{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:32:21Z","timestamp":1759937541424},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"European Community\u2019s H2020 Program","award":["654024","688364"],"award-info":[{"award-number":["654024","688364"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1140\/epjds\/s13688-016-0074-4","type":"journal-article","created":{"date-parts":[[2016,3,31]],"date-time":"2016-03-31T23:45:59Z","timestamp":1459467959000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Self-regulatory information sharing in participatory social sensing"],"prefix":"10.1140","volume":"5","author":[{"given":"Evangelos","family":"Pournaras","sequence":"first","affiliation":[]},{"given":"Jovan","family":"Nikolic","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"Vel\u00e1squez","sequence":"additional","affiliation":[]},{"given":"Marcello","family":"Trovati","sequence":"additional","affiliation":[]},{"given":"Nik","family":"Bessis","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Helbing","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,1]]},"reference":[{"issue":"2","key":"74_CR1","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s11036-013-0489-0","volume":"19","author":"M Chen","year":"2014","unstructured":"Chen M, Mao S, Liu Y (2014) Big data: a survey. Mob Netw Appl 19(2):171-209","journal-title":"Mob Netw Appl"},{"issue":"4","key":"74_CR2","doi-asserted-by":"crossref","first-page":"2280","DOI":"10.1109\/TII.2014.2332114","volume":"10","author":"E Pournaras","year":"2014","unstructured":"Pournaras E, Vasirani M, Kooij RE, Aberer K (2014) Decentralized planning of energy demand for the management of robustness and discomfort. IEEE Trans Ind Inform 10(4):2280-2289","journal-title":"IEEE Trans Ind Inform"},{"key":"74_CR3","unstructured":"Pournaras E (2013) Multi-level reconfigurable self-organization in overlay services. PhD thesis, Delft University of Technology"},{"issue":"6","key":"74_CR4","doi-asserted-by":"crossref","first-page":"1733","DOI":"10.1007\/s10618-014-0393-7","volume":"29","author":"S Hajian","year":"2015","unstructured":"Hajian S, Domingo-Ferrer J, Monreale A, Pedreschi D, Giannotti F (2015) Discrimination- and privacy-aware patterns. Data Min Knowl Discov 29(6):1733-1782","journal-title":"Data Min Knowl Discov"},{"key":"74_CR5","doi-asserted-by":"crossref","unstructured":"Pedreschi D, Ruggieri S, Turini F (2013) The discovery of discrimination. In: Discrimination and privacy in the information society. Springer, pp\u00a091-108","DOI":"10.1007\/978-3-642-30487-3_5"},{"key":"74_CR6","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1145\/1401890.1401959","volume-title":"Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201908)","author":"D Pedreschi","year":"2008","unstructured":"Pedreschi D, Ruggieri S, Turini F (2008) Discrimination-aware data mining. In: Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201908), pp\u00a0560-568"},{"key":"74_CR7","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1145\/2487575.2506179","volume-title":"Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201913)","author":"L Getoor","year":"2013","unstructured":"Getoor L, Machanavajjhala A (2013) Entity resolution for big data. In: Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201913). ACM, New York, p\u00a01527"},{"issue":"10","key":"74_CR8","doi-asserted-by":"crossref","first-page":"1040","DOI":"10.14778\/2336664.2336676","volume":"5","author":"X Liu","year":"2012","unstructured":"Liu X, Lu M, Ooi BC, Shen Y, Wu S, Zhang M (2012) CDAS: a crowdsourcing data analytics system. Proc VLDB Endow 5(10):1040-1051","journal-title":"Proc VLDB Endow"},{"key":"74_CR9","author":"D Christin","year":"2015","unstructured":"Christin D (2015) Privacy in mobile participatory sensing: current trends and future challenges. J Syst Softw. doi: 10.1016\/j.jss.2015.03.067","journal-title":"J Syst Softw"},{"issue":"11","key":"74_CR10","doi-asserted-by":"crossref","first-page":"1928","DOI":"10.1016\/j.jss.2011.06.073","volume":"84","author":"D Christin","year":"2011","unstructured":"Christin D, Reinhardt A, Kanhere SS, Hollick M (2011) A survey on privacy in mobile participatory sensing applications. J Syst Softw 84(11):1928-1946","journal-title":"J Syst Softw"},{"key":"74_CR11","first-page":"918","volume-title":"2013 