2,621 research outputs found

    How Emotions Unfold in Online Discussions After a Terror Attack

    Get PDF
    In the wake of a terror attack, social media is used for sharing thoughts and emotions, accessing and distributing information, and memorializing victims. Emotions are a big part of this, but there is a gap in our understanding on how those emotions evolve and what kinds of social media uses they are related to. Better understanding of the emotional and topical developments of online discussions can serve not only to fill the aforementioned gap, but also assist in developing better collective coping strategies for recovering from terror attacks. We examine what types of conversations unfolded online after the Boston Marathon Bombing and what kinds of emotions were associated with them, accounting for regional differences, and present a process model covering the general trends of such conversations. Although the phases apply to reactions to terror attacks on a general level, there are proximity-based differences to the location of the terror attack

    Data analytics 2016: proceedings of the fifth international conference on data analytics

    Get PDF

    Crisis Communication Patterns in Social Media during Hurricane Sandy

    Full text link
    Hurricane Sandy was one of the deadliest and costliest of hurricanes over the past few decades. Many states experienced significant power outage, however many people used social media to communicate while having limited or no access to traditional information sources. In this study, we explored the evolution of various communication patterns using machine learning techniques and determined user concerns that emerged over the course of Hurricane Sandy. The original data included ~52M tweets coming from ~13M users between October 14, 2012 and November 12, 2012. We run topic model on ~763K tweets from top 4,029 most frequent users who tweeted about Sandy at least 100 times. We identified 250 well-defined communication patterns based on perplexity. Conversations of most frequent and relevant users indicate the evolution of numerous storm-phase (warning, response, and recovery) specific topics. People were also concerned about storm location and time, media coverage, and activities of political leaders and celebrities. We also present each relevant keyword that contributed to one particular pattern of user concerns. Such keywords would be particularly meaningful in targeted information spreading and effective crisis communication in similar major disasters. Each of these words can also be helpful for efficient hash-tagging to reach target audience as needed via social media. The pattern recognition approach of this study can be used in identifying real time user needs in future crises

    UN Global Pulse: Annual Report 2013

    Get PDF
    Through public-private partnerships, innovative analysis and the development of open-source methodologies, Global Pulse is strengthening public sector capacity to leverage digital Big Data for development and resilience. This report provides a brief overview of advances made during 2013

    State of the art 2015: a literature review of social media intelligence capabilities for counter-terrorism

    Get PDF
    Overview This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it.  The paper is structured as follows: Part 1 is an overview of social media use, focused on how it is used by groups of interest to those involved in counter-terrorism. This includes new sections on trends of social media platforms; and a new section on Islamic State (IS). Part 2 provides an introduction to the key approaches of social media intelligence (henceforth ‘SOCMINT’) for counter-terrorism. Part 3 sets out a series of SOCMINT techniques. For each technique a series of capabilities and insights are considered, the validity and reliability of the method is considered, and how they might be applied to counter-terrorism work explored. Part 4 outlines a number of important legal, ethical and practical considerations when undertaking SOCMINT work
    • …
    corecore