{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:59Z","timestamp":1750221119329,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T00:00:00Z","timestamp":1546560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"USAID","award":["AID-OAA-A-13-00002"],"award-info":[{"award-number":["AID-OAA-A-13-00002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,4]]},"DOI":"10.1145\/3287098.3287101","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T18:42:31Z","timestamp":1547059351000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["The open incentive kit (OINK)"],"prefix":"10.1145","author":[{"given":"Noah","family":"Klugman","sequence":"first","affiliation":[{"name":"University of California, Berkeley"}]},{"given":"Santiago","family":"Correa","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst"}]},{"given":"Pat","family":"Pannuto","sequence":"additional","affiliation":[{"name":"University of California, Berkeley"}]},{"given":"Matthew","family":"Podolsky","sequence":"additional","affiliation":[{"name":"University of California, Berkeley"}]},{"given":"Jay","family":"Taneja","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst"}]},{"given":"Prabal","family":"Dutta","sequence":"additional","affiliation":[{"name":"University of California, Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2019,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon. 2018. Amazon Mechanical Turk. https:\/\/www.mturk.com\/. (2018). (Accessed on 07\/22\/2018).  Amazon. 2018. Amazon Mechanical Turk. https:\/\/www.mturk.com\/. (2018). (Accessed on 07\/22\/2018)."},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon. 2018. AWS Lambda - Serverless Compute - Amazon Web Services. https:\/\/aws.amazon.com\/lambda\/. (2018). (Accessed on 02\/28\/2018).  Amazon. 2018. AWS Lambda - Serverless Compute - Amazon Web Services. https:\/\/aws.amazon.com\/lambda\/. (2018). (Accessed on 02\/28\/2018)."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2018. AWS Mobile. https:\/\/aws.amazon.com\/mobile\/. (2018). (Accessed on 03\/02\/2018).  Amazon. 2018. AWS Mobile. https:\/\/aws.amazon.com\/mobile\/. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon. 2018. Document History - AWS Lambda. https:\/\/docs.aws.amazon.com\/lambda\/latest\/dg\/history.html. (2018). (Accessed on 03\/02\/2018).  Amazon. 2018. Document History - AWS Lambda. https:\/\/docs.aws.amazon.com\/lambda\/latest\/dg\/history.html. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Colin F Camerer and Robin M Hogarth. 1999. The effects of financial incentives in experiments: A review and capital-labor-production framework. Journal of risk and uncertainty (1999).  Colin F Camerer and Robin M Hogarth. 1999. The effects of financial incentives in experiments: A review and capital-labor-production framework. Journal of risk and uncertainty (1999).","DOI":"10.1007\/978-94-017-1406-8_2"},{"key":"e_1_3_2_1_6_1","unstructured":"Indian Governement Cashless India. 2018. Unified Payments Interface (UPI). http:\/\/cashlessindia.gov.in\/upi.html. (2018). (Accessed on 03\/02\/2018).  Indian Governement Cashless India. 2018. Unified Payments Interface (UPI). http:\/\/cashlessindia.gov.in\/upi.html. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2160601.2160614"},{"key":"e_1_3_2_1_8_1","unstructured":"PCI Security Standards Council. 2018. Official PCI Security Standards Council Site. https:\/\/www.pcisecuritystandards.org\/. (2018). (Accessed on 03\/02\/2018).  PCI Security Standards Council. 2018. Official PCI Security Standards Council Site. https:\/\/www.pcisecuritystandards.org\/. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026435508449"},{"key":"e_1_3_2_1_10_1","unstructured":"James Daniels. 2017. Google Cloud Functions static IP. https:\/\/groups.google.com\/forum\/#!topic\/firebase-talk\/o9Br8GtYBN4. (2017). (Accessed on 03\/02\/2018).  James Daniels. 