<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="2.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Comput. Sci.</journal-id>
<journal-title>Frontiers in Computer Science</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Comput. Sci.</abbrev-journal-title>
<issn pub-type="epub">2624-9898</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fcomp.2023.1253166</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Computer Science</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>User experience with disinformation-countering tools: usability challenges and suggestions for improvement</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Nault</surname>
<given-names>Kimberley</given-names>
</name>
<xref rid="c001" ref-type="corresp"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/2367394/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Ruhi</surname>
<given-names>Umar</given-names>
</name>
<uri xlink:href="https://loop.frontiersin.org/people/2368245/overview"/>
</contrib>
</contrib-group>
<aff><institution>Telfer School of Management, University of Ottawa</institution>, <addr-line>Ottawa, ON</addr-line>, <country>Canada</country></aff>
<author-notes>
<fn id="fn0001" fn-type="edited-by"><p>Edited by: Michele Sorice, Guido Carli Free International University for Social Studies, Italy</p></fn>
<fn id="fn0002" fn-type="edited-by"><p>Reviewed by: Donatella Selva, University of Florence, Italy; Mattia Zunino, Guido Carli Free International University for Social Studies, Italy</p></fn>
<corresp id="c001">&#x002A;Correspondence: Kimberley Nault, <email>kimberley.nault@uottawa.ca</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>02</day>
<month>10</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="collection">
<year>2023</year>
</pub-date>
<volume>5</volume>
<elocation-id>1253166</elocation-id>
<history>
<date date-type="received">
<day>04</day>
<month>07</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>11</day>
<month>09</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2023 Nault and Ruhi.</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Nault and Ruhi</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>Digital media has facilitated information spread and simultaneously opened a gateway for the distribution of disinformation. Websites and browser extensions have been put forth to mitigate its harm; however, there is a lack of research exploring their efficacy and user experiences. To address this gap, we conducted a usability evaluation of two websites and three browser extensions. Using a mixed methods approach, data from a heuristic evaluation and a moderated, task-based usability evaluation are analyzed in triangulation with data collected using summative evaluations. Challenges are identified to stem from users&#x2019; inability to understand results due to the presentation of information, unclear terminology, or lack of explanations. As a solution, we recommend four design principles: First is to establish credibility, second is to improve the general visual layout and design of the tools, third is to improve search capabilities, and finally, heavy importance should be given to the depth and presentation of information.</p>
</abstract>
<kwd-group>
<kwd>digital disinformation</kwd>
<kwd>misinformation</kwd>
<kwd>disinformation countering</kwd>
<kwd>information verification</kwd>
<kwd>usability</kwd>
<kwd>user experience</kwd>
</kwd-group>
<contract-num rid="cn1">1340696</contract-num>
<contract-sponsor id="cn1">Canadian Heritage<named-content content-type="fundref-id">10.13039/501100000017</named-content></contract-sponsor>
<counts>
<fig-count count="9"/>
<table-count count="6"/>
<equation-count count="0"/>
<ref-count count="67"/>
<page-count count="16"/>
<word-count count="10739"/>
</counts>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Human-Media Interaction</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<label>1.</label>
<title>Introduction</title>
<p>The spread of false information is not a new phenomenon. Originally spread via word of mouth and newsprint, falsified claims have a history of infiltrating public discourse (<xref ref-type="bibr" rid="ref54">Posetti and Matthews, 2018</xref>; <xref ref-type="bibr" rid="ref21">Hamilton, 2021</xref>), with the purpose for its distribution influenced by varying sociological and psychological factors (<xref ref-type="bibr" rid="ref27">Islam et al., 2020</xref>; <xref ref-type="bibr" rid="ref38">Levak, 2021</xref>). Historically, division was sown by corrupt politicians to gain power, targeting marginalized communities, fear-mongering, and fueling mistrust for the benefit of the elite. Similar purposes remain, however, with the dawn of the internet and social media, disinformation is distributed on a global scale (<xref ref-type="bibr" rid="ref20">Guille, 2013</xref>) to benefit a few financially or politically while wreaking havoc on many (<xref ref-type="bibr" rid="ref15">Glenski et al., 2018</xref>; <xref ref-type="bibr" rid="ref38">Levak, 2021</xref>). It is particularly of risk to security and public health (<xref ref-type="bibr" rid="ref17">Grado&#x0144; et al., 2021</xref>; <xref ref-type="bibr" rid="ref44">Mehta et al., 2021</xref>).</p>
<p>While the use of technology, algorithms, natural platform amplification, tracking, and targeting are used by big tech (<xref ref-type="bibr" rid="ref60">Spohr, 2017</xref>; <xref ref-type="bibr" rid="ref19">Grimme et al., 2020</xref>) unmaliciously to promote customer engagement and commercialization of many aspects of the internet, it has also been used to incentivize the draw of users&#x2019; attention through lies and sensational headlines. Put simply, better user engagement equals higher financial gain for authors and publishers. The commercialization of the news media industry has had especially devastating impacts due to the subsequent loss of credibility and trust in well-known publications. Biased headlines, erroneous information, and unverifiable information spread by major news outlets have resulted in a decreased reliability of news outlets for many citizens (<xref ref-type="bibr" rid="ref52">Plasser, 2005</xref>). Simultaneously, technologies are used to intentionally deceive the public through deepfakes (<xref ref-type="bibr" rid="ref64">Vizoso et al., 2021</xref>) and the spread of other forms of disinformation (<xref ref-type="bibr" rid="ref24">Himelein-Wachowiak et al., 2021</xref>; <xref ref-type="bibr" rid="ref26">Innes et al., 2021</xref>; <xref ref-type="bibr" rid="ref58">Rodr&#x00ED;guez-Virgili et al., 2021</xref>). With the recent release of ChatGPT, new concerns have been raised about the use of generative artificial intelligence and large language models to create false content that cannot be detected by average users (<xref ref-type="bibr" rid="ref16">Goldstein et al., 2023</xref>).</p>
<p>Reflecting the numerous forms and intentions behind the creation and spread of false information, multiple terms are utilized in society (<xref ref-type="bibr" rid="ref11">Froehlich, 2017</xref>; <xref ref-type="bibr" rid="ref10">Flores-Saviaga and Savage, 2019</xref>; <xref ref-type="bibr" rid="ref51">Pierre, 2020</xref>). One type is misinformation, where false information is spread without the intent to harm, usually because of carelessness or cognitive biases (<xref ref-type="bibr" rid="ref65">Wardle and Derakhshan, 2017</xref>; <xref ref-type="bibr" rid="ref33">Kumar and Shah, 2018</xref>; <xref ref-type="bibr" rid="ref42">Mayorga et al., 2020</xref>; <xref ref-type="bibr" rid="ref43">Meel and Vishwakarma, 2020</xref>). Forms of misinformation can include but are not limited to pseudoscience or satire. Alternatively, disinformation refers to knowingly false or incorrect information that is spread with deliberate intent to harm or deceive (<xref ref-type="bibr" rid="ref9">Fallis, 2015</xref>; <xref ref-type="bibr" rid="ref65">Wardle and Derakhshan, 2017</xref>; <xref ref-type="bibr" rid="ref33">Kumar and Shah, 2018</xref>; <xref ref-type="bibr" rid="ref42">Mayorga et al., 2020</xref>; <xref ref-type="bibr" rid="ref43">Meel and Vishwakarma, 2020</xref>; <xref ref-type="bibr" rid="ref30">Kapantai et al., 2021</xref>). Examples include false news, conspiracy theories, propaganda, clickbait, and deepfake videos of politicians and celebrities edited to appear as though they are making statements that they have not made (<xref ref-type="bibr" rid="ref26">Innes et al., 2021</xref>; <xref ref-type="bibr" rid="ref64">Vizoso et al., 2021</xref>). While less commonly known, malinformation defines the use of genuine or true information deliberately manipulated or taken out of context with the intent to deceive and cause harm (<xref ref-type="bibr" rid="ref65">Wardle and Derakhshan, 2017</xref>; <xref ref-type="bibr" rid="ref42">Mayorga et al., 2020</xref>; <xref ref-type="bibr" rid="ref25">Hinsley and Holton, 2021</xref>). Such cases represent forms of harassment, leaks, and hate speech (<xref ref-type="bibr" rid="ref65">Wardle and Derakhshan, 2017</xref>). To emphasize the high level of information distortion and significant challenges with establishing the veracity of information, many researchers refer to the current issues related to misinformation, disinformation, and malinformation as information disorders (<xref ref-type="bibr" rid="ref65">Wardle and Derakhshan, 2017</xref>; <xref ref-type="bibr" rid="ref12">Gaeta et al., 2023</xref>). For purposes of this article, we adopt the term disinformation in a similar broad context of information disorder, irrespective of the information creator&#x2019;s intent.</p>
<p>To identify and counter the spread of digital disinformation, tools have been developed by private sector companies, non-profit organizations, and civil society organizations. These tools range from websites powered by human fact-checkers to verify the accuracy of information, to bot and spam detection tools that can identify automated bot activity on social media, to automated artificial intelligence applications that can detect and label disinformation (<xref ref-type="bibr" rid="ref53">Pomputius, 2019</xref>: <xref ref-type="bibr" rid="ref56">RAND Corporation, n.d.</xref>). These tools help information consumers navigate today&#x2019;s challenging information environment by separating reliable information sources from false or misleading information to help consumers evaluate information and make more informed decisions (<xref ref-type="bibr" rid="ref16">Goldstein et al., 2023</xref>). While the advent of disinformation-countering tools shows promise (<xref ref-type="bibr" rid="ref45">Morris et al., 2020</xref>; <xref ref-type="bibr" rid="ref37">Lee, 2022</xref>), there is a dearth of academic and industry research on the efficacy of these tools, both in terms of their functionality and usability. As such, several calls have been made for their assessment from both academic and practitioner communities (<xref ref-type="bibr" rid="ref65">Wardle and Derakhshan, 2017</xref>; <xref ref-type="bibr" rid="ref29">Kanozia, 2019</xref>; <xref ref-type="bibr" rid="ref55">RAND Corporation, 2020</xref>).</p>
<p>To explore the efficacy of disinformation-countering tools, we refer to the field of user experience (UX), which, simply put, focuses on how something works and what contributes to its success (<xref ref-type="bibr" rid="ref14">Garrett, 2010</xref>). More specifically, the field of UX assesses users&#x2019; behaviors and sentiments while using a product or service (<xref ref-type="bibr" rid="ref23">Hassenzahl and Tractinsky, 2006</xref>; <xref ref-type="bibr" rid="ref35">Law et al., 2009</xref>) and includes all emotions, beliefs, physical and psychological responses, behaviors, and performances experienced before, during, and after using a product or service (<xref ref-type="bibr" rid="ref62">Technical Committee ISO/TC 159, 2019</xref>). The aspects considered are &#x201C;&#x2026;influenced by the system structure, the user and context of use&#x201D; (<xref ref-type="bibr" rid="ref62">Technical Committee ISO/TC 159, 2019</xref>, 43). Among the techniques for UX assessment, usability evaluations are used to assess the &#x201C;holistic experience&#x201D; (<xref ref-type="bibr" rid="ref59">Rosenzweig, 2015</xref>, 7) of the user and to identify any areas of weakness. To assess usability, the effectiveness, efficiency, and extent to which a user is satisfied should be assessed (<xref ref-type="bibr" rid="ref62">Technical Committee ISO/TC 159, 2019</xref>).</p>
<p>To address the lack of research on disinformation-countering tools, we select several tools and carry out an exploratory usability evaluation to assess their efficacy in addressing digital disinformation. Specifically, the objectives of our usability evaluation are to:</p>
<list list-type="bullet">
<list-item><p>Identify common user experience challenges faced by different types of users while utilizing online disinformation-countering tools.</p></list-item>
<list-item><p>Formulate recommendations for an optimized creation of disinformation-countering tools for users with varying levels of technological competence to improve their resilience to disinformation.</p></list-item>
</list>
</sec>
<sec sec-type="materials|methods" id="sec2">
<label>2.</label>
<title>Materials and methods</title>
<p>For our exploratory usability evaluation, as per recommendations for using multiple methods of data collection in usability evaluations (<xref ref-type="bibr" rid="ref18">Gray and Salzman, 1998</xref>; <xref ref-type="bibr" rid="ref22">Hartson et al., 2003</xref>; <xref ref-type="bibr" rid="ref36">Lazar et al., 2017</xref>), and particularly as an exploratory study, it was intended that each of the methods utilized will contribute toward a thorough discovery of users&#x2019; experiences and any usability problems. Moreover, using a mixed methods approach &#x201C;&#x2026;can provide rich data that can identify the big picture issues, patterns, and more detailed findings for specific issues&#x201D; (<xref ref-type="bibr" rid="ref59">Rosenzweig, 2015</xref>, 145). A further benefit of data collection utilizing multiple methods is that when analyzed in triangulation, the reliability of findings is enhanced (<xref ref-type="bibr" rid="ref36">Lazar et al., 2017</xref>).</p>
<p>To elaborate on each of the methods adopted, the following sub-sections separately discuss each method of data collection and analysis.</p>
<sec id="sec3">
<label>2.1.</label>
<title>Heuristic evaluations</title>
