{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T11:12:01Z","timestamp":1777029121798,"version":"3.51.4"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s10676-024-09797-z","type":"journal-article","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:02:20Z","timestamp":1725534140000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Authenticity in authorship: the Writer\u2019s Integrity framework for verifying human-generated text"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7757-3953","authenticated-orcid":false,"given":"Sanad","family":"Aburass","sequence":"first","affiliation":[]},{"given":"Maha","family":"Abu Rumman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,5]]},"reference":[{"key":"9797_CR1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2024.0150148","author":"S Aburass","year":"2024","unstructured":"Aburass, S., Dorgham, O., & Rumman, M. A. (2024a). An Ensemble approach to question classification: Integrating electra transformer, GloVe, and LSTM. International Journal of Advanced Computer Science and Applications. https:\/\/doi.org\/10.14569\/IJACSA.2024.0150148","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"9797_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sasc.2024.200110","volume":"6","author":"S Aburass","year":"2024","unstructured":"Aburass, S., Dorgham, O., & Shaqsi, J. A. (2024b). A hybrid machine learning model for classifying gene mutations in cancer using LSTM, BiLSTM, CNN, GRU, and GloVe. Systems and Soft Computing, 6, 200110. https:\/\/doi.org\/10.1016\/j.sasc.2024.200110","journal-title":"Systems and Soft Computing"},{"issue":"12","key":"9797_CR3","doi-asserted-by":"publisher","first-page":"130","DOI":"10.14569\/IJACSA.2020.0111216","volume":"11","author":"S AbuRass","year":"2020","unstructured":"AbuRass, S., Huneiti, A., & Al-Zoubi, M. B. (2020). Enhancing convolutional neural network using Hu\u2019s moments. International Journal of Advanced Computer Science and Applications, 11(12), 130\u2013137. https:\/\/doi.org\/10.14569\/IJACSA.2020.0111216","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"8","key":"9797_CR4","doi-asserted-by":"publisher","first-page":"757","DOI":"10.3844\/jcssp.2022.757.769","volume":"18","author":"S Aburass","year":"2022","unstructured":"Aburass, S., Huneiti, A., & Al-Zoubi, M. B. (2022). Classification of transformed and geometrically distorted images using convolutional neural network. Journal of Computer Science, 18(8), 757\u2013769. https:\/\/doi.org\/10.3844\/jcssp.2022.757.769","journal-title":"Journal of Computer Science"},{"issue":"48","key":"9797_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.5120\/ijca2018917282","volume":"179","author":"S AbuRass","year":"2018","unstructured":"AbuRass, S., & Qatawneh, M. (2018). Performance evaluation of AES algorithm on supercomputer IMAN1. International Journal of Computer Applications, 179(48), 32\u201334. https:\/\/doi.org\/10.5120\/ijca2018917282","journal-title":"International Journal of Computer Applications"},{"key":"9797_CR6","unstructured":"Akram, A. (2023). An empirical study of AI generated text detection tools. ArXiv Preprint arXiv:2310.01423"},{"issue":"1","key":"9797_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1186\/s41239-023-00427-0","volume":"20","author":"A Barrett","year":"2023","unstructured":"Barrett, A., & Pack, A. (2023). Not quite eye to A.I.: Student and teacher perspectives on the use of generative artificial intelligence in the writing process. International Journal of Educational Technology in Higher Education, 20(1), 59. https:\/\/doi.org\/10.1186\/s41239-023-00427-0","journal-title":"International Journal of Educational Technology in Higher Education"},{"key":"9797_CR8","doi-asserted-by":"publisher","unstructured":"Bellini, V., Semeraro, F., Montomoli, J., Cascella, M., & Bignami, E. (2024). Between human and AI: Assessing the reliability of AI text detection tools. Current Medical Research and Opinion, 1\u20136. https:\/\/doi.org\/10.1080\/03007995.2024.2310086","DOI":"10.1080\/03007995.2024.2310086"},{"key":"9797_CR9","doi-asserted-by":"crossref","unstructured":"Chaka, C. (2024). Reviewing the performance of AI detection tools in differentiating between AI-generated and human-written texts: A literature and integrative hybrid review. Journal of Applied Learning and Teaching, 7(1).","DOI":"10.37074\/jalt.2024.7.1.14"},{"issue":"1","key":"9797_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1186\/s41239-023-00411-8","volume":"20","author":"CKY Chan","year":"2023","unstructured":"Chan, C. K. Y., & Hu, W. (2023). Students\u2019 voices on generative AI: Perceptions, benefits, and challenges in higher education. International Journal of Educational Technology in Higher Education, 20(1), 43. https:\/\/doi.org\/10.1186\/s41239-023-00411-8","journal-title":"International Journal of Educational Technology in Higher Education"},{"key":"9797_CR11","doi-asserted-by":"publisher","unstructured":"Dorgham, O., Aburass, S., & Issa, G. F. (2024). Framework for enhanced digital image transmission security: Integrating hu moments, digital watermarking, and cryptographic hashing for integrity verification. In 2024 2nd international conference on cyber resilience (ICCR) (pp. 1\u20135). https:\/\/doi.org\/10.1109\/ICCR61006.2024.10532924","DOI":"10.1109\/ICCR61006.2024.10532924"},{"issue":"1","key":"9797_CR12","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s40979-023-00140-5","volume":"19","author":"AM