{"id":646,"date":"2016-03-23T14:32:39","date_gmt":"2016-03-23T22:32:39","guid":{"rendered":"http:\/\/www.consortiumlibrary.org\/blogs\/reference\/?p=646"},"modified":"2016-03-23T14:32:39","modified_gmt":"2016-03-23T22:32:39","slug":"verification-and-the-wild-world-web","status":"publish","type":"post","link":"https:\/\/consortiumlibrary.org\/blogs\/reference\/2016\/03\/23\/verification-and-the-wild-world-web\/","title":{"rendered":"Verification and the Wild World Web"},"content":{"rendered":"<p>How can I be sure<br \/>\nIn a world that\u2019s constantly changing?<br \/>\n\u2014 The Young Rascals<\/p>\n<p>That\u2019s a good question, especially in our modern digital world \u2013 how exactly can you be sure? \u00a0You can increase your chances by learning how to think critically about online sources, and one title\u00a0that can help is a new publication from the European Journalism Centre called the <em>Verification Handbook: An Ultimate Guideline on Digital Age Sourcing for Emergency Coverage<\/em>. \u00a0Remember the adage: \u00a0trust, but verify? \u00a0The attitude here is much more in the vein of verify, then trust. \u00a0Here\u2019s the link for a free PDF download:<\/p>\n<p><a href=\"http:\/\/verificationhandbook.com\">http:\/\/verificationhandbook.com<\/a><\/p>\n<p>This title is intended for journalists and aid responders who need to quickly find out whether something is real or not. \u00a0But while the rest of us might not want to go so far as to directly contact the person who first uploaded the questioned content to social media, there\u2019s a lot that non-journalists can learn from it, too. \u00a0It\u2019s divided into ten short chapters on things like <em>\u20183: Verifying User-Generated Content\u2019<\/em> (UGC is an acronym to remember when reading\u00a0this book &#8211; it&#8217;s everywhere!), <em>\u20184: Verifying Images,\u2019<\/em> and <em>\u20185: Verifying Video.\u2019<\/em> \u00a0There are a number of interesting case studies that are like short detective stories; for instance, there&#8217;s one on a giant beach ball on a city street and another on sharks swimming in a suburb after Hurricane Sandy. \u00a0The book concentrates\u00a0on news events, so other case studies include things like the Boston Marathon bombing and the 2011 Japanese earthquake.<\/p>\n<p>The last chapter, <em>\u2018Verification Tools,\u2019<\/em> lists several pages of useful internet tools and is worth browsing all by itself. \u00a0If you\u2019d like more, you can also download two related free books from that same link, one of additional materials and more case studies, and another focusing on\u00a0investigative reporting.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How can I be sure In a world that\u2019s constantly changing? \u2014 The Young Rascals That\u2019s a good question, especially in our modern digital world \u2013 how exactly can you be sure? \u00a0You can increase your chances by learning how to think critically about online sources, and one title\u00a0that can help is a new publication [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-646","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/consortiumlibrary.org\/blogs\/reference\/wp-json\/wp\/v2\/posts\/646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/consortiumlibrary.org\/blogs\/reference\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/consortiumlibrary.org\/blogs\/reference\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/consortiumlibrary.org\/blogs\/reference\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/consortiumlibrary.org\/blogs\/reference\/wp-json\/wp\/v2\/comments?post=646"}],"version-history":[{"count":1,"href":"https:\/\/consortiumlibrary.org\/blogs\/reference\/wp-json\/wp\/v2\/posts\/646\/revisions"}],"predecessor-version":[{"id":647,"href":"https:\/\/consortiumlibrary.org\/blogs\/reference\/wp-json\/wp\/v2\/posts\/646\/revisions\/647"}],"wp:attachment":[{"href":"https:\/\/consortiumlibrary.org\/blogs\/reference\/wp-json\/wp\/v2\/media?parent=646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/consortiumlibrary.org\/blogs\/reference\/wp-json\/wp\/v2\/categories?post=646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/consortiumlibrary.org\/blogs\/reference\/wp-json\/wp\/v2\/tags?post=646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}