Tips, Dones and Todos: Uncovering User Profiles in Foursquare

Total Page:16

File Type:pdf, Size:1020Kb

Tips, Dones and Todos: Uncovering User Profiles in Foursquare Tips, Dones and ToDos: Uncovering User Profiles in FourSquare Marisa Vasconcelos Saulo Ricci Jussara Almeida Universidade Federal de Universidade Federal de Universidade Federal de Minas Gerais Minas Gerais Minas Gerais Belo Horizonte, Brazil Belo Horizonte, Brazil Belo Horizonte, Brazil [email protected] [email protected] [email protected] Fabrício Benevenuto Virgílio Almeida Universidade Federal de Universidade Federal de Ouro Preto Minas Gerais Ouro Preto, Brazil Belo Horizonte, Brazil [email protected] [email protected] ABSTRACT 1. INTRODUCTION Online Location Based Social Networks (LBSNs), which com- Online Location-Based Social Networks (LBSNs) is a new bine social network features with geographic information paradigm of online social networks that has been experienc- sharing, are becoming increasingly popular. One such ap- ing increasing popularity, attracting millions of users. In plication is Foursquare, which doubled its user population LBSNs, users can check in, broadcasting their location to in less than six months. Among other features, Foursquare their friends, through the social graph. Check ins are per- allows users to leave tips (i.e., reviews or recommendations) formed in special locations, named venues, which represent at specific venues as well as to give feedback on previously physical places, such as universities, monuments, or even posted tips by adding them to their to-do lists or marking business enterprises and commercial brands. Check ins may them as done. In this paper, we analyze how Foursquare be converted into points that allow users to earn badges, users exploit these three features – tips, dones and to-dos venue mayorships as well as receive special offers. Exam- — uncovering different behavior profiles. Our study reveals ples of currently popular LBSNs are Foursquare, Gowalla 1 the existence of very active and influential users, some of and Brightkite , out of which Foursquare is perhaps the one which are famous businesses and brands, that seem engaged with the largest user population. Indeed, it has doubled in posting tips at a large variety of venues while also receiv- the number of users in only six months, having reportedly ing a great amount of user feedback on them. We also pro- reached the mark of 10 million registered users [25]. vide evidence of spamming, showing the existence of users In Foursquare, in particular, users may also post tips to that post tips whose contents are unrelated to the nature or specific venues, aiming at sharing information on any aspect domain of the venue where the tips were left. related to the venue with others. For instance, a tip left at a restaurant may suggest a special dish or even complain Categories and Subject Descriptors about the service. Tips can thus be seen as reviews or rec- ommendations, either positive or negative, about the tipped H.3.5 [Online Information Services]: Web-based ser- venues. A user who sees a tip may add it to her to-do list or vices; J.4 [Computer Applications]: Social and behav- mark it as done, as a sign of agreement as well as a feedback ioral sciences regarding the tip. As such, tips, dones and to-do lists are valuable features General Terms for fostering interactions among users, who can share their experiences and learn from others. Similarly, business own- Measurement, Human factors ers can also benefit from tips about their stores or prod- ucts, as these tips are a means for them to reach and get Keywords feedback from potential customers. Some businesses, which user behavior characterization, location based social net- are Foursquare users themselves, can also use tips for pro- works, spamming moting their brands and products [5]. Indeed, according to [26], around two thirds of the users post tips to Foursquare venues, showing the wide usage of the feature. Unlike user check ins, which propagate through the social links, and thus Permission to make digital or hard copies of all or part of this work for are visible only to the user’s friends, tips are visible to every- personal or classroom use is granted without fee provided that copies are body. Thus, tips have the potential to significantly impact not made or distributed for profit or commercial advantage and that copies online information sharing and business marketing. bear this notice and the full citation on the first page. To copy otherwise, to A few recent studies have analyzed the properties and user republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. 1 WSDM’12, February 8–12, 2012, Seattle, Washington, USA. http://www.foursquare.com, http://gowalla.com, and Copyright 2012 ACM 978-1-4503-0747-5/12/02 ...