This study explores how journalists in highspeed newsrooms gather information, how gathering activities are temporally structured and how reliability manifests itself in information-gathering activities.
DOCUMENT
The aim of this study was to understand the motives for using the Internet, and its associations with users' attitudes, social values, and relational involvement. Also, this study attempted to crossculturally compare the difference in the pattern of motives and the associations among three countries ' the US, the Netherlands, and S. Korea. The design of methods was based on examination and revision of uses and gratification approach toward Internet users. Findings from factor analysis revealed that information seeking and Self-Improvement were the dominant and common reasons for using the Internet across three countries. The differences in the composition of motives in each country were also reported. Strong correlations across countries were found between all the motives and satisfaction of the Internet. Expectation and positive evaluation of the Internet were also important attitudes associated with Internet use motives. Postmaterialist value showed strong association with motives of information seeking and Self-Improvement. Community involvement was significantly associated with Internet use motives in Korean users.
DOCUMENT
Currently, promising new tools are under development that will enable crime scene investigators to analyze fingerprints or DNA-traces at the crime scene. While these technologies could help to find a perpetrator early in the investigation, they may also strengthen confirmation bias when an incorrect scenario directs the investigation this early. In this study, 40 experienced Crime scene investigators (CSIs) investigated a mock crime scene to study the influence of rapid identification technologies on the investigation. This initial study shows that receiving identification information during the investigation results in more accurate scenarios. CSIs in general are not as much reconstructing the event that took place, but rather have a “who done it routine.” Their focus is on finding perpetrator traces with the risk of missing important information at the start of the investigation. Furthermore, identification information was mostly integrated in their final scenarios when the results of the analysis matched their expectations. CSIs have the tendency to look for confirmation, but the technology has no influence on this tendency. CSIs should be made aware of the risks of this strategy as important offender information could be missed or innocent people could be wrongfully accused.
DOCUMENT