Lecture to Northwestern London seminar series. It looks at the change in the role of news media in democracy, how the news industry has changed to a more networked system with new publishers and platforms becoming more influential. It examines the rise of fake news and the crisis of trust in news media and how politicians have responded.
This is a summarized view of doctoral consortium presentation done at NSF SoCS 2013 PI meeting.
During recent crises, citizens (sensors) are increasingly using social media to share variety of information- situation on the ground, emerging needs, donation offers, damage, etc. In such an evolving ad-hoc community, how can we extract actionable nuggets from the social media streams to aid relief efforts? This doctoral consortium presentation summarized in a poster shows a framework to analyze social media data and manage information to assist coordination by focusing on three important questions to answer: Whom to coordinate with, Why to coordinate and How to coordinate. It shows exemplary insights for needs and availability from the recent disaster events.
Check this ICWSM-2013 tutorial partly based on Hemant Purohit's PhD work with his mentors (Dr. Patrick Meier and Dr. Carlos Castillo) and adviser (Prof. Amit Sheth): http://www.slideshare.net/knoesis/icwsm-2013-tutorial-crisis-mapping-citizen-sensing-and-social-media-analytics (details: http://www.knoesis.org/hemant/present/icwsm2013)
Check out the NSF SoCS project on leveraging social media for crisis response: http://knoesis.org/research/semsoc/projects/socs
Truth, Trust and Technology: strategic communications in an age of misinforma...POLIS LSE
This was a lecture given to the NATO defense college in March 2018. It used the work of the LSE Truth, Trust and Technology Commission to examine the problems of strategic communications and journalism in an age of 'fake news' and disinformation.
Lecture to Northwestern London seminar series. It looks at the change in the role of news media in democracy, how the news industry has changed to a more networked system with new publishers and platforms becoming more influential. It examines the rise of fake news and the crisis of trust in news media and how politicians have responded.
This is a summarized view of doctoral consortium presentation done at NSF SoCS 2013 PI meeting.
During recent crises, citizens (sensors) are increasingly using social media to share variety of information- situation on the ground, emerging needs, donation offers, damage, etc. In such an evolving ad-hoc community, how can we extract actionable nuggets from the social media streams to aid relief efforts? This doctoral consortium presentation summarized in a poster shows a framework to analyze social media data and manage information to assist coordination by focusing on three important questions to answer: Whom to coordinate with, Why to coordinate and How to coordinate. It shows exemplary insights for needs and availability from the recent disaster events.
Check this ICWSM-2013 tutorial partly based on Hemant Purohit's PhD work with his mentors (Dr. Patrick Meier and Dr. Carlos Castillo) and adviser (Prof. Amit Sheth): http://www.slideshare.net/knoesis/icwsm-2013-tutorial-crisis-mapping-citizen-sensing-and-social-media-analytics (details: http://www.knoesis.org/hemant/present/icwsm2013)
Check out the NSF SoCS project on leveraging social media for crisis response: http://knoesis.org/research/semsoc/projects/socs
Truth, Trust and Technology: strategic communications in an age of misinforma...POLIS LSE
This was a lecture given to the NATO defense college in March 2018. It used the work of the LSE Truth, Trust and Technology Commission to examine the problems of strategic communications and journalism in an age of 'fake news' and disinformation.
For #IUday, Filippo Menczer presents research on online misinformation from the Center for Complex Networks and Systems Research, IU School of Informatics and Computing, and IU Network Science Institute. Watch the Facebook Live talk at https://www.facebook.com/fil.menczer/posts/10108970712372359
Truth, Trust and Technology: an agenda for the countering misinformationPOLIS LSE
A lecture setting out the problems being addressed the LSE Truth Trust and Technology Commission of 2018. It sets out the problem, the possible solutions in a conceptual framework.
This is a webinar organised by the Nigerian Library Association, Delta State Chapter, in collaboration with Digital Citizens.
The aim of the webinar is to equip library and information professionals with necessary technologies and strategies needed to play key roles in the dissemination of correct information, and in the information literacy of citizens, in this era of fake news and misinformation.
Information disorder: Toward an interdisciplinary framework for research and ...friendscb
A comprehensive examination of information disorder including filter bubbles, echo chambers and information pollution published by the Council of Europe.
Andrew Chadwick and Simon Collister (2014) "Boundary-Drawing Power and the Re...andrewchadwick
Slides for a presentation to the American Political Science Association Political Communication Section Annual Preconference, 2014, George Washington University, Washington DC, August 2014.
