Tips for integrating Twitter, Storify, Facebook, Google Plus and much more into your newsroom. Presentation at workshop for International Press Institute World Congress in Amman, Jordan, 2013.
Brian Housand, Ph.D.
brianhousand.com
@brianhousand
In 2006, we first learned that even the brightest students were easily fooled by internet hoaxes like the Pacific Northwest Tree Octopus. While we tried to laugh this off as the folly of misguided youth, a decade later we witnessed the rise of fake news and its impact on the “post-truth” world of 2016 overrun by an ever-growing network of social media. To fight for truth, justice, and yes, even the American way, this session presents a collection of superhero-themed critical thinking activities designed to empower you and your students to conquer the evils of fake news.
Tips for integrating Twitter, Storify, Facebook, Google Plus and much more into your newsroom. Presentation at workshop for International Press Institute World Congress in Amman, Jordan, 2013.
Brian Housand, Ph.D.
brianhousand.com
@brianhousand
In 2006, we first learned that even the brightest students were easily fooled by internet hoaxes like the Pacific Northwest Tree Octopus. While we tried to laugh this off as the folly of misguided youth, a decade later we witnessed the rise of fake news and its impact on the “post-truth” world of 2016 overrun by an ever-growing network of social media. To fight for truth, justice, and yes, even the American way, this session presents a collection of superhero-themed critical thinking activities designed to empower you and your students to conquer the evils of fake news.
Digital Forensics: Using Social and Online Tools to Find Great Stories – ONA19Online News Association
Notable figures, like all of us, exhibit specific, personalized behavior online, creating internet footprints visible to anyone via ethical and public digital sleuthing. Join this session to learn how to uncover likes, follows and timestamps, set up alerts and bots and dig around with digital tools.
I was recently asked to put together a presentation on the fake news phenomenon for discussions with leading journalists and media institutions in a developing country, with extremely poor media literacy but strong growth around social media use, on how to both identify misleading content and also stem its flow, reach and influence.
Download the full presentation as a PowerPoint (with embedded videos) or as an Apple Keynote file, here - https://drive.google.com/open?id=0Bxbk4wYolphwcVk4bV85aEFtYXc
Fake news: Identifying, debunking and discussing false narratives with learnersLearningandTeaching
Fake news. It was the 2017 word of the year, but how is it understood by the student of today?
Students today are often heavily engaged in the online community, moving in social spheres that may be foreign to their teachers. With studies revealing that 48% of Australians now use social media as a news source, it is increasingly important for educators to understand how their students are engaging with online content and communities. As educators, we must equip ourselves with the tools and skillsets needed to debunk false, misleading and biased content and to show our students how to do the same.
In these slides, Alyce Hogg introduces the drivers of fake news, from online communities like ‘Reddit’ and ‘4chan’, to bots and content mills. Alyce also provides strategies and resources for identifying and debunking fake news, and suggests approaches for discussing fake news with students.
Handling fake news and eyewitness mediaAlastair Reid
How to debunk hoaxes effectively, deal with graphic images and understand copyright on social media – as presented at the 2016 Online News Association annual conference
Fake news, its ramifications and tools to check this menace.Chetan Thathoo
What is Fake News, statistics related to it, tools to discover fake news,examples across countries, India scenario in the context of fake news, criticism of these tools and the effect of fake news on POTUS elections.
This is a training that was conducted for the NWS offices. It includes the basics of Twitter, some tips and best practices for NWS offices to use on Twitter and finally a section on detecting fake tweets and fake pictures.
Fake news is untrue information presented as news. It often has the aim of damaging the reputation of a person or entity or making money through advertising revenue. Once common in print, the prevalence of fake news has increased with the rise of social media, especially the Facebook News Feed
We are living in the ear of post-truth. After the surge of fake news stories during the 2016 U.S. elections, several initiatives have been introduced to mitigate the problem like fact-checker organization, artificial intelligence and government aggressive measures. All this are promising, but are we really winning the battle against disinformation?
This presentation was given by the National Weather Service Southern Region Social Media team to help NWS offices improve their status updates and better use Facebook.
