SlideShare a Scribd company logo
BURSTING YOUR
(FILTER) BUBBLE
Learning from Selective Exposure
R. Kelly Garrett | Asst. Professor | OSU School of
Communication
CSCW ’13, San Antonio, TX
February 25, 2013
SELECTIVE EXPOSURE
 Political attitudes influence what information people
consume (Lazarsfeld, et al., 1948; Frey, 1986)
 Selective approach, selective avoidance (Garrett,
2009)
 Not echo chambers (Gentzkow & Shapiro, 2011; Webster &
Ksiazek , 2012, Garrett et al., 2013)
 Context matters
 Effective design can capitalize on what we’ve
learned garrett.258@osu.edu 2
THE PROBLEM WITH EITHER/OR
garrett.258@osu.edu 3
CONTENT CUES
 Two experiments with similar design
 One using source cues (Iyengar & Hahn, 2009)
 Other using content cues (Garrett & Stroud,
2012)
 Strikingly different results
 Conservatives preferred Fox and avoided
CNN & NPR; Liberals the reverse
 Neither conservatives nor liberals consistently
avoided counter-attitudinal
 Lesson: Content cues may help overcome
some expressions of bias
4garrett.258@osu.edu
PARTY AFFILIATION
 Republicans avoid predominantly
counter-attitudinal content
 Democrats seek high levels of
pro-attitudinal content
 Both groups entertain diverse viewpoints
 Lesson: Different mixes of content may appeal
depending on the consumer’s political identity
5garrett.258@osu.edu
Avoid this… But not this.
And this.Seek this…
MOTIVATED REASONING & GOALS
 News consumers’ information seeking varies
depending on their goals (Carnahan, 2013)
 Accuracy
 Directional
 Closure
 For example, individuals who expect to publicly
justify their position to experts are more balanced
consumers
 Lesson: If you can prime accuracy goals, you can
make diverse exposure more palatable
6garrett.258@osu.edu
EMOTIONS
 Anxiety (Valentino et al., 2009; Carnahan et al., 2011)
 Individuals seek out diverse viewpoints when that
information helps them alleviate the threat
 Anger?
 We may avoid or abandon sources that make us angry
 Lessons: Users’ emotional states can provide clues
to the types of content that will attract them
7garrett.258@osu.edu
BROADER DESIGN IMPLICATIONS
 More sophisticated understanding of preferences
 Don’t present users with an either/or choice
 Recommend sets or streams of information
 Use context
 Provide counter-attitudinal content in form or context
that people find most palatable
 Nudge
 Prime normative expectations, benefits of counter-
attitudinal exposure (or risks of ignorance), etc.
8garrett.258@osu.edu

More Related Content

Similar to CSCW2013 Bursting your (filter) bubble

Human Growth & Development Advocacy ProjectAssignmentEDPS 210 co
Human Growth & Development  Advocacy ProjectAssignmentEDPS 210 coHuman Growth & Development  Advocacy ProjectAssignmentEDPS 210 co
Human Growth & Development Advocacy ProjectAssignmentEDPS 210 co
NarcisaBrandenburg70
 
Research methods a critical review1AimsTo .docx
Research methods a critical review1AimsTo .docxResearch methods a critical review1AimsTo .docx
Research methods a critical review1AimsTo .docx
verad6
 
fraenkel4_ppt_ch01 (3).ppt
fraenkel4_ppt_ch01 (3).pptfraenkel4_ppt_ch01 (3).ppt
fraenkel4_ppt_ch01 (3).ppt
CristineAuditor
 
Fraenkel4 ppt ch01
Fraenkel4 ppt ch01Fraenkel4 ppt ch01
Fraenkel4 ppt ch01
Gideon Tiongco
 
fraenkel4_ppt_ch01.ppt
fraenkel4_ppt_ch01.pptfraenkel4_ppt_ch01.ppt
fraenkel4_ppt_ch01.ppt
NAVEED1000
 
Lecture_research_question.pdf new presenta
Lecture_research_question.pdf new presentaLecture_research_question.pdf new presenta
Lecture_research_question.pdf new presenta
Diana Odhiambo
 
