Categories
Information literacies Skills Team TechItUpTuesday

That’s Fake News

What is Fake News?

Fake News is often linked with politics especially due to Donald Trump and the countless memes about “fake news” during his presidency. This association can sometimes be unhelpful as it narrows the focus of the issue. The term ‘false information’ is perhaps preferable as it can refer to a more diverse range of disinformation.

 GIF

Most of what you read online may appear to be true but often is not. False information can include news stories or hoaxes created to deliberately misinform or deceive readers. They can deceive people by looking like trusted websites or using similar names and web addresses to reputable news organisations.

As social media is a public platform, anyone can post anything without checking their facts. When we consider what is “fake news” there are two kinds of false information to be aware of – misinformation and disinformation.

Misinformation and Disinformation

Misinformation

This aims to shape and change people’s opinion by misleading them. A study from Indiana University classified misinformation as “false or misleading content including hoaxes, conspiracy theories, fabricated reports, click-bait headlines, and even satire.” 

Lying Nicole Power GIF by Kim's Convenience

Disinformation

Disinformation can be spread in similar ways to misinformation but is intended to deceive rather than mislead. There are many reasons why individual social media or business accounts might do this. They may wish to increase their social media marketing effectiveness, boost online traffic, gain more followers, incite an emotional response, or create distractions.

Disinformation can be dangerous on social media due to the vast amount of information and readers’ attention spans.

False Abraham Simpson GIF - Find & Share on GIPHY

Identifying False Information

Personal accounts

Social media platforms are designed to retain users and get engagement not to distinguish between real and “fake news”. If you want to know if something shared by a personal account is trustworthy here are a few questions to consider.

  • Does the person who shared the post have an emotional or professional investment in these claims? If either, they might not be completely unbiased, but it requires some judgement on your part and perhaps some research.
  • Is this information reasonable? Does what they are saying sound believable. Perhaps ask some people you trust whether they think it is reasonable as sometimes our own biases can influence us.
  • Does it come from a reputable source? For example: University, Government or Scholarly articles, most mainstream Magazines/Newspapers, and published works from reputable publishers. Places like Wikipedia and online blogs are not necessarily reliable. Even more reliable sources may have a political agenda or their own bias, so you need to exercise your own judgement.
Jeff Goldblum What GIF by The Late Late Show with James Corden - Find & Share on GIPHY

Business or professional accounts

This may not be as relevant as a student but when you go off into the working world these are things you need to be aware of. When you work for a professional organization where social media pages are tailored towards a particular audience there may be more motivation to fall into the categories of “fake news” to gain an edge. As well as the questions you’d ask of a personal account, you should also ask:

  • How it serves its audience? It should help its audience and advertise the business based on accurate information.
  • How it reflects on the business’s reputation or values? Should be trustworthy and reliable. Consider checking the reviews (not always reliable) or asking people who’ve interacted with the company.
  • Is this relevant to my clients? Our personal bias should not be involved. 

If you are found to be using false information or “fake news” with a professional or business account can have serious consequences and possible legal ramifications. This is especially relevant due to the speed at which false information spreads.

How False infomation spreads

Combating Fake News

Combating “fake news” on social media is about understanding other users’ motives as well as the platforms intention. Social media platforms make money by selling user data to ad companies. This is why ads you see are often based on your interests or search history.

The news that appears on your social media feed is filtered based on collected data. So, now you are aware of can help you be more conscious of your own inherent bias as some of what you see may be based on what you are conveying about yourself online. Whilst false information on social media is probably unavoidable by thinking critically and exercising a level of curiosity for what you read you can help sort the fact from the fiction.

As this video shows any news no matter how riciculous can be spread and msilead people.

Categories
Information literacies Skills Team TechItUpTuesday

Phishing, don’t take the bait

#TechItUpTuesday

What is phishing?

If you want to stay safe online you should always be on the lookout for scammers. Phishing is a form of social engineering attack or scam often used to steal user data, such as login details and credit card numbers. It often occurs when an attacker, masquerading as a trusted entity, possibly your bank, social media, or service provider tricking you into opening an email or message. 

Cartoon Fish GIF by Luis Ricardo - Find & Share on GIPHY

This video discusses many of the common examples of Phishing such as mass e-mail Phishing (often just referred to as Phishing), Spear Phishing and Smishing.

Other forms of phishing

HTTPS phishing

Often included as part of e-mail phishing this is something to be wary of when you are on any site. Most legitimate organizations use HTTPS instead of HTTP because it is considered safer and establishes legitimacy. If it’s posing as a site you already know, search for that site on a separate tab and compare the URLs to see that they match.

