Main Page: Difference between revisions

From Truthiness in Digital Media
Jump to navigation Jump to search
Line 28: Line 28:


;Please add links to papers, articles, blogposts, and other items related to internet misinformation and of interest to symposium participants to this page. Users need to create an account to edit this wiki -- click on the link in the top right corner of this page to obtain a username/password.
;Please add links to papers, articles, blogposts, and other items related to internet misinformation and of interest to symposium participants to this page. Users need to create an account to edit this wiki -- click on the link in the top right corner of this page to obtain a username/password.
* Jamie Barlett and Carl Miller [http://www.demos.co.uk/files/Truth_-_web.pdf?1317312220 truth, lies and the internet a report into young people’s digital fluency]
*Barlett, Jamie and Carl Miller [http://www.demos.co.uk/files/Truth_-_web.pdf?1317312220 truth, lies and the internet a report into young people’s digital fluency]
* Jamie Barlett and Carl Miller [http://www.demos.co.uk/publications/thepowerofunreason the power of unreason]
*Barlett, Jamie and Carl Miller [http://www.demos.co.uk/publications/thepowerofunreason the power of unreason]
* Matthew Battles. [http://www.theatlantic.com/technology/archive/2011/03/distributed-ghosts-in-the-machine/73098/ Distributed Ghosts in the Machine] The Atlantic, March 28, 2011.
*Battles, Matthew. [http://www.theatlantic.com/technology/archive/2011/03/distributed-ghosts-in-the-machine/73098/ Distributed Ghosts in the Machine] The Atlantic, March 28, 2011.
*Yochai Benkler. [http://techpresident.com/news/21680/seven-lessons-sopapipamegauplaod-and-four-proposals-where-we-go-here Seven Lessons from SOPA/PIPA/Megaupload and Four Proposals on Where We Go From Here] TechPresident, January 25, 2012.  
*Yochai Benkler. [http://techpresident.com/news/21680/seven-lessons-sopapipamegauplaod-and-four-proposals-where-we-go-here Seven Lessons from SOPA/PIPA/Megaupload and Four Proposals on Where We Go From Here] TechPresident, January 25, 2012.  
*Nick DeSantis. [http://chronicle.com/blogs/wiredcampus/new-media-consortium-names-1 New media consortium names 10 top ‘metatrends’ shaping educational technology] The Chronicle of Higher Education, February 3, 2012.
*DeSantis, Nick. [http://chronicle.com/blogs/wiredcampus/new-media-consortium-names-1 New media consortium names 10 top ‘metatrends’ shaping educational technology] The Chronicle of Higher Education, February 3, 2012.
*Diakopoulos, N., Goldenberg, S. and Essa, I., Videolyzer: Quality Analysis of Online Informational Video for Bloggers and Journalists. Proceedings of CHI, (2009). [http://www.deakondesign.com/Documents/paper0553-diakopoulos_dl.pdf]
*Diakopoulos, N., Goldenberg, S. and Essa, I., Videolyzer: Quality Analysis of Online Informational Video for Bloggers and Journalists. Proceedings of CHI, (2009). [http://www.deakondesign.com/Documents/paper0553-diakopoulos_dl.pdf]
* Michael S Dobbs. [http://mediapolicy.newamerica.net/publications/policy/the_rise_of_political_fact_checking_1 The Rise of Political Fact-checking - How Reagan Inspired a Journalistic Movement: A Reporter’s Eye View]
*Dobbs, Michael S [http://mediapolicy.newamerica.net/publications/policy/the_rise_of_political_fact_checking_1 The Rise of Political Fact-checking - How Reagan Inspired a Journalistic Movement: A Reporter’s Eye View]
*John Dunbar. [http://www.iwatchnews.org/2012/02/21/8211/super-pacs-out-raise-candidates-thanks-super-donors Super PACs out-raise candidates, thanks to super donors] Consider the Source, iWatch News, Center for Public Integrity, February 21, 2012.
*Dunbar, John. [http://www.iwatchnews.org/2012/02/21/8211/super-pacs-out-raise-candidates-thanks-super-donors Super PACs out-raise candidates, thanks to super donors] Consider the Source, iWatch News, Center for Public Integrity, February 21, 2012.