How to Spot Fake News: Be a Smarter Surfer
Presented by Liz Ryan and Erin Robinson
Derry Public Library
Learn how to spot fake news and pick up strategies on cross referencing, fact checking and avoiding propaganda!
Plug & Play News: Sourcing and Verifying News Online in 2022Niki Radisic
Drawing on real-life examples and first-hand accounts of reporting on crisis situations in Eastern Europe, the first version of Plug & Play News was created in 2014 and presented at re:publica Berlin 2015 conference. Regardless of year or location, the tools and methods used to source, verify, and make critical information available to the public in real-time are applicable in similar contexts worldwide.
Kristina Kirjanova, Leonie Askes, Steven Hazenberg, Leyre San Miguel and Mark...BOBCATSSS 2017
Kristina Kirjanova, Leonie Askes, Steven Hazenberg, Leyre San Miguel and Markéta Kučerová
What can be tracked will be tracked
Workshop at BOBCATSSS 2017
Digital Forensics: Using Social and Online Tools to Find Great Stories – ONA19Online News Association
Notable figures, like all of us, exhibit specific, personalized behavior online, creating internet footprints visible to anyone via ethical and public digital sleuthing. Join this session to learn how to uncover likes, follows and timestamps, set up alerts and bots and dig around with digital tools.
I was recently asked to put together a presentation on the fake news phenomenon for discussions with leading journalists and media institutions in a developing country, with extremely poor media literacy but strong growth around social media use, on how to both identify misleading content and also stem its flow, reach and influence.
Download the full presentation as a PowerPoint (with embedded videos) or as an Apple Keynote file, here - https://drive.google.com/open?id=0Bxbk4wYolphwcVk4bV85aEFtYXc
Fake news: Identifying, debunking and discussing false narratives with learnersLearningandTeaching
Fake news. It was the 2017 word of the year, but how is it understood by the student of today?
Students today are often heavily engaged in the online community, moving in social spheres that may be foreign to their teachers. With studies revealing that 48% of Australians now use social media as a news source, it is increasingly important for educators to understand how their students are engaging with online content and communities. As educators, we must equip ourselves with the tools and skillsets needed to debunk false, misleading and biased content and to show our students how to do the same.
In these slides, Alyce Hogg introduces the drivers of fake news, from online communities like ‘Reddit’ and ‘4chan’, to bots and content mills. Alyce also provides strategies and resources for identifying and debunking fake news, and suggests approaches for discussing fake news with students.
Handling fake news and eyewitness mediaAlastair Reid
How to debunk hoaxes effectively, deal with graphic images and understand copyright on social media – as presented at the 2016 Online News Association annual conference
Fake news, its ramifications and tools to check this menace.Chetan Thathoo
What is Fake News, statistics related to it, tools to discover fake news,examples across countries, India scenario in the context of fake news, criticism of these tools and the effect of fake news on POTUS elections.
This is a training that was conducted for the NWS offices. It includes the basics of Twitter, some tips and best practices for NWS offices to use on Twitter and finally a section on detecting fake tweets and fake pictures.
Fake news is untrue information presented as news. It often has the aim of damaging the reputation of a person or entity or making money through advertising revenue. Once common in print, the prevalence of fake news has increased with the rise of social media, especially the Facebook News Feed
We are living in the ear of post-truth. After the surge of fake news stories during the 2016 U.S. elections, several initiatives have been introduced to mitigate the problem like fact-checker organization, artificial intelligence and government aggressive measures. All this are promising, but are we really winning the battle against disinformation?
This presentation was given by the National Weather Service Southern Region Social Media team to help NWS offices improve their status updates and better use Facebook.
How to Spot Fake News: Be a Smarter Surfer
Presented by Liz Ryan and Erin Robinson
Derry Public Library
Learn how to spot fake news and pick up strategies on cross referencing, fact checking and avoiding propaganda!
Plug & Play News: Sourcing and Verifying News Online in 2022Niki Radisic
Drawing on real-life examples and first-hand accounts of reporting on crisis situations in Eastern Europe, the first version of Plug & Play News was created in 2014 and presented at re:publica Berlin 2015 conference. Regardless of year or location, the tools and methods used to source, verify, and make critical information available to the public in real-time are applicable in similar contexts worldwide.