<p>Carried out by experts, heuristic evaluations assess components of a product or service, comparing it against best practices to produce a rating and recommendations, if necessary (<xref ref-type="bibr" rid="ref59">Rosenzweig, 2015</xref>). While not an in-depth form of evaluation, usability heuristics provide a quick assessment of an interface. To conduct the heuristic evaluations, the recommended approach when using it alongside other methods of data collection is to conduct it early in the research process (<xref ref-type="bibr" rid="ref28">Jeffries and Desurvire, 1992</xref>). Thus, as a first step, research team members (<italic>n</italic>&#x2009;=&#x2009;4) individually assessed each tool using established heuristics (<xref ref-type="bibr" rid="ref47">Nielsen, 1994</xref>; <xref ref-type="bibr" rid="ref34">Law and Hvannberg, 2004</xref>). In cases of disagreement in assessment, tools are revisited to reach a mutually agreed upon severity rating. Further cases of disagreement result in the mean severity rating being taken as the final rating. With guidelines recommending three to four evaluators to increase the reliability of the mean severity rating (<xref ref-type="bibr" rid="ref47">Nielsen, 1994</xref>), our use of four evaluators meets these criteria.</p>
</sec>
<sec id="sec4">
<label>2.2.</label>
<title>User testing</title>
<p>To facilitate the testing of software tools through potential scenarios that are typically encountered by end users, black-box software testing methods (<xref ref-type="bibr" rid="ref46">Nidhra, 2012</xref>) using a task-based approach are used to assess how a user would interact with digital disinformation-countering tools using a real-life situation (<xref ref-type="bibr" rid="ref59">Rosenzweig, 2015</xref>). This approach assists in the assessment of the overall efficacy of disinformation-countering tools to meet the contextual, technical, and cognitive needs of individuals using them as part of their daily information consumption activities. Remote-moderated testing using a think-aloud protocol was selected as it provides for direct observation of user experiences, note-taking, asking clarifying questions, and assisting if an explanation is needed (<xref ref-type="bibr" rid="ref59">Rosenzweig, 2015</xref>; <xref ref-type="bibr" rid="ref57">Riihiaho, 2017</xref>; <xref ref-type="bibr" rid="ref40">Lewis and Sauro, 2021</xref>). We use the platform Loop11 to facilitate the sessions as it prompts scenarios and tasks while recording participants&#x2019; screens and audio.</p>
<p>Before conducting the usability evaluation with the main participants, moderators (<italic>n</italic>&#x2009;=&#x2009;2) created an evaluation script for use during evaluations. A pilot study with four participants identified deficiencies in scenarios and questions. Modifications were made according to feedback.</p>
</sec>
<sec id="sec5">
<label>2.3.</label>
<title>Summative evaluation</title>
<sec id="sec6">
<label>2.3.1.</label>
<title>SUS questionnaire</title>
<p>System Usability Scale (SUS) is a questionnaire using a Likert scale rating to provide an overall assessment of the usability of a product or service (<xref ref-type="bibr" rid="ref3">Brooke, 1996</xref>). The benefit of using the SUS is that while it provides a quick method of evaluating users&#x2019; opinions across 10 questions, the questions form a comprehensive assessment of various areas that contribute toward the effectiveness and efficiency in carrying out its intended use. Questions also address users&#x2019; overall satisfaction experienced while using the tool, while limiting the frustrations of lengthy evaluations (<xref ref-type="bibr" rid="ref3">Brooke, 1996</xref>). Moreover, the SUS is flexible, in that it can be used to assess a variety of applications, with high reliability and validity (<xref ref-type="bibr" rid="ref39">Lewis, 2018</xref>).</p>
<p>To reduce the length of the evaluation and the cognitive burden of completing multiple tasks and questions, only five questions relevant to the tools and objectives of our study were included. Past research has indicated that the exclusion of questions does not affect the final score, as long as the adjustment is made during result calculations (<xref ref-type="bibr" rid="ref39">Lewis, 2018</xref>).</p>
</sec>
<sec id="sec7">
<label>2.3.2.</label>
<title>Multiple choice questions</title>
<p>As a method to quickly gain participants&#x2019; opinions (<xref ref-type="bibr" rid="ref50">Patten, 2016</xref>), multiple choice questionnaires are used after user testing (<xref ref-type="bibr" rid="ref7">De Kock et al., 2009</xref>). While they have a limitation of only providing a brief overview of participants&#x2019; opinions (<xref ref-type="bibr" rid="ref50">Patten, 2016</xref>), used alongside other data collected, it can help further explore their experiences.</p>
<p>Accordingly, upon completion of tool evaluation using the previously mentioned methods, several multiple choice questions are asked to identify which tool appears to be most up-to-date, the easiest to use, and most likely to use in the future.</p>
</sec>
</sec>
<sec id="sec8">
<label>2.4.</label>
<title>Participants</title>
<p>While conducting research into the success of information systems, it is recommended to consider the technical abilities of the users (<xref ref-type="bibr" rid="ref66">Weigel and Hazen, 2014</xref>). Thus, considering our intent to explore the usability of digital tools to represent users with varying technical proficiency, we establish three categories of technical capability, &#x201C;beginner,&#x201D; &#x201C;intermediate,&#x201D; or &#x201C;advanced&#x201D; information technology users. Selected participants self-identified according to the high-level definition provided.</p>
<p>To determine a representative number of participants, we refer to the opinion that 5&#x2013;8 people can find most of the usability issues for qualitative evaluations (<xref ref-type="bibr" rid="ref49">Nielsen and Landauer, 1993</xref>; <xref ref-type="bibr" rid="ref59">Rosenzweig, 2015</xref>), whereas qualitative survey evaluations are recommended to have a minimum of 20 participants for a statistically representative sample (<xref ref-type="bibr" rid="ref59">Rosenzweig, 2015</xref>). Thus, we aimed to have 15&#x2013;20 participants. A call for participation was shared with peers and publicly posted on networking and social media platforms to solicit participants. Those interested were asked to complete an online form with their name, email, and level of technical competence.</p>
<p>Using purposive sampling, we ensured that the minimum requirement for each persona was fulfilled (<xref ref-type="bibr" rid="ref61">Tashakkori and Teddlie, 2003</xref>). Moreover, to seek heterogeneity in the final sample and maximize the generalizability of the results, participants of varying age and education levels were preferred (<xref ref-type="bibr" rid="ref40">Lewis and Sauro, 2021</xref>). As compensation, a $40 participant-selected Amazon or Starbucks gift card was given to each participant. Eighteen participants took part in the usability evaluation, and their demographics are provided in <xref rid="tab1" ref-type="table">Table 1</xref>.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption><p>Summary of participant demographics.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Participant demographics</th>
<th align="center" valign="top">Total</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Technical capability</td>
<td/>
</tr>
<tr>
<td align="left" valign="top">&#x2003;Beginner (B)</td>
<td align="center" valign="top">6</td>
</tr>
<tr>
<td align="left" valign="top">&#x2003;Intermediate (I)</td>
<td align="center" valign="top">9</td>
</tr>
<tr>
<td align="left" valign="top">&#x2003;Advanced (A)</td>
<td align="center" valign="top">5</td>
</tr>
<tr>
<td align="left" valign="top">Age</td>
<td/>
</tr>
<tr>
<td align="left" valign="top">&#x2003;18&#x2013;24</td>
<td align="center" valign="top">8</td>
</tr>
<tr>
<td align="left" valign="top">&#x2003;25&#x2013;34</td>
<td align="center" valign="top">6</td>
</tr>
<tr>
<td align="left" valign="top">&#x2003;35&#x2013;44</td>
<td align="center" valign="top">3</td>
</tr>
<tr>
<td align="left" valign="top">&#x2003;45&#x2013;54</td>
<td align="center" valign="top">1</td>
</tr>
<tr>
<td align="left" valign="top">Completed education</td>
<td/>
</tr>
<tr>
<td align="left" valign="top">&#x2003;High school</td>
<td align="center" valign="top">5</td>
</tr>
<tr>
<td align="left" valign="top">&#x2003;College</td>
<td align="center" valign="top">3</td>
</tr>
<tr>
<td align="left" valign="top">&#x2003;Undergraduate</td>
<td align="center" valign="top">5</td>
</tr>
<tr>
<td align="left" valign="top">&#x2003;Graduate</td>
<td align="center" valign="top">5</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec9">
<label>2.5.</label>
<title>Tasks and scenarios</title>
<p>To represent real-life situations, scenario-based tasks were used to uncover potential issues experienced while information credibility checking. As summarized in <xref rid="tab2" ref-type="table">Table 2</xref>, three articles were used for fact-checking and were selected based on the diverse forms of disinformation that individuals could be subjected to in their daily lives, either through social media posts or received from friends or family. As news with sensational headlines is most likely to be accessed and shared (<xref ref-type="bibr" rid="ref4">Burkhardt, 2017</xref>), articles with such headlines were selected. They include Chinese Herb Kills Cancer Cells (pseudoscience), Biggest Lie in World History: There Never Was A Pandemic (conspiracy theory), and Hairdresser Arrested for Making Voodoo Dolls from Customers&#x2019; Hair (satire).</p>
<table-wrap position="float" id="tab2">
<label>Table 2</label>
<caption><p>Overview of tools and scenarios.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top" colspan="3">Scenarios</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Pseudoscience</td>
<td align="left" valign="top">Chinese herb kills cancer cells&#x2014;new study finds (<xref ref-type="bibr" rid="ref6">David Wolfe, 2021</xref>).</td>
<td align="left" valign="top">Article reports that scientists have discovered that a Chinese herb &#x201C;lei gong teng&#x201D; can kill cancer cells and is an alternative cancer treatment.</td>
</tr>
<tr>
<td align="left" valign="top">Conspiracy theory</td>
<td align="left" valign="top">Biggest lie in world history: There never was a pandemic. The database is flawed. The COVID mandates including the vaccine are invalid (<xref ref-type="bibr" rid="ref5">Chossudovsky, 2022</xref>).</td>
<td align="left" valign="top">The author compiled quotes and data to support their claims of the COVID pandemic being a &#x201C;lie.&#x201D;</td>
</tr>
<tr>
<td align="left" valign="top">Satire</td>
<td align="left" valign="top">Hairdresser arrested for making voodoo dolls from customers&#x2019; hair (<xref ref-type="bibr" rid="ref67">World News Daily Report, n.d.</xref>).</td>
<td align="left" valign="top">Written in a news article format, it is claimed that an individual had been arrested for making voodoo dolls out of his customers&#x2019; hair to perform black magic on them.</td>
</tr>
<tr>
<td align="left" valign="top" colspan="3">Tools</td>
</tr>
<tr>
<td align="left" valign="top">Category</td>
<td align="left" valign="top">Source</td>
<td align="left" valign="top">Summary</td>
</tr>
<tr>
<td align="left" valign="top">Website</td>
<td align="left" valign="top">MediaBias/FactCheck (MBFC-W)</td>
<td align="left" valign="top">Users can verify information using the topic or media source.</td>
</tr>
<tr>
<td align="left" valign="top">Website</td>
<td align="left" valign="top">Isthiscredible (ITC-W)</td>
<td align="left" valign="top">Users can verify information using a website URL or a topic search.</td>
</tr>
<tr>
<td align="left" valign="top">Browser extensions</td>
<td align="left" valign="top">The Newsroom (TNR-E)</td>
<td align="left" valign="top">The Newsroom&#x2019; is a beta version, that verifies information via an icon that appears on the top left side of the screen when a user scrolls through a website (<xref rid="fig1" ref-type="fig">Figure 1</xref>). Once the user hovers over the icon, a box appears with a source and political bias score, a summary of the source, website history, and ownership.</td>
</tr>
<tr>
<td align="left" valign="top">Browser extensions</td>
<td align="left" valign="top">Newstrition (NT-E)</td>
<td align="left" valign="top">&#x201C;Newstrition&#x201D; (<xref rid="fig2" ref-type="fig">Figure 2</xref>) provides a warning banner across the screen of &#x201C;problematic&#x201D; sources, an extension window that can be opened for additional information, as well as a website that can be visited for further information.</td>
</tr>
<tr>
<td align="left" valign="top">Browser extensions</td>
<td align="left" valign="top">MediaBias/FactCheck-Extension (MBFC-E)</td>
<td align="left" valign="top">The extension (<xref rid="fig3" ref-type="fig">Figure 3</xref>) provides a text box with an overall website rating and an option for further reading.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>We chose to use browser extensions and stand-alone websites to investigate different modalities of use for countering disinformation, as well as to ascertain user preferences and the functional efficacy of each style of tool. Based on our initial testing, three browser extensions and two websites were selected (<xref rid="tab2" ref-type="table">Table 2</xref>; <xref rid="fig1" ref-type="fig">Figures 1</xref>&#x2013;<xref rid="fig3" ref-type="fig">3</xref>).</p>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption><p>Screenshot of &#x201C;The Newsroom&#x201D; browser extension.</p></caption>
<graphic xlink:href="fcomp-05-1253166-g001.tif"/>
</fig>
<fig position="float" id="fig2">
<label>Figure 2</label>
<caption><p>Screenshot of &#x201C;Newstrition&#x201D; browser extension.</p></caption>
<graphic xlink:href="fcomp-05-1253166-g002.tif"/>
</fig>
<fig position="float" id="fig3">
<label>Figure 3</label>
<caption><p>Screenshot of &#x201C;MediaBias/FactCheck&#x201D; browser extension.</p></caption>
<graphic xlink:href="fcomp-05-1253166-g003.tif"/>
</fig>
</sec>
<sec id="sec10">
<label>2.6.</label>
<title>Protocol</title>
<p>Participants first met via Zoom to receive information on the study and tasks to be completed. Once agreed, participants electronically signed the consent form and returned it to the moderator via email. Upon receipt, the evaluation was carried out in Loop11.</p>
<p>Participants began by answering several demographic questions (5&#x2009;min), followed by the tasks (30&#x2013;45&#x2009;min). To validate claims made within the identified articles, participants first visited selected websites, followed by the browser extensions. As the browser extensions require additional steps for installation, participants were instructed to install the extension and had an opportunity to review any developer-provided information guides. Participants then opened identified articles to assess how the extension interacts with the website and/or authenticates information.</p>
<p>Upon completion of tasks for each tool, summative questions were asked to collect participants&#x2019; final opinions, which included the shortened SUS (5&#x2009;min) and multiple choice questions (5&#x2009;min). Debriefings were held via Zoom to thank participants and answer final questions.</p>