*Electronic Privacy Information Center. [http://epic.org/privacy/voting/E_Deceptive_Report_10_2010.pdf E-Deceptive Campaign Practices: Technology and Democracy 2.0 Report 2010] October 2010.
*Electronic Privacy Information Center. [http://epic.org/privacy/voting/E_Deceptive_Report_10_2010.pdf E-Deceptive Campaign Practices: Technology and Democracy 2.0 Report 2010] October 2010.
*Fabrice Epelboin. [http://www.readwriteweb.com/archives/the_morning_after_french_president.php Did the French Govt. Ask Twitter to Suspend Satirical Accounts?] Read Write Web, February 19, 2012.
*Epelboin, Fabrice. [http://www.readwriteweb.com/archives/the_morning_after_french_president.php Did the French Govt. Ask Twitter to Suspend Satirical Accounts?] Read Write Web, February 19, 2012.
*Ernesto Falcon. [http://www.publicknowledge.org/blog/who-really-engaged-misinformation Who Really Engaged in Misinformation?] Public Knowledge, February 9, 2012.
*Falcon, Ernesto. [http://www.publicknowledge.org/blog/who-really-engaged-misinformation Who Really Engaged in Misinformation?] Public Knowledge, February 9, 2012.
*Nicle Ferraro. [http://www.internetevolution.com/author.asp?section_id=466&doc_id=239958& RIAA CEO Hopes SOPA Protests Were a 'One-Time Thing'] Internet Evolution, February 29, 2012.
*Ferraro, Nicle. [http://www.internetevolution.com/author.asp?section_id=466&doc_id=239958& RIAA CEO Hopes SOPA Protests Were a 'One-Time Thing'] Internet Evolution, February 29, 2012.
* Lucas Graves and Tom Glaisyer. [http://mediapolicy.newamerica.net/publications/policy/the_fact_checking_universe_in_spring_2012 The Fact-Checking Universe in Spring 2012: An Overview]
*Graves, Lucas and Tom Glaisyer. [http://mediapolicy.newamerica.net/publications/policy/the_fact_checking_universe_in_spring_2012 The Fact-Checking Universe in Spring 2012: An Overview]
*Heinzelman, Jessica and Patrick Meier. "Crowdsourcing for Human Rights Monitoring: Challenges and Opportunities for Information Collection and Verification" in Lannon, J. and Halpin E.F. (2012) ''Human Rights and Information Communication Technologies: Trends and Consequences of Use''. IGI Global.
*Heinzelman, Jessica and Patrick Meier. "Crowdsourcing for Human Rights Monitoring: Challenges and Opportunities for Information Collection and Verification" in Lannon, J. and Halpin E.F. (2012) ''Human Rights and Information Communication Technologies: Trends and Consequences of Use''. IGI Global.
*Howard, P. N., Agarwal, S. D., & Hussain, M. M. (2011). When Do States Disconnect Their Digital Networks? Regime Responses to the Political Uses of Social Media. The Communication Review, Twitter Revolutions? Addressing Social Media and Dissent, 14(3), 216-232.
*Howard, P. N., Agarwal, S. D., & Hussain, M. M. (2011). When Do States Disconnect Their Digital Networks? Regime Responses to the Political Uses of Social Media. The Communication Review, Twitter Revolutions? Addressing Social Media and Dissent, 14(3), 216-232.
Line 47: Line 47:
*Howard, P. N., & Hussain, M. M. (2011). The Role of Digital Media. Journal of Democracy, The Upheavals in Egypt and Tunisia, 22(3), 35-48.
*Howard, P. N., & Hussain, M. M. (2011). The Role of Digital Media. Journal of Democracy, The Upheavals in Egypt and Tunisia, 22(3), 35-48.
*Howard, P. N., Hussain, M. M., Freelon, D., Mari, W., & Duffy, A. (2011). Digital Media and Contagious Democracy: Lessons from the Arab Spring. Dallas, TX: Bush Institute for Human Freedom.
*Howard, P. N., Hussain, M. M., Freelon, D., Mari, W., & Duffy, A. (2011). Digital Media and Contagious Democracy: Lessons from the Arab Spring. Dallas, TX: Bush Institute for Human Freedom.
*Muzammil M Hussain. [http://jou.sagepub.com/content/early/2012/01/12/1464884911433253 Journalism’s digital disconnect: The growth of campaign content and entertainment gatekeepers in viral political information] Journalism, January 24, 2012.
*Hussain, Muzammil M. [http://jou.sagepub.com/content/early/2012/01/12/1464884911433253 Journalism’s digital disconnect: The growth of campaign content and entertainment gatekeepers in viral political information] Journalism, January 24, 2012.
