% $ biblatex auxiliary file $
% $ biblatex bbl format version 3.1 $
% Do not modify the above lines!
%
% This is an auxiliary file used by the 'biblatex' package.
% This file may safely be deleted. It will be recreated by
% biber as required.
%
\begingroup
\makeatletter
\@ifundefined{ver@biblatex.sty}
{\@latex@error
{Missing 'biblatex' package}
{The bibliography requires the 'biblatex' package.}
\aftergroup\endinput}
{}
\endgroup
\refsection{0}
\datalist[entry]{nyt/global//global/global}
\entry{Abd-Alrazaq2020}{article}{}
\name{author}{5}{}{%
{{un=0,uniquepart=base,hash=1ae430018c8a2cc69362aeaaf6d86956}{%
family={Abd-Alrazaq},
familyi={A\bibinithyphendelim A\bibinitperiod},
given={Ala},
giveni={A\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=bb073c7839ddb90f32fe4e44d7db30de}{%
family={Alhuwail},
familyi={A\bibinitperiod},
given={Dari},
giveni={D\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=23f470b9ca8844a0ffe9c05ed49f8ac1}{%
family={Househ},
familyi={H\bibinitperiod},
given={Mowafa},
giveni={M\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=f30d71d2370f23d1345f218d8b6daae2}{%
family={Hai},
familyi={H\bibinitperiod},
given={Mounir},
giveni={M\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=dd4ec3734c19215c884c441e103b979b}{%
family={Shah},
familyi={S\bibinitperiod},
given={Zubair},
giveni={Z\bibinitperiod},
givenun=0}}%
}
\strng{namehash}{a23dda0c82c59a608cea28a3048293f7}
\strng{fullhash}{1e9ef025e48f843cbad6bdab3bf41950}
\strng{bibnamehash}{1e9ef025e48f843cbad6bdab3bf41950}
\strng{authorbibnamehash}{1e9ef025e48f843cbad6bdab3bf41950}
\strng{authornamehash}{a23dda0c82c59a608cea28a3048293f7}
\strng{authorfullhash}{1e9ef025e48f843cbad6bdab3bf41950}
\field{sortinit}{A}
\field{sortinithash}{a3dcedd53b04d1adfd5ac303ecd5e6fa}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{abstract}{Background: The recent coronavirus disease (COVID-19) pandemic is taking a toll on the world's health care infrastructure as well as the social, economic, and psychological well-being of humanity. Individuals, organizations, and governments are using social media to communicate with each other on a number of issues relating to the COVID-19 pandemic. Not much is known about the topics being shared on social media platforms relating to COVID-19. Analyzing such information can help policy makers and health care organizations assess the needs of their stakeholders and address them appropriately. Objective: This study aims to identify the main topics posted by Twitter users related to the COVID-19 pandemic. Methods: Leveraging a set of tools (Twitter's search application programming interface (API), Tweepy Python library, and PostgreSQL database) and using a set of predefined search terms ("corona," "2019-nCov," and "COVID-19"), we extracted the text and metadata (number of likes and retweets, and user profile information including the number of followers) of public English language tweets from February 2, 2020, to March 15, 2020. We analyzed the collected tweets using word frequencies of single (unigrams) and double words (bigrams). We leveraged latent Dirichlet allocation for topic modeling to identify topics discussed in the tweets. We also performed sentiment analysis and extracted the mean number of retweets, likes, and followers for each topic and calculated the interaction rate per topic. Results: Out of approximately 2.8 million tweets included, 167,073 unique tweets from 160,829 unique users met the inclusion criteria. Our analysis identified 12 topics, which were grouped into four main themes: origin of the virus; its sources; its impact on people, countries, and the economy; and ways of mitigating the risk of infection. The mean sentiment was positive for 10 topics and negative for 2 topics (deaths caused by