Sunteți pe pagina 1din 13

International Journal of Disaster Risk Reduction 28 (2018) 565–577

Contents lists available at ScienceDirect

International Journal of Disaster Risk Reduction


journal homepage: www.elsevier.com/locate/ijdrr

Social media applications and emergency management: A literature review T


and research agenda

Sergio Luna, Michael J. Pennock
Stevens Institute of Technology Castle Point on Hudson, Hoboken, NJ 07030, USA

A R T I C L E I N F O A B S T R A C T

Keywords: Social media applications have proven to be a dependable communication channel even when traditional
Social media methods fail. Their application to emergency management offers new benefits to the domain. For instance,
Emergency management analysis of information as the event unfolds may increase situational awareness, news and alerts may reach
Socio-technical challenges larger audiences in less time and decision makers may monitor public activities as well as coordinate with
Complex systems
stakeholders. With such benefits, it seems the adoption of social media applications to emergency management
should be automatic. However, their implementation introduces risks as well. To better understand the benefits
and challenges, a review and analysis of the literature regarding the application of social media to emergency
management was conducted. Identified research gaps were mapped into social and technological challenges.
These challenges were then analyzed to set research directions for practitioners and researchers.

1. Introduction public when more traditional means fail. Given these characteristics, it
would seem as if its adoption for emergency management should be
The emergency management domain is facing an increase in com- automatic. However, it turns out that there are still substantial chal-
plexity and a decrease in the predictability of operational scenarios lenges regarding the application of social media that must be addressed
[32]. Comprehensive analysis of events such as: Hurricane Katrina, for it to realize its full potential in the emergency management domain.
Hurricane Sandy, the earthquake and tsunami at Fukushima, Japan, One way to understand these challenges is to view disaster response
among others, indicate that traditional emergency management meth- through the lens of complexity science. As will subsequently be dis-
odologies have been overwhelmed by: cussed, disaster response exhibits all the characteristics of a complex
system, and these are increasing with time. Applying a well-known
• Rapidly developing scenarios principle from complexity science suggests that emergency managers
• Increased numbers of participants must employ equally complex methods to keep up. While the features of
• Adoption of new technologies social media suggest that it is sufficiently complex to serve that pur-
• Large amounts of data to be collected and analyzed pose, a deeper investigation reveals that social media itself exacerbates
the problem. This double-edged aspect of social media in emergency
Consequently, the implementation of traditional emergency man- management contributes to the challenges of leveraging it effectively.
agement activities, which follow a hierarchical approach, result in se- To provide context for these challenges, this article aims to under-
vere economic impacts, loss of human lives, loss of morale and con- stand the following through a detailed analysis of the literature: 1) how
fidence in government institutions, and threats to national security social media applications have been used during emergency events in
[58]. Therefore, to mitigate the impacts of disasters, experts suggest the past, 2) how social media applications can potentially support the
focusing research efforts on developing more flexible and adaptable emergency management lifecycle and the activities performed by
strategies that are able to cope with such dynamic and uncertain en- emergency managers, and 3) the underlying complexities with regard
vironments. to the effective use of social media applications. The ultimate goal is to
One possible way to facilitate such strategies is to leverage social identify research challenges, which if addressed, will enable more ef-
media. In short, social media could provide timely and widespread data fective use of social media in the emergency management domain.
collection to improve situational awareness during rapidly evolving The remainder of this paper is organized as follows: Section 2 in-
situations as well as provide a reliable communication channel with the troduces the approach implemented to analyze the literature to identify


Corresponding author.
E-mail addresses: sluna@stevens.edu (S. Luna), mpennock@stevens.edu (M.J. Pennock).

https://doi.org/10.1016/j.ijdrr.2018.01.006
Received 6 October 2017; Received in revised form 7 January 2018; Accepted 8 January 2018
Available online 10 January 2018
2212-4209/ © 2018 Elsevier Ltd. All rights reserved.
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

research gaps. Section 3 reviews the evolution and current state of catastrophe, technological incident, or human-caused event that has
emergency management in the United States. Section 4 explores the resulted in severe property damage, deaths, and or multiple injuries”
concept of social media applications, their capabilities, and im- [23]. The International Federation of Red Cross and Red Crescent So-
plementation during emergency events. It also identifies the benefits cieties described disasters as “… a sudden, calamitous event that ser-
and challenges they bring to emergency management. Based on the iously disrupts the functioning of a community or society and causes
analysis from the previous sections, Section 5 presents a research human, material, and economic or environmental losses that exceed the
agenda that describes several outstanding issues regarding the appli- community's or society's ability to cope using its own resources. Though
cation of social media to emergency management that require addi- often caused by nature, disasters can have human origins” [47]. Simi-
tional research to enable social media to reach its full potential. larly, The United Nations Office for Disaster Risk Reduction identified
disaster as “A serious disruption of the functioning of a community or a
2. Approach society at any scale due to hazardous events interacting with conditions
of exposure, vulnerability and capacity, leading to one or more of the
This article presents a detailed analysis of social media use during following: human, material, economic and environmental losses and
emergency situations as well as research directions for practitioners and impacts” [107].
researchers in the application of social media to disaster response. Therefore, disasters are events that disrupt a community's func-
We began by defining social media as any Web 2.0 application that tionality because it lacks the resources necessary to cope with a hazard.
allows users to generate, consume and exchange content. We then According to Haddow, Bullock and Coppola [41], a disaster may have
searched both the scientific literature (journal articles, conference three different origins: natural, technological and human-made. Natural
proceedings, books, etc.) and official literature such as: U.S government disasters are those caused by mother earth. These events present the
documents, non-government organization policies, training manuals, characteristic that some of them could exhibit properties that allow
and official reports. Scientific literature was obtained by via Google them to be forecasted while others seem to occur without any warning
Scholar as well as specialized sources such as: International Journal of signs. Technological disaster refers to those caused by human errors in
Disaster Risk Reduction (IJDRR), International Journal of Mass controlling technology or a malfunction of a technological system.
Emergencies and Disasters, and Information Systems for Crisis Response Lastly, human-caused disasters are those events caused by humans, who
and Management (ISCRAM). may or may not have the intention to harm others.
Our search included the terms: “social media”, “social media ap- To establish a common understanding for disasters, researchers and
plications, “Web 2.0”, “crisis response”, “emergency management”, practitioners have identified four properties present in all disasters,
“disaster response”, “online networks”, and “crisis management”. which include: [1,6,84].
All sources relevant to our topic, based on the title, were initially
analyzed by examining their abstract, introduction and conclusion. • Length of forewarning – Describes the timescale for disaster ac-
Those that were relevant to our topic were examined in detail for ap- tion. Some events present little or no warning time such as earth-
proval. Once all approved sources were evaluated, we used a grounded quakes or terrorist attacks. While others provide longer warning
theory approach to cluster the sources by relevant topics [39]. In- time, which provides additional time for implementing suitable re-
ductive coding facilitated the emergence of social media and emergency sponse plans. Examples of these events include hurricanes and
management categories. For instance, clusters of social media use, snowstorms.
benefits, and challenges during disaster scenarios emerged from lit- • Magnitude of impact – It measures or quantifies the severity of the
erature. Lastly, the groups of sources were evaluated for similarities and events. Richter scale, hurricane categories I-V, and radiation level
differences; the results of such analysis are then reflected as sections in are only some metrics to measure disasters.
our article. • Geographical scope – Disasters hit a specific geographic location.
However, their impact can be spread to contiguous areas.
3. Emergency management in the United States • Impact duration – This property seeks to quantify the time length
of a disaster. A catastrophic event may take seconds, minutes, days,
This section focuses on evaluating emergency management strate- months or even years, depending on the event. For instance, an
gies from the United States perspective due to the vast amount of lit- earthquake can be felt for a few seconds while an economic reces-
erature found; however, the cited literature reflects the fact that these sion may take years to form.
approaches are being used around the globe, and the phenomena are
not limited to the United States. These attributes have assisted decision makers in the classification
Historical analysis of emergency management in the United States of hazards as well as in the development of strategies to cope with
shows that the concept of emergency management has evolved over disasters. For instance, the Federal Emergency Management Agency
time, and primarily a disaster-driven approach has been adopted. Major [34] has taken two different perspectives to emergency management.
changes in the structure of emergency management have been devel- The Traditional Approach and the Professional Approach.
oped in response to the following factors: disaster events, political in-
terests, and presidential leadership style. Initially, FEMA had its foun- 3.1.1. The traditional approach to emergency management
dations based on military principles. Therefore, the hierarchical or top- The traditional approach to emergency management is also referred
down principles were followed when developing response strategies. to as bureaucratic or command and control [34]. In traditional
[34,41]. Nevertheless, a shift in perspective has taken place in emer- methods, disaster management is addressed from a single perspective:
gency management, as can be observed in the 2011 Whole Community the government's perspective. Dynes [28] asserts that a military format
Approach [31]. This section discusses the evolution of the emergency facilitates the implementation of a strict set of objectives, policies and a
management approaches implemented by FEMA. well-defined division of activities among its departments. In a similar
line, Schneider [90] recognizes that the American disaster response
3.1. FEMA approaches to emergency management approach is dominated by a strict set of norms, and it consists of bu-
reaucratic policies and processes where emergent norms are not ac-
Despite the fact that the federal government created an emergency cepted. Thus, adaptation to unexpected tasks and involvement of more
management office, there is no agreement among researchers, practi- groups is not recognized. Classic approaches are characterized by
tioners, and government organizations for the definition of disaster. For adopting a hierarchical structure. Neal and Phillips [71] state that
instance, FEMA defines disaster as “An occurrence of a natural under a command and control approach, decision-making and

566
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

Table 1
Comparison of FEMA's approaches to emergency management.

