{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T03:12:10Z","timestamp":1775617930967,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319928975","type":"print"},{"value":"9783319928982","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92898-2_6","type":"book-chapter","created":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T15:58:13Z","timestamp":1528127893000},"page":"70-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Increasing Trust in (Big) Data Analytics"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Schneider","sequence":"first","affiliation":[]},{"given":"Joshua Peter","family":"Handali","sequence":"additional","affiliation":[]},{"given":"Jan","family":"vom Brocke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,5]]},"reference":[{"issue":"2","key":"6_CR1","first-page":"1","volume":"17","author":"A Abbasi","year":"2016","unstructured":"Abbasi, A., et al.: Big data research in information systems: toward an inclusive research agenda. J. Assoc. Inf. Syst. 17(2), 1\u201332 (2016)","journal-title":"J. Assoc. Inf. Syst."},{"key":"6_CR2","volume-title":"PID Controllers: Theory, Design, and Tuning","author":"KJ \u00c5str\u00f6m","year":"1995","unstructured":"\u00c5str\u00f6m, K.J., H\u00e4gglund, T.: PID Controllers: Theory, Design, and Tuning. Instrument society of America, Research Triangle Park (1995)"},{"key":"6_CR3","volume-title":"The Basics of Social Research","author":"ER Babbie","year":"2013","unstructured":"Babbie, E.R.: The Basics of Social Research. Cengage Learning, Boston (2013)"},{"issue":"2","key":"6_CR4","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","volume":"81","author":"M Barreno","year":"2010","unstructured":"Barreno, M., et al.: The security of machine learning. Mach. Learn. 81(2), 121\u2013148 (2010)","journal-title":"Mach. Learn."},{"key":"6_CR5","unstructured":"Bengio, Y.: Deep learning of representations for unsupervised and transfer learning. In: Proceedings of ICML Workshop on Unsupervised and Transfer Learning, pp. 17\u201336 (2012)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Bilge, L., Dumitras, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 833\u2013844 (2012)","DOI":"10.1145\/2382196.2382284"},{"key":"6_CR7","unstructured":"Claverie-Berge, I.: Solutions Big Data IBM. http:\/\/www-05.ibm.com\/fr\/events\/netezzaDM_2012\/Solutions_Big_Data.pdf. Accessed 16 Mar 2018"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/1251829","volume":"61","author":"PM Doney","year":"1997","unstructured":"Doney, P.M., Cannon, J.P.: An examination of the nature of trust in buyer-seller relationships. J. Mark. 61, 35\u201351 (1997)","journal-title":"J. Mark."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Fong, R.C., Vedaldi, A.: Interpretable explanations of black boxes by meaningful perturbation. In: IEEE International Conference on Computer Vision (2017)","DOI":"10.1109\/ICCV.2017.371"},{"issue":"2","key":"6_CR10","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/BF02985802","volume":"27","author":"J Franklin","year":"2005","unstructured":"Franklin, J.: The elements of statistical learning: data mining, inference and prediction. Math. Intell. 27(2), 83\u201385 (2005)","journal-title":"Math. Intell."},{"issue":"5","key":"6_CR11","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1109\/TNNLS.2013.2292894","volume":"25","author":"B Fr\u00e9nay","year":"2014","unstructured":"Fr\u00e9nay, B., Verleysen, M.: Classification in the presence of label noise: a survey. IEEE Trans. Neural Netw. Learn. Syst. 25(5), 845\u2013869 (2014)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"4","key":"6_CR12","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama, J., et al.: A survey on concept drift adaptation. ACM Comput. Surv. (CSUR) 46(4), 44 (2014)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Gao, J., Xie, C., Tao, C.: Big data validation and quality assurance\u2013issues, challenges, and needs. In: 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE), pp. 433\u2013441. IEEE, March 2016","DOI":"10.1109\/SOSE.2016.63"},{"key":"6_CR14","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10247-4","volume-title":"Data Preprocessing in Data Mining","author":"S Garc\u00eda","year":"2015","unstructured":"Garc\u00eda, S., et al.: Data Preprocessing in Data Mining. ISRL, vol. 72. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-10247-4"},{"key":"6_CR15","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., et al.: Deep Learning. MIT Press, Cambridge (2016)"},{"issue":"3","key":"6_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1609\/aimag.v38i3.2741","volume":"38","author":"B Goodman","year":"2016","unstructured":"Goodman, B., Flaxman, S.: European Union regulations on algorithmic decision-making and a \u201cright to explanation\u201d. AI Mag. 38(3), 50\u201357 (2016)","journal-title":"AI Mag."