{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T13:40:30Z","timestamp":1732023630071,"version":"3.28.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"39","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19621-x","type":"journal-article","created":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T05:01:51Z","timestamp":1718773311000},"page":"86425-86455","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["eHTrust: Model for Trust Evaluation in Content-Driven Health Websites"],"prefix":"10.1007","volume":"83","author":[{"given":"Sarika","family":"Agarwal","sequence":"first","affiliation":[]},{"given":"Himani","family":"Bansal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,19]]},"reference":[{"key":"19621_CR1","unstructured":"E. Ojakaar and J. M. Spool, \u201cGetting them to what they want,\u201d UIE Rep. Best Pract. Ser., 2001."},{"key":"19621_CR2","doi-asserted-by":"crossref","unstructured":"H. Singal and S. Kohli, \u201cMitigating information trust: taking the edge off health websites,\u201d Int. J. Technoethics IJT, vol. 7, no. 1, Art. no. 1, 2016.","DOI":"10.4018\/IJT.2016010102"},{"key":"19621_CR3","doi-asserted-by":"crossref","unstructured":"A. Beldad, M. De Jong, and M. Steehouder, \u201cHow shall I trust the faceless and the intangible? A literature review on the antecedents of online trust,\u201d Comput. Hum. Behav., vol. 26, no. 5, Art. no. 5, 2010.","DOI":"10.1016\/j.chb.2010.03.013"},{"key":"19621_CR4","doi-asserted-by":"crossref","unstructured":"D. Artz and Y. Gil, \u201cA survey of trust in computer science and the semantic web,\u201d J. Web Semant., vol. 5, no. 2, Art. no. 2, 2007.","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"19621_CR5","unstructured":"\u201c\u0918\u0930\u0947\u0932\u0942 \u0928\u0941\u0938\u094d\u0916\u0947 \u0938\u0947 \u092d\u0940 \u0916\u0924\u094d\u092e \u0915\u0930 \u0938\u0915\u0924\u0947 \u0939\u0948\u0902 \u0915\u094b\u0930\u094b\u0928\u093e\u0935\u093e\u092f\u0930\u0938, \u091c\u093e\u0928\u0947\u0902 \u0915\u094d\u092f\u093e \u0939\u0948 \u0909\u092a\u093e\u092f,\u201d Amar Ujala. Accessed: Apr. 14, 2023. [Online]. Available: https:\/\/www.amarujala.com\/photo-gallery\/gorakhpur\/coronavirus-home-remedies-by-treatment-news"},{"key":"19621_CR6","unstructured":"S. Brooks, \u201cHow Cannabis Oil Works to Kill Cancer,\u201d Onco\u2019Zine. Accessed: Apr. 16, 2023. [Online]. Available: https:\/\/www.oncozine.com\/how-cannabis-oil-works-to-kill-cancer\/"},{"key":"19621_CR7","unstructured":"\u201cCannabis, CBD oil and cancer.\u201d Accessed: Apr. 16, 2023. [Online]. Available: https:\/\/www.cancerresearchuk.org\/about-cancer\/treatment\/complementary-alternative-therapies\/individual-therapies\/cannabis"},{"key":"19621_CR8","unstructured":"\u201cTop health disinformation websites 2020,\u201d Statista. Accessed: Apr. 14, 2023. [Online]. Available: https:\/\/www.statista.com\/statistics\/266916\/top-health-disinformation-websites-visits\/"},{"issue":"7337","key":"19621_CR9","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1136\/bmj.324.7337.581","volume":"324","author":"H Kunst","year":"2002","unstructured":"Kunst H, Groot D, Latthe PM, Latthe M, Khan KS (2002) Accuracy of information on apparently credible websites: survey of five common health topics. Bmj 324(7337):581\u2013582","journal-title":"Bmj"},{"key":"19621_CR10","unstructured":"C. Boyer, \u201cWhen the quality of health information matters: Health on the Net is the Quality Standard for Information You can Trust,\u201d Health Net Found. Httpswww Hon ChGlobalpdfTrustworthyOct2006 Pdf Arch. Internet Arch. Httpsbit Ly2MjoRRt, 2013."