{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T04:08:42Z","timestamp":1759205322981,"version":"3.41.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,2,1]],"date-time":"2008-02-01T00:00:00Z","timestamp":1201824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["___amp___num;IIS-0325464___amp___num;0714441"],"award-info":[{"award-number":["___amp___num;IIS-0325464___amp___num;0714441"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["___amp___num;IIS-0325464___amp___num;0714441"],"award-info":[{"award-number":["___amp___num;IIS-0325464___amp___num;0714441"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2008,2]]},"abstract":"<jats:p>In this article, we demonstrate the applicability of semantic techniques for detection of Conflict of Interest (COI). We explain the common challenges involved in building scalable Semantic Web applications, in particular those addressing connecting-the-dots problems. We describe in detail the challenges involved in two important aspects on building Semantic Web applications, namely, data acquisition and entity disambiguation (or reference reconciliation). We extend upon our previous work where we integrated the collaborative network of a subset of DBLP researchers with persons in a Friend-of-a-Friend social network (FOAF). Our method finds the connections between people, measures collaboration strength, and includes heuristics that use friendship\/affiliation information to provide an estimate of potential COI in a peer-review scenario. Evaluations are presented by measuring what could have been the COI between accepted papers in various conference tracks and their respective program committee members. The experimental results demonstrate that scalability can be achieved by using a dataset of over 3 million entities (all bibliographic data from DBLP and a large collection of FOAF documents).<\/jats:p>","DOI":"10.1145\/1326561.1326568","type":"journal-article","created":{"date-parts":[[2008,3,12]],"date-time":"2008-03-12T22:35:44Z","timestamp":1205361344000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection"],"prefix":"10.1145","volume":"2","author":[{"given":"Boanerges","family":"Aleman-Meza","sequence":"first","affiliation":[{"name":"University of Georgia, GA"}]},{"given":"Meenakshi","family":"Nagarajan","sequence":"additional","affiliation":[{"name":"Wright State University, OH"}]},{"given":"Li","family":"Ding","sequence":"additional","affiliation":[{"name":"Stanford University, CA"}]},{"given":"Amit","family":"Sheth","sequence":"additional","affiliation":[{"name":"Wright State University, OH"}]},{"given":"I. Budak","family":"Arpinar","sequence":"additional","affiliation":[{"name":"University of Georgia, GA"}]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, MD"}]},{"given":"Tim","family":"Finin","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, MD"}]}],"member":"320","published-online":{"date-parts":[[2008,3,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v8i6.1057"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.63"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135838"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.001"},{"volume-title":"Proceedings of the 1st International Workshop on Recent Advances in Intrusion Detection. Louvain-la-Neuve","author":"Anderson R.","key":"e_1_2_1_5_1","unstructured":"Anderson , R. and Khattak , A . 1998. The use of information retrieval techniques for intrusion detection . In Proceedings of the 1st International Workshop on Recent Advances in Intrusion Detection. Louvain-la-Neuve , Berlin, Germany. Anderson, R. and Khattak, A. 1998. The use of information retrieval techniques for intrusion detection. In Proceedings of the 1st International Workshop on Recent Advances in Intrusion Detection. Louvain-la-Neuve, Berlin, Germany."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775249"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242680"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11926078_24"},{"volume-title":"Linked---The New Science of Networks","author":"Barab\u00e1si A.-L.","key":"e_1_2_1_9_1","unstructured":"Barab\u00e1si , A.-L. 2002. Linked---The New Science of Networks . Perseus Publishing , Cambridge, MA . Barab\u00e1si, A.-L. 2002. Linked---The New Science of Networks. Perseus Publishing, Cambridge, MA."},{"volume-title":"Introduction to Structural Analysis: The Network Approach to Social Research","author":"Berkowitz S. D.","key":"e_1_2_1_10_1","unstructured":"Berkowitz , S. D. 1982. Introduction to Structural Analysis: The Network Approach to Social Research . Butterworth , Toronto, Canada . Berkowitz, S. D. 1982. Introduction to Structural Analysis: The Network Approach to Social Research. Butterworth, Toronto, Canada."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/309844.309897"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Bhattacharya I. and Getoor L. 2006. Entity resolution in graphs. In L. B. Holder and D. J. Cook Eds. Mining Graph Data. John Wiley &amp; Sons.  