{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T22:21:29Z","timestamp":1751235689865,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030450014"},{"type":"electronic","value":"9783030450021"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45002-1_17","type":"book-chapter","created":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T15:04:25Z","timestamp":1586185465000},"page":"199-210","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["How Can Critical Thinking Be Used to Assess the Credibility of Online Information?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5978-4346","authenticated-orcid":false,"given":"Albie","family":"van Zyl","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4425-2010","authenticated-orcid":false,"given":"Marita","family":"Turpin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6973-1798","authenticated-orcid":false,"given":"Machdel","family":"Matthee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,1]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"2078","DOI":"10.1002\/asi.20672","volume":"58","author":"MJ Metzger","year":"2007","unstructured":"Metzger, M.J.: Making sense of credibility on the Web: models for evaluating online information and recommendations for future research. J. Am. Soc. Inf. Sci. Technol. 58, 2078\u20132091 (2007)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1002\/asi.1081","volume":"52","author":"JW Fritch","year":"2001","unstructured":"Fritch, J.W., Cromwell, R.L.: Evaluating Internet resources: identity, affiliation, and cognitive authority in a networked world. J. Am. Soc. Inform. Sci. Technol. 52, 499\u2013507 (2001)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"2399","DOI":"10.1002\/asi.23543","volume":"66","author":"W Choi","year":"2015","unstructured":"Choi, W., Stvilia, B.: Web credibility assessment: conceptualization, operationalization, variability, and models. J. Am. Soc. Inf. Sci. Technol. 66, 2399\u20132414 (2015)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Metzger, M.J., Flanagin, A.J.: Psychological approaches to credibility assessment online. In: The Handbook of the Psychology of Communication Technology, vol. 32, pp. 445\u2013466 (2015)","DOI":"10.1002\/9781118426456.ch20"},{"key":"17_CR5","unstructured":"Sundar, S.S.: The MAIN model: a heuristic approach to understanding technology effects on credibility. In: Digital Media, Youth, and Credibility, vol. 73100 (2008)"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1111\/j.1460-2466.2010.01488.x","volume":"60","author":"MJ Metzger","year":"2010","unstructured":"Metzger, M.J., Flanagin, A.J., Medders, R.B.: Social and heuristic approaches to credibility evaluation online. J. Commun. 60, 413\u2013439 (2010)","journal-title":"J. Commun."},{"key":"17_CR7","volume-title":"Thinking Skills: Critical Thinking and Problem Solving","author":"J Butterworth","year":"2013","unstructured":"Butterworth, J., Thwaites, G.: Thinking Skills: Critical Thinking and Problem Solving. Cambridge University Press, Cambridge (2013)"},{"key":"17_CR8","unstructured":"WEF: The World Economic Forum Future of Jobs Report 2018. WEF (2018)"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/301353.301402","volume":"42","author":"S Tseng","year":"1999","unstructured":"Tseng, S., Fogg, B.: Credibility and computing technology. Commun. ACM 42, 39\u201344 (1999)","journal-title":"Commun. ACM"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1136\/bmj.324.7337.573","volume":"324","author":"G Eysenbach","year":"2002","unstructured":"Eysenbach, G., K\u00f6hler, C.: How do consumers search for and appraise health information on the world wide web? Qualitative study using focus groups, usability tests, and in-depth interviews. BMJ 324, 573\u2013577 (2002)","journal-title":"BMJ"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Fogg, B.J., Soohoo, C., Danielson, D.R., Marable, L., Stanford, J., Tauber, E.R.: How do users evaluate the credibility of Web sites?: A study with over 2,500 participants. In: Proceedings of the 2003 Conference on Designing for User Experiences, pp. 1\u201315. ACM, (Year)","DOI":"10.1145\/997078.997097"},{"key":"17_CR12","volume-title":"Organizational behaviour","author":"R Kreitner","year":"2002","unstructured":"Kreitner, R., Kinicki, A., Buelens, M.: Organizational behaviour. McGraw Hill, London (2002)"},{"key":"17_CR13","first-page":"493","volume":"69","author":"HA Simon","year":"1979","unstructured":"Simon, H.A.: Rational decision making in business organizations. Am. Econ. Rev. 69, 493\u2013513 (1979)","journal-title":"Am. Econ. Rev."},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Fogg, B.J.: Prominence-interpretation theory: explaining how people assess credibility online. In: CHI 2003 extended abstracts on human factors in computing systems, pp. 722\u2013723. Citeseer (2003)","DOI":"10.1145\/765891.765951"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/764008.763957","volume":"2002","author":"BJ Fogg","year":"2002","unstructured":"Fogg, B.J.: Persuasive technology: using computers to change what we think and do. Ubiquity 2002, 5 (2002)","journal-title":"Ubiquity"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1002\/asi.10016","volume":"53","author":"CN Wathen","year":"2002","unstructured":"Wathen, C.N., Burkell, J.: Believe it or not: factors influencing credibility on the Web. J. Am. Soc. Inf. Sci. Technol. 53, 134\u2013144 (2002)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"17_CR17","unstructured":"The Foundation of Critical Thinking. https:\/\/www.criticalthinking.org\/pages\/our-conception-of-critical-thinking\/411"},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1037\/0003-066X.53.4.449","volume":"53","author":"DF Halpern","year":"1998","unstructured":"Halpern, D.F.: Teaching critical thinking for transfer across domains: disposition, skills, structure training, and metacognitive monitoring. Am. Psychol. 53, 449 (1998)","journal-title":"Am. Psychol."},{"key":"17_CR19","first-page":"1","volume":"4","author":"DT Tiruneh","year":"2014","unstructured":"Tiruneh, D.T., Verburgh, A., Elen, J.: Effectiveness of critical thinking instruction in higher education: a systematic review of intervention studies. High. Educ. Stud. 4, 1\u201317 (2014)","journal-title":"High. Educ. Stud."},{"key":"17_CR20","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226062648.001.0001","volume-title":"The Craft of Research","author":"WC Booth","year":"2008","unstructured":"Booth, W.C., Colomb, G.G., Williams, J.M., Bizup, J., Fitzgerald, W.T.: The Craft of Research. University of Chicago Press, Chicago (2008)"},{"key":"17_CR21","volume-title":"An Introduction to Reasoning","author":"S Toulmin","year":"1979","unstructured":"Toulmin, S., Rieke, R., Janik, A.: An Introduction to Reasoning. Macmillan Publishing Co., Inc., Nova York (1979)"},{"key":"17_CR22","unstructured":"G\/O Media Inc. https:\/\/entertainment.theonion.com\/cbs-sitcoms-under-fire-for-using-prison-laughter-1833206200"},{"key":"17_CR23","unstructured":"Theme WordPress Par MH Themes. http:\/\/healthynfit.org\/do-not-let-your-children-watch-peppa-pig-psychologists-warn-parents\/"},{"key":"17_CR24","unstructured":"Sky UK. https:\/\/news.sky.com\/story\/sheep-registered-as-pupils-in-bid-to-save-classes-at-french-alps-primary-school-11714338"}],"container-title":["Lecture Notes in Computer Science","Responsible Design, Implementation and Use of Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45002-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T23:08:40Z","timestamp":1712358520000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-45002-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030450014","9783030450021"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45002-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I3E","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on e-Business, e-Services and e-Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Skukuza","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"South Africa","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i3e2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.i3e2020.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"191","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the global COVID-19 pandemic and the consequential worldwide imposed travel restrictions and lockdown, the I3E 2020 conference was cancelled.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}