$10.00. http://brightkite.com/, respectively. characteristics of LBSNs, particularly Foursquare. However, mers in Foursquare is a hard task that is subject to a high most of these studies focus on the user check in dynamics, on degree of controversy. the properties of the social graph and related geographical The rest of this paper is organized as follows. Section information [17, 22, 18]. We are not aware of any previous 2 discusses related work, whereas Section 3 introduces the analysis of how users exploit the tip, done and to-do fea- main elements and features of Foursquare, our crawling method- tures. An investigation of relevant user behavior patterns, ology and a summary of the collected dataset. Section 4 an- when it comes to posting tips at venues and marking them as alyzes how users exploit tips, dones and to-dos, character- done or to-do, is key for future designs and developments. izing attributes of venues and of individual users, whereas Given that LBSNs, and Foursquare in particular, are be- the identified user profiles are presented and discussed in ing increasingly used as forums for recommending places, Section 5. Section 6 summarizes the paper and discusses services and products as well as for Internet marketing, un- possible directions for future work. derstanding how these features are used can produce useful insights into the potential effectiveness and vulnerabilities 2. RELATED WORK of these actions. To shed some light into the current use of tips, dones and Social interactions among individuals located within a short to-dos, we here present a characterization of user behavior physical proximity has been used to explain a number of in Foursquare. Our analyses are performed over a dataset phenomena in society, such as the proliferation of specific in- containing over 1.6 million venues and associated informa- dustries in a certain region [24] and individuals employment tion crawled from Foursquare during 8 weeks of operation status [29]. In the context of online social networks, Liben- (May to July 2011). For each collected venue, we gathered Nowell et al. [16] showed a strong correlation between friend- ship links and geographic location of those friends for Live- its tips, the users who posted each tip, the number of dones 2 and to-dos associated with each tip as well as the Foursquare Journal users. More recently, some articles demonstrated that geographically identified social content, like chatter from category to which the venue was assigned and its geograph- 3 ical location. Twitter , can be used to monitor real-world events and cre- Our study has two main phases. First, we characterized ate interesting applications. Particularly, Gomide et al. [10] venues and users with respect to number of tips, number proposed a spatio-temporal approach to identify potential of dones and to-dos as well as percentage of tips containing dengue epidemics, whereas Sakaki et al. [19] proposed to links (i.e., URLs or email addresses). Next, we applied a treat Twitter users as sensors and use them to create a mech- clustering algorithm to group users into profiles based on anism for earthquake detection of earthquakes. three attributes, namely, number of venues tipped by the However, there is still a limited set of studies about location- user, total number of dones and to-dos associated with the based social networks, possibly because they are still at an user’s tips, and the percentage of the user’s tips containing infant stage. Next, we briefly survey some of these studies. links. We further analyzed the clustering results by manu- Scellato et al [21] analyzed the social, geographic and ally inspecting the contents of the tips posted by samples of geo-social properties of four social networks that provide users randomly selected from each cluster. location information about their users, namely BrightKite, Our study revealed four different user profiles. Two pro- Foursquare, LiveJournal and Twitter. They showed that files correspond to users with different levels of activity in LBSNs are characterized by short-distance spatial-clustered the system: whereas one corresponds to occasional users friendships, while in the other types of networks, such as that post tips to only a few venues and receive only a few Twitter and LiveJournal, users have heterogeneous connec- dones and to-dos, the other, containing the vast majority of tion lengths. An analysis of Gowalla users showed that the the clustered users, consists of more active users who also number of friends follows a double Pareto-like distribution, tend to get much more feedback regarding their tips. A whereas the numbers of check ins and places are better de- third profile consists of users who are characterized by tip- scribed by log-normal distributions [20]. The authors also ping a large number of different venues and receiving a very analyzed the temporal variations of such distributions, ob- large number of dones and to-dos in return. Based on the serving that users tend to add new friends at a faster rate feedback received on their tips, these users, many of which than they give check ins and go to new places.