Elkhatat","year":"2023","unstructured":"Elkhatat, A. M., Elsaid, K., & Almeer, S. (2023). Evaluating the efficacy of AI content detection tools in differentiating between human and AI-generated text. International Journal for Educational Integrity, 19(1), 17. https:\/\/doi.org\/10.1007\/s40979-023-00140-5","journal-title":"International Journal for Educational Integrity"},{"issue":"11","key":"9797_CR13","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.3390\/educsci13111109","volume":"13","author":"T Farrelly","year":"2023","unstructured":"Farrelly, T., & Baker, N. (2023). Generative artificial intelligence: Implications and considerations for higher education practice. Education Sciences, 13(11), 1109. https:\/\/doi.org\/10.3390\/educsci13111109","journal-title":"Education Sciences"},{"key":"9797_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sasc.2022.200037","volume":"4","author":"N Gonz\u00e1lez","year":"2022","unstructured":"Gonz\u00e1lez, N., Calot, E. P., Ierache, J. S., & Hasperu\u00e9, W. (2022). Towards liveness detection in keystroke dynamics: Revealing synthetic forgeries. Systems and Soft Computing, 4, 200037. https:\/\/doi.org\/10.1016\/j.sasc.2022.200037","journal-title":"Systems and Soft Computing"},{"issue":"1","key":"9797_CR15","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1186\/s41239-024-00445-6","volume":"21","author":"R Hall","year":"2024","unstructured":"Hall, R. (2024). Generative AI and re-weaving a pedagogical horizon of social possibility. International Journal of Educational Technology in Higher Education, 21(1), 12. https:\/\/doi.org\/10.1186\/s41239-024-00445-6","journal-title":"International Journal of Educational Technology in Higher Education"},{"key":"9797_CR16","doi-asserted-by":"publisher","unstructured":"Kaliyar, R. K. (2020). A multi-layer bidirectional transformer encoder for pre-trained word embedding: A survey of BERT. In 2020 10th international conference on cloud computing, data science & engineering (confluence) (pp. 336\u2013340). https:\/\/doi.org\/10.1109\/Confluence47617.2020.9058044","DOI":"10.1109\/Confluence47617.2020.9058044"},{"key":"9797_CR17","doi-asserted-by":"crossref","unstructured":"Kalyan, K. S., Rajasekharan, A., & Sangeetha, S. (2021). AMMUS\u202f: A survey of transformer-based pretrained models in natural language processing. arXiv:2108.05542","DOI":"10.1016\/j.jbi.2021.103982"},{"issue":"4","key":"9797_CR18","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10676-023-09728-4","volume":"25","author":"A Knott","year":"2023","unstructured":"Knott, A., Pedreschi, D., Chatila, R., Chakraborti, T., Leavy, S., Baeza-Yates, R., Eyers, D., Trotman, A., Teal, P. D., Biecek, P., Russell, S., & Bengio, Y. (2023). Generative AI models should include detection mechanisms as a condition for public release. Ethics and Information Technology, 25(4), 55. https:\/\/doi.org\/10.1007\/s10676-023-09728-4","journal-title":"Ethics and Information Technology"},{"key":"9797_CR19","unstructured":"Lu, N., Liu, S., He, R., Wang, Q., Ong, Y.-S., & Tang, K. (2023). Large language models can be guided to evade AI-generated text detection."},{"key":"9797_CR20","unstructured":"Monaco, J. V, & Tappert, C. C. (2017). Obfuscating keystroke time intervals to avoid identification and impersonation. arXiv:1609.07612"},{"issue":"1","key":"9797_CR21","doi-asserted-by":"publisher","first-page":"20220158","DOI":"10.1515\/opis-2022-0158","volume":"7","author":"WH Walters","year":"2023","unstructured":"Walters, W. H. (2023). The effectiveness of software designed to detect AI-generated writing: A comparison of 16 AI text detectors. Open Information Science, 7(1), 20220158. https:\/\/doi.org\/10.1515\/opis-2022-0158","journal-title":"Open Information Science"},{"issue":"1","key":"9797_CR22","doi-asserted-by":"publisher","first-page":"14045","DOI":"10.1038\/s41598-023-41032-5","volume":"13","author":"WH Walters","year":"2023","unstructured":"Walters, W. H., & Wilder, E. I. (2023). Fabrication and errors in the bibliographic citations generated by ChatGPT. Scientific Reports, 13(1), 14045. https:\/\/doi.org\/10.1038\/s41598-023-41032-5","journal-title":"Scientific Reports"},{"issue":"1","key":"9797_CR23","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s40979-023-00146-z","volume":"19","author":"D Weber-Wulff","year":"2023","unstructured":"Weber-Wulff, D., Anohina-Naumeca, A., Bjelobaba, S., Folt\u00fdnek, T., Guerrero-Dib, J., Popoola, O., \u0160igut, P., & Waddington, L. (2023). Testing of detection tools for AI-generated text. International Journal for Educational Integrity, 19(1), 26. https:\/\/doi.org\/10.1007\/s40979-023-00146-z","journal-title":"International Journal for Educational Integrity"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-024-09797-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-024-09797-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-024-09797-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T03:39:37Z","timestamp":1726889977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-024-09797-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["9797"],"URL":"https:\/\/doi.org\/10.1007\/s10676-024-09797-z","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]},"assertion":[{"value":"22 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"62"}}