scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Emergency Management using Social Networks

01 Oct 2019-pp 721-726
TL;DR: An end-to-end framework is proposed that takes public posts from social networking sites and converts it into a structured format that makes the information actionable and applies influence maximization techniques to increase the reach and to warrant better public participation in the crisis in a timely manner.
Abstract: The popularity of social networks make them most efficient to integrate into the Emergency Management process. Posts on social networking sites can help people by ensuring timely detection of an emergency. Often during the situations of a natural disaster, there is an information chasm created between the affected and the unaffected area that further compounds the confusion and chaos. In this paper, we examine the various challenges that exist while attempting to integrate social networks and Emergency Management and trace the state-of-art techniques that exist in various domains that come together for this Emergency Management system. We propose an end-to-end framework that takes public posts from social networking sites and converts it into a structured format that makes the information actionable. A summarization technique may be applied to the acquired information post mining of social media feed to convert everything into a text message that can be released into various social platforms. To increase the reach of this post and to warrant better public participation in the crisis in a timely manner, we apply influence maximization techniques and monitor the diffusion process of this generated post through a diffusion modelling technique that we propose. We conduct experiments to analyze the performance of this model and of the influence maximization process and conclude with an analysis of the experiments and the observed results and list out improvements that we intend to incorporate in future versions of this work.
Citations
More filters
Journal ArticleDOI
TL;DR: Survey data collected from households in Jacksonville, Florida affected by 2016's Hurricane Matthew identifies perceived consistency of information as a key predictor of uncertainty regarding hurricane impact and evacuation logistics and provides practical implications regarding the need of information coordination for improved evacuation decision‐making.
Abstract: Understanding how information use contributes to uncertainties surrounding evacuation decisions is crucial during disasters. While literature increasingly establishes that people consult m...

7 citations


Cites background from "Emergency Management using Social N..."

  • ...…important to consider the impact of dynamic information environments such as augmented reality tools which assist with realistic visualization of spatial data and social networking sites which allows user-generated updates (Hiltz & Plotnick, 2013; Sharma & Kumar, 2019) on perceived uncertainties....

    [...]

References
More filters
01 Jun 2014
TL;DR: A collection of more than 50 large network datasets from tens of thousands of node and edges to tens of millions of nodes and edges that includes social networks, web graphs, road networks, internet networks, citation networks, collaboration networks, and communication networks.
Abstract: A collection of more than 50 large network datasets from tens of thousands of nodes and edges to tens of millions of nodes and edges. In includes social networks, web graphs, road networks, internet networks, citation networks, collaboration networks, and communication networks.

3,135 citations


"Emergency Management using Social N..." refers background or methods in this paper

  • ...social network, so we used the Facebook dataset provided by Stanford SNAP[18]....

    [...]

  • ...Recently a lot of emphasis is on using Twitter data for identifying first stories, due to the fact that Twitter is the most preferred social media because of a large audience [13][17[18]....

    [...]

  • ...In this work, we only look at the topological information of social network, so we used the Facebook dataset provided by Stanford SNAP[18]....

    [...]

  • ...724 2019 IEEE Region 10 Conference (TENCON 2019) To validate the diffusion model that we propose, we used the Facebook dataset provided by SNAP [30]....

    [...]

Journal ArticleDOI
TL;DR: The results clearly indicate that information dissemination is dominated by both weak and strong w-o-m, rather than by advertising, which means that strong and weak ties become the main forces propelling growth.
Abstract: Though word-of-mouth (w-o-m) communications is a pervasive and intriguing phenomenon, little is known on its underlying process of personal communications. Moreover as marketers are getting more interested in harnessing the power of w-o-m, for e-business and other net related activities, the effects of the different communications types on macro level marketing is becoming critical. In particular we are interested in the breakdown of the personal communication between closer and stronger communications that are within an individual's own personal group (strong ties) and weaker and less personal communications that an individual makes with a wide set of other acquaintances and colleagues (weak ties). We use a technique borrowed from Complex Systems Analysis called stochastic cellular automata in order to generate data and analyze the results so that answers to our main research issues could be ascertained. The following summarizes the impact of strong and weak ties on the speed of acceptance of a new product: ••The influence of weak ties is at least as strong as the influence of strong ties. Despite the relative inferiority of the weak tie parameter in the model's assumptions, their effect approximates or exceeds that of strong ties, in all stages of the product life cycle. ••External marketing efforts (e.g., advertising) are effective. However, beyond a relatively early stage of the growth cycle of the new product, their efficacy quickly diminishes and strong and weak ties become the main forces propelling growth. The results clearly indicate that information dissemination is dominated by both weak and strong w-o-m, rather than by advertising. ••The effect of strong ties diminishes as personal network size decreases. Market attributes were also found to mediate the effects of weak and strong ties. When personal networks are small, weak ties were found to have a stronger impact on information dissemination than strong ties.