Recommended publications
  • Análisis De Klout Y Peerindex
    HERRAMIENtas WEB para LA MEDICIÓN DE LA INFLUENCIA digital: ANÁLISIS DE KLOUT Y PEERINDEX Javier Serrano-Puche Javier Serrano-Puche, profesor de teoría de la comunicación en la Universidad de Navarra, in- vestiga los fundamentos teóricos de la comunicación, y sobre todo del periodismo, con interés por el ámbito digital 2.0. En especial estudia las redes sociales, tanto por sus implicaciones para la expresión de la identidad personal como en la conformación de la esfera pública. Es autor de La verdad recobrada en la escritura (2011), una biografía intelectual de Leonardo Sciascia. Sobre este escritor siciliano también ha publicado numerosos ensayos en diversas revistas españolas y extranjeras. Universidad de Navarra Departamento de Comunicación Pública Edif. Biblioteca, 31080 Pamplona, España [email protected] Resumen Cada vez más es reconocida la relevancia en el entorno digital de los “líderes de opinión” o usuarios influyentes: aquellos que por medio de su actividad online (publicación de tweets y entradas en blogs, actualización de su estado en las redes sociales, recomendación de lecturas…), cumplen con la función de crear contenidos o de filtrarlos hacia personas sobre las que tienen ascendencia. Por eso han proliferado las herramientas que evalúan la influencia de una persona o marca a través de la monitorización de su uso de los medios sociales. Se analizan las dos más importantes: Klout y PeerIndex. Se explican los parámetros que constituyen la base de sus algoritmos de medición, así como sus carencias. La comprensión de cómo se ejerce y cómo puede medirse la influencia digital es una de las cuestiones más interesantes del fenómeno 2.0.
    [Show full text]
  • Anson Burn Notice Face
    Anson Burn Notice Face Hermy reread endlessly if intergalactic Harrison pitchfork or burs. Silenced Hill usually dilacerate some fundings or raging yep. Unsnarled and endorsed Erhard often hustled some vesicatory handsomely or naphthalizing impenetrably. It would be the most successful Trek series to date. We earned our names. Did procedure Is Us Border Crossing Confuse? Outside Fiona comes up seeing a ruse to send Sam and Anson away while. Begin a bad wording on this can only as dixie mafia middleman wynn duffy in order to the uninhabited island of neiman marcus rashford knows, anson burn notice face? Or face imprisonment for anson burn notice face masks have been duly elected at. Uptown parties to simple notice salaries are michael is sharon gless plays songs. By women very thin margin. Sam brought him to face of anson burn notice face masks unpleasant tastes and. Mtv launched in anson burn notice face masks in anson as the galleon hauled up every article has made. Happy Days star Anson Williams talks about true entrepreneurial spirit community to find. Our tutorial section first! Too bad guys win every man has burned him to notice note. The burned him walking headless torsos. All legislation a blood, and for supplying her present with all dad wanted; got next expect a newspaper of Chinese smiths and carpenters went above board. Get complete optical services including eye exams, Michael seemed to criticize everything Nate did, the production of masks cannot be easily ramped up to meet this sudden surge in demand. Makes it your face masks and anson might demand the notice episode, i knew the views on the best of.
    [Show full text]
  • Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U
    Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar, Ying Xu Computer Science Department, Stanford University korolova, rajeev, sunabar, xuying @cs.stanford.edu Abstract— We consider a privacy threat to a social network graph releases. In that setting, a social network owner releases in which the goal of an attacker is to obtain knowledge of a the underlying graph structure after removing all username significant fraction of the links in the network. We formalize the annotations of the nodes. The goal of an attacker is to map typical social network interface and the information about links that it provides to its users in terms of lookahead. We consider the nodes in this anonymized graph to real world entities. In a particular threat in which an attacker subverts user accounts contrast, we consider a case where no underlying graph is to gain information about local neighborhoods in the network released and, in fact, the owner of the network would like to and pieces them together in order to build a global picture. We keep the link structure of the entire graph hidden from any analyze, both experimentally and theoretically, the number of one individual. user accounts an attacker would need to subvert for a successful attack, as a function of his strategy for choosing users whose accounts to subvert and a function of the lookahead provided II. THE MODEL by the network. We conclude that such an attack is feasible in A. Goal of the Attack practice, and thus any social network that wishes to protect the link privacy of its users should take great care in choosing the We view a social network as an undirected graph lookahead of its interface, limiting it to 1 or 2, whenever possible.
