Abstract.
The purpose of this White Paper of the EU Support Action “Visioneer”(see www.visioneer.ethz.ch) is to address the following goals:
-
1.
Develop strategies to quickly increase the objective knowledge about social and economic systems.
-
2.
Describe requirements for efficient large-scale scientific data mining of anonymized social and economic data.
-
3.
Formulate strategies how to collect stylized facts extracted from large data set.
-
4.
Sketch ways how to successfully build up centers for computational social science.
-
5.
Propose plans how to create centers for risk analysis and crisis forecasting.
-
6.
Elaborate ethical standards regarding the storage, processing, evaluation, and publication of social and economic data.
References
- 1.
Visioneer, envisioning a socio-economic knowledge collider, http://www.visioneer. ethz.ch
- 2.
D. Helbing, S. Balietti, From Social Simulation to Integrative System Design. Eur. Phys. J. Special Topics 195, 69 (2011), see http://www.visioneer.ethz.ch
- 3.
D. Helbing, S. Balietti, How to create an Innovation Accelerator. Eur. Phys. J. Special Topics 195, 101 (2011), see http://www.visioneer.ethz.ch
- 4.
D. Helbing, S. Balietti, Formulating grand fundamental challenges. Visioneer White Paper (2010), see http://www.visioneer.ethz.ch
- 5.
D. Helbing, Pluralistic Modeling of Complex Systems (July 18, 2010). CCSS-10-009, available at SSRN: http://ssrn.com/abstract=1646314(2010)
- 6.
D. Helbing, S. Balietti, Fundamental and real world challenges in economics (in print) (2010)
- 7.
D. Helbing, Systemic risks in society and economics, Sante Fe Institute, working paper (2009)
- 8.
S.V. Buldyrev, R. Parshani, G. Paul, H.E. Stanley, S. Havlin, Nature 465, 08932 (2010)
- 9.
D. Helbing, W. Yu, K.-D. Opp, H. Rauhut, Amer. J. Sociol. (submitted) (2010
- 10.
See http://hussonet.free.fr/toxicap.xls
- 11.
K.P. Smith, N.A. Christakis, Ann. Rev. Sociol. 34, 405 (2008)
- 12.
Privatsphäre als Luxusgut, http://www.nzz.ch/blogs/nzz_blogs/betablog/ privatsphaere_als_luxusgut_1.7266824.html
- 13.
D. Helbing, M. Christen, Mit Rauschen und Reibung gegen finanzielle Blasen (submitted to Wirtschaftswoche) (2010)
- 14.
M. Mäs, A. Flache, D. Helbing, PLoS Computational Biology (in print) (2010)
- 15.
The Future of Social Experimenting: The Full Story, http://www.soms.ethz.ch/ research/socialexperimenting
- 16.
J. Surowiecki, The wisdom of crowds: Why the many are smarter than the few and how collective wisdom shapes business, economics, societies, and nations (Random House, Inc., 2004)
- 17.
J.H. Kagel, A.E. Roth, The Handbook of Experimental Economics (Princeton University, 1997)
- 18.
M.J. Salganik, P.S. Dodds, D.J. Watts, Science 311, 854 (2006)
- 19.
W.S. Bainbridge, Science 317, 472 (2007)
- 20.
N.F. Johnson, C. Xu, Z. Zhao, N. Ducheneaut, N. Yee, G. Tita, P.M. Hui, Phys. Rev. E 79, 066117 (2009)
- 21.
M. Szell, S. Thurner, Social Networks (2009) (submitted) [E-print http://arxiv.org/ abs/0911.1084]
- 22.
N.A. Christakis, J.H. Fowler, New Engl. J. Med. 357, 370 (2007)
- 23.
N.A. Christakis, J.H. Fowler, New Engl. J. Med. 358, 2249 (2008)
- 24.
J.H. Fowler, N.A. Christakis, British Med. J. 337, a2338 (2008)
- 25.
J.H. Fowler, N.A. Christakis, Cooperative behavior cascades in human social networks (2009) [E-print http://arxiv.org/abs/0908.3497]
- 26.
