SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
#mumbai
Social Media in Times of Crisis
Timeline of the Reporting on Social Media Sites
CBS Story on Citizen Journalism
80 tweets sent to Twitter
via SMS every five seconds
                  - (Source: CNN)
#mumbai tweets: peak of roughly 1,000/hr
 Screenshot courtesy of Gauvra Mishra, taken at 12:18 pm India time 11/28
Vinu’s
               stream
“   Taken late night Nov 26
    at Colaba. Arranged in
    the order I took the
    snaps as I visited this
    place - 15 mins after I
    heard the sound. 2 mins
    walking distance from
    my house.
             “
Google Map of
the attack sites
      Use of geo-tagging
A Question of Accuracy
A Question of Accuracy
“Sure, lots of Twitter
messages are flat out
wrong and can spread
disinformation. But as
Ingram notes in his blog
post above, other people
tend to immediately
correct those errors. Bad
information is quickly
drowned out by good
information.”

  - Michael Arrington, TechCrunch
A Question of Accuracy
“Sure, lots of Twitter              quot;It was actually an
messages are flat out               incoherent, rumour-
wrong and can spread                fueled mob operating in
disinformation. But as              a mad echo chamber of
Ingram notes in his blog            tweets, re-tweets and re-
post above, other people            re-tweets. During the
tend to immediately                 hour or so I followed on
correct those errors. Bad           Twitter there were wildly
information is quickly              differing estimates of
drowned out by good                 the numbers killed and
information.”                       injured - ranging up to
                                    1,000.quot;
  - Michael Arrington, TechCrunch   - Blogger Tim Mallon (Source: CNN)
Potential for
misinformation
Did the Indian government
 originate that message?

    Amy Gahran, an editor of the Poynter
   Institute's E-Media Tidbits blog tracked
   down the original message to a Twitter
     user named Mark Bao, who is a high
         school junior based in Boston.
?
Food for Thought
•   What is more important in reporting:
    immediacy or accuracy?

•   Who/what is the media nowadays?

•   How can we apply the social media
    lessons learned from this incident to PR?

•   Does social media feed terrorists sensitive
    info? Could it be used as a terrorism tool?
Credits   Dr. Corinne Weisgerber
           St. Edward’s University

Blog: http://socialmediaprclass.blogspot.com
       Email: corinnew@stedwards.edu

     Opening Slide Photo Credit: Surag (Flickr:.rGz)

Weitere ähnliche Inhalte

Was ist angesagt?

Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?Melissa Andrews
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11captsbtyagi
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
President-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of TwitterPresident-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of TwitterSMED Tests
 
Twitterbreakingnews
TwitterbreakingnewsTwitterbreakingnews
TwitterbreakingnewsSteve Fox
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 
PeopleBrowsr Presents The Future of News - An Orwellian Inversion
PeopleBrowsr Presents The Future of News - An Orwellian Inversion PeopleBrowsr Presents The Future of News - An Orwellian Inversion
PeopleBrowsr Presents The Future of News - An Orwellian Inversion PeopleBrowsr
 
Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30Jorge Sebastiao
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!InnoTech
 
Cyber security
Cyber securityCyber security
Cyber securitysafeedu
 
How to get attention for anything
How to get attention for anythingHow to get attention for anything
How to get attention for anythingJonny Li
 
Echo Chamber dan Eksklusifitas Pemikiran di Media Sosial
Echo Chamber dan Eksklusifitas Pemikiran di Media SosialEcho Chamber dan Eksklusifitas Pemikiran di Media Sosial
Echo Chamber dan Eksklusifitas Pemikiran di Media SosialIsmail Fahmi
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkE Hacking
 

Was ist angesagt? (19)

Plug & Play News
Plug & Play News Plug & Play News
Plug & Play News
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
 
Rumour detection
Rumour detectionRumour detection
Rumour detection
 
Rumors!
Rumors!Rumors!
Rumors!
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
President-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of TwitterPresident-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of Twitter
 
Twitterbreakingnews
TwitterbreakingnewsTwitterbreakingnews
Twitterbreakingnews
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
NCSO
NCSONCSO
NCSO
 
