Open access peer-reviewed chapter

In the Eye of the Storm: Social Media and Crisis Management

Written By

Serge Banyongen

Submitted: 29 May 2022 Reviewed: 12 December 2022 Published: 17 May 2023

DOI: 10.5772/intechopen.109449

From the Edited Volume

Crisis Management - Principles, Roles and Application

Edited by Carine Yi

Chapter metrics overview

104 Chapter Downloads

View Full Metrics

Abstract

Social media, also called Web 2.0, is a generic term used to talk about applications that allow users to create, manipulate, and disseminate content as much as possible in real time. These applications allow for several possibilities that range from involvement to participation, communication, and collaboration of users. They allow everyone with minimal access to the Internet to publish, share, review, comment, and post items, such as mentions, comments, information, videos, and photos. In a crisis, social media becomes a double-edged sword. It can play an essential role during the prodromal, acute, chronic, and resolution phases of natural disasters and human-made crises. Social media can also be at the origin of the crisis or the reason for its amplification. Social media facilitates an increase of interactions between main actors at the center of a crisis. This chapter combines social media content analysis (opinion detection and sentiment analysis) with network analysis (ego network analysis) and nodes centrality assessment to critically evaluate how social media affects the crisis management process.

Keywords

  • social media
  • crisis informatics
  • ego network analysis
  • nodes centrality
  • content analysis

1. Introduction

The Internet has taken only a quarter of the time it took television channels to become popular. Users themselves set the trends and shape the framework in which organizations interact with them. Networks are driving the evolution of ever shorter messages, delivered with increasing frequency through a plurality of means and channels. Social media, also called Web 2.0, is a generic term used to refer to applications that allow their users to create, manipulate, and distribute content as much as possible in real time. These applications allow for several possibilities that range from involvement to participation, communication, and collaboration of users. They allow everyone with minimal access to the Internet to publish, share, review, comment, and post items, such as mentions, comments, information, videos, and photos. In this way, social media has distinguished itself from traditional websites. Kaplan et al. [1] have defined social media as “a group of internet-based applications that build on the ideological and technological foundations of Web 2.0 and allow the creation and exchange of user-generated content.”

Indeed, with social media, the user can generate their own content, unlike with websites where they can only view it [2]. Social media companies have unleashed persuasive platforms that generate useful data for public debates, socialization, and information exchange, increasing their impact on daily lives [3]. Therefore, social media has substantially increased communication channels by allowing a constant interaction of information and opinions on a one-to-one, one-to-many, and many-to-many communicative basis [1, 4]. Social media has made it possible to blur boundaries and time by articulating ubiquity and multisharing. A story can spread virally to millions of people in just a few minutes [4]. Social media is characterized by interactivity, user-generated content, and multidirectional communication flows. With social media, the immediacy of information takes a new form as it arrives in real time. The public is no longer made of the distant spectators they once were. They do their own research on the authenticity of the news and sometimes influence the course of an event. In this sense, social media blurred the lines between the public and the audience. While for a long time, traditional media users acted as an audience (i.e., a passive spectator of the content diffused from these media), social media users now act as a public (i.e., they can influence the course of events through their interactions and have agency over events). Almost 5 billion people are connected to the Internet, and more than half of humanity (4.2 billion people) was connected to social media in 2021. The number of social media users grows by almost 13% yearly [5]. The progress of social media is the result of globalization. Ulrich Beck, a German sociologist, links globalization and crisis. In his famous theory on risk society, Beck argued that risk is inherent to modern society. This concept highlights social media’s role as a bridge between globalization and crises. Social media has influenced crisis management in the health, corporate, nonprofit, religious, political, and natural disaster sectors [6].

As far as crises are concerned, just in 2021, a total of 432 catastrophic events were recorded (Figure 1). Floods dominated these events, with 223 occurrences, up from an average of 163 annual floods recorded across the 2001–2020 period. Storms were the second most frequently recorded disaster, with 121 events recorded in 20211.

Figure 1.

This figure demonstrates the top 10 economic losses and disaster trends (source: 2021 disasters in numbers).

Crisis management phasesNumber of articles
Mitigation11% (n = 24)
Preparedness23% (n = 50)
Response57% (n = 125)
Recovery9% (n = 20)

Table 1.

Breakdown of the corpus based on crisis management phases.

These numbers do not account for technical and human-made crises; if we were to add them, the tally will be higher. In fact, the more people use social media, the more researchers and practitioners need to understand social media’s impacts during a crisis [7]. This chapter focuses on the links between social media and crises, through the following research question: How is social media used in crisis management? Before responding to this question, the chapter will first outline the applied methodological approach, then explain critical features of social media that are involved in crisis management, and finally describe the two primary analysis trends of crises on social media that are regularly presented in the literature: the content analysis and the network analysis.

Advertisement

2. Use of social media in crisis management

When a crisis strikes, the team in charge of responding is always in need of tools to manage the overflow of information by summarizing it. Time being of the essence, it is critical to collect, review and classify high-value messages while using them to identify and manage issues as they arise or are amplified [8]. Social media has developed features that allow the crisis management team to perform disaster forensics [9].

Social media is essential throughout the crisis management process, from early detection to recovery. Social media has increased the volume of connections and the proactive nature of exchanges, which actively participate in a new form of crisis management [10]. This is mainly due to the trust relationship that social media has created with traditional media [11]. Thus, according to Timothy Coombs [12], researchers in crisis communication spotted the potential of social media long before traditional communications research [13]. Social media allows for an increase in the interactions of key actors at the center of a crisis, such as citizens, local communities, and officials from different levels of government [14]. This configuration is found in a crisis because people often are confined to hiding places, constrained by, among other things, the triggering of barricaded confinement. Many used social media to communicate with their relatives and reassure them of their conditions. However, what interests us here is the social media activity that manages this crisis. Thus, as Rainer et al. [15] have demonstrated, social media can be used to allow for effective crisis management in several aspects. First, the management of risk and the prediction of its occurrence. Indeed, monitoring social media in real time increases the speed and efficiency with which emergency managers can react. Qualitative and quantitative processing of social media content increases the likelihood of predicting mass behavior and better understanding potential risks [16].

Social media also allows for better risk analysis. The information gathered helps first responders assess the danger of the situation, from the sharing of information and knowledge about the site on social media to the extent of the damage and the number of victims. This allows response teams to adequately plan for specific resources and determine the appropriate scope of work before starting tasks that need to be done, even before these teams arrive on the scene.

Once a crisis begins, social media can be used to coordinate the efforts of different working groups. The crisis management team members can be tasked according to their skills and the needs in the field. Social media has become an essential tool in the organization of post-crisis aid and allows the coordination of different community organizations that want to help with relief efforts. By providing adequate and real-time information to people affected by the crisis, social media enable people to understand the full scope of the crisis and signal the presence of crisis managers.

The rapid and real-time dissemination of information is undoubtedly one of the most used functions of social media in times of crisis. It can help save lives. In addition, it offers the advantage of reaching people who are cut off from traditional means of communication, especially in developing countries, where there are often more mobile phones than landlines and more smartphones and handhelds than desktop computers.

Social media also puts the role of first witnesses back at the center of the intervention. These act as citizen journalists and transmit valuable information with regular updates on the situation on the ground. Responders cannot be everywhere and often have limited resources [17].

Web 2.0 reorients the narrative about the crisis and the public at the heart of it, defining the causes, identifying the issues, and predicting the consequential impact [18]. Austin et al. [19] reflected on an organization’s interactions over social media with its various audiences that produce, consume, and disseminate information during a crisis. Their model, called crisis communication through social media, has identified three types of social media to consider before, during, and after a crisis. Some influential creators create content and convey information about the situation that others consume. Followers consume the information provided by the creators. Inactive participants eventually use the data from the creators through word-of-mouth or through traditional media, which also follows creators. Researchers have recognized Twitter as playing a significant role during natural disasters.

