Presentation of Christian Reuter, Oliver Heger and Volkmar Pipek on the topic "Combining Real and Virtual Volunteers through Social Media" at ISCRAM2013
UMAP 2013 - Link, Like, Follow, Friend: The Social Element in User Modeling a...gjhouben
The document discusses how social media, particularly Twitter, can provide insights for user modeling and adaptation (UMAP) research. It notes that Twitter data can help understand real-world events and user behavior. Semantic analysis of tweets can improve filtering of relevant information and faceted search capabilities. However, making sense of Twitter data requires hybrid human-machine approaches due to the need for contextual interpretation. Lessons from incident response case studies show the value of combining automatic analysis with human judgment.
Paper: A review of the value of social media in countrywide disaster risk red...Neil Dufty
This input paper was developed for the HFA Thematic Review and as an input to the Global Assessment Report on Disaster Risk Reduction 2015 (GAR15). It examines the current and potential value of social media in raising risk awareness and forming communities of practice before a disaster happens.
The Digital Humanitarian Moment: New Practices, Knowledge Politics, and Phila...Ryan Burns
Digital humanitarianism alters how data is collected and represented in humanitarian responses. It emerges at the intersection of new mapping technologies, practices, and philanthropy-capitalism. Specifically:
1. Social media allows needs to be crowdsourced, but these needs must be "tamed" and filtered for operational use.
2. Needs are represented to construct "needy subjects" through place-based and temporal framings to justify interventions.
3. It enables further private sector involvement through philanthropy-capitalism, which depoliticizes humanitarianism and naturalizes tradeoffs.
Digital humanitarianism is shaping the humanitarian sector and broader political and economic relationships through knowledge politics around data collection and
1. The document summarizes two studies on the use of Twitter as a social reporting tool during crisis events.
2. The first study examined how information authentication on Twitter during the 2010 Haiti earthquake reduced rumors and enabled collaboration. It found authentication was important to establish credibility.
3. The second study analyzed content selection on Twitter during the 2009 Gaza conflict. It introduced the concept of "second-level gatekeeping" and found an unequal distribution of content, with traditional media disproportionately represented.
Twitter turns ten: its use to date in disaster managementNeil Dufty
This article explores current literature to identify the main uses of Twitter in emergency management over the past ten
years in Australia and overseas. It finds several uses across the ‘disaster cycle’ including as a medium for identifying hazard
risk, community engagement for disaster mitigation and preparedness, early warning communication, crowdsourcing to provide real-time information, emotional support, identifying needs and vulnerabilities of affected communities, and allocating resources during recovery. This paper concludes by examining some relatively untapped uses of Twitter in building disaster resilience including for social capital
formation, capacity building, disaster virtual communities-of-practice, and social change.
Detecting Important Life Events on Twitter Using Frequent Semantic and Syntac...COMRADES project
Dickinson, Thomas; Fernandez, Miriam; Thomas, Lisa; Mulholland, Paul; Briggs, Pam and Alani, Harith (2016). Detecting Important Life Events on Twitter Using Frequent Semantic and Syntactic Subgraphs. IADIS International Journal on WWW/Internet, 14(2) pp. 23–37.
http://oro.open.ac.uk/48678/
Disasters 2.0: Real Time Collaboration: Documentation and MappingConnie White
Objective 1: Cover the available technologies that are free that help EM create real-time documents, spreadsheets, presentations and forms that are available online (Google Suite) for many to use collaboratively and simultaneously and offline in a traditional singleton sense (OpenWord)
Objective 2: Demonstrate the free available mapping tools that are user friendly and very powerful for response efforts -- these are web based collaborative mapping tools that can be used in advance or in an ad hoc fashion - including the GeoLocation devices that can be leveraged. (WikiMapia, Open Street Maps, etc.)
A Framework to Identify Best Practices: Social Media and Web 2.0 Technologies...Connie White
Social media is used in a variety of domains, including emergency management. However, the question of which technologies are most appropriate for a given emergency remains open. We present a framework of dimensions of emergencies that can assist in selecting appropriate social media for an emergency situation. Social media is not a panacea but can be used effectively given the proper functions available from the particular services provided by each of the Web 2.0 technologies available. The main objective of this paper is to identify the best practices for social media to leverage its ability given the complexities that coincide with events. This is a conceptual paper based on the results of preliminary studies involving group interactions with emergency professionals with various backgrounds. In addition, emergency management students who are professionals in the field followed by another interview soliciting information from information systems scientist were surveyed. We found that each situation called forth various dimensions where only sub phases of the stated dimension may be used given the task type derived from the event characteristics. This lays a foundation upon which a more formal approach can be taken to help tame the social media mania into a manageable set of ‘best practices’ from which emergencies can be managed more effectively given Web 2.0 technologies and social collaborative online tools.
UMAP 2013 - Link, Like, Follow, Friend: The Social Element in User Modeling a...gjhouben
The document discusses how social media, particularly Twitter, can provide insights for user modeling and adaptation (UMAP) research. It notes that Twitter data can help understand real-world events and user behavior. Semantic analysis of tweets can improve filtering of relevant information and faceted search capabilities. However, making sense of Twitter data requires hybrid human-machine approaches due to the need for contextual interpretation. Lessons from incident response case studies show the value of combining automatic analysis with human judgment.
