{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.07894","arxiv_id":"2605.07894","integrity":{"available":true,"endpoint":"/pith/2605.07894/integrity.json","summary":{"critical":1,"advisory":0,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":1,"advisory":0,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T10:02:13.648223Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T04:47:26.688731Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T15:31:18.429381Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T11:25:54.999353Z","findings_count":1}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5555/189200.189209' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5555/189200.189209","detected_arxiv_id":null,"ref_index":21,"audited_at":"2026-05-19T11:25:54.999353Z"}],"snapshot_sha256":"3ec3ed7bfd619ee9c5dbd7edd67f331a4a1eff2512a25e3cc29d0c08c56c1f3d"},"events":[{"event_id":1035,"event_type":"pith.integrity.v1","payload_sha256":"3ecebefc8aedbde7c70227204dbda6063e62f38e4d5958a81b05cd647c49b1d1","signature_b64":"a5z6/IvBu0a/yXgncZf6lNUEys4g0f6ETHNrb5y83W6EQGw9a9CoMWOdLLSFPb+R/nahdCfpI10wJNKWVzmzDA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:27:01.647126+00:00","payload":{"note":"Identifier '10.5555/189200.189209' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Jakob Nielsen. 1994. Heuristic Evaluation. InUsability Inspection Methods, Jakob Nielsen and Robert L. Mack (Eds.). John Wiley & Sons, Inc., New York, NY, USA, 25–62. https://dl.acm.org/doi/10.5555/189200.189209","arxiv_id":"2605.07894","detector":"doi_compliance","evidence":{"doi":"10.5555/189200.189209","arxiv_id":null,"ref_index":21,"raw_excerpt":"Jakob Nielsen. 1994. Heuristic Evaluation. InUsability Inspection Methods, Jakob Nielsen and Robert L. Mack (Eds.). John Wiley & Sons, Inc., New York, NY, USA, 25–62. https://dl.acm.org/doi/10.5555/189200.189209","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":21,"audited_at":"2026-05-19T11:25:54.999353Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/189200.189209","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"d1a47f29ffa66dc87b8e412129a4e68580fc506aca28c1df664ac1fde3b57e72","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.07894/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}