Social media like Twitter provides a platform for the efficient organization of relief efforts and for strategic planning to avoid further human and material damage [20, 21, 22]. Web 2.0 technologies, social media, and media data mining are new technological forms that provide and gather information about the population affected by a crisis in an efficient manner [23, 24]. Social media help increase the flow of information between people directly affected and those close to them (family and friends). Most platforms have features that allow a user to let their loved ones know they are safe when a disaster occurs. This online reporting reassures others and better channels the search and rescue of those who need it most. Social media in crisis contexts allow for rapid updates on developments and continuous interaction with the community and neighborhood [25, 26].

In a crisis involving a sniper on the loose, it is wiser to use a phone to connect to social media than to speak in person, which would risk alerting the sniper of someone’s presence and attempting to call for safety. This was the situation in the shootings of May 14, 2022, in Buffalo, New York, and, in the terrorist attack of September 21, 2013, at the Westgate shopping mall in Nairobi, Kenya. In these situations, it appears as if texting and updating the status through social media provided information to relatives while it is safer to do so than calling and using the voice, which could result in letting the sniper where you are hiding. In the case of the attack of January 9, 2015, against the kosher grocery store in the suburbs of Paris, France, social media have helped in crowdsourcing with people on the ground and played a key role in supplementing the 24 h/7 television cycle to contribute to the increase of the post-stress resulting from the trauma of being exposed physically to those events [27, 28].

Now that types of social media and users and their practicality during a crisis have been identified, and the next section will examine how social media can be used during a crisis. The answer to this how follows the phases that evolve chronologically during a crisis.

Advertisement

3. Methodology framework

This research uses the convergent parallel design method to triangulate multiple data sources using quantitative and qualitative approaches (QUAN +QUAL). From this, links between two phenomena such as crises and social media can be analyzed, and further interpret the combined results [29]. This approach comes from one of the most regularly used studies concerning social media [30]. This chapter conducts a systematic review of literature about crises and social media to determine the trends. A literature review, which examines existing research and information on a chosen field of study, is a crucial component of a research study. Fink’s [31] definition of a research literature review as “a systematic, explicit, and reproducible method for identifying, evaluating, and synthesizing the existing body of completed and recorded work produced by researchers, scholars, and practitioners” corresponds to what we understand as a systematic literature review (p. 3). A systematic review is also a type of literature review. The main difference between a literature review and a systematic review is their focus on the research question; a systematic review is focused on a specific research question, whereas a literature review is not. The main objective of this type of research is to identify, review, and summarize the best available research on a specific research question. Systematic reviews are primarily used because reviewing existing studies is often more practical than conducting new research [32]. As adopted in this chapter, the review is predominantly descriptive to synthesize the critical aspects of using social media in crisis management.

The methodology followed was inspired by the work of Snelson [30], notably the four-stage approach, as well as the work of Kankanamge et al. [33], to highlight a comprehensive understanding of the use of social media in crisis (natural and man-made) management. The scientific articles used as a corpus in this chapter were selected from databases using four stages: pre-search, data collection, data cleaning, and analysis.

3.1 Data identification and collection

The research for this chapter was conducted from April to May 2022. Using Boolean search with keywords, such as social media and crisis management, articles were selected from the following databases: Academic Search Premier (n = 458); Applied Social Sciences Index and Statistics (n = 989); ProQuest (n = 370); Science Direct (n = 451); and Scopus (n = 693). These databases were chosen for their broad reach across multidisciplinary and interdisciplinary peer-reviewed journals. They also represent key research fields currently popular in scholarly publications. In studying links between social media and crisis, it is critical to research both the text and the context [34].

New specific keywords were included, such as social media and natural disasters, social media and organizational crisis, social media and reputation management, social media and image repair, crisis informatics, social media crisis communication, social media, and financial crisis, social media and political crisis, social media and economic crisis, social media and social crisis, and social media and scandal to reduce the scope of the research. The search was also restricted to the classic stages of crisis management as identified by Bundy et al. [35] and Lai & Wong, [36]: pre-crisis, crisis, and post-crisis. The articles retained for analysis were the ones with Boolean phrases, such as social media and crisis mitigation, social media and crisis preparedness, social media and crisis response, and social media and crisis recovery (Table 1). This research was also conducted to understand the influence of social media on the five “critical tasks” for leaders during crises, as identified by Boin et al. [37], namely: sense-making, decision-making, meaning-making, terminating, and learning.

3.2 Data cleaning

After filtering social media streams and reducing irrelevant information, the reference was identified by checking the title, abstract, key findings, and conclusion to ensure that each selected article was related to the research question. This methodological discrimination process brought down the total tally of articles from all databases to 219. Here is the following classification of articles based on the crisis management process:

3.3 Results

Content analysis was used to assess the corpus. “Content analysis is a research technique that is based on measuring the amount of something (violence, negative portrayals of someone, etc.) in a representative sampling of some mass-mediated popular form of art” ([38], p. 25). The “content” refers to words, meanings, pictures, symbols, ideas, themes, or any message that can be communicated. In content analysis, a systematic sample of texts is used in the study, and classification systems are devised to identify different features of the text, which are then counted with an emphasis on objectivity and reliability. This is done to describe the substance characteristics of message content, to describe the form characteristics of message content, to make inferences about audiences of content, and to predict the effects of content on audiences [39].

In the case of this research, content analysis was mainly used to find meaningful links between social media and the crisis management process, which prompted an assessment of the reliability of those two factors in the corpus using the kappa Cohen coefficient [40]. Cohen’s kappa coefficient is a statistical measurement that calculates the level of agreement between two variables according to a formula. As a general rule, kappa is always less than or equal to 1 [41]. When kappa is less than or equal to 0.20, the level of agreement between the variables is poor. This agreement is fair when the kappa is between 0.20 and 0.40; it is moderate if kappa is between 0.40 and 0.60; it is good when the kappa is between 0.60 and 0.80, and it is very good if the coefficient is between 0.80 and 1. The coding of the corpus was conducted using NVivo and R software until an 0.80 coefficient was obtained. Case studies are by far the most used approach in the corpus, with 64% (n = 140), while for data collection techniques, the content analysis, including literature reviews, accounts for 47% (n = 103). Next comes focus groups (28% n = 61), interviews (12% n = 26), surveys (8% n = 17), and finally fieldwork and observations (5% n = 11).

The corpus studied shows Twitter as the most used platform representing 43%, highlighting its real-time capacities to provide useful data as the crisis outspread, thus improving situation awareness [42]. Some applications, such as WhatsApp, are also widely used and are part of the 15% of the corpus represented under the terms specialized platforms. In most cases, the literature revealed the use of combined platforms, such as Twitter and Facebook, Facebook and Instagram, or links from the three abovementioned platforms to YouTube. It is worth mentioning that the total of platforms used surpassed 100% because some studies in the selected corpus combined platforms for their research.

As per the platforms, the results were observed as shown in Figure 2.

Figure 2.

List of social media platforms represented in the corpus.

Natural disasterCountryYearApplicationAuthors
Hokkaido EarthquakeJapan2018K-DiPSNakai et al. [112]
Lombok EarthquakeIndonesia2018CrowhelpRachmah et al. [113]
Gorkha EarthquakeNepal2015UrepGoda et al. [114]
Haiti EarthquakeHaiti2010UshahidiYates & Paquette [115]
Chile Earthquake and TsunamiChile2010Ushahidi
Wenchuan EarthquakeChina2008WebGISHuang et al. [116]
Saguenay FloodsCanada1996Hazus (web application, not mobile)Natev & Todorov [107]

Table 2.

Non-exhaustive list of web applications playing a key role during natural disasters as per the corpus.

Based on these findings, the literature provides tools and processes to assess data during the crisis on Facebook and Twitter, the most used platforms.

3.3.1 Data analysis through twitter

Twitter is a tool that has not always been used to its full potential during crises. Indeed, if citizens are massively present, their number increases substantially during a crisis, and some governments have often been reluctant to use this tool [43]. In addition to all the data identified above for Facebook and Twitter, during a crisis, it is the place from which rumors start that can impact the organization’s ability to resolve the crisis and, later, its reputation. This is why the analysis of network interaction seems the most interesting. To determine this, several researchers use NodeXL, a network in the form of a list point to symbolize the relationship that exists not only between Twitter users but especially their interaction on a particular piece of content [44, 45, 46]. Each action performed on Twitter leaves traces that form a network. NodleXL makes it possible to highlight the connection networks of Twitter users. This tool uses the Clauset-Newman-Moore algorithm to divide network users into subgroups and generate graphs that identify connections between users [45].