<p>To analyze the task-based usability evaluation data, thematic content analysis was used to identify ideas, patterns, or trends (<xref ref-type="bibr" rid="ref31">Krippendorff, 2012</xref>, <xref ref-type="bibr" rid="ref32">2018</xref>). Extracted data were then quantified for quasi-statistical consideration to demonstrate the frequency of occurrence (<xref ref-type="bibr" rid="ref2">Becker, 1970</xref>). Results of the quantitative questions collected in Loop11 are to be exported to Excel for analysis. SUS questionnaire results are to be analyzed using a programmed spreadsheet (<xref ref-type="bibr" rid="ref8">Excel Spreadsheet for Calculating SUS Scores, 2008</xref>) and then represented using adjective-based scoring to facilitate understanding (<xref ref-type="bibr" rid="ref1">Bangor et al., 2008</xref>).</p>
</sec>
</sec>
<sec sec-type="results" id="sec11">
<label>3.</label>
<title>Results</title>
<p>As our first research objective is to identify common challenges faced by users of varying technical proficiency, in this section, we will present the results and findings from our methods of evaluation.</p>
<sec id="sec12">
<label>3.1.</label>
<title>Heuristic evaluation</title>
<p>As highlighted in <xref rid="tab3" ref-type="table">Table 3</xref>, a numeric score ranging from zero, where no issues were found, to four, which represents a severe issue, was assigned for each heuristic. Considering the severity of ratings, the poorest performing heuristic is the lack of help and documentation, followed by a lack of match between the system and the real world. The third worst-rated heuristic is a tie between the visibility of system status and consistency and standards.</p>
<table-wrap position="float" id="tab3">
<label>Table 3</label>
<caption><p>Results of heuristic evaluation&#x2014;websites and browser extensions.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Heuristic</th>
<th align="center" valign="top">MBFC-W</th>
<th align="center" valign="top">ITC-W</th>
<th align="center" valign="top">TNR-E</th>
<th align="center" valign="top">NT-E</th>
<th align="center" valign="top">MBFC-E</th>
<th align="center" valign="top">Total</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Visibility of system status</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">4</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top"><bold>12</bold></td>
</tr>
<tr>
<td align="left" valign="top">Match between the system and the real world</td>
<td align="center" valign="top">4</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top"><bold>14</bold></td>
</tr>
<tr>
<td align="left" valign="top">User control and freedom</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top">1</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top"><bold>5</bold></td>
</tr>
<tr>
<td align="left" valign="top">Consistency and standards</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">4</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top"><bold>12</bold></td>
</tr>
<tr>
<td align="left" valign="top">Error prevention</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top"><bold>7</bold></td>
</tr>
<tr>
<td align="left" valign="top">Recognition rather than recall</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top"><bold>11</bold></td>
</tr>
<tr>
<td align="left" valign="top">Flexibility and efficiency of use</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top"><bold>0</bold></td>
</tr>
<tr>
<td align="left" valign="top">Esthetic and minimalist design</td>
<td align="center" valign="top">4</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top"><bold>7</bold></td>
</tr>
<tr>
<td align="left" valign="top">Help users recognize, diagnose, and recover from errors</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top"><bold>5</bold></td>
</tr>
<tr>
<td align="left" valign="top">Help and documentation</td>
<td align="center" valign="top">4</td>
<td align="center" valign="top">4</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">4</td>
<td align="center" valign="top">1</td>
<td align="center" valign="top"><bold>16</bold></td>
</tr>
<tr>
<td align="left" valign="top">Total per tool</td>
<td align="center" valign="top"><bold>22</bold></td>
<td align="center" valign="top"><bold>11</bold></td>
<td align="center" valign="top"><bold>14</bold></td>
<td align="center" valign="top"><bold>25</bold></td>
<td align="center" valign="top"><bold>17</bold></td>
<td/>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>0&#x2009;=&#x2009;No Issues, 4&#x2009;=&#x2009;Severe Issue.</p>
</table-wrap-foot>
</table-wrap>
<p>To elaborate on the lack of help, while some tools have some form of &#x201C;faq,&#x201D; &#x201C;how it works,&#x201D; or an overview of the extension, <xref rid="tab3" ref-type="table">Table 3</xref> shows that apart from MBFC-E, the tools have little support on how to use it. Considering the lack of match between the system and the real world, all tools had poorly represented information and had an insufficient explanation of what terms meant, leading to confusion. The visibility of system status was rated poorly across all but the ITC-W, due to either a lack of knowing how to open the extension or whether a search is being executed when queries are entered. Finally, except for TNR-E, the lack of consistency and standards was rated poorly again across tools due to their lack of consistency in the terms used and forms of interaction. While the tools should reduce user&#x2019;s cognitive load by being designed in a way that users are familiar with, and are intuitive (<xref ref-type="bibr" rid="ref48">Nielsen, 2020</xref>), most tools were not designed in a way that is easy to understand, particularly when receiving results.</p>
<p>Considering ITC-W has the lowest overall severity ratings, it may suggest that the website is a more user-friendly tool than the others, potentially indicating that it may provide a more appreciable experience and may be a better option for disinformation-countering. Nevertheless, with the severity rankings being high across several tools, this suggests serious deficiencies, which may hinder their use. Acknowledging the importance of these tools and the need for amplifying their use to circumvent the harms of disinformation, it is evident that improvements are required.</p>
</sec>
<sec id="sec13">
<label>3.2.</label>
<title>User testing</title>
<p>Given that a major aspect of user experience relates to users&#x2019; overall satisfaction and how efficiently tasks can be performed, we collected participants&#x2019; feedback and challenges experienced while attempting to verify claims made within the articles provided.</p>
<p>Upon analysis of the data collected, it became evident that the challenges experienced were concentrated across four main categories, including, issues related to the design of the interface, how to verify information, receiving results, and then understanding the results received. Each of these will be discussed, with a sample of participant commentary highlighted in <xref rid="tab4" ref-type="table">Table 4</xref>.</p>
<table-wrap position="float" id="tab4">
<label>Table 4</label>
<caption><p>Representative quotes from participants.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Usability challenge</th>
<th align="left" valign="top">Example of comments</th>
</tr>
<tr>
<th align="left" valign="top">Interface</th>
<th align="left" valign="top"/>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Too much content</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>MBFC-W: &#x201C;<italic>the layout is distracting. The news ticker that has changing headlines diverts my attention</italic>&#x201D; [P2].</p></list-item>
<list-item><p>MBFC-W: &#x201C;<italic>the website is crowded</italic>&#x201D; [P24].</p></list-item>
<list-item><p>MBFC-W: &#x201C;<italic>I know people need to make money to eat but it&#x2019;s a fact check website; they should not have all these ads</italic>&#x201D; [P7].</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Tool does not appear trustworthy</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>MBFC-W: &#x201C;the <italic>website looks sketchy</italic>&#x201D; [P3].</p></list-item>
<list-item><p>MBFC-W: &#x201C;<italic>&#x2026;it had a lot of ads and pop ups, so it does not seem very legitimate</italic>&#x201D; [P16].</p></list-item>
<list-item><p>MBFC-W: &#x201C;<italic>it does not seem wholly credible either</italic>&#x201D; [P12].</p></list-item>
<list-item><p>MBFC-W: &#x201C;<italic>I think calling a website quackery, makes this fact checker seem less credible because that shows me bias on its own</italic>&#x201D; [P14].</p></list-item>
<list-item><p>NT-E: &#x201C;<italic>well this one itself looks a bit sketchy&#x2014;I do not like the sign up, it looks like it&#x2019;s trying to sell me something. I also do not like the ads. It does not look legitimate. If I opened this, I would not think it was legitimate and would go back to the website</italic>&#x201D; [P5].</p></list-item>
<list-item><p>NT-E: &#x201C;<italic>sign(ing) in for more information or subscribing to receive information seems like a bit much</italic>&#x201D; [P16].</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Verifying information</td>
<td/>
</tr>
<tr>
<td align="left" valign="top">Did not understand how to search</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>MBFC-W: &#x201C;it&#x2019;s <italic>difficult to see where to actually search</italic>&#x201D; [P3].</p></list-item>
<list-item><p>MBFC-W: &#x201C;<italic>the website is not clear how I should confirm if the information is accurate or not</italic>&#x201D; [P23].</p></list-item>
<list-item><p>TNR-E: &#x201C;I<italic>f you move your mouse away it should go away</italic>&#x201D; [P21].</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Receiving results</td>
<td/>
</tr>
<tr>
<td align="left" valign="top">Did not receive related results</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>ITC-W: &#x201C;<italic>the red text here makes me think it cannot find anything but then it says, questionable news</italic>&#x201D; [P9].</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Understanding results</td>
<td/>
</tr>
<tr>
<td align="left" valign="top">Did not understand results</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>TNR-E: &#x201C;<italic>&#x2026;how am I supposed to know that I can click on the history/ownership information that does not seem clickable?</italic>&#x201D; [P14].</p></list-item>
<list-item><p>TNR-E: &#x201C;<italic>the information in the extension was easy to read but the terminology wasn&#x2019;t clear&#x2026;they use different terms, so I need to read to understand what they mean by mixed. Does &#x2018;low&#x2019; mean low accuracy or low risk? I do not know if, for native speakers, they get the terms directly, but since I am not a native speaker, it confuses me</italic>&#x201D; [P18].</p></list-item>
<list-item><p>MBFC-E: &#x201C;<italic>what the reasoning behind which colors are used. Since green was used for satire, if I am in a hurry and I see green then I might assume that it means that it is ok</italic>&#x201D; [P11].</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Felt not enough information provided</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>ITC-W: &#x201C;<italic>it does not really do anything. Questionable, in what sense? it does not really do anything for me</italic>&#x201D; [P16].</p></list-item>
<list-item><p>ITC-W: &#x201C;<italic>it is telling me that it&#x2019;s questionable, but I do not know why. Is it about the source, website, article?</italic>&#x201D; [P14].</p></list-item>
<list-item><p>ITC-W: &#x201C;<italic>&#x2026;it does not really make me feel any more confident than before</italic>&#x201D; [P14].</p></list-item>
<list-item><p>NT-E: &#x201C;<italic>this provides nothing. It seemed really cool at the start because there were so many tabs that I thought it would provide something, but I cannot even&#x2014;it said learn why but I cannot. Outside of saying it is problematic it does not say why. When I open the website there is even less information</italic>&#x201D; [P21].</p></list-item>
<list-item><p>NT-E: &#x201C;<italic>I wish I knew how they did the ratings.</italic></p></list-item>
<list-item><p>NT-E: &#x201C;<italic>I do not understand what goes into the aggregate ratings, this is not anything helpful</italic>&#x201D; [P10].</p></list-item>
<list-item><p>NT-E: &#x201C;<italic>its community based so the problem is that you do not know who is rating it and what their stance is</italic>&#x201D; [P21].</p></list-item>
<list-item><p>TNR-E: &#x201C;<italic>if I just used the extension, without going to &#x2018;more information&#x2019; then it would not be useful. The text provided in the box was not enough. Their grading system wasn&#x2019;t clear, and I would not go out of my way to find it</italic>&#x201D; [P2].</p></list-item>
<list-item><p>ITC-W: &#x201C;<italic>this is so unsatisfying, I need to know why</italic>&#x201D; [P2].</p></list-item>
<list-item><p>ITC-W: &#x201C;i<italic>t should give more details as to why it is not credible for people to know what to look out for in the future</italic>&#x201D; [P16].</p></list-item>
</list></td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="sec14">
<label>3.2.1.</label>
<title>User interface</title>
<p>As the interface is the point of interaction between humans and a product, it plays a major role in successful interactions. At the outset, as demonstrated in <xref rid="fig4" ref-type="fig">Figure 4</xref>, participants expressed two main concerns related to the interface. Mostly relating to MBFC-W, the first complaint was due to overwhelming content, which, in turn, led participants to question its trustworthiness. The website has an extensive number of advertisements and cluttered text, resulting in difficult navigation.</p>
<fig position="float" id="fig4">
<label>Figure 4</label>
<caption><p>Participant feedback on tool appearance.</p></caption>
<graphic xlink:href="fcomp-05-1253166-g004.tif"/>
</fig>
<p>Although it was not a direct usability concern, opinions on tool trustworthiness were documented as it became apparent that it influences the likelihood of tool adoption. As expressed in the sample of participant comments in <xref rid="tab4" ref-type="table">Table 4</xref>, the general layout and extensive use of advertisements led participants to question the legitimacy of MBFC-W itself.</p>
</sec>
<sec id="sec15">
<label>3.2.2.</label>
<title>Verifying information</title>
<p>The search process presented further challenges, with participants unsure of how to formulate an operative search query. Despite instructions, MBFC-W URL searches did not provide results, nor did they appear to be able to fact-check. Rather, searches could only be performed using a source&#x2019;s name, which was not clear to participants. Surprisingly, despite ITC-W&#x2019;s minimalistic design, multiple participants did not notice the option to search using a URL. Those who did recognize that they must be performed in a specific manner that is not indicated on the website. One participant entered &#x201C;<ext-link xlink:href="http://www.globalresearch.ca" ext-link-type="uri">www.globalresearch.ca</ext-link>&#x201D; that returned &#x201C;not able to analyze.&#x201D;</p>
