{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T01:12:56Z","timestamp":1704849176269},"reference-count":49,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T00:00:00Z","timestamp":1535932800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2019,2,10]]},"abstract":"Summary<\/jats:title>Complex systems such as Collective Adaptive Systems that include a variety of resources, are increasingly being designed to include people in task\u2010execution. Collectives, encapsulating human resources\/services, represent one type of an application within which people with different type of skills can be engaged to solve one common problem or work on the same project. Mechanisms of managing social collectives are dependent on functional and non\u2010functional parameters of members of social collectives. In this work, we investigate the benefits provenance can offer to social computing and trade\u2010off implications. We show experimental results of how provenance data can help better visualize interaction and performance data during a collective's run\u2010time. We present novel metrics that can be derived from provenance, and lastly, we discuss privacy implications. If utilized ethically, provenance can help in developing more efficient provisioning and management mechanisms in social computing.<\/jats:p>","DOI":"10.1002\/cpe.4894","type":"journal-article","created":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T06:10:02Z","timestamp":1536041402000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Application of provenance in social computing: A case study"],"prefix":"10.1002","volume":"31","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4991-3455","authenticated-orcid":false,"given":"Mirela","family":"Riveni","sequence":"first","affiliation":[{"name":"Institut f\u00fcr Informationssysteme Distributed Systems Group, TU Wien Vienna Austria"}]},{"given":"Tien\u2010Dung","family":"Nguyen","sequence":"additional","affiliation":[{"name":"International University Ho Chi Minh City National University Ho Chi Minh City Vietnam"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7908-5067","authenticated-orcid":false,"given":"Mehmet S.","family":"Aktas","sequence":"additional","affiliation":[{"name":"Computer Engineering Department Y\u0131ld\u0131z Technical University Istanbul Turkey"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6872-8821","authenticated-orcid":false,"given":"Schahram","family":"Dustdar","sequence":"additional","affiliation":[{"name":"Institut f\u00fcr Informationssysteme Distributed Systems Group, TU Wien Vienna Austria"}]}],"member":"311","published-online":{"date-parts":[[2018,9,3]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15895-2_13"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.142"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.12"},{"key":"e_1_2_10_5_1","doi-asserted-by":"crossref","unstructured":"ChengJ BernsteinMS.Flock: hybrid crowd\u2010machine learning classifiers. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW);2015;Vancouver Canada.","DOI":"10.1145\/2675133.2675214"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2674662"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-8806-4_48"},{"issue":"2","key":"e_1_2_10_8_1","first-page":"109","article-title":"Virtualizing software and humans for elastic processes in multiple clouds\u2010a service management perspective","volume":"3","author":"Dustdar S","year":"2012","journal-title":"Int J Next Gener Comput"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2014.2345206"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.68"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34321-6_4"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2014.08.002"},{"key":"e_1_2_10_13_1","doi-asserted-by":"crossref","unstructured":"AmbatiV VogelS CarbonellJ.Collaborative workflow for crowdsourcing translation. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW);2012;Seattle WA.","DOI":"10.1145\/2145204.2145382"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16567-2_12"},{"key":"e_1_2_10_15_1","doi-asserted-by":"crossref","unstructured":"Fazel\u2010ZarandiM DevlinHJ HuangY ContractorN.Expert recommendation based on social drivers social network analysis and semantic data representation. In: Proceedings of the 2nd International Workshop on Information Heterogeneity and Fusion in Recommender Systems (HetRec).2011;Chicago IL.","DOI":"10.1145\/2039320.2039326"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8462-3_8"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07881-6_25"},{"key":"e_1_2_10_19_1","doi-asserted-by":"crossref","unstructured":"RiveniM TruongH\u2010L DustdarS.Trust\u2010aware elastic social compute units. In: Proceedings of the 2015 IEEE TrustCom\/BigDataSE\/ISPA \u2010 Vol.\u00a01 (TRUSTCOM);2015;Helsinki Finland.","DOI":"10.1109\/Trustcom.2015.367"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2596628"},{"key":"e_1_2_10_21_1","doi-asserted-by":"crossref","unstructured":"BatesA HassanWU ButlerK et al.Transparent web service auditing via network provenance functions. In: Proceedings of the 26th International Conference on World Wide Web (WWW);2017;Perth Australia.","DOI":"10.1145\/3038912.3052640"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2013.2266929"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4263"},{"key":"e_1_2_10_24_1","unstructured":"MissierP MoreauL.PROV\u2010DM: the PROV data model: W3C recommendation (W3C).2013;http:\/\/www.w3.org\/TR\/2013\/REC-prov-dm-20130430\/"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.07.005"},{"key":"e_1_2_10_26_1","unstructured":"MoreauL.Provtoolbox: java library to create and convert W3C PROV data model representations.http:\/\/lucmoreau.github.io\/ProvToolbox\/. Accessed April 22 2017."