Mattias Rost studied Foursquare check-in data and conducted interviews with Foursquare users. The analysis and interviews revealed that people use check-ins primarily for social communication and entertainment rather than just sharing their location. Check-ins allow people to coordinate with friends, share stories about their lifestyle, and engage in gameplay like competing for mayorships. However, norms around appropriate check-in behavior are still evolving.
Successful Qualitative Research: Don't get too comfortable!SAGE Publishing
In this presentation, Dr. Kristi Jackson of Queri, encourages qualitative researchers to observe what “closeness” and “distance” mean in everyday life, and to apply these observations to the analysis of qualitative data. She also provides practical suggestions about where, when, and how qualitative researchers might play with these ideas to move beyond comfortable interpretations to compelling ones. Kristi draws on 20 years of expertise in Qualitative Data Analysis Software (QDAS), although her presentation is appropriate for researchers regardless of whether or not they use such software. Attendees will leave with concrete tips about how to achieve closeness and distance in their own qualitative research (as they collect, handle, analyze and report their data), regardless of the theories and methodologies employed (e.g., discourse analysis, evaluation research, grounded theory, ethnography).
Presented to single family property managers to educate & entertain on concepts of persona based marketing, content development and the Renter's Decision Journey (RDJ).
Presentation for School of Visual Arts' Introduction to Information Architecture & Design - Presented by Robert Stribley, Senior Information Architect, Razorfish, NY
Social Intimacy in Social Media - How Youth Practice Friendships and Construc...Malene Charlotte Larsen
Keynote presentation at ECREA regional conference:
“Addressing the role of media in interpersonal communication and social interaction – in different contexts and professions”
Aarhus University, Nov 10 2015
Phoenix Design Week: User Journeys for Damn Good Digital DesignRebekah Baggs
Designing holistic digital experiences that delight our users and meet our organizational objectives isn't easy, but it's not impossible. User journeys can help.
Journeys and Notes: Designing Social Computing for Non-PlacesJustin Cranshaw
This is a presentation I gave at CHI 2016 for our project on Journeys and Notes, describes our explorations around building an online community around the journeys we take.
To reference this work, please cite our CHI 2016 paper, which can be found here:
https://dl.acm.org/citation.cfm?id=2858573&CFID=813579170&CFTOKEN=29973528
A presentation for Open Source Bridge that summarizes the 6 weeks of research and development that I just wrapped up while at the Banff Centre for a residency on Arts and Sciences for Saul and Charles.
See:
http://opensourcebridge.org/sessions/246
We live in dense urban landscapes that have crisis at many different scales. A crisis may be a large event such as a tsunami, an earthquake, a terrorist attack or other large scale disaster. A crisis may be something smaller such as a house fire, or a pileup on the freeway, a gas leak or a road out. A crisis may be something relatively minor, a crisis only to one person, such as being locked out of ones car, or trying to find a lost pet, or needing help sharing babysitting duties.
For the purpose of this talk I am interested in the far end of the long tail of crisis response – and what open source technology we can strap together to build tactical systems for helping tackle such crisis. I have been developing an approach using off the shelf tools that can help resolve local crisis – the smaller more personal crisis that interrupts peoples lives.
If we watch messages over a city, and provide analytic views for interested parties, then a role for “angels” to participate emerges. Interested individuals can act in a matchmaking capacity to connect complementary interests together. We can collaboratively up-score or down-score public comments aggregated from a variety of geo local sources. We can filter away noise so that responders can more easily decide what to respond to. In sum we can make it possible for people on the ground, in the area, to volunteer to help out by providing clarity.
I consider these class of services to be a kind of ubiquitous angel. They are not something that you have to even know exist until they help you.
The tools that we can leverage today to build such services are worth knowing – having many applications. In particular solr ( an enterprise search engine ) and carrot2 ( a topic clustering engine ) can play a powerful role in helping filter noise. Other related projects in particular Ushahidi and Swift have a high degree of overlap and those technologies will be discussed as well.
