SlideShare a Scribd company logo
1 of 15
Dealing with Information
Overload When Using Social
Media for Emergency
Management: Emerging Solutions
Starr Roxanne Hiltz (NJIT)
Linda Plotnick (Jacksonville State, AL)
ISCRAM 2013
Contents
A focused literature review of issues
related to information overload and
potential solutions to the problem, in
the realm of social media use in
emergency management
2(C) 2013 Roxanne Hiltz
Information Overload in the
Context of CMC
the delivery of too many communications and
to an increase in social density that gives
individuals access to more communications
than they can easily respond to
information entropy, whereby incoming
messages are not sufficiently organized by
topic or content to be easily recognized as
important
(Hiltz & Turoff, 1985)
3(C) 2013 Roxanne Hiltz
A review that covers:
Emergent social conventions
use of “voluntweeters,” and technical
features of social media , useful in
organizing and filtering the information ,
to obtain situational awareness
Natural language processing and visual
map based (GISis) displays
4(C) 2013 Roxanne Hiltz
Social conventions in the Twitterverse
Hashtags help with finding and filtering
@ to indicate that tweet is about or for a specific
person or organization
Retweets and follow@ to recommend who/
what to follow
Analyses build on/ document the usefulness: e.g.,
Starbird and Palen (2010) show:
how these conventions were used during two
disasters
retweets authored by “local” users are more
likely to be about the event.
5(C) 2013 Roxanne Hiltz
Human “Voluntweeters”
Trained volunteers, off-site, who aid the
onsite emergency managers by
monitoring and filtering social media
6(C) 2013 Roxanne Hiltz
Examples of Human
“Voluntweeters”
Example 1: Haiti, “tweek the tweet” suggested
hastag markups ( eg, “#need”); translated and
passed on tweets to on the ground personnel
(Starbird and Stamberger, 2010).
Example 2: Use as liaisons between the
overburdened personnel of official response
organizations and the users of social media who want
to receive information (St. Denis, Hughes, and Palen,
2012).
Team of 8 filtered and passed on relevant SM info
during a 3 week forest fire and also used the SM
to pass on instructions for the public, from the
manager. 7(C) 2013 Roxanne Hiltz
Machines- Natural Language
processing,1
(Verma et al., 2011) describes a
program developed to automatically
identify messages communicated via
Twitter that can contribute to
situational awareness.
8(C) 2013 Roxanne Hiltz
Machines- Natural Language
processing, 1 continued
Tweets that contribute to situational
awareness are likely to be written in a
style that is: objective, impersonal and
formal
9
Thus, the identification of subjectivity,
personal style and formal register
provide useful features for extracting
tweets that contain tactical information.
(achieved 80% accuracy).
(C) 2013 Roxanne Hiltz
Natural Language Processing, 2
Cameron, Power, Robinson, and Yin (2012)
developed a platform and client tools to
demonstrate how relevant Twitter messages
can be identified and utilized to inform the
situation awareness of an emergency incident
as it unfolds.
Their system uses a clustering engine to
gather and visually display clustering sets of
tweets related to an incident.
10(C) 2013 Roxanne Hiltz
A GIS to aid Sensemaking:
“Sensplace2”
Prototype (MacEachern et al. 2011)
visual display including the following
features:
a ‘tweet list’ that includes 500 identified/
selected most relevant tweets for any inquiry, with
a color-coded strip to indicate the relevance
ranking of each selected Tweet.
11(C) 2013 Roxanne Hiltz
Sensplace2 continued
Also includes
a display in the form of a ‘tweet map,’
supporting simultaneously, a geographic overview
of the location of the selected tweets, and the
ability to get more detail by selecting places or
applying spatial filtering.
A ‘heatmap’ is included in the overview tools that
uses color to depict tweet frequency by concept
(topic), time or place specifications
12(C) 2013 Roxanne Hiltz
Conclusion
Natural language processing to filter
and aggregate and analyze social media
data streams, combined with geo-
visual displays as part of the delivery of
results, have a great deal of promise for
overcoming the information overload
problem faced by emergency managers.
13(C) 2013 Roxanne Hiltz
Conclusion continued
Pilot interviews with US government
emergency managers indicate great
enthusiasm for such systems, that
would filter and visually display
“relevant” results, incorporated into
their “regular” EMIS.
14(C) 2013 Roxanne Hiltz
Thank You
QUESTIONS?
15(C) 2013 Roxanne Hiltz

More Related Content

Viewers also liked

Hp0 s35 question answers
Hp0 s35 question answersHp0 s35 question answers
Hp0 s35 question answersMarcoMCervantes
 
Riskpro brief introduction
Riskpro brief introductionRiskpro brief introduction
Riskpro brief introductionNidhi Gupta
 
Legal risk advisory services 2013
Legal risk advisory services 2013Legal risk advisory services 2013
Legal risk advisory services 2013Nidhi Gupta
 
Riskpro executive summary
Riskpro executive summaryRiskpro executive summary
Riskpro executive summaryNidhi Gupta
 
