Automatic Fake News Detection

Total Page:16

File Type:pdf, Size:1020Kb

Automatic Fake News Detection AUTOMATIC FAKE NEWS DETECTION Master Degree Project in Informatics with a Specialization in Privacy, Information and Cyber Security One Year Master 15 ECTS Spring term 2020 Pontus Nordberg Supervisor: Joakim Kävrestad Examiner: Marcus Nohlberg Abstract Due to the large increase in the proliferation of “fake news” in recent years, it has become a widely discussed menace in the online world. In conjunction with this popularity, research of ways to limit the spread has also increased. This paper aims to look at the current research of this area in order to see what automatic fake news detection methods exist and are being developed, which can help online users in protecting themselves against fake news. A systematic literature review is conducted in order to answer this question, with different detection methods discussed in the literature being divided into categories. The consensus which appears from the collective research between categories is also used to identify common elements between categories which are important to fake news detection; notably the relation of headlines and article content, the importance of high-quality datasets, the use of emotional words, and the circulation of fake news in social media groups. Keywords: Fake News, Automatic Detection Table of Contents Journal paper ........................................................................................................................................... 1 3 Journal paper Abstract Due to the large increase in the proliferation of “fake news” in recent years, it has become a widely discussed menace in the online world. In conjunction with this popularity, research of ways to limit the spread has also increased. This paper aims to look at the current research of this area in order to see what automatic fake news detection methods exist and are being developed, which can help online users in protecting themselves against fake news. A systematic literature review is conducted in order to answer this question, with different detection methods discussed in the literature being divided into categories. The consensus which appears from the collective research between categories is also used to identify common elements between categories which are important to fake news detection; notably the relation of headlines and article content, the importance of high-quality datasets, the use of emotional words, and the circulation of fake news in social media groups. Keywords: Fake News, Automatic Detection Introduction In the lead-up year before the 2016 American presidential election the term “fake news” was popularized and has since become a common term in the public vocabulary, being named the “word of the year” of 2017 by the Collins English Dictionary and American Dialect Society (American Dialect Society, 2018; Collins, 2017). Views have differed in regards to exactly what content should or should not be included under the “fake news”-umbrella. But the most commonly used definition is that fake news consists of deliberate disinformation, used to purposefully spread untrue information, or as skewed reporting of real events to push a certain narrative (Gelfert, 2018; Klein & Wueller, 2017; Shu et al., 2017). While the concept of “fake news” can be argued to be as old as news itself, the advent of social media and mass-information on the internet has led to fake news taking on a new form compared to its previous iterations (Alam & Ravshanbekov, 2019; Janze & Risius, 2017). Concerns have been raised especially in the context of the effect which fake news can have on elections (Faustini & Covões, 2019). This type of fake news, which can spread among millions of people online, has attracted much attention from researchers, and many studies have been made in order to examine fake news and its impact on society and democracy. Much of the research which has been done as a result of fake news becoming an increasingly relevant issue has been aimed towards finding ways to combat it. Education on how to identify fake news, bias, “clickbait” (eye-catching, typically misleading, article titles to bait people to click on them which generates advertising revenue), or other disinformation in online news has become something which is taught to students in many schools and libraries (Klein & Wueller, 2017). Additionally; government organizations, news agencies, and online- websites also provide manual fact-checking to identify fake news, as well as information on how to think critically and be aware of bias when reading news-stories they come across online (Ireton & Posetti, 2018; Shabani & Sokhn, 2018). Since online users who are using the internet to receive news and information get exposed to these large volumes of disinformation as a result of fake news, trusting what one reads online has become more difficult. “Manual” ways to detect fake news exist for such users, such as using their own judgement in determining if what they read is accurate or not, or by utilizing 1 the assistance