Paper: A review of the value of social media in countrywide disaster risk red...Neil Dufty
This input paper was developed for the HFA Thematic Review and as an input to the Global Assessment Report on Disaster Risk Reduction 2015 (GAR15). It examines the current and potential value of social media in raising risk awareness and forming communities of practice before a disaster happens.
The Digital Humanitarian Moment: New Practices, Knowledge Politics, and Phila...Ryan Burns
Digital humanitarianism alters how data is collected and represented in humanitarian responses. It emerges at the intersection of new mapping technologies, practices, and philanthropy-capitalism. Specifically:
1. Social media allows needs to be crowdsourced, but these needs must be "tamed" and filtered for operational use.
2. Needs are represented to construct "needy subjects" through place-based and temporal framings to justify interventions.
3. It enables further private sector involvement through philanthropy-capitalism, which depoliticizes humanitarianism and naturalizes tradeoffs.
Digital humanitarianism is shaping the humanitarian sector and broader political and economic relationships through knowledge politics around data collection and
1. The document summarizes two studies on the use of Twitter as a social reporting tool during crisis events.
2. The first study examined how information authentication on Twitter during the 2010 Haiti earthquake reduced rumors and enabled collaboration. It found authentication was important to establish credibility.
3. The second study analyzed content selection on Twitter during the 2009 Gaza conflict. It introduced the concept of "second-level gatekeeping" and found an unequal distribution of content, with traditional media disproportionately represented.
Twitter turns ten: its use to date in disaster managementNeil Dufty
This article explores current literature to identify the main uses of Twitter in emergency management over the past ten
years in Australia and overseas. It finds several uses across the ‘disaster cycle’ including as a medium for identifying hazard
risk, community engagement for disaster mitigation and preparedness, early warning communication, crowdsourcing to provide real-time information, emotional support, identifying needs and vulnerabilities of affected communities, and allocating resources during recovery. This paper concludes by examining some relatively untapped uses of Twitter in building disaster resilience including for social capital
formation, capacity building, disaster virtual communities-of-practice, and social change.
Detecting Important Life Events on Twitter Using Frequent Semantic and Syntac...COMRADES project
Dickinson, Thomas; Fernandez, Miriam; Thomas, Lisa; Mulholland, Paul; Briggs, Pam and Alani, Harith (2016). Detecting Important Life Events on Twitter Using Frequent Semantic and Syntactic Subgraphs. IADIS International Journal on WWW/Internet, 14(2) pp. 23–37.
http://oro.open.ac.uk/48678/
Disasters 2.0: Real Time Collaboration: Documentation and MappingConnie White
Objective 1: Cover the available technologies that are free that help EM create real-time documents, spreadsheets, presentations and forms that are available online (Google Suite) for many to use collaboratively and simultaneously and offline in a traditional singleton sense (OpenWord)
Objective 2: Demonstrate the free available mapping tools that are user friendly and very powerful for response efforts -- these are web based collaborative mapping tools that can be used in advance or in an ad hoc fashion - including the GeoLocation devices that can be leveraged. (WikiMapia, Open Street Maps, etc.)
A Framework to Identify Best Practices: Social Media and Web 2.0 Technologies...Connie White
Social media is used in a variety of domains, including emergency management. However, the question of which technologies are most appropriate for a given emergency remains open. We present a framework of dimensions of emergencies that can assist in selecting appropriate social media for an emergency situation. Social media is not a panacea but can be used effectively given the proper functions available from the particular services provided by each of the Web 2.0 technologies available. The main objective of this paper is to identify the best practices for social media to leverage its ability given the complexities that coincide with events. This is a conceptual paper based on the results of preliminary studies involving group interactions with emergency professionals with various backgrounds. In addition, emergency management students who are professionals in the field followed by another interview soliciting information from information systems scientist were surveyed. We found that each situation called forth various dimensions where only sub phases of the stated dimension may be used given the task type derived from the event characteristics. This lays a foundation upon which a more formal approach can be taken to help tame the social media mania into a manageable set of ‘best practices’ from which emergencies can be managed more effectively given Web 2.0 technologies and social collaborative online tools.
This document provides information on the subjects and topics S1/2 students will be studying in Term 4 of the 2015-16 school year at Stronsay School. Key subjects covered include English, maths, science, French, religious education, health and wellbeing, art, music, and PE. For each subject, the document lists the main topics and skills students will be focusing on during the term. It encourages parents to contact teachers if they need more information on the curriculum.
The document discusses prototyping and provides examples of different types of prototypes including paper prototypes, digital prototypes, storyboards, role plays, and space prototypes. It explains that prototyping is used to make ideas tangible and test reactions from users in order to gain insights. Prototypes should be iterated on and fail early to push ideas further and save time and money. Both low and high fidelity prototypes are mentioned as ways to test ideas at different stages of the design process.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
The document discusses how personalization and dynamic content are becoming increasingly important on websites. It notes that 52% of marketers see content personalization as critical and 75% of consumers like it when brands personalize their content. However, personalization can create issues for search engine optimization as dynamic URLs and content are more difficult for search engines to index than static pages. The document provides tips for SEOs to help address these personalization and SEO challenges, such as using static URLs when possible and submitting accurate sitemaps.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
This document summarizes a study of CEO succession events among the largest 100 U.S. corporations between 2005-2015. The study analyzed executives who were passed over for the CEO role ("succession losers") and their subsequent careers. It found that 74% of passed over executives left their companies, with 30% eventually becoming CEOs elsewhere. However, companies led by succession losers saw average stock price declines of 13% over 3 years, compared to gains for companies whose CEO selections remained unchanged. The findings suggest that boards generally identify the most qualified CEO candidates, though differences between internal and external hires complicate comparisons.
