SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
#mumbai
Social Media in Times of Crisis
Timeline of the Reporting on Social Media Sites
CBS Story on Citizen Journalism
80 tweets sent to Twitter
via SMS every five seconds
                  - (Source: CNN)
#mumbai tweets: peak of roughly 1,000/hr
 Screenshot courtesy of Gauvra Mishra, taken at 12:18 pm India time 11/28
Vinu’s
               stream
“   Taken late night Nov 26
    at Colaba. Arranged in
    the order I took the
    snaps as I visited this
    place - 15 mins after I
    heard the sound. 2 mins
    walking distance from
    my house.
             “
Google Map of
the attack sites
      Use of geo-tagging
A Question of Accuracy
A Question of Accuracy
“Sure, lots of Twitter
messages are flat out
wrong and can spread
disinformation. But as
Ingram notes in his blog
post above, other people
tend to immediately
correct those errors. Bad
information is quickly
drowned out by good
information.”

  - Michael Arrington, TechCrunch
A Question of Accuracy
“Sure, lots of Twitter              quot;It was actually an
messages are flat out               incoherent, rumour-
wrong and can spread                fueled mob operating in
disinformation. But as              a mad echo chamber of
Ingram notes in his blog            tweets, re-tweets and re-
post above, other people            re-tweets. During the
tend to immediately                 hour or so I followed on
correct those errors. Bad           Twitter there were wildly
information is quickly              differing estimates of
drowned out by good                 the numbers killed and
information.”                       injured - ranging up to
                                    1,000.quot;
  - Michael Arrington, TechCrunch   - Blogger Tim Mallon (Source: CNN)
Potential for
misinformation
Did the Indian government
 originate that message?

    Amy Gahran, an editor of the Poynter
   Institute's E-Media Tidbits blog tracked
   down the original message to a Twitter
     user named Mark Bao, who is a high
         school junior based in Boston.
?
Food for Thought
•   What is more important in reporting:
    immediacy or accuracy?

•   Who/what is the media nowadays?

•   How can we apply the social media
    lessons learned from this incident to PR?

•   Does social media feed terrorists sensitive
    info? Could it be used as a terrorism tool?
Credits   Dr. Corinne Weisgerber
           St. Edward’s University

Blog: http://socialmediaprclass.blogspot.com
       Email: corinnew@stedwards.edu

     Opening Slide Photo Credit: Surag (Flickr:.rGz)

Más contenido relacionado

La actualidad más candente

Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?Melissa Andrews
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11captsbtyagi
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
President-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of TwitterPresident-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of TwitterSMED Tests
 
Twitterbreakingnews
TwitterbreakingnewsTwitterbreakingnews
TwitterbreakingnewsSteve Fox
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 
PeopleBrowsr Presents The Future of News - An Orwellian Inversion
PeopleBrowsr Presents The Future of News - An Orwellian Inversion PeopleBrowsr Presents The Future of News - An Orwellian Inversion
PeopleBrowsr Presents The Future of News - An Orwellian Inversion PeopleBrowsr
 
Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30Jorge Sebastiao
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!InnoTech
 
Cyber security
Cyber securityCyber security
Cyber securitysafeedu
 
How to get attention for anything
How to get attention for anythingHow to get attention for anything
How to get attention for anythingJonny Li
 
Echo Chamber dan Eksklusifitas Pemikiran di Media Sosial
Echo Chamber dan Eksklusifitas Pemikiran di Media SosialEcho Chamber dan Eksklusifitas Pemikiran di Media Sosial
Echo Chamber dan Eksklusifitas Pemikiran di Media SosialIsmail Fahmi
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkE Hacking
 

La actualidad más candente (19)

Plug & Play News
Plug & Play News Plug & Play News
Plug & Play News
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
 
Rumour detection
Rumour detectionRumour detection
Rumour detection
 
Rumors!
Rumors!Rumors!
Rumors!
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
President-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of TwitterPresident-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of Twitter
 
Twitterbreakingnews
TwitterbreakingnewsTwitterbreakingnews
Twitterbreakingnews
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
NCSO
NCSONCSO
NCSO
 