Twitter’s communication interface is quite flexible and allows for the exchange and communication through words with a more significant number of users, even if they do not follow each other. They are following each other and are not in the same network. Accounts on Twitter are both public, that is, visible to all, including those who are not registered as members, or else private, that is, visible only to those in one’s network [47, 48]. During a crisis, information is gathered by tracking keywords and tweets made from those words. This was seen during the Boston terrorist attack with the keyword #Bostonstrong, among others.

Twitter allows access to public tweets through two practical tools: the application programming interface (API) and streaming, enabling one to see the tweets at any time and see them as they are written. There can be three types of analysis: activity analysis, network analysis, and content analysis [47].

The calculation of statistics and indicators describing the activities Twitter activity captured in a dataset at a particular time relies primarily on processing these datasets based on specific communication profiles. The additional filtering of the data during a certain time, user, or keyword evaluation may also be necessary to better understand the activity on Twitter better.

The analysis of Twitter activity can be done temporarily. It then includes the overall volume of tweets plus the hourly volume of different types of tweets over time (original tweets, replies, unpublished retweets, revised retweets, tweets containing URLs, etc.). This analysis is also based on the volume of specific keywords (or clusters of keywords over time), the number of active users over some time (day, hour, day of the week) period (day, hour, minute), and the average number of tweets per user over a while.

3.3.2 Data analysis through Facebook

There are four primary actions on Facebook. You can either post a piece of information or a video, like someone’s post, comment on it or share it with your network of friends and admirers. The ability to spread is one of the things to measure with Facebook accounts. Outreach is an aggregation of the total number of pages, likes, friends, and people talking about it, those who spread the information back in turn, and the click-through rate obtained [49]. From a post, one can evaluate the viral nature of the data by determining the number of people who have shared it. This allows us to know the type of post that pushes the audience to action, however small it may be. Obtaining such data is crucial in post-crisis analysis because it gives an idea of the quality of information to look for in times of crisis [50, 51]. Applications such as Facebook Insights also provide information about page views by unique visitors, that is, those who came directly to the Facebook page without being driven there by an ad.

The engagement rate is generally one of the most calculated data on Facebook. It measures how well an organization interacts with its audience on Facebook. It is data that is calculated post-ante. It is an equation that divides the number of people who clicked, liked, commented, or shared the post by the number of people who have seen it. This aspect is critical during a crisis when you want to calculate the relevance of the diffusion of information [52]. It is necessary to transcend the reach rate (the number of people who have seen the post) because many accounts are fake or robotic and automatically generate traffic without the expected impact. The rate is a useful measure to evaluate the quality of the information content generated on Facebook. Only the account administrator can obtain it.

Advertisement

4. Key features of social media in crisis management

Several essential aspects of social media need to be assessed to understand its role in managing crises properly. One of these crucial aspects is the concept of a network, which, when studied, helps indicate how information is created.

4.1 Networks

Throughout history, networks have always been part of society, existing at the center of power [53]. They suggest how people have lived in society through their form and how people are connected through various positions. Indeed, people seem tailored to influence and interact with one another, and our brains seem wired to seek connectivity with others [54]. Linking globalization and the evolution of the information and communication technology of (ICT), Manuel Castells [55] explained that new relations using ICT have emerged, creating a new social structure. The analysis of social ties is a field that has grown in importance while establishing the sociology of information and communication techniques [56]. A social network is a social structure composed of individuals (or organizations) called “nodes,” linked by one or more specific types of interdependence, such as friendship; kinship; common interest; financial exchange; aversion; sexuality; or relationships of belief, knowledge, or prestige [57]. Scholarly literature has shown that it is impossible to manage a crisis through social media without a social network analysis (SNA), which refers to the regularities in the patterning of relationships among individuals, groups, or organizations. When a crisis arises, it is critical to understand how information circulates within a network, wherever the information has started or if social media simply amplify it.

4.2 Homophily

Although definitions of homophily differ in their specificity, their basic theoretical intent agrees that it is “the degree to which interacting pairs of individuals are similar in certain attributes” ([58], p. 402). Homophily is also “the tendency of individuals to interact with similar individuals” ([59], p. 463). Fincham explained that homophily acquires meaning for the individuals involved and thus influences their social interaction (2019). One of the important observations made by social scientists is this tendency in social groups to connect similar people (after all, birds of a feather flock together). This tendency significantly affects the values derived from social media, where people often encounter similar voices and interact with like-minded people. Homophily has predictive power in social media, so researchers can predict real-life friendships by looking at online interactions, common interests, and location [60]. This concept can be seen as correlated with the question: Who social media users view to be trustworthy in a crisis? It explains how information circulates during a crisis and key phenomena such as fake news and echo chambers.

4.3 Bubble filters

Bubble filter is the concept by which algorithms track your activities online and systematically arrange the content you have access to base on your preferences. These filters structure people’s online experience, isolating them from the information they have not previously expressed interest in [61]. The bubble filters are based on the selective exposure theory [62]. When managing a crisis, bubble filters represent a serious threat in the CMT attempt to reach out to targeted audiences through social media as the filters might not allow the information to go through their bubble of preferences [63]. While networks, homophily, and bubble filters are hindering the reach, echo chambers’ next concept impacts the message’s persuasiveness during a crisis.

4.4 Echo chambers

Integral to the echo chamber is the idea that opinions in the network are polarized with self-reinforcing nodes [64]. Online users decide to isolate themselves in the worlds of a shared imagination [65]. Recent studies have shown that online users tend to select the information that adheres to their belief systems, ignore information that does not, and join groups—that is, echo chambers—centered around a shared narrative. This concept can explain how it was difficult during the COVID-19 pandemic to present rational arguments against conspiracy theories [66, 67, 68, 69]. Information circulation is not the only critical aspect of social media related to a crisis; the speed of information travel is also essential. Other key features that link social media to a crisis include virality and buzz.

4.5 Virality

The concept of virality is borrowed from medicine and related to the proliferation of harmful viruses inside the human body, or in this case, society. Metcalfe’s law [70], which famously characterizes many of the effects seen in communication technologies and networks, from the Internet and social networking to the World Wide Web, could explain virality as a dynamic of information transmission speed on social media. The law states that the value of a telecommunications network is proportional to the square of the number of connected users of the system. According to Huberman et al. [71], virality is related to mimetics since it boils down to sharing and looking for information that other people are already looking for and sharing. People online are hungry for novelty and anything that sounds new.

4.6 Buzz

Crises on social media are by-products of bad buzz. This is another expression to designate electronic word-of-mouth that has the power to hinder an organization’s reputation. Since communication on social media happens in real time, most users have the privilege of being news breakers organizations managing crises should pay careful attention to that phenomenon.

Now that features of social media with the power to impact crises have been outlined, it is time to look at how social media, according to the literature, manage crises.

Advertisement

5. Crisis watch: social media monitoring

There are several factors to consider when monitoring the possibility of a crisis on social media. It involves tracking specific elements on the social media horizon to identify those that could be problematic. This monitoring provides crucial information in real time and on a continuous basis, covering controversial topics. At the same time, it gives access to new or hidden elements that emerge in conversations that an organization previously ignored, giving a whole new perspective on the subject.

Social media monitoring is an integral element of risk communication and, therefore, an essential component of any crisis communication strategy. Web 2.0 is where reputational risks are high, so it is advisable for 24/7 monitoring [72]. The purpose of monitoring is to identify radical opinions and elements that could damage an organization’s reputation and thus trigger a crisis [73] and identify all negative opinions in a general way [74]. In this way, social media monitoring can track the trajectory of comments and discussion patterns that emerge from different topics accompanying main comments, especially the profiles of the most influential people. Such a predisposition already draws the cartography of the action in a crisis. Time is the scarcest commodity during a crisis. The continuous monitoring of the networks allows one to know how to orient oneself during a crisis.