J. Howe, Wired Mag. 14, (2006)
- 27.
J. Howe, Crown Busin. (2009)
- 28.
D. Tapscott, A.D. Williams, Portfolio Hardcover (2008)
- 29.
C.R. Sunstein, Infotopia: How Many Minds Produce Knowledge (Oxford University Press, USA, 2006)
- 30.
M. Abramowicz, Predictocracy: Market Mechanisms for Public and Private Decision Making (Yale University Press, 2009)
- 31.
Designing E-Business Systems. Markets, Services, and Networks. 7th Workshop on E-Business, WEB 2008, edited by C. Weinhardt, S. Luckner, J. Stösser (Paris, France, 2008)
- 32.
R. Kalakota, M. Robinson, E-business 2.0: Roadmap for Success (Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 2001)
- 33.
C.S.R. Prabhu, E-governance: Concepts and Case Studies (PHI Learning, 2006)
- 34.
Electronic Government: 8th International Conference, EGOV 2009, edited by M.A. Wimmer, H.J. Scholl, M. Janssen, R. Traunmller (Linz, Austria, 31 August—3 September, 2009)
- 35.
G.E. Moore, Electronics Magazine 4 (1965), ftp://download.intel.com/museum/ Moores_Law/Articles-Press_Releases/Gordon_Moore_1965_Article.pdf
- 36.
I. Fisher, The Theory of Interest (NY, Macmillan, 1930)
- 37.
B.B. Mandelbrot, J. Busin. 36, 394 (1963)
- 38.
E.F. Fama, J. Busin. 38, 34 (1965)
- 39.
R.K. Merton, Science 159, 56 (1968)
- 40.
A. Barabasi, Science 286, 509 (1999)
- 41.
R. Dunbar, Grooming, Gossip, and the Evolution of Language (Harvard University Press, 1998)
- 42.
V. Pareto, Translation of Manuale di economia politica (“Manual of political economy”), A.M. Kelley (1971)
- 43.
G.K. Zipf, Human Behavior and the Principle of Least-Effort (Addison-Wesley, 1949)
- 44.
E. Ravenstein, The Geographical Magazine III, 173, 201, 229 (1876)
- 45.
G.K. Zipf, Amer. Sociol. Rev. 11, 677 (1946)
- 46.
J. Tinbergen, Shaping the World Economy: Suggestions for an International Economic policy, Twentieth Century Fund (1962)
- 47.
C.A.E. Goodhart, Papers in Monetary Economics (Reserve Bank of Australia) (1975)
- 48.
K.A. Chrystal, P.D. Mizen, Vol. 1 of Central Banking, Monetary Theory and Practice: Essays in Honour of Charles Goodhart, edited by P.D. Mizen (Northampton, MA, Edward Elgar, 2003)
- 49.
J. Danãelsson, J. Banking Finance 26, 127396 (2002)
- 50.
Ioannidis P.A. , John, PLos Med. 2, 8 (2005)
- 51.
D. Lazer, et al., Science 323, 721 (2009)
- 52.
Recommendations of the Association of Internet Researchers (AoIR) Ethics Working Committee, http://www.aoir.org/reports/ethics.pdf
- 53.
Research Methods in the Social Sciences, edited by C. Frankfort-Nachmias, D. Nachmias (Worth Publishers, New York, 2008)
- 54.
L.C. Bollinger, Announcing the Columbia committee on global thought, http://www. columbia.edu/cu/president/.../051214-committee-global-thought.html
- 55.
H. Spencer, The Principles of Sociology (Appleton, New York, 1898; the three volumes were originally published in serial form between 1874 and 1896)
- 56.
L. von Bertalanffy, General System Theory: Foundations, Development, Applications (George Braziller, New York, 1968)
- 57.
J.M. Epstein, Generative Social Science. Studies in Agent-Based Computational Modeling (Princeton University, 2006), p. 51
- 58.
J. Lorenz, H. Rauhut, F. Schweitzer D. Helbing, How social influence undermines the wisdom of crowds (submitted) (2010)
- 59.
