{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:27Z","timestamp":1750306527328,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,27]],"date-time":"2014-10-27T00:00:00Z","timestamp":1414368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,27]]},"DOI":"10.1145\/2691195.2691208","type":"proceedings-article","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T14:15:23Z","timestamp":1425392123000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Crowdsourcing collection of data for crisis governance in the post-2015 world"],"prefix":"10.1145","author":[{"given":"Buddhadeb","family":"Halder","sequence":"first","affiliation":[{"name":"Tilburg University, Tilburg, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2014,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-012-9121-2"},{"key":"e_1_3_2_1_2_1","unstructured":"Bloome D Sheridan D Street BV (1993) Reading mass-observation writing. University of Sussex Library Brighton.  Bloome D Sheridan D Street BV (1993) Reading mass-observation writing. University of Sussex Library Brighton."},{"volume-title":"Washington DC 20433","author":"Bott M.","key":"e_1_3_2_1_3_1"},{"volume-title":"DC 20005","year":"2013","author":"Brabham D C","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"Branigan T. 2011. China boosts internet surveillance. Available at http:\/\/bit.ly\/1lCnU2T  Branigan T. 2011. China boosts internet surveillance. Available at http:\/\/bit.ly\/1lCnU2T"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-0015-1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ips018"},{"key":"e_1_3_2_1_8_1","unstructured":"Clift S. 2003. \"E-Democracy E-Governance and Public NetWork.\" Publicus September. http:\/\/www.publicus.net  Clift S. 2003. \"E-Democracy E-Governance and Public NetWork.\" Publicus September. http:\/\/www.publicus.net"},{"key":"e_1_3_2_1_9_1","series-title":"Edward Elgar 2014","volume-title":"Internet: The Draft Data Protection Regulation. Forthcoming in Savin, A., Trzaskowski, J., (eds) Research Handbook on EU Internet Law","author":"Cuijpers C.","year":"2014"},{"key":"e_1_3_2_1_10_1","unstructured":"Cushing T. 2014. Los Angeles Law Enforcement Looking To Crowdsource Surveillance (Mis)Uses of Technology. Published at http:\/\/bit.ly\/S4d6wE accessed on 12\/05\/14  Cushing T. 2014. Los Angeles Law Enforcement Looking To Crowdsource Surveillance (Mis)Uses of Technology. Published at http:\/\/bit.ly\/S4d6wE accessed on 12\/05\/14"},{"key":"e_1_3_2_1_11_1","unstructured":"Dharmakumar R. 2013. India's Internet Privacy Woes. Available at http:\/\/bit.ly\/1qfRIlM accessed on 12\/05\/2014.  Dharmakumar R. 2013. India's Internet Privacy Woes. Available at http:\/\/bit.ly\/1qfRIlM accessed on 12\/05\/2014."},{"key":"e_1_3_2_1_12_1","unstructured":"Fact Sheet EC. 2012. Why do we need an EU data protection reform' in Factsheets on data protection reform. Available http:\/\/bit.ly\/1pXq1hM accessed on 14\/05\/2014.  Fact Sheet EC. 2012. Why do we need an EU data protection reform' in Factsheets on data protection reform. Available http:\/\/bit.ly\/1pXq1hM accessed on 14\/05\/2014."},{"key":"e_1_3_2_1_13_1","unstructured":"Farrier C. 2010. Internet Eyes Citizen Spy Game -- The New Stasi? Available at http:\/\/bit.ly\/1gGVvpM  Farrier C. 2010. Internet Eyes Citizen Spy Game -- The New Stasi? Available at http:\/\/bit.ly\/1gGVvpM"},{"key":"e_1_3_2_1_14_1","unstructured":"George S. 2011. Key Deployment Report -- March 2011. Ushahidi 1100 North Glebe Rd. 22201 http:\/\/ushahidi.com  George S. 2011. Key Deployment Report -- March 2011. Ushahidi 1100 North Glebe Rd. 22201 http:\/\/ushahidi.com"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858948.1858955"},{"key":"e_1_3_2_1_16_1","unstructured":"Halder B. 2013. Mobile-based Crowdsourcing Platform for Post-2015 Governance: Possibilities for Developing Countries available at http:\/\/bit.ly\/1vzmwRE  Halder B. 2013. Mobile-based Crowdsourcing Platform for Post-2015 Governance: Possibilities for Developing Countries available at http:\/\/bit.ly\/1vzmwRE"},{"key":"e_1_3_2_1_17_1","unstructured":"Howe J.: The Rise of Crowdsourcing accessed on 20\/10\/13 from http:\/\/wrd.cm\/1rH4vjv  Howe J.: The Rise of Crowdsourcing accessed on 20\/10\/13 from http:\/\/wrd.cm\/1rH4vjv"},{"key":"e_1_3_2_1_18_1","unstructured":"Jain B. 2011. 8 736 phone and e-mail accounts tapped by different government agencies in July. Available at: http:\/\/bit.ly\/1lCo8qw  Jain B. 2011. 