Internal report I prepared regarding negative effects of anonymous, reader-submitted comments on www.steamboatpilot.com. This report led to a change in policy at the newspaper that requires identity verification.
A Journalist's guide to working with social sourcesFirst Draft
This document provides a journalist's guide to working with social media sources and eyewitness media. It addresses key questions like how to contact social sources, how to word calls to eyewitnesses, when permission is needed to use eyewitness media, and how to credit and protect people in eyewitness media. The guide stresses building trust with sources, considering their privacy and emotional state, and avoiding encouraging dangerous behavior to capture media. It also addresses ethical dilemmas around using private or traumatic communications from social media.
This document provides an overview of the remaining classes for a journalism ethics course. It includes a preview of upcoming guest speakers on ethics topics, details of quizzes and assignments. The instructor reviews answers to a recent quiz, covering topics like media ownership, digital audiences, privacy and visual journalism. Upcoming assignments involve reading articles by guest speaker Cristela Guerra on reporting ethics and analyzing a Nightline segment for its coverage of ethics issues.
The document compares traditional mediums of self-narrative like journals and literature to modern blogging. It discusses initial impressions of blogging and whether it is a legitimate form of self-narrative. A "battle" is depicted between authors and bloggers, with journaling compared to blogs. Blogging allows for easy, customizable and public or private entries, while traditional methods require more resources. Both mediums can reach audiences, but blogging has become more accepted as a form of self-narrative with internet growth. The writer remains torn between traditional and blogging worlds.
The document presents Kimberly Cardinal's theory of convenience, which argues that people are increasingly sharing details about their personal lives online rather than communicating via phone or letters due to convenience. As technology allows people more control over their schedules, social media images have become normalized in society. People are thus more inclined to post about their daily lives online to keep friends and family updated in a time-efficient way, which can reinforce individualism if overused. The theory is classified as interpretive as it aims to understand this phenomenon of increased online self-sharing rather than scientifically explain or predict human behavior.
This document summarizes 10 common mistakes that public relations professionals make when dealing with journalists. These mistakes include following up too aggressively after sending out releases, taking too long to respond to journalist inquiries, not including clear contact information, failing to understand the realities of journalism work, misspelling journalists' names, breaking promises made to journalists, being gatekeepers rather than facilitators, showing favoritism to larger media outlets, and having too narrow a perspective focused on their client rather than the needs of journalists. The document provides examples and advice on how to avoid these mistakes and have more successful media relations.
M.K. Fain was fired from her job as a software engineer at Promptworks in Philadelphia for writing a blog post about feminism and non-binary gender identities. She and some female coworkers had also previously filed a harassment complaint against the company. After being fired, Fain was ostracized by parts of the tech community and had speaking engagements canceled due to complaints about being "transphobic". While the experience was difficult, it motivated Fain to double down on feminist writing and start her own platforms to discuss these issues.
This chapter discusses how youth use new media technologies like mobile phones, instant messaging, and social media in their dating practices and intimacy. It explores how these technologies have changed courtship rituals, allowing youth to get to know each other online before meeting in person, but also how they make breaking up more difficult by leaving digital remnants of past relationships. While new media provides benefits of privacy and easier communication, it can also make youth more vulnerable if too much personal information is shared publicly online.
A Journalist's guide to working with social sourcesFirst Draft
This document provides a journalist's guide to working with social media sources and eyewitness media. It addresses key questions like how to contact social sources, how to word calls to eyewitnesses, when permission is needed to use eyewitness media, and how to credit and protect people in eyewitness media. The guide stresses building trust with sources, considering their privacy and emotional state, and avoiding encouraging dangerous behavior to capture media. It also addresses ethical dilemmas around using private or traumatic communications from social media.
This document provides an overview of the remaining classes for a journalism ethics course. It includes a preview of upcoming guest speakers on ethics topics, details of quizzes and assignments. The instructor reviews answers to a recent quiz, covering topics like media ownership, digital audiences, privacy and visual journalism. Upcoming assignments involve reading articles by guest speaker Cristela Guerra on reporting ethics and analyzing a Nightline segment for its coverage of ethics issues.
The document compares traditional mediums of self-narrative like journals and literature to modern blogging. It discusses initial impressions of blogging and whether it is a legitimate form of self-narrative. A "battle" is depicted between authors and bloggers, with journaling compared to blogs. Blogging allows for easy, customizable and public or private entries, while traditional methods require more resources. Both mediums can reach audiences, but blogging has become more accepted as a form of self-narrative with internet growth. The writer remains torn between traditional and blogging worlds.
The document presents Kimberly Cardinal's theory of convenience, which argues that people are increasingly sharing details about their personal lives online rather than communicating via phone or letters due to convenience. As technology allows people more control over their schedules, social media images have become normalized in society. People are thus more inclined to post about their daily lives online to keep friends and family updated in a time-efficient way, which can reinforce individualism if overused. The theory is classified as interpretive as it aims to understand this phenomenon of increased online self-sharing rather than scientifically explain or predict human behavior.
This document summarizes 10 common mistakes that public relations professionals make when dealing with journalists. These mistakes include following up too aggressively after sending out releases, taking too long to respond to journalist inquiries, not including clear contact information, failing to understand the realities of journalism work, misspelling journalists' names, breaking promises made to journalists, being gatekeepers rather than facilitators, showing favoritism to larger media outlets, and having too narrow a perspective focused on their client rather than the needs of journalists. The document provides examples and advice on how to avoid these mistakes and have more successful media relations.
M.K. Fain was fired from her job as a software engineer at Promptworks in Philadelphia for writing a blog post about feminism and non-binary gender identities. She and some female coworkers had also previously filed a harassment complaint against the company. After being fired, Fain was ostracized by parts of the tech community and had speaking engagements canceled due to complaints about being "transphobic". While the experience was difficult, it motivated Fain to double down on feminist writing and start her own platforms to discuss these issues.
This chapter discusses how youth use new media technologies like mobile phones, instant messaging, and social media in their dating practices and intimacy. It explores how these technologies have changed courtship rituals, allowing youth to get to know each other online before meeting in person, but also how they make breaking up more difficult by leaving digital remnants of past relationships. While new media provides benefits of privacy and easier communication, it can also make youth more vulnerable if too much personal information is shared publicly online.
