{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:50:16Z","timestamp":1743007816581,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642205101"},{"type":"electronic","value":"9783642205118"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20511-8_34","type":"book-chapter","created":{"date-parts":[[2011,5,16]],"date-time":"2011-05-16T11:09:32Z","timestamp":1305544172000},"page":"359-371","source":"Crossref","is-referenced-by-count":0,"title":["Implicit Social Production: Utilising Socially Generated Data By-Products"],"prefix":"10.1007","author":[{"given":"Ben","family":"Jennings","sequence":"first","affiliation":[]},{"given":"Anthony","family":"Finkelstein","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"Anderson, C.: The Long Tail: Why the Future of Business Is Selling Less of More. Hyperion (July 2006)"},{"key":"34_CR2","volume-title":"The Wealth of Networks: How Social Production Transforms Markets and Freedom","author":"Y. Benkler","year":"2007","unstructured":"Benkler, Y.: The Wealth of Networks: How Social Production Transforms Markets and Freedom. Yale University Press, New Haven (2007)"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Bettenburg, N., Shihab, E., Hassan, A.E.: An empirical study on the risks of using off-the-shelf techniques for processing mailing list data. In: ICSM 2009: Proceedings of the 25th IEEE International Conference on Software Maintenance, pp. 539\u2013542 (2009)","DOI":"10.1109\/ICSM.2009.5306383"},{"key":"34_CR4","unstructured":"Bosman, J.: Chevy tries a write-your-own-ad approach, and the potshots fly. The New York Times (January 2006)"},{"issue":"7","key":"34_CR5","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/S1364-6613(03)00136-0","volume":"7","author":"M. Christiansen","year":"2003","unstructured":"Christiansen, M., Kirby, S.: Language evolution: Consensus and controversies. Trends in Cognitive Sciences\u00a07(7), 300\u2013307 (2003)","journal-title":"Trends in Cognitive Sciences"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Coombs, R., Chopra, S., Schenk, D., Yutan, E.: Medical slang and its functions. Social Science & Medicine (January 1993)","DOI":"10.1016\/0277-9536(93)90116-L"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Dumas, B., Lighter, J.: Is slang a word for linguists? American Speech (January 1978)","DOI":"10.2307\/455336"},{"key":"34_CR8","unstructured":"Erol, S., Granitzer, M., Happ, S., Jantunen, S., Jennings, B., Koschmider, A., Nurcan, S., Rossi, D., Schmidt, R.: Combining bpm and social software: Contradiction or chance? Software Process Improvement and Practice Journal Special Issue on BPM 2008 Selected Workshop papers 2009, 9999 (Special Issue on BPM 2008) (2009)"},{"key":"34_CR9","unstructured":"Frank, E., Paynter, G.W., Witten, I.H., Gutwin, C., Nevill-Manning, C.G.: Domain-specific keyphrase extraction. In: Proceedings of the 16th International Joint Conference on Artificial Intelligence (IJCAI 1999), pp. 668\u2013673 (1999)"},{"key":"34_CR10","unstructured":"Good, N., Schafer, J., Konstan, J., Borchers, A.: Combining collaborative filtering with personal agents for better recommendations. In: Proceedings of AAAI (January 1999)"},{"issue":"6","key":"34_CR11","first-page":"1360","volume":"78","author":"M. Granovetter","year":"1973","unstructured":"Granovetter, M.: The strength of weak ties. ajs\u00a078(6), 1360 (1973)","journal-title":"ajs"},{"issue":"1","key":"34_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/963770.963772","volume":"22","author":"J.L. Herlocker","year":"2004","unstructured":"Herlocker, J.L., Konstan, J.A., Terveen, L.G., Riedl, J.T.: Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst.\u00a022(1), 5\u201353 (2004)","journal-title":"ACM Trans. Inf. Syst."},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Hossain, L., Zhu, D.: Social networks and coordination performance of distributed software development teams. The Journal of High Technology Management Research (January 2009)","DOI":"10.1016\/j.hitech.2009.02.007"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Hulth, A.: Improved automatic keyword extraction given more linguistic knowledge. In: Proceedings of the 2003 Conference on Empirical Methods in Natural Language Processing, vol.\u00a010, pp. 216\u2013223 (2003)","DOI":"10.3115\/1119355.1119383"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Kagdi, H., Poshyvanyk, D.: Who can help me with this change request? In: Proceedings of 17th IEEE International Conference on Program Comprehension, vol.\u00a09, pp. 273\u2013277 (May 2010)","DOI":"10.1109\/ICPC.2009.5090056"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Kosala, R., Blockeel, H.: Web mining research: A survey. ACM SIGKDD Explorations Newsletter (January 2000)","DOI":"10.1145\/360402.360406"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Ma, D., Schuler, D., Zimmermann, T., Sillito, J.: Expert recommendation with usage expertise. In: Proceedings of the 25th IEEE International Conference on Software Maintenance (September 2009)","DOI":"10.1109\/ICSM.2009.5306386"},{"key":"34_CR18","unstructured":"Mathes, A.: Folksonomies-cooperative classification and communication through shared metadata. Computer Mediated Communication (January 2004)"},{"key":"34_CR19","unstructured":"Mullenweg, M.: Akismet (2007), http:\/\/akismet.com\/faq\/"},{"key":"34_CR20","unstructured":"Surowiecki, J.: The Wisdom of Crowds. Anchor (August 2005)"},{"issue":"3","key":"34_CR21","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/245108.245122","volume":"40","author":"L. Terveen","year":"1997","unstructured":"Terveen, L., Hill, W., Amento, B., Mcdonald, D., Creter, J.: Phoaks: A system for sharing recommendations. Communications of the ACM\u00a040(3), 59\u201362 (1997)","journal-title":"Communications of the ACM"},{"key":"34_CR22","unstructured":"Turney, P.: Learning algorithms for keyphrase extraction. Information Retrieval (January 2000)"},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"Vanderwal, T.: Folksonomy (2007), http:\/\/www.vanderwal.net\/folksonomy.html","DOI":"10.1055\/s-2007-968259"},{"key":"34_CR24","volume-title":"Social Network Analysis: Methods and Applications (Structural Analysis in the Social Sciences)","author":"S. Wasserman","year":"1995","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications (Structural Analysis in the Social Sciences). Cambridge University Press, Cambridge (1995)"},{"key":"34_CR25","unstructured":"Witten, I.H., Paynter, G.W., Frank, E., Gutwin, C., Craig: Kea: Practical automatic keyphrase extraction. In: ACM DL, pp. 254\u2013255 (1999)"},{"key":"34_CR26","first-page":"283","volume-title":"CIKM 2005: Proceedings of the 14th ACM International Conference on Information and Knowledge Management","author":"Y.-F.B. Wu","year":"2005","unstructured":"Wu, Y.-F.B., Li, Q., Bot, R.S., Chen, X.: Domain-specific keyphrase extraction. In: CIKM 2005: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, pp. 283\u2013284. ACM Press, New York (2005)"},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"Zeng, H., Alhossaini, M., Ding, L., Fikes, R., McGuinness, D., et al.: Computing trust from revision history. In: Intl. Conf. on Privacy, Security and Trust (2006)","DOI":"10.21236\/ADA454704"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20511-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T15:10:44Z","timestamp":1741187444000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20511-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642205101","9783642205118"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20511-8_34","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2011]]}}}