{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T23:31:04Z","timestamp":1717111864398},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T00:00:00Z","timestamp":1502755200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11948-017-9960-9","type":"journal-article","created":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T07:23:11Z","timestamp":1502781791000},"page":"1603-1610","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Method for Improving the Integrity of Peer Review"],"prefix":"10.1007","volume":"24","author":[{"given":"Mehdi","family":"Dadkhah","sequence":"first","affiliation":[]},{"given":"Mohsen","family":"Kahani","sequence":"additional","affiliation":[]},{"given":"Glenn","family":"Borchardt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,15]]},"reference":[{"key":"9960_CR1","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/978-3-540-77465-5_19","volume":"226","author":"RB Basnet","year":"2008","unstructured":"Basnet, R. B., Mukkamala, S., & Sung, A. H. (2008). Detection of phishing attacks: A machine learning approach. Soft Computing Applications in Industry, 226, 373\u2013383.","journal-title":"Soft Computing Applications in Industry"},{"issue":"10","key":"9960_CR2","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.3346\/jkms.2016.31.10.1511","volume":"31","author":"J Beall","year":"2016","unstructured":"Beall, J. (2016). Dangerous predatory publishers threaten medical research. Journal of Korean Medical Science, 31(10), 1511\u20131513. doi: 10.3346\/jkms.2016.31.10.1511 .","journal-title":"Journal of Korean Medical Science"},{"issue":"11","key":"9960_CR3","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1007\/s13312-016-0983-0","volume":"53","author":"M Dadkhah","year":"2016","unstructured":"Dadkhah, M., & Bianciardi, G. (2016). Hackers spy scientists. Indian Pediatrics, 53(11), 1027.","journal-title":"Indian Pediatrics"},{"key":"9960_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-016-9867-x","author":"M Dadkhah","year":"2017","unstructured":"Dadkhah, M., Lagzian, M., & Borchardt, G. (2017). Identity theft in the academic world leads to junk science. Science and Engineering Ethics. doi: 10.1007\/s11948-016-9867-x .","journal-title":"Science and Engineering Ethics"},{"issue":"19","key":"9960_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i19\/91161","volume":"9","author":"J Dileep Kumar","year":"2016","unstructured":"Dileep Kumar, J., Srikanth, V., & Tejeswini, L. (2016). Email phishing attack mitigation using server side email addon. Indian Journal of Science & Technology, 9(19), 1\u20135. doi: 10.17485\/ijst\/2016\/v9i19\/91161 .","journal-title":"Indian Journal of Science & Technology"},{"issue":"10","key":"9960_CR6","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1164394.1164398","volume":"49","author":"T Dinev","year":"2006","unstructured":"Dinev, T. (2006). Why spoofing is serious internet fraud. Communications of the ACM, 49(10), 76\u201382. doi: 10.1145\/1164394.1164398 .","journal-title":"Communications of the ACM"},{"issue":"1","key":"9960_CR7","doi-asserted-by":"crossref","first-page":"61","DOI":"10.24846\/v22i1y201307","volume":"22","author":"IRA Hamid","year":"2013","unstructured":"Hamid, I. R. A., Abawajy, J., & Kim, T.-H. (2013). Using feature selection and classification scheme for automating phishing email detection. Studies in Informatics and Control, 22(1), 61\u201370.","journal-title":"Studies in Informatics and Control"},{"issue":"25","key":"9960_CR8","doi-asserted-by":"publisher","first-page":"2393","DOI":"10.1056\/NEJMp1512330","volume":"373","author":"CJ Haug","year":"2015","unstructured":"Haug, C. J. (2015). Peer-review fraud\u2014hacking the scientific publication process. New England Journal of Medicine, 373(25), 2393\u20132395. doi: 10.1056\/NEJMp1512330 .","journal-title":"New England Journal of Medicine"},{"key":"9960_CR9","doi-asserted-by":"crossref","unstructured":"Rao, R. S., & Ali, S. T. (2015). A computer vision technique to detect phishing attacks. In Paper presented at the communication systems and network technologies (CSNT), 2015 fifth international conference on.","DOI":"10.1109\/CSNT.2015.68"},{"issue":"1","key":"9960_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s11948-015-9625-5","volume":"22","author":"DB Resnik","year":"2016","unstructured":"Resnik, D. B., & Elmore, S. A. (2016). Ensuring the quality, fairness, and integrity of journal peer review: A possible role of editors. Science and Engineering Ethics, 22(1), 169\u2013188. doi: 10.1007\/s11948-015-9625-5 .","journal-title":"Science and Engineering Ethics"},{"key":"9960_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-016-9842-6","author":"JA Teixeira da Silva","year":"2017","unstructured":"Teixeira da Silva, J. A., & Al-Khatib, A. (2017). Should authors be requested to suggest peer reviewers? Science and Engineering Ethics. doi: 10.1007\/s11948-016-9842-6 .","journal-title":"Science and Engineering Ethics"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-017-9960-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9960-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9960-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T07:11:45Z","timestamp":1602745905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-017-9960-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,15]]},"references-count":11,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["9960"],"URL":"https:\/\/doi.org\/10.1007\/s11948-017-9960-9","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,15]]}}}