LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Pickard, Alison; Gannon-Leary, Pat; Coventry, Lynne (2011)
Publisher: Library and Information Research Group
Languages: English
Types: Article
Subjects: P100
This article describes a Joint Information Systems Committee (JISC)-funded project, conducted by a cross-disciplinary team, examining trust in information resources in the web environment employing a literature review and online Delphi study with follow-up community consultation. The project aimed to try to explain how users assess or assert trust in their use of resources in the web environment; to examine how perceptions of trust influence the behavior of information users; and to consider whether ways of asserting trust in information resources could assist the development of information literacy. A trust model was developed from the analysis of the literature and discussed in the consultation. Elements comprising the i-Trust model include external factors, internal factors and user's cognitive state. This article gives a brief overview of the JISC funded project which has now produced the i-Trust model (Pickard et. al. 2010) and focuses on issues of particular relevance for information providers and practitioners.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Adlington, J. and Benda, C. (2006) Checking under the hood, Internet Reference Services Quarterly, 10(3), 135-148.
    • Agosto (2002a). Bounded rationality and satisficing in young people's web-based decision-making, Journal of the American Society for Information Science and Technology, 53(1), 16-27.
    • Agosto, D. E. (2002b). A model of young people's decision-making in using the Web, Library and Information Science Research, 24(4), 311-341.
    • Amichai-Hamburger, Y., Fine, A. and Goldstein, A. (2004) Impact of Internet activity and need for closure on consumer preference, Computers in Human Behavior, 20, 103-117.
    • Amichai-Hamburger, Y., Kaynar, O. and Fine, A. (2007) Effects of need for cognition on Internet use, Computers in Human Behavior, 23(1), 880-891.
    • Anderson, R. (2006) The (uncertain) future of libraries in a Google world, Internet Reference Services Quarterly, 10(3), 29-36.
    • Anderson, R. (2010) Scholarly communications: the view from the library. In: Woodward, H. L. E. (ed.) Digital information: order or anarchy. London, Facet.
    • Becker, N. J. (2003). Google in perspective: understanding and enhancing student search skills, New Review of Academic Librarianship, 9(1), 84-100.
    • Bell, S. (2004) The Infodiet: how libraries can offer an appetizing alternative, Chronicle of Higher Education, B15.
    • Bilal, D. (2000). Children‟s use of the Yahooligans! Web search engine: 1.
    • Cognitive, physical, and affective behaviors on fact-based search tasks, Journal of the American Society for Information Science, 51, 646-665.
    • Bradley, R. (2005) Digital authenticity and integrity: Digital cultural heritage documents as research resources, PORTAL, 5(2), 165-176.
    • Braten, I., H. I. Stromso, et al. (2009). Trust matters: examining the role of source evaluation in students' construction of meaning within and across multiple texts, Reading Research Quarterly 44(1), 6-28.
    • Breeding, M. (2006). Technology for the next generation, Computers in Libraries 26(10), 28-30.
    • Haya, G., Nygren, E. and Widmark, W. (2007) Metalib and Google Scholar: a user study, Online Information Review, 31(1), 365-375 Head, A. J. and M. B. Eisenberg (2009). How college students seek information in the digital age. Project Information Literacy Progress Report. Washington DC, Information School, University of Washington.
    • Hembroff, L.A. (2006) MSU student health assessment: Spring 2006 [online].
    • URL: www.ippsr.msu.edu/Publications%5Cacha_2006_RPT_LAH.pdf [accessed 04.01.12].
    • Herring, J.E. (2004) The Internet and information skills. London: Facet Publishing Herring, M. Y. (2005) A gaggle of Googles: limitations and defects of electronic access as panacea, Internet Reference Services Quarterly, 10(3-4), 37-44.
    • Hertzum, M., Andersen, H.H.K., Andersen, V, and Hansen, C.B. (2002). Trust in information sources: Seeking information from people, documents, and virtual agents, Interacting with Computers, 14(5), 575-599.
    • Hung, T. Y. (2004). Undergraduate students' evaluation criteria when using web resources for class, Journal of Educational Media and Library Sciences. 42(1),.
    • Jones, S. (2002) The Internet goes to college: how students are living in the future with today's technology. Washington DC: Pew Research Center.
    • Kaynar, O. and Amichai-Hamburger, Y. (2008) The effects of need for cognition on Internet use revisited, Computers in Human Behavior, 24(2), 361-371.
    • Kelton, K., Fleischmann, K. R. and Wallace, W. A. (2008) Trust in digital information, Journal of the American Society for Information Science and Technology, 59(3), 363-374.
    • Kolsto, S.D. (2001). To trust or not to trust,... "pupils' ways of judging information encountered in a socio-scientific issue, International Journal of Science Education, 23(9), 877-901 Kuhlthau, C.C. (1991). Inside the search process: Information seeking from the user‟s perspective, Journal of the American Society for Information Science, 42, 361-371.
    • Kuhlthau, C.C. (1993a). A principle of uncertainty for information seeking.
    • Journal of Documentation, 49(4), 339-355.
    • Kuhlthau, C.C. (1993b). Seeking meaning: A process approach to library and information services. Norwood, NJ: Ablex.
    • Lappin, J. and McLeod, J. (2010) Investigation into the use of Microsoft SharePoint in Higher Education Institutions: Final Report. Eduserv funded Walsh, P. (2007) Content labels, explained in plain English [online]. URL: http://segala.com/blog/content-labels-explained-in-plain-english/ [accessed 05.01.12].
    • Wang, P., and Soergel, D. (1998). A cognitive model of document use during a research project. Study I. Document selection, Journal of the American Society for Information Science, 49, 115-133.
    • Weiler, A. (2005). Information seeking behaviour in Generation Y students: motivation, critical thinking and learning theory, Journal of Academic Librarianship 31(1), 46-53.
    • Wieklinski, J. M. (2005) Studying Google Scholar: wall to wall coverage? Online, 29(3), 22-26.
    • Wong, W., H. Stelmaszewska, et al. (2009). User behaviour in resource discovery: Final report. JISC User behaviour observational study, JISC.
    • York, M. C. (2006) Calling the scholars home, Internet Reference Services Quarterly, 10(3), 117-133.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article