8 736 phone and e-mail accounts tapped by different government agencies in July. Available at: http:\/\/bit.ly\/1lCo8qw"},{"key":"e_1_3_2_1_19_1","unstructured":"Jeffery S. 2011 Ushahidi: crowdmapping collective that exposed Kenyan election killings. Available from: http:\/\/bit.ly\/1vXT7Ot accessed on 21\/11\/2012  Jeffery S. 2011 Ushahidi: crowdmapping collective that exposed Kenyan election killings. Available from: http:\/\/bit.ly\/1vXT7Ot accessed on 21\/11\/2012"},{"volume-title":"The Huffington Post. Retrieved on","year":"2013","author":"Johnson L.","key":"e_1_3_2_1_20_1"},{"volume-title":"How Congress Unknowingly Legalized PRISM in 2007","year":"2013","author":"Lee T. B.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"Linklaters. 2013. China -- Progress towards national privacy regulation in Technology Media & Telecommunications News. pp 10--14. Available at http:\/\/bit.ly\/1lCoiym  Linklaters. 2013. China -- Progress towards national privacy regulation in Technology Media & Telecommunications News. pp 10--14. Available at http:\/\/bit.ly\/1lCoiym"},{"volume-title":"Proceedings of the 6th international ISCRAM conference","year":"2009","author":"Liu S.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"Mason P. 2007. Kenya in crisis BBC News Report accessed on 12\/05\/2014 from http:\/\/bbc.in\/1tle73o  Mason P. 2007. Kenya in crisis BBC News Report accessed on 12\/05\/2014 from http:\/\/bbc.in\/1tle73o"},{"key":"e_1_3_2_1_25_1","unstructured":"Meier P. 2013. Data Protection Protocols for Crisis Mapping available at http:\/\/bit.ly\/1u11vfN  Meier P. 2013. Data Protection Protocols for Crisis Mapping available at http:\/\/bit.ly\/1u11vfN"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"OECD\/International Telecommunication Union (2011) M-Government: Mobile Technologies for Responsive Governments and Connected Societies p 36 OECD Publishing. http:\/\/dx.doi.org\/10.1787\/9789264118706-en  OECD\/International Telecommunication Union (2011) M-Government: Mobile Technologies for Responsive Governments and Connected Societies p 36 OECD Publishing. http:\/\/dx.doi.org\/10.1787\/9789264118706-en","DOI":"10.1787\/9789264118706-en"},{"key":"e_1_3_2_1_27_1","unstructured":"Paul McCormack and Kate Lucente . 2014. Data Protection Laws of World Handbook. DLA Piper London. http:\/\/bit.ly\/VXjIP4  Paul McCormack and Kate Lucente . 2014. Data Protection Laws of World Handbook. DLA Piper London. http:\/\/bit.ly\/VXjIP4"},{"key":"e_1_3_2_1_28_1","unstructured":"Poblet M. (ed.) 2011. Mobile Technologies for Conflict Management: Online Dispute Resolution Governance Participation Law Governance and Technology Series 2 DOI 10.1007\/978-94-007-1384-0_4 \u00a9 Springer Science+Business Media B. V. 2011   Poblet M. (ed.) 2011. Mobile Technologies for Conflict Management: Online Dispute Resolution Governance Participation Law Governance and Technology Series 2 DOI 10.1007\/978-94-007-1384-0_4 \u00a9 Springer Science+Business Media B. V. 2011"},{"volume-title":"Chapter: II. Surveillance policy in 'Country Report-China' under the 'Privacy in the Developing World'.","year":"2012","author":"Privacy International","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","unstructured":"Qinglian H. 2006. The Hijacked Potential of China's Internet in China's Right's Forum. Special Book Review. pp 33--35.  Qinglian H. 2006. The Hijacked Potential of China's Internet in China's Right's Forum. Special Book Review. pp 33--35."},{"key":"e_1_3_2_1_31_1","unstructured":"Roberts A. 2014. A true sea shanty: the story behind the Longitude prize. Accessed on 19\/05\/2014 from http:\/\/bit.ly\/1ndqO9m  Roberts A. 2014. A true sea shanty: the story behind the Longitude prize. Accessed on 19\/05\/2014 from http:\/\/bit.ly\/1ndqO9m"},{"key":"e_1_3_2_1_32_1","unstructured":"Shirky C. 2008. Here Comes Everybody: The Power of Organizing without Organizations. New York: Penguin Press.  Shirky C. 2008. Here Comes Everybody: The Power of Organizing without Organizations. New York: Penguin Press."},{"key":"e_1_3_2_1_33_1","unstructured":"Singh S. 2013. Govt. violates privacy safeguards to secretly monitor Internet traffic. Available at http:\/\/bit.ly\/1tleESR  Singh S. 2013. Govt. violates privacy safeguards to secretly monitor Internet traffic. Available at http:\/\/bit.ly\/1tleESR"},{"key":"e_1_3_2_1_34_1","unstructured":"South African Government. 