},{"key":"19621_CR11","unstructured":"\u201cFinding and Evaluating Online Resources,\u201d NCCIH. Accessed: Aug. 27, 2021. [Online]. Available: https:\/\/www.nccih.nih.gov\/health\/finding-and-evaluating-online-resources"},{"key":"19621_CR12","doi-asserted-by":"crossref","unstructured":"M. K. Paasche-Orlow and M. S. Wolf, \u201cThe causal pathways linking health literacy to health outcomes,\u201d Am. J. Health Behav., vol. 31, no. 1, Art. no. 1, 2007.","DOI":"10.5993\/AJHB.31.s1.4"},{"key":"19621_CR13","doi-asserted-by":"crossref","unstructured":"S. R. Paige, J. L. Krieger, and M. L. Stellefson, \u201cThe influence of eHealth literacy on perceived trust in online health communication channels and sources,\u201d J. Health Commun., vol. 22, no. 1, Art. no. 1, 2017.","DOI":"10.1080\/10810730.2016.1250846"},{"key":"19621_CR14","doi-asserted-by":"crossref","unstructured":"A. Groth and D. Haslwanter, \u201cEfficiency, effectiveness, and satisfaction of responsive mobile tourism websites: a mobile usability study,\u201d Inf. Technol. Tour., vol. 16, no. 2, Art. no. 2, 2016.","DOI":"10.1007\/s40558-015-0041-0"},{"key":"19621_CR15","unstructured":"D. M. Lestari, D. Hardianto, and A. N. Hidayanto, \u201cAnalysis of user experience quality on responsive web design from its informative perspective,\u201d Int. J. Softw. Eng. Its Appl., vol. 8, no. 5, Art. no. 5, 2014."},{"key":"19621_CR16","doi-asserted-by":"crossref","unstructured":"\u201cFuture Internet | Free Full-Text | Important Factors for Improving Google Search Rank.\u201d Accessed: Oct. 30, 2021. [Online]. Available: https:\/\/www.mdpi.com\/1999-5903\/11\/2\/32","DOI":"10.3390\/fi11020032"},{"key":"19621_CR17","doi-asserted-by":"crossref","unstructured":"S. Purkait, \u201cExamining the effectiveness of phishing filters against DNS based phishing attacks,\u201d Inf. Comput. Secur., 2015.","DOI":"10.1108\/ICS-02-2013-0009"},{"key":"19621_CR18","doi-asserted-by":"publisher","first-page":"22170","DOI":"10.1109\/ACCESS.2020.2969780","volume":"8","author":"A El Aassal","year":"2020","unstructured":"El Aassal A, Baki S, Das A, Verma RM (2020) An in-depth benchmarking and evaluation of phishing detection research for security needs. IEEE Access 8:22170\u201322192","journal-title":"IEEE Access"},{"issue":"4","key":"19621_CR19","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/s11235-017-0414-0","volume":"68","author":"AK Jain","year":"2018","unstructured":"Jain AK, Gupta BB (2018) Towards detection of phishing websites on client-side using machine learning based approach. Telecommun. Syst. 68(4):687\u2013700","journal-title":"Telecommun. Syst."},{"key":"19621_CR20","unstructured":"\u201chttps:\/\/www.domainregistration.com.au\/infocentre\/info-domain-length.php#:~:text=What%20Is%20The%20Maximum%20Domain,%22.%22%20is%2063%20characters.\u201d"},{"issue":"1","key":"19621_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13635-015-0028-6","volume":"2016","author":"AK Jain","year":"2016","unstructured":"Jain AK, Gupta BB (2016) A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J. Inf. Secur. 2016(1):1\u201311","journal-title":"EURASIP J. Inf. Secur."},{"key":"19621_CR22","first-page":"14","volume":"2014","author":"N Gupta","year":"2014","unstructured":"Gupta N, Aggarwal A, Kumaraguru P, \u201cbit. ly, malicious: Deep dive into short url based e-crime detection\u201d, in, (2014) APWG Symposium on Electronic Crime Research (eCrime). IEEE 2014:14\u201324","journal-title":"IEEE"},{"key":"19621_CR23","unstructured":"\u201cWhat is the WHOIS database?,\u201d SECURING VALUE. Accessed: Aug. 10, 2021. [Online]. Available: https:\/\/www.ssl247.co.uk"},{"key":"19621_CR24","first-page":"492","volume":"2012","author":"RM Mohammad","year":"2012","unstructured":"Mohammad RM, Thabtah F, McCluskey L, \u201cAn assessment of features related to phishing websites using an automated technique\u201d, in, (2012) International Conference for Internet Technology and Secured Transactions. IEEE 2012:492\u2013497","journal-title":"IEEE"},{"key":"19621_CR25","unstructured":"R. M. Mohammad, F. Thabtah, and L. McCluskey, \u201cPhishing websites features,\u201d Sch. Comput. Eng. Univ. Hudders., 2015."