<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Educ.</journal-id>
<journal-title>Frontiers in Education</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Educ.</abbrev-journal-title>
<issn pub-type="epub">2504-284X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/feduc.2020.577843</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Education</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Assessing University Students&#x00027; Critical Online Reasoning Ability: A Conceptual and Assessment Framework With Preliminary Evidence</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Molerov</surname> <given-names>Dimitri</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/978944/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Zlatkin-Troitschanskaia</surname> <given-names>Olga</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/836563/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Nagel</surname> <given-names>Marie-Theres</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/881646/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Br&#x000FC;ckner</surname> <given-names>Sebastian</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/866799/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Schmidt</surname> <given-names>Susanne</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/982356/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Shavelson</surname> <given-names>Richard J.</given-names></name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/989160/overview"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>Department of Research Methods in Education, Humboldt University of Berlin</institution>, <addr-line>Berlin</addr-line>, <country>Germany</country></aff>
<aff id="aff2"><sup>2</sup><institution>Department of Business and Economics Education, Johannes Gutenberg University</institution>, <addr-line>Mainz</addr-line>, <country>Germany</country></aff>
<aff id="aff3"><sup>3</sup><institution>Stanford Graduate School of Education, Stanford University</institution>, <addr-line>Palo Alto, CA</addr-line>, <country>United States</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Douglas F. Kauffman, Medical University of the Americas &#x02013; Nevis, United States</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Henk Huijser, Queensland University of Technology, Australia; Ronny Scherer, University of Oslo, Norway</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Dimitri Molerov <email>molerov&#x00040;hu-berlin.de</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Educational Psychology, a section of the journal Frontiers in Education</p></fn></author-notes>
<pub-date pub-type="epub">
<day>15</day>
<month>12</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="collection">
<year>2020</year>
</pub-date>
<volume>5</volume>
<elocation-id>577843</elocation-id>
<history>
<date date-type="received">
<day>30</day>
<month>06</month>
<year>2020</year>
</date>
<date date-type="accepted">
<day>13</day>
<month>11</month>
<year>2020</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2020 Molerov, Zlatkin-Troitschanskaia, Nagel, Br&#x000FC;ckner, Schmidt and Shavelson.</copyright-statement>
<copyright-year>2020</copyright-year>
<copyright-holder>Molerov, Zlatkin-Troitschanskaia, Nagel, Br&#x000FC;ckner, Schmidt and Shavelson</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract><p>Critical evaluation skills when using online information are considered important in many research and education frameworks; critical thinking and information literacy are cited as key twenty-first century skills for students. Higher education may play a special role in promoting students&#x00027; skills in critically evaluating (online) sources. Today, higher education students are more likely to use the Internet instead of offline sources such as textbooks when studying for exams. However, far from being a value-neutral, curated learning environment, the Internet poses various challenges, including a large amount of incomplete, contradictory, erroneous, and biased information. With low barriers to online publication, the responsibility to access, select, process, and use suitable relevant and trustworthy information rests with the (self-directed) learner. Despite the central importance of critically evaluating online information, its assessment in higher education is still an emerging field. In this paper, we present a newly developed theoretical-conceptual framework for Critical Online Reasoning (COR), situated in relation to prior approaches (&#x0201C;information problem-solving,&#x0201D; &#x0201C;multiple-source comprehension,&#x0201D; &#x0201C;web credibility,&#x0201D; &#x0201C;informal argumentation,&#x0201D; &#x0201C;critical thinking&#x0201D;), along with an evidence-centered assessment framework and its preliminary validation. In 2016, the Stanford History Education Group developed and validated the assessment of <italic>Civic Online Reasoning</italic> for the United States. At the college level, this assessment holistically measures students&#x00027; web searches and evaluation of online information using open Internet searches and real websites. Our initial adaptation and validation indicated a need to further develop the construct and assessment framework for evaluating higher education students in Germany across disciplines over their course of studies. Based on our literature review and prior analyses, we classified COR abilities into three uniquely combined facets: (i) online information acquisition, (ii) critical information evaluation, and (iii) reasoning based on evidence, argumentation, and synthesis. We modeled COR ability from a behavior, content, process, and development perspective, specifying scoring rubrics in an evidence-centered design. Preliminary validation results from expert interviews and content analysis indicated that the assessment covers typical online media and challenges for higher education students in Germany and contains cues to tap modeled COR abilities. We close with a discussion of ongoing research and potentials for future development.</p></abstract>
<kwd-group>
<kwd>critical online reasoning assessment</kwd>
<kwd>critical thinking</kwd>
<kwd>web credibility</kwd>
<kwd>higher education</kwd>
<kwd>information problem solving using the Internet</kwd>
<kwd>multiple-source use</kwd>
<kwd>test validation</kwd>
<kwd>performance assessment</kwd>
</kwd-group>
<counts>
<fig-count count="2"/>
<table-count count="5"/>
<equation-count count="0"/>
<ref-count count="169"/>
<page-count count="29"/>
<word-count count="23592"/>
</counts>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<title>Introduction</title>
<sec>
<title>Relevance and Research Background</title>
<p>Today, higher education students use the Internet to access information and sources for learning much more frequently than offline sources such as textbooks (Gasser et al., <xref ref-type="bibr" rid="B49">2012</xref>; Maurer et al., <xref ref-type="bibr" rid="B87">2020</xref>). However, there have been warnings about the harmful effects of online media use on students&#x00027; learning (Maurer et al., <xref ref-type="bibr" rid="B86">2018</xref>), with misinformation and the acquisition of (domain-specific) misconceptions and erroneous knowledge being prominent examples (Bayer et al., <xref ref-type="bibr" rid="B9">2019</xref>; Center for Humane Technology, <xref ref-type="bibr" rid="B20">2019</xref>). While Internet users are generally concerned about their ability to distinguish warranted, fact-based knowledge from misinformation<xref ref-type="fn" rid="fn0001"><sup>1</sup></xref> (Newman et al., <xref ref-type="bibr" rid="B105">2019</xref>), research on web credibility suggests that Internet users pay little attention to cues indicating erroneous information and a lack of trustworthiness; similar findings were determined across a variety of online information environments and learner groups (Fogg et al., <xref ref-type="bibr" rid="B48">2003</xref>; Metzger and Flanagin, <xref ref-type="bibr" rid="B96">2013</xref>, <xref ref-type="bibr" rid="B95">2015</xref>).</p>
<p>For learning in higher education, the Internet may have both a positive and a negative impact (Maurer et al., <xref ref-type="bibr" rid="B86">2018</xref>, <xref ref-type="bibr" rid="B87">2020</xref>). Positive affordances for collaboration, organization, aggregation, presentation, and the ubiquitous accessibility of information have been discussed in research on online and multimedia learning (Mayer, <xref ref-type="bibr" rid="B88">2009</xref>). However, problems such as addictive gratification mechanisms, filter bubbles and algorithm-amplified polarization, political and commercial targeting based on online behavior profiles, censorship, and misinformation (Bayer et al., <xref ref-type="bibr" rid="B9">2019</xref>; Center for Humane Technology, <xref ref-type="bibr" rid="B20">2019</xref>) have recently been critically discussed as well. The potential of online applications and social media for purposes of persuasion has been known for some time (Fogg, <xref ref-type="bibr" rid="B44">2003</xref>), though the impact of online information on knowledge acquisition is still under-researched to date.</p>
<p>As recent research indicates, the multitude of information and sources available online may lead to information overload (Batista and Marques, <xref ref-type="bibr" rid="B8">2017</xref>; Hahnel et al., <xref ref-type="bibr" rid="B57">2019</xref>). Lower barriers to publication and the lack of requirements for quality assurance, fewer gatekeepers, and faster distribution result in a highly diverse online media landscape and varying information quality (Shao et al., <xref ref-type="bibr" rid="B126">2017</xref>). Students are confronted with quality shortcomings such as incomplete, contradictory, or erroneous information when obtaining and integrating new information from multiple online sources (List and Alexander, <xref ref-type="bibr" rid="B81">2017</xref>; Braasch et al., <xref ref-type="bibr" rid="B13">2018</xref>). Hence, whenever Internet users are acquiring knowledge based on online information or performing online search queries in a way that can be framed as solving an information problem (Brand-Gruwel et al., <xref ref-type="bibr" rid="B14">2005</xref>), they are faced with the challenge of finding, selecting, accessing, and using suitable information. In addition, online learners need to avoid distractions (e.g., advertisements, clickbait) and misinformation as well as evaluate the information they choose with regard to possible biases and specific narrative framing of information (Walton, <xref ref-type="bibr" rid="B146">2017</xref>; Banerjee et al., <xref ref-type="bibr" rid="B7">2020</xref>). To successfully distinguish between trustworthy and untrustworthy online information, students need to judge its relevance to their inquiry and, in particular, evaluate its credibility (Flanagin et al., <xref ref-type="bibr" rid="B40">2010</xref>; Goldman and Brand-Gruwel, <xref ref-type="bibr" rid="B54">2018</xref>). The ability to find suitable information online, distinguish trustworthy from untrustworthy information, and reason based on this information is examined under the term of &#x0201C;critical online reasoning.&#x0201D; These abilities are crucial for (self-)regulated (unsupervised) acquisition of warranted (domain-specific) knowledge based on online information.<xref ref-type="fn" rid="fn0002"><sup>2</sup></xref> In this context, current studies are focusing on the development of (domain-specific) misconceptions and the acquisition of erroneous knowledge over the course of higher education studies, specifically among students who report that they predominantly use Internet sources when studying (Maurer et al., <xref ref-type="bibr" rid="B86">2018</xref>, <xref ref-type="bibr" rid="B87">2020</xref>).</p>
</sec>
<sec>
<title>University Students&#x00027; Critical Online Reasoning Assessment (CORA): Study Context</title>
<p>To acquire reliable and warranted (domain-specific) knowledge, students need to access, evaluate, select, and ultimately reason based on relevant and trustworthy information from online sources. At the same time, they need to recognize erroneous or (intentionally) misleading information and possible corresponding bias, for instance, due to underlying framing or unwarranted perspectives, to avoid being misled and acquiring erroneous knowledge. To properly handle online sources featuring incorrect, incomplete, and contradictory information, students need to recognize patterns in the information indicating its trustworthiness or lack thereof (cues for credibility or misinformation) based on self-selected criteria such as perceived expertise or communicative intentions to acquire reliable, warranted (domain-specific) knowledge using the Internet.</p>
<p>Students&#x00027; critical evaluation skills when dealing with online information are considered important in many research frameworks in a multitude of disciplines that address the online learning-and-teaching environment (Section Theoretical and Conceptual Framework; <xref ref-type="table" rid="T1">Table 1</xref>). Like critical thinking and information literacy, they are considered to be among the key twenty-first century skills, and are considered key skills for &#x0201C;Education in the Digital World&#x0201D; (National Research Council, <xref ref-type="bibr" rid="B104">2012</xref>; KMK, <xref ref-type="bibr" rid="B73">2016</xref>). Skills related to the critical-reflective use of online information are more important than ever, which becomes evident especially with regard to the internet-savvy younger generations (Wineburg et al., <xref ref-type="bibr" rid="B152">2018</xref>). Higher education can play a special role in promoting students&#x00027; critical thinking skills and their skills in evaluating (online) sources (Moore, <xref ref-type="bibr" rid="B100">2013</xref>) due to the evidence-based, research-focused orientation of most academic disciplines (Pellegrino, <xref ref-type="bibr" rid="B110">2017</xref>). For instance, graduate students were found to have advanced critical thinking skills, which has been attributed to the fact that they wrote a bachelor thesis as part of their undergraduate studies (Shavelson et al., <xref ref-type="bibr" rid="B127">2019</xref>; Zlatkin-Troitschanskaia et al., <xref ref-type="bibr" rid="B166">2019</xref>).</p>
<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Theoretical and conceptual background of COR.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" colspan="4"><bold>Critical online reasoning (COR)</bold></th>
</tr>
<tr>
<th valign="top" align="left" colspan="3"><bold>Main assessment frameworks</bold></th>
<th valign="top" align="center"><bold>Studies (selection)</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left" colspan="3">Civic online reasoning assessment (CORA) (assessment in U.S., employing real websites and live open web search as stimuli)</td>
<td valign="top" align="left">Wineburg et al., <xref ref-type="bibr" rid="B155">2016a</xref>; Wineburg and McGrew, <xref ref-type="bibr" rid="B154">2017</xref>; Wineburg et al., <xref ref-type="bibr" rid="B152">2018</xref>; Breakstone et al., <xref ref-type="bibr" rid="B17">2019</xref>; McGrew et al., <xref ref-type="bibr" rid="B91">2019</xref></td>
</tr>
<tr>
<td valign="top" align="left" colspan="3">Performance Assessment of Learning in higher education (PAL) (criterion-sampled performance tasks)</td>
<td valign="top" align="left">Shavelson et al., <xref ref-type="bibr" rid="B128">2018</xref>, <xref ref-type="bibr" rid="B127">2019</xref>; Zlatkin-Troitschanskaia et al., <xref ref-type="bibr" rid="B166">2019</xref></td>
</tr>
<tr>
<td valign="top" align="left" colspan="3">Positive Learning in the Age of Information (PLATO) framework</td>
<td valign="top" align="left">Zlatkin-Troitschanskaia et al., <xref ref-type="bibr" rid="B165">2018</xref>, <xref ref-type="bibr" rid="B163">2020b</xref></td>
</tr>
<tr>
<td valign="top" align="left" colspan="3"><bold>Related research strands for main COR facets</bold></td>
<td valign="top" align="left"><bold>Studies (selection)</bold></td>
</tr>
<tr>
<td valign="top" align="left">Overarching</td>
<td valign="top" align="left" colspan="2">Multiple-source comprehension and use (MSC)</td>
<td valign="top" align="left">for an overview, see Rouet, <xref ref-type="bibr" rid="B119">2006</xref>; Lawless et al., <xref ref-type="bibr" rid="B79">2012</xref>; List and Alexander, <xref ref-type="bibr" rid="B81">2017</xref>; Braasch et al., <xref ref-type="bibr" rid="B13">2018</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Information-problem solving using the Internet (IPS-I)</td>
<td valign="top" align="left">Brand-Gruwel et al., <xref ref-type="bibr" rid="B15">2009</xref>; Walraven et al., <xref ref-type="bibr" rid="B144">2009</xref>; Goldman and Brand-Gruwel, <xref ref-type="bibr" rid="B54">2018</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Internet reading strategies/online search behavior and self-reported search strategies</td>
<td valign="top" align="left">Salmer&#x000F3;n et al., <xref ref-type="bibr" rid="B120">2005</xref>; Zhang and Duke, <xref ref-type="bibr" rid="B159">2008</xref>; Zhang et al., <xref ref-type="bibr" rid="B160">2011</xref>; Pernice, <xref ref-type="bibr" rid="B111">2017</xref></td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td/>
<td valign="top" align="left" colspan="2">&#x0201C;Sourcing&#x0201D; in MSC/use of source cues about author and meta-data, for credibility evaluation; proactive, repeated, and task-related sourcing</td>
<td valign="top" align="left">Braten et al., <xref ref-type="bibr" rid="B16">2018</xref>; Hahnel et al., <xref ref-type="bibr" rid="B57">2019</xref></td>
</tr> <tr>
<td valign="top" align="left">(I) Online Information Acquisition (OIA)</td>
<td valign="top" align="left" colspan="2">Higher education students&#x00027; use of online information</td>
<td valign="top" align="left">Head and Eisenberg, <xref ref-type="bibr" rid="B60">2009</xref>; Samson, <xref ref-type="bibr" rid="B122">2010</xref>; Maurer et al., <xref ref-type="bibr" rid="B86">2018</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Students&#x00027; information needs and problems using online information and databases</td>
<td valign="top" align="left">Walraven et al., <xref ref-type="bibr" rid="B143">2008</xref>; Catalano, <xref ref-type="bibr" rid="B19">2013</xref>; Sanders et al., <xref ref-type="bibr" rid="B123">2015</xref>; Kohnen and Mertens, <xref ref-type="bibr" rid="B74">2019</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Heuristic and systematic information seeking strategies</td>
<td valign="top" align="left">Chen and Chaiken, <xref ref-type="bibr" rid="B21">1999</xref>; De Neys, <xref ref-type="bibr" rid="B28">2006</xref>; Toplak et al., <xref ref-type="bibr" rid="B139">2007</xref>; Evans and Stanovich, <xref ref-type="bibr" rid="B33">2013</xref>; Gronchi and Giovannelli, <xref ref-type="bibr" rid="B56">2018</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Information foraging theory</td>
<td valign="top" align="left">Pirolli and Card, <xref ref-type="bibr" rid="B112">1999</xref>; Juvina and van Oostendorp, <xref ref-type="bibr" rid="B67">2008</xref></td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td/>
<td valign="top" align="left" colspan="2">Interactive Information Retrieval/programming and designing search engines, static and dynamic websites, databases, etc. with a focus on user&#x00027;s interaction with them</td>
<td valign="top" align="left">for an overview, see (Xie, <xref ref-type="bibr" rid="B158">2008</xref>)</td>
</tr> <tr>
<td valign="top" align="left">(II) Critical Information Evaluation (CIE)</td>
<td valign="top" align="left" colspan="2">Disinformation and misinformation classification and current examples (EU)/recent misinformation and disinformation phenomena</td>
<td valign="top" align="left">(Karlova and Fisher, <xref ref-type="bibr" rid="B71">2013</xref>; Ciampaglia, <xref ref-type="bibr" rid="B23">2018</xref>); for a review of disinformation as a threat to democracy, see also (Bayer et al., <xref ref-type="bibr" rid="B9">2019</xref>; Flore et al., <xref ref-type="bibr" rid="B42">2019</xref>)</td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Media bias and propaganda/Studies on strategy and system-level media effects promoting spread of misinformation and disinformation, including the documentation of deconstructions of media, framing, interaction measures, message components, power exertion, and manipulation techniques in advertisement, propaganda, and journalism, as well as implications for (civic) education</td>
<td valign="top" align="left">Herman and Chomsky, <xref ref-type="bibr" rid="B61">2002</xref>; Paul and Elder, <xref ref-type="bibr" rid="B109">2008</xref>; Daniels, <xref ref-type="bibr" rid="B26">2009</xref>; Walton, <xref ref-type="bibr" rid="B146">2017</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Hierarchy of Influences on a media message/media-sociological approach highlighting agents and practices influencing media messages at different levels of power, correspondingly, different scope and spread of misinformation</td>
<td valign="top" align="left">Reese and Shoemaker, <xref ref-type="bibr" rid="B115">2016</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left">General Web credibility models</td>
<td valign="top" align="left">Prominence Interpretation Theory/cue identification and interpretation for operator, design, and content; gullibility and incredulity error; deceiver credibility</td>
<td valign="top" align="left">Tseng and Fogg, <xref ref-type="bibr" rid="B141">1999</xref>; Fogg et al., <xref ref-type="bibr" rid="B47">2000</xref>, <xref ref-type="bibr" rid="B45">2001a</xref>,<xref ref-type="bibr" rid="B46">b</xref>, <xref ref-type="bibr" rid="B48">2003</xref>; Fogg, <xref ref-type="bibr" rid="B43">2002</xref>; George et al., <xref ref-type="bibr" rid="B51">2014</xref>, <xref ref-type="bibr" rid="B50">2016</xref></td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Two-step judgment/immediate surface judgment and subsequent message judgment</td>
<td valign="top" align="left">Wathen and Burkell, <xref ref-type="bibr" rid="B149">2002</xref></td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Dual processing model/3 phases: ability and motivation at exposure influence propensity and depth of evaluation; follow-up studies on relations and features</td>
<td valign="top" align="left">Metzger, <xref ref-type="bibr" rid="B94">2007</xref>; Winter et al., <xref ref-type="bibr" rid="B157">2016</xref>; Flanagin et al., <xref ref-type="bibr" rid="B41">2018</xref>; Kr&#x000E4;mer et al., <xref ref-type="bibr" rid="B76">2018</xref></td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Unifying model/ &#x0201C;construct&#x0201D; phase&#x02014;subjective and context-dependent criterialization of credibility; heuristics and interaction</td>
<td valign="top" align="left">Hilligoss and Rieh, <xref ref-type="bibr" rid="B62">2008</xref></td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">MAIN model&#x02014;modality, agency, interactivity, navigability/affordances of technology itself as cues for credibility</td>
<td valign="top" align="left">Sundar, <xref ref-type="bibr" rid="B134">2008</xref></td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Information trust/3 &#x0201C;s&#x0201D; model (surface, source, semantics), influence by users&#x00027; domain knowledge, topic knowledge, and information skills</td>
<td valign="top" align="left">Lucassen and Schraagen, <xref ref-type="bibr" rid="B83">2011</xref>, <xref ref-type="bibr" rid="B84">2013</xref></td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">New Web Credibility model/juxtaposes P-I website dimensions (operator, content, design) with credibility attributions (expertise and trustworthiness); overview</td>
<td valign="top" align="left">Choi, <xref ref-type="bibr" rid="B22">2015</xref></td>
</tr>
<tr>
<td/>
<td/>
<td valign="top" align="left">Content Credibility Corpus/corpus collection of websites and topics for credibility evaluation</td>
<td valign="top" align="left">Kakol et al., <xref ref-type="bibr" rid="B69">2017</xref>; Wierzbicki, <xref ref-type="bibr" rid="B151">2018</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Web credibility aspects (selection)</td>
<td valign="top" align="left">appearance (Akamine et al., <xref ref-type="bibr" rid="B3">2008</xref>); web 1.0 to 2.0 (Tanaka, <xref ref-type="bibr" rid="B135">2009</xref>; Tanaka et al., <xref ref-type="bibr" rid="B136">2010</xref>); web experience (Jozsa et al., <xref ref-type="bibr" rid="B66">2012</xref>); conflicting topics (Salmer&#x000F3;n et al., <xref ref-type="bibr" rid="B121">2013</xref>), fear appeals (Dunbar et al., <xref ref-type="bibr" rid="B29">2014</xref>), relations with trust in press (Go et al., <xref ref-type="bibr" rid="B52">2016</xref>), message sidedness (Flanagin et al., <xref ref-type="bibr" rid="B41">2018</xref>), source credibility in political communication (Flanagin and Metzger, <xref ref-type="bibr" rid="B39">2014</xref>)</td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td/>
<td valign="top" align="left" colspan="2">Further key evaluation criteria of online information, see also web credibility studies</td>
<td valign="top" align="left">text relevance (McCrudden et al., <xref ref-type="bibr" rid="B90">2011</xref>); accessibility/comprehensibility (Snow, <xref ref-type="bibr" rid="B130">2002</xref>; Coiro, <xref ref-type="bibr" rid="B24">2003</xref>); usefulness (Goldman et al., <xref ref-type="bibr" rid="B53">2013</xref>)</td>
</tr> <tr>
<td valign="top" align="left">(III) Reasoning with Evidence, Argumentation and Synthesis (REAS)</td>
<td valign="top" align="left" colspan="2">Integrated model/review of CT constructs for higher education and the online environment, integrated model, ambiguity experience as activation</td>
<td valign="top" align="left">Jahn, <xref ref-type="bibr" rid="B64">2012</xref>; Jahn and Kenner, <xref ref-type="bibr" rid="B65">2018</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Logic-based CT/CT pioneering approach</td>
<td valign="top" align="left">Ennis, <xref ref-type="bibr" rid="B32">1985</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Education- and psychology-based CT/Delphi study on CT components</td>
<td valign="top" align="left">Facione, <xref ref-type="bibr" rid="B34">1990</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Development of reflective CT/6-stage theory based on systematicity of reflection/meta-cognitive monitoring</td>
<td valign="top" align="left">Elder and Paul, <xref ref-type="bibr" rid="B31">2010</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Psychology-based CT</td>
<td valign="top" align="left">Halpern, <xref ref-type="bibr" rid="B58">2014</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Scientific reasoning and argumentation/studies focusing on students&#x00027; reasoning and argumentation patterns based on scientific evidence, models, and principles</td>
<td valign="top" align="left">Fischer et al., <xref ref-type="bibr" rid="B37">2014</xref>; Fischer, <xref ref-type="bibr" rid="B35">2018</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Rational thinking/rational thinking construct and operationalization</td>
<td valign="top" align="left">Stanovich et al., <xref ref-type="bibr" rid="B133">2016</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Valid (informal) argumentation/fundamental comp onents of argumentation, construction, and analysis of valid argumentation patterns (schemes of (un)warranted reasoning, critical questions for knowledge elicitation)</td>
<td valign="top" align="left">Walton, <xref ref-type="bibr" rid="B145">2006</xref>; Walton et al., <xref ref-type="bibr" rid="B147">2008</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Adequate heuristics/fast and frugal heuristics for ecological rationality</td>
<td valign="top" align="left">Goldstein and Gigerenzer, <xref ref-type="bibr" rid="B55">2002</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Suboptimal heuristics and biases</td>
<td valign="top" align="left">Kahneman et al., <xref ref-type="bibr" rid="B68">1982</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Reasoning fallacies</td>
<td valign="top" align="left">Van Eemeren, <xref ref-type="bibr" rid="B142">2013</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Definition of bias</td>
<td valign="top" align="left">Walton, <xref ref-type="bibr" rid="B145">2006</xref></td>
</tr>
<tr>
<td valign="top" align="left">(IV) Metacognitive Activation (MCA)&#x02014;Overarching metacognitive and regulative component, affective and attitudinal aspects</td>
<td valign="top" align="left" colspan="2">Metacognitive processes and regulation/ review of meta-cognitive processes to support information search</td>
<td valign="top" align="left">Blummer and Kenton, <xref ref-type="bibr" rid="B11">2015</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Affective reactions and uncertainty/6-phase Information Search Process with varying certainty and affective response</td>
<td valign="top" align="left">Kuhlthau, <xref ref-type="bibr" rid="B77">1993</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Context-based initial activation</td>
<td valign="top" align="left">Jahn, <xref ref-type="bibr" rid="B64">2012</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Activation via discrepancy detection/ambiguity experience/subfacet of Discrepancy-Induced Source Comprehension (D-ISC) model for mid-task activation</td>
<td valign="top" align="left">Jahn, <xref ref-type="bibr" rid="B64">2012</xref>; Braasch and Br&#x000E5;ten, <xref ref-type="bibr" rid="B12">2017</xref></td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td/>
<td valign="top" align="left" colspan="2">(attitudinal) Critical thinking dispositions</td>
<td valign="top" align="left">openness to experience etc. Facione (<xref ref-type="bibr" rid="B34">1990</xref>)<break/> intellectual virtues (Paul and Elder, <xref ref-type="bibr" rid="B108">2005</xref>)</td>
</tr> <tr>
<td valign="top" align="left" colspan="4"><bold>Related research strands for broader COR activity</bold></td>
</tr>
<tr>
<td valign="top" align="left">Literacies</td>
<td valign="top" align="left" colspan="2">Digital literacy/media literacy, information literacy, and computer literacy</td>
<td valign="top" align="left">Koltay, <xref ref-type="bibr" rid="B75">2011</xref>; Bulger et al., <xref ref-type="bibr" rid="B18">2014</xref>; Murray and P&#x000E9;rez, <xref ref-type="bibr" rid="B102">2014</xref>; Sparks et al., <xref ref-type="bibr" rid="B132">2016</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Information literacy</td>
<td valign="top" align="left">American Library Association, <xref ref-type="bibr" rid="B4">2000</xref>; Kingsley et al., <xref ref-type="bibr" rid="B72">2011</xref>; Taylor and Dalal, <xref ref-type="bibr" rid="B137">2014</xref>; Sanders et al., <xref ref-type="bibr" rid="B123">2015</xref>; Maurer et al., <xref ref-type="bibr" rid="B85">2017</xref>; Podgornik et al., <xref ref-type="bibr" rid="B113">2017</xref>; McMullin, <xref ref-type="bibr" rid="B92">2018</xref>; Walton et al., <xref ref-type="bibr" rid="B148">2020</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">ICT information and communication technology literacy</td>
<td valign="top" align="left">Zylka et al., <xref ref-type="bibr" rid="B169">2015</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Media literacy</td>
<td valign="top" align="left">Damico and Panos, <xref ref-type="bibr" rid="B25">2018</xref>; Powers, <xref ref-type="bibr" rid="B114">2019</xref>; Threadgill and Price, <xref ref-type="bibr" rid="B138">2019</xref></td>
</tr>
<tr>
<td valign="top" align="left">Further Relevant Assessment Frameworks (selection)</td>
<td valign="top" align="left" colspan="2">Multiple-source comprehension assessment</td>
<td valign="top" align="left">Lawless et al., <xref ref-type="bibr" rid="B79">2012</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Assessment of argument evaluation in scientific texts</td>
<td valign="top" align="left">M&#x000FC;nchow et al., <xref ref-type="bibr" rid="B101">2019</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Critical Thinking assessment in higher education</td>
<td valign="top" align="left">Liu et al., <xref ref-type="bibr" rid="B82">2014</xref></td>
</tr>
<tr>
<td valign="top" align="left">Instructional Approaches (selection)</td>
<td valign="top" align="left" colspan="2">Civic Online Reasoning instructional intervention</td>
<td valign="top" align="left">McGrew et al., <xref ref-type="bibr" rid="B91">2019</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Critical source evaluation for improved search</td>
<td valign="top" align="left">Leeder and Shah, <xref ref-type="bibr" rid="B80">2016</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Bad News game/multilingual browser game on use of major media disinformation strategies, based on &#x02018;inocculation&#x02019; approach</td>
<td valign="top" align="left">Roozenbeek and van der Linden, <xref ref-type="bibr" rid="B118">2019</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Review of CT interventions</td>
<td valign="top" align="left">Abrami et al., <xref ref-type="bibr" rid="B1">2008</xref></td>
