Posts Categorised: Social Media

A New Canteen Culture: The Potential to Use Social Media as Evidence in Policing

Manly Cove/Flickr

“This article suggests that these private narratives offer both the research community and students of policing a new form of knowledge capture and creation, and one that allows insight into the changing nature of the policing sphere. This article explores and promotes both the importance and the implications of innovative practices in relation to the use of social media as police knowledge, offering two examples to support the proposition.”

Source: Hesketh, I., & Williams, E. (2017).  Policing: A Journal of Policy and Practice, and available from this link (subscription journal).

Digital volunteering in disaster risk reduction: an opportunity or a challenge?

AIPM0226_jpg

Lilly Pilly/PaperMonkey

“In recent years, information from community members contributed online has proved highly useful in emergencies. Information sharing activities by private citizens using social media, smartphones, and web mapping tools have been termed volunteered geographic information (VGI), or digital volunteering. This research examined the potential role of VGI in fostering community engagement in bushfire preparation.”

Source: Hawath, B. (2017). BNHCRC Hazard Notes and available from this link (open access). 

Microtasking: redefining crowdsourcing practices in emergency management

Manly Cove/Flickr

“This paper examines the roles, types and forms of virtual microtasking for emergency information management in order to better understand collective intelligence mechanisms and the potential for logistics response. Using three case studies this paper reviews the emerging body of knowledge in microtasking practices in emergency management to demonstrate how crowd-sourced information is captured and processed during emergency events to provide critical intelligence throughout the emergency cycle. It also considers the impact of virtual information collection, collation and management on traditional humanitarian operations and relief efforts. Based on the case studies the emergent forms of microtasking for emergency information management were identified. Opportunities for continuities, adaptations and innovations are explained. The contribution of virtual microtasking extends to all supply chain strategic domains to help maximise resource use and optimise service delivery response.”

Source: Poblet, M., Fitzpatrick, M. & Chhetri, P. (2017). Australian Journal of Emergency Management, 32(2) and available from this link (open access)  

 

Tweeting situational awareness during the Sydney siege

IMG_1560

Manly dawn/G.Griffin

“The article … seeks to highlight the need for law enforcement and government agencies to take into account developments within social media, which have added a new dimension to terrorist activity. Failure to take account of these developments will diminish the capacity of law enforcement and government to respond effectively to similar events in the future.”

Source: Archie, B. (2016).  Journal of Policing, Intelligence and Counter Terrorism, and available from this link (subscription journal).

 

Social Media and the Workplace

Gum tree

“Social media influences and permeates many aspects of daily life for Americans today, and the workforce is no exception. These digital platforms offer the potential to enhance worker productivity by fostering connections with colleagues and resources around the globe. At the same time, employers might worry that employees are using these tools for non-work purposes while on the job or engaging in speech in public venues that might reflect poorly on their organization.”

Source: Olmstead, K., Lampe, C. & Ellison, N. (2016). Pew Research Center and available from this link (open access).

Categories: Social Media

Human Factor 2016

Storm from North Head/Flickr

“Today’s advanced attacks focus more on exploiting human flaws than system flaws. To explore this under-reported aspect of enterprise threats, we created The Human Factor. This paper presents original field research using data gathered by Proofpoint products deployed in customer settings around the world. It covers the latest trends in in email attachments, social media posts, and URLs. The Human Factor reveals not just who is clicking what, but how threat actors are exploiting the human factor. Because as the data makes clear, the weakest link in security is all of us.”

Source: Proofpoint and available from this link (open access).

The evolution of social technologies

DSC_0576

Collins Beach

“Our review of survey data spanning the years 2005 to 2015 suggests three distinct, progressively more sophisticated phases of usage. Companies in our sample began with trial-and-error applications—for example, using social platforms such as YouTube to expand their marketing mix to attract younger consumers. They then switched their focus to fostering collaboration. Most recently, some have deployed social technologies to catalyze the cocreation of strategy. Across this spectrum, we also found that companies shifted the mix of technologies and expanded the terrain of application.”

Source: Harrysson, M.,  Schoder, D. and Tavakoli, A. (2016). McKinsey Quarterly and available from this link.

Categories: Social Media

Twitter turns ten: its use to date in disaster management

Manly sunrise/Flickr

“This article explores current literature to identify the main uses of Twitter in emergency management over the past ten years in Australia and overseas. It finds several uses across the ‘disaster cycle’ including as a medium for identifying hazard risk, community engagement for disaster mitigation and preparedness, early warning communication, crowdsourcing to provide real-time information, emotional support, identifying needs and vulnerabilities of affected communities, and allocating resources during recovery. This paper concludes by examining some relatively untapped uses of Twitter in building disaster resilience including for social capital formation, capacity building, disaster virtual communities-of-practice, and social change.”

Source: Duffy, N. (2016). Australian Journal of Emergency Management, 31/2, and available from this link (open access).

 

The state of the art 2015: A literature review of social media intelligence capabilities for counter-terrorism.

Serene Manly dawn/Flickr

“This paper is a review of the specific social media research techniques that have emerged, which can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance.”

Source: Bartlett, J., & Reynolds, L. (2015). Demos (UK) and available from this link.

Managing Yourself: The Art of Evangelism

Storm over Manly Beach/Flickr

“If you’re a leader, you should evangelize for your organization and what it has to offer, and you should feel comfortable playing this role both internally — in break rooms, over e-mail, through collaborative platforms — and externally, at industry conferences and via LinkedIn, Facebook, and Twitter. In the social age, evangelism is everyone’s job.”

Source: Guy Kawasaki (2015). Harvard Business Review and available from this link (personal registration maybe required).