Delay Tolerant Disaster Communication with the One Laptop Per Child XO
Delay Tolerant Disaster Communication with the One Laptop Per Child XO Delay Tolerant Disaster Communication with the One Laptop Per Child XO
Delay Tolerant Disaster Communication with the One Laptop Per Child XO Mirjam-Mona
 
Project mgmt services brochure 2013
Project mgmt services brochure 2013Project mgmt services brochure 2013
Project mgmt services brochure 2013Nidhi Gupta
 

Viewers also liked (7)

Hp0 s35 question answers
Hp0 s35 question answersHp0 s35 question answers
Hp0 s35 question answers
 
Riskpro brief introduction
Riskpro brief introductionRiskpro brief introduction
Riskpro brief introduction
 
Legal risk advisory services 2013
Legal risk advisory services 2013Legal risk advisory services 2013
Legal risk advisory services 2013
 
Riskpro executive summary
Riskpro executive summaryRiskpro executive summary
Riskpro executive summary
 
Delay Tolerant Disaster Communication with the One Laptop Per Child XO
Delay Tolerant Disaster Communication with the One Laptop Per Child XO Delay Tolerant Disaster Communication with the One Laptop Per Child XO
Delay Tolerant Disaster Communication with the One Laptop Per Child XO
 
Bunkhachon Srisawat Infographic MIM
Bunkhachon Srisawat Infographic MIM Bunkhachon Srisawat Infographic MIM
Bunkhachon Srisawat Infographic MIM
 
Project mgmt services brochure 2013
Project mgmt services brochure 2013Project mgmt services brochure 2013
Project mgmt services brochure 2013
 

Similar to Dealing with Information Overload When Using Social Media for Emergency Management: Emerging Solutions

Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdfclientmentailai
 
Weather events identification in social media streams: tools to detect their ...
Weather events identification in social media streams: tools to detect their ...Weather events identification in social media streams: tools to detect their ...
Weather events identification in social media streams: tools to detect their ...Alfonso Crisci
 
Big data analysis of news and social media content
Big data analysis of news and social media contentBig data analysis of news and social media content
Big data analysis of news and social media contentFiras Husseini
 
OCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergenciesOCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergenciesJan Husar
 
Helping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet HaystackHelping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet HaystackCOMRADES project
 
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...Connie White
 
Information Contagion through Social Media: Towards a Realistic Model of the ...
Information Contagion through Social Media: Towards a Realistic Model of the ...Information Contagion through Social Media: Towards a Realistic Model of the ...
Information Contagion through Social Media: Towards a Realistic Model of the ...Axel Bruns
 
Classifying Crises-Information Relevancy with Semantics
Classifying Crises-Information Relevancy with SemanticsClassifying Crises-Information Relevancy with Semantics
Classifying Crises-Information Relevancy with SemanticsCOMRADES project
 
Twitter turns ten: its use to date in disaster management
Twitter turns ten: its use to date in disaster managementTwitter turns ten: its use to date in disaster management
Twitter turns ten: its use to date in disaster managementNeil Dufty
 
Fusing text and image for event
Fusing text and image for eventFusing text and image for event
Fusing text and image for eventijma
 
Jasist11
Jasist11Jasist11
Jasist11svennus
 
Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusioncsandit
 
Humanitarian Diplomacy in the Digital Age: Analysis and use of digital inform...
Humanitarian Diplomacy in the Digital Age: Analysis and use of digital inform...Humanitarian Diplomacy in the Digital Age: Analysis and use of digital inform...
Humanitarian Diplomacy in the Digital Age: Analysis and use of digital inform...Keith Powell
 
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...IJCSEA Journal
 
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...IJCSEA Journal
 
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...IJCSEA Journal
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...Araz Taeihagh
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementConnie White
 

Similar to Dealing with Information Overload When Using Social Media for Emergency Management: Emerging Solutions (20)

Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdf
 
Weather events identification in social media streams: tools to detect their ...
Weather events identification in social media streams: tools to detect their ...Weather events identification in social media streams: tools to detect their ...
Weather events identification in social media streams: tools to detect their ...
 
Big data analysis of news and social media content
Big data analysis of news and social media contentBig data analysis of news and social media content
Big data analysis of news and social media content
 
OCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergenciesOCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergencies
 
Helping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet HaystackHelping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet Haystack
 
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
 
Framework to Analyze Coordination in Crisis Response Using Social Media
 Framework to Analyze Coordination in Crisis Response Using Social Media Framework to Analyze Coordination in Crisis Response Using Social Media
Framework to Analyze Coordination in Crisis Response Using Social Media
 
Information Contagion through Social Media: Towards a Realistic Model of the ...
Information Contagion through Social Media: Towards a Realistic Model of the ...Information Contagion through Social Media: Towards a Realistic Model of the ...
Information Contagion through Social Media: Towards a Realistic Model of the ...
 
