The document analyzes Twitter data during Hurricane Sandy to understand communication flows. It finds that tweet volume increased as the storm hit but geotagging decreased, possibly due to cell network issues. Keyword analysis showed tweets mentioning "Sandy" rose dramatically. Maps showed tweet locations and densities increased in affected areas. Network analysis revealed interactions between general accounts and those mentioning "weather." Proper data handling, geocoding analysis, deduplication and device platform understanding are needed for effective emergency communication analysis.
OCHA Think Brief - Hashtag Standards for emergenciesJan Husar
POLICY AND STUDIES SERIES
These short think pieces are non-papers that present
relatively new ideas that require testing and validation.
The objective of the Think Brief is to generate feedback,
views and advice. The Think Briefs do not necessarily
represent the official views of OCHA
(Course updated March 19, 2013)
MCUrgent is a social media emergency notification system developed by Morris County and used in multi-jurisdictional emergencies. It includes towns as team members in a single Facebook and Twitter emergency notification stream.
This beginner course explains what it is and how municipalities can post messages.
Social Media & Crisis Communications: the story of #memstormMemphisWeather.net
Social Media & Crisis Communication:
The story of #memstorm
Presented at TechCamp Memphis (#tcmem)
5/12/2012
MemphisWeather.net meteorologist Erik Proseus
This report outlines market trends in 2013 and provides growth prospects for the investment, office, logistics and retail property markets in France and the Paris region.
OCHA Think Brief - Hashtag Standards for emergenciesJan Husar
POLICY AND STUDIES SERIES
These short think pieces are non-papers that present
relatively new ideas that require testing and validation.
The objective of the Think Brief is to generate feedback,
views and advice. The Think Briefs do not necessarily
represent the official views of OCHA
(Course updated March 19, 2013)
MCUrgent is a social media emergency notification system developed by Morris County and used in multi-jurisdictional emergencies. It includes towns as team members in a single Facebook and Twitter emergency notification stream.
This beginner course explains what it is and how municipalities can post messages.
Social Media & Crisis Communications: the story of #memstormMemphisWeather.net
Social Media & Crisis Communication:
The story of #memstorm
Presented at TechCamp Memphis (#tcmem)
5/12/2012
MemphisWeather.net meteorologist Erik Proseus
This report outlines market trends in 2013 and provides growth prospects for the investment, office, logistics and retail property markets in France and the Paris region.
This is a self-made presentation about The Big Bang Theory (NOT the TV show :P) to be given to a lecturer and students of University level. Intended for all those to download who may have presentations to give and can't find a good enough topic :). Everyone else is free to download it for other purposes as well!!
Oprah Winfrey, has had more of an influence on Western society than most politicians and religious leaders put together. People trust her, because she has stayed true to herself in her career.
A presentation on how Elon Musk created world class and revolutionary companies such as Tesla, Spacex, Solar City etc, thus confirming that he is the real life Tony Stark!! ;)
Google has developed the programming language called Go. Go is a freedom-respecting and open source programming language and it is designed by Robert Griesemer, Rob Pike, and Ken Thompson in the year 2007. Go language was released in 2009. The syntax of the Go language resembles the C programming language and Go language is a statically typed programming language which is often called golang. Go language is detailed understood by golang online course.
Every single developer heard this say more than one time during his professional career, 'KIS' which means 'Keep It Simple', however with the excessive evolvement of the web computing and the continues rise of the distributed systems, the complexity of the systems architecture increases. Building a server enterprise application which is highly scalable with high and reliable availability in addition to great performance which consists of set of independent deployable oriented services can be achieved by Microservice architecture. This session introduces briefly what is the Microservice Architecture and how to build it using one of the most popular server programming languages which is called Go or Golang.
Here's my presentation on Google Analytics development (via Google Tag Manager) that I gave at SuperWeek 2015, in January.
The presentation goes through two interesting use cases for making data more meaningful: Page Visibility as a requirement for Page Views, and Enhanced Ecommerce for Content Tracking.
For my final year project I used data analysis techniques to investigate user behavior pattern recognition in respect of similar interests and culture versus offline geographical location. This was an out-of-the-box topic, which I selected due to my love on Data Analysis, in respect of the Social Network Analysis in the Internet era.
