Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor.

Similar presentations


Presentation on theme: "Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor."— Presentation transcript:

1 Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

2 Article 31: False Reporting on the Internet and the Spread of Rumors Three Case Studies By: Paul Hitlin Presented by: Lynsey Saylor

3 The internet has been the chosen news medium for people’s opinions about causes of tragic events. Many people find comfort in these explanations. Steven O’Leary claims that, “these rumors fill a need for consumers of news that is very similar to the void that ‘real news’ fills.” These Internet rumors help people to make sense of their world following a tragedy.

4 The Internet is certainly not responsible for errors in journalism. Instead it allows for anyone to have access to the production and dissemination of news.

5 4 Reasons for Cyberjournalism Errors 1. The Need for Speed – the deadline is always “now” and many reporters do not check sources as they are competing to get the story published first 2. The Desire to Attract ‘Hits’ – financial incentives and competition to keep consumers interested; competition again for getting a story first 3. Political Gains – certain political groups spread rumors to promote their own cause 4. Attraction to Scandal – consumers can browse sites rapidly and this furthers the need for reporters to lead with scandal to grab attention

6 Three Case Studies 1. TWA Flight 800; July 17, 1996. Three rumors were spread as to the cause. 2. Sidney Blumenthal vs. Matt Drudge and Internet Libel, 1997. Allegations of spousal abuse. Rare example of ease of correction. 3. The Suicide of White House Aide Vince Foster; July 20, 1993. Suicide was an alleged murder cover up.

7 Correction Policy  There is no real way to correct false reporting on the Internet because the ease and quickness of the spread of information.  It usually is difficult to trace errors to a particular site or author.  “There is simply too much online content for the government to be able to enforce the same types of journalistic laws that other news mediums must follow, not to mention the potential for excessive government censorship.”

8 Questions  The Internet can be held accountable for the rumors spread through its use? ANSWER: FALSE  Which of the following is a reason for Cyberjournalism errors? A. Political Gain B. Attraction to Scandal C. The Need for Speed D. All of the above

9 By: Simson Garfinkel

10 …Continue Constitution o Protection & Restriction Search and Seizure- 4 th Amendment Witness against self -5 th Amendment o “False Light” and “Sexting” The Computer o Computerize Errors o Driver’s License o Netflix

11 …Continue 9/11 First National Scare in Computer Age o Switch of Definition of Privacy o Security or Privacy have to choose Facebook o People willing put out personal information o 1 of 5 internet users spend a average of 25 minutes per day on Facebook.

12 The Concerns o Problems: o Cost o Development o Identifying o Changes: o No more passwords electronic chip license, or government issued card o Privacy Protection Agency

13 Questions 1. How much time does 1 out of 5 internet users spend per day on Facebook a. 2 hours b. 1 hour c. 30 minutes d. 25 minutes 2. True or False: The Government is thinking about getting rid of passwords, and switching to cards with electronic chips built in.

14 The Evolution of Cyber Warfare Chris Moore By Greg Bruno

15 Cyber Ware fare: The New Frontier  Estonia: Believes that Russia staged a denial of service attack due to the movement of a statue in a former Russian state. Russia denies any involvement.  Many believe that China is the most active in these tactics.  United States: Accused China of trying to infiltrate government networks at the Departments of State, Commerce, and Defense.

16 U.S. Cyber Warfare On the Offensive  The United States is not simply a bystander in this new type of warfare.  Will Arkin, a defense analyst, said “our ability to penetrate into enemy computer networks, our ability to exploit communication networks, to manipulate digital information, is real.  No one outside of the government really knows what they are truly capable of.

17 Tactics  Such things as denial of service are most likely unheard of by most people, while such things as spyware and malware are more common.  Denial of service is an approach that harnesses “botnets”—massive networks of interconnected computers—to bombard targeted networks with information requests while masking the location of the primary attacker.

18 Patching the Holes  Director of National Intelligence Michael McConnell believes that both China and Russia both have the technical capabilities to target and disrupt the United States information.  Significant amounts of money have been put towards enhancing “civilian agency cyber security and strengthening defenses to combat terrorism.” (Roughly $144 million by the Bush administration.)

19 Measuring the Threat  In 2007 the Department of Homeland Security logged an estimated 37,000 attempted breaches of private and government computer systems, and over 80,000 attacks on Pentagon systems.  One economists estimate that shutting down electric power to a sizable region for more than ten days would stop over 70% of the economic activities in the region.

20 Questions  Who do many believe to be the most active in these “cyber warfare” tactics?  Answer: China  How much was spent by the Bush administration to better protect the United States against the types of attacks?  Answer: $144 million


Download ppt "Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor."

Similar presentations


Ads by Google