{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:04:52Z","timestamp":1775243092495,"version":"3.50.1"},"reference-count":267,"publisher":"Emerald","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12,18]]},"abstract":"<jats:p>Credibility, as the general concept covering trustworthiness and expertise, but also quality and reliability, is strongly debated in philosophy, psychology, and sociology, and its adoption in computer science is therefore fraught with difficulties. Yet its importance has grown in the information access community because of two complementing factors: on one hand, it is relatively difficult to precisely point to the source of a piece of information, and on the other hand, complex algorithms, statistical machine learning, artificial intelligence, make decisions on behalf of the users, with little oversight from the users themselves.<\/jats:p>\n                  <jats:p>This survey presents a detailed analysis of existing credibility models from different information seeking research areas, with focus on the Web and its pervasive social component. It shows that there is a very rich body of work pertaining to different aspects and interpretations of credibility, particularly for different types of textual content (e.g., Web sites, blogs, tweets), but also to other modalities (videos, images, audio) and topics (e.g., health care). After an introduction placing credibility in the context of other sciences and relating it to trust, we argue for a quartic decomposition of credibility: expertise and trustworthiness, well documented in the literature and predominantly related to information source, and quality and reliability, raised to the status of equal partners because the source is often impossible to detect, and predominantly related to the content.<\/jats:p>\n                  <jats:p>The second half of the survey provides the reader with access points to the literature, grouped by research interests. Section 3 reviews general research directions: the factors that contribute to credibility assessment in human consumers of information; the models used to combine these factors; the methods to predict credibility. A smaller section is dedicated to informing users about the credibility learned from the data. Sections 4, 5, and 6 go further into details, with domain-specific credibility, social media credibility, and multimedia credibility, respectively. While each of them is best understood in the context of Sections 1 and 2, they can be read independently of each other.<\/jats:p>\n                  <jats:p>The last section of this survey addresses a topic not commonly considered under \u201ccredibility\u201d: the credibility of the system itself, independent of the data creators. This is a topic of particular importance in domains where the user is professionally motivated and where there are no concerns about the credibility of the data (e.g. e-discovery and patent search). While there is little explicit work in this direction, we argue that this is an open research direction that is worthy of future exploration.<\/jats:p>\n                  <jats:p>Finally, as an additional help to the reader, an appendix lists the existing test collections that cater specifically to some aspect of credibility.<\/jats:p>\n                  <jats:p>Overall, this review will provide the reader with an organised and comprehensive reference guide to the state of the art and the problems at hand, rather than a final answer to the question of what credibility is for computer science. Even within the relatively limited scope of an exact science, such an answer is not possible for a concept that is itself widely debated in philosophy and social sciences.<\/jats:p>","DOI":"10.1561\/1500000046","type":"journal-article","created":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T05:52:48Z","timestamp":1450417968000},"page":"355-475","source":"Crossref","is-referenced-by-count":33,"title":["Credibility in Information Retrieval"],"prefix":"10.1561","volume":"9","author":[{"given":"Alexandru L.","family":"Ginsca","sequence":"first","affiliation":[{"name":"CEA, LIST, 91190 Gif-sur-Yvette ,","place":["France"]}]},{"given":"Adrian","family":"Popescu","sequence":"additional","affiliation":[{"name":"CEA, LIST, 91190 Gif-sur-Yvette ,","place":["France"]}]},{"given":"Mihai","family":"Lupu","sequence":"additional","affiliation":[{"name":"Vienna University of Technology ,","place":["Austria"]}]}],"member":"140","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"2026040314240710000_ref001","doi-asserted-by":"crossref","DOI":"10.1145\/2187836.2187930","article-title":"Actions Speak As Loud As Words: Predicting Relationships from Social Behavior Data","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Adali","year":"2012"},{"key":"2026040314240710000_ref002","doi-asserted-by":"crossref","DOI":"10.1145\/1341531.1341557","article-title":"Finding High-quality Content in Social Media","volume-title":"Proc. of the International Conference on Web Search and Data Mining (WSDM)","author":"Agichtein","year":"2008"},{"key":"2026040314240710000_ref003","doi-asserted-by":"crossref","DOI":"10.1109\/IUCS.2010.5666759","article-title":"Organizing Information on the Web to Support User Judgments on Information Credibility","volume-title":"Proc. of the 4th International Universal Communication Symposium (IUCS)","author":"Akamine","year":"2010"},{"key":"2026040314240710000_ref004","doi-asserted-by":"crossref","DOI":"10.1145\/2682862.2682873","article-title":"Tweet Author Location Impacts on Tweet Credibility","volume-title":"Proc. of the Australasian Document Computing Symposium","author":"Aladhadh","year":"2014"},{"key":"2026040314240710000_ref005","article-title":"Detecting Uninteresting Content in Text Streams","volume-title":"Proc. of the the Special Interest Group on Information Retrieval (SIGIR) Crowdsourcing for Search Evaluation Workshop","author":"Alonso","year":"2010"},{"key":"2026040314240710000_ref006","doi-asserted-by":"crossref","DOI":"10.14236\/ewic\/HCI2009.64","article-title":"The Effect of Aesthetics on Web Credibility","volume-title":"Proc. of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology","author":"Alsudani","year":"2009"},{"key":"2026040314240710000_ref007","doi-asserted-by":"crossref","DOI":"10.1145\/1526993.1527003","article-title":"The Effects of Source Credibility Ratings in a Cultural Heritage Information Aggregator","volume-title":"Proc. of the 3rd Workshop on Information Credibility on the Web","author":"Amin","year":"2009"},{"key":"2026040314240710000_ref008","doi-asserted-by":"crossref","DOI":"10.1145\/1557914.1557950","article-title":"Social Search and Discovery Using a Unified Approach","volume-title":"Proc. of the 20th ACM Conference on Hypertext and Hypermedia","author":"Amitay","year":"2009"},{"key":"2026040314240710000_ref009","doi-asserted-by":"crossref","DOI":"10.1145\/1451983.1452000","article-title":"Robust PageRank and Locally Computable Spam Detection Features","volume-title":"Proc. of the 4th International Workshop on Adversarial Information Retrieval on the Web","author":"Andersen","year":"2008"},{"issue":"2","key":"2026040314240710000_ref010","article-title":"Text Categorization Models for Identifying Unproven Cancer Treatments on the Web","volume":"129","author":"Aphinyanaphongs","year":"2007","journal-title":"Studies in Health Technology and Informatics"},{"key":"2026040314240710000_ref011","volume-title":"Treatise on Rhetoric, Literal ly Translated from the Greek","author":"Aristotle","year":"1857"},{"issue":"3","key":"2026040314240710000_ref012","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1111\/j.1083-6101.2009.01448.x","article-title":"Blogs of Information: How Gender Cues and Individual Motivations Influence Perceptions of Credibility","volume":"14","author":"Armstrong","year":"2009","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2026040314240710000_ref013","volume-title":"Persuasive Technology","author":"Atkinson","year":"2006"},{"issue":"3","key":"2026040314240710000_ref014","article-title":"Automated Essay Scoring with E-Rater\u00ae V. 2","volume":"4","author":"Attali","year":"2006","journal-title":"The Journal of Technology, Learning and Assessment"},{"key":"2026040314240710000_ref015","article-title":"Do we Believe in TripAdvisor? Examining Credibility perceptions and Online Travelers\u2019 Attitude Toward Using User-generated Content","author":"Ayeh","year":"2013","journal-title":"Journal ofTravel Research"},{"key":"2026040314240710000_ref016","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-78646-7_46","article-title":"Accessibility in Information Retrieval","volume-title":"Advances in Information Retrieval","author":"Azzopardi","year":"2008"},{"key":"2026040314240710000_ref017","first-page":"552","article-title":"Classifying Trust\/Distrust Relationships in Online Social Networks","volume-title":"Proc. of the International Conference on Privacy, Security, Risk and Trust","author":"Bachi","year":"2012"},{"key":"2026040314240710000_ref018","article-title":"PageRank Increase under Different Collusion Topologies","volume-title":"Proc. of the International Workshop on Adversarial Information Retrieval on the Web","author":"Baeza-Yates","year":"2005"},{"key":"2026040314240710000_ref019","doi-asserted-by":"crossref","DOI":"10.1145\/1390334.1390486","article-title":"Bloggers as Experts: Feed Distillation Using Expert Retrieval Models","volume-title":"Proc. of the Special Interest Group on