{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:52:38Z","timestamp":1755838358813,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,2,15]],"date-time":"2014-02-15T00:00:00Z","timestamp":1392422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,2,15]]},"DOI":"10.1145\/2531602.2531733","type":"proceedings-article","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:23:08Z","timestamp":1391782988000},"page":"248-256","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Information extraction and manipulation threats in crowd-powered systems"],"prefix":"10.1145","author":[{"given":"Walter S.","family":"Lasecki","sequence":"first","affiliation":[{"name":"University of Rochester, Rochester, NY, USA"}]},{"given":"Jaime","family":"Teevan","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Ece","family":"Kamar","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,2,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047201"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866078"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866080"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433420"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.81"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2011-768"},{"key":"e_1_3_2_1_7_1","volume-title":"The Mechanical Turk Blog","author":"Featured","year":"2013","unstructured":"Featured requester : Discover how comScore benefits from mechanical Turk . The Mechanical Turk Blog , March 2013 . http:\/\/bit.ly\/Ye64Sb Featured requester: Discover how comScore benefits from mechanical Turk. The Mechanical Turk Blog, March 2013. http:\/\/bit.ly\/Ye64Sb"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.89"},{"key":"e_1_3_2_1_9_1","volume-title":"Combining human and machine learning intelligence in large-scale crowdsourcing: Principles, methods, and studies. MSR-TR-2012-58","author":"Kamar E.","year":"2012","unstructured":"Kamar , E. , Hacker , S. , Lintott , C. and Horvitz , E . Combining human and machine learning intelligence in large-scale crowdsourcing: Principles, methods, and studies. MSR-TR-2012-58 , 2012 . Kamar, E., Hacker, S., Lintott, C. and Horvitz, E. Combining human and machine learning intelligence in large-scale crowdsourcing: Principles, methods, and studies. MSR-TR-2012-58, 2012."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460572"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441923"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441922"},{"volume-title":"Proceedings of SIGIR 2010 Workshop on Crowdsourcing for Search Evaluation.","author":"Le J.","key":"e_1_3_2_1_13_1","unstructured":"Le , J. , Edmonds , A. , Hester , V. , and Biewald , L . Ensuring quality in crowdsourced search relevance evaluation . In Proceedings of SIGIR 2010 Workshop on Crowdsourcing for Search Evaluation. Le, J., Edmonds, A., Hester,V., and Biewald, L. Ensuring quality in crowdsourced search relevance evaluation. In Proceedings of SIGIR 2010 Workshop on Crowdsourcing for Search Evaluation."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866040"},{"volume-title":"Y-A. Human OCR. CHI 2011 Workshop on Crowdsourcing and Human Computation.","author":"Little G.","key":"e_1_3_2_1_15_1","unstructured":"Little , G. and Sun , Y-A. Human OCR. CHI 2011 Workshop on Crowdsourcing and Human Computation. Little, G. and Sun, Y-A. Human OCR. CHI 2011 Workshop on Crowdsourcing and Human Computation."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380122"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047200"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441912"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2513383.2517033"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501988.2502057"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of Collective Intelligence","author":"Lasecki W.S.","year":"2012","unstructured":"Lasecki , W.S. , White , S.C. , Murray , K.I. and Bigham , J.P . Crowd Memory: Learning in the collective . In Proceedings of Collective Intelligence 2012 . Lasecki, W.S., White, S.C., Murray, K.I. and Bigham, J.P. Crowd Memory: Learning in the collective. In Proceedings of Collective Intelligence 2012."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600150.1600175"},{"key":"e_1_3_2_1_23_1","volume-title":"http:\/\/collisiondetection.net","author":"Massively","year":"2006","unstructured":"Massively multiplayer pong. http:\/\/collisiondetection.net , 2006 . Massively multiplayer pong. http:\/\/collisiondetection.net, 2006."},{"key":"e_1_3_2_1_24_1","unstructured":"Menton C. and Singh P. Manipulation can be hard in tractable voting systems even for constant-sized coalitions. CoRR abs\/1108.4439.  Menton C. and Singh P. Manipulation can be hard in tractable voting systems even for constant-sized coalitions. CoRR abs\/1108.4439."},{"key":"e_1_3_2_1_25_1","volume-title":"HComp","author":"Sun Y-A","year":"2011","unstructured":"Sun , Y-A . Roy , S. and Little , G . Beyond independent agreement: A tournament selection approach for quality assurance of human computation tasks . In HComp 2011 . Sun, Y-A. Roy, S. and Little, G. Beyond independent agreement: A tournament selection approach for quality assurance of human computation tasks. In HComp 2011."},{"key":"e_1_3_2_1_26_1","volume-title":"LIDAP-WP4","author":"Sweeney L.","year":"2000","unstructured":"Sweeney , L. Uniqueness of simple demographics in the U.S. population . In LIDAP-WP4 , Carnegie Mellon University . 2000 . Sweeney, L. Uniqueness of simple demographics in the U.S. population. In LIDAP-WP4, Carnegie Mellon University. 2000."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979148"},{"key":"e_1_3_2_1_28_1","volume-title":"US interactive marketing forecast","author":"Van Boskrik S.","year":"2011","unstructured":"Van Boskrik , S. US interactive marketing forecast , 2011 to 2016. Forrester . August 2011. Van Boskrik, S. US interactive marketing forecast, 2011 to 2016. Forrester. August 2011."},{"key":"e_1_3_2_1_29_1","volume-title":"Games with a purpose. Comp. 39(6)","author":"Von Ahn L.","year":"2006","unstructured":"Von Ahn , L. Games with a purpose. Comp. 39(6) , 2006 . Von Ahn, L. Games with a purpose. Comp. 39(6), 2006."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of ACL-HLT","author":"Zaidan O.F.","year":"2011","unstructured":"Zaidan , O.F. and Callison-Burch , C . Crowdsourcing translation: professional quality from non-professionals . In Proceedings of ACL-HLT 2011 . Zaidan, O.F. and Callison-Burch, C. Crowdsourcing translation: professional quality from non-professionals. In Proceedings of ACL-HLT 2011."}],"event":{"name":"CSCW'14: Computer Supported Cooperative Work","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Baltimore Maryland USA","acronym":"CSCW'14"},"container-title":["Proceedings of the 17th ACM conference on Computer supported cooperative work &amp; social computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2531602.2531733","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2531602.2531733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:00Z","timestamp":1750234200000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2531602.2531733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,15]]},"references-count":30,"alternative-id":["10.1145\/2531602.2531733","10.1145\/2531602"],"URL":"https:\/\/doi.org\/10.1145\/2531602.2531733","relation":{},"subject":[],"published":{"date-parts":[[2014,2,15]]},"assertion":[{"value":"2014-02-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}