OCHA Think Brief - Hashtag Standards for emergenciesJan Husar
POLICY AND STUDIES SERIES
These short think pieces are non-papers that present
relatively new ideas that require testing and validation.
The objective of the Think Brief is to generate feedback,
views and advice. The Think Briefs do not necessarily
represent the official views of OCHA
Presentation of my current research interests to 'Scoping Questions of Privacy, Surveillance and Governance in the Digital Society,' Digital Society Network, University of Sheffield, 16 July 2014.
Trevısan leicester esrc festival of soc sci_nov 2012_webfilippotrevisan
Slides from my presentation on the 'digitalization' of disability activism in the UK at the 2012 Economic and Social Research Council Festival of Social Science, 9 Nov., University of Leicester - Department of Media and Communication.
This document summarizes a presentation on the social media strategies of political institutions in Germany and Japan regarding environmental issues after the 2015 Paris Climate Conference. It finds that the German environmental ministry (BMUB) has a more active social media strategy than its Japanese counterpart, with more tweets engaging other accounts. The BMUB strategy aims to set the agenda, while Japanese officials do not alter strategies between media. Limitations and opportunities for further analysis are discussed.
This document discusses the emergence of online disability activism in response to UK welfare cuts. It analyzes three types of online actors opposing the cuts: formal organizations, digitized activists, and digital action networks. The research focuses on the digital action network "The Broken of Britain" and its Facebook page. Analysis found the group effectively builds consensus online around personal stories and alternative policy frames. However, questions remain around its long-term sustainability and accountability as a new form of online-only disability activism.
The document provides a progress report for a Datagrant project studying online health campaigns. It summarizes that in the past year:
- The project team expanded with additional members and funding. Partnerships were formed with organizations to obtain data.
- Results included developing tools to classify the country and motivations of social media users participating in health campaigns. Analyses found relationships between campaign strategies, network structures, and fundraising success.
- Publications and presentations were made on the findings. Media coverage raised the profile of the project. Planned future work includes analyzing additional social media data, studying campaign participant lifecycles, and submitting new grant proposals.
Online social movements and networked activism. Trends around researchJosé Manuel Noguera
This document discusses online social movements and networked activism in Spain. It focuses on two key Spanish political movements: Pásalo in 2004 and 15M in 2011.
It analyzes how these movements utilized social media and networked communication to organize and spread their messages outside of traditional media. Specifically, it looks at how 15M protesters coordinated on social networks and how analysis of Twitter data showed decentralized, non-hierarchical information flows.
The document also examines how mainstream media initially failed to adequately cover 15M in its early days, while discussion grew rapidly on social networks. It identifies open questions around the media logic of social networks and how they spread the messages of online social movements.
Emergency Management in the age of social convergencePatrice Cloutier
Conference on social media use in emergency management given at the Social Media in Government Conference on Oct. 3, 2011 for the Conference Board of Canada.
Social Media in Crisis Management: ISCRAM Summer School 2011Connie White
This is a lecture for PhD students at a summer school hosted by Information Systems for Crisis Response and Management, ISCRAM www.iscram.org. This lecture covers social media and the information systems concepts that show how social media can support emergency management.
How to use social medias to better engage people affected by crisesNoMOUZAY
This document provides guidance for humanitarian organizations on using social media to better engage with communities affected by crises. It recommends starting by researching which social media platforms are most widely used in the target country or community to understand where to focus engagement efforts. The guide emphasizes building proximity and trust both on and offline as foundations for effective social media communication. It then offers tips for activities like social media listening, preparedness, emergency response, and measuring success. The overall aim is to strengthen two-way communication and engagement with affected populations to center their needs, concerns, and feedback in humanitarian programs and responses.
Stakeholder Engagement and Public Information Through Social Media: A Study o...Marco Bellucci
Manetti, G., Bellucci, M., & Bagnoli, L. (2016). Stakeholder Engagement and Public Information Through Social Media: A Study of Canadian and American Public Transportation Agencies. The American Review of Public Administration. doi:10.1177/0275074016649260
http://arp.sagepub.com/content/early/2016/05/13/0275074016649260.short
Emergency relief services in the social media ageEvanMeduna
Social media has become an important tool for emergency relief services in disaster situations. When traditional methods of communication are unavailable due to infrastructure damage, people turn to social media to request help and spread awareness. A nursing home in Texas used Twitter during Hurricane Harvey to call for assistance when first responders could not be reached, and their tweet was shared thousands of times to bring faster aid. Similarly, a woman rescued her family from rising floodwaters during the storm by having someone contact the fire department on Facebook. While social media allows quick sharing of information, emergency services must take care to validate information to avoid spreading misinformation.
This document provides information on the subjects and topics S1/2 students will be studying in Term 4 of the 2015-16 school year at Stronsay School. Key subjects covered include English, maths, science, French, religious education, health and wellbeing, art, music, and PE. For each subject, the document lists the main topics and skills students will be focusing on during the term. It encourages parents to contact teachers if they need more information on the curriculum.