Information Retrieval (SIGIR)","author":"Balog","year":"2008"},{"issue":"1","key":"2026040314240710000_ref020","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MMUL.2012.10","article-title":"Multimedia in Forensics, Security, and Intelligence","volume":"19","author":"Battiato","year":"2012","journal-title":"IEEE Trans. on Multimedia"},{"issue":"1","key":"2026040314240710000_ref021","first-page":"2","article-title":"Link Analysis for Web Spam Detection","volume":"2","author":"Becchetti","year":"2008","journal-title":"ACM Trans. on the Web (TWEB)"},{"key":"2026040314240710000_ref022","article-title":"Facilitating the Online Search of Experts at NASA Using Expert Seeker People-finder","volume-title":"Proc. of the International Conference on Practical Aspects of Knowledge Management (PAKM)","author":"Becerra-Fernandez","year":"2000"},{"key":"2026040314240710000_ref023","article-title":"Detecting Spammers and Content Promoters in Online Video Social Networks","volume-title":"Proc. of the Special Interest Group on Information Retrieval (SIGIR)","author":"Benevenuto","year":"2009"},{"issue":"4","key":"2026040314240710000_ref024","article-title":"Video Interactions in Online Video Social Networks","volume":"5","author":"Benevenuto","year":"2009","journal-title":"ACM Trans. on Multimedia Computing, Communications, and Applications (TOMCCAP)"},{"key":"2026040314240710000_ref025","article-title":"Detecting Spammers on Twitter","volume-title":"Proc. of the Collaboration, Electronic messaging, Anti-Abuse and Spam Conference","author":"Benevenuto","year":"2010"},{"issue":"3","key":"2026040314240710000_ref026","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1109\/TSMCB.2011.2173799","article-title":"Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems","volume":"42","author":"Benevenuto","year":"2012","journal-title":"IEEE Trans. on Systems, Man, and Cybernetics, Part B: Cybernetics"},{"key":"2026040314240710000_ref027","article-title":"Deliverable 4.1: First Report on Alternative Evaluation Methodology","volume-title":"Technical report, PROMISE Network of Excellence","author":"Berendsen","year":"2011"},{"issue":"1","key":"2026040314240710000_ref028","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ijmedinf.2004.10.001","article-title":"Instruments to Assess the Quality of Health Information on the World Wide Web: What Can Our Patients Actually Use?","volume":"74","author":"Bernstam","year":"2005","journal-title":"International Journal of Medical Informatics"},{"key":"2026040314240710000_ref029","doi-asserted-by":"crossref","DOI":"10.1145\/1526709.1526717","article-title":"Learning to Recognize Reliable Users and Content in Social Media with Coupled Mutual Reinforcement","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Bian","year":"2009"},{"key":"2026040314240710000_ref030","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/s10791-011-9172-x","article-title":"Graph-based Term Weighting for Information Retrieval","volume":"15","author":"Blanco","year":"2012","journal-title":"Information Retrieval"},{"issue":"1","key":"2026040314240710000_ref031","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MMUL.2007.17","article-title":"MultiTube-Where Web 2.0 and Multimedia Could Meet","volume":"14","author":"Boll","year":"2007","journal-title":"IEEE Trans. on Multimedia"},{"key":"2026040314240710000_ref032","doi-asserted-by":"crossref","DOI":"10.1145\/1401890.1401994","article-title":"Identifying Authoritative Actors in Question-answering Forums: The Case of Yahoo! Answers","volume-title":"Proc. ofSpecial Interest Group on Knowledge Discovery and Data Mining (SIGKDD)","author":"Bouguessa","year":"2008"},{"key":"2026040314240710000_ref033","doi-asserted-by":"crossref","DOI":"10.1145\/2567948.2578996","article-title":"Identifying Fraudulently Promoted Online Videos","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Bulakh","year":"2014"},{"key":"2026040314240710000_ref034","doi-asserted-by":"crossref","DOI":"10.3115\/1067807.1067814","article-title":"Toward Evaluation of Writing Style: Finding Overly Repetitive Word Use in Student Essays","volume-title":"Proc. of the Conference of the European chapter of the Association for Computational Linguistics","author":"Burstein","year":"2003"},{"key":"2026040314240710000_ref035","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-30284-8_50","article-title":"Evaluating Scientific Hypotheses Using the SPARQL Inferencing Notation","volume-title":"Proc. of the International Conference on The Semantic Web: Research and Applications","author":"Callahan","year":"2012"},{"key":"2026040314240710000_ref036","article-title":"Combining Lexical and Grammatical Features to Improve Readability Measures for First and Second Language Texts","volume-title":"Proc. of the Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL HLT)","author":"Callan","year":"2007"},{"key":"2026040314240710000_ref037","article-title":"Recod@ MediaEval 2014: Diverse Social Images Retrieval","volume-title":"Working Notes of MediaEval","author":"Calumby","year":"2014"},{"key":"2026040314240710000_ref038","doi-asserted-by":"crossref","DOI":"10.1145\/956863.956965","article-title":"Expertise Identification Using Email Communications","volume-title":"Proc. of the International Conference on Information and Knowledge Management (CIKM)","author":"Campbell","year":"2003"},{"key":"2026040314240710000_ref039","doi-asserted-by":"crossref","DOI":"10.1145\/1963405.1963500","article-title":"Information Credibility on Twitter","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Castillo","year":"2011"},{"issue":"5","key":"2026040314240710000_ref040","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1108\/IntR-05-2012-0095","article-title":"Predicting Information Credibility in Time-Sensitive Social Media","volume":"23","author":"Castillo","year":"2013","journal-title":"Internet Research"},{"key":"2026040314240710000_ref041","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v4i1.14033","article-title":"Measuring User Influence in Twitter: The Million Follower Fallacy","volume-title":"Proc. of the International Conference on Web and Social Media (ICWSM)","author":"Cha","year":"2010"},{"issue":"5","key":"2026040314240710000_ref042","doi-asserted-by":"crossref","DOI":"10.1037\/0022-3514.39.5.752","article-title":"Heuristic Versus Systematic Information Processing and the Use of Source Versus Message Cues in Persuasion","volume":"39","author":"Chaiken","year":"1980","journal-title":"Journal of Personality and Social Psychology"},{"issue":"1","key":"2026040314240710000_ref043","first-page":"26","article-title":"Using Blog Content Depth and Breadth to Access and Classify Blogs","volume":"5","author":"Chen","year":"2010","journal-title":"International Journal of Business and Information"},{"key":"2026040314240710000_ref044","article-title":"An Unsupervised Method for Detecting Grammatical Errors","volume-title":"Proc. ofthe North American chapter of the Association for Computational Linguistics conference","author":"Chodorow","year":"2000"},{"key":"2026040314240710000_ref045","article-title":"Choicestream Survey: Consumer Opinion on Online Advertising and Audience Targeting","author":"Choicestream","year":"2013"},{"issue":"4","key":"2026040314240710000_ref046","volume":"2","author":"Cofta","year":"2011","journal-title":"The Trustworthy and Trusted Web"},{"key":"2026040314240710000_ref047","article-title":"A Language Modeling Approach to Predicting Reading Difficulty","volume-title":"Proc. of the Annual Conference ofthe North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL HLT)","author":"Collins-Thompson","year":"2004"},{"key":"2026040314240710000_ref048","doi-asserted-by":"crossref","DOI":"10.1145\/1458527.1458548","article-title":"Professional Credibility: Authority on the Web","volume-title":"Proc. of the Workshop on Information Credibility on the Web","author":"Conrad","year":"2008"},{"issue":"4","key":"2026040314240710000_ref049","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1561\/1500000006","article-title":"Email Spam Filtering: A Systematic Review","volume":"1","author":"Cormack","year":"2007","journal-title":"Foundations and Trends\u00ae in Information Retrieval"},{"key":"2026040314240710000_ref050","article-title":"Credibility in the Blogosphere: A Study of Measurement and Influence of Wine Blogs as an Information Source","author":"Cosenza","year":"2014","journal-title":"Journal of Consumer Behaviour"},{"key":"2026040314240710000_ref051","doi-asserted-by":"crossref","DOI":"10.4108\/icst.pervasivehealth.2014.254988","article-title":"Is it a Question of Trust?: How Search Preferences Influence Forum Use","volume-title":"Proc. of the International Conference on Pervasive Computing Technologies for Healthcare","author":"Crawford","year":"2014"},{"key":"2026040314240710000_ref052","doi-asserted-by":"crossref","DOI":"10.1145\/2396761.2398660","article-title":"On the Inference of Average Precision from Score Distributions","volume-title":"Proc. of the International Conference on Information and Knowledge Management (CIKM)","author":"Cummins","year":"2012"},{"key":"2026040314240710000_ref053","article-title":"Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering","volume-title":"Working Notes of MediaEval","author":"Dang-Nguyen","year":"2014"},{"key":"2026040314240710000_ref054","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59140-562-7.ch107","article-title":"Web Credibility","volume-title":"Encyclopedia of Human Computer