Bhattacharya I. and Getoor L. 2006. Entity resolution in graphs. In L. B. Holder and D. J. Cook Eds. Mining Graph Data. John Wiley &amp; Sons.","DOI":"10.1002\/9780470073049.ch13"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(98)00068-5"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/294469.294486"},{"volume-title":"Proceedings of the 27th International Conference on Very Large Data Bases","author":"Crescenzi V.","key":"e_1_2_1_15_1","unstructured":"Crescenzi , V. , Mecca , G. , and Merialdo , P . 2001. RoadRunner: Towards automatic data extraction from large Web sites . In Proceedings of the 27th International Conference on Very Large Data Bases . Rome, Italy. Crescenzi, V., Mecca, G., and Merialdo, P. 2001. RoadRunner: Towards automatic data extraction from large Web sites. In Proceedings of the 27th International Conference on Very Large Data Bases. Rome, Italy."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775178"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031171.1031289"},{"key":"e_1_2_1_18_1","first-page":"12","article-title":"Social networking on the semantic web","volume":"5","author":"Ding L.","year":"2005","unstructured":"Ding , L. , Finin , T. , Zhou , L. , and Joshi , A. 2005 a. Social networking on the semantic web . Learn. Orga. 5 , 12 . Ding, L., Finin, T., Zhou, L., and Joshi, A. 2005a. Social networking on the semantic web. Learn. Orga. 5, 12.","journal-title":"Learn. Orga."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.299"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066168"},{"key":"e_1_2_1_21_1","first-page":"1","article-title":"Studying online social networks","volume":"3","author":"Garton L.","year":"1997","unstructured":"Garton , L. , Haythornthwaite , C. , and Wellman , B. 1997 . Studying online social networks . J. Comput.-Mediated Comm. 3 , 1 . Garton, L., Haythornthwaite, C., and Wellman, B. 1997. Studying online social networks. J. Comput.-Mediated Comm. 3, 1.","journal-title":"J. Comput.-Mediated Comm."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775250"},{"key":"e_1_2_1_23_1","unstructured":"Hammond B. Sheth A. and Kochut K. 2002. Semantic enhancement engine: A modular document enhancement platform for semantic applications over heterogeneous content. In V. Kashyap and L. Shklar Eds. Real World Semantic Web Applications. Ios Press. Inc. 29--49.  Hammond B. Sheth A. and Kochut K. 2002. Semantic enhancement engine: A modular document enhancement platform for semantic applications over heterogeneous content. In V. Kashyap and L. Shklar Eds. Real World Semantic Web Applications. Ios Press. Inc. 29--49."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11926078_4"},{"key":"e_1_2_1_25_1","volume-title":"Ordinary: Finding Hidden Threats by Analyzing Unusual Behavior","author":"Hollywood J.","year":"2004","unstructured":"Hollywood , J. , Snyder , D. , Mckay , K. N. , and Boon , J. E . 2004 . Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual Behavior . RAND Corporation . Hollywood, J., Snyder, D., Mckay, K. N., and Boon, J. E. 2004. Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual Behavior. RAND Corporation."},{"volume-title":"Proceedings of the 1st International Semantic Web Conference","author":"Horrocks I.","key":"e_1_2_1_26_1","unstructured":"Horrocks , I. and Tessaris , S . 2002. Querying the semantic web: A formal approach . In Proceedings of the 1st International Semantic Web Conference . Sardinia, Italy. Horrocks, I. and Tessaris, S. 2002. Querying the semantic web: A formal approach. In Proceedings of the 1st International Semantic Web Conference. Sardinia, Italy."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11574620_32"},{"volume-title":"Proceedings of the 13th International Florida Artificial intelligence Research Society Conference. AAAI Press, 91--95","author":"Jonyer I.","key":"e_1_2_1_28_1","unstructured":"Jonyer , I. , Holder , L. B. , and Cook , D. J . 2000. Graph-based hierarchical conceptual clustering . In Proceedings of the 13th International Florida Artificial intelligence Research Society Conference. AAAI Press, 91--95 . Jonyer, I., Holder, L. B., and Cook, D. J. 2000. Graph-based hierarchical conceptual clustering. In Proceedings of the 13th International Florida Artificial intelligence Research Society Conference. AAAI Press, 91--95."},{"volume-title":"Proceedings of the SIAM Data Mining Conference.","author":"Kalashnikov D.","key":"e_1_2_1_29_1","unstructured":"Kalashnikov , D. , Mehrotra , S. , and Chen , Z . 2005. Exploiting relationships for domain-independent data cleaning . In Proceedings of the SIAM Data Mining Conference. Kalashnikov, D., Mehrotra, S., and Chen, Z. 2005. Exploiting relationships for domain-independent data cleaning. In Proceedings of the SIAM Data Mining Conference."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511524"},{"key":"e_1_2_1_31_1","first-page":"27","article-title":"The hidden web","volume":"18","author":"Kautz H.","year":"1997","unstructured":"Kautz , H. , Selman , B. , and Shah , M. 1997 . The hidden web . AI Mag. 18 , 2, 27 -- 36 . Kautz, H., Selman, B., and Shah, M. 1997. The hidden web. AI Mag. 18, 2, 27--36.","journal-title":"AI Mag."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72667-8_12"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/565117.565137"},{"key":"e_1_2_1_35_1","unstructured":"Laz T. Fisher K. Kostich M. and Atkinson M. 2004. Connecting the dots. Modern Drug Discovery 33--36.  