2017. Google Cloud Functions static IP. https:\/\/groups.google.com\/forum\/#!topic\/firebase-talk\/o9Br8GtYBN4. (2017). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_11_1","unstructured":"Committee for Protection of Human Subjects. 2017. Compensation of Research Subjects. https:\/\/cphs.berkeley.edu\/compensation.pdf. (2017). (Accessed on 02\/28\/2018).  Committee for Protection of Human Subjects. 2017. Compensation of Research Subjects. https:\/\/cphs.berkeley.edu\/compensation.pdf. (2017). (Accessed on 02\/28\/2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218673"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.25.4.191"},{"key":"e_1_3_2_1_15_1","unstructured":"Google. 2018. Cloud Firestore. https:\/\/firebase.google.com\/docs\/firestore\/. (2018). (Accessed on 03\/01\/2018).  Google. 2018. Cloud Firestore. https:\/\/firebase.google.com\/docs\/firestore\/. (2018). (Accessed on 03\/01\/2018)."},{"key":"e_1_3_2_1_16_1","unstructured":"Google. 2018. Cloud Functions. https:\/\/cloud.google.com\/functions\/. (2018). (Accessed on 02\/28\/2018).  Google. 2018. Cloud Functions. https:\/\/cloud.google.com\/functions\/. (2018). (Accessed on 02\/28\/2018)."},{"key":"e_1_3_2_1_17_1","unstructured":"Google. 2018. Firebase Cloud Messaging. https:\/\/firebase.google.com\/docs\/cloud-messaging\/. (2018). (Accessed on 03\/01\/2018).  Google. 2018. Firebase Cloud Messaging. https:\/\/firebase.google.com\/docs\/cloud-messaging\/. (2018). (Accessed on 03\/01\/2018)."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2018. Firebase Invites. https:\/\/firebase.google.com\/docs\/invites\/. (2018). (Accessed on 03\/01\/2018).  Google. 2018. Firebase Invites. https:\/\/firebase.google.com\/docs\/invites\/. (2018). (Accessed on 03\/01\/2018)."},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2018. Google Analytics Solutions - Marketing Analytics & Measurement. https:\/\/www.google.com\/analytics\/#?modal_active=none. (2018). (Accessed on 03\/02\/2018).  Google. 2018. Google Analytics Solutions - Marketing Analytics & Measurement. https:\/\/www.google.com\/analytics\/#?modal_active=none. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_20_1","unstructured":"Google. 2018. Google Forms App Script. https:\/\/developers.google.com\/appsscript\/reference\/forms\/. (2018). (Accessed on 03\/02\/2018).  Google. 2018. Google Forms App Script. https:\/\/developers.google.com\/appsscript\/reference\/forms\/. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_21_1","unstructured":"Google. 2018. Google Scholar. https:\/\/scholar.google.com\/. (2018). (Accessed on 03\/02\/2018).  Google. 2018. Google Scholar. https:\/\/scholar.google.com\/. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1172\/JCI25694"},{"key":"e_1_3_2_1_23_1","unstructured":"Grafana. 2018. Grafana - The open platform for analytics and monitoring. https:\/\/grafana.com\/. (2018). (Accessed on 03\/02\/2018).  Grafana. 2018. Grafana - The open platform for analytics and monitoring. https:\/\/grafana.com\/. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2369220.2369236"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Matthew Jadud. 2016. IRB Reviews Required. (2016).  Matthew Jadud. 2016. IRB Reviews Required. (2016).","DOI":"10.1145\/2993223.2993229"},{"key":"e_1_3_2_1_26_1","unstructured":"Korba. 2018. Korba - Our Lives Simplified. http:\/\/korbaweb.com\/library. (2018). (Accessed on 03\/01\/2018).  Korba. 2018. Korba - Our Lives Simplified. http:\/\/korbaweb.com\/library. (2018). (Accessed on 03\/01\/2018)."},{"volume-title":"Infocom","year":"2013","author":"Koutsopoulos Iordanis","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872086801000617"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1404208111"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Edwin A Locke. 1968. Toward a theory of task motivation and incentives. Organizational behavior and human performance 3 2 (1968) 157--189.  