Traditional Approach Professional Approach

Development Categorize disasters according to the level of importance. Focus Understand there are more types of disaster scenarios than war and
on civilian hazard, war and nuclear. (Cold War US-USSR). nuclear disasters. Natural disasters are also considered.
Approach Hierarchical and top-bottom approach. Horizontal relationships, networks.
Adaptation Level Rigid strategies do not allow adaptation to new scenarios. Seek to implement flexible strategies.
Player Perspective Only one agency participating, the government. Multiple: Government, citizens, non-profit organizations, etc.
Public Interfere with responses or not participate at all. Panic behavior. It is a resource and supports operations.
Information gathered from non- It is not trusted. It is acknowledged that information could be beneficial but also it
governmental agencies may generate new challenges.
First Responders Only count for emergency management agencies. Public might be the first responders.

communications become centralized, while considering that public 3.1.2. The professional approach to emergency management
decisions are made rationally. Therefore, emergency managers see The Federal Emergency Management Agency [34] professional ap-
emergent behavior as unacceptable and tend to prevent it [71,90]. An proach recognizes that emergency management is a decentralized net-
example of a traditional approach to emergency management is the work of organizations that collaborate to mitigate the impacts of dis-
Federal Civil Defense Act presented in 1950. asters. For instance, local police and fire departments, public works,
Classic approaches to emergency management were developed volunteers and government entities coordinate activities before, during
under the following assumptions: [12,29,71,91] and after a disaster occurs. Also, it understands that civilians support
recovery strategies rather than interfere with them. In contrast to the
• Government emergency management agencies are expected to be Traditional Approach, this method acknowledges that public informa-
the only responders during disaster events tion may support emergency activities. The public is recognized to be
• Government is required to direct and control all disaster operations the first emergency responder because they experience the event.
• Hierarchical agency classification and disaster priority. War is the Therefore, public participation is accepted and welcomed rather than
top priority ignored. Also, the flexibility of the professional approach allows the
• Information transmitted by non-government institutions should not implementation of its strategies to multiple types of disasters; strategies
be trusted developed are not constrained to one specific disaster anymore. An
• Effective emergency response is the result of normal, rational, example to the professional approach includes the Whole Community
written bureaucratic procedures Approach introduced by FEMA in 2011.
• Policies, standards, and operational procedures will always be ap- To better understand differences between the Traditional and the
plicable and effective Professional approach to emergency management, Table 1 presents a
• Citizens respond ineffectively or do not respond at all comparison based on their development, approach, adaptation level,
• Public behaviors always involve panic, looting or other anti-social player perspective, information gathered and first responders.
activities. Emergent groups interfere with government response
operations
3.2. Emergency management as a complex system
The September 11th, 2001 terrorist attacks and Hurricane Katrina
are some examples of how traditional emergency response strategies Practitioners and scholars are becoming reluctant to rely on tradi-
have been tested. During these events, Bolton and Stolcis [11] identi- tional emergency management activities [11,97]. Events such as Sep-
fied that the rapidly developing scenarios caused significant confusion tember 11th and Hurricane Katrina are examples of “decisional pa-
among emergency managers, who relied on rigid and static mitigation ralysis” due to over-reliance of static techniques that hinder
plans. Implemented strategies were overwhelmed by the events them- information sharing when in need.
selves [41]. Thus, managers’ confusion and inability to implement More recently, researchers and practitioners have started to view
proper strategies was reflected in delayed services and tardy resource emergency management through the lens of complexity science. For
and staff allocation, exacerbating the number of casualties, as well as instance, Cavallo and Ireland [16] advocate that the impacts of natural
economic and infrastructure damages. The Federal Emergency Man- and human-made disasters might be exacerbated by risk interconnec-
agement Agency [33] in its Crisis Response and Disaster Resilience tions that are not captured by traditional linear models. O'Sullivan [74]
2030 manuscript states that emergency management will encounter asserts that community resilience increases by migrating from a tradi-
new and more complex challenges. Therefore, strategies that mitigate tional command and control approach to understanding the complex-
the possible impacts must be developed. The challenges identified by ities of community response, stakeholders’ collaboration, and inter-
FEMA include: dependencies between different aspects of emergency management.
Kapucu [53] examined the effectiveness of coordinating interactions

• New and unknown operational scenarios among emergency managers, technology, members of government en-
• Increased number of disaster events tities, and individual citizens. Development of resilient communities

• More information to be analyzed with possibly less time to process it can be supported by capturing and grasping complex interactions be-
• Adoption and development of new technologies tween stakeholders. Casti [14] affirms that disaster events follow non-

• Increase in the number of participants linear paths. Consequently, they may not be able to be forecasted. Also,
• High public expectations Comfort [19] states that intergovernmental crisis management could be
reframed as a complex adaptive system that adapts its performance to
Following FEMA's direction, traditional emergency management best fit the demands of the environment. It then facilitates the process
approaches seem to be insufficient to address the future challenges of cognition, communication, coordination and control among stake-
FEMA expects and is preparing for [71]. Consequently, new paradigms holders. Tan et al. [101] acknowledge that crisis management possess
must be formulated to account for such challenges. the characteristics of complexity science. Relationships among in-
dividuals, organizations, infrastructure and technology result in emer-
gent behavior that is difficult to predict. Lastly, Simonovic [97] defines

567
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

Percentage of adults in the United States with at least one social media Fig. 1. Illustrates the increase in social media users in the United
profile States from 2005 to 2016. Data obtained from Pew Research
80% Center [77].
69%
70%
Percentage of U.S Adults

60%
50%
40%
30%
20%
10% 5%

0%
1/14/04 5/28/05 10/10/06 2/22/08 7/6/09 11/18/10 4/1/12 8/14/13 12/27/14 5/10/16 9/22/17
Date

management of disasters as an integrated system comprised of four communication channels for: coordination, providing and seeking in-
subsystems: individuals, organizations, society and environment. formation, connecting with loved ones, among others. Social media
Emergency management is then achieved by a set of inputs, outputs and applications have gained significant interest in emergency management
feedback loops among subsystems. since the first time they were employed in 2005 during Hurricane Ka-
In brief, viewing emergency management through the lens of trina [103]. It has been observed that during disasters participants
complexity science recognizes that disaster response exhibits the utilize social media applications as a communication channel due to
characteristics of the Professional Approach. Also, emergency man- their ability to continue operating even when other methods fail
agement may benefit from complexity science since it may provide [98,112].
insights as to how to balance control mechanisms during incremental or Paraphrasing Ashby's Law of Requisite Variety [4], for every com-
rapidly developing scenarios. To better understand complex systems, it plex problem, there must be a complex solution. The conclusion one can
is necessary to recognize their properties. According to Rouse and draw from the literature discussed in this section is that the traditional
Serban [87], McDermott et al. [68] and Holland [44], complex systems approach to emergency management is insufficiently complex to ad-
present the following characteristics: dress modern disasters. The professional approach to emergency man-
agement, when observed through the lens of complexity science, is a
• Nonlinearity- Complex systems are dynamical and do not present recognition of this conclusion. In line with Ashby's Law, actually im-
fixed equilibrium points. plementing the professional approach requires the development of
• Multi-agents- Systems are composed of multiple agents, each of supporting methods and tools that exhibit sufficient complexity. As will
them governed by its own interests, beliefs and goals. be discussed in the next section, social media would seem to provide
• Learning and adaptation – Agents are able to acquire knowledge sufficient flexibility and adaptability to allow it to be the complex so-
from interacting with other agents and/or their surrounding en- lution that could improve the emergency management domain.
vironment. Also, agents are able to adapt their behavior as they Nevertheless, it also brings new challenges that must be addressed to
learn from the outcomes of their previously taken actions. understand how social media applications can support emergency
• Self-organization – Agents are able to interact and create networks management effectively. The next section describes the advantages and
or groups with shared objectives. Learning and adaptation are challenges of social media in emergency management.
achieved via feedback loops. New behavior emerges from agents’
interaction.
• There is no single point of control – System behavior is not con- 4. Social media applications in the context of emergency
trollable. However, it may be influenced. management

As has been noted, experts suggest that emergency situations exhibit 4.1. Social media
all these characteristics. Hence, it seems to be evident that disaster
response strategies should incorporate complexity science principles. The first social media application, SixDegrees.com, was introduced
This research recognizes emergency management as a complex in 1997, reaching an estimate of 3.5 million registered users [40]. More
system because it understands that emergency situations are rapid recently, the Pew Research Center [77] estimates that 69% of the
evolving environments that cannot be controlled. Stakeholders colla- United States adult population owns at least one social media profile.
borate during all four phases of emergency management. However, That is an increase from 5% in 2005 as seen in Fig. 1.
each of them is regulated by its own interests, beliefs, and objectives. According to Houston, et al. [45] the term social media is a com-
Collaboration among stakeholders is achieved through feedback loops. prehensive concept for a variety of internet-based platforms and ser-
In addition, stakeholders exchange resources, such as information and vices that operate under the principles of Web 2.0. Thus, social media
data, which facilitate the decision-making process. Evaluation of out- applications allow users to generate, share, and consume content al-
comes based on their previously taken actions permits stakeholders to most in real-time [52]. Images, videos, text, and geo-locations are only
learn from their experiences and support the adoption of new decisions some of the features that can be exchanged among users. Their flex-
like implementing new response strategies for when the next event ibility and adaptability facilitate the development of multiple applica-
occurs. It is in this context that social media is particularly relevant to tions, each with different capabilities. In Table 2, Fraustino, Liu and Jin
emergency management. [35] classify social media applications according to their properties.
Proper coordination is critical to mitigate the impacts of disasters. Another categorization method is presented in the marketing do-
According to Reddy et al. [83], rapidly changing scenarios make co- main. Edwards [30] classifies social media applications into five groups
ordination more challenging. It is understood that participants rely on to support experts when developing advertising strategies:

568
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

Table 2
Types of Web 2.0 applications and their capabilities developed by Faustino, Liu and Jin [35].

