Skip to main content
European Commission logo print header

Emergency Management in Social Media Generation

Final Report Summary - EMERGENT (Emergency Management in Social Media Generation)

Executive Summary:
EmerGent aims at understanding the positive and the negative impact of social media, which currently can be described as a continuous feed of an unstructured, unvalidated real-time record of citizens' experiences, in emergencies in order to enhance objective and perceived safety and security of citizens before, during and after emergencies. Furthermore, EmerGent aims at strengthening the role of European companies dealing with services and products related to the aimed research and development results.
During a large-scale emergency, such as a flood, earthquake or rioting, a lot of valuable in-formation is shared on sites such as Twitter, Facebook or Instagram. During recent catastro-phes throughout the world, like hurricane Sandy in 2012, the European floods 2013/14 and terrorist attacks in Paris and Brussels in 2015, social media have been widely used [HSPA14]. Indeed, the terrorist attack in Paris generated around 6.7 million posts with the hashtag “#prayforparis” on Twitter within 10 hours [GoEm15]. And during recent years, the amount of information shared, especially on Twitter and Facebook, has grown enormously [Ethe12]. Yet, emergency services struggle to harness the potential lying within social media. Emer-Gent positions itself exactly in this dilemma and aids emergency services by providing in-structions for the use of social media before, during and after emergencies, as well as by processing and intelligently representing the sheer amount of information generated during emergencies.
To achieve this goal, EmerGent
• Regarded current attitudes towards social media within emergency services and citi-zens,
• Studied the past, current and future impact of social media before, during and after emergencies using the theory of change,
• Analysed potentials of the social media usage before, during and after emergencies,
• Assessed methods to handle enormous amounts of user-generated content from so-cial media, including text messages, images and videos,
• Implemented methods to turn high volume - low information social media data streams into low volume - information rich ,
• Researched methods to assess the quality of social media content,
• Implemented semi-supervised machine methods to classify the quality of social me-dia content,
• Designed, developed and evaluated an service-oriented IT-System that includes a mobile application (112.social app) and an interface for emergency services.
• Researched and evaluated existing guidelines for social media usage, especially re-garding the use in the emergency service’s processes,
• Developed guidelines for the use of social media in emergency services before, dur-ing and after emergencies,
• Created explainer videos to showcase the impact and potentials of the use of social media in emergencies
While EmerGent mainly focused on the use of social media in large-scale emergencies and disasters, the results are applicable as well for smaller incidents, such as accidents.
For detailed information, please visit the project website at www.fp7-emergent.eu.
Project Context and Objectives:
4.1.1 Project Context and Main Objectives
---------------------------------------------------------------------------------------------------------
The overall objective of EmerGent is to understand the positive and negative impact of social media in emergencies in order to:
* Enhance the safety and security of citizens before, during and after emergencies,
* Strengthen the role of European companies supplying services and products related to EmerGent’s results.
Wherever emergencies or crises occur, ad-hoc communities are built through existing social media channels. These communities are often not connected at all or perhaps are weakly to the emergency management services. Systematic research project concerning the effective identification and integration of valuable and reliable information from social media into emergency management processes is needed.

4.1.1.1 Project context
---------------------------------------------------------------------------------------------------------
Social media is a serious and fast growing phenomenon for creating and maintaining social links. The convergence of social networking and mobile media technology is also shifting the way people communicate, and gain or share information, even in emergency or crisis situations. Social media, especially social network providers like Facebook, Google+ and Twitter have high impact when citizens share their observations, opinions and emotions, and this is not restricted to normal life events. Facebook as the largest social network, receiving 85% of the clicks on social media websites [Stat16], shows ever growing numbers of monthly active users [Face16]. And Twitter for instance had more than 100 million active users in 2011, posting 230 million tweets a day. One year later, the number of active users and the number of tweets per day had doubled [Ethe12]. This means, that the general usage of social media is getting more and more important to share information. Additionally, Twitter has a history of breaking important stories before traditional news media [POMM13]. Hence, to handle the vast amount of data, information from social media streams has to be transformed into a low volume but rich information model. Because of the huge amount of potentially useful data created on a variety of social networks, direct usage of social media is impracticable to extract useful information. Hence, advanced filter techniques are required [Piro09]. This need is amplified by the fact that even the main social network providers are using different concepts for communication, information sharing and the establishment of relationships. Furthermore, observers try to help other users by supplying relevant Information to the public via social networks ([HuPa09, PaLi07, QHZZ11]). Wherever emergencies or crisis situations appear, ad-hoc crisis communities are often built on existing social media communities [ReMP11]. These ad-hoc crisis communities are made possible by social media that support “crowdsourcing” approaches ([Gool10, Howe08]) to use the wisdom of the crowd. However, these communities are generally only weakly connected to emergency management services (EMS)/public authorities and the corresponding emergency management processes. Hence, a systematic research activity concerning the effective integration of valuable and reliable information flows from social media to EMS, and from EMS to social media is needed.

4.1.1.2 Main objectives
---------------------------------------------------------------------------------------------------------
The overall concept of EmerGent is shown in the figure below. Today the “emergency management cycle” (EMC) with its phases does not capture social media (represented by the cloud on the left-hand side) with its highly valuable information. Although existing social apps (e. g. for mobile devices) are sometimes used by citizens to share their observations and feelings, these are only weakly connected to existing emergency services (ES) systems. To achieve the goal of EmerGent (right hand side in the figure) the consortium has developed a strong research oriented methodology (centre of figure).

Figure 1 The overall concept (source: DoW)

Within the “Analysis of Social Media in Emergencies Today and Tomorrow” (O2), EmerGent investigates the current use of social media during emergencies, and the future potential for citizens and ES involvement within the EMC when using social media. It also performs an analysis of the methods and tools for citizens and ES to integrate on a technical level.
The results of the analysis are used to assess the impact of social media in emergencies for citizens and ES (O1) through continuous citizen and ES involvement through social media and workshops. This includes the acquisition of users who participate long-term as well as the development of basic infrastructures to maintain and support relationship via social media. The methodology of the impact assessment consists of case studies, analyses of emergencies in the past where social media played a crucial role, workshops with experts and deep content analysis to get precise knowledge about feelings and reactions on both sides.
To handle the vast amount of valuable and distributed information, methods for Information Mining (IM) and Information Quality (IQ) are developed to classify and rate the available and provided data from users. Information Gathering (IG) and Information Routing (IR), including the development of new social apps, is done as part of the “Novel Emergency Management” (O3). The development of new social apps is undertaken to obtain and provide visualisations of the most relevant information (as assessed by EmerGent) integrated with several social network providers.
All analysis and impact assessment results lead to the creation of guidelines (O4). These guidelines enable ES and all other involved stakeholders to understand the benefits of social media and its integration into their process on different levels (conceptual & technical) (O5). The insights and results from the studies are incorporated into these guidelines. Through the collection and presentation of Information, the analysis of social media in emergencies and the development of IM and IQ methods, an IT-system for the “Novel Emergency Management in Social Media Generation” will be developed.
In the following, the five objectives will be subdivided into the Work Packages (see Figure 2) and there will be a distinction between a) completed and b) current work related to the specific objective. The descriptions and measurements refer to the DoW.

