Sign in
Back
Further reading Episode 2
Welcome and course introduction
Most welcome to "Go verify! Intensive course in fact-checking and verification as journalistic method"
Introduction lecture: Powerpoint
Part I: Understanding and countering information influence activities
Introduction
Introduction
Episode 1
Episode 1: What are information influence activities?
Episode 1. Powerpoint
Script Episode 1
Quiz Episode 1
Discussion questions Episode 1
Further reading Episode 1
Episode 2
Episode 2: Techniques and strategies used in information influence activities
Episode 2. Powerpoint
Script Episode 2
Quiz Episode 2
Discussion questions Episode 2
Further reading Episode 2
Episode 3
Episode 3: How to identify and analyse information influence activities
Episode 3. Powerpoint
Script Episode 3
Quiz Episode 3
Discussion questions Episode 3
Further reading Episode 3
Six techniques of malign information influence activities
Episode 4
Episode 4: Strategies and best practices for countering information influence activities
Episode 4. Powerpoint
Script Episode 4
Quiz Episode 4
Discussion questions Episode 4
Further reading Episode 4
Part II: Digital verification tools
Introduction: the Verification Toolbox
Introduction: The Verification Toolbox - short lecture
Introduction: The Verification Toolbox - script and links
Exercise 1
Exercise 1: Reverse image search - fundamentals (short lecture)
Exercise 1: Reverse image search – script and links
Exercise 2
Exercise 2: Forensic image analysis (short lecture)
Exercise 2: Forensic image analysis – script and links
Exercise 3
Exercise 3: Metadata analysis (short lecture)
Exercise 3: Metadata analysis – script and links
Exercise 4
Exercise 4: AI-manipulated digital content (short lecture)
Exercise 4: AI manipulated content – script and links
Exercise 5
Exercise 5: Digital archiving and archive research (short lecture)
Exercise 5: Digital archiving – script and links
Countering information influence activities. A handbook for journalists
Handbook
Course evaluation and feedback
Course evaluation and feedback
Course certificate
Course certificate
Further reading
The Great Hack: The Tip of the Iceberg
https://www.amnesty.org/en/latest/news/2019/07/the-great-hack-facebook-cambridge-analytica/
How Cambridge Analytica Sparked the Great Privacy Awakening
https://www.wired.com/story/cambridge-analytica-facebook-privacy-awakening/
EU Report Deceptive design patterns in social media platform
interfaces:
how to recognise and avoid them
https://www.edpb.europa.eu/system/files/2023-02/edpb_03-2022_guidelines_on_deceptive_design_patterns_in_social_media_platform_interfaces_v2_en_0.pdf
UN Countering Disinformation
https://www.un.org/en/countering-disinformation
Lifting the lid on manipulative website contents (Cognitive Hacking Framework)
https://compass.onlinelibrary.wiley.com/doi/full/10.1111/spc3.12947
Hjälp
Här kommer det finnas möjlighet till hjälptext