Beyond today there’s a role for such technology to help us deal with new kinds of crisis in the future. Over the next decades we may be facing economic and environmental concerns that are granular, evenly distributed and problematic in resolution. These kinds of tools and approaches may be useful there as well.
Don't get fooled again: Best Practices for Online Verification gatehouseGateHouseMedia
Craig Silverman, founder of the Regret the Error blog, shares his take on which media outlets got it wrong and which ones got it right – and why – during coverage of the Boston Marathon bombing suspects, with tips and takeaways for newsrooms on verification of digital information. Silverman (craig@craigsilverman.ca) is an award-winning journalist and the founder of Regret the Error, a blog that reports on media errors and corrections, and trends regarding accuracy and verification.
Presentación de Chema Alonso sobre el uso de los datos en la generación de servicios en Internet y la privacidad. Más información en el http://www.elladodelmal.com
Cartogram: Internet Startup Final PresentationCasey Winters
For Brad Keywell and Eric Lefkofsky's Building Internet Startups class at the University of Chicago, each student was asked to build a 5-10 page presentation for a new startup idea. Out of the 100 students in the class, seven were selected to be presented in front of the class. Mine was one of the seven chosen.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Successful Qualitative Research: Don't get too comfortable!SAGE Publishing
In this presentation, Dr. Kristi Jackson of Queri, encourages qualitative researchers to observe what “closeness” and “distance” mean in everyday life, and to apply these observations to the analysis of qualitative data. She also provides practical suggestions about where, when, and how qualitative researchers might play with these ideas to move beyond comfortable interpretations to compelling ones. Kristi draws on 20 years of expertise in Qualitative Data Analysis Software (QDAS), although her presentation is appropriate for researchers regardless of whether or not they use such software. Attendees will leave with concrete tips about how to achieve closeness and distance in their own qualitative research (as they collect, handle, analyze and report their data), regardless of the theories and methodologies employed (e.g., discourse analysis, evaluation research, grounded theory, ethnography).
Presented to single family property managers to educate & entertain on concepts of persona based marketing, content development and the Renter's Decision Journey (RDJ).
Presentation for School of Visual Arts' Introduction to Information Architecture & Design - Presented by Robert Stribley, Senior Information Architect, Razorfish, NY
Social Intimacy in Social Media - How Youth Practice Friendships and Construc...Malene Charlotte Larsen
Keynote presentation at ECREA regional conference:
“Addressing the role of media in interpersonal communication and social interaction – in different contexts and professions”
Aarhus University, Nov 10 2015
Phoenix Design Week: User Journeys for Damn Good Digital DesignRebekah Baggs
Designing holistic digital experiences that delight our users and meet our organizational objectives isn't easy, but it's not impossible. User journeys can help.
Journeys and Notes: Designing Social Computing for Non-PlacesJustin Cranshaw
This is a presentation I gave at CHI 2016 for our project on Journeys and Notes, describes our explorations around building an online community around the journeys we take.
To reference this work, please cite our CHI 2016 paper, which can be found here:
https://dl.acm.org/citation.cfm?id=2858573&CFID=813579170&CFTOKEN=29973528
A presentation for Open Source Bridge that summarizes the 6 weeks of research and development that I just wrapped up while at the Banff Centre for a residency on Arts and Sciences for Saul and Charles.
See:
http://opensourcebridge.org/sessions/246
We live in dense urban landscapes that have crisis at many different scales. A crisis may be a large event such as a tsunami, an earthquake, a terrorist attack or other large scale disaster. A crisis may be something smaller such as a house fire, or a pileup on the freeway, a gas leak or a road out. A crisis may be something relatively minor, a crisis only to one person, such as being locked out of ones car, or trying to find a lost pet, or needing help sharing babysitting duties.
For the purpose of this talk I am interested in the far end of the long tail of crisis response – and what open source technology we can strap together to build tactical systems for helping tackle such crisis. I have been developing an approach using off the shelf tools that can help resolve local crisis – the smaller more personal crisis that interrupts peoples lives.