Figure 2 Objective-Work Package Relations
Project Results:
Main Scientific and Technological Results / Foregrounds
Significant Results from Work Packages
---------------------------------------------------------------------------------------------------------

WP2 Impact of Social Media in Emergencies
---------------------------------------------------------------------------------------------------------

The objective of WP2 was to conduct an impact analysis of social media in emergencies, in the light of approaches used by EmerGent. This included the use of in-depth case studies to explore the current and potential future use of social media in emergencies, and to explore the results of these case studies and the EmerGent results overall with a group of experts and stakeholders in order to help shape the EmerGent concept, platform and tools.
The work done as part of this WP combined case studies and online surveys of citizens and emergency services. This included case studies of the London riots (2011), floods in six Euro-pean countries between 2010 and 2015, two terrorist attacks in 2013 and 2016, and eight organisations already using technologies to collect and analyse social media data. This was complemented by surveys of emergency services (conducted in 2014 and 2017) and of citi-zens – including a survey of an opportunity sample of over 1000 citizens across Europe in 2015 and representative online surveys of citizens in Italy, Netherland, the UK and Germany conducted between October 2016 and March 2017.
The case studies and surveys have shown that currently very few emergency services collect and use social media data extensively – although there is a growing trend towards such use since the start of the project. This is illustrated in the changing attitudes of emergency ser-vice staff in response to the surveys in 2014 and 2017. In particular, as can be seen in Table 1 below, there appears to have been a significant change in attitude among them with re-gard to the extent to which they see social media as an important tool in general and for gaining situational awareness during emergencies more specifically since 2014. It shows that their use of social media before and during emergencies has increased, although the change is largest for sharing information with the public – both about how to behave in emergencies and how to avoid accidents.

[Table 1 Use of social media in 2014 and now]

The flooding case studies analysis highlighted four main sets of obstacles to the more wide-spread use of social media in emergencies: i) lack of organizational structures and proce-dures in place – on the whole the structures and networks already developed in emergency services to support the use of social media were limited; ii) lack of resources, staff and skills; iii) lack of systems and procedures to deal with information overload and iv) verification of information – services were often not confident about the veracity of the information circu-lated through social media. This means that in the flooding case studies the impact on emergency services was quite limited.
In contrast, the case studies and online surveys of citizens showed that there is a growing trend in citizens’ use of social media before, during and after emergencies both to look for and share information. Analysis of the representative citizen surveys showed that almost half (45%) of citizens across the four countries have used social media during an emergency. However, as can be seen in Figure 3 below, there are significant differences in the level of use across the four countries included in the survey.

[Figure 3: Use of social media during an emergency]

The evidence from the case study analysis shows that the use of social media by citizens and some emergency services had positive impacts particularly during and after the flooding emergencies. The key impacts of the use of social media in the flooding emergencies ana-lysed can be summarized as follows:
• More efficient and effective co-ordination of information by volunteers, often in real-time, on events related to the flooding
• More effective and fast dissemination/broadcasting of timely information on what was happening more widely by emergency services and volunteers
• Providing emotional support and solidarity, particularly among citizens
Given the relatively low use of social media by emergency services in the flooding case stud-ies, case study wave 3 therefore focused on eight specific services or authorities in which particular tools were used to collect and analyse social media data. We were particularly interested in i) examples of emergency services that had embedded the use of social media in their organisational structures, systems and practice ii) specific platforms and technolo-gies that were being used by emergency services iii) examples of real emergencies that il-lustrated i) and ii).
The case study analysis shows that the case study organisations used a combination of free and paid-for tools to access and analyse social media. Coosto is reported as simple to use, automated and provides comprehensive searching, and has a support service that is seen as very useful and effective. In other cases free data management and analysis tools, such as Tweetdeck or Hootsuite were used, but only ‘on demand’, in emergency situations. One dis-advantage of some of the commercial tools such as Coosto in particular is that they have been developed as commercial tools mainly for use in communication and marketing sce-narios. This means that they are not designed with the aim of finding appropriate, timely and relevant information for emergency scenarios.
The case studies also showed that social media data is seen as providing useful information relating to three main categories: information, behaviour and sense-making. By interrogat-ing the information coming in through social media according to these three types, social media analysts can make a distinction in an emergency situation between people who are actually affected; people who think they are affected and people who are not directly affect-ed. Collecting and analysing social media data effectively before, during and after an emer-gency relies heavily on specialist social media to provide the technical expertise necessary to support emergency services and similar agencies in crisis situations.
The impact of social media in emergencies is enhanced when social media is incorporated within broader systems and processes aimed at supporting transparency and open govern-ment. On the whole, the case studies show relatively modest organisational resistance to the incorporation of social media into emergency service systems and practices. This is because in all of the cases analysed buy-in and ownership of social media strategy happened at the top level. Where suspicion of and resistance to the use of social media was encountered, it was at grass roots level. This was effectively addressed through awareness-raising cam-paigns, education and training programmes and, crucially, demonstrating to front-line staff that social media gets results.
The case studies showed that the main barriers to the wider implementation of social media in these emergency services are:
• the cost of commercial social media analysis tools
• difficulties in using the analysis tools in particular in relation to choosing the right search terms to identify relevant information
• some emergency services staff not fully understanding the ‘world’ of social media, the language used in it and how it operates
• a residual organisational culture in emergency services that devalues the contribu-tion of ‘non-professionals’
• difficulties in keeping in touch with and responding to developments in social media technologies, their applications and their users
• variability in expertise and experience across agencies and departments, leading to some inconsistency in the quality and usefulness of the social media analysis carried out, and highlighting the need for greater standardization in recruitment and training and the application of some kind of quality assurance system for social media analy-sis.
The case study analysis highlighted four main lessons that have implications for the ongoing design and exploitation of the EmerGent tools and resources: that there are now many rival tools available to analyse and manage social media data; that such tools are used to provide different types of information to emergency services including situational awareness, behav-iour and emotions; training in using and analysing social media needs to be directed at the right staff; and finally that guidelines on using social media need to be tailored to the exist-ing levels and types of social media use among emergency services staff.
The overall methodology of WP2 as presented in Deliverable 2.1 was based on the Theory of Change in order to explore the expected impacts of social media in general, and the Emer-Gent project more specifically, on citizens and emergency services. The evidence from each successive wave of case studies was used to update this Theory of Change, and concluded with a contribution analysis in Deliverable 2.4 to explore the impact of the project overall relative to its different aims and objectives. The contribution analysis showed that Emer-Gent’s Theory of Change was coherent, and relatively plausible, though all of the assump-tions embedded in the Theory of Change can be questioned to some degree. The primary explanatory mechanisms embedded in EmerGent’s Theory of Change are largely supported by the evidence. This evidence suggests that the activities carried out in the project are likely to lead to its desired outcomes and goals, although the contribution analysis highlights some implications for future exploitation and sustainability of EmerGent. These include that:
• the likely impact of the EmerGent tools will vary depending on the cultural and or-ganisational context in which they are used. EmerGent therefore needs to take ac-count of changes in social media technologies, which reflect greater differentiation in the use of different services by different groups for different purposes
• the organisational culture of a service will shape how social media tools are embed-ded in the organisation’s emergency management processes / procedures, and hence the impact EmerGent tools are likely to have. EmerGent needs to ensure that the EIS, App and Guidelines reflect the typology of ‘whole system enthusiasts’, ‘bottom up en-thusiasts’, ‘top down professionals’ and ‘worried pragmatists’ identified by the im-pacts work carried out
• to improve situational awareness the EmerGent tools need to be able to identify the geographical source of information, and reduce the amount of irrelevant information gathered. The EmerGent system needs to be able to handle search strings to strike a balance between general categories (e.g. capturing information about ‘fires’ ‘floods’ etc.) but also to reflect local contextual conditions, particularly the geography of the area in which the tools are being used
• given emergency services’ apparent lack of support for an EmerGent ‘App’, more work needs to be done to identify the potential value of an App for emergency ser-vices and citizens, and how this value could be realized
• more attention needs to be paid to how the EmerGent tools can be used to help inte-grate social media and traditional media within the systems of emergency services
• if the EmerGent guidelines are going to effect change, they have to cater for a range of experiences and needs
• in order to help emergency services use the tools provided by EmerGent they need to be provided with help and guidance on how to do this, including advice and support to acquire the specialist skills needed to use the tools.

