Contextual Analysis of the Victims’ Social Network for People Recommendation on the Emergency Scenario

  • Sírius Thadeu Ferreira da Silva
  • Jonice Oliveira
  • Marcos R. S. Borges
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7493)


The growing use of mobile devices by the population and the high popularity of the social media in current society, such as Facebook and Twitter, produces more and more information, plenty of them with contextual data. One of the major obstacles to the emergency response team during the response phase of emergency management is to obtain information that could lead to solving a particular situation involving emergency victims. In this paper we present a proposal which aims to collect information from social media and mobile devices, identify the contextual information and analyze them to indicate people who could help in the identification of victims. This work focuses on identifying the social network of victims and look for people who can provide important and reliable information about them, thus assisting the emergency team in its work. We use this contextual information to improve the recommendation process, identifying people with high degree of closeness.


Social Networks Emergency Response Recommendation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    United Nations, Department of Humanitarian Affairs: Internationally Agreed Glossary of Basic Terms Related to Disaster Management. United Nations, Geneva (1992)Google Scholar
  2. 2.
    Drabek, T.E.: The Social Dimensions of Disaster. Federal Emergency Management Agency, Emergency Management Institute, Emmitsburg, MD (1996)Google Scholar
  3. 3.
    Milgram, S.: The Small World Problem. Psychology Today 1(1), 61–67 (1967)MathSciNetGoogle Scholar
  4. 4.
    Kapferer, B.: Norms and the Manipulation of Relationships in a Work Context. In: Mitchell, J.C. (ed.) Social Networks in Urban Situations. Manchester University Press, Manchester (1969)Google Scholar
  5. 5.
    Verbrugge, L.M.: Multiplexity in Adult Friendships. Social Forces 57(4), 1286–1309 (1979)Google Scholar
  6. 6.
    Granovetter, M.S.: The Strength of Weak Ties. The American Journal of Sociology 78(6), 1360–1380 (1973)CrossRefGoogle Scholar
  7. 7.
    Wagner, D., Lopez, M., Doria, A., Pavlyshak, I., Kostakos, V., Oakley, I., Spiliotopoulos, T.: Hide and seek. In: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services, Lisbon, p. 55 (2010)Google Scholar
  8. 8.
    Murphy, T., Jennex, M.E.: Knowledge Management Systems for Hurricane Katrina Response. In: Proceedings of the 3rd International ISCRAM Conference, Newark, p. 615 (2006)Google Scholar
  9. 9.
    Google, Inc. Google Person Finder,

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Sírius Thadeu Ferreira da Silva
    • 1
  • Jonice Oliveira
    • 1
  • Marcos R. S. Borges
    • 1
  1. 1.PPGI/IM – Graduate Program in Informatics, Institute of Mathematics (IM)Federal University of Rio de Janeiro (UFRJ)Rio de JaneiroBrazil

Personalised recommendations