If we watch messages over a city, and provide analytic views for interested parties, then a role for “angels” to participate emerges. Interested individuals can act in a matchmaking capacity to connect complementary interests together. We can collaboratively up-score or down-score public comments aggregated from a variety of geo local sources. We can filter away noise so that responders can more easily decide what to respond to. In sum we can make it possible for people on the ground, in the area, to volunteer to help out by providing clarity.
I consider these class of services to be a kind of ubiquitous angel. They are not something that you have to even know exist until they help you.
The tools that we can leverage today to build such services are worth knowing – having many applications. In particular solr ( an enterprise search engine ) and carrot2 ( a topic clustering engine ) can play a powerful role in helping filter noise. Other related projects in particular Ushahidi and Swift have a high degree of overlap and those technologies will be discussed as well.
Beyond today there’s a role for such technology to help us deal with new kinds of crisis in the future. Over the next decades we may be facing economic and environmental concerns that are granular, evenly distributed and problematic in resolution. These kinds of tools and approaches may be useful there as well.
Don't get fooled again: Best Practices for Online Verification gatehouseGateHouseMedia
Craig Silverman, founder of the Regret the Error blog, shares his take on which media outlets got it wrong and which ones got it right – and why – during coverage of the Boston Marathon bombing suspects, with tips and takeaways for newsrooms on verification of digital information. Silverman (craig@craigsilverman.ca) is an award-winning journalist and the founder of Regret the Error, a blog that reports on media errors and corrections, and trends regarding accuracy and verification.
Presentación de Chema Alonso sobre el uso de los datos en la generación de servicios en Internet y la privacidad. Más información en el http://www.elladodelmal.com
Cartogram: Internet Startup Final PresentationCasey Winters
For Brad Keywell and Eric Lefkofsky's Building Internet Startups class at the University of Chicago, each student was asked to build a 5-10 page presentation for a new startup idea. Out of the 100 students in the class, seven were selected to be presented in front of the class. Mine was one of the seven chosen.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
6. Two studies of foursquare
• Interview based study
Cramer, H., Rost, M., and Holmquist L. E. (2011). Performing a Check-in: Emerging Practices, Norms
and ‘Conflicts’ in Location-Sharing Using Foursquare. In proceedings of MobileHCI’11, Stockholm,
Sweden.
• Exploratory data analysis
Rost, M., Barkhuus, L., Cramer, H. and Brown, B. (2013) Representation and communication:
Challenges in interpreting large social media datasets. In Proceedings of CSCW’13, Feb 23-27, San
Antonio, Texas.
9. • "researchers conclude that people are hesitant to
share their location and would only do so when
they see a clear need to do so and usefulness to
the people they would share their location with or
request it.” - (Wagner et al. MobileHCI ’10)
10. • "researchers conclude that people are hesitant to
share their location and would only do so when
they see a clear need to do so and usefulness to
the people they would share their location with or
request it.” - (Wagner et al. MobileHCI ’10)
11. two alternatives
• 1) The researchers were wrong, because people
share their location through foursquare with no
“clear need to do so”
• or
• 2) There is a need with the foursquare check-in
that is not understood
12. Interviews
• 20 in depth interviews with foursquare users (15M,
5F. US, .se, .nl)
• 30-150 minutes
• students in their early 20s, to professionals in late
30s
• bus driver, IT consultant, event organiser working
from home, students, researchers
13. Questions about
• motivations for checking in
• with whom they shared
• which locations they would and would not share
• likes/dislikes about the service
• influence of incentives
• perceptions of other’s use of the service
14.
15. The act (checking in)
• Coordination
• Tell people you have arrived somewhere, or to invite people
to come join you
• Impression management / story telling
• sharing lifestyle
• Choose to checking in or not check in tells a story
• Mayorships, points
• Promoting a place (c.f. Facebook like)
16. audience-less
• Something to do
• “If your business meeting is boring for a moment
then you think, oh yeah, I could check in now”
• Diary / tracking
• “I did check in to the restaurant we went for lunch.