Growing Your Business with Twitter: An Infoboom WebinarPaul Gillin
Twitter is the hottest new social networking tool, but it can be dense and confusing to the uninitiated. Successful users are finding that Twitter can deliver a gusher of value, from market intelligence to sales leads, but unlocking that value requires understanding the unique characteristics and culture of the Twitter community.
This webinar looks at the dynamics of Twitter and how to apply it to your business. You'll learn:
Who should “tweet” for your company;
How to create a unique and compelling Twitter presence;
How to grow a quality follower base;
The value of retweets and hash tags;
How to express yourself in 140 characters; and
The low-hanging fruit of business value.
Facebook 101: Tips and Tricks provides 25 tips for optimizing your Facebook experience. It discusses setting up a profile with a current photo, inviting real friends and family but not random strangers, using features like writing on friends' walls, updating your status occasionally, creating events, tagging photos, and making pages. It also warns about potential employers checking profiles and provides safety tips like being wary of scammers. The document aims to help users make the most of Facebook while avoiding privacy and safety issues.
The document discusses the debate around online dating versus offline dating. It provides perspectives from sources on both sides of the issue. Some of the key points made include: online dating provides convenience and allows people to efficiently find others with shared interests, but it may also discourage commitment and people from putting effort into real-world interactions since there is always another match available online. Ultimately, different people have different preferences for how to meet partners based on their lifestyle and needs.
The document discusses the history and reasons for fake news, how to identify it, and efforts by search engines and social media platforms to curb its spread. It notes that fake news has existed for centuries, often for financial or propaganda reasons. Recent examples spread for clicks and advertising revenue. The document outlines techniques for verifying news claims, such as checking dates, sources, images and details. It acknowledges challenges given platforms often promote engaging content that confirms biases. Search engines and Facebook are working on solutions but their algorithms remain imperfect and sometimes promote false stories.
Dr. Brian Housand gave a presentation on teaching critical thinking in a post-truth world. He discussed how the rise of fake news and speed of information sharing online has left many people unprepared to distinguish real from false information. Some key challenges in identifying fake news are the speed at which information spreads versus the time needed for fact-checking, information overload on social media, and a growing crisis of authenticity for verifying sources. Dr. Housand recommended teaching students tools like the CRAAP test to develop skills in evaluating currency, relevance, authority, accuracy and purpose of information to help identify fake news.
The power point presentation given to a class at the University of Utah in September, 2008.
The topic is fact checking and accuracy and I shared my code of ethics for blogging.
This document provides an overview of a class on the psychology and spread of fake news. It discusses factors that contribute to the belief and dissemination of fake news, including low political knowledge, confirmation bias, echo chambers on social media, and incentives for politicians to reinforce beliefs. It also outlines assignments for the class, including analyzing case studies of fake news articles through essays and presentations examining the source, content, and intended effects of the stories. Groups will analyze specific fake news stories and the document lists potential topics for each group.
Facebook is introducing news flags to identify fake content on its platform. While this aims to limit the spread of misinformation, the approach has limitations. It is easy for activist groups to game the system by mass-flagging opposing views. Also, stories flagged as containing false information may not provide enough context about what exactly is false. Facebook could improve by helping debunking articles spread, showing more transparency in its fact-checking process, and supporting digital media literacy education for users.
This document discusses how to identify fake news and evaluate the reliability of news sources. It begins by defining fake news as intentionally deceptive information created to mislead readers, often by playing on biases. While fake news has existed for a long time, it is especially prevalent online. The document provides tips on how to determine the truthfulness of a claim, including checking if a source provides evidence from reputable studies or if it is trying to convince readers of a particular viewpoint. It recommends vetting sources by checking their domain extension and researching their credibility. Examples are given to show how to compare news sites for reliability and biases. Readers are encouraged to fact check questionable claims from social media by investigating stories from trusted news outlets.
This document provides information on identifying and avoiding fake news. It discusses that distinguishing real from fake news is an important skill, and the objective is to help readers better identify fake news and avoid using those sources for scholarly research. It then provides tips on spotting fake news such as checking the author and source credibility, verifying images are being used correctly in context, and using fact-checking websites and browser extensions. Questionable aspects of news stories are outlined, such as sensationalized headlines, lack of multiple sources reporting on the story, and stories designed to appeal more to emotions than facts.
This document discusses evaluating evidence and determining the credibility of information sources. It provides examples of different types of evidence from personal testimonies to scientific studies and emphasizes the importance of considering evidence from reliable sources. Readers are encouraged to be skeptical of claims unless they are supported by solid evidence and to have an open mind when considering new information rather than avoiding facts that contradict preexisting beliefs. Critical thinking skills are important for separating facts from fiction.
A handout for the jobseekers, those who want insight from the publishing community -- this is entirely for those who can pass around for their amusement. Those who want to pass this around are more than welcome to.
Fake news, its ramifications and tools to check this menace.Chetan Thathoo
What is Fake News, statistics related to it, tools to discover fake news,examples across countries, India scenario in the context of fake news, criticism of these tools and the effect of fake news on POTUS elections.
Brian Housand, Ph.D.
brianhousand.com
@brianhousand
In 2006, we first learned that even the brightest students were easily fooled by internet hoaxes like the Pacific Northwest Tree Octopus. While we tried to laugh this off as the folly of misguided youth, a decade later we witnessed the rise of fake news and its impact on the “post-truth” world of 2016 overrun by an ever-growing network of social media. To fight for truth, justice, and yes, even the American way, this session presents a collection of superhero-themed critical thinking activities designed to empower you and your students to conquer the evils of fake news.
This document provides guidance on avoiding social media landmines and getting value from social media interactions. It discusses how journalists use social media, how to appropriately pitch to journalists online, maintaining professional relationships, addressing negative comments, copyright issues, and strategies for avoiding regrettable posts. Key topics include maintaining control of emotions, choosing words carefully, and acting as if anything posted could be made public.
This document discusses what constitutes fake news and provides tips on how to identify it. Fake news are hoaxes and propaganda designed to look like real news stories for profit or to damage reputations. Anyone can now publish news, making it harder to distinguish from real journalism. To avoid fake news, carefully examine sources and check unknown outlets on fact-checking sites. Rather than rely solely on social media, consume a variety of news from trustworthy sources and do your own research.
