5 research outputs found

    An analysis of emotion-exchange motifs in multiplex networks during emergency events

    Get PDF
    In this paper, we present an analysis of the emotion-exchange patterns that arise from Twitter messages sent during emergency events. To this end, we performed a systematic structural analysis of the multiplex communication network that we derived from a data-set including more than 1.9 million tweets that have been sent during five recent shootings and terror events. In order to study the local communication structures that emerge as Twitter users directly exchange emotional messages, we propose the concept of emotion-exchangemotifs. Our findings suggest that emotion-exchange motifs which contain reciprocal edges (indicating online conversations) only emerge when users exchange messages that convey anger or fear, either in isolation or in any combination with another emotion. In contrast, the expression of sadness, disgust, surprise, as well as any positive emotion are rather characteristic for emotion-exchange motifs representing one-way communication patterns (instead of online conversations). Among other things, we also found that a higher structural similarity exists between pairs of network layers consisting of one high-arousal emotion and one low-arousal emotion, rather than pairs of network layers belonging to the same arousal dimension

    Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

    Get PDF
    Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)Series: Working Papers on Information Systems, Information Business and Operation

    “Evacuate everyone south of that line” Analyzing structural communication patterns during natural disasters

    No full text
    In this paper, we analyze more than 16 million tweets that have been sent from 6.1 million Twitter accounts and are related to nine natural disasters. As part of our analysis, we identify eight basic emotions conveyed in these tweets. We found that during natural disasters, social media messages at first predominantly express fear, while sadness and positive emotions increase in the immediate aftermath of the event. In this context, positive emotions contribute to the social phenomenon of emotional bonding and are often related to compassion, gratitude, as well as donations for disaster relief. In our analysis, we found that the users’ emotional expressions directly contribute to the emergence of the underlying communication network. In particular, we identified statistically significant structural patterns that we call emotion-exchange motifs and show that: (1) the motifs 021U and 021D are common for the communication of all eight emotions considered in this study, (2) motifs which include bidirectional edges (i.e. online conversations) are generally not characteristic for the communication of surprise, sadness, and disgust, (3) the structural analysis of a set of emotions (rather than a single emotion) leads to the formation of more complex motifs representing more complex social interactions, and (4) the messaging patterns emerging from the communication of joy and sadness show the highest structural similarity, even reaching a perfect similarity score at some point during the data-extraction period
    corecore