COVID-19 and increased racism). The mean for tweet topics of account followers ranged from 2722 (increased racism) to 13,413 (economic losses). The highest mean of likes for the tweets was 15.4 (economic loss), while the lowest was 3.94 (travel bans and warnings). Conclusions: Public health crisis response activities on the ground and online are becoming increasingly simultaneous and intertwined. Social media provides an opportunity to directly communicate health information to the public. Health systems should work on building national and international disease detection and surveillance systems through monitoring social media. There is also a need for a more proactive and agile public health presence on social media to combat the spread of fake news.}
\field{issn}{14388871}
\field{journaltitle}{Journal of Medical Internet Research}
\field{number}{4}
\field{title}{{Top concerns of tweeters during the COVID-19 pandemic: A surveillance study}}
\field{volume}{22}
\field{year}{2020}
\field{pages}{1\bibrangedash 9}
\range{pages}{9}
\verb{doi}
\verb 10.2196/19016
\endverb
\verb{file}
\verb :Users/cbuntain/Documents/Mendeley Desktop/Abd-Alrazaq et al/Journal of Medical Internet Research/Abd-Alrazaq et al. - 2020 - Top concerns of tweeters during the COVID-19 pandemic A surveillance study.pdf:pdf
\endverb
\keyw{2019-ncov,Coronavirus,covid-19,Disease surveillance,Health informatics,Infodemiology,Infoveillance,Public health,Sars-cov-2,Social media,Twitter}
\endentry
\entry{Banda2020}{article}{}
\name{author}{7}{}{%
{{un=0,uniquepart=base,hash=ba73cf69c0012daab00949fc7c1a3002}{%
family={Banda},
familyi={B\bibinitperiod},
given={Juan\bibnamedelima M.},
giveni={J\bibinitperiod\bibinitdelim M\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=9231ef59c3b016e7a40a3abecee4f228}{%
family={Tekumalla},
familyi={T\bibinitperiod},
given={Ramya},
giveni={R\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=67fa3b2beefb182b93b1a726028f60df}{%
family={Wang},
familyi={W\bibinitperiod},
given={Guanyu},
giveni={G\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=9947a86e54fc3c15dcd263fe092b5190}{%
family={Yu},
familyi={Y\bibinitperiod},
given={Jingyuan},
giveni={J\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=d968d11b7eccf47bf34da645996ccf77}{%
family={Liu},
familyi={L\bibinitperiod},
given={Tuo},
giveni={T\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=a183e0a0fd304801a7e0977e7e3ee31b}{%
family={Ding},
familyi={D\bibinitperiod},
given={Yuning},
giveni={Y\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=7110a6f6ee457d86a15dde8924429aac}{%
family={Chowell},
familyi={C\bibinitperiod},
given={Gerardo},
giveni={G\bibinitperiod},
givenun=0}}%
}
\strng{namehash}{cc68dd61d80095896afd0a92d70a80cc}
\strng{fullhash}{aa949835d544c3b0994efb112aba504f}
\strng{bibnamehash}{aa949835d544c3b0994efb112aba504f}
\strng{authorbibnamehash}{aa949835d544c3b0994efb112aba504f}
\strng{authornamehash}{cc68dd61d80095896afd0a92d70a80cc}
\strng{authorfullhash}{aa949835d544c3b0994efb112aba504f}
\field{sortinit}{B}
\field{sortinithash}{8de16967003c7207dae369d874f1456e}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{abstract}{As the COVID-19 pandemic continues its march around the world, an unprecedented amount of open data is being generated for genetics and epidemiological research. The unparalleled rate at which many research groups around the world are releasing data and publications on the ongoing pandemic is allowing other scientists to learn from local experiences and data generated in the front lines of the COVID-19 pandemic. However, there is a need to integrate additional data sources that map and measure the role of social dynamics of such a unique world-wide event into biomedical, biological, and epidemiological analyses. For this purpose, we present a large-scale curated dataset of over 152 million tweets, growing daily, related to COVID-19 chatter generated from January 1st to April 4th at the time of writing. This open dataset will allow researchers to conduct a number of research projects relating to the emotional and mental responses to social distancing measures, the identification of sources of misinformation, and the stratified measurement of sentiment towards the pandemic in near real time.}
