What constitutes different type of fake news on the internet

Assignment Help Other Subject
Reference no: EM131438413

Assignment

Social media is a great tool that allows the coverage of personal, regional and global updates and news. Social media provides quick updates for important and critical events. For example, in 2010 people used Twitter to update the public in real time of the disaster recovery efforts of the Haiti Quake. However, there is also a negative side to this quick reporting of information which is the increase in the spread of misinformation and fake news.

In November 2016, Stanford University released the results of a study that they conducted over 18 months with 7,804 American students who were asked evaluatethe credibility of information from a variety of Web sources.The results were not good. Here is the link to the executive summary of the study and some early findings: https://sheg.stanford.edu/upload/V3LessonPlans/Executive%20Summary%2011.21.16.pdf

While fake news or digital misinformation has always been a concern, the increased use of social media to spread both real and 'fake' news, the results of this new study, and the recent American Presidential election showcase the seriousness of this issue.

In this assignment, you will explore and report on three areas:

1. You will need to research what constitutes different types of fake news and misinformation on the Internet and how it is spread through social media.

2. You need to report on why it is difficult for some people to distinguish between real news and fake news or misinformation today.

3. While education is importantto help people identify real and fake news, technology also plays an important role. You need to investigate three different techniques or approaches that researchers are proposing or have developed to help social media sites automatically detect fake news or misinformation. The ACM library and the IEEE library will be great sources for the entire paper but in particular for finding out about these techniques.

For this assignment, you need to use peer reviewed sources to research this topic (such as papers from the ACM Library and IEEE library). Note, you can find papers published by IEEE on Dal's library website. The IEEE has a database that you can search just like the ACM library. You should have 5-6peer reviewed references for this assignment.

You will use the ACM SIGCHI paper format available as a Word template (attached). This is the same one you used for Assignment 1.

You will use the IEEE citation format (links to the citation format are below). Your paper is to be 2.5-3 pages, properly formatted, including references

IEEE Reference/Citation Format Links:
https://www.ieee.org/documents/ieeecitationref.pdf
https://www.ijssst.info/info/IEEE-Citation-StyleGuide.pdf

Reference no: EM131438413

Questions Cloud

Define countif function : Modify the spreadsheet using IF functions to include new columns, classifying the checking and savings account balances as low if the balance is less than $250, medium if between $250 but less than $2000, and high otherwise.
A companys business strategy includes rapid growth : A company’s business strategy includes rapid growth, including a 50% increase in staff over the next 2 years. Describe/explain how the use of HR technology can support this strategy, as it relates to staffing (including forecasting and tracking).
Alternative dispute resolution process : Share your thoughts in 250 words on the most important principles about setting up an Alternative Dispute Resolution Process, which is a process that helps parties resolve disputes without going to trial.
Stakeholders in the contract execution process : What are the various stakeholders in the contract execution process, and what are their roles and responsibilities? Provide examples with contract execution.
What constitutes different type of fake news on the internet : You will need to research what constitutes different types of fake news and misinformation on the Internet and how it is spread through social media.
Research on competencies needed by middle managers : Research on the competencies needed by middle managers in hotels was conducted by Brophy and Kiely. The study was conducted on three-star hotels in Ireland using input from both general managers and lower-level managers in the hotels. Of the competen..
Successfully manage innovation streams : Identify and discuss the three things that companies need to be good at in order to successfully manage innovation streams. Explain why managing these factors is important. Specify which one of these three might tend to be more influenced by organ..
Organizational risk-security plan : You currently serve as an IT Security intern for a military defense contractor called Military Delivery Logistics (MDL) based in Washington, D.C. Because your organization contracts with the U.S. military, the organization is required to perform r..
Factors of planning-organization-human resource : While the factors of planning, organization, human resource staffing, and leadership are all critical components for the resurgences of the program, what control elements will you implement immediately to alleviate this program's existing conditio..

Reviews

Write a Review

Other Subject Questions & Answers

  Implications of labeling human behaviors

What are the implications of labeling human behaviors (and by extension, human beings) as normal or abnormal?

  Observe this early renaissance painting by perugino

After studying this great masterpiece, write two sentences describing how line was used, two sentences about colors, two sentences about form, two sentences about perspective, two sentences about depth, and two sentences about texture. A critical ele..

  Key external factors-threats and opportunities

As you have studied about external and internal factors in an industry analysis. Your job is to identify only the key external factors (Threats and Opportunities) of Virtual University of Pakistan. You should point out at least 10 Opportunities and t..

  Civil liberties-habeas corpus and the war on terror

An assumption made by the Bush administration in selecting this location was that it was beyond the jurisdiction of U.S. courts. The administration wanted to avoid any judicial oversight of how it handled detainees, characterized as "enemy combatants

  Discuss a situation in which a living will might apply

Briefly discuss a situation in which a Living Will might apply and would be of benefit to those involved. Once you have researched and discussed Advance Directives, draft a sample Living Will.

  Role-environmental protection agency-protecting community

Explain the role of Environmental Protection Agency in protecting community health. Give specific examples of its functions. Your reply must be at least 300 words in length.

  What is proprium according to allport

What are the differences between cardinal, central, and secondary traits? What are some of Mary's central traits? What is functional autonomy? Find at least one example of preservative functional autonomy in the case. What is proprium according to Al..

  Distance in megaparsecs to a galaxy

Using the Hubble law, what is the distance in megaparsecs to a galaxy that has a recession velocity of 29,000 km/s? (Assume the Hubble constant is equal to 70 km/s/Mpc.) Please show how you got answer.

  What is the most successful child-rearing style

In addition to the cerebral cortex, which other parts of the brain make strides during early childhood? Identify the applicable brain structures, and discuss their impact on development. Explain in detail using examples from your readings.

  In your opinion was this morally justifiable action explain

Assume the atomic bombs that were dropped on Japan at the end of World War II were responsible for ending the war. In your opinion, was this a morally justifiable action (even though tens of thousands of civilians were killed)? Explain

  What are reasons people participate in politics

Which device, in nominating candidates, is considered to be democratic? Which Supreme Court case decided that giving money to one's own campaign is a form of free speech?

  Discussing the law enforcement

It has been alleged that sexually explicit emails were sent out by Representative Foley. Should employers be able to monitor all emails sent by employees? If legislative leaders knew or suspected about the emails, what actions should they have take..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd