SlideShare a Scribd company logo
Public Lecture, 01.10.2012 @
Oslo and Akershus University
College of Applied Sciences
Department of Journalism
and Media Studies




Julian Ausserhofer
@boomblitz

Fact Checking on Social Media
Tales and Hacks 
2




Julian Ausserhofer
‣@boomblitz
3




Fact Checking on Social Media:
      Today‘s Agenda
✓Some Background
✓User Generated Videos & Photos
✓Twitter
4




    Karl Theodor Maria Nikolaus
    Johann Jacob Philipp Franz
     Joseph Sylvester Freiherr
      von und zu Guttenberg
                        http://de.wikipedia.org/wiki/Karl-Theodor_zu_Guttenberg
5




       #guttenplag




Crowdsourced fact checking
                      http://de.guttenplag.wikia.com
6




“Publics are communicating […] through
 complex networks that are bottom-up,
   top-down as well as side-to-side.”
                                  (Ito, 2008: 3)
7




  Unverified information,
gossip, rumours, hoaxes, …
                  http://www.triplem.com.au/sydney/funny/photos/hoaxphotos
…in emergency situations,
                http://commons.wikimedia.org/wiki/File:Earthquake_damage_-_dairy.jpg
… in politics,
          http://en.wikipedia.org/wiki/File:1876_Democratic_National_Convention_-_Missouri.jpg
… in elections,
              http://www.flickr.com/photos/usaid_images/5545404004/
11




     … in protests,
                      CC BY ridus.ru
12




                     … about celebrities.                                    CC BY David Shrankbone http://en.wikipedia.org/wiki/     CC BY Walmart Stores http://en.wikipedia.org/wiki/File:Will_Smith_2011,_2.jpg
                                                                                      File:Eddie_Murphy_by_David_Shankbone.jpg                CC BY Wikipediology http://en.wikipedia.org/wiki/File:Lil_Kim_Party.jpg
                                                     CC BY Agência Brasil http://en.wikipedia.org/wiki/File:Cuba.FidelCastro.02.jpg                                 CC BY jdeeringdavis http://en.wikipedia.org/wiki/
→ Celebrities incorrectly declared dead on Twitter                              CC BY Renan Facciolo http://en.wikipedia.org/wiki/
                                                              File:Kanye_West_SWU_Music_%26_Arts_Festival_2011_(crop).jpg
                                                                                                                                       File:Morgan_Freeman_@_69th_Annual_Golden_Globes_Awards_01_crop.jpg
                                                                                                                                        CC BY Alan Light http://en.wikipedia.org/wiki/File:Oprah_Winfrey_(2004).jpg
                                                     CC BY Conny Liegl http://en.wikipedia.org/wiki/File:Patrick_Swayze_2006.jpg                   http://en.wikipedia.org/wiki/File:Denzel_Washington_cropped.jpg
                                                                            http://en.wikipedia.org/wiki/File:Bill_Cosby_(2010).jpg
13




     Why?
14




Some stories are “too good to be true“.
 (Bradshaw, 2011)
                     http://www.thepoke.co.uk/index.php/2010/12/08/bad-santa-sends-xmas-message-to-harrods/
15




                          Ad Hoc Publics
                               #ouruni
                               #ukriots
                              #wikileaks
                             #arabspring
                          #occupywallstreet
(Bruns & Burgess, 2011)
16




                  Filter Bubbles
(Pariser, 2011)           CC BY-NC-SA 3.0 Julian Ausserhofer, Axel Maireder & Axel Kittenberger http://twitterpolitik.net
17




      User Generated
     Videos and Photos
     #How to verify them.
18




✓ Check Uploader's history, location. Is he/she a scraper?
✓ Use Google street view/maps/satellite to verify locations.
✓ Consult other news sources or validated user content.
✓ Background noises? Weather? Landscape?
✓ Monitor social media traffic: Who shares it?
✓ Develop and maintain relationships with the community.



  (Little, 2011)
                                                     http://youtu.be/FmhV-ymivJk
19




                 Photos: EXIF Data
(Carvin, 2011)
                            http://storify.com/acarvin/how-to-debunk-a-geopolitical-rumor-with-your-twitt2
20




     Reverse Image Search
21




           Twitter
     #How to find sources.
     #How to verify tweets.
22




     Raid on Osama bin Laden I
                        http://en.wikipedia.org/wiki/File:Bin_laden_image_2.png
23




 Raid on Osama bin Laden II
                     http://tweetlibrary.com/damon/osamaraidlivetweets
24




Raid on Osama bin Laden III
                    http://tweetlibrary.com/damon/osamaraidlivetweets
25




     #How to find sources.
26




       Have a trustable profile.
✓ Get a trustworthy Twitter handle: Short and memorable, no underlines.
✓ State your full name.
✓ Define the topics you tweet about.
27




                    Be reachable.
✓ Email address, mobile number.
✓ Anonymous contact form.
✓ Provide links and affiliations that build authority and trust.
28




                           Search
✓ Use operators and the advanced search.
✓ Search for keywords and hashtags, people and places in different
languages and scopes.
                                                                 http://search.twitter.com
29




Follow the sources of important others in the field.
 (Saldivar, 2012)
                                         https://twitter.com/paulbradshaw/following
30




     http://wefollow.com   http://twellow.com




             Useful services
31




     #How to verify tweets.
32




     1. Check the profile
33




www.WhenDidYouJoinTwitter.com
34




✓ When was the account last updated?
✓ How many followers and followees?
✓Who were the first followers?
✓ How many listings?
✓ How many addressings?
✓ Is there a profile picture?
✓ How many fake followers?