The document discusses prototyping and provides examples of different types of prototypes including paper prototypes, digital prototypes, storyboards, role plays, and space prototypes. It explains that prototyping is used to make ideas tangible and test reactions from users in order to gain insights. Prototypes should be iterated on and fail early to push ideas further and save time and money. Both low and high fidelity prototypes are mentioned as ways to test ideas at different stages of the design process.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
The document discusses how personalization and dynamic content are becoming increasingly important on websites. It notes that 52% of marketers see content personalization as critical and 75% of consumers like it when brands personalize their content. However, personalization can create issues for search engine optimization as dynamic URLs and content are more difficult for search engines to index than static pages. The document provides tips for SEOs to help address these personalization and SEO challenges, such as using static URLs when possible and submitting accurate sitemaps.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
This document summarizes a study of CEO succession events among the largest 100 U.S. corporations between 2005-2015. The study analyzed executives who were passed over for the CEO role ("succession losers") and their subsequent careers. It found that 74% of passed over executives left their companies, with 30% eventually becoming CEOs elsewhere. However, companies led by succession losers saw average stock price declines of 13% over 3 years, compared to gains for companies whose CEO selections remained unchanged. The findings suggest that boards generally identify the most qualified CEO candidates, though differences between internal and external hires complicate comparisons.
OCHA Think Brief - Hashtag Standards for emergenciesJan Husar
POLICY AND STUDIES SERIES
These short think pieces are non-papers that present
relatively new ideas that require testing and validation.
The objective of the Think Brief is to generate feedback,
views and advice. The Think Briefs do not necessarily
represent the official views of OCHA
Presentation of my current research interests to 'Scoping Questions of Privacy, Surveillance and Governance in the Digital Society,' Digital Society Network, University of Sheffield, 16 July 2014.
Trevısan leicester esrc festival of soc sci_nov 2012_webfilippotrevisan
Slides from my presentation on the 'digitalization' of disability activism in the UK at the 2012 Economic and Social Research Council Festival of Social Science, 9 Nov., University of Leicester - Department of Media and Communication.
This document summarizes a presentation on the social media strategies of political institutions in Germany and Japan regarding environmental issues after the 2015 Paris Climate Conference. It finds that the German environmental ministry (BMUB) has a more active social media strategy than its Japanese counterpart, with more tweets engaging other accounts. The BMUB strategy aims to set the agenda, while Japanese officials do not alter strategies between media. Limitations and opportunities for further analysis are discussed.
This document discusses the emergence of online disability activism in response to UK welfare cuts. It analyzes three types of online actors opposing the cuts: formal organizations, digitized activists, and digital action networks. The research focuses on the digital action network "The Broken of Britain" and its Facebook page. Analysis found the group effectively builds consensus online around personal stories and alternative policy frames. However, questions remain around its long-term sustainability and accountability as a new form of online-only disability activism.
The document provides a progress report for a Datagrant project studying online health campaigns. It summarizes that in the past year:
- The project team expanded with additional members and funding. Partnerships were formed with organizations to obtain data.
- Results included developing tools to classify the country and motivations of social media users participating in health campaigns. Analyses found relationships between campaign strategies, network structures, and fundraising success.
- Publications and presentations were made on the findings. Media coverage raised the profile of the project. Planned future work includes analyzing additional social media data, studying campaign participant lifecycles, and submitting new grant proposals.
Online social movements and networked activism. Trends around researchJosé Manuel Noguera
This document discusses online social movements and networked activism in Spain. It focuses on two key Spanish political movements: Pásalo in 2004 and 15M in 2011.
It analyzes how these movements utilized social media and networked communication to organize and spread their messages outside of traditional media. Specifically, it looks at how 15M protesters coordinated on social networks and how analysis of Twitter data showed decentralized, non-hierarchical information flows.
The document also examines how mainstream media initially failed to adequately cover 15M in its early days, while discussion grew rapidly on social networks. It identifies open questions around the media logic of social networks and how they spread the messages of online social movements.
Emergency Management in the age of social convergencePatrice Cloutier
Conference on social media use in emergency management given at the Social Media in Government Conference on Oct. 3, 2011 for the Conference Board of Canada.
Social Media in Crisis Management: ISCRAM Summer School 2011Connie White
This is a lecture for PhD students at a summer school hosted by Information Systems for Crisis Response and Management, ISCRAM www.iscram.org. This lecture covers social media and the information systems concepts that show how social media can support emergency management.
How to use social medias to better engage people affected by crisesNoMOUZAY
This document provides guidance for humanitarian organizations on using social media to better engage with communities affected by crises. It recommends starting by researching which social media platforms are most widely used in the target country or community to understand where to focus engagement efforts. The guide emphasizes building proximity and trust both on and offline as foundations for effective social media communication. It then offers tips for activities like social media listening, preparedness, emergency response, and measuring success. The overall aim is to strengthen two-way communication and engagement with affected populations to center their needs, concerns, and feedback in humanitarian programs and responses.
Stakeholder Engagement and Public Information Through Social Media: A Study o...Marco Bellucci
Manetti, G., Bellucci, M., & Bagnoli, L. (2016). Stakeholder Engagement and Public Information Through Social Media: A Study of Canadian and American Public Transportation Agencies. The American Review of Public Administration. doi:10.1177/0275074016649260
http://arp.sagepub.com/content/early/2016/05/13/0275074016649260.short
Emergency relief services in the social media ageEvanMeduna
Social media has become an important tool for emergency relief services in disaster situations. When traditional methods of communication are unavailable due to infrastructure damage, people turn to social media to request help and spread awareness. A nursing home in Texas used Twitter during Hurricane Harvey to call for assistance when first responders could not be reached, and their tweet was shared thousands of times to bring faster aid. Similarly, a woman rescued her family from rising floodwaters during the storm by having someone contact the fire department on Facebook. While social media allows quick sharing of information, emergency services must take care to validate information to avoid spreading misinformation.