Interaction","author":"Danielson","year":"2006"},{"key":"2026040314240710000_ref055","doi-asserted-by":"crossref","DOI":"10.1145\/1772938.1772943","article-title":"On Measuring the Quality of Wikipedia Articles","volume-title":"Proc. of the Workshop on Information Credibility","author":"de la Calzada","year":"2010"},{"key":"2026040314240710000_ref056","volume-title":"The Resolution of Conflict: Constructive and Destructive Processes","author":"Deutsch","year":"1973"},{"key":"2026040314240710000_ref057","doi-asserted-by":"crossref","DOI":"10.1145\/1479190.1479195","article-title":"An Annotation Model for Making Sense of Information Quality in Online Video","volume-title":"Proc. of the International Conference on the Pragmatic Web: Innovating the Interactive Society","author":"Diakopoulos","year":"2008"},{"key":"2026040314240710000_ref058","doi-asserted-by":"crossref","DOI":"10.1145\/1772938.1772953","article-title":"Modulating Video Credibility via Visualization of Quality Evaluations","volume-title":"Proc. of the Workshop on Information Credibility","author":"Diakopoulos","year":"2010"},{"key":"2026040314240710000_ref059","doi-asserted-by":"crossref","DOI":"10.1145\/1518701.1518824","article-title":"Videolyzer: Quality Analysis of Online Informational Video for Bloggers and Journalists","volume-title":"Proc. of the SIGCHI Conference on Human Factors in Computing Systems","author":"Diakopoulos","year":"2009"},{"key":"2026040314240710000_ref060","doi-asserted-by":"crossref","DOI":"10.1145\/882082.882093","article-title":"Graph-based Ranking Algorithms for e-mail Expertise Analysis","volume-title":"Proc. of the SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery","author":"Dom","year":"2003"},{"key":"2026040314240710000_ref061","doi-asserted-by":"crossref","DOI":"10.1007\/11564096_14","article-title":"Thwarting the Nigritude Ultramarine: Learning to Identify Link Spam","volume-title":"Proc. of the European Conference on Machine Learning","author":"Drost","year":"2005"},{"key":"2026040314240710000_ref062","doi-asserted-by":"crossref","DOI":"10.4324\/9780203186015","volume-title":"Gender, Economy and Culture in the European Union","author":"Duncan","year":"2012"},{"issue":"5","key":"2026040314240710000_ref063","doi-asserted-by":"crossref","first-page":"A12","DOI":"10.1016\/j.chb.2012.12.034","article-title":"How Much Klout do You Have. . . A Test of System Generated Cues on Source Credibility","volume":"29","author":"Edwards","year":"2013","journal-title":"Computers in Human Behavior"},{"key":"2026040314240710000_ref064","article-title":"The Source of the Story: Evaluating the Credibility of Crisis Information Sources","volume-title":"Proc. of the Information Systems for Crisis Response and Management Conference","author":"Endsley","year":"2014"},{"key":"2026040314240710000_ref065","doi-asserted-by":"crossref","DOI":"10.3115\/1609067.1609092","article-title":"Cognitively Motivated Features for Readability Assessment","volume-title":"Proc. of the Conference of the European Chapter of the Association for Computational Linguistics","author":"Feng","year":"2009"},{"key":"2026040314240710000_ref066","article-title":"A Comparison of Features for Automatic Readability Assessment","volume-title":"Proc. of the International Conference on Computational Linguistics","author":"Feng","year":"2010"},{"issue":"6","key":"2026040314240710000_ref067","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1016\/S0747-5632(03)00021-9","article-title":"The Perceived credibility of Personal Web Page Information as Influenced by the Sex of the Source","volume":"19","author":"Flanagin","year":"2003","journal-title":"Computers in Human Behavior"},{"key":"2026040314240710000_ref068","volume-title":"Digital Media, Youth, and Credibility","author":"Flanagin","year":"2008"},{"issue":"3-4","key":"2026040314240710000_ref069","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10708-008-9188-y","article-title":"The Credibility of Volunteered Geographic Information","volume":"72","author":"Flanagin","year":"2008","journal-title":"GeoJournal"},{"issue":"1","key":"2026040314240710000_ref070","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10660-014-9139-2","article-title":"Mitigating Risk in E-commerce Transactions: Perceptions of Information Credibility and the Role of User-generated Ratings in Product Quality and Purchase Intention","volume":"14","author":"Flanagin","year":"2014","journal-title":"Electronic Commerce Research"},{"key":"2026040314240710000_ref071","doi-asserted-by":"crossref","DOI":"10.1016\/B978-155860643-2\/50011-1","volume-title":"Persuasive Technology: Using Computers to Change What We Think and Do","author":"Fogg","year":"2003"},{"key":"2026040314240710000_ref072","doi-asserted-by":"crossref","DOI":"10.1145\/302979.303001","article-title":"The Elements of Computer Credibility","volume-title":"Proc. of the SIGCHI Conference on Human factors in computing systems","author":"Fogg","year":"1999"},{"key":"2026040314240710000_ref073","article-title":"How do People Evaluate a Web Site\u2019s Credibility?","volume-title":"Technical report, The Stanford Persuasive Technology Lab","author":"Fogg","year":"2002"},{"issue":"2","key":"2026040314240710000_ref074","doi-asserted-by":"crossref","DOI":"10.1016\/j.amjmed.2004.04.032","article-title":"Consumer Health Information on the Internet about Carpal Tunnel Syndrome: Indicators of Accuracy","volume":"118","author":"Frick\u00e9","year":"2005","journal-title":"The American Journal of Medicine"},{"key":"2026040314240710000_ref075","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/1879141.1879147","article-title":"Detecting and Characterizing Social Spam Campaigns","volume-title":"Proc. of the SIGCOMM Conference on Internet Measurement","author":"Gao","year":"2010"},{"key":"2026040314240710000_ref076","doi-asserted-by":"crossref","DOI":"10.1016\/j.chb.2014.11.071","article-title":"Exploring Factors Influencing Chinese Users\u2019 Perceived Credibility of Health and Safety Information on Weibo","volume":"45","author":"Gao","year":"2015","journal-title":"Computers in Human Behavior"},{"key":"2026040314240710000_ref077","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.2005272","article-title":"Youth and Digital Media: From Credibility to Information Quality","volume-title":"Technical Report 2012-1, Berkman Center","author":"Gasser","year":"2012"},{"key":"2026040314240710000_ref078","article-title":"Digital Divas: Women, Politics and the Social Network","volume-title":"Technical Report D-63, Joan Shorenstein Center on the Press, Cambridge MA","author":"Geiber","year":"2011"},{"key":"2026040314240710000_ref079","doi-asserted-by":"crossref","DOI":"10.1145\/2513577.2513579","article-title":"User Profiling for Answer Quality Assessment in Q&A Communities","volume-title":"Proc. ofthe Workshop on Data-driven User Behavioral Modelling and Mining from Social Media","author":"Ginsca","year":"2013"},{"key":"2026040314240710000_ref080","doi-asserted-by":"crossref","DOI":"10.1145\/2647868.2655033","article-title":"Toward an Estimation of User Tagging Credibility for Social Image Retrieval","volume-title":"Proc. of the International Conference on Multimedia","author":"Ginsca","year":"2014"},{"key":"2026040314240710000_ref081","volume-title":"Experimental IR Meets Multilinguality, Multimodality, and Interaction","author":"Ginsca","year":"2015"},{"issue":"2","key":"2026040314240710000_ref082","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1561\/1800000006","article-title":"Trust on the World Wide Web: a Survey","volume":"1","author":"Golbeck","year":"2006","journal-title":"Foundations and Trends\u00ae in Web Science"},{"key":"2026040314240710000_ref083","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.spasta.2012.03.002","article-title":"Assuring the Quality of Volunteered Geographic Information","volume":"1","author":"Goodchild","year":"2012","journal-title":"Spatial Statistics"},{"issue":"7","key":"2026040314240710000_ref084","doi-asserted-by":"crossref","DOI":"10.1016\/j.socscimed.2004.08.010","article-title":"Health Information-seeking Behaviour in Adolescence: the Place of the Internet","volume":"60","author":"Gray","year":"2005","journal-title":"Social Science and Medicine"},{"key":"2026040314240710000_ref085","doi-asserted-by":"crossref","DOI":"10.1145\/1866307.1866311","article-title":"@Spam: the Underground on 140 Characters or Less","volume-title":"Proc. of the Conference on Computer and Communications Security","author":"Grier","year":"2010"},{"issue":"5","key":"2026040314240710000_ref086","doi-asserted-by":"crossref","DOI":"10.2196\/jmir.7.5.e59","article-title":"Automated Assessment of the Quality of Depression Websites","volume":"7","author":"Griffiths","year":"2005","journal-title":"Journal of Medical Internet Research"},{"key":"2026040314240710000_ref087","doi-asserted-by":"crossref","DOI":"10.1145\/988672.988727","article-title":"Propagation of Trust and Distrust","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Guha","year":"2004"},{"key":"2026040314240710000_ref088","doi-asserted-by":"crossref","DOI":"10.1145\/2185354.2185356","article-title":"Credibility Ranking of Tweets During High Impact Events","volume-title":"Proc. of the Workshop on Privacy and Security in Online Social Media","author":"Gupta","year":"2012"},{"key":"2026040314240710000_ref089","doi-asserted-by":"crossref","DOI":"10.1145\/2488388.2488434","article-title":"Mining Expertise and Interests from Social