The document provides guidance on using social media platforms like Twitter, Facebook, and YouTube for business purposes. It recommends aiming for 40% original content, 30% replies, 20% retweets, and 10% links on Twitter. For Facebook, it suggests customizing privacy and notification settings. And for YouTube, it describes how to create a business channel, upload videos, and embed videos on a website.
In Defense of Anonymous Commenters - Jen Eyer at TEDx (script)Jen Strayer Eyer
The document discusses anonymity in online commenting on news sites. It summarizes that:
1) Requiring real names reduces participation, especially from vulnerable groups, and does not guarantee civility as offensive comments still occur under real names.
2) Anonymity allows for whistleblowing and discussion of sensitive local issues. Comment moderation through clear rules, engagement, and an evolution to higher quality discussions is more effective than real names at improving civility.
3) Research shows anonymous commenters on well-moderated sites contribute valuable local information and have more positive, productive discussions than those using real names. Anonymity with moderation enables important community conversations.
This document summarizes a confession by an anonymous former paid internet shill. The shill describes being hired by a shadowy organization to manipulate online discussions and spread pro-Israel messaging on various forums and social media sites. They were given training, scripts, and dossiers on popular forum members to target. Though initially apolitical, over time the shill began to genuinely believe the pro-Israel views they were promoting. Eventually, the stress of lying to friends and family about their real job led them to quit. The shill hopes bringing attention to these practices will help people be more discerning about what they read online.
Growing Your Business with Twitter: An Infoboom WebinarPaul Gillin
Twitter is the hottest new social networking tool, but it can be dense and confusing to the uninitiated. Successful users are finding that Twitter can deliver a gusher of value, from market intelligence to sales leads, but unlocking that value requires understanding the unique characteristics and culture of the Twitter community.
This webinar looks at the dynamics of Twitter and how to apply it to your business. You'll learn:
Who should “tweet” for your company;
How to create a unique and compelling Twitter presence;
How to grow a quality follower base;
The value of retweets and hash tags;
How to express yourself in 140 characters; and
The low-hanging fruit of business value.
Facebook 101: Tips and Tricks provides 25 tips for optimizing your Facebook experience. It discusses setting up a profile with a current photo, inviting real friends and family but not random strangers, using features like writing on friends' walls, updating your status occasionally, creating events, tagging photos, and making pages. It also warns about potential employers checking profiles and provides safety tips like being wary of scammers. The document aims to help users make the most of Facebook while avoiding privacy and safety issues.
The document discusses the debate around online dating versus offline dating. It provides perspectives from sources on both sides of the issue. Some of the key points made include: online dating provides convenience and allows people to efficiently find others with shared interests, but it may also discourage commitment and people from putting effort into real-world interactions since there is always another match available online. Ultimately, different people have different preferences for how to meet partners based on their lifestyle and needs.
The document discusses the history and reasons for fake news, how to identify it, and efforts by search engines and social media platforms to curb its spread. It notes that fake news has existed for centuries, often for financial or propaganda reasons. Recent examples spread for clicks and advertising revenue. The document outlines techniques for verifying news claims, such as checking dates, sources, images and details. It acknowledges challenges given platforms often promote engaging content that confirms biases. Search engines and Facebook are working on solutions but their algorithms remain imperfect and sometimes promote false stories.
Dr. Brian Housand gave a presentation on teaching critical thinking in a post-truth world. He discussed how the rise of fake news and speed of information sharing online has left many people unprepared to distinguish real from false information. Some key challenges in identifying fake news are the speed at which information spreads versus the time needed for fact-checking, information overload on social media, and a growing crisis of authenticity for verifying sources. Dr. Housand recommended teaching students tools like the CRAAP test to develop skills in evaluating currency, relevance, authority, accuracy and purpose of information to help identify fake news.
The power point presentation given to a class at the University of Utah in September, 2008.
The topic is fact checking and accuracy and I shared my code of ethics for blogging.
This document provides an overview of a class on the psychology and spread of fake news. It discusses factors that contribute to the belief and dissemination of fake news, including low political knowledge, confirmation bias, echo chambers on social media, and incentives for politicians to reinforce beliefs. It also outlines assignments for the class, including analyzing case studies of fake news articles through essays and presentations examining the source, content, and intended effects of the stories. Groups will analyze specific fake news stories and the document lists potential topics for each group.
Facebook is introducing news flags to identify fake content on its platform. While this aims to limit the spread of misinformation, the approach has limitations. It is easy for activist groups to game the system by mass-flagging opposing views. Also, stories flagged as containing false information may not provide enough context about what exactly is false. Facebook could improve by helping debunking articles spread, showing more transparency in its fact-checking process, and supporting digital media literacy education for users.
This document discusses how to identify fake news and evaluate the reliability of news sources. It begins by defining fake news as intentionally deceptive information created to mislead readers, often by playing on biases. While fake news has existed for a long time, it is especially prevalent online. The document provides tips on how to determine the truthfulness of a claim, including checking if a source provides evidence from reputable studies or if it is trying to convince readers of a particular viewpoint. It recommends vetting sources by checking their domain extension and researching their credibility. Examples are given to show how to compare news sites for reliability and biases. Readers are encouraged to fact check questionable claims from social media by investigating stories from trusted news outlets.
This document provides information on identifying and avoiding fake news. It discusses that distinguishing real from fake news is an important skill, and the objective is to help readers better identify fake news and avoid using those sources for scholarly research. It then provides tips on spotting fake news such as checking the author and source credibility, verifying images are being used correctly in context, and using fact-checking websites and browser extensions. Questionable aspects of news stories are outlined, such as sensationalized headlines, lack of multiple sources reporting on the story, and stories designed to appeal more to emotions than facts.
This document discusses evaluating evidence and determining the credibility of information sources. It provides examples of different types of evidence from personal testimonies to scientific studies and emphasizes the importance of considering evidence from reliable sources. Readers are encouraged to be skeptical of claims unless they are supported by solid evidence and to have an open mind when considering new information rather than avoiding facts that contradict preexisting beliefs. Critical thinking skills are important for separating facts from fiction.
