Instruction:
Answer the questions at the end of the case study (2-3 paragraphs per question). Include an introduction and conclusion. Provide reference and resources.
Case Study:
Twitter's Emerging Role in Disaster Communications
An Atlanta city councilman grabbed his phone when he saw a woman having a seizure on the street. Instead of calling 911 and waiting in line, Councilman Hall tweeted, "Need paramedic on John Wesley Dobbs and Jackson St." A woman was unconscious on the ground. Please RT”
Several councilman supporters called 911 after seeing his text. Paramedics rushed the woman to the hospital.
Twitter, famed for its daily updates and caustic political jibes, is increasingly used in emergency response. The tool allows users to gather and share emergency and catastrophe information faster than government agencies like the Red Cross.
As Hurricanes Harvey and Irma hit Texas and Florida, millions of tweets recorded flooding locations and times, growing in volume. Short communications reported on-the-ground situations and worried about missing family members. They also “retweeted” TV and state government news. Twitter tweets during natural catastrophes may give first-hand stories and real-time information about each area, frequently urging rapid rescue. A University of Colorado graduate student started Tweak the Tweet to enhance Twitter following a catastrophic Haitian catastrophe. Kate Starbird developed syntax for disaster-related tweets to help computer systems arrange and understand them (Figure 1.24). Hashtags—keywords preceded by a pound sign—were used to organize unstructured tweets about victims who needed aid. These let computers identify who participates, what is required, where the problem is, and what else is occurring. Researchers are developing methods to recognize traffic events from Twitter automatically. Twitter users report incidents, and authorities can receive real-time alerts.
Figure 1.24 Tweet reformatting improves disaster response.
Figure 1.24 Full ALT Text
Restructured tweets demand Twitter users to know more than most and employ that knowledge under pressure. Researchers are also developing machine learning and artificial intelligence methods to analyze millions of tweets to find information on catastrophe victims and collapsed structures. One way reveals lesser occurrences like food, medicine, or rescue requirements. To identify urgent incidents, the
The Red Cross and other disaster response groups know that people increasingly use Twitter for support and information during calamities. In one study, more than a quarter of respondents claimed they would send a direct Twitter message to emergency responders, unaware that assistance groups currently need to be prepared to monitor Twitter and other platforms. They also need more ways to evaluate this information. Though timely, is it accurate? A youngster may have overstated it, or a fraudster may have done it. Aid groups will benefit from social media feedback as artificial intelligence tactics evolve to monitor and analyze tweets.
Twitter's emergency response and catastrophe communications potential is intriguing despite its shortcomings. According to a survey, traditional and digital news channels posted 42% of emergency tweets. Critical eyewitness statements were 9%. According to Federal Emergency Management Center chief Craig Fugate, “Social media can empower the public to be part of the response, not as victims to be taken care of.”
Discussion Questions
1-25. What are the potential benefits of Twitter and other social media for emergency and disaster communications?
1-26. What are the potential risks of using Twitter and other social media for emergency and disaster communications?
1-27. What types of education would be necessary at the user level to make Twitter and other social media more effective for emergency and disaster communications?
1-28. What would need to happen on the part of aid organizations and traditional media for Twitter and other social media to be effective in emergency and disaster communications?
Trending nowThis is a popular solution!
Step by stepSolved in 3 steps
- Chapter 13 – Mobile Devices in Computer Forensics Review Questions (4 points) What are the different roles of mobile devices in crime? Answer: What problems do prepaid phones pose to investigators? Answer: What is mobile phone cloning? Answer: Which kinds of evidence can be retrieved from mobile phones and PDAs? Answer: Practical Exercise (3 points) Mobile devices have been the objectives of crimes (target). They have been utilized to commit crimes (tool). Sometimes the devices simply hold evidence of crimes (incidental). Conduct an online search for a case not described in this chapter where a mobile device was involved in a criminal or civil investigation. Name and reference/link the case that you discovered. Answer: What were some of the case’s critical facts? Answer: What was the specific role(s) of the mobile device in the investigation? Answer: (Continued on next page) Critical Thinking Questions (3 points) New mobile devices are…arrow_forwardneed correct answer for this practice question pleasearrow_forwardIn this article, not only are the origins and effects of cyberbullying, but also the many proposed remedies, examined at length.arrow_forward
- Cyberbullying's origins, effects, and the many approaches of combating them are all explored at detail in this article.arrow_forwardHave you ever seen someone being bullied or harassed online by someone else? How did you react when you first learnt about the situation? How did you get to the conclusion that the person had been the target of bullying conduct previous to your intervention?arrow_forwardCASE STUDY #1: Uber Announces New Data Breach Affecting 57 Million Riders and Drivers Ridesharing company Uber Technologies, Inc. has disclosed that hackers have stolen the personal information of about 57 million customers and drivers, according to a report by Bloomberg News. The news outlet also reported that Uber discovered the data breach in late 2016 and then waited to disclose the news almost a year later. What was stolen? Chief Executive Officer Dara Khosrowshahi states in a press release on Uber’s website that the stolen information included the following: • The names and driver’s license numbers of around 600,000 drivers in the United States were stolen. It is important to note that the driver’s license numbers affect the drivers working for Uber and not their ridesharing customers. • Aside from the driver’s license numbers, other personal information of all 57 million Uber riders and drivers around the world was compromised: names, e-mail addresses, and mobile…arrow_forward
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY