{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:36Z","timestamp":1750306296237,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2889160.2889225","type":"proceedings-article","created":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T12:27:23Z","timestamp":1463401643000},"page":"41-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Trustworthiness in enterprise crowdsourcing"],"prefix":"10.1145","author":[{"given":"Anurag","family":"Dwarakanath","sequence":"first","affiliation":[{"name":"Accenture Technology Labs, Bangalore, India"}]},{"given":"N. C.","family":"Shrikanth","sequence":"additional","affiliation":[{"name":"Accenture Technology Labs, Bangalore, India"}]},{"given":"Kumar","family":"Abhinav","sequence":"additional","affiliation":[{"name":"IIIT-Delhi, Delhi, India"}]},{"given":"Alex","family":"Kass","sequence":"additional","affiliation":[{"name":"Accenture Technology Labs, San Jose"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"S. Ackerman. www.wired.com\/2013\/04\/darpa-fang-winner. Accessed: 2015-10-06.  S. Ackerman. www.wired.com\/2013\/04\/darpa-fang-winner. Accessed: 2015-10-06."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.20"},{"key":"e_1_3_2_1_3_1","first-page":"16","volume-title":"Proceedings of the SIGIR 2009 Workshop on the Future of IR Evaluation","volume":"15","author":"Alonso O.","year":"2009","unstructured":"O. Alonso and S. Mizzaro . Can we get rid of trec assessors? using mechanical turk for relevance assessment . In Proceedings of the SIGIR 2009 Workshop on the Future of IR Evaluation , volume 15 , page 16 , 2009 . O. Alonso and S. Mizzaro. Can we get rid of trec assessors? using mechanical turk for relevance assessment. In Proceedings of the SIGIR 2009 Workshop on the Future of IR Evaluation, volume 15, page 16, 2009."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772694"},{"key":"e_1_3_2_1_5_1","unstructured":"M. Barbaro and T. J. Zeller. A face is exposed for aol searcher no. 4417749. www.nytimes.com\/2006\/08\/09\/technology\/09aol.html. Accessed: 2015-10-18.  M. Barbaro and T. J. Zeller. A face is exposed for aol searcher no. 4417749. www.nytimes.com\/2006\/08\/09\/technology\/09aol.html. Accessed: 2015-10-18."},{"key":"e_1_3_2_1_6_1","unstructured":"Blackduck. Open source code scanning. www.blackducksoftware.com\/compliance\/code-scanning. Accessed: 2015-10-23.  Blackduck. Open source code scanning. www.blackducksoftware.com\/compliance\/code-scanning. Accessed: 2015-10-23."},{"key":"e_1_3_2_1_7_1","unstructured":"Checkmarx. Identify & fix security vulnerabilities. www.checkmarx.com\/technology\/static-code-analysis-sca\/. Accessed: 2015-10-23.  Checkmarx. Identify & fix security vulnerabilities. www.checkmarx.com\/technology\/static-code-analysis-sca\/. Accessed: 2015-10-23."},{"key":"e_1_3_2_1_8_1","first-page":"26","volume-title":"CrowdSearch","author":"Difallah D. E.","year":"2012","unstructured":"D. E. Difallah , G. Demartini , and P. Cudr\u00e9-Mauroux . Mechanical cheat: Spamming schemes and adversarial techniques on crowdsourcing platforms . In CrowdSearch , pages 26 -- 30 , 2012 . D. E. Difallah, G. Demartini, and P. Cudr\u00e9-Mauroux. Mechanical cheat: Spamming schemes and adversarial techniques on crowdsourcing platforms. In CrowdSearch, pages 26--30, 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145355"},{"key":"e_1_3_2_1_10_1","first-page":"8","volume-title":"Proceedings of the Second International Workshop on CrowdSourcing in Software Engineering","author":"Dwarakanath A.","year":"2015","unstructured":"A. Dwarakanath , U. Chintala , S. N. C., G. Virdi , A. Kass , A. Chandran , S. Sengupta , and S. Paul . Crowdbuild: a methodology for enterprise software development using crowdsourcing . In Proceedings of the Second International Workshop on CrowdSourcing in Software Engineering , pages 8 -- 14 , 2015 . A. Dwarakanath, U. Chintala, S. N. C., G. Virdi, A. Kass, A. Chandran, S. Sengupta, and S. Paul. Crowdbuild: a methodology for enterprise software development using crowdsourcing. In Proceedings of the Second International Workshop on CrowdSourcing in Software Engineering, pages 8--14, 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-011-9181-9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935828"},{"key":"e_1_3_2_1_13_1","unstructured":"J. Fuller. http:\/\/yannigroth.com\/2012\/07\/09\/the-dangers-of-crowdsourcing-johann-fullers-post-\\on-harvard-business-manager\/. Accessed: 2015-10-18.  J. Fuller. http:\/\/yannigroth.com\/2012\/07\/09\/the-dangers-of-crowdsourcing-johann-fullers-post-\\on-harvard-business-manager\/. Accessed: 2015-10-18."