<p>As shown in <xref rid="fig5" ref-type="fig">Figure 5</xref>, MBFC-W particularly required multiple search attempts and forms of queries before participants could verify information. Overall, both MBFC-W and ITC-W appear to only accept specific queries to return relevant results, which increased errors and impacted participants&#x2019; ability to perform searches.</p>
<fig position="float" id="fig5">
<label>Figure 5</label>
<caption><p>Initial challenges in verifying information.</p></caption>
<graphic xlink:href="fcomp-05-1253166-g005.tif"/>
</fig>
<p>Opening the extensions then became a difficulty, with most complaints centering around TNR-E. Only after users scroll through a website does an icon appear, thus, how it works was not immediately clear. Once noticed, participants enjoyed the ease of use, however, once open, the icon&#x2019;s window often did not close, which obstructed participants from being able to continue reading from the website.</p>
</sec>
<sec id="sec16">
<label>3.2.3.</label>
<title>Receiving results</title>
<p>Likely stemming from confusion on how to perform a search, participants were more likely to not receive relevant results while using the websites (<xref rid="fig6" ref-type="fig">Figure 6</xref>). Although topic searches were promoted in MBFC-W, searches using &#x201C;Chinese herb kills cancer&#x201D; or &#x201C;covid is a lie&#x201D; returned somewhat related results, however, the connection between the topic searched and the results received was not always clear. Similarly, although ITC-W promotes topic searches, no participants received relevant results. In addition, impacting the ability to recognize results is ITC-W responding to successful searches via a red box that highlights the search bar and with &#x201C;questionable news&#x201D; written in small, red font. Given the format, several participants did not notice the feedback at all, with some thinking it was an error message.</p>
<fig position="float" id="fig6">
<label>Figure 6</label>
<caption><p>Challenges in receiving results.</p></caption>
<graphic xlink:href="fcomp-05-1253166-g006.tif"/>
</fig>
<p>In such situations, the beginner and intermediate participants often ended the task without being able to verify the scenario article&#x2019;s claims. For the browser extensions, likely owing to the lack of need to formulate a search query, only a limited number of participants ended task(s) without verifying information. Such reasons included the inability to see or open the icons.</p>
<p>We note that the researchers&#x2019; independent verification of ITC-W using &#x201C;mainstream&#x201D; news provided better fact-checking with more elaborate reasoning, thereby suggesting that ITC-W could be more useful for mainstream news stories, rather than verifications of information originating from satire, pseudoscience, or conspiracy theories.</p>
</sec>
<sec id="sec17">
<label>3.2.4.</label>
<title>Understanding results</title>
<p>After overcoming the initial challenges and pertinent results were received, participants continued to encounter challenges.</p>
<sec id="sec18">
<label>3.2.4.1.</label>
<title>Lack of understanding</title>
<p>The first source of difficulty was understanding what the tool&#x2019;s terminology signifies. ITC-W, the most confusing tool for intermediate users (<xref rid="fig7" ref-type="fig">Figure 7</xref>), merely returned &#x201C;questionable news&#x201D; in response to search queries, which left participants with more questions than answers. Within MBFC-W and TNR-E (which sources the ratings from MBFC-W), some participants were unsure of what &#x201C;tin foil hat&#x201D; and &#x201C;quackery&#x201D; meant, particularly non-native English speakers. It was noted that slightly less confusion was experienced using MBFC-W, which may be due to the visualized rating scale and additional content that helped participants understand the context. Initially, participants appeared to prefer TNR-E due to how information was visually presented; however, without the additional context to support an understanding of terminology, participants were left more confused.</p>
<fig position="float" id="fig7">
<label>Figure 7</label>
<caption><p>Challenges in understanding results received.</p></caption>
<graphic xlink:href="fcomp-05-1253166-g007.tif"/>
</fig>
<p>As it is brief and to the point, MBFC-E was better received. Participants noted they could immediately see a rating if it was pinned to their browser; however, with green used for a &#x201C;satire&#x201D; rating, as indicated in the representative comments (<xref rid="tab4" ref-type="table">Table 4</xref>), users may wrongly assume that green indicates that a website is good or trustworthy. In addition, the rating being a description of the article&#x2019;s categorization is confusing. For example, articles deemed to be &#x201C;satire&#x201D; received a satire label and a short paragraph defining the term, without any reference to the article being verified.</p>
<p>Although MBFC-W, MBFC-E, and TNR-E provide more details if you click &#x201C;read more,&#x201D; not all saw the option, whereas others felt informed enough by initial results. Those who read the additional context, appreciated it more, such as the scenario websites&#x2019; owners and/or funders.</p>
</sec>
<sec id="sec19">
<label>3.2.4.2.</label>
<title>Not enough information provided</title>
<p>Further contributing to a lack of understanding was the absence of information to support verification outputs. Considering ITC-W and notes in the sample of comments (<xref rid="tab4" ref-type="table">Table 4</xref>), participants were unsure of whether it was the scenario website that was questionable or if it was the article itself. Without additional context, participants did not understand what the rating meant. Despite most participants originally liking ITC-W, the lack of information was a deterrent to fully embracing it as an option for fact-checking.</p>
<p>Albeit Newstrition (NT-E) providing an initial rating via an orange banner spanning across the top of the website, a text box with additional information enabled by the extension and a website, the intermediate and advanced participants found the content provided to be lacking information (<xref rid="fig7" ref-type="fig">Figure 7</xref>). Only a small number of participants relied on the banner alone, with a large number opening the extension window in the hopes of obtaining additional insight. The extension itself presented multiple &#x201C;tabs&#x201D; under which it was expected that information would be found, however, both the extension and the website that was supposed to provide further information were lacking. While it appeared that more information could be received once registering an account, participants saw that as a barrier and did not wish to do so.</p>
</sec>
<sec id="sec20">
<label>3.2.4.3.</label>
<title>Sought instruction guide</title>
<p>Due to the lack of explanation, as seen in <xref rid="fig7" ref-type="fig">Figure 7</xref>, ITC-W and TNR-E had the highest levels of seeking an instruction guide. Particularly within ITC-W, participants sought an explanation for what terminology meant, whereas confusion over how to open the extension led participants to seek a manual in TNR-E. The reason for seeking additional information in NT-E was due to the ratings being calculated based on feedback from users, to which some were concerned with biases manipulating the ratings.</p>
</sec>
</sec>
</sec>
<sec id="sec21">
<label>3.3.</label>
<title>Summative evaluation</title>
<p>Once participants completed tasks, they were asked to provide SUS ratings and answer multiple choice questions. Thus, in addition to participants&#x2019; thoughts, opinions, and a count of the frequency of which an issue occurred, these scores provide a quantitative score for each tool assessed.</p>
<sec id="sec22">
<label>3.3.1.</label>
<title>SUS score</title>
<p>As demonstrated in <xref rid="tab5" ref-type="table">Table 5</xref>, upon answering five SUS questions, the lowest score across all users is MBFC-W, while MBFC-E was rated the highest for both beginners and advanced users. Intermediate participants rated ITC-W as the highest, which is interesting considering the complaints of their peers. We note that the highest rates of standard deviation are between the same tools, with MBFC-E having the highest rate at 5.30, followed by ITC-W at 4.25 points, suggesting a difference in preference for tools.</p>
<table-wrap position="float" id="tab5">
<label>Table 5</label>
<caption><p>Final SUS scores.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th/>
<th align="center" valign="top">MBFC-W</th>
<th align="center" valign="top">ISC-W</th>
<th align="center" valign="top">TNR-E</th>
<th align="center" valign="top">NT-E</th>
<th align="center" valign="top">MBFC-E</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="bottom">Beginner</td>
<td align="center" valign="bottom">27.00</td>
<td align="center" valign="bottom">31.00</td>
<td align="center" valign="bottom">35.50</td>
<td align="center" valign="bottom">35.00</td>
<td align="center" valign="bottom">38.00</td>
</tr>
<tr>
<td align="left" valign="bottom">Intermediate</td>
<td align="center" valign="bottom">22.50</td>
<td align="center" valign="bottom">35.00</td>
<td align="center" valign="bottom">31.25</td>
<td align="center" valign="bottom">31.56</td>
<td align="center" valign="bottom">33.44</td>
</tr>
<tr>
<td align="left" valign="bottom">Advanced</td>
<td align="center" valign="bottom">23.50</td>
<td align="center" valign="bottom">39.50</td>
<td align="center" valign="bottom">35.00</td>
<td align="center" valign="bottom">35.50</td>
<td align="center" valign="bottom">44.00</td>
</tr>
<tr>
<td align="left" valign="bottom">Average</td>
<td align="center" valign="bottom">24.33</td>
<td align="center" valign="bottom">35.17</td>
<td align="center" valign="bottom">33.92</td>
<td align="center" valign="bottom">34.02</td>
<td align="center" valign="bottom">38.48</td>
</tr>
<tr>
<td align="left" valign="bottom">STDDV</td>
<td align="center" valign="bottom">2.36</td>
<td align="center" valign="bottom">4.25</td>
<td align="center" valign="bottom">2.32</td>
<td align="center" valign="bottom">2.14</td>
<td align="center" valign="bottom">5.30</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>While it is apparent that MBFC-E is the preferred tool to assess the overall user experience, we consider the interpretation of the usability rating. On this account, guidelines confer that anything rated below 60 is considered a failing grade. More specifically, anything between 25 and 39 is poor, whereas any score between 39 and 52 is rated as &#x201C;ok,&#x201D; but still not acceptable (<xref ref-type="bibr" rid="ref1">Bangor et al., 2008</xref>). Given MBFC-E&#x2019;s score of 44, it still falls within an unacceptable rating from a usability perspective.</p>
</sec>
<sec id="sec23">
<label>3.3.2.</label>
<title>Multiple choice rating questions</title>
<p>In addition to the SUS scores, to ascertain which tool participants thought would provide them with the most current information to assist them in the verification process, participants were asked to rate which website or extension they found to be most up-to-date. <xref rid="fig8" ref-type="fig">Figure 8</xref> surprisingly shows that despite ISC-W having the second-highest SUS score, it had the second-lowest ranking for being up-to-date. Moreover, although MBFC-W provided the source information for MBFC-E and TNR-E, it was considered the least up-to-date, which may suggest that the format in which information is presented influences users&#x2019; perception of its quality. We also asked which tool participants would be more likely to use in the future, in which MBFC-E had only a slight lead over NT-E and TNR-E.</p>
<fig position="float" id="fig8">
<label>Figure 8</label>
<caption><p>Overall participant opinions: up-to-date vs. likely-to-use.</p></caption>
<graphic xlink:href="fcomp-05-1253166-g008.tif"/>
</fig>
<p>While it is surprising that TNR-E and NT-E would be included in the list of tools considered most up-to-date and most likely to be used post-evaluation, <xref rid="fig9" ref-type="fig">Figure 9</xref> demonstrates that although NT-E was considered up-to-date by beginner and intermediate participants, overall, they were more likely to use a different tool.</p>
<fig position="float" id="fig9">
<label>Figure 9</label>
<caption><p>Tool participants would use (post-evaluation).</p></caption>
<graphic xlink:href="fcomp-05-1253166-g009.tif"/>
</fig>
</sec>
</sec>
</sec>
<sec sec-type="discussions" id="sec24">
<label>4.</label>
<title>Discussion</title>
<p>For a comprehensive usability evaluation, we compare results from our multiple methods of data collection.</p>
<p>The heuristic evaluation indicated that the tool with the least number of usability violations was ITC-W, in which case it was initially expected to be a better option for disinformation-countering. However, while engaged in the usability evaluation, it was revealed to be the opposite. Despite having a better design, participants eventually preferred MBFC-W with the greater number of usability challenges due to the information it provided. Comparing MBFC-W with browser extensions, it was immediately clear that extensions provided a much-improved experience as search query challenges were eliminated. Despite an initial appreciation for TNR-E&#x2019;s visual design, a full analysis of the usability evaluation data revealed that the usability of MBFC-E was better than other tools reviewed. Albeit demonstrating that it is unacceptable from a usability standards perspective, the SUS score further confirmed the usability evaluation and summative results that MBFC-E is a better option for disinformation-countering.</p>
<p>Although ITC-W had the second-highest SUS score, when asked which tool participants thought was most up-to-date and would be more likely to use, it fell to second last and last place, respectively. While MBFC-E received a higher ranking in the usability evaluation and the SUS score, the final question on which tool participants would more likely use, it had only one more vote than TNR-E and NT-E. Such variance in results confirms the need, as mentioned, for multiple forms of evaluation in usability assessments as receiving similar results across different forms of assessment strengthens the validity of findings.</p>
<sec id="sec25">
<label>4.1.</label>
<title>Challenges faced by users</title>