[Figure 4 Infographic of the comparative study]


WP3 Analysis of Social Media in Emergencies Today and Tomorrow
---------------------------------------------------------------------------------------------------------

The objective of WP3 was to focus on the continuous analysis of social media in emergencies in order to identify the potentials of new communication media at all phases in the EMC. The analysis of both EMS processes and social media should provide a foundation for the following questions: Which stakeholders have to be considered? How is the information flow designed and which communication channels are used? Which events and patterns of social media use should be investigated? What kind and quality of information is needed? Based on those questions this WP aimed to define the requirements for the project.
Results on Current Use of Social Media in Emergencies (T3.1)
We have researched Social Media usage before, during and after emergencies. The analysis is based on a comprehensive study of the Social Media related behaviour of authorities (among EMS) and the public in past emergencies.
Based on a study of social media use in various emergencies we provide insights into the current use of Social Media in emergencies. This includes a discussion of a wide range of recent papers on this topic leading to usage patterns, a typology of Social Media usage in crisis management and role patterns, the different types of Social Media users during an emergency, examples and typologies of data quality problems as well as approaches for re-solving these problems, an overview of the various other related projects relevant to Emer-Gent and results of own interviews with authorities about their current and prospective use of Social Media.
Social media constitute a direct and fast channel for communicating with the public and spreading accurate and trusted information, especially during emergencies, when it is even more important for people to have access to trusted information. Social media provide a possibility for bi-directional communication and are currently used in most of the cases. However, the current practice shows higher use of broadcasting information to citizens, ra-ther than responding to individual cases.
The use of social media during the different stages of an emergency management cycle highlighted the importance of information gathering and validation. This is considered as one of the great challenges in the use of social media and in some cases it may prevent or restrict further use. To overcome this barrier, an alternative model of operation is explored by some authorities, where the purpose of using social media is divided into use for opera-tional purpose versus informational purpose, or use during an emergency versus use during normal operation. The emerging difficulty in handling social media data streams triggers the need for supporting these processes with applicable tools. Authorities already experiment with the use of different tools, although the current study reports a lack of clear understand-ing of what tool to use or which tool is more suitable in which situation.
While implementation strategies or models for integration with current workflows are clear-ly interesting topics and some authorities currently explore or discuss different options, no clear or documented plans or goals were identified. Interviewees were not active in the re-search field of social media and emergency management. However, all shared an interest to follow the advances of this theme and expect the importance of social media in emergencies to rise in the future.


Publications:
Reuter, C., & Kaufhold, M.-A. (2018). Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics. Journal of Contingencies and Crisis Management (JCCM), 26(1).

Reuter, C. (2015). Der Einsatz sozialer Medien in Katastrophenlagen. Crisis Prevention – Fachmagazin Für Innere Sicherheit, Bevölkerungsschutz Und Katastrophenhilfe, 5(4), 43–44.



Findings on Processes and Interoperable Tools within EMS (Task 3.2)
The results of semi-structured interviews done with representatives of the main types of EMS (Police, Fire and Rescue Service, Medical Service, PSAP) from Belgium, Germany, the Netherlands, Norway, Slovenia and Poland reveal that only one-directional communication via Social Media, namely from Authority to Citizens, currently dominates the existing infor-mation flows. The reasons for this include a lack of operators skilled in Social Media and insufficient user-friendly software solutions that would combine gathering and forwarding information to citizens. The interviewees stated that a better Social Media integration into existing workflows of the EMS would require user friendly, easy software using most com-mon protocols and standards that will monitor and gather relevant data from the citizens or even disseminate data before, during and after emergencies.
The state-of-the-art analysis of the current tools for receiving and providing information via Social Media indicates that integration into the current generation of C&C systems could hardly be done. This is due to the fact that the tools, no matter how sophisticated the soft-ware is, have technical limitations regarding information exchange with typically monolithic structured C&C systems. The choice to integrate software at the inbound and outbound in-terfaces of C&C systems that analyses data and detect relevant information about emergen-cies could be a sound technical solution to avoid a radical change in currently used C&C so-lutions. Standard data formats for information exchange between EmerGent and EMS should be a relevant aspect for defining the information routing requirements.

Publications:

Kaufhold, M.-A. & Reuter, C. (2017). The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt. In T. Comes, F. Bénaben, C. Hanachi, & M. Lauras (Eds.), Proceedings of Information Systems for Crisis Response and Management (ISCRAM) (pp. 603–612). Albi, France. Retrieved from http://idl.iscram.org/files/marc-andrekaufhold/2017/1494_Marc-AndreKaufhold+ChristianReuter2017.pdf
Findings on Interfaces to Mobile Devices and Major Social Network Providers (Task 3.3)
D3.3 provided insights into the technical analysis of social media in emergencies; this in-cludes a review of different OSN’s policies for both end users and developers, characteriza-tion of technical limitations and potentials of existing social networks, design issues based on existing limitations, a situation aware design in mobile apps, a useful overview of strategies for design patterns and interaction design, a constructive discussion on capturing and shar-ing relevant information for EMS using OSN and the need to provide direct communication channels between the citizens and EMS.

Technical shortcomings of selected existing OSNs: Access to information from social media is generally possible. Besides mere statistical data, such as profile information, it is possible to request additional information about the connection of users and groups. The technical possibilities for integrating other applications are widely diversified by the provider; especially in the mobile sector the trend goes towards mobile SDKs, which make standard functionali-ties of the social networks accessible to each type of program similar to Facebook's "Like" button. The access to internal data is subjected to security measures such as the OAuth pro-tocol. The protection of personal data is in the foreground so that access to it must be ap-proved by the users themselves. In addition to safety aspects, the use of these services is only possible in the context of the granted query rate. If, for example, a search query met the capacity in a specific time interval, the use would only be possible after the end of this interval. These rate limits are dynamic for many requests and systems; if the given number of possible requests is not sufficient, it will be necessary to make a separate request to the sys-tem owner. It is required to provide detailed information to the relevant application and provide access to this. However, the limitations allow the connection of different services of the individual networks. Thus, not only the exchange between the networks, but also the col-lection and dissemination of information according to quality and relevance become possi-ble.
Design patterns for citizens’ targeted information: Design patterns are used to describe best practices and effective design solutions, and to capture and share design knowledge with other people faced with the same problem and context. Supporting collaboration across au-thorities and citizens in complex and time-critical situations is extremely challenging. De-signing suitable interfaces and interactions is a vital aspect for enabling actors to deal with this complexity. Moreover, the significance of situation awareness in designing mobile apps is discussed in this section. In T3.4 design patterns and interaction issues related to mobile devices are combined with the gathered requirements to scope out the most relevant re-quirements for the intended purpose.
Need for distinctive interface for the mobile EmerGent apps: Considering the state of the art, it becomes clear that there aren't applications covering all phases of EMC at the same time, and that the one existing generally introduces new methods for sharing information taking advantage of last generation smartphones.

Publications:

Reuter, C., & Scholl, S. (2014). Technical Limitations for Designing Applications for Social Media. In M. Koch, A. Butz, & J. Schlichter (Eds.), Mensch & Computer: Workshopband (pp. 131–140). München, Germany, Ger-many: Oldenbourg-Verlag.

Kaufhold, M.-A. Reuter, C., Ludwig, T., & Scholl, S. (2017). Social Media Analytics: Eine Marktstudie im Krisenma-nagement. In M. Eibl & M. Gaedke (Eds.), INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Bonn.

