Structuring computer-mediated communication systems to avoid information overload
Communications of the ACM
The elements of computer credibility
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Quality is in the eye of the beholder: meeting users' requirements for Internet quality of service
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Designing trust into online experiences
Communications of the ACM
Barriers to use: usability and content accessibility on the Web's most popular sites
CUU '00 Proceedings on the 2000 conference on Universal Usability
Journal of the American Society for Information Science and Technology - Special issue on the still the frontier: Information Science at the Millenium
Interaction and outeraction: instant messaging in action
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
What makes Web sites credible?: a report on a large quantitative study
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Computing and using reputations for internet ratings
Proceedings of the 3rd ACM conference on Electronic Commerce
Effects of four computer-mediated communications channels on trust development
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Trust without touch: jumpstarting long-distance trust with initial social activities
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Finding others online: reputation systems for social online spaces
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Online Communities: Designing Usability and Supporting Socialbilty
Online Communities: Designing Usability and Supporting Socialbilty
Trust and epistemic communities in biodiversity data sharing
Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries
Web credibility research: a method for online experiments and early study results
CHI '01 Extended Abstracts on Human Factors in Computing Systems
Innovative web use to learn about consumer behavior and online privacy
Communications of the ACM - Digital rights management
Spam, spam, spam, spam: how can we stop it
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Straight Talk: Delivering Bad News Through Electronic Communication
Information Systems Research
The evolving role of security, privacy, and trust in a digitized world
The human-computer interaction handbook
Trust-building measures: a review of consumer health portals
Communications of the ACM - Multimodal interfaces that flex, adapt, and persist
Telling humans and computers apart automatically
Communications of the ACM - Information cities
Deception and design: the impact of communication technology on lying behavior
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Trust and mistrust of online health sites
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
How do users evaluate the credibility of Web sites?: a study with over 2,500 participants
Proceedings of the 2003 conference on Designing for user experiences
Proceedings of the 10th international conference on Intelligent user interfaces
How to make secure email easier to use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Social navigation as a model for usable security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Web Usability: A User-Centered Design Approach
Web Usability: A User-Centered Design Approach
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Security and Usability
Student research and the internet
Communications of the ACM - The semantic e-business vision
Decision strategies and susceptibility to phishing
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Catching spam before it arrives: domain specific dynamic blacklists
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Keeping bots out of online games
Proceedings of the 2005 ACM SIGCHI International Conference on Advances in computer entertainment technology
Spam and the ongoing battle for the inbox
Communications of the ACM - Spam and the ongoing battle for the inbox
Developing usable CAPTCHAs for blind users
Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility
Credibility: A multidisciplinary framework
Annual Review of Information Science and Technology
Recognizing objects in adversarial clutter: breaking a visual captcha
CVPR'03 Proceedings of the 2003 IEEE computer society conference on Computer vision and pattern recognition
Views, reactions and impact of digitally-signed mail in e-commerce
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Towards a design theory for online communities
Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology
The effect of aesthetics on web credibility
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
Journal of the American Society for Information Science and Technology
Proceedings of the 15th international conference on Intelligent user interfaces
Augmenting web pages and search results to support credibility assessment
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Tweeting is believing?: understanding microblog credibility perceptions
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Microblog credibility perceptions: comparing the USA and China
Proceedings of the 2013 conference on Computer supported cooperative work
Hi-index | 0.00 |
As more of our communication, commerce, and personal data goes online, credibility becomes an increasingly important issue. How do we determine if our e-commerce sites, our healthcare sites, or our online communication partners are credible? This paper examines the research literature in the area of web credibility. This review starts by examining the cognitive foundations of credibility. Other sections of the paper examine not only the general credibility of web sites, but also online communication, such as e-mail, instant messaging, and online communities. Training and education, as well as future issues (such as CAPTCHAs and phishing), will be addressed. The implications for multiple populations (users, web developers, browser designers, and librarians) will be discussed.