{"id":119,"date":"2017-09-21T13:49:27","date_gmt":"2017-09-21T13:49:27","guid":{"rendered":"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/?page_id=119"},"modified":"2017-12-05T19:57:16","modified_gmt":"2017-12-05T19:57:16","slug":"schedule","status":"publish","type":"page","link":"https:\/\/wordpress.cs.vt.edu\/cs6724f17\/schedule\/","title":{"rendered":"Schedule"},"content":{"rendered":"<table id=\"schedule\">\n<tr>\n<th>Date<\/th>\n<th>Topic<\/th>\n<th>Readings<\/th>\n<th>Leader<\/th>\n<th>Assignments<\/th>\n<\/tr>\n<tr>\n<td>T 8\/29<\/td>\n<td>Welcome<\/td>\n<td>Introductions and review syllabus<\/td>\n<td><\/td>\n<td>Introduce project<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">R 8\/31<\/td>\n<td rowspan=\"3\">Overview<\/td>\n<td>\n    Yardley, E., Lynes, A. G. T., Wilson, D., &amp; Kelly, E. (2016). <a href=\"https:\/\/doi.org\/10.1177\/1741659016674045\">What\u2019s the deal with \u2018websleuthing\u2019? News media representations of amateur detectives in networked spaces<\/a>. <i>Crime, Media, Culture<\/i>.\n    <\/td>\n<td>Dr. Luther<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/08\/30\/whats-the-deal-with-websleuthing-news-media-representations-of-amateur-detectives-in-networked-spaces\/\">Summary<\/a><\/td>\n<td rowspan=\"3\"><\/td>\n<\/tr>\n<tr>\n<td>\n    Madrigal, A. C. (2013, April 19). <a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2013\/04\/-bostonbombing-the-anatomy-of-a-misinformation-disaster\/275155\/\">#BostonBombing: The Anatomy of a Misinformation Disaster<\/a>. <i>The Atlantic<\/i>.\n    <\/td>\n<td>Dr. Luther<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/08\/30\/bostonbombing-the-anatomy-of-a-misinformation-disaster\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"https:\/\/tineye.com\/\">Tineye<\/a>\n    <\/td>\n<td>Dr. Luther<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/08\/30\/tineye\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">T 9\/5<\/td>\n<td rowspan=\"3\">Tech: Verification<\/td>\n<td>\n    Kriplean, T., Bonnar, C., Borning, A., Kinney, B., &amp; Gill, B. (2014). <a href=\"https:\/\/doi.org\/10.1145\/2531602.2531677\">Integrating On-demand Fact-checking with Public Dialogue<\/a>. In <i>Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work &amp; Social Computing<\/i> (pp. 1188\u20131199). New York, NY, USA: ACM.\n    <\/td>\n<td>Sukrit<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/04\/integrating-on-demand-fact-checking-with-public-dialogue\/\">Summary<\/a><\/td>\n<td rowspan=\"3\"><\/td>\n<\/tr>\n<tr>\n<td>\n      Chapters 1, 3, 6, and 7 of:<br \/>\n      Silverman, C. (Ed.). (2014). <a href=\"http:\/\/verificationhandbook.com\/book\/\"><i>The Verification Handbook: A Definitive Guide to Verifying Digital Content for Emergency Coverage<\/i><\/a>.\n    <\/td>\n<td>Chiguy<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/04\/silverman-c-ed-2014-the-verification-handbook-a-definitive-guide-to-verifying-digital-content-for-emergency-coverage\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n        Demo: <a href=\"http:\/\/www.mturk.com\">Amazon Mechanical Turk<\/a>\n    <\/td>\n<td>Leanna<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/03\/amazon-mechanical-turk\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>R 9\/7<\/td>\n<td>Instructor out<\/td>\n<td>\n    Watch on your own:<\/p>\n<p>    <a href=\"https:\/\/www.youtube.com\/watch?v=NsnfklNmgs0&amp;vl=en\"><i>Digital Civilian Detectives<\/i><\/a> (video)\n    <\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\">T 9\/12<\/td>\n<td rowspan=\"4\">Domain: Journalism<\/td>\n<td>\n    Brandtzaeg, P. B., L\u00fcders, M., Spangenberg, J., Rath-Wiggins, L., &amp; F\u00f8lstad, A. (2016). <a href=\"https:\/\/doi.org\/10.1080\/17512786.2015.1020331\">Emerging Journalistic Verification Practices Concerning Social Media<\/a>. <i>Journalism Practice<\/i>, 10(3), 323\u2013342.