},{"key":"19621_CR26","unstructured":"L. Richardson, \u201cbeautifulsoup4: Screen-scraping library.\u201d Aug. 10, 2021. Accessed: Aug. 10, 2021. [Online]. Available: http:\/\/www.crummy.com\/software\/BeautifulSoup\/bs4\/"},{"key":"19621_CR27","doi-asserted-by":"crossref","unstructured":"J. R. Quinlan, \u201cLearning decision tree classifiers,\u201d ACM Comput. Surv. CSUR, vol. 28, no. 1, Art. no. 1, 1996.","DOI":"10.1145\/234313.234346"},{"issue":"6","key":"19621_CR28","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1021\/ci034160g","volume":"43","author":"V Svetnik","year":"2003","unstructured":"Svetnik V, Liaw A, Tong C, Culberson JC, Sheridan RP, Feuston BP (2003) Random forest: a classification and regression tool for compound classification and QSAR modeling. J. Chem. Inf. Comput. Sci. 43(6):1947\u20131958","journal-title":"J. Chem. Inf. Comput. Sci."},{"key":"19621_CR29","unstructured":"V. Jakkula, \u201cTutorial on support vector machine (svm),\u201d Sch. EECS Wash. State Univ., vol. 37, 2006."},{"key":"19621_CR30","first-page":"214","volume":"2022","author":"J Gu","year":"2022","unstructured":"Gu J, Xu H, \u201cAn ensemble method for phishing websites detection based on XGBoost\u201d, in, (2022) 14th international conference on computer research and development (ICCRD). IEEE 2022:214\u2013219","journal-title":"IEEE"},{"key":"19621_CR31","unstructured":"S. Barber, How Fast Does a Website Need To Be? Citeseer, 2015."},{"key":"19621_CR32","unstructured":"S. I. Swaid, \u201cHeWEK: Measuring the Health Website Quality From the Perception of the African American,\u201d 2010."},{"issue":"1","key":"19621_CR33","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10209-020-00715-w","volume":"20","author":"Y Akg\u00fcl","year":"2021","unstructured":"Akg\u00fcl Y (2021) Accessibility, usability, quality performance, and readability evaluation of university websites of Turkey: a comparative study of state and private universities. Univers. Access Inf. Soc. 20(1):157\u2013170","journal-title":"Univers. Access Inf. Soc."},{"issue":"1","key":"19621_CR34","doi-asserted-by":"publisher","first-page":"258","DOI":"10.11591\/eei.v10i1.1755","volume":"10","author":"H Najadat","year":"2021","unstructured":"Najadat H, Al-Badarneh A, Alodibat S (2021) A review of website evaluation using web diagnostic tools and data envelopment analysis. Bull. Electr. Eng. Inform. 10(1):258\u2013265","journal-title":"Bull. Electr. Eng. Inform."},{"key":"19621_CR35","unstructured":"J. Steimle, \u201cWhy your business needs a responsive website before 2014,\u201d Forbes Cited, 2013."},{"key":"19621_CR36","unstructured":"P. Ajitha, \u201cResponsive Design in Web Development with Security Using Optimization Algorithms\u201d."},{"key":"19621_CR37","unstructured":"\u201cWhat is an SSL Certificate? | SSL FAQs | Thawte\u00ae.\u201d Accessed: Dec. 03, 2021. [Online]. Available: https:\/\/www.thawte.com\/resources\/getting-started\/ssl-faq\/"},{"key":"19621_CR38","unstructured":"K. K. Chaudhary et al., \u201cEVALUATION of GOVERNMENT WEBSITES on DESIGN FLAWS, ACCESSIBILITY ISSUES and SECURITY ISSUES\u201d."},{"key":"19621_CR39","doi-asserted-by":"crossref","unstructured":"C. Soghoian and S. Stamm, \u201cCertified lies: Detecting and defeating government interception attacks against SSL (short paper),\u201d in International Conference on Financial Cryptography and Data Security, Springer, 2011, pp. 250\u2013259.","DOI":"10.1007\/978-3-642-27576-0_20"},{"issue":"3\u20134","key":"19621_CR40","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1002\/mcda.428","volume":"15","author":"P Hansen","year":"2008","unstructured":"Hansen P, Ombler F (2008) A new method for scoring additive multi-attribute value models using pairwise rankings of alternatives. J. Multi-Criteria Decis. Anal. 15(3\u20134):87\u2013107","journal-title":"J. Multi-Criteria Decis. Anal."