{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:54:06Z","timestamp":1770746046490,"version":"3.49.0"},"reference-count":63,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2008,9,5]],"date-time":"2008-09-05T00:00:00Z","timestamp":1220572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9,5]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper seeks to understand how users determine credibility in the internet environment from a conceptual level and the implications of these new methods of credibility determination on internet tools (primarily software) and services.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The author first examines the underlying reasons for increased dependence on the internet for information, using electronic commerce as a starting point. The central concept of \u201cinformation self\u2010sufficiency\u201d is introduced and then examined through the lens of the internet and conversation theory.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The author finds that users are shifting from more traditional \u201cauthority\u201d methods of credibility determination, where users cede determinations to trusted third parties, to a \u201creliability\u201d approach where users seek commonalities and coherence among multiple information sources. This has led to an increased pressure for participation and openness at all levels of the internet.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>Studies on users and credibility must better account for often invisible technical factors.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Libraries must take into account a greater need for participation and technical fluency when dealing with patrons, particularly in information literacy programs and instruction.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper presents a large\u2010scale conceptual approach to credibility on the internet. It seeks to inform current approaches to the subject nested in communications and instruction with the unique technical environment of the internet.<\/jats:p><\/jats:sec>","DOI":"10.1108\/00220410810899709","type":"journal-article","created":{"date-parts":[[2008,9,20]],"date-time":"2008-09-20T07:05:59Z","timestamp":1221894359000},"page":"667-686","source":"Crossref","is-referenced-by-count":73,"title":["Credibility on the internet: shifting from authority to reliability"],"prefix":"10.1108","volume":"64","author":[{"given":"R. David","family":"Lankes","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022021320210087800_b1","unstructured":"Abend, J. (1999), \u201cLands' end uses internet to expand sales, personalize customer service\u201d, Bobbin. FindArticles.com, www.findarticles.com\/p\/articles\/mi_m3638\/is_10_40\/ai_55609089 (accessed December 15, 2006)."},{"key":"key2022021320210087800_b2","unstructured":"Becker, L. (2002), \u201cSelf\u2010service web applications: less cost, more value\u201d, available at: www.adaptivepath.com\/publications\/essays\/archives\/000063.php (accessed November 15, 2006)."},{"key":"key2022021320210087800_b3","doi-asserted-by":"crossref","unstructured":"Bimber, B., Flanagin, A.J. and Stohl, C. (2005), \u201cReconceptualizing collective action in the contemporary media environment\u201d, Communication Theory, Vol. 15, pp. 365\u201088.","DOI":"10.1111\/j.1468-2885.2005.tb00340.x"},{"key":"key2022021320210087800_b5","doi-asserted-by":"crossref","unstructured":"Bryant, S.L., Forte, A. and Bruckman, A. (2005), \u201cBecoming Wikipedian: transformation of participation in a collaborative online encyclopedia\u201d, Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, Sanibel Island, FL, USA, pp. 1\u201010.","DOI":"10.1145\/1099203.1099205"},{"key":"key2022021320210087800_b6","unstructured":"Chesney, T. (2006), \u201cAn empirical examination of Wikipdeia's credibility\u201d, First Monday, Vol. 11 No. 11, available at: www.firstmonday.org\/issues\/issue11_11\/chesney\/index.html (accessed January 4, 2006)."