The social media monitoring process needs to be segmented into several steps to be effective [47, 75, 76]. First, the preparation is done based on objectives established beforehand in close connection with the organization’s mission. The proposal is not to monitor citizens’ private conversations but rather the information they have chosen to make public on social media. Although the first type of surveillance is espionage, the second type belongs to the field of strategic communication.

Preparing for a crisis takes an organization through the process of defining a crisis. Potential risks are identified for each organization in the crisis communication plan. The preparation phase also requires assessing the resources necessary to ensure adequate monitoring. Once preparation is done, the monitoring itself begins. At this stage, the main focus is on collecting critical data. As with any information-gathering exercise, it is essential to use an appropriate method. This can be done manually using Boolean operators or search engines [77]. The next step is to analyze the information. This can be done in a statistical, metric, or specific way on the activities, content, or network. This process is operationalized from the applications of the program interface designated API, which is a system of tools and resources in an operating system that allows an operating system to enable developers to create software applications such as Tweet Archivist, Tweetdeck, the Hootsuite galaxy of Hootsuite, Netvibes, and Trackur APIs [76]. Facebook and Twitter both offer APIs for data search, as do some free search engines such as Social Mention. Monitoring is an essential tool in the decision-making process in times of crisis [78, 79, 80]. In crisis cases, such as mass shootings, perpetrators have been vocal on social media for some time and could have been spotted with proper monitoring [81].

To summarize, following [76], a textual analysis that allows for understanding user opinions is necessary for monitoring. This requires specialists who work 24/7 by combining a manual approach with the appropriate software. Monitoring social media with essential information monitoring tools is critical in crisis management.

Advertisement

6. Response and recovery phases: social media analysis

The following section adopts a normative approach because, in the literature, the authors advised the crisis management team (CMT) on harvesting social media’s power to mitigate the crisis effects.

Social media increases information and knowledge during a crisis, whether the public is affected or not [82]. After social media monitoring comes social media analysis, which is the development and evaluation of tools to visualize, collect, and track social media data based on the particular requirements of a target application [83]. There are different types of data: The so-called structured data include the sociodemographic elements of the user; thematic data include content such as likes, comments, shares, and more; unstructured data can be stored and include, among other things, the identity of the ad, timestamp, username (of the author), the content of the posting, sometimes content, and occasionally even the type of posting. It is, therefore, advisable to adopt some practical approaches to social media analysis, such as thematic or trend-based analysis, opinion, and sentiment analysis, the structural method [84], or the ecosystem approach [85]. When responding to a crisis, collecting meaningful information and tracking its propagation are critical for a crisis management team [86].

Social media analysis during a crisis shows a clear difference in focus in the literature based on the research approaches where social science authors produce more qualitative research focusing on content analysis: opinion detection and sentiment analysis. In contrast, authors from the computers and health sciences fields emphasize quantitative research using structural methods with network analysis and computational methods as critical aspects of understanding how social media could be used to assess the crisis dynamic.

One of the key limitations in the literature is that there is little to no exchange and discussion between researchers and, more important, no comprehensive approach to analyses of response and recovery through social media. The following section will be divided into two main parts: It will first present the quantitative and then qualitative methods as they appear in the literature review.

6.1 Qualitative data analyses (QDA)

This section is about the research that displayed analysis of the impacts of social media on crises that mostly focus on text-based data. They describe the use of words, assess non-numeric data information, and explain the nature and deployment of key concepts and ideas related to the topic.

6.1.1 Content analysis

Opinion detection: During a crisis, social media can be used to gather necessary information, especially with the detection of opinions. The crisis management team struggled to convince people to abandon their homes in natural disasters such as the California wildfires in the United States. An opinion survey can help identify the fears and needs of people caught in the middle of a crisis like this one. Opinion research uses a thematic approach and requires an analysis process of social media content.

For this purpose, there are two main approaches [72]:

  1. Natural language processing analyzes representations and implicit meanings based on a vector of texts and meanings, leading to identifying degrees of positive or negative opinions of texts produced in social media.

  2. The semantic web approach detects explicit representations of the domain based on the semantic annotations that trace the ontology of the text from keywords or tags.

Both approaches focus on detecting opinions on social media to provide senior executives with a rational basis for deciding which topics are the determinants of important topics to monitor on social media. Opinion detection on social media has often been used to predict major trends in practice and acceptable organizational standards.

Some authors have found strong links between social media opinions and real-life events [8, 87, 88]. The detection of opinions on social media can be done through several steps: detection, tracking, classification, and verification—especially in a crisis involving rumors, such as bombing alerts and cyber crises [89].

First, one must identify the contributor (i.e., the one who is expressing the opinion). Second, the sentiments they express must be classified. According to the classic positive/negative/neutral approach, this classification highlights two essential aspects: polarization and information. The next step is the representation scale, a numerical determination of an opinion’s degree of negativity (−1) or positivity (+1). Finally, it is important to look at the purpose of the opinion: what subjects it deals with, who it is about, and what events it is about [90]. For each text, an opinion can be represented by rhetorical aspects, concepts used, and keywords [72]. These opinions are extracted as algorithms that combine the time at which the opinions were expressed, the average of the opinions on a particular topic, the average subjectivity of each opinion, the standard of positive and negative opinions, and the total number of views [90].

6.1.2 Sentiment analysis

Once opinion detection has been achieved, and the classification is done, managing a crisis through social media should lead to sentiment analysis, which is critical when managing situations such as recovery from natural disasters [91].

Sentiment analysis in social media, especially during a crisis, combines the factual elements in the text with the expression of emotions for an effective evaluation of content produced by both individuals and online communities [92, 93, 94]. This analysis combines phrases and keywords [90]. It performs a morphological analysis by determining the nouns and verbs used in each sentence using a software program, according to the following declination: a taxonomy of emotion-related words paired according to their common root. This allows a lexical determination based on verbal forms, for example. It is then essential to contextualize the use of the words [95]. These words may be related to feelings, but what they are meant to express may be different depending on the context and the collective understanding community in which they are used [96]. The root match here is no longer enough. Sentiment detection identifies comments found in texts and blogs and annotates them independently of the main articles to aggregate the sentiments appropriately. Sentiment grammar identifies these and then associates them with relevant targets and the owners of those opinions. Sentiment aggregation combines the scores of each feeling expressed on the networks [97].

To better analyze feelings on social media in a crisis, it is necessary to understand them through the dichotomy of normative and informative elements that govern the formation of an opinion. In the processing of a statement, the normative elements are the socialization of the person, their rank within the group and the group itself, and the acquisition of values through an accumulation of information. This element is therefore linked to the subject [98]. This aspect is seen as being stable and difficult to change because of the exposure to social media content. The informational element is related to the purpose of the exchange. It is more likely that social media users are more flexible in this regard and thus adopt or accept a point of view that is different from the one held (or not) before the social media interaction [72]. Sentiment analysis in social media combines psychological and sociological approaches to understand the building blocks of an individual’s behavior and, more importantly, their group attitude. Morphosyntactic labeling is one of the best ways to analyze feelings on social media [99]. It is a process of assigning a part of speech to each word in a sentence. This method is used to retrieve information and clarify ambiguity in what is said on networks, and it is essential in processing information. This process also allows easy classification in terms of the following:

  1. Closed grammatical categories with a fixed set of words and a determined function in a language, such as pronouns, prepositions, determiners, and conjunctions

  2. Closed class category composed of many words and even invented expressions; here, it is possible to find nouns, verbs, adjectives, and adverbs.

The process consists of finding borders between the implicit forms of the expressions and those belonging to the interacting group’s metaculture. Thus, sentiment analysis can be used to identify critical trends during increasing interaction on social networks [100], especially during crises.