\n    <\/td>\n<td>Momen<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/11\/emerging-journalistic-verification-practices-concerning-social-media\/\">Summary<\/a><\/td>\n<td rowspan=\"4\"><\/td>\n<\/tr>\n<tr>\n<td>\n    Aitamurto, T. (2015). <a href=\"http:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/3481\/1502\">Motivation Factors in Crowdsourced Journalism: Social Impact, Social Change, and Peer Learning<\/a>. <i>International Journal of Communication<\/i>, 9(0), 21.\n    <\/td>\n<td>Rifat<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/11\/motivation-factors-in-crowdsourced-journalism-social-impact-social-change-and-peer-learning\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"https:\/\/www.galaxyzoo.org\/\">Galaxy Zoo<\/a>\n    <\/td>\n<td>Lee<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/11\/galaxy-zoo-a-citizen-science-application\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>Website: <a href=\"https:\/\/www.bellingcat.com\/\">Bellingcat<\/a><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\">R 9\/14<\/td>\n<td rowspan=\"4\">Issue: Vigilantism<\/td>\n<td>\n    Trottier, D. (2016). <a href=\"https:\/\/doi.org\/10.1007\/s13347-016-0216-4\">Digital Vigilantism as Weaponisation of Visibility<\/a>. <i>Philosophy &amp; Technology<\/i>, 1\u201318.\n    <\/td>\n<td>Lee<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/13\/digital-vigilantism-as-weaponisation-of-visibility\/\">Summary<\/a><\/td>\n<td rowspan=\"4\">Pitches due<\/td>\n<\/tr>\n<tr>\n<td>\n    Nhan, J., Huey, L., &amp; Broll, R. (2017). <a href=\"https:\/\/doi.org\/10.1093\/bjc\/azv118\">Digilantism: An Analysis of Crowdsourcing and the Boston Marathon Bombings<\/a>. <i>The British Journal of Criminology<\/i>, 57(2), 341\u2013361.\n    <\/td>\n<td>Leanna<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/13\/digilantism-an-analysis-of-crowdsourcing-and-the-boston-marathon-bombings\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Optional: Gao, L., &amp; Stanyer, J. (2014). <a href=\"https:\/\/doi.org\/10.1080\/1369118X.2013.836553\">Hunting corrupt officials online: the human flesh search engine and the search for justice in China<\/a>. <i>Information, Communication &amp; Society<\/i>, 17(7), 814\u2013829.\n    <\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>\n    Demo: <a href=\"https:\/\/www.mapillary.com\/\">Mapillary<\/a>\n    <\/td>\n<td>Annie<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/13\/mapillary-summary\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">T 9\/19<\/td>\n<td rowspan=\"3\">Tech: Sensemaking<\/td>\n<td>\n    Goyal, N., &amp; Fussell, S. R. (2016). <a href=\"https:\/\/doi.org\/10.1145\/2818048.2820071\">Effects of Sensemaking Translucence on Distributed Collaborative Analysis<\/a>. In <i>Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work &amp; Social Computing<\/i> (pp. 288\u2013302). New York, NY, USA: ACM.