Reuter, C., Ludwig, T., Kotthaus, C., Kaufhold, M.-A. Radziewski, E. von, & Pipek, V. (2016). Big Data in a Crisis? Creating Social Media Datasets for Emergency Management Research. I-Com: Journal of Interactive Media, 15(3), 249–264. https://doi.org/https://doi.org/10.1515/icom-2016-0036

Requirements (Task 3.4)
We created a description of the “requirements engineering methodology” applied in Emer-Gent. The document also presents first versions of conceptual, technical, visual and user re-quirements for including social media in the emergency management for both ES and citi-zens.
The requirements for a system are the descriptions of what the system should do—the ser-vices that it provides and the constraints on its operation. Requirements engineering is one of the earliest phases of software development and has the maximum impact on the product in the long run. Hence, properly collected requirements have great influence on the design phase of software development. The EmerGent requirements engineering process was based on a use case driven approach, involving both EmerGent end-users and technology providers who are part of the consortium as well as End User Advisory Board (EAB) members. Two scenarios form the basis for the identification and development of use cases and require-ments. This process has culminated in a number of specific requirements that can be used as the basis of the software development process.
In the second period, we created an updated description of the “requirements engineering methodology” applied in EmerGent. The document also presents the second version of user requirements for including social media in the emergency management for both ES and citi-zens.
Potentials of Social Media and Citizens Involvement for Emergency Services (Task 3.5+3.6)
Results from our surveys: Based on quantitative and qualitative surveys with emergency ser-vices we have found that the majority of Emergency Service staff has positive attitudes to-wards the use of social media for both private and organizational purposes. However, there are significant differences in the attitudes among different types of Emergency Service staff, in terms of their gender, age, and geographical location – thus, female, young staff and those based in countries with high levels of social media use are, on average, significantly more likely to express positive attitudes towards the use of social media for both private and organizational purposes. More than 50% of the survey participants use social media in many ways before and during emergencies at least sometimes; of these, they are currently most likely to use social media to share information with the public about how to avoid accidents or emergencies – however, only 16% of the survey participants indicate that they do this often. According to around half of the survey participants, social media are used by their organizations to receive messages from the public during emergencies at least sometimes; but only 5% state that this happens in their organizations often.
Results of the Evaluation of the Interface: The participants expressed their feedback to the system. The majority of the participants expressed a positive attitude towards the presented application seeing potential as it can support them in their work. Only a few don’t think it would be helpful, mostly because they don’t have the time to use it or are not familiar with social media at all. According to the first evaluation, the forwarding of information is one of the most appreciated features and the interviewees already wished for its extension to ena-ble the communication with other services and organizations involved in crisis situations. Another positively perceived feature is filtering. Filtering the social media input helps deal-ing with the massive amount of posts and therefore enables the users to focus on the helpful information. Nevertheless, the participants think that this might also be problematic, as an automatic system cannot replace the human expertise and might therefore lead to missing important information. Most participants were not able to answer the question about the EmerGent notification because it was not visible. The main challenge and problem of social media use in general, in Emergency Services and in crisis situations at all, is the risk of false information. The interviewees expressed that concern repeatedly and said that it could cause panic.

[Figure 5 Infographic of the emergency service survey]

Summary:
• Summary on statistics on current social media use across Europe
• Identification of potentials for social media in emergencies from the consortium
• Results of the survey on potentials of social media in emergencies with 700 partici-pants including qualitative and quantitative results
• Translation and distribution of survey results

Publications:
Reuter, C., & Spielhofer, T. (2017). Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens’ Perception of Social Media in Emergencies in Europe. Journal Technological Forecasting and Social Change (TFSC), 121, 168–180.

Reuter, C., Ludwig, T., Kaufhold, M.-A. & Spielhofer, T. (2016). Emergency Services Attitudes towards Social Media: A Quantitative and Qualitative Survey across Europe. International Journal on Human-Computer Stud-ies (IJHCS), 95, 96–111.

Reuter, C., Amelunxen, C., & Moi, M. (2016). Semi-Automatic Alerts and Notifications for Emergency Services based on Cross-Platform Social Media Data –Evaluation of a Prototype. In H. C. Mayr & M. Pinzger (Eds.), In-formatik 2016: von Menschen für Menschen. Klagenfurt: GI-Edition-Lecture Notes in Informatics (LNI)

Reuter, C., Kaufhold, M.-A. Leopold, I., & Knipp, H. (2017). Informing the Population: Mobile Warning Apps. In M. Klafft (Ed.), Risk and Crisis Communication in Disaster Prevention and Management (pp. 31–41). epubli. Retrieved from http://publica.fraunhofer.de/eprints/urn_nbn_de_0011-n-4527283.pdf#page=35

Reuter, C., Kaufhold, M.-A. Leopold, I., & Knipp, H. (2017). Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps. In European Conference on Information Systems (ECIS). Guimarães, Portugal. Retrieved from http://aisel.aisnet.org/ecis2017_rp/139/

Kaufhold, M.-A. Reuter, C., & Stefan, M. (2017). Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien. In Mensch & Computer 2017: Workshopband (p. accepted). Regensburg, Germany: Ge-sellschaft für Informatik e.V.

Reuter, C., Pätsch, K., & Runft, E. (2017). IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study. I-Com: Journal of Interactive Media, 16(2).

Reuter, C., Kaufhold, M.-A. & Steinfort, R. (2017). Rumors, Fake News and Social Bots in Conflicts and Emergen-cies: Towards a Model for Believability in Social Media. In T. Comes, F. Bénaben, C. Hanachi, & M. Lauras (Eds.), Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) (pp. 583–591). Albi, France.

Kaufhold, M.-A. & Reuter, C. (2016). The Self-Organization of Digital Volunteers across Social Media: The Case of the 2013 European Floods in Germany. Journal of Homeland Security and Emergency Management (JHSEM), 13(1), 137–166.

Reuter, C., Pätsch, K., & Runft, E. (2016). Terrorismus und soziale Medien – Propaganda und Gegenpropaganda. In W. Prinz, J. Borchers, & M. Jarke (Eds.), Mensch & Computer: Tagungsband. Aachen, Germany: Gesell-schaft für Informatik e.V.



WP4 Information Mining and Information Quality
---------------------------------------------------------------------------------------------------------

The objectives of this WP was to analyse the nature and usefulness of the information from social media data sources, and exploring the opportunities for refining the information into a more useful form for further processing. The WP focused primarily on extracting and refin-ing information present in social media streams. The overall objective was to define a tool which transforms high volume data, into low volume but rich information content (See Fig-ure 6). During the project runtime WP4 was strongly connected to other WPs like WP5 and WP6.

[Figure 6 Simplified process for processing and analyzing SM data]

Summary of the main outcomes:
- Information mining methods to enrich and classify social media data before during and after emergencies.
- Evaluated IQ Framework to estimate IQ on social media data
- Semantic data model to structure and understand information from social media in a structured way
- Framework to visualize data from social media data streams.

Information Mining

During this task, we assessed techniques that were implemented for extracting and refining information present in social media streams, as well as providing guidance for our next steps. Regarding their strengths and weaknesses as demonstrated by their application to test data, as well as their context in the field as a whole, we have chosen algorithms and we in-formed about them in D4.4. Moreover, we showed the benefits of the algorithms we have implemented, to emergency services. F.i. we used a test case of flooding in the UK to evalu-ate our implementation. We captured a subset of Twitter data using the public Twitter API between 25 November 2015 and 13 January 2016 (inclusive) which were in English and con-tained any of the following phrases:
• Flood ;
• Heavy rain;
• Stormy weather.
Over this fifty day period, we collected a total of 970,106 tweets. From this collection of tweets, we created two random sets of 1,000 tweets each: (i) a training set and (ii) a testing set. We used our training set of data to train our Naïve Bayes Classifier for information clas-sification. Following this, we used the classifier to label our test set of data. For our test data, we compared the classification labels to those determined manually. A summary of our re-sults can be seen in Table 2. We find that 76.1% of our tweets have been correctly labelled by the classifier, when compared to our manual labels. These success rates are similar to those of other text classification studies in the literature [ICLM14].

[Table 2: Comparing manual and automatic labelling for a set of tweets]

Examining the results, it is particularly striking that we see a large number of false positives, but a low number of false negatives. One of the main reasons we are getting a large number of false positives is that many messages are about flooding outside the UK, thus have a lot of similarities with messages about flooding in the UK. If we only use posts with geotags, we could eradicate messages from outside the UK easily. The other reason we got more false positives is that, if we have not seen any of the words in a message (aside from the key-word), it is automatically classified as “not spam” to avoid losing potentially relevant infor-mation. It is more important that emergency services do not miss important tweets than encounter some irrelevant tweets. This emphasis on reducing false negatives at the expense of including false positives is specific to our ES users; this approach would not be considered with brand management tools. Future activities with our end users should confirm this ap-proach. Even with the large number of false positives included, we have reduced the number of tweets the ES need to examine by 44%. More details can be found in the deliverables of WP4.