L. Molgedey, W. Ebeling, Eur. Phys. J. B-Cond. Matter Complex Syst. 15, 733737 (2000)
- 60.
G. Sugihara, R.M. May, Nature 344, 734741 (1990)
- 61.
D. Helbing, et al., Human Behaviour and Traffic Networks, edited by M. Schreckenberg, R. Selten (Springer, Berlin, 2004), p. 47
- 62.
N. Bardsley, R. Cubitt, G. Loomes, G.P. Moffatt, R. Sugden, Experimental Economics: Rethinking the Rule (Princeton University Press, 2009)
- 63.
D. Friedman, Cassar A., Economics Lab: An Intensive Course in Experimental Economics (Routledge, 2004)
- 64.
D. Friedman, S. Sunder, Experimental Methods: A Primer for Economists (Cambridge University Press, 1994)
- 65.
F. Guala, The Methodology of Experimental Economics (Cambridge University Press, 2005)
- 66.
S. Lämmer, D. Helbing, JSTAT P04019 (2008)
- 67.
M. Scheffer, J. Bascompte, W.A. Brock, V. Brovkin, S.R. Carpenter, V. Dakos, H. Held, E.H. van Nes, M Rietkerk, Nature 461, 53 (2009)
- 68.
D. Helbing, S. Lämmer, D. Armbruster, A.S. Mikhailov, K. Kaneko, Networks of Interacting Machines: Production Organization in Complex Industrial Systems and Biological Cells, edited by D. Armbruster, A.S. Mikhailov, K. Kaneko (World Scientific, Singapore, 2005), p. 33
- 69.
D. Helbing, H. Ammoser, C. Khnert, Extreme Events in Nature and Society, edited by S. Albeverio, V. Jentsch, H. Kantz (Springer, Berlin, 2005)
- 70.
Google chief: Only miscreants worry about net privacy, http://www.theregister. co.uk/2009/12/07/schmidt_on_privacy/
- 71.
Details of 100 m Facebook users collected and published, http://www.bbc.co.uk/ news/technology-10796584
- 72.
L. Odling-Smee, Nature 446, 10 (2007)
- 73.
The Data Deluge, The Economist, Feb 25th 2010, http://www.economist.com/node/ 15579717
- 74.
Information is Power, The Guardian Data Blog, http://www.guardian.co.uk/media/ 2010/may/24/data-journalism
- 75.
Building Big Society, www.cabinetoffice.gov.uk/media/407789/building-big- society.pdf
- 76.
Apple confirms $1bn data center, http://www.theregister.co.uk/2009/06/04/ apple_1bn_north_carolina_data_center/
- 77.
NSA plans massive, 65MW, $2bn data center in Utah, http://www.theregister. co.uk/2009/07/03/new_nsa_data_center/
- 78.
Microsoft consumes Chicago data center, http://www.theregister.co.uk/2009/05/ 20/ascent_ch2_datacenter/
- 79.
Google admits Scandinavian data center landing, http://www.theregister. co.uk/2009/03/05/google_finland_data_center/
- 80.
Google pays $51.7m for newspaper destruction metaphor, http://www.theregister. co.uk/2009/02/12/google_buys_defunct_paper_mill/
- 81.
Intel sees future in Mega Data Center, http://www.theregister.co.uk/2009/02/18/ the_intel_cloud/
- 82.
R. Axelrod, The Evolution of Cooperation (Basic Books, 1984), p. 169
- 83.
A. Leventhal, ACM Queue 7 (2009)
- 84.
T. Hey, S. Tansley, K. Tolle, The Fourth Paradigm: Data-Intensive Scientific Discovery, edited by T. Hey, S. Tansley, K. Tolle (Microsoft Research, Redmond, Washington, 2009)
- 85.
M. Banko, E. Brill, Proceedings of the 39th Annual Meeting of the Association for Computational Linguistics (ACL 2001) (Toulouse, France, 2001), p. 26
- 86.
A. Halevy, P. Norvig, F. Pereira, Comm. ACM 24, 812 (2009)
- 87.
T. Brants, C. Ashok, Popat, P. Xu, F.J. Och, J. Dean, Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (Prague, Czech Republic, 2007), p. 858
- 88.