\n    <\/td>\n<td>Annie<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/18\/effects-of-sensemaking-translucence-on-distributed-collaborative-analysis\/\">Summary<\/a><\/td>\n<td rowspan=\"3\"><\/td>\n<\/tr>\n<tr>\n<td>\n    Kittur, A., Peters, A. M., Diriye, A., &amp; Bove, M. (2014). <a href=\"https:\/\/doi.org\/10.1145\/2531602.2531644\">Standing on the Schemas of Giants: Socially Augmented Information Foraging<\/a>. In <i>Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work &#038; Social Computing<\/i> (pp. 999\u20131010). New York, NY, USA: ACM.\n    <\/td>\n<td>Emma<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/17\/standing-on-the-schemas-of-giants-socially-augmented-information-foraging\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n    Demo: <a href=\"http:\/\/www.ban.jo\">Banjo<\/a>\n    <\/td>\n<td>Dr. Luther<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">R 9\/21<\/td>\n<td rowspan=\"3\">Domain: Crime<\/td>\n<td>\n    Lewis, S., &amp; Lewis, D. A. (2012). <a href=\"http:\/\/dl.acm.org\/citation.cfm?doid=2207676.2208595\">Examining technology that supports community policing<\/a>. In <i>Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems<\/i> (pp. 1371\u20131380). New York, NY, USA: ACM.\n    <\/td>\n<td>Rifat<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/20\/examining-technology-that-supports-community-policing\/\">Summary<\/a><\/td>\n<td rowspan=\"3\"><\/td>\n<\/tr>\n<tr>\n<td>\n      Trottier, D. (2014). <a href=\"http:\/\/www.austlii.edu.au\/au\/journals\/JlLawInfoSci\/2014\/4.html\">Police and user-led investigations on social media<\/a>. <i>Journal of Law, Information and Science<\/i>, 23(1).\n    <\/td>\n<td>Leanna<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/20\/police-and-user-led-investigations-on-social-media\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"https:\/\/meedan.com\/en\/check\/\">Check<\/a>\n    <\/td>\n<td>Tianyi<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/20\/check-collaborative-fact-checking\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">T 9\/26<\/td>\n<td rowspan=\"3\">Issue: Identity<\/td>\n<td>\n    Douglas, D. M. (2016). <a href=\"https:\/\/doi.org\/10.1007\/s10676-016-9406-0\">Doxing: a conceptual analysis<\/a>. <i>Ethics and Information Technology<\/i>, 18(3), 199\u2013210.\n    <\/td>\n<td>Momen<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/25\/doxing-a-conceptual-analysis\/\">Summary<\/a><\/td>\n<td rowspan=\"3\"><\/td>\n<\/tr>\n<tr>\n<td>\n    Bernstein, M. S., Monroy-Hernandez, A., Harry, D., Andr\u00e9, P., &amp; Panovich, K. (2011). <a href=\"https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM11\/paper\/viewFile\/2873\/4398\">4chan and \/b\/: An Analysis of Anonymity and Ephemerality in a Large Online Community<\/a>. In <i>Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media<\/i>.\n    <\/td>\n<td>Tianyi<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/24\/4chan-and-b-an-analysis-of-anonymity-and-ephemerality-in-a-large-online-community\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"https:\/\/www.shodan.io\/\">Shodan<\/a>\n    <\/td>\n<td>Emma<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/24\/shodan\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">R 9\/28<\/td>\n<td rowspan=\"3\">Tech: Mobile<\/td>\n<td>\n    Agapie, E., Teevan, J., &amp; Monroy-Hern\u00e1ndez, A. (2015). <a href=\"http:\/\/www.aaai.org\/ocs\/index.php\/HCOMP\/HCOMP15\/paper\/view\/11595\">Crowdsourcing in the Field: A Case Study Using Local Crowds for Event Reporting<\/a>. In <i>Third AAAI Conference on Human Computation and Crowdsourcing<\/i>.