{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:34:05Z","timestamp":1725860045388},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319394251"},{"type":"electronic","value":"9783319394268"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39426-8_2","type":"book-chapter","created":{"date-parts":[[2016,6,26]],"date-time":"2016-06-26T22:47:34Z","timestamp":1466981254000},"page":"15-27","source":"Crossref","is-referenced-by-count":1,"title":["A Methodology for Quality-Based Selection of Internet Data Sources in Maritime Domain"],"prefix":"10.1007","author":[{"given":"Milena","family":"Str\u00f3\u017cyna","sequence":"first","affiliation":[]},{"given":"Gerd","family":"Eiden","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Filipiak","sequence":"additional","affiliation":[]},{"given":"Jacek","family":"Ma\u0142yszko","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"W\u0119cel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,28]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.2307\/249240","volume":"8","author":"D Robey","year":"1984","unstructured":"Robey, D., Markus, M.L.: Rituals in information system design. MIS Q. 8, 5\u201315 (1984)","journal-title":"MIS Q."},{"key":"2_CR2","unstructured":"International Organization for Standardization: ISO 8402\u20131986 (GB\/T6583-1992): Quality-Vocabulary, June 1986"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Vespe, M., Sciotti, M., Battistello, G.: Multi-sensor autonomous tracking for maritime surveillance. In: International Conference on Radar, 2008, pp. 525\u2013530. IEEE (2008)","DOI":"10.1109\/RADAR.2008.4653980"},{"key":"2_CR4","unstructured":"European Commission: Integrated Maritime Policy for the EU. Working document III on Maritime Surveillance Systems (2008)"},{"issue":"14","key":"2_CR5","doi-asserted-by":"crossref","first-page":"5719","DOI":"10.1016\/j.eswa.2013.04.029","volume":"40","author":"S Kazemi","year":"2013","unstructured":"Kazemi, S., Abghari, S., Lavesson, N., Johnson, H., Ryman, P.: Open data for anomaly detection in maritime surveillance. Expert Syst. Appl. 40(14), 5719\u20135729 (2013)","journal-title":"Expert Syst. Appl."},{"key":"2_CR6","unstructured":"Alonso, J., Ambur, O., Amutio, M.A., Aza\u00f1\u00f3n, O., Bennett, D., Flagg, R., McAllister, D., Novak, K., Rush, S., Sheridan, J.: Improving access to government through better use of the web. World Wide Web Consortium (2009)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Rhodes, B.J., Bomberger, N.A., Seibert, M., Waxman, A.M.: Maritime situation monitoring and awareness using learning mechanisms. In: Military Communications Conference, MILCOM 2005, pp. 646\u2013652. IEEE (2005)","DOI":"10.1109\/MILCOM.2005.1605756"},{"key":"2_CR8","unstructured":"Fooladvandi, F., Brax, C., Gustavsson, P., Fredin, M.: Signature-based activity detection based on Bayesian networks acquired from expert knowledge. In: 12th International Conference on Information Fusion, FUSION 2009, pp. 436\u2013443. IEEE (2009)"},{"key":"2_CR9","unstructured":"Riveiro, M., Falkman, G., Ziemke, T.: Improving maritime anomaly detection and situation awareness through interactive visualization. In: 11th International Conference on Information Fusion, 2008, pp. 1\u20138. IEEE (2008)"},{"key":"2_CR10","unstructured":"Helldin, T., Riveiro, M.: Explanation methods for Bayesian networks: review and application to a maritime scenario. In: Proceedings of the 3rd Annual Sk\u00f6vde Workshop on Information Fusion Topics (SWIFT 2009), pp. 11\u201316 (2009)"},{"key":"2_CR11","unstructured":"Peter, B.: Data quality. The key to interoperability (2010)"},{"issue":"3","key":"2_CR12","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1016\/0167-9236(93)E0050-N","volume":"13","author":"RY Wang","year":"1995","unstructured":"Wang, R.Y., Reddy, M.P., Kon, H.B.: Toward quality data: an attribute-based approach. Decis. Support Syst. 13(3), 349\u2013372 (1995)","journal-title":"Decis. Support Syst."},{"key":"2_CR13","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1080\/07421222.1996.11518099","volume":"12","author":"RY Wang","year":"1996","unstructured":"Wang, R.Y., Strong, D.M.: Beyond accuracy: what data quality means to data consumers. J. Manage. Inf. Syst. 12, 5\u201333 (1996)","journal-title":"J. Manage. Inf. Syst."},{"issue":"3","key":"2_CR14","doi-asserted-by":"crossref","first-page":"16:1","DOI":"10.1145\/1541880.1541883","volume":"41","author":"C Batini","year":"2009","unstructured":"Batini, C., Cappiello, C., Francalanci, C., Maurino, A.: Methodologies for data quality assessment and improvement. ACM Comput. Surv. 41(3), 16:1\u201316:52 (2009)","journal-title":"ACM Comput. Surv."},{"key":"2_CR15","unstructured":"European Statistical System: ESS handbook for quality reports. Eurostat (2014)"},{"key":"2_CR16","unstructured":"European Parliament: Regulation (EC) No 223\/2009 of the European Parliament and the Council of 11 on European statistics and repealing Regulation (EC, Euratom). Official J. Eur. Union 52 (2009)"},{"key":"2_CR17","unstructured":"Naumann, F., Freytag, J.C., Spiliopoulou, M.: Quality-driven source selection using data envelopment analysis. In: Proceedings of the 3rd Conference on Information Quality (IQ), Cambridge, MA (1998)"},{"issue":"10","key":"2_CR18","doi-asserted-by":"crossref","first-page":"1675","DOI":"10.1023\/B:AURC.0000044276.99273.a0","volume":"65","author":"A Dorofeyuk","year":"2004","unstructured":"Dorofeyuk, A., Pokrovskaya, I., Chernyavkii, A.: Expert methods to analyze and perfect management systems. Autom. Remote Control 65(10), 1675\u20131688 (2004)","journal-title":"Autom. Remote Control"},{"issue":"14","key":"2_CR19","doi-asserted-by":"crossref","first-page":"5719","DOI":"10.1016\/j.eswa.2013.04.029","volume":"40","author":"S Kazemi","year":"2013","unstructured":"Kazemi, S., Abghari, S., Lavesson, N., Johnson, H., Ryman, P.: Open data for anomaly detection in maritime surveillance. Expert Syst. Appl. 40(14), 5719\u20135729 (2013)","journal-title":"Expert Syst. Appl."},{"key":"2_CR20","unstructured":"Brown, B.B.: Delphi process: a methodology used for the elicitation of opinions of experts. Technical report, DTIC Document (1968)"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39426-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T03:03:40Z","timestamp":1568084620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39426-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319394251","9783319394268"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39426-8_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2016]]}}}