Kristina Kirjanova, Leonie Askes, Steven Hazenberg, Leyre San Miguel and Mark...BOBCATSSS 2017
Kristina Kirjanova, Leonie Askes, Steven Hazenberg, Leyre San Miguel and Markéta Kučerová
What can be tracked will be tracked
Workshop at BOBCATSSS 2017
Mariann Væring - Bibliotherapy as a method to ensure quality of follow up and...BOBCATSSS 2017
Mariann Væring
Bibliotherapy as a method to ensure quality of follow up and treatment of families dealing with recent diagnosing of psychiatric disorders
Paper at BOBCATSSS 2017
Natalia Bermudes Qvortrup - Making the case for international library collabo...BOBCATSSS 2017
Natalia Bermudes Qvortrup
Making the case for international library collaborations with the global south: A comparative case study of Bodleian Libraries, University of Oxford
Paper at BOBCATSSS 2017
Tom Becker - Functions of knowledge management in Finnish public libraries - ...BOBCATSSS 2017
Tom Becker
Functions of knowledge management in Finnish public libraries - A research project in cooperation with metropolitan city libraries in Northern Europe
Paper at BOBCATSSS 2017
Zsuzsanna Arany - Banned? Tolerated? Supported? The appearance of information...BOBCATSSS 2017
Zsuzsanna Arany
Banned? Tolerated? Supported? The appearance of information and communication technology devices in public education
Paper at BOBCATSSS 2017
Hope Shinn - Internet Filtering in School Libraries: A Comparison of Governme...BOBCATSSS 2017
Hope Shinn
Internet Filtering in School Libraries: A Comparison of Government and Library Association Policies in the United States and Australia
Paper at BOBCATSSS 2017
Cecilia Elsen - How can library anxiety play a positive role on students' ide...BOBCATSSS 2017
Cecilia Elsen
How can library anxiety play a positive role on students' identity? A philosophical approach to anxiety and academic libraries
Paper at BOBCATSSS 2017
Aida Pooladian and Ángel Borrego - What do people think about public librarie...BOBCATSSS 2017
Aida Pooladian and Ángel Borrego
What do people think about public libraries in Barcelona? An obtrusive evaluation of citizens' views
Paper at BOBCATSSS 2017
Social Media and the U.S. Election: Consuming the CampaignJanelle Ward
slides from November 5, 2012, the third session of the course Social Media and the U.S. Election. The course is taught by Janelle Ward and hosted by the John Adams Institute in Amsterdam, the Netherlands.
This SIDLIT 2019 roundtable discussion focused on strategies for verifying and counteracting media bias, fake news, and the various forms of half-truths that are becoming ubiquitous in our national dialog. The discussion will include examples of media bias and alternative facts as well as positive steps that educators and technologists can take to encourage critical thinking as opposed to blind acceptance of news from the plethora of sources now available.
Twitter is now an established and a widely popular news medium. Be it normal banter or a discussion on high impact events like Boston marathon blasts, February 2014 US Icestorm, etc., people use Twitter to get updates and also broadcast their thoughts and views. Twitter bots have today become very common and acceptable. People are using them to get updates about emergencies like natural disasters, terrorist strikes, etc., users also use them for getting updates about different places and events, both local and global. Twitter bots provide these users a means to perform certain tasks on Twitter that are both simple and structurally repetitive, at a much higher rate than what would be possible for a human alone. During high impact events these Twitter bots tend to provide a time critical and a comprehensive information source with information aggregated form various different sources. In this study, we present how these bots participate in discussions and augment them during high impact events. We identify bots in 5 high impact events for 2013: Boston blasts, February 2014 US Icestorm, Washington Navy Yard Shooting, Oklahoma tornado, and Cyclone Phailin. We identify bots among top tweeters by getting all such accounts manually annotated. We then study their activity and present many important insights. We determine the impact bots have on information diffusion during these events and how they tend to aggregate and broker information from various sources to different users. We also analyzed their tweets, list down important differentiating features between bots and non bots (normal or human accounts) during high impact events. We also show how bots are slowly moving away from traditional API based posts towards web automation platforms like IFTTT, dlvr.it, etc. Using standard machine learning, we proposed a methodology to identify bots/non bots in real time during high impact events. This study also looks into how the bot scenario has changed by comparing data from high impact events from 2013 against data from similar type of events from 2011. Bots active in high impact events generally don't spread malicious content. Lastly, we also go through an in-depth analysis of Twitter bots who were active during 2013 Boston Marathon Blast. We show how bots because of their programming structure don't pick up rumors easily during these events and even if they do; they do it after a long time.
