Internet information triangulation: Design theory and prototype evaluation
Many discussions exist regarding the credibility of information on the Internet. Similar discussions happen on the interpretation of social scientific research data, for which information triangulation has been proposed as a useful method. In this article, we explore a design theory—consisting of a...
Saved in:
Published in | Journal of the Association for Information Science and Technology Vol. 66; no. 4; pp. 684 - 701 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Hoboken
Blackwell Publishing Ltd
01.04.2015
Wiley Subscription Services, Inc |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Many discussions exist regarding the credibility of information on the Internet. Similar discussions happen on the interpretation of social scientific research data, for which information triangulation has been proposed as a useful method. In this article, we explore a design theory—consisting of a kernel theory, meta‐requirements, and meta‐designs—for software and services that triangulate Internet information. The kernel theory identifies 5 triangulation methods based on Churchman's inquiring systems theory and related meta‐requirements. These meta‐requirements are used to search for existing software and services that contain design features for Internet information triangulation tools. We discuss a prototyping study of the use of an information triangulator among 72 college students and how their use contributes to their opinion formation. From these findings, we conclude that triangulation tools can contribute to opinion formation by information consumers, especially when the tool is not a mere fact checker but includes the search and delivery of alternative views. Finally, we discuss other empirical propositions and design propositions for an agenda for triangulator developers and researchers. In particular, we propose investment in theory triangulation, that is, tools to automatically detect ethically and theoretically alternative information and views. |
---|---|
Bibliography: | istex:4E1BA5E1EA279F5CEB78ED9F773778F69C68FF25 ArticleID:ASI23203 ark:/67375/WNG-PWF2PK0C-9 ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ISSN: | 2330-1635 2330-1643 |
DOI: | 10.1002/asi.23203 |