PeopleBrowsr Presents The Future of News - An Orwellian Inversion
PeopleBrowsr Presents The Future of News - An Orwellian Inversion PeopleBrowsr Presents The Future of News - An Orwellian Inversion
PeopleBrowsr Presents The Future of News - An Orwellian Inversion
 
Using social media in breaking news michelle guido - orlando
Using social media in breaking news   michelle guido - orlandoUsing social media in breaking news   michelle guido - orlando
Using social media in breaking news michelle guido - orlando
 
Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
 
Cyber security
Cyber securityCyber security
Cyber security
 
How to get attention for anything
How to get attention for anythingHow to get attention for anything
How to get attention for anything
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
Echo Chamber dan Eksklusifitas Pemikiran di Media Sosial
Echo Chamber dan Eksklusifitas Pemikiran di Media SosialEcho Chamber dan Eksklusifitas Pemikiran di Media Sosial
Echo Chamber dan Eksklusifitas Pemikiran di Media Sosial
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon Talk
 

Andere mochten auch

26/11: An economic perspective
26/11: An economic perspective26/11: An economic perspective
26/11: An economic perspectiveS G
 
Social media & tourism
Social media & tourismSocial media & tourism
Social media & tourismgbonamie
 
Social media etiquette
Social media etiquette Social media etiquette
Social media etiquette Syed M Zeeshan
 
Social media and Travel & Tourism
Social media and Travel & Tourism Social media and Travel & Tourism
Social media and Travel & Tourism Social Samosa
 
disaster of Mumbai terror attack by vinay
disaster of Mumbai terror attack by vinaydisaster of Mumbai terror attack by vinay
disaster of Mumbai terror attack by vinayVinay M
 
Social Media Marketing for the Tourism Industry
Social Media Marketing for the Tourism IndustrySocial Media Marketing for the Tourism Industry
Social Media Marketing for the Tourism IndustryValentina Trikounaki
 
Social Media & Tourism: 10 Tips to Attract Travelers
Social Media & Tourism: 10 Tips to Attract TravelersSocial Media & Tourism: 10 Tips to Attract Travelers
Social Media & Tourism: 10 Tips to Attract TravelersBen Grossman
 
Impact of social media on tourism ppt
Impact of social media on tourism pptImpact of social media on tourism ppt
Impact of social media on tourism pptMahesh Wadde
 
Social Media And Tourism
Social Media And TourismSocial Media And Tourism
Social Media And TourismKatie Lips
 

Andere mochten auch (12)

26/11 MUMBAI
26/11 MUMBAI26/11 MUMBAI
26/11 MUMBAI
 
Social Media & Tourism
Social Media & TourismSocial Media & Tourism
Social Media & Tourism
 
26/11: An economic perspective
26/11: An economic perspective26/11: An economic perspective
26/11: An economic perspective
 
Social media & tourism
Social media & tourismSocial media & tourism
Social media & tourism
 
Social media etiquette
Social media etiquette Social media etiquette
Social media etiquette
 
Social media and Travel & Tourism
Social media and Travel & Tourism Social media and Travel & Tourism
Social media and Travel & Tourism
 
disaster of Mumbai terror attack by vinay
disaster of Mumbai terror attack by vinaydisaster of Mumbai terror attack by vinay
disaster of Mumbai terror attack by vinay
 
Social Media Marketing for the Tourism Industry
Social Media Marketing for the Tourism IndustrySocial Media Marketing for the Tourism Industry
Social Media Marketing for the Tourism Industry
 
Social Media & Tourism: 10 Tips to Attract Travelers
Social Media & Tourism: 10 Tips to Attract TravelersSocial Media & Tourism: 10 Tips to Attract Travelers
Social Media & Tourism: 10 Tips to Attract Travelers
 
Mumbai attack
Mumbai attackMumbai attack
Mumbai attack
 
Impact of social media on tourism ppt
Impact of social media on tourism pptImpact of social media on tourism ppt
Impact of social media on tourism ppt
 
Social Media And Tourism
Social Media And TourismSocial Media And Tourism
Social Media And Tourism
 