Information Quality
Regarding the overall approach in EmerGent for designing the EmerGent IT-System we de-cided to develop the IQ Framework based on existing knowledge from the literature, user requirements, use cases as well as results from workshops with experts that were performed within the project lifecycle. We evaluated the performance of the IQ graph regarding cor-rect ratings. Therefore, we let three human experts rate the IQ of posts belonging to a real-world incident. We then compared the human ratings with the automatic ratings of IQ sup-ported by machine learning. The performance in our experiment was above average. The IQ framework to compute IQ is in shown in Figure 7.

[Figure 7: Information Quality Framework for EmerGent]

To evaluate how well machine learning algorithms (and, by extension, the EmerGent IQ framework) can rate the IQ value of posts, the machine learning software Weka was used. For each rater, different configuration options of the Multilayer Perceptron were evaluated.

The configurations were:
1. Training time: 500, Number of decimal places: 2, Layers: 1 (Weka’s default configu-ration)
2. Training time: 1000, Number of decimal places: 4, Layers: 1
3. Training time: 2000, Number of decimal places: 4, Layers: 2

The result of this evaluation is shown in Table 3. We highlighted the best configuration for each rater in green. We measured the performance of the learned IQ graph in terms of ac-curacy. The accuracy is the relative frequency of posts that are rated correctly by the IQ graph according to the expert. It can be seen that the accuracy of the neural network de-pends highly on the training data that was created by each expert. For Expert A, it managed to classify ca. 59% of the posts correctly, for Experts N and R ca. 65%. Further details can be found in D4.5.

[Table 3: Accuracy of different backpropagation configurations for each expert]


Semantic Data Model
The EmerGent ontology is used to model all data that is related to the project (see Figure 8). It defines the schema to structure extracted domain knowledge from social media. Since this information represents several different domains, the ontology consists of different parts. These different parts describe information from, e.g. social media and alerts. The EmerGent ontology fulfils, especially due to using existing standards, ontologies and EmerGent alerts, all requirements that were placed in it by citizens and authorities.

[Figure 8 Main classes of the EmerGent ontology]

Since the objective is to increase the information interoperability on a conceptual and IT-level, the EmerGent ontology and the SemanticDataStore rely on existing standards rather than creating completely new standards. These standards have been described and evaluat-ed based on their scalability. The conclusions drawn from this led to the creation of the Se-manticDataStore as it is already implemented in EmerGent which uses the openRDF Sesame Framework together with BigData from Blazegraph in order to have a fast RDF-Storage backend combined with a powerful API supporting common W3C standards to process RDF data. Benchmarking was conducted, as the goal was to create the SemanticDataStore as a good performing graph based database in terms of scalability. In this benchmark different types of queries were defined, some of which being efficient, others not. The storage system was tested with realistic workloads of use case motivated queries.

Development of IT for information mining and information quality
Based on the research done a software subsystem called Processing and Analysis Subsystem (PAS) has been developed in order to show the positive and negative impact of social media usage in emergencies like riots, flooding’s or fires.
The Processing and Analysis Subsystem of EmerGent acts to extract the key information from SM messages and creates relevant alerts that can be sent to ES. An outline of this subsystem, and its main interactions with other subsystems of EmerGent, can be seen in Figure 9. The PAS components are shown in black whilst other EmerGent components are depicted in grey. All components in the subsystem are controlled by a central controller via RESTful web ser-vices.

[Figure 9: PAS within EmerGent]


WP5 Information Collection and Presentation
---------------------------------------------------------------------------------------------------------

It was the objective of WP5 to research and specify appropriate APIs for gathering data from Social Media. The goal was to be able to acquire data both from public streams and also from approved private streams. To allow the transferring of messages to ES, routing mechanisms were to be designed and implemented. Regarding the reverse direction of transfer, the routing mechanisms also provide support for targeted broadcasts of messages from Emergency Services to interested citizens. Additionally, the results of the WP were to be implemented in an EmerGent App for smart phones to give the citizens wanting to report a comfortable environment. Information presentation also deals with presenting information in an appropriate way to ES, by targeting the specific needs of ES staff.
Implementation of Social Media API
This part of WP5 aimed to establish a technical basis infrastructure for the following technical EmerGent work packages regarding the access to social media services.
The implementation of Facebook and Twitter access is written in Java and realized as Apache Tomcat server application. Using the Jersey reference implementation of Java API for RESTful Web Services, it provides REST-based endpoints to interact with any client. Endpoint results are returned as JSON documents, processed with the Jettison library. Internally, data structures according the OpenSocial 2.5.1 specification are realized with the OpenSocial Parser, and the Activity Streams 2.0 specification by the OpenSocial reference implementation for Java. The data is processed with the object-relational mapper Hibernate. While Twitter4J provides access to the Twitter REST API, Facebook4J enables the use of the Facebook Graph API in Java. Moreover, Social Media API provides interfaces for implementing other services such as YouTube.
This API enables EmerGent to successfully connect to several social platforms simultaneously and obtain relevant data. Using georeference parameters, such as “latitude”, “longitude”, and “radius”, the API not only enables EmerGent to search social media platforms for keywords, but to search in a specific area as well. Of course, this limits the data to users who have provided location. Additionally, the time can be specified as well, using a “since” parameter. This allows us to specify a date from which data should be gathered. If this parameter is not specified, the earliest messages were more than two months old in some cases.
Routing
Information Routing represents an important concept to link social media (and therefore citizens) to the emergency services. To reach this aim EmerGent is placed between social media and ES C&C systems performing a mediator role in social media oriented C2A and A2C communications. The routing system provides a mechanism that enables EmerGent to forward and address all incoming messages produced by EmerGent Subsystems (like data mining, mobile applications, etc.) as well as by ES to the correct recipients. The system permits us to address alerting messages created by EmerGent (coming from the intelligence analysis of social messages collected) to ES (C2A). On the A2C side, the Routing Subsystem will be used by ES to send emergency messages managed by them, and publish information on social media exploiting EmerGent functionalities.
The design of the Routing Subsystem considers current alerting and emergency data exchange standards (such as CAP and other data formats belonging to the EDXL family of standards), and efforts produced by other EU projects, like REACT (Ref. EmerGent Description of Work) and IDIRA [WWW16]. The aim was to develop communication interfaces that make the integration of existing C&C systems easier to be adopted by ES with EmerGent, and therefore with the social media world. The Routing Subsystem will be the contact point between ES C&C systems and EmerGent.
Requirements for Emergency Mobile App and ES Interface
Based on the results of the corresponding tasks in WP3, requirements for the design and implementation of the mobile application and the emergency service interface were created.
For the engineering of the requirements, a three-step approach, based on the approach used in WP3 was used. During the first step, a scenario from real-life operations was chosen to be illustrated and analysed. In the second step, workshops with end users, development teams and experts were held, where the scenarios and the envisaged use cases where presented, in order to understand different approaches, establish a common understanding and allow interaction with each other. The third stage was to involve a broader community by using an online survey to collect data.
This process resulted in a set of requirements that describes what the mobile application and the emergency interface should do and that had a profound influence during the design phase of both systems.


Emergency Service Interface
The Emergency Service Interface (see Figure 10) provides a web based system, which allows emergency services to interact with the EmerGent System and permits them to interact with citizens through the application and social media channels. The interface also shows relevant data, such as recognized alerts. The interface presents automatically detected incidents from social media platforms on a map and groups and summarizes them. Additionally, alerts from the emergency mobile app “112.social” can be seen and directly interacted with, allowing the emergency services to get into direct contact with the reporting citizen. Also, possibilities to broadcast information via 112.social and the different social media platforms are provided.

