, Is this source or information good?

I. Agrafiotis, S. Creese, M. Goldsmith, and J. Nurse, Information trustworthiness as a solution to the misinformation problems in social media, 2015.

M. Bacharach and D. Gambetta, Trust in signs. Trust in society, 2001.

K. Barber and J. Kim, Belief Revision Process Based on Trust: Agents Evaluating Reputation of Information Sources, Trust in Cyber-societies, pp.73-82, 2001.
DOI : 10.1007/3-540-45547-7_5

M. Bense, Introduction to theoretical aesthetics fundamentals and application in text theory, 1969.

J. Berger, L. Katherine, and . Milkman, What makes online content viral? Journal of marketing research, pp.192-205, 2012.
DOI : 10.2139/ssrn.1528077

G. David and B. , Aesthetic measure, 1933.

J. Seely-brown and P. Duguid, The Social Life of Information: Updated, with a New Preface, Harvard Business Review Press, 2017.

G. Elias, . Carayannis, F. David, and . Campbell, Knowledge creation, diffusion, and use in innovation networks and knowledge clusters: a comparative systems approach across the United States, Europe, and Asia, 2006.

G. Kerry, . Coffman, M. Andrew, and . Odlyzko, Internet growth: Is there a moores law for data traffic? In Handbook of massive data sets, pp.47-93, 2002.

N. Dwyer and S. Marsh, Self-trust, Self-efficacy and Digital Learning, IFIP International Conference on Trust Management, pp.110-115, 2017.
DOI : 10.4018/978-1-4666-6158-5.ch002

URL : https://hal.archives-ouvertes.fr/hal-01651166

, Computing with Social Trust HumanComputer Interaction Series, 2009.

A. Natascha, . Karlova, E. Karen, and . Fisher, Plz rt: A social diffusion model of misinformation and disinformation for understanding human information behaviour, Information Research, vol.18, issue.1, pp.1-17, 2013.

B. Koops, C. Prins, and H. Hijmans, ICT law and internationalisation: a survey of government views, 2000.

X. Liu, E. Datta, and . Lim, Computational Trust Models and Machine Learning, 2014.
DOI : 10.1201/b17778

S. Marsh and P. Briggs, Examining trust, forgiveness and regret as computational concepts. Computing with social trust, 2009.

S. Marsh, infodna (version 2) agent enhanced trustworthy distributed information, PST, pp.149-153, 2004.

S. Marsh, P. Briggs, K. El-khatib, B. Esfandiari, and J. A. Stewart, Defining and Investigating Device Comfort, Defining and Investigating Device Comfort, pp.231-252, 2011.
DOI : 10.2197/ipsjjip.19.231

S. Marsh, A. Ali, . Ghorbani, C. Virendra, and . Bhavsar, The acorn multi-agent system. Web Intelligence and Agent Systems, An International Journal, vol.1, issue.1, pp.65-86, 2003.

S. Marsh, Y. Wang, S. Noel, L. Robart, and J. Stewart, Device Comfort for mobile health information accessibility, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.377-380, 2013.
DOI : 10.1109/PST.2013.6596095

S. Paul and M. , Formalising trust as a computational concept, 1994.

D. Harrison, M. Norman, and L. Chervany, The meanings of trust, 1996.

M. Mcluhan and Q. Fiore, The medium is the message, pp.126-128, 1967.

A. Moles, Information theory and esthetic perception, 1968.

S. Pinch, N. Henry, M. Jenkins, and S. Tallman, From 'industrial districts' to 'knowledge clusters': a model of knowledge dissemination and competitive advantage in industrial agglomerations, Journal of Economic Geography, vol.3, issue.4, pp.373-388, 2003.
DOI : 10.1093/jeg/lbg019

J. Rigau, M. Feixas, and M. Sbert, Informational Aesthetics Measures, IEEE Computer Graphics and Applications, vol.28, issue.2, 2008.
DOI : 10.1109/MCG.2008.34

A. Nancy, . Ross, C. Michael, . Wolfson, R. James et al., Relation between income inequality and mortality in canada and in the united states: cross sectional assessment using census data and vital statistics, Bmj, issue.7239, pp.320898-902, 2000.

R. Scha and R. Bod, Computationele esthetica, Informatie en Informatiebeleid, vol.11, issue.1, pp.54-63, 1993.

C. Silverman, Lies, damn lies and viral content, 2015.

T. Storer, S. Marsh, S. Noel, B. Esfandiari, K. El-khatib et al., Encouraging second thoughts: Obstructive user interfaces for raising security awareness, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.366-368, 2013.
DOI : 10.1109/PST.2013.6596092

S. George and . Takach, Computer law (toronto: Irwin law, 1997), reviewed by david johnston, chair of the highway advisory council, CB LJ, vol.30, p.314, 1998.

S. Tallman, M. Jenkins, N. Henry, and S. Pinch, Knowledge, Clusters, and Competitive Advantage, Academy of Management Review, vol.29, issue.2, pp.258-271, 2004.
DOI : 10.5465/amr.2004.12736089

K. Tuominen and R. Savolainen, A social constructionist approach to the study of information use as discursive action, Proceedings of an international conference on Information seeking in context, pp.81-96, 1997.

M. Witkowski, A. Artikis, and J. Pitt, Experiments in Building Experiential Trust in a Society of Objective-Trust Based Agents, Trust in Cybersocieties, pp.111-132, 2001.
DOI : 10.1007/3-540-45547-7_7