Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Journal of Homeland Security and Emergency Management

Editor-in-Chief: Renda-Tanali, Irmak, D.Sc.

Managing Editor: McGee, Sibel, Ph.D.

4 Issues per year


IMPACT FACTOR 2016: 0.474
5-year IMPACT FACTOR: 0.627

CiteScore 2016: 0.57

SCImago Journal Rank (SJR) 2016: 0.245
Source Normalized Impact per Paper (SNIP) 2016: 0.358

Online
ISSN
1547-7355
See all formats and pricing
More options …

The Evolving Role of the Public Information Officer: An Examination of Social Media in Emergency Management

Amanda L. Hughes / Leysia Palen
Published Online: 2012-06-21 | DOI: https://doi.org/10.1515/1547-7355.1976

Abstract

This work examines how the introduction of social media has affected the role of the Public Information Officer (PIO)—the public relations component of the National Incident Management System (NIMS). Through analysis of 25 PIO interviews, we examine the work practice of PIOs and find that social media expand not only the scope and type of PIO work activity, but also the “information pathways” that exist between PIOs, the media, and members of the public. We model these changes and examine how the presence of social media challenges previous conceptualizations of PIO work. Lastly, we present a view of how PIO work could be better imagined for the future of emergency management organizations.

Keywords: crisis informatics; emergency management; ICT; NIMS; Public Information Officer; PIO; social media

About the article

Published Online: 2012-06-21


Citation Information: Journal of Homeland Security and Emergency Management, ISSN (Online) 1547-7355, DOI: https://doi.org/10.1515/1547-7355.1976.

Export Citation

©2012 Walter de Gruyter GmbH & Co. KG, Berlin/Boston. Copyright Clearance Center

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

[1]
Fidel Liberal, Jose Oscar Fajardo, Cristina Lumbreras, and Wolfgang Kampichler
IEEE Communications Magazine, 2017, Volume 55, Number 1, Page 132
[2]
Christian Reuter and Marc-André Kaufhold
Journal of Contingencies and Crisis Management, 2017
[5]
Loni Hagen, Thomas Keller, Stephen Neely, Nic DePaula, and Claudia Robert-Cooperman
Social Science Computer Review, 2017, Page 089443931772198
[6]
Uuf Brajawidagda, Christopher G. Reddick, and Akemi Takeoka Chatfield
Information Polity, 2017, Page 1
[7]
Femke Mulder, Julie Ferguson, Peter Groenewegen, Kees Boersma, and Jeroen Wolbers
Big Data & Society, 2016, Volume 3, Number 2, Page 205395171666205
[8]
Gregory A. Williams, Chelsea L. Woods, and Nicole C. Staricek
Communication Studies, 2017, Volume 68, Number 4, Page 385
[9]
Sara E Harrison and Peter A. Johnson
International Journal of Information Systems for Crisis Response and Management, 2016, Volume 8, Number 4, Page 17
[10]
Shafiza Mohd Shariff, Xiuzhen Zhang, and Mark Sanderson
Computers in Human Behavior, 2017, Volume 75, Page 785
[11]
Venkata Kishore Neppalli, Cornelia Caragea, Doina Caragea, Murilo Cerqueira Medeiros, Andrea H Tapia, and Shane E. Halse
International Journal of Information Systems for Crisis Response and Management, 2016, Volume 8, Number 3, Page 32
[12]
Shane E. Halse, Andria Tapia, Anna Squicciarini, and Cornelia Caragea
Information, Communication & Society, 2017, Page 1
[13]
Clayton Wukich, Michael D. Siciliano, Jason Enia, and Brandon Boylan
International Public Management Journal, 2017, Volume 20, Number 3, Page 381
[14]
Clayton Wukich
Journal of Contingencies and Crisis Management, 2016, Volume 24, Number 4, Page 230
[15]
Mats Eriksson and Eva-Karin Olsson
Journal of Contingencies and Crisis Management, 2016, Volume 24, Number 4, Page 198
[16]
Desmond Upton Patton, Robert D. Eschmann, Caitlin Elsaesser, and Eddie Bocanegra
Computers in Human Behavior, 2016, Volume 65, Page 591
[17]
Clayton Wukich and Ines Mergel
Government Information Quarterly, 2016, Volume 33, Number 2, Page 305
[18]
Sharon Mastracci
Journal of Homeland Security and Emergency Management, 2015, Volume 12, Number 4
[19]
[20]
Muhammad Imran, Carlos Castillo, Fernando Diaz, and Sarah Vieweg
ACM Computing Surveys, 2015, Volume 47, Number 4, Page 1
[21]
Dharma Dailey and Kate Starbird
Computer Supported Cooperative Work (CSCW), 2014, Volume 23, Number 4-6, Page 445
[22]
Ann Hayward Walker, Robert Pavia, Ann Bostrom, Thomas M. Leschine, and Kate Starbird
Human and Ecological Risk Assessment: An International Journal, 2015, Volume 21, Number 3, Page 667
[23]
Brendan Pender, Graham Currie, Alexa Delbosc, and Nirajan Shiwakoti
Transport Reviews, 2014, Volume 34, Number 4, Page 501
[24]
David M. Hondula and Rashmi Krishnamurthy
Public Administration Review, 2014, Volume 74, Number 2, Page 274
[25]
David E. Alexander
Science and Engineering Ethics, 2014, Volume 20, Number 3, Page 717
[26]
Elisabeth Sjöberg, Gary C. Barker, Jonas Landgren, Isaac Griberg, Jeffrey E. Skiby, Anna Tubbin, Anne von Stapelmohr, Malin Härenstam, Mikael Jansson, and Rickard Knutsson
Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 2013, Volume 11, Number S1, Page S264

Comments (0)

Please log in or register to comment.
Log in