},{"key":"key2022021320210087800_b7","doi-asserted-by":"crossref","unstructured":"Choo, J. and Roy, S. (2004), \u201cImpact of search engines on page popularity\u201d, International World Wide Web Conference: Proceedings of the 13th International Conference on World Wide Web, ACM Press, New York, NY, pp. 20\u20109.","DOI":"10.1145\/988672.988676"},{"key":"key2022021320210087800_b9","unstructured":"de George, R.T. (1985), The Nature and Limits of Authority, University Press of Kansas, Lawrence, KS."},{"key":"key2022021320210087800_b10","unstructured":"Dg.o (2006), \u201cThe National Science Foundation's digital government research program\u201d, available at: www.digitalgovernment.org\/ (accessed December 15, 2006)."},{"key":"key2022021320210087800_b11","unstructured":"Federal Election Commission (2006), Help America Vote Act of 2002: Public Law 107\u2010252, available at: www.fec.gov\/hava\/hava.htm (accessed November 15, 2006)."},{"key":"key2022021320210087800_b12","unstructured":"Flannigan, A. and Metzger, M. (2007), \u201cIntroduction, in MacArthur 2007\u201d, in Metzger, M. and Flanagin, A. (Eds), Digital Media, Youth, and Credibility, MacArthur Foundation Series on Digital Media and Learning, Chicago, IL."},{"key":"key2022021320210087800_b16","doi-asserted-by":"crossref","unstructured":"Fogg, B.J. (2002), Persuasive Technology: Using Computers to Change What We Think and Do, Morgan Kaufman, New York, NY.","DOI":"10.1145\/764008.763957"},{"key":"key2022021320210087800_b17","doi-asserted-by":"crossref","unstructured":"Fogg, B.J., Soohoo, C., Danielson, D.R., Marable, L., Stanford, J. and Tauber, E.R. (2003), \u201cHow do users evaluate the credibility of web sites? A study with over 2,500 participants\u201d, Proceedings of the 2003 Conference on Designing for User Experiences, San Francisco, CA, USA, pp. 1\u201015.","DOI":"10.1145\/997078.997097"},{"key":"key2022021320210087800_b15","doi-asserted-by":"crossref","unstructured":"Fogg, B.J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P. and Treinen, M. (2001), \u201cWhat makes web sites credible? A report on a large quantitative study\u201d, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Seattle, Washington, USA, March 31\u2010April 4, pp. 61\u20108.","DOI":"10.1145\/365024.365037"},{"key":"key2022021320210087800_b14","doi-asserted-by":"crossref","unstructured":"Fogg, B.J., Marshal, J., Osipovich, A., Varma, C., Laraki, O., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P. and Treinen, M. (2000), \u201cElements that affect web credibility: early results from a self\u2010report study\u201d, Proceedings of ACM CHI '00 Extended Abstracts on Human Factors in Computing Systems, The Hague, The Netherlands, pp. 287\u20108.","DOI":"10.1145\/633292.633460"},{"key":"key2022021320210087800_b18","unstructured":"Fott, G. (2006), \u201cAdobe Photoshop CS3 Beta\u201d, available at: www.pcmag.com\/article2\/0,1895,2074376,00.asp (accessed January 6, 2007)."},{"key":"key2022021320210087800_b19","unstructured":"Friedman, B., Kahn, P.H. Jr and Borning, A. (2006), \u201cValue sensitive design and information systems\u201d, in Zhang, P. and Galletta, D. (Eds), Human\u2010computer Interaction in Management Information Systems: Foundations, M.E. Sharpe, London, pp. 348\u201072."},{"key":"key2022021320210087800_b20","doi-asserted-by":"crossref","unstructured":"Giles, J. (2005), \u201cInternet encyclopedias go head to head\u201d, Nature, Vol. 438, pp. 900\u20101.","DOI":"10.1038\/438900a"},{"key":"key2022021320210087800_b21","unstructured":"Grants.gov. (2006), available at: www.grants.gov\/ (accessed November 25, 2006)."},{"key":"key2022021320210087800_b23","doi-asserted-by":"crossref","unstructured":"Haas, T. (2005), \u201cFrom \u2018public journalism\u2019 to the \u2018public's journalism\u2019? Rhetoric and the reality in the discourse on weblogs\u201d, Journalism Studies, Vol. 6 No. 3, pp. 387\u201096.","DOI":"10.1080\/14616700500132073"},{"key":"key2022021320210087800_b22","doi-asserted-by":"crossref","unstructured":"Halpern, D.F. (2003), Thought & Knowledge: An Introduction to Critical Thinking, 4th ed., Lawrence Erlbaum Associates, Mahwah, NJ.","DOI":"10.4324\/9781410606433"},{"key":"key2022021320210087800_b24","doi-asserted-by":"crossref","unstructured":"Ivory, M.Y. and Megraw, R. (2005), \u201cEvolution of website design patterns\u201d, ACM Transactions on Information Systems, Vol. 23 No. 4, pp. 