provided by the aforementioned fact-checking websites. However, such processes can be rather unreliable, as the very purpose of fake news is to appear as legitimate news, or tedious, due to the need to look up fact-checks for various claims on different websites than the one they’re reading; assuming that what they’re reading even has been fact- checked in the first place. An efficient way to reliably detect fake news would therefore be very beneficial to online users and the trustworthiness of online news. Since a lot of research has been done regarding ways to combat fake news by identifying it using technology, this study will examine how online users can protect themselves against fake news by looking at what detection methods exists and are being developed today, as well as how this process can be automated. To answer this question, scientific literature will be systematically collected, mapped out, examined, and analysed. The results will then show the research community’s most recent developments regarding fake new detection technology, and what needs to be focused on to create an effective implementation to protect online users. Methodology The methodology chosen for this paper, and which is suitable for the type of question which the paper aims to answer, is a systematic literature review. Wee and Banister (2016) describe a literature review as something which should add value, unlike a mere literature overview. This thesis will, as previously mentioned, fulfil this criteria by providing an analysis of the current research in fake news detection, and thus contributing to the development of protection against fake news for regular users online. To perform a systematic literature review, relevant literature is needed from trusted and high- quality sources, such as academic databases. A variety of sources is necessary to yield a wide enough selection of papers, and since a single database is unlikely to contain all relevant material. Brereton et al. (2007) recommends the following online databases for literature reviews in the area of software engineering, making them suitable for this thesis. IEEExplore SpringerLink ACM Digital Library Google Scholar is also suggested to be useful for when one wants to examine more or less all main literature on a topic (Wee & Banister, 2016). The three databases suggested and listed above will therefore be the main sources of literature in this review, with Google Scholar being used as a secondary source for literature not already found in the main databases. The search term used in all the above-mentioned databases, with the publications year limited to 2015 and later (to get the most recent results and due to the explosion in the popularity and discussion of the term since that time as a result of the US presidential election) was: Automatic Fake News Detection These search parameters proved adequate and provided a vast amount of results in the aforementioned databases. Exclusion measures were then applied to the search results, this was the process of excluding articles in the results not related to fake news detection or which were not directly focused on it, for example articles that mentioned the concept but did not present automatic detection methods. Papers presenting developed detection methods in 2 regards to news pieces or articles were the ones collected from the databases. They were then sorted out of duplicates, which resulted in 47 relevant papers to be used. Thematic coding was chosen to be the analysis method for the review of the literature. This method creates a descriptive presentation of qualitative data where themes of the data are identified and implications from across several pieces of analysed content can be identified and noted (Anderson, 2007; Smith et al., 1992). The collected material will be placed into different fake news detection categories based on the method-types which researchers have focused on. This will result in a good overview of how similar models relate to other models of the same method-type and, as mentioned above, how implications can be seen and conclusions drawn from the identified themes. Results This chapter will present the data which has been gathered using the method specified in the previous chapter. The final 47 papers were analysed and the fake news detection research that each paper presented put in relation with the other papers of the same category. The categories are the themes of the thematic coding analysis method. They were created by grouping together the literature into the categories based on their (see Table 1 below). Text Classification Singhania et al. (2017), Abedalla et al. (2019), Saikh et al. (2019), (25) – Papers mainly Bhattacharjee et al. (2017), Janze & Risius (2017), Pérez-Rosas et focusing on analysis al. (2017), Qawasmeh et al. (2019), Kaur et al. (2019), Traylor et and classification based al. (2019), Monteiro et al. (2018), Girgis et al. (2018), Ahmed et on the content of the al. (2017), Manzoor & Singla (2019), Waikhom & Goswami article (2019), Granik & Meysura, (2017), Faustini & Covões (2019), Rubin et al.