*Indiana University Center for Complex Networks & Systems Research. [http://truthy.indiana.edu/ The Truthy Project] Truthy is a research project that helps you understand how memes spread online. We collect tweets from Twitter and analyze them. With our statistics, images, movies, and interactive data, you can explore these dynamic networks.  
*Indiana University Center for Complex Networks & Systems Research. [http://truthy.indiana.edu/ The Truthy Project] Truthy is a research project that helps you understand how memes spread online. We collect tweets from Twitter and analyze them. With our statistics, images, movies, and interactive data, you can explore these dynamic networks.  
*Indiana University Center for Complex Networks & Systems Research. [http://cnets.indiana.edu/groups/nan/truthy Information Diffusion in Online Social Networks] The focus of this research project is understanding how information propagates through complex networks. Leveraging large-scale behavioral trace data from online social networking platforms we are able to analyze and model the spread of information, from political discourse to market trends, in unprecedented detail.  
*Indiana University Center for Complex Networks & Systems Research. [http://cnets.indiana.edu/groups/nan/truthy Information Diffusion in Online Social Networks] The focus of this research project is understanding how information propagates through complex networks. Leveraging large-scale behavioral trace data from online social networking platforms we are able to analyze and model the spread of information, from political discourse to market trends, in unprecedented detail.  
*Frank Jacobs. [http://opinionator.blogs.nytimes.com/2012/02/28/the-first-google-maps-war/?src=un&feedurl=http%3A%2F%2Fjson8.nytimes.com%2Fpages%2Fopinion%2Findex.jsonp The First Google Maps War] The New York Times, February 28, 2012.
*Jacobs, Frank. [http://opinionator.blogs.nytimes.com/2012/02/28/the-first-google-maps-war/?src=un&feedurl=http%3A%2F%2Fjson8.nytimes.com%2Fpages%2Fopinion%2Findex.jsonp The First Google Maps War] The New York Times, February 28, 2012.
*Jim Lakely. [http://heartland.org/press-releases/2012/02/15/heartland-institute-responds-stolen-and-fake-documents Heartland Institute Responds to Stolen and Fake Documents] Heartland Institute, February 15, 2012.
*Keller, Jared. [http://www.theatlantic.com/politics/archive/2010/11/when-campaigns-manipulate-social-media/66351/ When campaigners manipulate social media] The Atlantic, November 10, 2010.  
*Jared Keller. [http://www.theatlantic.com/politics/archive/2010/11/when-campaigns-manipulate-social-media/66351/ When campaigners manipulate social media] The Atlantic, November 10, 2010.  
*Kleiner, Kurt. [http://www.technologyreview.com/computing/26666/ Bogus grass-roots politics on Twitter: Data-mining techniques reveal fake Twitter accounts that give the impression of a vast political movement] Technology Review, November 2, 2010.  
*Kurt Kleiner. [http://www.technologyreview.com/computing/26666/ Bogus grass-roots politics on Twitter: Data-mining techniques reveal fake Twitter accounts that give the impression of a vast political movement] Technology Review, November 2, 2010.  
*Lakely, Jim. [http://heartland.org/press-releases/2012/02/15/heartland-institute-responds-stolen-and-fake-documents Heartland Institute Responds to Stolen and Fake Documents] Heartland Institute, February 15, 2012.
*Patrick Meier. [http://irevolution.net/2011/11/29/information-forensics-five-case-studies Information Forensics: Five Case Studies on How to Verify Crowdsourced Information from Social Media] iRevolution, November 29, 2011.  
*Meier, Patrick. [http://irevolution.net/2011/11/29/information-forensics-five-case-studies Information Forensics: Five Case Studies on How to Verify Crowdsourced Information from Social Media] iRevolution, November 29, 2011.  