<p>To determine whether certain users fare better or worse in the use of disinformation-countering tools, our objective was to identify usability challenges faced by users of varying technical proficiency. In this regard, we have found inconsistency in experiences, suggesting that all users face challenges regardless of their technical abilities.</p>
<p>To elaborate, we mention several occurrences where participants had greater discrepancies in their experiences. First, considering challenges experienced within the user interface, as seen in <xref rid="fig4" ref-type="fig">Figure 4</xref>, beginners more often complained of being distracted by the content in MBFC-W than their counterparts. While attempting to verify information, advanced users had more difficulty figuring out how to perform a search in MBFC-W and required multiple attempts (<xref rid="fig5" ref-type="fig">Figure 5</xref>). When results of search queries or feedback from the browser extension were received, due to their inability to execute a successful search query or recognize that results had been received, the intermediate participants were more likely to end the task without verifying information in MBFC-W and TNR-E (<xref rid="fig6" ref-type="fig">Figure 6</xref>).</p>
<p>Considering whether participants understood the meaning of the search results or feedback from the extensions, beginners only slightly lacked an understanding of the results in TNR-E, compared to others, whereas intermediates were behind their peers while interacting with MBFC-E (<xref rid="fig7" ref-type="fig">Figure 7</xref>). For those who complained of not enough information being provided, intermediate and advanced were more likely to complain of not enough information in TNR-E, whereas the advanced users had similar complaints using ITC-W and further sought an instruction guide to try to understand the results received (<xref rid="fig7" ref-type="fig">Figure 7</xref>).</p>
<p>Thus, given the inconsistencies in challenges experienced, it appears that user performance relates more to the individual tool interacted with, the depth of information they wish to see, and their ability to interpret results, rather than their technical proficiency. Moreover, many cases wherein participant experiences were all closely aligned suggest the severity of the usability issues in the disinformation-countering tools. In this case, it cannot be stated that one group of user profiles fares better than the others.</p>
</sec>
<sec id="sec26">
<label>4.2.</label>
<title>Recommendations</title>
<p>To address our second research objective, in this section, we address recommendations for both tool developers and researchers to optimize the creation of disinformation-countering tools to improve resilience to disinformation. To the best of our knowledge, recommended design principles and guidelines have yet to be put forth for the design of disinformation-countering tools. Therefore, whereas our findings in the results and discussion sections pertain specifically to our study and investigation of disinformation-countering tools, our recommendations section integrates our findings with existing literature to put forth comprehensive suggestions for tool design.</p>
<sec id="sec27">
<label>4.2.1.</label>
<title>Recommendation for tool design</title>
<p>Recommendations in the form of design principles and guidelines have long been established for user interfaces. Design principles, which are the general goals to be met in user interface design, were created to maximize usability and the effective design of user interfaces. Design guidelines then provide specific instructions on how to incorporate the goals within a design (<xref ref-type="bibr" rid="ref13">Galitz, 2007</xref>).</p>
<p>To address the identified usability challenges, <xref rid="tab6" ref-type="table">Table 6</xref> provides a list of design principles and guidelines that were selected and adapted from <xref ref-type="bibr" rid="ref13">Galitz (2007)</xref>, <xref ref-type="bibr" rid="ref41">Mayhew (1991)</xref>, and the <xref ref-type="bibr" rid="ref63">U.S. Department of Health and Human Services (2006)</xref> to address digital disinformation-countering tools. Based on the identified challenges, several guidelines were added to ensure comprehensiveness in addressing existing shortcomings in the design of digital disinformation-countering tools.</p>
<table-wrap position="float" id="tab6">
<label>Table 6</label>
<caption><p>Recommended design principles and guidelines for disinformation-countering tools (synthesis of key literature and our study&#x2019;s research findings).</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Design principles</th>
<th align="left" valign="top">Recommended guidelines</th>
</tr>
</thead>
<tbody>
<tr>
<td/>
<td align="left" valign="top">Transparency</td>
</tr>
<tr>
<td align="left" valign="top">Credibility</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Disclose how fact-checking is performed.</p></list-item>
<list-item><p>Names of individuals or organizations involved in the fact-checking process should be disclosed.</p></list-item>
<list-item><p>Avoid the use of anonymous, community-based voting.</p></list-item>
<list-item><p>Avoid or minimize the use of advertising.</p></list-item>
</list></td>
</tr>
<tr>
<td/>
<td align="left" valign="top">Layout and design</td>
</tr>
<tr>
<td align="left" valign="top">Accessibility/Operability</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Tools should be usable by the general population with varying levels of knowledge and abilities.</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Esthetically pleasing</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Message can be understood quickly and clearly.</p></list-item>
<list-item><p>Keep necessary content only.</p></list-item>
<list-item><p>Use of white space.</p></list-item>
<list-item><p>Easy to read fonts.</p></list-item>
<list-item><p>Use of color to enhance understanding.</p></list-item>
<list-item><p>Avoid the use of pop-ups and new windows.</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Compatibility</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Tool design should be aligned with users&#x2019; need to efficiently verify information.</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Consistency</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Design, terminology, and imagery used should be consistent.</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Obviousness</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Tools should be designed in a way that reduces users&#x2019; cognitive load.</p></list-item>
<list-item><p>Content should be structured to be easily understood and provided in a logical order.</p></list-item>
</list></td>
</tr>
<tr>
<td/>
<td align="left" valign="top">Search capability</td>
</tr>
<tr>
<td align="left" valign="top">Directness</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Websites should provide clear access to search boxes.</p></list-item>
<list-item><p>Browser extensions should directly provide verification.</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Flexibility</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Search methods should allow for users&#x2019; differing approaches to search queries.</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Obviousness</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Sample search queries should be provided for users to formulate queries and maximize successful results.</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Product compatibility</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Available search methods should align with approaches used in other tools.</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Provide feedback</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Websites and browser extensions alike should provide feedback when processing requests.</p></list-item>
</list></td>
</tr>
<tr>
<td/>
<td align="left" valign="top">Content</td>
</tr>
<tr>
<td align="left" valign="top">Clarity</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Terminology used should be free from jargon and use standard English.</p></list-item>
<list-item><p>Use rating scales and/or color for visual feedback.</p></list-item>
<list-item><p>Color alone should not be used for feedback.</p></list-item>
<list-item><p>Colors should be distinguishable by those with color blindness.</p></list-item>
<list-item><p>Ensure clickable links are clearly visible to users.</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Simplicity</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Only useful, relevant information should be provided.</p></list-item>
<list-item><p>Results should have progressive disclosure.</p></list-item>
<list-item><p>Immediate results should provide a high-level rating with the ability to receive additional information.</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Availability</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Access to information should not be restricted to registered users.</p></list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Help/Documentation</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item><p>Provide a help section for novice users, including the search process, definitions of terminology, and any forms of rating used.</p></list-item>
</list></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Once the recommended design principles and guidelines as mentioned below are applied to existing and/or new disinformation-countering tools, a usability evaluation should follow to assess whether the implementations have led to better usability and overall improvements to the user&#x2019;s experience.</p>
<sec id="sec28">
<label>4.2.1.1.</label>
<title>Transparency</title>
<p>As some participants raised the concern of individual biases with heavy importance to promote trust and encourage uptake of digital disinformation-countering tools, the most important task is to establish the credibility and trustworthiness of the tool (<xref ref-type="bibr" rid="ref63">U.S. Department of Health and Human Services, 2006</xref>). While it is understood that developers require funding to create and maintain the tools, the placement of extensive advertisements conjures less credibility. Accordingly, advertisements should be avoided or kept to a minimum, if necessary.</p>
<p>Furthermore, developers should clearly present how fact or source &#x201C;checks&#x201D; are performed, including whether it is human-based, machine (learning)-based, or a combination of methods. Moreover, data sources, criteria, or rating scales utilized in the verification process should be communicated. We conjure that it is not advisable to allow anonymous, community-based voting on the credibility of information or sources. If it is used, it should be clearly indicated, including how feedback influences information provided by the tool and efforts taken to mitigate the risk of feedback from those wrongly informed or with nefarious intent. In addition, the names of individuals involved in the verification process, their roles, educational backgrounds, past work, and any community affiliations should also be provided. Such information would promote transparency and reduce the worry of biased ratings, thus solidifying trust in the tool.</p>
<p>Given that many participants had difficulty either navigating the tool, were initially unsure how to get it to work, or, in some cases, unable to get it to work, attention must be paid to the design and layout of the tool, with specific consideration given to its purpose of facilitating access to information to counter disinformation. Moreover, given the tools&#x2019; use by the public, its design should be accessible to optimize usability for as many different users as possible. Most importantly, only necessary information should be provided in a form that is easy to read and find.</p>
</sec>
<sec id="sec29">
<label>4.2.1.2.</label>
<title>Search</title>
<p>Since performing searches was a major usability challenge, it should be given importance in tool development. The formats in which searches can be performed should be clearly outlined for users to understand how to search in a manner that will most likely return results directly related to their topic. Considering that many of the participants attempted to perform typical search engine queries, search capabilities must accommodate differing forms of search queries. We also note that the search instructions should be given and match the website&#x2019;s current search capabilities.</p>
</sec>
<sec id="sec30">
<label>4.2.1.3.</label>
<title>Content</title>
<p>With the different types of users and the varying depth of details desired, a brief, informative overall rating should first be presented to provide an initial understanding of the topic being investigated. An option to click for additional information can then be provided for users who prefer further details. We advise against requiring users to create accounts and login to view additional information. As witnessed within our study, those who did notice and commented on it mentioned that they would not likely sign up for such a service. Thus, such requirements may pose a barrier, and further enable disinformation to spread.</p>
</sec>
<sec id="sec31">
<label>4.2.1.4.</label>
<title>Layout and design</title>
<p>Rating scales should have simplified terminology for users of differing educational and language levels to understand numeric and/or color rating scales to visually receive initial feedback. Moreover, rating scales should be consistent not only throughout the tool itself but also across tools to avoid confusion in understanding. While it may be difficult to coordinate across all disinformation-countering platforms, those involved with a centralized body, such as the International Fact-Checking Network, may be better positioned to do so.</p>
<p>As some participants indicated that it may be possible for an untrustworthy website to feature credible information, and vice versa, it should be clarified whether the rating provided is based on the source itself or the specific article or topic being verified. Some participants appreciated knowing who the source website owner was, and their funder, as it helped to provide context of who they are affiliated with or any biases they may have. Providing this information may raise awareness of platforms or authors to directly avoid in the future, without the need for countering tools.</p>
</sec>
</sec>
<sec id="sec32">
<label>4.2.2.</label>
<title>Recommendations for academia</title>