Classifying Crises-Information Relevancy with Semantics
Classifying Crises-Information Relevancy with SemanticsClassifying Crises-Information Relevancy with Semantics
Classifying Crises-Information Relevancy with Semantics
 
Twitter turns ten: its use to date in disaster management
Twitter turns ten: its use to date in disaster managementTwitter turns ten: its use to date in disaster management
Twitter turns ten: its use to date in disaster management
 
Fusing text and image for event
Fusing text and image for eventFusing text and image for event
Fusing text and image for event
 
Jasist11
Jasist11Jasist11
Jasist11
 
Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusion
 
Humanitarian Diplomacy in the Digital Age: Analysis and use of digital inform...
Humanitarian Diplomacy in the Digital Age: Analysis and use of digital inform...Humanitarian Diplomacy in the Digital Age: Analysis and use of digital inform...
Humanitarian Diplomacy in the Digital Age: Analysis and use of digital inform...
 
Akram.pptx
Akram.pptxAkram.pptx
Akram.pptx
 
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
 
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
 
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Dealing with Information Overload When Using Social Media for Emergency Management: Emerging Solutions

  • 1. Dealing with Information Overload When Using Social Media for Emergency Management: Emerging Solutions Starr Roxanne Hiltz (NJIT) Linda Plotnick (Jacksonville State, AL) ISCRAM 2013
  • 2. Contents A focused literature review of issues related to information overload and potential solutions to the problem, in the realm of social media use in emergency management 2(C) 2013 Roxanne Hiltz
  • 3. Information Overload in the Context of CMC the delivery of too many communications and to an increase in social density that gives individuals access to more communications than they can easily respond to information entropy, whereby incoming messages are not sufficiently organized by topic or content to be easily recognized as important (Hiltz & Turoff, 1985) 3(C) 2013 Roxanne Hiltz
  • 4. A review that covers: Emergent social conventions use of “voluntweeters,” and technical features of social media , useful in organizing and filtering the information , to obtain situational awareness Natural language processing and visual map based (GISis) displays 4(C) 2013 Roxanne Hiltz
  • 5. Social conventions in the Twitterverse Hashtags help with finding and filtering @ to indicate that tweet is about or for a specific person or organization Retweets and follow@ to recommend who/ what to follow Analyses build on/ document the usefulness: e.g., Starbird and Palen (2010) show: how these conventions were used during two disasters retweets authored by “local” users are more likely to be about the event. 5(C) 2013 Roxanne Hiltz
  • 6. Human “Voluntweeters” Trained volunteers, off-site, who aid the onsite emergency managers by monitoring and filtering social media 6(C) 2013 Roxanne Hiltz
  • 7. Examples of Human “Voluntweeters” Example 1: Haiti, “tweek the tweet” suggested hastag markups ( eg, “#need”); translated and passed on tweets to on the ground personnel (Starbird and Stamberger, 2010). Example 2: Use as liaisons between the overburdened personnel of official response organizations and the users of social media who want to receive information (St. Denis, Hughes, and Palen, 2012). Team of 8 filtered and passed on relevant SM info during a 3 week forest fire and also used the SM to pass on instructions for the public, from the manager. 7(C) 2013 Roxanne Hiltz
  • 8. Machines- Natural Language processing,1 (Verma et al., 2011) describes a program developed to automatically identify messages communicated via Twitter that can contribute to situational awareness. 8(C) 2013 Roxanne Hiltz
  • 9. Machines- Natural Language processing, 1 continued Tweets that contribute to situational awareness are likely to be written in a style that is: objective, impersonal and formal 9 Thus, the identification of subjectivity, personal style and formal register provide useful features for extracting tweets that contain tactical information. (achieved 80% accuracy). (C) 2013 Roxanne Hiltz
  • 10. Natural Language Processing, 2 Cameron, Power, Robinson, and Yin (2012) developed a platform and client tools to demonstrate how relevant Twitter messages can be identified and utilized to inform the situation awareness of an emergency incident as it unfolds. Their system uses a clustering engine to gather and visually display clustering sets of tweets related to an incident. 10(C) 2013 Roxanne Hiltz
  • 11. A GIS to aid Sensemaking: “Sensplace2” Prototype (MacEachern et al. 2011) visual display including the following features: a ‘tweet list’ that includes 500 identified/ selected most relevant tweets for any inquiry, with a color-coded strip to indicate the relevance ranking of each selected Tweet. 11(C) 2013 Roxanne Hiltz
  • 12. Sensplace2 continued Also includes a display in the form of a ‘tweet map,’ supporting simultaneously, a geographic overview of the location of the selected tweets, and the ability to get more detail by selecting places or applying spatial filtering. A ‘heatmap’ is included in the overview tools that uses color to depict tweet frequency by concept (topic), time or place specifications 12(C) 2013 Roxanne Hiltz
  • 13. Conclusion Natural language processing to filter and aggregate and analyze social media data streams, combined with geo- visual displays as part of the delivery of results, have a great deal of promise for overcoming the information overload problem faced by emergency managers. 13(C) 2013 Roxanne Hiltz
  • 14. Conclusion continued Pilot interviews with US government emergency managers indicate great enthusiasm for such systems, that would filter and visually display “relevant” results, incorporated into their “regular” EMIS. 14(C) 2013 Roxanne Hiltz