},{"key":"19621_CR41","unstructured":"\u201cURL 2016 | Datasets | Research | Canadian Institute for Cybersecurity | UNB.\u201d Accessed: Aug. 10, 2021. [Online]. Available: https:\/\/www.unb.ca\/cic\/datasets\/url-2016.html"},{"key":"19621_CR42","doi-asserted-by":"crossref","unstructured":"P. Vaitkevicius and V. Marcinkevicius, \u201cComparison of classification algorithms for detection of phishing websites,\u201d Informatica, vol. 31, no. 1, Art. no. 1, 2020.","DOI":"10.15388\/20-INFOR404"},{"key":"19621_CR43","unstructured":"S. Rahmatizadeh, \u201cEvaluating the trustworthiness of consumeroriented health websites on diabetes,\u201d 2018."},{"key":"19621_CR44","unstructured":"\u201cAbout the Health On the Net Foundation,\u201d Health On the Net. Accessed: Jun. 06, 2023. [Online]. Available: https:\/\/www.hon.ch\/en\/about.html"},{"issue":"2","key":"19621_CR45","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1136\/jech.53.2.105","volume":"53","author":"D Charnock","year":"1999","unstructured":"Charnock D, Shepperd S, Needham G, Gann R (1999) DISCERN: an instrument for judging the quality of written consumer health information on treatment choices. J. Epidemiol. Community Health 53(2):105\u2013111","journal-title":"J. Epidemiol. Community Health"},{"key":"19621_CR46","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.procs.2016.05.199","volume":"85","author":"H Singal","year":"2016","unstructured":"Singal H, Kohli S (2016) Trust necessitated through metrics: estimating the trustworthiness of websites. Procedia Comput. Sci. 85:133\u2013140","journal-title":"Procedia Comput. Sci."},{"key":"19621_CR47","doi-asserted-by":"crossref","unstructured":"Singal, H. and Kohli, S. Escalation of TRUST analysis in web. In\u00a0Proceedings of the 12th ACM International Conference on Computing Frontiers\u00a0(pp. 1-6), 2015.","DOI":"10.1145\/2742854.2745721"},{"key":"19621_CR48","doi-asserted-by":"crossref","unstructured":"Singal, H. and Kohli, S. Conceptual model for obfuscated TRUST induced from Web Analytics data for content-driven websites. In\u00a02014 International Conference on Advances in Computing, Communications and Informatics (ICACCI)\u00a0(pp. 2781-2785), 2014.","DOI":"10.1109\/ICACCI.2014.6968622"},{"key":"19621_CR49","doi-asserted-by":"crossref","unstructured":"Singal, H. and Kohli, S. Intellectualizing trust for medical websites. In\u00a0Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies\u00a0(pp. 1-4), 2016.","DOI":"10.1145\/2905055.2905293"},{"issue":"1\u20132","key":"19621_CR50","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1504\/IJAIP.2019.099946","volume":"13","author":"H Bansal","year":"2019","unstructured":"Bansal H, Kohli S (2019) Trust evaluation of websites: a comprehensive study. International Journal of Advanced Intelligence Paradigms 13(1\u20132):101\u2013112","journal-title":"International Journal of Advanced Intelligence Paradigms"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19621-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19621-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19621-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T13:15:57Z","timestamp":1732022157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19621-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":50,"journal-issue":{"issue":"39","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["19621"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19621-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,6,19]]},"assertion":[{"value":"27 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest in this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}