*Meier, Patrick. [http://irevolution.net/2011/03/26/technology-to-counter-rumors How To Use Technology To Counter Rumors During Crises] iRevolution, March 26, 2011.  
*Meier, Patrick. [http://irevolution.net/2011/03/26/technology-to-counter-rumors How To Use Technology To Counter Rumors During Crises] iRevolution, March 26, 2011.  
*Meier, Patrick. [http://irevolution.net/2011/12/07/why-bounded-crowdsourcing Why Bounded Crowdsourcing is Important] iRevolution, December 7, 2011.
*Meier, Patrick. [http://irevolution.net/2011/12/07/why-bounded-crowdsourcing Why Bounded Crowdsourcing is Important] iRevolution, December 7, 2011.
Line 63: Line 63:
*Meier, Patrick. [http://irevolution.net/2011/02/10/facebook-for-repressive-regimes How to Use Facebook if You Are a Repressive Regime] iRevolution, February 10, 2011.
*Meier, Patrick. [http://irevolution.net/2011/02/10/facebook-for-repressive-regimes How to Use Facebook if You Are a Repressive Regime] iRevolution, February 10, 2011.
*Meier, Patrick. [http://irevolution.net/2010/04/08/wag-the-dog Wag the Dog, or How Falsifying Crowdsourced Data Can Be a Pain] iRevolution, April 8, 2010.
*Meier, Patrick. [http://irevolution.net/2010/04/08/wag-the-dog Wag the Dog, or How Falsifying Crowdsourced Data Can Be a Pain] iRevolution, April 8, 2010.
*Timothy Messer-Kruse/ [http://chronicle.com/article/The-Undue-Weight-of-Truth-on/130704/ The ‘Undue Weight’ of Truth on Wikipedia] The Chronicle of Higher Education, February 12, 2012.  
*Messer-Kruse, Timothy [http://chronicle.com/article/The-Undue-Weight-of-Truth-on/130704/ The ‘Undue Weight’ of Truth on Wikipedia] The Chronicle of Higher Education, February 12, 2012.  
*Panagiotis Metaxas. [http://cs.wellesley.edu/~pmetaxas/Metaxas-EvolutionSEs-LNBIP10.pdf Web spam, social propaganda and the evolution of search engine rankings] Lecture Notes BIP, Springer-Verlag, 2010.  
*Metaxas, Panagiotis. [http://cs.wellesley.edu/~pmetaxas/Metaxas-EvolutionSEs-LNBIP10.pdf Web spam, social propaganda and the evolution of search engine rankings] Lecture Notes BIP, Springer-Verlag, 2010.  
*Panagiotis Metaxas and Eni Mustafaraj. [http://cs.wellesley.edu/~pmetaxas/Metaxas-Obscurity-to-prominence.pdf From obscurity to prominence in prominence in minutes: political speech and real-time search] Web Science 2010 Conference, Raleigh, NC, April 2010.  
*Metaxas, Panagiotis and Eni Mustafaraj. [http://cs.wellesley.edu/~pmetaxas/Metaxas-Obscurity-to-prominence.pdf From obscurity to prominence in prominence in minutes: political speech and real-time search] Web Science 2010 Conference, Raleigh, NC, April 2010.  
*Pamela Meyer. [http://www.cnn.com/2011/11/13/opinion/meyer-lie-spotting/ How to spot a lie] CNN.com, November 14, 2011.  
*Meyer, Pamela. [http://www.cnn.com/2011/11/13/opinion/meyer-lie-spotting/ How to spot a lie] CNN.com, November 14, 2011.  
*Moy, P., & Hussain, M. M. (2011). Media Influences on Political Trust and Engagement. In R. Y. Shapiro & L. R. Jacobs (Eds.), The Oxford Handbook of American Public Opinion and the Media (pp. 220-235). Oxford, UK: Oxford University Press.
*Moy, P., & Hussain, M. M. (2011). Media Influences on Political Trust and Engagement. In R. Y. Shapiro & L. R. Jacobs (Eds.), The Oxford Handbook of American Public Opinion and the Media (pp. 220-235). Oxford, UK: Oxford University Press.
*Eni Mustafaraj, Samantha Finn, Carolyn Whitlock and Panagiotis Metaxas. [http://cs.wellesley.edu/~pmetaxas/Silent-minority-Vocal-majority.pdf Vocal minority versus silent majority: discovering the opinions of the long tail] IEEE SocialCom Conference, Boston, MA, October, 2011.  
*Mustafaraj, Eni; Samantha Finn, Carolyn Whitlock and Panagiotis Metaxas. [http://cs.wellesley.edu/~pmetaxas/Silent-minority-Vocal-majority.pdf Vocal minority versus silent majority: discovering the opinions of the long tail] IEEE SocialCom Conference, Boston, MA, October, 2011.  
*Eni Mustafaraj and Panagiotis Metaxas. [http://cs.wellesley.edu/~pmetaxas/TrustTrails.pdf Trails of trustiworthiness in real-time streams] Design, Influence and Social Technologies, ACM Computer Supported Cooperative Work (CSCW), Seattle, WA, February, 2012.  
