{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:31:10Z","timestamp":1730248270885,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,9]]},"DOI":"10.1109\/icit58056.2023.10225779","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:26:12Z","timestamp":1693329972000},"page":"476-482","source":"Crossref","is-referenced-by-count":0,"title":["Detection of Fabricated Survey Data using Clustering Analysis"],"prefix":"10.1109","author":[{"given":"Lamia","family":"AbedNoor Muhammed","sequence":"first","affiliation":[{"name":"College of Computer science and IT, University of Al-Qadisiyah,Diwaniyah,Iraq"}]},{"given":"Ban","family":"Abdnoor Mohammed","sequence":"additional","affiliation":[{"name":"College of Computer science and IT, University of Al-Qadisiyah,Diwaniyah,Iraq"}]}],"member":"263","reference":[{"journal-title":"Questionnaire Survey Methodology in Educational and Social Science Studies","year":"2021","author":"Bihu","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0005738"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055418000837"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3055926"},{"journal-title":"Menold A Literature Review of Methods to Detect Fabricated Survey Data","year":"2011","author":"Bredl","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2288-3-18"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1177\/009286150203600115"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/1948550617691101"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57521-2_22"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/00131644211004708"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1037\/met0000403"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4300\/JGME-D-16-00098.1"},{"journal-title":"Social Science Research: Principles, Methods, and Practices","year":"2012","author":"Bhattacherjee","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4324\/9780203519196"},{"volume-title":"Survey research methods: A reader","year":"1989","author":"Singer","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/intqhc\/mzg031"},{"volume-title":"Collecting evaluation data: Surveys","year":"2000","author":"Taylor-Powell","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/0974909820120509S"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11893011_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2702.2006.01573.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-96303-2_3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2012.100"},{"issue":"113","key":"ref23","article-title":"A study of hierarchical clustering algorithm","volume":"2","author":"Rani","year":"2013","journal-title":"ter S & on Te SIT"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/widm.30"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1201\/9781315373515-6"},{"issue":"6","key":"ref26","first-page":"1943","article-title":"An overview of partitioning algorithms in clustering techniques","volume":"5","author":"Saket","year":"2016","journal-title":"International Journal of Advanced Research in Computer Engineering & Technology"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.03.206"},{"issue":"1","key":"ref28","first-page":"42","article-title":"K-Medoid clustering algorithm-a review","volume":"1","author":"Kaur","year":"2014","journal-title":"International Journal of Computer Applications and Technology"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1111\/j.2006.0030-1299.14714.x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCYB.2008.4721376"},{"volume-title":"Impact of Servant Leadership on Followers Job Performance: Followers Self-Efficacy as Mediator","year":"2022","author":"Mohammed","key":"ref31"}],"event":{"name":"2023 International Conference on Information Technology (ICIT)","start":{"date-parts":[[2023,8,9]]},"location":"Amman, Jordan","end":{"date-parts":[[2023,8,10]]}},"container-title":["2023 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225686\/10225751\/10225779.pdf?arnumber=10225779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T21:18:49Z","timestamp":1709327929000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10225779\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icit58056.2023.10225779","relation":{},"subject":[],"published":{"date-parts":[[2023,8,9]]}}}