Opinion leadership on twitter xu ica2013Han Woo PARK
1) The study examined how opinion leadership on Twitter relates to social connectivity, involvement, and user identity during the 2012 Wisconsin recall election.
2) It found that having more social connectivity on Twitter, as measured by betweenness centrality in the #wirecall hashtag network, positively predicted being retweeted by others.
3) It also found that involvement, as indicated by a user's geographic location in Wisconsin, positively predicted being retweeted, while self-disclosed political identity did not have significant predictive power.
This document provides guidance on creating an effective online strategy for community organizing and advocacy using social media. It discusses understanding social media and identifying objectives, audiences, and key messages. Popular social media tools are categorized as conversation starters, collaboration tools, and social networks. Steps for developing an online strategy include identifying objectives and audiences, crafting messages, and evaluating impact. Guidance is provided on engaging target audiences, conducting online surveys, and selecting appropriate metrics to measure success.
The Pessimistic Investor Sentiments Indicator in Social NetworksTELKOMNIKA JOURNAL
This document proposes a method to calculate a pessimistic investor sentiments indicator using social network data. It defines pessimistic investor sentiment as consisting of depression, disappointment, fear, anxiety, panic, dread and despair. The frequency of these sentiments is counted from social media posts. An entropy-based formula is used to calculate the indicator, taking into account expert-assigned weights. Applying this method to Chinese stock market data from March 2016 generated time-series values of the indicator that discriminated sentiment changes more clearly when incorporating the weights. The proposed indicator provides a quantitative measure of pessimistic investor sentiment from social networks.
“Why Information Matters: a foundation for resilience” is
part of Embracing Change: The Critical Role of Information,
funded by a grant from the Rockefeller Foundation to
support the Internews’ Center for Innovation and Learning’s
research on the role of information ecosystems in building
resilience. Many thanks to the Rockefeller Foundation, and
especially to Sundaa Bridgett-Jones, Associate Director,
International Development, for vital input and support.
No Money, No Problem - A Scalable Approach to Social Media MonitoringTamer Hadi
This document discusses social media monitoring during emergencies. It begins with an overview of why social media monitoring is important for situational awareness, identifying misinformation, and messaging the public. It then covers establishing an online presence during non-emergency times to build credibility. Several free tools for social media monitoring are presented, including Twitter, TweetDeck, Hootsuite, and Snapchat Maps. Resources and training from FEMA, ASPR, and other organizations are also discussed. The document concludes with case studies of social media monitoring during the 2014 Ebola outbreak in New York City.
International Disaster Conference and Expo PresentationGreg Licamele
Presentation delivered in New Orleans at the 2013 International Disaster Conference and Expo. http://idcexpo.blogspot.com/2012/12/idce-panelist-bios-licamele-dudgeon.html
Similar to Combining Real and Virtual Volunteers through Social Media (20)
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 6
Combining Real and Virtual Volunteers through Social Media
1. 1
Combining Real and Virtual Volunteers
through Social Media
Christian Reuter · Oliver Heger · Volkmar Pipek
(christian.reuter@uni-siegen.de)
2. Research Field
Project:
Learning information infrastructures in
crisis management using the example of
power outages (2010-2013)
Target: Development of an
inter-organizational collabo-
ration infrastructure “SiRena”
2
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
5. Crisis Communication Matrix
5
public
Sender
Crisis
Communication
Self Help
Communities
Inter-
organizational
Crisis
Management
Integration of
citizen generated
content
organizations
publicorganizations
Receiver
ISCRAM 2011
Reuter/Marx/Pipek
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
6. Crisis Communication Matrix
6
public
Sender
Crisis
Communication
Self Help
Communities
Inter-
organizational
Crisis
Management
Integration of
citizen generated
content
organizations
publicorganizations
Receiver
ISCRAM 2011
Reuter/Marx/Pipek
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
7. Crisis Communication Matrix
7
public
Sender
Crisis
Communication
Self Help
Communities
Inter-
organizational
Crisis
Management
Integration of
citizen generated
content
organizations
publicorganizations
Receiver
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
ISCRAM 2011
Reuter/Marx/Pipek
8. Emergent Volunteer Groups
8
… private citizens who work together
… in pursuit of collective goals relevant to actual or potential disasters
… but whose organization has not yet become institutionalized
(Stallings & Quarantelli 1985)
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
9. Emergent Volunteer Groups
Exist of… Five essential factors
1. extra community setting,
which legitimizes the group
2. crucial event,
which is perceived as a threat
3. supportive social climate
with positive values regarding the
necessity
4. existing social network, so that
communication can take place
5. available resources such as
information, knowledge or skills
9
• an active core (1%)
• a larger supporting circle
for specific tasks (10%)
• a great number of primarily
nominal supporters who
occasionally assist, but are
rather passive
(Quarantelli, 1984, …)
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
12. Haiti: Open Street Maps
12
• Open Street Maps:
Before the
earthquake of 2010
13. Haiti: Open Street Maps
13
• Open Street Maps:
Two weeks after the
earthquake of 2010
14. Real Volunteers
neighbourly help
local, on-site
„Emergent Groups“
(Stallings & Quarantelli 1985)
Virtual Volunteers
information exchange
online, everywhere
„Digital Volunteers“
(Starbird & Palen 2011)
Differentiation: Virtual and Real
Emergent Volunteer Groups
Research question: How can IT support the collaboration of
virtual and real emergent volunteer groups?