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702443"},{"key":"e_1_3_2_1_15_1","unstructured":"M. Harris. How a lone hacker shredded the myth of crowdsourcing. https:\/\/medium.com\/backchannel\/how-a-lone-hacker-shredded-the-myth-of\/crowdsourcing-d9d0534f1731#.j1pr4nuao\/. Accessed: 2015-10-23.  M. Harris. How a lone hacker shredded the myth of crowdsourcing. https:\/\/medium.com\/backchannel\/how-a-lone-hacker-shredded-the-myth-of\/crowdsourcing-d9d0534f1731#.j1pr4nuao\/. Accessed: 2015-10-23."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41154-0_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-005-6825-4"},{"key":"e_1_3_2_1_18_1","unstructured":"P. Ipeirotis. Be a top mechanical turk worker: You need $5 and 5 minutes. www.behind-the-enemy-lines.com\/2010\/10\/be-top-mechanical-turk-worker-you-need.html. Accessed: 2015-10-23.  P. Ipeirotis. Be a top mechanical turk worker: You need $5 and 5 minutes. www.behind-the-enemy-lines.com\/2010\/10\/be-top-mechanical-turk-worker-you-need.html. Accessed: 2015-10-23."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357127"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433450"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818823"},{"issue":"2","key":"e_1_3_2_1_22_1","first-page":"34","article-title":"Understanding the risks","volume":"30","author":"Liberstein M. A.","year":"2012","unstructured":"M. A. Liberstein . Crowdsourcing : Understanding the risks . NYSBA Inside , 30 ( 2 ): 34 -- 38 , 2012 . M. A. Liberstein. Crowdsourcing: Understanding the risks. NYSBA Inside, 30(2):34--38, 2012.","journal-title":"NYSBA Inside"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809400.1809422"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888904000116"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544854"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401965"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1613715.1613751"},{"key":"e_1_3_2_1_28_1","unstructured":"SonarQube. www.sonarqube.org\/features\/. Accessed: 2015-10-23.  SonarQube. www.sonarqube.org\/features\/. Accessed: 2015-10-23."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4562953"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-014-0013-1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568249"},{"key":"e_1_3_2_1_32_1","unstructured":"TopCoder. www.topcoder.com. Accessed: 2015-10-06.  TopCoder. www.topcoder.com. Accessed: 2015-10-06."},{"key":"e_1_3_2_1_33_1","unstructured":"TopCoder. Algorithm competition rating system. https:\/\/community.topcoder.com\/tc?module=Static&d1=help&d2=ratings. Accessed: 2015-10-23.  TopCoder. Algorithm competition rating system. https:\/\/community.topcoder.com\/tc?module=Static&d1=help&d2=ratings. Accessed: 2015-10-23."},{"key":"e_1_3_2_1_34_1","unstructured":"TopCoder. Protecting intellectual property in open innovation and crowdsourcing - topcoder webinar series. www.youtube.com\/watch?v=BB9iaGbBpBI. Accessed: 2015-10-23.  TopCoder. Protecting intellectual property in open innovation and crowdsourcing - topcoder webinar series. www.youtube.com\/watch?v=BB9iaGbBpBI. Accessed: 2015-10-23."},{"key":"e_1_3_2_1_35_1","unstructured":"TopCoder. Topcoder api. docs.tcapi.apiary.io\/. Accessed: 2015-10-23.  TopCoder. Topcoder api. docs.tcapi.apiary.io\/. Accessed: 2015-10-23."},{"key":"e_1_3_2_1_36_1","unstructured":"Upwork. www.upwork.com. Accessed: 2015-10-06.  Upwork. www.upwork.com. Accessed: 2015-10-06."},{"key":"e_1_3_2_1_37_1","unstructured":"Upwork. Api reference. developers.upwork.com\/. Accessed: 2015-10-23.  Upwork. Api reference. developers.upwork.com\/. Accessed: 2015-10-23."},{"key":"e_1_3_2_1_38_1","unstructured":"P. Wagorn. The problems with crowdsourcing and how to fix them. www.ideaconnection.com\/blog\/2014\/04\/how-to-fix-crowdsourcing\/. Accessed: 2015-10-18.  P. Wagorn. The problems with crowdsourcing and how to fix them. www.ideaconnection.com\/blog\/2014\/04\/how-to-fix-crowdsourcing\/. Accessed: 2015-10-18."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.2011.14504801135"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2015.26"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2012.104"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"],"location":"Austin Texas","acronym":"ICSE '16"},"container-title":["Proceedings of the 38th International Conference on Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889225","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2889160.2889225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:12Z","timestamp":1750221552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889225"}},"subtitle":["a taxonomy &amp; evidence from data"],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":41,"alternative-id":["10.1145\/2889160.2889225","10.1145\/2889160"],"URL":"https:\/\/doi.org\/10.1145\/2889160.2889225","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}