6,308
Views
35
CrossRef citations to date
0
Altmetric
Full Research Papers

Managing social media uncertainty to support the decision making process during Emergencies

, , &

Abstract

Recent emergencies have shown the positive impact of using social media and social networks for communicating and exchanging information. Citizens and authorities can make safer decisions during emergencies based on the real-time information available on social media. Decision-making starts with information gathering and social media provides the opportunity to inform multiple citizens at once. However, message and source uncertainty can place emergency stakeholders in a risky position, as it is not always possible to know if messages are accurate, rumours or even malicious. Current approaches for social media information verification focuses on technical resources like analytical packages. Little research has been developed to provide citizens and field workers with tools to evaluate social media information. This paper presents research in progress for developing a verification framework – for all emergency stakeholders – to support their decision-making process by managing social media uncertainty during emergencies.

Introduction

Decision Making is ‘a mechanism for making choices at each step of the problem-solving process’ (FEMA, Citation2005, p. 2-1). It results in the selection of an action among several alternative possibilities. This is a critical skill during emergencies when it is paramount to make timely sound decisions to reduce human and material losses (Kowalski-Trakofler, Vaught, & Scharf, Citation2003).

The cost of emergencies and disasters can be really high. The 2015 storms in Ireland, Desmond and Frank, had an estimated cost of €100 million for repairing the roads after the floods (Pope, Citation2016). As of December 2015, US$1.62 billion was mobilised by the World Bank Group to finance the Ebola response and recovery efforts (Chavez, Citation2015). In the twentieth century until 2014, it is estimated that hurricanes cost an average of US$5 billion in property loss each year in the USA and have accounted for the deaths of 587 U.S. residents (Hurricane Research Division, Citation2014).

Decisions focus on reducing the impact of a disaster as well as saving lives. During emergencies, most decisions are the products of complex interactions (Patterson, Weil, & Patel, Citation2010) with sometimes faulty or incomplete information (Kowalski-Trakofler et al., Citation2003; Tapia & Moore, Citation2014). There are multiple models used to explain the decision-making process. Traditional theories include prescriptive and descriptive models of analytical decision-making, which are based on the evaluation of options in the decision-making process (Elliott, Citation2005). However, in dynamic, complex and uncertain scenarios where group decision may be required, the analytical approach may not be suitable. As an alternative, the naturalistic decision-making (NDM) school introduced the concept of ‘experience’. NDM theories focus on ‘how people use experience to make decisions in naturalistic environments (e.g. under time pressure, shifting conditions, with unclear goals, degraded information and within team interactions)’ (Elliott, Citation2005, p. 8). However, not all emergencies stakeholders are experts in emergencies. Therefore, communication channels enable the connection between non-experts decision makers with more informed decision makers.

A relatively new information communications technology (ICT) used in emergency management is social media. Social media is a group of internet-based applications that allow citizens and authorities alike to create, post and exchange content (Kaplan & Haenlein, Citation2010). These applications have multiple benefits. For example, they have been used to help identify and rescue disaster victims (Merchant, Elmer, & Lurie, Citation2011). A more extended use of social media is as a mass communication channel, in order to inform large numbers of stakeholders at once (Ki & Nekmat, Citation2014; Muralidharan et al., Citation2011; Stříteský, Stránská, & Drábik, Citation2015; Utz, Schultz, & Glocka, Citation2013). Additionally, it provides a unique opportunity to collect and make use of large amounts of real-time data (Big Data), which is paramount in decision support systems and any emergency management decision-making process (Gaynor, Seltzer, & Moulton, Citation2005; Kamel Boulos et al., Citation2011; U.S. Department of Homeland Security, Citation2014). However, data accessibility is not enough to improve key decision-making processes.

Data quality truly impacts stakeholder decision-making (Chengalur-Smith, Ballou, & Pazer, Citation1999). In 2013 during the ‘Big Data and Disaster Management JST / NSF Joint Workshop’, veracityFootnote1 was declared as one of the biggest challenges for the correct integration of big data within emergency management. Ideally, verification should be achieved in real-time to support decisions made during emergencies (Gaynor et al., Citation2005; Kamel Boulos et al., Citation2011). Due to limitations on resource availability, the importance of real-time data verification increases after the emergency takes place; and therefore during the response phase (Computing Community Consortium, Citation2012; Radisch & Jacobzone, Citation2010).