</tr>
<tr>
<td/>
<td valign="top" align="left" colspan="2">Fostering CT using digital media/review of instructional designs in HE</td>
<td valign="top" align="left">Jahn, <xref ref-type="bibr" rid="B64">2012</xref>; Jahn and Kenner, <xref ref-type="bibr" rid="B65">2018</xref></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Despite being of central importance for studying using the Internet, the assessment of students&#x00027; skills related to critical online reasoning (COR) is an emerging field with conceptual and theoretical frameworks building on a large number of prior research strands (Section Theoretical and Conceptual Framework; <xref ref-type="table" rid="T1">Table 1</xref>). For instance, computer skills, digital and information literacy, and critical thinking approaches have described and examined (bundles of) related facets. To our knowledge, there is no conceptual and assessment framework to date that describes and operationalizes COR as an interrelated triad of its key facets (i) information acquisition in the online environment, (ii) critical information evaluation, and (iii) reasoning using evidence, argumentation, and synthesis.</p>
<p>In this context, pioneering work has been done by Wineburg et al. (<xref ref-type="bibr" rid="B152">2018</xref>) from the Stanford History Education Group (SHEG), who developed an assessment for measuring <italic>Civic Online Reasoning</italic> at the middle school, high school, and college level. At the college level, this holistic assessment of how students evaluate online information and sources comprises short evaluation prompts, real websites, and an open Internet search (Wineburg and McGrew, <xref ref-type="bibr" rid="B153">2016</xref>; Wineburg et al., <xref ref-type="bibr" rid="B155">2016a</xref>,<xref ref-type="bibr" rid="B156">b</xref>). The assessment was validated in a nationwide study in the U.S. (Wineburg et al., <xref ref-type="bibr" rid="B152">2018</xref>), which indicated substantial deficits in these skills among higher education students.</p>
<p>Based on this U.S. research, we adapted the assessment framework for higher education in Germany. The preliminary validation of the U.S. assessment for Germany indicated that an adaption and validation in terms of the recommendations by the international Test Adaptation Guidelines [TAGs, International Test Commission (ITC), <xref ref-type="bibr" rid="B63">2017</xref>] was not possible. It became evident that, in addition to the practical difficulties of adapting the U.S. assessment web stimuli for assessing the critical evaluation of online information for learning in the German higher education context, expert interviews (Section Content Analysis: CORA Task Components as Coverage of the Construct) indicated that due to the differences in terms of historical and socio-cultural traditions between the two countries, in German higher education, the concept of &#x0201C;civic education&#x0201D; is less prominent than &#x0201C;academic education&#x0201D; (for a comparison of the concept of education/ &#x0201C;Bildung&#x0201D; in Germany and in the U.S., see (Beck, <xref ref-type="bibr" rid="B10">2020</xref>); for a model of critical thinking, see Oser and Biedermann, <xref ref-type="bibr" rid="B107">2020</xref>). Moreover, experts noted that students learn from information from a variety of sources not necessarily related to civic issues (e.g., commercial websites), in addition to scientific publications and textbooks, and it remains unclear how new knowledge based on these multiple sources is integrated, which requires further differentiation and specification.</p>
<p>Based on the results of this preliminary validation, we modified the theoretical framework by expanding our focus beyond civic reasoning to include further purposes of online information acquisition, and situated the construct in relation to a number of theories, models, and adjacent fields, focusing on the research traditions of <italic>critical thinking</italic> (Facione, <xref ref-type="bibr" rid="B34">1990</xref>), which are more applicable to Germany (than civic reasoning), as well as in relation to additional relevant constructs such as &#x0201C;web credibility,&#x0201D; &#x0201C;multiple source comprehension,&#x0201D; &#x0201C;multiple-source use,&#x0201D; and &#x0201C;information problem-solving&#x0201D; using the Internet (Metzger, <xref ref-type="bibr" rid="B94">2007</xref>; Braasch et al., <xref ref-type="bibr" rid="B13">2018</xref>; Goldman and Brand-Gruwel, <xref ref-type="bibr" rid="B54">2018</xref>). Based on a combination of converging aspects from these research strands, we developed a new conceptual framework to describe and operationalize the abovementioned triad of key facets underlying the resulting skill of <italic>Critical Online Reasoning (COR):</italic> (i) <italic>online information acquisition</italic>, (ii) <italic>critical information evaluation, and</italic> (iii) <italic>reasoning using evidence, argumentation, and synthesis</italic>.</p>
</sec>
<sec>
<title>Research Objectives and Questions</title>
<p>The first objective of this paper is to present this newly developed conceptual and assessment framework, and to locate this conceptualization and operationalization approach in the context of prior and current research while critically reflecting on its scope and limitations. The methodological framework is based on an evidence-centered assessment design (ECD) (Mislevy, <xref ref-type="bibr" rid="B97">2017</xref>). According to ECD, alignment of a <italic>student model, a task model</italic>, and <italic>an interpretive model</italic> are needed to design assessments with validity in mind. The <italic>student model</italic> covers the abilities that students are to develop and exhibit (RQ1); the <italic>task model</italic> details how abilities are tapped by assessment tasks (RQ2); and the <italic>interpretive model</italic> describes the way in which scores are considered to relate to student abilities (RQ3). The following research questions (RQ) are examined in this context.</p>
<p><italic>RQ1: What student abilities and mental processes does the CORA cover? How can the COR ability be described and operationalized in terms of its construct definition?</italic></p>
<p><italic>RQ2: What kinds of situations (task prompts), with which psychological stimuli (i.e., test definition), are required to validly measure students&#x00027; abilities and mental processes in accordance with the construct definition?</italic></p>
<p>As a second objective of this paper, we focus on the preliminary validation of the COR assessment (hereinafter referred to as CORA). The validation framework for CORA is based on approaches by Messick (<xref ref-type="bibr" rid="B93">1989</xref>) and Kane (<xref ref-type="bibr" rid="B70">2012</xref>). A qualitative evaluation of the CORA yielded preliminary validity evidence based on a content analysis of the CORA tasks, and interviews with experts in media science, linguistics, and test development (Section Content Analysis: CORA Task Components as Coverage of the Construct). Based on the results of content validation studies conducted according to the Standards for Pedagogical and Psychological Testing (AERA et al., <xref ref-type="bibr" rid="B2">2014</xref>; hereinafter referred to as AERA Standards), the following RQ was investigated:</p>
<p><italic>RQ3: To what extent does the preliminary evidence support the validity claim that CORA measures the participants&#x00027; personal construct-relevant abilities in the sense of the defined construct definition?</italic></p>
<p>In Section Theoretical and Conceptual Framework, we first present the theoretical and conceptual COR framework, also in terms of related research approaches. In Section Assessment Framework of Critical Online Reasoning, we describe the U.S. assessment of civic online reasoning and present our work toward adapting and further developing this approach into an expanded assessment framework and scoring scheme for measuring COR in German higher education. In Section Preliminary Validation, we report on initial results from the preliminary validation studies. In Section Research Perspectives, we close with implications for refining CORA tasks and rubrics and give an outlook on ongoing further validation studies and analyses using CORA in large-scale assessments.</p>
</sec>
</sec>
<sec id="s2">
<title>Theoretical and Conceptual Framework</title>
<p>In this section, we outline the working construct definition for Critical Online Reasoning (COR) as a basis for the CORA framework. We explain the theoretical components and key considerations used to derive this COR construct definition from related prior approaches and frameworks. COR is modeled from a <italic>process, content, domain</italic>, and <italic>development</italic> perspective. For brevity, we only describe the key facets and central components and list the most relevant references categorized by (sub)facets in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p>
<fig id="F1" position="float">
<label>Figure 1</label>
<caption><p>The COR construct with its main facets: MCA, metacognitive activation; OIA, online information acquisition; CIE, critical information evaluation; REAS, reasoning with evidence, argumentation and synthesis.</p></caption>
<graphic xlink:href="feduc-05-577843-g0001.tif"/>
</fig>
<sec>
<title>Construct Definition of Critical Online Reasoning</title>
<p>The working construct definition of COR <italic>(RQ1)</italic> describes the personal abilities of searching, selecting, accessing, processing, and using online information to solve a given problem or build knowledge while critically distinguishing trustworthy from untrustworthy information and reasoning argumentatively based on trustworthy and relevant information from the online environment.</p>
<p>This construct definition focuses on a combination of three overlapping facets: (i) <italic>Online Information Acquisition (OIA)</italic> abilities (for inquiry-based learning and information problem-solving), (ii) <italic>Critical Information Evaluation (CIE) abilities</italic> to analyze online information particularly in terms of its credibility and trustworthiness, and (iii) abilities to use the information for <italic>Reasoning based on Evidence, Argumentation, and Synthesis (REAS)</italic>, weighting (contradictory) arguments and (covert) perspectives, while accounting for possible misinformation and biases. In addition, we assume that the activation of these COR facets requires metacognitive skills, described in the <italic>Metacognitive Activation (MCA)</italic> (<xref ref-type="fig" rid="F1">Figure 1</xref>).</p>
</sec>
<sec>
<title>Theoretical Components of COR</title>
<sec>
<title>Process Perspective</title>
<p><italic>Online Information Acquisition (OIA)</italic> focuses on the searching and accessing of online information, for example by using general and specialized search engines and databases, specifying search queries, opening specific websites. Beyond these more technical aspects, COR focuses in particular on searching for specific platform entries and passages and terms on a website in as far as they contribute to an <italic>(efficient) accessing of relevant and trustworthy information and avoidance of untrustworthy information</italic> (Braten et al., <xref ref-type="bibr" rid="B16">2018</xref>; the Information Search Process model, Kuhlthau et al., <xref ref-type="bibr" rid="B78">2008</xref>).</p>
<p><italic>Critical Information Evaluation (CIE)</italic> is crucial for self-directed, cross-sectional learning based on online information. This facet focuses on students&#x00027; <italic>selection of information sources and evaluation of information and sources</italic> based on website features or specific cues (e.g., text, graphics, audio-visuals). Following comprehension-oriented reception and processing, CIE is used to differentiate and select high- instead of low-quality information (relative to one&#x00027;s subjective standards and interpretation of task requirements). A cue can be any meaningful pattern in the online environment interpreted as an indicator of (trustworthy or untrustworthy) online media or communicative means. Examples of cues may be a URL, title or keyword on the search engine results page, a layout or design element, media properties, an article title, information about author, publisher or founder, publication date, certain phrasings, legal or technical information. Trustworthiness &#x0201C;evaluations&#x0201D; typically include targeted verification behavior, which results in a (defeasible) &#x0201C;judgment&#x0201D; about a web medium or piece of information, which may be based on an initial heuristic appraisal without further (re-)evaluation. However, CIE as &#x0201C;evaluation&#x0201D; can require a more systematic analytical, criteria-based judgment process for students, possibly using multiple searches to establish reliable and warranted knowledge (for an overview on related multiple document comprehension frameworks, see Braten et al., <xref ref-type="bibr" rid="B16">2018</xref>; e.g., the Discrepancy-Induced Source Comprehension (D-ISC) model, Braasch and Br&#x000E5;ten, <xref ref-type="bibr" rid="B12">2017</xref>).</p>
<p><italic>Reasoning with Evidence, Argumentation, and Synthesis (REAS)</italic> is probably the most important facet of COR, which distinguishes this construct from &#x0201C;literacy&#x0201D; constructs (e.g., digital, information or media literacy). This facet focuses on uniting the initially appraised information, weighting it against further indications and perspectives, and using it as evidence to construct a convincing argument that accounts for uncertainty (Walton, <xref ref-type="bibr" rid="B145">2006</xref>). Argumentation is a well-suited discourse format for deliberating whether to accept a proposition (e.g., to trust or distrust). Evidence-based argumentation imposes certain quality standards for a well-founded judgment (e.g., rationality) and requires minimal components of a claim, reasons, evidence (and data) and conventional inferential connections between them (e.g., Argumentation Schemes, Walton, <xref ref-type="bibr" rid="B145">2006</xref>; Walton et al., <xref ref-type="bibr" rid="B147">2008</xref>; Fischer et al., <xref ref-type="bibr" rid="B37">2014</xref>; Fischer, <xref ref-type="bibr" rid="B35">2018</xref>).</p>
<p>These three main facets, OIA, CIE, and REAS, are primarily considered cognitive abilities. Each of them can also take on a metacognitive quality within the COR process, for example as reasoners (internally) comment on their ongoing search, evaluation or argument construction (e.g., &#x0201C;I would not trust this website&#x0201D;), or (self-)reflect on previously acquired knowledge to identify incorrectness or inconsistencies (e.g., &#x0201C;This sentence here contradicts that other source/what I know about the subject&#x0201D;). The latter reflection can become epistemic if it turns to the method of information acquisition and reasoning itself (e.g., &#x0201C;How did I end up believing this scam?&#x0201D;).</p>
<p>These main facets are accompanied by an overarching, self-regulative, metacognitive COR component that activates deliberate COR behavior and coordinates (transitions) between the COR facets in the progression of COR activity, particularly for activating a critical evaluation and deciding when to terminate it, in relation to other events (e.g., during a learning experience, social communication)<xref ref-type="fn" rid="fn0003"><sup>3</sup></xref>. Self-regulation can be applied to monitor and maintain focus (noticing unfocused processing, returning to task) and handle environmental signals (identifying and minimizing distracting information features) (Blummer and Kenton, <xref ref-type="bibr" rid="B11">2015</xref>). As reasoners may have affective responses (Kuhlthau, <xref ref-type="bibr" rid="B77">1993</xref>) to their task progress and to specific information (particularly on controversial topics), affective self-regulation can not only support them in staying on task and keeping an open mind, but they can use it meta-cognitively for COR to gain an insight into unconsciously processed information (e.g., identifying and coping with triggered avoidance reactions or anxiety induced by ambiguity or manipulation attempts) and can critically reflect on triggers in the source cues.</p>
<p>Thus, <italic>Metacognitive Activation (MCA)</italic> is assumed to be an ability required to activate COR in relevant contexts. (Epistemic) metacognition can be characterized by gradations of self-awareness regarding information acquisition, evaluation and reasoning processes, which may activate a &#x0201C;vigilance state&#x0201D; in students and lead to certain (subconscious) reactions (and a habitual affective response, e.g., anxiety, excitement), or can also be interpreted as an indicator of a potential problem with processed information (&#x0201C;am I being lied to/at risk after misjudging the information?&#x0201D;) at the metacognitive level (on uncertainty and emotions when searching for information, see Kuhlthau, <xref ref-type="bibr" rid="B77">1993</xref>; on ambiguity experience as the first stage in a general critical reasoning process, see Jahn and Kenner, <xref ref-type="bibr" rid="B65">2018</xref>), which may lead to the activation of an evaluative COR process.</p>
<p>The main facets of COR and the overarching metacognitive self-regulative component are understood to determine <italic>COR performance</italic> (and are the focus of the CORA, Section Test Definition and Operationalization of COR: Design and Characteristics of CORA Tasks). The main COR facets are assumed to rely on &#x0201C;secondary&#x0201D; sub-facets that provide support in cases where <italic>related specific problems</italic> occur, including self-regulation for minimizing distractions and on-task focus, as well as diverse knowledge sub-facets.</p>
<p>Knowledge sub-facets may include, for OIA, knowledge of resources and techniques for credibility verification; for CIE, knowledge of credibility indicators and potentially misleading contexts and framings, manipulative genres and communication strategies; for REAS, knowledge of reasoning standards as well as fallacies, heuristics, and perceptual, reasoning and memory biases as well as of epistemic limitations for trustworthiness assertions. The list is non-exhaustive, and the knowledge and skills are problem-dependent (e.g., checking for media bias will yield conclusive results only if there is in fact a bias in the stimulus material); they can be expected to impact COR in related cases. Hence, controlling for corresponding stimuli encompassed in the task is recommended.</p>
<p>Attitudinal dispositions for critical reasoning and thinking, such as open-mindedness, fairness, and intellectual autonomy (Facione, <xref ref-type="bibr" rid="B34">1990</xref>; Paul and Elder, <xref ref-type="bibr" rid="B108">2005</xref>) are equally likely candidates for COR influences. These secondary facets are not examined in the current conceptualization.</p>
</sec>
<sec>
<title>Content Perspective</title>
<p>For acquiring information online in a warranted way, students need to successfully identify and use trustworthy sources and information and avoid untrustworthy ones. In contrast, unsuccessful performance is marked by trusting untrustworthy information, a gullibility error, or refusing to accept trustworthy sources, an incredulity error (Tseng and Fogg, <xref ref-type="bibr" rid="B141">1999</xref>). To decide which information to trust and use, students need to judge information in regard to several criteria, including at least the following: <italic>usefulness, accessibility, relevance</italic>, and <italic>trustworthiness</italic>. Information may be judged as useful if it advances the inquiry, for instance by supporting the construction of an argument; usefulness may also be understood as a holistic appraisal based on all other criteria. Lack of <italic>accessibility</italic> (or comprehensibility) limits students to the parts of the information landscape that they can confidently access and process (e.g., students may ignore a search result in a foreign language or leave a website with a paywall, but also abandon a text they deem too difficult to locate or understand in the given task time). In an open information environment, successfully judging <italic>relevance</italic> as relatedness or specificity to the topic of inquiry and <italic>trustworthiness</italic> or quality of information enables students to select and spend more time on high-quality sources and avoid untrustworthy sources. Assuming students will attempt to ignore information they judge as untrustworthy, any decision in this regard affects their available information pool for reasoning and learning.</p>
<p>The judgment of trustworthiness as an (inter-)subjective judgment of the objectively verifiable quality of an online media product against an evidential or epistemic standard is central to COR. In more descriptively oriented &#x0201C;web credibility&#x0201D; research, a credibility judgment is understood as a subjective attribution of trust to an online media product; trustworthiness in COR is closely related, but presupposes that the judgment can be based on valid or invalid reasoning (acceptable or unacceptable based on a normative standard) and hence can be evaluated as a skill. Trustworthiness in COR can be considered a warranted credibility judgment. Consequently, COR enables students to distinguish trustworthy from untrustworthy information and, more specifically, various sub-types based on assumed expertise and communicative intent, for example: accidental misinformation due to error, open or hidden bias, deliberate disinformation, and (non-epistemic) &#x0201C;bullshitting.&#x0201D; A more fine-grained judgment is assumed to afford higher certainty, a more precise information selection, and more adequate response to an information problem. To successfully infer the type of information, reasoners may evaluate cues from at least three major strands of evidence about an online medium, including cues on content, logic, and evidence; cues on design, surface structure, and other representational factors; and cues on author, source, funding, and other media production and publication-related factors. Reasoners may evaluate these themselves (using their own judgment), trust the judgment of experts (external judgment), or a combination of the two; when accepting external judgment, instead of the information itself, reasoners need to judge at least their chosen expert&#x00027;s topic-related expertise and truth-oriented intent.</p>
</sec>
<sec>
<title>Domain-Specificity and Generality</title>
<p>Based on the CORA framework, COR is modeled for generic critical online reasoning (GEN-COR) on tasks and websites that do not require specialized domain knowledge and are suited for young adults after secondary education. The construct can be specified for study domains (DOM-COR), for instance by defining domain standards of evidence for distinguishing trustworthy from untrustworthy information and typical domain problems regarding the judgment of online information.</p>
</sec>
<sec>
<title>Development Perspective</title>
<p>Different gradations can be derived based on task difficulty, complexity, time, and aspired specificity of reasoning (Sections Test Definition and Operationalization of COR: Design and Characteristics of CORA Tasks and Scoring Rubrics). COR ability levels were distinguished to fit the main construct facets depending on students&#x00027; performance in (sub-)tasks tapping OIA, CIE, and REAS (see rubrics in Section Scoring Rubrics; <xref ref-type="table" rid="T1">Table 1</xref>).</p>
</sec>
</sec>
</sec>
<sec id="s3">
<title>Assessment Framework of Critical Online Reasoning</title>
<sec>
<title>Civic Online Reasoning</title>
<p>Wineburg and McGrew (<xref ref-type="bibr" rid="B153">2016</xref>) developed an assessment to measure <italic>civic online reasoning</italic>, which they defined as students&#x00027; skills in interpreting online news sources and social media posts. The assessment includes real, multimodal websites as information sources (and distractors) as well as open web searches. The construct of civic online reasoning was developed from the construct of news media literacy (Wineburg et al., <xref ref-type="bibr" rid="B155">2016a</xref>). It was conceptualized as a key sub-component of analytic thinking while using online media. The assessment aims to measure whether students are able to competently navigate information online and to distinguish reliable, trustworthy sources and information from biased and manipulative information (Wineburg et al., <xref ref-type="bibr" rid="B155">2016a</xref>).</p>
<p>The students&#x00027; skills required to solve the tasks were assessed under realistic conditions for learning using the Internet, i.e., while students performed website evaluations and self-directed open web searches (Wineburg and McGrew, <xref ref-type="bibr" rid="B154">2017</xref>). The computer-based assessment presents students with short tasks containing links to websites with, for instance news articles or social media text and video posts, which students are asked to evaluate. The task prompts require the test-takers to evaluate the credibility of information, and to justify their decision, also citing web sources as evidence. The topics focus on various political and social issues of most US-centric civic interest, typically with conflicting constellations of sources.</p>
<p>Using this assessment, the SHEG surveyed a sample of 7,804 higher education students across the U.S. (Wineburg et al., <xref ref-type="bibr" rid="B155">2016a</xref>), and compared the students&#x00027; performance to that of history professors and professional fact checkers. Based on the findings, the search engine results pages designed and implemented an intervention to improve students&#x00027; civic online reasoning in higher education (Wineburg and McGrew, <xref ref-type="bibr" rid="B153">2016</xref>; McGrew et al., <xref ref-type="bibr" rid="B91">2019</xref>).</p>
</sec>
<sec>
<title>Critical Online Reasoning Assessment (CORA)</title>
<p>In our project<xref ref-type="fn" rid="fn0004"><sup>4</sup></xref>, the initial goal was to adapt this instrument to assess the <italic>civic online reasoning</italic> of students in higher education in Germany and to explore the possibility of using this assessment in cross-national comparisons. The assessment of civic online reasoning features realistic judgment and decision-making scenarios with strong socio-cultural roots, which may engage and tap both the (meta)cognition and the emotional responses of test-takers, as well as their critical evaluation skills. While cultural specificity may present advantages in a within-country assessment, these can become idiosyncratic challenges in cross-national adaptations (e.g., Arffman, <xref ref-type="bibr" rid="B6">2007</xref>; Solano-Flores et al., <xref ref-type="bibr" rid="B131">2009</xref>). Even though we followed the state-of-the-art TAGs by the ITC International Test Commission (<xref ref-type="bibr" rid="B63">2017</xref>) and the best-practice approach of (Double-)Translation, Reconciliation, Adjudication, Pretesting, and Documentation (TRAPD, Harkness, <xref ref-type="bibr" rid="B59">2003</xref>) in assessment adaptation research (as recommended in the TAGs), after the initial adaptation process (Molerov et al., <xref ref-type="bibr" rid="B99">2019</xref>), both the (construct) definition of <italic>civic online reasoning</italic> and the adapted assessment of civic online reasoning showed limitations when applied to the context of learning based on online information in German academic education. The translation team faced several major practical challenges while adapting the real website stimuli, and the results were less favorably evaluated by adaptation experts. This was a key finding from the adaptation attempts and preliminary construct validation by means of curricular analyses and interviews with experts for German higher education. Both analyses indicated the significant differences in terms of historical and socio-cultural traditions between the higher education systems in the two countries (for details, Zlatkin-Troitschanskaia et al., <xref ref-type="bibr" rid="B167">2018b</xref>). Regarding construct limitations, curricular analysis indicated differences in the relevance of &#x0201C;civic education&#x0201D; within German higher education, highlighting problems for the (longitudinal and cross-disciplinary) assessment of generic abilities in learning based on online information. Expert interviews conducted in the context of adaptation attempts and the preliminary validation of the U.S. conceptual and assessment framework of &#x0201C;civic online reasoning&#x0201D; (for details, Molerov et al., <xref ref-type="bibr" rid="B99">2019</xref>) indicated that the concept of &#x0201C;civic education&#x0201D; is related to a specific research strand of political education and is less important in German higher education than &#x0201C;academic education,&#x0201D; which is more strongly related to research traditions focusing on critical thinking (for a comparison of the concept of education in Germany and in the U.S., see Beck, <xref ref-type="bibr" rid="B10">2020</xref>; Oser and Biedermann, <xref ref-type="bibr" rid="B107">2020</xref>).</p>
<p>Based on this preliminary validation of the U.S. assessment in Germany, we modified the conceptual framework (Section Theoretical Components of COR) to accommodate for the close relationship between COR and generic critical thinking, multiple-source comprehension, scientific reasoning and informal argumentation approaches (Walton, <xref ref-type="bibr" rid="B145">2006</xref>; Fischer et al., <xref ref-type="bibr" rid="B37">2014</xref>, <xref ref-type="bibr" rid="B36">2018</xref>; Goldman and Brand-Gruwel, <xref ref-type="bibr" rid="B54">2018</xref>; Jahn and Kenner, <xref ref-type="bibr" rid="B65">2018</xref>), and expanded the U.S. assessment framework to cover all online sources that students use for learning. We developed the scoring rubrics accordingly to validly measure the <italic>critical online reasoning</italic> (COR) ability of higher education students of all degree programs in Germany in accordance with our construct definition (Section Construct Definition of Critical Online Reasoning). Thus, new CORA tasks with new scenarios were created to cover the (German) online media landscape used for learning and topics including culturally relevant issues and problems. The assessment framework was expanded to comprise tasks stimulating web searches, the critical evaluation of online information, and students&#x00027; use of this information in reasoning based on evidence, argumentation and synthesis <italic>to obtain warranted knowledge and solve the given information problems, and to develop coherent and conclusive arguments for their decision</italic> (e.g., draft a short essay or evaluative short report). We also developed and validated the scoring scheme to rate the students&#x00027; responses to the CORA tasks (Section Scoring Rubrics).</p>
</sec>
<sec>
<title>Test Definition and Operationalization of COR: Design and Characteristics of CORA Tasks</title>
<p>The German CORA project developed a holistic, performance assessment that uses criterion-sampled situations to tap students&#x00027; real-world decision-making and judgment skills. The tasks/situations merit critical evaluation. Students may encounter such tasks when studying and working in academic and professional domains, as well as in their public and private lives (Davey et al., <xref ref-type="bibr" rid="B27">2015</xref>; Shavelson et al., <xref ref-type="bibr" rid="B128">2018</xref>, <xref ref-type="bibr" rid="B127">2019</xref>). CORA comprises six tasks of 10 min each. CORA is characterized by the use of realistic tasks in a natural online environment (for an example, see <xref ref-type="fig" rid="F2">Figure 2</xref>). As tasks are carried out on the Internet, students have an unlimited pool of information from which to search and select suitable sources to verify or refute a claim, while judging and documenting the evidence. Five CORA tasks contain links to websites that may have been published with (covert) commercial or ideological intent, and may, for instance aim to sell products or to convince their audience of a particular point of view by offering low-quality information. The characteristics of the low-quality information offered on websites linked in the CORA tasks included, for instance a selection of information while (intentionally) omitting other perspectives, incorrect or imprecise information, irrelevant and distracting information, and biased framing. The tasks feature snippets of information in online media, such as websites, twitter messages, YouTube videos, put forward by political, financial, religious, media or other groups, some cloaked with covert agendas, others more transparent.</p>
<fig id="F2" position="float">
<label>Figure 2</label>
<caption><p>Example CORA Task prompt (German website).</p></caption>
<graphic xlink:href="feduc-05-577843-g0002.tif"/>
</fig>
