How to Fake a Tweet, or How to Spot BS Online

By Hannah Rozear

In a 2019 survey, half of Americans polled say the issue of made-up news and misinformation is a critical problem facing our country (Pew 2019). The proliferation and ease of faking content, paired with the viral nature of news-sharing on social media, has created an imperative for people to learn how to evaluate the information and claims they find online. This workshop will introduce you to media manipulation by highlighting recent examples and will engage participants in a discussion about ways to counteract the flood of mis- and dis-information encountered online. Participants will also learn how easy (and fun) it is to fake a tweet.

  • Social Media

About Course


  • Recent trends and examples of online media manipulation
  • Who are these online media manipulators? Where do they operate? What motivates them?
  • Strategies and tools for investigating questionable content and claims found online
  • Resources for keeping up with research and news on this topic
  • How to fake a tweet


Hannah Rozear

Hannah is a research librarian with a special interest in digital and media literacy. She is co-teaching a course in ISS this semester called, The Googlization of Knowledge: Information, Ethics, & Technology


A good read before the class if you would like to prepare:

Marwick, Alice and Rebecca Lewis, 2017, Media Manipulation and Disinformation Online


Fake-a-Tweet Fake-a-Tweet Fake-a-Tweet

This class is part of our Digital Citizenship Track

See the whole track

Suggested Courses

Branding Workshop

Defending Forward in the Cyber Cool War

Margaret Hu

Come to this workshop to discuss the US position in the current Cyber Cool War. This talk will focus on the use of the term “defend forward” in the 2018 U.S Department of Defense Cyber Strategy Summary.

Learn More
Branding Workshop

The Big Encryption Debate: Privacy & Security in the Digital Age

Justin Sherman

What is encryption, and why does it matter? How does it protect privacy and security? How do criminals and terrorists hide behind encryption? Should law enforcement have encryption backdoors?

Learn More