\field{eprinttype}{arXiv}
\field{issn}{2331-8422}
\field{journaltitle}{arXiv}
\field{title}{{A large-scale COVID-19 twitter chatter dataset for open scientific research - An international collaboration}}
\field{year}{2020}
\verb{eprint}
\verb 2004.03688
\endverb
\verb{file}
\verb :Users/cbuntain/Documents/Mendeley Desktop/Banda et al/arXiv/Banda et al. - 2020 - A large-scale COVID-19 twitter chatter dataset for open scientific research - An international collaboration.pdf:pdf
\endverb
\endentry
\entry{Chen2020}{article}{}
\name{author}{3}{}{%
{{un=0,uniquepart=base,hash=0d9ef40c3451566d8104bb3eee7c151b}{%
family={Chen},
familyi={C\bibinitperiod},
given={Emily},
giveni={E\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=8aea0a421db201a447f5fec22e73a92f}{%
family={Lerman},
familyi={L\bibinitperiod},
given={Kristina},
giveni={K\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=9ff088972e751f036f6d04e4c835050d}{%
family={Ferrara},
familyi={F\bibinitperiod},
given={Emilio},
giveni={E\bibinitperiod},
givenun=0}}%
}
\strng{namehash}{90b9f803b898b7f5e47304cdd4f42b8b}
\strng{fullhash}{fe6aba11f51ead3d26aa968e2db310e4}
\strng{bibnamehash}{fe6aba11f51ead3d26aa968e2db310e4}
\strng{authorbibnamehash}{fe6aba11f51ead3d26aa968e2db310e4}
\strng{authornamehash}{90b9f803b898b7f5e47304cdd4f42b8b}
\strng{authorfullhash}{fe6aba11f51ead3d26aa968e2db310e4}
\field{sortinit}{C}
\field{sortinithash}{4c244ceae61406cdc0cc2ce1cb1ff703}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{abstract}{Background: At the time of this writing, the novel coronavirus (COVID-19) pandemic outbreak has already put tremendous strain on many countries' citizens, resources and economies around the world. Social distancing measures, travel bans, self-quarantines, and business closures are changing the very fabric of societies worldwide. With people forced out of public spaces, much conversation about these phenomena now occurs online, e.g., on social media platforms like Twitter. Objective: In this paper, we describe a multilingual coronavirus (COVID-19) Twitter dataset that we are making available to the research community via our COVID-19TweetIDs Github repository. Methods: We started this ongoing data collection on January 28, 2020, leveraging Twitter's Streaming API and Tweepy to follow certain keywords and accounts that were trending at the time the collection began, and used Twitter's Search API to query for past tweets, resulting in the earliest tweets in our collection dating back to January 21, 2020. Results: Since the inception of our collection, we have actively maintained and updated our Github repository on a weekly basis. We have published over 123 million tweets, with over 60{\%} of the tweets in English. This manuscript also presents basic analysis that shows that Twitter activity responds and reacts to coronavirus-related events. Conclusions: It is our hope that our contribution will enable the study of online conversation dynamics in the context of a planetary-scale epidemic outbreak of unprecedented proportions and implications. This dataset could also help track scientific coronavirus misinformation and unverified rumors or enable the understanding of fear and panic – and undoubtedly more.}
\field{eprinttype}{arXiv}
\field{issn}{2369-2960}
\field{journaltitle}{arXiv}