J. Lin, C. Dyer, Synthesis Lectures on Human Language Technologies (Morgan & Claypool, 2010)
- 89.
J. Dean, S. Ghemawat, Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004) (San Francisco, California, 2004), p. 137
- 90.
R. Pike, S. Dorward, R. Griesemer, S. Quinlan, Scientific Programming Journal Special Issue on Grids and Worldwide Computing Programming Models and Infrastructure 13, 227
- 91.
A. Awadallah, How Hadoop Revolutionized Data Warehousing at Yahoo and Facebook (CTO, Cloudera, Inc., 2009), http://www.slideshare.net/awadallah/ how-hadoop-revolutionized-data-warehousing-at-yahoo-and-facebook
- 92.
J. Hofman, Large-Scale Social Media Analysis with Hadoop (Yahoo! Research, 2010) http://www.slideshare.net/jakehofman/largescale-social-media-analysis- with-hadoop
- 93.
A. Manus Mc, M.-T. Kechadi, Data Mining V: Data Mining, Text Mining and Their Business Applications (2004), p. 189
- 94.
S.H. Muggleton, Nature 440, 409410 (2006)
- 95.
A. Szalay, J. Gray, Nature 440, 413414 (2006)
- 96.
I. Foster, Nature 440, 419 (2006)
- 97.
Eds., Nature 455, 1 (2008)
- 98.
S. Nelson, Nature 455, 36 (2008)
- 99.
C. Lynch, Nature 455, 28 (2008)
- 100.
C. Doctorow, Nature, 455, 16 (2008)
- 101.
Google spotlights data center inner workings, http://news.cnet.com/8301-10784_3- 9955184-7.html
- 102.
D. Butler, Nature 449, 644
- 103.
Eds., Nature 449, 637
- 104.
G. Pass, A. Chowdhury, C. Torgeson, Proc. 1st Int. Conference on Scalable Information Systems (Hong Kong, 2006)
- 105.
N. Eagle, A. Pentland, Personal Ubiquitous Comput 10 (2006)
- 106.
N. Eagle, A. Pentland, D. Lazer, PNAS 106, 36 (2009)
- 107.
The Jerusalem Declaration is part of the WP9 “Data in complex systems” of the GIACS Coordination Action n. 012380, http://portale.unipa.it/ocs/home/ jerusalemSubscription.html
- 108.
A. Vespignani, Science 325, 425 (2009)
- 109.
A. Barabasi, Science 325, 412 (2009)
- 110.
E. Ostrom, Science 325, 419 (2009
- 111.
Google Flu Trends, http://www.google.org/flutrends/
- 112.
N.A. Christakis, J.H. Fowler, PLoS ONE 5, e12948 (2010)
- 113.
J.V. Henderson, A. Storeygard, D.N. Weil, NBER Working Paper No. w15199 (2009)
- 114.
L. Backstrom, C. Dwork, J. Kleinberg, Proc. 16th Int. World Wide Web Conference (2007)
- 115.
EU Commission plans more harmonisation of data protection law. http://www.out-law.com/default.aspx?page=11228
- 116.
P. Bajaria, J. Yeo, Inf. Econom. Policy 21, 90 (2009)
- 117.
C. Schultz, Transparency and tacit collusion (2001)
- 118.
B. Kluger, S.B. Wyatt, J. Financial Quant. Anal. 37, 449 (2002)
- 119.
M. Michael, J.E. Moreira, D. Shiloach, R.W. Wisniewski, Parallel and Distributed Processing Symposium, IEEE International (2007)
- 120.
L.A. Barroso, Hölzle, The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines (Morgan & Claypool Publishers, 2009)
- 121.
A. Jacobs, ACM Queue 7 (2009)
- 122.
SSD Myths and Legends - “write endurance”, http://www.storagesearch.com/ ssdmyths-endurance.html
- 123.
A. Mazlouimian, D. Helbing, Y.-H. Eom, S. Lozano, S. Fortunato, How citation boosts trigger scientific paradigm shifts (2010) (in preparation)
- 124.