From Research to Applications: What Can We Extract with Social Media Sensing?Yiannis Kompatsiaris
SIGMAP22 Keynote Presentation:
Social media have transformed the Web into an interactive sharing platform where users upload data and media, comment on, and share this content within their social circles. The large-scale availability of user-generated content in social media platforms has opened up new possibilities for studying and understanding real-world phenomena, trends and events. Social media and websites provide an access to public opinions on certain aspects and therefore play an important role in getting insights on targeted audiences. The objective of this talk is to provide an overview of social media mining, including key aspects such as data collection, multimodal analysis and visualization. Challenges, such as fighting misinformation, will be presented together with applications, results and demonstrations from multiple areas including: news, environment, security, interior and urban design.
This is a self-made presentation about The Big Bang Theory (NOT the TV show :P) to be given to a lecturer and students of University level. Intended for all those to download who may have presentations to give and can't find a good enough topic :). Everyone else is free to download it for other purposes as well!!
Oprah Winfrey, has had more of an influence on Western society than most politicians and religious leaders put together. People trust her, because she has stayed true to herself in her career.
A presentation on how Elon Musk created world class and revolutionary companies such as Tesla, Spacex, Solar City etc, thus confirming that he is the real life Tony Stark!! ;)
Google has developed the programming language called Go. Go is a freedom-respecting and open source programming language and it is designed by Robert Griesemer, Rob Pike, and Ken Thompson in the year 2007. Go language was released in 2009. The syntax of the Go language resembles the C programming language and Go language is a statically typed programming language which is often called golang. Go language is detailed understood by golang online course.
Every single developer heard this say more than one time during his professional career, 'KIS' which means 'Keep It Simple', however with the excessive evolvement of the web computing and the continues rise of the distributed systems, the complexity of the systems architecture increases. Building a server enterprise application which is highly scalable with high and reliable availability in addition to great performance which consists of set of independent deployable oriented services can be achieved by Microservice architecture. This session introduces briefly what is the Microservice Architecture and how to build it using one of the most popular server programming languages which is called Go or Golang.
Here's my presentation on Google Analytics development (via Google Tag Manager) that I gave at SuperWeek 2015, in January.
The presentation goes through two interesting use cases for making data more meaningful: Page Visibility as a requirement for Page Views, and Enhanced Ecommerce for Content Tracking.
For my final year project I used data analysis techniques to investigate user behavior pattern recognition in respect of similar interests and culture versus offline geographical location. This was an out-of-the-box topic, which I selected due to my love on Data Analysis, in respect of the Social Network Analysis in the Internet era.
From Research to Applications: What Can We Extract with Social Media Sensing?Yiannis Kompatsiaris
SIGMAP22 Keynote Presentation:
Social media have transformed the Web into an interactive sharing platform where users upload data and media, comment on, and share this content within their social circles. The large-scale availability of user-generated content in social media platforms has opened up new possibilities for studying and understanding real-world phenomena, trends and events. Social media and websites provide an access to public opinions on certain aspects and therefore play an important role in getting insights on targeted audiences. The objective of this talk is to provide an overview of social media mining, including key aspects such as data collection, multimodal analysis and visualization. Challenges, such as fighting misinformation, will be presented together with applications, results and demonstrations from multiple areas including: news, environment, security, interior and urban design.
Big data in transport an international transport forum overview oct 2013OpenSkyData
Comprehensive Guide on the use of Big Data in Transportation Services from the International Transport Forum. OpenSky loves making big data work for organisations large and small.
http://www.openskydata.com/our-sectors/transport.html
Expelling Information of Events from Critical Public Space using Social Senso...ijtsrd
Open foundation frameworks give a significant number of the administrations that are basic to the wellbeing, working, and security of society. A considerable lot of these frameworks, in any case, need persistent physical sensor checking to have the option to recognize disappointment occasions or harm that has struck these frameworks. We propose the utilization of social sensor enormous information to recognize these occasions. We center around two primary framework frameworks, transportation and vitality, and use information from Twitter streams to identify harm to spans, expressways, gas lines, and power foundation. Through a three step filtering approach and assignment to geographical cells, we are able to filter out noise in this data to produce relevant geo located tweets identifying failure events. Applying the strategy to real world data, we demonstrate the ability of our approach to utilize social sensor big data to detect damage and failure events in these critical public infrastructures. Samatha P. K | Dr. Mohamed Rafi "Expelling Information of Events from Critical Public Space using Social Sensor Big Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25350.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/25350/expelling-information-of-events-from-critical-public-space-using-social-sensor-big-data/samatha-p-k
Social Data and Multimedia Analytics for News and Events Applications lecture given at 2015 IEEE SPS Italy Chapter Summer School on Signal Processing (S3P)
2018 GIS in Recreation: The Latest Trail Technology Crowdsourcing Maps and AppsGIS in the Rockies
Americans are increasingly recognizing the health, quality of life, environmental, and economic benefits that trails and active transportation offer. As a result, now more than ever it’s important to connect people to our trails, improve the planning of new trails, and better understand how visitors use trails.