463\u201097.","DOI":"10.1145\/1095872.1095876"},{"key":"key2022021320210087800_b26","doi-asserted-by":"crossref","unstructured":"Jenkins, P.S. (2003), \u201cLeafleting and picketing on the \u2018Cydewalk\u2019 \u2013 four models of the role of the internet in labour disputes\u201d, UCLA Journal of Law and Technology, Vol. 7 No. 1.","DOI":"10.2139\/ssrn.470682"},{"key":"key2022021320210087800_b27","doi-asserted-by":"crossref","unstructured":"Johnson, T.J. and Kaye, B.K. (2004), \u201cWag the blog: how reliance on traditional media and the internet influence credibility perceptions of weblogs among blog users\u201d, Journalism and Mass Communication Quarterly, Vol. 81 No. 3, pp. 622\u201042.","DOI":"10.1177\/107769900408100310"},{"key":"key2022021320210087800_b30","unstructured":"Lankes, R.D. (1999), Building and Maintaining Internet Information Services: K\u201012 Digital Reference Services, ERIC Clearinghouse on Information & Technology, Syracuse, NY."},{"key":"key2022021320210087800_b29","unstructured":"Lankes, R.D., Silverstein, J. and Nicolson, S. (2007), \u201cParticipatory networks: the library as conversation\u201d, available at: http:\/\/iis.syr.edu\/projects\/PNOpen\/ (accessed March 10, 2007)."},{"key":"key2022021320210087800_b28","doi-asserted-by":"crossref","unstructured":"Law, R., Leung, K. and Wong, R.J. (2004), \u201cThe impact of the internet on travel agencies\u201d, International Journal of Contemporary Hospitality Management, Vol. 16 No. 2, pp. 100\u20107.","DOI":"10.1108\/09596110410519982"},{"key":"key2022021320210087800_b31","unstructured":"Levitt, S. and Dubner, S. (2005), Freakonomics: A Rogue Economist Explores the Hidden Side of Everything, William Morrow, New York, NY."},{"key":"key2022021320210087800_b34","doi-asserted-by":"crossref","unstructured":"Littlefield, J.E., Bao, Y. and Cook, D.L. (2000), \u201cInternet real estate information: are home purchasers paying attention to it?\u201d, Journal of Consumer Marketing, Vol. 17 No. 7, pp. 575\u201090.","DOI":"10.1108\/07363760010357787"},{"key":"key2022021320210087800_b37","unstructured":"McGunines, D.L., Zeng, H., da Silva, P.P., Ding, L., Narayanan, D. and Bhaowal, M. (2006), \u201cInvestigations into trust for collaborative information repositories: a Wikipedia case study\u201d, Proceedings of the Workshop on Models of Trust for the Web. WWW2006, Edinburgh, UK, May 22\u201026, available at: http:\/\/ebiquity.umbc.edu\/_file_directory_\/papers\/274.pdf (accessed January 4, 2007)."},{"key":"key2022021320210087800_b38","unstructured":"Madden, M. (2006), \u201cInternet penetration and impact\u201d, Pew Internet & American Life Project, available at: www.pewinternet.org\/PPF\/r\/182\/report_display.asp (accessed November 15, 2006)."},{"key":"key2022021320210087800_b63","unstructured":"Madden, M. and Fox, S. (2006), \u201cRiding the waves of \u2018web 2.0\u2019: more than a buzzword, but still not easily defined\u201d, Pew Internet Project, available at: www.pewinternet.org\/pdfs\/PIP_Web_2.0.pdf (accessed December 12, 2007)."},{"key":"key2022021320210087800_b41","doi-asserted-by":"crossref","unstructured":"Metzger, M.J., Flannagin, A.J. and Zwarun, L. (2003a), \u201cCollege student web use, perceptions of information credibility, and verification behavior\u201d, Computers & Education, Vol. 41, pp. 271\u201090.","DOI":"10.1016\/S0360-1315(03)00049-6"},{"key":"key2022021320210087800_b40","doi-asserted-by":"crossref","unstructured":"Metzger, M.J., Flanagin, A.J., Eyal, K., Lemus, D. and McCann, R.M. (2003b), \u201cBringing the concept of credibility for the 21st century: integrating perspectives on source, message, and media credibility in the contemporary media environment\u201d, in Kalbfleish, P. (Ed.), Communication Yearbook, Vol. 27, Erlbaum, Mahwah, NJ, pp. 293\u2010335.","DOI":"10.1080\/23808985.2003.11679029"},{"key":"key2022021320210087800_b42","doi-asserted-by":"crossref","unstructured":"Meuter, M.L., Ostrom, A.L., Roundtree, R.I. and Bitner, M. (2000), \u201cSelf\u2010service technologies: understanding customer satisfaction with technology\u2010based service encounters\u201d, Journal of Marketing, Vol. 64, pp. 50\u201064.","DOI":"10.1509\/jmkg.64.3.50.18024"},{"key":"key2022021320210087800_b43","unstructured":"Miteko, T. (2006), \u201cDriving value from every online customer interaction: the power of intent\u2010driven personalization\u201d, Customer Inter@ction Solutions., Vol. 24 No. 8, pp. 38\u201041."