IEEE 38th conference on local computer networks workshops (LCN workshops)","author":"D Christin","year":"2013","unstructured":"Christin D, Buchner C, Leibecke N (2013) What\u2019s the value of your privacy? Exploring factors that influence privacy-sensitive contributions to participatory sensing applications. In: 2013 IEEE 38th conference on local computer networks workshops (LCN workshops), pp\u00a0918-923"},{"key":"74_CR12","doi-asserted-by":"crossref","first-page":"1255","DOI":"10.1109\/ENERGYCON.2014.6850584","volume-title":"2014 IEEE international energy conference (ENERGYCON)","author":"E Pournaras","year":"2014","unstructured":"Pournaras E, Vasirani M, Kooij RE, Aberer K (2014) Measuring and controlling unfairness in decentralized planning of energy demand. In: 2014 IEEE international energy conference (ENERGYCON), pp\u00a01255-1262"},{"issue":"5-6","key":"74_CR13","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/S0895-7177(02)80019-X","volume":"35","author":"D Helbing","year":"2002","unstructured":"Helbing D, Hennecke A, Shvetsov V, Treiber M (2002) Micro- and macro-simulation of freeway traffic. Math Comput Model 35(5-6):517-547","journal-title":"Math Comput Model"},{"key":"74_CR14","doi-asserted-by":"crossref","unstructured":"Sun H, Florio VD, Gui N, Blondia C (2009) Promises and challenges of ambient assisted living systems. In: 2009. ITNG\u00a0\u201909. Sixth international conference on information technology: new generations. IEEE, pp\u00a01201-1207","DOI":"10.1109\/ITNG.2009.169"},{"issue":"9","key":"74_CR15","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1109\/PROC.1982.12425","volume":"70","author":"ET Jaynes","year":"1982","unstructured":"Jaynes ET (1982) On the rationale of maximum-entropy methods. Proc IEEE 70(9):939-952","journal-title":"Proc IEEE"},{"key":"74_CR16","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.1111\/1468-0262.00335","volume":"70","author":"AE Roth","year":"2002","unstructured":"Roth AE (2002) The economist as engineer: game theory, experimentation, and computation as tools for design economics. Econometrica 70:1341-1378","journal-title":"Econometrica"},{"key":"74_CR17","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1145\/2623330.2623705","volume-title":"Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining","author":"H Zhu","year":"2014","unstructured":"Zhu H, Xiong H, Ge Y, Chen E (2014) Mobile app recommendations with security and privacy awareness. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp\u00a0951-960"},{"key":"74_CR18","unstructured":"K\u00f6nings B (2015) User-centered awareness and control of privacy in Ubiquitous Computing. PhD thesis, Universit\u00e4t Ulm, Ulm"},{"key":"74_CR19","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/978-3-662-43826-8_7","volume-title":"Information security theory and practice. Securing the Internet of things","author":"D Christin","year":"2014","unstructured":"Christin D, Engelmann F, Hollick M (2014) Usable privacy for mobile sensing applications. In: Information security theory and practice. Securing the Internet of things. Lecture notes in computer science, vol\u00a08501. Springer, Berlin, pp\u00a092-107"},{"key":"74_CR20","first-page":"14:1","volume-title":"Proceedings of the 11th international conference on mobile and ubiquitous multimedia (MUM \u201912)","author":"D Christin","year":"2012","unstructured":"Christin D, Reinhardt A, Hollick M, Trumpold K (2012) Exploring user preferences for privacy interfaces in mobile sensing applications. In: Proceedings of the 11th international conference on mobile and ubiquitous multimedia (MUM \u201912). ACM, New York, pp\u00a014:1-14:10"},{"key":"74_CR21","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/AINA.2015.203","volume-title":"2015 IEEE 29th international conference on advanced information networking and applications (AINA)","author":"E Pournaras","year":"2015","unstructured":"Pournaras E, Moise I, Helbing D (2015) Privacy-preserving ubiquitous social mining via modular and compositional virtual sensors. In: 2015 IEEE 29th international conference on advanced information networking and applications (AINA), pp\u00a0332-338"},{"key":"74_CR22","first-page":"72","volume":"3","author":"AK Jain","year":"2012","unstructured":"Jain