Tipsheets

Browse more 5,000 tipsheets from our national conferences and Watchdog Workshops on how to cover specific beats, conduct a great interview and learn countless tips on where to find the information you need.

Logged-in members can download any tipsheet, for free. Contact the Resource Center 573-882-3364 or rescntr@ire.org for questions.

Search results for "research" ...

  • Web for watchdogs

    Learn the best tips, tricks and practices for using the web as a watchdog.

    Tags: watchdog; web practices; researching; databases; Google searches

    By Charles Minshew

    2019

  • Web search and social media for watchdogs

    Learn how to use web and social media searches to conduct backgrounding and research skills that every watchdog should have.

    Tags: social media; web searches; backgrounding; research; advanced search

    By Denise Malan

    2019

  • Dig deeper with social media

    Doug Haddix went into how to do deep dives through social media, specifically Twitter and Facebook. He gave examples of how to do advanced searches on the platforms and the best information to look for and trust.

    Tags: social media; research; sleuthing

    By Doug Haddix

    2018

  • Demographics beyond the Census

    Demographics are life, and the way we live shapes everything else we write about. And it's not just Census numbers: When it comes to demographic data, the Census Bureau isn't the only game in town. Many institutions and agencies run surveys or programs that can be mined for details about people and housing.

    Tags: demographics; data; surveys; alternative

    By D'Vera Cohn

    2018

  • The Stanford Open Policing Project

    On a typical day in the United States, police officers make more than 50,000 traffic stops. Our team is gathering, analyzing, and releasing records from millions of traffic stops by law enforcement agencies across the country. Our goal is to help researchers, journalists, and policymakers investigate and improve interactions between police and the public.

    Tags: standord; academics; scientists

    By Sharad Goel

    2018

  • Lessons from scientists and academics

    Scientists, academics and investigative journalists have a lot in common. Both develop deep knowledge of their subjects over long-spanning careers and care about accuracy, fairness and making an impact through groundbreaking discoveries. This presentation will discuss what academics researchers and journalists can learn from each other, how they can effectively work together by harnessing complementary skills and successfully collaborate to push the boundaries of research and reporting while maintaining the highest standards.

    Tags: scientists; academics; knowledge; accuracy

    By Sinduja Rangarajan

    2018

  • Securing Workstations and Personal Data

    Doing research for in-depth investigations can be dicey, digitally-speaking. Learn how to compartmentalize your internet-based research while keeping your identity private, your computer clean and your data safe.

    Tags: workstation; personal; research; security

    By Neena Kapur

    2018

  • Safe Searching

    Doing research for in-depth investigations can be dicey, digitally-speaking. Learn how to compartmentalize your internet-based research while keeping your identity private, your computer clean and your data safe.

    Tags: privacy; internet; identity; security

    By Margot Williams

    2018

  • Digging through the web

    Learn a variety of research techniques and free resources. From backgrounding a person to retrieving an archived multimedia interview, to one-click web scraping, this tipsheet will give you tools you can put to use immediately.

    Tags: web; backgrounding

    By Gary Price

    2018

  • Digital Security Tip Sheet for Journalists​

    Are your sources’ identities at risk? Are you handling sensitive information? Do you need to protect your data from digital espionage? Do you need to encrypt your communication with editors and sources? Are you under technical attack? This tipsheet will introduce you to a digital security toolbox that can help you store, send and receive sensitive information.

    Tags: identity; sources; protection; espionage

    By Camille Fassett; Martin Shelton; Jorge Luis Sierra

    2018