{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T20:44:03Z","timestamp":1754599443657,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/icsrs48664.2019.8987623","type":"proceedings-article","created":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T02:46:05Z","timestamp":1581389165000},"page":"116-125","source":"Crossref","is-referenced-by-count":8,"title":["Credibility Analysis for Available Information Sources on the Web: A Review and a Contribution"],"prefix":"10.1109","author":[{"given":"Irvin","family":"Dongo","sequence":"first","affiliation":[]},{"given":"Yudith","family":"Cardinale","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Aguilera","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"1406","article-title":"Credfinder: A real-time tweets credibility assessing system","author":"alkubaian","year":"2016","journal-title":"Proc of Internat Conf on Advances in Social Networks Analysis and Mining"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13734-6_16"},{"key":"ref31","first-page":"611","article-title":"Believe it or not? analyzing information credibility in microblogs","author":"kang","year":"2015","journal-title":"Proc of Internat Conf on Advances in Social Networks Analysis and Mining"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"10:1","DOI":"10.1145\/3309699","article-title":"The web of false information: Rumors, fake news, hoaxes, clickbait, and various other shenanigans","volume":"11","author":"zannettou","year":"2019","journal-title":"Journal of Data and Information Quality"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806651"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IMCSIT.2008.4747296"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDLE.2010.5605996"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25264-3_19"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2008.183"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2536146.2536147"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2457317.2457352"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167342"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IC3e.2013.6735982"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.120"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.187"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1089\/cyber.2018.0475","article-title":"The blue check of credibility: Does account verification matter when evaluating news on twitter?","volume":"22","author":"edgerly","year":"2019","journal-title":"Cyberpsychology Behavior and Social Networking"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.10.001"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300755"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/17440081111141772"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1968613.1968743"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886314"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/764792.764802"},{"journal-title":"RDF 1 1 Concepts and Abstract Syntax","year":"2014","author":"graham","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2361354.2361367"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.midw.2017.03.005"},{"journal-title":"OWL 2 Web Ontology Language Document Overview (Second Edition)","year":"2012","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/0163853X.2016.1169968"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.046"},{"key":"ref22","article-title":"Finding relevant sources in twitter based on content and social structure","author":"canini","year":"0","journal-title":"NIPS LCCC Workshop 2010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-014-9139-2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1526993.1527005"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"157","DOI":"10.7494\/csci.2015.16.2.157","article-title":"Au-tomated credibility assessment on twitter","volume":"16","author":"lorek","year":"2015","journal-title":"Computer Science"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2013.148"}],"event":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2019,11,20]]},"location":"Rome, Italy","end":{"date-parts":[[2019,11,22]]}},"container-title":["2019 4th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8967508\/8987581\/08987623.pdf?arnumber=8987623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:49:39Z","timestamp":1658155779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8987623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icsrs48664.2019.8987623","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}