[Figure 10: Emergency Service Interface]

Using the information quality results calculated by the corresponding subsystems in WP4, the interface can be used by the emergency services to filter low quality or irrelevant messages.


Emergency Mobile App “112.social”
The Emergency Mobile App enables citizens to report incidents, such as fires, to local authorities, while local authorities have the possibility to broadcast messages to the users. The application is available for iOS and Android through beta program access [Iess17].
The citizens are enabled by the mobile application to share trustworthy information with emergency services (see Figure 11):
• Type of the incident
• Description of the incident
• Location of the incident
• Several types of media files of the incident
o Images
o Videos
o Audio files


[Figure 11: Emergency Mobile App “112.social”]

To use 112.social the user must register using Facebook, Twitter or Google Plus and the application uses information provided by the smartphone, such as location and IMEI. The aim is for the user to give a the description of the event, to generate alerts that are sent into the EmerGent system. The alerts are in accordance with the Common Alerting Protocol Standard published by OASIS [JoSW10] and in comparison to social media alone, provide more trustworthy and helpful information.
Using the routing system mentioned afore, the generated CAP alerts are sent to the correct recipient, e.g. authority, especially depending on the type of reported incident.

WP6 Design and Evaluation of the overall system architecture
---------------------------------------------------------------------------------------------------------
The objective of WP6 was to design EmerGent overall system architecture, using a loose-coupled, SOA oriented approach. This included:
• The integration of all EmerGent produced components out of WP4 & WP5 into the EmerGent IT-system, following an agile approach on development.
• The Validation and Evaluation of the overall system against user requirements
The overall system was divided into loosely coupled subsystems. These subsystems were related to specific topics like the processing and analysing social media data streams. F.i. the PAS subsystem was designed to handle this job. After data was gathered from various social media data streams, social media posts were analysed, classified and rated by Information Quality. Due to clearly specified interfaces different sets of subsystems can be used while configuring the system. F.i. if an organization is only interested in gathering data, the system can be configured in that way where only the Storage-Subsystem and the Gathering subsystem are active.

[Figure 12 - EmerGent high level architecture (Source: EmerGent / D6.1 with updates highlighted in red)]

In Figure 12 the EmerGent architecture with all its subsystems is shown. Details on the design and implementation of the subsystem were specified in deliverables of the work packages WP4 and WP5. The final version of the architecture has been slightly modified to accomplish some specific tasks not foreseen in D6.1 without changing the important foundation of the architecture itself.
The following parts have been updated after the release of D6.1:
• the IG interacts with the IR to read C2A direct messages and improve PAS Controller jobs related to C2A indirect.
• The ES interface provides a settings tool for configuring crawl jobs of the IG and some parameters of the PAS controller.
In addition the previous picture highlights that A2C push notifications are dispatched to citizen’s devices through an external push notification service as "Apple Push Notification Service" (APNS) and "Google Cloud Messaging" (GCM).


Beside the design of the overall EmerGent IT-System architecture, 2 validations and 2 evaluations were performed during the project. The Evaluation included field-trails at two European fire brigades. With strong contact to our stakeholders the development has been supported in an iterative way by including feedback within an agile development approach. Details can be found in D6.2 D6.3 and D6.4. Below we briefly outline the results from the second evaluation. Within the project we followed the Design Science Research Cycles approach from [Hevn07]. The DSR is practice-oriented and must “provide methods to organize design and implementation processes in a reflexive and evolutionary way that allows for iteratively revising and improving versions of the system or its modules. It requires sound procedures of iterative design processes and an evolutionary project management which combine methods for modular design, formative evaluation and collective learning in recurring development loops with limited range in order to confine the risks [RSBW09].” For EmerGent our environment was primarily defined by the application domain. The used artefacts were a web interface for ES and a mobile application for citizens. Backend components / subsystems were running in the background. Used foundations were experience & expertise from the consortium and EAB, literature (research papers, reports, and other projects) and knowledge on the development of IT (See Figure 13)

[Figure 13. EmerGent in the Design Science Research Cycles, from [Hevn07]]

During both evaluations complex question sets were used to gather positive and negative impressions (more than 15 questions). Table 4 provides an overview about the participants in the EmerGent evaluation.

[Table 4 Evaluation – Overview about the participants]

In the following section we present a small subset of the most interesting findings from the second evaluation. Details on the second evaluation can be found in D6.4. As shown in the table above we performed interviews with more than 25 people.
Results of the Second Evaluation:
How would you evaluate the following functions according to their importance in your job?
It is clear to see that more than 50% of interviewees think that each of the functionalities is medium to maximum important (rating 1 or 2). This can be seen as an encouraging result. Especially the communication between citizens and authority (C2A) is seen as an added value. In total 10 people rated 1 or 2 for the EMA as well as the filtering and mining through the ESI. But if you have a closer look the interviewees see more importance in the ESI than the EMA. This can maybe be explained by the fact, that there was no real use of the EMA in the field trials. For the authority to citizen (A2C) communication the interviewees preferred the indirect way (9 votes vs. 7 votes for direct). The following figure illustrates the spreading of the results for the answers for question.

[Figure 14 How would you evaluate the following functions according to their importance in your job?]

How do you evaluate “Information quality”?
Four participants indicated a huge, further four a moderate and three a small benefit from the information quality component. On the positive side, on high settings, the component was perceived as a filter for the most crucial alerts, worked reliable and allowed a focus on important results. Thus, only a small amount of misclassification was observed. Two participants observed that, in tendency, authorities’ and media messages were assigned with a higher quality than citizens’ messages which was seen sceptical since potential eyewitness reports are rated lower and media reports from hours or days ago are rated higher. Moreover, one participant assumed that too many messages were filtered out and thus a performance feedback of (the different layers of filters) is required.

[Figure 15 How do you evaluate “Information quality”?]


Besides the technical aspects, other participants stated that it is generally difficult to choose relevant information, hard to determine true or false information and impossible to avoid “fake” information. Since a huge benefit was expected, if the component works properly, but a lot of scepticism and potentials of improvement were mentioned, further research should be put into this topic. The figure above illustrates the spreading of the results for the answers for question.

Regarding the mobile app we observed, that most of the implemented and tested features were ranked at least as important. It was quite interesting to see, that the feedback had an overall positive attitude. The following figure provides you an overview of the results.

[Figure 16 How would you evaluate the following functions according to their importance?]

WP7 Guidelines, Dissemination, Exploitation and Ethics
---------------------------------------------------------------------------------------------------------
The purpose of WP7 was to deliver a report with the findings of the project, in the form of guidelines for future adoption of social media in the emergency management procedures. Furthermore, this WPs included the following activities:
• Carry out dissemination activities, collect and collate results and outcomes. (See section 4.2 Extended Dissemination)
• Maximise the possible reach of the project findings in as many areas as possible.
• Identification of possible exploitation paths for the project results, both in terms of tools and guidelines.