For this session, we’ll explore what role technology plays in how people engage with trails. How can land managers utilize technology to publish better information to their visitors and also understand who’s engaging with their recreational infrastructure? Learn how to reach and understand new audiences, using everything from apps that get people outdoors to crowdsourced data.
What's the status of the NSDI?
Cowen's address will provide his perspective on the current status of the National Spatial Data Infrastructure (NSDI). He will draw from his extensive experience with the National Research Council’s Mapping Science Committee, chairing the NRC study National Land Parcel Data: A Vision for the Future, a recent term as chair of the National Geospatial Advisory Committee, and his service as vice chairman of the Coalition of Geospatial Organizations (COGO) Report Card Committee on the NSDI. Through these activities he has observed and analyzed the Federal geospatial landscape for the thirty years since president Clinton issued Executive Order 12906, Coordinating Geographic Data Acquisition and Access: The National Spatial Data Infrastructure in 1994. He will comment on the changing role of various stakeholders in the collection, maintenance and sharing of geospatial data.
Event detection in twitter using text and image fusioncsandit
In this paper, we describe an accurate and effective event detection method to detect events from
Twitter stream. It detects events using visual information as well as textual information to improve
the performance of the mining. It monitors Twitter stream to pick up tweets having texts and photos
and stores them into database. Then it applies mining algorithm to detect the event. Firstly, it detects
event based on text only by using the feature of the bag-of-words which is calculated using the term
frequency-inverse document frequency (TF-IDF) method. Secondly, it detects the event based on
image only by using visual features including histogram of oriented gradients (HOG) descriptors,
grey-level co-occurrence matrix (GLCM), and color histogram. K nearest neighbours (Knn)
classification is used in the detection. Finally, the final decision of the event detection is made based
on the reliabilities of text only detection and image only detection. The experiment result showed that
the proposed method achieved high accuracy of 0.93, comparing with 0.89 with texts only, and 0.86
with images only.
Big Data Analytics - A use case for 5G deployment Massimo Marino
Can and How Telco benefit from big data analytics?
Understanding 5G, Internet of Things, and Big Data.
Big Data Analytics for 5G networks offers an opportunity to gain a better picture of operations and customers, and to maximise profits and user satisfaction.

Achieving and managing a pro-active core network with advanced packet priority and routing management, and exploiting SDN technology will maximise the global throughput and minimise jitter and latency.
The use of the SDN technology is linked to the use of Big Data.
Similar to Analysis of Twitter Data During Hurricane Sandy (20)
The Viral Nature of Social Media Messages in DisasterCatherine Graham
The originator of this message was trying to find help for Ward no. 4’s villagers via social media. Facebook statistics show that their average user has 350 contacts. If the average user has 350 followers, this means this one message is delivered to approximately 350,000 Facebook users. But over a week before, this case had already been posted on quakemap.org, a crisis-mapping database built by online volunteers and managed by Kathmandu Living Labs. On May 7, humanitarian group Helping Hands is notified, and by May 11, Ward no. 4 has already received much-needed food and shelter.
Ward no. 4 was assisted by a coordinated crisis mapping effort. In crisis mapping, people submit their info on disaster hotspots to an online report database. These reports show aid agencies on the ground where the affected area is, and what sort of relief the people need (food/water/shelter, medical aid, etc.) Dedicated volunteers filter that information for accuracy. Taken together, these reports form a map of the disaster zone, showing aid agencies where the greatest needs are concentrated, and what locations need the most help.
Overview of Social Media During Disaster and Crowd Power in Disaster Response
Prepared for Middlebury Institute of International Studies (MIIS) Disaster Response/Resilience Seminar
Presented by Catherine Graham
May 6, 2016
This is a collaborative project between Humanity Road and volunteers from GISCorps aimed to review and collate mapping resources relating to Typhoon Hagupit. A wide variety of mapping products from DHN members, relief agencies and government departments were reviewed and categorized. Additionally, links to these mapping products were created in the DHN ArcGIS Online Account: http://dhnetwork.maps.arcgis.com
A brief slide presentation on elements of social media exercises and what to include in your internal and external planning. There are two types of social media exercise planning - off channel (using simulators) and on channel using actual social media. In either situation you should have internal and external communications plans in place.
Visit http://quackattack.cdrp.net/
The Quack Attack exercise is designed to highlight the capabilities of social media in a disaster situation, as well as train participants in how to utilize various social media platforms and techniques.