\n    <\/td>\n<td>Chiguy<br \/>\n    <br \/>\n    <a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/25\/ad-hoc-crowd-sourced-reporters-on-the-rise\/\">Summary<\/a><\/td>\n<td rowspan=\"3\"><\/td>\n<\/tr>\n<tr>\n<td>\n    Dimond, J. P., Dye, M., Larose, D., &amp; Bruckman, A. S. (2013). <a href=\"https:\/\/doi.org\/10.1145\/2441776.2441831\">Hollaback!: The Role of Storytelling Online in a Social Movement Organization<\/a>. In <i>Proceedings of the 2013 Conference on Computer Supported Cooperative Work<\/i> (pp. 477\u2013490). New York, NY, USA: ACM.\n    <\/td>\n<td>Lee<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/27\/hollaback\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"https:\/\/techcrunch.com\/2017\/06\/21\/snap-map\/\">Snap-Map<\/a>\n    <\/td>\n<td>Sukrit<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/09\/25\/tech-demo-snap-map\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>T 10\/3<\/td>\n<td>Media portrayals<\/td>\n<td>\n    <a href=\"http:\/\/www.cbs.com\/shows\/wisdom-of-the-crowd\/\"><i>Wisdom of the Crowd<\/i><\/a>\n    <\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">R 10\/5<\/td>\n<td rowspan=\"3\">Domain: Human rights<\/td>\n<td>\n    Edwards, S., &amp; Koettl, C. (2011). <a href=\"http:\/\/hir.harvard.edu\/article\/?a=2807\">Looking to the Sky: Monitoring Human Rights through Remote Sensing<\/a>. <i>Harvard International Review<\/i>; Cambridge, 32(4), 66\u201371.\n    <\/td>\n<td>Momen<br \/>\n    <a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/04\/looking-to-the-sky-monitoring-human-rights-through-remote-sensing\/\">Summary<\/a><\/td>\n<td rowspan=\"3\"><\/td>\n<\/tr>\n<tr>\n<td>\n    Hanham, M. (2015, July 9). <a href=\"http:\/\/www.38north.org\/2015\/07\/mhanham070915\/\">Kim Jong Un Tours Pesticide Facility Capable of Producing Biological Weapons<\/a>. <i>38North<\/i>.\n    <\/td>\n<td>Tianyi<br \/>\n    <a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/04\/kim-jong-un-tours-pesticide-facility-capable-of-producing-biological-weapons\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"http:\/\/www.nltk.org\/\">Natural Language Toolkit (NLTK)<\/a>\n    <\/td>\n<td>Emma<br \/>\n    <a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/04\/nltk-the-natural-language-toolkit\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>T 10\/10<\/td>\n<td>Peer feedback #1<\/td>\n<td>\n      Leanna<br \/>\n      Lee<br \/>\n      Rifat<br \/>\n      Tianyi\n    <\/td>\n<td><\/td>\n<td>Presentation #1<\/td>\n<\/tr>\n<tr>\n<td>R 10\/12<\/td>\n<td>Peer feedback #1<\/td>\n<td>\n      Emma<br \/>\n      Chiguy<br \/>\n      Momen<br \/>\n      Sukrit\n    <\/td>\n<td><\/td>\n<td>Presentation #1<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">T 10\/17<\/td>\n<td rowspan=\"3\">Issue: Shame<\/td>\n<td>\n      <a href=\"https:\/\/canvas.vt.edu\/files\/5120767\/download?download_frd=1\">Chapter 4<\/a> of Ronson, J. (2015). <i>So You\u2019ve Been Publicly Shamed<\/i>. New York: Riverhead Books. <strong>Warning: Contains offensive language and threats of violence.<\/strong>\n    <\/td>\n<td>Emma<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/10\/so-youve-been-publicly-shamed-chapter-4\/\">Summary<\/a><\/td>\n<td rowspan=\"3\"><\/td>\n<\/tr>\n<tr>\n<td>\n      <a href=\"https:\/\/canvas.vt.edu\/files\/5120768\/download?download_frd=1\">Chapter 6<\/a> of Ronson, J. (2015). <i>So You\u2019ve Been Publicly Shamed<\/i>. New York: Riverhead Books. <strong>Warning: Contains offensive language and threats of violence.