For example, the address for Canvas, if you clicked on a link and the address began with HTTP rather than HTTPS it could be unsafe:

Correct: https://canvas.hull.ac.uk/

Potentially unsafe: http://canvas.hull.co.uk/

They may also use hypertext which is a “clickable” link embedded into the text to hide the real URL. When checking the link make sure that it’s in its original, long-tail format and shows the whole URL, double click on the URL so the full format shows.

Search engine phishing

Sometimes known as SEO poisoning or SEO trojans, is where hackers work to become the top hit on a search using google or other engines. If they get you to click their link, it takes you to their website. When you interact with it and enter sensitive data, they have your information. Hacker sites can pose as any type of website but are usually banks, PayPal, social media, and shopping sites.

Vishing

This is when you may receive a call on your phone maybe claiming to be your bank or government authority demanding your details or payment with a threat of legal action if you don’t comply. This is to create a heightened sense of urgency that may make a person take actions against their best interests. This can also happen online as well maybe you will get a message, or a warning pop-up often on unsafe sites as previously mentioned, you should not click on these links.

Identity Fraud GIF by Team Coco - Find & Share on GIPHY

Prevention and protection against Phishing

Protection

The best protection is awareness and education, if you are aware and careful you will likely never fall victim to this scam. Don’t open attachments or links in unsolicited emails, even if the emails came from a recognized source. If the email is unexpected, be wary about opening the attachment and verify the URL.

Star Wars Tech GIF by UAB Information Technology - Find & Share on GIPHY

Protection

If you do fall victim to phishing, you can protect yourself through Two-factor authentication (2FA) which adds an extra verification layer when logging in to applications. 2FA relies on two verifiers: something you know, like a password and username, and something you have, such as a smartphone or credit card. If you lose one layer of protection or your phone is stolen, 2FA prevents the use of compromised data or credentials, since one verifier will not gain you entry. You may also sometimes have a third verifier something you are which is either a fingerprint, an iris scan, or a voiceprint. 

Other methods of protection against phishing include frequently changing your password and not reusing the same password for different applications. So stay safe online and don’t bite when phishers come phishing.

Categories
Digital literacies Information literacies Skills Team TechItUpTuesday

Digital identity – You’re leaving footprints

#TechItUpTuesday

Digital footprints

So, what is meant by your digital footprint, well whenever you use the internet you’re leaving a series of digital footprints. These footprints are the lasting impression of all the activities you perform online. Your digital footprints can be seen by others, particularly if you are using social networks like Facebook and Twitter.

Video Looking GIF by Polyvinyl Records - Find & Share on GIPHY

Sometimes these footprints can be hidden, such as your order history on Amazon, your PayPal purchases, or your searched terms on browsers like Google or Bing. Although most users on the internet cannot see these particular footprints, they are still lasting impressions about you stored online. Therefore, you need to ask yourself if you trust every website and service that you use to keep your data secure and use it appropriately.

Though it is impossible to have no footprint if you use the internet, there are ways to reduce your footprint. This video explains what your digital footprint is and how to reduce it.

Digital identity

All the information that you share online contributes to your digital identity. Your identity is made of what you share online, however, it may include things you didn’t consciously share. For this reason, you need to carefully manage your online activities and curate your online identity.

The Office GIF - Find & Share on GIPHY

Many individuals form multiple identities online. Sometimes this is to keep personal, business, and/or study in separate digital spheres to stop personal issues from blending into professional spaces. Others construct online identities as pseudonyms to isolate their true selves from their online activity. This can be to protect personal information about themselves, to hide something they think is embarrassing, or to cover up criminal activity.

Having multiple identities online in most cases (with the exception of criminal activity) is completely fine and often the services people use online encourage this. This doesn’t mean making yourself a completely different person online is okay for example Facebook encourages people to connect with friends and family whereas LinkedIn encourages people to act professionally and connect with colleagues and business professionals. This leads people to act differently on each service, creating unique identities for each service. This kind of isolation is useful as it ensures what you share is appropriate to the audience. However, just as you may be creating your own digital identities, you need to be aware that other users are also doing the same.

Check out this site for some more useful tips on managing their digital footprint.

Categories
Information literacies Skills Team TechItUpTuesday

Using databases

#TechItUpTuesday

Graphic with a pencil on paper

What are databases?