Application Type Description Example

Blogs Interactive virtual journal that allows users to express opinions, share thoughts, promote ideas, WordPress, Blogger, HubPages
etc.
Discussion Forums Online bulletin board where users are able to post questions/concerns and expect to receive bbPress, LiveJournal
responses to the message left.
Micro-blogs Short version of blogs. Users share content in a limited space. Twitter, Tumblr
Photo/Video and Podcasting Exchange of multimedia content, images, video and audio. YouTube, Instagram
Social Bookmarking Platform that allows users to add, edit, share bookmarks. Delicious, Google
Social Discovery Engines & News Bulletin board where users post news, links, pictures, etc. and vote for ranking their priority. Reddit, Pulse, StumbleUpon
Sources
Social/Professional Networking Environment where users communicate with others. User profile is required to establish a list of LinkedIn, Facebook, Google+
connections with whom to share information.
Social Rating Reviews Platform where users are able to rate and describe experiences that others can comment and share. Yelp, TripAdvisor
Video/Text Chatting Multimedia platform that allows users to establish dialogue via text or video. Skype, WhatsApp, WeChat
Wikis Website that allows users to create, edit and delete content. There is no defined content owner in Wikipedia, Wikispaces
comparison to blogs.

• Interact with others and share information about brands identified by Houston et al. [45] is the Event to Post-Event phase with
• Updates about news and activities tailoring trending topics and viral seven out of fifteen functions occurring at this stage. The uses identified
campaigns during Event to Post-Event include: document how the disaster is
• Location-based services tracking and prospects for new sells evolving, provide or consume news content, provide and consume
• Social gaming disaster information, promote and receive donations, provide in-
• Social couponing is utilized when consumers influence each other formation on how to volunteer, provide and receive behavioral health
while at the same time sell items assistance, communicate emotions, memorialize victims, and finally,
disseminate information about disaster response and recovery efforts.
In essence, the term social media refers to the collection of appli- Functions at the Post-Event phase include connecting or reconnecting
cations that facilitate content sharing. Nowadays, social media appli- with members of the community and discussing socio-political and
cations have become a primary communication channel. Their flex- scientific causes and consequences as well as responsibility. Lastly,
ibility and adaptability have motivated other domains to understand activities covering Pre-Event to Post-Event include the implementation
their principles, develop new applications and exploit their benefits. of traditional crisis communication activities.
Examples of studies in other disciplines include: politics where Social media users have been exploiting social media capabilities
Tumasjan et al. [106] aimed to predict the German federal election when in need, even though they were not primarily intended for
using public sentiment obtained from Twitter. In marketing, Mangold emergency situations. For instance, the earthquake and tsunami that
and Faulds [66] studied how the way organizations communicate with occurred in Fukushima, Japan (2011) caused disruptions on telephone
consumers has recently changed. Enterprises should monitor and par- service lines. Consequently, service providers limited the number of
ticipate in consumer-to-consumer discussions to shape the conversation voice calls up to 80%, driving the public to search for other commu-
in a manner that is consistent with the enterprise's mission. In educa- nication mechanisms. In that case, microblogging and video conference
tion, Davis et al. [22] estimate that more than 90% of college students tools were the solution the Japanese public needed. In that event,
have a social media profile. In response, higher education institutions Twitter and Skype became popular applications because they continued
are adopting social media profiles to deliver academic content, provide operating despite limited service due to heavy congestion and power
student support, build and strengthen a sense of community, expand outages [112]. More recently, during Hurricane Harvey the emergency
alumni networks, and advertise their academic offerings. Lastly, in number 911 was overloaded. Emergency dispatchers were over-
Healthcare Antheunis, Tates and Nieboer [2] investigated the manner whelmed by the number of calls and asked residents to wait in line.
in which providers and patients use social media applications. Findings Consequently, affected citizens turned to social media applications to
showed that patients primarily used social networks for increasing request assistance [20]. Thanks to social media, affected users were
knowledge and exchanging advice while providers mostly used them able to communicate with family members, which provided a means for
for communication with colleagues and marketing purposes. people to learn the status of their relatives.
Emergency management has not been the exception when trying to Social media's flexibility and adaptability made its application to
understand the phenomena of social media. Research indicates that one other types of disasters much easier. Applications were used by Virginia
of the first disaster scenarios where social media was employed was Tech's students during a school shooting as well as during the Southern
during Hurricane Katrina in 2005 [41,103]. It is also recognized as the California wildfires in 2007 [93,110]. In both events, the public had
inflection point for understanding the benefits and implementing social significant participation. Social media applications were primarily used
media applications. For instance, Houston et al. [45] recognize five to exchange information, coordinate activities, provide scenario de-
classes of social media users in emergency management. These include: scription, among others [76]. After such events, researchers acknowl-
individuals, communities, organizations, governments, and news edged that the public experiencing a disaster could function as a
media. All users generate, consume, and exchange content during all- backchannel mechanism by providing real-time information that may
phases of emergency management. In addition, Houston et al. [45] assist practitioners in the implementation of more effective response
identified fifteen different uses of social media applications during strategies [99].
disasters along with the emergency management phase. For instance, Table 3 illustrates some disaster events where social media has been
social media uses during the Pre-Event phase include: provide and re- utilized. The volume of data generated has subsequently increased as
ceive disaster information. The functions from Pre-Event to Event phase the number of users who rely on social media continue growing
involve signaling and detection of disasters. Also, uses at the Event [35,112].
phase include, send and receive assistance requests, as well as, inform Emergency response organizations recognize the benefits of social
others about location and condition status. The stage with the most uses media. For instance, the Department of Homeland Security (DHS)

569
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

Table 3
Social media usage during disasters.

Event Details

Hurricane Katrina 2005 [35] • 73% of civilians monitored websites for major news.
• Citizens utilized social media to communicate with relatives.
Haiti Earthquake 2010 [35] • Twitter was the primary mechanism for communication.
• Traditional media, one-way communication such as TV and radio, was utilized by civilians for news updates.
Japan Earthquake and Tsunami 2011 [112] • Facebook, Skype, Twitter, Waze, Mixi, etc. continued operating even when the telephone lines were down.
• Twitter reached about 1200 tweets per minute coming from Tokyo.
Hurricane Sandy 2012 [35] • Twitter was used for communication reaching 1.1 million tweets in 21 h.
• On Facebook, Sandy became the 2nd most talked about topic of the year.
through the National Preparedness Report describes the current state of during and after a disaster. Lindsay [62] suggests that by monitoring
social media capabilities implemented by emergency agencies [24]. The information flows, situational awareness can be established. For in-
document also presents the goal to implement the Whole Community stance, when Hurricane Sandy (2012) hit the Northeast coast of the
approach, which describes the need to integrate emergency response United States, more than 20 million tweets were posted on Twitter in a
stakeholders to face hazards that challenge common wellbeing. five-day period. Emergency managers actively attempted to monitor the
Government, non-government organizations (NGOs), faith-based traffic in Twitter to increase their situational awareness. They also
organizations, communities and individuals have all been identified as engaged in conversations with the public to clarify doubts, correct ru-
key participants. For instance, there are agencies at different govern- mors, and deliver disaster relief information [25]. Shari, Buehner and
ment levels, as in the case of the city of Hoboken, New Jersey Palenchar [93] illustrate how the information exchanged during dis-
(@CityofHoboken), The Tennessee Emergency Management Agency asters as in the case of the 2007 Virginia Tech shooting and the 2007
(@T_E_M_A) at the state level, and the Federal Emergency Management California wildfires may assist practitioners to establish common
Agency (@FEMA) at the federal level. Non-government organizations ground. Also, Vieweg et al. [111] analyzed tweets from the 2009 Red
(NGOs) include the American Red Cross (@RedCross) and the Lions River Floods and 2009 Oklahoma City Fires, suggesting that social
Club International Foundation (@lionsclub). Lastly, examples of faith- media content may provide relevant information for situational up-
based entities consist of the Salvation Army USA (@SalvationArmyUS) dates.
and the Trinity Church at Wall Street (@TrinityWallSt). In brief, all of As has been noted in previous examples, social media applications
these emergency management stakeholders have social media presence, may provide valuable information as an event unfolds. This may result
and more importantly these organizations stay active during the in improved decision making by users and responders.
emergency management lifecycle. Such uses of social media are con-
sistent with DHS's emergency management concepts by facilitating
4.2.2. Faster information diffusion
coordination among stakeholders and simultaneously offering me-
Social media applications rely on internet services to operate. The
chanisms that can be implemented during any of the four phases of
World Wide Web was first mapped by Barabasi and Albert [7] as a
emergency management.
scale-free network, a concept frequently employed in complexity sci-
As it has been noted, social media applications seem to be consistent
ence. In their work, they found that only a few nodes have a large
with the professional approach to disaster management developed by
number of connections while most of nodes have a limited number of
FEMA as well as with the complexity science principles. Public parti-
connections. In other words, in social networks a few individuals are
cipation, decentralization of activities, networks of social media users
considered “influencers” or “hubs” as could be the case for public fig-
and fast dissemination of information offers significant benefits to the
ures. In essence, public figures have a large number of followers or fans
domain. The next section elaborates on the benefits of social media with
while those same followers have a scarce number of fans. A similar
respect to emergency management.
phenomena is replicated in emergency management. Influential mem-
bers of the community, authorities and non-government institutions
4.2. Social media benefits to emergency management have a large number of social media followers compared to the general
public, which tends to have a limited number of connections. Doerr,
4.2.1. Increase situational awareness Fouz and Friedrich [27] studied rumors in social networks concluding
In emergency management, Trainor and Subbio [103] state that that network topology plays a key role on how the information is dis-
situational awareness “describes human perceptions of the multifaceted seminated. They conclude that social media spreads information faster
circumstances around a crisis event that allow for interpreting situa- than any other network topology. In the same line, with the aim to
tions, making decisions and predicting future outcomes.” Thus, situa- understand how viruses propagate through different network topolo-
tional awareness refers to humans understanding what is occurring in gies, Berger et al. [9] concluded that viruses disseminate faster on the
their surrounding environment, in this case a disaster event. Harrald internet or scale-free networks than any other topology analyzed. Ne-
and Jefferson [42] identified requirements for increasing situational kovee et al. [72] compared dissemination rates of random graphs and
awareness: (1) obtaining data relevant to the goal one is trying to scale-free networks. He found that scale-free networks offer faster dis-
achieve, (2) data collected should provide a significant description of semination rates compared to random graphs. In addition, social in-
situation, (3) data should be enough to allow understanding the re- fluence plays a critical role on how information is disseminated and
lationships among components, (4) data should provide enough in- adopted. Bakshy et al. [5] defined that individuals with similar pre-
formation to facilitate development of potential future states and, (5) ferences tend to form clusters. Thus, individuals with similar interests
data should be able to facilitate the decision-making process. favor the formation of groups with similar characteristics.
Mobile technologies and social media applications would seem to As defined by Doerr, Fouz and Friedrich [27], the backbone of social
fulfill the requirements to increase situational awareness. Users have media is the scale-free network topology. Its properties allow faster
the ability to take pictures, video, and establish conversations almost in information dissemination rates that could significantly support emer-
real-time, facilitating the dissemination of information and establishing gency management at any of its operational phases. During emergency
communications with loved ones and authorities. Goodchild [38] sug- situations, information is key to coordination, response and recovery
gests the analogy that humans are sensors who provide information actions. Having information on time might be the difference between

