{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:55:47Z","timestamp":1743130547916,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030161804"},{"type":"electronic","value":"9783030161811"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-16181-1_34","type":"book-chapter","created":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T13:02:29Z","timestamp":1553605349000},"page":"361-372","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Data Quality Mining"],"prefix":"10.1007","author":[{"given":"Alexandra","family":"Oliveira","sequence":"first","affiliation":[]},{"given":"Rita","family":"Gaio","sequence":"additional","affiliation":[]},{"given":"Pilar","family":"Baylina","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Rebelo","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds Paulo","family":"Reis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,27]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Balasingam, B., Mannaru, P., Sidoti, D., Pattipati, K., Willett, P., Pedrycz, W., Chen, S.-M. (eds.): Online anomaly detection in big data. In: The First Line of Defense Against Intruders Data Science and Big Data: An Environment of Computational Intelligence, pp. 83\u2013107. Springer International Publishing (2017)","DOI":"10.1007\/978-3-319-53474-9_4"},{"key":"34_CR2","unstructured":"Gliklich, R.E., Dreyer, N.A., Leavy, M.B. (eds.) Registries for Evaluating Patient Outcomes: A User\u2019s Guide, 3rd edn., 11 April 2014. Data Collection and Quality Assurance 2014"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Cai, L., Zhu, Y.: The challenges of data quality and data quality assessment in the big data era. Data Sci. J. 14 (2015)","DOI":"10.5334\/dsj-2015-002"},{"key":"34_CR4","first-page":"137","volume":"3","author":"AF Karr","year":"2006","unstructured":"Karr, A.F., Sanil, A.P., Banks, D.L.: Data quality: a statistical perspective statistical methodology. Elsevier 3, 137\u2013173 (2006)","journal-title":"Elsevier"},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v059.i10","volume":"59","author":"H Wickham","year":"2014","unstructured":"Wickham, H.: Tidy data. J. Stat. Softw. 59, 1\u201323 (2014). Foundation for Open Access Statistics","journal-title":"J. Stat. Softw."},{"key":"34_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/0471448354","volume-title":"Exploratory Data Mining and Data Cleaning","author":"T Dasu","year":"2003","unstructured":"Dasu, T., Johnson, T.: Exploratory Data Mining and Data Cleaning. Wiley, Hoboken (2003)"},{"key":"34_CR7","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1146\/annurev-statistics-060116-054114","volume":"4","author":"S Keller","year":"2017","unstructured":"Keller, S., Korkmaz, G., Orr, M., Schroeder, A., Shipp, S.: The evolution of data quality: understanding the transdisciplinary origins of data quality concepts and approaches. Ann. Rev. Stat. Appl. 4, 85\u2013108 (2017)","journal-title":"Ann. Rev. Stat. Appl."},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Laranjeiro, N.; Soydemir, S.N., Bernardino, J.: A survey on data quality: classifying poor data. In: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 179\u2013188 (2015)","DOI":"10.1109\/PRDC.2015.41"},{"key":"34_CR9","unstructured":"BARC (Business Application research Center) - a CXP Group Company, Data Quality and Master Data Management: How to Improve your data quality (2017)"},{"key":"34_CR10","unstructured":"EUROSTAT, Handbook on Data Validation in Eurostat -Practical Guide to Data Validation in EuroSttat (2010)"},{"key":"34_CR11","unstructured":"Azimaee, M., Smith, M., Lix, L., Burchill, C., Orr, J.: MCHP data quality framework. Manitoba Centre for Health Policy, University of Manitoba, Winnipeg (Manitoba) (2015)"},{"key":"34_CR12","first-page":"3","volume":"23","author":"E Rahm","year":"2000","unstructured":"Rahm, E., Do, H.H.: Data cleaning: problems and current approaches. IEEE Data Eng. Bull. 23, 3\u201313 (2000)","journal-title":"IEEE Data Eng. Bull."