*Mustafaraj, Eni and Panagiotis Metaxas. [http://cs.wellesley.edu/~pmetaxas/TrustTrails.pdf Trails of trustiworthiness in real-time streams] Design, Influence and Social Technologies, ACM Computer Supported Cooperative Work (CSCW), Seattle, WA, February, 2012.  
*Nahon, K., Helmsley, J., Hussain, M. M., & Walker, S. (2011). Viral Political Information in the US Elections Metabase, 2008 [Data Set]. Seattle, WA: Information and Society Center.
*Nahon, K., Helmsley, J., Hussain, M. M., & Walker, S. (2011). Viral Political Information in the US Elections Metabase, 2008 [Data Set]. Seattle, WA: Information and Society Center.
*Nahon, K., Hemsley, J., Walker, S., & Hussain, M. M. (2011). Fifteen Minutes of Fame: The Power of Blogs in the Lifecycle of Viral Political Information. Policy & Internet, 3(1).
*Nahon, K., Hemsley, J., Walker, S., & Hussain, M. M. (2011). Fifteen Minutes of Fame: The Power of Blogs in the Lifecycle of Viral Political Information. Policy & Internet, 3(1).
*Melanie Newman. [http://www.thebureauinvestigates.com/2011/12/06/pr-firm-attacked-critics-of-rwandan-government/ PR firm ‘attacked’ critics of Rwandan government] Bureau of Investigative Journalism, December 6, 2011.  
*Newman, Melanie. [http://www.thebureauinvestigates.com/2011/12/06/pr-firm-attacked-critics-of-rwandan-government/ PR firm ‘attacked’ critics of Rwandan government] Bureau of Investigative Journalism, December 6, 2011.  
* Brendan Nyhan and Jason Reifler. [http://mediapolicy.newamerica.net/publications/policy/misinformation_and_fact_checking Misinformation and Fact-checking Research Findings from Social Science]
*Nyhan, Brendan and Jason Reifler. [http://mediapolicy.newamerica.net/publications/policy/misinformation_and_fact_checking Misinformation and Fact-checking Research Findings from Social Science]
*Phil Plait. [http://blogs.discovermagazine.com/badastronomy/2012/02/15/breaking-news-a-look-behind-the-curtain-of-the-heartland-institutes-climate-change-spin/ Breaking news: A look behind the curtain of the Heartland Institute’s climate change spin] Discover Magazine, February 15, 2012.
*Plait, Phil. [http://blogs.discovermagazine.com/badastronomy/2012/02/15/breaking-news-a-look-behind-the-curtain-of-the-heartland-institutes-climate-change-spin/ Breaking news: A look behind the curtain of the Heartland Institute’s climate change spin] Discover Magazine, February 15, 2012.
*Jay Rosen. [http://pressthink.org/index.html NPR Tries to Get its Pressthink Right] Press Think, February 26, 2012.
*Rosen, Jay. [http://pressthink.org/index.html NPR Tries to Get its Pressthink Right] Press Think, February 26, 2012.
*Sarah Lai Stirland. [http://dyn.politico.com/printstory.cfm?uuid=C0B92A6F-F35A-8E68-853B0D6937451A7B Google is latest weapon vs. GOP] Politico, October 18, 2010.
*Lai Stirland, Sarah. [http://dyn.politico.com/printstory.cfm?uuid=C0B92A6F-F35A-8E68-853B0D6937451A7B Google is latest weapon vs. GOP] Politico, October 18, 2010.
*Andrew Sullivan. [http://andrewsullivan.thedailybeast.com/2012/02/wikipedia-is-not-truth.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+andrewsullivan%2FrApM+%28The+Daily+Dish%29 Wikipedia is not Truth] The Daily Dish, February 20, 2012.  
*Sullivan, Andrew. [http://andrewsullivan.thedailybeast.com/2012/02/wikipedia-is-not-truth.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+andrewsullivan%2FrApM+%28The+Daily+Dish%29 Wikipedia is not Truth] The Daily Dish, February 20, 2012.  
*Geoffrey York. [http://www.theglobeandmail.com/news/world/how-a-us-agency-cleaned-up-rwandas-genocide-stained-image/article2322005/page1/ How a U.S. agency cleaned up Rwanda’s genocide-stained image] Globe and Mail, January 31, 2012.
*York, Geoffrey. [http://www.theglobeandmail.com/news/world/how-a-us-agency-cleaned-up-rwandas-genocide-stained-image/article2322005/page1/ How a U.S. agency cleaned up Rwanda’s genocide-stained image] Globe and Mail, January 31, 2012.