Download the published paper at http://j.mp/IJOC-Snowden-2
Semantic Social Mashup approach for Designing Citizen DiplomacyAmit Sheth
Amit Sheth, "Semantic Social Mashup approach for Designing Citizen Diplomacy," position paper/talk at NSF Workshop on Designing Citizen Diplomacy, Irvine, CA, January 27-28, 2011.
Emergency Surgery Workshop Davos 2011: Presentation by Prof Jürg Kesselring, MD, Member of the International Committee of the Red Cross ICRC, Valens, Switzerland
For #IUday, Filippo Menczer presents research on online misinformation from the Center for Complex Networks and Systems Research, IU School of Informatics and Computing, and IU Network Science Institute. Watch the Facebook Live talk at https://www.facebook.com/fil.menczer/posts/10108970712372359
Truth, Trust and Technology: an agenda for the countering misinformationPOLIS LSE
A lecture setting out the problems being addressed the LSE Truth Trust and Technology Commission of 2018. It sets out the problem, the possible solutions in a conceptual framework.
This is a webinar organised by the Nigerian Library Association, Delta State Chapter, in collaboration with Digital Citizens.
The aim of the webinar is to equip library and information professionals with necessary technologies and strategies needed to play key roles in the dissemination of correct information, and in the information literacy of citizens, in this era of fake news and misinformation.
Information disorder: Toward an interdisciplinary framework for research and ...friendscb
A comprehensive examination of information disorder including filter bubbles, echo chambers and information pollution published by the Council of Europe.
Andrew Chadwick and Simon Collister (2014) "Boundary-Drawing Power and the Re...andrewchadwick
Slides for a presentation to the American Political Science Association Political Communication Section Annual Preconference, 2014, George Washington University, Washington DC, August 2014.
Download the published paper at http://j.mp/IJOC-Snowden-2
Semantic Social Mashup approach for Designing Citizen DiplomacyAmit Sheth
Amit Sheth, "Semantic Social Mashup approach for Designing Citizen Diplomacy," position paper/talk at NSF Workshop on Designing Citizen Diplomacy, Irvine, CA, January 27-28, 2011.
Emergency Surgery Workshop Davos 2011: Presentation by Prof Jürg Kesselring, MD, Member of the International Committee of the Red Cross ICRC, Valens, Switzerland
From collecting archives to managing information: ICRC information management...souslapoussiere
From collecting archives to managing information: new activities and new roles for an archives service.
Presentation given at the ICA congress Seoul 2016
International Red Cross & Red Crescent MovementJessica Ports
This presentation provides a quick overview to the International Red Cross and Red Crescent Movement. Focuses on activities of the ICRC, the Federation and the National Societies, as well as a brief history of the Movement and the Fundamental Principles. Also discusses the American Red Cross, current Movement activities around the world, and career options. Presented to graduate students at Tulane University.
A lecture given to the NATO Defense College about the LSE Truth, Trust and Technology Commission. The Commission is examining the crisis in public information, fake news, and interference in elections.
Misinformation, Disinformation & Hate speech
Tackling Misinformation,
Disinformation, and Hate Speech:
Empowering South Sudanese Youth, a presentation by Emmanuel Bida Thomas a fact-checker at 211 Check a fact-checking and information verification platform in South Sudan dedicated to countering misinformation, disinformation and hate speech.
Crisis Information Management: A Primer, presentation by Sanjana Hattotuwa, Special Advisor, ICT4Peace Foundation. Prepared for ISCRAM Summer School 2011 - http://www.iscram.org/live/summerschool2011.
How to Think in the Information Age: Finding Facts in a Post-Truth WorldSt. Petersburg College
With an ever-increasing daily torrent of information raining on people from almost every perceivable angle, it is impossible to process it all and, more importantly, to “separate the wheat from the chaff.” It is vital for everyone to be able to verify the accuracy and authority of information found on the Web while being able to detect bad data and lies to achieve the final goal of making intelligent decisions. As 21st Century library and information professionals, it is essential that we know how to think in the Information Age and to be able to pass this skill on to our users. In this webinar:
~ discover what misinformation is and explore ways to combat it.
~ learn to recognize misleading news, statistics, graphs, infographics, and more.
~ understand basic fallacies and how to detect bias.
~ appreciate how fast information spreads on social media and gather tools to help you become a stronger digital citizen.
~ utilize the scientific method to become a critical thinker in the Information Age.
Strategic communication, news media and influencePOLIS LSE
Slides for a presentation to the NATO defence college in Rome in March 2017 looking at the news and social media context and how it is becoming more networked. It looks at the positive and negative aspects of digital change and the structural shifts in communication, especially in journalism and its consumption and dissemination.