\field{title}{{Tracking Social Media Discourse About the COVID-19 Pandemic: Development of a Public Coronavirus Twitter Data Set}}
\field{volume}{6}
\field{year}{2020}
\verb{doi}
\verb 10.2196/19273
\endverb
\verb{eprint}
\verb 2003.07372
\endverb
\verb{file}
\verb :Users/cbuntain/Documents/Mendeley Desktop/Chen, Lerman, Ferrara/arXiv/Chen, Lerman, Ferrara - 2020 - Tracking Social Media Discourse About the COVID-19 Pandemic Development of a Public Coronavirus Twitter D.pdf:pdf
\endverb
\keyw{computational social sciences,covid-19,network analysis,sars-cov-2,social media}
\endentry
\entry{Damiani2004}{article}{}
\name{author}{4}{}{%
{{un=0,uniquepart=base,hash=832654d2c401b8bf9a040fe6056d3a49}{%
family={Damiani},
familyi={D\bibinitperiod},
given={Ernesto},
giveni={E\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=bc8c1d9aebecb5380f24aeda738d776b}{%
family={Vimercati},
familyi={V\bibinitperiod},
given={Sabrina\bibnamedelimb De\bibnamedelima Capitani},
giveni={S\bibinitperiod\bibinitdelim D\bibinitperiod\bibinitdelim C\bibinitperiod},
givenun=0,
prefix={di},
prefixi={d\bibinitperiod},
prefixun=0}}%
{{un=0,uniquepart=base,hash=4158c04c999d8710a8ac52fdaac460f1}{%
family={Paraboschi},
familyi={P\bibinitperiod},
given={Stefano},
giveni={S\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=19cbbd79dfea5fca14f15fee59d99895}{%
family={Samarati},
familyi={S\bibinitperiod},
given={Pierangela},
giveni={P\bibinitperiod},
givenun=0}}%
}
\strng{namehash}{dd0f705b02272efa14850ed0d34b035c}
\strng{fullhash}{92c3492b313fc77c6caf6eba6e05795c}
\strng{bibnamehash}{92c3492b313fc77c6caf6eba6e05795c}
\strng{authorbibnamehash}{92c3492b313fc77c6caf6eba6e05795c}
\strng{authornamehash}{dd0f705b02272efa14850ed0d34b035c}
\strng{authorfullhash}{92c3492b313fc77c6caf6eba6e05795c}
\field{sortinit}{D}
\field{sortinithash}{c438b3d5d027251ba63f5ed538d98af5}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{abstract}{A promising anti - spam technique consists in collect - ing users opinions that given email messages are spam and using this collective judgment to block message propagation to other users . To be effective , this strat - egy requires a way to identify similarity among email messages , even if the program used by the spammer to generate the messages may try to obfuscate their common origin . In this paper , we investigate the issues arising in the design of a digest - based spam detection mechanism , which has to satisfy many conflicting requirements : protect message confidentiality , be public , and prove difficult or expensive to fool by obfuscation techniques that automatically introduce differences into the same base spam message . We show that an open digest function is able to satisfy the above requirements and contribute to the fight against spam .}
\field{journaltitle}{Proceedings of the 2004 International Workshop on Security in Parallel and Distributed Systems}
\field{number}{1}
\field{title}{{An Open Digest-based Technique for Spam Detection}}
\field{volume}{1}
\field{year}{2004}
\field{pages}{559\bibrangedash 564}
\range{pages}{6}
\verb{file}
\verb :Users/cbuntain/Documents/Mendeley Desktop/Damiani et al/Proceedings of the 2004 International Workshop on Security in Parallel and Distributed Systems/Damiani et al. - 2004 - An Open Digest-based Technique for Spam Detection.pdf:pdf
\endverb
\verb{urlraw}
\verb http://spdp.di.unimi.it/papers/pdcs04.pdf
\endverb
\verb{url}
\verb http://spdp.di.unimi.it/papers/pdcs04.pdf
\endverb
\endentry
\entry{imran2013practical}{inproceedings}{}
\name{author}{5}{ul=2}{%
{{un=0,uniquepart=base,hash=2bd768b19dce2c8812b046e3b50b16cb}{%
family={Imran},
familyi={I\bibinitperiod},
given={Muhammad},
giveni={M\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=2bf4b746fadf1451a98c8691ff1c1dce}{%