Ähnlich wie Role of Social Media during the Mumbai Attacks

PPT_Turk_fake_news[1].pdf
PPT_Turk_fake_news[1].pdfPPT_Turk_fake_news[1].pdf
PPT_Turk_fake_news[1].pdfKishanDixit4
 
PPT Turk fake news.pdf
PPT Turk fake news.pdfPPT Turk fake news.pdf
PPT Turk fake news.pdfsexter1
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxCyber Security Partners
 
Swim Lesson 8 Can Twitter Lead A Revoloution
Swim Lesson 8 Can Twitter Lead A RevoloutionSwim Lesson 8 Can Twitter Lead A Revoloution
Swim Lesson 8 Can Twitter Lead A RevoloutionEmily Reeves Dean
 
Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.Chetan Thathoo
 
Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?TheRealEdwin
 
303 assignment two
303 assignment two303 assignment two
303 assignment twoJoseph Crain
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLKirsten Fiedler
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
Presentation Crisis Communications
Presentation Crisis CommunicationsPresentation Crisis Communications
Presentation Crisis CommunicationsJanet Thaeler
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 

Ähnlich wie Role of Social Media during the Mumbai Attacks (20)

PPT_Turk_fake_news[1].pdf
PPT_Turk_fake_news[1].pdfPPT_Turk_fake_news[1].pdf
PPT_Turk_fake_news[1].pdf
 
PPT Turk fake news.pdf
PPT Turk fake news.pdfPPT Turk fake news.pdf
PPT Turk fake news.pdf
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
 
Arunav Sinha - PRAXIS 2019
Arunav Sinha - PRAXIS 2019Arunav Sinha - PRAXIS 2019
Arunav Sinha - PRAXIS 2019
 
The Role of Social Media in Da'awah
The Role of Social Media in Da'awahThe Role of Social Media in Da'awah
The Role of Social Media in Da'awah
 
Swim Lesson 8 Can Twitter Lead A Revoloution
Swim Lesson 8 Can Twitter Lead A RevoloutionSwim Lesson 8 Can Twitter Lead A Revoloution
Swim Lesson 8 Can Twitter Lead A Revoloution
 
Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.
 
Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?
 
303 assignment two
303 assignment two303 assignment two
303 assignment two
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Twitter
TwitterTwitter
Twitter
 
Social journalism
Social journalismSocial journalism
Social journalism
 
Final ppt
Final pptFinal ppt
Final ppt
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRL
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Presentation Crisis Communications
Presentation Crisis CommunicationsPresentation Crisis Communications
Presentation Crisis Communications
 
The dark side of IA
The dark side of IAThe dark side of IA
The dark side of IA
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 

Mehr von Corinne Weisgerber

Crisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCrisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCorinne Weisgerber
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineCorinne Weisgerber
 
Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015Corinne Weisgerber
 
Teaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuiteTeaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuiteCorinne Weisgerber
 
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...Corinne Weisgerber
 
Social Media Metrics for Academics
Social Media Metrics for AcademicsSocial Media Metrics for Academics
Social Media Metrics for AcademicsCorinne Weisgerber
 
Communicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case StudyCommunicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case StudyCorinne Weisgerber
 
Negotiating multiple identities on the social web
Negotiating multiple identities on the social webNegotiating multiple identities on the social web
Negotiating multiple identities on the social webCorinne Weisgerber
 
Re-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as CuratorsRe-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as CuratorsCorinne Weisgerber
 
Building Thought Leadership through Content Curation
Building Thought Leadership through Content CurationBuilding Thought Leadership through Content Curation
Building Thought Leadership through Content CurationCorinne Weisgerber
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Social Media & Interreligious Understanding
Social Media & Interreligious UnderstandingSocial Media & Interreligious Understanding
Social Media & Interreligious UnderstandingCorinne Weisgerber
 
Empowering students through personal learning networks
Empowering students through personal learning networksEmpowering students through personal learning networks
Empowering students through personal learning networksCorinne Weisgerber
 
Egypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issuesEgypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issuesCorinne Weisgerber
 
Re-interpreting the Social Media Dream
Re-interpreting the Social Media DreamRe-interpreting the Social Media Dream
Re-interpreting the Social Media DreamCorinne Weisgerber
 