Sentiment analysis is necessary during a crisis because it provides insight into the morale of users as well as their perceptions of the attribution dynamic. In crisis management, attribution theory is the one that consists in evaluating who is to blame for the crisis. It goes through the analysis of the threat, the determination of the initial responsibility, and the examination of the intensification factors with two elements in mind: consistency (this type of crisis has happened before) and what distinguishes the crisis from other crises [12]. Depending on the nature of the crisis, the thoughts and perceptions of victims, key players, and the public can increase the accountability of the crisis and damage the reputation of the organizations involved or affected by it. The analysis of social media sentiments in this context offers the opportunity to gauge the perception of those immersed in the heart of this crisis and those closely observing its unfolding. The position of the actors at the front of the scene has an impact on the general interpretation of the evolution of the crisis. There are close links between the attribution of responsibility in a crisis and the post-crisis reputation of an organization [79, 101, 102, 103, 104]. One could use social networks by scanning opinions and analyzing sentiments on social networks. It is therefore possible to determine how the crises were perceived by those who experienced them from the front lines.

6.2 Quantitative analysis

This section focuses on the literature that describes the use of data models and statistics to explain the complexity and the links between social media and crisis management.

6.2.1 Network analysis

SNA provides information on how people and institutions function during and after disasters and adapt to hazard settings [105]. SNA is the mapping and measurement of relationships and flows between connected people, groups, organizations, computers, URLs, and other information/knowledge entities in a crisis. The network nodes are the people and groups, whereas the links show the relationships or flow between the nodes. SNA provides a visual and mathematical analysis of human relationships [106]. Organizational network analysis allows one to X-ray an organization and reveals the organizational nervous system that connects everything. The analysis of social ties is a field that has grown in importance from establishing the sociology of information and communication techniques [56].

Network analysis allows mapping conversations on a topic to distinguish network types based on their division, density, and direction [107]. There are two types of network analyses: egos network analysis (EAN) and complete network analysis. The EAN assesses the nodes that shape the relationships between actors in the network, making it possible to highlight the operating radius, the diameter of the node and its centrality, the proximity, and the betweenness interaction [108]. While managing a crisis, this exercise allows us to gauge the scope and, therefore, the capacity of influence of information circulating in the network. One can thus determine the nature of the network from the typology of Smith et al. [46]. The centrality of a node measures its prominence or structural importance in a network. A high centrality score can indicate power, influence, control, or status. Determining which node is the most “central” can help disseminate information more quickly in a network, stop epidemics, protect a network from disruption, and identify suspected terrorists, among other things. Network visualization allows for a series of centrality measures to identify the most influential nodes in a social network.

6.2.2 Netnography

Netnography is the adaptation of ethnographic studies on the behaviors and interactions of people on social media. It allows one to map out the key stakeholders and their behaviors during a crisis. It also helps the CMT to gain a clear understanding of the digital infrastructure involved in the crisis [109]. It provides information visualization critical to essential decision making, such as managing the response to a crisis. The technique was efficiently used in the case of the 2015 earthquake in Nepal to establish platforms of communication and effective collaboration between the officials managing the response to that disaster and the stakeholders (the general population and the victims; [110]). Netnography needs to be developed before the crisis, which allows the CMT to know exactly who to talk to and when as well as to anticipate their potential reaction by updating their frequently asked questions to respond appropriately and provide relief.

6.2.3 Applications for disaster

When it comes to crisis triggered by natural disasters, accurate and quality information is critical to predict, prevent and manage the situation. To manage such a crisis, there are a series of tracked metrics, such as TTR (time to respond); MTBF (mean time before failure); MTTR (mean time to recovery, repair, respond, or resolve); MTTF (mean time to failure); and MTTA (mean time to acknowledge), which can help teams properly implement their response. For extreme events such as natural disasters, it is critical to connecting people in need and dire situations with institutions and people who are willing or able to help. Numerous web applications have helped to achieve that results whether during earthquakes, hurricanes, floods, and snow storms by successfully enabling civilians to use their smartphone to produce data, describing the scene and channeling support [111]. Social media in general and web applications, in particular, have been involved in the short-term return to normalcy (Table 2) [117, 118].

On top making facilitating the collect data, disaster management apps also render the analysis and the process of these data easier by increasing data visualization thus transforming information (raw data) into intelligence (useful information) that could be used to save lives [119].

With the increased use of mobile technology, researchers dealing with crisis management have been developing applications that could help teams foster their ability to use the metrics mentioned above, enabling them to efficiently report, track, and share information as well as interact with victims during emergency situations [8]. The main advantage of these applications is how they leverage data to integrate them into multiple mobile technology sources, thus increasing victims’ contribution to the collective knowledge of the extreme event dynamics and intervention team visualization of the situation. These applications have proven useful for critically matching the needs with available resources at the right moment. In some cases, such as the earthquake in Haiti, interventions started on-site, thanks to applications like Ushahidi, an open-source platform providing insights into events happening in near-real time [115]. Crowdsourcing applications and volunteered geographic information have been used in numerous disasters for preparedness, mitigation, and response purposes (Figure 3).

Figure 3.

Breakdown of applications used per crisis type as appeared in the reviewed literature.

6.2.4 Community response grid

Social media network analysis also clearly allows CMT to understand community response grids (CRGs). CRGs integrate mobile technologies and social media, enabling people on a disaster site to report information and respond to instructions from the intervention team, thus facilitating intervention in large-scale emergencies [120]. According to Wu et al. [121], a CRG is a geographically based sociotechnical network that helps local communities become better prepared for and more resilient to emergencies. Empowered by the Internet and mobile technologies, the system helps local communities establish multichannel emergency communication, report emergencies to officials, receive information from official and community sources, coordinate peer-to-peer assistance, provide emotional support, and build trust.

Advertisement

7. Conclusion

Social media is incredibly present in people’s lives globally. It plays a critical role in managing crises as well. Research has reflected on multidisciplinary approaches to demonstrate the impact of social media on an organization’s mitigation, preparedness, readiness, and response and recovery deployment during a crisis. This chapter conducted a systematic literature review assessing how researchers have increasingly used real-life case study models considering related events, precursors, and unperceived variables to understand the governance of uncertainty through social media.

Content analysis focusing on discourse, narratives, videos, and pictures used during a crisis appears to be one of the main methods in the literature to outline social media’s influence during a crisis and its use by the crisis management team. Another important method in the domain present in the literature is the network analysis. Here, researchers focus on connectivity and interactivity by analyzing the use of centrality and the importance of nodes during a crisis. The degree of centrality is the most straightforward measure of node connectivity. Sometimes it is helpful to consider degree (number of inbound links) and degree (number of outbound links) as separate measures, for example, when examining transactional data or account activity during a crisis. This method allows the crisis management team to properly channel their responses into action by providing critical information about the most influential actors and subjects. Social media increases the understanding of two crucial elements during a crisis: stakeholders’ core needs and concerns. That said, this research has its own limitations. In effect, a crisis can be considered as both danger and opportunity, and social media presents a dangerous opportunity and must be handled with care in times of crisis. With its propensity to spread fake news, misinformation, and rumors, social media can often become a double-edged sword. It can be found at the origin of a crisis and can contribute to amplifying a crisis by amplifying it on a disproportionate scale. This dangerous aspect has not been addressed in this chapter and could become the object of another research project in the future in a holistic attempt to comprehend the main links between crisis management and the use of social media.