Recommended publications
  • Tutorial Blogspot Plus Blogger Templates
    Tutorial Blogspot Plus Blogger Templates To Bloggers Everywhere 1 2 Contents Contact Us 25 Cara daftar Gmail 25 Cara daftar Blogger pertama kali 27 Cara login ke blogger pertama kali 28 Kontrol panel blogger (dashboard) 29 Cara posting di blogger 30 Halaman Pengaturan (menu dasar) 31 Banyak malware yang ditemukan google 32 Google ! Mesin pembobol yang menakutkan 32 Web Proxy (Anonymous) 33 Daftar alamat google lengkap 34 Google: tampil berdasarkan Link 37 Oom - Pemenang kontes programming VB6 source code 38 (www.planet-sourc... Oom - Keyboard Diagnostic 2002 (VB6 - Open Source) 39 Oom - Access Siemens GSM CellPhone With Full 40 AT+Command (VB6 - Ope... Oom - How to know speed form access (VB6) 40 Para blogger haus akan link blog 41 Nama blog cantik yang disia-siakan dan apakah pantas nama 41 blog dipe... Otomatisasi firewalling IP dan MAC Address dengan bash script 43 Firewalling IP Address dan MAC Address dengan iptables 44 Meminimalis serangan Denial of Service Attacks di Win Y2K/XP 47 Capek banget hari ini.. 48 3 daftar blog ke search engine 48 Etika dan cara promosi blog 49 Tool posting dan edit text blogger 52 Setting Blog : Tab Publikasi 53 Wordpress plugins untuk google adsense 54 Google meluncurkan pemanggilan META tag terbaru 54 “unavailable after” Setting Blog : Tab Format 55 Melacak posisi keyword di Yahoo 56 Mengetahui page ranking dan posisi keyword (kata kunci) anda 56 pada S... Percantik halaman blog programmer dengan "New Code 57 Scrolling Ticke... 20 Terbaik Situs Visual Basic 58 BEST BUY : 11 CD Full Source Code Untuk Programmer 60 Tips memulai blog untuk pemula 62 Lijit: Alternatif search untuk blogger 62 Berpartisipasi dalam Blog "17 Agustus Indonesia MERDEKA" 63 Trafik di blog lumayan, tapi kenapa masih aja minim komentar? 64 Editor posting compose blogger ternyata tidak "wysiwyg" 65 Google anti jual beli link 65 Tips blogger css validator menggunakan "JavaScript Console" 65 pada Fl..
    [Show full text]
  • Unconscionability 2.0 and the Ip Boilerplate: a R Evised Doctrine of Unconscionability for the Information
    UNCONSCIONABILITY 2.0 AND THE IP BOILERPLATE: A REVISED DOCTRINE OF UNCONSCIONABILITY FOR THE INFORMATION AGE Amit Elazari Bar On† ABSTRACT In the information age, where fewer goods and more innovations are produced, intellectual property law has become the most crucial governing system. Yet, rather than evolving to fit its purpose, it has seemingly devolved—standard form contracts, governing countless creations, have formed an alternative de facto intellectual property regime. The law governing the information society is often prescribed not by legislators or courts, but rather by private entities, using technology and contracts to regulate much of the creative discourse. The same phenomena persist in other emerging areas of information law, such as data protection and cybersecurity laws. This Article offers a new analytical perspective on private ordering in intellectual property (IP) focusing on the rise of IP boilerplate, the standard form contracts that regulate innovations and creations. It distinguishes between contracts drafted by the initial owners of the IP (such as End-User-License-Agreements (EULAs)) and contracts drafted by nonowners (such as platforms’ terms of use), and highlights the ascendancy of the latter in the user- generated content era. In this era, the drafter of the contract owns nothing, yet seeks to regulate the layman adherent’s creations, and sometimes even to redefine the contours of the public domain. Private ordering is expanding its governing role in IP, creating new problems and undermining the rights that legislators bestow on creators and users. While scholars often discuss the problems caused by IP boilerplate, solutions are left wanting. Inter-doctrinal solutions have been unjustly overlooked.
    [Show full text]
  • Fake News Outbreak 2021: Can We Stop the Viral Spread?
    SOK: Fake News Outbreak 2021: Can We Stop the Viral Spread? TANVEER KHAN, Tampere University ANTONIS MICHALAS, Tampere University ADNAN AKHUNZADA, Technical University of Denmark Social Networks’ omnipresence and ease of use has revolutionized the generation and distribution of information in today’s world. However, easy access to information does not equal an increased level of public knowledge. Unlike traditional media channels, social networks also facilitate faster and wider spread of disinformation and misinformation. Viral spread of false information has serious implications on the behaviours, attitudes and beliefs of the public, and ultimately can seriously endanger the democratic processes. Limiting false information’s negative impact through early detection and control of extensive spread presents the main challenge facing researchers today. In this survey paper, we extensively analyse a wide range of different solutions for the early detection of fake news in the existing literature. More precisely, we examine Machine Learning (ML) models for the identification and classification of fake news, online fake news detection competitions, statistical outputs as well as the advantages and disadvantages of some of the available data sets. Finally, we evaluate the online web browsing tools available for detecting and mitigating fake news and present some open research challenges. 1 INTRODUCTION The popularity of Online Social Networks (OSNs) has rapidly increased in recent years. Social media has shaped the digital world to an extent it is now an indispensable part of life for most of us [54]. Rapid and extensive adoption of online services is influencing and changing how we access information, how we organize to demand political change and how we find partners.
