Preface |
|
ix | |
Acknowledgments |
|
xi | |
|
|
1 | (17) |
|
1.1 "Sirens going off now!! Take cover ... be safe!" |
|
|
2 | (1) |
|
|
3 | (2) |
|
1.3 Information Flows in Social Media |
|
|
5 | (3) |
|
|
8 | (1) |
|
1.5 Requirements: "Big Picture" Versus "Actionable Insights" |
|
|
9 | (2) |
|
1.6 Organizational Challenges |
|
|
11 | (2) |
|
1.7 Scope and Organization of This Book |
|
|
13 | (3) |
|
1.8 Further Reading and Online Appendix |
|
|
16 | (2) |
|
2 Volume: Data Acquisition, Storage, and Retrieval |
|
|
18 | (17) |
|
2.1 Social Media Data Sizes |
|
|
18 | (4) |
|
|
22 | (6) |
|
2.3 Postfiltering and De-Duplication |
|
|
28 | (1) |
|
2.4 Data Representation / Feature Extraction |
|
|
29 | (2) |
|
|
31 | (1) |
|
|
32 | (2) |
|
|
34 | (1) |
|
3 Vagueness: Natural Language and Semantics |
|
|
35 | (16) |
|
3.1 Social Media Is Conversational |
|
|
36 | (1) |
|
|
37 | (4) |
|
|
41 | (1) |
|
|
42 | (2) |
|
3.5 Geotagging and Geocoding |
|
|
44 | (2) |
|
3.6 Extracting Structured Information |
|
|
46 | (1) |
|
3.7 Ontologies for Explicit Semantics |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (2) |
|
4 Variety: Classification and Clustering |
|
|
51 | (17) |
|
|
52 | (5) |
|
4.2 Supervised Classification |
|
|
57 | (6) |
|
4.3 Unsupervised Classification / Clustering |
|
|
63 | (3) |
|
|
66 | (1) |
|
|
66 | (2) |
|
5 Virality: Networks and Information Propagation |
|
|
68 | (11) |
|
5.1 Crisis Information Networks |
|
|
69 | (4) |
|
5.2 Cascading of Crisis Information |
|
|
73 | (3) |
|
5.3 User Communities and User Roles |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
78 | (1) |
|
6 Velocity: Online Methods and Data Streams |
|
|
79 | (17) |
|
|
80 | (1) |
|
6.2 Analyzing Temporal Data |
|
|
81 | (2) |
|
|
83 | (2) |
|
6.4 Event-Detection Methods |
|
|
85 | (5) |
|
6.5 Incremental Update Summarization |
|
|
90 | (2) |
|
6.6 Domain-Specific Approaches |
|
|
92 | (2) |
|
|
94 | (1) |
|
|
94 | (2) |
|
7 Volunteers: Humanitarian Crowdsourcing |
|
|
96 | (14) |
|
|
97 | (2) |
|
7.2 Organized Digital Volunteering |
|
|
99 | (3) |
|
7.3 Motivating Volunteers |
|
|
102 | (2) |
|
7.4 Digital Volunteering Tasks |
|
|
104 | (3) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
8 Veracity: Misinformation and Credibility |
|
|
110 | (13) |
|
8.1 Emergencies, Media, and False Information |
|
|
111 | (2) |
|
8.2 Policy-Based Trust and Social Media |
|
|
113 | (1) |
|
8.3 Misinformation and Disinformation |
|
|
114 | (1) |
|
8.4 Verification Practices |
|
|
115 | (2) |
|
8.5 Automatic Credibility Analysis |
|
|
117 | (4) |
|
|
121 | (1) |
|
|
122 | (1) |
|
9 Validity: Biases and Pitfalls of Social Media Data |
|
|
123 | (15) |
|
9.1 Studying the "Offline" World Using "Online" Data |
|
|
124 | (2) |
|
|
126 | (2) |
|
9.3 Content Production Issues |
|
|
128 | (1) |
|
9.4 Infrastructure and Technological Factors |
|
|
129 | (1) |
|
9.5 The Geography of Events and Geotagged Social Media |
|
|
130 | (4) |
|
9.6 Evaluation of Alerts Triggered from Social Media |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (2) |
|
10 Visualization: Crisis Maps and Beyond |
|
|
138 | (14) |
|
|
138 | (4) |
|
|
142 | (3) |
|
|
145 | (4) |
|
|
149 | (1) |
|
|
150 | (2) |
|
11 Values: Privacy and Ethics |
|
|
152 | (12) |
|
11.1 Protecting the Privacy of Individuals |
|
|
153 | (3) |
|
11.2 Intentional Human-Induced Disasters |
|
|
156 | (1) |
|
11.3 Protecting Citizen Reporters and Digital Volunteers |
|
|
157 | (1) |
|
11.4 Ethical Experimentation |
|
|
158 | (1) |
|
11.5 Giving Back and Sharing Data |
|
|
159 | (2) |
|
|
161 | (1) |
|
|
162 | (2) |
|
12 Conclusions and Outlook |
|
|
164 | (7) |
|
12.1 The Quality of Crisis Information |
|
|
165 | (1) |
|
12.2 Peer Production of Crisis Information |
|
|
166 | (1) |
|
12.3 Technologies for Crisis Communications in Social Media |
|
|
167 | (1) |
|
12.4 User-Generated Images, Video, and Aerial Photography |
|
|
167 | (1) |
|
|
168 | (3) |
Bibliography |
|
171 | (38) |
Index |
|
209 | (2) |
Terms and Acronyms |
|
211 | |