Making smart decision: Thornley Fallis whitepaper looks at important trends, metrics and benchmarks to inform digital communications strategies for 2014 and beyond.
Social media - promise and peril for journalists Linda Austin
This presentation was delivered at Media Culture Days at Babeș-Bolyai University in Cluj-Napoca, Romania, on May 15, 2019. Linda Austin spoke as a Fulbright Specialist. It summarizes the benefits and detriments to journalists from the advent of social media. The promise includes (1) Promotion and branding, and (2) Reporting and audience engagement. The peril includes (1) Trolling of journalists, (2) Journalists misled by hoaxes, (3) Less trust in social media reduces trust in all media, (4) Press freedom restricted, (5) Journalists amplifying the ugliness, and (6) Platforms suck digital-ad revenue.
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Dataconomy Media
Trump, Brexit, Cambridge Analytica... In the last few years, we have had to confront the consequences of the use and misuse of data science algorithms in manipulating public opinion through social media. The use of private data to microtarget individuals is a daily practice (and a trillion-dollar industry), which has serious side-effects when the selling product is your political ideology. How can we cope with this new scenario?
Outreach Through Social Media | Ocean Sciences 2014Christie Wilcox
My presentation at Ocean Sciences 2014 in Honolulu, HI on how scientists can use social media for outreach and professional development. The internet is yours! #OSMSocial #2014OSM
Benedicta Obodoruku - Refugees and United Nations High Commissioner for Refu...BOBCATSSS 2017
Benedicta Obodoruku
Refugees and United Nations High Commissioner for Refugees (UNHCR) information access and information services
Poster at BOBCATSSS 2017
Mackelienė Dalia - Not only salary that matters: positive outcomes of volunta...BOBCATSSS 2017
Mackelienė Dalia
Not only salary that matters: positive outcomes of voluntary work in library for long-term-unemployed persons
Poster at BOBCATSSS 2017
Georgios Kourkoulos and Ruth Gbikpi - The EUI Library and the Delivery of Non...BOBCATSSS 2017
Georgios Kourkoulos and Ruth Gbikpi
The EUI Library and the Delivery of Non-Electronic Resources: Putting the Physical Collection on the Move
Paper at BOBCATSSS 2017
Stella O. Oyediran-Tidings - Availability and accessibility of educational in...BOBCATSSS 2017
Stella O. Oyediran-Tidings
Availability and accessibility of educational information to learners in selected high schools in South Africa
Paper at BOBCATSSS 2017
Galanos Vassilis - The Double Meaning of "Replacement" and the Moral Value o...BOBCATSSS 2017
Galanos Vassilis
The Double Meaning of "Replacement" and the Moral Value of Human and Nonhuman Inforgs: Crossroads of Philosophy of Information and Actor-Network Theory
Paper at BOBCATSSS 2017
This tutorial presentation offers a beginner-friendly guide to using THREADS, Instagram's messaging app. It covers the basics of account setup, privacy settings, and explores the core features such as close friends lists, photo and video sharing, creative tools, and status updates. With practical tips and instructions, this tutorial will empower you to use THREADS effectively and stay connected with your close friends on Instagram in a private and engaging way.
Your LinkedIn Success Starts Here.......SocioCosmos
In order to make a lasting impression on your sector, SocioCosmos provides customized solutions to improve your LinkedIn profile.
https://www.sociocosmos.com/product-category/linkedin/
This tutorial presentation provides a step-by-step guide on how to use Facebook, the popular social media platform. In simple and easy-to-understand language, this presentation explains how to create a Facebook account, connect with friends and family, post updates, share photos and videos, join groups, and manage privacy settings. Whether you're new to Facebook or just need a refresher, this presentation will help you navigate the features and make the most of your Facebook experience.