570
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

life or death or millions of dollars lost in infrastructure. Social media 4.3. Social media challenges to emergency management
applications may support agile coordination among participants before,
during and after a disaster. The literature discussed in the previous section indicates that
emergency management may benefit from social media applications.
The flexibility and adaptability of social media addresses some of the
4.2.3. Monitoring activities and stakeholder coordination complexity challenges of emergency management. However, the lit-
Rapid communication among stakeholders is facilitated through the erature also indicates that the application of social media brings new
common platform social media offers to emergency management. It has challenges to emergency management. In some cases, social media
been observed that social media use increases during a disaster as actually exaggerates the previously described complexity challenges. In
people are continuously seeking information [35]. this section, we elaborate on the identified challenges introduced by
After the 2010 earthquake in Haiti, emergency managers recognized social media.
that social media is an important communication channel during Fig. 2 is an updated illustration of the challenges identified by Luna
emergency situations. For instance, United States agencies such as the and Pennock [65]. They summarized the challenges social media pose
U.S. Agency for International Development (USAID), the U.S. State to emergency management and organized these into two groups: social
Department, and the U.S. Armed Forces relied on social media appli- and technical.
cations to coordinate actions between agencies [96,114].
In addition, Teodorescu [102] indicates that monitoring social 4.3.1. Social challenges
media activity supports officials in understanding public sentiment and Social challenges are those that emerge from participant interac-
reactions to government responses. Sentiment analysis provides offi- tions. Interactions of interest are among the members of the public,
cials information to adapt emergency plans to mitigate public concerns. between the public and participating organizations, and among the
Furthermore, it has been noticed that during emergency situations a organizations themselves.
high volume of data is transmitted among users. As in the case of According to the International Organization for Standardization
hurricane Sandy with more than 20 million and during Fukushima an (ISO), the International Electrotechnical Commission (IEC), and the
estimate of 177 million tweets were exchanged [3]. To monitor real- Institute of Electrical and Electronics Engineers (IEEE), interoperability
time user activities, researchers have developed several systems that is defined as the “degree to which two or more systems, products or
support the analysis of social media streams. For instance, Tapia, Moore components can exchange information and use the information that has
and Johnson [100] developed the Enhance Messaging for the Emer- been exchanged” [48]. In emergency management, proper coordination
gency Response Sector (EMERSE), a tool that classifies text messages among participants must exist during emergency situations to provide
and tweets so that officials can easily go over the data and understand effective assistance. Nevertheless, Kaigo [50] and Wallop [112] re-
public sentiment. Also, Caragea et al. [13] introduced Disaster Tech cognize that when in need, stakeholders do not react in the most effi-
Lab, a monitoring platform implemented during hurricane Sandy to cient manner. Interoperability issues include transmission of mis-
map and respond to user requests. In another example, the Department information, rumors and cascading information flow. The rapid way
of Homeland Security [26] recognizes the Clark Regional Emergency social media spreads information is beneficial in emergency manage-
Services Agency (CRESA). In CRESA, the emergency manager cate- ment, if the information being disseminated is true. However, Karlova
gorizes channels from Twitter which include: local, state and national and Fisher [55] assert that if the information spread is outdated, in-
news, public and response agencies. The public is classified into local accurate or false, participants could take counterproductive actions that
and non-local to better understand data and isolate those that are not might exacerbate the negative impacts of disasters. The speed of mes-
relevant for the area. Data collection is constrained to the area affected. sage transmission, particularly false information, can result in severe
This facilitates mapping via geo-location. In addition, trending topics or consequences in emergency situations [64]. For instance, during dis-
specific hashtag search is feasible in CRESA allowing rapid and specific asters information such as event characteristics, citizens’ concerns,
response to emerging events. In a similar line, Purohit and Sheth [81] event images and several similar elements are disseminated via social
developed Twitris which is a Twitter based automatic classifier of media applications such as Twitter, Facebook, WhatsApp, etc. The
tweets that utilizes geo-location and semantics. Lastly, [78] introduced concern remains when the information is shared across user networks
SA: Emergency Situation Awareness, a Twitter powered tool that clas- without validation by authorities. Transmission of noise, in this case
sifies, clusters, and geo-tags tweets. outdated, inaccurate or false information, proves to be significant as it
may alter the perception and decision-making process of social media

Fig. 2. Challenges introduced by social media applications to the


emergency management domain (Updated from [65]).

571
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

Table 4
Events where outdated, inaccurate, or false information was disseminated via social media.

Year Event Counterproductive Consequences

2008 Oh (2013) Mumbai Terrorist Attack • Incorrect reports of explosions were disseminated via Twitter.
2010 Castillo, Mendoza
and Poblete [15]
Indonesian Emergency
Management Account
• Twitter account of Indonesian presidential adviser for emergency management was hacked. A false tsunami
warning alert was sent on his behalf.
2011 Karlova and Fisher Japan Earthquake and • Commuters walked unnecessary miles to find out that shelters and subways were not operating.
[54] Tsunami • Assistance was requested when victims were already rescued.

2012 DHS (2013b) Hurricane Sandy


• A hoax sent to a British channel stated that radiation was spreading across the Asian continent.
Inaccurate information related to:
• Bridge failures
• Lack of resources
• Shelter location
• Recovery status
• Weather reports

2014 Chen [17] Columbian Chemicals • Adisseminated


Russian organization generated a false emergency situation in Centerville, Louisiana. The organization
information about an explosion of a chemical plant igniting social media and generating serious
public concerns.
• Incommented
order to generate a realistic scenario, the organization created false Twitter accounts, posted false images and
on status to gain credibility.
2017 Potenza [79] Hurricane Harvey The spread of false rumors including:
•The City of Houston was checking immigration documents at shelters.
•Houston Bush Airport was completely flooded. Water level covered Delta planes.

users. Amazon. Reyes, Rosso and Buscaldi [85] created a classification model
Actions taken based on outdated or uncertain information may for recognizing sarcasm based on representativeness and relevance.
trigger a cascade of counterproductive behavior. One example is the Zhao, Lan and Zhu [116] suggested a method to identify early signals of
earthquake and tsunami in Fukushima where a rumor was spread sarcasm based on text classification. Sakamoto, Huaye and Yuko [89]
during the response phase. The rumor stated that hazardous materials asserted that collective truthfulness might reduce sharing of false in-
from an explosion in the Cosmo Oil Co. Ltd. were falling from the sky formation. Kwon et al. [57] proposed a method that classifies text based
along with rain, harming all those exposed to them [50]. Misinforma- on structural and linguistic patterns. A common denominator in all
tion exacerbated the impact of the Tsunami resulting in a public previously mentioned approaches is the utilization of machine learning
hoarding behavior. Rumors stating that vital goods were scarce when techniques.
they were not resulted in a shortage of drinking water, foods with long Practitioners and researchers understand that personal and cultural
shelf life, gasoline fuel, gas cartridges, and salt [50]. Thus, mis- experiences may shape the behavior of disasters [55,73]. As such, it is
information in social media has the potential to exacerbate the impacts important to understand human responses to disaster and how such
of disasters. Finally, misinformation resulted in a loss of credibility for perceptions influence their social media usage.
government institutions. The Japanese government encouraged citizens The Federal Emergency Management Agency through its Strategic
to return home during the recovery phase, while the radiation levels Foresight Initiative [32] identifies key long-term trends and drivers that
were not within the accepted limits [61]. Citizens developed mixed might potentially affect emergency management activities. The identi-
feelings which resulted in loss of morale and confidence in the gov- fied drivers include:
ernment, slowing down the recovery efforts. Table 4 illustrates six
different scenarios where outdated, inaccurate or false information has • Increase in U.S. population
been disseminated through social media applications. • Increase in elderly population
One challenge to identifying misinformation in social media appli- • Increase in racial and ethnic diversity
cations is identifying irony in text-based applications. Sarcasm is con- • Development of megaregions
text, culture, and voice-tone dependent making it difficult to recognize • Increase in coastal population density
for some people. Thus, recognizing sarcasm properties in text-based • Shifts in demographic structure
applications makes identification even more challenging and may cause
unintended consequences. Approaches developed to contain and re- For instance, FEMA forecasts a shift in demographics in the next 35
cognize sarcasm propagation in social media have been suggested. Tsur, years. The United States Census Bureau [108] estimates growth of the
Davidov and Rappoport [104] proposed a semi-supervised algorithm to U.S. population by 42% between 2010 and 2050. Also, the percentage
recognize sarcasm in product reviews. Davidov, Tsur and Rappoport of elderly is estimated to grow from 12% to 21% by 2050. In addition,
[21] developed an algorithm to recognize sarcasm in Twitter and the United States Census Bureau [109] forecasts an increase of