<\/strong>\n    <\/td>\n<td>Leanna<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/16\/doing-something-good\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"https:\/\/timeline.knightlab.com\/\">Timeline JS<\/a>\n    <\/td>\n<td>Tianyi<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/15\/demo-timeline-js-easy-to-make-beautiful-timelines\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">R 10\/19<\/td>\n<td rowspan=\"3\">Tech: Biometrics<\/td>\n<td>\n    Davis, J. P., Jansari, A., &amp; Lander, K. (2013). <a href=\"https:\/\/thepsychologist.bps.org.uk\/volume-26\/edition-10\/i-never-forget-face\">I never forget a face!<\/a> <i>The Psychologist<\/i>, 26, 726\u2013729.\n    <\/td>\n<td>Leanna<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/18\/i-never-forget-a-face\/\">Summary<\/a><\/td>\n<td rowspan=\"3\">Recommended: Draft of introduction<\/td>\n<\/tr>\n<tr>\n<td>\n    Toobin, J. (2007, April 30). <a href=\"https:\/\/www.newyorker.com\/magazine\/2007\/05\/07\/the-csi-effect\">The CSI Effect<\/a>. <i>The New Yorker<\/i>.\n    <\/td>\n<td>Rifat<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/18\/the-csi-effect-the-truth-about-forensic-science\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"https:\/\/www.truthfinder.com\/\">Truthfinder<\/a>\n    <\/td>\n<td>Momen<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/18\/demo-truthfinder\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>T 10\/24<\/td>\n<td>Instructor out<\/td>\n<td>\n<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">R 10\/26<\/td>\n<td rowspan=\"3\">Issue: Security<br \/>(Guest: <a href=\"http:\/\/people.cs.vt.edu\/gangwang\/\">Prof. Gang Wang<\/a>)<\/td>\n<td>\n      Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, and Ben Y. Zhao. 2012. <a href=\"http:\/\/dx.doi.org\/10.1145\/2187836.2187928\">Serf and turf: crowdturfing for fun and profit<\/a>. In <i>Proceedings of the 21st international conference on World Wide Web (WWW &#8217;12)<\/i>. ACM, New York, NY, USA, 679-688.\n    <\/td>\n<td>Chiguy<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/25\/its-not-steak-and-lobster-but-maybe-it-can-become-that\/\">Summary<\/a><\/td>\n<td rowspan=\"3\">Recommended: Draft of related work<\/td>\n<\/tr>\n<tr>\n<td>\n      Lasecki, W. S., Teevan, J., &amp; Kamar, E. (2014). <a href=\"https:\/\/doi.org\/10.1145\/2531602.2531733\">Information Extraction and Manipulation Threats in Crowd-powered Systems<\/a>. In <i>Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work &amp; Social Computing<\/i> (pp. 248\u2013256). New York, NY, USA: ACM.\n    <\/td>\n<td>Chiguy<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/25\/273\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"https:\/\/www.gdeltproject.org\/\">GDELT<\/a>\n    <\/td>\n<td>Leanna<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/25\/global-database-of-events-language-and-tone\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">T 10\/31<\/td>\n<td rowspan=\"3\">Domain: Crisis<\/td>\n<td>\n    Bica, M., Palen, L., &amp; Bopp, C. (2017). <a href=\"https:\/\/doi.org\/10.1145\/2998181.2998212\">Visual Representations of Disaster<\/a>. In <i>Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing<\/i> (pp. 1262\u20131276). New York, NY, USA: ACM.\n    <\/td>\n<td>Tianyi<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/31\/visual-representations-of-disaster\/\">Summary<\/a><\/td>\n<td rowspan=\"3\"><\/td>\n<\/tr>\n<tr>\n<td>\n    Dailey, D., &amp; Starbird, K. (2014). <a href=\"https:\/\/doi.org\/10.1007\/s10606-014-9208-z\">Journalists as Crowdsourcerers: Responding to Crisis by Reporting with a Crowd<\/a>. <i>Computer Supported Cooperative Work (CSCW)<\/i>, 23(4\u20136), 445\u2013481.