SlideShare a Scribd company logo
1 of 16
Download to read offline
It is the process of verifying
information in non-fictional and
fictional text in order to determine its
veracity and correctness.
Tips from Professor Masato Kajimoto
Be alert when you
see sensational
wordings, emotional,
language,
promotional writing
and obvious
exaggeration in the
headlines.
Ask yourself: Who is
sharing this information?
Is it from someone you
know who often shares
questionable
information? Is the
original producer of the
post known for
partisanship,
sensationalism,
inaccurate reporting or
prank?
News websites and social media accounts could
have been hacked.
Check if other news outlets have the same
story. Journalists do make mistakes.
Before you react. Read
everything. Watch the entire video.
Nuances and contexts are often buried in the
report somewhere in the middle.
Be skeptical about a photo. Suspect
manipulation:
Is it possible that the image has been
altered with software like Photoshop?
Could the image be old or
from another place or about an irrelevant
event?
Vera-Files Fact Check
VERA Files Fact Check tracks the false claims, flip-flops,
misleading statements of public officials and figures, and debunks
them with factual evidence. It also fights misinformation and
disinformation spread on the internet.
Google
Add words like “fake” or “hoax” to news keywords
and search for it.
Google Reverse Image
Use Google reverse image to detect the real information of photos.
Amnesty Int’l. Data Viewer
The YouTube Data Viewer is a web-based video verification tool offered
through The Citizen Evidence Lab, created by Amnesty International. Users
input a YouTube URL, and the tool outputs information about the video that is
helpful in verifying a video.
WRAP UP
❖ False information are being spread rapidly whether
intentional or unintentional. The need for
fact-checking is very essential of being an information
literate.
❖ Spreading unverified information, especially
exaggerated claims and warnings, only causes
unnecessary panic and harm.

More Related Content

What's hot

Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Social Media in Law Enforcement
Social Media in Law EnforcementSocial Media in Law Enforcement
Social Media in Law EnforcementLKinoshita
 
Communication Skills
Communication SkillsCommunication Skills
Communication SkillsMMMTS
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Spam detection using machine learning based binary classifier_043660
Spam detection using machine learning based binary classifier_043660Spam detection using machine learning based binary classifier_043660
Spam detection using machine learning based binary classifier_043660syaidatulamirah
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer VandalismAditya Singh
 

What's hot (20)

Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Social Media in Law Enforcement
Social Media in Law EnforcementSocial Media in Law Enforcement
Social Media in Law Enforcement
 
Communication Skills
Communication SkillsCommunication Skills
Communication Skills
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Siber zorbalik
Siber zorbalikSiber zorbalik
Siber zorbalik
 
Cyber security
Cyber securityCyber security
Cyber security
 
Fake news
Fake newsFake news
Fake news
 
Spam
Spam Spam
Spam
 
Getting the Lowdown on Fake News
Getting the Lowdown on Fake News Getting the Lowdown on Fake News
Getting the Lowdown on Fake News
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Spam detection using machine learning based binary classifier_043660
Spam detection using machine learning based binary classifier_043660Spam detection using machine learning based binary classifier_043660
Spam detection using machine learning based binary classifier_043660
 
Phishing
PhishingPhishing
Phishing
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Email Ethics
Email Ethics Email Ethics
Email Ethics
 
Invasion of Privacy
Invasion of PrivacyInvasion of Privacy
Invasion of Privacy
 

Similar to FACT-CHECKING

10 Ways to Identify Disinformation
10 Ways to Identify Disinformation10 Ways to Identify Disinformation
10 Ways to Identify DisinformationSarah Jackson
 
Fake news presentation lirt summit 2018
Fake news presentation lirt summit 2018Fake news presentation lirt summit 2018
Fake news presentation lirt summit 2018PamelaPfeiffer1
 
How do we guard against social media fake news
How do we guard against social media fake newsHow do we guard against social media fake news
How do we guard against social media fake newschantal le roux
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021Mark Kor
 
Tackling Misinformation, Disinformation, and Hate Speech: Empowering South Su...
Tackling Misinformation, Disinformation, and Hate Speech: Empowering South Su...Tackling Misinformation, Disinformation, and Hate Speech: Empowering South Su...
Tackling Misinformation, Disinformation, and Hate Speech: Empowering South Su...Excellence Foundation for South Sudan
 