572
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

minorities relative to the White population. Hispanics are expected to be considered as they may diminish the utility of social media for
reach 24%, African-American 15%, Asian 8%, and the White population emergency management.
is expected to decrease from 81% to 72% by 2050 [32]. With this Also, data from social media applications lacks a well-defined
transition of demographics, languages spoken in the U.S. are also ex- structure, hence their integration with relational databases is infeasible.
pected to diversify. According to [94], the most common non-English Social media data may include special characters and emojis, making
languages spoken in the US among the population 5 years and over by the analysis and derivation of meaning a difficult task to perform [70].
2020 are forecast to be Spanish (62.6%), Chinese (4.7%), French Lastly, the development and implementation of new emergency man-
(2.8%), Tagalog (2.7%) and Vietnamese (2.3%). To complicate matters, agement activities are limited by the amount of data that emergency
people are migrating to coastal and flood prone areas as well as creating managers are able to process. As Imran et al. [46] stated, information
mega-regions [32]. Bertot et al. [10] assert that officials must account overload and information prioritization should be addressed to make
for language barriers, social stratification, age, educational level; use of social media data for situational awareness. For instance, during
however, research considering these factors is limited. Therefore, Me- Hurricane Sandy, it was difficult for stakeholders to monitor and extract
jova, Weber and Macy [70] state that with such expected shifts in de- valuable information from more than 20 million crowdsourced tweets
mographics, it is necessary to understand the presence and usage of [69]. In an analogy, emergency managers face the “needle in a hay-
social media applications by the multiple demographic groups. stack” phenomena; they are continuously searching for key information
Lastly, the features of social media applications allow any user to in a large volume of data to help them detect, monitor, and gain in-
create or open an account on behalf of another individual or entity formation for situational awareness. Thus, finding the “needle” or key
leading to stakeholder universality. Consequently, this characteristic information will enable emergency managers to make more informed
facilitates the creation of false social media profiles. Individuals or or- decisions.
ganizations with malicious intentions may take advantage of fictitious
profiles to disseminate incorrect information or infiltrate into proprie- 4.4. Summary of benefits and challenges
tary databases. Their goal is to inflict harm.
In brief, the implementation of social media applications to disaster
4.3.2. Technical challenges response provides new benefits to the domain such as:
Technical challenges are defined as limitations in governing the
physical and logistical resources required to support the functioning • Situational awareness,
and maintenance of social media applications. • Faster information diffusion,
The rapid adaptation of social media applications has outpaced the • Monitoring activities and stakeholder coordination.
existing regulatory frameworks, which leads to the development of poor
quality data [42,60]. Therefore, Lindsay [62] suggests that standards, However, their adoption introduces new challenges including:
processes, and regulations should be developed to better manage the
information disseminated through social media applications. • Interoperability issues, misinterpretation by the public, and rumors
In a related issue, data ownership has not been well defined. Bertot • Stakeholder stratification
et al. [10] understand that application developers are the primary • Stakeholder demographics
content owners. However, the authors point out that when a disaster • Stakeholder universality
occurs, government agencies have not yet defined who will manage the • Absence of standards and regulations regarding their use
applications and for how long the records will be kept. As stated by • System architecture: Definition of ownership and information flows.
White and Plotnick [113], a lack of a well-defined architecture results • Data infrastructure: What storage capabilities are needed? What
in interoperability challenges among stakeholders. Gao et al. [36] em- amount of personnel and tools are required to analyze the vast
phasize that the amount of content generated during disasters is ex- amount of data?
pected to increase as the number of users adopt new applications. • System and data security: Who will have access to the data? What if
However, there are no estimates on what human and capital resources security is violated?
are needed to store, manipulate and analyze the data. Therefore, data • Monetization: What are the consequences to migrate from a non-
manipulation protocols and training manuals should be developed for profit to for-profit social media application?
future reference. • Social media data attributes: How to generate knowledge from un-
System security is one of the topics that concerns the public the structured data during emergency situations?
most. As Trainor and Subbio [103] and Fraustino, Liu and Jin [35]
indicate, questions regarding who has access to their information and This research domain is relatively new considering that formal
how that information is managed results in reluctant adoption of social studies in the application of social media to emergency management
media applications. Also, data security is of interest to policy makers. began after Hurricane Katrina in 2005 [95,67,75,80,86]. Data mining
For instance, Lindsay [62] concluded that unauthorized access to data tools and techniques have been developed such as keyword extraction
and information infrastructure may result in damage to strategic per- and trend analysis [37,56,59,88]. Social science models and theories to
sonnel or resources creating or exacerbating potential damages. simulate social dynamics have been proposed [115,43]. Nevertheless,
Social media monetization is defined as the strategy of how a social the research in these domains seems to have been conducted in-
media provider earns revenue and provides value to its stakeholders dependently of each other.
[105]. The challenge with a monetization model is that it may cause Addressing the challenges introduced by social media applications
users to lose interest in certain applications. Lipowicz [63] remarks that will expand the set of tools that emergency managers can utilize. The
as social media applications migrate from nonprofit to for-profit, they next section elaborates on proposed directions to address the challenges
are exposed to losing users, credibility, or user activity. This especially identified.
occurs when applications transition from an ad-free version to an in-app
advertising model or when the number of advertisements increase 5. Research agenda
significantly. Furthermore, Clemons [18] stated that approaching users
with an excess of marketing material may cause the public to lose in- In order to address the challenges presented, this section provides a
terest. The concern in the emergency management domain is that the research agenda for practitioners and researchers regarding the appli-
public could ignore or be diverted away from critical government cation of social media to disaster response. To develop the research
messages. The impact of monetization approaches in general needs to agenda, we utilized all articles approved for further detail as described

573
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

in Section 2. Then, we employed the grounded theory approach to algorithms are a common technique used to address this issue [46]. A
cluster groups of social media issues in emergency management [39]. remaining challenge is that of filtering spammers rather than filtering
Inductive coding enabled the emergence of issues or challenges that are spam itself. Spammers or malicious users learn and adapt their spam-
still needed to be addressed in emergency management. The key topics ming strategies, thus filtering techniques must also account for
that emerged were interoperability issues, stakeholder universality, spammer behavior [8].
user demographics, lack of standards and regulations, extraction of
useful information, and social media monetization. 5.3. User demographics
Based on that analysis, we have identified the following questions
that require additional investigation by the emergency management How are social media applications used by different demographic
research community. Our research agenda is driven by the challenges groups during emergency situations?
identified by Luna and Pennock [65]. We expect that the expertise of
multiple disciplines including the social sciences, data mining, in- • Does age influence the use and decision making during disasters as
formation technology, political science, communications, public affairs, the literature in social sciences state?
and engineering will be required to make progress against this agenda. • How does community structure influence the decision-making pro-
cess during emergency situations?
5.1. Interoperability
Different socioeconomic groups may exhibit differences in access to
How should one filter or signal alerts that attract an emergency and use of social media during a disaster. Understanding the differences
manager's attention as an event unfolds? in how stakeholders use social media applications during disaster
events will facilitate the development of tailored preparedness, miti-
• How does unstructured data influence the detection of mis- gation, response and recovery activities as well as applications that
information in social media applications during the phases of consider a wide range of scenarios. Social science models and theories
emergency management? to simulate social dynamics have been proposed [115,43]. However,
• How can social media data be employed to anticipate and visualize future studies should include social media use demographics along with
cascading network effects during disaster scenarios? social dynamic models to generate more comprehensive simulation
scenarios.
Information disseminated via social networks may contain rumors,
false, or truthful but outdated information. Emergency managers may 5.4. Regulatory frameworks
benefit from a rumor detection mechanism that allows them to identify
false information. By informing the public about circulating rumors, Governance frameworks for social media management are limited
emergency managers may prevent counterproductive consequences. In when suggesting how to manage human and technical resources in
addition, visualization of what-if scenarios may assist decision makers emergency management. Therefore, the logical questions to ask would
when developing response strategies, which will improve community be:
resilience. Proposed approaches to detect misinformation rely on su-
pervised and semi-supervised learning algorithms and sensor fusion • What are the policies, standards, guidelines and procedures that
techniques to classify sarcasm [114,116,57]. Two trends in sarcasm would facilitate the implementation and management of social
detection include: first, the discovery of sarcastic patterns and the use of media applications during the four phases of emergency manage-
those patterns as features and second, the use of contextual information ment?
for sarcasm detection [49]. Open challenges in sarcasm detection in- • What resources are needed to store the information generated?
clude issues with annotation such as the use of # to describe sarcasm • What is the cost for maintaining the system in operation?
(i.e. #not: “I love my job #not") and how to improve accuracy if an- • Who will have access to the information obtained?
notations are not included or are deleted during pre-processing stages. • Where will it be stored and for how long?
Also, issues with sentiment as a feature include providing or ranking
different polarity values to words which is reflected in the sentiment Official use of social media applications has been limited due to the
output. scarce regulatory frameworks developed or accepted by response or-
ganizations [26]. Answers to these questions will enable the creation of
5.2. Stakeholder universality standards, policies and regulations that facilitate the governance of
social media applications before, during, and after emergency situa-
To what extent can social media data facilitate the detection of tions.
malicious social media profiles?
5.5. Extracting useful information from social media data
• What properties of social media profiles support the authentication
of user-generated profiles? How do you extract actionable knowledge from extremely large
volumes of social media data?
Individuals or organizations with malicious intentions may take
advantage of fictitious profiles to disseminate incorrect information or • What human and capital resources are needed to store, manipulate,
infiltrate into proprietary databases. The objective of the above ques- and analyze social media data during disaster events?
tions is to understand to what level fake social media profiles can be
detected. Domains including marketing and politics have been affected Knowledge extraction from social media is challenging because of
by “internet-bots”, malicious software that performs the automated task the unstructured nature of the data. Text including sarcasm, gramma-
of creating a vast number of false profiles with the goal to influence tical errors, special characters, and emoji's makes the analysis even
consumers or voters [51,82]. Early detection of malicious or false more challenging. Development of text analysis tools able to extract
profiles will enable emergency managers to detect false assistance re- relevant and accurate information will reduce the burden on decision
quests or mitigate false information during all four-phases of emergency makers and speed up the decision-making process [26]. Text mining
management. Current approaches to bot detection rely on techniques techniques including topic discovery, cluster analysis, keyword ex-
similar to the detection of internet spam. Supervised learning traction, trend analysis, and classification methods have been proposed