D. Helbing, M. Treiber, N.J. Saam, Phys. Rev. E 71, 067101 (2005)
- 125.
S.E. Asch, Psychol. Monogr. 70, 9 (1956)
- 126.
F. Winter, H. Rauhut, D. Helbing, Jena Economic Research Papers (2009)
- 127.
D. Helbing, A. Johansson, SFI Working Paper #09-09-040 (2009)
- 128.
D. Helbing, W. Yu, Proceedings of the National Academy of Sciences USA (PNAS) 106, 3680 (2009)
- 129.
D. Helbing, W. Yu, H. Rauhut, Self-organization and emergence in social systems, Modeling the coevolution of social environments and cooperative behavior, SFI Working Paper #09-07-026 (2009)
- 130.
Four million British identities are up for sale on the Internet, http://technology. timesonline.co.uk/tol/news/tech_and_web/the_web/article6718560.ece
- 131.
E. Diener, R. Crandall, Ethics in Social and Behavioral Research (University of Chicago Press, Chicago, 1978)
- 132.
R. Geambasu, T. Kohno, A. Levy, H.M. Levy, Proceedings of the USENIX Security Symposium (Montreal, Canada, 2009)
- 133.
It seems it not so easy to clear ones name on-line, even when trying hard. This is specially true for traces left on social network Web sites, for which specific applications, such as http://suicidemachine.org/, have been created in order to accomplish this task. For a discussion based on a true story see http://ask.slashdot.org/story/09/12/10/2115238/Best-Way-To-Clear-Your- Name-Online
- 134.
Data, data everywhere, The Economist (2010)
- 135.
L. Lessig, Against Transparency, The New Republic (2009), http://www.tnr.com/ article/books-and-arts/against-transparency
- 136.
A. Diekmann, W. Przepiorka, H. Rauhut, Z. Soziol. 40, 74 (2011)
- 137.
A.C. Kinsey, W.B. Pomeroy, C.E. Martin, Sexual Behavior in the Human Male (Saunders, Philadelphia, 1948)
- 138.
A.C. Kinsey, W.B. Pomeroy, C.E. Martin, P.H. Gebhard, Sexual Behavior in the Human Female (Saunders, Philadelphia, 1953)
- 139.
Symantec Internet Security Threat Report, http://www.symantec.com/business/ theme.jsp?themeid=threatreport
- 140.
A. Janc, L. Olejnik, Feasibility and Real-World Implications of Web Browser History Detection
- 141.
G. Wondracek, T. Holz, E. Kirda, C. Kruegel, A Practical Attack to De-Anonymize Social Network Users. Technical Report TR-iSecLab-0110-001
- 142.
Google admits it accidentally gathered WiFi data, http://www.ft.com/cms/s/2/ 8a23b394-5fab-11df-a670-00144feab49a.html
- 143.
Google to hand over intercepted data, http://www.ft.com/cms/s/2/db664044-6f43- 11df-9f43-00144feabdc0.html
- 144.
Lawyers Claim Google Wi-Fi Sniffing “Is Not an Accident”, http://gizmodo. com/5554960/lawyers-claim-google-wi+fi-sniffing-is-not-an-accident
- 145.
Wi-Fi Data Captured By Google Street View Cars Included Passwords, http://gizmodo.com/5567460/wi+fi-data-captured-by-google-street-view- cars-included-passwords
- 146.
Statement of Ethical Practice for the British Sociological Association, BSA, the British Sociological Society, 2002, http://www.britsoc.co.uk/equality/ Statement+Ethical+Practice.htm
- 147.
Ethical Guidelines, Social Research Association (2003), http://www.the-sra. org.uk/ethical.htm
- 148.
D. Sally, I. Ron, H. Ursula, An EU Code of Ethics for Socio-Economic Research (The Institute of Employment Studies, 2004)
- 149.
The British Psychological Society, Report of the Working Party on Conducting Research on the Internet (2007), http://www.bps.org.uk/the-society/code-of- conduct/
- 150.