 (Bradshaw, 2011; Silverman, 2011b)
35




     Check for mutual Twitter users.
36




     2. Check the person
       Google him/her
37




     3. Crowdsource
38




(Silverman, 2011a)
39




Nelson Mandela‘s Twitter death I
(Zarrella, 2011)
(Silverman, 2011a)                         CC BY South Africa The Good News / www.sagoodnews.co.za
                     http://danzarrella.com/anatomy-of-a-twitter-death-hoax-rip-nelson-mandela.html#
40




Nelson Mandela‘s Twitter death II
(Zarrella, 2011)
                    http://danzarrella.com/anatomy-of-a-twitter-death-hoax-rip-nelson-mandela.html#
41




Guardian: Reading the Riots
(Dant & Richards, 2011)   http://www.guardian.co.uk/uk/interactive/2011/dec/07/london-riots-twitter
42




     Conclusion
43




     Everything is fakeable.
Check, double-check, triple-check.
44




Final Decision: Publish or not?
             1. How urgent is it?
2. What is the damage in case of falsehood?



 (Verweij, 2012)
45




 You


                                                              You




The network has a self-correcting mechanism.

       But do not rely on it.
                             http://www.guardian.co.uk/uk/interactive/2011/dec/07/london-riots-twitter
#tusen takk
Julian Ausserhofer
julian.ausserhofer@fh-joanneum.at
@boomblitz     http://ausserhofer.net
Sources
  47




✓Bradshaw, P. (2011, January 26). Content, Context and Code: Verifying Information Online. Online Journalism Blog.
Retrieved from http://onlinejournalismblog.com/2011/01/26/verifying-information-online-content-context-code/
✓Bruns, A., & Burgess, J. (2011). The Use of Twitter Hashtags in the Formation of Ad Hoc Publics. Presented at the
European Consortium for Political Research Conference, Reykjavik. Retrieved from http://eprints.qut.edu.au/46515/
✓Carvin, A. (2011). Israeli weapons In Libya? How @acarvin and his Twitter followers debunked sloppy journalism. Storify.
Retrieved from http://storify.com/acarvin/how-to-debunk-a-geopolitical-rumor-with-your-twitt2
✓Dant, A., & Richards, J. (2011, December 8). Behind the Rumours: How We Built Our Twitter Riots Interactive. Guardian
Datablog. Retrieved from http://www.guardian.co.uk/news/datablog/2011/dec/08/twitter-riots-interactive
✓Ito, M. (2008). Introduction. In K. Varnelis (Ed.), Networked Publics (pp. 1–14). Cambridge, London: MIT Press.

✓Little, M. (2011, May 20). The Human Algorithm. Storyful Blog. Retrieved from http://blog.storyful.com/2011/05/20/the-
human-algorithm-2/
✓Pariser, E. (2011). The Filter Bubble: What the Internet Is Hiding from You. New York: The Penguin Press.

✓Saldivar, S. (2012, July 12). How Journalists Can Find Sources on Twitter. Retrieved from http://stevesaldivar.com/blog/
2012/07/12/how-journalists-can-find-sources-on-twitter/
✓Silverman, C. (2011a, April 8). Is This the World’s Best Twitter Account? Columbia Journalism Review – Behind the News.
Retrieved from http://www.cjr.org/behind_the_news/is_this_the_worlds_best_twitter_account.php
✓Silverman, C. (2011b, June 3). Best Practices for Social Media Verification. Columbia Journalism Review – The News
Frontier. Retrieved from http://www.cjr.org/the_news_frontier/best_practices_for_social_medi.php
✓Verweij, P. (2012, January 23). 7 Best Practices For Verifying Tweets. d3-media. Retrieved from http://d3-
media.blogspot.co.at/2012/01/7-best-practices-for-verifying-tweets.html
✓Zarrella, D. (2011, January). Anatomy of a Twitter Death Hoax: “Rip Nelson Mandela.” Retrieved from http://
danzarrella.com/anatomy-of-a-twitter-death-hoax-rip-nelson-mandela.html#

More Related Content

What's hot

PRSA Webinar: PR in a Wikipedia Age
PRSA Webinar: PR in a Wikipedia AgePRSA Webinar: PR in a Wikipedia Age
PRSA Webinar: PR in a Wikipedia Age
Andrew Lih
 
Wikiconference USA 2015 - What Wikipedia Must Do
Wikiconference USA 2015 - What Wikipedia Must DoWikiconference USA 2015 - What Wikipedia Must Do
Wikiconference USA 2015 - What Wikipedia Must Do
Andrew Lih
 
The Favit solution to the Information Overload
The Favit solution to the Information OverloadThe Favit solution to the Information Overload
The Favit solution to the Information OverloadMartin Linkov
 
Presidential Debate Corrigan
Presidential Debate CorriganPresidential Debate Corrigan
Presidential Debate Corrigan
crcorri
 
The Future of Knowledge in the Age of Wikipedia - REMIXNYC 2014
The Future of Knowledge in the Age of Wikipedia - REMIXNYC 2014The Future of Knowledge in the Age of Wikipedia - REMIXNYC 2014
The Future of Knowledge in the Age of Wikipedia - REMIXNYC 2014
Andrew Lih
 
