{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T01:00:02Z","timestamp":1774400402336,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1145\/3121050.3121072","type":"proceedings-article","created":{"date-parts":[[2017,9,29]],"date-time":"2017-09-29T12:48:56Z","timestamp":1506689336000},"page":"91-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Evaluation Measures for Relevance and Credibility in Ranked Lists"],"prefix":"10.1145","author":[{"given":"Christina","family":"Lioma","sequence":"first","affiliation":[{"name":"University of Copenhagen, Copenhagen, Denmark"}]},{"given":"Jakob Grue","family":"Simonsen","sequence":"additional","affiliation":[{"name":"University of Copenhagen, Copenhagen, Denmark"}]},{"given":"Birger","family":"Larsen","sequence":"additional","affiliation":[{"name":"University of Aalborg in Copenhagen, Copenhagen, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2017,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963440"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Paul E. Black Karen A. Scarfone and Murugiah P. Souppaya (Eds.). 2008. Cyber Security Metrics and Measures. Wiley Handbook of Science and Technology for Homeland Security.  Paul E. Black Karen A. Scarfone and Murugiah P. Souppaya (Eds.). 2008. Cyber Security Metrics and Measures. Wiley Handbook of Science and Technology for Homeland Security.","DOI":"10.1002\/9780470087923.hhs440"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2914706"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983659"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009000"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646033"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484028.2484071"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772938.1772952"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000051"},{"key":"e_1_3_2_1_10_1","volume-title":"NODALIDA 2013, May 22--24, 2013, Oslo University, Norway (Link\u00f6ping Electronic Conference Proceedings), Stephan Oepen, Kristin Hagen, and Janne Bondi Johannessen (Eds.)","volume":"85","author":"Horn Christopher","year":"2013"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468694"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772749"},{"key":"e_1_3_2_1_14_1","unstructured":"Elisabeth Lex Inayat Khan Horst Bischof and Michael Granitzer 2014. Assessing the Quality of Web Content. CoRR Vol. abs\/1406.3188 (2014). http:\/\/arxiv.org\/abs\/1406.3188  Elisabeth Lex Inayat Khan Horst Bischof and Michael Granitzer 2014. Assessing the Quality of Web Content. CoRR Vol. abs\/1406.3188 (2014). http:\/\/arxiv.org\/abs\/1406.3188"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3006299.3006315"},{"key":"e_1_3_2_1_16_1","volume-title":"Advances in Information Retrieval , 30th European Conference on IR Research, ECIR","author":"Mizzaro Stefano","year":"2008"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145274"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518772"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767695"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835804"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979127"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026584"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2011.19"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871672"}],"event":{"name":"ICTIR '17: ACM SIGIR International Conference on the Theory of Information Retrieval","location":"Amsterdam The Netherlands","acronym":"ICTIR '17","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the ACM SIGIR International Conference on Theory of Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3121050.3121072","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3121050.3121072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:05Z","timestamp":1750273505000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3121050.3121072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":24,"alternative-id":["10.1145\/3121050.3121072","10.1145\/3121050"],"URL":"https:\/\/doi.org\/10.1145\/3121050.3121072","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]},"assertion":[{"value":"2017-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}