Guidelines
One of the major outcomes in EmerGent are the guidelines for Emergency Services as well as citizens. The guidelines for Emergency Services are provided in two different versions: a short and brief version and a detailed version. The guidelines are split in four sections corresponding to the phases of an emergency:
• Prepare to start using social media (7 guidelines)
• Before an emergency (5 guidelines)
• During an emergency (6 guidelines)
• After an emergency (2 guidelines)
See Figure 17 for an overview of the different phases. Furthermore, the consortium decided to follow an open source approach. All guidelines are published under CC 4.0:
“You are free to use and extend the guidelines for any purpose, provided an attribution to the EmerGent project is provided. The Guidelines to increase the benefit of social media in emergencies by the EmerGent Consortium are licensed under a Creative Commons Attribution 4.0 International License. “
The guidelines can be accessed at http://www.fp7-emergent.eu/guidelines

[Figure 17 Guidelines outline]

The guidelines for Citizens are provided in a short graphical version (see Figure 18) and a more detailed version as well. Further information is available in D7.3 and at http://www.fp7-emergent.eu/guidelines/

[Figure 18: Graphical version of the citizens guidelines [WWW01]]

Dissemination

The dissemination activities carried out by the EmerGent consortium made the project results known widely to all stakeholder audiences. The staff of emergency services and public authorities, companies providing solutions for social media analysis or solutions for emergency services, the research community and academia are amongst the stakeholders of EmerGent. To reach these groups, the consortium established a strong online presence from the beginning of the project through its websites and social media accounts. It produced several dissemination materials for online and offline communication, such as leaflets, poster, videos and infographic. Each item in the list of produced materials contains key messages dedicated to the intended target group. EmerGent aimed to avoid communicating only its deliverables, but strived to extract information from them, transform it into key messages and diffuse it to the intended audience via the most appropriate dissemination channel. Following this approach, the dissemination activities of the project have helped the project raise awareness on the use of social media for emergency management and spark interest in external stakeholders. In addition to the strong online presence, the project consortium has been actively engaged in several publications, including scientific publications and attended several events to represent, present and promote EmerGent. The project’s dissemination activities are described in detail in D7.1.
Online Presence

The EmerGent project maintained several online presences: two websites and four social media accounts.
The EmerGent website, available at http://www.fp7-emergent.eu was set up and launched online at the beginning of the project and represents the project’s information hub. All the deliverables and other relevant files, documents, publications, dissemination material and information were made available to all stakeholders via the project website and it also operates as EmerGent’s public repository. Background information about the project, its rationale, objectives and achievements are described and it also offers links to the project’s social media accounts and its RSS feed.
EmerGent implemented a second website, 112.social available at http://112.social parallel to the main project website, as a dedicated web platform to act as a key information point for the dissemination and marketing campaign.
EmerGent uses Twitter and Facebook (see Table 5) to disseminate information in social media. The consortium uses the social media accounts to provide up to date information linked to the project websites and to build a community of stakeholders interested in EmerGent. The use of social media proved to be a very useful method to reach interested stakeholders beyond the project consortium and we received interest from third parties to interact with the EmerGent outputs.

[Table 5: EmerGent's Social Media Accounts]

Marketing Campaign

In addition to our dissemination and exploitation activates, EmerGent performed a marketing campaign on social media to engage citizens during the project. The 112.social website which was developed for this task is a presentation of the main findings of the project customized for a non-research audience. Development of content for the 112.social website was continuous and the findings/results of the research carried out were disseminated through this channel.
The creation of the project videos and infographic work to summarize the project’s surveys and guidelines was particularly well received and is now a key tool to disseminate key messages and critical information points going forward.
EmerGent produced three videos. The first video presents the EmerGent architecture and how the four components of EmerGent, information gathering, information routing, information mining and information quality have been implemented in the context of the EmerGent solution. The second video presents what EmerGent is about, its objectives and why it is important to look at the impact of social media in emergencies. The third video presents an overview of the detailed findings of the project studies and aims to raise awareness of the survey findings and the EmerGent guidelines. It directs viewers to the dedicated dissemination web pages for the surveys and the guidelines. All videos are available on the project website, YouTube and Vimeo. A dissemination campaign for the third video was started on 21st August via Twitter (using Tavistock and EmerGent Twitter accounts). This involved sending out 181 direct tweets to contacts, including 151 emergency services, over the following three weeks. The results of this campaign were:
• 455 engagements – including 53 retweets and 55 likes
• 365 views of the video on YouTube
• Positive responses on Twitter from emergency services (see examples below).

[Figure 19 Dissemination via Twitter example 1]
[Figure 20 Dissemination via Twitter example 2]

Three infographics to report and disseminate the results of the surveys of the attitudes of emergency services staff and citizens towards the use of social media were created (More details can be found at http://www.fp7-emergent.eu). The graphics helped raise awareness on the subject and understand the current attitudes of emergency services and citizens by the presentation of numerical data.


Ethics & Data protection
EmerGent aimed to understand the impact of social media in emergencies, thus had to deal with large quantities of social media data. To ensure the project was respecting the privacy of social media users, the EmerGent consortium was aware of, and compliant with, European laws on data protection and privacy. We continually monitored the relevant laws. We created D7.8 which also provides information about measures that were in place to prevent improper use or disclosure of the data, as well as ensuring forensic readiness of our system. To allow us to continually consider and evaluate data protection risks, an updated Privacy Impact Assessment was provided which was used for the remainder of the project for identifying, assessing and recording risks.

[Figure 21: EmerGent Ethics Advisory Committee Operation]

During the project, new challenges regarding the EU data protection law reform have been considered.
Article 8(1) of the Charter of Fundamental Rights of the European Union and Article 16(1) of the EU Treaty enshrines the right to the protection of personal data. Data protection law at a European Union level has recently undergone a wide-scale process of reform which has taken the form of a “package” of measures. These include a wide-ranging General Data Protection Regulation (GDPR) and a Directive on the Processing of Data by “Competent Authorities”. Any plans to ensure that EmerGent is embraced commercially needed to embed considerations of the duties and responsibilities enshrined in this new law.
The Emergent Ethics Advisory Committee (EAC) was established as part of D7.5 to be the “guardians of the correct governance practices”, which was reviewed annually. The EAC oversaw the evaluation of the compliance with the applicable regulations in terms of protection of rights and safety of subjects who contributed with the data used in the project. Matters tracked by the EEMS (EmerGent Ethics Monitoring System) were stored on the project’s SharePoint and the result of this evaluation was recorded in the Ethical Management Reports (D7.9). See Figure 21 for an overview of the EAC operation.
For tackling potential data protection hazards, a risk assessment process, built around the EAC, has been implemented:
If a privacy protection hazard has been identified, its risk factor (see Table 8) was derived regarding potential severity (see Table 7) and likelihood (see Table 6). If the derived risk factor then exceeds the guidelines, actions to mitigate the risk were searched. Once mitigation actions have been identified then the residual likelihood and severity of the hazard need to be recalculated to produce a value as if the mitigation actions have been implemented. The effect should be to reduce the overall mitigated residual risk rating. The Task members can then review the hazard and either:s
• accept that the mitigation actions are required and sufficient to not cause undue risk to the project;
• escalate the mitigated risk to the internal EAC;
• provide guidance;
• refer to the EmerGent Project board.
The internal EAC will then provide guidance on the risk to the project. If the EAC feels that they do not have the expertise to provide the guidance then they will refer to the external EAC committee members. If after consultation, the EAC feels that the risk factor is not controlled then it would advise the Emergent Project Board for direction and inform the Task Leader who raised the hazard accordingly.

[Table 6: Hazard Likelihood Scoring]

[Table 7: Hazard Severity Scoring]

[Table 8: Risk factor rating matrix]
Potential Impact:
EmerGent was aimed at exploring an area of social research and technical development with a high potential impact on the everyday life of citizens. It is estimated that 320 million emergency calls are made every year in the European Union, enabling emergency services to assist citizens in all sorts of difficult situations. For the time being however, most Europe-an emergency services can only be reached through the public switched telephone or mobile networks.
In many recent events affecting large numbers of people (e. g., the flooding in Genoa) or dramatic events like the massacre in Utoya, communication through social media has demonstrated its clear potential. In the first case, for alerting the population and coordinat-ing volunteers, while in the second example for gathering first-hand information from on-site people. In particular, social media have become a medium by themselves and video and text based communications are replacing traditional systems such as teletypes for the deaf and hard of hearing. Geographical location based services are increasingly used to submit or lookup close points of interest or a friend’s current position. Modern mobile phones from which an emergency call might be placed have the potential to transmit lifesaving location information with the call.
The outcome that EmerGent will support the main objectives of the Security theme:
• improve security for the citizens by creating the understanding of the importance of social media in emergencies (for citizens and EMS) and
• enable an enhanced competitiveness for industry by an enhanced SME participation.
The project has not only assessed the potential impact of social media in the different phases of an emergency, but also identified, implemented and validated tools and methods to in-crease such impact.
The release of the EmerGent guidelines has been done under CC 4.0. and can be used and extended by everybody. They inform about how new media and social networks may im-prove the bi-directional communication between citizens and emergency services and be-tween different emergency services.