A handout for the jobseekers, those who want insight from the publishing community -- this is entirely for those who can pass around for their amusement. Those who want to pass this around are more than welcome to.
Fake news, its ramifications and tools to check this menace.Chetan Thathoo
What is Fake News, statistics related to it, tools to discover fake news,examples across countries, India scenario in the context of fake news, criticism of these tools and the effect of fake news on POTUS elections.
Brian Housand, Ph.D.
brianhousand.com
@brianhousand
In 2006, we first learned that even the brightest students were easily fooled by internet hoaxes like the Pacific Northwest Tree Octopus. While we tried to laugh this off as the folly of misguided youth, a decade later we witnessed the rise of fake news and its impact on the “post-truth” world of 2016 overrun by an ever-growing network of social media. To fight for truth, justice, and yes, even the American way, this session presents a collection of superhero-themed critical thinking activities designed to empower you and your students to conquer the evils of fake news.
This document provides guidance on avoiding social media landmines and getting value from social media interactions. It discusses how journalists use social media, how to appropriately pitch to journalists online, maintaining professional relationships, addressing negative comments, copyright issues, and strategies for avoiding regrettable posts. Key topics include maintaining control of emotions, choosing words carefully, and acting as if anything posted could be made public.
This document discusses what constitutes fake news and provides tips on how to identify it. Fake news are hoaxes and propaganda designed to look like real news stories for profit or to damage reputations. Anyone can now publish news, making it harder to distinguish from real journalism. To avoid fake news, carefully examine sources and check unknown outlets on fact-checking sites. Rather than rely solely on social media, consume a variety of news from trustworthy sources and do your own research.
The document provides guidance on using social media platforms like Twitter, Facebook, and YouTube for business purposes. It recommends aiming for 40% original content, 30% replies, 20% retweets, and 10% links on Twitter. For Facebook, it suggests customizing privacy and notification settings. And for YouTube, it describes how to create a business channel, upload videos, and embed videos on a website.
In Defense of Anonymous Commenters - Jen Eyer at TEDx (script)Jen Strayer Eyer
The document discusses anonymity in online commenting on news sites. It summarizes that:
1) Requiring real names reduces participation, especially from vulnerable groups, and does not guarantee civility as offensive comments still occur under real names.
2) Anonymity allows for whistleblowing and discussion of sensitive local issues. Comment moderation through clear rules, engagement, and an evolution to higher quality discussions is more effective than real names at improving civility.
3) Research shows anonymous commenters on well-moderated sites contribute valuable local information and have more positive, productive discussions than those using real names. Anonymity with moderation enables important community conversations.
This document summarizes a confession by an anonymous former paid internet shill. The shill describes being hired by a shadowy organization to manipulate online discussions and spread pro-Israel messaging on various forums and social media sites. They were given training, scripts, and dossiers on popular forum members to target. Though initially apolitical, over time the shill began to genuinely believe the pro-Israel views they were promoting. Eventually, the stress of lying to friends and family about their real job led them to quit. The shill hopes bringing attention to these practices will help people be more discerning about what they read online.
Thank You Paper Thank You Writing Paper - Pack OMellisa Hedeen
This document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with the option of a full refund for plagiarized work. The service aims to provide original, high-quality content through a bidding system and revision process.
The document provides instructions for applying for a law essay writing competition. It outlines 5 steps: 1) Create an account, 2) Complete a 10-minute order form providing instructions, sources, and deadline, 3) Review bids from writers and choose one, 4) Review the completed paper and authorize payment, 5) Request revisions to ensure satisfaction. It emphasizes the site's promise to provide original, high-quality content or offer a full refund.
Good Essay Setup. Online assignment writing service.Leah Roberts
The New Deal was President Franklin Roosevelt's plan to address the Great Depression through federal agencies focused on relief, recovery, and reform. The key agencies included the AAA to limit agricultural production, the CCC to employ young men in conservation projects, the NRA to regulate industry, the SSA to provide social security, the TVA to develop rural areas, and the WPA to fund public works projects. The relief agencies, which provided direct aid to the unemployed, were the most successful part of the New Deal in addressing the economic crisis.
The document provides instructions for requesting and receiving writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account; 2) Complete an order form with instructions and deadline; 3) Review bids from writers and select one; 4) Review the completed paper and authorize payment; 5) Request revisions to ensure satisfaction.
Short Essay On My Favourite Festival Diwali In HindiKari Lowry
The document discusses the Orlando City Soccer Fan Club discourse community, outlining that it is a group of soccer fans who share common interests and goals of supporting the Orlando City soccer team, and have developed their own vocabulary and preferred ways of communicating to achieve this goal, such as attending matches, singing chants, and encouraging the team through both wins and losses.
Expository Essay Outline 6Th Grade. Online assignment writing service.Heather Brown
The document provides steps for requesting writing assistance from HelpWriting.net, including registering for an account, completing an order form with instructions and deadline, reviewing bids from writers and choosing one, authorizing payment after receiving the paper, and having the option to request revisions. It emphasizes that original, high-quality content will be provided, and a full refund is offered if plagiarism is found.
Expository Essay Topics About Education. Online assignment writing service.Jessica Reyes
The document provides instructions for creating an account and submitting a paper writing request on the HelpWriting.net website. It outlines a 5 step process: 1) Create an account with a password and email. 2) Complete a 10 minute order form with instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, with a refund option for plagiarized content.
The Curious Tale Of The Typewriter Bone To Type, Shoot Straight, AndLisa Brown
The relationship between Mesopotamian and Greek gods and the humans who worshipped them differed in key ways. The Mesopotamians viewed their gods with respect, seeing them as nurturing figures. The gods interacted with humans in a restrained manner. In contrast, the Greeks viewed their gods with fear, as the gods were more brash in their dealings with humans. These differing relationships are evident when examining ancient texts like the Epic of Gilgamesh and Homer's Iliad, which provide insights into the religious customs and traditions of these early civilizations.