==FOOD FOR THOUGHT DINNERS==
==FOOD FOR THOUGHT DINNERS==

Revision as of 18:28, 2 March 2012

TRUTHINESS IN DIGITAL MEDIA:A SYMPOSIUM THAT SEEKS TO UNDERSTAND AND ADDRESS PROPAGANDA AND MISINFORMATION IN THE NEW MEDIA ECOSYSTEM

March 6-7, 2012

http://blogs.law.harvard.edu/truthiness/


OVERVIEW

Introduction

As the networked media environment increasingly permeates private and public life, driven in part by the rapid and extensive travels of news, information and commentary, our systems for identifying and responding to misinformation and propaganda are failing us, creating serious risk to everything from personal and financial health to fundamental democratic processes and governance. In this age when many would argue that news and information have become key ingredients of broad social progress, our supply is tainted. Concerns about misinformation and disinformation are nothing new. Indeed, many tried and true techniques for disseminating misinformation remain just as vibrant in our current communications and information era. But digital media present new challenges to existing institutions, structures and processes, jeopardizing its potential contributions to the health of political, economic, and social systems.

While opinions differ over how digital media ameliorates and exacerbates the spread and influence of misinformation, this multifaceted issue persists in the face of thoughtful, sustained, and creative responses—and demonstrates a great diversity of manifestations, roots, and harms. The motives for spreading misinformation are many. They may be partisan or commercial, may derive from or evoke moral and religious sensibilities, may offer political or social commentary, or may be merely whimsical. But what to do? Building upon recent convenings and a number of related projects, we are taking a critical step towards a deeper understanding of the problem with a keen eye towards collectively identifying novel solutions and concrete actions to combat the deleterious impacts of misinformation in the near term and over time.