PeopleBrowsr Presents The Future of News - An Orwellian Inversion
PeopleBrowsr Presents The Future of News - An Orwellian Inversion PeopleBrowsr Presents The Future of News - An Orwellian Inversion
PeopleBrowsr Presents The Future of News - An Orwellian Inversion
 
Using social media in breaking news michelle guido - orlando
Using social media in breaking news   michelle guido - orlandoUsing social media in breaking news   michelle guido - orlando
Using social media in breaking news michelle guido - orlando
 
Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
 
Cyber security
Cyber securityCyber security
Cyber security
 
How to get attention for anything
How to get attention for anythingHow to get attention for anything
How to get attention for anything
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
Echo Chamber dan Eksklusifitas Pemikiran di Media Sosial
Echo Chamber dan Eksklusifitas Pemikiran di Media SosialEcho Chamber dan Eksklusifitas Pemikiran di Media Sosial
Echo Chamber dan Eksklusifitas Pemikiran di Media Sosial
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon Talk
 

Destacado

26/11: An economic perspective
26/11: An economic perspective26/11: An economic perspective
26/11: An economic perspectiveS G
 
Social media & tourism
Social media & tourismSocial media & tourism
Social media & tourismgbonamie
 
Social media etiquette
Social media etiquette Social media etiquette
Social media etiquette Syed M Zeeshan
 
Social media and Travel & Tourism
Social media and Travel & Tourism Social media and Travel & Tourism
Social media and Travel & Tourism Social Samosa
 
disaster of Mumbai terror attack by vinay
disaster of Mumbai terror attack by vinaydisaster of Mumbai terror attack by vinay
disaster of Mumbai terror attack by vinayVinay M
 
Social Media Marketing for the Tourism Industry
Social Media Marketing for the Tourism IndustrySocial Media Marketing for the Tourism Industry
Social Media Marketing for the Tourism IndustryValentina Trikounaki
 
Social Media & Tourism: 10 Tips to Attract Travelers
Social Media & Tourism: 10 Tips to Attract TravelersSocial Media & Tourism: 10 Tips to Attract Travelers
Social Media & Tourism: 10 Tips to Attract TravelersBen Grossman
 
Impact of social media on tourism ppt
Impact of social media on tourism pptImpact of social media on tourism ppt
Impact of social media on tourism pptMahesh Wadde
 
Social Media And Tourism
Social Media And TourismSocial Media And Tourism
Social Media And TourismKatie Lips
 

Destacado (12)

26/11 MUMBAI
26/11 MUMBAI26/11 MUMBAI
26/11 MUMBAI
 
Social Media & Tourism
Social Media & TourismSocial Media & Tourism
Social Media & Tourism
 
26/11: An economic perspective
26/11: An economic perspective26/11: An economic perspective
26/11: An economic perspective
 
Social media & tourism
Social media & tourismSocial media & tourism
Social media & tourism
 
Social media etiquette
Social media etiquette Social media etiquette
Social media etiquette
 
Social media and Travel & Tourism
Social media and Travel & Tourism Social media and Travel & Tourism
Social media and Travel & Tourism
 
disaster of Mumbai terror attack by vinay
disaster of Mumbai terror attack by vinaydisaster of Mumbai terror attack by vinay
disaster of Mumbai terror attack by vinay
 
Social Media Marketing for the Tourism Industry
Social Media Marketing for the Tourism IndustrySocial Media Marketing for the Tourism Industry
Social Media Marketing for the Tourism Industry
 
Social Media & Tourism: 10 Tips to Attract Travelers
Social Media & Tourism: 10 Tips to Attract TravelersSocial Media & Tourism: 10 Tips to Attract Travelers
Social Media & Tourism: 10 Tips to Attract Travelers
 
Mumbai attack
Mumbai attackMumbai attack
Mumbai attack
 
Impact of social media on tourism ppt
Impact of social media on tourism pptImpact of social media on tourism ppt
Impact of social media on tourism ppt
 
Social Media And Tourism
Social Media And TourismSocial Media And Tourism
Social Media And Tourism
 

Similar a Mumbai Social Media Crisis Timeline

PPT_Turk_fake_news[1].pdf
PPT_Turk_fake_news[1].pdfPPT_Turk_fake_news[1].pdf
PPT_Turk_fake_news[1].pdfKishanDixit4
 