An Investigation Of Discrepancies Between Qualitative And Quantitative Findin...
An Investigation Of Discrepancies Between Qualitative And Quantitative Findin...An Investigation Of Discrepancies Between Qualitative And Quantitative Findin...
An Investigation Of Discrepancies Between Qualitative And Quantitative Findin...
Kelly Lipiec
 
How do they describe their research methods document 15.docx
How do they describe their research methods document 15.docxHow do they describe their research methods document 15.docx
How do they describe their research methods document 15.docx
intel-writers.com
 
Communicating Science to Policymakers
Communicating Science to PolicymakersCommunicating Science to Policymakers
Communicating Science to Policymakers
Scientists and Engineers for America
 
RUNNING HEAD TECHNOLOGY .docx
RUNNING HEAD TECHNOLOGY                                          .docxRUNNING HEAD TECHNOLOGY                                          .docx
RUNNING HEAD TECHNOLOGY .docx
toltonkendal
 
Unsolicited advice: lessons for impacting public policy
Unsolicited advice: lessons for impacting public policyUnsolicited advice: lessons for impacting public policy
Unsolicited advice: lessons for impacting public policy
Troy D. Mix
 
ParaphrasingforPSYC206
ParaphrasingforPSYC206ParaphrasingforPSYC206
ParaphrasingforPSYC206
Stevenson University
 
Nonexperimental researchstrengths, weaknessesand issues o.docx
Nonexperimental researchstrengths, weaknessesand issues o.docxNonexperimental researchstrengths, weaknessesand issues o.docx
Nonexperimental researchstrengths, weaknessesand issues o.docx
vannagoforth
 
Metopen Armiya.pptx
Metopen Armiya.pptxMetopen Armiya.pptx
Metopen Armiya.pptx
ogie6
 
Part II: Design
Part II: DesignPart II: Design
Part II: Design
Mariuxi Arcos
 
Collaboration and stakeholder workshop
Collaboration and stakeholder workshopCollaboration and stakeholder workshop
Collaboration and stakeholder workshop
Data Science Studies UW
 
Understanding Different Types of Case Studies_ An Ultimate Guide
Understanding Different Types of Case Studies_ An Ultimate GuideUnderstanding Different Types of Case Studies_ An Ultimate Guide
Understanding Different Types of Case Studies_ An Ultimate Guide
Harry Brook
 
Introductory Course On Public Speaking
Introductory  Course On  Public  SpeakingIntroductory  Course On  Public  Speaking
Introductory Course On Public Speaking
David Deubelbeiss
 
Massey University PhD Induction July 2018 NCTL Session
Massey University PhD Induction July 2018 NCTL SessionMassey University PhD Induction July 2018 NCTL Session
Massey University PhD Induction July 2018 NCTL Session
Martin McMorrow
 
Mistakes in comparative research method
Mistakes in comparative research methodMistakes in comparative research method
Mistakes in comparative research method
iouellet
 

Similar to CSCW2013 Bursting your (filter) bubble (20)

Human Growth & Development Advocacy ProjectAssignmentEDPS 210 co
Human Growth & Development  Advocacy ProjectAssignmentEDPS 210 coHuman Growth & Development  Advocacy ProjectAssignmentEDPS 210 co
Human Growth & Development Advocacy ProjectAssignmentEDPS 210 co
 
Research methods a critical review1AimsTo .docx
Research methods a critical review1AimsTo .docxResearch methods a critical review1AimsTo .docx
Research methods a critical review1AimsTo .docx
 
fraenkel4_ppt_ch01 (3).ppt
fraenkel4_ppt_ch01 (3).pptfraenkel4_ppt_ch01 (3).ppt
fraenkel4_ppt_ch01 (3).ppt
 
Fraenkel4 ppt ch01
Fraenkel4 ppt ch01Fraenkel4 ppt ch01
Fraenkel4 ppt ch01
 
fraenkel4_ppt_ch01.ppt
fraenkel4_ppt_ch01.pptfraenkel4_ppt_ch01.ppt
fraenkel4_ppt_ch01.ppt
 
Lecture_research_question.pdf new presenta
Lecture_research_question.pdf new presentaLecture_research_question.pdf new presenta
Lecture_research_question.pdf new presenta
 
An Investigation Of Discrepancies Between Qualitative And Quantitative Findin...
An Investigation Of Discrepancies Between Qualitative And Quantitative Findin...An Investigation Of Discrepancies Between Qualitative And Quantitative Findin...
An Investigation Of Discrepancies Between Qualitative And Quantitative Findin...
 