<p>As our study did not establish trends in usability challenges experienced due to technical proficiency, further exploration should be undertaken with a greater number of participants of different age groups and educational backgrounds to determine differences in user characteristics to establish personas. This can help guide the future update and creation of goals to meet users&#x2019; specific needs (<xref ref-type="bibr" rid="ref41">Mayhew, 1991</xref>; <xref ref-type="bibr" rid="ref63">U.S. Department of Health and Human Services, 2006</xref>; <xref ref-type="bibr" rid="ref13">Galitz, 2007</xref>). Furthermore, during our study, one participant admitted to believing in conspiracy theories and was observed to particularly question results provided by the tools, while another reflected that the tools were less likely to be useful for those who already believe in conspiracies. Considering these points, in addition to creating tools to counter disinformation, the role of mental models, including pre-existing beliefs in conspiracy theories, should be explored in relation to the use of disinformation-countering tools to assess their role and whether there are other criteria to consider in the uptake of said tools.</p>
<p>Efforts must also be made to establish effective methods of developing critical thinking skills in individuals of varying demographics. This will assist in taking a comprehensive approach to addressing the challenges imposed by disinformation and preventing individuals from reaching the stage where disinformation-countering tools may be rejected.</p>
<p>As identified, the user experience, particularly ITC-W, is quite improved while using mainstream news sources; therefore, further study should explore experiences verifying different types of disinformation sources. Simultaneously, we recommend a review of the availability and usability of disinformation-countering tools for Mac operating systems (macOS), as well as Android and IOS mobile devices.</p>
<p>While the heuristic evaluations addressed many of the usability challenges, given the final preference for a tool that provided better information, we posit that the use of heuristic evaluations alone may not be a useful approach to assessing the usability of information-based tools. Rather, as witnessed in our study, and long recommended by researchers (<xref ref-type="bibr" rid="ref18">Gray and Salzman, 1998</xref>; <xref ref-type="bibr" rid="ref22">Hartson et al., 2003</xref>; <xref ref-type="bibr" rid="ref36">Lazar et al., 2017</xref>), a mixed method approach wherein more than one form of evaluation should be undertaken to strengthen research findings.</p>
</sec>
</sec>
<sec id="sec33">
<label>4.3.</label>
<title>Limitations of our study</title>
<p>Our study is not without limitations. We first mention that had we used mainstream news sources, the tools generally would have provided better information and a particularly much-improved experience. Our results would likely have fewer identified usability challenges and are strongly in favor of ITC-W. Moreover, consideration was not given to the format in which the news articles may be received and read, as well as any pre-existing opinions the participants may hold, nor their awareness of and caution toward potential disinformation. Furthermore, the tools selected for our study only form a small sample of the disinformation-countering websites, browser extensions, and applications created. Therefore, with the limited number of articles and types of information verified, our findings may not present a full image of the capabilities offered by disinformation-countering tools. As such, our results cannot be generalized to all currently available tools.</p>
<p>On this note, we also mention that the NT-E tool was discontinued at the end of our period of study and the MBFC-W has since been updated with fewer advertisements, thus limiting future replicability of our study. Finally, given that we had less than the 20 participants required to establish statistically significant findings for our summative questions, the results can be considered informative, however, not statistically significant. Financial and time limitations prevented the inclusion of additional participants in our study.</p>
</sec>
</sec>
<sec sec-type="conclusions" id="sec34">
<label>5.</label>
<title>Conclusion</title>
<p>In the hope of enhancing their uptake to counteract the harms of disinformation, we have answered calls from researchers to explore the usability of disinformation-countering tools. In addition to addressing the gap in the academic literature on the usability of disinformation-countering tools, by incorporating a mixed-method approach to our usability evaluation, we simultaneously address a gap in incorporating multiple methods within a study. To the best of our knowledge, no other study has followed such a strategy for research on digital disinformation-countering tools.</p>
<p>Our findings indicate that all tools featured some form of usability challenges, with the main areas of contention being the layout of the user interface, how to verify information, recognizing that results were received, and fully comprehending the meaning of the results. To address these challenges, we put forth several design recommendations to improve the development of disinformation-countering tools.</p>
<p>First, we have identified that as disinformation-countering tools, the need for transparency and background information on the developers of the tools is paramount to promoting trust in their use. Therefore, the first of our recommendations is to establish the credibility of the tools, followed by improvements to the layout and design of the tools. This includes the creation of tools with a focus on how to verify information quickly and efficiently, with content structured logically and in a manner that could be generally understood by all users. Moreover, the design should be esthetically pleasing to enhance their experience.</p>
<p>Following is the need to drastically improve a website&#x2019;s search capabilities where users can execute their queries using standard search engine approaches and/or receive visual indications of accepted forms of queries. Finally, information should be structured in a manner that reduces users&#x2019; cognitive load and first presents information for initial verification, followed by the option to incrementally obtain in-depth contextual information. The use of color, rating scales, and simplified, standardized terminology will further assist users in quickly verifying information.</p>
<p>With the ongoing distribution of disinformation and the consequences of its spread, multiple approaches and tools are necessary to address its harms, wherein the disinformation-countering tools explored in our study form one such approach. Given our findings, we hope that developers will recognize the need for their improvement and implement recommendations to enhance the usability of disinformation-countering tools. Through their improvement, we further hope for their increased uptake to educate society with factual evidence and dispel the spread of erroneous, harmful information.</p>
</sec>
<sec sec-type="data-availability" id="sec35">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec id="sec36" sec-type="ethics-statement">
<title>Ethics statement</title>
<p>The studies involving humans were approved by University of Ottawa Research Ethics Board. The studies were conducted in accordance with the local legislation and institutional requirements. The participants provided their written informed consent to participate in this study.</p>
</sec>
<sec id="sec37" sec-type="author-contributions">
<title>Author contributions</title>
<p>UR contributed to the conceptual design of the study and wrote the sections of the manuscript. KN and UR were involved in the literature review. KN conducted the data collection, performed data analysis, summarized and interpreted the results, and wrote the first draft of the manuscript. All authors contributed to the article and approved the submitted version.</p>
</sec>
</body>
<back>
<sec sec-type="funding-information" id="sec38">
<title>Funding</title>
<p>This research was supported by the Canadian Heritage Digital Citizen Contribution Program (Grant Number 1340696).</p>
</sec>
<ack>
<p>The authors thank R. Kalantari who assisted in initial data collection for this project.</p>
</ack>
<sec sec-type="COI-statement" id="sec39">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec id="sec100" sec-type="disclaimer">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bangor</surname> <given-names>A.</given-names></name> <name><surname>Kortum</surname> <given-names>P. T.</given-names></name> <name><surname>Miller</surname> <given-names>J. T.</given-names></name></person-group> (<year>2008</year>). <article-title>An empirical evaluation of the system usability scale</article-title>. <source>Int. J. Hum. Comput. Interact.</source> <volume>24</volume>, <fpage>574</fpage>&#x2013;<lpage>594</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10447310802205776</pub-id></citation></ref>
<ref id="ref2"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Becker</surname> <given-names>H. S.</given-names></name></person-group> (<year>1970</year>). <article-title>&#x201C;Field work evidence,&#x201D;</article-title> <source>in Sociological Work Method and Substance</source>. ed. <person-group person-group-type="editor"><name><surname>Becker</surname> <given-names>H. S.</given-names></name></person-group>, <edition>1st</edition> Edn. (<publisher-loc>New Brunswick, NJ</publisher-loc>: <publisher-name>Transaction Books Routledge</publisher-name>).</citation></ref>
<ref id="ref3"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Brooke</surname> <given-names>J.</given-names></name></person-group> (<year>1996</year>). &#x201C;<article-title>SUS: a &#x2018;quick and dirty&#x2019; usability scale</article-title>&#x201D; in <source>Usability Evaluation in Industry</source>. eds. <person-group person-group-type="editor"><name><surname>Jordan</surname> <given-names>P. W.</given-names></name> <name><surname>Thomas</surname> <given-names>B.</given-names></name> <name><surname>McClelland</surname> <given-names>I. L.</given-names></name> <name><surname>Weerdmeester</surname> <given-names>B.</given-names></name></person-group>, (<publisher-loc>London</publisher-loc>: <publisher-name>CRC Press</publisher-name>), <fpage>207</fpage>&#x2013;<lpage>212</lpage>.</citation></ref>
<ref id="ref4"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Burkhardt</surname> <given-names>J.</given-names></name></person-group> (<year>2017</year>). <article-title>History of fake news</article-title>. <source>Libr. Technol. Rep.</source> <volume>53</volume>, <fpage>5</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="ref5"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Chossudovsky</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). Biggest lie in world history: there never was a pandemic. The data base is flawed. The covid mandates including the vaccine are invalid. Global Research Centre for Research on Globalization. Available at: <ext-link xlink:href="https://www.globalresearch.ca/biggest-lie-in-world-history-the-data-base-is-flawed-there-never-was-a-pandemic-the-covid-mandates-including-the-vaccine-are-invalid/5772008" ext-link-type="uri">https://www.globalresearch.ca/biggest-lie-in-world-history-the-data-base-is-flawed-there-never-was-a-pandemic-the-covid-mandates-including-the-vaccine-are-invalid/5772008</ext-link></citation></ref>
<ref id="ref6"><citation citation-type="web"><person-group person-group-type="author"><collab id="coll1">David Wolfe</collab></person-group> (<year>2021</year>). Chinese herb kills cancer cells&#x2014;new study finds. Available at: <ext-link xlink:href="https://www.davidwolfe.com/chinese-herb-kills-cancer-40-days/" ext-link-type="uri">https://www.davidwolfe.com/chinese-herb-kills-cancer-40-days/</ext-link>.</citation></ref>
<ref id="ref7"><citation citation-type="other"><person-group person-group-type="author"><name><surname>De Kock</surname> <given-names>E.</given-names></name> <name><surname>Van Biljon</surname> <given-names>J.</given-names></name> <name><surname>Pretorius</surname> <given-names>M.</given-names></name></person-group> (<year>2009</year>). &#x201C;Usability evaluation methods: mind the gaps&#x201D; in <italic>Proceedings of the 2009 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists</italic>. Vanderbijlpark Emfuleni South Africa: ACM, 122&#x2013;131.</citation></ref>
<ref id="ref8"><citation citation-type="web"><person-group person-group-type="author"><collab id="coll2">Excel Spreadsheet for Calculating SUS Scores</collab></person-group> (<year>2008</year>). Measuring UX. Available at: <ext-link xlink:href="https://measuringux.com/sus/SUS_Calculation.xlsx" ext-link-type="uri">https://measuringux.com/sus/SUS_Calculation.xlsx</ext-link>.</citation></ref>
<ref id="ref9"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fallis</surname> <given-names>D.</given-names></name></person-group> (<year>2015</year>). <article-title>What is disinformation?</article-title> <source>Libr. Trends</source> <volume>63</volume>, <fpage>401</fpage>&#x2013;<lpage>426</lpage>. doi: <pub-id pub-id-type="doi">10.1353/lib.2015.0014</pub-id></citation></ref>
<ref id="ref10"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Flores-Saviaga</surname> <given-names>C.</given-names></name> <name><surname>Savage</surname> <given-names>S.</given-names></name></person-group> (<year>2019</year>). Anti-Latinx computational propaganda in the United States. Institute of the Future. arXiv [Preprint]. doi: <pub-id pub-id-type="doi">10.48550/ARXIV.1906.10736</pub-id></citation></ref>
<ref id="ref11"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Froehlich</surname> <given-names>T. J.</given-names></name></person-group> (<year>2017</year>). A not-so-brief account of current information ethics: the ethics of ignorance, missing information, misinformation, disinformation and other forms of deception or incompetence. Textos Universitaris de Bibliotecomia i Documentacio 39. Available at: <ext-link xlink:href="http://temaria.net/simple.php?origen=1575-5886&#x0026;idioma=en" ext-link-type="uri">http://temaria.net/simple.php?origen=1575-5886&#x0026;idioma=en</ext-link></citation></ref>
<ref id="ref12"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gaeta</surname> <given-names>A.</given-names></name> <name><surname>Loia</surname> <given-names>V.</given-names></name> <name><surname>Lomasto</surname> <given-names>L.</given-names></name> <name><surname>Orciuoli</surname> <given-names>F.</given-names></name></person-group> (<year>2023</year>). <article-title>A novel approach based on rough set theory for analyzing information disorder</article-title>. <source>Appl. Intell.</source> <volume>53</volume>, <fpage>15993</fpage>&#x2013;<lpage>16014</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10489-022-04283-9</pub-id>, PMID: <pub-id pub-id-type="pmid">36471689</pub-id></citation></ref>
<ref id="ref13"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Galitz</surname> <given-names>W.</given-names></name></person-group> (<year>2007</year>). <source>The Essential Guide to User Interface Design: An Introduction to GUI Design Principles and Techniques</source>, <edition>3rd</edition> Edition. <publisher-loc>Indianapolis, IN</publisher-loc>: <publisher-name>Wiley Publishing Inc.</publisher-name></citation></ref>