008 Gre Analytical Writing Sample Essays Essay ExaMandy Love
The document discusses the Bandura study which aimed to see if children would copy aggressive behaviors they observed in adults. In the study, children either saw an aggressive or non-aggressive male/female model interact with a bobo doll or no model. The results showed children were more aggressive after seeing an aggressive model. Boys were generally more aggressive than girls. The gender of the model also impacted the children's behaviors, with boys copying male models more. The study helped show that aggression can be learned through observation.
The B-Word You Betcha.”By Andi ZeislerThe Washington Pos.docxmattinsonjanel
“The B-Word? You Betcha.”
By Andi Zeisler
The Washington Post Sunday, November 18, 2007
When you work for a magazine called Bitch, the phone tends to ring a lot when the word pops up in the news.
When the New York City Council announced a symbolic ban on the word several months back, the phone rang. When New York Knicks coach Isiah Thomas defended his use of the term toward Anucha Browne Sanders, a former Knicks marketing executive who won a sexual harassment suit last month, it rang some more. And since one of Sen. John McCain's supporters used the B-word to refer to Sen. Hillary Rodham Clinton in a question last week, it has been ringing like crazy.
People want to know whether it is still a bad word. They want to know whether I support its use in public discourse. Or they already think it's a bad word and want to discuss whether its use has implications for free speech or sexual harassment or political campaigns.
The other thing about working for a magazine called Bitch is that you really can't cop to being totally sick of having this conversation. But I am. Still, I'll continue to say the same things I always say, partly because talking about the word is an occupational responsibility/hazard and partly because, despite the fatigue, I believe them.
So here goes: Bitch is a word we use culturally to describe any woman who is strong, angry, uncompromising and, often, uninterested in pleasing men. We use the term for a woman on the street who doesn't respond to men's catcalls or smile when they say, "Cheer up, baby, it can't be that bad." We use it for the woman who has a better job than a man and doesn't apologize for it. We use it for the woman who doesn't back down from a confrontation.
So let's not be disingenuous. Is it a bad word? Of course it is. As a culture, we've done everything possible to make sure of that, starting with a constantly perpetuated mindset that deems powerful women to be scary, angry and, of course, unfeminine -- and sees uncompromising speech by women as anathema to a tidy, well-run world.
It's for just these reasons that when Lisa Jervis and I started the magazine in 1996, no other title was even up for consideration. As young women who had been bombarded with the word for, say, daring to walk down the street in tank tops, we knew what kinds of insults would be hurled when we started publishing articles on sexism in consumer and popular culture.
When Lisa and I were on tour with a 10th-year anniversary anthology, men wandered up to us after several readings to ask, nervously, whether we hated men -- or whether men were "allowed" to read the magazine. We always told them the same thing: If you actually read the magazine -- which includes everything from essays on racism in the modeling industry to columns on the marketing of the HPV drug Gardasil -- you'll find that it's not about hating men but about elevating women. But too many people don't see the difference. And, at least in part, that's why the B-wor ...
Best College Essay Help, Cheap College Essay WritiDonna Castro
Here is a summary of the key points from the Task versus People Orientation assessment chapter:
- The chapter discusses how people can be oriented towards tasks or people in their work. Those with a task orientation focus more on getting work done efficiently, while those with a people orientation focus more on building relationships.
- An assessment was given to determine one's natural orientation - whether they are more task-focused or people-focused. The assessment looked at preferences around structure, deadlines, and social aspects of work.
- Based on the results, the chapter provided strategies for how to work most effectively depending on one's natural orientation. For example, task-oriented individuals were advised to set deadlines to stay focused, while people-
Graduate School Essay Sample Physical TherapyRhonda Ramirez
The document discusses how the characteristics of heroes have changed over time as seen in British literature. It introduces the four main categories of heroes: the epic hero, romantic hero, tragic hero, and postmodern hero. The epic hero, the first hero seen in British literature, seeks fame and glory through completing difficult tasks and killing enemies, regardless of cost, in order to gain honor.
The document summarizes the bonus features included on the home media release of the film Captain America: Civil War. It includes a making-of documentary broken into sections like "Page to Screen" discussing the film's inspiration from the comic arc. Other sections profile characters like Black Panther and Spider-Man, covering their portrayals and roles in the film.
This document summarizes a research paper on the pros and cons of social media. It discusses opinions on whether social media helps or hurts communication skills. While social media allows connecting with others worldwide, it can also compromise privacy and enable cyberbullying. The author explored these issues through research articles on topics like uses of hashtags for bullying on Twitter and studies on cyberbullying among college students. Though initially thinking social media was mostly positive, the author reconsidered after learning how severe cyberbullying can be, with some victims taking their own lives.
This document summarizes a research paper on the pros and cons of social media. It discusses opinions on whether social media helps or hurts communication skills. While social media allows connecting with others worldwide, it can also enable privacy issues and cyberbullying. The author chose articles discussing cyberbullying in more depth, which changed their view - while social media has benefits, it also has severe negatives like enabling bullying that has led to youth suicide.
Seth Meyers discusses the growing scandal around Harvey Weinstein, as more women in Hollywood come forward with allegations of sexual harassment and assault. Meyers notes how Weinstein has been a powerful figure in the industry for decades, and questions how his behavior could have been covered up for so long. The segment highlights the importance of the #MeToo movement in empowering victims to share their stories and bring accountability to powerful abusers in Hollywood and beyond.
This document summarizes the challenges the author faced in trying to write a biography on Richard Stallman with Stallman's cooperation. The publisher wanted to release it as an e-book but Stallman objected to the encryption and copyright restrictions of e-books. Despite various compromise proposals, Stallman refused to cooperate unless the e-book allowed full copying. When the publisher would not agree, the project fell apart due to the inability to resolve the disagreement over the e-book format and copyright.
APA Reference Page – Definition, Format And ExaLisa Brown
This document provides instructions for using the writing assistance service HelpWriting.net in 5 steps:
1. Create an account by providing a password and email address.
2. Complete a 10-minute order form providing instructions, sources, deadline, and attaching a sample for style imitation.
3. Review bids from writers for your request, choose one based on qualifications, order history, and feedback, then pay a deposit.