Edwin A Locke. 1968. Toward a theory of task motivation and incentives. Organizational behavior and human performance 3 2 (1968) 157--189.","DOI":"10.1016\/0030-5073(68)90004-4"},{"key":"e_1_3_2_1_31_1","unstructured":"Microsoft. 2018. Azure Functions-Serverless Architecture. https:\/\/azure.microsoft.com\/en-us\/services\/functions\/. (2018). (Accessed on 02\/28\/2018).  Microsoft. 2018. Azure Functions-Serverless Architecture. https:\/\/azure.microsoft.com\/en-us\/services\/functions\/. (2018). (Accessed on 02\/28\/2018)."},{"key":"e_1_3_2_1_32_1","unstructured":"Microsoft. 2018. Azure Machine Learning Anomaly Detection API | Microsoft Docs. https:\/\/docs.microsoft.com\/en-us\/azure\/machine-learning\/team-data-science-process\/apps-anomaly-detection-api. (2018). (Accessed on 09\/30\/2018).  Microsoft. 2018. Azure Machine Learning Anomaly Detection API | Microsoft Docs. https:\/\/docs.microsoft.com\/en-us\/azure\/machine-learning\/team-data-science-process\/apps-anomaly-detection-api. (2018). (Accessed on 09\/30\/2018)."},{"key":"e_1_3_2_1_33_1","unstructured":"Microsoft. 2018. Working with the App Service Mobile Apps managed client library. https:\/\/docs.microsoft.com\/en-us\/azure\/app-service-mobile\/app-service-mobile-dotnet-how-to-use-client-library. (2018). (Accessed on 03\/02\/2018).  Microsoft. 2018. Working with the App Service Mobile Apps managed client library. https:\/\/docs.microsoft.com\/en-us\/azure\/app-service-mobile\/app-service-mobile-dotnet-how-to-use-client-library. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_34_1","unstructured":"Phil Nash. 2018. A set of useful Twilio Functions. https:\/\/github.com\/philnash\/useful-twilio-functions. (2018). (Accessed on 03\/01\/2018).  Phil Nash. 2018. A set of useful Twilio Functions. https:\/\/github.com\/philnash\/useful-twilio-functions. (2018). (Accessed on 03\/01\/2018)."},{"key":"e_1_3_2_1_35_1","unstructured":"Nodemailer. 2018. Nodemailer. https:\/\/nodemailer.com\/about\/. (2018). (Accessed on 03\/01\/2018).  Nodemailer. 2018. Nodemailer. https:\/\/nodemailer.com\/about\/. (2018). (Accessed on 03\/01\/2018)."},{"key":"e_1_3_2_1_36_1","unstructured":"Peoples Bank of China. 2018. Peoples Bank of China Issues Barcode and QR Code Payment Rules. http:\/\/www.pbc.gov.cn\/english\/130721\/3456052\/index.html. (2018). (Accessed on 03\/02\/2018).  Peoples Bank of China. 2018. Peoples Bank of China Issues Barcode and QR Code Payment Rules. http:\/\/www.pbc.gov.cn\/english\/130721\/3456052\/index.html. (2018). (Accessed on 03\/02\/2018)."},{"key":"#cr-split#-e_1_3_2_1_37_1.1","unstructured":"Department of Health and US Government Human Services Office of Inspector General. 2000. Recruiting Human Subjects: Sample Guidelines for Practice (OEI-01-97-00196"},{"key":"#cr-split#-e_1_3_2_1_37_1.2","unstructured":"6\/00). https:\/\/oig.hhs.gov\/oei\/reports\/oei-01-97-00196.pdf. (2000). (Accessed on 03\/02\/2018). Department of Health and US Government Human Services Office of Inspector General. 2000. Recruiting Human Subjects: Sample Guidelines for Practice (OEI-01-97-00196"},{"key":"#cr-split#-e_1_3_2_1_37_1.3","unstructured":"6\/00). https:\/\/oig.hhs.gov\/oei\/reports\/oei-01-97-00196.pdf. (2000). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_38_1","unstructured":"Central Bank of Kenya. 2005. Kenya Electronic Payments and Settlement System (KEPSS) Rules and Procedures. https:\/\/www.centralbank.go.ke\/wp-content\/uploads\/2016\/08\/KepssRules1.pdf. (2005). (Accessed on 03\/02\/2018).  Central Bank of Kenya. 2005. Kenya Electronic Payments and Settlement System (KEPSS) Rules and Procedures. https:\/\/www.centralbank.go.ke\/wp-content\/uploads\/2016\/08\/KepssRules1.pdf. (2005). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_39_1","unstructured":"University of Massachusetts Research Administration and Compliance. 