AK, Maheswari S (2012) Survey of recent clustering techniques in data mining. Int J Comput Sci Manag Res 3:72-78","journal-title":"Int J Comput Sci Manag Res"},{"key":"74_CR23","doi-asserted-by":"crossref","unstructured":"Froehlich J, Chen MY, Consolvo S, Harrison B, Landay JA (2007) MyExperience: a system for in situ tracing and capturing of user feedback on mobile phones. In: Proceedings of the 5th international conference on mobile systems, applications and services. ACM, pp\u00a057-70","DOI":"10.1145\/1247660.1247670"},{"issue":"2","key":"74_CR24","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"JY Tsai","year":"2011","unstructured":"Tsai JY, Egelman S, Cranor L, Acquisti A (2011) The effect of online privacy information on purchasing behavior: an experimental study. Inf Syst Res 22(2):254-268","journal-title":"Inf Syst Res"},{"key":"74_CR25","unstructured":"Sadeh N, Acquisti A, Breaux TD, Cranor LF, McDonalda AM, Reidenbergb JR, Smith NA, Liu F, Russellb C, Schaub F, Wilson S (2013) The usable privacy policy project: combining crowdsourcing, machine learning and natural language processing to semi-automatically answer those privacy questions users care about. Technical report CMU-ISR-13-119, Carnegie Mellon University"},{"key":"74_CR26","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/RE.2015.7320419","volume-title":"2015 IEEE 23rd international requirements engineering conference (RE)","author":"TD Breaux","year":"2015","unstructured":"Breaux TD, Smullen D, Hibshi H (2015) Detecting repurposing and over-collection in multi-party privacy requirements specifications. In: 2015 IEEE 23rd international requirements engineering conference (RE). IEEE, New York, pp\u00a0166-175"},{"key":"74_CR27","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1145\/2370216.2370290","volume-title":"Proceedings of the 2012 ACM conference on ubiquitous computing","author":"J Lin","year":"2012","unstructured":"Lin J, Amini S, Hong JI, Sadeh N, Lindqvist J, Zhang J (2012) Expectation and purpose: understanding users\u2019 mental models of mobile app privacy through crowdsourcing. In: Proceedings of the 2012 ACM conference on ubiquitous computing. ACM, New York, pp\u00a0501-510"},{"key":"74_CR28","doi-asserted-by":"crossref","unstructured":"Ravichandran R, Benisch M, Kelley PG, Sadeh NM (2009) Capturing social networking privacy preferences. In: Privacy enhancing technologies. Springer, pp\u00a01-18","DOI":"10.1007\/978-3-642-03168-7_1"},{"key":"74_CR29","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/RELAW.2015.7330207","volume-title":"2015 IEEE eighth international workshop on requirements engineering and law (RELAW)","author":"J Bhatia","year":"2015","unstructured":"Bhatia J, Breaux TD (2015) Towards an information type lexicon for privacy policies. In: 2015 IEEE eighth international workshop on requirements engineering and law (RELAW). IEEE, New York, pp\u00a019-24"},{"issue":"11","key":"74_CR30","doi-asserted-by":"crossref","first-page":"1266","DOI":"10.1016\/j.comcom.2009.08.012","volume":"33","author":"KL Huang","year":"2010","unstructured":"Huang KL, Kanhere SS, Hu W (2010) Preserving privacy in participatory sensing systems. Comput Commun 33(11):1266-1280","journal-title":"Comput Commun"},{"key":"74_CR31","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1145\/1460412.1460440","volume-title":"Proceedings of the 6th ACM conference on embedded network sensor systems (SenSys \u201908)","author":"RK Ganti","year":"2008","unstructured":"Ganti RK, Pham N, Tsai Y, Abdelzaher TF (2008) PoolView: stream privacy for grassroots participatory sensing. In: Proceedings of the 6th ACM conference on embedded network sensor systems (SenSys \u201908). ACM, New York, pp\u00a0281-294"},{"key":"74_CR32","first-page":"10","volume-title":"Proceedings of the 2012 IEEE 37th conference on local computer networks (LCN 2012)","author":"KL Huang","year":"2012","unstructured":"Huang KL, Kanhere SS, Hu W (2012) A privacy-preserving reputation system for participatory sensing. In: Proceedings of the 2012 IEEE 37th conference on local computer networks (LCN 2012). IEEE Comput. Soc., Washington, pp\u00a010-18"},{"issue":"2","key":"74_CR33","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.finmar.2004.11.001","volume":"8","author":"B