SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Assessing Credibility of Weblogs
Victoria L. Rubin and Elizabeth D. Liddy*
School of Information Studies
*Center for Natural Language Processing
Syracuse University
Syracuse, NY13244-1190, USA
{vlrubin, liddy}@syr.edu
Abstract
Credibility is a perceived quality and is evaluated with at
least two major components: trustworthiness and expertise.
Weblogs (or blogs) are a potentially fruitful genre for
exploration of credibility assessment due to public
disclosure of information that might reveal trustworthiness
and expertise by webloggers (or bloggers) and availability
of audience evaluations. The objectives of the planned
exploratory study are to compile a list of factors that users
take into account in credibility assessment of blog sites,
order them in terms of users’ perceived importance, and
determine which factors can be recognized and evaluated
with Natural Language Processing (NLP) techniques. With
partial automation in mind, we propose an analytical
framework for blog credibility assessment based on four
profile factors: 1) the blogger’s expertise and the amount of
offline identity disclosure, 2) the blogger’s trustworthiness
(or the overtly stated value system including beliefs, goals,
and values), 3) information quality, and 4) appeals of a
personal nature. We describe a multi-stage study that
combines a qualitative study of credibility judgments of
blog-readers with NLP-based analysis of blogs. The study
will elicit and test credibility assessment factors (Phase I),
perform NLP-based blog profiling (Phase II), and content-
analyze blog-readers’ comments for partial profile matching
(Phase III).
Introduction
In order to implement an automation of weblog credibility
assessment, we need to know how users assess credibility
of blogs. To learn this, we need to first clarify several key
concepts. For instance, what is credibility, and how is it
generally assessed? How does blog credibility assessment
compare to credibility assessment of other types of
websites? Can findings from credibility assessment studies
of other types of websites be used as a starting point for
blog credibility assessments? And which specific
credibility assessment factors can be accessible for
automation with NLP algorithms?
Credibility
Credible information is believable information (Stanford et
al., 2002). Credibility is viewed as a perceived quality that
is evaluated simultaneously with at least two major
components: trustworthiness and expertise. The
trustworthiness component refers to goodness or morality
of the source and can be described with terms such as well-
intentioned, truthful, or unbiased. The expertise component
refers to perceived knowledge of the source and can be
described with terms such as knowledgeable, reputable,
and competent (Tseng and Fogg, 1999).
People assess the reliability of information in terms of the
information source, mode of knowing, and match against
prior expectations (Chafe, 1986). The information source
in the blogging context is two-fold: the blogger’s self-
reported image (or profile) and the information posted in
the entries (e.g., news digests, opinions, or reactions to
other postings). While judgments of credibility are
inevitably complex, readers generally evaluate whether the
source is honest and competent and whether the provided
information is complete, accurate, unbiased and
appropriate (Van House, 2004).
Each of the credibility assessment components is a
challenge to computational approaches in NLP given the
subtleties of how it might be expressed. However, we
hypothesize that some information about the information
source can be directly accessible with NLP tools due to a
blog’s high level of self-disclosure and the availability of
blog-readers’ comments.
NLP-based Automation
Wassmer and Eastman (2005) used credentials,
advertising, and design analysis for their experimental
system that automatically assessed website credibility. The
system produced a credibility measure on a 0 to 10 scale,
and was tested on nine medical domain websites with the
results comparable to those produced by human searchers
and analysts. The study observed that while an absolute
factor of credibility – the accuracy of information –
requires exhaustive fact-checking and is currently
computationally unsuitable, a combination of several
indicative heuristics can produce a satisfactory system.
Wassmer and Eastman’s study also calls for NLP
sophistication in the process of credibility assessment
automation (2005).
Analysis and identification of natural language patterns for
subtle but discernable text properties (such as likes and
dislikes, attitude, affect, subjective opinions, attribution,
and the writer’s certainty) have been a part of a recent
trend of text analysis and text understanding in NLP,
Information Retrieval, and Machine Learning (Shanahan,
Qu, and Wiebe, 2005). NLP-based user profiling has also
been previously applied to making generalizations about
users’ interests (Bloedorn and Mani, 1998) and modeling
users’ malicious e-mailing behaviors (Stolfo et al., 2003).
For the purposes of credibility assessment, it seems
feasible to automatically extract and systematize natural
language statements pertaining to a blogger’s overtly
stated beliefs, goals, biases, opinions, preferences,
ownership and purchasing habits. For instance, consider
the following excerpts that testify to the availability of
such natural language statements for simple NLP
extraction rules:
(1) I don't care much for political correctness; I do care
for accuracy and honesty (what people actually do
rather than what they believe or say). (www.kk.org)
(2) I love music boxes. I can be a bit of a perfectionist.
One of my philosophies in life is “life-long learning”. I
don't like social masks. (www.amorelicious.com)
(3) I had never got the hang of academic writing. The
personal voice on blogs appealed to me so much more.
(www.rebeccablood.net from nycblogger webring)
NLP rules can capture regularities and variations of
expressions pertaining to the first person, the blogger, for
example, “do/don’t love/like/care (much) for”, “appealed
to me (so much more)”, and “(one of) my philosophy/(-ies)
in life is”. Therefore, it is possible to compile the actual
values for the blogger’s preferences, goals, etc. into an
information structure that captures weighted credibility
assessment factors, similar to user interest profiles
(Bloedorn and Mani, 1998). Also, a heuristic method for
matching bloggers’ and blog-readers’ profiles can be
developed in an attempt to predict how credible a
particular blog-reader may find a particular blog.
Blogs
This study explores the construct of credibility as a type of
trusting relationship that is created between an individual
blogger and a blog-reader. We identify bloggers and blog-
readers as two groups actively involved in the processes of
information exchange, credibility building, and assess-
ments. The information exchange is based on shared topics
of interest and match between information needs and
information availability. However, in such an information
exchange people tend to doubt information from others
who have conflicting goals and values (Van House, 2004).
Bloggers build their audience credibility by publicly
disclosing their personal and professional lives, and by
offering their perspective on life and current events. It is
also conventional to reveal aspects of one’s offline identity
as a sign of trust and in order to attract readers (Rak,
2005).
In studying credibility, an interesting and differentiating
feature of weblogs is that they are meant to be inherently