Senator calls on FTC to tackle social-net privacy, http://news.cnet.com/ 8301-13577_3-20003415-36.html
- 151.
The Electronic Frontier Foundation published a timeline of Facebook’s privacy policy modifications over the years, http://www.eff.org/deeplinks/2010/04/ facebook-timeline
- 152.
Watchdog files complaint over Facebook “privacy” settings, http://www. theregister.co.uk/2009/12/17/epic_facebook_privacy_complain/
- 153.
Exclusive: Google, CIA Invest in “Future” of Web Monitoring, http://www. wired.com/dangerroom/2010/07/exclusive-google-cia/
- 154.
X. Su, T.M. Khoshgoftaar, Adv. Artificial Intell. (2009)
- 155.
E.J. Candes, T. Tao, IEEE Trans. Inform. Theory 56, 2053 (2009)
- 156.
M. Bezzi, et al. (eds.), Privacy and Identity Management for Life (Springer, 2009)
- 157.
G. Ziegler, C. Farkas, A. Lörincz, Inf. Software Technol. 48, 726 (2006)
- 158.
Apple’s Worst Security Breach: 114,000 iPad Owners Exposed, http://gawker. com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed
- 159.
T-Mobile confirms biggest phone customer data breach, http://www.guardian. co.uk/uk/2009/nov/17/t-mobile-phone-data-privacy
- 160.
EU warns on Facebook privacy, http://www.nytimes.com/2009/01/27/technology/ 27iht-facebook.4-417144.html
- 161.
German minister warns Facebook over privacy rules, http://blog.foreignpolicy. com/posts/2010/04/05/german_minister_warns_facebook_over_privacy_rules
- 162.
C. Cattuto, W. Van den Broeck, A. Barrat, V. Colizza, J.-F. Pinton, A. Vespignani, PLoS ONE 5, e11596 (2010)
- 163.
J. Krumm, Person. Ubiquit. Comp. 13, 391 (2009)
- 164.
D. Helbing, W. Yu, PNAS 107, 5265 (2010)
- 165.
Internet Reputation Management: neutralize negative publicity, http://www. internet-reputation-management.com/
- 166.
Reputation Management Consultants, http://www.reputationmanagementconsultants. com/
- 167.
Reputation Defender, http://www.reputationdefender.com/
- 168.
Squidoo: Internet Reputation Management, http://www.squidoo.com/internet- reputation-management
- 169.
European privacy seals for IT products and IT-based services, https://www. european-privacy-seal.eu/
- 170.
Ixquick: the world’s most private search engine, http://ixquick.com/
- 171.
RottenNeighbor.com was a website created to post information about neighbors and find information about new potential neighbors before moving. Launched in July 2007, it was discontinued in July 2009
- 172.
Digging into Data List of Data Repositories, http://www.diggingintodata.org/ Repositories/tabid/167/Default.aspx
- 173.
Digging into Data, http://www.diggingintodata.org/
- 174.
Transparency is at the heart of this Government, Data.gov.uk is home to national & local data for free re-use, http://data.gov.uk
- 175.
Data.Gov Empowering people, http://www.data.gov
- 176.
Dataverse Project: An Open-Source Application for Publishing, Citing and Discovering Research Data, http://thedata.org/
- 177.
Apache WSIF: Web Service Invocation Framework, http://ws.apache.org/wsif/
- 178.
ETH Financial Crisis Observatory, http://www.er.ethz.ch/fco/index
- 179.
123 People, http://www.123people.com
- 180.
Oakland Crimespotting is an interactive map of crimes in Oakland and a tool for understanding crime in cities, http://oakland.crimespotting.org
- 181.
Government requests directed to Google and YouTube, http://www.google.com/ governmentrequests/
- 182.
Mechanical Turk is a market place for work, https://www.mturk.com/mturk/welcome
- 183.
Micro Payment: professional payment provider, http://micropayment.de
- 184.
Vanish: self-destructing digital data, http://vanish.cs.washington.edu
- 185.
Did you watch porn? http://www.didyouwatchporn.com
- 186.