Mehr von Corinne Weisgerber (20)

Interviewing 2
Interviewing 2Interviewing 2
Interviewing 2
 
Crisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCrisis communication & the Austin Bombings
Crisis communication & the Austin Bombings
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe Online
 
Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015
 
Teaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuiteTeaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuite
 
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
 
The Networked Academic
The Networked AcademicThe Networked Academic
The Networked Academic
 
Social Media for Churches
Social Media for ChurchesSocial Media for Churches
Social Media for Churches
 
Social Media Metrics for Academics
Social Media Metrics for AcademicsSocial Media Metrics for Academics
Social Media Metrics for Academics
 
Communicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case StudyCommunicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case Study
 
Negotiating multiple identities on the social web
Negotiating multiple identities on the social webNegotiating multiple identities on the social web
Negotiating multiple identities on the social web
 
Re-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as CuratorsRe-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as Curators
 
Building Thought Leadership through Content Curation
Building Thought Leadership through Content CurationBuilding Thought Leadership through Content Curation
Building Thought Leadership through Content Curation
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Social Media & Interreligious Understanding
Social Media & Interreligious UnderstandingSocial Media & Interreligious Understanding
Social Media & Interreligious Understanding
 
Empowering students through personal learning networks
Empowering students through personal learning networksEmpowering students through personal learning networks
Empowering students through personal learning networks
 
Curating news
Curating newsCurating news
Curating news
 
Egypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issuesEgypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issues
 
Re-interpreting the Social Media Dream
Re-interpreting the Social Media DreamRe-interpreting the Social Media Dream
Re-interpreting the Social Media Dream
 
PRSSA Twitter Workshop
PRSSA Twitter WorkshopPRSSA Twitter Workshop
PRSSA Twitter Workshop
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Role of Social Media during the Mumbai Attacks

  • 1. #mumbai Social Media in Times of Crisis
  • 2. Timeline of the Reporting on Social Media Sites
  • 3. CBS Story on Citizen Journalism
  • 4.
  • 5.
  • 6. 80 tweets sent to Twitter via SMS every five seconds - (Source: CNN)
  • 7. #mumbai tweets: peak of roughly 1,000/hr Screenshot courtesy of Gauvra Mishra, taken at 12:18 pm India time 11/28
  • 8. Vinu’s stream “ Taken late night Nov 26 at Colaba. Arranged in the order I took the snaps as I visited this place - 15 mins after I heard the sound. 2 mins walking distance from my house. “
  • 9.
  • 10. Google Map of the attack sites Use of geo-tagging
  • 11.
  • 12. A Question of Accuracy
  • 13. A Question of Accuracy “Sure, lots of Twitter messages are flat out wrong and can spread disinformation. But as Ingram notes in his blog post above, other people tend to immediately correct those errors. Bad information is quickly drowned out by good information.” - Michael Arrington, TechCrunch
  • 14. A Question of Accuracy “Sure, lots of Twitter quot;It was actually an messages are flat out incoherent, rumour- wrong and can spread fueled mob operating in disinformation. But as a mad echo chamber of Ingram notes in his blog tweets, re-tweets and re- post above, other people re-tweets. During the tend to immediately hour or so I followed on correct those errors. Bad Twitter there were wildly information is quickly differing estimates of drowned out by good the numbers killed and information.” injured - ranging up to 1,000.quot; - Michael Arrington, TechCrunch - Blogger Tim Mallon (Source: CNN)
  • 15.
  • 17. Did the Indian government originate that message? Amy Gahran, an editor of the Poynter Institute's E-Media Tidbits blog tracked down the original message to a Twitter user named Mark Bao, who is a high school junior based in Boston.
  • 18. ? Food for Thought • What is more important in reporting: immediacy or accuracy? • Who/what is the media nowadays? • How can we apply the social media lessons learned from this incident to PR? • Does social media feed terrorists sensitive info? Could it be used as a terrorism tool?
  • 19. Credits Dr. Corinne Weisgerber St. Edward’s University Blog: http://socialmediaprclass.blogspot.com Email: corinnew@stedwards.edu Opening Slide Photo Credit: Surag (Flickr:.rGz)