    [Show full text]
  • Informational Apathy: the Impact of the Information Age
    Informational Apathy: The Impact of the Information Age A Research Paper submitted to the Department of Engineering and Society Presented to the Faculty of the School of Engineering and Applied Science University of Virginia • Charlottesville, Virginia In Partial Fulfillment of the Requirements for the Degree Bachelor of Science, School of Engineering Dylan Culfogienis Fall, 2020 On my honor as a University Student, I have neither given nor received unauthorized aid on this assignment as defined by the Honor Guidelines for Thesis-Related Assignments Informational Apathy: The Impact of the Information Age Introduction As the information age progresses, fact-checked, high-quality information and news is increasingly being drowned out by misinformation and disinformation. This rising tide of information disorder manifests as increasing public distrust of news sources, both traditional (news channels), and emerging (social media), despite increasing viewership and readership. (Shearer & Matsa, 2018) Social media companies build their machine learning-driven news feeds around metrics of “meaningfulness” and view time, as opposed to veracity. (Tien, 2018) 24-hour news channels eschew journalistic integrity in favor of fast turn-around time and attention-grabbing headlines. (“How News Has Changed,” 2017) The effects of this public distrust are correlated with a rise in political polarization in the US, and a rise of “echo-chamber” communities such as conspiracy groups and radical political organizations, groups characterized by the exclusion of certain popular assumptions or facts. As public information sources change, it is important to understand how those changes affect the population. At the time of writing, Facebook serves 2.37 billion users, with 1.56 billion reading Facebook daily.
    [Show full text]
  • A Landscape Analysis
    The Fight Against Dis- information in the U.S. A Landscape Analysis OCTOBER 2018 Authors Heidi Legg, Director of Special Projects, The Shorenstein Center on Media, Politics and Public Policy, Harvard Kennedy School Joe Kerwin, Harvard College Senior, Dunster House Edited by Grace Greason, Harvard College, Sophomore, Lowell House The views expressed in Shorenstein Center Discussion Papers are those of the author(s) and do not necessarily reflect those of Harvard Kennedy School or of Harvard University. Discussion Papers have not undergone formal review and approval. Such papers are included in this series to elicit feedback and to encourage debate on import- ant issues and challenges in media, politics and public policy. Copyright belongs to the author(s). Papers may be downloaded for personal use only. How is Disinformation Changing Us? The Fight Against Disinformation in the U.S.: A Landscape Analysis is a map of the disinformation initiatives currently in play to undergird newsrooms and improve media literacy at this challenging moment for the free press. Universities, platforms, foundations and private donors are all working to understand how a contagion spreads in this viral digital culture and to discover potential solutions. In an effort to discover who is stepping up, what they are doing and where they are making early headway, the work is organized into four categories: 1. Internal Platform Efforts, 2. Institutional Initiatives, 3. Upstart Initiatives and 4. Leading Funders. The iPhone is 10 years old, Twitter is 12 and Facebook is 14. History has shown that the medium is the message and that cataclysmic changes in how we communicate bring dra- matic shifts in our society.
