Social Network Types: An Emergency Social Network Approach - A Concept of Possible Inclusion of Emergency Posts in Social Networks through an API

In current digital era, people are staring at their smart phones all the time: checking newest posts and messages of their connections in social network sites. At the same time, global attacks and armed accidents representing menace to public safety occur with continuously increasing frequency. In such times, it is important to use all possible communication channels for effective broadcasting of emergency information. During assaults, involving and threatening broad public, it is important to deliver emergency instructions about how to behave, what to do and which places to avoid, to affected civilians through exploitation of communication channels used by targeted receivers. Such information can save human lives through avoidance of entering dangerous areas and creating the necessary room for security forces to act by leaving the place of the accident free of civilians. This paper aims to propose a concept model of emergency broadcasting by utilizing social network sites for information dissemination. Instead of introducing a new social network type like an emergency network, it proposes a connecting point between the public governmental security forces and the social network sites in form of a first draft of a possible API in high level. The discussion part of this paper intends to highlight viable advantages and stress potential disadvantages of proposed concept.

[1]  Keith Mallinson,et al.  Smartphone Revolution: Technology patenting and licensing fosters innovation, market entry, and exceptional growth. , 2015, IEEE Consumer Electronics Magazine.

[2]  Mauro Conti,et al.  It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).

[3]  Parampalli Udaya,et al.  A disaster prevention broadcasting based on data hiding scheme using complete complementary codes , 2014, 2014 International Symposium on Information Theory and its Applications.

[4]  Daniel Z. Levin,et al.  The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer , 2004, Manag. Sci..

[5]  Parampalli Udaya,et al.  An audio data hiding based on complete complementary codes and its application to an evacuation guiding system , 2013, The Sixth International Workshop on Signal Design and Its Applications in Communications.

[6]  Arun Sundararajan,et al.  Trust and the Strength of Ties in Online Social Networks: An Exploratory Field Experiment , 2017, MIS Q..

[7]  Emily Erikson,et al.  Social Networks and Macro-Social Change , 2016 .

[8]  Michal Gregus,et al.  The E-business Perspective as a Solution for Inertia against Complexity Management in SME , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.

[9]  A. Eguiluz,et al.  Smartphones and teenagers, threat or opportunity , 2012, 2012 15th International Conference on Interactive Collaborative Learning (ICL).

[10]  Hal Berghel,et al.  Lies, Damn Lies, and Fake News , 2017, Computer.

[11]  Lada A. Adamic,et al.  Information Evolution in Social Networks , 2014, WSDM.

[12]  Aristeidis Samitas,et al.  The effects of ICT* on output per worker , 2016 .

[13]  D. Fesenmaier,et al.  Smartphone Use in Everyday Life and Travel , 2016 .

[14]  A. Bergström,et al.  Strong Support for News Media: Attitudes towards News on Old and New Platforms , 2012 .

[15]  Emily Erikson,et al.  Social Networks and Macrosocial Change , 2017 .

[16]  Nayef R. F. Al-Rodhan The Politics of Emerging Strategic Technologies , 2011 .

[17]  Albert A. Barreda,et al.  Consumer perception of knowledge-sharing in travel-related Online Social Networks , 2016 .

[18]  Monday Obaidjevwe Ogbomo,et al.  Importance of Information and Communication Technologies (ICTs) in Making a Heathy Information Society: A Case Study of Ethiope East Local Government Area of Delta State, Nigeria , 2008 .

[19]  Monika Davidekova,et al.  ICT Collaboration Tools for Virtual Teams in Terms of the SECI Model , 2017, Int. J. Eng. Pedagog..

[20]  Peter Farkas,et al.  Applications of Complete Complementary Codes and Propositions for Future Research Areas of these Codes , 2016, ANT/SEIT.

[21]  Andria Jones-Bitton,et al.  The personal use of Facebook by public health professionals in Canada: Implications for public health practice , 2017 .

[22]  Jesús Rodríguez López,et al.  Labor demand and ICT adoption in Spain , 2016 .

[23]  Sheng Zhou,et al.  Medical high-frequency ultrasound imaging using Golay-coded pulse excitation , 2012, 2012 5th International Conference on BioMedical Engineering and Informatics.

[24]  Heyoung Lee,et al.  The SAMS: Smartphone Addiction Management System and Verification , 2013, Journal of Medical Systems.

[25]  Suzanne Porath,et al.  Text Messaging and Teenagers: A Review of the Literature , 2011 .

[26]  Andrew T. Perrin Social Media Usage: 2005-2015 , 2015 .

[27]  D. Jorgenson,et al.  The ICT revolution, world economic growth, and policy issues , 2016 .

[28]  J. Jonides,et al.  Do Social Network Sites Enhance or Undermine Subjective Well‐Being? A Critical Review , 2017 .

[29]  Heejune Ahn,et al.  A Systemic Smartphone Usage Pattern Analysis: Focusing on Smartphone Addiction Issue , 2014, MUE 2014.