},{"key":"key2022021320210087800_b44","doi-asserted-by":"crossref","unstructured":"Mowshowitz, A. and Kawaguchi, A. (2002), \u201cThe consumer side of search: bias on the web\u201d, Communications of the ACM, Vol. 45 No. 9, pp. 56\u201060.","DOI":"10.1145\/567498.567527"},{"key":"key2022021320210087800_b45","doi-asserted-by":"crossref","unstructured":"Nikolaos, T.K., Poulos, M. and Bokos, G. (2006), \u201cEvaluating authoritative sources using social networks: an insight from Wikipedia\u201d, Online Information Review, Vol. 30 No. 3, pp. 252\u201062.","DOI":"10.1108\/14684520610675780"},{"key":"key2022021320210087800_b46","unstructured":"Oxford English Dictionary (1989), \u201cEntry on authority\u201d, 2nd ed., available at: http:\/\/dictionary.oed.com\/cgi\/entry\/50015071?query_type\u2009=\u2009word&queryword\u2009=\u2009authority&first\u2009=\u20091& max_to_show\u2009=\u200910&sort_type\u2009=\u2009alpha&result_place\u2009=\u20091&search_id\u2009=\u2009gPnp\u20102lm Q0y\u20103202&hilite\u2009=\u200950015071 (accessed December 29, 2006)."},{"key":"key2022021320210087800_b47","doi-asserted-by":"crossref","unstructured":"Palm, R. and Danis, M. (2002), \u201cThe internet and home purchase\u201d, Tijdschrift voor Economische en Sociale Geografie, Vol. 93 No. 5, pp. 537\u201047.","DOI":"10.1111\/1467-9663.00224"},{"key":"key2022021320210087800_b48","unstructured":"Pask, G. (1976), Conversation Theory: Applications in Education and Epistemology, Elsevier, New York, NY."},{"key":"key2022021320210087800_b49","unstructured":"PEACEFIRE (2006), available at: www.peacefire.org\/ (accessed December 29, 2006)."},{"key":"key2022021320210087800_b50","unstructured":"Raymond, E. (2001), Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary, O'Reilly Media, Sebastopol, CA."},{"key":"key2022021320210087800_b51","doi-asserted-by":"crossref","unstructured":"Rice, K.L. (2006), \u201cA comprehensive look at distance education in the K\u201012 context\u201d, Journal of Research on Technology in Education, Vol. 38 No. 4, pp. 425\u201048.","DOI":"10.1080\/15391523.2006.10782468"},{"key":"key2022021320210087800_b53","unstructured":"Silverstein, J. (1997), \u201cInformation technology and commerce: attributes of emerging online business\u201d, unpublished doctoral dissertation, Syracuse University, Syracuse, NY."},{"key":"key2022021320210087800_b52","doi-asserted-by":"crossref","unstructured":"Stadler, F. and Hirsh, J. (2002), \u201cOpen source intelligence\u201d, First Monday, Vol. 7 No. 6, available at: http:\/\/firstmonday.org\/issues\/issue7_6\/stalder\/index.html (accessed January 4, 2007).","DOI":"10.5210\/fm.v7i6.961"},{"key":"key2022021320210087800_b54","doi-asserted-by":"crossref","unstructured":"van Riel, A., Liljander, V. and Jurriens, P. (2001), \u201cExploring consumer evaluations of e\u2010services: a portal site\u201d, International Journal of Service Industry Management, Vol. 12 No. 4, pp. 359\u201077.","DOI":"10.1108\/09564230110405280"},{"key":"key2022021320210087800_b55","doi-asserted-by":"crossref","unstructured":"Walther, J.B., Wang, Z. and Loh, T. (2004), \u201cThe effect of top\u2010level domains and advertisements on health web site credibility\u201d, Journal of Medical Internet Research, Vol. 6 No. 3, e24, available at: www.jmir.org\/2004\/3\/e24\/ (accessed January 3, 2006).","DOI":"10.2196\/jmir.6.3.e24"},{"key":"key2022021320210087800_b56","doi-asserted-by":"crossref","unstructured":"Wathen, C.N. and Burkell, J. (2002), \u201cBelieve it or not: factors influencing credibility on the web\u201d, Journal of the American Society for Information Science and Technology, Vol. 53 No. 2, pp. 134\u201044.","DOI":"10.1002\/asi.10016"},{"key":"key2022021320210087800_b57","doi-asserted-by":"crossref","unstructured":"Weiss, A. (2005), \u201cThe power of collective intelligence\u201d, NetWorker, Vol. 9 No. 3, pp. 16\u201023.","DOI":"10.1145\/1086762.1086763"},{"key":"key2022021320210087800_b58","unstructured":"Wikipedia (2006), Astroturfing, available at: http:\/\/en.wikipedia.org\/wiki\/Astroturfing (accessed December 29, 2006)."