4. Review your completed paper and authorize final payment if pleased, or request free revisions.
5. You can request multiple revisions to ensure satisfaction, and the company guarantees original, high-quality content or a full refund.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Presentation of the OECD Artificial Intelligence Review of Germany
Anonymous Postings
1. January 11, 2008
Brent Boyer
Editor
Steamboat Pilot & Today
Subject: Anonymous postings on Steamboatpilot.com
Dear Brent,
First, let me apologize for the amount of time it has taken me to prepare this report. When I first decided to
address the topic of anonymous, reader-submitted comments on Steamboatpilot.com, I underestimated the
volatility of the subject. Of course I did not think the issue was one debated at our paper alone, but I was
taken aback when Bob Steele, a media ethicist at The Poynter Institute in St. Petersburg, Fla., told me,
“This issue of comments on news organization web sites may be the hottest one in the biz right now.”
I was further astounded when I sent an e-mail out to about 30 of my sources asking their opinion on the
subject. I sent the e-mail at 9 p.m. on a Wednesday. The first response came at 5:14 a.m. the next morning.
By 9 a.m., I had 10. By noon, I had 18. By the end of the day, 23 had trickled in. I ultimately received about
30 responses, some of which came from people I didn’t even send the e-mail too. I wish these sources so
vigorously responded to all my requests. The issue is one that clearly matters to our readers.
When I began working here in July, I was ambivalent on the subject. In fact, I never thought much about it
at all until former Editor Scott Stanford wrote about the subject in his “From the editor” blog in July. Not
having much of an opinion myself, I was inclined to accept Stanford’s justification: “…requiring users to
identify themselves might raise the level of dialogue on the Web site and reduce the nastiness. But I also
fear that it would drastically reduce participation. I admit — I have forsaken the former in order to
encourage the latter.” One of our copy editors vigorously disagreed with Stanford and felt we were
indirectly misleading readers by allowing users to post whatever they wanted, however inaccurate. I was
not swayed by that argument and in fact found it a bit paternalistic. I believe our readers have as much
ability as us here in the newsroom to consider the source and hold anonymous comments less credible.
While I may have been ambivalent, the result of my unscientific survey of sources was not. With the
exception of a tiny minority, I think one word best describes the collective opinion of the respondents:
scorn. All of the responses are included with this correspondence, but here are some highlights:
Anonymous comments are for cowards and lack any accountability. Often those comments are
very brutal and personal. I have been the topic many times and it affects my wife, kids and family.
— Alan Lanning
I very much believe that eliminating this practice and ONLY allowing comment with a name
would both increase the number of commentators as well as bring this section of your paper out of
the gutter.
— Ken Klinger
My experience in reading and posting to blogs leads me to believe that allowing anonymous
postings simply encourages profanity and flaming. It does nothing to enhance the quality of the
debate.
— Carl Steidtman
What it does do is to turn the printer/broadcaster into a biased and opinionated vehicle for bile.
— Mike Forney
The current anonymous blogging can be mean and irresponsible, thus the worst 1 percent of the
potential users keep 90 percent of potential users from ever going there. I have asked people to
engage with it. Given the hours some of those people contribute otherwise, they care a great deal
about our community. But they refuse to enter the blog because they do not want exposure to the
anonymous insults. One banker quipped, “Its the same 10 people, why do you bother reading it.”
— Steve Lewis
2. If people want to joke and blog back and forth it seems to me they can find a system other than
our local paper.
— Ray Birch
I am more open to publishing comments anonymously online, except that your reputation and
brand is so closely tied to your print edition and history. Newspapers historically are the
permanent record of a given area, they are the keepers of tracking the events of the day for the
future. They hold all entities accountable — government, business, individuals. I think you
probably diminish that reputation, even in the cyber world, by publishing anonymous comments
on a site related to your reputation and brand.
— Mark Stutz
I think that anonymous blogging has about the same value as comments scrawled on a public
restroom wall. A paper is a hallowed institution and allowing anonymous blogging on the paper’s
web site demeans the fourth estate’s credibility. Blog pages are easy to create if people want to
share thoughts and ideas, so I don’t believe the paper has any obligation to provide the forum. It
stokes anger and perpetuates inaccurate information.
—Cari Hermacinski
City Councilwoman Hermacinski was involved in what I consider to be one of the worst moments for
Steamboatpilot.com since I began working here. In a story about campaign financing, an anonymous poster
decided to attack Hermacinski in a very personal way. For two years, the Hermacinskis had a young
Slovakian woman named Katarina living with them, who cared for their children in exchange for room and
board, an educational stipend and a weekly salary. During part of Katarina’s time here, she dated a local
doctor, Eric Meyer. In his or her post, the anonymous harasser called Katarina a “gypsy whore” pimped out
by the Hermacinski family. “I suppose that I subjected myself to personal attacks by choosing to enter this
campaign,” Hermacinski wrote in an e-mail to you and I, “but this type of filthy talk is akin to attacking
one of my children.” Hermacinski’s e-mail, along with every response I received about anonymous
comments and most of my research, is included with this correspondence.
While I had long since stopped paying attention to the comments, this incident cemented my now
prevailing opinion that our reader comments, as currently managed, do little to further any meaningful
discourse. Their damaging qualities vastly outweigh their value. As she herself points out, Hermacinski is a
public figure, and as such should expect, and perhaps be less guarded against, such attacks. This does little
to sway my opinion, however, since public figures are not the only ones subject to such abuse. No sooner
can we publish a picture of a person of Latin heritage, than a person goes online and publishes a comment
such as this one, which, among other offences, callously references an infanticide in a Hispanic family last
year:
id04sp (anonymous): Four to a room.
Great.
Can't wait for the first homicide.
Has anybody checked the occupants for green cards?
I always feel for my fellow reporters when one of them is subjected to something like this:
steamboatsconscience (anonymous): Pilot management
Please make Margaret go away.
Pretty please
These comments remain on our Web site today — a fact that brings me to my next point: short of any
sweeping changes to the status quo, we could drastically improve our Web site’s atmosphere simply by
more strictly enforcing our existing Reader Submitted Content Policy which says, “if you … engage in ad
hominem attacks on fellow commenters, people mentioned in stories, or reporters and editors, we reserve
the right (but assume no obligation) to remove your contributions. And if you become a problem for our
site’s other users we can and will ban you from using this free service.” Id04sp’s comment is clearly one
that appeals to prejudice and emotion rather than to reason, yet it remains. Steamboatconscience’s comment
is clearly an attack on reporter Margaret Hair, yet it remains. I believe if we took a more hard-line approach
to removing comments — and users — from our Web site, we would if nothing else create an expectation
3. for, and foster an atmosphere of, civility.