This paper presents research in progress that focuses on the data quality concept. It presents the development of a framework to manage social media uncertainty to support the decision-making process during emergencies. Section 1 provides an overview of the challenges of using social media as an information and communication tool. It identifies two key challenges associated with data verification and information quality. Section 2 explores current approaches to verify social media information with a description of the difficulties of implementing these approaches for different stakeholders. Section 3 proposes three research questions to support the development of the information verification framework. Section 4 introduces the planned activities for the proposed research and how this are aligned with design research methodology. The final section is the summary and conclusions of this paper.

Challenges of using social media as information communication technology

Social Media has been used in multiple events including hurricanes, such as Sandy, Isaac, Katrina, Hugo and Rita (Belardo & Harrald, Citation1992; Huang & Xiao, Citation2015; Kapucu & Garayev, Citation2011; Tinker, Citation2013) and flooding, like in Queensland and Saxony in 2013 (Ehnis & Bunker, Citation2012; Peters & Paulo, Citation2015). However, its use is not without its considerable challenges.

Five potential policy issues for the use of social media in the context of emergencies and disasters are: 1) administrative cost considerations, 2) privacy issues, 3) technological limitations, 4) accurate information and 5) malicious use of social media during disasters (Lindsay, Citation2011). These last two challenges are shared by all emergency stakeholders: citizens and organisations alike during the decision-making process. For example, misinformation was an issue in the Boston Marathon bombing in 2013, where the wrong suspects were pointed out in Social Media (Golgowski, Citation2013; Hughes, Palen, & Peterson, Citation2014; Petrecca, Citation2013). This impacted on citizens and emergency responders alike by disrupting suspects’ lives and allocating resources to monitor the wrong suspects.

Inaccuracy of information and rumours

Inaccurate information and rumours have been reported as a challenge by multiple researchers and emergency responders (Castillo, Mendoza, & Poblete, Citation2011; Mendoza, Poblete, & Castillo, Citation2010; Oh, Agrawal, & Rao, Citation2013; Procter, Vis, & Voss, Citation2013; Terpstra et al., Citation2012). Misinformation can spread really fast in social media platforms (Lukasik, Cohn, & Bontcheva, Citation2015; Takayasu et al., Citation2015). This challenge impacts on the allocation of resources by first responders and citizens’ decisions before, during and after emergencies.

For example, in March 2011 after the Japanese earthquake and tsunami, tweets for assistance were ‘retweeted’ after the victims had been rescued (Acar & Muraki, Citation2011). In another example during the Japanese earthquake, the tweet:

Please spread: To those people who live close to the east shore of Tokyo Bay! Due to the explosion of oil tanks, harmful chemical materials may fall with rain soon. Bring your umbrella and rain coat with you to protect your skin from the dangerous rain!!

However, this was a rumour without scientific basis (Chen et al., Citation2015; Takayasu et al., Citation2015). Other examples can be found after Hurricane Sandy in October 2012, where rumours circulated on social networks about paid volunteer opportunities and reimbursements for survivors (Jacobs & Tuohy, Citation2012).

Malicious use of social media

Malicious use of social media can create additional instability during terrorist attacks, by congregating people in a location and having a second attack at that location (Gao, Barbier, & Goolsby, Citation2011; Lindsay, Citation2011; Weaver, Boyle, & Besaleva, Citation2012). An example of this is the use of social media during the Mumbai attacks in 2008, with the following message was posted during the incidents (Oh, Agrawal, & Rao, Citation2011):

RT @celebcorps remember when tweeting details that it is CONFIRMED terrorists have satphone (satellite phone – authors added) access to net sources (1:50 AM Nov 27th, 2008 from Ubiquity)

It is possible to observe that these two challenges are highly related to social media data quality. Thus, the next section evaluates potential solutions proposed to overcome this data verification problem.