2002. Electronic Communications and Transactions Act 2002 No. 25 of 2002 {Online}. Accessed on 25\/05\/2014 and available from: http:\/\/www.internet.org.za\/ect_act.html  South African Government. 2002. Electronic Communications and Transactions Act 2002 No. 25 of 2002 {Online}. Accessed on 25\/05\/2014 and available from: http:\/\/www.internet.org.za\/ect_act.html"},{"key":"e_1_3_2_1_35_1","unstructured":"Spellman J. 2010. Heading off disaster one tweet at a time. http:\/\/bit.ly\/1tleESR Turner Broadcasting System Inc.  Spellman J. 2010. Heading off disaster one tweet at a time. http:\/\/bit.ly\/1tleESR Turner Broadcasting System Inc."},{"key":"e_1_3_2_1_36_1","unstructured":"The Economic Times. 2013. Action to be taken in 'phone tapping' during BJP rule: Virbhadra Singh. Available at: http:\/\/bit.ly\/1ovmH7W  The Economic Times. 2013. Action to be taken in 'phone tapping' during BJP rule: Virbhadra Singh. Available at: http:\/\/bit.ly\/1ovmH7W"},{"key":"e_1_3_2_1_37_1","unstructured":"Verma J. S. 2013. Report of the Commmittee on Amendments to Criminal Law. Available at http:\/\/bit.ly\/1wVi7df  Verma J. S. 2013. Report of the Commmittee on Amendments to Criminal Law. Available at http:\/\/bit.ly\/1wVi7df"},{"key":"e_1_3_2_1_38_1","unstructured":"Walton G. 2001. China's Golden Shield: Corporations and the Development of Surveillance Technology in the People's Republic of China 9 (Rights and Democracy 2001). Available at http:\/\/www.totse.com\/en\/privacy\/pucc.html  Walton G. 2001. China's Golden Shield: Corporations and the Development of Surveillance Technology in the People's Republic of China 9 (Rights and Democracy 2001). Available at http:\/\/www.totse.com\/en\/privacy\/pucc.html"},{"key":"#cr-split#-e_1_3_2_1_39_1.1","unstructured":"Wepster S. A. 2010. Between Theory and Observations; pp 34--37. ISBN 978-1-4419-1313-5; DOI: 10.1007\/978-14419-1314-2; Springer New York Dordrecht Heidelberg London. 10.1007\/978-14419-1314-2;"},{"key":"#cr-split#-e_1_3_2_1_39_1.2","unstructured":"Wepster S. A. 2010. Between Theory and Observations; pp 34--37. ISBN 978-1-4419-1313-5; DOI: 10.1007\/978-14419-1314-2; Springer New York Dordrecht Heidelberg London."},{"key":"e_1_3_2_1_40_1","unstructured":"Young. C. 2014. HarassMap: Using Crowdsourced Data to Map Sexual Harassment in Egypt. Available at http:\/\/bit.ly\/1qfTd39  Young. C. 2014. HarassMap: Using Crowdsourced Data to Map Sexual Harassment in Egypt. Available at http:\/\/bit.ly\/1qfTd39"},{"volume-title":"Brazil: Brazil Is Passing Legislation Aimed At Guaranteeing The Protection And Privacy Of Internet Users. Accessed on 21\/05\/2012 and","year":"2014","author":"Zimmermann D.","key":"e_1_3_2_1_41_1"},{"key":"#cr-split#-e_1_3_2_1_42_1.1","doi-asserted-by":"crossref","unstructured":"Zittoun T. Alex G. Flora C. and Aveling E. 2008. Using Social Knowledge: A Case Study of a Diarist's Meaning Making During World War II 163--179. DOI: 10.1007\/978-4-431-74680-5_10 10.1007\/978-4-431-74680-5_10","DOI":"10.1007\/978-4-431-74680-5_10"},{"key":"#cr-split#-e_1_3_2_1_42_1.2","doi-asserted-by":"crossref","unstructured":"Zittoun T. Alex G. Flora C. and Aveling E. 2008. Using Social Knowledge: A Case Study of a Diarist's Meaning Making During World War II 163--179. DOI: 10.1007\/978-4-431-74680-5_10","DOI":"10.1007\/978-4-431-74680-5_10"}],"event":{"name":"ICEGOV2014: 8th International Conference on Theory and Practice of Electronic Governance","sponsor":["Macao Foundation, Macao SAR Govt Macao Foundation, Macao SAR Government","Municipio de Guimar\u00e3es Municipio de Guimar\u00e3es"],"location":"Guimaraes Portugal","acronym":"ICEGOV2014"},"container-title":["Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2691195.2691208","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2691195.2691208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:07Z","timestamp":1750227127000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2691195.2691208"}},"subtitle":["potential offers and crucial challenges"],"short-title":[],"issued":{"date-parts":[[2014,10,27]]},"references-count":44,"alternative-id":["10.1145\/2691195.2691208","10.1145\/2691195"],"URL":"https:\/\/doi.org\/10.1145\/2691195.2691208","relation":{},"subject":[],"published":{"date-parts":[[2014,10,27]]},"assertion":[{"value":"2014-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}