{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T23:49:03Z","timestamp":1767916143603,"version":"3.49.0"},"reference-count":47,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T00:00:00Z","timestamp":1491177600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Internet Research"],"published-print":{"date-parts":[[2017,4,3]]},"DOI":"10.1108\/intr-11-2015-0309","type":"journal-article","created":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T11:35:03Z","timestamp":1490182503000},"page":"321-337","source":"Crossref","is-referenced-by-count":38,"title":["Theorizing the textual differences between authentic and fictitious reviews"],"prefix":"10.1108","volume":"27","author":[{"given":"Snehasish","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"Alton Y.K.","family":"Chua","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2014-0146"},{"key":"ref002","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021387326192"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918299"},{"key":"ref004","doi-asserted-by":"publisher","DOI":"10.2308\/acch.2002.16.3.233"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X05278386"},{"key":"ref006","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.11.009"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6658662"},{"key":"ref009","volume-title":"Readability Revisited: The New Dale-Chall Readability Formula","author":"Chall J.S.","year":"1995"},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.12.0063"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-10-2014-0232"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0029-9"},{"issue":"1","key":"ref014","first-page":"39","volume":"10","author":"Dawes J.","year":"2002","journal-title":"Australasian Journal of Market Research"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"issue":"4","key":"ref016","first-page":"532","volume":"14","author":"Eisenhardt K.","year":"1989","journal-title":"Academy of Management Journal"},{"key":"ref017","doi-asserted-by":"publisher","DOI":"10.1080\/00332747.1969.11023575"},{"key":"ref018","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.188"},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1207\/s15506878jobem4401_3"},{"key":"ref020","doi-asserted-by":"publisher","DOI":"10.1080\/01638530701739181"},{"key":"ref021","unstructured":"Harris, C. (2012), \u201cDetecting deceptive opinion spam using human computation\u201d, AAAI Workshop on Artificial Intelligence, AAAI, Menlo Park, CA, pp. 87-93."},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.12.029"},{"key":"ref023","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-01-2013-0007"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.1108\/10662241211271563"},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-09-2013-0199"},{"key":"ref026","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.88.1.67"},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.3115\/1075096.1075150"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1145\/2667111"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-11-2013-0238"},{"key":"ref031","first-page":"2488","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence, AAAI","author":"Li F.","year":"2011"},{"key":"ref033","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376245"},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1080\/1068316X.2015.1008477"},{"issue":"1","key":"ref036","first-page":"3","volume":"62","author":"Mackiewicz J.","year":"2015","journal-title":"Technical Communication"},{"key":"ref037","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2014.01.012"},{"key":"ref038","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"ref039","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2013.10.002"},{"key":"ref040","first-page":"497","volume-title":"Proceedings of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, ACL","author":"Ott M.","year":"2013"},{"key":"ref041","unstructured":"Ott, M., Choi, Y., Cardie, C. and Hancock, J.T. (2011), \u201cFinding deceptive opinion spam by any stretch of the imagination\u201d, annual meeting of the Association for Computational Linguistics, ACL, Stroudsburg, PA, pp. 309-319."},{"key":"ref042","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-06-2014-0166"},{"key":"ref043","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-09-2012-0175"},{"key":"ref044","doi-asserted-by":"publisher","DOI":"10.1080\/09658210701256456"},{"issue":"1","key":"ref046","first-page":"295","volume":"36","author":"Rayson P.","year":"2001","journal-title":"Language and Computers"},{"key":"ref047","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X09351676"},{"key":"ref049","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864757"},{"key":"ref051","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-01-2014-0021"},{"key":"ref052","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.009"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IntR-11-2015-0309","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/IntR-11-2015-0309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:37:09Z","timestamp":1753393029000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/27\/2\/321-337\/390053"}},"subtitle":["Validation across positive, negative and moderate polarities"],"short-title":[],"issued":{"date-parts":[[2017,4,3]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4,3]]}},"alternative-id":["10.1108\/IntR-11-2015-0309"],"URL":"https:\/\/doi.org\/10.1108\/intr-11-2015-0309","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2017,4,3]]}}}