biased as an alternative media. Blog-readers admittedly
often distrust traditional media and see blogs as a viable
alternative, particularly since they believe bloggers do not
hide their biases (Johnson and Kaye, 2004).
Another blog feature - “blogrolling”, or hyperlinking to
bloggers’ favorite sites, can be used as a credibility
assessment component. In this vote-casting system,
hyperlinks act as votes, citations, or references to relevant
pages on the Web. It serves as a “web of trust” to mimic
the way people share by word-of-mouth. The principle is
commonly employed for relevance ranking, for instance, in
Google’s PageRank search algorithm (Bowman and Willis,
2003).
In this study we will explore how these distinctive features
of blogs can be used beneficially for NLP and Machine
Learning analysis to allow for automation of blog
credibility assessment. Thus, the objectives of this study
are: 1) to compile a list of factors that users take into
account in credibility assessment of weblog sites; 2) to
order these factors in terms of their perceived importance
to users, and; 3) to suggest which factors can be accessed
and computed with NLP-techniques.
Methods
We developed a four factor preliminary analytical
framework for blog-readers’ credibility assessment of blog
sites (Table 1). The hypothesized framework was based
on elements from evidentiality theory (Chafe, 1986); large-
scale health and financial website credibility assessment
surveys (Stanford et al., 2002); Van House’s apparently
unpublished observations on weblog credibility (2004);
and the authors’ previous experiences with blogging
(Rubin, Stanton, and Liddy, 2004) with one active
webring: www.nycbloggers.com (with self-reported 6157
blogs as of 31 January 2006); and three additional personal
topic-oriented blog sites: www.amorelicious.com,
www.kk.org, and www.absoblogginlutely.net.
1) Blogger’s Expertise and Offline Identity Disclosure
a) Name and geographic location
b) Credentials
c) Affiliations (personal and institutional)
d) Blogrolls (i.e., hyperlinks to other sites)
e) Stated competencies
f) Mode of knowing
2) Blogger’s Trustworthiness and Value System
a) Biases
b) Beliefs
c) Opinions
d) Honesty
e) Preferences
f) Habits
g) Slogans
3) Information Quality
a) Completeness
b) Accuracy
c) Appropriateness
d) Timeliness
e) Organization (by categories or chronology)
f) Match to prior expectations
g) Match to information need
4) Appeals and Triggers of a Personal Nature
a) Aesthetic appeal (i.e., design layout, typography,
and color schemes)
b) Literary appeal (i.e., writing style and wittiness)
c) Curiosity trigger
d) Memory trigger (i.e., shared experiences)
e) Personal connection (e.g., the source is an
acquaintance or a competitor of the blog-reader)
Table 1. Blog Credibility Assessment Factors
In Phase I, we will test the applicability of these factors in
the blog context and modify the analytical framework
accordingly. We will use two possible sources for
accessing blog-readers evaluations and value systems that
may contribute to credibility assessment: their comments
to blog postings or their prompted judgments about the
specifics of what makes a particular blog site credible.
The study will invite 5-10 subjects who are frequent blog-
readers to participate. We will ask study participants to
search for and submit 3 – 5 credible blog sites for a
specific information need of their choice, e.g. a viewpoint
on a current issue. We aim to collect approximately 30
blog sites as the sample data.
Once the blog sites have been selected, we will ask the
participants to review their nominated sites, and to reflect
and comment freely on how their credibility judgments
were made using the traditional think-aloud protocol (Van
Someren, Barnard, and Sandberg, 1994). This may
generate additional factors to be incorporated in the
analytical framework. In a follow-up session, we will ask
participants to rank-order all factors by level of importance
and relevance using the Q-Sort technique (McKeown and
Thomas, 1988).
In Phase II, we will perform NLP analysis of the self-
disclosed information in the sample data of the 15-30 blog
sites collected earlier in order to create blogger profiles
based on the most highly ranked blogger-related factors.
Each factor in the profile will then be assessed in terms of
NLP’s ability for recognition with rule-based algorithms,
as well as its potential as a candidate for Machine
Learning.
In Phase III, we will content-analyze comments made to
the blogging sites with the most complete profiles to
determine a match between the profiles of a particular
blogger and blog-readers who find the blog credible.
Conclusions
This work in progress proposes to combine a rule-based
NLP exploration of blog texts with a multi-stage
qualitative exploration of blog credibility assessment
factors. The contribution is in combining a linguistic /
NLP-based analysis of actual texts on blogging sites with a
qualitative analysis of blog-readers’ judgments of
credibility, and ultimately in the potential for producing an
empirically verifiable analytical framework. Once the
factors that contribute to blog credibility are completed and
tested, we can focus specific computational efforts on
scanning large amounts of information for blogger-
profiling and automating credibility assessment.
References
Bloedorn, E., Mani, I., (1998). Using NLP for Machine
Learning of User Profiles, Intelligent Data Analysis, 2 (1-
4), 3-18.
Bowman, S., Willis, C. (2003) We Media: How audiences
are shaping the future of news and information, An NDN
Research Report, Available: www.ndn.org.
Chafe, W. (1986). Evidentiality in English Conversation
and Academic Writing. In W. Chafe, J. Nichols (Eds.),
Evidentiality: The Linguistic Coding of Epistemology (Vol.
20, pp. 261-273). Norwood, New Jersey: Ablex Publishing
Corporation.
Johnson, T., Kaye., K. (2004) Wag the Blog: How
Reliance on traditional Media and the Internet Influence
Credibility Perceptions of Weblogs among Blog Users.
Journalism and Mass Communication Quarterly, 81 (3),
622-642.
McKeown, B., Thomas, D. (1988). Q Methodology. Sage
Publications, Newbury Park.
Rak, J. (2005) The Digital Queer: Weblogs and Internet
Identity. Biography 28(1), 166-182.
Rubin, V. L., Stanton, J. M., Liddy, E. D. (2004).
Discerning Emotions in Texts. Paper presented at the
AAAI Spring Symposium: Exploring Attitude and Affect
in Text: Theories and Applications, Stanford, CA.
Shanahan, J., Qu, Y., Wiebe, J. (2005) Computing Attitude
and Affect in Text: Theory and Applications. (Eds), The
Information Retrieval Series, Volume 20, Springer.
Stanford, J., Tauber, E., Fogg, B.J., Marable, L. (2002).
Experts vs. Online Consumers: A comparative credibility
study of health and finance web sites. Available:
http://www.consumerwebwatch.org/news/report3_credibili
tyre- search/slicedbread.pdf.
Stolfo, S., Hershkop, S., Wang, K., Nimeskern, O., Hu, C.
(2003). Behavior Profiling of Email, The First NSF / NIJ
Symposium on Intelligence, Security Informatics (ISI
2003), Tucson, AZ.
Tseng, H., Fogg, B.J. (1999). Credibility and computing
technology. Communications of the ACM, 42(5), 39-44.
Van House, N. (2004). Weblogs: Credibility and
Collaboration in an Online World (prepared for CSCW
Workshop on Trust, October, 2004, unpublished).
Van Someren, M., Barnard, Y., Sandberg, J., (1994). The
Think Aloud Method: A practical guide to modeling
cognitive processes, Academic Press, London.
Wassmer, M., Eastman, C. (2005). Automatic Evaluation
of Credibility on the Web. Proceedings of the American
Society for Information Science and Technology Annual
Meeting (ASIS&T), Charlotte, NC.