574
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

[37,56,59,88]. Nevertheless, images are also disseminated through so- Acknowledgements


cial media, and methods to process and analyze multimedia in social
media should be formulated [114] This material is based upon work supported, in part, by an
Innovation and Entrepreneurship Fellowship from the Stevens Institute
of Technology. Any opinions, findings and conclusions or re-
5.6. Social media monetization commendations expressed in this material are those of the authors and
do not necessarily reflect the views of the Stevens Institute of
How is public engagement affected by social media monetization in Technology.
emergency situations?
References
• To what extent may social media providers introduce advertising in
their platforms before users abandon them? [1] David Alexander, Natural Disaster, Chapman & Hall, New York, 1993, p. 1993.
[2] M.L. Antheunis, K. Tates, T.E. Nieboer, Patients' and health professionals' use of
social media in health care: motives, barriers and expectations, Patient Educ.
The business model that a social media application employs may be Couns. 92 (3) (2013) 426–431.
proportional to their market penetration. For instance, free or freemium [3] S. Anson, H. Watson, K. Wadhwa, K. Metz, Analysing Social Media Data for
models are intended to gain a vast number of users at first sight. The Disaster Preparedness: Understanding the Opportunities and Barriers Faced by
Humanitarian, (2017).
concern lies when those social media applications transition to a [4] W.R. Ashby, An Introduction to Cybernetics, Chapman & Hall, London, 1956.
membership-type business model. Users tend to abandon applications [5] E. Bakshy, I. Rosenn, C. Marlow, L. Adamic, The role of social networks in in-
as they transition from one economic model to another. Analysis of the formation diffusion, in: Proceedings of the 21st International Conference World
Wide Web (ACM, New York), 519–528, 2012.
impacts of different business models as well as their potential transition
[6] Darul E. Bangi, Characterization of hazards, vulnerability and risk of disaster
should be considered by decision makers when developing a dedicated management, Adv. Environ. Biol. 6 (3) (2012) 955–966.
social media tool for emergency management. In regard to monetizing [7] A.L. Barabasi, R. Albert, Science 286 (1999) 509.
[8] F. Benevenuto, G. Magno, T. Rodrigues, V. Almeida, Detecting spammers on
social media, literature reflects on how to make profit during emer-
Twitter, in: Proceedings of Collaboration, Electronic messaging, AntiAbuse and
gency situations. For instance, Shanley, et al. [92] discussed the pos- Spam Conference July 13-14, 2010, Redmond, Washington, 2010.
sibility to license map data for profit. Luna and Pennock [65] suggest [9] N. Berger, C. Borgs, Chayes, and J., S. Amin, On the spread of viruses on the
evaluating business models in emergency management. Social media internet, in: Proceedings of the sixteenth annual ACM-SIAM symposium on
Discrete algorithms. Society for Industrial and Applied Mathematics, 2005.
monetization in emergency management is an underdeveloped topic, [10] J.C. Bertot, P.T. Jaeger, D. Hansen, The impact of polices on government social
and literature is scarce. Future research should include the effects of media usage: issues, challenges, and recommendations, Gov. Inf. Q. 29 (1) (2012)
advertising on user abandonment during disaster scenarios. 30–40.
[11] M.J. Bolton, G.B. Stolcis, Overcoming failure of imagination in crisis management:
Answers to the above questions aim to define the requirements to the complex adaptive system, Innov. J.: Public Sect. Innov. J. 13 (4) (2008) 2–12.
operate social media applications during emergency events. The solu- [12] N. Britton, A new emergency management for a new millennium? Aust. J. Emerg.
tions will also improve coordination and interoperability among sta- Manag. 16 (4) (2002) 44–54.
[13] C. Caragea, N. McNeese, G. Jaiswal, Traylor, H.-.W. Kim, P. Mitra, Classifying text
keholders and technology by identifying broken information links. messages for the Haiti earthquake. Proceedings of the 8th International ISCRAM
Conference. Lisbon, Portugal. 2011, 2011.
[14] John L. Casti, Risk, natural disasters, and complex system theory, Complexity 7 (2)
(2001) 11–13.
6. Conclusions [15] C. Castillo, M. Mendoza, B. Poblete, Information Credibility on Twitter,
in: Proceedings of the 20th International World Wide Web Conference, 1–10, Jan
Social media is a pervasive communication channel that allows 2011, 2011.
[16] A. Cavallo, V. Ireland, Preparing for complex interdependent risks: a system of
users to create, consume and exchange content. Lessons learned from
systems approach to building disaster resilience, Int. J. Disaster Risk Reduct.
historical disasters have shown that social media has the potential to (2014) 181–193.
support the emergency management domain by providing: stakeholders [17] A. Chen, The Agency, The New York Times, 2015 (2 June 2015), 〈https://www.
with information as the event unfolds, a mechanism to alert larger nytimes.com/2015/06/07/magazine/the-agency.html〉.
[18] E.K. Clemons, The complex problem of monetizing virtual electronic social net-
audiences in less time, a platform to monitor public activities, as well as works, Decis. Support Syst. 48 (1) (2009) 46–56.
a tool where stakeholders can coordinate activities. [19] L.K. Comfort, Crisis management in hindsight: cognition, communication, co-
However, substantial research challenges remain. Results from a ordination, and control, Public Adm. Rev. 67 (s1) (2007) 189–197.
[20] J. Cowan, When 911 was overloaded, desperate harvey victims turned to social
literature review revealed two major areas where additional work is media for help, Emerg. Manag. (2017) (28 August 2017), 〈http://www.govtech.
required. The first area consists of social challenges, which are char- com/em/disaster/When-911-Failed-Them-Desperate-Harvey-Victims-Turned-to-
acterized by interactions among stakeholders. Understanding the re- Social-Media-for-Help.html〉.
[21] D. Davidov, O. Tsur, A. Rappoport, Semi-supervised recognition of sarcastic sen-
lationships among user responses to social media content, quality of tences in twitter and amazon, in: Proceedings of the Fourteenth Conference on
disseminated information, and user demographics is still an incipient Computational Natural Language Learning. Association for Computational
field. The second area refers to the technical challenges, which are Linguistics, 2010.
[22] C. Davis III, R. Deil-Amen, C. Rios-Aguilar, C. Gonzalez, Social Media in Higher
those related to governing the physical and logistical resources required Education: A Literature Review and Research Directions, The Centre for the Study
to support the functioning and maintenance of social media applica- of Higher Education at the University of Arizona and Claremont Graduate
tions. Underdeveloped areas in managing social media include the de- University, 2012.
[23] Department of Homeland Security, National Response Plan. Washington, D.C.,
velopment of regulations, definition of system ownership and man-
November 2004, 2004.
agement, social media monetization, and management of social media [24] Department of Homeland Security, 2013 National Preparedness Report.
data. Washington, D.C., March 2013, 2013a.
Finally, we proposed a research agenda for the emergency man- [25] Department of Homeland Security, Lessons Learned: Social Media and Hurricane
Sandy. Washington, D.C., June 2013, 2013b.
agement research community that seeks to address a set of unexplored [26] Department of Homeland Security, Using Social Media for Enhances Situational
facets of social media in emergency management. Progress on this Awareness and Decision Support. Washington, D.C., June 2014, 2014.
agenda will create a foundation for the development of better methods, [27] B. Doerr, M. Fouz, T. Friedrich, Why rumors spread so quickly in social networks,
Commun. ACM 55 (6) (2012) 70–75.
tools and processes which will reduce the burden on decision makers [28] R. Dynes, Community emergency planning, Int. J. Mass Emergencies Disasters 12
and emergency managers, improve strategies to leverage social media (1994) 141–158.
content for disaster response, and facilitate coordination among sta- [29] F. Edwards-Winslow, Preparing for WMD/NBCEvents in San Jose:
Intergovernmental Relations. Paper presented at the American Society for Public
keholders as a disaster unfolds. Administration National Conference, March 24, Phoenix, Arizona, 2002, 2002.