family={Elbassuoni},
familyi={E\bibinitperiod},
given={Shady},
giveni={S\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=9945b3859caed4e19a23f700fa1b79db}{%
family={Castillo},
familyi={C\bibinitperiod},
given={Carlos},
giveni={C\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=2fe7f45d1e1c4122f580116dc9632b11}{%
family={Diaz},
familyi={D\bibinitperiod},
given={Fernando},
giveni={F\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=55ece9583a9bf3ec98855980d0a72147}{%
family={Meier},
familyi={M\bibinitperiod},
given={Patrick},
giveni={P\bibinitperiod},
givenun=0}}%
}
\list{organization}{1}{%
{ACM}%
}
\strng{namehash}{c9664a27844450a9f898a80a58bd62cb}
\strng{fullhash}{9072cec1cdf16a73447b92b1e4617a55}
\strng{bibnamehash}{9072cec1cdf16a73447b92b1e4617a55}
\strng{authorbibnamehash}{9072cec1cdf16a73447b92b1e4617a55}
\strng{authornamehash}{c9664a27844450a9f898a80a58bd62cb}
\strng{authorfullhash}{9072cec1cdf16a73447b92b1e4617a55}
\field{sortinit}{I}
\field{sortinithash}{9417e9a1288a9371e2691d999083ed39}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Proceedings of WWW}
\field{title}{Practical extraction of disaster-relevant information from social media}
\field{year}{2013}
\endentry
\entry{imran2016twitter}{inproceedings}{}
\name{author}{3}{ul=2}{%
{{un=0,uniquepart=base,hash=2bd768b19dce2c8812b046e3b50b16cb}{%
family={Imran},
familyi={I\bibinitperiod},
given={Muhammad},
giveni={M\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=1830bc3848a0cda63f4a76b15fc00352}{%
family={Mitra},
familyi={M\bibinitperiod},
given={Prasenjit},
giveni={P\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=9945b3859caed4e19a23f700fa1b79db}{%
family={Castillo},
familyi={C\bibinitperiod},
given={Carlos},
giveni={C\bibinitperiod},
givenun=0}}%
}
\strng{namehash}{62ac1914b11d2d521615214e0d967367}
\strng{fullhash}{13861388789491fe0b3bd8bd9a702781}
\strng{bibnamehash}{13861388789491fe0b3bd8bd9a702781}
\strng{authorbibnamehash}{13861388789491fe0b3bd8bd9a702781}
\strng{authornamehash}{62ac1914b11d2d521615214e0d967367}
\strng{authorfullhash}{13861388789491fe0b3bd8bd9a702781}
\field{sortinit}{I}
\field{sortinithash}{9417e9a1288a9371e2691d999083ed39}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Proceedings of LREC}
\field{title}{Twitter as a lifeline: Human-annotated twitter corpora for NLP of crisis-related messages}
\field{year}{2016}
\endentry
\entry{Lewis95}{inproceedings}{}
\name{author}{1}{}{%
{{un=0,uniquepart=base,hash=870d985358608ff1f593fc41f7b890b6}{%
family={Lewis},
familyi={L\bibinitperiod},
given={David\bibnamedelima D.},
giveni={D\bibinitperiod\bibinitdelim D\bibinitperiod},
givenun=0}}%
}
\list{publisher}{2}{%
{National Institute of Standards}%
{Technology {(NIST)}}%
}
\strng{namehash}{870d985358608ff1f593fc41f7b890b6}
\strng{fullhash}{870d985358608ff1f593fc41f7b890b6}
\strng{bibnamehash}{870d985358608ff1f593fc41f7b890b6}
\strng{authorbibnamehash}{870d985358608ff1f593fc41f7b890b6}
\strng{authornamehash}{870d985358608ff1f593fc41f7b890b6}
\strng{authorfullhash}{870d985358608ff1f593fc41f7b890b6}
\field{sortinit}{L}
\field{sortinithash}{dad3efd0836470093a7b4a7bb756eb8c}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Proceedings of {TREC-4}}
\field{title}{The {TREC-4} Filtering Track}
\field{year}{1995}
\verb{urlraw}
\verb http://trec.nist.gov/pubs/trec4/papers/lewis.ps.gz
\endverb
\verb{url}
\verb http://trec.nist.gov/pubs/trec4/papers/lewis.ps.gz
\endverb
\endentry
\entry{mccreadie2019trec}{inproceedings}{}
\name{author}{3}{}{%
{{un=0,uniquepart=base,hash=74212d7b5e575814cfd707992a8e2d0b}{%
family={McCreadie},
familyi={M\bibinitperiod},
given={Richard},
giveni={R\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=bf704044a7c90a2b16a1ddd24b973424}{%
family={Buntain},
familyi={B\bibinitperiod},
given={Cody},