    [Show full text]
  • Unconscionability 2.0 and the IP Boilerplate: a Revised Doctrine of Unconscionability for the Information Age
    Unconscionability 2.0 and the IP Boilerplate: A Revised Doctrine of Unconscionability for the Information Age By Amit Elazari A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of the Science of Law in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Steven Davidoff Solomon, Chair Professor Deirdre K. Mulligan Professor Chris Jay Hoofnagle Professor Robert P. Merges Professor Molly Shaffer Van Houweling Fall 2018 Unconscionability 2.0 and the IP Boilerplate: A Revised Doctrine of Unconscionability for the Information Age © 2018 by Amit Elazari Abstract Unconscionability 2.0 and the IP Boilerplate: A Revised Doctrine of Unconscionability for the Information Age by Amit Elazari Doctor of the Science of Law University of California, Berkeley Professor Steven Davidoff Solomon, Chair In the information age, where fewer goods and more innovations are produced, intellectual property law has become the most crucial governing system. Yet, rather than evolving to fit its purpose, it has seemingly devolved—standard form contracts, governing countless creations, have formed an alternative de facto intellectual property regime. The law governing the information society is often prescribed not by legislators or courts, but rather by private entities, using technology and contracts to regulate much of the creative discourse. The same phenomena persist in other emerging areas of information law, such as data protection and cybersecurity laws. This dissertation offers a new analytical perspective on private ordering in intellectual property (IP) focusing on the rise of the IP boilerplate, the standard form contracts that regulate innovations and creations. It distinguishes between contracts drafted by the initial owners of the IP (such as EULAs) and contracts drafted by nonowners (such as platforms’ terms of use), and highlights the ascendancy of the latter in the user-generated content era.
    [Show full text]
  • CYBERSECURITY When Will You Be Hacked?
    SUFFOLK ACADEMY OF LAW The Educational Arm of the Suffolk County Bar Association 560 Wheeler Road, Hauppauge, NY 11788 (631) 234-5588 CYBERSECURITY When Will You Be Hacked? FACULTY Victor John Yannacone, Jr., Esq. April 26, 2017 Suffolk County Bar Center, NY Cybersecurity Part I 12 May 2017 COURSE MATERIALS 1. A cybersecurity primer 3 – 1.1. Cybersecurity practices for law firms 5 – 1.2. Cybersecurity and the future of law firms 11 – 2. Information Security 14 – 2.1. An information security policy 33 – 2.2. Data Privacy & Cloud Computing 39 – 2.3. Encryption 47 – 3. Computer security 51 – 3.1. NIST Cybersecurity Framework 77 – 4. Cybersecurity chain of trust; third party vendors 113 – 5. Ransomware 117 – 5.1. Exploit kits 132 – 6. Botnets 137 – 7. BIOS 139 – 7.1. Universal Extensible Firmware Interface (UEFI) 154– 8. Operating Systems 172 – 8.1. Microsoft Windows 197 – 8.2. macOS 236– 8.3. Open source operating system comparison 263 – 9. Firmware 273 – 10. Endpoint Security Buyers Guide 278 – 11. Glossaries & Acronym Dictionaries 11.1. Common Computer Abbreviations 282 – 11.2. BABEL 285 – 11.3. Information Technology Acronymns 291 – 11.4. Glossary of Operating System Terms 372 – 2 Cyber Security Primer Network outages, hacking, computer viruses, and similar incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications, and data networks increase, so do the opportunities for exploitation. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
    [Show full text]
  • References-9781789733624 127..154
    REFERENCES Achenbach, J. (2018, May 25). Did the news media, led by Walter Cronkite, lose the war in Vietnam? The Washington Post. Retrieved from https://www.washingtonpost.com/ national/did-the-news-media-led-by-walter-cronkite-lose-the- war-in-vietnam/2018/05/25/a5b3e098-495e-11e8-827e- 190efaf1f1ee_story.html?noredirect5on&utm_term5. 702160dc0c31. Affelt, A. (2015). The accidental data scientist: Big data applications and opportunities for librarians and information professionals. Medford, NJ: Information Today, Inc. Affelt, A. (2017). Fake news: The library imperative. In Library and book trade almanac. Medford, NJ: Information Today, Inc. Allcott, H., Gentzkow, M., & Yu, C. (September 2018). Trends in the diffusion of misinformation on social media. Stanford, CA: Stanford Institute for Economic Policy Research. Retrieved from https://siepr.stanford.edu/system/ files/publications/18-029.pdf. Alvarez, B. (2017, January 11). Public libraries in the age of fake news. Public Libraries Online. Retrieved from http:// publiclibrariesonline.org/2017/01/feature-public-libraries-in- the-age-of-fake-news/. American Libraries. (2018, January/February). Libraries join the fight against fake news. American Libraries. 127 128 References Atleo, S. (2013, November 4). Special bulletin on first nations education. Assembly of First Nations. Retrieved from http:// www.afn.ca/2013/11/04/communique-from-the-national- chief-shawn-atleo-november-4-2013/. Baer, D., & Lebowitz, S. (2015, October 19). 17 books Bill Gates thinks everyone should read. Business Insider. Retrieved from http://www.businessinsider.com/bill-gates- favorite-books-2015-10/#tap-dancing-to-work-warren-buffett- on-practically-everything-1966-2012-by-carol-loomis-1. Banks, M.