2018. IRB Guidelines | Research and Engagement | UMass Amherst. https:\/\/www.umass.edu\/research\/compliance\/human-subjects-irb\/guidance. (2018). (Accessed on 03\/02\/2018).  University of Massachusetts Research Administration and Compliance. 2018. IRB Guidelines | Research and Engagement | UMass Amherst. https:\/\/www.umass.edu\/research\/compliance\/human-subjects-irb\/guidance. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_40_1","unstructured":"OpenDataKit. 2018. Open Data Kit - Deployments. https:\/\/opendatakit.org\/about\/deployments\/. (2018). (Accessed on 03\/01\/2018).  OpenDataKit. 2018. Open Data Kit - Deployments. https:\/\/opendatakit.org\/about\/deployments\/. (2018). (Accessed on 03\/01\/2018)."},{"key":"e_1_3_2_1_41_1","unstructured":"OpenMapKit. 2018. OpenMapKit Website. http:\/\/openmapkit.org\/. (2018). (Accessed on 03\/01\/2018).  OpenMapKit. 2018. OpenMapKit Website. http:\/\/openmapkit.org\/. (2018). (Accessed on 03\/01\/2018)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Steven Ovadia. 2014. Automate the internet with \"if this then that\" (IFTTT). Behavioral & social sciences librarian 33 4 (2014) 208--211.  Steven Ovadia. 2014. Automate the internet with \"if this then that\" (IFTTT). Behavioral & social sciences librarian 33 4 (2014) 208--211.","DOI":"10.1080\/01639269.2014.964593"},{"key":"e_1_3_2_1_43_1","unstructured":"Particle. 2018. Particle Guides | Webhooks. https:\/\/docs.particle.io\/guide\/tools-and-features\/webhooks\/. (2018). (Accessed on 03\/02\/2018).  Particle. 2018. Particle Guides | Webhooks. https:\/\/docs.particle.io\/guide\/tools-and-features\/webhooks\/. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_44_1","unstructured":"PayPal. 2018. Creating and managing NVP\/SOAP API credentials. https:\/\/developer.paypal.com\/docs\/classic\/api\/apiCredentials\/?mark=API%20security. (2018). (Accessed on 03\/02\/2018).  PayPal. 2018. Creating and managing NVP\/SOAP API credentials. https:\/\/developer.paypal.com\/docs\/classic\/api\/apiCredentials\/?mark=API%20security. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2016.04.014"},{"key":"e_1_3_2_1_46_1","unstructured":"petnet. 2018. Petnet.Io Smartfeeder - The SmartFeeder feeds your pet the right amount at the right time automatically! https:\/\/www.welcome.ai\/products\/hardware-iot\/petnet-io-smartfeeder. (2018). (Accessed on 09\/30\/2018).  petnet. 2018. Petnet.Io Smartfeeder - The SmartFeeder feeds your pet the right amount at the right time automatically! https:\/\/www.welcome.ai\/products\/hardware-iot\/petnet-io-smartfeeder. (2018). (Accessed on 09\/30\/2018)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.3390\/bs4030213"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674377.2674383"},{"key":"e_1_3_2_1_49_1","unstructured":"Peter D Schellie. 1979. Electronic Fund Transfer Act. The Business Lawyer (1979) 1441--1452.  Peter D Schellie. 1979. Electronic Fund Transfer Act. The Business Lawyer (1979) 1441--1452."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002716212458082"},{"key":"e_1_3_2_1_51_1","unstructured":"Square. 2018. Square Connect API Documentation. https:\/\/docs.connect.squareup.com\/api\/oauth#credentials. (2018). (Accessed on 03\/02\/2018).  Square. 2018. Square Connect API Documentation. https:\/\/docs.connect.squareup.com\/api\/oauth#credentials. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"RG Stovel S Ginsburg L Stroud RB Cavalcanti and LA Devine. 2018. Incentives for recruiting trainee participants in medical education research. Medical teacher 40 2 (2018) 181--187.  RG Stovel S Ginsburg L Stroud RB Cavalcanti and LA Devine. 2018. Incentives for recruiting trainee participants in medical education research. Medical teacher 40 2 (2018) 181--187.","DOI":"10.1080\/0142159X.2017.1395402"},{"key":"e_1_3_2_1_53_1","unstructured":"Stripe. 2018. Stripe API Reference. https:\/\/stripe.com\/docs\/api#authentication. (2018). (Accessed on 03\/02\/2018).  