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
Lee Yount
 
Can Wikipedia Survive Popular Success and Community Decline?
Can Wikipedia Survive Popular Success and Community Decline?Can Wikipedia Survive Popular Success and Community Decline?
Can Wikipedia Survive Popular Success and Community Decline?
Andrew Lih
 
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
Lee Yount
 
InterAct Book Summit: Preventing Information Overload
InterAct Book Summit: Preventing Information OverloadInterAct Book Summit: Preventing Information Overload
InterAct Book Summit: Preventing Information Overload
Denise Jacobs
 
The technology of social change: 2015 Nonprofit Tech Conference Ignite
The technology of social change: 2015 Nonprofit Tech Conference IgniteThe technology of social change: 2015 Nonprofit Tech Conference Ignite
The technology of social change: 2015 Nonprofit Tech Conference Ignite
CoLab Coop
 
2015 NTC Ignite
2015 NTC Ignite2015 NTC Ignite
2015 NTC Ignite
Stephanie Gutowski
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbookMika Ch
 
UIUC SLIS LIS531 MiniCourse Endangered Data Week
UIUC SLIS LIS531 MiniCourse Endangered Data WeekUIUC SLIS LIS531 MiniCourse Endangered Data Week
UIUC SLIS LIS531 MiniCourse Endangered Data Week
aaroncollie
 
Transparency International Workshop
Transparency International WorkshopTransparency International Workshop
Transparency International Workshop
Mer Joyce
 
5 Location Trends For 2011
5 Location Trends For 20115 Location Trends For 2011
5 Location Trends For 2011
Gary Gale
 
Reconsidering Threshold Concepts (LOEX 2015, Denver, CO)
Reconsidering Threshold Concepts (LOEX 2015, Denver, CO)Reconsidering Threshold Concepts (LOEX 2015, Denver, CO)
Reconsidering Threshold Concepts (LOEX 2015, Denver, CO)
Lane Wilkinson
 
Digital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient TweetsDigital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient Tweetsmartin255
 
Social Discovery, Social Access
Social Discovery, Social AccessSocial Discovery, Social Access
Social Discovery, Social Access
Stephen Francoeur
 
@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015
Michael Nelson
 
Dispute finder
Dispute finderDispute finder
Dispute finder
robennals
 

What's hot (20)

PRSA Webinar: PR in a Wikipedia Age
PRSA Webinar: PR in a Wikipedia AgePRSA Webinar: PR in a Wikipedia Age
PRSA Webinar: PR in a Wikipedia Age
 
Wikiconference USA 2015 - What Wikipedia Must Do
Wikiconference USA 2015 - What Wikipedia Must DoWikiconference USA 2015 - What Wikipedia Must Do
Wikiconference USA 2015 - What Wikipedia Must Do
 
The Favit solution to the Information Overload
The Favit solution to the Information OverloadThe Favit solution to the Information Overload
The Favit solution to the Information Overload
 
Presidential Debate Corrigan
Presidential Debate CorriganPresidential Debate Corrigan
Presidential Debate Corrigan
 
The Future of Knowledge in the Age of Wikipedia - REMIXNYC 2014
The Future of Knowledge in the Age of Wikipedia - REMIXNYC 2014The Future of Knowledge in the Age of Wikipedia - REMIXNYC 2014
The Future of Knowledge in the Age of Wikipedia - REMIXNYC 2014
 
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
 
Can Wikipedia Survive Popular Success and Community Decline?
Can Wikipedia Survive Popular Success and Community Decline?Can Wikipedia Survive Popular Success and Community Decline?
Can Wikipedia Survive Popular Success and Community Decline?
 
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
 
InterAct Book Summit: Preventing Information Overload
InterAct Book Summit: Preventing Information OverloadInterAct Book Summit: Preventing Information Overload
InterAct Book Summit: Preventing Information Overload
 
The technology of social change: 2015 Nonprofit Tech Conference Ignite
The technology of social change: 2015 Nonprofit Tech Conference IgniteThe technology of social change: 2015 Nonprofit Tech Conference Ignite
The technology of social change: 2015 Nonprofit Tech Conference Ignite
 
2015 NTC Ignite
2015 NTC Ignite2015 NTC Ignite
2015 NTC Ignite
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbook
 
UIUC SLIS LIS531 MiniCourse Endangered Data Week
UIUC SLIS LIS531 MiniCourse Endangered Data WeekUIUC SLIS LIS531 MiniCourse Endangered Data Week
UIUC SLIS LIS531 MiniCourse Endangered Data Week
 
Transparency International Workshop
Transparency International WorkshopTransparency International Workshop
Transparency International Workshop
 
5 Location Trends For 2011
5 Location Trends For 20115 Location Trends For 2011
5 Location Trends For 2011
 
Reconsidering Threshold Concepts (LOEX 2015, Denver, CO)
Reconsidering Threshold Concepts (LOEX 2015, Denver, CO)Reconsidering Threshold Concepts (LOEX 2015, Denver, CO)
Reconsidering Threshold Concepts (LOEX 2015, Denver, CO)
 
Digital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient TweetsDigital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient Tweets
 
Social Discovery, Social Access
Social Discovery, Social AccessSocial Discovery, Social Access
Social Discovery, Social Access
 
@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015@WebSciDL PhD Student Project Reviews August 5&6, 2015
@WebSciDL PhD Student Project Reviews August 5&6, 2015
 
Dispute finder
Dispute finderDispute finder
Dispute finder
 

Viewers also liked

State Of The Net 2012 - Vincenzo Cosenza
State Of The Net 2012 - Vincenzo CosenzaState Of The Net 2012 - Vincenzo Cosenza
State Of The Net 2012 - Vincenzo Cosenza
Me-Source S.r.l./Blogmeter
 