575
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

[30] S.M. Edwards, A social media mindset, J. Interact. Advert. 12 (1) (2011) 1–3. Federal Technology. FCW, 16 Sept. 2011. Web. 11 Nov. 2016. 〈https://fcw.com/
[31] Federal Emergency Management Agency, A Whole Community Approach to articles/2011/09/16/social-media-for-disasters-has-good-and-bad-aspects-crs-
Emergency Management: Principles, Themes, and Pathways for Action, report-says.aspx〉, 2011.
Washington, D.C. December 2011, 2011a. [64] F. Liu, A. Burton-Jones, D. Xu. Rumors on social media in disasters: extending
[32] Federal Emergency Management Agency, Strategic Foresight Initiative. U.S. transmission to retransmission, in: Proceedings of the Pacific Asia Conference on
Demographic Shifts. Washington, D.C. May 2011, 2011b. Information Systems (PACIS), 2014. 〈http://aisel.aisnet.org/pacis2014/49〉.
[33] Federal Emergency Management Agency, Strategic Foresight Initiative. Crisis [65] S. Luna, M. Pennock. Social media in emergency management advances, chal-
Response and Disaster Resilience 2030: Forging Strategic Action in an Age of lenges and future directions, in: Proceedings of the 9th Annual IEEE International
Uncertainty. Washington, D.C. January 2012, 2012a. Systems Conference (SysCon), no. IEEE, 2015, pp. 792–797.
[34] Federal Emergency Management Agency, Theory, Principles and Fundamentals of [66] W.G. Mangold, D.J. Faulds, Social media: the new hybrid element of the promo-
Hazards, Disasters, and U.S. Emergency Management, Approaches to Emergency tion mix, Bus. Horiz. 52 (2009) 357–365.
Management. Washington, D.C. 2012, 2012b. [67] W. Macias, K. Hilyard, V. Freimuth, Blog functions as risk and crisis commu-
[35] J.D. Fraustino, B. Liu, Y. Jin, Social Media Use during Disasters: A Review of the nication during Hurricane Katrina, J. Comput.-Mediat. Commun. 15 (1) (2009)
Knowledge Base Gaps. Final report to Human Factors/Behavioral Sciences 1–31.
Division, Science and Technology Directorate, U.S. Department of Homeland [68] T. McDermott, W. Rouse, S. Goodman, M. Loper, Multi-level modeling of complex
Security. College Park, MD: START, 2012. socio-technical systems, Procedia Comput. Sci. 16 (2013) 1132–1141.
[36] H. Gao, G. Barbier, R. R. Goolsby, Harnessing the crowdsourcing power of social [69] P. Meier, Crisis maps: harnessing the power of big data to deliver Humanitarian
media for disaster relief, IEEE Intell. Syst. 26 (3) (2011) 10–14. Assistance, Forbes (2013) (2 May 2013), 〈https://www.forbes.com/sites/
[37] S. Gaglio, G. Lo Re, M. Morana, A framework for real-time Twitter data analysis, skollworldforum/2013/05/02/crisis-maps-harnessing-the-power-of-big-data-to-
Comput. Commun. 73 (Part B) (2016) 236–242. deliver-humanitarian-assistance/#5e6e186b115c〉.
[38] M.F. Goodchild, Citizens as sensors: the world of volunteered geography, [70] Y. Mejova, I. Weber, M. Macy, Twitter: a Digital Socioscope, Cambridge University
GeoJournal 69 (2007) 211–221. Press, Cambridge, UK, 2015.
[39] C. Goulding, Grounded Theory: A Practical Guide for Management, Business and [71] D. Neal, B. Phillips, Effective emergency management: Reconsidering the bu-
Market Researchers, Sage, Thousand Oaks, CA, 2002. reaucratic approach, Disasters 19 (1995) 327–337.
[40] Ashley Rae Harris, Facebook: The Company and Its Founders, ABDO Pub, [72] M. Nekovee, Y. Moreno, G. Bianconi, M. Marsili, Theory of rumour spreading in
Minneapolis, MN, 2013 (Print). complex social networks, Phys. A: Stat. Mech. Appl. 374 (1) (2008) 457–470.
[41] G. Haddow, J. Bullock, D. Coppola, Introduction to Emergency Management, [73] O. Oh, M. Agrawal, H. Rao, Community intelligence and social media services: a
Buttersworth-Heinemann, Newton, PA, 2013. rumor theoretic analysis of tweets during social crises, MIS Q. 37 (2) (2013)
[42] J. Harrald, T. Jefferson, Shared situational awareness in emergency management 407–426 (2013).
mitigation and response, in: Proceedings of the 40th annual Hawaii International [74] T.L. O’Sullivan, C.E. Kuziemsky, D. Toal-Sullivan, W. Corneil, Unraveling the
Conference on System Sciences, 2007. HICSS 2007. IEEE, p. 23, 2007. complexities of disaster management: a framework for social infrastructure to
[43] D. Helbing, I. Farkas, T. Vicsek, Simulating dynamical features of escape panic, promote population health and resilience (http://dx.doi.org/), Social. Sci. Med.
Nature 407 (2000) 487–490. (2013), http://dx.doi.org/10.1016/j.socscimed.2012.07.040.
[44] John H. Holland, Hidden Order: How Adaptation Builds Complexity, Basic Books, [75] L. Palen, S.B. Liu. Citizen Communications in Crisis: Anticipating a Future of ICT
1995. supported Public Participation, in: Proceedings of the 2007 Conference on Human
[45] J.B. Houston, J. Hawthorne, M.F. Perreault, E.H. Park, M.G. Hode, M.R. Halliwell, Factors in Computing Systems (CHI 2007). 2007. pp. 727–736. New York, NY:
S.E. Turner McGowen, R. Davis, S. Vaid, J.A. McElderry, S.A. Griffith, Social media ACM Press.
and disasters: a functional framework for social media use in disaster planning, [76] L. Palen, S. Vieweg, S. Liu, A.L. Hughes, Crisis in a networked World: features of
response, and research, Disasters 39 (1) (2014) 1–22. computer-mediated communication in the April 16, 2007 Virginia tech event, Soc.
[46] M. Imran, C. Castillo, F. Fernando Diaz, S. Vieweg, Processing social media mes- Sci. Comput. Rev. Spec. Issue E-Social. Sci. (2009).
sages in mass emergency: a survey, ACM Comput. Surv. 47 (4) (2015) (Article67). [77] Pew Research Center. Social Media Fact Sheet. Washington, D.C., 〈http://www.
[47] International Federation of Red Cross and Red Crescent Societies. What is a dis- pewinternet.org/fact-sheet/social-media/〉, (Accessed 1 December 2017).
aster? 〈http://www.ifrc.org/en/what-we-do/disaster-management/about- [78] R. Power, B. Robinson, J. Colton, M. Cameron, Emergency situation awareness:
disasters/what-is-a-disaster〉 Accessed on 2017. Twitter case studies, in: Proceedings of Information Systems for Crisis Response
[48] ISO/IEC/IEEE, Systems and Software Engineering - System and Software and Management (ISCRAM), 218–231, 2014.
Engineering Vocabulary (SEVocab). Geneva, Switzerland: International [79] A. Potenza, Why do hoaxes go viral during natural disasters like Hurricane
Organization for Standardization (ISO)/International Electrotechnical Harvey? Verge (2017) (29 August 2017), 〈https://www.theverge.com/2017/8/
Commission (IEC)/ Institute of Electrical and Electronics Engineers (IEEE). ISO/ 29/16221600/hurricane-harvey-hoaxes-viral-social-media-sharks-delta-planes〉.
IEC/IEEE 24765:2009, 2009. [80] C. Procopio, S. Procopio, Do you know what it means to miss new orleans?orleans?
[49] A. Joshi, P. Bhattacharyya, M.J. Carman, Autom. sarcasm Detect.: A Surv. 1602 internet communication, geographic community, and social capital in crisis, J.
(2016) 03426 (arXiv preprint arXiv). Appl. Commun. Res. 35 (1) (2007) 67–87.
[50] M. Kaigo, Social media usage during disasters and social capital: Twitter and the [81] H. Purohit, A. Sheth, Twitris v3: From citizen sensing to analysis, coordination and
Great East Japan earthquake, Keio Commun. Rev. 34 (2012) 19–35. action, in: Proceedings of International Conference on Web and Social Media
[51] C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, S. Savage, (ICWSM), 2013.
Spamalytics: An Empirical Analysis of Spam Marketing Conversion. In ACM [82] J. Ratkiewicz, M. Conover, M. Meiss, B. Gonçalves, A. Flammini, F. Menczer,
Conference on Computer and Communications Security, 2008, 2008. Detecting and tracking political abuse in social media, in: Proceedings of the Fifth
[52] A.M. Kaplan, M. Haenlein, Users of the World, unite! The challenges and oppor- International AAAI Conference on Weblogs and Social Media, page 297, 2011,
tunities of social media, Bus. Horiz. 53 (1) (2010) 59–68. 2011.
[53] N. Kapucu, Collaborative emergency management: better community organizing, [83] M.C. Reddy, S.A. Paul, J. Abraham, M. McNeese, C. DeFitch, J. Yen, Challenges to
better public preparedness and response, Disasters 32 (2) (2008) 239–262. effective crisis management: using information and communication technologies
[54] N.A. Karlova, K.E. Fisher, Plz RT: A Social Diffusion Model of Misinformation and to coordinate emergency medical services and emergency department teams', Int.
Disinformation for Understanding Human Information Behaviour, in: Proceedings J. Med. Inform. 78 (2009) 259–269.
of the ISIC 2012 The Information Behaviour Conference, 2012. [84] Pat Reid, D. Van Niekerk, A model for a multi‐agency response management
[55] N.A. Karlova, K.E. Fisher, A social diffusion model of misinformation and disin- system (MARMS) for South Africa, Disaster Prev. Manag. (2008) 244–255.
formation for understanding human information behaviour, Inf. Res. 18 (1) [85] A. Reyes, P. Rosso, D. Buscaldi, From humor recognition to irony detection: the
(2013). figurative language of social media, Data Knowl. Eng. 74 (2012) 1–12.
[56] R. Kaushik, S. Apoorva, J.N.V.K. D. Mallya, J.N. Chaitanya, S. Kamath, Sociopedia: [86] S. Robinson, “If you had been: us”: mainstream press and citizen journalists jockey
An Interactive System for Event Detection and Trend Analysis for TwitterData, for authority over the collective memory of Hurricane Katrina, New Media Soc. 11
2016 Springer, India, 2016, pp. 63–70. (5) (2009) 795–814.
[57] S. Kwon, M. Cha, K. Jung, W. Chen, Y. Wang. Prominent features of rumor pro- [87] W.B. Rouse, N. Serban, Understanding change in complex socio-technical systems,
pagation in online social media, in: H. Xiong, G. Karypis, B.M. Thuraisingham, D.J. Inf. Knowl. Syst. Manag. 10 (2011) 1–4.
Cook, X. Wu (Eds.). 2013 IEEE Proceedings of the 13th International Conference [88] T. Sakaki, F. Toriumi, Y. Matsuo, Tweet trend analysis in an emergency situation,
on Data Mining. Dallas, TX, 2013, pp. 1103–1108. in: Proceedings of the Special Workshop on Internet and Disasters, SWID ’11,
[58] E. Lee, Facility location and multi-modality mass dispensing strategies and pages 3:1–3:8, New York, NY, USA. ACM, 2011.
emergency response for biodefense and infectious disease outbreaks, Int. J. Risk [89] Y. Sakamoto, Li Huaye, T. Yuko, Rumors on Social Media During Emergencies
Assess. Manag. 12 (2–3-4) (2009) (311–251). (July 29, 2014). Howe School Research Paper No. 2014–2037, 2014.
[59] D. Lee, K.-R. Kim, H.-G. Cho, A New Extraction Algorithm for Hierarchical [90] S. Schneider, Governmental response to disasters: the conflict between
Keyword Using Text Social Network, Springer, 2016, pp. 903–912 (2016). Bureaucratic, Proced. Emergent Norms’ Public Adm. Rev. 52 (2) (1992) 135–145
[60] L. Li, M.F. Goodchild, The role of social networks in emergency management: a (Mar- Apr 1992).
research agenda, Int. J. Inf. Syst. Crisis Response Manag. 2 (4) (2012) 48–58. [91] M.D. Selves, Local Emerg. Manag.: A Tale Two Models (2002) (Accessed on 2017),
[61] J. Li, A. Vishwanath, H.R. Rao, Retweeting during the 2011 Japan nuclear ra- 〈http://training.fema.gov/EMIWeb/edu/localEM1.html〉.
diation incident: an exploration of risk and reassurance communication, Commun. [92] L. Shanley, R. Burns, Z. Bastian, E. Robson, Tweeting up a storm: the promise and
ACM 57 (1) (2014) 78–85. perils of crisis mapping, Photogramm. Eng. Remove Sens. 79 (2013) 865–879.
[62] B.R. Lindsay, Social Media and Disasters: Current Uses, Future Options, and Policy [93] R. Veil Shari, T. Buehner, M.J. Palenchar, A work-in-process literature review:
Considerations 41987 Congressional Research Service, 2011. incorporating social media in risk and crisis communication, J. Contingencies
[63] A. Lipowicz, Social Media: A Mixed Blessing for Disaster Response. The Business of Crisis Manag. 19 (2) (2011) 110–122.

