{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:58:33Z","timestamp":1742921913864,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031602207"},{"type":"electronic","value":"9783031602214"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60221-4_37","type":"book-chapter","created":{"date-parts":[[2024,5,12]],"date-time":"2024-05-12T18:01:29Z","timestamp":1715536889000},"page":"389-401","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Economy for the Fitness of Intelligent Algorithms"],"prefix":"10.1007","author":[{"given":"Miguel \u00c1ngel Jim\u00e9nez","family":"Garc\u00eda","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Richard","family":"de Jes\u00fas Gil Herrera","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"37_CR1","unstructured":"Alayrac, J., et al.: Flamingo: a visual language model for few-shot learning. Adv. Neural Inf. Process. Syst. 23716\u201323736 (2022)"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Bygrave, L.: Data privacy law: an international perspective (2014)","DOI":"10.1093\/acprof:oso\/9780199675555.001.0001"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Casado, R., Younas, M.: Emerging trends and technologies in big data processing. Concurr. Comput. Pract. Exp. 2078\u20132091 (2015)","DOI":"10.1002\/cpe.3398"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Charilaou, P., Battat, R.: Machine learning models and over-fitting considerations. World J. Gastroenterol. 28(5), 605 (2022)","DOI":"10.3748\/wjg.v28.i5.605"},{"key":"37_CR5","unstructured":"Chen, M., et al.: Evaluating large language models trained on code. arXiv preprint (2021)"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Davenport, T., Ronanki, R.: An empirical overview of nonlinearity and overfitting in machine learning using COVID-19 data. Chaos, Solitons Fractals 139 (2020)","DOI":"10.1016\/j.chaos.2020.110055"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Dudek-Dyduch, E., Tadeusiewicz, R., Horzyk, A.: Neural network adaptation process effectiveness dependent of constant training data availability. Neurocomputing 72(13\u201315), 3138\u20133149 (2009)","DOI":"10.1016\/j.neucom.2009.03.017"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Fang, H.: Managing data lakes in big data era: What\u2019s a data lake and why has it became popular in data management ecosystem. In: IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), pp. 820\u2013824 (2015)","DOI":"10.1109\/CYBER.2015.7288049"},{"key":"37_CR9","unstructured":"Foster, D.: Generative Deep Learning. O\u2019Reilly Media, Inc. (2022)"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Geng, D., Zhang, C., Xia, C., Xia, X., Liu, Q., Fu, X.: Big data-based improved data acquisition and storage system for designing industrial data platform. IEEE Access 7, 44574\u201344582 (2019)","DOI":"10.1109\/ACCESS.2019.2909060"},{"key":"37_CR11","unstructured":"Gozalo-Brizuela, R., Garrido-Merchan, E.: ChatGPT is not all you need. A state of the art review of large generative AI models. arXiv preprint (2023)"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Grzonkowski, S., Corcoran, P., Coughlin, T.: Security analysis of authentication protocols for next-generation mobile and CE cloud services. In: 2011 IEEE International Conference on Consumer Electronics-Berlin (ICCE-Berlin), pp. 83\u201387 (2011)","DOI":"10.1109\/ICCE-Berlin.2011.6031855"},{"key":"37_CR13","unstructured":"Houde, S., et al.: Business (mis) use cases of generative ai. arXiv preprint arXiv:2003.07679 (2020)"},{"key":"37_CR14","unstructured":"Kaggle. Contact. Kaggle (2023, September 22). https:\/\/www.kaggle.com\/contact#\/datasets\/license"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Li, G., Zhou, X., Cao, L.: AI meets database: AI4DB and DB4AI. In: Proceedings of the 2021 International Conference on Management of Data, pp. 2859\u20132866 (2021)","DOI":"10.1145\/3448016.3457542"},{"issue":"01","key":"37_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/MC.2022.3218176","volume":"56","author":"H Lin","year":"2023","unstructured":"Lin, H.: Standing on the shoulders of AI giants. Computer 56(01), 97\u2013101 (2023)","journal-title":"Computer"},{"key":"37_CR17","doi-asserted-by":"publisher","unstructured":"Liu, N., Li, S., Du, Y., Torralba, A., Tenenbaum, J.: Compositional visual generation with composable diffusion models. In: European Conference on Computer Vision, pp. 423\u2013439. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19790-1_26","DOI":"10.1007\/978-3-031-19790-1_26"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Lowe, D.: Fitting parameterized three-dimensional models to images. In: IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 441\u2013450 (1991)","DOI":"10.1109\/34.134043"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Miloslavskaya, N., Tolstoy, A.: Big data, fast data and data lake concepts. Procedia Comput. Sci. 88, 300\u2013305 (2016)","DOI":"10.1016\/j.procs.2016.07.439"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Munappy, A., Mattos, D., Bosch, J., Olsson, H., Dakkak, A.: ad-hoc data analytics to dataops. In: Proceedings of the International Conference on Software and System Processes, pp. 165\u2013174 (2020)","DOI":"10.1145\/3379177.3388909"},{"key":"37_CR21","unstructured":"Niemi, A.: Digital lead generation and nurturing: a holistic approach (2017)"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Peng, Y., Nagata, H.: An empirical overview of nonlinearity and overfitting in machine learning using COVID-19 data. Chaos Solitons Fractals 139 (2020)","DOI":"10.1016\/j.chaos.2020.110055"},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"Perreault, Jr., W., Leigh, L.: Reliability of nominal data based on qualitative judgments. J. Market. Res. 135\u2013148 (1989)","DOI":"10.1177\/002224378902600201"},{"key":"37_CR24","doi-asserted-by":"crossref","unstructured":"Qiu, J., Wu, Q., Ding, G., Xu, Y., Feng, S.: A survey of machine learning for big data processing. EURASIP J. Adv. Signal Process. 1\u201316 (2016)","DOI":"10.1186\/s13634-016-0355-x"},{"key":"37_CR25","unstructured":"RegulationGeneral Data Protection Regulation. General Data Protection Regulation (GDPR). Intersoft Consulting (2018)"},{"key":"37_CR26","doi-asserted-by":"crossref","unstructured":"Remane, G., Hanelt, A., Tesch, J., Kolbe, L.: The business model pattern database\u2014a tool for systematic business model innovation. Int. J. Innov. Manag. (2017)","DOI":"10.1142\/S1363919617500049"},{"key":"37_CR27","unstructured":"Robinson, I., Webber, J., Eifrem, E.: Graph Databases: New Opportunities for Connected Data. O\u2019Reilly Media, Inc. (2015)"},{"key":"37_CR28","doi-asserted-by":"crossref","unstructured":"Sakr, S., Liu, A., Batista, D., Alomari, M.: A survey of large-scale data management approaches in cloud environments. IEEE Commun. Surv. Tutor. 13, 311\u2013336 (2011)","DOI":"10.1109\/SURV.2011.032211.00087"},{"key":"37_CR29","doi-asserted-by":"crossref","unstructured":"Salloum, S., Dautov, R., Dautov, X., Peng, P., Huang, J.: Big data analytics on Apache Spark. Int. J. Data Sci. Analyt. 1(3\u20134), 145\u2013164 (2016)","DOI":"10.1007\/s41060-016-0027-9"},{"key":"37_CR30","first-page":"471","volume":"80","author":"P Schwartz","year":"1994","unstructured":"Schwartz, P.: European data protection law and restrictions on international data flows. Iowa L. Rev. 80, 471 (1994)","journal-title":"Iowa L. Rev."},{"key":"37_CR31","doi-asserted-by":"crossref","unstructured":"Shen, Y., et al.: ChatGPT and other large language models are double-edged swords. Radiology 307(2) (2023)","DOI":"10.1148\/radiol.230163"},{"key":"37_CR32","unstructured":"Taylor, R., et al.: Galactica: a large language model for science. arXiv preprint (2022)"},{"key":"37_CR33","unstructured":"Villegas, R., et al.: Phenaki: variable length video generation from open domain textual description. arXiv preprint (2022)"},{"key":"37_CR34","unstructured":"Wang, F., Yun, C., Goldwasser, S., Vaikuntanathan, V., Zaharia, M.: Splinter: practical private queries on public data. In: 14th USENIX Symposium on Networked Systems Design and Implementation, pp. 299\u2013313 (2017)"},{"key":"37_CR35","doi-asserted-by":"crossref","unstructured":"Wang, L., Chen, W., Yang, W., Bi, F., Yu, F.: State-of-the-art review on image synthesis with generative adversarial networks. IEEE Access 8, 63514\u201363537 (2020)","DOI":"10.1109\/ACCESS.2020.2982224"},{"key":"37_CR36","doi-asserted-by":"crossref","unstructured":"Zech, H.: A legal framework for a data economy in the European Digital Single Market: rights to use data. J. Intellect. Prop. Law Pract. 11(6), 460\u2013470 (2016)","DOI":"10.1093\/jiplp\/jpw049"},{"key":"37_CR37","unstructured":"Zheng, A., Casari, A.: Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists. O\u2019Reilly Media, Inc. (2018)"},{"key":"37_CR38","doi-asserted-by":"crossref","unstructured":"Zittrain, J., Edelman, B. (2003). Internet filtering in China. IEEE Internet Comput. 7(2), 70\u201377 (2003)","DOI":"10.1109\/MIC.2003.1189191"}],"container-title":["Lecture Notes in Networks and Systems","Good Practices and New Perspectives in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60221-4_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,12]],"date-time":"2024-05-12T18:05:47Z","timestamp":1715537147000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60221-4_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031602207","9783031602214"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60221-4_37","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}