{"id":"https://openalex.org/W2948674767","doi":"https://doi.org/10.1108/ijwis-10-2018-0075","title":"On verifying the authenticity of e-commercial crawling data by a semi-crosschecking method","display_name":"On verifying the authenticity of e-commercial crawling data by a semi-crosschecking method","publication_year":2019,"publication_date":"2019-06-03","ids":{"openalex":"https://openalex.org/W2948674767","doi":"https://doi.org/10.1108/ijwis-10-2018-0075","mag":"2948674767"},"language":"en","primary_location":{"id":"doi:10.1108/ijwis-10-2018-0075","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ijwis-10-2018-0075","pdf_url":null,"source":{"id":"https://openalex.org/S145159096","display_name":"International Journal of Web Information Systems","issn_l":"1744-0084","issn":["1744-0084","1744-0092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Web Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029072011","display_name":"Tran Khanh Dang","orcid":"https://orcid.org/0000-0002-7282-3589"},"institutions":[{"id":"https://openalex.org/I47265099","display_name":"Ho Chi Minh City University of Technology","ror":"https://ror.org/04qva2324","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023","https://openalex.org/I47265099"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Tran Khanh Dang","raw_affiliation_strings":["Ho Chi Minh City University of Technology, Ho Chi Minh City, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Ho Chi Minh City University of Technology, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I47265099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079476476","display_name":"Duc Minh Pham","orcid":"https://orcid.org/0000-0001-7358-7410"},"institutions":[{"id":"https://openalex.org/I47265099","display_name":"Ho Chi Minh City University of Technology","ror":"https://ror.org/04qva2324","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023","https://openalex.org/I47265099"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Duc Minh Chau Pham","raw_affiliation_strings":["Ho Chi Minh City University of Technology, Ho Chi Minh City, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Ho Chi Minh City University of Technology, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I47265099"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088820066","display_name":"Duc Dan Ho","orcid":null},"institutions":[{"id":"https://openalex.org/I47265099","display_name":"Ho Chi Minh City University of Technology","ror":"https://ror.org/04qva2324","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023","https://openalex.org/I47265099"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Duc Dan Ho","raw_affiliation_strings":["Ho Chi Minh City University of Technology, Ho Chi Minh City, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Ho Chi Minh City University of Technology, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I47265099"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029072011"],"corresponding_institution_ids":["https://openalex.org/I47265099"],"apc_list":null,"apc_paid":null,"fwci":2.1156,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.9006637,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"15","issue":"4","first_page":"454","last_page":"473"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/crawling","display_name":"Crawling","score":0.9118667840957642},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8578411340713501},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.597306489944458},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5441585183143616},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5047305822372437},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.46887755393981934},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42299848794937134},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.42110469937324524},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.4144095182418823},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2569791078567505},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16098222136497498},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.10199621319770813}],"concepts":[{"id":"https://openalex.org/C100368936","wikidata":"https://www.wikidata.org/wiki/Q1411725","display_name":"Crawling","level":2,"score":0.9118667840957642},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8578411340713501},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.597306489944458},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5441585183143616},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5047305822372437},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.46887755393981934},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42299848794937134},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.42110469937324524},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.4144095182418823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2569791078567505},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16098222136497498},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.10199621319770813},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C105702510","wikidata":"https://www.wikidata.org/wiki/Q514","display_name":"Anatomy","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ijwis-10-2018-0075","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ijwis-10-2018-0075","pdf_url":null,"source":{"id":"https://openalex.org/S145159096","display_name":"International