14
overlapping
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
15. Outline
15
① Present knowledge
② Twitter Study:
Time analysis and identification
of role pattern
③ Interview Study:
Self-help activities in the perception
of emergency services
④ Concepts and Implications
Combining real and virtual emergent volunteer groups
⑤ Summary
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
16. Twitter Case Study: 2011 Super Outbreak
Event: “2011 Super Outbreak”
– 211 tornados in the Southern, Midwestern, and
Northeastern United States, leaving catastrophic destruction
in its wake, especially across the state of Alabama
Data collection:
– Tool: The Archivist / Twitter Search API
– Keyword: “tornado”
– Time: 15 hours (2011/04/28 – 2011/04/29)
– Data collected: 79.318 Tweets, 59.282 User
16
http://en.wikipedia.org/wiki/April_25%E2%80%
9328,_2011_tornado_outbreak
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
18. Twitter: Role Pattern
Basis: 41 Twitterers who had the most Tweets (1982 Tweets, 2.50% of all collected Tweets)
and 51 Twitterers who were retweeted the most (7742 Retweets, 22.32% of all Retweets).
Categories are not disjoint and users can belong to more than one of them.
Method: tweets were selected, read and classified manually with the help of qualitative coding
18
Role name Characteristic Task %
The HELPER Is often retweeted and publishes many tweets
(can be especially distinguished by their Tweet-content)
Involved in help activities 28%
The REPORTER Is often retweeted
(provides generative, synthetic and innovative information)
Generates information 68%
The RETWEETER Publishes many tweets
(concentrate on retweeting information, which was brought in
by the reporters; ~”information broker” (Hughes&Palen09)
Distributes information 16%
The REPEATER Publishes many tweets
(possesses only one or very few main messages,
e.g. charity appeal, political opinion)
Spreads a message 19%
The READER Reads tweets Consumes Information -
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
19. Twitter: Insights
19
Temporal Developments
– Warning vs. help: Help activities are especially of interest when potential
threats have faded away
– Retweets vs. links: When the help activities begin to shift to the focus, linking
external sites increases while the percentage of retweets decreases.
Role Pattern
– Helper, Reporter, Retweeter, Repeater
– … and Readers!
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
20. Interviews (1): Perception of Emergency Services
Contrary findings in literature
Volunteers are conceived negatively
(Lanzara 1983, Pfeil 2000)
vs. existence is valued as an essential
factor when fighting a crisis
(Lorenzen 2005).
Official plans do not consider self-help
(Dynes 2006, Stallings & Quarantelli 1985)
vs. self-help is an important part of
official relief actions (Lorenzen 2005).
Methods
Empirical study in two regions of
North Rhine-Westphalia in Germany
Participants: firefighters, police, public
administration, energy network operator
Observations (n=4)
Group discussions (n=5)
Interviews (n=22) to analyze the work
context and the use of information and
communication systems
20
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
21. Interviews (2): Perception of Emergency Services
Helpful: “Particularly during heavy rainfalls
self-help would be sometimes very helpful;
[…] Instead of calling us and writing down
that you have 2 cm water in the
basement.” (I05).
Information: “When somebody calls us,
who has seen something […], then we
certainly ask whether […] they have a gas
tank or whatever kind of heating system
they have.” (I07)
Legal basis: “Everything we do must have a
legal basis. […] A civil self-help group is not
a unit of the emergency service. After all,
we couldn’t utilize them, even if we wanted
to.” (I06) 21
Appearance: “The more you are in the
countryside, the more the citizens support
each other and the less they call the
state.” (I09)
Entitlement: „As you can see very clearly,
the entitlement has increased extremely
[...]. Since they call that the manhole cover
is located next ten centimeter.“ (I09)
Interest: „Our interest is to sensitize the
population that self-help mechanisms
develop” (I05).
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
22. How can IT support the
collaboration of virtual and real
emergent volunteer groups?
22
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
23. Virtual & real volunteer groups
23
Increasing activities by
virtual volunteer groups
Decreasing activities by
real volunteer groups
Social media fosters the appearance
of emergent volunteer groups
(Starbird & Palen 2011, Shklovski et al. 2008,
Palen et al. 2007, Palen & Liu 2007)
Conceived negatively / valuable / not
considered / important part of official relief
(Dynes 2006, Lorenzen 2005, Pfeil 2000,
Stallings & Quarantelli 1985, Lanzara 1983)
Twitter analysis:
Help activities are especially of interest when
threats have faded away (“warning” “help”)
When the help activities shift to the focus,
linking external sites increases while retweets
decreases (retweet”http”)
Different role pattern can be distinguished!
Interviews with emergency services:
They appreciate the work of emergent groups
They wish to foster self help mechanisms
Information exchange can be helpful
for both sides!