Más contenido relacionado

Destacado

The strengthening the child welfare response to trafficking act
The strengthening the child welfare response to trafficking actThe strengthening the child welfare response to trafficking act
The strengthening the child welfare response to trafficking actKeri Strahler
 
Soalan excel p.am 2 2011 sabah
Soalan excel p.am 2 2011 sabahSoalan excel p.am 2 2011 sabah
Soalan excel p.am 2 2011 sabahmfong
 
The effects of blog mediated public relations (bmpr
The effects of blog mediated public relations (bmprThe effects of blog mediated public relations (bmpr
The effects of blog mediated public relations (bmprChiang Mai University
 
Raquel Glottman Last Chapter
Raquel Glottman Last ChapterRaquel Glottman Last Chapter
Raquel Glottman Last ChapterRaquelGlottman
 
SB 10 Testimony - Tomari Quinn
SB 10 Testimony - Tomari QuinnSB 10 Testimony - Tomari Quinn
SB 10 Testimony - Tomari QuinnKeri Strahler
 
Us.report.letter.to.obama.(final)
Us.report.letter.to.obama.(final)Us.report.letter.to.obama.(final)
Us.report.letter.to.obama.(final)Keri Strahler
 
7.12.12 TANF work requirement letter
7.12.12 TANF work requirement letter 7.12.12 TANF work requirement letter
7.12.12 TANF work requirement letter Keri Strahler
 
