Internet Credibility
Essay by review • January 1, 2011 • Essay • 894 Words (4 Pages) • 1,290 Views
Running head: INTERNET CREDIBILITY
Internet Credibility
Managerial Communication - COM/526
With the popularity of the Internet growing in monumental proportions in recent years, so has its use as an information source. As an information source, one can search for and retrieve requested information on virtually any subject. When searching for information, most people expect that it will be trustworthy and reliable. However, how can one truly know if the information one has requested is in fact, trustworthy and reliable. I think people assume that because they have found the information on the Internet, that it is credible. Not only is that a bad thing to believe, but it could also be a dangerous belief, for there are many who would take any medical advice one found on the Internet, as the gospel, instead of verifying that it is indeed credible. The following list is sample listing of methods or processes that can be used in an attempt to verify the credibility of information found on the Internet.
1. Use of a Librarian to verify Internet content is always quite reliable (Hamblen 1996). To an extent, it could be said that a Librarians profession is based on reliable or credible information.
2. Check reliability on the Internet using common sense (Hamblen 1996). It may seem a somewhat over simplified, but common sense is sometimes the first line of defense in determining what is credible and what is not. Unfortunately, this personal attribute is not always reliable for some people.
3. Simply ask yourself, "Do you know the source?" (Hamblen 1996). Of course, with this option, you must be somewhat knowledgeable about what you are looking for and also have an idea about what source you expect to get the information from.
4. Be aware that unsolicited information is probably untrustworthy (Hamblen 1996). In this case, when you receive unsolicited information, it is almost always considered to be unreliable. The reason, is because unsolicited information is usually intended to solely benefit the sender. Usually, in the form of a sales pitch.
5. Was it written by an authoritative source (Scott 1996)? Typically, any information that has been authenticated in this way can definitely be considered credible. Any type of federal government organization or medical board would typically fall into the category.
6. Is it authenticated as part of an editorial or peer review process (Scott 1996)? Once a book or other publication has been accepted by a publisher as reliable, then it is usually considered to be credible. However, even with this authentication process, it is always possible that the author of the piece has successfully hidden facts or truths in order to get it authenticated by the publisher.
7. Is it evaluated by experts, reviewers or subject specialists as part of collection development (Scott 1996)? Specifically, I would consider this type of authentication to be common place in the area of science and mathematics. For scientists or mathematicians to become published for work developed in their respective fields, it is required that it be critiqued and agreed upon by other experts in the same field.
8. Verify the author, his or her affiliation, date and the source of publication (Scott 1996). People should always be sure that the author is writing about a subject that they are in fact associated with on a professional level. The information the author provides should be relevant with the current environment of the subject in question. In addition, the source from where the information is provided should also be deemed credible.
9. Check and compare the source to other sources, both similar and different ones (Scott 1996). By performing this activity, one could quickly determine if the source in question
...
...