PPT Turk fake news.pdf
PPT Turk fake news.pdfPPT Turk fake news.pdf
PPT Turk fake news.pdfsexter1
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxCyber Security Partners
 
Swim Lesson 8 Can Twitter Lead A Revoloution
Swim Lesson 8 Can Twitter Lead A RevoloutionSwim Lesson 8 Can Twitter Lead A Revoloution
Swim Lesson 8 Can Twitter Lead A RevoloutionEmily Reeves Dean
 
Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.Chetan Thathoo
 
Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?TheRealEdwin
 
303 assignment two
303 assignment two303 assignment two
303 assignment twoJoseph Crain
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLKirsten Fiedler
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
Presentation Crisis Communications
Presentation Crisis CommunicationsPresentation Crisis Communications
Presentation Crisis CommunicationsJanet Thaeler
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 

Similar a Mumbai Social Media Crisis Timeline (20)

PPT_Turk_fake_news[1].pdf
PPT_Turk_fake_news[1].pdfPPT_Turk_fake_news[1].pdf
PPT_Turk_fake_news[1].pdf
 
PPT Turk fake news.pdf
PPT Turk fake news.pdfPPT Turk fake news.pdf
PPT Turk fake news.pdf
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
 
Arunav Sinha - PRAXIS 2019
Arunav Sinha - PRAXIS 2019Arunav Sinha - PRAXIS 2019
Arunav Sinha - PRAXIS 2019
 
The Role of Social Media in Da'awah
The Role of Social Media in Da'awahThe Role of Social Media in Da'awah
The Role of Social Media in Da'awah
 
Swim Lesson 8 Can Twitter Lead A Revoloution
Swim Lesson 8 Can Twitter Lead A RevoloutionSwim Lesson 8 Can Twitter Lead A Revoloution
Swim Lesson 8 Can Twitter Lead A Revoloution
 
Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.Fake news, its ramifications and tools to check this menace.
Fake news, its ramifications and tools to check this menace.
 
Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?
 
303 assignment two
303 assignment two303 assignment two
303 assignment two
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Twitter
TwitterTwitter
Twitter
 
Social journalism
Social journalismSocial journalism
Social journalism
 
Final ppt
Final pptFinal ppt
Final ppt
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRL
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Presentation Crisis Communications
Presentation Crisis CommunicationsPresentation Crisis Communications
Presentation Crisis Communications
 
The dark side of IA
The dark side of IAThe dark side of IA
The dark side of IA
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 

Más de Corinne Weisgerber

Crisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCrisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCorinne Weisgerber
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineCorinne Weisgerber
 
Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015Corinne Weisgerber
 
Teaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuiteTeaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuiteCorinne Weisgerber
 
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...Corinne Weisgerber
 
Social Media Metrics for Academics
Social Media Metrics for AcademicsSocial Media Metrics for Academics
Social Media Metrics for AcademicsCorinne Weisgerber
 
Communicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case StudyCommunicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case StudyCorinne Weisgerber
 
Negotiating multiple identities on the social web
Negotiating multiple identities on the social webNegotiating multiple identities on the social web
Negotiating multiple identities on the social webCorinne Weisgerber
 
Re-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as CuratorsRe-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as CuratorsCorinne Weisgerber
 
Building Thought Leadership through Content Curation
Building Thought Leadership through Content CurationBuilding Thought Leadership through Content Curation
Building Thought Leadership through Content CurationCorinne Weisgerber
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Social Media & Interreligious Understanding
Social Media & Interreligious UnderstandingSocial Media & Interreligious Understanding
Social Media & Interreligious UnderstandingCorinne Weisgerber
 
Empowering students through personal learning networks
Empowering students through personal learning networksEmpowering students through personal learning networks
Empowering students through personal learning networksCorinne Weisgerber
 
Egypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issuesEgypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issuesCorinne Weisgerber
 
Re-interpreting the Social Media Dream
Re-interpreting the Social Media DreamRe-interpreting the Social Media Dream
Re-interpreting the Social Media DreamCorinne Weisgerber
 

