On Ascertaining Reliability

Web surfers can refer to the credentials of the contributors to ascertain the reliability of the information, no?

Crucial to determining the reliability of information on the web is the source from which the information is obtained. In most cases, sources are explicitly stated and hence, there is a higher likelihood that information in these cases are reliable—unreliable and inaccurate information, once identified with the source, would potentially destroy his/her presumably much-valued credibility. Governmental, statutory and academic websites usually provide reliable information. 

Yet even when sources are explicitly stated, there is no guarantee that such information is totally reliable. Writers may use pseudonyms or write under pretend credentials and the web surfers are none the wiser. To compound this, articles are easily posted on the web, without the writers’ knocking on the doors of publishers and facing possible rejection in getting their works with unreliable information published—understandably, no self-respecting publisher would put money into books with questionable content on the market.

Hence with the use of false information pertaining to the writers’ identities and the ease with which articles are posted on the web, articles of any sort can be posted with minimal risk to the writers and the writers leave no trace behind. The next article that they write can easily be attributed to another “writer”, using another pseudonym. After reading the political opinions of Professor Smith from Graham University, one seldom presumes to suspect that Professor Smith or Graham University actually exists; rather, one takes for granted their existence and hence, does not question the information obtained. For all intents and purposes, the information seems genuine and trustworthy, especially since a name and credentials have been attached to the piece, no doubt, adding credibility. The web surfer then proceeds to use the information thus obtained and might even disseminate it among his friends. This can have negative consequences.

 

           

 

 

 

 

 

It is possible to imagine that, for security purposes, information that the public ought to be given access to and when provided, might be altered or manipulated. [Back]