},{"key":"34_CR13","unstructured":"Hipp, J., Guntzer, U., Grimmer, U.: Data quality mining-making a virute of necessity. In: DMKD (2001)"},{"key":"34_CR14","unstructured":"De Jonge, E., van der Loo, M.: An introduction to data cleaning with R Heerlen, Statistics Netherlands (2013)"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Taleb, I., Dssouli, R., Serhani, M.A.: Big data pre-processing: a quality framework Big Data (BigData Congress). In: IEEE International Congress on 2015, pp. 191\u2013198 (2015)","DOI":"10.1109\/BigDataCongress.2015.35"},{"key":"34_CR16","unstructured":"ESS Task Force Peer Review, Quality Assurance Framework of the European Statistical System- Version 1.2, European Statistical System (2015)"},{"key":"34_CR17","first-page":"48","volume":"14","author":"J Barateiro","year":"2005","unstructured":"Barateiro, J., Galhardas, H.: A survey of data quality tools. Datenbank-Spektrum 14, 48 (2005)","journal-title":"Datenbank-Spektrum"},{"key":"34_CR18","unstructured":"van der Loo, M.: A formal typology of data validation functions (2015)"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Chalamalla, A., Ilyas, I.F., Ouzzani, M., Papotti, P.: Descriptive and prescriptive data cleaning. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, pp. 445\u2013456 (2014)","DOI":"10.1145\/2588555.2610520"},{"key":"34_CR20","unstructured":"Cong, G., Fan, W., Geerts, F., Jia, X., Ma, S.: Improving data quality: consistency and accuracy. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 315\u201332 (2007)"},{"key":"34_CR21","unstructured":"Zio, M., Fursova, N., Gelsema, T., Giebing, S., Guarnera, U., Petrauskiene, J., Kalben, Q., Scanu, M., Bosch, K., van der Loo, M., Walsdorfer, K.: Methodology for data validation 1.0. (2016)"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"van der loo, M.: Properties of validation rules. In: Methodology for Data Validation 1.0 (2016)","DOI":"10.1002\/9781118445112.stat08255"},{"key":"34_CR23","unstructured":"van der Loo, M.: Validation levels based on decomposition of metadata - Essnet Validat Foudation. In: Methodology for data validation 1.0 (2016)"},{"key":"34_CR24","unstructured":"Giessing, S., Walsdorfer, K.: Validation levels from a business prespective - Essnet Validat Foudation. In: Methodology for data validation 1.0 (2016)"},{"key":"34_CR25","first-page":"531","volume":"29","author":"WE Winkler","year":"2004","unstructured":"Winkler, W.E.: Inf. Syst. Methods for evaluating and creating data quality 29, 531\u2013550 (2004)","journal-title":"Methods for evaluating and creating data quality"},{"key":"34_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/9780470904848","volume-title":"Handbook of Statistical Data Editing and Imputation","author":"T Waal de","year":"2011","unstructured":"de Waal, T., Pannekoek, J., Scholtus, S.: Handbook of Statistical Data Editing and Imputation. Wiley, Hoboken (2011)"},{"key":"34_CR27","unstructured":"Osborne, J.W., Overbay, A.: The power of outliers (and why researchers should always check for them) Practical assessment, research and evaluation, vol. 9, pp. 1\u201312 (2004)"},{"key":"34_CR28","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1037\/1082-989X.7.2.147","volume":"7","author":"J Schafer","year":"2002","unstructured":"Schafer, J., Graham, J.: Missing data: our view of the state of the art. Psychol. Methods 7, 147 (2002)","journal-title":"Psychol. Methods"},{"key":"34_CR29","unstructured":"Dusetzina, S., Tyree, S., Meyer, A., Green, L., Carpenter, W.: Linking data for health services research: a framework and instructional guide. Agency for Healthcare Research and Quality (US), Rockville (MD) (2014)"},{"key":"34_CR30","first-page":"59","volume":"70","author":"B Forchhammerl","year":"2013","unstructured":"Forchhammerl, B., Papenbrockl, T., Steningl, T., Viehmeierl, S.: Duplicate detection on GPUs. HPI Future SOC Lab: Proc. 2011 70, 59 (2013)","journal-title":"HPI Future SOC Lab: Proc. 2011"},{"key":"34_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2007.250581","volume":"19","author":"AK Elmagarmid","year":"2007","unstructured":"Elmagarmid, A.K., Ipeirotis, P.G., Verykios, V.S.: Duplicate record detection: a survey. IEEE Trans. Knowl. Data Eng. 19, 1\u201316 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"34_CR32","doi-asserted-by":"crossref","unstructured":"Christen, P. Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection, Springer Science and Business Media (2012)","DOI":"10.1007\/978-3-642-31164-2"}],"container-title":["Advances in Intelligent Systems and Computing","New Knowledge in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16181-1_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T04:57:41Z","timestamp":1721105861000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-16181-1_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030161804","9783030161811"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16181-1_34","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"27 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST'19","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Galicia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}