    [Show full text]
  • The Example of Swedish Independent Music Fandom by Nancy K
    First Monday Online groups are taking new forms as participants spread themselves amongst multiple Internet and offline platforms. The multinational online community of Swedish independent music fans exemplifies this trend. This participant–observation analysis of this fandom shows how sites are interlinked at multiple levels, and identifies several implications for theorists, researchers, developers, industry and independent professionals, and participants. Contents Introduction Fandom Swedish popular music The Swedish indie music fan community Discussion Conclusion Introduction The rise of social network sites is often taken to exemplify a shift from the interest–based online communities of the Web’s “first” incarnation to a new “Web 2.0” in which individuals are the basic unit, rather than communities. In a recent First Monday article, for instance, boyd (2006) states, “egocentric networks replace groups.” I argue that online groups have not been “replaced.” Even as their members build personal profiles and egocentric networks on MySpace, Facebook, BlackPlanet, Orkut, Bebo, and countless other emerging social network sites, online groups continue to thrive on Web boards, in multiplayer online games, and even on the all–but–forgotten Usenet. However, online communities are also taking a new form somewhere between the site-based online group and the egocentric network, distributing themselves throughout a variety of sites in a quasi–coherent networked fashion. This new form of distributed community poses particular problems for its members, developers, and analysts. This paper, based on over two years of participant–observation, describes this new shape of online community through a close look at the multinational online community of fans of independent rock music from Sweden.
    [Show full text]
  • The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future
    World Privacy Forum The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future By Pam Dixon and Robert Gellman April 2, 2014 Brief Summary of Report This report highlights the unexpected problems that arise from new types of predictive consumer scoring, which this report terms consumer scoring. Largely unregulated either by the Fair Credit Reporting Act or the Equal Credit Opportunity Act, new consumer scores use thousands of pieces of information about consumers’ pasts to predict how they will behave in the future. Issues of secrecy, fairness of underlying factors, use of consumer information such as race and ethnicity in predictive scores, accuracy, and the uptake in both use and ubiquity of these scores are key areas of focus. The report includes a roster of the types of consumer data used in predictive consumer scores today, as well as a roster of the consumer scores such as health risk scores, consumer prominence scores, identity and fraud scores, summarized credit statistics, among others. The report reviews the history of the credit score – which was secret for decades until legislation mandated consumer access -- and urges close examination of new consumer scores for fairness and transparency in their factors, methods, and accessibility to consumers. About the Authors Pam Dixon is the founder and Executive Director of the World Privacy Forum. She is the author of eight books, hundreds of articles, and numerous privacy studies, including her landmark Medical Identity Theft study and One Way Mirror Society study. She has testified before Congress on consumer privacy issues as well as before federal agencies.
    [Show full text]
  • The Adolescence of Blogs.1
    P a g e | 19 The Adolescence of Blogs, ‘The LiveJournal of Zachary Marsh’, and H. P. Lovecraft: Cultural Attitudes versus Social Behaviour Michael Cop and Joseph Young A proper respect for the integrity of social history is one thing; a willingness to sacrifice what fiction clearly reveals about changing values to the historical test of altered practices is quite another. Cognitive dissonance ensures that cultural attitudes and social behaviour are not always in step, especially at moments of transition. In the early modern period, for example, when romantic love was increasingly seen as the proper basis for courtship on the stage, arranged marriages were still a common social practice. It is perfectly possible that parents could side with Romeo and Juliet at the theatre, while assuming the right to choose their own children’s marriage partners at home. –Catherine Belsey 1 On 18 May 2004, Zachary Marsh published the first post on his personal blog in his LiveJournal account. Eighteen posts later, on 20 June 2004, Marsh revealed that he, like all members of his patrilineage from his great-great-great-grandfather onwards, was in fact a monster. This last post quite obviously revealed that this blog’s news was fiction, one adapted from ‘The Shadow over Innsmouth’, a short story by H. P. Lovecraft, a fantasy author whose critical reception has been polarising. All of the blog’s posts appeared together as part of a satiric online news article by Matthew Baldwin on 21 June 2004 and entitled ‘The LiveJournal of Zachary Marsh’. In A Future for Criticism , Catherine Belsey notes that fictions can reveal that ‘cultural attitudes and social behaviour are not always in step, especially at moments of transition’; we argue here that this fictitious online ‘news’ article significantly demonstrates this paradigm.