References

  1. 1. Kaplan M, Haenlein A, Haenlein M. Users of the world, unite! The challenges and opportunities of social media. Business Horizons. 2010;53:59-68
  2. 2. Earl J, Kimport K. Digital Enabled Social Change: Activism in the Internet Age. Cambridge: MIT Press; 2011. DOI: 10.7551/mitpress/9780262015103.001.0001
  3. 3. Quan-Haase A, Sloan L. Introduction to the handbook of social media research methods: Goals, challenges, and innovations. In: Sloan L, Quan-Haase A, editors. The SAGE Handbook of Social Media Research Methods. London: SAGE Publications Inc.; 2016. pp. 1-9. DOI: 10.4135/9781473983847.n1
  4. 4. Grubmüller V, Götsch K, Krieger B. Social media analytics for future oriented policy making. European Journal of Futures Research. 2013;1(1):20. DOI: 10.1007/s40309-013-0020-7
  5. 5. Cheng Y, Spruill T, Dalton C. Social media and crisis communication (SMCC). In: Jin Y, Austin LL, editors. Social Media and Crisis Communication. second ed. New York: Routledge; 2022
  6. 6. Jin Y, Austin LL. Social Media and Crisis Communication. Second ed. New-York: Routledge; 2022. DOI: 10.4324/9781003043409
  7. 7. Yan J, Liu BF, Austin LL. Examining the role of social media in effective crisis management: The effects of crisis origin, information form, and source on publics’ crisis responses. Communication Research. 2014;41(1):74-94
  8. 8. Saroj A, Pal S. Use of social media in crisis management: A survey. International Journal of Disaster Risk Reduction. 2020;4(101584):1-19
  9. 9. Masys AJ. Disaster Forensics: Understanding Root Cause and Complex Causality. Cham, Switzerland: Springer; 2016
  10. 10. Baron G. Response suggestions and public participation are the new norm in response management. Crisis Comm. 2010. Available from: http://www.emergencymgmt.com/emergency-blogs/crisis-comm/Response-Suggestions-and-Public-111510.html
  11. 11. Sweetser KD, Metzgar E. Communicating during the crisis: Use of blogs as a relationship management tool. Public Relations Review. 2007;33(3):340-342
  12. 12. Coombs WT. Crisis Communication and Social Media. Essential Knowledge Project; 2008
  13. 13. Wetzstein I, Grubmüller-Régent V, Götsch K, Rainer K. Crisis and social media: A metastudy on pertinent research and practice. Human Technology. 2014;10(2):95-124
  14. 14. Vihalemm T, Kiisel M, Harro-Loit H. Citizens’ response patterns to warning messages. Journal of Contingencies and Crisis Management. 2012;20(1):13-25
  15. 15. Rainer K, Grubmüller V, Pejic I, Götsch K, Leitner P. Social media applications in crisis interaction systems. Connecting Matter, Life, Culture and Technology. 2013;1(1):110-127
  16. 16. Špoljarić A. Managing crisis communication via social media. Naše gospodarstvo/Our Economy. 2021;67(1):23-32. DOI: 10.2478/ngoe-2021-0003
  17. 17. Bruns A. Crisis communication. In: Cunningham IS, Turnbull S, editors. The Media and Communications in Australia. Crows Nest, NSW: Allen & Unwin; 2014. pp. 351-355
  18. 18. van der Meer T, Verhoeven P. Public framing organizational crisis situations: Social media versus news media. Public Relations Review. 2013;39:229-231
  19. 19. Austin L, Fisher Liu B, Jin Y. How audiences seek out crisis information: Exploring the social-mediated crisis communication model. Journal of Applied Communication Research. 2012;40(2):188-207
  20. 20. Fincham K. Exploring political journalism homophily on twitter: A comparative analysis of US and UK elections in 2016 and 2017. Media and Communication. 2019;7(1):213-224
  21. 21. Goolsby R. Social media as crisis platform: The future of community maps/crisis maps. ACM Transactions on Intelligent Systems and Technology (TIST). 2010;1(1):1-11. DOI: 10.1145/1858948.1858955
  22. 22. Lee H, Palen A, Palen L. Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management. 2009;6(3-4):248-260
  23. 23. Backfried G, Göllner J, Quirchmayr G, Rainer K, Kienast G, Thallinger G, et al. Cross-media analysis for communication during natural disasters. Computer and Information Science. 2013;409:13-22
  24. 24. Buzoianu C, Bîra M. Using social media listening in crisis communication and management: New methods and practices for looking into crises. Sustainability. 2021, 2021;13(23):13015. DOI: 10.3390/su132313015
  25. 25. Jahng MR, Hong S. How should you tweet? The effect of crisis response voices, strategy, and prior brand attitude in social media crisis communication. Corporate Reputation Review. 2017;20(2):147-157. DOI: 10.1057/s41299-017-0022-7
  26. 26. Velev D, Zlateva P. In: Lijuan D, editor. Use of Social Media in Natural Disaster Management, International Proceedings of Economics Development and Research. Vol. 39. IACSIT Press; 2012. pp. 41-45. Available from: http://www.ipedr.com/vol39/009-ICITE2012-B00019.pdf [Assessed on December 28th, 2022]
  27. 27. Nilsen LG, Hafstad GS, Staksrud E, Dyb G. Five reasons for using social media among young terror survivors: Results from the Utøya study. Computers in Human Behavior. 2018;84:285-294. DOI: 10.1016/j.chb.2018.03.006
  28. 28. Robert M, Stene LE, Garfin DR, Vandentorren S, Motreff Y, du Roscoat E, et al. Media exposure and post-traumatic stress symptoms in the wake of the November 2015 Paris terrorist attacks: A population-based study in France. Frontiers in Psychiatry. 2021;12:509457. DOI: 10.3389/fpsyt.2021.509457
  29. 29. Creswell JW, Plano Clark VL. Designing and Conducting Mixed Methods Research. 2nd ed. Los Angeles: Sage Publications Ltd.; 2011
  30. 30. Snelson LC. Qualitative and mixed methods social media research: A review of the literature. The International Journal of Qualitative Methods. 2016;(1):1-15. DOI: 10.1177/16094069156245
  31. 31. Fink A. Conducting Research Literature Reviews: From the Internet to Paper. 4th ed. Thousand Oaks: Sage Publications, Inc; 2010
  32. 32. Rasmussen J, Øyvind I. Risk, crisis, and social media: A systematic review of seven years’ research. Nordicom Review. 2017;38(2):1-17. DOI: 10.1515/nor-2017-0393
  33. 33. Kankanamge N, Yigitcanlar T, Goonetilleke A, Kamruzzaman MD. Determining disaster severity through social media analysis: Testing the methodology with south East Queensland flood tweets. International Journal of Disaster Risk Reduction. 2019;42:101360. DOI: 10.1016/j.ijdrr.2019.101360
  34. 34. Zhu L, Anagondahalli D, Zhang A. Social media and culture in crisis communication: McDonald’s and KFC crises management in China. Public Relations Review. 2017;43:487-492
  35. 35. Bundy J, Pfarrer MD, Short CE, Coombs WT. Crises and crisis management: Integration, interpretation, and research development. Journal of Management. 2017;43(6):1661-1692
  36. 36. Lai IKW, Wong JWC. Comparing crisis management practices in the hotel industry between initial and pandemic stages of COVID-19. International Journal of Contemporary Hospitality Management. 2020;32(10):3135-3156
  37. 37. Boin A, Hart P, Stern E, Sundelius B. The Politics of Crisis Management: Public Leadership under Pressure. Second edition. Cambridge: Cambridge University Press; 2014. DOI: 10.1017/9781316339756
  38. 38. Berger AA. Media and Communication Research Methods: An Introduction to Qualitative and Quantitative Approaches. Third ed. Thousand Oaks: Sage; 2013
  39. 39. Neuendorf KA. The Content Analysis Guidebook. Second ed. SAGE Publications Inc.; 2017
  40. 40. MacKay M, Colangeli T, Gillis D, McWhirter J, Papadopoulos A. Examining social media crisis communication during early COVID-19 from public health and news media for quality, content, and corresponding public sentiment. International Journal of Environmental Research and Public Health. 2021;18(15):7986. DOI: 10.3390/ijerph18157986
  41. 41. Warrens MJ. Five ways to look at Cohen’s kappa. Journal of Psychology & Psychotherapy. 2015;5:197. DOI: 10.4172/2161-0487.1000197
