{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T00:11:46Z","timestamp":1773360706860,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,7]],"date-time":"2013-10-07T00:00:00Z","timestamp":1381104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,7]]},"DOI":"10.1145\/2513456.2513470","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:09:20Z","timestamp":1380650960000},"page":"121-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Crowd computing"],"prefix":"10.1145","author":[{"given":"Kalpana","family":"Parshotam","sequence":"first","affiliation":[{"name":"University of Witwatersrand, Johannesburg, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2013,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2011.129"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13218-012-0233-0"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2010.58"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10955-012-0661-0"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Cooke N. and Gillam L. 2011. Clowns Crowds and Clouds: A Cross-Enterprise Approach to Detecting Information Leakage Without Leaking Information. In Cloud Computing for Enterprise Architectures Z. Mahmood and R. Hill Eds. Springer London 301--322. DOI= http:\/\/dx.doi.org\/10.1007\/978-1-4471-2236-4_16.  Cooke N. and Gillam L. 2011. Clowns Crowds and Clouds: A Cross-Enterprise Approach to Detecting Information Leakage Without Leaking Information. In Cloud Computing for Enterprise Architectures Z. Mahmood and R. Hill Eds. Springer London 301--322. DOI= http:\/\/dx.doi.org\/10.1007\/978-1-4471-2236-4_16.","DOI":"10.1007\/978-1-4471-2236-4_16"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education","author":"Dron J.","year":"2007"},{"key":"e_1_3_2_1_7_1","volume-title":"Geocentric Crowdsourcing and Smarter Cities: Enabling Urban Intelligence in Cities and Regions. In 1st Ubiquitous Crowdsourcing Workshop at UbiComp 2010 Citeseer.","author":"Erickson T.","year":"2010"},{"key":"e_1_3_2_1_8_1","volume-title":"Workshop on Crowdsourcing and Human Computation at CHI","author":"Erickson T.","year":"2011"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2012.122"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2012.6377831"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Gration D. and Miah S. J. 2012. Cloud Versus Clouds: Emergency Response Communications at Large Scale Festivals and Special Events--Innovative ICT Applications. In Emerging Informatics - Innovative Concepts and Applications S. J. Miah Ed. InTech.  Gration D. and Miah S. J. 2012. Cloud Versus Clouds: Emergency Response Communications at Large Scale Festivals and Special Events--Innovative ICT Applications. In Emerging Informatics - Innovative Concepts and Applications S. J. Miah Ed. InTech.","DOI":"10.5772\/38914"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.291294"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348549.1348557"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Hewett T. T. 1992. ACM SIGCHI Curricula for Human-Computer Interaction. ACM Special Interest Group on Computer-Human Interaction Curriculum Development Group.  Hewett T. T. 1992. ACM SIGCHI Curricula for Human-Computer Interaction. ACM Special Interest Group on Computer-Human Interaction Curriculum Development Group.","DOI":"10.1145\/2594128"},{"key":"e_1_3_2_1_15_1","unstructured":"Howe J. 2006. The Rise of Crowdsourcing Wired 14 6 (29 May 2013).  Howe J. 2006. The Rise of Crowdsourcing Wired 14 6 (29 May 2013)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328057.1328076"},{"key":"e_1_3_2_1_17_1","volume-title":"Business Processes for the Crowd Computer. In Business Process Management Workshops, M. Rosa and P. Soffer Eds. Springer Berlin Heidelberg, 256--267","author":"Kucherbaev P."},{"key":"e_1_3_2_1_18_1","volume-title":"Chorus: Letting the Crowd Speak with One Voice. Technical Report","author":"Lasecki W. S.","year":"2012"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260108"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2011.02.001"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197462"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-010-0446-7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMI.2002.1166962"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design","author":"Medeiros S. P. J.","year":"2012"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869086.1869095"},{"key":"e_1_3_2_1_26_1","unstructured":"Muhammadi J. and Rabiee H. R. 2013. Crowd computing: a survey. Under consideration for publication in Knowledge and Information Systems.  Muhammadi J. and Rabiee H. R. 2013. Crowd computing: a survey. Under consideration for publication in Knowledge and Information Systems."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851322.1851334"},{"key":"e_1_3_2_1_28_1","unstructured":"O'Reilly T. 2005. What Is Web 2.0 Design Patterns and Business Models for the Next Generation of Software.  O'Reilly T. 2005. What Is Web 2.0 Design Patterns and Business Models for the Next Generation of Software."},{"key":"e_1_3_2_1_29_1","volume-title":"Web Squared: Web 2.0 Five Years On","author":"O'Reilly T.","year":"2009"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01937"},{"key":"e_1_3_2_1_31_1","volume-title":"Language for Special Purposes: Perspectives for the New Millennium","author":"Pozzi M."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979148"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 12th Australasian User Interface Conference (Perth, Australia, January 17, 2011). AUIC 2011, Australian Computer Society.","author":"Roughton A."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093553"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the SBSC & CRIWG-VIII Simp&oacute;\u00f3sio Brasileiro de Sistemas Colaborativos","author":"Schneider D.","year":"2011"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design","author":"Schneider D.","year":"2012"},{"key":"e_1_3_2_1_37_1","unstructured":"von Ahn L. 2005. Human Computation Doctoral Thesis. Carnegie Mellon University   von Ahn L. 2005. Human Computation Doctoral Thesis. Carnegie Mellon University"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630023"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.41"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"}],"event":{"name":"SAICSIT '13: 2013 South African Institute for Computer Scientists and Information Technologists","location":"East London South Africa","acronym":"SAICSIT '13","sponsor":["Amazon Amazon.com","Rhodes Univ. Rhodes University","IBM IBM"]},"container-title":["Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513456.2513470","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2513456.2513470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:54Z","timestamp":1750231734000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513456.2513470"}},"subtitle":["a literature review and definition"],"short-title":[],"issued":{"date-parts":[[2013,10,7]]},"references-count":40,"alternative-id":["10.1145\/2513456.2513470","10.1145\/2513456"],"URL":"https:\/\/doi.org\/10.1145\/2513456.2513470","relation":{},"subject":[],"published":{"date-parts":[[2013,10,7]]},"assertion":[{"value":"2013-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}