2,621 research outputs found
How Emotions Unfold in Online Discussions After a Terror Attack
In the wake of a terror attack, social media is used for sharing thoughts and emotions, accessing and distributing information, and memorializing victims. Emotions are a big part of this, but there is a gap in our understanding on how those emotions evolve and what kinds of social media uses they are related to. Better understanding of the emotional and topical developments of online discussions can serve not only to fill the aforementioned gap, but also assist in developing better collective coping strategies for recovering from terror attacks. We examine what types of conversations unfolded online after the Boston Marathon Bombing and what kinds of emotions were associated with them, accounting for regional differences, and present a process model covering the general trends of such conversations. Although the phases apply to reactions to terror attacks on a general level, there are proximity-based differences to the location of the terror attack
Crisis Communication Patterns in Social Media during Hurricane Sandy
Hurricane Sandy was one of the deadliest and costliest of hurricanes over the
past few decades. Many states experienced significant power outage, however
many people used social media to communicate while having limited or no access
to traditional information sources. In this study, we explored the evolution of
various communication patterns using machine learning techniques and determined
user concerns that emerged over the course of Hurricane Sandy. The original
data included ~52M tweets coming from ~13M users between October 14, 2012 and
November 12, 2012. We run topic model on ~763K tweets from top 4,029 most
frequent users who tweeted about Sandy at least 100 times. We identified 250
well-defined communication patterns based on perplexity. Conversations of most
frequent and relevant users indicate the evolution of numerous storm-phase
(warning, response, and recovery) specific topics. People were also concerned
about storm location and time, media coverage, and activities of political
leaders and celebrities. We also present each relevant keyword that contributed
to one particular pattern of user concerns. Such keywords would be particularly
meaningful in targeted information spreading and effective crisis communication
in similar major disasters. Each of these words can also be helpful for
efficient hash-tagging to reach target audience as needed via social media. The
pattern recognition approach of this study can be used in identifying real time
user needs in future crises
UN Global Pulse: Annual Report 2013
Through public-private partnerships, innovative analysis and the development of open-source methodologies, Global Pulse is strengthening public sector capacity to leverage digital Big Data for development and resilience. This report provides a brief overview of advances made during 2013
State of the art 2015: a literature review of social media intelligence capabilities for counter-terrorism
Overview
This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it.
The paper is structured as follows:
Part 1 is an overview of social media use, focused on how it is used by groups of interest to those involved in counter-terrorism. This includes new sections on trends of social media platforms; and a new section on Islamic State (IS).
Part 2 provides an introduction to the key approaches of social media intelligence (henceforth âSOCMINTâ) for counter-terrorism.
Part 3 sets out a series of SOCMINT techniques. For each technique a series of capabilities and insights are considered, the validity and reliability of the method is considered, and how they might be applied to counter-terrorism work explored.
Part 4 outlines a number of important legal, ethical and practical considerations when undertaking SOCMINT work
- âŚ