SlideShare une entreprise Scribd logo
1  sur  30
B.S. Detection for Digital Content



                Craig Silverman
  Editor of Regret the Error & Adjunct Faculty
                Poynter Institute
               @craigsilverman
Verifying Social Media Info




With thanks to Mandy Jenkins (@mjenkins, ZombieJournalism.com)
Old School Never Gets Old
• Develop human sources.

• Contact people, talk to them.

• Be skeptical. Too good to be true?

• Consult credible sources.

• Familiarize yourself with search and research
  methods.

• Communicate and work together.
Evaluate the Account & Person
• On Twitter, check when account was created. Be
  suspicious of brand new accounts.

• Analyze the network: friends, followers,
  conversations, retweets.
• What do they usually tweet/post about? Where do
  they say they are? How does it compare?
• Evaluate tweets before and after.


• Check their Klout score
Check Outside Social Media

• Google the handle/name with “spam, scam, spammer”
  etc. to see if others have complained.

• See if you can find other accounts online with the info
  you have. Search the username, or use Identify in
  Firefox, HoverMe in Chrome.
Contact/Crowdsource

• DM them, get one the phone, Skype. Get details
  and additional corroboration form people, images
  etc.

• Are others reporting this?

• Bring in the crowd by asking for help, additional
  info. Be clear about what you don’t know.
Lessons
• Andy is not just about SM. Lots of old school work
  comes first.
• What you don’t know is just as, or more, important
  as what you do.
• Hedging often gets stripped, so work to confirm
  before you tweet
• Questions encourage interaction, convey
  uncertainty.
• He RTs and adds context and info.
• He develops sources.
• He is present.
Law of Incorrect Tweets


The initial, mistaken information will be
  retweeted more than any subsequent
                 correction
Verifying Images
• Check exif info: regex.info/exif.cgi

• Check for edits to photos: errorlevelanalysis.com/

• Check history of photo: TinEye

• Reference locations against maps and existing images
  from the area.

• Check clothes/buildings/language/license
  plates/vehicles etc. Do they support the image?

• Examine weather reports, shadows to confirm
  conditions shown fit date and time.
Verifying Images

• Review the uploader’s history/location to see if he/
  she has shared credible content in the past or may
  be scraping from others.

• Are there images before and after you can
  compare to?

• Get them on the phone/Skype to talk about the
  image.

• Beware of the amazing shot in a breaking news
  situation.
Verifying Web Info
• Whois lookup on the domain.

• Check Internet archive and overall history of the
  site/organization/person.

• Check site's PageRank.

• Is clear and credible ownership/credit information
  offered? Footer information point to a real
  ownership entity?

• Does site/page have life? (Comments, likes,
  tweets, recent content, links in & out...)
Verifying Web Info
• Do blog and news searches to see if
  it/people/company has been talked about/covered
  already. Find the original source.

• Are people bookmarking it on Diigo or Delicious?

• Use the phone, send some emails before you
  publish anything.

• Check names. Do they have a personal history?
  Drawn from history or literature?

• Do the numbers add up?
Debunking B.S.

 “It would seem that expecting people to be
convinced by the facts flies in the face of, you
              know, the facts.”
Two Researchers
1. Brendan Nyhan, Dartmouth
   College/Columbia Journalism Review
2. Jason Reifler, Georgia State University

                 One Paper
Misinformation and Fact-checking: Research Finding
Four Concepts
1. Selective Disclosure

“People seek out information that is consistent
  with their pre-existing views and avoid
  information that contradicts their prior
  beliefs …”
Four Concepts

1. Selective Disclosure

2. The Backfire Effect

“When your deepest convictions are
 challenged by contradictory evidence, your
 beliefs get stronger.” (David McRaney)
Four Concepts

1. Selective Disclosure

2. The Backfire Effect

3. Motivated reasoning

  We are highly biased about topics we care a
  great deal about. Causes rationalizing rather
   than reasoning. Selecting experts. Choosing
                     science.
Four Concepts

1. Selective Disclosure

2. The Backfire Effect

3. Motivated reasoning

4. Illusion of Truth

  Familiar claims start to seem true over time.
               Beware of repetition.
Understand
1. Facts alone are not enough
2. Our brains resist correction
3. Repetition is effective, regardless of the
   information.
4. The purveyors of misinformation are
   organized, motivated and very experienced at
   pushing lies.
5. Beware of the “rumor bomb”
6. Journalists are surprisingly bad at correcting
   misinformation.
Tips
• Don’t hesitate.
• Be positive: “Barack Obama is a Christian.”
• Avoid condemnation: don’t personalize, or
  partisanize.
• Find experts who have credibility and no
  baggage. (And who adhere to #3.)
• Appeal to their views/values.
• Tell a story, show a picture.
• Once debunked, don’t look back.
Additional Reading

