0% found this document useful (0 votes)
613 views9 pages

Lesson 8: Authenticity Verification of Information From The Web

This document discusses ways to verify the authenticity of information found on the web. It explains that while anyone can publish online, there are methods to check if information is legitimate. These include verifying the author's name, checking if the site is credible, looking at ratings and user engagement, and reviewing cited references. The document provides an example performance task asking students to evaluate the reliability of websites they frequently visit based on these criteria.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
613 views9 pages

Lesson 8: Authenticity Verification of Information From The Web

This document discusses ways to verify the authenticity of information found on the web. It explains that while anyone can publish online, there are methods to check if information is legitimate. These include verifying the author's name, checking if the site is credible, looking at ratings and user engagement, and reviewing cited references. The document provides an example performance task asking students to evaluate the reliability of websites they frequently visit based on these criteria.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

BAAO COMMUNITY COLLEGE

San Juan, Baao, Camarines Sur


Email add: [email protected]

Lesson 8: Authenticity Verification of Information from


the Web
JESUS B. RANCES, LPT
Instructor, Baao Community College
The inherited property of Web 2.0 and its later
versions gave viewers the privilege to influence
content or give anyone the freedom to publish his or
her own Web sites regardless of content. There are no
standards governing content publishing on the World
Wide Web to ensure the correctness of information,
but there are ways on how to verify if the information
is trustworthy or legitimate.

COMPUTER TECHNOLOGY WITH INFORMATION TECHNOLOGY – Lesson 8: Authenticity Verification of Information from the Web
Published author’s name
Publishing the name of the one who wrote the
article or information is one sign that the
information is valid, credible, and legitimate. Most
of the authors who are intentionally writing hoaxes
or false articles will likely omit writing their names
to avoid responsibility. This will also enable the
users to further research and verify the author.

COMPUTER TECHNOLOGY WITH INFORMATION TECHNOLOGY – Lesson 8: Authenticity Verification of Information from the Web
Credible Web sites
Error-free articles are more likely published by
credible Web sites. These are Web sites of big
international or local companies involved in the
field you are searching for. Another example of
credible Web sites are government-connected and
government-maintained Web sites. News agencies
are another good source of credible information.

COMPUTER TECHNOLOGY WITH INFORMATION TECHNOLOGY – Lesson 8: Authenticity Verification of Information from the Web
Rating, number of viewers, and number of shares
A credible article is more likely to receive a high
rating or a normally high number of stars from
reviewers. This is a collective rating of the past
viewers of the site. If the article is not credible or
contains false information, it has a high probability of
getting a low rating. If the information in an article is
false, a fewer number of persons would share the
article. Another way is to visit the comment section of
the article. If the information presented is not true,
most of the comment are negative.
COMPUTER TECHNOLOGY WITH INFORMATION TECHNOLOGY – Lesson 8: Authenticity Verification of Information from the Web
Reference and related articles

Most of the credible articles include a list of


references or articles related to the published one.
To verify the authenticity of an article, visit the
articles listed as references and confirm if the
information written on the Web site conforms to the
information in the references.

COMPUTER TECHNOLOGY WITH INFORMATION TECHNOLOGY – Lesson 8: Authenticity Verification of Information from the Web
Performance Task:
1. What are the Web sites that you frequently visit?
________________________________________
________________________________________
2. Based on the discussion, assess and compare
the authenticity and reliability of information of your
frequently visited Web sites.
________________________________________
________________________________________
COMPUTER TECHNOLOGY WITH INFORMATION TECHNOLOGY – Lesson 8: Authenticity Verification of Information from the Web
Reference/s:
-Bandala, A.A (2016). Empowerment
Technologies. Diwa Learning Systems, Inc.,
Makati City, Philippines
-Using Information Technology: A Practical
Introduction to Computers &
Communications
https://classroom.google.com/u/1/w/MTE1Nzg2
Njg2MTUz/t/all
COMPUTER TECHNOLOGY WITH INFORMATION TECHNOLOGY – Lesson 8: Authenticity Verification of Information from the Web
Thank you!

You might also like