In order to achieve whole community solutions it takes a whole community approach. FSU VOST, Humanity Road, and CDRP are working together to prepare and respond to disaster. Whole community participation is key to improving disaster response and recovery.
Overview of Social Media During Disaster and Crowd Power in Disaster Response
Prepared for Otago University, COMP113 Social Media and Online
Presented by Catherine Graham
January 29, 2013
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
Analysis of Twitter Data During Hurricane Sandy
1. Analysis of Twitter Data during
Hurricane Sandy
Statistics Without Borders And Humanity Road
With data aggregated by TweetTracker
1
2. Published April 3, 2013 Page 2
Introduction
• To further the research and analysis of the use of communications
tools and social media during disaster, Humanity Road sponsored a
project to analyze a discrete set of Hurricane Sandy tweets that
originated from Long Island, NY.
• The goal was to identify statistically valid data that would add value
in understanding the flow of communications during the response
and recovery process. Additional research is recommended for the
same geography now in the recovery phase of Hurricane Sandy.
• There is a need to shorten the timeline for analysis of data during
emerging events. We recommend additional research to study the
elements and interplay of geography, population, social networks
and devices
3. Published April 3, 2013 Page 3
The Team
• This team explored what data may be available quickly that could be
useful to disaster response organizations in response to an emerging
event and also to identify what steps should be taken to increase
and ensure ‘good clean data’ is used for the analysis.
• The team included experienced members of the technology
community. Statistics without Borders performed analysis on data
that was aggregated by TweetTracker from Arizona State University
Decision Machine Learning Lab (DMML). TweetTracker is a project
sponsored by the Office of Naval Research)
4. Published April 3, 2013 Page 4
Parameters
• Data set was collected for six days from October 26, 2012 through
Oct 31, 2012 on a slow moving event, Hurricane Sandy.
• The geoboundary set for research included all of Long Island
Geocoding is approximate based on user preferences, exact location
may vary due to variables in twitter, cell phone and service provider
settings
• The report was compiled in partnership with Statistics without
Borders, for analysis with data aggregation by TweetTracker from
Arizona State University DMML lab (a project sponsored by the
Office of Naval Research)
5. Published April 3, 2013 Page 5
Total Tweet Volume
• Looking at Twitter Traffic by Day shows that it may be difficult to isolate the effects of time, from the
effects of the hurricane.
▫ The lowest volume day was on Sunday before Sandy Hit
▫ The highest volume day was the day after Sandy hit
• In order to identify significant shifts in total tweet volume it may be necessary to use longer timelines of
local data.
6. Published April 3, 2013 Page 6
Total Tweet Volume
• Views of Tweet volume over time, given a dataset over a small time window, may be made more useful by
filtering the tweets to focus on disaster event related keywords
• In the image below, we have filtered the tweets that are counted towards the tweet volume by the
keyword “Sandy”
• Even while, as shown in the previous slide, overall Tweet volume hasn’t changed dramatically, Tweets
about Sandy rise dramatically once the storm hits New York
Volume of Tweets that mention “Sandy” over timespan of data
Start
of
Sandy
7. Published April 3, 2013 Page 7
Tweets by Source
• Further analysis of daily trends by source indicates that there may be some
limitations to what twitter data can be Geocoded during weather events.
▫ Starting from Sunday October 28th the % of Geocodable tweets drops from 67% to 36% indicating that
there may have been some interference with the ability of mobile user’s phones to provide
coordinates.
▫ This is especially notable as the % of Mobile tweets remains fairly constant around 80%
*Tweets were classified as “Geocodable” if they were geotagged and
were not listed as being from a web source
8. Published April 3, 2013 Page 8
Tweets by Source (continued)
▫ The percentage of Geocodable tweets remains low in the days just after the storm as well
This could be caused by damage to mobile geotagging functionality.
It could also represent more users turning off the GPS function of their phone in order to conserve phone battery life.
9. Published April 3, 2013 Page 9
Tweet Locations Manhattan - Baseline
• The map below shows Tweets per 10k people on
October 28th, 2012.
• Tweet Volume on that Sunday was particularly low.
10. Published April 3, 2013 Page 10
Tweet Locations Manhattan – Event Day
• The map below shows Tweets per 10k people on
October 29th, 2012, the Day Sandy Hit.
11. Published April 3, 2013 Page 11
Tweet Locations Long Island- Baseline
• The map below shows Tweets per 10k people on October 28 th, 2012.
12. Published April 3, 2013 Page 12
Tweet Locations Long Island- Event Day
• The map below shows Tweets per 10k people on October 29th, 2012.