Social media information verification approaches

In the literature, social media information verification has been mainly explored from a journalist perspective (cf. Heravi & Mcginnis, Citation2013); however, in recent years emergency researchers have started to develop different methods to filter, classify, analyse and verify this data stream. There are two main approaches to data verification (Table ), differentiated based on: 1) Intrinsic properties and 2) Extrinsic properties.

Table 1. Intrinsic and Extrinsic Social Media Information Verification Approaches (Literature Review).

The intrinsic approach analyses properties of a specific Social Media platform. Properties considered include content in multimedia format, user information, timestamp and geographic information. For example in a journalism and enterprise perspective, ‘SocialSensor’ and ‘REVEAL’ FP7 projects explored the possibility of analysing the validity of tweets or authors based on a 3 ‘C’s framework: Content, Contributor and Context analysis (Corney et al., Citation2014; Middleton & Gottron, Citation2014). In this approach interaction with other systems is for an analytical purpose and not for verification.

The extrinsic approach relies on using additional resources to verify the information. Three main approaches are identified: experts, crowds, and machines (Kamel Boulos et al., Citation2011). For example, in crowdsourcing the input from a third person is paramount to identify the veracity of the information.

The approaches described in Table have been developed using analytical packages and machine learning algorithms. These approaches require technical resources that may not be available to all citizens during emergencies. Therefore, additional research is required to provide a framework that provides guidance to technical and non-technical emergency stakeholders.

Research objectives

The objective of this study is to create a social media message verification framework to support emergency stakeholders’ decision-making processes during the response phase of any emergency (small, medium, and large scale). It will provide a suitable environment to find the most appropriate combination for data verification in different emergency management scenarios.

This objective is operationalized through three research questions:

(1)

How have social media been used in past emergencies during the decision-making process?

Extensive research has been conducted on the positive impact of social media and online social networks on information analysis approaches and the intelligence phase of decision making, in general (Antunes & Costa, Citation2012; Chen, Storey, & Chiang, Citation2012; Crowley, Dabrowski, & Breslin, Citation2013; Jindal, Sharma, & Sharma, Citation2014; Rupnik & Kukar, Citation2007) and in the emergency management field (Gaynor et al., Citation2005; Imran & Castillo, Citation2015; Sullivan et al., Citation2013; Temnikova, Castillo, & Vieweg, Citation2015; Temnikova, Vieweg, & Castillo, Citation2015). By applying a systematic analysis of the usage of social media in past events, this study will analyse the challenges faced by emergency stakeholders using this platform for decision making.

(2)

How does the data available in social media impact on the decision-making and verification process during an emergency?

Social Media (e.g. Twitter) provide real time data for monitoring and analysing the impact of emergencies (Huang & Xiao, Citation2015; Imran & Castillo, Citation2014; Imran et al., Citation2014). This research question aims to gain a better understanding of how multiple formats available in Social Media (text, video, images, sound, GPS) and users’ information in online communities impact on the perception of message credibility and information trust. Furthermore, it aims to explore the steps that are taken to verify the information, and how processes and data available impacts on the decision making process. The answer of this question will guide the development of the verification framework and its evaluation.

(3)

How can a verification framework be implemented in online and offline decision support systems during emergencies?

Technology advances and its availabilityFootnote2 – including dedicated sensor networks and multi-purpose sensor networks (Sullivan et al., Citation2013) – allow the collection of a large volume of both structured and unstructured data (Big Data) during emergencies. Information can be obtained from different sources. For example, the “Global Disaster Alert and Coordination System” managed by the European Commission Joint Research Centre provides alerts and impact estimations after major disasters through their website. Information obtained through social media can be verified using more traditional channels including first responders, official reports, weather forecast and existing systems already in place. This research question aims to analyse how the developed framework can be used during emergencies and in conjunction with existing systems.

Planned activities

Research questions will be addressed using a design science research methodology. Design science aims to devise artefacts to achieve specific goals (Simon, Citation1996). Hence, the goal of this research project is to develop a framework to reduce social media uncertainly during emergencies. Table aligns design science methodology with each research question and describes the process for gathering and analysing data.