  42. 42. Cameron MA, Power R, Robinson B, Yin J. Emergency situation awareness from twitter for crisis management. In: Proceedings of the 21st International Conference on World Wide Web. Lyon France; 2012. pp. 695-698
  43. 43. Helsloot I, Groenendaal J. Twitter: An underutilized potential during sudden crises. Research note. Journal of Contingencies and Crisis Management. 2013;21(3):179-183
  44. 44. Hansen D, Sheiderman B, Smith MA. Analyzing Social Media Networks with NodeXL: Insights from a Connected World. 2nd edition. Cambridge: Morgan Kaufmann; 2010
  45. 45. Pew Research Center, Social Media Foundation. How we analyzed Twitter social media networks with NodeXL. 2014. Available from: http://www.pewinternet.org/files/2014/02/How-we-analyzed-297 Twitter-social-media-networks.pdf page [Assessed: April 14, 2022]
  46. 46. Smith A, Marc Lee Rainie, Ben Shneiderman, ItaiHimelboim. Mapping twitter topic networks: From polarized crowds to community clusters, report, pew research center. 20 February, 2014;2014. Available from: https://www.researchgate.net/publication/260478854_Mapping_Twitter_Topic_Networks_From_Polarized_Crowds_to_Community_Clusters
  47. 47. Bruns A, Liang Y. Tools and methods for capturing twitter data during natural disasters. First Monday. 2012;17:4-3. DOI: 10.5210/fm.v17i4.3937
  48. 48. Bruns A, Burgess J, Crawford K, Shaw F. #Qldfloods and @QPSMedia: Crisis Communication on Twitter in the 2011 South East Queensland Floods. Brisbane: ARC Centre of Excellence for Creative Industries and Innovation; 2012
  49. 49. Loukouman A. Le marketing des réseaux sociaux. Paris: MA Éditions; 2012
  50. 50. Ki E-J, Nekmat E. Situational crisis communication and interactivity: Usage and effectiveness of Facebook for crisis management by fortune 500 companies. Computers in Human Behavior. 2014;35:140-147. DOI: 10.1016/j.chb.2014.02.039
  51. 51. Hagen L, Keller T, Neely S, DePaula N, Robert-Cooperman C. Crisis Communications in the Age of Social Media. Social science computer review. 2018;36(5):523-541. DOI: 10.1177/0894439317721985
  52. 52. Kelleher T. Conversational voice, communicated commitment, and public relations outcomes in interactive online communication. Journal of Communication. 2009;59(1):172-188. DOI: 10.1111/j.1460-2466.2008.01410.x
  53. 53. Ferguson N. The Square and the Tower. Networks and Power, from the Freemasons to Facebook. New-York: Penguin Books; 2019
  54. 54. Fowler CA, Fowler JH. Connected: The Surprising Power of our Social Networks and How they Shape our Lives—How your friends’ friends’ Friends Affect Everything you Feel, Think, and Do. New York: Back Bay Books; 2011
  55. 55. Castells M. The Rise of the Network Society. second ed. Chichester, West Sussex; Malden, MA: Willey Blackwell; 2011
  56. 56. Dagiral É, Martin O. Liens sociaux numériques. Sociologie. 2017;1(8)
  57. 57. Huisman M, van Duijn MAJ. Software for social network analysis. In: Carrington PJ, Scott J, Wasserman S, editors. Models and Methods in Social Network Analysis. Cambridge, New York: Cambridge University Press; 2005. pp. 270-316
  58. 58. Ferber PH, Pugliese RR. Partisans, proximates, and poker players: The impact of homophily and proximity on communication patterns of state legislators. Polity. 2000;32:401-141
  59. 59. Hirsch BT, Suzanne P, Stephanie AH, Stanley DG. Genetic relatedness does not predict racoon social network structure. Animal Behaviour. 2013;85(2):463-470. DOI: 10.1016/j.anbehav.2012.12.011
  60. 60. Bischoff K. We love rock “n” roll: Analyzing and predicting friendship links in Last.fm. Presented at the WebSci ‘12: Proceedings of the 3rd Annual ACM Web Science Conference: 2012. DOI: 10.1145/2380718.2380725
  61. 61. Pariser E. The Filter Bubble: How the New Personalized Web Is Changing What we Read and How we Think. London: Pinguin Editions; 2012
  62. 62. Dahlgren PM. A critical review of filter bubbles and a comparison with selective exposure. Nordicom Review. 2021;42(1):15-33. DOI: 10.2478/nor-2021-0002
  63. 63. Nemoto Y, Klyuev V. Tool to retrieve less-filtered information from the internet. Information. Basel: MDPI AG. 2021;12:65. DOI: 10.3390/info12020065
  64. 64. Törnberg P. Echo chambers and viral misinformation: Modeling fake news as complex contagion. PLoS One. 2018;13(9):e0203958. DOI: 10.1371/journal.plsone.0203958
  65. 65. Huyghe FB. Fake news, la grande peur. Versailles: VA Press; 2018
  66. 66. Cinelli M, Quattrociocchi W, Galeazzi A, Valensise CM, Brugnoli E, Schmidt AL, et al. The COVID-19 social media infodemic. Scientific Reports. 2020;10:05004
  67. 67. Li Z, Qiu H, Zhou Q. Social-mediated diffusion of conspiracy theories about COVID-19: A study integrating SMCC and TPB models. International Journal of Human–Computer Interaction. 2022;38(7):680-689
  68. 68. Scannell D, Desens L, Guadagno M, Tra Y, Acker E, Sheridan K, et al. COVID-19 vaccine discourse on twitter: A content analysis of persuasion techniques, sentiment, and mis/disinformation. Journal of Health Communication. International Perspectives. 2021;26(7):443-459
  69. 69. Wen-Ying S, Budenz A. Considering emotion in COVID-19 vaccine communication: Addressing vaccine hesitancy and fostering vaccine confidence. Health Communication. 2021;35(14):1718-1722
  70. 70. Metcalfe B. Metcalfe’s law after 40 years of Ethernet. IEEE Computer. 2013;46(12):26-31. DOI: 10.1109/MC.2013.374
  71. 71. Huberman AB, Romero DM, Wu F. Social networks that matter: Twitter under the microscope. First Monday. 2009;14(1):1-9
  72. 72. Sobkowicz P, Kaschesky M, Bouchard G. Opinion mining in social media: Modeling, simulating, and forecasting political opinions in the web. Government Information Quarterly. 2012;29(4):470-479
  73. 73. Yang M, Kiang M, Ku Y, Chiu C, Li Y. Social media analytics for radical opinion mining in hate group web forums. Journal of Homeland Security and Emergency Management. 2011;8(1):1-17
  74. 74. Campbell C, Pitt LF, Parent M, Berthon P. Tracking back-talk in consumer-generated advertising. Journal of Advertising Research. 2011;51(1):224-238
  75. 75. Bengston DN, Fan DP, Reed P, Goldhor-Wilcock A. Rapid issue tracking: A method for taking the pulse of the public discussion of environmental policy. Environmental Communication. 2009;3(3):367-385
  76. 76. Ruggiero A, Marita V. Social media monitoring for crisis communication: Process, methods, and trends in the scientific literature. Online Journal of Communication and Media Technologies. 2014;4(1):105-130
  77. 77. Rappaport SD. Listening solutions. Journal of Advertising Research. 2010;50(2):197-213. DOI: 10.2501/S00218491009135X
  78. 78. Coombs WT, Holladay JS. Unpacking the halo effect: Reputation and crisis management. Journal of Communication Management. 2006;10(2):123-137
  79. 79. Coombs WT, Holladay JS. The paracrisis: The challenges created by publicly managing crisis prevention. Public Relations Review. 2012;38(3):408-415
  80. 80. Karafillakis E, Martin S, Simas C, Olsson K, Takacs J, Dada S, et al. Methods for social media monitoring related to vaccination: Systematic scoping review. JMIR Public Health and Surveillance. 2021;7(2):e17149. DOI: 10.2196/17149
  81. 81. Ebner J, Chris K, Harvey W. Is there a language of terrorists? a comparative manifesto analysis. Studies in Conflict & Terrorism. 2022;45(12):1-12. DOI: 10.1080/1057610X.2022.2109244
  82. 82. Liu F, Xu D. Social roles and consequences in using social media in disasters: A structurational perspective. Information Systems Frontiers. 2018;20(4):693-711. DOI: 10.1007/s10796-017-9787-6
  83. 83. Zeng D, Chen H, Lusch R, Li S. Social media analytics and intelligence. IEEE Intelligent Systems. 2010;25(6):13-16
  84. 84. Stieglitz S, Dang-Xuan L. Social media and political communication: A social media analytics framework. Social Network Analysis and Mining. 2013;3:1277-1291