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Guidotti, R., et al.: A survey of methods for explaining black box models. arXiv preprint arXiv:1802.01933 (2018)","DOI":"10.1145\/3236009"},{"key":"6_CR18","unstructured":"Hof, R.D.: Deep learning with massive amounts of computational power. https:\/\/www.technologyreview.com\/s\/513696\/deep-learning\/. Accessed 16 Mar 2018"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Johansson, U., Niklasson, L.: Evolving decision trees using oracle guides. In: IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2009, pp. 238\u2013244 (2009)","DOI":"10.1109\/CIDM.2009.4938655"},{"key":"6_CR20","unstructured":"KPMG: Building trust in analytics: breaking the cycle of mistrust in D&A. https:\/\/assets.kpmg.com\/content\/dam\/kpmg\/xx\/pdf\/2016\/10\/building-trust-in-analytics.pdf. Accessed 16 Mar 2018"},{"key":"6_CR21","unstructured":"KPMG: Now or never: CEOs mobilize for the fourth industrial revolution. https:\/\/assets.kpmg.com\/content\/dam\/kpmg\/pdf\/2016\/07\/2016-ceo-survey.pdf. Accessed 16 Mar 2018"},{"issue":"12","key":"6_CR22","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1016\/S0031-3203(98)00181-2","volume":"32","author":"R Krishnan","year":"1999","unstructured":"Krishnan, R., et al.: Extracting decision trees from trained neural networks. Pattern Recogn. 32(12), 1999\u20132009 (1999)","journal-title":"Pattern Recogn."},{"key":"6_CR23","unstructured":"Lipton, Z.C.: The mythos of model interpretability. In: Proceedings of ICML Workshop on Human Interpretability in Machine Learning (2016)"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Lou, Y., et al.: Accurate intelligible models with pairwise interactions. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 623\u2013631 (2013)","DOI":"10.1145\/2487575.2487579"},{"issue":"1","key":"6_CR25","doi-asserted-by":"publisher","first-page":"4","DOI":"10.7152\/acro.v24i1.14671","volume":"24","author":"T Lukoianova","year":"2013","unstructured":"Lukoianova, T., Rubin, V.L.: Veracity roadmap: Is big data objective, truthful and credible? Adv. Classif. Res. Online 24(1), 4\u201315 (2013)","journal-title":"Adv. Classif. Res. Online"},{"key":"6_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/0470010940","volume-title":"Robust Statistics","author":"RA Maronna","year":"2006","unstructured":"Maronna, R.A., Martin, R.D., Yohai, V.: Robust Statistics. Wiley, Chichester (2006)"},{"issue":"10","key":"6_CR27","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345\u20131359 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., et al.: Why should i trust you?: explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144 (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Saenger, J., Richthammer, C., Hassan, S., Pernul, G.: Trust and big data: a roadmap for research. In: 2014 25th International Workshop on Database and Expert Systems Applications (DEXA), pp. 278\u2013282, September 2014","DOI":"10.1109\/DEXA.2014.63"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Schneider, J., Bogojeska, J., Vlachos, M.: Solving Linear SVMs with multiple 1D projections. In: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, pp. 221\u2013230. ACM, November 2014","DOI":"10.1145\/2661829.2661994"},{"issue":"2","key":"6_CR31","first-page":"63","volume":"22","author":"AK Shenton","year":"2004","unstructured":"Shenton, A.K.: Strategies for ensuring trustworthiness in qualitative research projects. Educ. Inf. 22(2), 63\u201375 (2004)","journal-title":"Educ. Inf."},{"key":"6_CR32","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: International Conference on Learning Representations (2014)"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Taigman, Y., et al.: Deepface: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1701\u20131708 (2014)","DOI":"10.1109\/CVPR.2014.220"},{"issue":"4","key":"6_CR34","doi-asserted-by":"publisher","first-page":"249","DOI":"10.2753\/MIS0742-1222240410","volume":"24","author":"W Wang","year":"2008","unstructured":"Wang, W., Benbasat, I.: Attributions of trust in decision support technologies: a study of recommendation agents for e-commerce. J. Manag. Inf. Syst. 24(4), 249\u2013273 (2008)","journal-title":"J. Manag. Inf. Syst."},{"issue":"1","key":"6_CR35","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s40537-016-0043-6","volume":"3","author":"K Weiss","year":"2016","unstructured":"Weiss, K., et al.: A survey of transfer learning. J. Big Data 3(1), 9 (2016)","journal-title":"J. Big Data"},{"issue":"1","key":"6_CR36","first-page":"3","volume":"16","author":"Z-H Zhou","year":"2003","unstructured":"Zhou, Z.-H., et al.: Extracting symbolic rules from trained neural network ensembles. AI Commun. 16(1), 3\u201315 (2003)","journal-title":"AI Commun."},{"issue":"3","key":"6_CR37","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s10462-004-0751-8","volume":"22","author":"X Zhu","year":"2004","unstructured":"Zhu, X., Wu, X.: Class noise vs. attribute noise: a quantitative study. Artif. Intell. Rev. 22(3), 177\u2013210 (2004)","journal-title":"Artif. Intell. Rev."}],"container-title":["Lecture Notes in Business Information Processing","Advanced Information Systems Engineering Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92898-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:20:02Z","timestamp":1710328802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-92898-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319928975","9783319928982"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92898-2_6","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"5 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/caise2018.ut.ee","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}