Fact checking, controllare i fatti torna di moda
Fact checking, controllare i fatti torna di modaFact checking, controllare i fatti torna di moda
Fact checking, controllare i fatti torna di moda
Sergio Maistrello
 
Di che cosa parliamo quando parliamo di fact checking
Di che cosa parliamo quando parliamo di fact checkingDi che cosa parliamo quando parliamo di fact checking
Di che cosa parliamo quando parliamo di fact checking
Sergio Maistrello
 
Fact checking, dal giornalismo alla rete
Fact checking, dal giornalismo alla reteFact checking, dal giornalismo alla rete
Fact checking, dal giornalismo alla rete
Sergio Maistrello
 
Der Spiegel, fact checking - IJF11 Perugia
Der Spiegel, fact checking - IJF11 PerugiaDer Spiegel, fact checking - IJF11 Perugia
Der Spiegel, fact checking - IJF11 Perugia
Sergio Maistrello
 
Empörungsnetzwerke, Open Science und Open Data: Wie Wissenschaft, Hochschul-...
Empörungsnetzwerke, Open Science und Open Data:  Wie Wissenschaft, Hochschul-...Empörungsnetzwerke, Open Science und Open Data:  Wie Wissenschaft, Hochschul-...
Empörungsnetzwerke, Open Science und Open Data: Wie Wissenschaft, Hochschul-...
Julian Ausserhofer
 
Pordenone-partecipa, ipotesi di lavoro
Pordenone-partecipa, ipotesi di lavoroPordenone-partecipa, ipotesi di lavoro
Pordenone-partecipa, ipotesi di lavoroSergio Maistrello
 
Fact checking (Campus Multimedia Iulm)
Fact checking (Campus Multimedia Iulm)Fact checking (Campus Multimedia Iulm)
Fact checking (Campus Multimedia Iulm)
Sergio Maistrello
 
Gifford Lecture One: Cosmos, Time, Memory
Gifford Lecture One: Cosmos, Time, MemoryGifford Lecture One: Cosmos, Time, Memory
Gifford Lecture One: Cosmos, Time, Memory
Sean Carroll
 
What We (Don't) Know About the Beginning of the Universe
What We (Don't) Know About the Beginning of the UniverseWhat We (Don't) Know About the Beginning of the Universe
What We (Don't) Know About the Beginning of the Universe
Sean Carroll
 

Viewers also liked (11)

State Of The Net 2012 - Vincenzo Cosenza
State Of The Net 2012 - Vincenzo CosenzaState Of The Net 2012 - Vincenzo Cosenza
State Of The Net 2012 - Vincenzo Cosenza
 
Fact checking, controllare i fatti torna di moda
Fact checking, controllare i fatti torna di modaFact checking, controllare i fatti torna di moda
Fact checking, controllare i fatti torna di moda
 
Di che cosa parliamo quando parliamo di fact checking
Di che cosa parliamo quando parliamo di fact checkingDi che cosa parliamo quando parliamo di fact checking
Di che cosa parliamo quando parliamo di fact checking
 
Fact checking, dal giornalismo alla rete
Fact checking, dal giornalismo alla reteFact checking, dal giornalismo alla rete
Fact checking, dal giornalismo alla rete
 
Der Spiegel, fact checking - IJF11 Perugia
Der Spiegel, fact checking - IJF11 PerugiaDer Spiegel, fact checking - IJF11 Perugia
Der Spiegel, fact checking - IJF11 Perugia
 
Empörungsnetzwerke, Open Science und Open Data: Wie Wissenschaft, Hochschul-...
Empörungsnetzwerke, Open Science und Open Data:  Wie Wissenschaft, Hochschul-...Empörungsnetzwerke, Open Science und Open Data:  Wie Wissenschaft, Hochschul-...
Empörungsnetzwerke, Open Science und Open Data: Wie Wissenschaft, Hochschul-...
 
Pordenone-partecipa, ipotesi di lavoro
Pordenone-partecipa, ipotesi di lavoroPordenone-partecipa, ipotesi di lavoro
Pordenone-partecipa, ipotesi di lavoro
 
Fact checking (Campus Multimedia Iulm)
Fact checking (Campus Multimedia Iulm)Fact checking (Campus Multimedia Iulm)
Fact checking (Campus Multimedia Iulm)
 
Gifford Lecture One: Cosmos, Time, Memory
Gifford Lecture One: Cosmos, Time, MemoryGifford Lecture One: Cosmos, Time, Memory
Gifford Lecture One: Cosmos, Time, Memory
 
Theories of Truth Powerpoint
Theories of Truth PowerpointTheories of Truth Powerpoint
Theories of Truth Powerpoint
 
What We (Don't) Know About the Beginning of the Universe
What We (Don't) Know About the Beginning of the UniverseWhat We (Don't) Know About the Beginning of the Universe
What We (Don't) Know About the Beginning of the Universe
 

Similar to Fact Checking on Social Media: Tales and Hacks

Ponencia Congreso Andaluz Sociología, Almeria 25.11.2016 Social media el quin...
Ponencia Congreso Andaluz Sociología, Almeria 25.11.2016 Social media el quin...Ponencia Congreso Andaluz Sociología, Almeria 25.11.2016 Social media el quin...
Ponencia Congreso Andaluz Sociología, Almeria 25.11.2016 Social media el quin...
BO TRUE ACTIVITIES SL
 