Media","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Guy","year":"2013"},{"key":"2026040314240710000_ref090","article-title":"Combating Web Spam with TrustRank","volume-title":"Proc. of Very Large Data Bases (VLDB)","author":"Gy\u00f6ngyi","year":"2004"},{"key":"2026040314240710000_ref091","article-title":"Toward a Model of Domain-Specific Search","volume-title":"Proc. ofthe Open research Areas in Information Retrieval (OAIR)","author":"Hanbury","year":"2013"},{"key":"2026040314240710000_ref092","doi-asserted-by":"crossref","DOI":"10.1145\/2141512.2141550","article-title":"Modeling Problem Difficulty and Expertise in StackOverflow","volume-title":"Proc. of the Conference on Computer Supported Cooperative Work","author":"Hanrahan","year":"2012"},{"key":"2026040314240710000_ref093","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-02707-9_27","article-title":"Cognition, Age, and Web Browsing","volume-title":"Proc. of Universal Access in HCI","author":"Hanson","year":"2009"},{"key":"2026040314240710000_ref094","article-title":"C-TEST: Supporting Novelty and Diversity in TestFiles for Search Tuning","volume-title":"Proc. ofthe Special Interest Group on Information Retrieval (SIGIR)","author":"Hawking","year":"2009"},{"key":"2026040314240710000_ref095","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v3i1.13976","article-title":"Blogging Together: An Examination of Group Blogs","volume-title":"Proc. of the International Conference on Web and Social Media (ICWSM)","author":"Hearst","year":"2009"},{"key":"2026040314240710000_ref096","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.288088","article-title":"Measuring the Power of Nodes in Digraphs","volume-title":"Social Science Research Network","author":"Herings","year":"2001"},{"issue":"3","key":"2026040314240710000_ref097","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1019661126744","article-title":"Variation in the Contextuality of Language: An Empirical Measure","volume":"7","author":"Heylighen","year":"2002","journal-title":"Foundations of Science"},{"issue":"4","key":"2026040314240710000_ref098","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1016\/j.ipm.2007.10.001","article-title":"Developing a Unifying Framework of Credibility Assessment: Construct, Heuristics, and Interaction in Context","volume":"44","author":"Hilligoss","year":"2008","journal-title":"Information Processing & Management"},{"key":"2026040314240710000_ref099","doi-asserted-by":"crossref","DOI":"10.1088\/1755-1315\/18\/1\/012070","article-title":"A Conceptual Model of the Automated Credibility Assessment of the Volunteered Geographic Information","volume-title":"IOP Conference Series: Earth and Environmental Science","author":"Idris","year":"2014"},{"key":"2026040314240710000_ref100","volume-title":"The Turn: Integration of Information Seeking and Retrieval in Context","author":"Ingwersen","year":"2005"},{"key":"2026040314240710000_ref101","article-title":"Retrieving Diverse Social Images at Mediaeval 2014: Challenge, Dataset and Evaluation","volume-title":"Proc. of the MediaEval Workshop","author":"Ionescu","year":"2014"},{"key":"2026040314240710000_ref102","doi-asserted-by":"crossref","DOI":"10.1145\/2713168.2713192","article-title":"Div150Cred: A Social Image Retrieval Result Diversification with User Tagging Credibility Dataset","volume-title":"Proc. of the Multimedia Systems Conference","author":"Ionescu","year":"2015"},{"key":"2026040314240710000_ref103","doi-asserted-by":"crossref","DOI":"10.1145\/503376.503442","article-title":"Statistical Profiles of Highly-rated Web Sites","volume-title":"Proc. of the SIGCHI conference on Human factors in computing systems","author":"Ivory","year":"2002"},{"key":"2026040314240710000_ref104","doi-asserted-by":"crossref","DOI":"10.1109\/WI-IAT.2014.47","article-title":"Credibility Microscope: Relating Web Page Credibility Evaluations to their Textual Content","volume-title":"Proc. of the International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)","author":"Jaworski","year":"2014"},{"issue":"2","key":"2026040314240710000_ref105","article-title":"An Analysis of the Information Behaviors, Goals, and Intentions of Frequent Internet Users: Findings from Online Activity Diaries","volume":"17","author":"Jean","year":"2012","journal-title":"First Monday"},{"key":"2026040314240710000_ref106","first-page":"14","article-title":"Do You Trust Answers?: Credibility Judgments in Social Search Using Social Q&A Sites","volume":"2","author":"Jeon","year":"2013","journal-title":"Social Networks"},{"key":"2026040314240710000_ref107","doi-asserted-by":"crossref","DOI":"10.1145\/1148170.1148212","article-title":"A Framework to Predict the Quality of Answers with Non-textual Features","volume-title":"Proc. of the Special Interest Group on Information Retrieval (SIGIR)","author":"Jeon","year":"2006"},{"key":"2026040314240710000_ref108","article-title":"Do You Find Health Advice on Microblogging Platforms Credible? Role of Self-efficacy and Health Threat in Credibility Assessment","volume-title":"Proc. of Pacific Asia Conference on Information Systems","author":"Jiang","year":"2014"},{"key":"2026040314240710000_ref109","doi-asserted-by":"crossref","DOI":"10.1145\/1341531.1341560","article-title":"Opinion Spam and Analysis","volume-title":"Proc. of the International Conference on Web Search and Data Mining (WSDM)","author":"Jindal","year":"2008"},{"issue":"1","key":"2026040314240710000_ref110","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.chb.2008.08.004","article-title":"In Blog we Trust? Deciphering Credibility of Components of the Internet Among Politically Interested Internet Users","volume":"25","author":"Johnson","year":"2009","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"2026040314240710000_ref111","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1111\/jcc4.12084","article-title":"Credibility of Social Network Sites for Political Information Among Politically Interested Internet Users","volume":"19","author":"Johnson","year":"2014","journal-title":"Journal ofComputer-Mediated Communication"},{"key":"2026040314240710000_ref112","doi-asserted-by":"crossref","DOI":"10.1080\/15205436.2010.517490","article-title":"The Facebook Election","author":"Johnson","year":"2010","journal-title":"Mass Communication and Society"},{"issue":"1","key":"2026040314240710000_ref113","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1083-6101.2007.00388.x","article-title":"Every Blog Has Its Day: Politically-interested Internet Users\u2019 Perceptions of Blog Credibility","volume":"13","author":"Johnson","year":"2007","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2026040314240710000_ref114","doi-asserted-by":"crossref","DOI":"10.1145\/1526993.1527005","article-title":"Blog Credibility Ranking by Exploiting Verified Content","volume-title":"Proc. of the 3rd Workshop on Information credibility on the web","author":"Juffinger","year":"2009"},{"key":"2026040314240710000_ref115","doi-asserted-by":"crossref","DOI":"10.1145\/1321440.1321575","article-title":"Discovering Authorities in Question Answer Communities by Using Link Analysis","volume-title":"Proc. of the International Conference on Information and Knowledge Management (CIKM)","author":"Jurczyk","year":"2007"},{"key":"2026040314240710000_ref116","doi-asserted-by":"crossref","DOI":"10.1145\/1277741.1277938","article-title":"Hits on Question Answer Portals: Exploration of Link Analysis for Author Ranking","volume-title":"Proc. of the Special Interest Group on Information Retrieval (SIGIR)","author":"Jurczyk","year":"2007"},{"key":"2026040314240710000_ref117","doi-asserted-by":"crossref","DOI":"10.1145\/1774088.1774266","article-title":"Expert Finding in Question-Answering Websites: a Novel Hybrid Approach","volume-title":"Proc. of the Symposium on Applied Computing","author":"Kao","year":"2010"},{"key":"2026040314240710000_ref118","doi-asserted-by":"crossref","DOI":"10.1145\/1835449.1835581","article-title":"A Method to Automatically Construct a User Knowledge Model in a Forum Environment","volume-title":"Proc. of the Special Interest Group on Information Retrieval (SIGIR)","author":"Kardan","year":"2010"},{"key":"2026040314240710000_ref119","volume-title":"Progress in Location-Based Services 2014","author":"Karimipour","year":"2015"},{"key":"2026040314240710000_ref120","doi-asserted-by":"crossref","DOI":"10.1145\/1458527.1458541","article-title":"Using a Sentiment Map for Visualizing Credibility of News Sites on the Web","volume-title":"Proc. ofthe 2nd ACM Workshop on Information Credibility on the Web","author":"Kawai","year":"2008"},{"issue":"1","key":"2026040314240710000_ref121","doi-asserted-by":"crossref","DOI":"10.15847\/obsOBS812014688","article-title":"The Internet as a Source of Information. The Social Role of Blogs and Their Reliability","volume":"8","author":"Keskenidou","year":"2014","journal-title":"Observatorio (OBS*)"},{"key":"2026040314240710000_ref122","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-319-00615-4_2","volume-title":"Geographic Information Science at the Heart ofEurope","author":"Ke\u00dfler","year":"2013"},{"key":"2026040314240710000_ref123","article-title":"Credibility Assessment of Volunteered Geographic Information for Emergency Management: a Bayesian Network Modeling Approach","volume-title":"PhD thesis, University of Illinois at Urbana-Champaign","author":"Kim","year":"2013"},{"issue":"7184","key":"2026040314240710000_ref124","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1136\/bmj.318.7184.647","article-title":"Published