<p>A specific characteristic of the CORA tasks is that only the stimuli and distractors included in the task prompt and the websites linked in the tasks can be manipulated and controlled for by the test developers. Since the task prompt asks the students to evaluate the credibility and trustworthiness of the linked website through a free web search, realistic distractors include, for instance vividly presented information, a large amount of highly detailed information, (unreferenced) technical, numerical, statistical and graphical data, and alleged (e.g., scientific or political) authority. Depending on the search terms used and the research behavior of the participants, they are confronted with different stimuli and distractors in a free web search, i.e., stimuli and distractors may likely vary significantly from person to person. Thus, while we can control the quality of the websites linked in the CORA tasks, the quality of all other websites that students are confronted with during their Internet research depends solely on their search behavior and can be controlled in the assessment only to a limited extent.</p>
<sec>
<title>Stimuli and Distractors of the Linked Websites</title>
<p>Low-quality information on the linked websites can be caused by a lack of expertise of the author(s), belief-related bias, or accidental errors when drawing inferences or citing from other sources. Moreover, the linked sources offer contradictory information or inconsistencies between multiple online texts, which learners need to resolve in the process of acquiring consistent knowledge. In our example (<xref ref-type="fig" rid="F2">Figure 2</xref>), the provided link leads to a website that offers information about vegan protein sources. At first glance, the website seems to provide accurate and scientifically sound information about vegan nutrition and protein sources, but upon closer inspection, the information turns out to be biased in favor of vegan protein sources. The article is shaped by a commercial interest, since specific products are advertised. This bias can be noticed by reading the content of the website carefully and critically. The existence of an online shop is another indication of a commercial interest motivating the article. In contrast, the references to scientific studies give a false sense of reliability.</p>
<p>As the construct definition of COR states (Section Construct Definition of Critical Online Reasoning), if students wonder about the trustworthiness of certain online information during the inquiry, this should be a sufficient initial stimulus to activate their COR abilities. Thus, we explicitly include the stimulus at the beginning of an inquiry task prompt of all CORA tasks. The in-task cues can tap these activation routes even if the students did not respond to the initial prompt at the beginning of the task (<xref ref-type="fig" rid="F2">Figure 2</xref>). In the example, the participants are also asked whether the website is reliable to stimulate the COR process and a web search.</p>
<p>Following the ECD (Mislevy, <xref ref-type="bibr" rid="B97">2017</xref>), we describe the <italic>task model</italic> and the <italic>student model</italic> of the CORA in more detail.</p>
</sec>
<sec>
<title>Task Model</title>
<p>Task difficulty in terms of the <italic>cognitive requirements</italic> of the construct dimensions of COR varies through the task properties and the prompt (i.e., difficulty of deciding on a specific solution by considering pros/cons or both). For instance, in the dimension of OIA, task difficulty varies in terms of whether students are required to evaluate a website and related online sources or only a claim and related online sources. The quality of the websites found in the free web searches is likely to significantly vary between test participants, which is not explicitly controlled for in the task and in the scoring of the task performance. This information is only examined in additional process analyses using the recorded log files (Section Analyses of Response Processes and Longitudinal Studies).</p>
<p>In the easy CORA tasks, the web authors were aware that they may be biased and alerted their audience to this fact, for instance by stating their stance directly or by acknowledging their affiliation to a certain position or perspective&#x02014;the students then had to take these statements into account in their evaluation. In the difficult CORA tasks, the web authors actively tried to conceal the manipulative or biased nature of their published content&#x02014;and the students had to recognize the techniques these authors employed. In addition, they had to identify the severity of this manipulation and to autonomously decide which information was untrustworthy and should therefore not be taken into consideration. This untrustworthy information can comprise a single word or paragraph, an entire document, all content by a specific author or organization, or even entire platforms (e.g., if their publication guidelines, practices, and filters allow for low-quality information) or entire geographical areas (e.g., due to biased national discourse).</p>
<p>For each CORA task, we developed a rubric scheme that describes the aforementioned specific features of the websites linked in the task, for instance in terms of credibility and trustworthiness of the information they contained (for details, see Section Scoring Rubrics). To develop the psychological stimuli encountered in CORA tasks (in accordance with the construct definition; Section Construct Definition of Critical Online Reasoning), we based our approach on a specific classification of misinformation by Karlova and Fisher (<xref ref-type="bibr" rid="B71">2013</xref>) and on classifications of evaluative criteria of information quality (e.g., topicality, accuracy, trustworthiness, completeness, precision, objectivity) by Arazy and Kopak (<xref ref-type="bibr" rid="B5">2011</xref>), Rieh (<xref ref-type="bibr" rid="B116">2010</xref>, <xref ref-type="bibr" rid="B117">2014</xref>), and Paul and Elder (<xref ref-type="bibr" rid="B108">2005</xref>).</p>
<p>Cues indicating trustworthiness or lack thereof were systematized in evidence strands according to the Information Trust model (Lucassen and Schraagen, <xref ref-type="bibr" rid="B83">2011</xref>, <xref ref-type="bibr" rid="B84">2013</xref>). The model distinguishes evidence on author, content, and presentation, which are aligned with classical routes of persuasion in rhetoric; each requires a different evaluation process. We expand this model by a distinction of personal evaluation vs. trust in a secondary source of information (<xref ref-type="table" rid="T1">Table 1</xref>).</p>
<p>The <italic>task difficulty level</italic> was gauged in particular by the scope and extent of misinformation based on an adaptation of the Hierarchy of Influences model by Shoemaker and Reese (<xref ref-type="bibr" rid="B129">2014</xref>), which assesses agents in the media production process and their relative power to shape the media message&#x02014;and hence introduce error or manipulation, which need to be judged by students to discern the limits of warranted trust (e.g., at the bottom end are obvious deceptions and errors by the author such as SPAM emails or simple transcription mistakes in a paragraph, while at the top end are high-level secret service operations or a society-wide cultural misconception).</p>
<p>Task difficulty in terms of required argumentative reasoning in CORA was varied in three ways: (1) Scaffolding was added to the task prompts by asking students only for part of the argument (e.g., only pro side, con side, or only specific sub-criteria) to reduce the necessary reasoning steps. (2) The stimuli websites were selected by controlling for (i) scope and (ii) order of bias or misinformation, and for how difficult it is to detect it. <italic>Scope</italic> refers to the comprehensiveness of biases or misinformation based on the adapted Hierarchy of Influences model by Shoemaker and Reese (<xref ref-type="bibr" rid="B129">2014</xref>). The <italic>order</italic> is the level of meta-cognition that needs to be assumed in relation to a bias or misinformation. (3) The composition of sources that can be consulted for information (i.e., number of supporting and opposing, or high-quality and low-quality sources) can again be modified only in a closed Internet-like environment (Shavelson et al., <xref ref-type="bibr" rid="B127">2019</xref>; Zlatkin-Troitschanskaia et al., <xref ref-type="bibr" rid="B166">2019</xref>), but it can hardly be controlled for on the open Internet.</p>
<p>The natural online environment used in this assessment constitutes a crucial aspect of the CORA task difficulty (that is also related to the reliable scoring of task performance; Section Scoring Rubrics). In a closed information environment with a finite number of sources, a comprehensive evaluation of all sources is possible. On the Internet, an indefinitely large number of sources are available. Hence, when solving the CORA tasks, students also need to constantly decide whether to continue examining a selected source to extract more information (and how deeply to process this information, e.g., reading vs. scanning) or whether to attempt to find a more suitable source, and a sample of search hits on a search engine results page, and whether they should use different search terms or even switch to a more specialized search engine or a specific database that might yield more useful information. This aspect is related to the <italic>student model</italic> and the primary aim of students in the context of inquiry-based learning based on online information, which is to gather information to &#x0201C;fill&#x0201D; their knowledge gaps while carrying out a task. Learning in an online environment requires students&#x00027; initial (and later updated) understanding of the problem in relation to a specific generic or domain-specific task, and recognition of the types of information that are needed to solve a given problem, and then carrying out the steps to locate, access, use, and reason based on information, and finally formulate an evidence-based solution to the problem.</p>
</sec>
<sec>
<title>Student Model</title>
<p>The expected response processes while solving the CORA tasks can be described with a focus on their <italic>basic phases</italic> based on the abovementioned Information Problem-Solving using the Internet (IPS-I) model (Brand-Gruwel et al., <xref ref-type="bibr" rid="B15">2009</xref>): (1) <italic>Defining the information problem</italic>, (2) <italic>Searching information</italic>, (3) <italic>Scanning information</italic>, (4) <italic>Processing Information</italic>, (5) <italic>Organizing and presenting information</italic>. These phases are quite common in many other models and categorizations of information search and also media and digital literacy (e.g., Eisenberg and Berkowitz, <xref ref-type="bibr" rid="B30">1990</xref>; Fisher et al., <xref ref-type="bibr" rid="B38">2005</xref>). For a multi-source information problem, we expect that the processes will be iterated for each new source. An additional meta-cognitive <italic>Regulation</italic> component guides orientation, steering, and evaluation, and can be active throughout interacting at each phase (Brand-Gruwel et al., <xref ref-type="bibr" rid="B15">2009</xref>). Required judgments of information trustworthiness can be situated in the meta-cognitive component of evaluation. Within the evaluative process, trustworthiness judgments might be juxtaposed with judgments of accessibility, relevance and/or usefulness at several points <italic>in addition to the ongoing collection of information for the inquiry</italic>. Based on these categorizations, we developed a fine-grained description of the (sub)processes the students are expected to perform while solving the CORA tasks (<xref ref-type="table" rid="T2">Table 2</xref>).</p>
<table-wrap position="float" id="T2">
<label>Table 2</label>
<caption><p>Possible and necessary processes contributing to quality criterion judgments, with web content considered, attributed to IPS-I phase (on evaluative review, see CORA-MCA and IPS).</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>IPS-I phase</bold></th>
<th valign="top" align="center" colspan="4" style="border-bottom: thin solid #000000;"><bold>Judgments</bold></th>
</tr>
<tr>
<th/>
<th valign="top" align="left"><bold>Accessibility</bold></th>
<th valign="top" align="left"><bold>Relevance</bold></th>
<th valign="top" align="left"><bold>Trustworthiness</bold></th>
<th valign="top" align="left"><bold>Usefulness (task coverage)</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Define information problem</td>
<td/>
<td valign="top" align="left">o projection of possible relevant information</td>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">Search information</td>
<td valign="top" align="left">x ignoring inaccessible sources (language, no link) (unless useful based on &#x0201C;scent&#x0201D;)</td>
<td valign="top" align="left">o specifying relevant search terms<break/> x judging SERP results for task relevance</td>
<td valign="top" align="left">o considering URL for trustworthiness x specific fact-checking search</td>
<td/>
</tr>
<tr>
<td valign="top" align="left">Scan information</td>
<td valign="top" align="left">o managing accessibility on site or abandoning site (paid service, media activation; perceptual aides)</td>
<td valign="top" align="left">x overview and attempt to locate relevant information<break/> x title and topics match to search purpose<break/> o in-site search</td>
<td valign="top" align="left">o considering credibility cues</td>
<td valign="top" align="left">x amount of information appraisal</td>
</tr>
<tr>
<td valign="top" align="left">Process information</td>
<td valign="top" align="left">o difficult language (skim over, research, or abandon source)</td>
<td valign="top" align="left">o continuous evaluation during reading (on-task monitoring)</td>
<td valign="top" align="left">o evaluating argument o evaluating identified cues</td>
<td valign="top" align="left">o post-processing appraisal of coverage (and further steps)</td>
</tr>
<tr>
<td valign="top" align="left">Organize and present information</td>
<td/>
<td valign="top" align="left">x selecting information</td>
<td/>
<td valign="top" align="left">o on-task monitoring</td>
</tr>
<tr>
<td valign="top" align="left">Evaluative review (anytime)</td>
<td valign="top" align="left">o reflection on missed sources</td>
<td valign="top" align="left">o verification of relation to task</td>
<td valign="top" align="left">o doubt may re-activate COR</td>
<td valign="top" align="left">o post-task evaluation</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><italic>x = required/necessarily tapped; o = possible/can manifest</italic>.</p>
</table-wrap-foot>
</table-wrap>
<p>In the following, we describe the <italic>student model</italic> with regard to the four main COR facets in more detail.</p>
<p>In CORA, the test takers are required to produce an argumentative conclusive written response based on the consulted and critically evaluated online sources. In line with the older IPS model (Brand-Gruwel et al., <xref ref-type="bibr" rid="B14">2005</xref>), we have added a reflective metacognitive review as an expected process, which may occur at any moment but possibly upon response verification, to highlight that COR may be activated even after an iteration of the IPS-I process or after the whole CORA task has been completed without critical consideration.</p>
<p>Judgments of usefulness, accessibility, relevance, and trustworthiness of online information can be attributed to the COR facet CIE that is represented as a (meta-)cognitive evaluating component in the IPS-I model. A judgment may require a more elaborate evaluation based on additional information searches. Hence, we assume that a spontaneous trustworthiness judgment can occur at any stage in the IPS-I model. Additionally, a more deliberate, likely criterion-based, reflective evaluation of information, for instance in terms of its trustworthiness, can be performed as a specific (scheduled) sub-stage&#x02014;if the student is aware of the need to evaluate the information.</p>
<p>The sections in the IPS-I process for evaluations of trustworthiness and other judgments also indicate that they can be interwoven with comprehension and reasoning activities and with each other (Section Construct Definition of Critical Online Reasoning, <xref ref-type="fig" rid="F1">Figure 1</xref>). However, they are also likely to be distributed across several stages and differ in the content of partial evaluations and possible inferences drawn. The more detailed view of judgments and evaluations by search phase indicate that several judgments are likely to occur per phase and judgments of accessibility, relevance, trustworthiness, and usefulness are <italic>differentially important across phases</italic> and touch upon <italic>different sub-questions per phase</italic>. For instance, trustworthiness evaluations can be both fast, if an exclusion criterion is found, or gradual over one or several stages, including the collection of multiple cues. We assume this to be the case for information and sources that students evaluate as part of the CORA task. For other additional sources found during web searches, it is likely the student will evaluate trustworthiness just once and with little effort, i.e., heuristically, if they know they can go back to searching a more trustworthy source faster. (i.e., it is not the student&#x00027;s intention to find and determine every untrustworthy source on the Internet, but find one that is not untrustworthy and meets their needs). We therefore expect that the CORA tasks tap a judgment of trustworthiness, including either a systematic criterion-based evaluation (to the extent to which the test-taker is aware of criteria for trustworthy or untrustworthy information) and/or a vigilant recognition of the specific information features that may help the participants identify bias and misinformation.</p>
<p>In this context, the Information Search Process model (Kuhlthau, <xref ref-type="bibr" rid="B77">1993</xref>) links behavior, cognition, and affective responses, with cognition being characterized by gradations of <italic>self-awareness</italic> regarding information search process (<xref ref-type="fig" rid="F1">Figure 1</xref>). Here, again, we assume multifold interrelations with the metacognitive facet of COR. Therefore, we expect that recognizing a cue in the linked information in the CORA task (i.e., stimuli), indicating possible bias or misinformation, may activate a &#x0201C;vigilance state&#x0201D; in the students and lead to certain (subconscious) reactions (and a habitual affective response, e.g., anxiety, excitement) or can also be interpreted as an indicator of a potential problem (&#x0201C;am I being lied to?/at risk after misjudging the information?&#x0201D;) at the metacognitive level, which may lead to the activation of the facet of COR, i.e., (meta)cognition for critical reasoning activation (on the role of uncertainty and emotions when searching for information, see Kuhlthau, <xref ref-type="bibr" rid="B77">1993</xref>). In this regard, we consider the ambiguity experience as the initial stage in a general critical reasoning and evaluation process, i.e., a cognitive appraisal marked by uncertainty about the validity of one&#x00027;s interpretation of the current situation that leads to a need for more clarity (or to avoid the problem-solving situation, e.g., in case of a low self-efficacy), which may prompt an expected response behavior during the CORA tasks, i.e., critical reflection and evaluation.</p>
<p>In terms of the <italic>task model</italic>, this ambiguity is tapped by the CORA task description and the prompt, which explicitly asks students to judge the trustworthiness of a given website or claim. Thus, the task prompt is the initial stimulus for students to activate their trustworthiness evaluation since the question of whether or not information is trustworthy is explicitly given by the task prompt; the second are the cues offered by the stimulus materials embedded in the CORA tasks; the third is the reminder in the response field of the CORA task to formulate a short statement to the task questions and to list the consulted online sources (Section Scoring Rubrics). The CORA task prompts explicitly require students to formulate a response, justify it with reasons and arguments, and back these up by citing URLs of sources used to reach their decision. Thus, students&#x00027; responses comprise the fundamental components of argumentative reasoning (Section Theoretical Components of COR). In CORA, we framed the trustworthiness evaluation through an <italic>argumentative model</italic>, and modeled (possible) stances on a (trustworthiness) issue and their supporting reasons and evidence (cues). Alternatively, students might not reason deeply about it, but apply cognitive heuristics (Kahneman et al., <xref ref-type="bibr" rid="B68">1982</xref>; Metzger and Flanagin, <xref ref-type="bibr" rid="B96">2013</xref>). However, given that it is explicitly prompted in the task, we expect students to apply argumentative reasoning and to be able to identify cognitive heuristics (e.g., authority biases) within their argumentation.</p>
<p>In this context, one aspect is particular important in terms of the <italic>interpretative model</italic> (Section Scoring Rubrics). Assuming that cognitive biases (e.g., confirmation bias), and motivated reasoning can be tapped by controversial topics as presented in the CORA tasks, an opposing stance toward a given topic (i.e., skeptical) affords more stimuli to be critical and motivates the student to find evidence of misinformation. This is why a balanced selection of various topics was established in CORA. We assume students&#x00027; initial personal stance on the task and its topic will depend on a number of influences, controlled for in CORA (e.g., prior domain knowledge, attitude toward the task topic). This aspect is crucial since students may pass different credibility judgments and follow diverse reasoning approaches depending on their initial stance (Kahneman et al., <xref ref-type="bibr" rid="B68">1982</xref>; Flanagin et al., <xref ref-type="bibr" rid="B41">2018</xref>). At a later, longitudinal research stage (e.g., in the context of formative assessments; Section Analyses of Response Processes and Longitudinal Studies), attitude-dependent tasks can be administered to assess COR levels among students for topics they explicitly support or oppose. Not solving the task in a way that accounts for both perspectives would therefore yield a lower CORA test score (Section Scoring Rubrics). This in turn would strengthen the high ecological validity of CORA.</p>
<p>Whichever stance the students choose, they will not be awarded points unless they provide warrant through reasons and arguments, and back them up with evidence from the evaluated website and further consulted online sources (Section Scoring Rubrics). Thus, an evaluation supported by reason and evidence (such as a link to an authoritative website), judged by raters as acceptable against a generic or domain-specific quality standard, is used to infer the extent to which students&#x00027; have critically reasoned with and about online information. The call to justify is explicitly prompted in the task (&#x0201C;provide a justification&#x0201D;) and the backing with evidence is required in a separate field, asking for the URLs of consulted further websites. Providing citations is a common form of evidence in academic writing, and copying a URL does not require an elaborate evidential standard. The reasons and arguments students cite in their written responses are scored for plausibility and validity based on a few rules (e.g., &#x0201C;trusting only the source&#x00027;s own claims about itself is not sufficient reason&#x0201D;). The indicated URLs are also evaluated in terms of their trustworthiness (Nagel et al., <xref ref-type="bibr" rid="B103">2020</xref>). We assume that students with advanced COR abilities cite only the best sources they found and used to back up their argument. Conversely, indicating many relevant and trustworthy sources as well as irrelevant and untrustworthy ones was considered an indicator of reasoning that was not fully sufficient (see scoring rubrics in Section Scoring Rubrics).</p>
<p>According to the fundamentals of argumentation, the main claim, reasons, and backing (e.g., evidence) are the basic elements of a reasonable argument (Toulmin, <xref ref-type="bibr" rid="B140">2003</xref>; Walton, <xref ref-type="bibr" rid="B145">2006</xref>). Hence, we considered indications of these, which are also explicitly prompted in the CORA task, in a somewhat aligned manner in the students&#x00027; responses as evidence that students performed argumentative reasoning. Some argumentation frameworks include further basic components, such as rebuttal and undercut as types of opposing reasons or inclusion of consequences (Toulmin, <xref ref-type="bibr" rid="B140">2003</xref>). These components can be included in further CORA tasks (Section Refining and Expanding CORA), but were not required for the short online evaluation tasks. Moreover, in terms of metacognitive evaluation, students are expected to engage the evaluative critical reflection, i.e., &#x0201C;self-reflective review&#x0201D; of their task solution after formulating their response to the task.</p>
</sec>
</sec>
<sec>
<title>Scoring Rubrics</title>
<p>According to the task and the student models, CORA tasks measure whether students employ critical evaluation of trustworthiness and critically reason based on arguments from the online information they used. Based on our prior research on performance assessments of learning (e.g., for the international Performance Assessment of Learning (iPAL) project, see Shavelson et al., <xref ref-type="bibr" rid="B127">2019</xref>) and the developed scoring approach, we created and applied new scoring rubrics focusing on the main facets of COR and on fine-grained differentiations of scoring subcategories in accordance with our construct definition (Section Construct Definition of Critical Online Reasoning; for an excerpt of the facet &#x0201C;weighting arguments,&#x0201D; see <xref ref-type="table" rid="T3">Table 3</xref>).</p>
<table-wrap position="float" id="T3">
<label>Table 3</label>
<caption><p>Excerpt of the COR scoring scheme; REAS facet, sub-facet &#x0201C;weighing reasons.&#x0201D;</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>COR facet</bold></th>
<th valign="top" align="left"><bold>Sub-facet</bold></th>
<th valign="top" align="left"><bold>Description</bold></th>
<th valign="top" align="left" rowspan="2"><bold>Subscore &#x0201C;weighing reasons&#x0201D; <xref ref-type="table-fn" rid="TN1"><sup>a</sup></xref></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold>1</bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold>2</bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold>3</bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold>4</bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold>5</bold></th>
</tr>
<tr>
<th/>
<th/>
<th/>
<th valign="top" align="left"><bold>Not fulfilled</bold></th>
<th valign="top" align="left"><bold>Mostly not fulfilled</bold></th>
<th valign="top" align="left"><bold>Partially fulfilled</bold></th>
<th valign="top" align="left"><bold>Mostly fulfilled</bold></th>
<th valign="top" align="left"><bold>Completely fulfilled</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Reasoning using Evidence, Argumentation, and Synthesis</td>
<td valign="top" align="left">Weighing reasons</td>
<td valign="top" align="left">&#x02022; Balanced judgement: pros and cons/diverse perspectives<break/> &#x02022; Conclusive argument, comprehensible justification</td>
<td valign="top" align="left">0.5 points total<break/> 0.1 points per gradation</td>
<td valign="top" align="left">0.1<break/> tasks not fulfilled at all</td>
<td valign="top" align="left">0.2</td>
<td valign="top" align="left">0.3</td>
<td valign="top" align="left">0.4</td>
<td valign="top" align="left">0.5<break/> tasks completely fulfilled</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><italic>Note: completely fulfilled (full score), mostly (not)/partially fulfilled (few, half or most, but not all aspects covered), not fulfilled (zero points)</italic>.</p>
<fn id="TN1"><label>a</label><p><italic>The complete scoring scheme describes all major facets with scored sub-facets. This excerpt shows the REAS facet with the sub-facet &#x0201C;weighing reasons&#x0201D;</italic>.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>Each task is scored with a maximum of 2 points, with to 0.5 points awarded if the response mentions a major bias or credibility cue, for instance noticing a (covert) advertising purpose, <italic>and</italic> if its implications for the interpretation of information are identified. Up to 0.5 points are awarded if the students support their claim (no matter which stance) with one or two valid reasons that are weighted in relation to each other, and a maximum of 0.5 points if students refer to one or two credible external sources (that are aligned with their overall argumentation). Furthermore, students can achieve 0.5 points if their response is coherent, clearly related to the task prompt, and covers all sub-parts.</p>
<p>In contrast to a simple trustworthiness judgment, which could be performed without further reflection using heuristics, the underlying analytical reasoning requirements of the tasks are more demanding. It is also possible for participants to take the evidence for their criticism of a website from the website itself as long as the argument is warranted and conclusive. Consequently, the scoring rubrics also consider to what extent the students recognize the specific characteristics for or against the trustworthiness of certain websites, cues, and strands of evidence, and whether they consider them in their reasoning and decision-making processes. A student may identify manipulative techniques &#x0201C;X&#x0201D; and &#x0201C;Y&#x0201D; being used by the linked website, which make it untrustworthy, and cite them from the website. In this case, students can receive points for correctly judging the website as unreliable and for identifying a bias, even if they have not accessed external websites. In a follow-up study, in addition to this holistic score per task, further sub-scores can be awarded at different levels of granularity in accordance with the COR construct definition (Section Development of Scoring Modular Rubrics).</p>
<p>Regarding <italic>information trust</italic> strands of evidence, before scoring this aspect of students&#x00027; responses, we evaluate the stimuli in the CORA tasks in terms of type, number, and location of cues for/against the credibility of a website (Section Test Definition and Operationalization of COR: Design and Characteristics of CORA). In addition to evaluating the stimuli individually, we mark their valence and importance for main argumentative claims (e.g., supporting or contradicting the trustworthiness of the linked website). Given the large number of possible cues, we make some systematic limitations: the collection of cues is mainly restricted to the stimulus materials to be evaluated by all participants. These cues are listed and scored depending on how frequently they are mentioned in the students&#x00027; argumentative responses (i.e., focus on cues that students selected). In terms of possible verification of plausibility of reasons, we distinguish first-order reasons (e.g., &#x0201C;the website has an imprint&#x0201D;), which may lead to a successful judgment in certain cases and guard against some deceptions if only cues regarding credibility are used, to second-order reasons (e.g., &#x0201C;any website can have an imprint nowadays, but the indicated organization cannot be found online&#x0201D;).</p>
<p>Further, the cues were systematized following three strands of evidence in accordance with the 3&#x02032;S Information Trust model (Lucassen and Schraagen, <xref ref-type="bibr" rid="B83">2011</xref>) and Prominence Interpretation Theory (Tseng and Fogg, <xref ref-type="bibr" rid="B141">1999</xref>), including <italic>surface/design, semantics/content</italic>, and <italic>source</italic>/<italic>operator</italic>. Each of these strands can make a specific contribution to an argument about whether to trust information or not. Moreover, they address different reasoning approaches from &#x0201C;aesthetic&#x0201D; appraisal and consideration of mediated presentation, to content and argumentative appraisal as well as to consideration of authorship reputation, intent and expertise (and other cues of the production/publication process).</p>
