A Methodology for Automatic Acquisition of Flood‐event Management Information From Social Media: the Flood in Messinia, South Greece, 2016

Author(s):  
Stathis G. Arapostathis
2019 ◽  
Vol 3 (1) ◽  
pp. 79
Author(s):  
Veby Sabrina Firdaus

Internet is one of the newest medias that has been commonly used by the public. One of the problems which has been happening very often lately is the misuse of the internet mostly done by teenagers in Indonesia on social media, where social media is often used as a tool of cyberbullying. This fact is the main reason why the creators made an event that is also a campaign to spread awareness and invitation to not do cyberbullying with the social media influencers and teenagers as our main target audience. The event was a fashion show mixed with theatre acting and hip hop music. The main theme shown for this fashion show is Street Style with a touch of hip hop music because lately, hip hop is one of the popular music genres among society, especially the young people. Hip hop is considered to be a popular genre because it is known for its critical lyrics with deep meanings. The creators use theories such as Event Management Theory, Fashion Show Theory, Music Theory, Theatrical Theory, Social Criticism Theory, Social Message Theory, Cyberbullying Theory and Social Media Theory. The main theories that are used are Campaign Theory and K. Berlo's Communication Theory. The creators held this event entitled “TRUCE" which means The True Elucidation of Cyberbullying. The creators hope that this event will have an effect in the eyes of the general public and prevent themselves to not do cyberbullying.


Author(s):  
Yan Chen ◽  
Dennis F. Galletta ◽  
Paul Benjamin Lowry ◽  
Xin (Robert) Luo ◽  
Gregory D. Moody ◽  
...  

A key approach in many organizations to address the myriad of information security threats is encouraging employees to better understand and comply with information security policies (ISPs). Despite a significant body of academic research in this area, a commonly held but questionable assumption in these studies is that noncompliance simply represents the opposite of compliance. Hence, explaining compliance is only half of the story, and there is a pressing need to understand the causes of noncompliance, as well. If organizational leaders understood what leads a normally compliant employee to become noncompliant, future security breaches might be avoided or minimized. In this study, we found that compliant and noncompliant behaviors can be better explained by uncovering actions that focus not only on efficacious coping behaviors, but also those that focus on frustrated users who must sometimes cope with emotions, too. Employees working from a basis of emotion-focused coping are unable to address the threat and, feeling overwhelmed, focus only on controlling their emotions, merely making themselves feel better. Based on our findings, organizations can enhance their security by understanding the “tipping point” where employees’ focus likely changes from problem-solving to emotion appeasement, and instead push them into a more constructive direction.Yan Chen is an associate professor at Florida International University. She received her PhD in management information systems from University of Wisconsin–Milwaukee. Her research focuses on information security management, online fraud, privacy, and social media. She has published more than 30 research papers in refereed academic journals and conference proceedings.Dennis F. Galletta is a LEO awardee, fellow, and former president of the Association for Information Systems and professor at University of Pittsburgh since 1985. He has published 108 articles and four books. He is a senior editor at MIS Quarterly and an editorial board member at the Journal of Management Information Systems, and has been on several other boards.Paul Benjamin Lowry is the Suzanne Parker Thornhill Chair Professor in Business Information Technology at the Pamplin College of Business at Virginia Tech. He has published more than 135 journal articles. His research areas include organizational and behavioral security and privacy; online deviance and harassment, and computer ethics; human–computer interaction, social media, and gamification; and decision sciences, innovation, and supply chains.Xin (Robert) Luo is Endowed Regent’s Professor and full professor of MIS at the University of New Mexico. His research has appeared in leading information systems journals, and he serves as an associate editor for the Journal of the Association for Information Systems, Decision Sciences Journal, Information & Management, Electronic Commerce Research, and the Journal of Electronic Commerce Research.Gregory D. Moody is currently Lee Professor of Information Systems at the University of Nevada Las Vegas, and director of the cybersecurity graduate program. His interests include information systems security and privacy, e-business, and human–computer interaction. He is currently a senior editor for the Information Systems Journal and Transactions on Human-Computer Interaction.Robert Willison is a professor of management at Xi’an Jiaotong–Liverpool University. He received his PhD in information systems from the London School of Economics. His research focuses on insider computer abuse, information security policy compliance/noncompliance, software piracy, and cyber-loafing. His research has appeared in refereed academic journals such as MIS Quarterly, Journal of the Association for Information Systems, Information Systems Journal, and others.


2019 ◽  
Vol 2 ◽  
pp. 1-6 ◽  
Author(s):  
Xiao Huang ◽  
Cuizhen Wang ◽  
Zhenlong Li

<p><strong>Abstract.</strong> Recent years have seen the growth of popularity in social media, especially in social media based disaster studies. During a flood event, volunteers may contribute useful information regarding the extent and the severity of a flood in a real-time manner, largely facilitating the process of rapid inundation mapping. However, considering that ontopic (flood related) social media only comprises a small amount in the entire social media space, a robust extraction method is in great need. Taking Twitter as targeted social media platform, this study presents a visual-textual approach to automatic tagging flood related tweets in order to achieve real-time flood mapping. Two convolutional neural networks are adopted to process pictures and text separately. Their outputs are further combined and fed to a visual-textual fused classifier. The result suggests that additional visual information from pictures leads to better classification accuracy and the extracted tweets, representing timely documentation of flood event, can greatly benefit a variety of flood mitigation approaches.</p>


Author(s):  
Murat Seyfi

This chapter describes how through globalisation and developments in communication technologies, the lifestyle of people has changed and developed as well. Now, events are re-designed with communication tools and are becoming an important part of social life. This study aims to determine and evaluate the factors affecting perceptions of the audience who take part in events realized via Facebook, or on another online platform. Since this study is implemented through a social media communication device, on an on-line platform, it differs from other studies and gives this area a new perspective. Data acquired from questions were prepared to test the hypothesis of the study were analysed by doing factor analysis and regression tests. The acquired results were discussed.


Author(s):  
Sue M. Tapsell ◽  
David J. Ball
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document