  85. 85. Larson K, Watson RT. The value of social media: Toward measuring social media strategies. Paper presented at the 32nd International Conference on Information Systems (ICIS). Shanghai, China; 2011
  86. 86. Macnamara J. New insights into crisis communication from an “inside” emic perspective during COVID-19. Public Relations Inquiry. 2021;10(2):237-262
  87. 87. Kramer AD. An unobtrusive behavioral model of “gross national happiness.” [conference presentation]. In: SIGCHI Conference on Human Factors in Computing Systems, Atlanta, GA, USA. New York, NY, USA: Association for Computing Machinery; 2010. pp. 287-290
  88. 88. Thelwall M, Buckley K, Paltoglou G. Sentiment in twitter events. Journal of the American Society for Information Science and Technology. 2011;62:406-418
  89. 89. Zubiaga A, Aker A, Bontcheva K, Liakata M, Procter R. Detection and resolution of rumours in social media: A survey. ACM Computing Surveys. 2018;51(2):1-32
  90. 90. Maynard D, Gerhard G, Funk A, Fisichella M. Should I care about your opinion? Detection of opinion interestingness and dynamics in social media. Future Internet. 2014;6:457-481
  91. 91. Beigi G, Hu X, Maciejewski R, Liu H. An overview of sentiment analysis in social media and its applications in disaster relief. In: Pedrycz W, Chen SM, editors. Sentiment Analysis and Ontology Engineering. Studies in Computational Intelligence. Vol. 639. Cham: Springer; 2016. DOI: 10.1007/978-3-319-30319-2_13
  92. 92. Chmiel A, Sienkiewicz J, Thelwall M, Paltoglou G, Buckley K, Kappas A, et al. Collective emotions online and their influence on community life. PLoS One. 2011;6:e22207
  93. 93. Sobkowicz P, Sobkowicz A. Two-year study of emotion and communication patterns in a highly polarized political discussion forum. Social Science Computer Review. 2012;30(4):448-469. DOI: 10.1177/0894439312436512
  94. 94. Ding F, Liu Y. Modeling opinion interactions in a BBS community, The European Physical Journal B. 2010;78:245-252. DOI: 10.1140/epjb/e2010-10453-9
  95. 95. Öztürk N, Ayvaz S. Sentiment analysis on twitter: A text mining approach to the Syrian refugee crisis. Telematics and Informatics. 2018;35(1):136-147. DOI: 10.1016/j.tele.2017.10.006
  96. 96. Fersini E. Sentiment analysis in social networks: A machine learning perspective. In: Pozzi FA, Fersini E, Messina E, Liu B, editors. Sentiment Analysis in Social Networks. Cambridge, MA: Morgan Kaufmann; 2017. pp. 91-111
  97. 97. Kaur HJ, Kumar R. Sentiment analysis from social media in crisis situations. International Conference on Computing, Communication & Automation. 2015:251-256. DOI: 10.1109/CCAA.2015.7148383
  98. 98. Banyongen S. Terrorisme et communication de crise. Paris: Connaissances et Savoirs; 2016
  99. 99. Liu Bing. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data. Berlin: Springer; 2011
  100. 100. Stieglitz S, Dang-Xuan L, Burns A, Neuberger C. Social media analytics: An interdisciplinary approach and its implications for information systems. Business & Information Systems Engineering. 2014;2:89-96
  101. 101. Coombs WT, Holladay JS. Communication and attributions in a crisis: An experimental study of crisis communication. Journal of Public Relations Research. 1996;8(4):279-295
  102. 102. Coombs WT, Holladay JS. An extended examination of the crisis situation: A fusion of the relational management and symbolic approaches. Journal of Public Relations Research. 2001;13:321-340
  103. 103. Coombs WT, Holladay JS. Helping crisis managers protect reputational assets: Initial tests of the situational crisis communication theory. Management Communication Quarterly. 2002;16:165-186
  104. 104. Coombs WT, Schmidt L. An empirical analysis of image restoration: Texaco's racism crisis. Journal of Public Relations Research. 2000;12(2):163-178
  105. 105. Jones E, Faas AJ, editors. Social Network Analysis of Disaster Response, Recovery, and Adaptation. Kidlington, Oxford: Elsevier Science & Technology; 2016
  106. 106. Romascanu A, Ker H, Sieber R, Greenidge S, Lumley S, Bush D, et al. Using deep learning and social network analysis to understand and manage extreme flooding. Special Issue: Knowledge, Semantics and AI for Risk and Crisis Management. 2020;28(3):251-261
  107. 107. Miroslav N, Todorov N. Hazus: A standardized methodology for flood risk assessment in Canada. Canadian Water Resources Journal/Revue canadienne des ressources hydriques. 2013;38(3):223-231. DOI: 10.1080/07011784.2013.801599
  108. 108. Oggier F, Datta A, Phetsouvanh S. An ego network analysis of sextortionists. Social Network Analysis and Mining. 2020;10:44. DOI: 10.1007/s13278-020-00650-x
  109. 109. Hoejgaard CD. Dealing with the Platform: The Role of Affordances in Netnography as Rapid Research. SAGE Research Methods; 2022. DOI: 10.4135/9781529600445
  110. 110. Subba R, Tung B. Online convergence behavior, social media communications and crisis response: An empirical study of the 2015 Nepal earthquake police twitter project. In: Proceedings of the 50th Hawaii International Conference on System Sciences. Hilton Waikoloa Village, Hawaii; 2017
  111. 111. Goncalves A, Silva C, Morreale P, Bonafide J. Crowdsourcing for public safety. IEEE International Systems Conference Proceedings. 2014;2014:50-56. DOI: 10.1109/SysCon.2014.6819235
  112. 112. Nakai H, Itatani T, Horiike R. Application software that can prepare for disasters based on patient-participatory evidence: K-DiPS: A verification report. International Journal of Environmental Research and Public Health. 2022;19:9694. DOI: 10.3390/ijerph19159694
  113. 113. Ida R, Gunawan E, Widiyantoro S, Sunarti E, Indah G, Marliyani, et al. Social networks and local communication network patterns following the destructive 2018 Lombok. Indonesia, earthquake sequence, Geomatics, Natural Hazards and Risk. 2022;13(1):451-473. DOI: 10.1080/19475705.2022.2033854
  114. 114. Goda K, Kiyota T, Pokhrel RM, Chiaro G, Katagiri T, Sharma K, et al. The 2015 Gorkha Nepal earthquake: Insights from earthquake damage survey. Frontiers in Built Environment. 2015;1:8. DOI: 10.3389/fbuil.2015.00008
  115. 115. Yates D, Paquette S. Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake. International Journal of Information Management. 2011;31(1):6-13
  116. 116. Huang Y, Hung Wong. Effects of social group work with survivors of the Wenchuan earthquake in a transitional community. Health and Social Care. 2012;21(3):327-337. DOI: 10.1111/hsc.12022
  117. 117. Ogie RI, James S, Moore A, Dilworth T, Amirghasemi M, Whittaker J. Social media use in disaster recovery: A systematic literature review. International Journal of Disaster Risk Reduction. 2022;70(2022):102783
  118. 118. Huang R, Huang R, Ju JHN, Li W. WebGIS-based information management system for landslides triggered by Wenchuan earthquake. Natural Hazards. 2012;65(3):1507-1517
  119. 119. Jason K, Jishnu V, Remya G. Web application for disaster management. International Journal of Advanced Research in Computer and Communication Engineering. 2019;8(2):293-296
  120. 120. Jaeger PT, Fleischmann KR, Preece J, Shneiderman B, Wu PF, Qu Y. Community response grids: Using information technology to help communities respond to bioterror emergencies. Biosecurity and Bioterrorism. 2007;5(4):335-345. DOI: 10.1089/bsp.2007.0034
  121. 121. Wu PF, Qu Y, Preece J, Shbeiderman B. Community response grid (CRG) for a university campus: Design requirements and implications. [conference presentation]. In: Fiedrich F, Van de Walle B, editors. Proceedings of the 5th International ISCRAM Conference. Washington, DC, USA; 2008

Notes

  • Source: https://reliefweb.int/sites/reliefweb.int/files/resources/2021_EMDAT_report.pdf.

Written By

Serge Banyongen

Submitted: 29 May 2022 Reviewed: 12 December 2022 Published: 17 May 2023