Más de Corinne Weisgerber (20)

Interviewing 2
Interviewing 2Interviewing 2
Interviewing 2
 
Crisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCrisis communication & the Austin Bombings
Crisis communication & the Austin Bombings
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe Online
 
Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015
 
Teaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuiteTeaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuite
 
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
 
The Networked Academic
The Networked AcademicThe Networked Academic
The Networked Academic
 
Social Media for Churches
Social Media for ChurchesSocial Media for Churches
Social Media for Churches
 
Social Media Metrics for Academics
Social Media Metrics for AcademicsSocial Media Metrics for Academics
Social Media Metrics for Academics
 
Communicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case StudyCommunicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case Study
 
Negotiating multiple identities on the social web
Negotiating multiple identities on the social webNegotiating multiple identities on the social web
Negotiating multiple identities on the social web
 
Re-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as CuratorsRe-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as Curators
 
Building Thought Leadership through Content Curation
Building Thought Leadership through Content CurationBuilding Thought Leadership through Content Curation
Building Thought Leadership through Content Curation
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Social Media & Interreligious Understanding
Social Media & Interreligious UnderstandingSocial Media & Interreligious Understanding
Social Media & Interreligious Understanding
 
Empowering students through personal learning networks
Empowering students through personal learning networksEmpowering students through personal learning networks
Empowering students through personal learning networks
 
Curating news
Curating newsCurating news
Curating news
 
Egypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issuesEgypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issues
 
Re-interpreting the Social Media Dream
Re-interpreting the Social Media DreamRe-interpreting the Social Media Dream
Re-interpreting the Social Media Dream
 
PRSSA Twitter Workshop
PRSSA Twitter WorkshopPRSSA Twitter Workshop
PRSSA Twitter Workshop
 

Último

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 

Último (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 

Mumbai Social Media Crisis Timeline

  • 1. #mumbai Social Media in Times of Crisis
  • 2. Timeline of the Reporting on Social Media Sites
  • 3. CBS Story on Citizen Journalism
  • 4.
  • 5.
  • 6. 80 tweets sent to Twitter via SMS every five seconds - (Source: CNN)
  • 7. #mumbai tweets: peak of roughly 1,000/hr Screenshot courtesy of Gauvra Mishra, taken at 12:18 pm India time 11/28
  • 8. Vinu’s stream “ Taken late night Nov 26 at Colaba. Arranged in the order I took the snaps as I visited this place - 15 mins after I heard the sound. 2 mins walking distance from my house. “
  • 9.
  • 10. Google Map of the attack sites Use of geo-tagging
  • 11.
  • 12. A Question of Accuracy
  • 13. A Question of Accuracy “Sure, lots of Twitter messages are flat out wrong and can spread disinformation. But as Ingram notes in his blog post above, other people tend to immediately correct those errors. Bad information is quickly drowned out by good information.” - Michael Arrington, TechCrunch
  • 14. A Question of Accuracy “Sure, lots of Twitter quot;It was actually an messages are flat out incoherent, rumour- wrong and can spread fueled mob operating in disinformation. But as a mad echo chamber of Ingram notes in his blog tweets, re-tweets and re- post above, other people re-tweets. During the tend to immediately hour or so I followed on correct those errors. Bad Twitter there were wildly information is quickly differing estimates of drowned out by good the numbers killed and information.” injured - ranging up to 1,000.quot; - Michael Arrington, TechCrunch - Blogger Tim Mallon (Source: CNN)
  • 15.
  • 17. Did the Indian government originate that message? Amy Gahran, an editor of the Poynter Institute's E-Media Tidbits blog tracked down the original message to a Twitter user named Mark Bao, who is a high school junior based in Boston.
  • 18. ? Food for Thought • What is more important in reporting: immediacy or accuracy? • Who/what is the media nowadays? • How can we apply the social media lessons learned from this incident to PR? • Does social media feed terrorists sensitive info? Could it be used as a terrorism tool?
  • 19. Credits Dr. Corinne Weisgerber St. Edward’s University Blog: http://socialmediaprclass.blogspot.com Email: corinnew@stedwards.edu Opening Slide Photo Credit: Surag (Flickr:.rGz)