Criteria for Evaluating Health Related Web Sites: Review","volume":"318","author":"Kim","year":"1999","journal-title":"Bmj"},{"issue":"5","key":"2026040314240710000_ref125","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1145\/324133.324140","article-title":"Authoritative Sources in a Hyperlinked Environment","volume":"46","author":"Kleinberg","year":"1999","journal-title":"Journal of the ACM (JACM)"},{"key":"2026040314240710000_ref126","article-title":"Expert Search Using Internal Corporate Blogs","volume-title":"Proc. of the Special Interest Group on Information Retrieval (SIGIR) Workshop: Future Challenges in Expertise Retrieval","author":"Kolari","year":"2008"},{"issue":"2","key":"2026040314240710000_ref127","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ijinfomgt.2013.11.009","article-title":"Work-related Actors Influencing Doctors Search Behaviors And Trust Toward Medical Information Resources","volume":"34","author":"Kostagiolas","year":"2014","journal-title":"International Journal of Information Management"},{"key":"2026040314240710000_ref128","doi-asserted-by":"crossref","DOI":"10.4135\/9781452243610","volume-title":"Trust in Organizations: Frontiers of Theory and Research","author":"Kramer","year":"1996"},{"key":"2026040314240710000_ref129","first-page":"101","article-title":"Trusting The Internet: New Approaches To Credibility Tools","volume-title":"The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning","author":"Lankes","year":"2007"},{"issue":"2","key":"2026040314240710000_ref130","volume":"1","author":"Lazar","year":"2007","journal-title":"Understanding Web Credibility: A Synthesis Of The Research Literature"},{"issue":"2","key":"2026040314240710000_ref131","volume":"1","author":"Lazar","year":"2007","journal-title":"Understanding Web Credibility: A Synthesis Of The Research Literature"},{"issue":"1","key":"2026040314240710000_ref132","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.hlpt.2013.11.003","article-title":"Who Can You Trust? Credibility Assessment In Online Health Forums","volume":"3","author":"Lederman","year":"2014","journal-title":"Health Policy and Technology"},{"key":"2026040314240710000_ref133","doi-asserted-by":"crossref","DOI":"10.1145\/1835449.1835522","article-title":"Uncovering Social Spammers: Social Honeypots+ Machine Learning","volume-title":"Proc. of the Special Interest Group on Information Retrieval (SIGIR)","author":"Lee","year":"2010"},{"key":"2026040314240710000_ref134","article-title":"Teens, Kindness, And Cruelty On Social Network Sites: How American Teens Navigate The New World Of \u201cdigital Citizenship\u201d","volume-title":"Technical report, Pew Internet and American Life Project","author":"Lenhart","year":"2011"},{"issue":"6","key":"2026040314240710000_ref135","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MIC.2007.136","article-title":"Social Information Processing In News Aggregation","volume":"11","author":"Lerman","year":"2007","journal-title":"IEEE Internet Computing"},{"key":"2026040314240710000_ref136","doi-asserted-by":"crossref","DOI":"10.1145\/2740908.2742129","article-title":"Answer Quality Characteristics and Prediction on an Academic Q&A Site: A Case Study on ResearchGate","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Li","year":"2015"},{"issue":"1","key":"2026040314240710000_ref137","doi-asserted-by":"crossref","first-page":"2:1","DOI":"10.1145\/2534410","article-title":"Age Differences in Credibility Judgments of Online Health Information","volume":"21","author":"Liao","year":"2014","journal-title":"ACM Trans. on Computer-Human Interaction"},{"issue":"1","key":"2026040314240710000_ref138","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.ipm.2012.07.002","article-title":"Integrating Expert Profile, Reputation And Link Analysis For Expert Finding In Question-answering Websites","volume":"49","author":"Liu","year":"2013","journal-title":"Information Processing & Management"},{"key":"2026040314240710000_ref139","doi-asserted-by":"crossref","DOI":"10.1145\/1386790.1386838","article-title":"Predicting Trusts Among Users Of Online Communities: An Epinions Case Study","volume-title":"Proc. ofthe 9th ACM conference on Electronic commerce","author":"Liu","year":"2008"},{"key":"2026040314240710000_ref140","doi-asserted-by":"crossref","DOI":"10.1145\/1099554.1099644","article-title":"Finding Experts In Community-based Question-answering Services","volume-title":"Proc. of the International Conference on Information and Knowledge Management (CIKM)","author":"Liu","year":"2005"},{"key":"2026040314240710000_ref141","doi-asserted-by":"crossref","DOI":"10.1145\/2487788.2488131","article-title":"Defending Imitating Attacks in Web Credibility Evaluation Systems","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Liu","year":"2013"},{"key":"2026040314240710000_ref142","doi-asserted-by":"crossref","DOI":"10.1145\/1458527.1458536","article-title":"On The Credibility Of Wikipedia: An Accessibility Perspective","volume-title":"Proc. of the 2nd ACM Workshop on Information Credibility on the Web","author":"Lopes","year":"2008"},{"issue":"1","key":"2026040314240710000_ref143","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1080\/10447318.2013.839899","article-title":"A Picture Is Worth A Thousand Words: Source Credibility Theory Applied To Logo And Website Design For Heightened Credibility And Consumer Trust","volume":"30","author":"Lowry","year":"2014","journal-title":"International Journal of Human-Computer Interaction"},{"key":"2026040314240710000_ref144","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/1772938.1772944","article-title":"Trust in Wikipedia: How Users Trust Information From an Unknown Source","volume-title":"Proc. of the 4th Workshop on Information Credibility","author":"Lucassen","year":"2010"},{"issue":"7","key":"2026040314240710000_ref145","doi-asserted-by":"crossref","first-page":"1232","DOI":"10.1002\/asi.21545","article-title":"Factual Accuracy And Trust In Information: The Role Of Expertise","volume":"62","author":"Lucassen","year":"2011","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"2","key":"2026040314240710000_ref146","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1002\/asi.22743","article-title":"Topic Familiarity And Information Skills In Online Credibility Evaluation","volume":"64","author":"Lucassen","year":"2013","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"2026040314240710000_ref147","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"Luhmann","year":"1988"},{"key":"2026040314240710000_ref148","doi-asserted-by":"crossref","DOI":"10.1016\/j.dss.2013.05.005","article-title":"Impact of Informational Factors on Online Recommendation Credibility: The Moderating Role of Source Credibility","author":"Luo","year":"2013","journal-title":"Decision Support Systems"},{"issue":"1","key":"2026040314240710000_ref149","doi-asserted-by":"crossref","DOI":"10.1561\/9781601986498","volume":"7","author":"Lupu","year":"2013","journal-title":"Patent Retrieval"},{"key":"2026040314240710000_ref150","first-page":"3","article-title":"The Trec Blogs06 Collection: Creating And Analysing A Blog Test Collection","volume-title":"Department of Computer Science, University of Glasgow Technical Report TR-2006-224","author":"Macdonald","year":"2006"},{"key":"2026040314240710000_ref151","doi-asserted-by":"crossref","DOI":"10.1080\/00222216.1991.11969840","article-title":"A Model For Assessing The Effects Of Communication On Recreationists","author":"Manfredo","year":"1991","journal-title":"Journal of Leisure Research"},{"key":"2026040314240710000_ref152","article-title":"Controversial Users Demand Local Trust Metrics: An Experimental Study On Epinions.com Community","volume-title":"Proc. of the National Conference on Artificial Intelligence","author":"Massa","year":"2005"},{"issue":"8","key":"2026040314240710000_ref153","first-page":"639","article-title":"SMOG Grading: A New Readability Formula","volume":"12","author":"McLaughlin","year":"1969","journal-title":"Journal of Reading"},{"key":"2026040314240710000_ref154","doi-asserted-by":"crossref","DOI":"10.1145\/1964858.1964869","article-title":"Twitter Under Crisis: Can We Trust What We RT?","volume-title":"Proc. of the First Workshop on Social Media Analytics","author":"Mendoza","year":"2010"},{"key":"2026040314240710000_ref155","volume-title":"Social Trust and the Management of Risk","author":"Metlay","year":"1999"},{"issue":"13","key":"2026040314240710000_ref156","doi-asserted-by":"crossref","first-page":"2078","DOI":"10.1002\/asi.20672","article-title":"Making Sense Of Credibility On The Web: Models for Evaluating Online Information and Recommendations for Future Research","volume":"58","author":"Metzger","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"2026040314240710000_ref157","first-page":"293","volume-title":"Communication Yearbook","author":"Metzger","year":"2003"},{"key":"2026040314240710000_ref158","article-title":"Using Blog Properties to Improve Retrieval","volume-title":"Proc. of the International Conference on Web and Social Media (ICWSM)","author":"Mishne","year":"2007"},{"key":"2026040314240710000_ref159","article-title":"Leave a Reply: An Analysis of Weblog Comments","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Mishne","year":"2006"},{"key":"2026040314240710000_ref160","article-title":"Leave a Reply: An Analysis Of Weblog Comments","volume-title":"The 3rd Annual Workshop on the Weblogging