Table 2. Design research methodology alignment with research in progress.

Problem definition will mix information obtained from the literature review and stake-holder feedback. After each iteration the problem definition will be review and adjusted in order to incorporate the knowledge gathered. Four iterations are planned: content iteration, contributor iteration, context iteration and final iteration. These iterations have been decided by adapting the social media components proposed by Corney et al. (Citation2014) and Middleton and Gottron (Citation2014) to the emergency area: Content, Contributor and Context.

Each iteration will have three stages: design, build and evaluate. Design will focus on the component’s literature review. It will focus on detecting social media features related to the component analysed. In order to analyse each component to assess whether it should be included in the framework, an experiment will be created. This will be distributed using an online survey approach (Bradley, Citation1999; Kajewski, Citation1994) through social media channels and e-mail. A non-probability self-selecting sampling technique will be used. Sample profile will include social media users that are information distributors and/or seekers during emergencies. It will include citizens, community managers for fire brigades, police force and other emergency forces (for e.g. @CALFIRE_PIO, U.S. Fire (USFA), @CALFIRESANDIEGO, @kentfirerescue, @fema, @BaltimorePolice).

The survey will ask users to analyse different messages from social media according to their degree of reliability. The experiment will use a similar methodology used in Castillo et al. (Citation2011) where users were asked to classify tweets in one of the following categories: (i) almost certainly true, (ii) likely to be false, (iii) almost certainly false, and (iv) ‘I can’t decide’. Additionally, the experiment will ask the responder to decide if they will send an emergency response to the user (i.e. ‘send emergency team’ or ‘not an emergency’). Three main elements will be analysed: Content, Contributor and Context (Figure 2). This will be complemented by providing additional intrinsic and extrinsic information to the responder (expert insights, wisdom of crowd, linked data). The objective is to find what information is more useful to assess the veracity of social media messages with technical/analytical and non-technical/analytical resources.

The experiment will provide the basis to design a verification framework which will be presented during interviews to emergency managers, IT practitioners and academia. Interviews will focus on evaluating each iteration and identifying potential implementation in existing systems and future lines of research.

Summary and conclusions

This paper describes the importance of information quality in social media for decision-making during emergencies. It explores current approaches to verify information using social media intrinsic properties and additional resources such as experts’ advice, crowdsourcing and linked data (i.e. sensor nodes). Current approaches have been designed to support emergency managers and organisations. Little research has been developed to provide citizens and field workers with tools to evaluate social media information. In order to address this gap, three research questions are proposed to support the development of the information verification framework. The final section has introduced the planned activities for the proposed research using design research methodology.

Disclosure statement

No potential conflict of interest was reported by the authors.

Notes

1. Data veracity is understood as data quality, reliable and trustworthiness.

2. e.g. social media, earthquake detection using seismometers, wireless networks, unmanned systems, embedded sensors, pattern recognition, surface reconstruction, data fusion, and scheduling algorithms (IBM Corporation Software Group, Citation2013; Pu & Kitsuregawa, Citation2013).