ATM Policy Paper on Mining in the Philippines
ATM Policy Paper on Mining in the PhilippinesATM Policy Paper on Mining in the Philippines
ATM Policy Paper on Mining in the PhilippinesFarah Sevilla
 
The eLearning 2.0 Survival Guide - Assessing the Credibility of Web Sources
The eLearning 2.0 Survival Guide - Assessing the Credibility of Web SourcesThe eLearning 2.0 Survival Guide - Assessing the Credibility of Web Sources
The eLearning 2.0 Survival Guide - Assessing the Credibility of Web SourcesKristina Schneider
 

Destacado (16)

The strengthening the child welfare response to trafficking act
The strengthening the child welfare response to trafficking actThe strengthening the child welfare response to trafficking act
The strengthening the child welfare response to trafficking act
 
Robotic Gita
Robotic Gita Robotic Gita
Robotic Gita
 
Office
OfficeOffice
Office
 
Soalan excel p.am 2 2011 sabah
Soalan excel p.am 2 2011 sabahSoalan excel p.am 2 2011 sabah
Soalan excel p.am 2 2011 sabah
 
99818
9981899818
99818
 
Albums
AlbumsAlbums
Albums
 
Mini Youth
Mini YouthMini Youth
Mini Youth
 
Letter From DCF
Letter From DCFLetter From DCF
Letter From DCF
 
The effects of blog mediated public relations (bmpr
The effects of blog mediated public relations (bmprThe effects of blog mediated public relations (bmpr
The effects of blog mediated public relations (bmpr
 
Raquel Glottman Last Chapter
Raquel Glottman Last ChapterRaquel Glottman Last Chapter
Raquel Glottman Last Chapter
 
SB 10 Testimony - Tomari Quinn
SB 10 Testimony - Tomari QuinnSB 10 Testimony - Tomari Quinn
SB 10 Testimony - Tomari Quinn
 
Us.report.letter.to.obama.(final)
Us.report.letter.to.obama.(final)Us.report.letter.to.obama.(final)
Us.report.letter.to.obama.(final)
 
7.12.12 TANF work requirement letter
7.12.12 TANF work requirement letter 7.12.12 TANF work requirement letter
7.12.12 TANF work requirement letter
 
ATM Policy Paper on Mining in the Philippines
ATM Policy Paper on Mining in the PhilippinesATM Policy Paper on Mining in the Philippines
ATM Policy Paper on Mining in the Philippines
 
The eLearning 2.0 Survival Guide - Assessing the Credibility of Web Sources
The eLearning 2.0 Survival Guide - Assessing the Credibility of Web SourcesThe eLearning 2.0 Survival Guide - Assessing the Credibility of Web Sources
The eLearning 2.0 Survival Guide - Assessing the Credibility of Web Sources
 
Digital gita
Digital gitaDigital gita
Digital gita
 

Similar a Ss06 03-038

Comps paper journal version 2015
Comps paper journal version 2015Comps paper journal version 2015
Comps paper journal version 2015aj6785
 
Article 05 trust in websites
Article 05   trust in websitesArticle 05   trust in websites
Article 05 trust in websitesЮниВеб
 
An Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder TechniqueAn Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder TechniqueIJCSIS Research Publications
 
Determining Relevance Rankings with Search Click Logs
Determining Relevance Rankings with Search Click LogsDetermining Relevance Rankings with Search Click Logs
Determining Relevance Rankings with Search Click LogsInderjeet Singh
 
Lra09critevalroughdraft
Lra09critevalroughdraftLra09critevalroughdraft
Lra09critevalroughdraftGreg Mcverry
 
Evaluation Of A Research Method
Evaluation Of A Research MethodEvaluation Of A Research Method
Evaluation Of A Research MethodSusan Kennedy
 
An Attempt to Automate the Process of Source Evaluation
An Attempt to Automate the Process of Source EvaluationAn Attempt to Automate the Process of Source Evaluation
An Attempt to Automate the Process of Source EvaluationIDES Editor
 
Ccr a content collaborative reciprocal recommender for online dating
Ccr a content collaborative reciprocal recommender for online datingCcr a content collaborative reciprocal recommender for online dating
Ccr a content collaborative reciprocal recommender for online datingSean Chiu
 
Online purchase intention
Online purchase intention Online purchase intention
Online purchase intention Samantha Mak
 
Pre Assessment Quantitative And Qualitative Data Essay
Pre Assessment Quantitative And Qualitative Data EssayPre Assessment Quantitative And Qualitative Data Essay
Pre Assessment Quantitative And Qualitative Data EssayTiffany Sandoval
 
SENTIMENT ANALYSIS-AN OBJECTIVE VIEW
SENTIMENT ANALYSIS-AN OBJECTIVE VIEWSENTIMENT ANALYSIS-AN OBJECTIVE VIEW
SENTIMENT ANALYSIS-AN OBJECTIVE VIEWJournal For Research
 
MEDIA AND INFORMATION SOURCES.pptx
MEDIA AND INFORMATION SOURCES.pptxMEDIA AND INFORMATION SOURCES.pptx
MEDIA AND INFORMATION SOURCES.pptxClaesTrinio
 