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
24. Virtual & real volunteer groups
24
Virtual Volunteer Groups
Aim: Information sharing
Support: Collective intelligence
Real Volunteer Groups
Aim: Workforce sharing
Support: Coordination
Interaction between virtual and real emergent volunteer groups and emergency services
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
Provide
Information
Encourage
participation
25. Virtual & real volunteer groups
25
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
Virtual Volunteer Groups
Aim: Information sharing
Support: Collective intelligence
Real Volunteer Groups
Aim: Workforce sharing
Support: Coordination
Interaction between virtual and real emergent volunteer groups and emergency services
Provide
Information
Encourage
participation
26. Implications: Real and Virtual Volunteers
1. Use of existing social networks
– Prerequisite (Quarantelli 1984); Today: Facebook, Twitter, …
2. Promotion and awareness
– Displaying danger visually (Prerequisite) in existing networks
– Awareness on activities and needs (in the network/neighbourhood) encourages passive users
– Activating passive „readers“ for virtual or real activities
3. Connecting among volunteers
– Virtual: information vs. real: coordination
– Use of the same infrastructures: Displaying user or on-site twitterers (Starbird et al. 2012)
visually using role patterns (e.g. „helper“)
– Possibility to search for volunteers with special skills
4. Connection to emergency services and systems
– Using the information advantage (e.g. „reporter“) 26
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
28. Christian Reuter · Oliver Heger · Volkmar Pipek
University of Siegen Contact:
Institute for Information Systems christian.reuter@uni-siegen.de
CSCW and Social Media www.cscw.uni-siegen.de
Summary: Real and Virtual Volunteers
Empirical Study:
Information & communication practices role pattern
Perception of emergency services
Approach:
1. Use of existing social networks
2. Promotion and awareness
3. Connecting among volunteers
4. Connection to emergency services and systems public
Sender
Crisis
Communication
Self Help
Communities
Inter-
organizational
Crisis
Management
Integration of
citizen
generated
content
organisations
publicorganisations
Receiver
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
29. Related Work
1. Stallings, R.A., Quarantelli, E.L.: Emergent Citizen Groups and Emergency
Management. Public Administration Review. 45, 93–100 (1985).
2. Quarantelli, E.L.: Emergent Citizen Groups in Disaster Preparedness and Recovery
Activities, (1984).
3. Helsloot, I., Ruitenberg, A.: Citizen Response to Disasters : a Survey of Literature and
Some Practical Implications. Journal of Contingencies and Crisis Management. 12, 98–
111 (2004).
4. Lowe, S., Fothergill, A.: A Need to Help: Emergent Volunteer Behavior after September
11th. Beyond September 11th: An Account of Post-Disaster Research. pp. 293–314.
Boulder, CO: Natural Hazards Research and Applications Information Center, University
of Colorado (2003).
5. Voorhees, W.R.: New Yorkers Respond to the World Trade Center Attack: An Anatomy
of an Emergent Volunteer Organization. Journal of Contingencies and Crisis
Management. 16, 3–13 (2008).
6. Palen, L., Liu, S.B.: Citizen communications in crisis: anticipating a future of ICT-
supported public participation. Proceedings of the Conference on Human Factors in
Computing Systems (CHI). ACM Press, San Jose, USA (2007).
7. Starbird, K., Palen, L.: Voluntweeters: Self-Organizing by Digital Volunteers in Times of
Crisis. Proceedings of the Conference on Human Factors in Computing Systems (CHI).
ACM Press, Vancouver, BC, Canada (2011).
8. Vieweg, S., Hughes, A.L., Starbird, K., Palen, L.: Microblogging During Two Natural
Hazards Events: What Twitter May Contribute to Situational Awareness. Proceedings of
the Conference on Human Factors in Computing Systems (CHI). pp. 1079–1088
(2010).
9. Qu, Y., Huang, C., Zhang, P., Zhang, J.: Microblogging after a Major Disaster in China:
A Case Study of the 2010 Yushu Earthquake. Proc. CSCW. pp. 25–34, Hangzhou,
China (2011).
10. White, C., Plotnick, L., Kushma, J., Hiltz, S.R., Turoff, M.: An online social network for
emergency management. International Journal of Emergency Management. 6, 369–382
(2009).
11. Palen, L., Vieweg, S.: The emergence of online widescale interaction in unexpected
events: assistance, alliance & retreat. Proceedings of the Conference on Computer
Supported Cooperative Work (CSCW). pp. 117–126. ACM Press (2008).
12. Hughes, A.L., Palen, L.: Twitter Adoption and Use in Mass Convergence and
Emergency Events. In: Proc. ISCRAM, Gothenburg (2009).
13. Starbird, K., Palen, L., Hughes, A.L., Vieweg, S.: Chatter on The Red: What Hazards
Thret Reveals about the Social Life of Microblogges Information. In: Proc. CSCW. pp.
241–250. ACM Press (2010).
14. Starbird, K., Palen, L.: Pass It On?: Retweeting in Mass Emergency. Proceedings of the
International ISCRAM Conference. pp. 1–10. , Seattle, USA (2010).
15. Strauss, A.: Qualitative Analysis for Social Scientists. Cambridge press (1987).
16. Dynes, R.R.: Social Capital: Dealing with Community Emergencies. Homeland Security
Affairs. 2, (2006).
17. Lanzara, G.F.: Ephemeral Organisations in Extreme Environments: emergence,
strategy, extinction. Journal of Management Studies. 20, 71–95 (1983).
18. Lorenzen, D.: Risikokommunikation bei Naturkatastrophen - Ausgewählte Ergebnisse
der Befragung im Herbst 2004. (2005).
19. Pfeil, J.: Maßnahmen des Katastrophenschutzes und Reaktionen der Bürger in
Hochwassergebieten. Deutsches Komitee für Katastrophenvorsorge e.V. (DKKV)
(2000).