Project Serenity is an innovative initiative aimed at transforming urban environments into sustainable, self-sufficient communities. By integrating green architecture, renewable energy, smart technology, sustainable transportation, and urban farming, Project Serenity seeks to minimize the ecological footprint of cities while enhancing residents' quality of life. Key components include energy-efficient buildings, IoT-enabled resource management, electric and autonomous transportation options, green spaces, and robust waste management systems. Emphasizing community engagement and social equity, Project Serenity aspires to serve as a global model for creating eco-friendly, livable urban spaces that harmonize modern conveniences with environmental stewardship.
Grow Your Reddit Community Fast.........SocioCosmos
Sociocosmos helps you gain Reddit followers quickly and easily. Build your community and expand your influence.
https://www.sociocosmos.com/product-category/reddit/
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEFebless Hernane
Using Google Teams (G-Teams) is simple. Start by opening the Google Teams app on your phone or visiting the G-Teams website on your computer. Sign in with your Google account. To join a meeting, click on the link shared by the organizer or enter the meeting code in the "Join a Meeting" section. To start a meeting, click on "New Meeting" and share the link with others. You can use the chat feature to send messages and the video button to turn your camera on or off. G-Teams makes it easy to connect and collaborate with others!
Unlock TikTok Success with Sociocosmos..SocioCosmos
Discover how Sociocosmos can boost your TikTok presence with real followers and engagement. Achieve your social media goals today!
https://www.sociocosmos.com/product-category/tiktok/
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyDigital Marketing Lab
Explore the latest trends in Search Engine Optimization (SEO) and discover how modern practices are transforming business visibility. This document delves into the shift from keyword optimization to user intent, highlighting key trends such as voice search optimization, artificial intelligence, mobile-first indexing, and the importance of E-A-T principles. Enhance your online presence with expert insights from Digital Marketing Lab, your partner in maximizing SEO performance.
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...AJHSSR Journal
ABSTARCT: This study presents, to our knowledge, the first bibliometric analysis focusing on the concept of
"felt obligation," examining 120 articles published between 1986 and 2024. The aim of the study is to deepen our
understanding of the existing knowledge in the field of "felt obligation" and to provide guidance for further
research. The analysis is centered around the authors, countries, institutions, and keywords of the articles. The
findings highlight prominent researchers in this field, leading universities, and influential journals. Particularly,
it is identified that China plays a leading role in "felt obligation" research. The analysis of keywords emphasizes
the thematic focuses of these studies and provides a roadmap for future research. Finally, various
recommendations are presented to deepen the knowledge in this area and promote applied research. This study
serves as a foundation to expand and advance the understanding of "felt obligation" in the field.
KEYWORDS: Felt Obligation, Bibliometric Analysis, Research Trends
Surat Digital Marketing School is created to offer a complete course that is specifically designed as per the current industry trends. Years of experience has helped us identify and understand the graduate-employee skills gap in the industry. At our school, we keep up with the pace of the industry and impart a holistic education that encompasses all the latest concepts of the Digital world so that our graduates can effortlessly integrate into the assigned roles.
This is the place where you become a Digital Marketing Expert.
Telegram is a messaging platform that ushers in a new era of communication. Available for Android, Windows, Mac, and Linux, Telegram offers simplicity, privacy, synchronization across devices, speed, and powerful features. It allows users to create their own stickers with a user-friendly editor. With robust encryption, Telegram ensures message security and even offers self-destructing messages. The platform is open, with an API and source code accessible to everyone, making it a secure and social environment where groups can accommodate up to 200,000 members. Customize your messenger experience with Telegram's expressive features.
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...SocioCosmos
Get more Pinterest followers, reactions, and repins with Sociocosmos, the leading platform to buy all kinds of Pinterest presence. Boost your profile and reach a wider audience.
https://www.sociocosmos.com/product-category/pinterest/
2. #Pizzagate
A post on Twitter led to a
conspiracy theory about a
pedophilia network inside a
Pizza parlor in Washington DC
involving the Clinton Family.