References

  • Acar A., & Muraki, Y. 2011. Twitter and natural disasters: Crisis communication lessons from the Japan tsunami. International Journal of Web Based Communities ( April), 1–3. http://phys.org/news/2011-04-twitter-natural-disasters-crisis-lessons.html
  • Antunes, F., & Costa, J. 2012. The impact of online social networks on decision support systems. MCIS 2012 Proceedings. Paper 11.
  • Belardo, S., & Harrald, J. (1992). A framework for the application of group decision support systemsto the problem of planning for catastrophic events. IEEE Transactions on Engineering Management, 39(4), 400–411.10.1109/17.165425
  • Boididou, C., Papadopoulos, S., Kompatsiaris, Y., Schifferes, S., & Newman, N. (2014). Challenges of computational verification in social multimedia. Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web Companion, 743–748.
  • Bradley, N. (1999). Sampling for Internet surveys. An examination of respondent selection for Internet research. http://www.wmin.ac.uk/marketingresearch/Marketing/sam06.html
  • Canini, K. R., Suh, B., & Pirolli, P. L. (2011). Finding credible information sources in social networks based on content and social structure. 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int’l Conference on Social Computing, 1–8. http://doi.org/10.1109/PASSAT/SocialCom.2011.91
  • Castillo, C., Mendoza, M., & Poblete, B. (2011). Information credibility on twitter. Proceedings of the 20th International Conference on World Wide Web - WWW ‘11, 675. Retrieved from http://portal.acm.org/citation.cfm?doid=1963405.1963500
  • Chamales, G. (2013). Towards trustworthy social media and crowdsourcing. Wilson Center Commons Lab.
  • Chavez, D. (2015). World bank group ebola response fact sheet. World Bank Website. Website URL: http://www.worldbank.org/en/topic/health/brief/world-bank-group-ebola-fact-sheet
  • Chen, H., Storey, V. C., & Chiang, R. H. L. (2012). Business intelligence and analytics: From big data to big impact. MIS Quarterly, 36 ( 4 - Special Issue: Business Intelligence Research), 1165–1188.
  • Chen, G., Shen, H., Chen, G., Ye, T., Tang, X., & Kerr, N. (2015). A new kinetic model to discuss the control of panic spreading in emergency. Physica A: Statistical Mechanics and its Applications, 417, 345–357. Retrieved October 12, 2015, from http://www.sciencedirect.com/science/article/pii/S0378437114008231
  • Chengalur-Smith, I. N., Ballou, D. P., & Pazer, H. L. (1999). The impact of data quality information on decision making: An exploratory analysis’. IEEE Transactions on Knowledge and Data Engineering, 11, 853–864.10.1109/69.824597
  • Computing Community Consortium. (2012). CRICIS : Critical Real-Time Computing and Information Systems. A report from a Community Workshop. Report published by Computing Community Consortium.
  • Corney, D., Goker A., Martin, C., Papadopoulos, S., Mantziou, E., & Spyromitros-Xioufi, E. (2014). D4.4 SocialSensor Social indexing and search framework. Social Sensor FP7 Project - European Commission (project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 287975.
  • Crowley, D., Dabrowski, M., & Breslin, J. (2013). Decision Support using Linked, Social, and Sensor Data. http://aisel.aisnet.org/amcis2013/BusinessIntelligence/RoundTablePresentations/9
  • Daume, S., Albert, M., & von Gadow, K. (2014). Forest monitoring and social media – Complementary data sources for ecosystem surveillance? Forest Ecology and Management, 316, 9–20. http://doi.org/10.1016/j.foreco.2013.09.004
  • Ehnis, C., & Bunker, D. (2012). Social media in disaster response: Queensland police service - public engagement during the 2011 floods. Proceedings of the 23rd Australasian Conference on Information Systems, 1–10.
  • Elliott, T. (2005). Expert Decision-Making in Naturalistic Environments: A Summary of Research. South Australia: DSTO Systems Sciences Laboratory.
  • FEMA. (2005). Decision Making and Problem Solving. FEMA. U.S. Department of Homeland Security.
  • Gao, H., Barbier, G., & Goolsby, R. (2011). Harnessing the crowdsourcing power of social media for disaster relief. IEEE Intelligent Systems, 26(3), 10–14.10.1109/MIS.2011.52