Presentation made at "Enhancing Information and Communication: Issues for Policymakers, Ambassadors, and Commanders" organised by National Defence University, Fort Lesley J. McNair, Washington, DC on 17 August 2011.
The free and open exchange of knowledge empowers people, promotes accountability and sparks creativity. However, publishing and using data for social good can sometimes have the opposite result: cautionary tales are shared in corridors and back channels about open data projects that empowered the powerful, endangered the powerless, and generally made things worse while honestly trying to help.
This session will present real life stories from the Dark Side of Data, and provide a conversation space for all those who wish to share their experiences of community data snafus, ranging from hilarious to perilous, with the goal of transparently learning from our failures, and empowering new projects with roadmaps on how to open and share responsibly.
Making Decisions in a World Awash in Data: We’re going to need a different bo...Micah Altman
In his abstract, Scriffignano summarizes as follows:
l explore some of the ways in which the massive availability of data is changing and the types of questions we must ask in the context of making business decisions. Truth be told, nearly all organizations struggle to make sense out of the mounting data already within the enterprise. At the same time, businesses, individuals, and governments continue to try to outpace one another, often in ways that are informed by newly-available data and technology, but just as often using that data and technology in alarmingly inappropriate or incomplete ways. Multiple “solutions” exist to take data that is poorly understood, promising to derive meaning that is often transient at best. A tremendous amount of “dark” innovation continues in the space of fraud and other bad behavior (e.g. cyber crime, cyber terrorism), highlighting that there are very real risks to taking a fast-follower strategy in making sense out of the ever-increasing amount of data available. Tools and technologies can be very helpful or, as Scriffignano puts it, “they can accelerate the speed with which we hit the wall.” Drawing on unstructured, highly dynamic sources of data, fascinating inference can be derived if we ask the right questions (and maybe use a bit of different math!). This session will cover three main themes: The new normal (how the data around us continues to change), how are we reacting (bringing data science into the room), and the path ahead (creating a mindset in the organization that evolves). Ultimately, what we learn is governed as much by the data available as by the questions we ask. This talk, both relevant and occasionally irreverent, will explore some of the new ways data is being used to expose risk and opportunity and the skills we need to take advantage of a world awash in data.
Presentation on Reimagining Extremism: Context, culture, community and countrySanjana Hattotuwa
ICT4Peace Foundation’s Special Advisor Sanjana Hattotuwa was invited by New Zealand’s Department of Prime Minister and Cabinet to speak at He Whenua Taurikura, New Zealand’s first annual hui (meaning a large gathering in Maori) on countering terrorism and violent extremism. The hui was held from 14-16 June 2021 in Christchurch. He Whenua Taurikura translates to ‘a country at peace’. This presentation was delivered as part of the fourth panel at the hui, on day two.
Sanjana followed presentations by Jordan Carter from InternetNZ, Kate Hannah from Te Pūnaha Matatini and University of Auckland, Dr Nawab Osman from Facebook, Nick Pickles from Twitter, and Anjum Rahman from Inclusive Aotearoa Collective Tāhono and Islamic Women’s Council of New Zealand. The panel was chaired by Paul Ash, head of the Christchurch Call.
Roles of media in peacebuilding & conflict generationSanjana Hattotuwa
Was invited by Associate Professor SungYong Lee at NCPACS to deliver a guest lecture to his 2021 MA class on media's role in peacebuilding violent conflict generation.
Are we collectively ruining democracy? Polarisation of thought and belief seems to be on the increase particularly in the online environment. Where people who think similarly move (or are pushed) towards more fixed or extreme views, it makes it harder for people to express opinions or suggest new ideas. How can we challenge it? This is an opportunity to talk about how groupthink is affecting our lives, and to discuss positive alternatives.
Peace processes after the pandemic: What role for technology?Sanjana Hattotuwa
Increasingly discussed today in the Global North, Information and Communications Technologies (ICTs) have featured in mediation processes in the Global South for close upon two decades. This bears mention in what are often discussions that appear to present or posit the use of ICTs in mediation as recent or somehow pegged to the advent and, today, ubiquity of social media. The challenges today are both similar and different to those that existed at the turn of the century. Transparency, agency and voice, central pillars of democracy, find expression, at ever increasing scale, scope, and speed, on social media. Conversely, new forms of spoiler dynamics, linked to in large part the manipulation of public discourse, also use social media as key vectors to incite violence, inflame hate and spread incendiary falsehoods. The dilemma facing mediation today is one of having to deal with vectors of information production that lie entirely beyond the remit of the Chatham House rule, rules of confidential engagement, and the sandboxing needed to incubate fragile processes and relationships. Mediators are bombarded with information they must make sense of, and this sense-making process is itself often under-valued in modern day mediation. The confusion leads to (understandable, yet misplaced) anxiety, which often finds expression in suspicion and scepticism around the role, reach and relevance of ICTs in mediation processes.
