10 Matching Annotations
  1. Mar 2018
    1. J.M. Berger Former Brookings Expert

      Paying attention to the qualifications of the author(s)/composer(s) is another crucial role in crap detection at it will help discern whether or not to take the piece seriously or to use it for further research.

    2. Markaz

      In the Rheinghold text , he explains the importance of pay attention the website layout as well as content. However, in doing so, you must tune your crap detection and remember that not everything with a fancy layout is reliable, and vice versa.

    3. I took a detailed look at how ISIS functions online, breaking it down into a five-part template, which can be implemented in different ways depending on the target’s disposition:

      Rather than simply stating information, the author (Berger) explains his source and the way in which he broke his research down into smaller categories. This citation is also apart of crap detection with a reliable source.

    4. detected through social media analysis,

      The implementing of this specific link gives important attribution and increases source reliability. The text makes a statement and is able to back it up with an external, secure source.

    5. there are practical and ethical limits to how much we can interdict discovery.

      Though Rheinghold stresses the importance of crap detection and researching your sources, he accepts the fact that there a limits that we reach in terms of discernment of validity. This is shown as the ISIS busters reach ethical and practical limits of search. It is important in the way that one mustn't get overwhelmed with finding the true source origin because you can only go so far.

    6. stripping away the mystique and focusing on the mechanics.

      Rheinghold stresses the importance of looking at the base of things, rather than simply the makeup and what you see initially, it is important to dig deeper and look at sources from a questionable yet structured angle.

    7. Monday, November 9, 2015

      The article ends in 'edu' which, as Rheinghold states, increases estimation of its credibility.

    8. This post originally appeared on VOX-Pol.

      Considering that the origin of this post comes from a non-secure site, that appears a tad amateur - also brings forth speculation. It is a blog site, and considering this - I somehow take what is posted 'with a grain of salt'.

    9. How does ISIS acquire new recruits online and convince them to take action? J.M. Berger explains, arguing that efforts to counter terrorists’ online activity can be more effective if the mechanics are clearly understood.

      I begin critiquing this article based on Rheinghold's initial conversation with his daughter. In the text Rheinghold suggests using a free internet service - Whois , in order to search for validity in research. After plugging this domain name into the site, I find that the name of the registered owner is 'Educase'. Educase is a nonprofit core data service for research and analysis.

    10. How terrorists recruit online (and how to stop it)

      I will be connecting this text through Howard Rheinghold's "Crap Detection 101" from chapter 2 of his book Net Smart - How to Thrive Online. This allows for further critic of this article in terms of this theme.