    [Show full text]
  • Technology-Enabled Disinformation: Summary, Lessons, and Recommendations
    Technical Report UW-CSE-2018-12-02 Technology-Enabled Disinformation: Summary, Lessons, and Recommendations December 2018 John Akers Gagan Bansal Gabriel Cadamuro Christine Chen Quanze Chen Lucy Lin Phoebe Mulcaire Rajalakshmi Nandakumar Matthew Rockett Lucy Simko John Toman Tongshuang Wu Eric Zeng Bill Zorn Franziska Roesner ([email protected]) Paul G. Allen School of Computer Science & Engineering University of Washington Abstract In this report, which is the culmination of a PhD-level spe- 1 Technology is increasingly used — unintentionally (mis- cial topics course in Computer Science & Engineering at the information) or intentionally (disinformation) — to spread University of Washington’s Paul G. Allen School in the fall false information at scale, with potentially broad-reaching of 2018, we consider the phenomenon of mis/disinformation societal effects. For example, technology enables increas- from the perspective of computer science. The overall space ingly realistic false images and videos, and hyper-personal is complicated and will require study from, and collabora- targeting means different people may see different versions tions among, researchers from many different areas, includ- of reality. This report is the culmination of a PhD-level spe- ing cognitive science, economics, neuroscience, political sci- cial topics course1 in Computer Science & Engineering at ence, psychology, public health, and sociology, just to name the University of Washington’s Paul G. Allen School in the a few. As technologists, we focused in the course, and thus in fall of 2018. The goals of this course were to study (1) how this report, on the technology. We ask(ed): what is the role of technologies and today’s technical platforms enable and sup- technology in the recent plague of mis- and disinformation? port the creation and spread of such mis- and disinformation, How have technologies and technical platforms enabled and as well as (2) how technical approaches could be used to mit- supported the spread of this kind of content? And, critically, igate these issues.
    [Show full text]
  • Downloaded Over Librarians Share Experiences of Chal- Search Algorithms to Databases
    November/December 2019 THE MAGAZINE OF THE AMERICAN LIBRARY ASSOCIATION SPECIAL REPORT Democracy Fear-Free Public Speaking in p. 46 Action Videogame p. 24 Preservation p. 42 PLUS: Lindy West, Sound and Sight Screenings, Dropping (Off) Drawers Connectrac In-Carpet Wireway FREEDOM FROM TIME CONSTRAINTS The Connectrac® In-Carpet Wireway delivers power and data with an elegant and flexible, floor-based cable management solution unlike complicated and expensive methods such as core drilling, trenching or power poles. Our ultra-low profile wireway integrates with any furniture and can be moved or reconfigured as environments evolve. ® 1.877.357. 7183 PowerUpLibrary4U.com November/December 2019 American Libraries | Volume 50 #11/12 | ISSN 0002-9769 SPECIAL REPORT 34 Countdown to the Vote Democracy Libraries ramp up engagement and outreach efforts for 2020 in BY Emily Udell Action 36 Check Your Facts Prepping your library for the Libraries use tech tools 2020 elections | p. 24 to fight fake news BY Jessica Cilella 38 Media Literacy in an 26 Connecting with Congress Age of Fake News How libraries can build relationships Prepare your users with elected officials through for the pitfalls of year-round advocacy misinformation BY Lara Ewen BY George M. Eberhart 28 Civic Involvement By the numbers 30 Discourse for Democracy Promoting civic literacy with forums BY Greg Landgraf 52 FEATURES 42 Librarians, Start New Game How academic librarians support videogame scholars BY Diana Panuncial 46 Boost Your Public 42 Speaking Skills 46 Tips for librarians on speaking confidently and effectively in front of others BY Anne Ford 52 Knowledge IQ Fostering knowledge sharing among liaison librarians BY Diana Dill and Alice Kalinowski ON THE COVER: Illustration by Drew Bardana 18 22 16 UP FRONT TRENDS PERSPECTIVES 3 From the 16 From the Library IN PRACTICE Editor with Love 56 A Job Well Done Ready, Set, Engage! Information professionals help BY Meredith Farkas BY Sanhita SinhaRoy older adults parse the features and DISPATCHES culture of online dating apps 6 From Our 57 Personalization vs.