\n    <\/td>\n<td>Emma<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/30\/journalists-as-crowdsourcerers-responding-to-crisis-by-reporting-with-a-crowd\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Skype Q&amp;A with <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ted_Humphrey\">Ted Humphrey<\/a>, creator of <a href=\"http:\/\/www.cbs.com\/shows\/wisdom-of-the-crowd\/\"><i>Wisdom of the Crowd<\/i><\/a>\n    <\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">R 11\/2<\/td>\n<td rowspan=\"3\">Issue: Privacy<\/td>\n<td>\n    Lasecki, W. S., Gordon, M., Leung, W., Lim, E., Bigham, J. P., &amp; Dow, S. P. (2015). <a href=\"https:\/\/doi.org\/10.1145\/2702123.2702605\">Exploring Privacy and Accuracy Trade-Offs in Crowdsourced Behavioral Video Coding<\/a>. In <i>Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems<\/i> (pp. 1945\u20131954). New York, NY, USA: ACM.\n    <\/td>\n<td>Sukrit<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/01\/303\/\">Summary<\/a><\/td>\n<td rowspan=\"3\">Recommended: Draft of methods<\/td>\n<\/tr>\n<tr>\n<td>\n    Susan E. McGregor, Elizabeth Anne Watkins, and Kelly Caine. 2017. <a href=\"https:\/\/canvas.vt.edu\/courses\/55238\/files\/4855724\/download?verifier=vGSb1rOQ8p7mvx1unnG5HHgeCivVS3u9RJ7opM2F&amp;wrap=1\">Would You Slack That? The Impact of Security and Privacy on Cooperative Newsroom Work<\/a>. <i>Proc. ACM Hum.-Comput. Interact.<\/i> 1, 2, Article 75 (November 2017), 22 pages.\n    <\/td>\n<td>Lee<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/02\/would-you-slack-that-yeah-probably\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"https:\/\/www.kali.org\/\">Kali Linux<\/a>\n    <\/td>\n<td>Chiguy<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/01\/demo-kali-linux\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>T 11\/7<\/td>\n<td>Peer feedback #2<\/td>\n<td>\n      Leanna<br \/>\n      Sukrit<br \/>\n      Lawrence<br \/>\n      Momen\n    <\/td>\n<td><\/td>\n<td>Presentation #2<\/td>\n<\/tr>\n<tr>\n<td>R 11\/9<\/td>\n<td>Peer feedback #2<\/td>\n<td>\n      Lee<br \/>\n      Rifat<br \/>\n      Tianyi\n    <\/td>\n<td><\/td>\n<td>Presentation #2<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">T 11\/14<\/td>\n<td rowspan=\"3\">Issue: Media effects (Guest: <a href=\"http:\/\/www.michaelhorning.com\/\">Prof. Mike Horning<\/a>)<\/td>\n<td>\n      Horning, M. A. (2017). <a href=\"https:\/\/doi.org\/10.1016\/j.chb.2017.03.023\">Interacting with news: Exploring the effects of modality and perceived responsiveness and control on news source credibility and enjoyment among second screen viewers<\/a>. <i>Computers in Human Behavior<\/i>, 73(Supplement C), 273\u2013283.\n    <\/td>\n<td>Rifat<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/13\/interacting-with-news\/\">Summary<\/a><\/td>\n<td rowspan=\"3\"><\/td>\n<\/tr>\n<tr>\n<td>Ceren Budak, Sharad Goel, Justin M. Rao; <a href=\"https:\/\/doi.org\/10.1093\/poq\/nfw007\">Fair and Balanced? Quantifying Media Bias through Crowdsourced Content Analysis<\/a>, <i>Public Opinion Quarterly<\/i>, Volume 80, Issue S1, 1 January 2016, Pages 250\u2013271.