Additionally, the post-Coronavirus landscape brings with it added challenges. If physical meetings are no longer viable for the foreseeable future, a key question is how the rich, sensory experience, relational depth, non-verbal cues, physical contact and the security of verbal communication in a closed-door environment can be replicated, and to what degree, through virtually mediated environments. Aside from the obvious cyber-security concerns are also psycho-social, cognitive, socio-cultural, gendered challenges in mediation processes that will be predominantly anchored to online technologies, including social media apps, products, and platforms. Questions asked by Hattotuwa in 2018 are even more relevant in the long-shadow of Covid-19, in addition to others borne out of global and local circumstances that a few months ago seemed unimaginable. How can social media and ICTs help? What is important to focus on, and what are some dangers of today’s conflict landscape beyond the headlines? What questions should mediators ask in order to avoid the more uncommon pitfalls of incorporating ICTs in negotiations processes? Fundamentally, how will conflict transformation, anchored to mediation, change in a post-Coronavirus world where travel and meetings will be severely restricted, or no longer possible to do discreetly? More fundamentally, how can and should expectations from, models of and approaches to mediation change, post-pandemic, in a world increasingly mediated (no pun intended) through social media?
Beyond the global reset: Towards pandemic panopticons or something radically ...Sanjana Hattotuwa
On the invitation of Christina Goodness, Chief Information Management Officer at the Departments of Peacebuilding, Political and Peace Operations DPPA-DPO, United Nations, the ICT4Peace Foundation's Sanjana Hattotuwa gave a presentation titled 'Beyond the global reset: Towards pandemic panopticons or something radically new?' as part of the '(un)data Seminar Series on Outrageous Questions'.
Details and overview at https://ict4peace.org/activities/post-coronavirus-towards-pandemic-panopticons-or-something-radically-new/
«From the burning of the Notre Dame in Paris to heinous terrorism in Sri Lanka and Christchurch, social media inextricably is entwined with how billions see or engage with the world.»
More details at https://ict4peace.org/activities/full-video-slidedeck-of-lecture-from-christchurch-to-sri-lanka-the-curious-case-of-social-media/
Presentation delivered at the Zentrum für Internationale Friedenseinsätze gGmbH (Centre for International Peace Operations) based in Berlin, Germany, as part of an event to celebrate 15 years since its inception on 28 June 2017.
Human Rights & ICTs. A presentation delivered on 1 April 2017 to Amnesty International's 2017 Chairs Assembly and Director's Forum (CADF), held in Colombo, Sri Lanka.
I was recently asked to put together a presentation on the fake news phenomenon for discussions with leading journalists and media institutions in a developing country, with extremely poor media literacy but strong growth around social media use, on how to both identify misleading content and also stem its flow, reach and influence.
Download the full presentation as a PowerPoint (with embedded videos) or as an Apple Keynote file, here - https://drive.google.com/open?id=0Bxbk4wYolphwcVk4bV85aEFtYXc
Gave a short presentation at the Sri Lanka Press Institute (SLPI) on 26th October on drone journalism, as part of the excellent OneSriLanka Journalism Fellowship programme, supported by Internews.
Digital transformation and the role of civil society in Sri LankaSanjana Hattotuwa
The Friedrich-Naumann-Stiftung für die Freiheit Regional office South Asia organized a regional seminar on "Promoting Liberty Digitally" in Sri Lanka from 15th to 17th October 2016. I was asked to speak on "Digital transformation and the role of Civil Society in Sri Lanka" and to be present at a group discussion on "Civil rights and the Internet".
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Small Ideas for ICRC
1. Small ideas for ICRC
Sanjana Hattotuwa
ICT4Peace Foundation,TED Fellow
2. what’s new
• Ubiquity of two way communications
• Addressable peoples, even those who IDPs or refugees
• Both news generation and dissemination leverages new media
• Disintermediated models vs. traditional media model
• Citizens as producers
• Low resolution content broadcast on high definition media
3. what’s new
• Sous-veillance (observing from underneath, anchored to human security) in place
of, or in addition to, surveillance (often from centralised loci, anchored to national
security)
• Sous-veillance is crowd based intelligence, generally open data (though analysis
can be bounded). Surveillance ranges from sig int and psy ops to information
espionage, almost always bounded.