2,044 citations

Journal ArticleDOI
TL;DR: It is demonstrated that it is possible to accurately infer 95% of friendships based on the observational data alone, where friend dyads demonstrate distinctive temporal and spatial patterns in their physical proximity and calling patterns that allow the prediction of individual-level outcomes such as job satisfaction.
Abstract: Data collected from mobile phones have the potential to provide insight into the relational dynamics of individuals. This paper compares observational data from mobile phones with standard self-report survey data. We find that the information from these two data sources is overlapping but distinct. For example, self-reports of physical proximity deviate from mobile phone records depending on the recency and salience of the interactions. We also demonstrate that it is possible to accurately infer 95% of friendships based on the observational data alone, where friend dyads demonstrate distinctive temporal and spatial patterns in their physical proximity and calling patterns. These behavioral patterns, in turn, allow the prediction of individual-level outcomes such as job satisfaction.

1,921 citations


"Emergency Management using Social N..." refers methods in this paper

  • ...For this work, they considered three event sequences from Mobile Phone data from a European operator, Reality Mining project [4] and e-mail log from a network....

    [...]

Posted Content
TL;DR: This work develops an efficient approximation algorithm that scales to large datasets and finds provably near-optimal networks for tracing paths of diffusion and influence through networks and inferring the networks over which contagions propagate.
Abstract: Information diffusion and virus propagation are fundamental processes taking place in networks. While it is often possible to directly observe when nodes become infected with a virus or adopt the information, observing individual transmissions (i.e., who infects whom, or who influences whom) is typically very difficult. Furthermore, in many applications, the underlying network over which the diffusions and propagations spread is actually unobserved. We tackle these challenges by developing a method for tracing paths of diffusion and influence through networks and inferring the networks over which contagions propagate. Given the times when nodes adopt pieces of information or become infected, we identify the optimal network that best explains the observed infection times. Since the optimization problem is NP-hard to solve exactly, we develop an efficient approximation algorithm that scales to large datasets and finds provably near-optimal networks. We demonstrate the effectiveness of our approach by tracing information diffusion in a set of 170 million blogs and news articles over a one year period to infer how information flows through the online media space. We find that the diffusion network of news for the top 1,000 media sites and blogs tends to have a core-periphery structure with a small set of core media sites that diffuse information to the rest of the Web. These sites tend to have stable circles of influence with more general news media sites acting as connectors between them.

915 citations


"Emergency Management using Social N..." refers background in this paper

  • ...Explanatory Models: Gomez et al.[8] propose a model over static networks that tries to reconstruct the edges of a diffusion network by observing the timing of node infection over multiple information cascades and also propose a NETINF model to infer this diffusion network....

    [...]

  • ...They extend this idea [8] over static networks to propose NETRATE [20] that models the diffusion network as comprising of spatially discrete sets of diffusion networks....

    [...]

Journal ArticleDOI
16 Jul 2013
TL;DR: A survey of representative methods dealing with information diffusion in social networks and a taxonomy that summarizes the state-of-the-art is proposed, intended to help researchers in quickly understanding existing works and possible improvements to bring.
Abstract: Online social networks play a major role in the spread of information at very large scale. A lot of effort have been made in order to understand this phenomenon, ranging from popular topic detection to information diffusion modeling, including influential spreaders identification. In this article, we present a survey of representative methods dealing with these issues and propose a taxonomy that summarizes the state-of-the-art. The objective is to provide a comprehensive analysis and guide of existing efforts around information diffusion in social networks. This survey is intended to help researchers in quickly understanding existing works and possible improvements to bring.

823 citations


"Emergency Management using Social N..." refers background or methods in this paper

  • ...Other Predictive Models were based on the assumption of a static network; hence, they would not function well on realworld social networks that are dynamic in nature....

    [...]

  • ...Information Diffusion Modelling: In trying to model information diffusion on social networks, two kinds of approaches can be undertaken, namely Explanatory Models and Predictive Models [11]....

    [...]

  • ...Much work has been done towards using social media data to identify posts about a crisis or disaster and formalizing them into a structure to help the authorities or layman [13][28][22][11]....

    [...]

  • ...Predictive Models: Linear Threshold Model and Independent Cascade models are the models that have been the underlying models of various predictive models of Information diffusion on Social Networks and have been discussed in brief below [17]....

    [...]