<p>In addition to the described strands of evidence, the model was expanded by distinguishing a primary- and a secondary sources perspective for each strand. Usually, both perspectives will be used to some extent for an evaluation of trustworthiness, i.e., when verifying a cue oneself, evidence standards (standards related to the information itself) are used than when relying on other persons&#x00027; judgments (here, one rather uses standards related to the probability of successful judgment of the other person). For example, when judging trustworthiness of the author, a student may complete their own research on relevant aspects from a variety of biographic sources or they may follow a journalist&#x00027;s understanding of this author. Verifying every aspect oneself marks a fully autonomous learner, though we acknowledge that this may not be feasible for all aspects in the short test-taking time. For each task, strands containing important cues were listed. Moreover, major distractors supporting a competing assumption were marked.</p>
<p>The rating was carried out by at least two trained scorers per task. For the overall CORA test score, i.e., the average scores of two or three raters for each participant and for each task, a sufficient interrater agreement was determined, with Cohen&#x00027;s kappa &#x0003E;0.80 (<italic>p</italic> = 0.000).</p>
</sec>
</sec>
<sec id="s4">
<title>Preliminary Validation</title>
<p>The validation of the CORA was integrated with the ECD and follows the AERA Standards (Section Research Objectives and Questions). Starting from the holistic nature of the CORA (see section Task Model), the construct specification, and the modular extensions of the scoring in this paper (see <italic>Interpretative Model</italic>), we present preliminary validity evidence related to the content of the construct. After the COR construct specification and the assessment design, the newly developed CORA tasks underwent content analyses and were submitted to expert evaluation during interviews. The aims were to examine the coverage of the theoretically derived COR construct facets by the holistic tasks and to obtain expert judgment regarding the suitability of the content and requirements for higher education in Germany. Below, we outline the methodology (Sections Content Analysis: CORA Task Components as Coverage of the Construct and Expert Interviews) and discuss the results for both analyses (Section Findings From the Expert Interviews and Content Analysis).</p>
<sec>
<title>Content Analysis: CORA Task Components as Coverage of the Construct</title>
<p>A qualitative content analysis (Mayring, <xref ref-type="bibr" rid="B89">2014</xref>) of the CORA tasks was carried out by the CORA research team members who participated in the construct specification but not the selection of task stimuli. Task prompts and the encompassed stimuli were examined to determine the presence or absence of features that would allow test-takers to draw inferences and generate responses worth partial or full credit according to the scoring rubric (Section Scoring Rubrics). The six higher education CORA tasks that resulted from the design process (Section Test Definition and Operationalization of COR: Design and Characteristics of CORA) were coded according the following features and underlying (theoretical) frameworks:</p>
<list list-type="order">
<list-item><p>As part of the meta-cognitive facet, activation of COR was coded to gather evidence on whether the tasks tap students&#x00027; overall COR ability, i.e., whether they convey a need for critical evaluation and argumentative reasoning and at which point: at the beginning, middle or end of the task. We coded for activation by prompt or by context, by specific cues that would highlight the need for COR during task processing, and for end-of-task activation by required (metacognitive) review steps or invited by a contradictory or uncertain preliminary conclusion. The expectation was that at least some tasks would have a cue for COR activation at the beginning of the task, whereas others may only have a mid-task activation to tap students&#x00027; ability to identify situations when it is needed to activate their COR.</p>
<p>Moreover, the aspect of problem definition (in the sense of the IPS-I model, <xref ref-type="table" rid="T2">Table 2</xref>) was examined. We coded whether the task was embedded in a broader activity context to support judgment based on purpose and increase ecological validity (e.g., judging information trustworthiness <italic>for use in a term paper</italic>); in a pretest during task design, students had claimed to apply more or less rigorous evidence standards depending on purpose. We also coded whether the task goal was clearly stated in the prompt and whether solution criteria were given or if they needed to be inferred.</p>
<p>Other MCA subfacets regarding regulation, affective response, or attitudinal aspects were not coded due to the difficulty of assigning them to specific task features (in the online assessment); these could be elicited more efficiently in a future coglabs study (Section Analyses of Response Processes and Longitudinal Studies).</p></list-item>
<list-item><p>The OIA and CIE facets were assumed to be organized in order of the phases of the IPS-I process model to highlight similarities and differences among the CORA tasks, while specific features were coded based on other additional models and research foci (Section Scoring Rubrics). The phases of source selection and initial scanning of a website were listed under one facet (OIA or CIE), but are expected to be hybrid search and evaluation activities (to be further examined in coglabs; Section Analyses of Response Processes and Longitudinal Studies).</p>
<p>Among the search-related aspects (OIA), we coded the necessity to use different search interfaces during the process (e.g., a search engine, in-site search) to obtain reliable information. We assumed that basic search skills, but not use of advanced search operators or special databases would be required. Websites that were inaccessible and media that would not play or were too long and not searchable were excluded during the pretest. Hence, suitable information was expected to be fairly easy to locate and access (except on specific search tasks) by performing an external search.</p>
<p>Regarding information source selection, we generally coded the sources students had to evaluate to obtain suitable information, i.e., the given website, additional websites, and linked sources (e.g., a background article to a tweet), and/or websites which students selected themselves. We expected requirements to vary across tasks.</p></list-item>
<list-item><p>The facet of CIE united the IPS-I phases of scanning a website and in-depth information processing. For global website appraisal and orientation, we coded to what extent it was necessary to judge the overall layout and design (or if one could ignore the context and start reading/searching immediately), to what extent students needed to get an overview first, for instance to find a suitable paragraph in time by scanning sub-headings, and determine if they had to attend to any specific cues rather than reading the main text. We expected that some websites might have obvious design cues and others might not (e.g., a popular social network could be interpreted as an obvious cue for lower credibility); some websites were expected to be more complex or longer and require initial orientation; however, we expected students to find relevant information on the given landing page and standard sub-pages (e.g., publisher and author listed in the legal notice or &#x0201C;about&#x0201D; page); we expected the task solutions to not be based solely on the identification of a single cue.</p>
<p>Regarding information processing, we generally assumed the required reading comprehension to be a given among higher education students and focused on evidence evaluation, classifying available cues based on the 3&#x02018;S&#x02019; Information Trust model (Lucassen and Schraagen, <xref ref-type="bibr" rid="B83">2011</xref>) into cues in the design, content, or source, as well as (jointly for all three) secondary external sources indicating cue evaluations (Deferring judgment to external sources would also require an evaluation of these sources&#x00027; expertise and intent). For example, if a website had aggressive popup advertisement, this would be coded as a cue in the design that might indicate lower trustworthiness. We expected that not all tasks would have cues for (un)trustworthiness in all strands, but at least in one strand of evidence. Moreover, different strands of evidence would be tapped across tasks so that no single subset of evaluation skills or strategy (e.g., only using logical critique or looking up the author&#x00027;s reputation) would be universally successful.</p></list-item>
<list-item><p>Based on major components of reasoning (Walton, <xref ref-type="bibr" rid="B145">2006</xref>) with evidence, argumentation and synthesizing (REAS), we coded to what extent students needed to cite sources of evidence (expected), to what extent they had to provide reasons why they trusted the information (on some tasks), or arguments against its trustworthiness (expected), to what extent they needed to make an overall evaluative judgment (expected), and to what extent they had to synthesize and weight possibly contradicting information and arguments (expected), to what extent stimulus materials contained a prominent bias, mismatched heuristic, or fallacy to be avoided (expected for most tasks), and if there was a clear-cut solution vs. an undecidable outcome so they had to account for uncertainty (only on few tasks).</p>
<p>In regard to presentation of results (another IPS-I phase), we coded to what extent the quality of the structure and phrasing of students&#x00027; responses contributed to their score. As we focused on the quality of argumentative links and information nodes rather than their rhetorical arrangement, we expected response structures and phrasing to not matter beyond the general effort of presenting a coherent and conclusively argued response.</p></list-item>
<list-item><p>In addition, given that domain- and topic-dependent prior knowledge (and attitudes) might influence participants&#x00027; searches, evaluation, and reasoning, we collected some descriptive information on the task topics: We labeled the origin of the misinformation as an indicator of how widespread and hard to identify a deception might be (e.g., from a single author&#x00027;s error on a page to a newspaper editorial board&#x00027;s agenda-setting policy to a culturally normalized conviction), as suggested by the Hierarchy of Influences model (Shoemaker and Reese, <xref ref-type="bibr" rid="B129">2014</xref>). We coded the share of supporting and opposing (in terms of the task solution: conducive or distracting) search results for the key terms in the prompt and website title (as an indicator of controversy and how easy it was to find additional online information). We labeled the broader task context in terms of societal sphere (commerce, science, history etc.), the kind of misinformation genre, specific biases, heuristics, and fallacies presented, and the type of online medium. The overall expectation was that CORA tasks would present one or two challenging aspects but not be overly difficult given the short testing time (e.g., no national scandal to be uncovered), and would be varied in their genre and contexts. Results are summarized in <xref ref-type="table" rid="T4">Table 4</xref>.</p></list-item>
</list>
<table-wrap position="float" id="T4">
<label>Table 4</label>
<caption><p>Content analysis of the CORA tasks as coverage of the major facets of the construct.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>COR facet</bold></th>
<th valign="top" align="center"><bold>1</bold></th>
<th valign="top" align="center"><bold>2</bold></th>
<th valign="top" align="center"><bold>3</bold></th>
<th valign="top" align="center"><bold>4</bold></th>
<th valign="top" align="center"><bold>5</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left" colspan="6"><bold>A. Metacognitive Activation (MCA)</bold></td>
</tr>
<tr>
<td valign="top" align="left" colspan="6"><italic>COR activation</italic></td>
</tr>
<tr>
<td valign="top" align="left">Initial activation by prompt</td>
<td valign="top" align="center">&#x0002B;&#x0002B;</td>
<td valign="top" align="center">&#x0002B;&#x0002B;</td>
<td valign="top" align="center">&#x0002B;&#x0002B;</td>
<td valign="top" align="center">&#x0002B;&#x0002B;</td>
<td valign="top" align="center">&#x0002B;&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">Initial activation by context</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0 (&#x0002B;)</td>
<td valign="top" align="center">2nd</td>
<td valign="top" align="center">0 (&#x0002B;)</td>
<td valign="top" align="center">0</td>
</tr>
<tr>
<td valign="top" align="left">Mid-task activation by cue identification</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">2nd</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">2nd</td>
</tr>
<tr>
<td valign="top" align="left">End-task activation by synthesis outcome</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">opt</td>
</tr>
<tr>
<td valign="top" align="left">End-task activation by review process</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
</tr>
<tr>
<td valign="top" align="left"><italic>Problem definition</italic></td>
<td valign="top" align="left" colspan="5">see IPS-I (Brand-Gruwel et al., <xref ref-type="bibr" rid="B15">2009</xref>)</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Clear purpose of activity</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Clear task goal</td>
<td valign="top" align="center">&#x0002B;&#x0002B;</td>
<td valign="top" align="center">(&#x0002B;)</td>
<td valign="top" align="center">&#x0002B;&#x0002B;</td>
<td valign="top" align="center">&#x0002B;&#x0002B;</td>
<td valign="top" align="center">(&#x0002B;)</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Determining criteria</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left" colspan="6"><bold>1. Online Information Acquisition (OIA)</bold></td>
</tr>
<tr>
<td valign="top" align="left"><italic>Search</italic></td>
<td valign="top" align="left" colspan="5">see IPS-I, Interactive Information Retrieval (Xie, <xref ref-type="bibr" rid="B158">2008</xref>)</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Search engine use</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Data base use</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Defining query terms</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Spec. search (e.g., operators)</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;In-site search</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left" colspan="6"><italic>Information source selection</italic></td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Evaluating given source</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Evaluating linked sources</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">opt</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Evaluating self-selected sources</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left" colspan="6"><bold>2. Critical Information Evaluation (CIE)</bold></td>
</tr>
<tr>
<td valign="top" align="left"><italic>Scanning (global site appraisal)</italic></td>
<td valign="top" align="left" colspan="5">see IPS-I</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Of design</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Of structure</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Of spec. features</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
</tr>
<tr>
<td valign="top" align="left"><italic>Information processing; evaluation of strands of evidence</italic></td>
<td valign="top" align="left" colspan="5">see IPS-I; Information Trust (Lucassen and Schraagen, <xref ref-type="bibr" rid="B83">2011</xref>); Prominence Interpretation Theory (Tseng and Fogg, <xref ref-type="bibr" rid="B141">1999</xref>)</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Cues in design</td>
<td valign="top" align="center">&#x0002B;&#x0002B;</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">0</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Cues in content</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Cues on author/publisher</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Cues reported on in external sources (alternatively: expertise and intent)</td>
<td valign="top" align="center">Opt</td>
<td valign="top" align="center">&#x0002B;&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;/&#x02013;</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left" colspan="6"><bold>3. Reasoning using Evidence, Argumentation, and Synthesis (REAS)</bold> see Fundamentals of Critical Argumentation (Walton, <xref ref-type="bibr" rid="B145">2006</xref>)</td>
</tr>
<tr>
<td valign="top" align="left">Citing external sources of evidence</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">Generating supporting reasons</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">Generating opposing reasons</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">Making a holistic evaluative judgment</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">0 (scaff)</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;By synthesizing and weighing information</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">Avoiding biases, heuristics, fallacies</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left">Adjusting for uncertainty</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">opt</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left"><italic>Structuring and presenting results</italic></td>
<td valign="top" align="center" colspan="5">see IPS-I</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Organizing structure</td>
<td valign="top" align="center">0 (scaff)</td>
<td valign="top" align="center">0 (scaff)</td>
<td valign="top" align="center">0 (scaff)</td>
<td valign="top" align="center">0 (scaff)</td>
<td valign="top" align="center">0 (scaff)</td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;Formulating response</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
<td valign="top" align="center">&#x0002B;</td>
</tr>
<tr>
<td valign="top" align="left" colspan="6"><bold>B. Descriptive Features Hierarchy of Influences (Shoemaker and Reese</bold>, <xref ref-type="bibr" rid="B129"><bold>2014</bold></xref><bold>)</bold></td>
</tr>
<tr>
<td valign="top" align="left"><italic>Origin and diffusion of misinformation</italic></td>
<td valign="top" align="center">organization</td>
<td valign="top" align="center">personal</td>
<td valign="top" align="center">professional association</td>
<td valign="top" align="center">news editor</td>
<td valign="top" align="center">think tank</td>
</tr>
<tr>
<td valign="top" align="left"><italic>Share of supporting/distracting external sources</italic></td>
<td valign="top" align="center">&#x0002B;/0</td>
<td valign="top" align="center">&#x0002B;/&#x02013; &#x02013;</td>
<td valign="top" align="center">&#x0002B;/&#x02013;</td>
<td valign="top" align="center">0/&#x02013;</td>
<td valign="top" align="center">&#x0002B;/&#x02013;</td>
</tr>
<tr>
<td valign="top" align="left"><italic>Social context</italic></td>
<td valign="top" align="left" colspan="5">DE: commerce (1), politics (2), society/ethics (2), history (0), science (0),... US: commerce (0), politics (3), society/ethics (3), history (1), science (0),.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>Misinformation genres</italic></td>
<td valign="top" align="left" colspan="5">corporate educational texts, hidden advocacy, tendentious media commentary, social media rumor,...</td>
</tr>
<tr>
<td valign="top" align="left"><italic>Specific biases, heuristics, fallacies</italic></td>
<td valign="top" align="left" colspan="5">commercial bias (limited information selection, overstatement of pros, understatement of cons), oversimplification of opposing stance, ideological bias (religion, economic policy), unsupported one-sided prediction, baseless ridicule,...</td>
</tr>
<tr>
<td valign="top" align="left"><italic>Media type</italic></td>
<td valign="top" align="left" colspan="5">news article, website, tweet, Facebook post, and news video</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><italic>Features per individual task; descriptive features aggregated across tasks for context, genre, biases, media</italic>.</p>
<p>&#x0002B;&#x0002B; = <italic>cue is obvious from task (e.g., explicit prompt)</italic>.</p>
<p>&#x0002B; = <italic>cue is present but needs to be identified and used in inference; i.e., ability likely tapped</italic>.</p>
<p><italic>opt</italic> = <italic>cue is available for use, but not required for optimal solution; i.e., supporting sub-facet likely tapped</italic>.</p>
<p><italic>0</italic> = <italic>cue not available or offers no information; i.e., applying ability on problem yields no result</italic>.</p>
<p><italic>0 (scaff)</italic> = <italic>requirement scaffolded; i.e., partial solution is given</italic>.</p>
<p>&#x02013; = <italic>cues misleading; i.e., distractors present, critical evaluation (selection) likely tapped</italic>.</p>
<p>&#x02013; &#x02013; = <italic>most cues misleading; i.e., distractors present, critical evaluation (selection) and search skills likely tapped</italic>.</p>
<p><italic>2nd</italic> = <italic>cue present, but can be identified only after successful inference, e.g., after deception or bias detection, i.e., critical evaluation and argumentation (weighing of alternative explanations) likely tapped</italic>.</p>
</table-wrap-foot>
</table-wrap>
</sec>
<sec>
<title>Expert Interviews</title>
<p>Semi-structured expert interviews (Schnell et al., <xref ref-type="bibr" rid="B125">2011</xref>) provided a second source of evidence on content representativeness. In semi-structured interviews with experts, we presented examples of CORA tasks and asked experts to comment <italic>on their suitability for higher education in Germany</italic>. The interviewed experts were leading academics in their field and included two of the U.S. developers of the civic online reasoning assessment, four experts in computer-based performance assessments in higher education, and six scholars from the fields of media studies (who focus on online source evaluation or media literacy), linguistics, and cultural studies. After considering the task stimuli, prompt, and rubrics (sent to them in advance), the experts were given the opportunity to ask for clarifications and were then asked to share their first impressions of the assessment before responding to more specific questions regarding the tasks and features. The discussed topics are shown in <xref ref-type="table" rid="T5">Table 5</xref>.</p>
<table-wrap position="float" id="T5">
<label>Table 5</label>
<caption><p>Evaluation questions for experts (selection).</p></caption>
<table frame="hsides" rules="groups">
<tbody>
<tr>
<td valign="top" align="left">Suitability for higher education in Germany</td>
<td valign="top" align="left">To what extent are the COR tasks suited to assess students&#x00027; ability to critically use online information and reason based on it?</td>
</tr>
<tr>
<td valign="top" align="left">Coverage of facets</td>
<td valign="top" align="left">Which (sub)facets of COR might not be assessed by the tasks?</td>
</tr>
<tr>
<td valign="top" align="left">Representativeness of media</td>
<td valign="top" align="left">Are the media in the stimuli representative of the information environment higher education students typically encounter online?</td>
</tr>
<tr>
<td valign="top" align="left">Representativeness of misinformation types</td>
<td valign="top" align="left">Are the kinds of biased information representative of the types/genres of misinformation and biases that students should be able to recognize? Which ones might be missing?</td>
</tr>
<tr>
<td valign="top" align="left">Difficulty and source use</td>
<td valign="top" align="left">How do you judge the difficulty of tasks?/What university level are they suited for? What aspects might contribute to the difficulty? Do students need to evaluate other sources that are significantly more or less difficult to evaluate?</td>
</tr>
<tr>
<td valign="top" align="left">Potential for differential item functioning (DIF)</td>
<td valign="top" align="left">Would you expect any group of students to perform better on the tasks (e.g., depending on gender, age, study domain)?/Does the assessment disadvantage any group? Does the assessment have a potential bias?</td>
</tr>
<tr>
<td valign="top" align="left">Item design</td>
<td valign="top" align="left">Which aspects are particularly important to select or construct realistic tasks with adequate difficulty (to tap COR abilities)?</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The questions were asked in view of the German context and tasks specifically, since the media landscape and typical challenges with online information, including deception strategies, can be country-specific. Experts&#x00027; responses were interpreted in light of their disciplinary backgrounds and convergence or divergence between experts.</p>
</sec>
<sec>
<title>Findings From the Expert Interviews and Content Analysis</title>
<p>In the following, we present a summary of the main findings from the expert interviews and content analysis.</p>
<sec>
<title>Overall Experts Evaluations</title>
<p>Overall, with regard to the suitability and validity of the CORA tasks for higher education in Germany, most experts agreed and confirmed the content and ecological validity of the CORA tasks and recommended further expansions. For instance: &#x0201C;The task is clear, the instruction is also clear, and it seems obvious that they need to formulate a response.&#x0201D;</p>
<p>One expert, after pondering how to translate and adapt the U.S. tasks, and worrying about cultural suitability, considered the CORA tasks and commented: &#x0201C;These [German] tasks are really a hundred times better for Germany.&#x0201D;</p>
</sec>
<sec>
<title>Coverage of COR Facets</title>
<p>One question critically discussed with experts addresses the domain-specificity of the CORA tasks. Here, the experts confirmed that the six tasks cover generic COR ability. For instance: &#x0201C;No domain-specific knowledge is required. It&#x00027;s a good selection for the news/science context.&#x0201D;</p>
<p>One concern that was raised by most expects regards the suitability of the testing time to assess all facets of COR, and in particular the REAS facet. However, experts also agreed that students may not dedicate more time to the task when evaluating an information source in a real setting. As one expert notes: &#x0201C;There are 10 min to conduct a search. One may doubt if people would commit as much time in everyday life, unless they really took the time to carry out a more detailed search.&#x0201D; At the same time, the natural online environment of the assessment was praised in terms of the high ecological validity of CORA by all experts: &#x0201C;The mode of administration as given here is important, since it enables assessing internet search behavior.&#x0201D;</p>
<p>The new rating scheme with the subscores and evaluation categories was positively evaluated by the experts, although they stressed the high complexity of the scoring rubrics. For instance: &#x0201C;It is also good that you have different degrees, not only &#x0201C;right or wrong.&#x0201D; Of course, this places high demands on coders, but with training, it is doable.&#x0201D;</p>
</sec>
<sec>
<title>Representativeness of Media</title>
<p>Most experts positively evaluated the representativeness of the chosen media, i.e., media that students frequently use online. However, one expert criticized that &#x0201C;scientific and journalistic media were indeed covered, but the selection could include more reputable media as well as some media more on the lower quality end of the spectrum. The ones here are well chosen; one cannot immediately tell if they are fabricated or not.&#x0201D; Another expert proposed: &#x0201C;These are common media sources. However, you may include even more social media, and not only evaluate news by institutions and organizations, but also by individual users or from the &#x0201C;alternative&#x0201D; news outlets. Influencers on Instagram who present products are another option.&#x0201D;</p>
</sec>
<sec>
<title>Representativeness of Misinformation Types</title>
<p>In terms of the presented misinformation, the overall judgment by the experts was positive. For instance: &#x0201C;Item topics are nicely varied; tasks are not too simple, so one does not get bored; and I could not decide right away, I had to click on the [background source] and take a look. Even as a media-competent person I had to examine it to make a judgment.&#x0201D; Another expert stated: &#x0201C;I could not solve the items without checking. I had heard nothing about these cases. With unknown issues, ideology also plays a smaller role.&#x0201D; In terms of potential biases and DIFs, the experts did not express any concerns. For instance: &#x0201C;I do not think that, given equal competence, it would be easier for students with typically liberal or left-wing attitudes to solve the tasks. The selection of topics in the tasks covers some stances typically accepted in the left and green camp, some typically accepted by the conservative camp.... It is a good mix.&#x0201D; In addition, one expert recommended expanding the item pool by a clearly untrustworthy website and one clearly trustworthy website, so that lack of trustworthiness would not be predictable on post-tests. Another expert proposed: &#x0201C;Some other frequently shared information of low trustworthiness can include memes, misattributed or completely wrong quotes, or quotes taken out of context.&#x0201D;</p>
</sec>
<sec>
<title>Difficulty and Source Use</title>
<p>At the same time, however, it was questioned whether the task prompts might be too difficult for beginning or undergraduate students. For instance, &#x0201C;Even as a frequent evaluator, I was not always skeptical of the given information.&#x0201D; In this context, the appropriateness of the limited testing time was once again questioned. Only one expert was of the opinion that the tapped skills are mastered early on during the course of studies: &#x0201C;What you assess here is what we call study of sources. [&#x02026;] We teach this the first year in our degree course, and from then on, students should know it, and it is basically part of practice from then on.&#x0201D; In this regard, some experts recommend splitting the task into parts that focus on particular facets of COR. For instance, &#x0201C;You could ask for an ad hoc judgment, and have additional tasks [for more detailed search].&#x0201D; Another expert proposed: &#x0201C;If students do not find suitable sources, they may get stuck. Perhaps, it is worth including a separate task format or hints.&#x0201D;</p>
<p>Another aspect addressed by most experts concerns participants&#x00027; prior knowledge, beliefs and critical stances, which may significantly influence their CORA test performance. In this context, one expert stated: &#x0201C;Whether people evaluate sources can also depend on their motivation to put in the time for checking them. Hence, need for cognition could be an influence, people&#x00027;s proclivity to get to the bottom of things and not avoid complexity.&#x0201D; Similarly, another expert commented: &#x0201C;People may also carry out a detailed search just to confirm their worldview or to form an opinion. This can occur despite existing search skills (but they would still be ideologically stuck). Hence, motivation to be open to other positions is key, and it then matters how much time I&#x00027;m willing to invest in a search.&#x0201D; In this context, most experts stressed the need to control for participants&#x00027; prior knowledge and attitudes. For instance: &#x0201C;Political orientation can be used as a control variable if completely anonymized, for instance asking where they would position themselves on a 1-to-10 left-to-right-wing scale (on a voluntary basis) appears less invasive.&#x0201D; Another expert proposed: &#x0201C;You may also want to specify whether it is the successful judgment of a first impression or openness to changing one&#x00027;s opinion. In that case, personality traits would be controlled for. So, a different option would be to assess who changes their mind when they come across new leads.&#x0201D;</p>
</sec>
<sec>
<title>Suggestions for the Further Development of CORA</title>
<p>The interviewees did not recommend the exclusion of any tasks. In few cases, the experts recommended removing certain task features. However, the experts provided a number of recommendations in terms of refining the CORA. For instance: &#x0201C;The role of content shared by friends could be expanded, where it is unclear if it has been checked or not... User comments can be read and might influence more passive users... So to increase difficulty, you could add social credibility cues. It would be an even more realistic setting, but you need to see how additional information would influence difficulty.&#x0201D; This suggestion is in line with credibility research that highlights the huge role that social persuasion by peers plays in today&#x00027;s social media (Fogg, <xref ref-type="bibr" rid="B44">2003</xref>). Although cues exist in few of the tasks, social persuasion and learning was purposely left for future CORA expansions (Section Refining and Expanding CORA).</p>