20. White, C., Plotnick, L., Addams-Moring, R., Turoff, M., Hiltz, S.R.: Leveraging a Wiki to
Enhance Virtual Collaboration in the Emergency Domain. Proc. HICSS (2008).
29
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
30. Publications2013
1. Christofzik/Reuter (2013). The Aggregation of Information Qualities in
Collaborative Software. Int. Journ. Entr. Venturing, 5(3).
2. Heger/Reuter (2013). IT-basierte Unterstützung virtueller und realer
Selbsthilfegemeinschaften in Katastrophenlagen. In Proc. WI`13.
3. Ley/Pipek/Siebigteroth/Wiedenhöfer (2013): Retrieving and Exchanging of
Information in Inter-organizational Crisis Management. In Proc. ISCRAM `13.
4. Ludwig/Reuter/Pipek (2013): What You See Is What I Want: Mobile Reporting
Practices in Emergencies. In: Proc. ECSCW `13 (accepted)
5. Reuter/Heger/Pipek (2013). Combining Real and Virtual Volunteers through
Social Media. In Proc. ISCRAM `13.
6. Reuter/Ritzkatis (2013). Unterstützung mobiler Geo-Kollaboration zur
Lageeinschätzung von Feuerwehr und Polizei. In Proc. WI`13.
7. Reuter (2013). Power Outage Communications: Survey of Needs,
Infrastructures and Concepts. In Proc. ISCRAM `13.
8. Thamm/Ludwig/Reuter (2013). Design of a Process Modell for Unmanned
Aerial Systems (UAS) in Emergencies. In Proc. ISCRAM `13.
2012
9. Christofzik/Reuter (2012). Einfluss der Qualitätsermittlung kollaborativ
erstellter Informationen auf die Gestaltung interorganisationaler
Krisenmanagementsysteme. In Proc. MKWI `12.
10. Ley/Pipek/Reuter/Wiedenhoefer (2012). Supporting Improvisation Work in
Inter-Organizational Crisis Management. In Proc. CHI `12.
11. Ley/Pipek/Reuter/Wiedenhoefer (2012). Supporting Inter-organizational Situation
Assessment in Crisis Management. In Proc. ISCRAM `12.
12. Pipek/Palen/Landgren (Eds.) (2012): Workshop summary: collaboration & crisis
informatics (CCI'2012). Workshop-Proc. CSCW `12.
13. Reuter/Heger/Pipek (2012). Social Media for Supporting Emergent Groups in Crisis
Management. In Workshop-Proc. CSCW `12.
14. Reuter/Marx/Pipek (2012). Crisis Management 2.0: Towards a Systematization of
Social Software Use in Crisis Situations. Int. Journ. ISCRAM, 4(1), 1–16.
15. Reuter/Pipek/Wiedenhoefer/Ley (2012). Dealing with Terminologies in Collaborative
Systems for Crisis Management. In Proc. ISCRAM `12.
2011
16. Reuter/Marx/Pipek (2011). Social Software as an Infrastructure for Crisis Management
– a Case Study about Current Practice and Potential Usage. In Proc. ISCRAM `11.
17. Reuter/Marx/Pipek (2011). Desaster 2.0: Einbeziehung von Bürgern in das
Krisenmanagement. In: Proc. Mensch & Computer `11.
18. Reuter/Pohl/Pipek (2011). Umgang mit Terminologien in inter- organisationaler
Krisenkooperation - eine explorative Empirie. In Proc. Mensch & Computer `11.
19. Reuter (2011). Motive und Barrieren für Social Software in Organisationen und im
Krisenmanagement. In Workshop-Proc. Mensch & Computer `11.
20. Wiedenhoefer/Reuter/Ley/Pipek (2011). Inter-Organizational Crisis Management
Infrastructures for Electrical Power Breakdowns. In Proc. ISCRAM `11.
21. Wiedenhoefer/Reuter/Ley/Pipek (2011). Entwicklung IT-basierter interorganisationaler
Krisenmanagement-Infrastrukturen für Stromausfälle. In Workshop Proc. SE `11 (acc.)
30
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
31. Social Media: Tools
Microblogging
distributing information, answering requests (Starbird & Palen 2011), situation updates
(Vieweg et al. 2010), emotionally coping (Qu et al. 2011), for intensive coordination
work switch to other software (Skype, Google Wave, …) (Starbird & Palen 2011)
Social Networks
create collective intelligence, serve as information source and contain quality control
mechanisms (Palen & Vieweg 2008, Vieweg et al. 2008).
Wikis
visual interface which allows its users to publish and edit information on the Google
Map Interface (Palen et al. 2007).
Group Modules
Coordination and Cooperation, especially with Group modules
(Sebastian&Bui 2011, Petrescu-Prahova&Butts 2008, Majchrzak et al. 2007, Jaeger et al.
2007)
31
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary
32. Social Media: Tasks
Information
– meta-information, such as context, validity, source, credibility, and timeliness, are of importance
(Palen et al. 2010)
– e.g. particular hashtag-syntax for tweets during crises (Starbird and Stamberger 2010)
– existence of a given structure is essential, so that the information can be managed and information
overload can be reduced (Turoff et al. 2004)
Communication
– develop, discuss and finally vote on ideas in an iterative process (White et al. 2008b)
Coordination
– fosters decision-making and coordination by integrating a community platform (Jäger et al. 2007)
– template-driven processing (Bui and Sebastian 2011)
32
① Introduction ② Twitter Study ③ Interview Study ④ Concepts ⑤ Summary