Objectives

This symposium will focus on exploring the many facets of this complex issue with an eye to crafting tools and strategies to ameliorate the negative impacts of deception, bias, and inaccuracy in the digital media ecosystem. We hope to come to a better position to take advantage of the benefits promised by digital media while appreciating the positive aspects of creative media-making and probing the blurred boundaries between nefarious and beneficial media shaping practices.

From academics to activists, techno geeks to policy geeks, and media scholars to media makers, participants will span a wide range of academic and professional backgrounds and expertise to promote cross-disciplinary learning and to facilitate the formation of novel and holistic approaches to these complex issues. The one-day public conference will include approximately 100 participants to balance inclusiveness with a participatory setting. It will draw upon a variety of formats to complement the topics, disciplinary approaches, and available participants, including selected presentations, case studies, tool demonstrations, and roundtable discussions. We hope to provide ample white space between sessions for people to process ideas, connect with one another, and generate new insights and approaches regarding the nature and complexity of the problem, relevant narratives and illustrative use cases, new areas of vulnerability and concern, and the relative merits of existing strategies to combat misinformation.

The final session on March 6, 2012 is intended to provide a bridge between the day’s discussions and the Hack day, with a focus on interventions, tools, and useful strategies for a variety of users operating in today’s digital communications environment. Hosted at the Media Lab, the Hack Day will provide for a series of working sessions, informed by the conference and designed to maximize focus and productivity. It will endeavor to conceive and prototype tools, processes and other resources to confront the challenges identified in the previous days.

Mode

We are delighted to have a diverse range of experts, scholars, commentators, practitioners, and users as participants and speakers in the Symposium. Our hope is to create a highly interactive environment that will encourage conversation, provocation, debate, and input from all participants throughout the day. We will provide numerous mechanisms for commentary, both in the lead up to and after the symposium, from our blog to the Hack Day on March 7, 2012. Moderators and session leads will also be looking to the crowd to deepen and enrich all sessions and approach these complex issues from multiple dimensions, disciplines, and perspectives.


RESOURCES

Please add links to papers, articles, blogposts, and other items related to internet misinformation and of interest to symposium participants to this page. Users need to create an account to edit this wiki -- click on the link in the top right corner of this page to obtain a username/password.

FOOD FOR THOUGHT DINNERS

Food for Thought dinners are self-organized gatherings that allow conference attendees to engage in informal, themed conversation with other conference participants, and will take place on Tuesday, March 6th after the cocktail reception. Please note that attendees will pay their own dinner costs.


  • If you would like to propose / organize a food for thought dinner:


  • If you would like to join one of the dinners:
    • Add your name to one of the slots below by 3:00pm on Tuesday, March 6th
    • If you decide not to attend a dinner to which you are signed up, please delete yourself from the list.
  • For restaurants in Harvard Square, expect approximately a 10 minute walk from HLS campus. For restaurants in Porter Square, expect approximately a 15 minute walk.


Organizer, Proposed Topic

  • Insert time, address, venue
  1. Insert name
  2. Insert name
  3. Insert name
  4. Insert name
  5. Insert name
  6. Insert name

Organizer, Proposed Topic

  • Insert time, address, venue
  1. Insert name
  2. Insert name
  3. Insert name
  4. Insert name
  5. Insert name
  6. Insert name

Organizer, Proposed Topic

  • Insert time, address, venue
  1. Insert name
  2. Insert name
  3. Insert name
  4. Insert name
  5. Insert name
  6. Insert name

BLOGPOSTS

We welcome you to submit a blogpost for our conference website before, during and after the event. If you’re interested in submitting a blogpost, please contact Berkman staff members Amar Ashar (ashar at cyber.law.harvard.edu) or Kori Urayama (kurayama at cyber.law.harvard.edu ).
  • Blogposts should ideally:
    • Be 250-1,000 words in length
    • Can cover any issues, phenomena, visions, or questions that you think may be helpful in understanding a host of topics that will (or should) be dealt with at the conference;
    • Could include interesting examples of tools of misinformation, historical or new-media focused case studies, or focus on a specific mode, process or method—something that you are excited about;
    • Be new and original, but cross-postings are welcome/encouraged.