A database is a system that makes it easy to search, select and store information. These databases will usually contain journal articles, but might also hold legal cases, statistical datasets, news archives, videos, geological maps, and much more. In the case of The University Of Hull and many other universities, the Library buys subscriptions to hundreds of databases that are made available to students and staff through the library website

A picture of a hand pointing at a screen with text and various icons floating around the outside.

How do I use databases?

You could just search for your topic when using databases but it is much better to plan your search strategy. Otherwise, you may spend hours searching to find what you want. Here is an outline of how to carry out your strategy.

Visual representation of your search strategy with five key points

1. Identify key terms

The first step is to identify key terms. It is important to consider the keywords related to your search topic and establish the appropriate terms to search. Rather than entering a whole assignment/project title, you need to pick out the important words that describe your topic. The database will only look for what you type in, so for each keyword, you need to apply a few search tips.

  • Synonyms (a word or phrase that means exactly or nearly the same as another word or phrase) and related terms.
  • Consider American spellings and terminologies
  • Take into account Formal and informal terminology
  • Think about word endings and plurals for example instead of “Educate” maybe consider other endings like “Education”.
  • Acronyms and abbreviations can also be used for some words and phrases as well as some organisations
Trump Words GIF by moodman - Find & Share on GIPHY

2. Combine key terms

Next, you need to combine your terms using Boolean operators. Boolean consists of connectors that combine your search terms. Let’s take a look at how to use Boolean operators to help us get appropriate results.

This shows a venn diagram that demonstrates the use of the AND operator to link social media and teenagers. It only finds content that contain both. Content with only one will not appear in such a search

Use AND to combine and find information on all of your search terms. This will narrow your search. When using AND, you only receive pages including both of your search terms, though not next to each other. For your assignment, search for ‘social media AND teenagers’ to get results including social media specific to teenagers.

This shows a venn diagram that demonstrates the use of the OR operator to link teenagers and teens. It finds content that contain both teens, teenagers or both

Use OR to look for alternative terms, phrases or synonyms to broaden your search. When using OR, you receive pages containing one of or both of your search terms. For your assignment, search for ‘Teenagers OR Adolescents’ to get results including teenagers or adolescents, or both.

This shows a venn diagram that demonstrates the use of the OR operator to link teenagers and NOT pre-teens. It only finds content that contains teenagers alone. If content also included pre-teens it would be excluded

Use NOT to exclude a certain term and narrow your search. The NOT operator is used to find pages including only the first term and not the second term. For your assignment, search for ‘Teenagers NOT Adults’ to get results specific to teenagers only and not get any results related to adults.

3. Search techniques

You also need to consider some additional search techniques that can improve the relevancy and number of your results. These will consider things like different spellings, plural words, similar and related words, different words for the same concept. You do not want to miss a key paper because the author used “social networking” and you had only searched for “social media”! The main techniques to help with this are explained in the list below.

GIF showing a man searching for clues

Truncation

This ensures that all relevant articles are retrieved. It will often be an asterisk * which is placed at the stem of the word. Truncating will look for variant endings and plurals.

Phrase searching

Enclose your search terms within double quotation marks, i.e “social media”. This will avoid databases automatically inserting an “AND” between your search terms.

Wildcards

Use wildcards to improve your search. Different databases use different symbols. For example, on the EBSCOhost database, ? replaces one character, # replaces one or more.

Proximity

Narrow and focus your search, e.g. proximity searching. You can use operators NEAR (often N), Adjacent (ADJ) or SAME (in Web of Science). In some databases, you can specify the distances between search words, for example, in the EBSCOhost databases (such as Academic Search Premier, Business Source Premier and Cinahl).

4. Refine your search

The fourth stage is effectively repeating the other stages by further refining your search. If your search doesn’t find enough results consider adding more synonyms or a broader topic. For example instead of Henry VIII try searching for Tudors instead. Although if your search finds too many maybe combine more keywords or limit the date ranges or language to just English. You could also limit your search based on the material, so maybe just search for news archives or add more words to a proximity search.

Angry Jimmy Fallon GIF by The Tonight Show Starring Jimmy Fallon - Find & Share on GIPHY

5. Save your search strategy

The final stage is to save your strategy so you don’t have to repeat this process if you want to find your chosen article again.. The video below goes through the process of an advanced search for journal articles in the Ebsco database Academic Search Premier. The techniques seen in the video can be applied to all databases that the Library subscribes to.

Recommended databases

Now that we know what databases are and how to use them I just thought I’d give you a few recommendations. These are a few databases I think many of you will find most useful at university and beyond depending on your career path.

JSTOR logo
EBSCO logo
Oxford Journals logo