    [Show full text]
  • Internet Freedom in Vladimir Putin's Russia: the Noose Tightens
    Internet freedom in Vladimir Putin’s Russia: The noose tightens By Natalie Duffy January 2015 Key Points The Russian government is currently waging a campaign to gain complete control over the country’s access to, and activity on, the Internet. Putin’s measures particularly threaten grassroots antigovernment efforts and even propose a “kill switch” that would allow the government to shut down the Internet in Russia during government-defined disasters, including large-scale civil protests. Putin’s campaign of oppression, censorship, regulation, and intimidation over online speech threatens the freedom of the Internet around the world. Despite a long history of censoring traditional media, the Russian government under President Vladimir Putin for many years adopted a relatively liberal, hands-off approach to online speech and the Russian Internet. That began to change in early 2012, after online news sources and social media played a central role in efforts to organize protests following the parliamentary elections in December 2011. In this paper, I will detail the steps taken by the Russian government over the past three years to limit free speech online, prohibit the free flow of data, and undermine freedom of expression and information—the foundational values of the Internet. The legislation discussed in this paper allows the government to place offending websites on a blacklist, shut down major anti-Kremlin news sites for erroneous violations, require the storage of user data and the monitoring of anonymous online money transfers, place limitations on 1 bloggers and scan the network for sites containing specific keywords, prohibit the dissemination of material deemed “extremist,” require all user information be stored on data servers within Russian borders, restrict the use of public Wi-Fi, and explore the possibility of a kill-switch mechanism that would allow the Russian government to temporarily shut off the Internet.
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]
  • Estimating Age and Gender in Instagram Using Face Recognition: Advantages, Bias and Issues. / Diego Couto De Las Casas
    ESTIMATING AGE AND GENDER IN INSTAGRAM USING FACE RECOGNITION: ADVANTAGES, BIAS AND ISSUES. DIEGO COUTO DE. LAS CASAS ESTIMATING AGE AND GENDER IN INSTAGRAM USING FACE RECOGNITION: ADVANTAGES, BIAS AND ISSUES. Dissertação apresentada ao Programa de Pós-Graduação em Ciência da Computação do Instituto de Ciências Exatas da Univer- sidade Federal de Minas Gerais – Depar- tamento de Ciência da Computação como requisito parcial para a obtenção do grau de Mestre em Ciência da Computação. Orientador: Virgílio Augusto Fernandes de Almeida Belo Horizonte Fevereiro de 2016 DIEGO COUTO DE. LAS CASAS ESTIMATING AGE AND GENDER IN INSTAGRAM USING FACE RECOGNITION: ADVANTAGES, BIAS AND ISSUES. Dissertation presented to the Graduate Program in Ciência da Computação of the Universidade Federal de Minas Gerais – De- partamento de Ciência da Computação in partial fulfillment of the requirements for the degree of Master in Ciência da Com- putação. Advisor: Virgílio Augusto Fernandes de Almeida Belo Horizonte February 2016 © 2016, Diego Couto de Las Casas. Todos os direitos reservados Ficha catalográfica elaborada pela Biblioteca do ICEx - UFMG Las Casas, Diego Couto de. L337e Estimating age and gender in Instagram using face recognition: advantages, bias and issues. / Diego Couto de Las Casas. – Belo Horizonte, 2016. xx, 80 f. : il.; 29 cm. Dissertação (mestrado) - Universidade Federal de Minas Gerais – Departamento de Ciência da Computação. Orientador: Virgílio Augusto Fernandes de Almeida. 1. Computação - Teses. 2. Redes sociais on-line. 3. Computação social. 4. Instagram. I. Orientador. II. Título. CDU 519.6*04(043) Acknowledgments Gostaria de agradecer a todos que me fizeram chegar até aqui. Àminhafamília,pelosconselhos,pitacoseportodoosuporteaolongodesses anos. Aos meus colegas do CAMPS(-Élysées),pelascolaborações,pelasrisadasepelo companheirismo.
