{"id":"https://openalex.org/W2106807727","doi":"https://doi.org/10.1109/isi.2012.6284145","title":"Evaluating source trustability with data provenance: A research note","display_name":"Evaluating source trustability with data provenance: A research note","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W2106807727","doi":"https://doi.org/10.1109/isi.2012.6284145","mag":"2106807727"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2012.6284145","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6284145","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103370053","display_name":"Antonio Badia","orcid":null},"institutions":[{"id":"https://openalex.org/I142740786","display_name":"University of Louisville","ror":"https://ror.org/01ckdn478","country_code":"US","type":"education","lineage":["https://openalex.org/I142740786"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Antonio Badia","raw_affiliation_strings":["Computer Engineering and Computer Science Department, University of Louisville, USA","Computer Engineering and Computer Science Department - University of Louisville, USA"],"affiliations":[{"raw_affiliation_string":"Computer Engineering and Computer Science Department, University of Louisville, USA","institution_ids":["https://openalex.org/I142740786"]},{"raw_affiliation_string":"Computer Engineering and Computer Science Department - University of Louisville, USA","institution_ids":["https://openalex.org/I142740786"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5103370053"],"corresponding_institution_ids":["https://openalex.org/I142740786"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.19466515,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"129","last_page":"131"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9704999923706055,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.958899974822998,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.8418530821800232},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8032530546188354},{"id":"https://openalex.org/keywords/data-quality","display_name":"Data quality","score":0.6203994750976562},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.6116241812705994},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.606690526008606},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5258905291557312},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.49428486824035645},{"id":"https://openalex.org/keywords/data-source","display_name":"Data source","score":0.43379664421081543},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4236978590488434},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.32361096143722534},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.10203945636749268},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.08704283833503723}],"concepts":[{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.8418530821800232},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8032530546188354},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.6203994750976562},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.6116241812705994},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.606690526008606},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5258905291557312},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.49428486824035645},{"id":"https://openalex.org/C2983685735","wikidata":"https://www.wikidata.org/wiki/Q5227355","display_name":"Data source","level":2,"score":0.43379664421081543},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4236978590488434},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32361096143722534},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.10203945636749268},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.08704283833503723},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2012.6284145","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6284145","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W259338706","https://openalex.org/W1508926539","https://openalex.org/W1575999478","https://openalex.org/W2109614975","https://openalex.org/W2258083035","https://openalex.org/W6630151969","https://openalex.org/W6634429445"],"related_works":["https://openalex.org/W2392768766","https://openalex.org/W2058118494","https://openalex.org/W2382021449","https://openalex.org/W2095118173","https://openalex.org/W2104269053","https://openalex.org/W2106424170","https://openalex.org/W2364394956","https://openalex.org/W3128103276","https://openalex.org/W2353590449","https://openalex.org/W3190568750"],"abstract_inverted_index":{"One":[0],"of":[1,13,37,42,50,62,77,117,127,161,168,199],"the":[2,11,22,30,38,56,60,75,125,128,159,165,169,204],"main":[3],"challenges":[4],"in":[5,20,48,87,153,203],"intelligence":[6],"work":[7,202],"is":[8,35,121,181,184,207],"to":[9,28,59,71,93,124,151,164,197],"assess":[10],"trustworthiness":[12,34],"data":[14,31,53,78,95,111],"sources.":[15,63],"In":[16,64],"an":[17],"adversarial":[18],"setting,":[19],"which":[21],"subjects":[23],"under":[24],"study":[25,158],"actively":[26],"try":[27],"disturb":[29],"gathering":[32],"process,":[33],"one":[36],"most":[39],"important":[40,194],"properties":[41],"a":[43,185],"source.":[44],"The":[45],"recent":[46],"increase":[47],"usage":[49],"open":[51],"source":[52],"has":[54,113],"exacerbated":[55],"problem,":[57],"due":[58],"proliferation":[61],"this":[65,190],"paper":[66,176],"we":[67],"propose":[68],"computerized":[69],"methods":[70,85,163],"help":[72,146],"analysts":[73],"evaluate":[74],"truthfulness":[76,99],"sources":[79],"(open":[80],"or":[81],"not).":[82],"We":[83,157],"apply":[84],"developed":[86],"database":[88],"and":[89,135,140,210],"Semantic":[90],"Web":[91],"research":[92,205,218],"determine":[94,147],"quality":[96,112],"(which":[97],"includes":[98],"but":[100,192],"also":[101],"other":[102],"related":[103,123],"aspects":[104],"like":[105],"accuracy,":[106],"timeliness,":[107],"etc.).":[108],"Research":[109],"on":[110,173],"made":[114],"frequent":[115],"use":[116],"provenance":[118],"metadata.":[119],"This":[120,175],"metadata":[122],"origin":[126],"data:":[129],"where":[130],"it":[131,137,149],"comes":[132],"from,":[133],"how":[134,148],"when":[136],"was":[138],"obtained,":[139],"any":[141],"relevant":[142,201],"conditions":[143],"that":[144],"might":[145],"came":[150],"be":[152],"its":[154],"current":[155],"form.":[156],"application":[160],"similar":[162],"particular":[166],"situation":[167],"Intelligence":[170],"analyst,":[171],"focusing":[172],"trust.":[174],"describes":[177],"ongoing":[178],"research;":[179],"what":[180],"explained":[182],"here":[183],"first":[186],"attempt":[187],"at":[188],"tackling":[189],"complex":[191],"very":[193],"problem.":[195],"Due":[196],"lack":[198],"space,":[200],"literature":[206],"not":[208],"discussed,":[209],"several":[211],"technical":[212],"considerations":[213],"are":[214,220],"omitted;":[215],"finally,":[216],"further":[217],"directions":[219],"only":[221],"sketched.":[222]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
