20
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Twitter in the Cross Fire—The Use of Social Media in the Westgate Mall Terror Attack in Kenya

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          On September 2013 an attack on the Westgate mall in Kenya led to a four day siege, resulting in 67 fatalities and 175 wounded. During the crisis, Twitter became a crucial channel of communication between the government, emergency responders and the public, facilitating the emergency management of the event. The objectives of this paper are to present the main activities, use patterns and lessons learned from the use of the social media in the crisis. Using TwitterMate, a system developed to collect, store and analyze tweets, the main hashtags generated by the crowd and specific Twitter accounts of individuals, emergency responders and NGOs, were followed throughout the four day siege. A total of 67,849 tweets were collected and analyzed. Four main categories of hashtags were identified: geographical locations, terror attack, social support and organizations. The abundance of Twitter accounts providing official information made it difficult to synchronize and follow the flow of information. Many organizations posted simultaneously, by their manager and by the organization itself. Creating situational awareness was facilitated by information tweeted by the public. Threat assessment was updated through the information posted on social media. Security breaches led to the relay of sensitive data. At times, misinformation was only corrected after two days. Social media offer an accessible, widely available means for a bi-directional flow of information between the public and the authorities. In the crisis, all emergency responders used and leveraged social media networks for communicating both with the public and among themselves. A standard operating procedure should be developed to enable multiple responders to monitor, synchronize and integrate their social media feeds during emergencies. This will lead to better utilization and optimization of social media resources during crises, providing clear guidelines for communications and a hierarchy for dispersing information to the public and among responding organizations.

          Related collections

          Most cited references3

          • Record: found
          • Abstract: found
          • Article: not found

          Crisis and emergency risk communication as an integrative model.

          This article describes a model of communication known as crisis and emergency risk communication (CERC). The model is outlined as a merger of many traditional notions of health and risk communication with work in crisis and disaster communication. The specific kinds of communication activities that should be called for at various stages of disaster or crisis development are outlined. Although crises are by definition uncertain, equivocal, and often chaotic situations, the CERC model is presented as a tool health communicators can use to help manage these complex events.
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Integrating social media into emergency-preparedness efforts.

              Bookmark
              • Record: found
              • Abstract: found
              • Article: not found

              Communicating with the public about emerging health threats: lessons from the Pre-Event Message Development Project.

              We sought to better understand the challenges of communicating with the public about emerging health threats, particularly threats involving toxic chemicals, biological agents, and radioactive materials. At the request of the Centers for Disease Control and Prevention, we formed an interdisciplinary consortium of investigative teams from 4 schools of public health. Over 2 years, the investigative teams conducted 79 focus group interviews with 884 participants and individual cognitive response interviews with 129 respondents, for a total sample of 1013 individuals. The investigative teams systematically compared their results with other published research in public health, risk communication, and emergency preparedness. We found limited public understanding of emerging biological, chemical, and radioactive materials threats and of the differences between them; demand for concrete, accurate, and consistent information about actions needed for protection of self and family; active information seeking from media, local authorities, and selected national sources; and areas in which current emergency messaging can be improved. The public will respond to a threat situation by seeking protective information and taking self-protective action, underlining the critical role of effective communication in public health emergencies.
                Bookmark

                Author and article information

                Contributors
                Role: Editor
                Journal
                PLoS One
                PLoS ONE
                plos
                plosone
                PLoS ONE
                Public Library of Science (San Francisco, USA )
                1932-6203
                2014
                25 August 2014
                : 9
                : 8
                : e104136
                Affiliations
                [1 ]Department of Emergency Medicine, Recanati School for Community Health Professions, Faculty of Health Sciences, Ben-Gurion University of the Negev, Beer Sheba, Israel
                [2 ]PREPARED Center for Emergency Response Research, Ben-Gurion University of the Negev, Beer Sheba, Israel
                [3 ]Ready.org.il – Emergency readiness and preparedness in Israel, Givatayim, Israel
                [4 ]Department of Health Systems Management, Faculty of Health Sciences, Ben-Gurion University of the Negev, Beer Sheba, Israel
                [5 ]Department of Psychology, Tel Hai Academic College, Kiryat Shmona, Israel
                University of Pittsburgh Medical Center, United States of America
                Author notes

                Competing Interests: The authors have declared that no competing interests exist.

                Conceived and designed the experiments: TS. Performed the experiments: TS DL. Analyzed the data: TS DL. Contributed reagents/materials/analysis tools: TS. Wrote the paper: TS. Contributed with the interpretation of data: BA AG LAD. Reviewed the manuscript, revised it and approved its final version: BA AG LAD.

                Article
                PONE-D-14-02682
                10.1371/journal.pone.0104136
                4143241
                25153889
                bc3a2f39-4892-410f-a458-71d2dbe2ea57
                Copyright @ 2014

                This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

                History
                : 21 January 2014
                : 10 July 2014
                Page count
                Pages: 11
                Funding
                The authors have no support or funding to report.
                Categories
                Research Article
                Computer and Information Sciences
                Information Technology
                Information Storage and Retrieval
                Natural Language Processing
                Text Mining
                Network Analysis
                Social Networks
                Medicine and Health Sciences
                Health Care
                Communication in Health Care
                Social Sciences
                Sociology
                Criminology
                Terrorism
                Communications

                Uncategorized
                Uncategorized

                Comments

                Comment on this article