B.S. Detection for Journalists
B.S. Detection for JournalistsB.S. Detection for Journalists
B.S. Detection for JournalistsMandy Jenkins
 
Techhub Riga misinformation meet-up, 15 March 2018
Techhub Riga misinformation meet-up, 15 March 2018Techhub Riga misinformation meet-up, 15 March 2018
Techhub Riga misinformation meet-up, 15 March 2018Mārtiņš Vaivars
 
Social-Media-Strategy for students to manage platforms
Social-Media-Strategy for students to manage platformsSocial-Media-Strategy for students to manage platforms
Social-Media-Strategy for students to manage platformsantoniokisembo
 
Fact-checking in an Era of Fake News and Misinformation
Fact-checking in an Era of Fake News and MisinformationFact-checking in an Era of Fake News and Misinformation
Fact-checking in an Era of Fake News and MisinformationDavid Nzoputa Ofili
 
Barry’s YALILearns session on Media Literacy.pptx
Barry’s YALILearns session on Media Literacy.pptxBarry’s YALILearns session on Media Literacy.pptx
Barry’s YALILearns session on Media Literacy.pptxBarryAssangwingNkemo
 
Epic Of Gilgamesh Hero Essay
Epic Of Gilgamesh Hero EssayEpic Of Gilgamesh Hero Essay
Epic Of Gilgamesh Hero EssayCarrie Marie
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishingecarrow
 
Why is the news important.pptx
Why is the news important.pptxWhy is the news important.pptx
Why is the news important.pptxHatchuMatchu
 
Media and Information Module 3 Presentation
Media and Information Module 3 PresentationMedia and Information Module 3 Presentation
Media and Information Module 3 PresentationMarla Firmalino
 
Utilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionUtilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionSarah K Miller
 
Domestic Violence and The Workplace: Everybody’s Business - By Compliance Glo...
Domestic Violence and The Workplace: Everybody’s Business - By Compliance Glo...Domestic Violence and The Workplace: Everybody’s Business - By Compliance Glo...
Domestic Violence and The Workplace: Everybody’s Business - By Compliance Glo...Compliance Global Inc
 
Dealing with the media2
Dealing with the media2Dealing with the media2
Dealing with the media2Eric Johnston
 
CriteriaPoints PossiblePoints EarnedCommentsContentInt.docx
CriteriaPoints PossiblePoints EarnedCommentsContentInt.docxCriteriaPoints PossiblePoints EarnedCommentsContentInt.docx
CriteriaPoints PossiblePoints EarnedCommentsContentInt.docxannettsparrow
 

Similar to FACT-CHECKING (20)

10 Ways to Identify Disinformation
10 Ways to Identify Disinformation10 Ways to Identify Disinformation
10 Ways to Identify Disinformation
 
Tips to spot false news
Tips to spot false newsTips to spot false news
Tips to spot false news
 
Fake news presentation lirt summit 2018
Fake news presentation lirt summit 2018Fake news presentation lirt summit 2018
Fake news presentation lirt summit 2018
 
How do we guard against social media fake news
How do we guard against social media fake newsHow do we guard against social media fake news
How do we guard against social media fake news
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021
 
Tackling Misinformation, Disinformation, and Hate Speech: Empowering South Su...
Tackling Misinformation, Disinformation, and Hate Speech: Empowering South Su...Tackling Misinformation, Disinformation, and Hate Speech: Empowering South Su...
Tackling Misinformation, Disinformation, and Hate Speech: Empowering South Su...
 
B.S. Detection for Journalists
B.S. Detection for JournalistsB.S. Detection for Journalists
B.S. Detection for Journalists
 
Techhub Riga misinformation meet-up, 15 March 2018
Techhub Riga misinformation meet-up, 15 March 2018Techhub Riga misinformation meet-up, 15 March 2018
Techhub Riga misinformation meet-up, 15 March 2018
 
Social-Media-Strategy for students to manage platforms
Social-Media-Strategy for students to manage platformsSocial-Media-Strategy for students to manage platforms
Social-Media-Strategy for students to manage platforms
 
Fact-checking in an Era of Fake News and Misinformation
Fact-checking in an Era of Fake News and MisinformationFact-checking in an Era of Fake News and Misinformation
Fact-checking in an Era of Fake News and Misinformation
 
