2,432 research outputs found

    Information spreading during emergencies and anomalous events

    Full text link
    The most critical time for information to spread is in the aftermath of a serious emergency, crisis, or disaster. Individuals affected by such situations can now turn to an array of communication channels, from mobile phone calls and text messages to social media posts, when alerting social ties. These channels drastically improve the speed of information in a time-sensitive event, and provide extant records of human dynamics during and afterward the event. Retrospective analysis of such anomalous events provides researchers with a class of "found experiments" that may be used to better understand social spreading. In this chapter, we study information spreading due to a number of emergency events, including the Boston Marathon Bombing and a plane crash at a western European airport. We also contrast the different information which may be gleaned by social media data compared with mobile phone data and we estimate the rate of anomalous events in a mobile phone dataset using a proposed anomaly detection method.Comment: 19 pages, 11 figure

    Quantifying Information Flow During Emergencies

    Get PDF
    Recent advances on human dynamics have focused on the normal patterns of human activities, with the quantitative understanding of human behavior under extreme events remaining a crucial missing chapter. This has a wide array of potential applications, ranging from emergency response and detection to traffic control and management. Previous studies have shown that human communications are both temporally and spatially localized following the onset of emergencies, indicating that social propagation is a primary means to propagate situational awareness. We study real anomalous events using country-wide mobile phone data, finding that information flow during emergencies is dominated by repeated communications. We further demonstrate that the observed communication patterns cannot be explained by inherent reciprocity in social networks, and are universal across different demographics

    Disaster response : an intersection of poison control and public health

    Get PDF
    19_3019562019711

    A survey of results on mobile phone datasets analysis

    Get PDF

    Cascading Events, Technology and the Floods Directive: future challenges

    Get PDF
    Cascading events can be referred to multidimensional disasters, where a primary trigger generates a nonlinear series of secondary emergencies that escalate in time, becoming eventually the priority to tackle. In this process, critical infrastructure can be handled as roots of vulnerabilities, because they accumulate both physical attributes and functional nodes. When compromised, they produce widespread breakdowns of society, but also orient emergency responses and long-term recovery. Although floods have been widely associated to the failure of vulnerable equipments or to the disruption of strategic sectors such as energy, communication and transportation, their integration with the emerging concept of cascading has been limited. This open topic presents many challenges for scholars, researchers and practitioners, in particular when the implementation of the EU Floods Directive is considered. The paper presents an overview of the Floods Directive and its relation with the cascading events, using case studies and examples from the existing literature to point out missing links and gaps in the legislation. Conclusions argue that the Directive considers only local geographical scales and limited temporal horizons, which can be result inadequate to limit the escalation of events

    IoT for measurements and measurements for IoT

    Get PDF
    The thesis is framed in the broad strand of the Internet of Things, providing two parallel paths. On one hand, it deals with the identification of operational scenarios in which the IoT paradigm could be innovative and preferable to pre-existing solutions, discussing in detail a couple of applications. On the other hand, the thesis presents methodologies to assess the performance of technologies and related enabling protocols for IoT systems, focusing mainly on metrics and parameters related to the functioning of the physical layer of the systems
    • …
    corecore