• Important to understand Arab Spring, and situational awareness in sudden onset
disasters
4. Focus on process, not just spikes
Narrow band over time adds richness, full spectrum adds context
Local language(s)
Culture
Local actors
Diaspora
Hagiography and myth
Identity and power
Partisan politics
Regional power blocs
Inequity
Demographics (Youth)
Civic media
Verbal storytelling
17. challenges
• Concept of failing forward missing. Everyone parading what worked, but
more imp to know - what failed, why?
• Heard first cursory mention of ethics amidst overwhelmingly technocratic
perspectives. Good. Need to flesh out.
• No recognition of (geo) politics and US strategic interests in use & availability
of tech. Compare Haiti, Pakistan & Myanmar in '08
• A bigger disaster than Haiti, Pakistan had comparably little of this tech,
volunteerism and focus. Why?
18. challenges
• Surprisingly everyone seems to believe crowdsourcing is good, and is only
used for good. Context, content, creator, consumer absent
• At risk of sounding Rumsfeldian, why don't we know what we should know?
Core datasets vital for community resilience and response
• Trust is mutable, relative, contextual, locally defined, gendered, framed by
identity, inter alia.
• Violence as a result of knowledge creation.
19. challenges
• Impartial, accurate coverage still vital, increasingly hard to ascertain
• Torrent of information. Trickle of knowledge.
• Veracity hard to determine
• Pace of technology development hard to keep pace with
20. • Nature of violence, partisan bias, citizenship, governance structures, public
institutions heavily influence crowdsourcing.
• Crowdsourced HR or election violations mapping with volunteers from
perpetrator party/tribe/ethnicity? Proceed with caution
• Volunteerism undergirding stand-by crowdsourcing good, but what about
CPE's, where personal bias can deeply influence curation?
• Related to last tweet, volunteerism works better for sudden onset natural
disasters, which are also mediagenic
enduring challenges with crisismapping and
crowdsourcing
21. how and who do we trust?
abduction of a gay girl of damascus. or so we thought.
Tom MacMaster, 40 year old American
http://damascusgaygirl.blogspot.com Jelena Lecic, of London
22. A lesbian in Damascus
And other tall tales
Disinformation
Misinformation
Partial accounts
Gaming the system
Gender imbalance (e.g. rape reports in DRC)
Lack of access leads to challenges in verification
Multiple retweets mistaken for authenticity
Anonymity online (esp. post-Norwegian terrorist attack)
Machine translation / Lack of translation
Little or no direct access
Trauma
Anxiety
Fear
Persecution
Network infiltration and disruption
Trust perceptions and authority markers
Bias in mainstream media
Bias in citizen media
23. filter bubbles
• "A Squirrel Dying InYour FrontYard May Be More RelevantToYour Interests Right NowThan
People Dying In Africa", Mark Zuckerberg, creator of Facebook
• Human gatekeepers being replaced by algorithmic gatekeepers.
• A new, pervasive, almost invisible, systemic filtering?
http://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles.html
24. filtering to counter filter bubbles
• Ushahidi SwiftRiver | http://ushahidi.com/products/swiftriver-platform
http://www.youtube.com/watch?v=Tb0Gs7vtrgk
SwiftRiver is a platform that helps people make sense
of a lot of information in a short amount of time.
In practice, SwiftRiver enables the filtering and
verification of real-time data from channels like
Twitter, SMS, Email and RSS feeds.
25. two key effects of information overload
• Continuous partial attention, Linda Stone, Microsoft,
1997. With continuous partial attention we keep the
top level item in focus and scan the periphery in case
something more important emerges.
• The immediate altruistic response rapidly diminishes
over time (Melissa Brown, associate director of
research at the Center on Philanthropy at Indiana
University, 2010) Our brains release congratulatory hits
of dopamine when we engage in selfless behaviour —
which we’re moved to do the instant we witness
something awful.
28. CiM drivers from other domains
• Music industry (pattern based search, e.g. Pandora’s technical + human indexing), social
networking (group collaboration,e.g. LinkedIn, Facebook), social networking search (e.g.
Grepling), mobile phone apps (e.g. Guardly), marketing engines (e.g. adaptive persuasion
profiling), digital forensics (e.g. hyperspectral imaging with UAVs), ground truth profiling (e.g.
UNOSAT images on Sri Lanka) many sourcing for situational awareness (e.g. Microsoft
Photosynth), Open Data Initiatives (e.g. British, US govt’s,World Bank), visualisation (e.g.
Infomous)
29. take home
• Think beyond text. Online is not print.
• Think beyond prose. Online can be satire, verse, haiku!
• Think of photos, audio, video. Rich media tells stories, adds context.
• Think of SMS and crowd-sourcing, the audience are the producers.
• Don’t suggest you know everything. Use the community to add value to story.
• Link to other stories online, they add value.