Exploring Digital Cultures W12: The Wikipedia Debate
Exploring Digital Cultures W12: The Wikipedia DebateExploring Digital Cultures W12: The Wikipedia Debate
Exploring Digital Cultures W12: The Wikipedia Debate
NoNeedforInk
 
Think Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsThink Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming Skills
Marc Smith
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science Journalism
Liliana Bounegru
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science Journalism
Jonathan Gray
 
Social Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)informationSocial Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)information
Axel Bruns
 
Roundup Global Internet Activism Course
Roundup Global Internet Activism CourseRoundup Global Internet Activism Course
Roundup Global Internet Activism CourseThe New School
 
Social media - promise and peril for journalists
Social media - promise and peril for journalists Social media - promise and peril for journalists
Social media - promise and peril for journalists
Linda Austin
 
Webstock Bob Rapp
Webstock  Bob RappWebstock  Bob Rapp
Webstock Bob Rapp
Freelancer
 
Mobilize your cause: Tools
Mobilize your cause: ToolsMobilize your cause: Tools
Mobilize your cause: Tools
JD Lasica
 
The Filter in Our (?) Heads: Digital Media and Polarisation
The Filter in Our (?) Heads: Digital Media and PolarisationThe Filter in Our (?) Heads: Digital Media and Polarisation
The Filter in Our (?) Heads: Digital Media and Polarisation
Axel Bruns
 
Wikileaks brochure
Wikileaks brochureWikileaks brochure
Wikileaks brochure
043cyeung
 
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
Axel Bruns
 
The story of my (connected) life- CECA2010
The story of my (connected) life- CECA2010The story of my (connected) life- CECA2010
The story of my (connected) life- CECA2010
Ben Wildeboer
 
Extracting Data from Historical Documents: Crowdsourcing Annotations on Wikis...
Extracting Data from Historical Documents: Crowdsourcing Annotations on Wikis...Extracting Data from Historical Documents: Crowdsourcing Annotations on Wikis...
Extracting Data from Historical Documents: Crowdsourcing Annotations on Wikis...
Gaurav Vaidya
 
Challenges in-archiving-twitter
Challenges in-archiving-twitterChallenges in-archiving-twitter
Challenges in-archiving-twitter
Katrin Weller
 
Gatewatching 11: Echo Chambers? Filter Bubbles? Reviewing the Evidence
Gatewatching 11: Echo Chambers? Filter Bubbles? Reviewing the EvidenceGatewatching 11: Echo Chambers? Filter Bubbles? Reviewing the Evidence
Gatewatching 11: Echo Chambers? Filter Bubbles? Reviewing the Evidence
Axel Bruns
 
Conversing around Data with Collaborative Analysis - Where2011
Conversing around Data with Collaborative Analysis - Where2011Conversing around Data with Collaborative Analysis - Where2011
Conversing around Data with Collaborative Analysis - Where2011
Andrew Turner
 
Why Extension should use social media
Why Extension should use social mediaWhy Extension should use social media
Why Extension should use social media
Anne Adrian
 

Similar to Fact Checking on Social Media: Tales and Hacks (20)

Ponencia Congreso Andaluz Sociología, Almeria 25.11.2016 Social media el quin...
Ponencia Congreso Andaluz Sociología, Almeria 25.11.2016 Social media el quin...Ponencia Congreso Andaluz Sociología, Almeria 25.11.2016 Social media el quin...
Ponencia Congreso Andaluz Sociología, Almeria 25.11.2016 Social media el quin...
 
Exploring Digital Cultures W12: The Wikipedia Debate
Exploring Digital Cultures W12: The Wikipedia DebateExploring Digital Cultures W12: The Wikipedia Debate
Exploring Digital Cultures W12: The Wikipedia Debate
 
Think Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsThink Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming Skills
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science Journalism
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science Journalism
 
DMI Summer 2010 - Final Presentations
DMI Summer 2010 - Final PresentationsDMI Summer 2010 - Final Presentations
DMI Summer 2010 - Final Presentations
 
Social Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)informationSocial Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)information
 
Roundup Global Internet Activism Course
Roundup Global Internet Activism CourseRoundup Global Internet Activism Course
Roundup Global Internet Activism Course
 
Social media - promise and peril for journalists
Social media - promise and peril for journalists Social media - promise and peril for journalists
Social media - promise and peril for journalists
 
Webstock Bob Rapp
Webstock  Bob RappWebstock  Bob Rapp
Webstock Bob Rapp
 
Mobilize your cause: Tools
Mobilize your cause: ToolsMobilize your cause: Tools
Mobilize your cause: Tools
 
The Filter in Our (?) Heads: Digital Media and Polarisation
The Filter in Our (?) Heads: Digital Media and PolarisationThe Filter in Our (?) Heads: Digital Media and Polarisation
The Filter in Our (?) Heads: Digital Media and Polarisation
 
Wikileaks brochure
Wikileaks brochureWikileaks brochure
Wikileaks brochure
 
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
 
The story of my (connected) life- CECA2010
The story of my (connected) life- CECA2010The story of my (connected) life- CECA2010
The story of my (connected) life- CECA2010
 
Extracting Data from Historical Documents: Crowdsourcing Annotations on Wikis...
Extracting Data from Historical Documents: Crowdsourcing Annotations on Wikis...Extracting Data from Historical Documents: Crowdsourcing Annotations on Wikis...
Extracting Data from Historical Documents: Crowdsourcing Annotations on Wikis...
 