},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.5334\/jors.bq"},{"key":"e_1_2_10_28_1","doi-asserted-by":"crossref","unstructured":"DavidsonSB KhannaS RoyS StoyanovichJ TannenV ChenY.On provenance and privacy. In: Proceedings of the 14th International Conference on Database Theory (ICDT);2011;Uppsala Sweden.","DOI":"10.1145\/1938551.1938554"},{"key":"e_1_2_10_29_1","doi-asserted-by":"crossref","unstructured":"ChengY NguyenD BijonK KrishnanR ParkJ SandhuR.Towards provenance and risk\u2010awareness in social computing. In: Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems (SRAS);2012;Minneapolis MN.","DOI":"10.1145\/2420936.2420941"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_10_31_1","doi-asserted-by":"crossref","unstructured":"LiN LiT VenkatasubramanianS.t\u2010closeness: privacy beyond k\u2010anonymity and l\u2010diversity. In: Proceedings of the 23rd International Conference on Data Engineering (ICDE);2007;Istanbul Turkey.","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"5","key":"e_1_2_10_32_1","first-page":"1701","article-title":"Broken promises of privacy: responding to the surprising failure of anonymization","volume":"57","author":"Ohm P","year":"2010","journal-title":"UCLA Law Rev"},{"key":"e_1_2_10_33_1","unstructured":"SoghoianC.AOL Netflix and the end of open access to research data.cnet news;2007.http:\/\/news.cnet.com\/8301-13739_3-9826608-46.html"},{"key":"e_1_2_10_34_1","unstructured":"NarayananA ShmatikovV.How to break anonymity of the Netflix prize dataset.2006;CoRRabs\/cs\/0610105"},{"key":"e_1_2_10_35_1","doi-asserted-by":"crossref","unstructured":"TasY BaethMJ AktasMS.An approach to standalone provenance systems for big social provenance data. Paper presented at: 2016 12th International Conference on Semantics Knowledge and Grids (SKG);2016;Beijing China.","DOI":"10.1109\/SKG.2016.010"},{"key":"e_1_2_10_36_1","unstructured":"OgdenM MckelveyK MadsenMB Code for Science.Dat \u2010 Distributed Dataset Synchronization And Versioning.https:\/\/github.com\/datprotocol\/whitepaper\/blob\/master\/dat-paper.pdf"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41338-4_29"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16462-5_35"},{"key":"e_1_2_10_39_1","unstructured":"LeboT SahooS McGuinnessD.PROV\u2010O: the PROV ontology: W3C recommendation (W3C).2013;http:\/\/www.w3.org\/TR\/2013\/REC-prov-o-20130430\/"},{"key":"e_1_2_10_40_1","doi-asserted-by":"crossref","unstructured":"ParkJ NguyenD SandhuRS.On data provenance in group\u2010centric secure collaboration. Paper presented at: 7th International Conference on Collaborative Computing: Networking Applications and Worksharing (CollaborateCom);2011;Orlando FL.","DOI":"10.4108\/icst.collaboratecom.2011.247192"},{"key":"e_1_2_10_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08681-1_8"},{"key":"e_1_2_10_42_1","unstructured":"PanditHJ LewisD.Modelling provenance for gdpr compliance using linked open data vocabularies. In: Proceedings of the 5th International Workshop on Society Privacy and the Semantic Web \u2010 Policy and Technology (Privon) co\u2010located with 16th International Semantic Web Conference (ISWC);2017;Vienna Austria."},{"key":"e_1_2_10_43_1","first-page":"119","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","volume":"59","author":"Regulation G.D.P","year":"2016","journal-title":"Off J Eur Union"},{"key":"e_1_2_10_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1067-4"},{"key":"e_1_2_10_45_1","volume-title":"8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","author":"Pu C","year":"2012"},{"key":"e_1_2_10_46_1","unstructured":"BaethMJ AktasMS.A large scale synthetic social provenance database. In: Proceedings of the Ninth International Conference on Advances in Databases Knowledge and Data Applications (DBKDA);2017;Barcelona Spain."},{"key":"e_1_2_10_47_1","doi-asserted-by":"crossref","unstructured":"BaethMJ AktasMS.Detecting misinformation in social networks using provenance data. Paper presented at: 2017 13th International Conference on Semantics Knowledge and Grids (SKG);2017;Beijing China.","DOI":"10.1109\/SKG.2017.00022"},{"key":"e_1_2_10_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.164"},{"key":"e_1_2_10_49_1","doi-asserted-by":"crossref","unstructured":"HuynhTD EbdenM VenanziM RamchurnSD RobertsSJ MoreauL.Interpretation of crowdsourced activities using provenance network analysis. In: Proceedings of the First AAAI Conference on Human Computation and Crowdsourcing (HCOMP);2013;Palm Springs CA.","DOI":"10.1609\/hcomp.v1i1.13067"},{"key":"e_1_2_10_50_1","first-page":"261","volume-title":"Provenance and Annotation of Data and Processes \u2010 5th International Provenance and Annotation Workshop, IPAW, 2014, Cologne, Germany, June 9\u201013, 2014. Revised Selected Papers","author":"Garijo D","year":"2014"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.4894","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.4894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T18:02:49Z","timestamp":1694455369000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.4894"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,3]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,2,10]]}},"alternative-id":["10.1002\/cpe.4894"],"URL":"https:\/\/doi.org\/10.1002\/cpe.4894","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,3]]},"assertion":[{"value":"2017-09-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}