Recent terrorist attacks have increased the need to examine the public's response to such threats. This study focuses on the content of Twitter messages related to the 2016 terrorist attack on the Berlin Christmas market. We complement the collective sense-making perspective with the terror management theory (TMT) perspective to understand why people used Twitter in the aftermath of the attack. We use structural topic modeling to analyze our dataset of 51,000 tweets. Our results indicate that people used Twitter to make sense of the events and as part of typical reactions in TMT, that is, to validate their own worldviews and maintain their self-esteem. In accordance with TMT, we found that people used Twitter to search for meaning and value, show sympathy for victims and their families, or call for tolerance, but also to express nationalistic sentiment and greater hostility toward values and views other than their own. We further show that topics varied over the course of the attack and in the days that followed. Whereas in the first two days there were many emotion-related tweets and operational updates, subsequent days saw more opinionrelated tweets. Our findings contribute to the literature on collective behavior in the aftermath of terrorist attacks.
Mobile emergency warning apps are essential for effective emergency communication – of course, provided the population intends to use them. Drawing on protection motivation theory, the study validated a psychometric model to explain what motivates individuals to install a warning app for the first time and to keep using it over time. Multi-group covariance-based structural equation modeling was used to model the answers to a survey that measured the drivers of intention to begin using or intention to continue using a warning app. The model shows that, for both non-users and users, trust, social influence, and response efficacy positively and maladaptive rewards negatively affect intention to use and intention to continue use warning apps. However, perceived vulnerability influences only intention to use, whereas response cost and self-efficacy affect continued use intention. Hence, this study enhances the theoretical understanding of technology-enabled protection behaviors and provides practitioners with a list of factors to consider for pushing the adoption and continued use of emergency warning applications.
Recent terrorist attacks have increased the need to examine the public’s response to such threats. This study focuses on the content of Twitter messages related to the 2016 terrorist attack on the Berlin Christmas market. We complement the collective sense-making perspective with the terror management theory (TMT) perspective to understand why people used Twitter in the aftermath of the attack. We use structural topic modeling to analyze our dataset of 51,000 tweets. Our results indicate that people used Twitter to make sense of the events and as part of typical reactions in TMT, that is, to validate their own worldviews and maintain their self-esteem. In accordance with TMT, we found that people used Twitter to search for meaning and value, show sympathy for victims and their families, or call for tolerance, but also to express nationalistic sentiment and greater hostility toward values and views other than their own. We further show that topics varied over the course of the attack and in the days that followed. Whereas in the first two days there were many emotion-related tweets and operational updates, subsequent days saw more opinion-related tweets. Our findings contribute to the literature on collective behavior in the aftermath of terrorist attacks.
Natural and human-made disasters such as floods, epidemics, and terrorist attacks pose significant threats to societies worldwide. To minimize causalties during disaster situations and respond effectively, those involved in disaster management depend on information. Research acknowledges widely that impediments to information access and diffusion can lead to a number of failures, such as inappropriate resource allocation, late warning, delayed evacuations, and counterproductive prioritization of sequential relief operations. These failures, in turn, can exacerbate a crisis escalation and even lead to higher numbers of causalties during disaster response. This is why effective use of emergency management information systems (EMIS) is crucial in disaster management. EMIS make it possible to store, visualize, distribute, and access disaster-related information; they enable digital representations of event-specific data and support information exchange among individuals involved in disaster management activities at different locations. EMIS include tools such as proprietary response software, databases, and radio equipment; warning systems such as sirens, radio, and warning apps, or open source software. Some EMIS, such as purpose-build systems, can be accessed only by a restricted user group, whereas other systems are publicly available, such as public social media. The support EMIS offer disaster management in providing relevant information and supporting collaboration within the involved user groups make their use critical. However, EMIS make a difference in disaster management only if they are leveraged and integrated effectively in the relevant activities. Effective use of EMIS means they support users such as those from professional emergency response, government agencies, and affected communities and businesses in taking informed actions to respond to a disaster event—which depends highly on accurate, relevant, and timely information. The overall objective of this cumulative dissertation is to help researchers and practitioners obtain a deeper understanding of the potential of EMIS for emergency-related information ex-change and how EMIS can be leveraged effectively. The studies included in this dissertation aim to provide theoretically grounded and empirically verified insights as well as practical rec-ommendations regarding the use of EMIS in disaster management by organizations and the public and how using EMIS can support disaster-related activities.
To counteract the spread of Covid-19, many countries have introduced mobile applications for contact tracing, which raises considerable questions about how these apps protect users’ information privacy. Through an exploratory analysis of Covid-19 contact tracing apps being used in Australia, France, Germany, Japan, and New Zealand, we identify normative and technical principles for the design of privacy-sensitive contact tracing apps. Based on a Restricted Access/Limited Control (RALC) account of information privacy, we discuss how the apps protect users’ information privacy through limiting access to and allowing users to actively manage their personal information. Our findings illustrate what understanding of information privacy is evident from the various designs of Covid-19 contact tracing apps, and how competing design principles can contribute to users’ information privacy. From a practical perspective, our findings can inform the design of contact tracing apps and the development of privacy approaches that can be applied in particular contexts. Our work thus bridges the gap between ethical design guidelines and technical analyses of specific implementations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.