How do they describe their research methods document 15.docx
How do they describe their research methods document 15.docxHow do they describe their research methods document 15.docx
How do they describe their research methods document 15.docx
 
Communicating Science to Policymakers
Communicating Science to PolicymakersCommunicating Science to Policymakers
Communicating Science to Policymakers
 
RUNNING HEAD TECHNOLOGY .docx
RUNNING HEAD TECHNOLOGY                                          .docxRUNNING HEAD TECHNOLOGY                                          .docx
RUNNING HEAD TECHNOLOGY .docx
 
Unsolicited advice: lessons for impacting public policy
Unsolicited advice: lessons for impacting public policyUnsolicited advice: lessons for impacting public policy
Unsolicited advice: lessons for impacting public policy
 
ParaphrasingforPSYC206
ParaphrasingforPSYC206ParaphrasingforPSYC206
ParaphrasingforPSYC206
 
Nonexperimental researchstrengths, weaknessesand issues o.docx
Nonexperimental researchstrengths, weaknessesand issues o.docxNonexperimental researchstrengths, weaknessesand issues o.docx
Nonexperimental researchstrengths, weaknessesand issues o.docx
 
Metopen Armiya.pptx
Metopen Armiya.pptxMetopen Armiya.pptx
Metopen Armiya.pptx
 
Part II: Design
Part II: DesignPart II: Design
Part II: Design
 
Collaboration and stakeholder workshop
Collaboration and stakeholder workshopCollaboration and stakeholder workshop
Collaboration and stakeholder workshop
 
Understanding Different Types of Case Studies_ An Ultimate Guide
Understanding Different Types of Case Studies_ An Ultimate GuideUnderstanding Different Types of Case Studies_ An Ultimate Guide
Understanding Different Types of Case Studies_ An Ultimate Guide
 
Introductory Course On Public Speaking
Introductory  Course On  Public  SpeakingIntroductory  Course On  Public  Speaking
Introductory Course On Public Speaking
 
Massey University PhD Induction July 2018 NCTL Session
Massey University PhD Induction July 2018 NCTL SessionMassey University PhD Induction July 2018 NCTL Session
Massey University PhD Induction July 2018 NCTL Session
 
Mistakes in comparative research method
Mistakes in comparative research methodMistakes in comparative research method
Mistakes in comparative research method
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

CSCW2013 Bursting your (filter) bubble

  • 1. BURSTING YOUR (FILTER) BUBBLE Learning from Selective Exposure R. Kelly Garrett | Asst. Professor | OSU School of Communication CSCW ’13, San Antonio, TX February 25, 2013
  • 2. SELECTIVE EXPOSURE  Political attitudes influence what information people consume (Lazarsfeld, et al., 1948; Frey, 1986)  Selective approach, selective avoidance (Garrett, 2009)  Not echo chambers (Gentzkow & Shapiro, 2011; Webster & Ksiazek , 2012, Garrett et al., 2013)  Context matters  Effective design can capitalize on what we’ve learned garrett.258@osu.edu 2
  • 3. THE PROBLEM WITH EITHER/OR garrett.258@osu.edu 3
  • 4. CONTENT CUES  Two experiments with similar design  One using source cues (Iyengar & Hahn, 2009)  Other using content cues (Garrett & Stroud, 2012)  Strikingly different results  Conservatives preferred Fox and avoided CNN & NPR; Liberals the reverse  Neither conservatives nor liberals consistently avoided counter-attitudinal  Lesson: Content cues may help overcome some expressions of bias 4garrett.258@osu.edu
  • 5. PARTY AFFILIATION  Republicans avoid predominantly counter-attitudinal content  Democrats seek high levels of pro-attitudinal content  Both groups entertain diverse viewpoints  Lesson: Different mixes of content may appeal depending on the consumer’s political identity 5garrett.258@osu.edu Avoid this… But not this. And this.Seek this…
  • 6. MOTIVATED REASONING & GOALS  News consumers’ information seeking varies depending on their goals (Carnahan, 2013)  Accuracy  Directional  Closure  For example, individuals who expect to publicly justify their position to experts are more balanced consumers  Lesson: If you can prime accuracy goals, you can make diverse exposure more palatable 6garrett.258@osu.edu
  • 7. EMOTIONS  Anxiety (Valentino et al., 2009; Carnahan et al., 2011)  Individuals seek out diverse viewpoints when that information helps them alleviate the threat  Anger?  We may avoid or abandon sources that make us angry  Lessons: Users’ emotional states can provide clues to the types of content that will attract them 7garrett.258@osu.edu
  • 8. BROADER DESIGN IMPLICATIONS  More sophisticated understanding of preferences  Don’t present users with an either/or choice  Recommend sets or streams of information  Use context  Provide counter-attitudinal content in form or context that people find most palatable  Nudge  Prime normative expectations, benefits of counter- attitudinal exposure (or risks of ignorance), etc. 8garrett.258@osu.edu