Niso Article Level Metrics Presentation For Online 2
Niso Article Level Metrics Presentation For Online 2Niso Article Level Metrics Presentation For Online 2
Niso Article Level Metrics Presentation For Online 2Liz Allen
 
Global education and global teacher
Global education and global teacherGlobal education and global teacher
Global education and global teacherAliAqsamAbbasi
 
Essay 2 Explicating Literary Text.htmlEssay 2, Explicating a Lit.docx
Essay 2 Explicating Literary Text.htmlEssay 2, Explicating a Lit.docxEssay 2 Explicating Literary Text.htmlEssay 2, Explicating a Lit.docx
Essay 2 Explicating Literary Text.htmlEssay 2, Explicating a Lit.docxrusselldayna
 

Similar a Ss06 03-038 (20)

Comps paper journal version 2015
Comps paper journal version 2015Comps paper journal version 2015
Comps paper journal version 2015
 
Article 05 trust in websites
Article 05   trust in websitesArticle 05   trust in websites
Article 05 trust in websites
 
Proposal
ProposalProposal
Proposal
 
An Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder TechniqueAn Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder Technique
 
Proposal
ProposalProposal
Proposal
 
Determining Relevance Rankings with Search Click Logs
Determining Relevance Rankings with Search Click LogsDetermining Relevance Rankings with Search Click Logs
Determining Relevance Rankings with Search Click Logs
 
Lra09critevalroughdraft
Lra09critevalroughdraftLra09critevalroughdraft
Lra09critevalroughdraft
 
review-cred-4-30-15
review-cred-4-30-15review-cred-4-30-15
review-cred-4-30-15
 
Evaluation Of A Research Method
Evaluation Of A Research MethodEvaluation Of A Research Method
Evaluation Of A Research Method
 
An Attempt to Automate the Process of Source Evaluation
An Attempt to Automate the Process of Source EvaluationAn Attempt to Automate the Process of Source Evaluation
An Attempt to Automate the Process of Source Evaluation
 
Ccr a content collaborative reciprocal recommender for online dating
Ccr a content collaborative reciprocal recommender for online datingCcr a content collaborative reciprocal recommender for online dating
Ccr a content collaborative reciprocal recommender for online dating
 
209
209209
209
 
Online purchase intention
Online purchase intention Online purchase intention
Online purchase intention
 
Pre Assessment Quantitative And Qualitative Data Essay
Pre Assessment Quantitative And Qualitative Data EssayPre Assessment Quantitative And Qualitative Data Essay
Pre Assessment Quantitative And Qualitative Data Essay
 
SENTIMENT ANALYSIS-AN OBJECTIVE VIEW
SENTIMENT ANALYSIS-AN OBJECTIVE VIEWSENTIMENT ANALYSIS-AN OBJECTIVE VIEW
SENTIMENT ANALYSIS-AN OBJECTIVE VIEW
 
MEDIA AND INFORMATION SOURCES.pptx
MEDIA AND INFORMATION SOURCES.pptxMEDIA AND INFORMATION SOURCES.pptx
MEDIA AND INFORMATION SOURCES.pptx
 
Niso Article Level Metrics Presentation For Online 2
Niso Article Level Metrics Presentation For Online 2Niso Article Level Metrics Presentation For Online 2
Niso Article Level Metrics Presentation For Online 2
 
Apresentação UCA
Apresentação UCAApresentação UCA
Apresentação UCA
 
Global education and global teacher
Global education and global teacherGlobal education and global teacher
Global education and global teacher
 
Essay 2 Explicating Literary Text.htmlEssay 2, Explicating a Lit.docx
Essay 2 Explicating Literary Text.htmlEssay 2, Explicating a Lit.docxEssay 2 Explicating Literary Text.htmlEssay 2, Explicating a Lit.docx
Essay 2 Explicating Literary Text.htmlEssay 2, Explicating a Lit.docx
 

Más de Keri Strahler

2012 Kansas Domestic Violence Report
2012 Kansas Domestic Violence Report2012 Kansas Domestic Violence Report
2012 Kansas Domestic Violence ReportKeri Strahler
 
2013 DRC Newsletter
2013 DRC Newsletter 2013 DRC Newsletter
2013 DRC Newsletter Keri Strahler
 
Pornography and Crime
Pornography and CrimePornography and Crime
Pornography and CrimeKeri Strahler
 
Hutchinson News - Editorial Copy Fees
Hutchinson News - Editorial Copy FeesHutchinson News - Editorial Copy Fees
Hutchinson News - Editorial Copy FeesKeri Strahler
 
SB 10 Testimony - Jan Jarman
SB 10 Testimony - Jan JarmanSB 10 Testimony - Jan Jarman
SB 10 Testimony - Jan JarmanKeri Strahler
 
Property and Belongingness: Rethinking Gender-Biased Disinheritance
Property and Belongingness: Rethinking Gender-Biased DisinheritanceProperty and Belongingness: Rethinking Gender-Biased Disinheritance
Property and Belongingness: Rethinking Gender-Biased DisinheritanceKeri Strahler
 