Challenges in-archiving-twitter
Challenges in-archiving-twitterChallenges in-archiving-twitter
Challenges in-archiving-twitter
 
Gatewatching 11: Echo Chambers? Filter Bubbles? Reviewing the Evidence
Gatewatching 11: Echo Chambers? Filter Bubbles? Reviewing the EvidenceGatewatching 11: Echo Chambers? Filter Bubbles? Reviewing the Evidence
Gatewatching 11: Echo Chambers? Filter Bubbles? Reviewing the Evidence
 
Conversing around Data with Collaborative Analysis - Where2011
Conversing around Data with Collaborative Analysis - Where2011Conversing around Data with Collaborative Analysis - Where2011
Conversing around Data with Collaborative Analysis - Where2011
 
Why Extension should use social media
Why Extension should use social mediaWhy Extension should use social media
Why Extension should use social media
 

More from Julian Ausserhofer

Research on data journalism: What is there to investigate? Insights from a st...
Research on data journalism: What is there to investigate? Insights from a st...Research on data journalism: What is there to investigate? Insights from a st...
Research on data journalism: What is there to investigate? Insights from a st...
Julian Ausserhofer
 
News Production Workflows in Data- driven, Algorithmic Journalism: A Systema...
 News Production Workflows in Data- driven, Algorithmic Journalism: A Systema... News Production Workflows in Data- driven, Algorithmic Journalism: A Systema...
News Production Workflows in Data- driven, Algorithmic Journalism: A Systema...
Julian Ausserhofer
 
Digital Methods im Journalismus: Workflows in datenjournalistischen Projekten
Digital Methods im Journalismus: Workflows in datenjournalistischen ProjektenDigital Methods im Journalismus: Workflows in datenjournalistischen Projekten
Digital Methods im Journalismus: Workflows in datenjournalistischen Projekten
Julian Ausserhofer
 
Digitale Objekte in digitalen Öffentlichkeiten: Die Rolle von Hashtags in pol...
Digitale Objekte in digitalen Öffentlichkeiten: Die Rolle von Hashtags in pol...Digitale Objekte in digitalen Öffentlichkeiten: Die Rolle von Hashtags in pol...
Digitale Objekte in digitalen Öffentlichkeiten: Die Rolle von Hashtags in pol...
Julian Ausserhofer
 
Political Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and PeoplePolitical Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and People
Julian Ausserhofer
 
The Relevance of Algorithms
The Relevance of AlgorithmsThe Relevance of Algorithms
The Relevance of Algorithms
Julian Ausserhofer
 
Tagespolitik auf Twitter: Themen und Strukturen einer politischen Twittersphäre
Tagespolitik auf Twitter: Themen und Strukturen einer politischen TwittersphäreTagespolitik auf Twitter: Themen und Strukturen einer politischen Twittersphäre
Tagespolitik auf Twitter: Themen und Strukturen einer politischen Twittersphäre
Julian Ausserhofer
 
Social Media, politische Partizipation & Mobilisierung
Social Media, politische Partizipation & MobilisierungSocial Media, politische Partizipation & Mobilisierung
Social Media, politische Partizipation & Mobilisierung
Julian Ausserhofer
 
Identität im Social Media
 „Sharing“: Authentizität als Präsentation 
multip...
Identität im  Social Media
 „Sharing“: Authentizität als Präsentation 
multip...Identität im  Social Media
 „Sharing“: Authentizität als Präsentation 
multip...
Identität im Social Media
 „Sharing“: Authentizität als Präsentation 
multip...
Julian Ausserhofer
 
Vom Infodschungel zum digitalen Nutzgarten
Vom Infodschungel zum digitalen NutzgartenVom Infodschungel zum digitalen Nutzgarten
Vom Infodschungel zum digitalen Nutzgarten
Julian Ausserhofer
 
Datenjournalismus: Meilensteine und Charakteristika
Datenjournalismus: Meilensteine und CharakteristikaDatenjournalismus: Meilensteine und Charakteristika
Datenjournalismus: Meilensteine und Charakteristika
Julian Ausserhofer
 

More from Julian Ausserhofer (11)

Research on data journalism: What is there to investigate? Insights from a st...
Research on data journalism: What is there to investigate? Insights from a st...Research on data journalism: What is there to investigate? Insights from a st...
Research on data journalism: What is there to investigate? Insights from a st...
 
News Production Workflows in Data- driven, Algorithmic Journalism: A Systema...
 News Production Workflows in Data- driven, Algorithmic Journalism: A Systema... News Production Workflows in Data- driven, Algorithmic Journalism: A Systema...
News Production Workflows in Data- driven, Algorithmic Journalism: A Systema...
 
Digital Methods im Journalismus: Workflows in datenjournalistischen Projekten
Digital Methods im Journalismus: Workflows in datenjournalistischen ProjektenDigital Methods im Journalismus: Workflows in datenjournalistischen Projekten
Digital Methods im Journalismus: Workflows in datenjournalistischen Projekten
 
Digitale Objekte in digitalen Öffentlichkeiten: Die Rolle von Hashtags in pol...
Digitale Objekte in digitalen Öffentlichkeiten: Die Rolle von Hashtags in pol...Digitale Objekte in digitalen Öffentlichkeiten: Die Rolle von Hashtags in pol...
Digitale Objekte in digitalen Öffentlichkeiten: Die Rolle von Hashtags in pol...
 