• Best practices for social media verification
• Accuracy and accountability checklist for social media
• The journalist’s guide to gutless online verification
• The human algorithm
• BBC processes for verifying social media content
• Meet Andy Carvin, verification machine
• The challenge of verifying crowdsourced information
• Resources to help journalists with accuracy and
  verification
• How to: verify content from social media
• Misinformation and Fact-checking: Research Findings from Social S

Contenu connexe

Similaire à B.S. Detection for Digital Content

Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social mediaDave LaFontaine
 
Verifying sources and content found on social media
Verifying sources and content found on social media Verifying sources and content found on social media
Verifying sources and content found on social media Tien Hoang
 
Georgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year ExperienceGeorgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year ExperienceSeth Porter, MA, MLIS
 
B.S. Detection for Journalists
B.S. Detection for JournalistsB.S. Detection for Journalists
B.S. Detection for JournalistsMandy Jenkins
 
Fake News Lecture Slides: Lecture 3
Fake News Lecture Slides: Lecture 3Fake News Lecture Slides: Lecture 3
Fake News Lecture Slides: Lecture 3David Lynn Painter
 
Analyzing News Sources
Analyzing News SourcesAnalyzing News Sources
Analyzing News SourcesNicoleBranch
 
Identity Prosumption and the Quantified Self Movement - Jenny Davis, Whitney ...
Identity Prosumption and the Quantified Self Movement - Jenny Davis, Whitney ...Identity Prosumption and the Quantified Self Movement - Jenny Davis, Whitney ...
Identity Prosumption and the Quantified Self Movement - Jenny Davis, Whitney ...cyborgology
 
Judging the Relevance and worth of ideaspart 1.pptx
Judging the Relevance and worth of ideaspart 1.pptxJudging the Relevance and worth of ideaspart 1.pptx
Judging the Relevance and worth of ideaspart 1.pptxSherlyMaeNeri
 
Fake News, Alternative Facts, & Confirmation Bias
Fake News, Alternative Facts, & Confirmation BiasFake News, Alternative Facts, & Confirmation Bias
Fake News, Alternative Facts, & Confirmation BiasNicoleBranch
 
Identifying & Combating Misinformation w/ Fact Checking Tools
Identifying & Combating Misinformation w/ Fact Checking ToolsIdentifying & Combating Misinformation w/ Fact Checking Tools
Identifying & Combating Misinformation w/ Fact Checking ToolsUjjwal Acharya
 
Information Literacy, the cure for fake news - Gwen Kent
Information Literacy,the cure for fake news - Gwen KentInformation Literacy,the cure for fake news - Gwen Kent
Information Literacy, the cure for fake news - Gwen KentLondon South Bank University
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leadingHsuan-Ting Chen
 
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...Marie Notcheva
 
Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...
Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...
Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...Marie Notcheva
 
Using Twitter for research
Using Twitter for researchUsing Twitter for research
Using Twitter for researchSteve Buttry
 

Similaire à B.S. Detection for Digital Content (20)

Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social media
 
Verifying sources and content found on social media
Verifying sources and content found on social media Verifying sources and content found on social media
Verifying sources and content found on social media
 
Georgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year ExperienceGeorgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year Experience
 
B.S. Detection for Journalists
B.S. Detection for JournalistsB.S. Detection for Journalists
B.S. Detection for Journalists
 
Fake News Lecture Slides: Lecture 3
Fake News Lecture Slides: Lecture 3Fake News Lecture Slides: Lecture 3
Fake News Lecture Slides: Lecture 3
 
Analyzing News Sources
Analyzing News SourcesAnalyzing News Sources
Analyzing News Sources
 
03 dllo davidlafontaine
03 dllo davidlafontaine03 dllo davidlafontaine
03 dllo davidlafontaine
 
Identity Prosumption and the Quantified Self Movement - Jenny Davis, Whitney ...
Identity Prosumption and the Quantified Self Movement - Jenny Davis, Whitney ...Identity Prosumption and the Quantified Self Movement - Jenny Davis, Whitney ...
Identity Prosumption and the Quantified Self Movement - Jenny Davis, Whitney ...
 