I believe, however, that we should go even further. I mentioned media ethicist Bob Steele of the Poynter
Institute earlier. Steele, a former student of my alma mater DePauw University, was a frequent visitor to
campus and became one of my most trusted sources of advice whenever I encountered a touchy issue at our
school newspaper. I contacted him on this issue as well, and I believe he eloquently describes the
detrimental nature of anonymous comments:
My personal belief is that the anonymity creates a tilted tabletop. There is no real accountability
when posters hide behind their screen name, and that lack of accountability likely produces much
more diatribe, personal attacks and mean-spirited voices. … The costs of allowing this cyber-free-
for-all, most pit-like expression are great in my view. I believe there is a lot of collateral damage
to innocent people, as well as the likelihood that the diatribe will deter many otherwise willing
folks from entering the arena to comment.
I would go a step further than Steele, and suggest that the diatribe not only deters folks from commenting
online, but also deters them from engaging with the paper altogether. As recently as yesterday, I had a
source refuse to discuss something with me for fear of the beating he might take in the online comments.
My fellow reporters can relate similar experiences. If the whole idea of online comments is to foster as
much participation as possible, I believe our approach has proved counterproductive. I believe our ability to
do intimate stories, especially, will suffer if it hasn’t already. And who could blame people for not wanting
to open themselves up to us, and thus our Web site?
Unlike most people, us reporters have no choice but to participate regardless of how we feel about the
anonymous comments. But imagine if you will, the effects the diatribe can, and does, have on our morale. I
am frequently disheartened to see the stories I’ve worked so hard on reduced to billboards for hate.
At this point I’d like to stress that I’ve never been one to ignore the business side of journalism. I
understand there are probably economic reasons that we allow anonymous comments on our Web site.
They — arguably — generate users, page views and time on site, all of which are attractive to potential
online advertisers. (I say arguably because what I’ve found and tried to lay out here shows that they may be
turning away more users than they are generating.)
I also understand that our industry is in flux. Our newspaper is a great example of one that is trying to take
advantage of all that mediums such as television and the Internet have to offer. But it has always been my
opinion that in this endeavor, newspapers should strive to adopt the strengths of mediums such as
television, while chucking their traditional weaknesses. How much have we really gained if we gain the
immediacy of television, but also adopt its shrillness and sensationalism? Such an approach I think
undermines a newspaper’s greatest strengths, such as its ability to approach the news in a more analytical
and in-depth way. Readers appreciate this.
Similarly, the Internet has much strength to offer. With it we can allow our readers to participate in the
news in real time unlike ever before. Also, as Washington Post ombudsman Deborah Howell wrote, “The
intent was to build reader loyalty by making the Web site more of a conversation than just a lecture.” I am
not suggesting that we abandon this rich resource. As much as we hate to admit it, readers often know more
about stories than we do. Plus, we have an obligation to accommodate opinions that challenge what we
publish. But the Internet also suffers from a general lack of credibility, and again I ask how much we really
gain if we adopt that and other weaknesses along with the Internet’s strengths? As Washingtonpost.com
Editor Jim Brady said, “news organizations need to heal the existing wounds and not amputate the limb.”
“Two important journalism values — free, unfettered comment and civil, intelligent discourse — are
colliding,” Howell also wrote. In resolving this matter it is my opinion that we should ask ourselves what
we value as an organization. Do we value expression, in all its forms, above all else? Or do words like
community, dialogue and conversation come first? If it is the former, then perhaps we should leave things
the way they are. Perhaps we believe the utterly unfettered comments are worth their cost. As others have
pointed out, words and ideas have in the past been wrongly oppressed in the name of civility. I would point
out however, that journalism’s commitment to free expression is accompanied just as vigorously by our
demand for transparency, a fact that again shows how the anonymous comments have set our values on a
collision course. Furthermore, as Roy Peter Clark, a Poynter senior scholar and vice president, points out,
4. this argument “may confuse the right to speak with the duty to publish.”
I would like to think that we value the latter words foremost and that we consider this newspaper a vital
member of the community, not merely an aloof spectator, as is the case in some larger markets. If this is so,
I believe our obligation is to foster a vibrant and healthy conversation. In my research I have found that
there are no foolproof solutions to the problems of anonymous comments, but there are ways to raise the
bar. I do not see it as my place to define a new policy, but I will lie out below some suggestions, and the
practices of some other news organizations. My limited legal research suggests each approach might
require us to amend our disclaimers and other safeguards if adopted, but it appears we are sufficiently
protected under any and all scenarios. I would of course refer all such concerns to our legal counsel.
• An obvious and simple step is to require our users to adjust their anonymity settings to include
their name, if they want to comment on a story. This is the practice of organizations such as
Poynter and the New York Times. Concerns with this approach are that there is little we can do
currently to prevent people from using a fake name, or, even worse, someone else’s. Requiring a
mailing address and phone number, along with a full name and e-mail address when registering,
could partially cure this by providing additional information that we may be able to verify the
name against. And at the very least, as Cincymoms.com (an offshoot of The Enquirer newspaper
in Cincinnati) managing editor Karen Guitierrez said, “It’s important that people jump through
some hoops first, to cut down on script kiddies and others who are just making trouble.” Another
concern with requiring users to identify themselves is that we will drive away watchdogs that want
to expose injustice or unfairness but fear retribution. A relatively simply cure for that, I believe, is
to provide a way for users to anonymously submit tips directly to us through the Web site. We
could display this feature prominently with each story. Also, if we take this route but still want to
provide a forum for anonymous discussion, I believe we should more vigorously advertise our
online forums and blogs with each story. We could perhaps even get things rolling ourselves by
having reporters or others start threads or create blogs on particular subjects of interest. I would be
a fan of this approach as it strikes a balance by encouraging a forum for those who wish to
continue discussing anonymously, while also elevating the integrity of our stories by requiring the
comments directly connected to them to come from named sources.