</sec>
<sec>
<title>Overview Content Analysis</title>
<p>As task prompts shared a similar structure and wording with only differing topics and source links, the evaluative and argumentative requirements were assumed to be similar as well. The closer content analysis, however, revealed two distinct types of tasks: (1) &#x0201C;website evaluation tasks,&#x0201D; tapping particularly CIE, but less OIA if students did not search beyond the presented website; and (2) &#x0201C;fact-checking tasks&#x0201D; that only presented a claim, but no linked website as a stimulus, and therefore forced an Internet search. Fact-checking emphasized OIA more in comparison to CIE since students were not bound to evaluate one particular website; if they were uncertain about a source, they could abandon it to find a better alternative. In this way, the task types afforded use of all three facets but, respectively prioritized one in particular; consequently, a third format emphasizing REAS to complement the other two would be a further development step.</p>
<p>The task response sheet provides students with a clear structure, with the sections overall trustworthiness judgment, warrant (sometimes with separate pro and con sections), and URLs. The scoring rubrics did not contain any specific language requirements. Nonetheless, the students had to fill in the response sheet sections in a coherent way and formulate a conclusive statement to be awarded points. While the strands of evidence varied systematically, content-related aspects and difficulty were not systematically varied across tasks. At the current stage, given the large number of available topics and types of biases, it is still a small, to-be-expanded task pool (Section Refining and Expanding CORA).</p>
<p>Regarding the individual COR facets, the content analysis showed the following findings:</p>
</sec>
<sec>
<title>Metacognitive Activation (MCA)</title>
<p>In terms of the activation of COR, all task prompts offered clear instructions to evaluate the trustworthiness of the sources at the beginning of the task. Mid-task activation depended on the presence of specific cues. All tasks contained at least one explicit initial and one implicit mid-task cue that might alert students to the need to use their COR. End-of-task activation, for instance a prompt to explicitly review and reflect, was not employed. Moreover, there were no tasks with implicit mid-task or end-of-task activation only, which is a characteristic of deception in online information in real life (i.e., there rarely are prior warnings that a website might contain <italic>misinformation</italic>, compared to automated warnings and filters for, e.g., malware detection). The primary aim of CORA is to measure performance during Internet searches, critical evaluation, and argumentative reasoning; it would be hardly possible to assess these facets if students missed the activation cue.</p>
<p>In regard to the aspect of &#x0201C;problem definition,&#x0201D; while problems were clearly stated in the task prompts, the students need to determine the evaluation criteria for trustworthiness and untrustworthiness themselves. Some experts critically noted that students may be unsure about the required evidence standards. It remains an open question whether deriving criteria for one&#x00027;s trustworthiness judgment should be part of the COR ability. This aspect has been scaffolded in some think-aloud studies, though we are not aware of scaffolding in other assessments. In think-aloud studies, the evaluation of criteria has been separated into different steps; for instance consecutive filtering of sources based first on relevance, then trustworthiness, then usefulness (Walraven et al., <xref ref-type="bibr" rid="B144">2009</xref>; Goldman et al., <xref ref-type="bibr" rid="B53">2013</xref>).</p>
</sec>
<sec>
<title>Online Information Acquisition (OIA)</title>
<p>Regarding expected search skills, content analyses indicated that students can find a suitable source, and in one task a complete website review, even without specific search terms apart from the titles as long as they searched for external sources at all. Only for the fact-checking task did we find an expected larger share of relevant distracting SERP results. For selection of sources for reading, features also varied as expected. Even though some stimuli are quite short (e.g., a tweet), not all students may open the linked background article with more information. However, as this is clearly included as the main piece of evidence backing up the claim in the stimulus, students&#x00027; attention to the link as a cue and to the background article can be considered a legitimate part of the tapped COR ability. An examination of the SERPs for major keywords showed significant variation in terms of the available information on the first SERP page and across tasks (see section Descriptive Features), which usually included some supporting, but also multiple irrelevant or misleading sources on the first page. Thus, the tasks appear to tap students&#x00027; skills in SERP evaluation, as desired; for instance, students need to actively decide which websites to focus on.</p>
</sec>
<sec>
<title>Critical Information Evaluation (CIE)</title>
<p>As expected, some websites contain too much text to process in the limited time and require students to search for or skim the content. Most webpages contained more text on the landing page than fit on a single screen, and had common sub-pages, such as the &#x0201C;legal notice&#x0201D; or &#x0201C;about&#x0201D; section. For their own orientation and for a fast trustworthiness judgment, students need to gain a comprehensive overview of the websites first to be able to deliberately focus on specific sections. Some tasks also required students to recognize and understand cues outside the main text (e.g., an organization logo at the top). This indicates that simply starting to read the text might be an unsuccessful strategy on these tasks and would take too much time.</p>
<p>In terms of strands of evidence, cues were well distributed across tasks, in fact more regularly than expected. There were usually at least two strands of evidence with relevant cues available, so students could take different routes through the task. The linked background webpages usually contained cues that need to be understood and evaluated. Suitable information was also available in (purposefully selected) external sources to help students solve the tasks and, for instance verify the reputation of an unknown author. While tasks could be solved using just one of the available strands of evidence (e.g., only cues on author), combining two or more converging strands could potentially afford higher confidence in task response and possibly minimize effects of interpretation errors. This supports the intended interpretation of task performance.</p>
</sec>
<sec>
<title>Reasoning Based on Evidence, Argumentation, and Synthesis (REAS)</title>
<p>In terms of the argumentative component of COR, students needed to make a judgment in all tasks, mostly by weighting the pros and cons, although some tasks also scaffolded these, asking for both pros and cons separately rather than a final integrated decision. These requirements can be varied more systematically based on empirical evidence regarding task difficulty. All tasks required students to find <italic>disconfirming</italic> evidence or arguments, which supports the interpretation that &#x0201C;critical&#x0201D; reasoning skills are tapped, and some tasks required students to find both confirming and disconfirming evidence or arguments. This could place students who rely only on their confirmation bias at a disadvantage, as intended. However, one expert called for the inclusion of clearly trustworthy or untrustworthy websites to better discriminate performance at the lower skill range and prevent re-testing effects (i.e., students assuming that all websites in the assessment are untrustworthy). While citing external sources is required on all tasks and is often beneficial to building an evidence-based argument, it implies a certain trade-off, as evaluating these external sources takes time and requires a higher cognitive effort. A REAS-focused task format might juxtapose several pre-selected sources with potentially contradictory information that would need to be argumentatively weighted and synthesized. Such tasks have been developed in the iPAL project (Shavelson et al., <xref ref-type="bibr" rid="B127">2019</xref>; Zlatkin-Troitschanskaia et al., <xref ref-type="bibr" rid="B166">2019</xref>) and MSC research (for an overview, see Braasch et al., <xref ref-type="bibr" rid="B13">2018</xref>).</p>
</sec>
<sec>
<title>Descriptive Features</title>
<p>Task topics were varied, as expected, albeit not all societal spheres were equally covered&#x02014;experts did not judge this aspect as particularly important. Sources of misinformation, including websites by associations and individuals, small enterprises, and editorial teams, were at the lower to medium level in the Hierarchy of Influences. These sources of misinformation were still mostly identifiable as individual entities within a pluralistic information environment. The CORA tasks did not focus on entities at higher levels of influence, such as media corporations or government agencies. Thus, there were no high-level &#x0201C;scandals&#x0201D; involved (as often referenced in conspiracy-related misinformation). This may imply that the highest levels of COR related to analyzing societal and funding contexts, as typically required from investigative journalists, are not tapped in the CORA tasks. This is reasonable given the time limit and the lack of content-related knowledge requirements. However, as the experts noted, the selection of topics, contexts, and genres covered in the tasks could be varied more systematically (Section Refining and Expanding CORA).</p>
</sec>
<sec>
<title>Summary</title>
<p>The preliminary validity evidence from content analysis and expert interviews indicated some important implications for the CORA. Overall, both the content analysis and the expert interviews indicated that it taps higher education students&#x00027; abilities to search, access, critically evaluate, use, and reason based on online information in the German context, with a slightly stronger focus on the evaluation components. The preliminary evidence supports our validity claim that the CORA measures the participants&#x00027; personal construct-relevant abilities in the sense of the defined construct definition (<italic>RQ3</italic>). Moreover, the expert interviews indicated that the CORA tasks cover a significant portion of the online media landscape relevant for higher education students in Germany as well as typical problems and genres of websites and online texts that call for COR skills in the German higher education context.</p>
</sec>
</sec>
</sec>
<sec id="s5">
<title>Research Perspectives</title>
<sec>
<title>Refining and Expanding CORA</title>
<p>The CORA tasks allow for a variety of more detailed (sub)scores, for instance as adaptive feedback based on the navigation logs. Two crucial dimensions that are underrepresented in the scoring so far are the metacognitive activation of the COR abilities in relevant contexts and situations as well as the reviewing of own task-related knowledge and beliefs. This important aspect of COR also aligns with the activation of epistemic metacognition, and can offset own cognitive heuristics (e.g., confirmation bias). COR activation is currently triggered by the task prompt and tapped by the CORA tasks. Sub-tasks could be developed to assess COR activation in a more focused manner, for instance by using a format that assesses context-dependent choice of action (e.g., decision to evaluate a website or not) as tapped by situational judgment tests (Weekley and Ployhart, <xref ref-type="bibr" rid="B150">2013</xref>). There is also potential for task prompts to include an explicit purpose of the activity indicating subsequent use of the evaluated information. However, as Goldman and Brand-Gruwel (<xref ref-type="bibr" rid="B54">2018</xref>) stress, future research might need to focus more intensively on psychological stimuli embedded in the tasks and their complex interrelation with the task solvers&#x00027; response processes that these stimuli might activate (e.g., rereading, thinking critically).</p>
<p>Metacognitive reviewing of (prior) knowledge and beliefs, accepts the high probability that students do not withstand every manipulation attempt and have likely already acquired prior knowledge based on misinformation, which can only be transformed if it is reconsidered in light of the new knowledge. If an inconsistency between new (warranted) knowledge and prior (misinformed) knowledge occurs, it can only be resolved in an epistemically justified way if the prior misinformed knowledge is altered&#x02014;the opposite might lead to further misconceptions or motivated reasoning. This can be linked to the epistemic virtue of open-mindedness and implicates that negative experiences and failures can provide unique insights for learners and can be transformed into in-depth knowledge in the future (Oser, <xref ref-type="bibr" rid="B106">2018</xref>), but only if reviewed and successfully reinterpreted by the learner. Hence, conducting an open-minded metacognitive review of prior knowledge and beliefs forms a key component of COR, activated by prompts in CORA tasks.</p>
<p>As another direction for further research, in addition to the generic COR assessment, domain-specific CORA tasks have been developed based on the iPAL assessment framework for specific domains (e.g., economics; Zlatkin-Troitschanskaia et al., <xref ref-type="bibr" rid="B166">2019</xref>, <xref ref-type="bibr" rid="B162">2020a</xref>). Since learning environments and the media used by learners within disciplines change with increasing speed due to digitalization and university students&#x00027; increasing use of information available on the Internet for their domain learning, we will particularly focus on information gathering and knowledge building from mass and social media when further expanding the assessment of domain-specific COR.</p>
</sec>
<sec>
<title>Development of Scoring Modular Rubrics</title>
<p>A sub-score can be awarded per each single/individual aspect in a facet of COR; that is, for activation of COR, the phases during which a trustworthiness judgment is performed (or not), and additional evaluation process (e.g., a fact-checking search) are initiated (or not) (Section Scoring Rubrics). For the critical evaluation facet of COR, scoring can be extended depending on the strands of evidence used, based on the information trust model (Lucassen and Schraagen, <xref ref-type="bibr" rid="B83">2011</xref>, <xref ref-type="bibr" rid="B84">2013</xref>). Collecting evidence from the three strands&#x02014;(i) on the author, (ii) design/text surface, and (iii) the content&#x02014;a more reliable evaluation and reasoning than evidence from only one would be awarded a higher score. Similarly consulting external sources and other&#x00027;s judgments of the same aspect would be awarded a higher score than considering only one. The ratio of self-examined vs. externally consulted vs. not considered strands of evidence can serve as an indicator of (topic-dependent) intellectual autonomy (Paul and Elder, <xref ref-type="bibr" rid="B108">2005</xref>).</p>
<p>Identifying the (possibly hidden) purpose of a website (e.g., sales, political opinion-forming) is a primary phase in the task-solving process. This also includes recognition and understanding of advertisements and other surface features (e.g., authorship). If these behavior- and process-related facets are included in the scoring categories, a time-sequential diagnosis of the quality of online reasoning is possible. These sub-scores can be further used as a basis for the development of adaptive feedback for teachers and students, which indicates when a student is more or less successful in systematically solving a task (or, e.g., they were spending too much time on searching or on one website).</p>
<p>For the argumentation facet of COR, the score can be further differentiated based on use of each argument sub-component: i.e., central claim, reasons, evidence&#x02014;and implications for task requiring a recommendation (Walton, <xref ref-type="bibr" rid="B145">2006</xref>; Fischer, <xref ref-type="bibr" rid="B35">2018</xref>). A pool of supporting and attacking reasons can be collected from students&#x00027; responses, weighted in their contribution to task, and used to score subsequent responses (e.g., depending on whether students&#x00027; used the most weighted reasons, pros and cons, and only claimed an evidence-orientation, or cited evidence, verified evidence, generated own evidence).</p>
<p>A subscore can be awarded on the level of comprehension and reasoning of single text units. This requires a classification of cues at the text surface as an indication of trustworthy or untrustworthy sources and information. At the moment, this can be efficiently analyzed only for websites given as stimuli in the CORA tasks. The quality of additional websites used by the students can only be estimated based on their URLs. Analyzing the quality of all websites the students accessed while solving the CORA tasks would require comprehensive media-specific and content-qualitative analyses as well as in-depth linguistic and computer linguistic analyses (e.g., text mining). In addition, process data, for instance eye-tracking or navigation logs, can be used to support an on-task detection of cues the student has been exposed to (navigation). Similarly, in the REAS facet, single inferences and conclusions presented in the text, indicating author biases, fallacies, and heuristics can be classified and scored depending on whether students&#x00027; repeat them uncritically in their responses, avoid them, or qualify them. Against the background of familiarity and a critical approach to the topic given in a task, successful students should not copy statements so much as express their own argument and opinion.</p>
<p>Based on prior research identifying different navigation and reasoning profiles (List and Alexander, <xref ref-type="bibr" rid="B81">2017</xref>), respondents could be classified into specific COR &#x0201C;learner profiles&#x0201D; based on their (sub)scores on facets of the rubric (e.g., using cluster analysis). Based on students&#x00027; initial stance toward a task topic (for, against, neutral), (self-estimated) prior task- and topic-related knowledge (expert, novice), and topic interest (interested or not), students can be distinguished into distinct initial profiles, for instance &#x0201C;novice in favor&#x0201D; or &#x0201C;expert neutral,&#x0201D; which may impact students&#x00027; information search and reasoning approach while solving the CORA tasks: &#x0201C;Novices&#x0201D; may need to form an initial stance and identify trustworthy references or experts whose judgment they trust, while &#x0201C;experts&#x0201D; may draw on their knowledge of trustworthy sources, or prior reasoning on the topic, but are challenged to not fall for confirmation bias and need to test their position (self-critically) against opposing views. &#x0201C;Novices&#x0201D; may also adopt a naive strategy of no initial evaluation of online information, but fallibilism over time, for instance compensating low evaluation skills with sophisticated epistemic beliefs and thus being open-minded to change their beliefs based on new evidence (Paul and Elder, <xref ref-type="bibr" rid="B108">2005</xref>). Taking into account a longitudinal learning perspective (Section Analyses of Response Processes and Longitudinal Studies), online reasoning can later also include a meta-cognitive facet of less well-known yet important properties that influence students&#x00027; learning and mental functioning (e.g., built-in gratification mechanisms and resulting media preferences).</p>
<p>Scoring for formative purposes in educational practice can then focus on certain features in students&#x00027; response processes (Section Analyses of Response Processes and Longitudinal Studies) depending on initial &#x0201C;learner profile&#x0201D; (e.g., presence of pros and cons in responses of &#x0201C;topic experts&#x0201D; vs. &#x0201C;novices&#x0201D;), whereby the profiles may vary depending on the topic tapped by the CORA task. CORA tasks can be retested across several measurement points over a course of students&#x00027; studies (Section Analyses of Response Processes and Longitudinal Studies). Here, knowledge tasks (e.g., selected-response items) on key pieces of information and misinformation in CORA task stimuli can be used to control for (prior) knowledge or retesting effects, which would be especially important for domain-specific CORA tasks. A pre-post design can indicate domain learning over time, i.e., when a student accepted misinformation on the pretest but did not accept it on the posttest (e.g., indicating misconceptions or conceptual change). The formative assessments can inform teachers and students how they can improve their search and evaluation behavior and domain-learning using the Internet.</p>
</sec>
<sec>
<title>Analyses of Response Processes and Longitudinal Studies</title>
<p>Given the open-information environment and holistic nature of the performance assessment, a number of more detailed analyses of the information environment and students&#x00027; navigation thereof is being conducted. We aim to connect the assessment design and outcomes to the complex <italic>Information Landscape (IL)</italic> that the individual student encounters online, and examine how it influences the response process and test result (Nagel et al., <xref ref-type="bibr" rid="B103">2020</xref>). Using logged CORA performance data, the students&#x00027; browsing activity can be examined to describe which sources they accessed, how much time they spent, what judgments they made, and which cues they considered during which phases (Schmidt et al., <xref ref-type="bibr" rid="B124">2020</xref>).</p>
<p>According to the ECD (Mislevy and Haertel, <xref ref-type="bibr" rid="B98">2006</xref>), response processes indicate which cognitions are generated by a confrontation of a subject (student) with a task. The analysis of the response processes can refer to various indicators that arise during the processing of the CORA tasks (e.g., as described in <xref ref-type="table" rid="T2">Table 2</xref> in Section Test Definition and Operationalization of COR: Design and Characteristics of CORA, with a focus on quality judgments by IPS-I phases). The log files or think-aloud data can give an indication of the expected (meta)cognitive processes that are elicited during the response processes (Zumbo and Hubley, <xref ref-type="bibr" rid="B168">2017</xref>), for instance on the occurrence of different mental processes, students&#x00027; attention to particular aspects, and their distribution across the task solving phases to determine whether the theoretically assumed (construct-related) comprehension and reasoning processes were indeed performed by respondents.</p>
<p>In a longitudinal analysis perspective, we aim to investigate the relationship between the students&#x00027; COR ability and their acquisition of reliable warranted vs. erroneous knowledge over the course of their studies in higher education. Using repeated CORA measurements (i.e., formative assessments), aspects of knowledge development and memory (incl. retesting) effects over the course of study can be analyzed, providing an important basis for instructional interventions in educational practice.</p>
</sec>
</sec>
<sec sec-type="conclusions" id="s6">
<title>Conclusion</title>
<p>The holistic task format allows for modular extensions of sub-scores, provided abilities are tapped, which can be deployed efficiently in subsequent in-depth validation studies. As Goldman and Brand-Gruwel (<xref ref-type="bibr" rid="B54">2018</xref>) conclude for sourcing, which equally applies to trustworthiness evaluation and reasoning based on online information more generally: &#x0201C;We also need a more nuanced approach to the purpose and value of sourcing processes; identifying the perspective of a particular source is not the &#x0201C;end goal.&#x0201D; Perspective is not so much about trustworthiness of sources as it is about how perspective informs what learners make of the information with respect to forming interpretations, making decisions, and proposing solutions.&#x0201D;</p>
<p>We agree and add that, beyond specific text-types dedicated to arguing about trustworthiness (e.g., research papers, legal opinions), trustworthiness evaluation mainly serves to filter out untrustworthy information. That is, hardly any additional information is added that helps students resolve an information problem, and instead available evidence for reasoning that turns out to be untrustworthy is even detracted from an argument. This can appear demotivating to the novices, unless it supports the achievement of a higher-order goal, such as maintaining a high quality standard. In general, learning based on erroneous knowledge may result in either unverified adoption or incorrectly understood or recognized information that can lead to persistent misconceptions and knowledge inconsistencies, which can become evident in later use of this erroneous knowledge.</p>
<p>With the present COR conceptualization and its assessment framework combining information acquisition, trustworthiness evaluation, and argumentative reasoning, we contribute to a better understanding of how trustworthiness judgments are functionally embedded in the broader information acquisition and online reasoning process, and open up perspectives for long-term studies in this emerging research field.</p>
<p>At the same time, this study is only a starting point for longer-term research on critical reasoning at the higher education level within the specific context of the online information environment, which also marks its limitations. Future research would need to determine the relations with critical thinking skills assessed in other contexts as well as with the other cited, partially overlapping assessments (e.g., iPAL performance assessments) that served as a basis and inspiration in the development of the COR assessment.</p>
</sec>
<sec sec-type="data-availability-statement" id="s7">
<title>Data Availability Statement</title>
<p>The original contributions generated for the study are included in the article/supplementary materials, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec id="s8">
<title>Ethics Statement</title>
<p>Ethical review and approval for the study on human participants was not required in accordance with the local legislation and institutional requirements. Written informed consent to participate in this study was provided by participants. Participant statements were anonymized, published in small excerpts only, and checked to not reveal identifiable information.</p>
</sec>
<sec id="s9">
<title>Author Contributions</title>
<p>DM co-developed the assessment, conducted the analyses, and co-wrote the manuscript. OZ-T co-developed the assessment, supervised the analyses, and co-wrote the manuscript. M-TN co-developed the rating scheme and was involved in preparing, reviewing, and revising the manuscript. SB was involved in preparing, reviewing, and revising the manuscript. SS co-developed the assessment and was involved in its validation. RS was involved in the assessment validation and in reviewing and revising the manuscript. All authors contributed to the article and approved the submitted version.</p>
</sec>
<sec sec-type="COI-statement" id="conf1">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
</body>
<back>
<ack><p>We would like to thank all members of the Stanford History Education Group as well as all experts who supported this study. We would like to thank the two reviewers and the journal editor who provided helpful critical and constructive comments on the manuscript. We would like to thank the <italic>Frontiers in Education</italic> editorial staff for quality assurance.</p></ack>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Abrami</surname> <given-names>P. C.</given-names></name> <name><surname>Bernard</surname> <given-names>R. M.</given-names></name> <name><surname>Borokhovski</surname> <given-names>E.</given-names></name> <name><surname>Wade</surname> <given-names>A.</given-names></name> <name><surname>Surkes</surname> <given-names>M. A.</given-names></name> <name><surname>Tamim</surname> <given-names>R.</given-names></name> <etal/></person-group>. (<year>2008</year>). <article-title>Instructional interventions affecting critical thinking skills and dispositions: a stage 1 meta-analysis</article-title>. <source>Rev. Educ. Res</source>. <volume>78</volume>, <fpage>1102</fpage>&#x02013;<lpage>1134</lpage>. <pub-id pub-id-type="doi">10.3102/0034654308326084</pub-id></citation></ref>
<ref id="B2">
<citation citation-type="book"><person-group person-group-type="author"><collab>AERA APA, and NCME.</collab></person-group> (<year>2014</year>). <source>Standards of Educational and Psychological Testing</source>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>AERA, APA, and NCME American Educational Research Association, American Psychological Association, and National Council on Measurement in Education</publisher-name>.</citation></ref>
<ref id="B3">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Akamine</surname> <given-names>S.</given-names></name> <name><surname>Kato</surname> <given-names>Y.</given-names></name> <name><surname>Inui</surname> <given-names>K.</given-names></name> <name><surname>Kurohashi</surname> <given-names>S.</given-names></name></person-group> (<year>2008</year>). <article-title>Using appearance information for web information credibility analysis</article-title>, in <source>2nd International Symposium on Universal Communication, 2008: ISUC 2008; 15&#x02013;16 December, 2008, Osaka, Japan</source> (<publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>363</fpage>&#x02013;<lpage>365</lpage>. <pub-id pub-id-type="doi">10.1109/ISUC.2008.80</pub-id></citation></ref>
<ref id="B4">
<citation citation-type="web"><person-group person-group-type="author"><collab>American Library Association</collab></person-group> (<year>2000</year>). <source>Information Literacy Competency Standards for Higher Education</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.ala.org/acrl/standards/informationliteracycompetency">http://www.ala.org/acrl/standards/informationliteracycompetency</ext-link> (accessed June 24, 2020). <pub-id pub-id-type="doi">10.5860/crln.61.3.207</pub-id></citation></ref>
<ref id="B5">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Arazy</surname> <given-names>O.</given-names></name> <name><surname>Kopak</surname> <given-names>R.</given-names></name></person-group> (<year>2011</year>). <article-title>On the measurability of information quality</article-title>. <source>J. Am. Soc. Inf. Sci. Technol</source>. <volume>62</volume>, <fpage>89</fpage>&#x02013;<lpage>99</lpage>. <pub-id pub-id-type="doi">10.1002/asi.21447</pub-id></citation></ref>
<ref id="B6">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Arffman</surname> <given-names>I.</given-names></name></person-group> (<year>2007</year>). <source>The problem of equivalence in translating texts in international reading literacy studies: a text analytic study of three English and Finnish texts used in the PISA 2000 reading test</source> (dissertation). University of Jyv&#x000E4;skyl&#x000E4;, Jyv&#x000E4;skyl&#x000E4;, Finland.</citation></ref>
<ref id="B7">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Banerjee</surname> <given-names>M.</given-names></name> <name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Roeper</surname> <given-names>J.</given-names></name></person-group> (<year>2020</year>). <article-title>Narratives and their impact on students&#x00027; information seeking and critical online reasoning in higher education economics and medicine</article-title>. <source>Front. Educ</source>. <volume>5</volume>:<fpage>625</fpage>. <pub-id pub-id-type="doi">10.3389/feduc.2020.570625</pub-id></citation></ref>
<ref id="B8">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Batista</surname> <given-names>J. C. L.</given-names></name> <name><surname>Marques</surname> <given-names>R. P. F.</given-names></name></person-group> (<year>2017</year>). <source>Information and Communication Overload in the Digital Age</source>. <publisher-loc>Hershey, PA</publisher-loc>: <publisher-name>IGI Global</publisher-name>. <pub-id pub-id-type="doi">10.4018/978-1-5225-2061-0.ch001</pub-id></citation></ref>