Judging the Relevance and worth of ideaspart 1.pptx
Judging the Relevance and worth of ideaspart 1.pptxJudging the Relevance and worth of ideaspart 1.pptx
Judging the Relevance and worth of ideaspart 1.pptx
 
Fake News, Alternative Facts, & Confirmation Bias
Fake News, Alternative Facts, & Confirmation BiasFake News, Alternative Facts, & Confirmation Bias
Fake News, Alternative Facts, & Confirmation Bias
 
Ib workshop
Ib workshopIb workshop
Ib workshop
 
Identifying & Combating Misinformation w/ Fact Checking Tools
Identifying & Combating Misinformation w/ Fact Checking ToolsIdentifying & Combating Misinformation w/ Fact Checking Tools
Identifying & Combating Misinformation w/ Fact Checking Tools
 
Information Literacy, the cure for fake news - Gwen Kent
Information Literacy,the cure for fake news - Gwen KentInformation Literacy,the cure for fake news - Gwen Kent
Information Literacy, the cure for fake news - Gwen Kent
 
Laurel crap osher
Laurel crap osherLaurel crap osher
Laurel crap osher
 
Laurel Osher
Laurel OsherLaurel Osher
Laurel Osher
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
Retweet, not reteach!
Retweet, not reteach!Retweet, not reteach!
Retweet, not reteach!
 
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
 
Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...
Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...
Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...
 
Using Twitter for research
Using Twitter for researchUsing Twitter for research
Using Twitter for research
 

Plus de Craig Silverman

How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...Craig Silverman
 
Tips for Doing Accurate Data Journalism
Tips for Doing Accurate Data JournalismTips for Doing Accurate Data Journalism
Tips for Doing Accurate Data JournalismCraig Silverman
 
The Origins and Evolution of Fact-Checking, and The New Urgency of Verification
The Origins and Evolution of Fact-Checking, and The New Urgency of VerificationThe Origins and Evolution of Fact-Checking, and The New Urgency of Verification
The Origins and Evolution of Fact-Checking, and The New Urgency of VerificationCraig Silverman
 
Teaching students to be (wonderfully) abnormal
Teaching students to be (wonderfully) abnormalTeaching students to be (wonderfully) abnormal
Teaching students to be (wonderfully) abnormalCraig Silverman
 
9 No-Bull Steps to Creating Good Content
9 No-Bull Steps to Creating Good Content9 No-Bull Steps to Creating Good Content
9 No-Bull Steps to Creating Good ContentCraig Silverman
 
The true value of content curation (Or: Why links are not enough)
The true value of content curation (Or: Why links are not enough)The true value of content curation (Or: Why links are not enough)
The true value of content curation (Or: Why links are not enough)Craig Silverman
 
Best practices for social media corrections
Best practices for social media correctionsBest practices for social media corrections
Best practices for social media correctionsCraig Silverman
 
This History and Current State of Fact Checking
This History and Current State of Fact CheckingThis History and Current State of Fact Checking
This History and Current State of Fact CheckingCraig Silverman
 

Plus de Craig Silverman (8)

How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
How News Websites Spread (and Debunk) Online Rumors, Unverified Claims and Mi...
 
Tips for Doing Accurate Data Journalism
Tips for Doing Accurate Data JournalismTips for Doing Accurate Data Journalism
Tips for Doing Accurate Data Journalism
 
The Origins and Evolution of Fact-Checking, and The New Urgency of Verification
The Origins and Evolution of Fact-Checking, and The New Urgency of VerificationThe Origins and Evolution of Fact-Checking, and The New Urgency of Verification
The Origins and Evolution of Fact-Checking, and The New Urgency of Verification
 
Teaching students to be (wonderfully) abnormal
Teaching students to be (wonderfully) abnormalTeaching students to be (wonderfully) abnormal
Teaching students to be (wonderfully) abnormal
 
9 No-Bull Steps to Creating Good Content
9 No-Bull Steps to Creating Good Content9 No-Bull Steps to Creating Good Content
9 No-Bull Steps to Creating Good Content
 
The true value of content curation (Or: Why links are not enough)
The true value of content curation (Or: Why links are not enough)The true value of content curation (Or: Why links are not enough)
The true value of content curation (Or: Why links are not enough)
 
Best practices for social media corrections
Best practices for social media correctionsBest practices for social media corrections
Best practices for social media corrections
 
This History and Current State of Fact Checking
This History and Current State of Fact CheckingThis History and Current State of Fact Checking
This History and Current State of Fact Checking
 

Dernier

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Dernier (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