Ecosystem","author":"Mishne","year":"2006"},{"key":"2026040314240710000_ref161","doi-asserted-by":"crossref","DOI":"10.1145\/2623330.2623714","article-title":"People on Drugs: Credibility of User Statements in Health Communities","volume-title":"Proc. ofSpecial Interest Group on Knowledge Discovery and Data Mining (SIGKDD)","author":"Mukherjee","year":"2014"},{"key":"2026040314240710000_ref162","doi-asserted-by":"crossref","DOI":"10.1145\/1526993.1527004","article-title":"Statement Map: Assisting Information Crediblity Analysis by Visualizing Arguments","volume-title":"Proc. of the 3rd Workshop on Information Credibility on the Web","author":"Murakami","year":"2009"},{"key":"2026040314240710000_ref163","doi-asserted-by":"crossref","DOI":"10.1145\/2567948.2576939","article-title":"Information Network or Social Network?: The Structure of the Twitter Follow Graph","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Myers","year":"2014"},{"key":"2026040314240710000_ref164","doi-asserted-by":"crossref","DOI":"10.1145\/1963192.1963298","article-title":"DIDO: A Disease-determinants Ontology From Web Sources","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Nebot Romero","year":"2011"},{"key":"2026040314240710000_ref165","article-title":"Constructing a Scientific Blog Corpus for Information Credibility Analysis","volume-title":"Proc. ofthe Annual Meeting ofthe Association for Neuro-Linguistic Programming (ANLP)","author":"Nichols","year":"2009"},{"key":"2026040314240710000_ref166","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/978-3-319-03260-3_36","volume-title":"Social Informatics","author":"Nielek","year":"2013"},{"key":"2026040314240710000_ref167","doi-asserted-by":"crossref","DOI":"10.1145\/1571941.1572046","article-title":"Telling Experts from Spammers: Expertise Ranking in Folksonomies","volume-title":"Proc. of the Special Interest Group on Information Retrieval (SIGIR)","author":"Noll","year":"2009"},{"key":"2026040314240710000_ref168","doi-asserted-by":"crossref","DOI":"10.1023\/A:1026080230789","article-title":"From Retrieval Status Values to Probabilities of Relevance for Advanced IR Applications","volume":"6","author":"Nottelmann","year":"2003","journal-title":"Information Retrieval"},{"key":"2026040314240710000_ref169","doi-asserted-by":"crossref","DOI":"10.1145\/1135777.1135794","article-title":"Detecting Spam Web Pages Through Content Analysis","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Ntoulas","year":"2006"},{"key":"2026040314240710000_ref170","article-title":"Network Analysis of Recurring YouTube Spam Campaigns","volume-title":"Procs. of the International Conference on Web and Social Media (ICWSM)","author":"O\u2019Callaghan","year":"2012"},{"key":"2026040314240710000_ref171","doi-asserted-by":"crossref","DOI":"10.1109\/SocialCom-PASSAT.2012.128","article-title":"Credibility in Context: An Analysis of Feature Distributions in Twitter","volume-title":"Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom)","author":"ODonovan","year":"2012"},{"key":"2026040314240710000_ref172","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-36973-5_47","article-title":"Web Credibility: Features Exploration and Credibility Prediction","volume-title":"Proc. of the Annual European Conference on Information Retrieval (ECIR)","author":"Olteanu","year":"2013"},{"key":"2026040314240710000_ref173","article-title":"A Conceptual Workflow for Automatically Assessing the Quality of Volunteered Geographic Information for Crisis Management","volume-title":"Proc. of the Annual Association of Geographic Information Laboratories for Europe","author":"Ostermann","year":"2011"},{"key":"2026040314240710000_ref174","article-title":"The PageRank Citation Ranking: Bringing Order to the Web","volume-title":"Technical report 1999-66, Stanford InfoLab","author":"Page","year":"1999"},{"key":"2026040314240710000_ref175","doi-asserted-by":"crossref","DOI":"10.1145\/1935826.1935843","article-title":"Identifying Topical Authorities in Microblogs","volume-title":"Proc. of the International Conference on Web Search and Data Mining (WSDM)","author":"Pal","year":"2011"},{"key":"2026040314240710000_ref176","article-title":"Evolution of Experts in Question Answering Communities","volume-title":"Proc. of the International AAAI Conference on Weblogs and Social Media","author":"Pal","year":"2012"},{"issue":"2","key":"2026040314240710000_ref177","doi-asserted-by":"crossref","first-page":"10:1","DOI":"10.1145\/2180868.2180872","article-title":"Exploring Question Selection Bias to Identify Experts and Potential Experts in Community Question Answering","volume":"30","author":"Pal","year":"2012","journal-title":"ACM Trans. on Information Systems"},{"key":"2026040314240710000_ref178","doi-asserted-by":"crossref","DOI":"10.1145\/2184305.2184312","article-title":"Game-theoretic Models of Web Credibility","volume-title":"Proc. ofthe 2nd Joint WICOW\/AIRWeb Workshop on Web Quality","author":"Papaioannou","year":"2012"},{"issue":"1","key":"2026040314240710000_ref179","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1080\/13032917.2013.820203","article-title":"Personal Profile Information as Cues of Credibility in Online Travel Reviews","volume":"25","author":"Park","year":"2014","journal-title":"Anatolia"},{"key":"2026040314240710000_ref180","doi-asserted-by":"crossref","DOI":"10.1145\/2488388.2488476","article-title":"Latent Credibility Analysis","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Pasternack","year":"2013"},{"issue":"2","key":"2026040314240710000_ref181","article-title":"Source Credibility As a Function of Communicator Physical Attractiveness","volume":"11","author":"Patzer","year":"1983","journal-title":"Journal of Busin ess Research"},{"key":"2026040314240710000_ref182","doi-asserted-by":"crossref","DOI":"10.1109\/SocialCom-PASSAT.2012.13","article-title":"Can You Believe an Anonymous Contributor? On Truthfulness in Yahoo! Answer","volume-title":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Social Computing (SocialCom)","author":"Pelleg","year":"2012"},{"issue":"1","key":"2026040314240710000_ref183","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.csl.2008.04.003","article-title":"A Machine Learning Approach to Reading Level Assessment","volume":"23","author":"Petersen","year":"2009","journal-title":"Computer Speech & Language"},{"issue":"4","key":"2026040314240710000_ref184","doi-asserted-by":"crossref","DOI":"10.2196\/jmir.5.4.e33","article-title":"How Do Consumers Search for and Appraise Information on Medicines on the Internet? A Qualitative Study Using Focus Groups","volume":"5","author":"Peterson","year":"2006","journal-title":"Journal of Medical Internet Research"},{"key":"2026040314240710000_ref185","doi-asserted-by":"crossref","DOI":"10.1016\/S0065-2601(08)60214-2","article-title":"The Elaboration Likelihood Model of Persuasion","volume":"19","author":"Petty","year":"1986","journal-title":"Advances in Experimental Social Psychology"},{"key":"2026040314240710000_ref186","article-title":"Internet Gains on Television as Public\u2019s Main News Source","volume-title":"Technical report, The Pew Research Center for the People and the Press","author":"Pew Research Center","year":"2011"},{"key":"2026040314240710000_ref187","unstructured":"Pew Research Center\n          . Emerging Nations Embrace Internet, Mobile Technology.http:\/\/www.pewglobal.org\/2014\/02\/13\/emerging-nations-embrace-internet-mobile-technology\/, February2014."},{"key":"2026040314240710000_ref188","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-33247-0_7","article-title":"Effects of Language and Topic Size in Patent IR: An Empirical Study","volume-title":"Proc. of the Conference and Labs of the Evaluation Forum (CLEF)","author":"Piroi","year":"2012"},{"key":"2026040314240710000_ref189","doi-asserted-by":"crossref","DOI":"10.1145\/1518701.1518929","article-title":"So You Know You\u2019re Getting the Best Possible Information: A Tool that Increases Wikipedia Credibility","volume-title":"Proc. of the SIGCHI Conference on Human Factors in Computing Systems","author":"Pirolli","year":"2009"},{"key":"2026040314240710000_ref190","doi-asserted-by":"crossref","DOI":"10.3115\/1613715.1613742","article-title":"Revisiting Readability: A Unified Framework for Predicting Text Quality","volume-title":"Proc. of the Conference on Empirical Methods on Natural Language Processing (EMNLP)","author":"Pitler","year":"2008"},{"key":"2026040314240710000_ref191","article-title":"Filtering Web Pages for Quality Indicators: An Empirical Approach to Finding High Quality Consumer Health Information on the World Wide Web","volume-title":"Proc. of the AMIA Symposium","author":"Price","year":"1999"},{"key":"2026040314240710000_ref192","doi-asserted-by":"crossref","DOI":"10.1145\/2567948.2578997","article-title":"Incredible: Is (Almost) All Web Content Trustworthy? Analysis of psychological factors related to website credibility evaluation","volume-title":"Proc. ofthe International World Wide Web Conference (WWW)","author":"Rafalak","year":"2014"},{"key":"2026040314240710000_ref193","volume-title":"Guide to Writing","author":"Ramage","year":"1998","edition":"4th"},{"issue":"2","key":"2026040314240710000_ref194","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1002\/asi.10017","article-title":"Judgment of Information Quality and Cognitive Authority in the Web","volume":"53","author":"Rieh","year":"2002","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"2026040314240710000_ref195","article-title":"Credibility