    [Show full text]
  • The 2020 Census: DIGITAL PREPAREDNESS PLAYBOOK
    NATIONAL LEAGUE OF CITIES The 2020 Census: DIGITAL PREPAREDNESS PLAYBOOK A PLAYBOOK PRODUCED BY WITH CONTRIBUTIONS FROM Kyla Fullenwider Katie Sullivan and Data + Digital Fellow with the Maria Filippelli Beeck Center 1 The 2020 Census: Digital Preparedness Playbook ABOUT THE BEECK CENTER FOR ABOUT THE NATIONAL SOCIAL IMPACT + INNOVATION LEAGUE OF CITIES Working alongside experts and The National League of Cities students, the Beeck Center surfaces, (NLC) is the nation’s leading accelerates, and scales promising social advocacy organization devoted to impact efforts driving institutional-level strengthening and promoting cities as change. Partnering with Georgetown centers of opportunity, leadership and University, the Center is positioned as a governance. Through its membership neutral, academic player, and has built and partnerships with state municipal credibility working across sectors to leagues, NLC serves as a resource generate new ideas provoking leaders and advocate for more than 19,000 to think and act differently. The Center cities and towns and more than 218 always operates with a student lens million Americans. NLC’s Center for to help educate and prepare future City Solutions provides research and leaders in the impact space through analysis on key topics and trends experience. important to cities and creative solutions to improve the quality of life ABOUT THE AUTHORS in communities. The National League of Cities and the Beeck Center for Social Impact + ABOUT GEORGETOWN UNIVERSITY Innovation at Georgetown University Georgetown University is one of collaborated on this playbook as the world’s leading academic and a way to aid local governments in research institutions, offering a unique their preparation for the 2020 Digital educational experience that prepares Census.
    [Show full text]
  • Transnational Lessons from Terrorist Use of Social Media in South Asia
    Royal United Services Institute for Defence and Security Studies Global Research Network on Terrorism and Technology: Paper No. 13 Transnational Lessons from Terrorist Use of Social Media in South Asia Aaditya Dave Global Research Network on Terrorism and Technology: Paper No. 13 2 Key Findings • There are currently gaps in identifying terrorist content on various social media platforms. There may be a need for greater in-house expertise in technology companies, with the requisite language and cultural knowledge, to know where to look for content that might be missed by algorithms. • There is a link between hate speech and terrorist activity in South Asia. Given the extent of inter-communal violence in the region, it is critical to carry out further research on this link. • Terrorists’ use of end-to-end encrypted communications is a common feature of all three case studies in this paper: Pakistan; Bangladesh; and Sri Lanka. However, government responses to this in South Asia have so far been unhelpful, as their suggestions have been unimplementable and social media blocks have had limited effectiveness. Summary of Recommendations • There is a need for greater public–private dialogue on how the internet and social media are used by terrorists and for counterterrorism. A multi-stakeholder approach would not only help technology companies develop better approaches to managing the issues but also build links between communities and authorities to develop more cooperative approaches. • Governments should consult technology companies and civil society while designing regulations aimed at countering terrorist use of the internet to enhance the effectiveness and feasibility of regulations.
    [Show full text]