giveni={C\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=7432c6dd275d56edfc6ddb32fa771cd2}{%
family={Soboroff},
familyi={S\bibinitperiod},
given={Ian},
giveni={I\bibinitperiod},
givenun=0}}%
}
\strng{namehash}{695d1ab210ba303faf26a602679ef8e6}
\strng{fullhash}{3f587b09517066776bd2be4e32a86f80}
\strng{bibnamehash}{3f587b09517066776bd2be4e32a86f80}
\strng{authorbibnamehash}{3f587b09517066776bd2be4e32a86f80}
\strng{authornamehash}{695d1ab210ba303faf26a602679ef8e6}
\strng{authorfullhash}{3f587b09517066776bd2be4e32a86f80}
\field{extraname}{1}
\field{sortinit}{M}
\field{sortinithash}{2e5c2f51f7fa2d957f3206819bf86dc3}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Proceedings of the 16th International Conference on Information Systems for Crisis Response and Management (ISCRAM)}
\field{title}{TREC Incident Streams: Finding Actionable Information on Social Media}
\field{year}{2019}
\endentry
\entry{Mccreadie2020}{inproceedings}{}
\name{author}{3}{}{%
{{un=0,uniquepart=base,hash=74212d7b5e575814cfd707992a8e2d0b}{%
family={McCreadie},
familyi={M\bibinitperiod},
given={Richard},
giveni={R\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=bf704044a7c90a2b16a1ddd24b973424}{%
family={Buntain},
familyi={B\bibinitperiod},
given={Cody},
giveni={C\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=7432c6dd275d56edfc6ddb32fa771cd2}{%
family={Soboroff},
familyi={S\bibinitperiod},
given={Ian},
giveni={I\bibinitperiod},
givenun=0}}%
}
\strng{namehash}{695d1ab210ba303faf26a602679ef8e6}
\strng{fullhash}{3f587b09517066776bd2be4e32a86f80}
\strng{bibnamehash}{3f587b09517066776bd2be4e32a86f80}
\strng{authorbibnamehash}{3f587b09517066776bd2be4e32a86f80}
\strng{authornamehash}{695d1ab210ba303faf26a602679ef8e6}
\strng{authorfullhash}{3f587b09517066776bd2be4e32a86f80}
\field{extraname}{2}
\field{sortinit}{M}
\field{sortinithash}{2e5c2f51f7fa2d957f3206819bf86dc3}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Proceedings of the 17th International Conference on Information Systems for Crisis Response And Management}
\field{number}{May}
\field{title}{{Incident Streams 2019 : Actionable Insights and How to Find Them}}
\field{year}{2020}
\verb{file}
\verb :Users/cbuntain/Documents/Mendeley Desktop/McCreadie, Buntain, Soboroff/Proceedings of the 17th International Conference on Information Systems for Crisis Response And Management/McCreadie, Buntain, Soboroff - 2020 - Incident Streams 2019 Actionable Insights and How to Find Them.pdf:pdf
\endverb
\keyw{categorization,crisis informatics,emergency management,real-time,twitter}
\endentry
\entry{olteanu2015expect}{inproceedings}{}
\name{author}{3}{}{%
{{un=0,uniquepart=base,hash=46e4f02318c4efab6b689cec48c3a9e8}{%
family={Olteanu},
familyi={O\bibinitperiod},
given={Alexandra},
giveni={A\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=bee4aef4a8cd07c9d36e9d24e64a8c30}{%
family={Vieweg},
familyi={V\bibinitperiod},
given={Sarah},
giveni={S\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=9945b3859caed4e19a23f700fa1b79db}{%
family={Castillo},
familyi={C\bibinitperiod},
given={Carlos},
giveni={C\bibinitperiod},
givenun=0}}%
}
\list{organization}{1}{%
{ACM}%
}
\strng{namehash}{c4bc44aca644ef8fe1f3d31118730591}
\strng{fullhash}{e7abfff4a455819ee0b175257c99133d}
\strng{bibnamehash}{e7abfff4a455819ee0b175257c99133d}
\strng{authorbibnamehash}{e7abfff4a455819ee0b175257c99133d}
\strng{authornamehash}{c4bc44aca644ef8fe1f3d31118730591}
\strng{authorfullhash}{e7abfff4a455819ee0b175257c99133d}
\field{sortinit}{O}
\field{sortinithash}{ff8d4eeb5101e3cf3809959b3592d942}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Proceedings of CSCW}
\field{title}{What to expect when the unexpected happens: Social media communications across crises}
\field{year}{2015}
\endentry
\entry{Purohit2018}{article}{}