Laz T. Fisher K. Kostich M. and Atkinson M. 2004. Connecting the dots. Modern Drug Discovery 33--36."},{"key":"e_1_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Lee Y. L. 2005. Apps make semantic web a reality. SD Times.  Lee Y. L. 2005. Apps make semantic web a reality. SD Times.","DOI":"10.1145\/1062745.1062915"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2005.05.006"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the Semantic Technology Conference","author":"Miller E.","year":"2005","unstructured":"Miller , E. 2005 . The Semantic Web is Here . In Proceedings of the Semantic Technology Conference 2005. San Francisco, CA. Miller, E. 2005. The Semantic Web is Here. In Proceedings of the Semantic Technology Conference 2005. San Francisco, CA."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/945721.945722"},{"volume-title":"Proceedings of the Text Mining and Link Analysis Workshop.","author":"Neville J.","key":"e_1_2_1_40_1","unstructured":"Neville , J. , Adler , M. , and Jensen , D . 2003. Clustering relational data using attribute and link information . In Proceedings of the Text Mining and Link Analysis Workshop. Neville, J., Adler, M., and Jensen, D. 2003. Clustering relational data using attribute and link information. In Proceedings of the Text Mining and Link Analysis Workshop."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.98.2.404"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.016132"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/11581062_78"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117454.1117462"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-29248-9_3"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the Dagstuhl Seminar: Semantic Interoperability and Integration. IBFI","author":"Sheth A. P.","year":"2005","unstructured":"Sheth , A. P. 2005 b. From semantic search &amp; integration to analytics . In Proceedings of the Dagstuhl Seminar: Semantic Interoperability and Integration. IBFI , Schloss Dagstuhl, Germany. Sheth, A. P. 2005b. From semantic search &amp; integration to analytics. In Proceedings of the Dagstuhl Seminar: Semantic Interoperability and Integration. IBFI, Schloss Dagstuhl, Germany."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2005010103"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1020330"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/792550.792556"},{"key":"e_1_2_1_50_1","unstructured":"Townley J. 2000. The streaming search engine that reads your mind. Streaming Media World.  Townley J. 2000. The streaming search engine that reads your mind. Streaming Media World."},{"key":"e_1_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Wasserman S. and Faust K. 1994. Social Network Analysis: Methods and Applications. Cambridge University Press Cambridge UK.  Wasserman S. and Faust K. 1994. Social Network Analysis: Methods and Applications. Cambridge University Press Cambridge UK.","DOI":"10.1017\/CBO9780511815478"},{"volume-title":"Social Structures: A Network Approach","author":"Wellman B.","key":"e_1_2_1_52_1","unstructured":"Wellman , B. 1998. Structural analysis: From method and metaphor to theory and substance . In B. Wellman and S. D. Berkowitz. Eds. Social Structures: A Network Approach . Cambridge University Press , Cambridge , 19--61. Wellman, B. 1998. Structural analysis: From method and metaphor to theory and substance. In B. Wellman and S. D. Berkowitz. Eds. Social Structures: A Network Approach. Cambridge University Press, Cambridge, 19--61."},{"volume-title":"The state of record linkage and current research problems. RR99\/03","author":"Winkler W. E.","key":"e_1_2_1_53_1","unstructured":"Winkler , W. E. 1999. The state of record linkage and current research problems. RR99\/03 , U.S. Census Bureau . Winkler, W. E. 1999. The state of record linkage and current research problems. RR99\/03, U.S. Census Bureau."},{"volume-title":"Proceedings of Intelligence and Security Informatics, 1st NSF\/NIJ Symposium, 232--248","author":"Xu J.","key":"e_1_2_1_54_1","unstructured":"Xu , J. and Chen , H . 2003. Untangling criminal networks: A case study . In Proceedings of Intelligence and Security Informatics, 1st NSF\/NIJ Symposium, 232--248 . Xu, J. and Chen, H. 2003. Untangling criminal networks: A case study. In Proceedings of Intelligence and Security Informatics, 1st NSF\/NIJ Symposium, 232--248."}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1326561.1326568","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1326561.1326568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:25Z","timestamp":1750254985000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1326561.1326568"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,2]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,2]]}},"alternative-id":["10.1145\/1326561.1326568"],"URL":"https:\/\/doi.org\/10.1145\/1326561.1326568","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"type":"print","value":"1559-1131"},{"type":"electronic","value":"1559-114X"}],"subject":[],"published":{"date-parts":[[2008,2]]},"assertion":[{"value":"2007-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2007-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}