<ref id="B9">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Bayer</surname> <given-names>J.</given-names></name> <name><surname>Bitiukova</surname> <given-names>N.</given-names></name> <name><surname>B&#x000E1;rd</surname> <given-names>P.</given-names></name> <name><surname>Szak&#x000E1;cs</surname> <given-names>J.</given-names></name> <name><surname>Alemanno</surname> <given-names>A.</given-names></name> <name><surname>Uszkiewicz</surname> <given-names>E.</given-names></name></person-group> (<year>2019</year>). <source>Disinformation and Propaganda &#x02013; Impact on the Functioning of the Rule of Law in the EU and Its Member States. Directorate General for Internal Policies of the Union, Policy Department for Citizens&#x00027; Rights and Constitutional Affairs</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.europarl.europa.eu/RegData/etudes/STUD/2019/608864/IPOL_STU(2019)608864_EN.pdf">https://www.europarl.europa.eu/RegData/etudes/STUD/2019/608864/IPOL_STU(2019)608864_EN.pdf</ext-link> (accessed June 24, 2020).</citation></ref>
<ref id="B10">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Beck</surname> <given-names>K.</given-names></name></person-group> (<year>2020</year>). <article-title>On the relationship between &#x0201C;Education&#x0201D; and &#x0201C;Critical Thinking&#x0201D;</article-title>, in <source>Frontiers and Advances in Positive Learning in the Age of InformaTiOn (PLATO)</source>, ed <person-group person-group-type="editor"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>), <fpage>73</fpage>&#x02013;<lpage>87</lpage>.</citation></ref>
<ref id="B11">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Blummer</surname> <given-names>B.</given-names></name> <name><surname>Kenton</surname> <given-names>J. M.</given-names></name></person-group> (<year>2015</year>). <source>Improving Student Information Search: A Metacognitive Approach</source>. <publisher-loc>Amsterdam</publisher-loc>: <publisher-name>Elsevier</publisher-name>. <pub-id pub-id-type="doi">10.1533/9781780634623.23</pub-id></citation></ref>
<ref id="B12">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Braasch</surname> <given-names>J. L. G.</given-names></name> <name><surname>Br&#x000E5;ten</surname> <given-names>I.</given-names></name></person-group> (<year>2017</year>). <article-title>The discrepancy-induced source comprehension (D-ISC) model: basic assumptions and preliminary evidence</article-title>. <source>Educ. Psychol</source>. <volume>52</volume>, <fpage>167</fpage>&#x02013;<lpage>181</lpage>. <pub-id pub-id-type="doi">10.1080/00461520.2017.1323219</pub-id><pub-id pub-id-type="pmid">22086649</pub-id></citation></ref>
<ref id="B13">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Braasch</surname> <given-names>J. L. G.</given-names></name> <name><surname>Br&#x000E5;ten</surname> <given-names>I.</given-names></name> <name><surname>McCrudden</surname> <given-names>M. T.</given-names></name></person-group> (<year>2018</year>). <source>Handbook of Multiple Source Use</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Routledge Taylor and Francis Group</publisher-name>. <pub-id pub-id-type="doi">10.4324/9781315627496</pub-id></citation></ref>
<ref id="B14">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Brand-Gruwel</surname> <given-names>S.</given-names></name> <name><surname>Wopereis</surname> <given-names>I.</given-names></name> <name><surname>Vermetten</surname> <given-names>Y.</given-names></name></person-group> (<year>2005</year>). <article-title>Information problem solving by experts and novices: analysis of a complex cognitive skill</article-title>. <source>Comput. Hum. Behav</source>. <volume>21</volume>, <fpage>487</fpage>&#x02013;<lpage>508</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2004.10.005</pub-id></citation></ref>
<ref id="B15">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Brand-Gruwel</surname> <given-names>S.</given-names></name> <name><surname>Wopereis</surname> <given-names>I.</given-names></name> <name><surname>Walraven</surname> <given-names>A.</given-names></name></person-group> (<year>2009</year>). <article-title>A descriptive model of information problem solving while using internet</article-title>. <source>Comput. Educ</source>. <volume>53</volume>, <fpage>1207</fpage>&#x02013;<lpage>17</lpage>. <pub-id pub-id-type="doi">10.1016/j.compedu.2009.06.004</pub-id></citation></ref>
<ref id="B16">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Braten</surname> <given-names>I.</given-names></name> <name><surname>Stadtler</surname> <given-names>M.</given-names></name> <name><surname>Salmeron</surname> <given-names>L.</given-names></name></person-group> (<year>2018</year>). <article-title>The role of sourcing in discourse comprehension</article-title>, in <source>Handbook of Discourse Processes</source>, eds <person-group person-group-type="editor"><name><surname>Schober</surname> <given-names>M. F.</given-names></name> <name><surname>Rapp</surname> <given-names>D. N.</given-names></name> <name><surname>Britt</surname> <given-names>M. A.</given-names></name></person-group> (<publisher-loc>New York, NJ</publisher-loc>: <publisher-name>Taylor and Francis</publisher-name>), <fpage>141</fpage>&#x02013;<lpage>166</lpage>. <pub-id pub-id-type="doi">10.4324/9781315687384-10</pub-id></citation></ref>
<ref id="B17">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Breakstone</surname> <given-names>J.</given-names></name> <name><surname>Smith</surname> <given-names>M.</given-names></name> <name><surname>Wineburg</surname> <given-names>S.</given-names></name> <name><surname>Rapaport</surname> <given-names>A.</given-names></name> <name><surname>Carle</surname> <given-names>J.</given-names></name> <name><surname>Garland</surname> <given-names>M.</given-names></name> <etal/></person-group>. (<year>2019</year>). <source>Students&#x00027; Civic Online Reasoning: A National Portrait. Stanford History Education Group and Gibson Consulting</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://purl.stanford.edu/gf151tb4868">https://purl.stanford.edu/gf151tb4868</ext-link> (accessed June 25, 2020).</citation></ref>
<ref id="B18">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bulger</surname> <given-names>M. E.</given-names></name> <name><surname>Mayer</surname> <given-names>R. E.</given-names></name> <name><surname>Metzger</surname> <given-names>M. J.</given-names></name></person-group> (<year>2014</year>). <article-title>Knowledge and processes that predict proficiency in digital literacy</article-title>. <source>Reading Writing</source> <volume>27</volume>, <fpage>1567</fpage>&#x02013;<lpage>1583</lpage>. <pub-id pub-id-type="doi">10.1007/s11145-014-9507-2</pub-id></citation></ref>
<ref id="B19">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Catalano</surname> <given-names>A.</given-names></name></person-group> (<year>2013</year>). <article-title>Patterns of graduate students&#x00027; information seeking behavior: a meta-synthesis of the literature</article-title>. <source>J. Doc</source>. <volume>69</volume>, <fpage>243</fpage>&#x02013;<lpage>274</lpage>. <pub-id pub-id-type="doi">10.1108/00220411311300066</pub-id></citation></ref>
<ref id="B20">
<citation citation-type="web"><person-group person-group-type="author"><collab>Center for Humane Technology</collab></person-group> (<year>2019</year>). <source>Ledger of Harms</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://ledger.humanetech.com/">https://ledger.humanetech.com/</ext-link> (accessed October 17, 2019).</citation></ref>
<ref id="B21">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>S.</given-names></name> <name><surname>Chaiken</surname> <given-names>S.</given-names></name></person-group> (<year>1999</year>). <article-title>The heuristic-systematic model in its broader context</article-title>, in <source>Dual-Process Theories in Social Psychology</source>, eds <person-group person-group-type="editor"><name><surname>Chaiken</surname> <given-names>S.</given-names></name> <name><surname>Trope</surname> <given-names>Y.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Guilford Press</publisher-name>), <fpage>73</fpage>&#x02013;<lpage>96</lpage>.</citation></ref>
<ref id="B22">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Choi</surname> <given-names>W.</given-names></name></person-group> (<year>2015</year>). <source>A new framework of web credibility assessment and an exploratory study of older adults&#x00027; information behavior on the web</source> (dissertation). Florida State University, Tallahassee, FL, United States.</citation></ref>
<ref id="B23">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Ciampaglia</surname> <given-names>G. L.</given-names></name></person-group> (<year>2018</year>). <article-title>The digital misinformation pipeline</article-title>, in <source>Positive Learning in the Age of Information</source>, eds <person-group person-group-type="editor"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Wittum</surname> <given-names>G.</given-names></name> <name><surname>Dengel</surname> <given-names>A.</given-names></name></person-group> (<publisher-loc>Wiesbaden</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>413</fpage>&#x02013;<lpage>421</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-658-19567-0_25</pub-id></citation></ref>
<ref id="B24">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Coiro</surname> <given-names>J.</given-names></name></person-group> (<year>2003</year>). <article-title>Exploring literacy on the internet: reading comprehension on the internet: expanding our understanding of reading comprehension to encompass new literacies</article-title>. <source>Reading Teach</source>. <volume>56</volume>, <fpage>458</fpage>&#x02013;<lpage>464</lpage>.</citation></ref>
<ref id="B25">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Damico</surname> <given-names>J. S.</given-names></name> <name><surname>Panos</surname> <given-names>A.</given-names></name></person-group> (<year>2018</year>). <article-title>Civic media literacy as 21st century source work: future social studies teachers examine web sources about climate change</article-title>. <source>J. Soc. Stud. Res.</source> <volume>42</volume>, <fpage>345</fpage>&#x02013;<lpage>359</lpage>. <pub-id pub-id-type="doi">10.1016/j.jssr.2017.10.001</pub-id></citation></ref>
<ref id="B26">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Daniels</surname> <given-names>J.</given-names></name></person-group> (<year>2009</year>). <article-title>Cloaked websites: propaganda, cyber-racism and epistemology in the digital era</article-title>. <source>N. Media Soc</source>. <volume>11</volume>, <fpage>659</fpage>&#x02013;<lpage>683</lpage>. <pub-id pub-id-type="doi">10.1177/1461444809105345</pub-id></citation></ref>
<ref id="B27">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Davey</surname> <given-names>T.</given-names></name> <name><surname>Ferrara</surname> <given-names>S.</given-names></name> <name><surname>Holland</surname> <given-names>P. W.</given-names></name> <name><surname>Shavelson</surname> <given-names>R.</given-names></name> <name><surname>Webb</surname> <given-names>N. M.</given-names></name> <name><surname>Wise</surname> <given-names>L. L.</given-names></name></person-group> (<year>2015</year>). <source>Psychometric Considerations for the Next Generation of Performance Assessment: Report of the Center for K-12 Assessment and Performance Management at ETS</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.ets.org/Media/Research/pdf/psychometric_considerations_white_paper.pdf">https://www.ets.org/Media/Research/pdf/psychometric_considerations_white_paper.pdf</ext-link> (accessed July 22, 2018).</citation></ref>
<ref id="B28">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>De Neys</surname> <given-names>W. D.</given-names></name></person-group> (<year>2006</year>). <article-title>Dual processing in reasoning: two systems but one reasoner</article-title>. <source>Psychol. Sci</source>. <volume>17</volume>, <fpage>428</fpage>&#x02013;<lpage>433</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-9280.2006.01723.x</pub-id><pub-id pub-id-type="pmid">16683931</pub-id></citation></ref>
<ref id="B29">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dunbar</surname> <given-names>N. E.</given-names></name> <name><surname>Connelly</surname> <given-names>S.</given-names></name> <name><surname>Jensen</surname> <given-names>M. L.</given-names></name> <name><surname>Adame</surname> <given-names>B. J.</given-names></name> <name><surname>Rozzell</surname> <given-names>B.</given-names></name> <name><surname>Griffith</surname> <given-names>J. A.</given-names></name> <etal/></person-group>. (<year>2014</year>). <article-title>Fear appeals, message processing cues, and credibility in the websites of violent, ideological, and nonideological groups</article-title>. <source>J. Comput. Mediated Commun.</source> <volume>19</volume>, <fpage>871</fpage>&#x02013;<lpage>889</lpage>. <pub-id pub-id-type="doi">10.1111/jcc4.12083</pub-id></citation></ref>
<ref id="B30">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Eisenberg</surname> <given-names>M. B.</given-names></name> <name><surname>Berkowitz</surname> <given-names>R. E.</given-names></name></person-group> (<year>1990</year>). <source>Information Problem-Solving: The Big Six Skills Approach to Library and Information Skills Instruction</source>. <publisher-loc>Norwood, NJ</publisher-loc>: <publisher-name>Ablex</publisher-name>.</citation></ref>
<ref id="B31">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Elder</surname> <given-names>L.</given-names></name> <name><surname>Paul</surname> <given-names>R.</given-names></name></person-group> (<year>2010</year>). <source>Critical Thinking Development: A Stage Theory: With Implications for Instruction</source>.</citation></ref>
<ref id="B32">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ennis</surname> <given-names>R. H.</given-names></name></person-group> (<year>1985</year>). <article-title>A logical basis for measuring critical thinking skills</article-title>. <source>Educ. Leadersh</source>. <volume>43</volume>, <fpage>44</fpage>&#x02013;<lpage>48</lpage>.</citation></ref>
<ref id="B33">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Evans</surname> <given-names>J. S. B.</given-names></name> <name><surname>Stanovich</surname> <given-names>K. E.</given-names></name></person-group> (<year>2013</year>). <article-title>Dual-process theories of higher cognition: advancing the debate</article-title>. <source>Perspect. Psychol. Sci</source>. <volume>8</volume>, <fpage>223</fpage>&#x02013;<lpage>241</lpage>. <pub-id pub-id-type="doi">10.1177/1745691612460685</pub-id><pub-id pub-id-type="pmid">26172965</pub-id></citation></ref>
<ref id="B34">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Facione</surname> <given-names>P. A.</given-names></name></person-group> (<year>1990</year>). <article-title>Critical thinking: a statement of expert consensus for purposes of educational assessment and instruction: executive summary</article-title>. <source>The Delphi Report</source> (accessed June 25, 2020).</citation></ref>
<ref id="B35">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Fischer</surname> <given-names>F.</given-names></name></person-group> (<year>2018</year>). <source>Scientific Reasoning and Argumentation: The Roles of Domain-Specific and Domain-General Knowledge</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Routledge</publisher-name>.</citation></ref>
<ref id="B36">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Fischer</surname> <given-names>F.</given-names></name> <name><surname>Chinn</surname> <given-names>C.</given-names></name> <name><surname>Engelmann</surname> <given-names>K.</given-names></name> <name><surname>Osborne</surname> <given-names>J.</given-names></name></person-group> (<year>2018</year>). <source>Scientific Reasoning and Argumentation: The Roles of Domain-Specific and Domain-General Knowledge, 1st Edn</source>. <publisher-loc>London</publisher-loc>: <publisher-name>Routledge</publisher-name>. <pub-id pub-id-type="doi">10.4324/9780203731826-1</pub-id></citation></ref>
<ref id="B37">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fischer</surname> <given-names>F.</given-names></name> <name><surname>Kollar</surname> <given-names>I.</given-names></name> <name><surname>Ufer</surname> <given-names>S.</given-names></name> <name><surname>Sodian</surname> <given-names>B.</given-names></name> <name><surname>Hussmann</surname> <given-names>H.</given-names></name> <name><surname>Pekrun</surname> <given-names>R.</given-names></name> <etal/></person-group>. (<year>2014</year>). <article-title>Scientific reasoning and argumentation: Advancing an interdisciplinary research agenda in education</article-title>. <source>Front. Learn. Res</source>. <volume>2</volume>, <fpage>28</fpage>&#x02013;<lpage>45</lpage>. <pub-id pub-id-type="doi">10.14786/flr.v2i2.96</pub-id></citation></ref>
<ref id="B38">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Fisher</surname> <given-names>K. E.</given-names></name> <name><surname>Erdelez</surname> <given-names>S.</given-names></name> <name><surname>McKechnie</surname> <given-names>L.</given-names></name></person-group> (<year>2005</year>). <source>Theories of Information Behavior, ASIST Monograph Series</source>. <publisher-loc>Medford, NJ</publisher-loc>: <publisher-name>Information Today</publisher-name>.</citation></ref>
<ref id="B39">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Flanagin</surname> <given-names>A. J.</given-names></name> <name><surname>Metzger</surname> <given-names>M. J.</given-names></name></person-group> (<year>2014</year>). <article-title>Digital media and perceptions of source credibility in political communication</article-title>, in <source>The Oxford Handbook of Political Communication</source>, eds <person-group person-group-type="editor"><name><surname>Kenski</surname> <given-names>K.</given-names></name> <name><surname>Hall</surname> <given-names>K.</given-names></name></person-group> (<publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>), <fpage>417</fpage>&#x02013;<lpage>436</lpage>. <pub-id pub-id-type="doi">10.1093/oxfordhb/9780199793471.013.65</pub-id></citation></ref>
<ref id="B40">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Flanagin</surname> <given-names>A. J.</given-names></name> <name><surname>Metzger</surname> <given-names>M. J.</given-names></name> <name><surname>Hartsell</surname> <given-names>E.</given-names></name></person-group> (<year>2010</year>). <source>Kids and Credibility: An Empirical Examination of Youth, Digital Media Use, and Information Credibility</source>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>MIT Press</publisher-name>. <pub-id pub-id-type="doi">10.7551/mitpress/8778.001.0001</pub-id></citation></ref>
<ref id="B41">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Flanagin</surname> <given-names>A. J.</given-names></name> <name><surname>Winter</surname> <given-names>S.</given-names></name> <name><surname>Metzger</surname> <given-names>M. J.</given-names></name></person-group> (<year>2018</year>). <article-title>Making sense of credibility in complex information environments: the role of message sidedness, information source, and thinking styles in credibility evaluation online</article-title>. <source>Inf. Commun. Soc</source>. <volume>23</volume>, <fpage>1038</fpage>&#x02013;<lpage>1059</lpage>. <pub-id pub-id-type="doi">10.1080/1369118X.2018.1547411</pub-id></citation></ref>
<ref id="B42">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Flore</surname> <given-names>M.</given-names></name> <name><surname>Balahur</surname> <given-names>A.</given-names></name> <name><surname>Podavini</surname> <given-names>A.</given-names></name> <name><surname>Verile</surname> <given-names>M.</given-names></name></person-group> (<year>2019</year>). <source>Understanding Citizens&#x00027; Vulnerability to Disinformation and Data-driven Propaganda</source>. <publisher-loc>Luxembourg</publisher-loc>: <publisher-name>Publications Office of the European Union</publisher-name>. <pub-id pub-id-type="doi">10.2760/919835</pub-id></citation></ref>
<ref id="B43">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Fogg</surname> <given-names>B. J.</given-names></name></person-group> (<year>2002</year>). <source>Stanford Guidelines for Web Credibility. A Research Summary From the Stanford Persuasive Technology</source> Lab. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.webcredibility.org/guidelines">www.webcredibility.org/guidelines</ext-link> (accessed June 24, 2020).</citation></ref>
<ref id="B44">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Fogg</surname> <given-names>B. J.</given-names></name></person-group> (<year>2003</year>). <source>Persuasive Technology: Using Computers to Change What We Think and Do</source>. <publisher-loc>Amsterdam; Boston</publisher-loc>: <publisher-name>Morgan Kaufmann</publisher-name>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.loc.gov/catdir/description/els031/2002110617.html">http://www.loc.gov/catdir/description/els031/2002110617.html</ext-link> (accessed June 24, 2020).</citation></ref>
<ref id="B45">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Fogg</surname> <given-names>B. J.</given-names></name> <name><surname>Marshall</surname> <given-names>J.</given-names></name> <name><surname>Kameda</surname> <given-names>T.</given-names></name> <name><surname>Solomon</surname> <given-names>J.</given-names></name> <name><surname>Rangnekar</surname> <given-names>A.</given-names></name> <name><surname>Boyd</surname> <given-names>J.</given-names></name></person-group> (<year>2001a</year>). <article-title>Web credibility research</article-title>, in <source>CHI &#x00027;01 Extended Abstracts on Human Factors in Computing Systems</source>, ed <person-group person-group-type="editor"><name><surname>Tremaine</surname> <given-names>M.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>295</fpage>. <pub-id pub-id-type="doi">10.1145/634067.634242</pub-id></citation></ref>
<ref id="B46">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Fogg</surname> <given-names>B. J.</given-names></name> <name><surname>Marshall</surname> <given-names>J.</given-names></name> <name><surname>Laraki</surname> <given-names>O.</given-names></name> <name><surname>Osipovich</surname> <given-names>A.</given-names></name> <name><surname>Varma</surname> <given-names>C.</given-names></name> <name><surname>Fang</surname> <given-names>N.</given-names></name> <etal/></person-group>. (<year>2001b</year>). <article-title>What makes web sites credible? A report on a large quantitative study</article-title>, in <source>Proceedings of CHI &#x00027;01: The SIGCHI Conference on Human Factors in Computing Systems</source>, eds <person-group person-group-type="editor"><name><surname>Jacko</surname> <given-names>J.</given-names></name> <name><surname>Sears</surname> <given-names>A.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM Press</publisher-name>), <fpage>61</fpage>&#x02013;<lpage>68</lpage>. <pub-id pub-id-type="doi">10.1145/365024.365037</pub-id></citation></ref>
<ref id="B47">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Fogg</surname> <given-names>B. J.</given-names></name> <name><surname>Marshall</surname> <given-names>J.</given-names></name> <name><surname>Osipovich</surname> <given-names>A.</given-names></name> <name><surname>Varma</surname> <given-names>C.</given-names></name> <name><surname>Laraki</surname> <given-names>O.</given-names></name> <name><surname>Fang</surname> <given-names>N.</given-names></name> <etal/></person-group>. (<year>2000</year>). <article-title>Elements that affect web credibility: early results from a self-report study</article-title>, in <source>Chi &#x00027;00 Extended Abstracts on Human Factors in Computing Systems</source>, ed <person-group person-group-type="editor"><name><surname>Tremaine</surname> <given-names>M.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>287</fpage>&#x02013;<lpage>288</lpage>. <pub-id pub-id-type="doi">10.1145/633292.633460</pub-id></citation></ref>
<ref id="B48">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Fogg</surname> <given-names>B. J.</given-names></name> <name><surname>Soohoo</surname> <given-names>C.</given-names></name> <name><surname>Danielson</surname> <given-names>D. R.</given-names></name> <name><surname>Marable</surname> <given-names>L.</given-names></name> <name><surname>Stanford</surname> <given-names>J.</given-names></name> <name><surname>Tauber</surname> <given-names>E. R.</given-names></name></person-group> (<year>2003</year>). <article-title>How do users evaluate the credibility of web sites?</article-title>, in <source>Proceedings of the 2003 Conference on Designing for User Experiences</source>, ed <person-group person-group-type="editor"><name><surname>Arnowitz</surname> <given-names>J.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>1</fpage>&#x02013;<lpage>15</lpage>. <pub-id pub-id-type="doi">10.1145/997078.997097</pub-id></citation></ref>
<ref id="B49">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Gasser</surname> <given-names>U.</given-names></name> <name><surname>Cortesi</surname> <given-names>S.</given-names></name> <name><surname>Malik</surname> <given-names>M.</given-names></name> <name><surname>Lee</surname> <given-names>A.</given-names></name></person-group> (<year>2012</year>). <source>Youth and Digital Media: From Credibility to Information Quality</source>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>The Berkman Center for Internet and Society</publisher-name>. <pub-id pub-id-type="doi">10.2139/ssrn.2005272</pub-id></citation></ref>
<ref id="B50">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>George</surname> <given-names>J. F.</given-names></name> <name><surname>Giordano</surname> <given-names>G.</given-names></name> <name><surname>Tilley</surname> <given-names>P. A.</given-names></name></person-group> (<year>2016</year>). <article-title>Website credibility and deceiver credibility: expanding prominence-interpretation theory</article-title>. <source>Comput. Hum. Behav</source>. <volume>54</volume>, <fpage>83</fpage>&#x02013;<lpage>93</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2015.07.065</pub-id></citation></ref>
<ref id="B51">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>George</surname> <given-names>J. F.</given-names></name> <name><surname>Tilley</surname> <given-names>P.</given-names></name> <name><surname>Giordano</surname> <given-names>G.</given-names></name></person-group> (<year>2014</year>). <article-title>Sender credibility and deception detection</article-title>. <source>Comput. Hum. Behav.</source> <volume>35</volume>, <fpage>1</fpage>&#x02013;<lpage>11</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2014.02.027</pub-id></citation></ref>
<ref id="B52">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Go</surname> <given-names>E.</given-names></name> <name><surname>You</surname> <given-names>K. H.</given-names></name> <name><surname>Jung</surname> <given-names>E.</given-names></name> <name><surname>Shim</surname> <given-names>H.</given-names></name></person-group> (<year>2016</year>). <article-title>Why do we use different types of websites and assign them different levels of credibility? Structural relations among users&#x00027; motives, types of websites, information credibility, and trust in the press</article-title>. <source>Comput. Hum. Behav</source>. <volume>54</volume>, <fpage>231</fpage>&#x02013;<lpage>239</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2015.07.046</pub-id></citation></ref>
<ref id="B53">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Goldman</surname> <given-names>S.</given-names></name> <name><surname>Lawless</surname> <given-names>K.</given-names></name> <name><surname>Pellegrino</surname> <given-names>J.</given-names></name> <name><surname>Manning</surname> <given-names>F.</given-names></name> <name><surname>Braasch</surname> <given-names>J.</given-names></name> <name><surname>Gomez</surname> <given-names>K.</given-names></name></person-group> (<year>2013</year>). <article-title>A technology for assessing multiple source comprehension: an essential skill of the 21st century</article-title>, in <source>Technology-Based Assessments for 21st Century Skills: Theoretical and Practical Implications From Modern Research</source>, eds <person-group person-group-type="editor"><name><surname>Mayrath</surname> <given-names>M. C.</given-names></name> <name><surname>Clarke-Midura</surname> <given-names>J.</given-names></name> <name><surname>Robinson</surname> <given-names>D. H.</given-names></name></person-group> (<publisher-loc>Charlotte, NC</publisher-loc>: <publisher-name>Information Age Publishing</publisher-name>), <fpage>171</fpage>&#x02013;<lpage>207</lpage>.</citation></ref>
<ref id="B54">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Goldman</surname> <given-names>S. R.</given-names></name> <name><surname>Brand-Gruwel</surname> <given-names>S.</given-names></name></person-group> (<year>2018</year>). <article-title>Learning from multiple sources in a digital society</article-title>, in <source>International Handbook of the Learning Sciences</source>, eds <person-group person-group-type="editor"><name><surname>Fischer</surname> <given-names>F.</given-names></name> <name><surname>Hmelo-Silver</surname> <given-names>C. E.</given-names></name> <name><surname>Goldman</surname> <given-names>S. R.</given-names></name> <name><surname>Reimann</surname> <given-names>P.</given-names></name></person-group> (<publisher-loc>London</publisher-loc>: <publisher-name>Routledge</publisher-name>), <fpage>86</fpage>&#x02013;<lpage>95</lpage>. <pub-id pub-id-type="doi">10.4324/9781315617572-9</pub-id></citation></ref>
<ref id="B55">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Goldstein</surname> <given-names>D. G.</given-names></name> <name><surname>Gigerenzer</surname> <given-names>G.</given-names></name></person-group> (<year>2002</year>). <article-title>Models of ecological rationality: the recognition heuristic</article-title>. <source>Psychol. Rev</source>. <volume>109</volume>, <fpage>75</fpage>&#x02013;<lpage>90</lpage>. <pub-id pub-id-type="doi">10.1037/0033-295X.109.1.75</pub-id><pub-id pub-id-type="pmid">11863042</pub-id></citation></ref>
<ref id="B56">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gronchi</surname> <given-names>G.</given-names></name> <name><surname>Giovannelli</surname> <given-names>F.</given-names></name></person-group> (<year>2018</year>). <article-title>Dual process theory of thought and default mode network: a possible neural foundation of fast thinking</article-title>. <source>Front. Psychol</source>. <volume>9</volume>:<fpage>1237</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2018.01237</pub-id><pub-id pub-id-type="pmid">30065692</pub-id></citation></ref>
<ref id="B57">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hahnel</surname> <given-names>C.</given-names></name> <name><surname>Kroehne</surname> <given-names>U.</given-names></name> <name><surname>Goldhammer</surname> <given-names>F.</given-names></name> <name><surname>Schoor</surname> <given-names>C.</given-names></name> <name><surname>Mahlow</surname> <given-names>N.</given-names></name> <name><surname>Artelt</surname> <given-names>C.</given-names></name></person-group> (<year>2019</year>). <article-title>Validating process variables of sourcing in an assessment of multiple document comprehension</article-title>. <source>Br. J. Educ. Psychol.</source> <volume>89</volume>, <fpage>524</fpage>&#x02013;<lpage>537</lpage>. <pub-id pub-id-type="doi">10.1111/bjep.12278</pub-id><pub-id pub-id-type="pmid">30980396</pub-id></citation></ref>
<ref id="B58">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Halpern</surname> <given-names>D. F.</given-names></name></person-group> (<year>2014</year>). <source>Thought and Knowledge: An Introduction to Critical Thinking, 5th Edn</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Psychology Press</publisher-name>. <pub-id pub-id-type="doi">10.4324/9781315885278</pub-id></citation></ref>
<ref id="B59">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Harkness</surname> <given-names>J. A.</given-names></name></person-group> (<year>2003</year>). <article-title>Questionnaire translation</article-title>, in <source>Cross-Cultural Survey Methods</source>, eds <person-group person-group-type="editor"><name><surname>Harkness</surname> <given-names>J. A.</given-names></name> <name><surname>van de Vijver</surname> <given-names>F.</given-names></name> <name><surname>Mohler</surname> <given-names>P. P.</given-names></name></person-group> (<publisher-loc>Hoboken, NJ</publisher-loc>: <publisher-name>John Wiley and Sons</publisher-name>), <fpage>35</fpage>&#x02013;<lpage>56</lpage>.</citation></ref>
<ref id="B60">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Head</surname> <given-names>A.</given-names></name> <name><surname>Eisenberg</surname> <given-names>M. B.</given-names></name></person-group> (<year>2009</year>). <article-title>Project information literacy progress report: &#x0201C;lessons learned&#x0201D;: how college students seek information in the digital age</article-title>. <source>SSRN Electron. J</source>. <pub-id pub-id-type="doi">10.2139/ssrn.2281478</pub-id></citation></ref>
<ref id="B61">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Herman</surname> <given-names>E. S.</given-names></name> <name><surname>Chomsky</surname> <given-names>N.</given-names></name></person-group> (<year>2002</year>). <source>Manufacturing Consent: The Political Economy of the Mass Media</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Pantheon Books</publisher-name>.</citation></ref>