\name{author}{4}{}{%
{{un=0,uniquepart=base,hash=0517065d269582cea2926cc8350b82d2}{%
family={Purohit},
familyi={P\bibinitperiod},
given={Hemant},
giveni={H\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=9945b3859caed4e19a23f700fa1b79db}{%
family={Castillo},
familyi={C\bibinitperiod},
given={Carlos},
giveni={C\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=2bd768b19dce2c8812b046e3b50b16cb}{%
family={Imran},
familyi={I\bibinitperiod},
given={Muhammad},
giveni={M\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=bebb28e3cb74f2117b6a69a0f8c9728c}{%
family={Pandev},
familyi={P\bibinitperiod},
given={Rahul},
giveni={R\bibinitperiod},
givenun=0}}%
}
\strng{namehash}{68ecd5747f8b7796a3b1c2f92d6e03d1}
\strng{fullhash}{3e7844864312d1b0e69992916874d74d}
\strng{bibnamehash}{3e7844864312d1b0e69992916874d74d}
\strng{authorbibnamehash}{3e7844864312d1b0e69992916874d74d}
\strng{authornamehash}{68ecd5747f8b7796a3b1c2f92d6e03d1}
\strng{authorfullhash}{3e7844864312d1b0e69992916874d74d}
\field{sortinit}{P}
\field{sortinithash}{bb5b15f2db90f7aef79bb9e83defefcb}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{abstract}{The public expects a prompt response from emergency services to address requests for help posted on social media. However, the information overload of social media experienced by these organizations, coupled with their limited human resources, challenges them to timely identify and prioritize critical requests. This is particularly acute in crisis situations where any delay may have a severe impact on the effectiveness of the response. While social media has been extensively studied during crises, there is limited work on formally characterizing serviceable help requests and automatically prioritizing them for a timely response. In this paper, we present a formal model of serviceability called Social-EOC (Social Emergency Operations Center), which describes the elements of a serviceable message posted in social media that can be expressed as a request. We also describe a system for the discovery and ranking of highly serviceable requests, based on the proposed serviceability model. We validate the model for emergency services, by performing an evaluation based on real-world data from six crises, with ground truth provided by emergency management practitioners. Our experiments demonstrate that features based on the serviceability model improve the performance of discovering and ranking (nDCG up to 25{\%}) service requests over different baselines. In the light of these experiments, the application of the serviceability model could reduce the cognitive load on emergency operation center personnel, in filtering and ranking public requests at scale.}
\field{isbn}{9781538660515}
\field{journaltitle}{Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018}
\field{title}{{Social-EOC: Serviceability model to rank social media requests for emergency operation centers}}
\field{year}{2018}
\field{pages}{119\bibrangedash 126}
\range{pages}{8}
\verb{doi}
\verb 10.1109/ASONAM.2018.8508709
\endverb
\verb{file}
\verb :Users/cbuntain/Documents/Mendeley Desktop/Purohit et al/Proceedings of the 2018 IEEEACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018/Purohit et al. - 2018 - Social-EOC Serviceability model to rank social media requests for emergency operation centers.pdf:pdf
\endverb
\keyw{Emergency Management,Help Intent,Information Overload,Serviceability,Social Media}
\endentry
\entry{10.1145/3404820.3404823}{article}{}
\name{author}{3}{}{%
{{un=0,uniquepart=base,hash=5ce07e5d89224edb81342e9a6ab8180b}{%
family={Qazi},
familyi={Q\bibinitperiod},
given={Umair},
giveni={U\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=2bd768b19dce2c8812b046e3b50b16cb}{%
family={Imran},
familyi={I\bibinitperiod},