A 28 year old man used a gun
inside the restaurant to free the
captured childeren
4. 4
How and why
misinformation spreads
2. Introduction
1. Whisper Game
And the methods that are
used used to collect the
data
3. Boston Bombing
Importance of
factchecking
5. Fact-checking
Traditional methods of
factchecking
6. Verification Handbook
That help you factcheck
social media posts
7. Verification Tools
Workshop
Table of content
4. Role-playing
5. 5
Energizer
The wisper game
1. Line up in a straight line
2. We will give you one sentence
3. Take the wisper untill it’s in the front of the line
4. The first person will write the rumor down on a
paper
6. 6
Definition Misinformation: misinformation is a
false or inaccurate form of information that
spread either intentionally or unintentionally.
What is misinformation?
Misinfomation
The world economic forum named misinformation as
one of the top 10 treaths that our society is facing
Definition: Disinformation any government
communication
containing intentionally false and misleading material
7. 7
Why do rumors spread?
Misinfomation
Sort of rumors:
• Dread rumors
• Wish rumors
• Wedge driving rumors
When rumors spread
• Uncertainty
• Anxiety
• Believing
• Importance
• Improving self image
• Social status
8. • People want to help
• People want to make sense of the
world
• People want to feel part of the shared
experience
• To gain revenue
Misinformation
Why do people spread
misinformation?
10. 10
Echo chambers on social media
Misinformation
“The goal of News Feed is to deliver the right content
to the right people at the right time so they don’t miss
the stories that are important to them.” (Backstrom,
2013)
11. The 2013 Boston Marathon was marked by
two bombs that were detonated at the finish
line killing three people and injuring 264.
Both the FBI and Boston PD used Twitter to
reach out to the public to inform them of what
was going and what to do.
After three days, photographs and
surveillance video of two suspects were
released by the FBI to seek the public’s help
to identify them.
BOSTON BOMBING
Case Study
12. 12
BOSTON BOMBING
Case Study
Internet users used social media sites like Facebook, Twitter and Reddit
as a primary sources of real-time news after the bombings.
• At 2:59 PM the Boston Globe shared the first tweet about the
bombings
• At 4:10 pm there were more than 300,000 mentions on Twitter of
“Boston explosions.”
• Around 4:30 pm, there were more than 700,000 mentions on Twitter of
the “Boston Marathon.”
• All of the rumors followed the six reasons under what sort of situations
rumors spread more.
13. 13
The first rumor was a photo of a girl
killed while running in the marathon.
@NBCNews announce that an 8 year
old spectator was killed
@TylerJWalter assumed that was a girl
and a participant of the marathon
@_Nathansnicely share the rumor with a
picture
Girl Killed While Running in the Marathon
Rumor
Boston case
14. 14
• This rumor was credible and had more repercussion because it was started by the NBC
News
• The original rumor was retweeted 33 times, but it soon began to spread in many different forms,
from different authors
• 93,353 tweets contained both “girl” and “running”
• 92,785 tweets were related to the rumor
• 90,668 of these tweets were coded as misinformation
• 2046 tweets were corrections
• Corrections occurred almost at the same time as misinformation due to community response
Girl Killed While Running in the Marathon
Rumor
Boston case
15. 15
Users of 4chan and Reddit collected images of
suspicious individuals wearing backpacks at the
scene after the FBI released pictures of dark,
exploded backpacks.
Pictures were spread included two men carrying
heavy dark backpacks. They were affiliated with
U.S. military special operations, specifically Navy
SEALs.
After relate the FBI pictures with the Navy SEALs,
speculation claimed the bombings had been a
“false flag” attack by the U.S. Government.
False Flag Rumor
Boston case
16. 16
False Flag Rumor
Boston case
• This rumor made people feel important
• There were 4525 tweets in total
• 3793 of these tweets were misinformation
• 212 tweets were corrections
• 520 tweets were coded as other, most of those being unrelated
17. 17
The FBI released photographs of the
suspects.
Twitter users claimed that Tripathi, an 22
year old missing student, could be a
suspect.
The FBI had to release the names of the
real suspects sooner because the family of
Tripathi recieved death treaths
.