Extended Dissemination
Main Workshops, Events and Conferences
---------------------------------------------------------------------------------------------------------

Dissemination and exploitation of the project results were important objectives of the EmerGent consortium to ensure the scientific progress beyond the state-of-the art in the course of the project and for a sustained economic yield after finishing the project. The whole consortium was fully engaged in creating public awareness, scientific interest and a new market.

Table 9: Main Workshops, Events and Conferences

Online Dissemination
---------------------------------------------------------------------------------------------------------
Project websites

The EmerGent website [WWW06] was set up and launched online at the beginning of the project and represents the project’s information hub. All the deliverables and other relevant files, documents, publications, dissemination material and information are made available to all stakeholders via the project website and it also operates as EmerGent’s public repository. Background information about the project, its rationale, objectives and achievements are described and it also offers links to the project’s social media accounts and its RSS feed. With this information, the website has been the central communication tool of the project aiming to increase the dissemination effort, by specifically describing:
• Project: background, objectives, work plan, the corresponding FP7 topic and other related projects
• Partners: all consortium partners, the End user Advisory Board (EAB) and the Ethics Advisory Committee (EAC)
• News: project news, events, studies, etc.
• Guidelines: being one of the main outputs of the project a separate page for the EmerGent guidelines is provided
• Surveys: being one of the main outputs of the project a separate page for the EmerGent studies is provided
• Publications: a repository of all related publications by EmerGent, including scientific publications, press releases, newsletters, etc.
• Contact page
The design of the website (Figure 22) established the graphical style guide and colour palette of the project.
EmerGent implemented a second website, 112.social [Figure 23], in parallel with the project website, as a dedicated web platform to act as a key information point for the dissemination and marketing campaign, defined in Task 7.2. The website and the campaign are not described in detail in this deliverable, but a detailed report is provided in deliverable D7.2 Dissemination campaign [CmSf17].

Social media accounts

EmerGent used Twitter and Facebook to disseminate information on social media. The consortium used the social media accounts to provide up to date information linked to the project websites and to build a community of stakeholders interested in EmerGent. The use of social media proved to be a very useful method to reach interested stakeholders beyond the project consortium and we received interest from third parties to interact with the EmerGent outputs.
Newsletters
Electronic newsletter campaigns have been used by EmerGent to communicate the project’s latest news to those who expressed their interest. The newsletters are emailed to the End user Advisory Board (EAB) and a dedicated list of subscribers maintained from the beginning of the project. A newsletter subscription form [WWW07] was made available on both project websites and visitors could subscribe by entering an email address and optionally a name. All newsletters (Figure 24, Figure 25, Figure 26) are also still available on the project website [WWW08].
The newsletters provided short information about the latest project developments, a summary of the recently published documents and covered the past and upcoming events. The reader was invited to access more information about each of these items by following links to the EmerGent website. To increase the reach of the newsletters, consortium partners amplified their dissemination by including links to the newsletters in their campaigns and by posting to their social media accounts.
Videos
EmerGent produced three videos. The first video (Figure 27) presents the EmerGent architecture and how the four components of EmerGent, information gathering, information routing, information mining and information quality have been implemented in the context of the EmerGent solution. The second video (Figure 28) presents what EmerGent is about, its objectives and why it is important to look at the impact of social media in emergencies. The third video (Figure 29) presents an overview of the detailed findings of the project studies and aims to raise awareness on the studies and the EmerGent guidelines. It directs viewers to the dedicated dissemination web pages for the studies and the guidelines. All videos are available on the project website and YouTube or Vimeo.

Infographics
EmerGent has produced several infographics to report and disseminate
• the results of the surveys of the attitudes of emergency services staff (Figure 5) and citizens (Figure 30) towards the use of social media. The infographics helped to raise awareness on the subject and understand the current attitudes of emergency services and citizens by the presentation of numerical data
• the results of the representative study on citizens’ perception in Europe (Figure 4). The study researched the perception of citizens on the use of social media in Germany, Italy, the Netherlands and the United Kingdom with a representative survey of more than 7,000 participants. Similar infographics were produced to disseminate the results of the studies in the UK (Figure 31).
• the citizen guidelines (Figure 18). This infographic is provided with a free licence to emergency services and public authorities to adapt and disseminate to citizens.

[Figure 22: The EmerGent website [WWW06]]

[Figure 23: The 112.social website [WWW09]]
[Figure 24: EmerGent Newsletter 1 [WWW10]]
[Figure 25: EmerGent Newsletter 2 [WWW11]]
[Figure 26: EmerGent Newsletter 3 [WWW12]]
[Figure 27: EmerGent architecture video [WWW11]
[Figure 28: What is EmerGent? video [WWW12]]
[Figure 29: The impact of social media in emergencies video [WWW13]]
[Figure 30: Citizens attitudes towards the use of social media (infographic) [WWW16]]
[Figure 31: Results of the representative study on citizens’ perception in Europe (UK results, infographic)]

Exploitation with wider EM organisations

The focus in UK commercial exploitation moved away from the Control Room to organisations with more flexibility in software. When large scale emergencies need managing Local Government resilience organisations are involved. Through networking we approached ResilienceDirect and made a demonstration of EmerGent. ResilienceDirect is based in UK Central Government and creates a common platform for EMS to share information. It is a web based application which integrates GIS mapping (from Ordnance Survey, OS). A presentation of EmerGent to ResilienceDirect lead to a contact with OS emergency management. Meetings with OS in Southampton did not lead to successful exploitation. OS have a data mining team and saw EmerGent as a direct competitor to their component in ResilienceDirect. OS refused to sign a non-compete or non-disclosure agreement.
In the UK there is also a family of local resilience organisations called “PreparedIn” such as PreparedInEssex. We found PreparedInEssex were using a third party application to monitor social media using keywords. They were interested in EmerGent and attended a demonstration. In this case they were concerned about pricing. In Essex County Council three people have part of their work responsibilities to be monitoring for relevant content in social media. They are especially busy during large scale emergencies but are always active looking for incidents including small scale events such as house fires and road traffic accidents.
While PreparedInEssex were initially interested in a tool to help them automated this there were two areas of concern: pricing and versatility. Off the shelf tools for filtering social media such as Tweetdeck or Coosto were seen as both good enough for little or no expense and also more versatile than EmerGent as no training was required. Although EmerGent performed better at identifying and filtering social media emergency PreparedInEssex were not convinced the additional effectiveness would be worth additional cost. This led us to explore relationships with the providers of off the shelf tools.
Exploitation with weather organisations
We presented EmerGent to a team at the Meteorological Office who were monitoring social media using another off the shelf tool: Brandwatch. This is a competitor to Coosto which includes a Query Builder and an Advisor’s Dashboard. The Met Office have a power user who has built the following dashboard using advanced queries on weather events.
Around 20 to 60 tweets considered to be ‘noise’ every day. When the weather is quiet, the vast majority of tweets the query picks up are of no use. As soon as something starts to happen, these get drowned out by actual impact tweets.
The Met Office are specialists weather forecasting and “nowcasting” (detecting the current condition of weather). They are interested in using social media to see what the impact of weather is on the population. For example, they may know that a storm is hitting a town but it is uncertain what the disruption and damage will be. Social media could be a new means of determining this. The Met Office power user we interviewed was investigating if social media over-represents some impacts. She believed traffic disruption features heavily while property flooding is harder to pick up unless it’s been reported in a news story. However, it could also be argued that this represents a weighting towards what disrupts most people and therefore could be a fair measure of impact.
The Met Office were given access to an instance of EmerGent trained to mine social media data on flooding. The feedback was similar to those of Local Authorities: that the increased accuracy of data mining was useful but not of sufficient value to justify a higher cost or migration from their existing tool, Brandwatch, which is similar to Coosto.
List of Websites:
www.fp7-emergent.eu & www.112.social