SlideShare a Scribd company logo
1 of 30
Download to read offline
NEWS
CURATION
cu•ra•tor
(from Latin cura, care), means manager,
overseer, one who has the care and
superintendence of something
“   The editor who sits in a big building at the New
    York Times or your local newspaper that chooses
    what content you’ll see in your newspaper is a
    curator. So is the page designer who decides
    what story is at the top of the page - Robert Scoble
INFO MOLECULES
INFO MOLECULES
INFO MOLECULES
INFO MOLECULES
INFO MOLECULES
INFO MOLECULES
A curator is an information chemist. He or she mixes atoms together
in a way to build an info-molecule. Then adds value to that molecule.
HOWNEWS
CURATE
       TO
   - The Seven Needs of Real-Time Curators, Robert Scoble
1
BUNDLE
2
REORDER
3
DISTRIBUTE
4
EDITORIALIZE
“   ANYONE CAN COLLECT LINKS, AND
    ALGORITHMS CAN AGGREGATE.
    BUT ONLY TRAINED EDITORS
    HAVE THE SKILLS TO SELECT AND
    COLLECT THE BEST INFORMATION                     “
    AND BUILD A LOYAL AUDIENCE.
                    - MARK BRIGGS, JOURNALISM NEXT
5
UPDATE
    Upd
    V
        ated
      ersi on!
6
PARTICIPATE
7
TRACK
CURATION
EXAMPLES
THE REVOLUTION
WILL BE TWEETED
     TWITTER CURATION: NPR’S ANDY CARVIN
THE REVOLUTION
WILL BE TWEETED
     TWITTER CURATION: NPR’S ANDY CARVIN
NPR’S ANDY CARVIN
TWITTER CURATION USING A WIDGET
CURATING TWITTER CONTENT WITH PAPER.LI
Storify: pulls in content from Twitter, Facebook, Flickr &
   YouTube and generates a story based on real-time
             information from these networks
IN-CLASS WORK
CURATING TWEETS
ADD A TWITTER LIST & SEARCH WIDGET TO YOUR BLOG
HOW TO CREATE A
TWITTER LIST
         •   GO TO YOUR PROFILE
         •   CLICK ON LISTS
         •   CLICK CREATE A LIST
         •   NAME IT
         •   NAVIGATE TO PROFILE OF
             USER YOU WANT TO ADD
         •   CLICK ON
         •   CHECK BOX TO ADD
WHEN DONE, GO TO TWITTER WIDGETS PAGE, SELECT THE
  LIST, FILL OUT INFO, GRAB CODE & EMBED ON BLOG
CREDITS:
    Assistant Professor of Communication
   St. Edward’s University, Austin, Texas
      Email: corinnew@stedwards.edu
Blog: http://socialmediaprclass.blogspot.com
             Twitter: @corinnew

More Related Content

Viewers also liked

Viewers also liked (18)

Industrial Automation using unmanned Aerial vehicle
Industrial Automation using unmanned Aerial vehicleIndustrial Automation using unmanned Aerial vehicle
Industrial Automation using unmanned Aerial vehicle
 
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAttacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVE
 
Convert PowerPoint to Video
Convert PowerPoint to VideoConvert PowerPoint to Video
Convert PowerPoint to Video
 
IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11
 
The Bioteaming Manifesto
The Bioteaming ManifestoThe Bioteaming Manifesto
The Bioteaming Manifesto
 
Enabling Digital Transformation
Enabling Digital TransformationEnabling Digital Transformation
Enabling Digital Transformation
 
Content is king: easy & simple ways to curate relevant content
Content is king: easy & simple ways to curate relevant contentContent is king: easy & simple ways to curate relevant content
Content is king: easy & simple ways to curate relevant content
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
 
35 Lessons Learned in 35 Years
35 Lessons Learned in 35 Years35 Lessons Learned in 35 Years
35 Lessons Learned in 35 Years
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
 
Cloud Businesses: Strategic Considerations
Cloud Businesses: Strategic ConsiderationsCloud Businesses: Strategic Considerations
Cloud Businesses: Strategic Considerations
 
Introduction to Convolutional Neural Nets
Introduction to Convolutional Neural Nets Introduction to Convolutional Neural Nets
Introduction to Convolutional Neural Nets
 
Migrating Large Scale Data Sets to the Cloud
Migrating Large Scale Data Sets to the CloudMigrating Large Scale Data Sets to the Cloud
Migrating Large Scale Data Sets to the Cloud
 
Optimizing Storage for Big Data Analytics Workloads
Optimizing Storage for Big Data Analytics WorkloadsOptimizing Storage for Big Data Analytics Workloads
Optimizing Storage for Big Data Analytics Workloads
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Beyond DevOps - How Netflix Bridges the Gap
Beyond DevOps - How Netflix Bridges the GapBeyond DevOps - How Netflix Bridges the Gap
Beyond DevOps - How Netflix Bridges the Gap
 

Similar to Curating news

How to Identify and Track Your Social Community
How to Identify and Track Your Social CommunityHow to Identify and Track Your Social Community
How to Identify and Track Your Social Community
Eric Athas
 
Lecture 6 2012 twitter & science
Lecture 6 2012   twitter & scienceLecture 6 2012   twitter & science
Lecture 6 2012 twitter & science
Jessica Laccetti
 