Sunil Tripathi Rumor
Boston case
www.yourcompanyname.com
18. 18
• This rumor helpt people with their
social status
• There were 29,416 tweets
• 22,819 of the tweets were misinformation
• 4485 of the tweets were corrections
Sunil Tripati Rumor
Boston case
19. What are social media doing to stop
misinformation?
“We do not want to be arbiters of truth ourselves” – Mark Zuckerberg
27. 27
• Put a plan and procedures in place
• The path to verification can vary
with each fact.
• Verify the source.
• Never parrot or trust sources.
Fundamentals
Verification handbook
28. 28
Verification handbook
• Challenge the sources
• Triangulate
• Ask yourself, “Do I know enough to
verify?”
• Collaborate with team members
and experts; don’t go it alone.
Fundamentals
33. 33
Step 1: Confirming the authenticity
Verification handbook
Provenance: “Is this the original
piece of content?”
Run a number of checks on that
profile to make sure it is real
www.yourcompanyname.com
34. 34
Step 1: Provenance
Verification handbook
Provenance: “Is this the original
piece of content?”
Run a number of checks on that
profile to make sure it is real
Confirming the authenticity
www.letmetweetthatforyou.com
36. 36
Step 2: Check the source
Verification handbook
Source: “Who uploaded the
content?”
The ultimate goal when attempting to
verify UGC is to identify the original
uploader and get
in touch with them
UGC = User Generated Content
A large amount of data of social media, mostly
unfiltered, unverified and unstructured
37. 37
Step 3: Verifying the date
Verification handbook
Date: “When was the content
created?”
When you know the date of the
publication, you can fill it in on
Woflram Alpha later
www.wolframalpha.com
38. 38
Step 4: What is the location?
Verification handbook
Location: “Where was the
content created?”
Try to discover the location the
content is posted.
www.google.nl
39. 39
.
Tools for Verifying Images:
Jeffrey’s Exif Viewer: An online tool that reveals the Exchangeable Image File (EXIF) information
of a digital photo
.
Foto Forensics: This website uses error level analysis (ELA) to indicate parts of an image that
may have been altered.
Fuskr: Add-on to find all the photos with the digital camera default file names
Google Search by Image: By uploading or entering an image’s URL, users can find content such
as related or similar images, websites and other pages using the specific image.
JPEGSnoop: A free Windows-only application that can detect whether an image has been edited.
RevEye: This Chrome plug-in will let you search not just Google’s image database, but also the
databases of TinEye, Yandex, Baidu and Bing.
TinEye: A reverse image search engine that connects images to their creator
YouTube Data Viewer: This shows a video’s exact upload date and time
40. 40
htt[://Tineye.com
TinEye
A reverse image search engine that
connects images to their creators by
allowing users to find out where an image
originated, how it is used, whether
modified versions exist and if there are
higher resolution copies.
Check Images with TinEye
Tool 1
41. 41
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Aliquam tincidunt ante nec sem congue convallis.
Pellentesque vel mauris quis nisl ornare rutrum in id risus.
Proin vehicula ut sem et tempus. Interdum et malesuada
fames ac ante ipsum primis in faucibus.
Data Driving
Lorem ipsum dolor sit amet,
consectetur adipiscing elit. Aliquam
tincidunt ante nec sem congue conva
86%
76%
Twitter Users
76%
Facebook Users
76%
Google Users
Check Images with TinEye
Factchecking
43. 43
Tools for Verifying Identities
Person Finder: One of the most well-known open source databanks for individuals to post and search for the
status of people affected during disaster.
Pipl.com: Searches for an individual’s Internet footprint.
Rapportive: This Gmail plugin gives users a LinkedIn profile on their contacts, including social media
accounts, location, and employment.
Spokeo: A people search engine that can find individuals by name, email, phone or username.
Skypegrab: With a skype handle, one can track IP address and user location.
Storyful MultiSearch Extension: Simple and quick solution to search accounts associated with a specific
handle from one social platform to another.
WebMii: The tool searches for weblinks that match an individual’s name, or can identify unspecified
individuals by keyword.
44. 44
Tools for Verifying Identities
AnyWho: A free white pages directory with a reverse look-up function.