Editor's Notes

  1. Kick off with a discussion of what social scientists know about how people’s political predispositions shape their exposure to political news. This provides a foundation on which we can build new design strategies.
  2. Not a new idea: Bacon wrote about it in the 17th c; social science research dates back to the 1940s. Two distinct dimensions, with different causes and effects Generally speaking, people don’t have an aversion to news sources that present multiple viewpoints. They do, however, like to be reassured that their viewpoint has merit. How individuals achieve this varies, but it rarely mean shunning counter-attitudinal content. Exposure decisions are highly contextual, depending on both the news consumer’s demographic traits and his or her state of mind. Understanding this, designers can think about crafting systems that promote diverse exposure by accounting for these differences.
  3. If we build systems that confound selective approach and selective avoidance, echo chambers are what we’ll get (e.g., http://www.bing.com/politics/news?filter=all) Results from front page on 2/25 We can do better
  4. Content cues: Individuals tend to use source as a heuristic for the partisan bias of a source (e.g., Fox is conservative, MSNBC is liberal), which has amplify aversion to these sources. Cues derived from content (e.g., the story contains extensive coverage of position X, less of position Y) could provide more nuance, potentially encouraging individuals to examine sources they might otherwise avoid. Iyengar, S., & Hahn, K. S. (2009). Red Media, Blue Media: Evidence of Ideological Selectivity in Media Use. Journal of Communication, 59, 19-39. Garrett, R. K., & Stroud, N. J. (2012). Decoupling selective approach and selective avoidance. Paper presented at the Annual Conference of the National Communication Association, Orlando, FL.
  5. Further insight from the cue-based study described on the previous page. Garrett, R. K., & Stroud, N. J. (2012). Decoupling selective approach and selective avoidance. Paper presented at the Annual Conference of the National Communication Association, Orlando, FL.
  6. “accuracy goals promoted the use of more sources, a greater degree of balance in the information search, and more time spent reading the stories” Carnahan, Dustin. (2013) Why Motivations Matter: How Judgment Goals Influence Political Information-Seeking Practices and Their Implications for Deliberative Democracy. Ph.D. Dissertation in progress, Ohio State University (Political Science).
  7. This has been shown in the lab and in the wild. For example, Republican’s likelihood of examining left-leaning sources during the ’08 election cycle increased with the prospects of an Obama victory. (“Know thy enemy”) Valentino, N. A., Banks, A. J., Hutchings, V. L., & Davis, A. K. (2009). Selective Exposure in the Internet Age: The Interaction between Anxiety and Information Utility. Political Psychology, 30(4), 591-613. Carnahan, D., Lynch, E., & Garrett, R. K. (2011). Who are the “opinion-challengers”? Understanding online exposure practices and the role of information utility in the 2008 U.S. Election. Paper presented at the 69th Annual Midwest Political Science Association Conference, Chicago, IL. Schwarz, N. (2012). Feelings-as-information theory. In P. A. M. V. Lange, A. W. Kruglanski & E. T. Higgins (Eds.), Handbook of Theories of Social Psychology: Volume One (pp. 289-308). Thousand Oaks: Sage.
  8. E.g., prioritize quality, popularity, interestingness over partisanship or ideology.