  • Gaynor, M., Seltzer, M., & Moulton, S. (2005). A dynamic, data-driven, decision support system for emergency medical services. Computational Science–ICCS 2005, 61–100. http://www.springerlink.com/index/XD6YKQRFYTQXY2K5.pdf
  • Golgowski, N. (2013). Boston marathon bombing “bag men” suing New York post for falsely portraying them as suspects. New York Daily News. Retrieved January 22, 2016, from http://www.nydailynews.com/news/national/boston-bombing-
  • Gupta, A., Lamba, H., Kumaraguru, P., & Joshi, A. (2013). Faking Sandy: Characterizing and identifying fake images on Twitter during Hurricane Sandy. Proceedings of the 22nd …, 729–736. Retrieved from http://dl.acm.org/citation.cfm?id=2488033
  • Heravi, B. R., & Mcginnis, J. (2013). A framework for social semantic journalism. In First International IFIP Working Conference on Value-Driven Social & Semantic Collective Intelligence (VaSCo), ACM Web Science 2013. France. Retrieved from https://www.insight-centre.org/users/bahareh-rahmanzadeh-heravi
  • Huang, Q., & Xiao, Y. (2015). Geographic situational awareness: Mining tweets for disaster preparedness, emergency response, impact, and recovery. ISPRS International Journal of Geo-Information, 4, 1549–1568. Retrieved from http://www.mdpi.com/2220-9964/4/3/1549/htm10.3390/ijgi4031549
  • Hughes, A. L., Palen, L., & Peterson, S. (2014). Critical issues in disaster science and management: A dialogue between researchers and practitioners. In J. E. Trainor & T. Subbio (Eds.), Journal of Emergency Nursing (pp. 349–392). FEMA Higher Education Project.
  • Hurricane Research Division. (2014). Costs and benefits. National Oceanic and Atmosferic Administration - USA. Website URL: http://www.aoml.noaa.gov/hrd/hrd_sub/cost_benefits.html
  • IBM Corporation Software Group. (2013). Cloud Applications: Emergency. Response, 1–4.
  • Imran, M., Castillo, C., Diaz, F., & Vieweg, S. (2014). Processing social media messages in mass emergency: A survey. ACM Computing Surveys, 47(4), 67–105. http://doi.org/10.1145/2771588
  • Imran, M., & Castillo, C. (2014). Volunteer-powered automatic classification of social media messages for public health in aidr. Www, 671–672.
  • Imran, M., Castillo, C., Lucas, J., Meier, P., & Vieweg, S. (2014). AIDR: Artificial intelligence for disaster response. In Proceedings of the companion publication of the 23rd international conference on World wide web companion (pp. 159–162). http://doi.org/10.1145/2567948.2577034
  • Imran, M., & Castillo, C. (2015, May). Towards a data-driven approach to identify crisis-related topics in social media streams. In Proceedings of the 24th International Conference on World Wide Web Companion (pp. 1205–1210). International World Wide Web Conferences Steering Committee.
  • Jacobs, J., & Tuohy, R. (2012). Social Media in Emergency Management A Quick Look. Arlington, VA: Homeland Security Studies and Analysis Institute.
  • Jindal, K., Sharma, M., & Sharma, B. K. (2014). Data mining to support decision process in decision support system. International Journal of Emerging Technology and Advanced Engineering, 4, 41–46.
  • Kajewski, S., & W. (1994). Integrating case study and survey research methods: An example in information systems. European Journal of Information Systems, 3, 112–126.
  • Kamel Boulos, M. N. et al. (2011). Crowdsourcing, citizen sensing and sensor web technologies for public and environmental health surveillance and crisis management: Trends, OGC standards and application examples. International Journal of Health Geographics, 10, 1–29. Retrieved from http://www.ij-healthgeographics.com/content/10/1/67
  • Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, 53, 59–68.10.1016/j.bushor.2009.09.003
  • Kapucu, N., & Garayev, V. (2011). Collaborative decision-Making in emergency and disaster management. International Journal of Public Administration, 34, 366–375.10.1080/01900692.2011.561477