Beyond fake news
Beyond fake newsBeyond fake news
Beyond fake news
 
Barry’s YALILearns session on Media Literacy.pptx
Barry’s YALILearns session on Media Literacy.pptxBarry’s YALILearns session on Media Literacy.pptx
Barry’s YALILearns session on Media Literacy.pptx
 
Epic Of Gilgamesh Hero Essay
Epic Of Gilgamesh Hero EssayEpic Of Gilgamesh Hero Essay
Epic Of Gilgamesh Hero Essay
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Why is the news important.pptx
Why is the news important.pptxWhy is the news important.pptx
Why is the news important.pptx
 
Media and Information Module 3 Presentation
Media and Information Module 3 PresentationMedia and Information Module 3 Presentation
Media and Information Module 3 Presentation
 
Utilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionUtilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist edition
 
Domestic Violence and The Workplace: Everybody’s Business - By Compliance Glo...
Domestic Violence and The Workplace: Everybody’s Business - By Compliance Glo...Domestic Violence and The Workplace: Everybody’s Business - By Compliance Glo...
Domestic Violence and The Workplace: Everybody’s Business - By Compliance Glo...
 
Dealing with the media2
Dealing with the media2Dealing with the media2
Dealing with the media2
 
CriteriaPoints PossiblePoints EarnedCommentsContentInt.docx
CriteriaPoints PossiblePoints EarnedCommentsContentInt.docxCriteriaPoints PossiblePoints EarnedCommentsContentInt.docx
CriteriaPoints PossiblePoints EarnedCommentsContentInt.docx
 

More from Bob Lourence Silagan

More from Bob Lourence Silagan (6)

Squid Game | Reaction Paper
Squid Game | Reaction PaperSquid Game | Reaction Paper
Squid Game | Reaction Paper
 
7 TIPS in Writing a SUMMARY
7 TIPS in Writing a SUMMARY7 TIPS in Writing a SUMMARY
7 TIPS in Writing a SUMMARY
 
MEDIA TYPES
MEDIA TYPESMEDIA TYPES
MEDIA TYPES
 
Brief Lecture about News Literacy
Brief Lecture about News LiteracyBrief Lecture about News Literacy
Brief Lecture about News Literacy
 
Information Literacy
Information LiteracyInformation Literacy
Information Literacy
 
Supporting details
Supporting detailsSupporting details
Supporting details
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

FACT-CHECKING

  • 1.
  • 2. It is the process of verifying information in non-fictional and fictional text in order to determine its veracity and correctness.
  • 3. Tips from Professor Masato Kajimoto
  • 4. Be alert when you see sensational wordings, emotional, language, promotional writing and obvious exaggeration in the headlines.
  • 5. Ask yourself: Who is sharing this information? Is it from someone you know who often shares questionable information? Is the original producer of the post known for partisanship, sensationalism, inaccurate reporting or prank?
  • 6. News websites and social media accounts could have been hacked. Check if other news outlets have the same story. Journalists do make mistakes.
  • 7. Before you react. Read everything. Watch the entire video. Nuances and contexts are often buried in the report somewhere in the middle.
  • 8. Be skeptical about a photo. Suspect manipulation: Is it possible that the image has been altered with software like Photoshop? Could the image be old or from another place or about an irrelevant event?
  • 9.
  • 10.
  • 11.
  • 12. Vera-Files Fact Check VERA Files Fact Check tracks the false claims, flip-flops, misleading statements of public officials and figures, and debunks them with factual evidence. It also fights misinformation and disinformation spread on the internet.
  • 13. Google Add words like “fake” or “hoax” to news keywords and search for it.
  • 14. Google Reverse Image Use Google reverse image to detect the real information of photos.
  • 15. Amnesty Int’l. Data Viewer The YouTube Data Viewer is a web-based video verification tool offered through The Citizen Evidence Lab, created by Amnesty International. Users input a YouTube URL, and the tool outputs information about the video that is helpful in verifying a video.
  • 16. WRAP UP ❖ False information are being spread rapidly whether intentional or unintentional. The need for fact-checking is very essential of being an information literate. ❖ Spreading unverified information, especially exaggerated claims and warnings, only causes unnecessary panic and harm.