{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:38Z","timestamp":1750306838038,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,2,15]],"date-time":"2014-02-15T00:00:00Z","timestamp":1392422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,2,15]]},"DOI":"10.1145\/2531602.2531686","type":"proceedings-article","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:23:08Z","timestamp":1391782988000},"page":"956-966","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging the contributory potential of user feedback"],"prefix":"10.1145","author":[{"given":"Mikhil","family":"Masli","sequence":"first","affiliation":[{"name":"IBM, Armonk, NY, USA"}]},{"given":"Loren G.","family":"Terveen","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,2,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1025624"},{"key":"e_1_3_2_1_2_1","volume-title":"The wealth of networks: How social production transforms markets and freedom","author":"Benkler Y.","year":"2006","unstructured":"Benkler , Y. The wealth of networks: How social production transforms markets and freedom . Yale University Press , 2006 . Benkler, Y. The wealth of networks: How social production transforms markets and freedom. Yale University Press, 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099203.1099205"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-011-9108-6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216295.1216309"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642713"},{"key":"e_1_3_2_1_7_1","volume-title":"Cognitive-experiential self-theory of personality. Handbook of psychology","author":"Epstein S.","year":"2003","unstructured":"Epstein , S. Cognitive-experiential self-theory of personality. Handbook of psychology ( 2003 ). Epstein, S. Cognitive-experiential self-theory of personality. Handbook of psychology (2003)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.62.2.328"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Notes and practical considerations for researchers","volume":"31","author":"Fawcett T.","year":"2004","unstructured":"Fawcett , T. ROC graphs : Notes and practical considerations for researchers . Machine Learning 31 ( 2004 ), 1 -- 38 . Fawcett, T. ROC graphs: Notes and practical considerations for researchers. Machine Learning 31 (2004), 1--38.","journal-title":"Machine Learning"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441872"},{"key":"e_1_3_2_1_11_1","volume-title":"Motivation of software developers in open source projects: an internet-based survey of contributors to the linux kernel. Research policy 32, 7","author":"Hertel G.","year":"2003","unstructured":"Hertel , G. , Niedner , S. , and Herrmann , S . Motivation of software developers in open source projects: an internet-based survey of contributors to the linux kernel. Research policy 32, 7 ( 2003 ), 1159--1177. Hertel, G., Niedner, S., and Herrmann, S. Motivation of software developers in open source projects: an internet-based survey of contributors to the linux kernel. Research policy 32, 7 (2003), 1159--1177."},{"key":"e_1_3_2_1_12_1","volume-title":"Luring the lurkers, slashdot","author":"Katz J.","year":"1998","unstructured":"Katz , J. Luring the lurkers, slashdot , 1998 . Katz, J. Luring the lurkers, slashdot, 1998."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815355"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880071.1880073"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441955.2442008"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. ICWSM","author":"Masli M.","year":"2011","unstructured":"Masli , M. , Priedhorsky , R. , and Terveen , L . Task specialization in social production communities: The case of geographic volunteer work . Proc. ICWSM ( 2011 ). Masli, M., Priedhorsky, R., and Terveen, L. Task specialization in social production communities: The case of geographic volunteer work. Proc. ICWSM (2011)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208698"},{"key":"e_1_3_2_1_18_1","volume-title":"Issues in virtual ethnography. Ethnographic studies in real and virtual environments: Inhabited information spaces and connected communities","author":"Mason B.","year":"1999","unstructured":"Mason , B. Issues in virtual ethnography. Ethnographic studies in real and virtual environments: Inhabited information spaces and connected communities ( 1999 ), 61--69. Mason, B. Issues in virtual ethnography. Ethnographic studies in real and virtual environments: Inhabited information spaces and connected communities (1999), 61--69."},{"key":"e_1_3_2_1_19_1","first-page":"443","article-title":"Personalised route planning: A case-based approach","volume":"431","author":"McGinty L.","year":"2000","unstructured":"McGinty , L. , and Smyth , B . Personalised route planning: A case-based approach . In Advances in Case-Based Reasoning. Springer , 2000 , 431 -- 443 . McGinty, L., and Smyth, B. Personalised route planning: A case-based approach. In Advances in Case-Based Reasoning. Springer, 2000, 431--443.","journal-title":"Advances in Case-Based Reasoning. Springer"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/529793"},{"key":"e_1_3_2_1_21_1","volume-title":"Americas Conference on Information Systems","author":"Nonnecke B.","year":"2001","unstructured":"Nonnecke , B. , and Preece , J . Why lurkers lurk . In Americas Conference on Information Systems ( 2001 ), 1--10. Nonnecke, B., and Preece, J. Why lurkers lurk. In Americas Conference on Information Systems (2001), 1--10."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/962755.963094"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038558.2038587"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.17705\/1thci.00005"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1316624.1316663"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718931"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038558.2038570"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/301136.301193"},{"key":"e_1_3_2_1_29_1","volume-title":"Dual-process models in social and cognitive psychology: Conceptual integration and links to underlying memory systems. Personality and social psychology review 4, 2","author":"Smith E. R.","year":"2000","unstructured":"Smith , E. R. , and DeCoster , J. Dual-process models in social and cognitive psychology: Conceptual integration and links to underlying memory systems. Personality and social psychology review 4, 2 ( 2000 ), 108--131. Smith, E. R., and DeCoster, J. Dual-process models in social and cognitive psychology: Conceptual integration and links to underlying memory systems. Personality and social psychology review 4, 2 (2000), 108--131."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3141\/1828-13"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880071.1880097"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866079"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378704.1378719"},{"key":"e_1_3_2_1_34_1","volume-title":"DTIC Document","author":"Winston P. H.","year":"1970","unstructured":"Winston , P. H. Learning structural descriptions from examples. Tech. rep ., DTIC Document , 1970 . Winston, P. H. Learning structural descriptions from examples. Tech. rep., DTIC Document, 1970."},{"key":"e_1_3_2_1_35_1","volume-title":"Morgan Kaufmann","author":"Witten I. H.","year":"2005","unstructured":"Witten , I. H. , and Frank , E . Data Mining: Practical machine learning tools and techniques . Morgan Kaufmann , 2005 . Witten, I. H., and Frank, E. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, 2005."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409678"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/095281397147013"}],"event":{"name":"CSCW'14: Computer Supported Cooperative Work","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Baltimore Maryland USA","acronym":"CSCW'14"},"container-title":["Proceedings of the 17th ACM conference on Computer supported cooperative work &amp; social computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2531602.2531686","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2531602.2531686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:59Z","timestamp":1750234199000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2531602.2531686"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,15]]},"references-count":37,"alternative-id":["10.1145\/2531602.2531686","10.1145\/2531602"],"URL":"https:\/\/doi.org\/10.1145\/2531602.2531686","relation":{},"subject":[],"published":{"date-parts":[[2014,2,15]]},"assertion":[{"value":"2014-02-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}