{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:30:30Z","timestamp":1770064230680,"version":"3.49.0"},"reference-count":42,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Tel Aviv University Center for AI and Data Science"},{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["2029\/19"],"award-info":[{"award-number":["2029\/19"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100001212","name":"Koret Foundation","doi-asserted-by":"publisher","award":["Smart Cities and Digital Living 2030"],"award-info":[{"award-number":["Smart Cities and Digital Living 2030"]}],"id":[{"id":"10.13039\/100001212","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Hum Factors"],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:sec>\n                    <jats:title>Objective<\/jats:title>\n                    <jats:p>The study investigates users\u2019 tendency to access decision support (DS) systems as a function of the correlation between the DS information and the information users already have, the ongoing interaction with such systems, and the effect of correlated information on subjective trust.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Background<\/jats:title>\n                    <jats:p>Previous research has shown inconclusive findings regarding whether people prefer information that correlates with information they already have. Some studies conclude that individuals recognize the value of noncorrelated information, given its unique content, while others suggest that users favor correlated information as it aligns with existing evidence. The impact of the level of correlation on performance, subjective trust, and the decision to use DS remains unclear.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Method<\/jats:title>\n                    <jats:p>\n                      In an experiment (\n                      <jats:italic toggle=\"yes\">N<\/jats:italic>\n                      = 481), participants made classification decisions based on available information. They could also purchase additional DS with different degrees of correlation with the available information.\n                    <\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Results<\/jats:title>\n                    <jats:p>Participants tended to purchase information more often when the DS was not correlated with the available information. Correlated information reduced performance, and the effect of correlation on subjective trust and performance depended on DS sensitivity.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Conclusion<\/jats:title>\n                    <jats:p>Additional information may not improve performance when it is correlated with available information (i.e., it is redundant). Hence, the benefits of additional information and DS depend on the information the system and the operator use.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Application<\/jats:title>\n                    <jats:p>It is essential to analyze the correlations between information sources and design the available information to allow optimal task performance and possibly minimize redundancy (e.g., by locating sensors in different positions to capture independent data).<\/jats:p>\n                  <\/jats:sec>","DOI":"10.1177\/00187208241302787","type":"journal-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T03:50:06Z","timestamp":1732679406000},"page":"546-559","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["Normative or Confirmative: Effects of Information Quality and Redundancy in Decision Support Systems"],"prefix":"10.1177","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9834-6568","authenticated-orcid":false,"given":"Yoav","family":"Ben Yaakov","sequence":"first","affiliation":[{"name":"Tel Aviv University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8628-657X","authenticated-orcid":false,"given":"Maja","family":"Denisova","sequence":"additional","affiliation":[{"name":"Berlin Institute of Technology"}]},{"given":"Filmona","family":"Mulugeta","sequence":"additional","affiliation":[{"name":"Berlin Institute of Technology"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1801-9987","authenticated-orcid":false,"given":"Joachim","family":"Meyer","sequence":"additional","affiliation":[{"name":"Tel Aviv University"}]}],"member":"179","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.acra.2004.05.012"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(88)90030-1"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720817700258"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/1071181321651120"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/00187208241277158"},{"key":"e_1_3_3_7_1","volume-title":"Proceedings of the annual meeting of the cognitive science society","author":"Ben Yaakov Y.","year":"2024","unstructured":"Ben Yaakov Y., Meyer J. (2024). Choose and use: Users\u2019 selection of information sources for decision support. In Proceedings of the annual meeting of the cognitive science society (46). Cognitive Science Society."},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHMS49158.2020.9209426"},{"key":"e_1_3_3_9_1","first-page":"33","volume-title":"International conference on decision and game theory for security","author":"Ben Yaakov Y.","year":"2019","unstructured":"Ben Yaakov Y., Wang X., Meyer J., An B. (2019). Choosing protection: User investments in security measures for cyber risk management. International conference on decision and game theory for security (pp. 33\u201344). Springer-Verlag."},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2006.07.001"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0031625"},{"key":"e_1_3_3_12_1","volume-title":"Elements of information theory","author":"Cover T. M.","year":"2006","unstructured":"Cover T. M., Thomas J. A. (2006). Elements of information theory (2nd ed.). John Wiley & Sons, Incorporated. https:\/\/doi.org\/10.1002\/047174882X","edition":"2"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872007X215656"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872097778667960"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/0956797618792256"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0034266"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1994.1035"},{"key":"e_1_3_3_18_1","volume-title":"Signal detection theory and psychophysics","author":"Green D. M.","year":"1966","unstructured":"Green D. M., Swets J. A. (1966). Signal detection theory and psychophysics. Wiley."},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2017.02.009"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-2070(89)90015-0"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2008.01402.x"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0034747"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289635"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.10.001"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50_30392"},{"issue":"2","key":"e_1_3_3_26_1","article-title":"Detection theory: A user\u2019s guide","volume":"136","author":"Macmillan N. A.","year":"2004","unstructured":"Macmillan N. A., Creelman C. D. (2004). Detection theory: A user\u2019s guide. Psychology press, 136(Issue 2).","journal-title":"Psychology press"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/2491245"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872001775900931"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872001775870395"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHMS53169.2021.9582632"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/1071181322661121"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/1071181322661290"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872097778543886"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1518\/155534308X284417"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872008X312198"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872086400600510"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720820965019"},{"key":"e_1_3_3_38_1","first-page":"75","article-title":"A contingent criterion model of computer assisted detection","volume":"2","author":"Robinson D. E.","year":"1985","unstructured":"Robinson D. E., Sorkin R. D. (1985). A contingent criterion model of computer assisted detection. Trends in ergonomics\/human factors, 2, 75\u201382.","journal-title":"Trends in ergonomics\/human factors"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720816634228"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-92bf1922-011"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1006\/cogp.1998.0699"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.185.4157.1124"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.0963-7214.2004.00278.x"}],"container-title":["Human Factors: The Journal of the Human Factors and Ergonomics Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/00187208241302787","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/00187208241302787","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/00187208241302787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T23:35:10Z","timestamp":1767656110000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/00187208241302787"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"references-count":42,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["10.1177\/00187208241302787"],"URL":"https:\/\/doi.org\/10.1177\/00187208241302787","relation":{},"ISSN":["0018-7208","1547-8181"],"issn-type":[{"value":"0018-7208","type":"print"},{"value":"1547-8181","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,27]]}}}