Because it was kind of cool and if I check in I can
remember it”
• Sharing is rather a “by-product”
17. Audience
• 1-92 foursquare friends
• “actual friends”, “colleagues”, “work contacts”,
“supervisors”, “partners”, “siblings”, “parents”,
“people i don’t know who requested to be my
friend”
18. • “I'm only friends with people [for whom] I know I
can check in anywhere”
• “People I wouldn’t want to have a beer with I
wouldn’t add on foursquare”
19. Considering the outside
• “I don't know what notifications they have, so I don't
know whether it's going to buzz his iPhone at 2 in
the morning or like, I don't know how he's got it set
up, and so I was really hesitant”
20. Twitter & FB
• More hesitant to share cross media
• Avoid “Oversharing”
• Privacy concerns – Who’s following you on Twitter?
• The “wider” audience are not interested
• Politeness
21. Venues
• Venue creation as a means of expression
• ‘in your pants’, ’heatpocalypse’, ’drop your pants’
• “Because it is an imaginary place, as opposed to a
‘venue’, I want to express myself in terms of place, not
just create a history of my consumer behavior”
!
• (friend checks in to places around the house
depending on mood)
22. “Rules”
• What is a venue?
• “what happens now is we begin to construct our
own rules, because there aren't rules”
• While shared during check-in, also permanent
record of named locations
• Ephemeral in-crowd jokes, becomes permanent
• Over specific: airport gates
23. “Route 12 in the annoying
traffic jam”
• “you’ll never find that in the phone book, such a
place, but you can see a lot of people check-in,
because they are stuck in the same place”
!
• super user: “not a real venue”
• “to have a full database of real places, instead of
fantasy”
24. Acceptabel check-ins
• “I hate people who check into their homes. […] I
had a friend who checked in to his home all the
time and he checked in at 7 PM and he’d go to the
supermarket, and he checks in there, and he’d
check in again at 9 PM [...] And I was just like,
dude, what are you doing? I don't care that you're
home, I'm not your mother.”
• [Information Entropy] Unexpected checkins
informational: expected checkins non-informational
25. Fake check-ins
• Faux pas
• Checking up on: “...just to check whether [he] was
really there. Like, you’re checking in so often, that
cannot be true”
• Self-motivational: “…sometimes we go to places
just to check in. But not just passing by, we actually
have to be there.”
26. Rewards
• Sharing for reward, rather than utility
• Stealing mayorships
• Badges: incentive increase specific behaviours
• Discouraged when unattainable.
27. Unwanted rewards
• Mayor was social signal of ownership
• “it felt like it was more my place and like, in a social
sense, than it was his place. But then he claimed it
in the game, and that felt wrong to me.”
29. Physicality
• Considering those co-present
• “If I'm with multiple people, I usually check in
earlier. If I'm with one person I usually wait until that
person has gone to the bathroom or something”
30. • “I've been caught by my wife, ehm… doing it under
the table. I pulled it out, like, like at breakfast, like
what are you doing? And I'm like... she's like:
‘you're checking in to foursquare’ she's like: ‘that's
not coming here. Like, it’s Sunday morning, like
what are you doing?’”
31. • Invites “non-users” & engage fellow users
• Shared activity among users, e.g. competition who
can do it first under the table
33. Norms and conflicts
• evolve as people learn what is a check-in, and
expect other’s to do the same
• conflicts between different style and purpose
• is a traffic jam a venue?
• is an event a venue?
• can a venue be ephemeral?
34. Why check in?
• by product
• check-ins for me (now for recommendations)
• rewards / game
Something to do!
while considering the audience
35. Conclusion
• ‘No clear need’ … but people ‘Do foursquare’ as a
need. We play, we laugh, we like to be entertained.
foursquare full fills a need: entertainment and
communication.
• Location as action, not state
• Not where people are, but what people
communicate
37. Studies of behaviour
• Facebook relationship status -> relationship
formation and breakup
• Status updates -> happiness, wellbeing
• Location-updates -> travel patterns and behaviours
• Location tracking -> Social events, human mobility
38. Representative?
• What is the data representing?
• Data cleaning… is it transforming the data into
something we want it to be?