CPJ - Roots Of Impunity ..
CPJ - Roots Of Impunity ..CPJ - Roots Of Impunity ..
CPJ - Roots Of Impunity ..Keri Strahler
 
H.R. 1229 To promote economic security ..
H.R. 1229 To promote economic security .. H.R. 1229 To promote economic security ..
H.R. 1229 To promote economic security .. Keri Strahler
 

Más de Keri Strahler (10)

2012 Kansas Domestic Violence Report
2012 Kansas Domestic Violence Report2012 Kansas Domestic Violence Report
2012 Kansas Domestic Violence Report
 
Oei 07-98-00260
Oei 07-98-00260Oei 07-98-00260
Oei 07-98-00260
 
2013 DRC Newsletter
2013 DRC Newsletter 2013 DRC Newsletter
2013 DRC Newsletter
 
Pornography and Crime
Pornography and CrimePornography and Crime
Pornography and Crime
 
Hutchinson News - Editorial Copy Fees
Hutchinson News - Editorial Copy FeesHutchinson News - Editorial Copy Fees
Hutchinson News - Editorial Copy Fees
 
SB10
SB10SB10
SB10
 
SB 10 Testimony - Jan Jarman
SB 10 Testimony - Jan JarmanSB 10 Testimony - Jan Jarman
SB 10 Testimony - Jan Jarman
 
Property and Belongingness: Rethinking Gender-Biased Disinheritance
Property and Belongingness: Rethinking Gender-Biased DisinheritanceProperty and Belongingness: Rethinking Gender-Biased Disinheritance
Property and Belongingness: Rethinking Gender-Biased Disinheritance
 
CPJ - Roots Of Impunity ..
CPJ - Roots Of Impunity ..CPJ - Roots Of Impunity ..
CPJ - Roots Of Impunity ..
 
H.R. 1229 To promote economic security ..
H.R. 1229 To promote economic security .. H.R. 1229 To promote economic security ..
H.R. 1229 To promote economic security ..
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Ss06 03-038