<ref id="B62">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hilligoss</surname> <given-names>B.</given-names></name> <name><surname>Rieh</surname> <given-names>S. Y.</given-names></name></person-group> (<year>2008</year>). <article-title>Developing a unifying framework of credibility assessment: construct, heuristics, and interaction in context</article-title>. <source>Inf. Process. Manag.</source> <volume>44</volume>, <fpage>1467</fpage>&#x02013;<lpage>1484</lpage>. <pub-id pub-id-type="doi">10.1016/j.ipm.2007.10.001</pub-id></citation></ref>
<ref id="B63">
<citation citation-type="web"><person-group person-group-type="author"><collab>ITC International Test Commission</collab></person-group> (<year>2017</year>). <source>The ITC Guidelines for Translating and Adapting Tests, 2nd Edn</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.intestcom.org">www.intestcom.org</ext-link> (accessed June 24, 2020).</citation></ref>
<ref id="B64">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Jahn</surname> <given-names>D.</given-names></name></person-group> (<year>2012</year>). <source>Kritisches Denken f&#x000F6;rdern k&#x000F6;nnen: Entwicklung eines didaktischen Designs zur Qualifizierung p&#x000E4;dagogischer Professionals [Fostering critical thinking: developing a didactic design for qualification of pedagogical professionals]</source> (dissertation), Friedrich-Alexander-Universit&#x000E4;t Erlangen-N&#x000FC;rmberg, Erlangen, Germany.</citation></ref>
<ref id="B65">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Jahn</surname> <given-names>D.</given-names></name> <name><surname>Kenner</surname> <given-names>A.</given-names></name></person-group> (<year>2018</year>). <article-title>Critical thinking in higher education: how to foster it using digital media</article-title>, in <source>The Digital Turn in Higher Education</source>, eds <person-group person-group-type="editor"><name><surname>Kergel</surname> <given-names>D.</given-names></name> <name><surname>Heidkamp</surname> <given-names>B.</given-names></name> <name><surname>Tell&#x000E9;us</surname> <given-names>P. K.</given-names></name> <name><surname>Rachwal</surname> <given-names>T.</given-names></name> <name><surname>Nowakowski</surname> <given-names>S.</given-names></name></person-group> (<publisher-loc>Wiesbaden</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>81</fpage>&#x02013;<lpage>109</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-658-19925-8_7</pub-id></citation></ref>
<ref id="B66">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Jozsa</surname> <given-names>E.</given-names></name> <name><surname>Komlodi</surname> <given-names>A.</given-names></name> <name><surname>Ahmad</surname> <given-names>R.</given-names></name> <name><surname>Hercegfi</surname> <given-names>K.</given-names></name></person-group> (<year>2012</year>). <article-title>Trust and credibility on the web: the relationship of web experience levels and user judgments</article-title>, in <source>IEEE 3rd international conference on cognitive Infocommunications (CogInfoCom)</source> (<publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>605</fpage>&#x02013;<lpage>610</lpage>. <pub-id pub-id-type="doi">10.1109/CogInfoCom.2012.6422051</pub-id></citation></ref>
<ref id="B67">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Juvina</surname> <given-names>I.</given-names></name> <name><surname>van Oostendorp</surname> <given-names>H.</given-names></name></person-group> (<year>2008</year>). <article-title>Modeling semantic and structural knowledge in web navigation</article-title>. <source>Discourse Process.</source> <volume>45</volume>, <fpage>346</fpage>&#x02013;<lpage>364</lpage>. <pub-id pub-id-type="doi">10.1080/01638530802145205</pub-id></citation></ref>
<ref id="B68">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Kahneman</surname> <given-names>D.</given-names></name> <name><surname>Slovic</surname> <given-names>P.</given-names></name> <name><surname>Tversky</surname> <given-names>A.</given-names></name></person-group> (<year>1982</year>). <source>Judgement Under Uncertainty: Heuristics and Biases</source>. <publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>. <pub-id pub-id-type="doi">10.1017/CBO9780511809477</pub-id><pub-id pub-id-type="pmid">17835457</pub-id></citation></ref>
<ref id="B69">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kakol</surname> <given-names>M.</given-names></name> <name><surname>Nielek</surname> <given-names>R.</given-names></name> <name><surname>Wierzbicki</surname> <given-names>A.</given-names></name></person-group> (<year>2017</year>). <article-title>Understanding and predicting web content credibility using the content credibility corpus</article-title>. <source>Inf. Process. Manag</source>. <volume>53</volume>, <fpage>1043</fpage>&#x02013;<lpage>1061</lpage>. <pub-id pub-id-type="doi">10.1016/j.ipm.2017.04.003</pub-id></citation></ref>
<ref id="B70">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kane</surname> <given-names>M.</given-names></name></person-group> (<year>2012</year>). <article-title>Validating score interpretations and uses</article-title>. <source>Lang. Test</source>. <volume>29</volume>, <fpage>3</fpage>&#x02013;<lpage>17</lpage>. <pub-id pub-id-type="doi">10.1177/0265532211417210</pub-id></citation></ref>
<ref id="B71">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Karlova</surname> <given-names>N. A.</given-names></name> <name><surname>Fisher</surname> <given-names>K. E.</given-names></name></person-group> (<year>2013</year>). <article-title>A social diffusion model of misinformation and disinformation for understanding human information behaviour</article-title>. <source>Inf. Res</source>. <volume>18</volume>:<fpage>573</fpage>.</citation></ref>
<ref id="B72">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kingsley</surname> <given-names>K.</given-names></name> <name><surname>Galbraith</surname> <given-names>G. M.</given-names></name> <name><surname>Herring</surname> <given-names>M.</given-names></name> <name><surname>Stowers</surname> <given-names>E.</given-names></name> <name><surname>Stewart</surname> <given-names>T.</given-names></name> <name><surname>Kingsley</surname> <given-names>K. V.</given-names></name></person-group> (<year>2011</year>). <article-title>Why not just google it? An assessment of information literacy skills in a biomedical science curriculum</article-title>. <source>BMC Med. Educ.</source> <volume>11</volume>:<fpage>1</fpage>. <pub-id pub-id-type="doi">10.1186/1472-6920-11-17</pub-id><pub-id pub-id-type="pmid">21518448</pub-id></citation></ref>
<ref id="B73">
<citation citation-type="web"><person-group person-group-type="author"><collab>KMK</collab></person-group> (<year>2016</year>). <source>Standing Conference of the Ministers of Education and Cultural Affairs of the L&#x000E4;nder in Germany. Bildung in der digitalen Welt Strategie der Kultusministerkonferenz. [Education in the digital world. KMK strategy paper]</source>. Retrieved from <ext-link ext-link-type="uri" xlink:href="https://www.kmk.org/fileadmin/Dateien/pdf/PresseUndAktuelles/2018/Digitalstrategie_2017_mit_Weiterbildung.pdf">https://www.kmk.org/fileadmin/Dateien/pdf/PresseUndAktuelles/2018/Digitalstrategie_2017_mit_Weiterbildung.pdf</ext-link></citation></ref>
<ref id="B74">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kohnen</surname> <given-names>A. M.</given-names></name> <name><surname>Mertens</surname> <given-names>G. E.</given-names></name></person-group> (<year>2019</year>). <article-title>I&#x00027;m always kind of double-checking: exploring the information-seeking identities of expert generalists</article-title>. <source>Reading Res. Q.</source> <volume>54</volume>, <fpage>279</fpage>&#x02013;<lpage>297</lpage>. <pub-id pub-id-type="doi">10.1002/rrq.245</pub-id></citation></ref>
<ref id="B75">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Koltay</surname> <given-names>T.</given-names></name></person-group> (<year>2011</year>). <article-title>The media and the literacies: media literacy, information literacy, digital literacy</article-title>. <source>Media Cult. Soc.</source> <volume>33</volume>, <fpage>211</fpage>&#x02013;<lpage>221</lpage>. <pub-id pub-id-type="doi">10.1177/0163443710393382</pub-id></citation></ref>
<ref id="B76">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Kr&#x000E4;mer</surname> <given-names>N. C.</given-names></name> <name><surname>Preko</surname> <given-names>N.</given-names></name> <name><surname>Flanagin</surname> <given-names>A.</given-names></name> <name><surname>Winter</surname> <given-names>S.</given-names></name> <name><surname>Metzger</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>What do people attend to when searching for information on the web</article-title>, in <source>ICPS, Proceedings of the Technology, Mind, and Society Conference, Washington, DC</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>The Association for Computing Machinery</publisher-name>). <pub-id pub-id-type="doi">10.1145/3183654.3183682</pub-id></citation></ref>
<ref id="B77">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kuhlthau</surname> <given-names>C. C.</given-names></name></person-group> (<year>1993</year>). <article-title>A principle of uncertainty for information seeking</article-title>. <source>J. Doc.</source> <volume>49</volume>, <fpage>339</fpage>&#x02013;<lpage>355</lpage>. <pub-id pub-id-type="doi">10.1108/eb026918</pub-id></citation></ref>
<ref id="B78">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kuhlthau</surname> <given-names>C. C.</given-names></name> <name><surname>Heinstr&#x000F6;m</surname> <given-names>J.</given-names></name> <name><surname>Todd</surname> <given-names>R. J.</given-names></name></person-group> (<year>2008</year>). <article-title>The &#x02018;information search process&#x02019; revisited: is the model still useful</article-title>. <source>Inf. Res.</source> <volume>13</volume>, <fpage>13</fpage>&#x02013;<lpage>14</lpage>.</citation></ref>
<ref id="B79">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Lawless</surname> <given-names>K. A.</given-names></name> <name><surname>Goldman</surname> <given-names>S. R.</given-names></name> <name><surname>Gomez</surname> <given-names>K.</given-names></name> <name><surname>Manning</surname> <given-names>F.</given-names></name> <name><surname>Braasch</surname> <given-names>J.</given-names></name></person-group> (<year>2012</year>). <article-title>Assessing multiple source comprehension through evidence-centered design</article-title>, in <source>Reaching an Understanding: Innovations in How We View Reading Assessment</source>, eds <person-group person-group-type="editor"><name><surname>Sabatini</surname> <given-names>J. P.</given-names></name> <name><surname>O&#x00027;Reilly</surname> <given-names>T.</given-names></name> <name><surname>Albro</surname> <given-names>E.</given-names></name></person-group> (<publisher-loc>Lanham, MD</publisher-loc>: <publisher-name>Rowman and Littlefield Education</publisher-name>), <fpage>3</fpage>&#x02013;<lpage>17</lpage>.</citation></ref>
<ref id="B80">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Leeder</surname> <given-names>C.</given-names></name> <name><surname>Shah</surname> <given-names>C.</given-names></name></person-group> (<year>2016</year>). <article-title>Practicing critical evaluation of online sources improves student search behavior</article-title>. <source>J. Acad. Libr.</source> <volume>42</volume>, <fpage>459</fpage>&#x02013;<lpage>468</lpage>. <pub-id pub-id-type="doi">10.1016/j.acalib.2016.04.001</pub-id></citation></ref>
<ref id="B81">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>List</surname> <given-names>A.</given-names></name> <name><surname>Alexander</surname> <given-names>P. A.</given-names></name></person-group> (<year>2017</year>). <article-title>Analyzing and integrating models of multiple text comprehension</article-title>. <source>Educ. Psychol</source>. <volume>52</volume>, <fpage>143</fpage>&#x02013;<lpage>147</lpage>. <pub-id pub-id-type="doi">10.1080/00461520.2017.1328309</pub-id></citation></ref>
<ref id="B82">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>O. L.</given-names></name> <name><surname>Frankel</surname> <given-names>L.</given-names></name> <name><surname>Crotts Roohs</surname> <given-names>K.</given-names></name></person-group> (<year>2014</year>). <source>Assessing Critical Thinking in Higher Education: Current State and Directions for Next-Generation Assessment</source>. <publisher-loc>Princeton, NJ</publisher-loc>: <publisher-name>ETS</publisher-name>. <pub-id pub-id-type="doi">10.1002/ets2.12009</pub-id></citation></ref>
<ref id="B83">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lucassen</surname> <given-names>T.</given-names></name> <name><surname>Schraagen</surname> <given-names>J. M.</given-names></name></person-group> (<year>2011</year>). <article-title>Factual accuracy and trust in information: the role of expertise</article-title>. <source>J. Am. Soc. Inf. Sci. Technol</source>. <volume>62</volume>, <fpage>1232</fpage>&#x02013;<lpage>1242</lpage>. <pub-id pub-id-type="doi">10.1002/asi.21545</pub-id></citation></ref>
<ref id="B84">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lucassen</surname> <given-names>T.</given-names></name> <name><surname>Schraagen</surname> <given-names>J. M.</given-names></name></person-group> (<year>2013</year>). <article-title>The influence of source cues and topic familiarity on credibility evaluation</article-title>. <source>Comput. Hum. Behav</source>. <volume>29</volume>, <fpage>1387</fpage>&#x02013;<lpage>1392</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2013.01.036</pub-id></citation></ref>
<ref id="B85">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Maurer</surname> <given-names>A.</given-names></name> <name><surname>Schloegl</surname> <given-names>C.</given-names></name> <name><surname>Dreisiebner</surname> <given-names>S.</given-names></name></person-group> (<year>2017</year>). <article-title>Comparing information literacy of student beginners among different branches of study</article-title>. <source>Libellarium</source> <volume>9</volume>:<fpage>2</fpage>. <pub-id pub-id-type="doi">10.15291/libellarium.v9i2.280</pub-id></citation></ref>
<ref id="B86">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Maurer</surname> <given-names>M.</given-names></name> <name><surname>Quiring</surname> <given-names>O.</given-names></name> <name><surname>Schemer</surname> <given-names>C.</given-names></name></person-group> (<year>2018</year>). <article-title>Media effects on positive and negative learning</article-title>, in <source>Positive Learning in the Age of Information</source>, eds <person-group person-group-type="editor"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Wittum</surname> <given-names>G.</given-names></name> <name><surname>Dengel</surname> <given-names>A.</given-names></name></person-group> (<publisher-loc>Wiesbaden</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>197</fpage>&#x02013;<lpage>208</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-658-19567-0_11</pub-id></citation></ref>
<ref id="B87">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Maurer</surname> <given-names>M.</given-names></name> <name><surname>Schemer</surname> <given-names>C.</given-names></name> <name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Jitomirski</surname> <given-names>J.</given-names></name></person-group> (<year>2020</year>). <article-title>Positive and negative media effects on university students&#x00027; learning: preliminary findings and a research program</article-title>, in <source>Frontiers and Advances in Positive Learning in the Age of Information (PLATO)</source>, ed <person-group person-group-type="editor"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>), <fpage>109</fpage>&#x02013;<lpage>119</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-030-26578-6_8</pub-id></citation></ref>
<ref id="B88">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Mayer</surname> <given-names>R. E.</given-names></name></person-group> (<year>2009</year>). <source>Multimedia Learning, 2nd Edn</source>. <publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>. <pub-id pub-id-type="doi">10.1017/CBO9780511811678</pub-id></citation></ref>
<ref id="B89">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Mayring</surname> <given-names>P.</given-names></name></person-group> (<year>2014</year>). <source>Qualitative Content Analysis. Theoretical Foundation, Basic Procedures and Software Solution</source>. Retrieved from <ext-link ext-link-type="uri" xlink:href="https://nbn-resolving.de/urn:nbn:de:0168-ssoar-395173">https://nbn-resolving.de/urn:nbn:de:0168-ssoar-395173</ext-link></citation></ref>
<ref id="B90">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>McCrudden</surname> <given-names>M. T.</given-names></name> <name><surname>Magliano</surname> <given-names>J. P.</given-names></name> <name><surname>Schraw</surname> <given-names>G. J.</given-names></name></person-group> (<year>2011</year>). <source>Text Relevance and Learning From Text</source>. <publisher-loc>Charlotte, NC</publisher-loc>: <publisher-name>Information Age Pub</publisher-name>. <pub-id pub-id-type="doi">10.1007/978-1-4419-1428-6_354</pub-id></citation></ref>
<ref id="B91">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>McGrew</surname> <given-names>S.</given-names></name> <name><surname>Smith</surname> <given-names>M.</given-names></name> <name><surname>Breakstone</surname> <given-names>J.</given-names></name> <name><surname>Ortega</surname> <given-names>T.</given-names></name> <name><surname>Wineburg</surname> <given-names>S.</given-names></name></person-group> (<year>2019</year>). <article-title>Improving university students&#x00027; web savvy: an intervention study</article-title>. <source>Br. J. Educ. Psychol</source>. <volume>89</volume>, <fpage>485</fpage>&#x02013;<lpage>500</lpage>. <pub-id pub-id-type="doi">10.1111/bjep.12279</pub-id><pub-id pub-id-type="pmid">30993684</pub-id></citation></ref>
<ref id="B92">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>McMullin</surname> <given-names>S. L.</given-names></name></person-group> (<year>2018</year>). <source>The correlation between information literacy and critical thinking of college students: an exploratory study</source> (dissertation thesis). University of North Texas, Denton, TX, United States (ProQuest LLC).</citation></ref>
<ref id="B93">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Messick</surname> <given-names>S.</given-names></name></person-group> (<year>1989</year>). <article-title>Validity</article-title>, in <source>Educational Measurement</source>, <edition>3rd Edn.</edition>, ed <person-group person-group-type="editor"><name><surname>Linn</surname> <given-names>R. L.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>American Council on education and Macmillan</publisher-name>), <fpage>13</fpage>&#x02013;<lpage>104</lpage>.</citation></ref>
<ref id="B94">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Metzger</surname> <given-names>M. J.</given-names></name></person-group> (<year>2007</year>). <article-title>Making sense of credibility on the web: models for evaluating online information and recommendations for future research</article-title>. <source>J. Am. Soc. Inf. Sci. Technol</source>. <volume>58</volume>, <fpage>2078</fpage>&#x02013;<lpage>2091</lpage>. <pub-id pub-id-type="doi">10.1002/asi.20672</pub-id></citation></ref>
<ref id="B95">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Metzger</surname> <given-names>M. J.</given-names></name> <name><surname>Flanagin</surname> <given-names>A.</given-names></name></person-group> (<year>2015</year>). <article-title>Psychological approaches to credibility assessment online</article-title> in <source>The Handbook of the Psychology of Communication Technology</source>, ed <person-group person-group-type="editor"><name><surname>Sundar</surname> <given-names>S. S.</given-names></name></person-group> (<publisher-loc>Chichester; Malden, MA</publisher-loc>: <publisher-name>Wiley Blackwell</publisher-name>), <fpage>445</fpage>&#x02013;<lpage>466</lpage>. <pub-id pub-id-type="doi">10.1002/9781118426456.ch20</pub-id></citation></ref>
<ref id="B96">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Metzger</surname> <given-names>M. J.</given-names></name> <name><surname>Flanagin</surname> <given-names>A. J.</given-names></name></person-group> (<year>2013</year>). <article-title>Credibility and trust of information in online environments: the use of cognitive heuristics</article-title>. <source>J. Pragmatics</source> <volume>59</volume>, <fpage>210</fpage>&#x02013;<lpage>220</lpage>. <pub-id pub-id-type="doi">10.1016/j.pragma.2013.07.012</pub-id></citation></ref>
<ref id="B97">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Mislevy</surname> <given-names>R. J.</given-names></name></person-group> (<year>2017</year>). <source>Socio-Cognitive Foundations of Educational Measurement</source>. <publisher-loc>London</publisher-loc>: <publisher-name>Routledge</publisher-name>. <pub-id pub-id-type="doi">10.4324/9781315871691</pub-id></citation></ref>
<ref id="B98">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mislevy</surname> <given-names>R. J.</given-names></name> <name><surname>Haertel</surname> <given-names>G. D.</given-names></name></person-group> (<year>2006</year>). <article-title>Implications of evidence-centered design for educational testing</article-title>. <source>Educ. Meas.</source> <volume>25</volume>, <fpage>6</fpage>&#x02013;<lpage>20</lpage>. <pub-id pub-id-type="doi">10.1111/j.1745-3992.2006.00075.x</pub-id></citation></ref>
<ref id="B99">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Molerov</surname> <given-names>D.</given-names></name> <name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Schmidt</surname> <given-names>S.</given-names></name></person-group> (<year>2019</year>). <article-title>Adapting the civic online reasoning assessment cross-nationally using an explicit functional equivalence approach</article-title> in <source>Annual Meeting of the American Educational Research Association (Toronto)</source>.</citation></ref>
<ref id="B100">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Moore</surname> <given-names>T.</given-names></name></person-group> (<year>2013</year>). <article-title>Critical thinking: seven definitions in search of a concept</article-title>. <source>Stud. Higher Educ</source>. <volume>38</volume>, <fpage>506</fpage>&#x02013;<lpage>522</lpage>. <pub-id pub-id-type="doi">10.1080/03075079.2011.586995</pub-id></citation></ref>
<ref id="B101">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>M&#x000FC;nchow</surname> <given-names>H.</given-names></name> <name><surname>Richter</surname> <given-names>T.</given-names></name> <name><surname>von der M&#x000FC;hlen</surname> <given-names>S.</given-names></name> <name><surname>Schmid</surname> <given-names>S.</given-names></name></person-group> (<year>2019</year>). <article-title>The ability to evaluate arguments in scientific texts: measurement, cognitive processes, nomological network, and relevance for academic success at the university</article-title>. <source>Br. J. Educ. Psychol</source>. <volume>89</volume>, <fpage>501</fpage>&#x02013;<lpage>523</lpage>. <pub-id pub-id-type="doi">10.1111/bjep.12298</pub-id><pub-id pub-id-type="pmid">31209875</pub-id></citation></ref>
<ref id="B102">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Murray</surname> <given-names>M. C.</given-names></name> <name><surname>P&#x000E9;rez</surname> <given-names>J.</given-names></name></person-group> (<year>2014</year>). <article-title>Unraveling the digital literacy paradox: how higher education fails at the fourth literacy</article-title>. <source>Issues Inf. Sci. Inf. Technol.</source> <volume>11</volume>, <fpage>189</fpage>&#x02013;<lpage>210</lpage>. <pub-id pub-id-type="doi">10.28945/1982</pub-id></citation></ref>
<ref id="B103">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nagel</surname> <given-names>M.-T.</given-names></name> <name><surname>Sch&#x000E4;fer</surname> <given-names>S.</given-names></name> <name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Schemer</surname> <given-names>C.</given-names></name> <name><surname>Maurer</surname> <given-names>M.</given-names></name> <name><surname>Molerov</surname> <given-names>D.</given-names></name> <etal/></person-group>. (<year>2020</year>). <article-title>How do university students&#x00027; web search behavior, website characteristics, and the interaction of both influence students&#x00027; critical online reasoning?</article-title> <source>Front. Educ</source>. <volume>5</volume>:<fpage>1</fpage>. <pub-id pub-id-type="doi">10.3389/feduc.2020.565062</pub-id></citation></ref>
<ref id="B104">
<citation citation-type="book"><person-group person-group-type="author"><collab>National Research Council</collab></person-group> (<year>2012</year>). <source>Education for Life and Work: Developing Transferable Knowledge and Skills in the 21st Century</source>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>National Academies Press</publisher-name>.</citation></ref>
<ref id="B105">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Newman</surname> <given-names>N.</given-names></name> <name><surname>Fletcher</surname> <given-names>R.</given-names></name> <name><surname>Kalogeropoulos</surname> <given-names>A.</given-names></name> <name><surname>Nielsen</surname> <given-names>R. K.</given-names></name></person-group> (<year>2019</year>). <source>Reuters Institute Digital News Report 2019. Reuters Institut for the Study of Journalism</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://reutersinstitute.politics.ox.ac.uk/sites/default/files/inline-files/DNR_2019_FINAL.pdf">https://reutersinstitute.politics.ox.ac.uk/sites/default/files/inline-files/DNR_2019_FINAL.pdf</ext-link> (accessed January 1, 2020).</citation></ref>
<ref id="B106">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Oser</surname> <given-names>F. K.</given-names></name></person-group> (<year>2018</year>). <article-title>Positive learning through negative learning - the wonderful burden of PLATO</article-title>, in <source>Positive Learning in the Age of Information: A Blessing or a Curse?</source> (<publisher-loc>Wiesbaden</publisher-loc>: <publisher-name>Springer VS</publisher-name>), <fpage>363</fpage>-<lpage>372</lpage>.</citation></ref>
<ref id="B107">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Oser</surname> <given-names>F. K.</given-names></name> <name><surname>Biedermann</surname> <given-names>H.</given-names></name></person-group> (<year>2020</year>). <article-title>A three-level model for critical thinking: critical alertness, critical reflection, and critical analysis</article-title>, in <source>Frontiers and Advances in Positive Learning in the Age of InformaTiOn (PLATO)</source>, ed <person-group person-group-type="editor"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>), <fpage>89</fpage>&#x02013;<lpage>106</lpage>.</citation></ref>
<ref id="B108">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Paul</surname> <given-names>R.</given-names></name> <name><surname>Elder</surname> <given-names>L.</given-names></name></person-group> (<year>2005</year>). <source>A Guide for Educators to Critical Thinking Competency Standards, Principles, Performance Indicators, and Outcomes with a Critical Thinking Master Rubric</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.criticalthinking.org">www.criticalthinking.org</ext-link> (accessed June 24, 2020).</citation></ref>
<ref id="B109">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Paul</surname> <given-names>R.</given-names></name> <name><surname>Elder</surname> <given-names>L.</given-names></name></person-group> (<year>2008</year>). <source>The Thinker&#x00027;s Guide for Conscientious Citizens on How to Detect Media Bias and Propaganda in National and World News: In National and World News, 4th Edn</source>. <publisher-loc>Dillon Beach, CA</publisher-loc>: <publisher-name>The Foundation for Critical Thinking</publisher-name>.</citation></ref>
<ref id="B110">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Pellegrino</surname> <given-names>J. W.</given-names></name></person-group> (<year>2017</year>). <article-title><italic>Teaching, learning and assessing 21st century skills</italic>,</article-title> in <source>Educational Research and Innovation. Pedagogical Knowledge and the Changing Nature of the Teaching Profession</source>, ed <person-group person-group-type="editor"><name><surname>Guerriero</surname> <given-names>S.</given-names></name></person-group> (<publisher-loc>Paris</publisher-loc>: <publisher-name>OECD Publishing</publisher-name>), <fpage>223</fpage>&#x02013;<lpage>251</lpage>. <pub-id pub-id-type="doi">10.1787/9789264270695-12-en</pub-id></citation></ref>
<ref id="B111">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Pernice</surname> <given-names>K.</given-names></name></person-group> (<year>2017</year>). <source>F-Shaped Pattern of Reading on the Web: Misunderstood, but Still Relevant (Even on Mobile). World Leaders in Research-Based User Experience</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.nngroup.com/articles/f-shaped-pattern-reading-web-content/">https://www.nngroup.com/articles/f-shaped-pattern-reading-web-content/</ext-link> (accessed June 24, 2020).</citation></ref>
<ref id="B112">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pirolli</surname> <given-names>P.</given-names></name> <name><surname>Card</surname> <given-names>S.</given-names></name></person-group> (<year>1999</year>). <article-title>Information foraging</article-title>. <source>Psychol. Rev</source>. <volume>106</volume>, <fpage>643</fpage>&#x02013;<lpage>675</lpage>. <pub-id pub-id-type="doi">10.1037/0033-295X.106.4.643</pub-id></citation></ref>
<ref id="B113">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Podgornik</surname> <given-names>B. B.</given-names></name> <name><surname>Dolni&#x0010D;ar</surname> <given-names>D.</given-names></name> <name><surname>Gla&#x0017D;ar</surname> <given-names>S. A.</given-names></name></person-group> (<year>2017</year>). <article-title>Does the information literacy of university students depend on their scientific literacy?</article-title> <source>Eurasia J. Math. Sci. Technol. Educ.</source> <volume>13</volume>, <fpage>3869</fpage>&#x02013;<lpage>3891</lpage>. <pub-id pub-id-type="doi">10.12973/eurasia.2017.00762a</pub-id></citation></ref>
<ref id="B114">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Powers</surname> <given-names>E. M.</given-names></name></person-group> (<year>2019</year>). <article-title>How students access, filter and evaluate digital news: choices that shape what they consume and the implications for news literacy education</article-title>. <source>J. Lit. Technol</source>. <volume>20</volume>:<fpage>3</fpage>.</citation></ref>
<ref id="B115">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Reese</surname> <given-names>S. D.</given-names></name> <name><surname>Shoemaker</surname> <given-names>P. J.</given-names></name></person-group> (<year>2016</year>). <article-title>A media sociology for the networked public sphere: the hierarchy of influences model</article-title>. <source>Mass Commun. Soc</source>. <volume>19</volume>, <fpage>389</fpage>&#x02013;<lpage>410</lpage>. <pub-id pub-id-type="doi">10.1080/15205436.2016.1174268</pub-id></citation></ref>
<ref id="B116">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rieh</surname> <given-names>S. Y.</given-names></name></person-group> (<year>2010</year>). <article-title>Credibility and cognitive authority of information</article-title> in <source>Encyclopedia of Library and Information Sciences</source>. <volume>1</volume>, <fpage>1337</fpage>&#x02013;<lpage>1344</lpage>.</citation></ref>
<ref id="B117">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rieh</surname> <given-names>S. Y.</given-names></name></person-group> (<year>2014</year>). <article-title>Credibility assessment of online information in context</article-title>. <source>J. Inf. Sci. Theory Pract</source>. <volume>2</volume>, <fpage>6</fpage>&#x02013;<lpage>17</lpage>. <pub-id pub-id-type="doi">10.1633/JISTaP.2014.2.3.1</pub-id></citation></ref>
<ref id="B118">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Roozenbeek</surname> <given-names>J.</given-names></name> <name><surname>van der Linden</surname> <given-names>S.</given-names></name></person-group> (<year>2019</year>). <article-title>Fake news game confers psychological resistance against online misinformation</article-title>. <source>Palgrave Commun</source>. <volume>5</volume>:<fpage>133</fpage>. <pub-id pub-id-type="doi">10.1057/s41599-019-0279-9</pub-id><pub-id pub-id-type="pmid">31934684</pub-id></citation></ref>