given={Muhammad},
giveni={M\bibinitperiod},
givenun=0}}%
{{un=0,uniquepart=base,hash=80792d6784ab78b30794a214e7ee56e0}{%
family={Ofli},
familyi={O\bibinitperiod},
given={Ferda},
giveni={F\bibinitperiod},
givenun=0}}%
}
\list{location}{1}{%
{New York, NY, USA}%
}
\list{publisher}{1}{%
{Association for Computing Machinery}%
}
\strng{namehash}{916f36c766b9f50b7d0ec4516690def3}
\strng{fullhash}{7cb3b866a448a7152f9d59ca77ec2336}
\strng{bibnamehash}{7cb3b866a448a7152f9d59ca77ec2336}
\strng{authorbibnamehash}{7cb3b866a448a7152f9d59ca77ec2336}
\strng{authornamehash}{916f36c766b9f50b7d0ec4516690def3}
\strng{authorfullhash}{7cb3b866a448a7152f9d59ca77ec2336}
\field{sortinit}{Q}
\field{sortinithash}{c54e16deb53fc904a621fa8fd8703b5a}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{abstract}{The past several years have witnessed a huge surge in the use of social media platforms during mass convergence events such as health emergencies, natural or human-induced disasters. These non-traditional data sources are becoming vital for disease forecasts and surveillance when preparing for epidemic and pandemic outbreaks. In this paper, we present GeoCoV19, a large-scale Twitter dataset containing more than 524 million multilingual tweets posted over a period of 90 days since February 1, 2020. Moreover, we employ a gazetteer-based approach to infer the geolocation of tweets. We postulate that this largescale, multilingual, geolocated social media data can empower the research communities to evaluate how societies are collectively coping with this unprecedented global crisis as well as to develop computational methods to address challenges such as identifying fake news, understanding communities' knowledge gaps, building disease forecast and surveillance models, among others.}
\field{eprinttype}{arXiv}
\field{journaltitle}{SIGSPATIAL Special}
\field{month}{6}
\field{number}{1}
\field{title}{{GeoCoV19: A Dataset of Hundreds of Millions of Multilingual COVID-19 Tweets with Location Information}}
\field{volume}{12}
\field{year}{2020}
\field{pages}{6\bibrangedash 15}
\range{pages}{10}
\verb{doi}
\verb 10.1145/3404820.3404823
\endverb
\verb{eprint}
\verb 2005.11177
\endverb
\verb{file}
\verb :Users/cbuntain/Documents/Mendeley Desktop/Qazi, Imran, Ofli/SIGSPATIAL Special/Qazi, Imran, Ofli - 2020 - GeoCoV19 A Dataset of Hundreds of Millions of Multilingual COVID-19 Tweets with Location Information.pdf:pdf
\endverb
\verb{urlraw}
\verb https://doi.org/10.1145/3404820.3404823
\endverb
\verb{url}
\verb https://doi.org/10.1145/3404820.3404823
\endverb
\endentry
\entry{Zobel98}{inproceedings}{}
\name{author}{1}{}{%
{{un=0,uniquepart=base,hash=fec3a08fc98ee9b65f31e424408ed08f}{%
family={Zobel},
familyi={Z\bibinitperiod},
given={Justin},
giveni={J\bibinitperiod},
givenun=0}}%
}
\list{publisher}{1}{%
{ACM}%
}
\strng{namehash}{fec3a08fc98ee9b65f31e424408ed08f}
\strng{fullhash}{fec3a08fc98ee9b65f31e424408ed08f}
\strng{bibnamehash}{fec3a08fc98ee9b65f31e424408ed08f}
\strng{authorbibnamehash}{fec3a08fc98ee9b65f31e424408ed08f}
\strng{authornamehash}{fec3a08fc98ee9b65f31e424408ed08f}
\strng{authorfullhash}{fec3a08fc98ee9b65f31e424408ed08f}
\field{sortinit}{Z}
\field{sortinithash}{8f7b480688e809b50b6f6577b16f3db5}
\field{extradatescope}{labelyear}
\field{labeldatesource}{year}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Proceedings of SIGIR}
\field{isbn}{1581130155}
\field{title}{How Reliable Are the Results of Large-Scale Information Retrieval Experiments?}
\field{year}{1998}
\field{pages}{307\bibrangedash 314}
\range{pages}{8}
\verb{doi}
\verb 10.1145/290941.291014
\endverb
\verb{urlraw}
\verb https://doi.org/10.1145/290941.291014
\endverb
\verb{url}
\verb https://doi.org/10.1145/290941.291014
\endverb
\endentry
\enddatalist
\endrefsection
\endinput