},{"key":"key2022021320210087800_b59","unstructured":"Wikipedia (2007), \u201cBroadband internet access\u201d, available at: http:\/\/en.wikipedia.org\/wiki\/Broadband_Internet_access (accessed on August 5, 2007)."},{"key":"key2022021320210087800_b60","unstructured":"Wray, R. and Milmo, D. (2006), \u201cAOL tries to survive by going free\u201d, available at: http:\/\/business.guardian.co.uk\/story\/0,1835908,00.html (accessed January 2, 2007)."},{"key":"key2022021320210087800_b61","doi-asserted-by":"crossref","unstructured":"Wynne, C., Berthon, P., Pitt, L., Ewing, M. and Napoli, J. (2001), \u201cThe impact of the internet on the distribution value chain: the case of the South African tourism industry\u201d, International Marketing Review, Vol. 18 No. 4, pp. 420\u201031.","DOI":"10.1108\/EUM0000000005934"},{"key":"key2022021320210087800_b62","unstructured":"Zeldman, J. (2003), Designing with Web Standards, New Riders Press, Thousands Oaks, CA."},{"key":"key2022021320210087800_frd1","doi-asserted-by":"crossref","unstructured":"Brett, J.D. and Egley, R.J. (2006), \u201cLooking through different lenses: teachers' and administrators' views of accountability\u201d, Phi Delta Kappen, Vol. 87 No. 10, pp. 767\u201071.","DOI":"10.1177\/003172170608701012"},{"key":"key2022021320210087800_frd2","unstructured":"Davies, C., Hayward, G. and Lukman, L. (2006), \u201c14\u201019 and digital technologies: a review of research and projects\u201d, available at: www.futurelab.org.uk\/download\/pdfs\/research\/lit_reviews\/futurelab_review_13.pdf (accessed December 29, 2006)."},{"key":"key2022021320210087800_frd3","unstructured":"Florida Virtual School (2006), available at: www.flvs.net\/educators\/fact_sheet.php (accessed December 28, 2006)."},{"key":"key2022021320210087800_frd9","unstructured":"(The) Internet Gopher (2006), \u201cHistory of the Gopher Protocol\u201d, available at: www.codeghost.com\/gopher_history.html (accessed December 29, 2006)."},{"key":"key2022021320210087800_frd4","unstructured":"Lenhart, R. and Lewis, O. (2001), \u201cTeenage life online: the rise of the instant\u2010message generation and the internet's impact on friendships and family relationships\u201d, available at: www.pewinternet.org\/PPF\/r\/36\/report_display.asp (accessed December 15, 2006)."},{"key":"key2022021320210087800_frd5","unstructured":"Lenhart, A., Simon, M. and Graziano, M. (2001), \u201cThe internet and education: findings of the pew internet & American life project\u201d, available at: www.pewinternet.org\/PPF\/r\/39\/report_display.asp (accessed December 28, 2006)."},{"key":"key2022021320210087800_frd6","unstructured":"Lowe, C. (2005), \u201cYale University's PACE Research Center and the Big6\u2122\u201d, available at: http:\/\/big6.com\/showarticle.php?id\u2009=\u2009459 (accessed November 15, 2006)."},{"key":"key2022021320210087800_frd7","unstructured":"MacArthur Foundation (2006) MacSeries Volumes, available at: www.digitallearning.macfound.org\/site\/c.enJLKQNlFiG\/b.2029271\/k.E73F\/MacSeries.htm (accessed December 15, 2006)."},{"key":"key2022021320210087800_frd8","unstructured":"Market Wire (2006), \u201cUS teens graduate from choosing IM buddy icons to creating elaborate social networking profiles\u201d, According to Nielsen\/\/NetRatings www.marketwire.com\/mw\/release_html_b1?release_id\u2009=\u2009171656 (accessed December 28, 2006)."}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/00220410810899709","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220410810899709\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220410810899709\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:58Z","timestamp":1753400278000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/64\/5\/667-686\/207554"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,5]]},"references-count":63,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2008,9,5]]}},"alternative-id":["10.1108\/00220410810899709"],"URL":"https:\/\/doi.org\/10.1108\/00220410810899709","relation":{},"ISSN":["0022-0418"],"issn-type":[{"value":"0022-0418","type":"print"}],"subject":[],"published":{"date-parts":[[2008,9,5]]}}}