  • 1. Assessing Credibility of Weblogs Victoria L. Rubin and Elizabeth D. Liddy* School of Information Studies *Center for Natural Language Processing Syracuse University Syracuse, NY13244-1190, USA {vlrubin, liddy}@syr.edu Abstract Credibility is a perceived quality and is evaluated with at least two major components: trustworthiness and expertise. Weblogs (or blogs) are a potentially fruitful genre for exploration of credibility assessment due to public disclosure of information that might reveal trustworthiness and expertise by webloggers (or bloggers) and availability of audience evaluations. The objectives of the planned exploratory study are to compile a list of factors that users take into account in credibility assessment of blog sites, order them in terms of users’ perceived importance, and determine which factors can be recognized and evaluated with Natural Language Processing (NLP) techniques. With partial automation in mind, we propose an analytical framework for blog credibility assessment based on four profile factors: 1) the blogger’s expertise and the amount of offline identity disclosure, 2) the blogger’s trustworthiness (or the overtly stated value system including beliefs, goals, and values), 3) information quality, and 4) appeals of a personal nature. We describe a multi-stage study that combines a qualitative study of credibility judgments of blog-readers with NLP-based analysis of blogs. The study will elicit and test credibility assessment factors (Phase I), perform NLP-based blog profiling (Phase II), and content- analyze blog-readers’ comments for partial profile matching (Phase III). Introduction In order to implement an automation of weblog credibility assessment, we need to know how users assess credibility of blogs. To learn this, we need to first clarify several key concepts. For instance, what is credibility, and how is it generally assessed? How does blog credibility assessment compare to credibility assessment of other types of websites? Can findings from credibility assessment studies of other types of websites be used as a starting point for blog credibility assessments? And which specific credibility assessment factors can be accessible for automation with NLP algorithms? Credibility Credible information is believable information (Stanford et al., 2002). Credibility is viewed as a perceived quality that is evaluated simultaneously with at least two major components: trustworthiness and expertise. The trustworthiness component refers to goodness or morality of the source and can be described with terms such as well- intentioned, truthful, or unbiased. The expertise component refers to perceived knowledge of the source and can be described with terms such as knowledgeable, reputable, and competent (Tseng and Fogg, 1999). People assess the reliability of information in terms of the information source, mode of knowing, and match against prior expectations (Chafe, 1986). The information source in the blogging context is two-fold: the blogger’s self- reported image (or profile) and the information posted in the entries (e.g., news digests, opinions, or reactions to other postings). While judgments of credibility are inevitably complex, readers generally evaluate whether the source is honest and competent and whether the provided information is complete, accurate, unbiased and appropriate (Van House, 2004). Each of the credibility assessment components is a challenge to computational approaches in NLP given the subtleties of how it might be expressed. However, we hypothesize that some information about the information source can be directly accessible with NLP tools due to a blog’s high level of self-disclosure and the availability of blog-readers’ comments. NLP-based Automation Wassmer and Eastman (2005) used credentials, advertising, and design analysis for their experimental system that automatically assessed website credibility. The system produced a credibility measure on a 0 to 10 scale, and was tested on nine medical domain websites with the results comparable to those produced by human searchers and analysts. The study observed that while an absolute
  • 2. factor of credibility – the accuracy of information – requires exhaustive fact-checking and is currently computationally unsuitable, a combination of several indicative heuristics can produce a satisfactory system. Wassmer and Eastman’s study also calls for NLP sophistication in the process of credibility assessment automation (2005). Analysis and identification of natural language patterns for subtle but discernable text properties (such as likes and dislikes, attitude, affect, subjective opinions, attribution, and the writer’s certainty) have been a part of a recent trend of text analysis and text understanding in NLP, Information Retrieval, and Machine Learning (Shanahan, Qu, and Wiebe, 2005). NLP-based user profiling has also been previously applied to making generalizations about users’ interests (Bloedorn and Mani, 1998) and modeling users’ malicious e-mailing behaviors (Stolfo et al., 2003). For the purposes of credibility assessment, it seems feasible to automatically extract and systematize natural language statements pertaining to a blogger’s overtly stated beliefs, goals, biases, opinions, preferences, ownership and purchasing habits. For instance, consider the following excerpts that testify to the availability of such natural language statements for simple NLP extraction rules: (1) I don't care much for political correctness; I do care for accuracy and honesty (what people actually do rather than what they believe or say). (www.kk.org) (2) I love music boxes. I can be a bit of a perfectionist. One of my philosophies in life is “life-long learning”. I don't like social masks. (www.amorelicious.com) (3) I had never got the hang of academic writing. The personal voice on blogs appealed to me so much more. (www.rebeccablood.net from nycblogger webring) NLP rules can capture regularities and variations of expressions pertaining to the first person, the blogger, for example, “do/don’t love/like/care (much) for”, “appealed to me (so much more)”, and “(one of) my philosophy/(-ies) in life is”. Therefore, it is possible to compile the actual values for the blogger’s preferences, goals, etc. into an information structure that captures weighted credibility assessment factors, similar to user interest profiles (Bloedorn and Mani, 1998). Also, a heuristic method for matching bloggers’ and blog-readers’ profiles can be developed in an attempt to predict how credible a particular blog-reader may find a particular blog. Blogs This study explores the construct of credibility as a type of trusting relationship that is created between an individual blogger and a blog-reader. We identify bloggers and blog- readers as two groups actively involved in the processes of information exchange, credibility building, and assess- ments. The information exchange is based on shared topics of interest and match between information needs and information availability. However, in such an information exchange people tend to doubt information from others who have conflicting goals and values (Van House, 2004). Bloggers build their audience credibility by publicly disclosing their personal and professional lives, and by offering their perspective on life and current events. It is also conventional to reveal aspects of one’s offline identity as a sign of trust and in order to attract readers (Rak, 2005). In studying credibility, an interesting and differentiating feature of weblogs is that they are meant to be inherently biased as an alternative