Journal of Web Information Systems","issn_l":"1744-0084","issn":["1744-0084","1744-0092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Web Information Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W86039013","https://openalex.org/W179179905","https://openalex.org/W1199809254","https://openalex.org/W1885339188","https://openalex.org/W1966676388","https://openalex.org/W1966950287","https://openalex.org/W1970908217","https://openalex.org/W1978394996","https://openalex.org/W2010878208","https://openalex.org/W2012188461","https://openalex.org/W2025501308","https://openalex.org/W2045326521","https://openalex.org/W2061292447","https://openalex.org/W2073778644","https://openalex.org/W2085573882","https://openalex.org/W2092822777","https://openalex.org/W2119821739","https://openalex.org/W2119927523","https://openalex.org/W2149684865","https://openalex.org/W2167488165","https://openalex.org/W2183365078","https://openalex.org/W2279925385","https://openalex.org/W2435251607","https://openalex.org/W2507337457","https://openalex.org/W2570336233","https://openalex.org/W2741011390","https://openalex.org/W2766982372","https://openalex.org/W2996493790","https://openalex.org/W4239510810","https://openalex.org/W4244588885"],"related_works":["https://openalex.org/W2593155302","https://openalex.org/W2041415459","https://openalex.org/W2072812638","https://openalex.org/W3126095231","https://openalex.org/W2352855287","https://openalex.org/W4200071106","https://openalex.org/W2378906650","https://openalex.org/W2384288445","https://openalex.org/W2382526412","https://openalex.org/W2242172122"],"abstract_inverted_index":{"Purpose":[0],"Data":[1],"crawling":[2,223,238],"in":[3,44,93,108,145,221,237],"e-commerce":[4,211],"for":[5,33,74,142,229],"market":[6],"research":[7],"often":[8],"come":[9],"with":[10,125,163],"the":[11,46,56,104,130,133,146,154,164,182,199,207],"risk":[12],"of":[13,22,91,106,110,132,148,156,181,201,210],"poor":[14],"authenticity":[15],"due":[16],"to":[17,26,50,62,68,77,95,101,128,171,174,190],"modification":[18,39],"attacks.":[19],"The":[20,37,80,98,137,161],"purpose":[21],"this":[23],"paper":[24,81,232],"is":[25,61,100,168,203,225],"propose":[27],"a":[28,84,234],"novel":[29,235],"data":[30,38,47,71,85,107,147,240],"authentication":[31,241],"model":[32,87,167],"such":[34],"systems.":[35],"Design/methodology/approach":[36],"problem":[40,242],"requires":[41],"careful":[42,188],"examinations":[43],"which":[45,70,152,194,243],"are":[48,72,123,195],"re-collected":[49],"verify":[51],"their":[52,89,118,216],"reliability":[53],"by":[54],"overlapping":[55],"two":[57],"datasets.":[58],"This":[59,231],"approach":[60,236],"use":[63],"different":[64],"anomaly":[65,96],"detection":[66,214],"techniques":[67,141],"determine":[69],"potential":[73],"frauds":[75,202],"and":[76,150,227],"be":[78,172],"re-collected.":[79],"also":[82,169],"proposes":[83],"selection":[86,166],"using":[88],"weights":[90],"importance":[92],"addition":[94],"detection.":[97],"target":[99],"significantly":[102],"reduce":[103],"amount":[105],"need":[109],"verification,":[111],"but":[112],"still":[113],"guarantee":[114],"that":[115],"they":[116],"achieve":[117],"high":[119],"authenticity.":[120],"Empirical":[121],"experiments":[122],"conducted":[124],"real-world":[126],"datasets":[127],"evaluate":[129],"efficiency":[131],"proposed":[134],"scheme.":[135],"Findings":[136],"authors":[138],"examine":[139],"several":[140],"detecting":[143],"anomalies":[144],"users":[149],"products,":[151],"give":[153],"accuracy":[155],"80":[157,178],"per":[158,179],"cent":[159,180],"approximately.":[160],"integration":[162],"weight":[165],"proved":[170],"able":[173],"detect":[175],"more":[176],"than":[177],"existing":[183],"fraudulent":[184],"ones":[185,193],"while":[186],"being":[187],"not":[189,245],"accidentally":[191],"include":[192],"not,":[196],"especially":[197],"when":[198],"proportion":[200],"high.":[204],"Originality/value":[205],"With":[206],"rapid":[208],"development":[209],"fields,":[212],"fraud":[213],"on":[215],"data,":[217],"as":[218,220],"well":[219],"Web":[222],"systems":[224,239],"new":[226],"necessary":[228],"research.":[230],"contributes":[233],"has":[244],"been":[246],"studied":[247],"much.":[248]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
