Visual analytics for investigative analysis of hoax distress calls using social media

Junghoon Chae, Jiawei Zhang, Sungahn Ko, Abish Malik, Heather Connell, David S. Ebert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

A hoax distress call is a serious concern for the U.S. Coast Guard. Hoax calls not only put the Coast Guard rescue personnel in potentially dangerous situations, but also waste valuable assets that should be used for real emergency situations. However, conventional approaches do not provide enough information for investigating hoax calls and callers. As social media has played a pervasive role in the way people communicate, such data opens new opportunities and solutions to a wide range of challenges. In this paper, we present social media visual analytics solutions for supporting the investigation for hoax distress calls. We not only provide a set of comprehensive keyword collections, but also resolve the lack of social media data for the investigation. Our framework allows investigators to identify suspicious Twitter users and provide a visual analytics environment designed to examine geo-Tagged tweets and Instagram messages in the context of hoax distress calls.

Original languageEnglish
Title of host publication2016 IEEE Symposium on Technologies for Homeland Security, HST 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509007707
DOIs
StatePublished - Sep 14 2016
Externally publishedYes
Event2016 IEEE Symposium on Technologies for Homeland Security, HST 2016 - Waltham, United States
Duration: May 10 2016May 11 2016

Publication series

Name2016 IEEE Symposium on Technologies for Homeland Security, HST 2016

Conference

Conference2016 IEEE Symposium on Technologies for Homeland Security, HST 2016
Country/TerritoryUnited States
CityWaltham
Period05/10/1605/11/16

Fingerprint

Dive into the research topics of 'Visual analytics for investigative analysis of hoax distress calls using social media'. Together they form a unique fingerprint.

Cite this