<\/td>\n<td>Chiguy<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/13\/a-way-to-quantify-media-bias\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"http:\/\/wiibrew.org\/wiki\/Main_Page\">Wiibrew<\/a>\n    <\/td>\n<td>Chiguy<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/10\/30\/demowiibrew\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">R 11\/16<\/td>\n<td rowspan=\"3\">Tech: Visualization<\/td>\n<td>\n    Endert, A., Fiaux, P., &amp; North, C. (2012). <a href=\"https:\/\/doi.org\/10.1145\/2207676.2207741\">Semantic Interaction for Visual Text Analytics<\/a>. In <i>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems<\/i> (pp. 473\u2013482). New York, NY, USA: ACM.\n    <\/td>\n<td>Tianyi<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/14\/semantic-interaction-for-visual-text-analytics\/\">Summary<\/a><\/td>\n<td rowspan=\"3\">Recommended: Draft of results<\/td>\n<\/tr>\n<tr>\n<td>\n    Diakopoulos, N., Naaman, M., &amp; Kivran-Swaine, F. (2010). <a href=\"https:\/\/doi.org\/10.1109\/VAST.2010.5652922\">Diamonds in the rough: Social media visual analytics for journalistic inquiry<\/a>. In <i>2010 IEEE Symposium on Visual Analytics Science and Technology<\/i> (pp. 115\u2013122).\n    <\/td>\n<td>Lee<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/16\/social-media-analytics-tool-vox-civitas\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Peer feedback presentation #2\n    <\/td>\n<td>Emma<\/td>\n<\/tr>\n<tr>\n<td>T 11\/21<\/td>\n<td>Thanksgiving break<\/td>\n<td>\n<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>R 11\/23<\/td>\n<td>Thanksgiving break<\/td>\n<td>\n<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">T 11\/28<\/td>\n<td rowspan=\"3\">Issue: Credibility<br \/>\n      <br \/>(Guest: <a href=\"http:\/\/people.cs.vt.edu\/tmitra\/\">Prof. Tanushree Mitra<\/a>)<\/td>\n<td>\n    Mitra, T., &amp; Gilbert, E. (2015). <a href=\"https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM15\/paper\/view\/10582\">CREDBANK: A Large-Scale Social Media Corpus With Associated Credibility Annotations<\/a>. In <i>Ninth International AAAI Conference on Web and Social Media<\/i>. AAAI.\n    <\/td>\n<td>Emma<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/27\/credbank-a-large-scale-social-media-corpus-with-associated-credibility-annotations\/\">Summary<\/a><\/td>\n<td rowspan=\"3\"><\/td>\n<\/tr>\n<tr>\n<td>\n    Morris, M. R., Counts, S., Roseway, A., Hoff, A., &amp; Schwarz, J. (2012). <a href=\"https:\/\/doi.org\/10.1145\/2145204.2145274\">Tweeting is Believing?: Understanding Microblog Credibility Perceptions<\/a>. In <i>Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work<\/i> (pp. 441\u2013450). New York, NY, USA: ACM.\n    <\/td>\n<td>Sukrit<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/27\/tweeting-is-believing-understanding-microblog-credibility-perceptions\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/27\/montage-collaborative-video-tagging\/\">Montage<\/a>\n    <\/td>\n<td>Momen<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">R 11\/30<\/td>\n<td rowspan=\"3\">Domain: History<\/td>\n<td>\n    Rosenzweig, R. (2006). <a href=\"http:\/\/www.jstor.org\/stable\/4486062\">Can History Be Open Source? Wikipedia and the Future of the Past<\/a>. <i>Journal of American History<\/i>, 93(1), 117\u2013146.\n    <\/td>\n<td>Momen<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/29\/can-history-be-open-source\/\">Summary<\/a><\/td>\n<td rowspan=\"3\">Recommended: Draft of discussion<\/td>\n<\/tr>\n<tr>\n<td>\n    Willever-Farr, H. L., &amp; Forte, A. (2014). <a href=\"https:\/\/doi.org\/10.1145\/2531602.2531737\">Family Matters: Control and Conflict in Online Family History Production<\/a>. In <i>Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work &amp; Social Computing<\/i> (pp. 475\u2013486). New York, NY, USA: ACM.