and Cognitive Authority of Information","volume-title":"Encyclopedia of Library and Informaitn Sciences, 3rd Ed.","author":"Rieh","year":"2010"},{"key":"2026040314240710000_ref196","article-title":"Understanding Judgment of Information Quality and Cognitive Authority in the WWW","volume-title":"Proc. of the 61st Annual Meeting of the American Society for Information Science","author":"Rieh","year":"1998"},{"issue":"1","key":"2026040314240710000_ref197","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1002\/aris.2007.1440410114","article-title":"Credibility: A Multidisciplinary Framework","volume":"41","author":"Rieh","year":"2007","journal-title":"Annual Review of Information Science and Technology"},{"key":"2026040314240710000_ref198","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v8i1.14525","article-title":"Audience-aware Credibility: From Understanding Audience to Establishing Credible Blogs","volume-title":"Proc. of the International Conference on Web and Social Media (ICWSM)","author":"Rieh","year":"2014"},{"issue":"1","key":"2026040314240710000_ref199","doi-asserted-by":"crossref","DOI":"10.1086\/208577","article-title":"Children and Commercial Persuasion: An Attribution Theory Analysis","volume":"1","author":"Robertson","year":"1974","journal-title":"Journal of Consumer Research"},{"key":"2026040314240710000_ref200","article-title":"A Protection Motivation Theory of Fear Appeals and Attitude Change","volume-title":"The Journal ofPsychology: Interdisciplinary and Applied","author":"Rogers","year":"1975"},{"key":"2026040314240710000_ref201","author":"Rowe","year":"2010"},{"issue":"4","key":"2026040314240710000_ref202","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1177\/0165551513477820","article-title":"Understanding Trust Formation in Digital Information Sources: The Case of Wikipedia","volume":"39","author":"Rowley","year":"2013","journal-title":"Journal of Information Science"},{"key":"2026040314240710000_ref203","article-title":"Assessing the Credibility Of Weblogs","volume-title":"Proc. of the AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs (CAAW)","author":"Rubin","year":"2006"},{"issue":"2","key":"2026040314240710000_ref204","article-title":"Automated Essay Scoring Using Bayes\u2019 Theorem","volume":"1","author":"Rudner","year":"2002","journal-title":"The Journal of Technology, Learning and Assessment"},{"key":"2026040314240710000_ref205","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1007\/978-3-319-06028-6_54","volume-title":"Advances in Information Retrieval","author":"Rybak","year":"2014"},{"key":"2026040314240710000_ref206","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1007\/978-3-642-28601-8_37","article-title":"Text Content Reliability Estimation in Web Documents: A New Proposal","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"Sanz","year":"2012"},{"issue":"12","key":"2026040314240710000_ref207","first-page":"2536","article-title":"The Structure of Argument Patterns on a Social Q&A Site","volume":"63","author":"Savolainen","year":"2012","journal-title":"Journal ofthe Association for Information Science and Technology"},{"issue":"1","key":"2026040314240710000_ref208","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1108\/JD-11-2012-0152","article-title":"The Use of Rhetorical Strategies in Q&Amp;A Discussion","volume":"70","author":"Savolainen","year":"2014","journal-title":"Journal of Documentation"},{"key":"2026040314240710000_ref209","doi-asserted-by":"crossref","DOI":"10.1145\/1978942.1979127","article-title":"Augmenting Web Pages and Search Results to Support Credibility assessment","volume-title":"Proc. of the Special Interest Group on Computer-Human Interaction (SIGCHI)","author":"Schwarz","year":"2011"},{"key":"2026040314240710000_ref210","volume-title":"Human-Computer Interaction: Fundamentals","author":"Sears","year":"2009"},{"issue":"7","key":"2026040314240710000_ref211","doi-asserted-by":"crossref","first-page":"e69958","DOI":"10.1371\/journal.pone.0069958","article-title":"Comparing the Quality of Crowdsourced Data Contributed by Expert and Non-experts","volume":"8","author":"See","year":"2013","journal-title":"PloS one"},{"key":"2026040314240710000_ref212","volume-title":"Assessing the Credibility of VGI Contributors Based on Metadata and Reverse Viewshed Analysis: An Experiment with Geotagged Flickr Images","author":"Senaratne","year":"2013"},{"key":"2026040314240710000_ref213","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/978-3-319-07293-7_24","volume-title":"HCI in Business","author":"Seo","year":"2014"},{"key":"2026040314240710000_ref214","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/978-3-319-06028-6_50","volume-title":"Advances in Information Retrieval","author":"Shariff","year":"2014"},{"issue":"12","key":"2026040314240710000_ref215","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/355112.355124","article-title":"Designing Trust into Online Experiences","volume":"43","author":"Shneiderman","year":"2000","journal-title":"Communications of the ACM"},{"key":"2026040314240710000_ref216","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-319-05467-4_2","volume-title":"Roles, Trust, and Reputation in Social Media Knowledge Markets","author":"Shneiderman","year":"2015"},{"key":"2026040314240710000_ref217","doi-asserted-by":"crossref","DOI":"10.1145\/502585.502695","article-title":"A Statistical Model for Scientific Readability","volume-title":"Proc. ofthe International Conference on Information and Knowledge Management (CIKM)","author":"Si","year":"2001"},{"key":"2026040314240710000_ref218","volume-title":"Information Fusion (FUSION), 2014 17th International Conference on","author":"Sikdar","year":"2014"},{"key":"2026040314240710000_ref219","volume-title":"2013 International Conference on Social Computing (SocialCom)","author":"Sikdar","year":"2013"},{"key":"2026040314240710000_ref220","volume-title":"Knowing Together: A Social Epistemology for Socio-Technical Epistemic Systems","author":"Simon","year":"2010"},{"key":"2026040314240710000_ref221","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/978-3-642-28997-2_19","article-title":"Reliability Prediction of Webpages in the Medical Domain","volume-title":"Advances in Information Retrieval","author":"Sondhi","year":"2012"},{"issue":"2","key":"2026040314240710000_ref222","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1080\/15230406.2013.874200","article-title":"Spatial Collective Intelligence? Credibility, Accuracy, and Volunteered Geographic Information","volume":"41","author":"Spielman","year":"2014","journal-title":"Cartography and Geographic Information Science"},{"key":"2026040314240710000_ref223","volume-title":"Proc. of the IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology","author":"Sriphaew","year":"2008"},{"key":"2026040314240710000_ref224","article-title":"Experts vs. Online Consumers: A Comparative Credibility Study of Health and Finance Web Sites","volume-title":"Consumer Web Watch Research Report","author":"Stanford","year":"2002"},{"key":"2026040314240710000_ref225","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-3-642-40802-1_10","volume-title":"Information Access Evaluation. Multilinguality, Multimodality, and Visualization","author":"Stefanov","year":"2013"},{"key":"2026040314240710000_ref226","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-3-642-40802-1_10","volume-title":"Information Access Evaluation. Multilinguality, Multimodality, and Visualization","author":"Stefanov","year":"2013"},{"key":"2026040314240710000_ref227","doi-asserted-by":"crossref","DOI":"10.1145\/1242572.1242604","article-title":"Internet-scale Collection of Human-reviewed Data","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Su","year":"2007"},{"key":"2026040314240710000_ref228","volume-title":"Proc. of the 2010 Workshop on NLP and Linguistics: Finding the Common Ground","author":"Su","year":"2010"},{"key":"2026040314240710000_ref229","volume-title":"Digital Media, Youth, and Credibility","author":"Sundar","year":"2008"},{"key":"2026040314240710000_ref230","doi-asserted-by":"crossref","DOI":"10.1145\/2309996.2310047","article-title":"QualityRank: Assessing Quality of Wikipedia Articles by Mutually Evaluating Editors and Texts","volume-title":"Proc. of the Conference on Hypertext and Social Media","author":"Suzuki","year":"2012"},{"key":"2026040314240710000_ref231","article-title":"African Entrepreneurs Deflate Google\u2019s Internet Balloon Idea","volume-title":"MIT Technology Review","author":"Talbot","year":"2013"},{"key":"2026040314240710000_ref232","article-title":"Blog Spam: A Review","volume-title":"Conference on Email and AntiSpam (CEAS)","author":"Thomason","year":"2007"},{"key":"2026040314240710000_ref233","article-title":"Trusting Tweets: The Fukushima Disaster and Information Source Credibility on Twitter","volume-title":"Proc. of the 9th International Conference on Information Systems for Crisis Response and Management","author":"Thomson","year":"2012"},{"key":"2026040314240710000_ref234","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v8i1.14509","article-title":"Counting on Friends: Cues to Perceived Trustworthiness in Facebook Profiles","volume-title":"Proc. of the International Conference on Web and Social Media (ICWSM)","author":"Toma","year":"2014"},{"issue":"3","key":"2026040314240710000_ref235","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s10708-014-9556-8","article-title":"Towards Credibility of Micro-blogs: Characterising Witness Accounts","volume":"80","author":"Truelove","year":"2015","journal-title":"GeoJournal"},{"issue":"2","key":"2026040314240710000_ref236","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1002\/asi.21259","article-title":"Predicting Podcast Preference: An Analysis Framework and Its Application","volume":"61","author":"Tsagkias","year":"2009","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"5","key":"2026040314240710000_ref237","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/301353.301402","article-title":"Credibility and Computing Technology","volume":"42","author":"Tseng","year":"1999","journal-title":"Communications of the ACM"},{"key":"2026040314240710000_ref238","volume-title":"Discussion Paper Series from Center for Rationality and Interactive Decision Theory","author":"Ullmann-Margalit","year":"2001"},{"key":"2026040314240710000_ref239","unstructured":"US Census\n          . Educational Attainment in the United States: 2014.http:\/\/www.census.gov\/hhes\/socdemo\/education\/data\/cps\/2014\/tables.html, 2015."