<ref id="B119">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Rouet</surname> <given-names>J. F.</given-names></name></person-group> (<year>2006</year>). <source>The Skills of Document Use: From Text Comprehension to Web-Based Learning</source>. <publisher-loc>Mahwah, NJ</publisher-loc>: <publisher-name>Erlbaum</publisher-name>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.loc.gov/catdir/enhancements/fy0625/2005052083-d.html">http://www.loc.gov/catdir/enhancements/fy0625/2005052083-d.html</ext-link> (accessed June 24, 2020). <pub-id pub-id-type="doi">10.4324/9780203820094</pub-id></citation></ref>
<ref id="B120">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Salmer&#x000F3;n</surname> <given-names>L.</given-names></name> <name><surname>Ca&#x000F1;as</surname> <given-names>J. J.</given-names></name> <name><surname>Kintsch</surname> <given-names>W.</given-names></name> <name><surname>Fajardo</surname> <given-names>I.</given-names></name></person-group> (<year>2005</year>). <article-title>Reading strategies and hypertext comprehension</article-title>. <source>Discourse Process</source>. <volume>40</volume>, <fpage>171</fpage>&#x02013;<lpage>191</lpage>. <pub-id pub-id-type="doi">10.1207/s15326950dp4003_1</pub-id></citation></ref>
<ref id="B121">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Salmer&#x000F3;n</surname> <given-names>L.</given-names></name> <name><surname>Kammerer</surname> <given-names>Y.</given-names></name> <name><surname>Garc&#x000ED;a-Carri&#x000F3;n</surname> <given-names>P.</given-names></name></person-group> (<year>2013</year>). <article-title>Searching the web for conflicting topics: page and user factors</article-title>. <source>Comput. Hum. Behav</source>. <volume>29</volume>, <fpage>2161</fpage>&#x02013;<lpage>2171</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2013.04.034</pub-id></citation></ref>
<ref id="B122">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Samson</surname> <given-names>S.</given-names></name></person-group> (<year>2010</year>). <article-title>Information literacy learning outcomes and student success</article-title>. <source>J. Acad. Libr</source>. <volume>36</volume>, <fpage>202</fpage>&#x02013;<lpage>210</lpage>. <pub-id pub-id-type="doi">10.1016/j.acalib.2010.03.002</pub-id></citation></ref>
<ref id="B123">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sanders</surname> <given-names>L.</given-names></name> <name><surname>Kurbanoglu</surname> <given-names>S.</given-names></name> <name><surname>Boustany</surname> <given-names>J.</given-names></name> <name><surname>Dogan</surname> <given-names>G.</given-names></name> <name><surname>Becker</surname> <given-names>P.</given-names></name></person-group> (<year>2015</year>). <article-title>Information behaviors and information literacy skills of LIS students: an international perspective</article-title>. <source>J. Educ. Libr. Inf. Sci. Online</source> <volume>56</volume>, <fpage>80</fpage>&#x02013;<lpage>99</lpage>. <pub-id pub-id-type="doi">10.12783/issn.2328-2967/56/S1/9</pub-id></citation></ref>
<ref id="B124">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Schmidt</surname> <given-names>S.</given-names></name> <name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Roeper</surname> <given-names>J.</given-names></name> <name><surname>Klose</surname> <given-names>V.</given-names></name> <name><surname>Weber</surname> <given-names>M.</given-names></name> <name><surname>B&#x000FC;ltmann</surname> <given-names>A.-K.</given-names></name> <etal/></person-group>. (<year>2020</year>). <article-title>Undergraduate students&#x00027; critical online reasoning - process mining analysis</article-title>. <source>Front. Psychol</source>. (in press). <pub-id pub-id-type="doi">10.3389/fpsyg.2020.576273</pub-id></citation></ref>
<ref id="B125">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Schnell</surname> <given-names>R.</given-names></name> <name><surname>Hill</surname> <given-names>P. B.</given-names></name> <name><surname>Esser</surname> <given-names>E.</given-names></name></person-group> (<year>2011</year>). <source>Methoden der empirischen Sozialforschung [Methods of Empirical Social Research], 9th Edn</source>. <publisher-loc>Munich</publisher-loc>: <publisher-name>Oldenburg</publisher-name>.</citation></ref>
<ref id="B126">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Shao</surname> <given-names>C.</given-names></name> <name><surname>Ciampaglia</surname> <given-names>G. L.</given-names></name> <name><surname>Varol</surname> <given-names>O.</given-names></name> <name><surname>Flammini</surname> <given-names>A.</given-names></name> <name><surname>Menczer</surname> <given-names>F.</given-names></name></person-group> (<year>2017</year>). <source>The Spread of Fake News by Social Bots</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://arxiv.org/abs/1707.07592">https://arxiv.org/abs/1707.07592</ext-link> (accessed June 24, 2020).</citation></ref>
<ref id="B127">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shavelson</surname> <given-names>R. J.</given-names></name> <name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Beck</surname> <given-names>K.</given-names></name> <name><surname>Schmidt</surname> <given-names>S.</given-names></name> <name><surname>Mari&#x000F1;o</surname> <given-names>J. P.</given-names></name></person-group> (<year>2019</year>). <article-title>Assessment of university students&#x00027; critical thinking: next generation performance assessment</article-title>. <source>Int. J. Test</source>. <volume>19</volume>, <fpage>337</fpage>&#x02013;<lpage>362</lpage>. <pub-id pub-id-type="doi">10.1080/15305058.2018.1543309</pub-id></citation></ref>
<ref id="B128">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Shavelson</surname> <given-names>R. J.</given-names></name> <name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Mari&#x000F1;o</surname> <given-names>J.</given-names></name></person-group> (<year>2018</year>). <article-title>International performance assessment of learning in higher education (iPAL): research and development</article-title>, in <source>Assessment of Learning Outcomes in Higher Education &#x02013; Cross-National Comparisons and Perspectives</source>, eds <person-group person-group-type="editor"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Toepper</surname> <given-names>M.</given-names></name> <name><surname>Pant</surname> <given-names>H. A.</given-names></name> <name><surname>Lautenbach</surname> <given-names>C.</given-names></name></person-group> (<publisher-loc>Wiesbaden</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>193</fpage>&#x02013;<lpage>214</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-74338-7_10</pub-id></citation></ref>
<ref id="B129">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Shoemaker</surname> <given-names>P. J.</given-names></name> <name><surname>Reese</surname> <given-names>S. D.</given-names></name></person-group> (<year>2014</year>). <source>Mediating the Message in the 21st Century: A Media Sociology Perspective, 3rd Edn</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Routledge/Taylor and Francis Group</publisher-name>. <pub-id pub-id-type="doi">10.4324/9780203930434</pub-id></citation></ref>
<ref id="B130">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Snow</surname> <given-names>C. E.</given-names></name></person-group> (<year>2002</year>). <source>Reading for Understanding: Toward an RandD Program in Reading Comprehension</source>. <publisher-loc>Santa Monica CA</publisher-loc>: <publisher-name>Rand</publisher-name>.</citation></ref>
<ref id="B131">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Solano-Flores</surname> <given-names>G.</given-names></name> <name><surname>Backhoff</surname> <given-names>E.</given-names></name> <name><surname>Contreras-Ni&#x000F1;o</surname> <given-names>L. &#x000C1;.</given-names></name></person-group> (<year>2009</year>). <article-title>Theory of test translation error</article-title>. <source>Int. J. Test</source>. <volume>9</volume>, <fpage>78</fpage>&#x02013;<lpage>91</lpage>. <pub-id pub-id-type="doi">10.1080/15305050902880835</pub-id></citation></ref>
<ref id="B132">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sparks</surname> <given-names>J. R.</given-names></name> <name><surname>Katz</surname> <given-names>I. R.</given-names></name> <name><surname>Beile</surname> <given-names>P. M.</given-names></name></person-group> (<year>2016</year>). <article-title>Assessing digital information literacy in higher education: a review of existing frameworks and assessments with recommendations for next-generation assessment</article-title>. <source>ETS Res. Rep. Ser.</source> <volume>2016</volume>, <fpage>1</fpage>&#x02013;<lpage>33</lpage>. <pub-id pub-id-type="doi">10.1002/ets2.12118</pub-id></citation></ref>
<ref id="B133">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Stanovich</surname> <given-names>K. E.</given-names></name> <name><surname>West</surname> <given-names>R.</given-names></name> <name><surname>Toplak</surname> <given-names>M. E.</given-names></name></person-group> (<year>2016</year>). <source>The Rationality Quotient: Toward a Test of Rational Thinking</source>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>The MIT Press</publisher-name>. <pub-id pub-id-type="doi">10.7551/mitpress/9780262034845.001.0001</pub-id></citation></ref>
<ref id="B134">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Sundar</surname> <given-names>S. S.</given-names></name></person-group> (<year>2008</year>). <article-title>The MAIN model: a heuristic approach to understanding technology effects on credibility</article-title>, in <source>Digital Media, Youth, and Credibility</source>, eds <person-group person-group-type="editor"><name><surname>Metzger</surname> <given-names>M. J.</given-names></name> <name><surname>Flanagin</surname> <given-names>A. J.</given-names></name></person-group> (<publisher-loc>Cambridge</publisher-loc>: <publisher-name>MIT Press</publisher-name>), <fpage>73</fpage>&#x02013;<lpage>100</lpage>.</citation></ref>
<ref id="B135">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Tanaka</surname> <given-names>K.</given-names></name></person-group> (<year>2009</year>). <article-title>Web search and information credibility analysis: bridging the gap between web1.0 and web2.0</article-title>, in <source>ICUIMC 2009: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication</source> (<publisher-loc>Suwon</publisher-loc>), <fpage>39</fpage>&#x02013;<lpage>44</lpage>.</citation></ref>
<ref id="B136">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Tanaka</surname> <given-names>K.</given-names></name> <name><surname>Kawai</surname> <given-names>Y.</given-names></name> <name><surname>Zhang</surname> <given-names>J.</given-names></name> <name><surname>Nakajima</surname> <given-names>S.</given-names></name> <name><surname>Inagaki</surname> <given-names>Y.</given-names></name> <name><surname>Ohshima</surname> <given-names>H.</given-names></name> <etal/></person-group>. (<year>2010</year>). <article-title>Evaluating credibility of web information</article-title>, in <source>Proceedings of the 4th International Conference on Uniquitous Information Management and Communication - ICUIMC &#x00027;10</source>, eds <person-group person-group-type="editor"><name><surname>Kim</surname> <given-names>W.</given-names></name> <name><surname>Won</surname> <given-names>D.</given-names></name> <name><surname>You</surname> <given-names>K.-H.</given-names></name> <name><surname>Lee</surname> <given-names>S.-W.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM Press</publisher-name>), <fpage>1</fpage>&#x02013;<lpage>10</lpage>. <pub-id pub-id-type="doi">10.1145/2108616.2108645</pub-id></citation></ref>
<ref id="B137">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Taylor</surname> <given-names>A.</given-names></name> <name><surname>Dalal</surname> <given-names>H. A.</given-names></name></person-group> (<year>2014</year>). <article-title>Information literacy standards and the world wide web: results from a student survey on evaluation of Internet information sources</article-title>. <source>Inf. Res.</source> <volume>19</volume>:<fpage>4</fpage>.</citation></ref>
<ref id="B138">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Threadgill</surname> <given-names>E. J.</given-names></name> <name><surname>Price</surname> <given-names>L. R.</given-names></name></person-group> (<year>2019</year>). <article-title>Assessing online viewing practices among college students</article-title>. <source>J. Media Lit. Educ</source>. <volume>11</volume>, <fpage>37</fpage>&#x02013;<lpage>55</lpage>. <pub-id pub-id-type="doi">10.23860/JMLE-2019-11-2-3</pub-id></citation></ref>
<ref id="B139">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Toplak</surname> <given-names>M. E.</given-names></name> <name><surname>Liu</surname> <given-names>E.</given-names></name> <name><surname>MacPherson</surname> <given-names>R.</given-names></name> <name><surname>Toneatto</surname> <given-names>T.</given-names></name> <name><surname>Stanovich</surname> <given-names>K. E.</given-names></name></person-group> (<year>2007</year>). <article-title>The reasoning skills and thinking dispositions of problem gamblers: a dual process taxonomy</article-title>. <source>J. Behav. Decis. Mak</source>. <volume>20</volume>, <fpage>103</fpage>&#x02013;<lpage>124</lpage>. <pub-id pub-id-type="doi">10.1002/bdm.544</pub-id></citation></ref>
<ref id="B140">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Toulmin</surname> <given-names>S.</given-names></name></person-group> (<year>2003</year>). <source>The Uses of Argument, Updated Edn</source>. <publisher-loc>Cambridge, NY</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>. <pub-id pub-id-type="doi">10.1017/CBO9780511840005</pub-id></citation></ref>
<ref id="B141">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tseng</surname> <given-names>S.</given-names></name> <name><surname>Fogg</surname> <given-names>B. J.</given-names></name></person-group> (<year>1999</year>). <article-title>Credibility and computing technology</article-title>. <source>Commun. ACM</source> <volume>42</volume>, <fpage>39</fpage>&#x02013;<lpage>44</lpage>. <pub-id pub-id-type="doi">10.1145/301353.301402</pub-id></citation></ref>
<ref id="B142">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Van Eemeren</surname> <given-names>F. H.</given-names></name></person-group> (<year>2013</year>). <article-title>Fallacies as derailments of argumentative discourse: acceptance based on understanding and critical assessment</article-title>. <source>J. Pragmatics</source> <volume>59</volume>, <fpage>141</fpage>&#x02013;<lpage>152</lpage>. <pub-id pub-id-type="doi">10.1016/j.pragma.2013.06.006</pub-id></citation></ref>
<ref id="B143">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Walraven</surname> <given-names>A.</given-names></name> <name><surname>Brand-Gruwel</surname> <given-names>S.</given-names></name> <name><surname>Boshuizen</surname> <given-names>H. P. A.</given-names></name></person-group> (<year>2008</year>). <article-title>Information-problem solving: a review of problems students encounter and instructional solutions</article-title>. <source>Comput. Hum. Behav</source>. <volume>24</volume>, <fpage>623</fpage>&#x02013;<lpage>648</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2007.01.030</pub-id></citation></ref>
<ref id="B144">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Walraven</surname> <given-names>A.</given-names></name> <name><surname>Brand-Gruwel</surname> <given-names>S.</given-names></name> <name><surname>Boshuizen</surname> <given-names>H. P. A.</given-names></name></person-group> (<year>2009</year>). <article-title>How students evaluate information and sources when searching the world wide web for information</article-title>. <source>Comput. Educ</source>. <volume>52</volume>, <fpage>234</fpage>&#x02013;<lpage>246</lpage>. <pub-id pub-id-type="doi">10.1016/j.compedu.2008.08.003</pub-id></citation></ref>
<ref id="B145">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Walton</surname> <given-names>D.</given-names></name></person-group> (<year>2006</year>). <source>Fundamentals of Critical Argumentation. Critical Reasoning and Argumentation.</source> <publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>. <pub-id pub-id-type="doi">10.1017/CBO9780511807039</pub-id></citation></ref>
<ref id="B146">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Walton</surname> <given-names>D.</given-names></name></person-group> (<year>2017</year>). <article-title>Value-based argumentation in mass audience persuasion dialogues</article-title>. <source>COGENCY</source> <volume>9</volume>, <fpage>139</fpage>&#x02013;<lpage>159</lpage>.</citation></ref>
<ref id="B147">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Walton</surname> <given-names>D.</given-names></name> <name><surname>Reed</surname> <given-names>C.</given-names></name> <name><surname>Macagno</surname> <given-names>F.</given-names></name></person-group> (<year>2008</year>). <source>Argumentation Schemes</source>. <publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>. <pub-id pub-id-type="doi">10.1017/CBO9780511802034</pub-id><pub-id pub-id-type="pmid">28000092</pub-id></citation></ref>
<ref id="B148">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Walton</surname> <given-names>G.</given-names></name> <name><surname>Barker</surname> <given-names>J.</given-names></name> <name><surname>Pointon</surname> <given-names>M.</given-names></name> <name><surname>Turner</surname> <given-names>M.</given-names></name> <name><surname>Wilkinson</surname> <given-names>A.</given-names></name></person-group> (<year>2020</year>). <article-title>Information literacy and the societal imperative of information discernment</article-title>, in <source>Informed Societies: Why Information Literacy Matters for Citizenship, Participation and Democracy</source>, ed <person-group person-group-type="editor"><name><surname>Goldstein</surname> <given-names>S.</given-names></name></person-group> (<publisher-loc>London</publisher-loc>: <publisher-name>Facet Publishing</publisher-name>), <fpage>149</fpage>. <pub-id pub-id-type="doi">10.29085/9781783303922.010</pub-id></citation></ref>
<ref id="B149">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wathen</surname> <given-names>C. N.</given-names></name> <name><surname>Burkell</surname> <given-names>J.</given-names></name></person-group> (<year>2002</year>). <article-title>Believe it or not: factors influencing credibility on the web</article-title>. <source>J. Am. Soc. Inf. Sci. Technol</source>. <volume>53</volume>, <fpage>134</fpage>&#x02013;<lpage>144</lpage>. <pub-id pub-id-type="doi">10.1002/asi.10016</pub-id></citation></ref>
<ref id="B150">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Weekley</surname> <given-names>J. A.</given-names></name> <name><surname>Ployhart</surname> <given-names>R. E.</given-names></name></person-group> (<year>2013</year>). <source>Situational Judgment Tests: Theory, Measurement, and Application.</source> <publisher-loc>Mahwah</publisher-loc>: <publisher-name>Erlbaum</publisher-name>.</citation></ref>
<ref id="B151">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Wierzbicki</surname> <given-names>A.</given-names></name></person-group> (<year>2018</year>). <source>Web Content Credibility</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Springer Berlin Heidelberg</publisher-name>. <pub-id pub-id-type="doi">10.1007/978-3-319-77794-8</pub-id></citation></ref>
<ref id="B152">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Wineburg</surname> <given-names>S.</given-names></name> <name><surname>Breakstone</surname> <given-names>J.</given-names></name> <name><surname>McGrew</surname> <given-names>S.</given-names></name> <name><surname>Ortega</surname> <given-names>T.</given-names></name></person-group> (<year>2018</year>). <article-title>Why google can&#x00027;t save us. The challenges of our post-gutenberg moment</article-title>, in <source>Positive Learning in the Age of Information</source>, eds <person-group person-group-type="editor"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Wittum</surname> <given-names>G.</given-names></name> <name><surname>Dengel</surname> <given-names>A.</given-names></name></person-group> (<publisher-loc>Wiesbaden</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>221</fpage>&#x02013;<lpage>228</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-658-19567-0_13</pub-id></citation></ref>
<ref id="B153">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wineburg</surname> <given-names>S.</given-names></name> <name><surname>McGrew</surname> <given-names>S.</given-names></name></person-group> (<year>2016</year>). <article-title>Why students can&#x00027;t google their way to the truth: fact-checkers and students approach websites differently</article-title>. <source>Educ. Week</source> <volume>36</volume>, <fpage>22</fpage>&#x02013;<lpage>28</lpage>.</citation></ref>
<ref id="B154">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Wineburg</surname> <given-names>S.</given-names></name> <name><surname>McGrew</surname> <given-names>S.</given-names></name></person-group> (<year>2017</year>). <source>Lateral Reading: Reading Less and Learning More When Evaluating Digital Information (Working Paper)</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://ssrn.com/abstract=3048994">https://ssrn.com/abstract=3048994</ext-link> (accessed July 22, 2018). <pub-id pub-id-type="doi">10.2139/ssrn.3048994</pub-id></citation></ref>
<ref id="B155">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wineburg</surname> <given-names>S.</given-names></name> <name><surname>McGrew</surname> <given-names>S.</given-names></name> <name><surname>Breakstone</surname> <given-names>J.</given-names></name> <name><surname>Ortega</surname> <given-names>T.</given-names></name></person-group> (<year>2016a</year>). <article-title>Evaluating information: the cornerstone of civic online reasoning</article-title>. <source>Stanford Digital Repository</source>.</citation></ref>
<ref id="B156">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Wineburg</surname> <given-names>S.</given-names></name> <name><surname>McGrew</surname> <given-names>S.</given-names></name> <name><surname>Breakstone</surname> <given-names>J.</given-names></name> <name><surname>Ortega</surname> <given-names>T.</given-names></name></person-group> (<year>2016b</year>). <source>Evaluating Information: The Cornerstone of Civic Cnline Ceasoning: Executive summary</source>. <publisher-name>Stanford History Education Group</publisher-name>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://purl.stanford.edu/fv751yt5934">http://purl.stanford.edu/fv751yt5934</ext-link> (accessed June 24, 2020).</citation></ref>
<ref id="B157">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Winter</surname> <given-names>S.</given-names></name> <name><surname>Metzger</surname> <given-names>M. J.</given-names></name> <name><surname>Flanagin</surname> <given-names>A. J.</given-names></name></person-group> (<year>2016</year>). <article-title>Selective use of news cues: a multiple-motive perspective on information selection in social media environments</article-title>. <source>J. Commun</source>. <volume>66</volume>, <fpage>669</fpage>&#x02013;<lpage>693</lpage>. <pub-id pub-id-type="doi">10.1111/jcom.12241</pub-id></citation></ref>
<ref id="B158">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Xie</surname> <given-names>I.</given-names></name></person-group> (<year>2008</year>). <source>Interactive Information Retrieval in Digital Environments</source>. <publisher-loc>Hershey</publisher-loc>: <publisher-name>IGI Global</publisher-name>. <pub-id pub-id-type="doi">10.4018/978-1-59904-240-4</pub-id><pub-id pub-id-type="pmid">31767541</pub-id></citation></ref>
<ref id="B159">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>S.</given-names></name> <name><surname>Duke</surname> <given-names>N. K.</given-names></name></person-group> (<year>2008</year>). <article-title>Strategies for internet reading with different reading purposes: a descriptive study of twelve good internet readers</article-title>. <source>J. Lit. Res</source>. <volume>40</volume>, <fpage>128</fpage>&#x02013;<lpage>162</lpage>. <pub-id pub-id-type="doi">10.1080/10862960802070491</pub-id></citation></ref>
<ref id="B160">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>S.</given-names></name> <name><surname>Duke</surname> <given-names>N. K.</given-names></name> <name><surname>Jim&#x000E9;nez</surname> <given-names>L. M.</given-names></name></person-group> (<year>2011</year>). <article-title>The WWWDOT approach to improving students&#x00027; critical evaluation of websites</article-title>. <source>Reading Teach</source>. <volume>65</volume>, <fpage>150</fpage>&#x02013;<lpage>158</lpage>. <pub-id pub-id-type="doi">10.1002/TRTR.01016</pub-id></citation></ref>
<ref id="B161">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name></person-group> (<year>2020</year>). <source>Frontiers and Advances in Positive Learning in the Age of InformaTiOn (PLATO)</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>. <pub-id pub-id-type="doi">10.1007/978-3-030-26578-6</pub-id></citation></ref>
<ref id="B162">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Beck</surname> <given-names>K.</given-names></name> <name><surname>Fischer</surname> <given-names>J.</given-names></name> <name><surname>Braunheim</surname> <given-names>D.</given-names></name> <name><surname>Schmidt</surname> <given-names>S.</given-names></name> <name><surname>Shavelson</surname> <given-names>R. J.</given-names></name></person-group> (<year>2020a</year>). <article-title>The role of students&#x00027; beliefs when critically reasoning from multiple contradictory sources of information in performance assessments</article-title>. <source>Front. Psychol.</source> <volume>11</volume>:<fpage>2192</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2020.02192</pub-id><pub-id pub-id-type="pmid">33013566</pub-id></citation></ref>
<ref id="B163">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Br&#x000FC;ckner</surname> <given-names>S.</given-names></name> <name><surname>Molerov</surname> <given-names>D.</given-names></name> <name><surname>Bisang</surname> <given-names>W.</given-names></name></person-group> (<year>2020b</year>). <article-title>What can we learn from theoretical considerations and empirical evidence on learning in higher education? Implications for an interdisciplinary research framework</article-title>, in <source>Frontiers and Advances in Positive Learning in the Age of InformaTiOn (PLATO)</source>, ed. <person-group person-group-type="editor"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>), <fpage>287</fpage>&#x02013;<lpage>309</lpage>.</citation></ref>
<ref id="B164">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Dengel</surname> <given-names>A.</given-names></name> <name><surname>Wittum</surname> <given-names>G.</given-names></name></person-group> (<year>2018a</year>). <source>Positive Learning in the Age of Information: A Blessing or a Curse?</source> <publisher-loc>Wiesbaden</publisher-loc>: <publisher-name>Springer VS</publisher-name>. <pub-id pub-id-type="doi">10.1007/978-3-658-19567-0</pub-id></citation></ref>
<ref id="B165">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Schmidt</surname> <given-names>S.</given-names></name> <name><surname>Molerov</surname> <given-names>D.</given-names></name> <name><surname>Shavelson</surname> <given-names>R. J.</given-names></name> <name><surname>Berliner</surname> <given-names>D.</given-names></name></person-group> (<year>2018</year>). <article-title>Conceptual fundamentals for a theoretical and empirical framework of positive learning</article-title>, in <source>Positive Learning in the Age of Information: A Blessing or a Curse?</source>, eds <person-group person-group-type="editor"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Dengel</surname> <given-names>A.</given-names></name> <name><surname>Wittum</surname> <given-names>G.</given-names></name></person-group> (<publisher-loc>Wiesbaden</publisher-loc>: <publisher-name>Springer VS.</publisher-name>), <fpage>29</fpage>&#x02013;<lpage>50</lpage>.</citation></ref>
<ref id="B166">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Shavelson</surname> <given-names>R. J.</given-names></name> <name><surname>Schmidt</surname> <given-names>S.</given-names></name> <name><surname>Beck</surname> <given-names>K.</given-names></name></person-group> (<year>2019</year>). <article-title>On the complementarity of holistic and analytic approaches to performance assessment scoring</article-title>. <source>Br. J. Educ. Psychol</source>. <volume>89</volume>, <fpage>468</fpage>&#x02013;<lpage>484</lpage>. <pub-id pub-id-type="doi">10.1111/bjep.12286</pub-id><pub-id pub-id-type="pmid">31004361</pub-id></citation></ref>
<ref id="B167">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Toepper</surname> <given-names>M.</given-names></name> <name><surname>Molerov</surname> <given-names>D.</given-names></name> <name><surname>Buske</surname> <given-names>R.</given-names></name> <name><surname>Br&#x000FC;ckner</surname> <given-names>S.</given-names></name> <name><surname>Pant</surname> <given-names>H. A.</given-names></name> <etal/></person-group>. (<year>2018b</year>). <article-title>Adapting and validating the collegiate learning assessment to measure generic academic skills of students in Germany: implications for international assessment studies in higher education</article-title>, in <source>Assessment of Learning Outcomes in Higher Education</source>, eds <person-group person-group-type="editor"><name><surname>Zlatkin-Troitschanskaia</surname> <given-names>O.</given-names></name> <name><surname>Toepper</surname> <given-names>M.</given-names></name> <name><surname>Pant</surname> <given-names>H. A.</given-names></name> <name><surname>Lautenbach</surname> <given-names>C.</given-names></name> <name><surname>Kuhn</surname> <given-names>C.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>), <fpage>245</fpage>&#x02013;<lpage>266</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-74338-7_12</pub-id></citation></ref>
<ref id="B168">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Zumbo</surname> <given-names>B. D.</given-names></name> <name><surname>Hubley</surname> <given-names>A. M.</given-names></name></person-group> (<year>2017</year>). <article-title>Understanding and Investigating Response. Processes</article-title> in <source>Validation Research</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>, <fpage>69</fpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-56129-5</pub-id></citation></ref>
<ref id="B169">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zylka</surname> <given-names>J.</given-names></name> <name><surname>Christoph</surname> <given-names>G.</given-names></name> <name><surname>Kr&#x000F6;hne</surname> <given-names>U.</given-names></name> <name><surname>Hartig</surname> <given-names>J.</given-names></name> <name><surname>Goldhammer</surname> <given-names>F.</given-names></name></person-group> (<year>2015</year>). <article-title>Moving beyond cognitive elements of ICT literacy. First evidence on the structure of ICT engagement</article-title>. <source>Comput. Hum. Behav</source>. <volume>53</volume>, <fpage>149</fpage>&#x02013;<lpage>160</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2015.07.008</pub-id></citation></ref>
</ref-list>
<fn-group>
<fn id="fn0001"><p><sup>1</sup>In this study, we focused on misinformation. Misinformation may result from (often unintentional) error, lacking quality assurance, and lacking truth commitment, while disinformation may be spread purposefully due to vested (e.g., business-related, political, ideological, and potentially hidden) interests of stakeholders (Metzger, <xref ref-type="bibr" rid="B94">2007</xref>; Karlova and Fisher, <xref ref-type="bibr" rid="B71">2013</xref>).</p></fn>
<fn id="fn0002"><p><sup>2</sup>We focused on inquiry-based learning using the Internet, information problem solving, and integration of information from multiple sources (Zhang and Duke, <xref ref-type="bibr" rid="B159">2008</xref>; List and Alexander, <xref ref-type="bibr" rid="B81">2017</xref>) in the context of university studies, although the critical evaluation of information when acquiring knowledge while using the Internet for other purposes, such as for entertainment, is important as well.</p></fn>
<fn id="fn0003"><p><sup>3</sup>Regulation of COR may be performed deliberately using meta-cognition, or in response to a cognitive process outcome, habitual behavior, processing of environmental cues, affective or motivational state.</p></fn>
<fn id="fn0004"><p><sup>4</sup>The German CORA project is part of the cross-university PLATO research program, which examines higher education students&#x00027; Internet-supported learning for the acquisition of warranted knowledge from various disciplinary perspectives (for an overview, see Zlatkin-Troitschanskaia et al., <xref ref-type="bibr" rid="B164">2018a</xref>; Zlatkin-Troitschanskaia, <xref ref-type="bibr" rid="B161">2020</xref>).</p></fn>
</fn-group>
<fn-group>
<fn fn-type="financial-disclosure"><p><bold>Funding.</bold> This study was part of the PLATO program, funded by the Rhine-Main Universities fund. Open access publication was supported by the German Research Foundation (DFG) and the Open Access Publication Fund of Humboldt-Universit&#x000E4;t zu Berlin.</p></fn>
</fn-group>
</back>
</article>