  • Ki, E. J., & Nekmat, E. (2014). Situational crisis communication and interactivity: Usage and effectiveness of facebook for crisis management by fortune 500 companies. Computers in Human Behavior, 35, 140–147. Retrieved from http://linkinghub.elsevier.com/retrieve/pii/S074756321400105810.1016/j.chb.2014.02.039
  • Kowalski-Trakofler, K. M., Vaught, C., & Scharf, T. (2003). Judgment and decision making under stress: An overview for emergency managers. International Journal of Emergency Management, 1, 278.10.1504/IJEM.2003.003297
  • Lindsay, B. R. (2011). Social media and disasters: Current uses, future options and policy considerations. Journal of Current Issues in Media & Telecommunications, 2, 287–297. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=cax&AN=79919807&site=ehost-live
  • Lukasik, M., Cohn, T., & Bontcheva, K. (2015). Estimating collective judgement of rumours in social media. Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2590–2595. Retrieved from http://arxiv.org/abs/1506.0046810.18653/v1/D15-1
  • Martin, N., & Comm, B. A. (2014, June). Information verification in the age of digital journalism. In Special Libraries Association Annual Conference, Vancouver.
  • Mendoza, M., Poblete, B., & Castillo, C. (2010). Twitter under crisis: Can we trust what we rt? Workshop on Social Media Analytics, 9. Retrieved from http://snap.stanford.edu/soma2010/papers/soma2010_11.pdf
  • Merchant, R. M., Elmer, S., & Lurie, N. (2011). Integrating social media into emergency-Preparedness efforts. The New England Journal of Medicine, July 365, 289–291.10.1056/NEJMp1103591
  • Middleton, S. E., & Gottron, T. (2014). Contenct extraction methods and contest framework. REVEAL FP7 Project - European Commission (project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 610928.)
  • Muralidharan, S. et al. (2011). Hope for haiti: An analysis of facebook and twitter usage during the earthquake relief efforts. Public Relations Review, 37, 175–177. Retrieved from http://dx.doi.org/10.1016/j.pubrev.2011.01.01010.1016/j.pubrev.2011.01.010
  • Oh, O., Agrawal, M., & Rao, H. R. (2011). Information control and terrorism: Tracking the Mumbai terrorist attack through twitter. Information Systems Frontiers, 13, 33–43.10.1007/s10796-010-9275-8
  • Oh, O., Agrawal, M., & Rao, H. R. (2013). Community intelligence and social media services: A rumor theoretic analysis of tweets during social crises. MIS Quarterly, 37, 407–426.
  • Ortmann, J., Limbu, M., Wang, D., & Kauppinen, T. (2011, October). Crowdsourcing linked open data for disaster management. In Proceedings of the Terra Cognita Workshop on Foundations, Technologies and Applications of the Geospatial Web in conjunction with the ISWC (pp. 11–22).
  • Patterson, O., Weil, F., & Patel, K. (2010). The role of community in disaster response: Conceptual models. Population Research and Policy Review, 29, 127–141. Retrieved from http://link.springer.com/10.1007/s11113-009-9133-x10.1007/s11113-009-9133-x
  • Peters, R., & Paulo, S. (2015). Investigating images as indicators for relevant social media messages in disaster management. In B. Palen, Comes, & Hughes, (Eds.), International Conference on Information Systems for Crisis Response and Management (ISCRAM). Proceedings of the ISCRAM 2015 Conference.
  • Petrecca, L. (2013). After bombings, social media informs (and misinforms). USA Today. Retrieved October 12, 2015, from http://www.usatoday.com/story/news/2013/04/23/social-media-boston-marathon-bombings/2106701/
  • Poblet, M., García-Cuesta, E., & Casanovas, P. (2014). Crowdsourcing tools for disaster management: A review of platforms and methods. In AI Approaches to the Complexity of Legal Systems (pp. 261–274). Springer Berlin Heidelberg.
  • Popoola, A., Krasnoshtan, D., Toth, A. P., Naroditskiy, V., Castillo, C., Meier, P., & Rahwan, I. (2013, May). Information verification during natural disasters. In Proceedings of the 22nd international conference on World Wide Web companion (pp. 1029–1032). International World Wide Web Conferences Steering Committee.
  • Pope, C. (2016). Flooding aftermath: Cost of deluge around Ireland. The Irish Time.