What the Internet knows about you, This page checks your browser history and determines which of the 5000 most popular Internet websites you’ve recently visited, http://www.whattheinternetknowsaboutyou.com
- 187.
P. Eckersley, How Unique Is Your Web Browser? (Electronic Frontier Foundation, 2009)
- 188.
Panopticlick: How unique and trackable is your browser? https://panopticlick. eff.org
- 189.
EFF: Forget cookies, your browser has fingerprints, http://www.computerworld. com/s/article/9176904/EFF_Forget_cookies_your_browser_has_fingerprints
- 190.
WUALA, Backup. Store. Share. Access Everywhere, http://www.wuala.com/
- 191.
Tor: anonymity online, http://www.torproject.org/
- 192.
Freenet, the free network, http://freenetproject.org/
- 193.
QLectives (Quality Collectives), http://www.qlectives.eu
- 194.
Datenschutz fr iPhone-Apps, http://www.ethlife.ethz.ch/archive_articles/ 100930_MBusiness_Apps_sch/index
- 195.
DIASPORA, The privacy aware, personally controlled, do-it-all, open source social network, http://www.joindiaspora.com/
- 196.
Security Focus, http://www.securityfocus.com
- 197.
ICKN Galaxy Advisors, http://ickn.org
- 198.
PostRank: Intelligence from the social web, http://www.postrank.com/
- 199.
Soziale Netzwerke verraten künftiges Käuferverhalten, http://www.tagesanzeiger. ch/digital/internet/Soziale-Netzwerke-verraten-kuenftiges-Kaeuferverhalten/ story/19928880
- 200.
M.M. Gaber, A. Zaslavsky, S. Krishnaswamy, ACM SIGMOD Record Arch. 34, 18 (2005)
- 201.
A. Bifet, R.K. August, Data Stream Mining: A Practical Approach (The University of Waikato, 2009)
- 202.
J. Leskovec, L. Backstrom, J. Kleinberg, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (2009), p. 497
- 203.
R. Agrawal, R. Srikant, Proceedings of the 2000 ACM SIGMOD international conference on Management of data (2000), p. 439
- 204.
P. Samarati, L. Sweeney, Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (ACM Press, 1998)
- 205.
C.C. Aggarwal, P.S. Yu, Privacy-Preserving Data Mining: Models and Algorithms (Springer, 2008), p. 530
- 206.
M. Atzori, F. Bonchi, F. Giannotti, D. Pedreschi, VLDB J. 17, 703 (2006)
- 207.
B.C. Chen, D. Kifer, K. LeFevre, A., Machanavajjhala, Found. Trends Databases 2, 1167 (2009)
- 208.
B.-C. Chen, D. Kifer, K. LeFevre, A., Machanavajjhala, Found. Trends Databases 2, 1167 (2009)
- 209.
A. Narayanan, V. Shmatikov, IEEE Symposium on In Security and Privacy SP 2008 (IEEE Symposium, 2008), p. 111
- 210.
R. Jones, R. Kumar, B. Pang, A. Tomkins, CIKM ’08: Proceeding of the 17th ACM conference on Information and knowledge management (2008), p. 853
- 211.
F. Giannotti, D. Pedreschi, Mobility, Data Mining and Privacy: Geographic Knowledge Discovery (Springer, 2008), p. 410
- 212.
A. Monreale, G. Andrienko, N. Andrienko, F. Giannotti, D. Pedreschi, S. Rinzivillo, S. Wrobel, Transactions on Data Privacy 3, 91 (2010), http://www.tdp.cat/ issues/abs.a045a10.php
- 213.
Project Gaydar, http://www.boston.com/bostonglobe/ideas/articles/2009/09/20/ project_gaydar_an_mit_experiment_raises_new_questions_about_online_privacy/
Author information
Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Helbing, D., Balietti, S. From social data mining to forecasting socio-economic crises. Eur. Phys. J. Spec. Top. 195, 3 (2011). https://doi.org/10.1140/epjst/e2011-01401-8
Received:
Revised:
Published:
Keywords
- Recommender System
- European Physical Journal Special Topic
- Reality Mining
- Computational Social Science
- Electronic Frontier Foundation