39. Example
• Cheng et al. “Exploring Millions of Footprints in
Location Sharing Services” ICWSM’11
43. E.g.
> python topVenues newyork.txt 2010-11-15 | head 5!
Radioshack 1323!
Starbucks 53!
MoMa 50!
Eataly NYC 35!
High Line 26!
44. Nov 8-Dec5
• 5,499,469 venues
• 7.6 check-ins to each venue (Md=2, Var=46.7)
• Long tail
• Top 20% venues, 74% of the check-ins
• 37% (1,963,091) had 1 check-in
46. # Check-ins Venue
1 26 159 Siam Paragon (shopping mall), Bangkok
2 18 140 Los Angeles International Airport (LAX), US
3 17 224 MoMA Museum of modern art, NY
4 16 878 John F. Kennedy International Airport (JFK)
5 16 804 NBC Studio 1A Today Show, NY, US
6 16 564 Madison Square Garden, NY, US
7 16 404 Hartsfield Jackson Atlanta Int. Airport, US
8 15 967 San Francisco International Airport, US
9 15 239 Chicago O'Hare International Airport, US
10 12 460 New York Penn Station, NY, US
# Check-ins Venue
1 26 159 Siam Paragon (shopping mall), Bangkok
2 18 140 Los Angeles International Airport (LAX), US
3 17 224 MoMA Museum of modern art, NY
4 16 878 John F. Kennedy International Airport (JFK)
5 16 804 NBC Studio 1A Today Show, NY, US
6 16 564 Madison Square Garden, NY, US
7 16 404 Hartsfield Jackson Atlanta Int. Airport, US
8 15 967 San Francisco International Airport, US
9 15 239 Chicago O'Hare International Airport, US
10 12 460 New York Penn Station, NY, US
47. # Check-ins Venue
1 26 159 Siam Paragon (shopping mall), Bangkok
2 18 140 Los Angeles International Airport (LAX), US
3 17 224 MoMA Museum of modern art, NY
4 16 878 John F. Kennedy International Airport (JFK)
5 16 804 NBC Studio 1A Today Show, NY, US
6 16 564 Madison Square Garden, NY, US
7 16 404 Hartsfield Jackson Atlanta Int. Airport, US
8 15 967 San Francisco International Airport, US
9 15 239 Chicago O'Hare International Airport, US
10 12 460 New York Penn Station, NY, US
# Check-ins Venue
1 26 159 Siam Paragon (shopping mall), Bangkok
2 18 140 Los Angeles International Airport (LAX), US
3 17 224 MoMA Museum of modern art, NY
4 16 878 John F. Kennedy International Airport (JFK)
5 16 804 NBC Studio 1A Today Show, NY, US
6 16 564 Madison Square Garden, NY, US
7 16 404 Hartsfield Jackson Atlanta Int. Airport, US
8 15 967 San Francisco International Airport, US
9 15 239 Chicago O'Hare International Airport, US
10 12 460 New York Penn Station, NY, US
2.5M annual
visitors
7M annual
visitors
48. Local events
• #5: public studio for recording TV shows
• #13 & #19: Macy’s thanksgiving parade
• #39 Conan blimp (Badge for checking in)
49. “Snowpocalypse”
• Large numbers of weather related ‘venues’ (85)
• January 25th 2011, snowfall record held since 1925
• Freezepocalypse, Slushpocalypse, … telling a
story of the perceived conditions
• Illustrates a shared experience
53. External factors
• Radioshack
• 5 check-ins on the 12th of november
• 1323 check-ins on the 15th of november
• Top 10 most checked in venue for 3 days
• 15th: Promotion, 10% off for a check-in + Badge when
checked in to 5 stores
• (Online data influenced by small features + local
deviations)
56. So?
• So what have we looked at?
• Examples of communication within Foursquare over
a period of time, sharing experiences
• Not exhaustive or representative of what people do,
but examples of how people communicate
57. Check-in != Location
• #check-ins != #visitors
• Snowpocalypse started on Foursquare, not by snow
• External factors motivates checking in