BotOrNot: It checks the activity of a Twitter account and gives it a score based on how likely the account is a
bot.
Email Checker: A tool to check whether an email address exists.
Facebook Graph Search: A social search engine that is integrated into Facebook. It provides a streamlined
method to locate individuals.
Facebook Graph Search Engine Search engine to track an individual and find hidden information about the
individuals shared on Facebook.
GeoSocial Footprint: A website where one can track the users’ location “footprint” created from GPS enabled
tweets, social check-ins
HRL Lookups: One can trace network connection data, and check whether the number is valid, whether the
number is active and which network the mobile is using.
Muck Rack: Among other services, it lists thousands of journalists on Twitter, Facebook, Tumblr, Quora,
Google+, LinkedIn
Numberway: A free directory of international phone books.
45. 45
www.yourcompanyname.com
WebMii
Searches for weblinks that
match an individual’s name, or
can identify unspecified
individuals by keyword. It gives
a web visibility score which can
be used to identify fake profiles.
App for identifying persons
Tool 2
50. 50
http://www.trustthesource.nl
What i’m working on
Trustthesource
Tool 5
• Tool that combines all other
tools
• An algorithm that gives you
Immediate results
• Fact-checking based on
linguistics
51. TrusttheSource
Thank you for your time!
Info@Trustthesource.nl - evertvanbolhuis@hotmail.com - p.prins@st.hanze.nl – Marinamf@usal.es
Editor's Notes
If you find content on a social media profile, you have to run a number of checks on that profile to make sure it is real. In the case of a tweet, be aware that the site lemmetweetthatforyou.com makes it shockingly easy to fake a tweet, which can be then shared as a picture.
Another way people spread fake information on Twitter is by presenting the fake information as a retweet. That makes it appear as if you’re simply retweeting an original tweet. Fakers also often add a Twitter blue verification check mark to the cover photo on a faked account to make it appear legitimate. To check whether an account is actually verified, hover over the blue tick, and you will see the text “verified account” pop up. If it’s not there, it is not a verified account.
Facebook introduced a similar verification program, using the same blue tick system, for celebrities, journalists and government officials. Verified ticks can appear on Facebook pages as well as personal profiles. (As with Twitter, Facebook manages the verification program, and decides which verification requests to accept.) On Facebook pages, such as Usain Bolt’s below, the tick appears underneath the cover photo, next to the person’s name.
On personal profiles, the tick appears on the cover photo. Here’s the profile of Liz Heron, editor of emerging media at The Wall Street Journal: It’s worth noting that, as with Twitter, people have been known to Photoshop blue ticks onto cover photos. So, as with Twitter, if you hover your mouse over the blue tick, the phrase “verified profile” will appear.
But as with Twitter, remember the verification process is far from transparent, so with less famous people, it can be unclear whether an unverified account is a fake, or whether they’re just not famous enough to be verified!
But even with these official verification programs in place, there is no quick way of checking whether an account is real, other than painstaking checks on all of the details available on the profile. Items to review include linked websites, location, previous pictures and videos, previous status updates or tweets. Who are their friends or followers? Who are they following? Do they feature on anyone else’s lists? If you’re looking at a piece of rich content, such as a photo or video, one of the first questions is whether this is the original piece of footage or picture. Using reverse image search tools such as TinEye or Google Images3 you can find out whether it has been posted online previously.
While deliberate hoaxes are rare, they do happen. In recent years there have been relatively harmless hoax videos produced by PR companies looking for publicity11, and by students completing an end-of-term assignment12. There have also been deliberate attempts to create false content, particularly in Syria and Egypt, where discrediting the “enemy” can be achieved via reputable-looking content shared on social media channels.
Techniques include creating a false, but identical-looking website and claiming responsibility for a bomb attack13, or staging a gruesome incident and blaming the other side. Manipulation is relatively easy to do today, and whether you’re Nancy Pelosi trying to create a photograph of all female Congresswomen14 even when some of them are late, or a Syrian activist group sharing video of a man appearing to be buried alive15, any journalist or humanitarian professional has to start off by assuming a piece of UGC is false.