Political Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and PeoplePolitical Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and People
 
The Relevance of Algorithms
The Relevance of AlgorithmsThe Relevance of Algorithms
The Relevance of Algorithms
 
Tagespolitik auf Twitter: Themen und Strukturen einer politischen Twittersphäre
Tagespolitik auf Twitter: Themen und Strukturen einer politischen TwittersphäreTagespolitik auf Twitter: Themen und Strukturen einer politischen Twittersphäre
Tagespolitik auf Twitter: Themen und Strukturen einer politischen Twittersphäre
 
Social Media, politische Partizipation & Mobilisierung
Social Media, politische Partizipation & MobilisierungSocial Media, politische Partizipation & Mobilisierung
Social Media, politische Partizipation & Mobilisierung
 
Identität im Social Media
 „Sharing“: Authentizität als Präsentation 
multip...
Identität im  Social Media
 „Sharing“: Authentizität als Präsentation 
multip...Identität im  Social Media
 „Sharing“: Authentizität als Präsentation 
multip...
Identität im Social Media
 „Sharing“: Authentizität als Präsentation 
multip...
 
Vom Infodschungel zum digitalen Nutzgarten
Vom Infodschungel zum digitalen NutzgartenVom Infodschungel zum digitalen Nutzgarten
Vom Infodschungel zum digitalen Nutzgarten
 
Datenjournalismus: Meilensteine und Charakteristika
Datenjournalismus: Meilensteine und CharakteristikaDatenjournalismus: Meilensteine und Charakteristika
Datenjournalismus: Meilensteine und Charakteristika
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Fact Checking on Social Media: Tales and Hacks

