Comfort, L. K., Kilkon, K., and Zagorecki, A. (2009). Co-
ordination in rapidly evolving disaster response sys-
tems: The role of information. American Behavioral
Scientist, 48(3):295 – 313.
Cramer, R. E., McMaster, M. R., Bartell, P., and Dragna, M.
(1988). Subject competence and the minimization of
the bystander effect. Journal of Applied Social Psy-
chology, 18:1133 – 1148.
Darley, J. M. and Batson, C. (1973). ”From Jerusalem to
Jericho”: A study of situational and dispositional vari-
ables in helping behavior. Journal of Personality and
Social Psychology, 27(1):100 – 108.
Darley, J. M. and Latan´e, B. (1968). Bystander intervention
in emergencies: Diffusion of responsibility. Journal
of Personality and Social Psychology, 8(4):377 – 383.
Eagle, N. and Pentland, A. (2005). Reality mining: Sens-
ing complex social systems. Personal and Ubiquitous
Computing, 9:1 – 14.
EU (2006). Directive 2006/24/EC of the European Parlia-
ment and of the Council on the retention of data gener-
ated or processed in connection with the provision of
publicly available electronic communications services
or of public communications networks and amending
Directive 2002/58/EC.
Faraj, S. and Xiao, Y. (2006). Coordination in fast-response
organizations. Management Science, 52(8):1155 –
1169.
Franke, M. and Geyer-Schulz, A. (2009). An update al-
gorithm for restricted random walk clustering for dy-
namic data sets. Advances in Data Analysis and Clas-
sification, 3(1):63 – 92.
Garcia, S. M., Weaver, K., Moskowitz, G. B., and Darley,
J. M. (2002). Crowded minds: The implicit bystander
effect. Journal of Personality and Social Psychology,
83:843 – 853.
Granovetter, M. (1982). The strength of weak ties: a net-
work theory revisited. chapter 5, pages 105 – 130.
Sage Publications, Inc., Beverly Hills, California.
Granovetter, M. S. (1973). The strength of weak ties. The
American Journal of Sociology, 78(6):1360 – 1380.
Hoser, B. and Geyer-Schulz, A. (2005). Eigenspectral anal-
ysis of hermitian adjacency matrices for the analysis
of group substructures. The Journal of Mathematical
Sociology, 29(4):265 – 294.
Kikiras, P. and Drakoulis, D. (2004). An integrated
approach for the estimation of mobile subscriber
geolocation. Wireless Personal Communications,
30(2):217–231.
Latan´e, B. and Darley, J. (1970). The Unresponsive By-
stander: Why doesn’t he help? Appleton-Century-
Crofts, New York.
Levine, M., Prosser, A., Evans, D., and Reicher, S. (2005).
Identity and emergency intervention: How social
group membership and inclusiveness of group bound-
aries shape helping behavior. Personality and Social
Psychology Bulletin, 31(4):443 – 453.
Markey, P. M. (2000). Bystander intervention in computer-
mediated communication. Computers in Human Be-
havior, 16:183 – 188.
Milgram, S. (1970). The experience of living in cities. Sci-
ence, 167:1461 – 1468.
Miller, D. T. and McFarland, C. (1987). Pluralistic igno-
rance: When similarity is interpreted as dissimiliarity.
Journal of Personality and Social Psychology, 53:298
– 305.
Monin, B. and Norton, M. (2003). Perceptions of a fluid
consensus: Uniqueness bias, false consensus, false
polarization, and pluralistic ignorance in a water con-
servation crisis. Personality and Social Psychology
Bulletin, 29:559 – 567.
Moriarty, T. (1975). Crime, commitment, and the respon-
sive bystander: Two field experiments. Journal of Per-
sonality and Social Psychology, 31:370 – 376.
Nadler, A. and Halabi, S. (2006). Intergroup helping as sta-
tus relations: Effects of status stability, identification,
and type of help on receptivity to high-status group’s
help. Journal of Personality and Social Psychology,
91(1):97 – 110.
Newman, M. E. J. and Girvan, M. (2004). Finding and eval-
uating community structure in networks. Physical Re-
view E, 69(2):026113.
Open Handset Alliance (2010). Open handset alliance.
http://www.openhandsetalliance.com/.
Ovelg¨onne, M. and Geyer-Schulz, A. (2009). Randomized
greedy modularity clustering. Technical report, Karl-
sruhe.
Palen, L. and Liu, S. B. (2007). Citizen communication
in crisis: Anticipating a future of ict-supported public
participation. In CHI 2007 Proceedings, pages 727 –
736. ACM.
Piliavin, I. M., Piliavin, J. A., and Rodin, J. (1975). Costs,
diffusion, and the stigmatized victim. Journal of Per-
sonality and Social Psychology, 32(3):429 – 438.
Rungg, A. (2010). Privatsp¨are 2.0. Technical report, Finan-
cial Times Deutschland, 17.2.2010, p.25.
Rutkowski, G. K., Gruder, C. L., and Romer, D. (1983).
Group cohesiveness, social norms, and bystander in-
tervention. Journal of Personality and Social Psychol-
ogy, 44:545 – 552.
Schwartz, S. H. and Gottlieb, A. (1980). Bystander
anonymity and reaction to emergencies. Journal of
Personality and Social Psychology, 39:418 – 430.
Shotland, R. L. and Heinold, W. D. (1985). Bystander
response to arterial bleeding: Helping skills, the
decision-making process, and differentiating the help-
ing response. Journal of Personality and Social Psy-
chology, 49:347 – 356.
Shotland, R. L. and Stebbins, C. A. (1980). Bystander re-
sponse to rape: Can a victim attract help? Journal of
Applied Social Psychology, 10:510 – 527.
Shotland, R. L. and Straw, M. K. (1976). Bystander re-
sponse to an assault: When a man attacks a woman.
Journal of Personality and Social Psychology, 34:990
– 999.
Smith, J. (2003). The nature of personal robbery. Home
Office Research Study 254, Home Office Research,
Development and Statictics Directorate.
GETTING HELP IN A CROWD - A Social Emergency Alert Service
217