{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:21:35Z","timestamp":1769746895242,"version":"3.49.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["W911NF1210043"],"award-info":[{"award-number":["W911NF1210043"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/tcss.2016.2563460","type":"journal-article","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T18:16:49Z","timestamp":1464373009000},"page":"23-31","source":"Crossref","is-referenced-by-count":12,"title":["Technology Futures From Passive Crowdsourcing"],"prefix":"10.1109","volume":"3","author":[{"given":"Erica","family":"Briscoe","sequence":"first","affiliation":[]},{"given":"Scott","family":"Appling","sequence":"additional","affiliation":[]},{"given":"Joel","family":"Schlosser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1457","article-title":"Non-negative matrix factorization with sparseness constraints","volume":"5","author":"hoyer","year":"2004","journal-title":"J Mach Learn Res"},{"key":"ref38","author":"bird","year":"2009","journal-title":"Natural Language Processing With Python"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4305-0_9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488006"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963246"},{"key":"ref30","first-page":"314","article-title":"Event detection using lexical chain","author":"sangeetha","year":"2010","journal-title":"Advances in Natural Language Processing"},{"key":"ref37","first-page":"47","article-title":"Evaluation of named entity extraction systems","volume":"41","author":"marrero","year":"2009","journal-title":"Adv Comput Linguistics Res Comput Sci"},{"key":"ref36","author":"mccallum","year":"2002","journal-title":"Mallet A machine learning for language toolkit"},{"key":"ref35","first-page":"61","article-title":"Accurate methods for the statistics of surprise and coincidence","volume":"19","author":"dunning","year":"1993","journal-title":"Comput Linguistics"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339704"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0040-1625(01)00157-3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.09.010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2006.04.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2013.10.004"},{"key":"ref13","article-title":"Technological forecasting&#x2014;A review","author":"firat","year":"2008"},{"key":"ref14","author":"shirky","year":"2008","journal-title":"Here Comes Everybody The Power of Organizing Without Organizations"},{"key":"ref15","author":"segaran","year":"2007","journal-title":"Programming Collective Intelligence Building Smart Web 2 0 Applications"},{"key":"ref16","first-page":"16","article-title":"Deriving disaster-related information from social media","author":"appling","year":"2014","journal-title":"Proc 1st KDD Workshop Learn Emergencies Social Inf KDD (KDD-LESI)"},{"key":"ref17","first-page":"1","author":"l\u00e9vy","year":"1997","journal-title":"Collective intelligence Mankind's emerging world in cyberspace"},{"key":"ref18","first-page":"1","article-title":"The rise of crowdsourcing","volume":"14","author":"howe","year":"2006","journal-title":"Wired Mag"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2011.07.005"},{"key":"ref28","author":"baraniuk","year":"2014","journal-title":"What Will the Internet Look Like in 2040?"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2005.09.001"},{"key":"ref27","author":"columbus","year":"2014","journal-title":"Mobile is Eating the World"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-4972(00)00040-7"},{"key":"ref6","author":"poulter","year":"2012","journal-title":"Do Smartphones Spell the End of the Digital Camera?"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1162\/089120101753342653"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF02797394"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/09500690305020"},{"key":"ref7","author":"dudley-nicholson","year":"2014","journal-title":"Samsung Launches Compact NX1 Camera as it Predicts the Death of the Digital SLR Camera"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6386(199810\/12)9:4<11::AID-CIR4>3.0.CO;2-V"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2307\/2982727"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-010-0244-2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357127"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(73)90033-9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v13i6.2159"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989331"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2307\/2340521"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1108\/TG-09-2013-0035"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1177\/1745691610393980"},{"key":"ref23","year":"2014","journal-title":"Scicast"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44848-9_32"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2012.10.026"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3115\/1572340.1572342"},{"key":"ref25","first-page":"21","article-title":"Good sources of weak signals: A global study of where futurists look for weak signals","volume":"12","author":"hiltunen","year":"2008","journal-title":"Journal of Futures Studies"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/7495039\/07480443.pdf?arnumber=7480443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:08:43Z","timestamp":1642003723000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7480443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":45,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2016.2563460","relation":{},"ISSN":["2329-924X"],"issn-type":[{"value":"2329-924X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3]]}}}