576
S. Luna, M.J. Pennock International Journal of Disaster Risk Reduction 28 (2018) 565–577

[94] Shin, H.B., & Ortman, J.M. (2011). Language projections: 2010 to 2020. Paper Fourth International AAAI Conference on Weblogs and Social Media, 2010.
presented at the 2011 Federal Forecasters Conference, Washington, DC. Retrieved [107] United Nations Office for Disaster Risk Reduction, UNISDR Terminology in
from 〈http://www.census.gov/hhes/socdemo/language/data/acs/Shin_Ortman_ Disaster Risk Reduction 〈https://www.unisdr.org/we/inform/terminology〉,
FFC2011_paper.pdf〉. 2009, 2009.
[95] I. Shklovski, M. Burke, S. Kiesler, R. Kraut, Technology adoption and use in the [108] United States Census Bureau. The Next Four Decades, The Older Population in the
aftermath of Hurricane Katrina in New Orleans, Am. Behav. Sci. 53 (8) (2010) United States: 2010 to 2050. Population Estimates and Projections, P25-1138, May
1228–1246. 2010. pg. 1, 2010. Available at: 〈http://www.census.gov/prod/2010pubs/p25-
[96] T. Simon, A. Goldberg, B. Adini, Socializing in emergencies—a review of the use of 1138.pdf〉.
social media in emergency situations, Int. J. Inf. Manag. 35 (5) (2015) 609–619. [109] United States Census Bureau, U.S. Census Bureau Projections Show a Slower
[97] S.P. Simonovic, Systems Approach to Management of Disasters: methods and Growing, Older, More Diverse Nation a Half Century from Now. Washington, DC.,
Applications, Wiley & Sons, New York, 2010, p. 2010. December 2012, 2012.
[98] E.S. Spiro, S. Fitzhugh, J. Sutton, N. Pierski, M. Greczek, C.T. Butts, Rumoring [110] S. Vieweg, L. Palen, S. Liu, A. Hughes, J. Sutton, Collective intelligence in disaster:
during extreme events: a case study of Deepwater Horizon 2010, in: Proceedings of examination of the phenomenon in the aftermath of the 2007 Virginia tech
ACM Web Science Conference 2012, ACM, 275-283, 2012. shooting, Int. J. Crisis Response Manag. (2008).
[99] J. Sutton, L. Palen, I. I. Shlovski,, Backchannels on the front lines: emergent use of [111] S. Vieweg, A. Hughes, K. Starbird, L. Palen. Microblogging during two natural
social media in the 2007, Int. J. Crisis Response Manag. (2008). hazards events: what twitter may contribute to situational awareness, in:
[100] A. Tapia, K. Moore, N. Johnson, Beyond the trustworthy Tweet: a deeper under- Proceedings of the 28th International Conference on Human Factors in Computing
standing of microblogged data use by disaster response and humanitarian relief Systems Atlanta: Association of Computing Machinery. 2010. pp. 1079–1088.
organizations, Proc. Inf. Syst. Crisis Response Manag. (2013) 770–779 (Baden- [112] H. Wallop, Japan Earthquake: How Twitter and Facebook Helped. The Telegraph,
Baden, Germany). Telegraph Media Group, 2014, p. 2014.
[101] M.L. Tan, R. Prasanna, K. Stock, Hudson-Doyle, G. Leonard, D. Johnston, Mobile [113] C. White, L. Plotnick, A framework to identify best practices: social media and web
applications in crisis informatics literature: a systematic review, Int. J. Disaster 2.0 technologies in emergency domain, Int. J. Inf. Syst. Crisis Response Manag.
Risk Reduct. 24 (2017) 297–311. (2010) 37–48.
[102] N.H. Teodorescu, Using analytics and social media for monitoring and mitigation [114] D. Yates, S. Paquette, Emergency knowledge management and social media
of social disasters, Procedia Eng. 107C (2015) 325–334. technologies: a case study of the 2010 Haitian earthquake, Int. J. Inf. Manag. 31
[103] J.E. Trainor, T. Subbio, Crit. Issues Disaster Sci. Manag.: A Dialog-. Res. Pract. (2011) 6–13.
(2014), 〈http://dspace.udel.edu/handle/19716/13418〉 (Accessed on 20 January [115] M. Zafar, K. Zia, A. Muhammad, A. Ferscha. An Agent-Based Model of Crowd
2016). Evacuation Integrating Agent Perception and Proximity Pressure, in: Proceedings
[104] O. Tsur, D. Davidov, A. Rappoport, ICWSM-A Great Catchy Name: Semi- of the 14th International Conference on Advances in Mobile Computing and Multi
Supervised Recognition of Sarcastic Sentences in Online Product Reviews. Media, 2016, pp. 12–19, Singapore.
International Conference on Web and Social Media, 2010. [116] J. Zhao, M. Lan, T. Zhu. ECNU: Expression- and message-level sentiment or-
[105] T. Tuten, M. Solomon, Social Media Marketing, Pearson, Upper Saddle River, NJ, ientation classification in Twitter using multiple effective features, in: Proceedings
2013. of the 8th International Workshop on Semantic Evaluation, SemEval ’14. 2014. pp.
[106] A. Tumasjan, T. Sprenger, P. Sandner, I. Welpe, Predicting elections with twitter: 259–264, Dublin, Ireland.
What 140 characters reveal about political sentiment, in: Proceedings of the

577

S-ar putea să vă placă și