Biais","year":"2005","unstructured":"Biais B, Glosten L, Spatt C (2005) Market microstructure: a survey of microfoundations, empirical results, and policy implications. J Financ Mark 8(2):217-264","journal-title":"J Financ Mark"},{"key":"74_CR34","series-title":"International series in operations research and management science","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/978-1-4020-7953-5_9","volume-title":"Handbook of quantitative supply chain analysis","author":"LMA Chan","year":"2004","unstructured":"Chan LMA, Shen ZJ, Simchi-Levi D, Swann J (2004) Coordination of pricing and inventory decisions: a survey and classification. In: Simchi-Levi D, Wu SD, Shen Z (eds) Handbook of quantitative supply chain analysis. International series in operations research and management science, vol\u00a074. Springer, Berlin, pp\u00a0335-392"},{"key":"74_CR35","doi-asserted-by":"crossref","first-page":"2168","DOI":"10.1109\/PESS.2000.866982","volume-title":"2000 IEEE power engineering society summer meeting","author":"AK David","year":"2000","unstructured":"David AK, Wen F (2000) Strategic bidding in competitive electricity markets: a literature survey. In: 2000 IEEE power engineering society summer meeting, vol\u00a04, pp\u00a02168-2173"},{"issue":"3","key":"74_CR36","doi-asserted-by":"crossref","first-page":"1040","DOI":"10.1109\/TIFS.2012.2189568","volume":"7","author":"S Roy","year":"2012","unstructured":"Roy S, Conti M, Setia S, Jajodia S (2012) Secure data aggregation in wireless sensor networks. IEEE Trans Inf Forensics Secur 7(3):1040-1052","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"74_CR37","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-1-4614-3223-4_3","volume-title":"Mining text data","author":"A Nenkova","year":"2012","unstructured":"Nenkova A, McKeown K (2012) A survey of text summarization techniques. In: Mining text data. Springer, Berlin, pp\u00a043-76"},{"issue":"1","key":"74_CR38","doi-asserted-by":"crossref","DOI":"10.1186\/2194-3206-1-19","volume":"1","author":"E Pournaras","year":"2013","unstructured":"Pournaras E, Warnier M, Brazier FM (2013) A generic and adaptive aggregation service for large-scale decentralized networks. Complex Adapt Syst Model 1(1):19","journal-title":"Complex Adapt Syst Model"},{"key":"74_CR39","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/PerCom.2013.6526720","volume-title":"Proceedings of the 2013 IEEE international conference on pervasive computing and communications (PerCom)","author":"I Boutsis","year":"2013","unstructured":"Boutsis I, Kalogeraki V (2013) Privacy preservation for participatory sensing data. In: Proceedings of the 2013 IEEE international conference on pervasive computing and communications (PerCom). IEEE, New York, pp\u00a0103-113"},{"key":"74_CR40","series-title":"OpenAccess series in informatics (OASIcs)","first-page":"176","volume-title":"17th GI\/ITG conference on communication in distributed systems (KiVS 2011)","author":"M D\u00fcrr","year":"2011","unstructured":"D\u00fcrr M, Wiesner K (2011) A privacy-preserving social P2P infrastructure for people-centric sensing. In: Luttenberger N, Peters H (eds) 17th GI\/ITG conference on communication in distributed systems (KiVS 2011). OpenAccess series in informatics (OASIcs), vol\u00a017. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Dagstuhl, pp\u00a0176-181"},{"key":"74_CR41","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1038\/527033a","volume":"527","author":"D Helbing","year":"2015","unstructured":"Helbing D, Pournaras E (2015) Build digital democracy. Nature 527:33-34","journal-title":"Nature"}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-016-0074-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-016-0074-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-016-0074-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T21:11:11Z","timestamp":1655413871000},"score":1,"resource":{"primary":{"URL":"http:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-016-0074-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,1]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["74"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-016-0074-4","relation":{},"ISSN":["2193-1127"],"issn-type":[{"value":"2193-1127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,1]]},"article-number":"14"}}