  • Procter, R., Vis, F., & Voss, A. (2013). Reading the riots on twitter: Methodological innovation for the analysis of big data. International Journal of Social Research Methodology, 16, 197–214. Retrieved from http://www.tandfonline.com/doi/abs/10.1080/13645579.2013.77417210.1080/13645579.2013.774172
  • Pu, C., & Kitsuregawa, M. (2013). Big Data and disaster management: a report from the JST/NSF Joint Workshop. Georgia Institute of Technology: CERCS.
  • Radisch, J., & Jacobzone, S. (2010). High Level Risk Forum: The use of social media in risk and crisis communication. Paris: France.
  • Rupnik, R., & Kukar, M. (2007). Decision support system to support decision processes with data mining. Journal of Information and Organizational Sciences, 31, 217–232.
  • Schulz, A., Paulheim, H., & Probst, F. (2012). Crisis information management in the web 3.0 age. Proceedings of ISCRAM.
  • Simon, H. A. (1996). The Sciences of the Artificial. 3rd ed. Cambridge, MA: MIT Press. Retrieved from https://books.google.ie/books?hl=en&lr=&id=k5Sr0nFw7psC&oi=fnd&pg=PR9&dq=The+Sciences+of+Artificial&ots=-v0OkEIGDw&sig=fJNTerYWThBxzcvUwgWi55GH40U&redir_esc=y#v=onepage&q=TheSciencesofArtificial&f=false
  • Stringhini, G., Kruegel, C., & Vigna, G. (2010, December). Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference (pp. 1–9). ACM.
  • Stříteský, V., Stránská, A., & Drábik, P. (2015). Crisis communication on facebook. Studia Commercialia Bratislavensia, 8, 103–111. Retrieved from http://www.degruyter.com/view/j/stcb.2015.8.issue-29/stcb-2015-0010/stcb-2015-0010.xml
  • Sullivan, T., Zhang, J., O’Connor, E., Briciu Burghina, C. C., Heery, B., Gualano, L., ... & Regan, F. (2013). Improving data driven decision making through integration of environmental sensing technologies. Oceans ‘13 MTS/IEE, 1–7. Retrieved from http://doras.dcu.ie/18508/
  • Takayasu, M. et al. (2015). Rumor diffusion and convergence during the 3. 11 earthquake: A twitter case study. PLoS ONE, 10, 1–19.
  • Tapia, A. H., & Moore, K. (2014). Good enough is good enough: Overcoming disaster response organizations’ slow social media data adoption. Computer Supported Cooperative Work (CSCW), 23, 483–512. Retrieved from http://link.springer.com/10.1007/s10606-014-9206-1.10.1007/s10606-014-9206-1
  • Temnikova, I., Castillo, C., & Vieweg, S. (2015). EMTerms 1.0: A terminological resource for crisis tweets. In ISCRAM 2015 Proceedings of the 12th International Conference on Information Systems for Crisis Response and Management.
  • Temnikova, I., Vieweg, S., & Castillo, C. (2015). The case for readability of crisis communications in social. Media., 1–6.
  • Terpstra, T., et al. (2012). Towards a realtime twitter analysis during crises for operational crisis management. International Conference on Information Systems for Crisis Response and Management (ISCRAM)., 1–9.
  • Tinker, T. L. (2013). Communicating and managing change during extreme weather events: Promising practices for responding to urgent and emergent climate threats. Journal of Business Continuity & Emergency Planning, 6, 304–313. Retrieved from http://www.ncbi.nlm.nih.gov/pubmed/23835423\nhttp://eds.b.ebscohost.com/eds/detail/detail?sid=22a6e664-0a96-4f43-8ac8-a09f41aea706%40sessionmgr112&vid=0&hid=120&bdata=JkF1dGhUeXBlPXVybCxjb29raWUsaXAsdWlkJnNpdGU9ZWRzLWxpdmU%3d#db=bth&AN=89332568
  • U.S. Department of Homeland Security. (2014). Using Social Media for Enhanced Situational Awareness and Decision Support. USA: Homeland Security- Science and Technology.
  • Utz, S., Schultz, F., & Glocka, S. (2013). Crisis communication online: How medium, crisis type and emotions affected public reactions in the Fukushima Daiichi nuclear disaster. Public Relations Review, 39, 40–46. Retrieved from http://dx.doi.org/10.1016/j.pubrev.2012.09.01010.1016/j.pubrev.2012.09.010
  • Weaver, A. C., Boyle, J. P., & Besaleva, L. I. (2012). Applications and trust issues when crowdsourcing a crisis. 21st International Conference on Computer Communications and Networks, ICCCN 2012 – Proceedings (pp. 1–5). IEEE.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.