  • 1. Public Lecture, 01.10.2012 @ Oslo and Akershus University College of Applied Sciences Department of Journalism and Media Studies Julian Ausserhofer @boomblitz Fact Checking on Social Media Tales and Hacks 
  • 3. 3 Fact Checking on Social Media: Today‘s Agenda ✓Some Background ✓User Generated Videos & Photos ✓Twitter
  • 4. 4 Karl Theodor Maria Nikolaus Johann Jacob Philipp Franz Joseph Sylvester Freiherr von und zu Guttenberg http://de.wikipedia.org/wiki/Karl-Theodor_zu_Guttenberg
  • 5. 5 #guttenplag Crowdsourced fact checking http://de.guttenplag.wikia.com
  • 6. 6 “Publics are communicating […] through complex networks that are bottom-up, top-down as well as side-to-side.” (Ito, 2008: 3)
  • 7. 7 Unverified information, gossip, rumours, hoaxes, … http://www.triplem.com.au/sydney/funny/photos/hoaxphotos
  • 8. …in emergency situations, http://commons.wikimedia.org/wiki/File:Earthquake_damage_-_dairy.jpg
  • 9. … in politics, http://en.wikipedia.org/wiki/File:1876_Democratic_National_Convention_-_Missouri.jpg
  • 10. … in elections, http://www.flickr.com/photos/usaid_images/5545404004/
  • 11. 11 … in protests, CC BY ridus.ru
  • 12. 12 … about celebrities. CC BY David Shrankbone http://en.wikipedia.org/wiki/ CC BY Walmart Stores http://en.wikipedia.org/wiki/File:Will_Smith_2011,_2.jpg File:Eddie_Murphy_by_David_Shankbone.jpg CC BY Wikipediology http://en.wikipedia.org/wiki/File:Lil_Kim_Party.jpg CC BY Agência Brasil http://en.wikipedia.org/wiki/File:Cuba.FidelCastro.02.jpg CC BY jdeeringdavis http://en.wikipedia.org/wiki/ → Celebrities incorrectly declared dead on Twitter CC BY Renan Facciolo http://en.wikipedia.org/wiki/ File:Kanye_West_SWU_Music_%26_Arts_Festival_2011_(crop).jpg File:Morgan_Freeman_@_69th_Annual_Golden_Globes_Awards_01_crop.jpg CC BY Alan Light http://en.wikipedia.org/wiki/File:Oprah_Winfrey_(2004).jpg CC BY Conny Liegl http://en.wikipedia.org/wiki/File:Patrick_Swayze_2006.jpg http://en.wikipedia.org/wiki/File:Denzel_Washington_cropped.jpg http://en.wikipedia.org/wiki/File:Bill_Cosby_(2010).jpg
  • 13. 13 Why?
  • 14. 14 Some stories are “too good to be true“. (Bradshaw, 2011) http://www.thepoke.co.uk/index.php/2010/12/08/bad-santa-sends-xmas-message-to-harrods/
  • 15. 15 Ad Hoc Publics #ouruni #ukriots #wikileaks #arabspring #occupywallstreet (Bruns & Burgess, 2011)
  • 16. 16 Filter Bubbles (Pariser, 2011) CC BY-NC-SA 3.0 Julian Ausserhofer, Axel Maireder & Axel Kittenberger http://twitterpolitik.net
  • 17. 17 User Generated Videos and Photos #How to verify them.
  • 18. 18 ✓ Check Uploader's history, location. Is he/she a scraper? ✓ Use Google street view/maps/satellite to verify locations. ✓ Consult other news sources or validated user content. ✓ Background noises? Weather? Landscape? ✓ Monitor social media traffic: Who shares it? ✓ Develop and maintain relationships with the community. (Little, 2011) http://youtu.be/FmhV-ymivJk
  • 19. 19 Photos: EXIF Data (Carvin, 2011) http://storify.com/acarvin/how-to-debunk-a-geopolitical-rumor-with-your-twitt2
  • 20. 20 Reverse Image Search
  • 21. 21 Twitter #How to find sources. #How to verify tweets.
  • 22. 22 Raid on Osama bin Laden I http://en.wikipedia.org/wiki/File:Bin_laden_image_2.png
  • 23. 23 Raid on Osama bin Laden II http://tweetlibrary.com/damon/osamaraidlivetweets
  • 24. 24 Raid on Osama bin Laden III http://tweetlibrary.com/damon/osamaraidlivetweets
  • 25. 25 #How to find sources.
  • 26. 26 Have a trustable profile. ✓ Get a trustworthy Twitter handle: Short and memorable, no underlines. ✓ State your full name. ✓ Define the topics you tweet about.
  • 27. 27 Be reachable. ✓ Email address, mobile number. ✓ Anonymous contact form. ✓ Provide links and affiliations that build authority and trust.
  • 28. 28 Search ✓ Use operators and the advanced search. ✓ Search for keywords and hashtags, people and places in different languages and scopes. http://search.twitter.com
  • 29. 29 Follow the sources of important others in the field. (Saldivar, 2012) https://twitter.com/paulbradshaw/following
  • 30. 30 http://wefollow.com http://twellow.com Useful services
  • 31. 31 #How to verify tweets.
  • 32. 32 1. Check the profile
  • 34. 34 ✓ When was the account last updated? ✓ How many followers and followees? ✓Who were the first followers? ✓ How many listings? ✓ How many addressings? ✓ Is there a profile picture? ✓ How many fake followers? (Bradshaw, 2011; Silverman, 2011b)
  • 35. 35 Check for mutual Twitter users.
  • 36. 36 2. Check the person Google him/her
  • 37. 37 3. Crowdsource
  • 39. 39 Nelson Mandela‘s Twitter death I (Zarrella, 2011) (Silverman, 2011a) CC BY South Africa The Good News / www.sagoodnews.co.za http://danzarrella.com/anatomy-of-a-twitter-death-hoax-rip-nelson-mandela.html#
  • 40. 40 Nelson Mandela‘s Twitter death II (Zarrella, 2011) http://danzarrella.com/anatomy-of-a-twitter-death-hoax-rip-nelson-mandela.html#
  • 41. 41 Guardian: Reading the Riots (Dant & Richards, 2011) http://www.guardian.co.uk/uk/interactive/2011/dec/07/london-riots-twitter
  • 42. 42 Conclusion
  • 43. 43 Everything is fakeable. Check, double-check, triple-check.
  • 44. 44 Final Decision: Publish or not? 1. How urgent is it? 2. What is the damage in case of falsehood? (Verweij, 2012)
  • 45. 45 You You The network has a self-correcting mechanism. But do not rely on it. http://www.guardian.co.uk/uk/interactive/2011/dec/07/london-riots-twitter
  • 47. Sources 47 ✓Bradshaw, P. (2011, January 26). Content, Context and Code: Verifying Information Online. Online Journalism Blog. Retrieved from http://onlinejournalismblog.com/2011/01/26/verifying-information-online-content-context-code/ ✓Bruns, A., & Burgess, J. (2011). The Use of Twitter Hashtags in the Formation of Ad Hoc Publics. Presented at the European Consortium for Political Research Conference, Reykjavik. Retrieved from http://eprints.qut.edu.au/46515/ ✓Carvin, A. (2011). Israeli weapons In Libya? How @acarvin and his Twitter followers debunked sloppy journalism. Storify. Retrieved from http://storify.com/acarvin/how-to-debunk-a-geopolitical-rumor-with-your-twitt2 ✓Dant, A., & Richards, J. (2011, December 8). Behind the Rumours: How We Built Our Twitter Riots Interactive. Guardian Datablog. Retrieved from http://www.guardian.co.uk/news/datablog/2011/dec/08/twitter-riots-interactive ✓Ito, M. (2008). Introduction. In K. Varnelis (Ed.), Networked Publics (pp. 1–14). Cambridge, London: MIT Press. ✓Little, M. (2011, May 20). The Human Algorithm. Storyful Blog. Retrieved from http://blog.storyful.com/2011/05/20/the- human-algorithm-2/ ✓Pariser, E. (2011). The Filter Bubble: What the Internet Is Hiding from You. New York: The Penguin Press. ✓Saldivar, S. (2012, July 12). How Journalists Can Find Sources on Twitter. Retrieved from http://stevesaldivar.com/blog/ 2012/07/12/how-journalists-can-find-sources-on-twitter/ ✓Silverman, C. (2011a, April 8). Is This the World’s Best Twitter Account? Columbia Journalism Review – Behind the News. Retrieved from http://www.cjr.org/behind_the_news/is_this_the_worlds_best_twitter_account.php ✓Silverman, C. (2011b, June 3). Best Practices for Social Media Verification. Columbia Journalism Review – The News Frontier. Retrieved from http://www.cjr.org/the_news_frontier/best_practices_for_social_medi.php ✓Verweij, P. (2012, January 23). 7 Best Practices For Verifying Tweets. d3-media. Retrieved from http://d3- media.blogspot.co.at/2012/01/7-best-practices-for-verifying-tweets.html ✓Zarrella, D. (2011, January). Anatomy of a Twitter Death Hoax: “Rip Nelson Mandela.” Retrieved from http:// danzarrella.com/anatomy-of-a-twitter-death-hoax-rip-nelson-mandela.html#