• Tweet Volume on that Sunday was particularly low.
13. Published April 3, 2013 Page 13
Storm Surge Data
• The map below has some additional storm surge Figures overlaying the
Twitter heat map.
• There still seems to be fairly strong Twitter traffic even in areas with high
storm surge.
• Storm surge data aquired from AccuWeather
14. Published April 3, 2013 Page 14
Network relationships
• The social network visualization below shows interactions between Twitter accounts in
general and those that contain the string “weather” in them
• Links are only made where the tweets in question mentioned “sandy”
• Filtering the data in this way and then rendering network relationships can yield useful
views
• This view may reveal something of where various Twitter users were getting their Sandy
related weather updates
15. Published April 3, 2013 Page 15
Twitter analytics summary
• In order to draw any strong conclusions from Twitter data it may be
necessary to conduct more detailed analysis of overall patterns
• Insight may be gained by interactively visualizing the data and
filtering for keywords of interest
• Map visualization provides some information for locations and high
volume areas, and overall patterns.
▫ Unfortunately major events like this hurricane may interfere with the
ability to get good location data from Twitter.
• Overlaying weather or other event information may add more
actionable information to the analysis.
• Some mapping software provides easy sharing via the web, and
could be used to share maps during emergencies.
▫ These mapping systems would be interactive as well which will make the
data more actionable.
ArcGIS Explorer
Google Earth
▫ Some of these systems also include important location information like
parks, schools, hospitals and churches.
• Network visualization may be useful in gaining insights that
geospatial and temporal views elide, such as what news
organizations Twitter users interact with about a crisis event
16. Published April 3, 2013 Page 16
Data considerations
• To preserve data integrity, the raw data should be
imported directly into a statistical or GIS package. Loss
of integrity can result when using spreadsheet
applications, which are not designed to manage data.
• Maps should make use of standard geographies (e.g.,
Census tracts) wherever possible, as these maps are both
freely available and have population counts.
• Raw data can be assumed to contain duplicate records
and blanks (no text in the tweet). Standard data quality
checks should include the removal of duplicates (on ID
variables, tweet text and date-time) and blanks.
• Accuracy of geocoding should be assessed by looking for
unusual (or implausible) concentrations of tweets in
specific geographies.
17. Published April 3, 2013 Page 17
Data considerations – cont’d
• There are hundreds of different tweet publishing
platforms, but only a few account for any substantial
proportion of tweets. The top 4 publishing modes
account for 80% of tweets; the top 8 account for 90% of
tweets. These should be kept in mind when considering
any type of device-specific content.
Platform Percent
Twitter for iPhone 45.5%
Twitter for Android 13.7%
Instagram 10.5%
foursquare 10.2%
Tweetbot for iOS 4.9%
dlvr.it 2.3%
Tweetbot for Mac 2.1%
Twitter for BlackBerry 1.8%
18. 18
Overall Summary
• Data treatment such as formatting, deduplication, geotagging analysis are important
steps to presenting the data.
• Geocoding is approximate based on user preferences; exact location may vary due to
variables but can be useful to determine
• Geocoded information can decrease or degrade in certain type events and warrants more
research.
• Deduplication should be a standard part of any data cleaning prior to analysis
• Geocode trend line should be included in future reports to continue communications
research
• Tweet volume can remain the same but subject matter shifts can be tracked through
keyword analysis.
• Analysis of publish codes for platform is possible and recommended at the county level
for emergency managers to determine device types & relevant applications. Some codes
allow you to infer the device type (e.g., Android, iPhone, iPad, iOS, Blackberry); others
don't (e.g., Instagram, Foursquare, Tweetdeck).
• Some mapping can be done with free tools such as Google-Earth, ARC GIS and Geofeedia
but no matter what tool is used, statistical analysis from Statistics without Borders can
help identify trends as well as help to create visually useful content.
19. Published April 3, 2013 Page 19
Credits
Special thanks to the following for contributing their time and
dialogue to the preparation of this report
•Team selection Cathy Furlong, Statistics without Borders
•GIS and heat map results Paige Stover, Statistics without Borders
•Network Relationships Joshua Saxe, Statistics without Borders
•Analytics & data considerations by Tim B. Gravelle, Statistics without Borders
•Additional guidance and recommendations by Joanna Lane, NY VOST
•TweetTracker developed by Shamanth Kumar, Fred Morstatter and Dr. Huan Liu
Arizona State University DMML Lab under a grant from the Office of Naval Research
•Summary and Project Management by Cat Graham, Humanity Road
•Storm surge data acquired from AccuWeather