Principles ofnewssocialmedia overview(1)
Principles ofnewssocialmedia overview(1)Principles ofnewssocialmedia overview(1)
Principles ofnewssocialmedia overview(1)
klstar1
 
Case studies-mining-social
Case studies-mining-socialCase studies-mining-social
Case studies-mining-social
Eric Athas
 

Similar to Curating news (20)

Twitter For Journalists
Twitter For JournalistsTwitter For Journalists
Twitter For Journalists
 
Creating Compelling Content for Nonprofits
Creating Compelling Content for Nonprofits Creating Compelling Content for Nonprofits
Creating Compelling Content for Nonprofits
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
 
Web 2.0 For Western Springs Jun25, 2009
Web 2.0 For Western Springs Jun25, 2009Web 2.0 For Western Springs Jun25, 2009
Web 2.0 For Western Springs Jun25, 2009
 
Building Thought Leadership through Content Curation
Building Thought Leadership through Content CurationBuilding Thought Leadership through Content Curation
Building Thought Leadership through Content Curation
 
Twitter 2019
Twitter 2019Twitter 2019
Twitter 2019
 
NABJ DJTF Social Reporting Webinar
NABJ DJTF Social Reporting WebinarNABJ DJTF Social Reporting Webinar
NABJ DJTF Social Reporting Webinar
 
How to Identify and Track Your Social Community
How to Identify and Track Your Social CommunityHow to Identify and Track Your Social Community
How to Identify and Track Your Social Community
 
Empowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaEmpowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jesha
 
How to Identify and Track Your Social Community
How to Identify and Track Your Social CommunityHow to Identify and Track Your Social Community
How to Identify and Track Your Social Community
 
Lecture 6 2012 twitter & science
Lecture 6 2012   twitter & scienceLecture 6 2012   twitter & science
Lecture 6 2012 twitter & science
 
Principles ofnewssocialmedia overview(1)
Principles ofnewssocialmedia overview(1)Principles ofnewssocialmedia overview(1)
Principles ofnewssocialmedia overview(1)
 
Case studies-mining-social
Case studies-mining-socialCase studies-mining-social
Case studies-mining-social
 
MyCharityConnects Winnipeg - Philanthropy 2.0 - Winnipeg [2011-03-02]
MyCharityConnects Winnipeg - Philanthropy 2.0  - Winnipeg [2011-03-02]MyCharityConnects Winnipeg - Philanthropy 2.0  - Winnipeg [2011-03-02]
MyCharityConnects Winnipeg - Philanthropy 2.0 - Winnipeg [2011-03-02]
 
Curation and Crowdsourcing for Journalists
Curation and Crowdsourcing for JournalistsCuration and Crowdsourcing for Journalists
Curation and Crowdsourcing for Journalists
 
Twitter Tips and Tricks
Twitter Tips and TricksTwitter Tips and Tricks
Twitter Tips and Tricks
 
Web 2.0 for Texas State Certified Public Manager (CPM)
Web 2.0 for Texas State Certified Public Manager (CPM)Web 2.0 for Texas State Certified Public Manager (CPM)
Web 2.0 for Texas State Certified Public Manager (CPM)
 
Web 2.0 For Texas State CPM Program
Web 2.0 For Texas State CPM ProgramWeb 2.0 For Texas State CPM Program
Web 2.0 For Texas State CPM Program
 
Gov 2.0 for Texas Certified Public Manager (CPM ) Program
Gov 2.0 for Texas Certified Public Manager (CPM ) ProgramGov 2.0 for Texas Certified Public Manager (CPM ) Program
Gov 2.0 for Texas Certified Public Manager (CPM ) Program
 
Social Media for the Catholic Press
Social Media for the Catholic PressSocial Media for the Catholic Press
Social Media for the Catholic Press
 

More from Corinne Weisgerber

More from Corinne Weisgerber (20)

Interviewing 2
Interviewing 2Interviewing 2
Interviewing 2
 
Crisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCrisis communication & the Austin Bombings
Crisis communication & the Austin Bombings
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe Online
 
Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015
 
Teaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuiteTeaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuite
 
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
 
The Networked Academic
The Networked AcademicThe Networked Academic
The Networked Academic
 
Social Media for Churches
Social Media for ChurchesSocial Media for Churches
Social Media for Churches
 
Social Media Metrics for Academics
Social Media Metrics for AcademicsSocial Media Metrics for Academics
Social Media Metrics for Academics
 
Communicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case StudyCommunicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case Study
 
Negotiating multiple identities on the social web
Negotiating multiple identities on the social webNegotiating multiple identities on the social web
Negotiating multiple identities on the social web
 
Re-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as CuratorsRe-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as Curators
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Social Media & Interreligious Understanding
Social Media & Interreligious UnderstandingSocial Media & Interreligious Understanding
Social Media & Interreligious Understanding
 
Empowering students through personal learning networks
Empowering students through personal learning networksEmpowering students through personal learning networks
Empowering students through personal learning networks
 
Egypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issuesEgypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issues
 
Re-interpreting the Social Media Dream
Re-interpreting the Social Media DreamRe-interpreting the Social Media Dream
Re-interpreting the Social Media Dream
 
PRSSA Twitter Workshop
PRSSA Twitter WorkshopPRSSA Twitter Workshop
PRSSA Twitter Workshop
 
Creating a Personal Learning Network
Creating a Personal Learning NetworkCreating a Personal Learning Network
Creating a Personal Learning Network
 
Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...
Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...
Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 

Curating news