Stripe. 2018. Stripe API Reference. https:\/\/stripe.com\/docs\/api#authentication. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_54_1","unstructured":"SurveyCTO. 2018. Homepage. https:\/\/www.surveycto.com\/. (2018). (Accessed on 07\/22\/2018).  SurveyCTO. 2018. Homepage. https:\/\/www.surveycto.com\/. (2018). (Accessed on 07\/22\/2018)."},{"volume-title":"R: A language and environment for statistical computing.","year":"2013","author":"R Core Team","key":"e_1_3_2_1_55_1"},{"key":"e_1_3_2_1_56_1","unstructured":"Twilio. 2018. Twilio - Communication APIs for SMS Voice Video and Authentication. https:\/\/www.twilio.com\/. (2018). (Accessed on 03\/02\/2018).  Twilio. 2018. Twilio - Communication APIs for SMS Voice Video and Authentication. https:\/\/www.twilio.com\/. (2018). (Accessed on 03\/02\/2018)."},{"key":"e_1_3_2_1_57_1","unstructured":"Twilio. 2018. Two Factor Authentication for Identity Management via SMS or Voice. https:\/\/www.twilio.com\/use-cases\/two-factor-authentication. (2018). (Accessed on 09\/30\/2018).  Twilio. 2018. Two Factor Authentication for Identity Management via SMS or Voice. https:\/\/www.twilio.com\/use-cases\/two-factor-authentication. (2018). (Accessed on 09\/30\/2018)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Dale Whittington John Briscoe Xinming Mu and William Barron. 1990. Estimating the willingness to pay for water services in developing countries: A case study of the use of contingent valuation surveys in southern Haiti. Economic development and cultural change 38 2 (1990) 293--311.  Dale Whittington John Briscoe Xinming Mu and William Barron. 1990. Estimating the willingness to pay for water services in developing countries: A case study of the use of contingent valuation surveys in southern Haiti. Economic development and cultural change 38 2 (1990) 293--311.","DOI":"10.1086\/451794"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Xinglin Zhang Zheng Yang Wei Sun Yunhao Liu Shaohua Tang Kai Xing and Xufei Mao. 2016. Incentives for mobile crowd sensing: A survey. IEEE Communications Surveys & Tutorials (2016).  Xinglin Zhang Zheng Yang Wei Sun Yunhao Liu Shaohua Tang Kai Xing and Xufei Mao. 2016. Incentives for mobile crowd sensing: A survey. IEEE Communications Surveys & Tutorials (2016).","DOI":"10.1109\/COMST.2015.2415528"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Xinglin Zhang Zheng Yang Zimu Zhou Haibin Cai Lei Chen and Xiangyang Li. 2014. Free market of crowdsourcing: Incentive mechanism design for mobile sensing. IEEE transactions on parallel and distributed systems (2014).  Xinglin Zhang Zheng Yang Zimu Zhou Haibin Cai Lei Chen and Xiangyang Li. 2014. Free market of crowdsourcing: Incentive mechanism design for mobile sensing. IEEE transactions on parallel and distributed systems (2014).","DOI":"10.1109\/TPDS.2013.2297112"}],"event":{"name":"ICTD '19: Tenth International Conference on Information and Communication Technologies and Development","acronym":"ICTD '19","location":"Ahmedabad India"},"container-title":["Proceedings of the Tenth International Conference on Information and Communication Technologies and Development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287098.3287101","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287098.3287101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:08Z","timestamp":1750208528000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287098.3287101"}},"subtitle":["standardizing the generation, comparison, and deployment of incentive systems"],"short-title":[],"issued":{"date-parts":[[2019,1,4]]},"references-count":61,"alternative-id":["10.1145\/3287098.3287101","10.1145\/3287098"],"URL":"https:\/\/doi.org\/10.1145\/3287098.3287101","relation":{},"subject":[],"published":{"date-parts":[[2019,1,4]]},"assertion":[{"value":"2019-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}