• “If the conversation degrades to such a point where people are just calling each other names and
they can’t control it, then we turn off the comments to that specific story,” Editor Kelly Boldan of
The West Central Tribune in Willmar, Minn., told Minnesota Public Radio. Some might consider
this an extreme step, but if the point of allowing comments beneath a story is to encourage
discussion on that particular subject, it could make sense to disable the feature when it is no longer
fulfilling its intended purpose.
• At the Orange County (Calif.) Register, a “remove comment” button appears next to every user-
submitted comment. Posts are removed if two users click the button. After a vicious attack on a
subject of one of the Register’s stories, editors added this note: “We want this to be a place where
people discuss and debate ideas that foster stronger communities. We built this for you. Please take
care of it. Tolerate broad thinking, but take action against obscene or hateful material. Make it a
credible and safe place worth preserving and sharing.” A concern with this approach, no matter
how many clicks of the button are required to remove a post, is that someone with ulterior motives
could delete entire viewpoints from the comments, even if the process is made laborious by
requiring the entire page to reload after each click. “I imagine there are some sore mouse muscles
in a few companies PR offices,” OCRegister.com editor Jeff Light said.
• A system could be developed that could block the IP addresses of offensive users. This would
give us an added ability to ban such users, who can currently simply sign up for a new e-mail
address to regain access to our site. “We’ve had extreme situations where the network was a
business and have contacted that business to let it know what is coming from the network,” said
Indianapolis Star Editor Dennis Ryerson. “Most companies have policies against such improper
use of company equipment and have been extraordinarily helpful in stopping the abuse.”
• On Savannahnow.com, reporters are expected to answer comments posted to their story. I’m not
sure how much value we would find in this approach, but it might allow reporters to operate as a
kind of moderator that could refocus the discussion on the topic at hand and steer it away from the
5. gutter.
• The Courier Mail in Queensland, Australia, has a user agreement that goes above and beyond
most. Its Web site rejects comments that do “not add to the debate,” or are “repetitious, illegal or
meaningless,” or that contain “clear errors of fact.”
• Some interesting provisions of Poynter’s user agreement: “Feedback comments are limited to
2,000 characters, or about 300 words. We encourage you to keep your comments within those
limits as opposed to continuing to another post. … Discussions dominated by the frequency or
verbosity of individual contributors become less interesting and useful for the rest of us. At times,
it may be more appropriate for you to exchange an e-mail directly with a fellow poster rather than
carrying on a conversation in the feedback area.”
• Slashdot, a technology news aggregator, has one of the more novel approaches. Other users
moderate the comments users post about articles. Moderators are selected at random, new users
cannot moderate and each moderator cannot moderate and post in the same discussion. “Every
post is born with a predetermined rating between zero and two — determined based on the ratings
assigned to the user’s previous posts. Moderators can then raise or lower the score of a post —
each moderator can dole out five points. No posts can have a score higher than five or lower than
negative five. Individual users specify their tolerance for viewing posts with low scores.” This
approach adopts the “self-policing” theory of the Internet. This is the theory behind Wikipedia,
and it supposes that information on the Internet becomes increasingly credible as fellow users
correct each other. I’m skeptical such an approach could work on Steamboatpilot.com, however.
Our very own Andy Wirth, chief marketing officer for Intrawest, does a good job of summing this
up: “It’s been suggested that with critical mass of use, the self-policing nature of this space in fact
makes it accurate, over time. Two key variables here MIGHT make this true. Volume and time.
The operative word is might and accuracy now becomes exceedingly subjective. In this case,
meaning Steamboat and even Rocky Mountain News, we simply don’t have nearly enough critical
mass and/or use to make the postings anything more than graffiti.”
In conclusion I would recommend that we remember that Steamboatpilot.com is our Web site. We have
allowed it to be hijacked by everyone from the reckless to the racist. I hope we can take it back and turn it
in to something we can be proud to put our names on.
Respectfully submitted,
Brandon Gee
Reporter
Steamboat Pilot & Today
Enclosures
6. gutter.
• The Courier Mail in Queensland, Australia, has a user agreement that goes above and beyond
most. Its Web site rejects comments that do “not add to the debate,” or are “repetitious, illegal or
meaningless,” or that contain “clear errors of fact.”
• Some interesting provisions of Poynter’s user agreement: “Feedback comments are limited to
2,000 characters, or about 300 words. We encourage you to keep your comments within those
limits as opposed to continuing to another post. … Discussions dominated by the frequency or
verbosity of individual contributors become less interesting and useful for the rest of us. At times,
it may be more appropriate for you to exchange an e-mail directly with a fellow poster rather than
carrying on a conversation in the feedback area.”
• Slashdot, a technology news aggregator, has one of the more novel approaches. Other users
moderate the comments users post about articles. Moderators are selected at random, new users
cannot moderate and each moderator cannot moderate and post in the same discussion. “Every
post is born with a predetermined rating between zero and two — determined based on the ratings
assigned to the user’s previous posts. Moderators can then raise or lower the score of a post —
each moderator can dole out five points. No posts can have a score higher than five or lower than
negative five. Individual users specify their tolerance for viewing posts with low scores.” This
approach adopts the “self-policing” theory of the Internet. This is the theory behind Wikipedia,
and it supposes that information on the Internet becomes increasingly credible as fellow users
correct each other. I’m skeptical such an approach could work on Steamboatpilot.com, however.
Our very own Andy Wirth, chief marketing officer for Intrawest, does a good job of summing this
up: “It’s been suggested that with critical mass of use, the self-policing nature of this space in fact
makes it accurate, over time. Two key variables here MIGHT make this true. Volume and time.
The operative word is might and accuracy now becomes exceedingly subjective. In this case,
meaning Steamboat and even Rocky Mountain News, we simply don’t have nearly enough critical
mass and/or use to make the postings anything more than graffiti.”
In conclusion I would recommend that we remember that Steamboatpilot.com is our Web site. We have
allowed it to be hijacked by everyone from the reckless to the racist. I hope we can take it back and turn it
in to something we can be proud to put our names on.
Respectfully submitted,
Brandon Gee
Reporter
Steamboat Pilot & Today
Enclosures