z-logo
Premium
Tracking and Analyzing Individual Distress Following Terrorist Attacks Using Social Media Streams
Author(s) -
Lin YuRu,
Margolin Drew,
Wen Xidao
Publication year - 2017
Publication title -
risk analysis
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.972
H-Index - 130
eISSN - 1539-6924
pISSN - 0272-4332
DOI - 10.1111/risa.12829
Subject(s) - sadness , anger , terrorism , distress , social media , baseline (sea) , psychology , anxiety , social anxiety , computer science , applied psychology , computer security , social psychology , clinical psychology , political science , world wide web , psychiatry , law
Risk research has theorized a number of mechanisms that might trigger, prolong, or potentially alleviate individuals' distress following terrorist attacks. These mechanisms are difficult to examine in a single study, however, because the social conditions of terrorist attacks are difficult to simulate in laboratory experiments and appropriate preattack baselines are difficult to establish with surveys. To address this challenge, we propose the use of computational focus groups and a novel analysis framework to analyze a social media stream that archives user history and location. The approach uses time‐stamped behavior to quantify an individual's preattack behavior after an attack has occurred, enabling the assessment of time‐specific changes in the intensity and duration of an individual's distress, as well as the assessment of individual and social‐level covariates. To exemplify the methodology, we collected over 18 million tweets from 15,509 users located in Paris on November 13, 2015, and measured the degree to which they expressed anxiety, anger, and sadness after the attacks. The analysis resulted in findings that would be difficult to observe through other methods, such as that news media exposure had competing, time‐dependent effects on anxiety, and that gender dynamics are complicated by baseline behavior. Opportunities for integrating computational focus group analysis with traditional methods are discussed.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here