<ref id="ref14"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Garrett</surname> <given-names>J. J.</given-names></name></person-group> (<year>2010</year>). <source>The Elements of User Experience: User-Centered Design for the Web and Beyond</source>. <edition>2nd</edition> Edn. <publisher-loc>Indianapolis, IN</publisher-loc>: <publisher-name>New Riders</publisher-name></citation></ref>
<ref id="ref15"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Glenski</surname> <given-names>M.</given-names></name> <name><surname>Weninger</surname> <given-names>T.</given-names></name> <name><surname>Volkova</surname> <given-names>S.</given-names></name></person-group> (<year>2018</year>). <article-title>Propagation from deceptive news sources who shares, how much, how evenly, and how quickly?</article-title> <source>IEEE Transac. Comput. Soc. Syst.</source> <volume>5</volume>, <fpage>1071</fpage>&#x2013;<lpage>1082</lpage>. doi: <pub-id pub-id-type="doi">10.1109/TCSS.2018.2881071</pub-id></citation></ref>
<ref id="ref16"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Goldstein</surname> <given-names>J. A.</given-names></name> <name><surname>Sastry</surname> <given-names>G.</given-names></name> <name><surname>Musser</surname> <given-names>M.</given-names></name> <name><surname>DiResta</surname> <given-names>R.</given-names></name> <name><surname>Gentzel</surname> <given-names>M.</given-names></name> <name><surname>Sedova</surname> <given-names>K.</given-names></name></person-group> (<year>2023</year>). Generative language models and automated influence operations: Emerging threats and potential mitigations. arXiv [Preprint]. doi: <pub-id pub-id-type="doi">10.48550/arXiv.2301.04246</pub-id></citation></ref>
<ref id="ref17"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Grado&#x0144;</surname> <given-names>K. T.</given-names></name> <name><surname>Ho&#x0142;yst</surname> <given-names>J. A.</given-names></name> <name><surname>Moy</surname> <given-names>W. R.</given-names></name> <name><surname>Sienkiewicz</surname> <given-names>J.</given-names></name> <name><surname>Suchecki</surname> <given-names>K.</given-names></name></person-group> (<year>2021</year>). <article-title>Countering misinformation: a multidisciplinary approach</article-title>. <source>Big Data Soc.</source> <volume>8</volume>, <fpage>205395172110138</fpage>&#x2013;<lpage>205395172110114</lpage>. doi: <pub-id pub-id-type="doi">10.1177/20539517211013848</pub-id></citation></ref>
<ref id="ref18"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gray</surname> <given-names>W. D.</given-names></name> <name><surname>Salzman</surname> <given-names>M. C.</given-names></name></person-group> (<year>1998</year>). <article-title>Damaged merchandise? A review of experiments that compare usability evaluation methods</article-title>. <source>Hum. Comp. Interact.</source> <volume>13</volume>, <fpage>203</fpage>&#x2013;<lpage>261</lpage>. doi: <pub-id pub-id-type="doi">10.1207/s15327051hci1303_2</pub-id></citation></ref>
<ref id="ref19"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Grimme</surname> <given-names>C.</given-names></name> <name><surname>Preuss</surname> <given-names>M.</given-names></name> <name><surname>Takes</surname> <given-names>F. W.</given-names></name> <name><surname>Waldherr</surname> <given-names>A.</given-names></name></person-group> eds. (<year>2020</year>). Disinformation in open online media: First multidisciplinary international symposium, MISDOOM 2019, Hamburg, Germany, February 27&#x2013;March 1, 2019, revised selected papers. Cham: Springer International Publishing Available at: <ext-link xlink:href="http://link.springer.com/10.1007/978-3-030-39627-5" ext-link-type="uri">http://link.springer.com/10.1007/978-3-030-39627-5</ext-link> (Accessed October 9, 2022).</citation></ref>
<ref id="ref20"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Guille</surname> <given-names>A.</given-names></name></person-group> (<year>2013</year>). &#x201C;Information diffusion in online social networks&#x201D; in <italic>Proceedings of the 2013 Sigmod/PODS Ph.D. Symposium on PhD symposium&#x2014;SIGMOD&#x2019;13 PhD symposium</italic> (New York, New York, USA: ACM Press), 31&#x2013;36.</citation></ref>
<ref id="ref21"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Hamilton</surname> <given-names>K.</given-names></name></person-group> (<year>2021</year>). &#x201C;Interrupting the propaganda supply chain&#x201D; in 1st International Workshop on Knowledge Graphs for Online Discourse Analysis (KnOD), Collocated with TheWebConf (WWW) 2021 (Ljubljana, Slovenia: ARROW@TU DublinContent Analysis: An Introduction to its Methodology), 7.</citation></ref>
<ref id="ref22"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hartson</surname> <given-names>H. R.</given-names></name> <name><surname>Andre</surname> <given-names>T. S.</given-names></name> <name><surname>Williges</surname> <given-names>R. C.</given-names></name></person-group> (<year>2003</year>). <article-title>Criteria for evaluating usability evaluation methods</article-title>. <source>Int. J. Hum. Comput. Interact.</source> <volume>15</volume>, <fpage>145</fpage>&#x2013;<lpage>181</lpage>. doi: <pub-id pub-id-type="doi">10.1207/S15327590IJHC1501_13</pub-id></citation></ref>
<ref id="ref23"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hassenzahl</surname> <given-names>M.</given-names></name> <name><surname>Tractinsky</surname> <given-names>N.</given-names></name></person-group> (<year>2006</year>). <article-title>User experience&#x2014;a research agenda</article-title>. <source>Behav. Inform. Technol.</source> <volume>25</volume>, <fpage>91</fpage>&#x2013;<lpage>97</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01449290500330331</pub-id></citation></ref>
<ref id="ref24"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Himelein-Wachowiak</surname> <given-names>M.</given-names></name> <name><surname>Giorgi</surname> <given-names>S.</given-names></name> <name><surname>Devoto</surname> <given-names>A.</given-names></name> <name><surname>Rahman</surname> <given-names>M.</given-names></name> <name><surname>Ungar</surname> <given-names>L.</given-names></name> <name><surname>Schwartz</surname> <given-names>H. A.</given-names></name> <etal/></person-group>. (<year>2021</year>). <article-title>Bots and misinformation spread on social media: implications for COVID-19</article-title>. <source>J. Med. Internet Res.</source> <volume>23</volume>, <fpage>e26933</fpage>&#x2013;<lpage>e26911</lpage>. doi: <pub-id pub-id-type="doi">10.2196/26933</pub-id>, PMID: <pub-id pub-id-type="pmid">33882014</pub-id></citation></ref>
<ref id="ref25"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hinsley</surname> <given-names>A.</given-names></name> <name><surname>Holton</surname> <given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>Fake news cues: examining the impact of content, source, and typology of news cues on People&#x2019;s confidence in identifying Mis- and disinformation</article-title>. <source>Int. J. Commun.</source> <volume>15</volume>, <fpage>4984</fpage>&#x2013;<lpage>5003</lpage>.</citation></ref>
<ref id="ref26"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Innes</surname> <given-names>M.</given-names></name> <name><surname>Dobreva</surname> <given-names>D.</given-names></name> <name><surname>Innes</surname> <given-names>H.</given-names></name></person-group> (<year>2021</year>). <article-title>Disinformation and digital influencing after terrorism: spoofing, truthing and social proofing</article-title>. <source>Contemp. Soc. Sci.</source> <volume>16</volume>, <fpage>241</fpage>&#x2013;<lpage>255</lpage>. doi: <pub-id pub-id-type="doi">10.1080/21582041.2019.1569714</pub-id></citation></ref>
<ref id="ref27"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Islam</surname> <given-names>A. K. M. N.</given-names></name> <name><surname>Laato</surname> <given-names>S.</given-names></name> <name><surname>Talukder</surname> <given-names>S.</given-names></name> <name><surname>Sutinen</surname> <given-names>E.</given-names></name></person-group> (<year>2020</year>). <article-title>Misinformation sharing and social media fatigue during COVID-19: an affordance and cognitive load perspective</article-title>. <source>Technol. Forecast. Soc. Chang.</source> <volume>159</volume>:<fpage>120201</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.techfore.2020.120201</pub-id>, PMID: <pub-id pub-id-type="pmid">32834137</pub-id></citation></ref>
<ref id="ref28"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jeffries</surname> <given-names>R.</given-names></name> <name><surname>Desurvire</surname> <given-names>H.</given-names></name></person-group> (<year>1992</year>). <article-title>Usability testing vs. heuristic evaluation: was there a contest?</article-title> <source>SIGCHI Bull.</source> <volume>24</volume>, <fpage>39</fpage>&#x2013;<lpage>41</lpage>. doi: <pub-id pub-id-type="doi">10.1145/142167.142179</pub-id></citation></ref>
<ref id="ref29"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kanozia</surname> <given-names>D. R.</given-names></name></person-group> (<year>2019</year>). <article-title>Analysis of digital tools and technologies for debunking fake news</article-title>. <source>J. Content Commun. Commun.</source> <volume>9</volume>, <fpage>114</fpage>&#x2013;<lpage>122</lpage>. doi: <pub-id pub-id-type="doi">10.31620/JCCC.06.19/16</pub-id></citation></ref>
<ref id="ref30"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kapantai</surname> <given-names>E.</given-names></name> <name><surname>Christopoulou</surname> <given-names>A.</given-names></name> <name><surname>Berberidis</surname> <given-names>C.</given-names></name> <name><surname>Peristeras</surname> <given-names>V.</given-names></name></person-group> (<year>2021</year>). <article-title>A systematic literature review on disinformation: toward a unified taxonomical framework</article-title>. <source>New Media Soc.</source> <volume>23</volume>, <fpage>1301</fpage>&#x2013;<lpage>1326</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1461444820959296</pub-id></citation></ref>
<ref id="ref31"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Krippendorff</surname> <given-names>K.</given-names></name></person-group> (<year>2012</year>). &#x201C;<article-title>Content analysis</article-title>&#x201D; in <source>Encyclopedia of Research Design</source>. ed. <person-group person-group-type="editor"><name><surname>Salkind</surname> <given-names>N. J.</given-names></name></person-group> (<publisher-loc>Thousand Oaks</publisher-loc>: <publisher-name>Sage Publications Inc.</publisher-name>), <fpage>234</fpage>&#x2013;<lpage>238</lpage>.</citation></ref>
<ref id="ref32"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Krippendorff</surname> <given-names>K.</given-names></name></person-group> (<year>2018</year>). <source>Content Analysis: An Introduction to its Methodology</source>. <edition>4th</edition> Edn. <publisher-loc>Thousand Oaks</publisher-loc>: <publisher-name>SAGE Publications Inc.</publisher-name></citation></ref>
<ref id="ref33"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Kumar</surname> <given-names>S.</given-names></name> <name><surname>Shah</surname> <given-names>N.</given-names></name></person-group> (<year>2018</year>). False information on web and social media: A survey. arXiv [Preprint]. doi: <pub-id pub-id-type="doi">10.48550/arXiv.1804.08559</pub-id></citation></ref>
<ref id="ref34"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Law</surname> <given-names>E. L.-C.</given-names></name> <name><surname>Hvannberg</surname> <given-names>E. T.</given-names></name></person-group> (<year>2004</year>). &#x201C;Analysis of strategies for improving and estimating the effectiveness of heuristic evaluation&#x201D; in <italic>Proceedings of the third Nordic conference on Human-computer interaction</italic>. Tampere Finland: ACM, 241&#x2013;250.</citation></ref>
<ref id="ref35"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Law</surname> <given-names>E. L.-C.</given-names></name> <name><surname>Roto</surname> <given-names>V.</given-names></name> <name><surname>Hassenzahl</surname> <given-names>M.</given-names></name> <name><surname>Vermeeren</surname> <given-names>A.</given-names></name> <name><surname>Kort</surname> <given-names>J.</given-names></name></person-group> (<year>2009</year>). &#x201C;Understanding, scoping and defining user eXperience: a survey approach&#x201D; in <italic>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</italic>. Boston, MA, 719&#x2013;728.</citation></ref>
<ref id="ref36"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Lazar</surname> <given-names>J.</given-names></name> <name><surname>Feng</surname> <given-names>J. H.</given-names></name> <name><surname>Hochheiser</surname> <given-names>H.</given-names></name></person-group> (<year>2017</year>). <source>Research Methods in Human-Computer Interaction</source>. <edition>2nd</edition> Edn. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>Morgan Kaufmann</publisher-name></citation></ref>
<ref id="ref37"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lee</surname> <given-names>J.</given-names></name></person-group> (<year>2022</year>). <article-title>The effect of web add-on correction and narrative correction on belief in misinformation depending on motivations for using social media</article-title>. <source>Behav. Inform. Technol.</source> <volume>41</volume>, <fpage>629</fpage>&#x2013;<lpage>643</lpage>. doi: <pub-id pub-id-type="doi">10.1080/0144929X.2020.1829708</pub-id></citation></ref>
<ref id="ref38"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Levak</surname> <given-names>T.</given-names></name></person-group> (<year>2021</year>). <article-title>Disinformation in the new media system &#x2013; characteristics, forms, reasons for its dissemination and potential means of tackling the issue</article-title>. <source>Medijska Istra&#x017E;.</source> <volume>26</volume>, <fpage>29</fpage>&#x2013;<lpage>58</lpage>. doi: <pub-id pub-id-type="doi">10.22572/mi.26.2.2</pub-id></citation></ref>
<ref id="ref39"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lewis</surname> <given-names>J. R.</given-names></name></person-group> (<year>2018</year>). <article-title>The system usability scale: past, present, and future</article-title>. <source>Int. J. Hum. Comput. Interact.</source> <volume>34</volume>, <fpage>577</fpage>&#x2013;<lpage>590</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10447318.2018.1455307</pub-id></citation></ref>