\n    <\/td>\n<td>Sukrit<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/29\/family-matters-control-and-conflict-in-online-family-history-production\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n      Demo: <a href=\"http:\/\/dh.mi.ur.de\/\">WebNLP<\/a>\n    <\/td>\n<td>Emma<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/11\/30\/an-update-on-nltk-web-based-gui-nltk-via-webnlp\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\">T 12\/5<\/td>\n<td rowspan=\"4\">Demo day<\/td>\n<td>Demo: <a href=\"https:\/\/www.social-searcher.com\/\">Social Searcher<\/a><\/td>\n<td>Rifat<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/12\/04\/demo-social-searcher\/\">Summary<\/a><\/td>\n<td rowspan=\"4\"><\/td>\n<\/tr>\n<tr>\n<td>Demo: <a href=\"https:\/\/www.snopes.com\/\">Snopes<\/a><\/td>\n<td>Rifat<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/12\/04\/demo-snopes-com\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>Demo: <a href=\"http:\/\/rochci.github.io\/LegionTools\/\">LegionTools<\/a><\/td>\n<td>Sukrit<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/12\/04\/tech-demo-legiontools\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>Demo: <a href=\"https:\/\/nextdoor.com\/\">Nextdoor<\/a><\/td>\n<td>Lee<br \/>\n    <br \/><a href=\"http:\/\/wordpress.cs.vt.edu\/cs6724f17\/2017\/12\/04\/nextdoor-facebook-lite\/\">Summary<\/a><\/td>\n<\/tr>\n<tr>\n<td>R 12\/7<\/td>\n<td>Final project presentations<\/td>\n<td>\n      Momen<br \/>\n      Chiguy<br \/>\n      Sukrit<br \/>\n      Leanna\n    <\/td>\n<td><\/td>\n<td>Final presentation<\/td>\n<\/tr>\n<tr>\n<td>T 12\/12<\/td>\n<td>Final project presentations<\/td>\n<td>\n      Emma<br \/>\n      Rifat<br \/>\n      Tianyi<br \/>\n      Lee\n    <\/td>\n<td><\/td>\n<td>Final presentation<\/td>\n<\/tr>\n<tr>\n<td>R 12\/14<\/td>\n<td>Reading Day<\/td>\n<td>\n<\/td>\n<td><\/td>\n<td>SPOT Survey due<\/td>\n<\/tr>\n<tr>\n<td>F 12\/15<\/td>\n<td><\/td>\n<td>\n<\/td>\n<td><\/td>\n<td>Final project due<\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Date Topic Readings Leader Assignments T 8\/29 Welcome Introductions and review syllabus Introduce project R 8\/31 Overview Yardley, E., Lynes, A. G. T., Wilson, D., &amp; Kelly, E. (2016). What\u2019s the deal with \u2018websleuthing\u2019? News media representations of amateur detectives in networked spaces. Crime, Media, Culture. Dr. Luther Summary Madrigal, A. C. (2013, April 19). [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-119","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/wordpress.cs.vt.edu\/cs6724f17\/wp-json\/wp\/v2\/pages\/119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wordpress.cs.vt.edu\/cs6724f17\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wordpress.cs.vt.edu\/cs6724f17\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.cs.vt.edu\/cs6724f17\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.cs.vt.edu\/cs6724f17\/wp-json\/wp\/v2\/comments?post=119"}],"version-history":[{"count":43,"href":"https:\/\/wordpress.cs.vt.edu\/cs6724f17\/wp-json\/wp\/v2\/pages\/119\/revisions"}],"predecessor-version":[{"id":389,"href":"https:\/\/wordpress.cs.vt.edu\/cs6724f17\/wp-json\/wp\/v2\/pages\/119\/revisions\/389"}],"wp:attachment":[{"href":"https:\/\/wordpress.cs.vt.edu\/cs6724f17\/wp-json\/wp\/v2\/media?parent=119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}