Classifying News Sources With a Venn-Diagram Mapping Strategy

tumblr_oi4gpt2iaw1qb05two1_1280-1

See larger image below.

How to scrutinize, classify, organize, and evaluate today’s media — as much as possible, online and off? That’s the question.

As we search for ideas that can help young people explore news sources, evaluate their preferences, examine how the media outlets identify and share facts, we mustn’t forget incorporating the the opportunity to talk with one another about the perspective that each source brings to its news-sharing. Recently I found Vanessa Otero’s interesting diagram that demonstrates how we can focus on media sources as well as consider their viewpoints and biases.

Evaluating 21st Century news is more complex than it’s ever was in the 20th Century. Reading the news is de-emphasized and watching the news is more prevalent, so we don’t interact much with information sources. The Internet and cable television channels allow opinions or made-up stories to masquerade as news sources — even when those opinions have no credible or factual source. Social media amplifies everything. Truth and expertise are incidental.                                                                             Continue reading

U.S. Government to Search Social Media Accounts for Security Clearances

Who’s data is it?

Who’s data is it?

Are there specific situations when others — people we do not know — check out and examine our social media data?

An article in the Washington Post, U.S. to Scan Social Media Accounts Before Issuing Security Clearances, describes a directive issued by James Clapper, the Director of National Intelligence, about searching social media files.

According to officials responsible for formulating policy and implementing the directive, future government employment security clearance investigations will include a search of social media content. Applicants will not be asked for passwords and investigators will not log into (or break into) accounts. Investigators will seek to identity the range an individual’s public content, looking for information that might raise red flags and adversely affect a decision to give a person a security clearance.

Continue reading