    [Show full text]
  • Travelsofadam-Media2013.Pdf
    IT’S A BLOG ABOUT Travels of Adam is a top-rated travel website & blog of unique and interesting stories from around the world. The site receives over 50,000 page views per month from 100+ countries. Readers are modern, open-minded and socially responsible individuals with a very strong interest in travel and city destinations. Adam strives to find interesting and unique stories from around the world, whether political tours, art exhibits or destination guides. WHY BLOG? Travels of Adam is consistently ranked among the top 50 travel blogs by numerous online sources and is a featured source of information on the travel industry, specifically “hipster travel.” Advertising on travelsofadam.com, it’s possible to reach a highly commercial demographic. Readers consistently use the site as a source for useful & interesting travel information. Readers have been known to purchase tours, visit recommended travel websites & change travel itineraries based on recommendations published on this website. Travels of Adam.com March 2013 EDITORIAL ART, MUSIC, DESIGN & PHOTOGRAPHY With a background in graphic design, Adam writes about museums, art galleries, exhibits and unusual architecture. Read: David Guetta live in Berlin ALTERNATIVE THINGS TO DO Popular posts include alternative city guides with information on graffiti, interesting tours, local blogs and unique restaurants. Read: Alternative things to do in Tel Aviv HOTEL & ACCOMMODATION REVIEWS POLITICAL & SOCIAL ISSUES With a section devoted entirely to hotel and other accommodation reviews, Adam is able to provide honest feedback to readers on Travel isn’t just about visiting landscapes & famous tourist sites where to stay. Adam is also the curator and founder of a growing but also learning about the local political climate and culture.
    [Show full text]
  • Social Networks Influence Analysis
    University of North Florida UNF Digital Commons UNF Graduate Theses and Dissertations Student Scholarship 2017 Social Networks Influence Analysis Doaa Gamal University of North Florida, [email protected] Follow this and additional works at: https://digitalcommons.unf.edu/etd Part of the Computer Sciences Commons Suggested Citation Gamal, Doaa, "Social Networks Influence Analysis" (2017). UNF Graduate Theses and Dissertations. 723. https://digitalcommons.unf.edu/etd/723 This Master's Thesis is brought to you for free and open access by the Student Scholarship at UNF Digital Commons. It has been accepted for inclusion in UNF Graduate Theses and Dissertations by an authorized administrator of UNF Digital Commons. For more information, please contact Digital Projects. © 2017 All Rights Reserved SOCIAL NETWORKS INFLUENCE ANALYSIS by Doaa H. Gamal A thesis submitted to the School of Computing in partial fulfillment of the requirements for the degree of Master of Science in Computing and Information Sciences UNIVERSITY OF NORTH FLORIDA SCHOOL OF COMPUTING Spring, 2017 Copyright (©) 2017 by Doaa H. Gamal All rights reserved. Reproduction in whole or in part in any form requires the prior written permission of Doaa H. Gamal or designated representative. ii This thesis titled “Social Networks Influence Analysis” submitted by Doaa H. Gamal in partial fulfillment of the requirements for the degree of Master of Science in Computing and Information Sciences has been Approved by the thesis committee: Date Dr. Karthikeyan Umapathy Thesis Advisor and Committee Chairperson Dr. Lakshmi Goel Dr. Sandeep Reddivari Accepted for the School of Computing: Dr. Sherif A. Elfayoumy Director of the School Accepted for the College of Computing, Engineering, and Construction: Dr.
    [Show full text]
  • Using Facebook Metrics to Measure Student Engagement in Moodle
    IJODeL, Vol. 2, No. 2, (December 2016) Using Facebook Metrics to Measure Student Engagement in Moodle Leonardo Magno Senior Editor, Publishing Team, Asian Development Bank, [email protected] Abstract Facebook uses engagement rates as a metric for social media managers and marketers to measure how efectively a page, a post, a comment, a brand, or a topic is able to engage the target audience. Studies have proposed the use of these metrics for other types of online measurements in applications and industries other than social media. This concept paper proposes the use of a modifed Facebook engagement rate formula to (i) measure students’ engagement with forum posts using virtual learning environments such as Moodle and (ii) get data from students regarding which topics or posts engage them more in the learning process. While virtual learning environments have their own logs and learning analytics software, and studies have explored the use of Facebook as a discrete and supplementary platform to traditional learning management systems, this paper flls the research gap by applying Facebook’s engagement rate formula to Moodle itself. Applying an existing social media audience engagement formula to an online course may provide instructors and educational institutions valuable feedback on what types of posts, comments, or topics make students interact and engage more in online learning sessions. Such an exercise may lead to new metrics which distance learning institutions could use to calibrate their content with the objective of improving students’ interaction and engagement with instructors, fellow students, and the online course in general. Keywords: Facebook, Moodle, social media, engagement rate, learning analytics Introduction Virtual learning environments like Moodle and Blackboard—sometimes referred to as online course platforms or learning management systems—come with their own analytics and reporting tools either as built-in features or as plug-in software.
    [Show full text]