},{"key":"2026040314240710000_ref240","article-title":"Weblogs: Credibility and Collaboration in an Online World","volume-title":"Computer Supported Cooperative Work Workshop","author":"Van House","year":"2004"},{"key":"2026040314240710000_ref241","doi-asserted-by":"crossref","DOI":"10.1145\/2567948.2579000","article-title":"Predicting Webpage Credibility Using Linguistic Features","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Wawer","year":"2014"},{"key":"2026040314240710000_ref242","article-title":"Credibility Improves Topical Blog Post Retrieval","volume-title":"46th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies","author":"Weerkamp","year":"2008"},{"key":"2026040314240710000_ref243","first-page":"1","article-title":"Credibility-inspired Ranking for Blog Post Retrieval","author":"Weerkamp","year":"2012","journal-title":"Information Retrieval"},{"key":"2026040314240710000_ref244","volume-title":"Proc. of the 45th Annual Meeting of the ACL on Interactive Poster and Demonstration Sessions","author":"Weimer","year":"2007"},{"key":"2026040314240710000_ref245","doi-asserted-by":"crossref","DOI":"10.1145\/1718487.1718520","article-title":"TwitterRank: Finding Topic-sensitive Influential Twitterers","volume-title":"Proc. of the International Conference on Web Search and Data Mining (WSDM)","author":"Weng","year":"2010"},{"issue":"2","key":"2026040314240710000_ref246","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1111\/jcc4.12041","article-title":"Social Media as Information Source: Recency of Updates and Credibility of Information","volume":"19","author":"Westerman","year":"2014","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"2","key":"2026040314240710000_ref247","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1111\/j.1559-1816.1975.tb01305.x","article-title":"Is the Medium the Message? A Study of Effects of Media, Communicator, and Message Characteristics on Attitude Change","volume":"5","author":"Worchel","year":"1975","journal-title":"Journal of Applied Social Psychology"},{"key":"2026040314240710000_ref248","article-title":"Using Visual Features for Anti-spam Filtering","volume-title":"Proc. of the International Conference on Image Processing","author":"Wu","year":"2005"},{"key":"2026040314240710000_ref249","article-title":"Most of U.S. Is Wired, but Millions Aren\u2019t Plugged In","volume-title":"The New York Times","author":"Wyatt","year":"2013"},{"issue":"1","key":"2026040314240710000_ref250","first-page":"178","article-title":"Consumers\u2019 Responses to Ambivalent Online Hotel Reviews: The Role of Perceived Source Credibility and Pre-decisional Disposition","volume":"30","author":"Xie","year":"2011","journal-title":"International Journal of Hospitality Management"},{"key":"2026040314240710000_ref251","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/978-3-642-14246-8_24","volume-title":"Web-Age Information Management","author":"Xu","year":"2010"},{"key":"2026040314240710000_ref252","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/978-3-642-23535-1_26","article-title":"Credibility-oriented Ranking of Multimedia News Based on a Material-opinion Model","volume-title":"Web-Age Information Management","author":"Xu","year":"2011"},{"key":"2026040314240710000_ref253","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.chb.2014.01.027","article-title":"Should I Trust Him? The Effects of Reviewer Profile Characteristics on eWOM Credibility","volume":"33","author":"Xu","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"7","key":"2026040314240710000_ref254","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1002\/asi.20361","article-title":"Relevance Judgment: What Do Information Users Consider Beyond Topicality?","volume":"57","author":"Xu","year":"2006","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"2026040314240710000_ref255","doi-asserted-by":"crossref","DOI":"10.1145\/1978942.1979126","article-title":"Enhancing Credibility Judgment of Web Search Results","volume-title":"Proc. of the 2011 Annual Conference on Human Factors in Computing Systems","author":"Yamamoto","year":"2011"},{"key":"2026040314240710000_ref256","doi-asserted-by":"crossref","DOI":"10.1145\/1982185.1982546","article-title":"ImageAlert: Credibility Analysis of Text-image Pairs on the Web","volume-title":"Proc. of the 2011 ACM Symposium on Applied Computing","author":"Yamamoto","year":"2011"},{"key":"2026040314240710000_ref257","article-title":"Game Principles for Enhancing the Quality of User-generated Data Collections","volume-title":"Proc. of the 17th Annual Association of Geographic Information Laboratories for Europe (AGILE) Conference on Geographic Information Science","author":"Yanenko","year":"2014"},{"issue":"5","key":"2026040314240710000_ref258","doi-asserted-by":"crossref","first-page":"752","DOI":"10.1108\/OIR-05-2012-0091","article-title":"Exploring User Contributed Information in Social Computing Systems: Quantity Versus Quality","volume":"37","author":"Ye","year":"2013","journal-title":"Online Information Review"},{"key":"2026040314240710000_ref259","doi-asserted-by":"crossref","DOI":"10.1145\/2632188.2632208","article-title":"Constructing Effective and Efficient Topic-specific Authority Networks for Expert Finding in Social Media","volume-title":"Proc. of the Workshop on Social Media Retrieval and Analysis","author":"Yeniterzi","year":"2014"},{"key":"2026040314240710000_ref260","doi-asserted-by":"crossref","DOI":"10.1145\/2600428.2609486","article-title":"Analyzing Bias in CQA-based Expert Finding Test Sets","volume-title":"Proc. of the Special Interest Group on Information Retrieval (SIGIR)","author":"Yeniterzi","year":"2014"},{"issue":"2","key":"2026040314240710000_ref261","article-title":"The Impact of Online Disruptive Ads on Users\u2019 Comprehension, Evaluation of Site Credibility, and Sentiment of Intrusiveness","volume":"16","author":"Zha","year":"2014","journal-title":"American Communication Journal"},{"key":"2026040314240710000_ref262","volume-title":"Visualization for Information Retrieval (The Information Retrieval Series)","author":"Zhang","year":"2007","edition":"1st"},{"key":"2026040314240710000_ref263","doi-asserted-by":"crossref","DOI":"10.1145\/2661829.2661978","article-title":"NCR: A Scalable Network-Based Approach to Co-Ranking in Question-and-Answer Sites","volume-title":"Proc. of the International Conference on Information and Knowledge Management (CIKM)","author":"Zhang","year":"2014"},{"key":"2026040314240710000_ref264","doi-asserted-by":"crossref","DOI":"10.1145\/1242572.1242603","article-title":"Expertise Networks in Online Communities: Structure and Algorithms","volume-title":"Proc. of the International World Wide Web Conference (WWW)","author":"Zhang","year":"2007"},{"issue":"2","key":"2026040314240710000_ref265","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1111\/j.1468-0009.2012.00662.x","article-title":"Health and Illness in a Connected World: How Might Sharing Experiences on the Internet Affect People\u2019s Health?","volume":"90","author":"Ziebland","year":"2012","journal-title":"Milbank Quarterly"},{"key":"2026040314240710000_ref266","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-319-15916-4_3","volume-title":"Propagation Phenomena in Real World Networks","author":"Ziegler","year":"2015"},{"issue":"4-5","key":"2026040314240710000_ref267","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s10796-005-4807-3","article-title":"Propagation Models for Trust and Distrust in Social Networks","volume":"7","author":"Ziegler","year":"2005","journal-title":"Information Systems Frontiers"}],"container-title":["Foundations and Trends\u00ae in Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/ftinr\/article-pdf\/9\/5\/355\/11048037\/1500000046en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ftinr\/article-pdf\/9\/5\/355\/11048037\/1500000046en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T18:24:56Z","timestamp":1775240696000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ftinr\/article\/9\/5\/355\/1328672\/Credibility-in-Information-Retrieval"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,18]]},"references-count":267,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,12,18]]}},"URL":"https:\/\/doi.org\/10.1561\/1500000046","relation":{},"ISSN":["1554-0669","1554-0677"],"issn-type":[{"value":"1554-0669","type":"print"},{"value":"1554-0677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,18]]}}}