Rank these sources from 1 (MOST credible) to 5 (LEAST credible) for academic research. Consider peer review, author credentials, methodology, and potential bias.
Navigate this decision tree to evaluate a research claim. Each choice affects your path - choose wisely based on research methodology principles.
Rate the credibility of these research claims. Click your assessment for each scenario.
Source: Non-peer-reviewed preprint by nuclear engineer (not biologist)
Sample: n=45 participants
Funding: Nuclear industry
Scientific consensus: Contradicts mainstream research
Source: Lancet meta-analysis by public health researchers
Sample: Analysis of 100+ studies
Funding: WHO and NIH grants
Scientific consensus: Widely supported by experts
Source: Health blog by self-taught coach
Sample: Personal testimonials only
Funding: Sells the supplements mentioned
Scientific consensus: No peer-reviewed support
Match each research scenario with the specific cognitive bias it demonstrates. Drag bias cards to the appropriate scenarios.
Examine this interactive chart and identify potential data manipulation techniques. Click on suspicious elements to investigate.
You have 60 seconds to identify all the p-hacking techniques in this research summary. Click on suspicious elements as quickly as possible!
Complete the challenges above to prove your research literacy and unlock the library doors!