B.S. Detection for Digital Content

  • 1. B.S. Detection for Digital Content Craig Silverman Editor of Regret the Error & Adjunct Faculty Poynter Institute @craigsilverman
  • 2.
  • 3.
  • 4.
  • 5. Verifying Social Media Info With thanks to Mandy Jenkins (@mjenkins, ZombieJournalism.com)
  • 6. Old School Never Gets Old • Develop human sources. • Contact people, talk to them. • Be skeptical. Too good to be true? • Consult credible sources. • Familiarize yourself with search and research methods. • Communicate and work together.
  • 7. Evaluate the Account & Person • On Twitter, check when account was created. Be suspicious of brand new accounts. • Analyze the network: friends, followers, conversations, retweets. • What do they usually tweet/post about? Where do they say they are? How does it compare? • Evaluate tweets before and after. • Check their Klout score
  • 8. Check Outside Social Media • Google the handle/name with “spam, scam, spammer” etc. to see if others have complained. • See if you can find other accounts online with the info you have. Search the username, or use Identify in Firefox, HoverMe in Chrome.
  • 9. Contact/Crowdsource • DM them, get one the phone, Skype. Get details and additional corroboration form people, images etc. • Are others reporting this? • Bring in the crowd by asking for help, additional info. Be clear about what you don’t know.
  • 10.
  • 11. Lessons • Andy is not just about SM. Lots of old school work comes first. • What you don’t know is just as, or more, important as what you do. • Hedging often gets stripped, so work to confirm before you tweet • Questions encourage interaction, convey uncertainty. • He RTs and adds context and info. • He develops sources. • He is present.
  • 12. Law of Incorrect Tweets The initial, mistaken information will be retweeted more than any subsequent correction
  • 13.
  • 14.
  • 15.
  • 16. Verifying Images • Check exif info: regex.info/exif.cgi • Check for edits to photos: errorlevelanalysis.com/ • Check history of photo: TinEye • Reference locations against maps and existing images from the area. • Check clothes/buildings/language/license plates/vehicles etc. Do they support the image? • Examine weather reports, shadows to confirm conditions shown fit date and time.
  • 17.
  • 18. Verifying Images • Review the uploader’s history/location to see if he/ she has shared credible content in the past or may be scraping from others. • Are there images before and after you can compare to? • Get them on the phone/Skype to talk about the image. • Beware of the amazing shot in a breaking news situation.
  • 19.
  • 20. Verifying Web Info • Whois lookup on the domain. • Check Internet archive and overall history of the site/organization/person. • Check site's PageRank. • Is clear and credible ownership/credit information offered? Footer information point to a real ownership entity? • Does site/page have life? (Comments, likes, tweets, recent content, links in & out...)
  • 21. Verifying Web Info • Do blog and news searches to see if it/people/company has been talked about/covered already. Find the original source. • Are people bookmarking it on Diigo or Delicious? • Use the phone, send some emails before you publish anything. • Check names. Do they have a personal history? Drawn from history or literature? • Do the numbers add up?
  • 22. Debunking B.S. “It would seem that expecting people to be convinced by the facts flies in the face of, you know, the facts.”
  • 23. Two Researchers 1. Brendan Nyhan, Dartmouth College/Columbia Journalism Review 2. Jason Reifler, Georgia State University One Paper Misinformation and Fact-checking: Research Finding
  • 24. Four Concepts 1. Selective Disclosure “People seek out information that is consistent with their pre-existing views and avoid information that contradicts their prior beliefs …”
  • 25. Four Concepts 1. Selective Disclosure 2. The Backfire Effect “When your deepest convictions are challenged by contradictory evidence, your beliefs get stronger.” (David McRaney)
  • 26. Four Concepts 1. Selective Disclosure 2. The Backfire Effect 3. Motivated reasoning We are highly biased about topics we care a great deal about. Causes rationalizing rather than reasoning. Selecting experts. Choosing science.
  • 27. Four Concepts 1. Selective Disclosure 2. The Backfire Effect 3. Motivated reasoning 4. Illusion of Truth Familiar claims start to seem true over time. Beware of repetition.
  • 28. Understand 1. Facts alone are not enough 2. Our brains resist correction 3. Repetition is effective, regardless of the information. 4. The purveyors of misinformation are organized, motivated and very experienced at pushing lies. 5. Beware of the “rumor bomb” 6. Journalists are surprisingly bad at correcting misinformation.
  • 29. Tips • Don’t hesitate. • Be positive: “Barack Obama is a Christian.” • Avoid condemnation: don’t personalize, or partisanize. • Find experts who have credibility and no baggage. (And who adhere to #3.) • Appeal to their views/values. • Tell a story, show a picture. • Once debunked, don’t look back.
  • 30. Additional Reading • Best practices for social media verification • Accuracy and accountability checklist for social media • The journalist’s guide to gutless online verification • The human algorithm • BBC processes for verifying social media content • Meet Andy Carvin, verification machine • The challenge of verifying crowdsourced information • Resources to help journalists with accuracy and verification • How to: verify content from social media • Misinformation and Fact-checking: Research Findings from Social S