media. Blog-readers admittedly often distrust traditional media and see blogs as a viable alternative, particularly since they believe bloggers do not hide their biases (Johnson and Kaye, 2004). Another blog feature - “blogrolling”, or hyperlinking to bloggers’ favorite sites, can be used as a credibility assessment component. In this vote-casting system, hyperlinks act as votes, citations, or references to relevant pages on the Web. It serves as a “web of trust” to mimic the way people share by word-of-mouth. The principle is commonly employed for relevance ranking, for instance, in Google’s PageRank search algorithm (Bowman and Willis, 2003). In this study we will explore how these distinctive features of blogs can be used beneficially for NLP and Machine Learning analysis to allow for automation of blog credibility assessment. Thus, the objectives of this study are: 1) to compile a list of factors that users take into account in credibility assessment of weblog sites; 2) to order these factors in terms of their perceived importance to users, and; 3) to suggest which factors can be accessed and computed with NLP-techniques. Methods We developed a four factor preliminary analytical framework for blog-readers’ credibility assessment of blog sites (Table 1). The hypothesized framework was based on elements from evidentiality theory (Chafe, 1986); large- scale health and financial website credibility assessment surveys (Stanford et al., 2002); Van House’s apparently unpublished observations on weblog credibility (2004); and the authors’ previous experiences with blogging
  • 3. (Rubin, Stanton, and Liddy, 2004) with one active webring: www.nycbloggers.com (with self-reported 6157 blogs as of 31 January 2006); and three additional personal topic-oriented blog sites: www.amorelicious.com, www.kk.org, and www.absoblogginlutely.net. 1) Blogger’s Expertise and Offline Identity Disclosure a) Name and geographic location b) Credentials c) Affiliations (personal and institutional) d) Blogrolls (i.e., hyperlinks to other sites) e) Stated competencies f) Mode of knowing 2) Blogger’s Trustworthiness and Value System a) Biases b) Beliefs c) Opinions d) Honesty e) Preferences f) Habits g) Slogans 3) Information Quality a) Completeness b) Accuracy c) Appropriateness d) Timeliness e) Organization (by categories or chronology) f) Match to prior expectations g) Match to information need 4) Appeals and Triggers of a Personal Nature a) Aesthetic appeal (i.e., design layout, typography, and color schemes) b) Literary appeal (i.e., writing style and wittiness) c) Curiosity trigger d) Memory trigger (i.e., shared experiences) e) Personal connection (e.g., the source is an acquaintance or a competitor of the blog-reader) Table 1. Blog Credibility Assessment Factors In Phase I, we will test the applicability of these factors in the blog context and modify the analytical framework accordingly. We will use two possible sources for accessing blog-readers evaluations and value systems that may contribute to credibility assessment: their comments to blog postings or their prompted judgments about the specifics of what makes a particular blog site credible. The study will invite 5-10 subjects who are frequent blog- readers to participate. We will ask study participants to search for and submit 3 – 5 credible blog sites for a specific information need of their choice, e.g. a viewpoint on a current issue. We aim to collect approximately 30 blog sites as the sample data. Once the blog sites have been selected, we will ask the participants to review their nominated sites, and to reflect and comment freely on how their credibility judgments were made using the traditional think-aloud protocol (Van Someren, Barnard, and Sandberg, 1994). This may generate additional factors to be incorporated in the analytical framework. In a follow-up session, we will ask participants to rank-order all factors by level of importance and relevance using the Q-Sort technique (McKeown and Thomas, 1988). In Phase II, we will perform NLP analysis of the self- disclosed information in the sample data of the 15-30 blog sites collected earlier in order to create blogger profiles based on the most highly ranked blogger-related factors. Each factor in the profile will then be assessed in terms of NLP’s ability for recognition with rule-based algorithms, as well as its potential as a candidate for Machine Learning. In Phase III, we will content-analyze comments made to the blogging sites with the most complete profiles to determine a match between the profiles of a particular blogger and blog-readers who find the blog credible. Conclusions This work in progress proposes to combine a rule-based NLP exploration of blog texts with a multi-stage qualitative exploration of blog credibility assessment factors. The contribution is in combining a linguistic / NLP-based analysis of actual texts on blogging sites with a qualitative analysis of blog-readers’ judgments of credibility, and ultimately in the potential for producing an empirically verifiable analytical framework. Once the factors that contribute to blog credibility are completed and tested, we can focus specific computational efforts on scanning large amounts of information for blogger- profiling and automating credibility assessment. References Bloedorn, E., Mani, I., (1998). Using NLP for Machine Learning of User Profiles, Intelligent Data Analysis, 2 (1- 4), 3-18. Bowman, S., Willis, C. (2003) We Media: How audiences are shaping the future of news and information, An NDN Research Report, Available: www.ndn.org. Chafe, W. (1986). Evidentiality in English Conversation and Academic Writing. In W. Chafe, J. Nichols (Eds.), Evidentiality: The Linguistic Coding of Epistemology (Vol. 20, pp. 261-273). Norwood, New Jersey: Ablex Publishing Corporation.
  • 4. Johnson, T., Kaye., K. (2004) Wag the Blog: How Reliance on traditional Media and the Internet Influence Credibility Perceptions of Weblogs among Blog Users. Journalism and Mass Communication Quarterly, 81 (3), 622-642. McKeown, B., Thomas, D. (1988). Q Methodology. Sage Publications, Newbury Park. Rak, J. (2005) The Digital Queer: Weblogs and Internet Identity. Biography 28(1), 166-182. Rubin, V. L., Stanton, J. M., Liddy, E. D. (2004). Discerning Emotions in Texts. Paper presented at the AAAI Spring Symposium: Exploring Attitude and Affect in Text: Theories and Applications, Stanford, CA. Shanahan, J., Qu, Y., Wiebe, J. (2005) Computing Attitude and Affect in Text: Theory and Applications. (Eds), The Information Retrieval Series, Volume 20, Springer. Stanford, J., Tauber, E., Fogg, B.J., Marable, L. (2002). Experts vs. Online Consumers: A comparative credibility study of health and finance web sites. Available: http://www.consumerwebwatch.org/news/report3_credibili tyre- search/slicedbread.pdf. Stolfo, S., Hershkop, S., Wang, K., Nimeskern, O., Hu, C. (2003). Behavior Profiling of Email, The First NSF / NIJ Symposium on Intelligence, Security Informatics (ISI 2003), Tucson, AZ. Tseng, H., Fogg, B.J. (1999). Credibility and computing technology. Communications of the ACM, 42(5), 39-44. Van House, N. (2004). Weblogs: Credibility and Collaboration in an Online World (prepared for CSCW Workshop on Trust, October, 2004, unpublished). Van Someren, M., Barnard, Y., Sandberg, J., (1994). The Think Aloud Method: A practical guide to modeling cognitive processes, Academic Press, London. Wassmer, M., Eastman, C. (2005). Automatic Evaluation of Credibility on the Web. Proceedings of the American Society for Information Science and Technology Annual Meeting (ASIS&T), Charlotte, NC.