<ref id="ref40"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Lewis</surname> <given-names>J. R.</given-names></name> <name><surname>Sauro</surname> <given-names>J.</given-names></name></person-group> (<year>2021</year>). &#x201C;<article-title>Usability and user experience: design and evaluation</article-title>&#x201D; in <source>Handbook of Human Factors and Ergonomics</source>. eds. <person-group person-group-type="editor"><name><surname>Salvendy</surname> <given-names>G.</given-names></name> <name><surname>Karwowski</surname> <given-names>W.</given-names></name></person-group> (<publisher-loc>USA</publisher-loc>: <publisher-name>John Wiley &#x0026; Sons, Inc.</publisher-name>), <fpage>972</fpage>&#x2013;<lpage>1015</lpage>.</citation></ref>
<ref id="ref41"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Mayhew</surname> <given-names>D. J.</given-names></name></person-group> (<year>1991</year>). <source>Principles and Guidelines in Software User Interface Design</source>. <publisher-loc>Upper Saddle River, NJ</publisher-loc>: <publisher-name>Prentice-Hall Inc</publisher-name></citation></ref>
<ref id="ref42"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Mayorga</surname> <given-names>M. W.</given-names></name> <name><surname>Hester</surname> <given-names>E. B.</given-names></name> <name><surname>Helsel</surname> <given-names>E.</given-names></name> <name><surname>Ivanov</surname> <given-names>B.</given-names></name> <name><surname>Sellnow</surname> <given-names>T. L.</given-names></name> <name><surname>Slovic</surname> <given-names>P.</given-names></name> <etal/></person-group>. (<year>2020</year>). &#x201C;<article-title>Enhancing public resistance to &#x2018;fake news&#x2019;: a review of the problem and strategic solutions</article-title>&#x201D; in <source>The Handbook of Applied Communication Research</source>. eds. <person-group person-group-type="editor"><name><surname>O&#x2019;Hair</surname> <given-names>H. D.</given-names></name> <name><surname>O&#x2019;Hair</surname> <given-names>M. J.</given-names></name></person-group> (Hoboken, NJ: John Wiley &#x0026; Sons, Inc. <publisher-name>Wiley</publisher-name>), <fpage>197</fpage>&#x2013;<lpage>212</lpage>.</citation></ref>
<ref id="ref43"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Meel</surname> <given-names>P.</given-names></name> <name><surname>Vishwakarma</surname> <given-names>D. K.</given-names></name></person-group> (<year>2020</year>). <article-title>Fake news, rumor, information pollution in social media and web: a contemporary survey of state-of-the-arts, challenges and opportunities</article-title>. <source>Expert Syst. Appl.</source> <volume>153</volume>:<fpage>112986</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.eswa.2019.112986</pub-id></citation></ref>
<ref id="ref44"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mehta</surname> <given-names>A. M.</given-names></name> <name><surname>Liu</surname> <given-names>B. F.</given-names></name> <name><surname>Tyquin</surname> <given-names>E.</given-names></name> <name><surname>Tam</surname> <given-names>L.</given-names></name></person-group> (<year>2021</year>). <article-title>A process view of crisis misinformation: how public relations professionals detect, manage, and evaluate crisis misinformation</article-title>. <source>Public Relat. Rev.</source> <volume>47</volume>:<fpage>102040</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.pubrev.2021.102040</pub-id></citation></ref>
<ref id="ref45"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Morris</surname> <given-names>D. S.</given-names></name> <name><surname>Morris</surname> <given-names>J. S.</given-names></name> <name><surname>Francia</surname> <given-names>P. L.</given-names></name></person-group> (<year>2020</year>). <article-title>A fake news inoculation? Fact checkers, partisan identification, and the power of misinformation</article-title>. <source>Politics Groups Identit.</source> <volume>8</volume>, <fpage>986</fpage>&#x2013;<lpage>1005</lpage>. doi: <pub-id pub-id-type="doi">10.1080/21565503.2020.1803935</pub-id></citation></ref>
<ref id="ref46"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nidhra</surname> <given-names>S.</given-names></name></person-group> (<year>2012</year>). <article-title>Black box and white box testing techniques&#x2014;a literature review</article-title>. <source>IJESA</source> <volume>2</volume>, <fpage>29</fpage>&#x2013;<lpage>50</lpage>. doi: <pub-id pub-id-type="doi">10.5121/ijesa.2012.2204</pub-id></citation></ref>
<ref id="ref47"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Nielsen</surname> <given-names>J.</given-names></name></person-group> (<year>1994</year>). &#x201C;<article-title>Enhancing the explanatory power of usability heuristics</article-title>&#x201D; in <source>Usability Inspection Methods</source>. In Proceedings of the ACM CHI &#x2019;94: conference companion on human factors in computing systems; Boston, MA: ACM, <fpage>152</fpage>&#x2013;<lpage>158</lpage>.</citation></ref>
<ref id="ref48"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Nielsen</surname> <given-names>J.</given-names></name></person-group> (<year>2020</year>). <source>10 Usability Heuristics for User Interface Design</source> <publisher-name>Nielsen Norman Group</publisher-name>.</citation></ref>
<ref id="ref49"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Nielsen</surname> <given-names>J.</given-names></name> <name><surname>Landauer</surname> <given-names>J.</given-names></name></person-group> (<year>1993</year>). &#x201C;A mathematical model of finding the usability problems&#x201D; in <italic>CHI &#x2018;93: Proceedings of the INTERACT &#x2018;93 and CHI &#x2018;93 Conference on Human Factors in Computing Systems (Amsterdam)</italic>, 206&#x2013;213.</citation></ref>
<ref id="ref50"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Patten</surname> <given-names>M.</given-names></name></person-group> (<year>2016</year>). <source>Questionnaire Research: A Practical Guide</source> <edition>4th</edition> Edn. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Routledge</publisher-name>.</citation></ref>
<ref id="ref51"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pierre</surname> <given-names>J. M.</given-names></name></person-group> (<year>2020</year>). <article-title>Mistrust and misinformation: a two-component, socio-epistemic model of belief in conspiracy theories</article-title>. <source>J. Soc. Polit. Psychol.</source> <volume>8</volume>, <fpage>617</fpage>&#x2013;<lpage>641</lpage>. doi: <pub-id pub-id-type="doi">10.5964/jspp.v8i2.1362</pub-id></citation></ref>
<ref id="ref52"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Plasser</surname> <given-names>F.</given-names></name></person-group> (<year>2005</year>). <article-title>From hard to soft news standards?: how political journalists in different media systems evaluate the shifting quality of news</article-title>. <source>Harv. Int. J. Press/Politics</source> <volume>10</volume>, <fpage>47</fpage>&#x2013;<lpage>68</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1081180X05277746</pub-id></citation></ref>
<ref id="ref53"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pomputius</surname> <given-names>A.</given-names></name></person-group> (<year>2019</year>). <article-title>Putting misinformation under a microscope: exploring technologies to address predatory false information online</article-title>. <source>Med. Ref. Serv. Q.</source> <volume>38</volume>, <fpage>369</fpage>&#x2013;<lpage>375</lpage>. doi: <pub-id pub-id-type="doi">10.1080/02763869.2019.1657739</pub-id>, PMID: <pub-id pub-id-type="pmid">31687908</pub-id></citation></ref>
<ref id="ref54"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Posetti</surname> <given-names>J.</given-names></name> <name><surname>Matthews</surname> <given-names>A.</given-names></name></person-group> (<year>2018</year>). A short guide to the history of &#x2018;fake news&#x2019; and disinformation. International Center for Journalists. Available at: <ext-link xlink:href="https://www.icfj.org/sites/default/files/2018-07/A%20Short%20Guide%20to%20History%20of%20Fake%20News%20and%20Disinformation_ICFJ%20Final.pdf" ext-link-type="uri">https://www.icfj.org/sites/default/files/2018-07/A%20Short%20Guide%20to%20History%20of%20Fake%20News%20and%20Disinformation_ICFJ%20Final.pdf</ext-link></citation></ref>
<ref id="ref55"><citation citation-type="web"><person-group person-group-type="author"><collab id="coll3">RAND Corporation</collab></person-group> (<year>2020</year>). Fighting disinformation online: Building the database of web tools. RAND Corporation Available at: <ext-link xlink:href="https://www.rand.org/pubs/research_reports/RR3000.html" ext-link-type="uri">https://www.rand.org/pubs/research_reports/RR3000.html</ext-link></citation></ref>
<ref id="ref56"><citation citation-type="web"><person-group person-group-type="author"><collab id="coll4">RAND Corporation</collab></person-group> (<year>n.d.</year>). Tools that fight disinformation online. RAND Corporation Available at: <ext-link xlink:href="https://www.rand.org/research/projects/truth-decay/fighting-disinformation/search.html" ext-link-type="uri">https://www.rand.org/research/projects/truth-decay/fighting-disinformation/search.html</ext-link></citation></ref>
<ref id="ref57"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Riihiaho</surname> <given-names>S.</given-names></name></person-group> (<year>2017</year>). &#x201C;<article-title>Usability Testing</article-title>&#x201D; in <source>The Wiley Handbook of Human Computer Interaction</source>. eds. <person-group person-group-type="editor"><name><surname>Norman</surname> <given-names>K. L.</given-names></name> <name><surname>Kirakowski</surname> <given-names>J.</given-names></name></person-group> (<publisher-loc>USA</publisher-loc>: <publisher-name>John Wiley &#x0026; Sons</publisher-name>), <fpage>257</fpage>&#x2013;<lpage>275</lpage>.</citation></ref>
<ref id="ref58"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rodr&#x00ED;guez-Virgili</surname> <given-names>J.</given-names></name> <name><surname>Serrano-Puche</surname> <given-names>J.</given-names></name> <name><surname>Fern&#x00E1;ndez</surname> <given-names>C. B.</given-names></name></person-group> (<year>2021</year>). <article-title>Digital disinformation and preventive actions: perceptions of users from Argentina, Chile, and Spain</article-title>. <source>Media Commun.</source> <volume>9</volume>, <fpage>323</fpage>&#x2013;<lpage>337</lpage>. doi: <pub-id pub-id-type="doi">10.17645/MAC.V9I1.3521</pub-id></citation></ref>
<ref id="ref59"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Rosenzweig</surname> <given-names>E.</given-names></name></person-group> (<year>2015</year>). <source>Successful User Experience: Strategies and Roadmaps</source>. <publisher-loc>Waltham, MA, USA</publisher-loc>: <publisher-name>Morgan Kaufmann</publisher-name></citation></ref>
<ref id="ref60"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Spohr</surname> <given-names>D.</given-names></name></person-group> (<year>2017</year>). <article-title>Fake news and ideological polarization: filter bubbles and selective exposure on social media</article-title>. <source>Bus. Inf. Rev.</source> <volume>34</volume>, <fpage>150</fpage>&#x2013;<lpage>160</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0266382117722446</pub-id></citation></ref>
<ref id="ref61"><citation citation-type="book"><person-group person-group-type="editor"><name><surname>Tashakkori</surname> <given-names>A.</given-names></name> <name><surname>Teddlie</surname> <given-names>C.</given-names></name></person-group> eds. (<year>2003</year>). <source>Handbook of Mixed Methods in Social and Behavioral Research</source>. <publisher-loc>Thousand Oaks, CA</publisher-loc>: <publisher-name>SAGE Publications Inc.</publisher-name></citation></ref>
<ref id="ref62"><citation citation-type="web"><person-group person-group-type="author"><collab id="coll5">Technical Committee ISO/TC 159</collab></person-group> (<year>2019</year>). ISO 9241-210:2019, 3.2.3. Available at: <ext-link xlink:href="https://www.iso.org/obp/ui/#iso:std:iso:9241:-210:ed-2:v1:en" ext-link-type="uri">https://www.iso.org/obp/ui/#iso:std:iso:9241:-210:ed-2:v1:en</ext-link></citation></ref>
<ref id="ref63"><citation citation-type="web"><person-group person-group-type="author"><collab id="coll6">U.S. Department of Health and Human Services</collab></person-group> (ed.) (<year>2006</year>). Research-based web design &#x0026; usability guidelines. Version 2. Washington, D.C: U.S. Dept. of Health and Human Services: U.S. General Services Administration Available at: <ext-link xlink:href="https://www.usability.gov/sites/default/files/documents/guidelines_book.pdf" ext-link-type="uri">https://www.usability.gov/sites/default/files/documents/guidelines_book.pdf</ext-link>.</citation></ref>
<ref id="ref64"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vizoso</surname> <given-names>&#x00C1;.</given-names></name> <name><surname>Vaz-&#x00C1;lvarez</surname> <given-names>M.</given-names></name> <name><surname>L&#x00F3;pez-Garc&#x00ED;a</surname> <given-names>X.</given-names></name></person-group> (<year>2021</year>). <article-title>Fighting Deepfakes: media and internet giants&#x2019; converging and diverging strategies against hi-tech misinformation</article-title>. <source>Macromolecules</source> <volume>9</volume>, <fpage>291</fpage>&#x2013;<lpage>300</lpage>. doi: <pub-id pub-id-type="doi">10.17645/mac.v9i1.3494</pub-id></citation></ref>
<ref id="ref65"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Wardle</surname> <given-names>C.</given-names></name> <name><surname>Derakhshan</surname> <given-names>H.</given-names></name></person-group> (<year>2017</year>). Information disorder: toward an interdisciplinary framework for research and policy making. Council of Europe Available at: <ext-link xlink:href="https://rm.coe.int/information-disorder-toward-an-interdisciplinary-framework-for-researc/168076277c" ext-link-type="uri">https://rm.coe.int/information-disorder-toward-an-interdisciplinary-framework-for-researc/168076277c</ext-link></citation></ref>
<ref id="ref66"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Weigel</surname> <given-names>F. K.</given-names></name> <name><surname>Hazen</surname> <given-names>B. T.</given-names></name></person-group> (<year>2014</year>). <article-title>Technical proficiency for IS success</article-title>. <source>Comput. Hum. Behav.</source> <volume>31</volume>, <fpage>27</fpage>&#x2013;<lpage>36</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2013.10.014</pub-id></citation></ref>
<ref id="ref67"><citation citation-type="web"><person-group person-group-type="author"><collab id="coll7">World News Daily Report</collab></person-group> (<year>n.d.</year>). Hairdresser arrested for making voodoo dolls from customer&#x2019; hair. World news daily report. Available at: <ext-link xlink:href="https://worldnewsdailyreport.com/hairdresser-arrested-for-making-voodoo-dolls-from-customers-hair/" ext-link-type="uri">https://worldnewsdailyreport.com/hairdresser-arrested-for-making-voodoo-dolls-from-customers-hair/</ext-link>.</citation></ref>
</ref-list>
</back>
</article>
