Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey

Understanding Human-Machine Networks: A Cross-Disciplinary Survey

Published: 04 April 2017 Publication History
  • Get Citation Alerts
  • Abstract

    In the current hyperconnected era, modern Information and Communication Technology (ICT) systems form sophisticated networks where not only do people interact with other people, but also machines take an increasingly visible and participatory role. Such Human-Machine Networks (HMNs) are embedded in the daily lives of people, both for personal and professional use. They can have a significant impact by producing synergy and innovations. The challenge in designing successful HMNs is that they cannot be developed and implemented in the same manner as networks of machines nodes alone, or following a wholly human-centric view of the network. The problem requires an interdisciplinary approach. Here, we review current research of relevance to HMNs across many disciplines. Extending the previous theoretical concepts of socio-technical systems, actor-network theory, cyber-physical-social systems, and social machines, we concentrate on the interactions among humans and between humans and machines. We identify eight types of HMNs: public-resource computing, crowdsourcing, web search engines, crowdsensing, online markets, social media, multiplayer online games and virtual worlds, and mass collaboration. We systematically select literature on each of these types and review it with a focus on implications for designing HMNs. Moreover, we discuss risks associated with HMNs and identify emerging design and development trends.

    Supplementary Material

    a12-tsvetkova-apndx.pdf (tsvetkova.zip)
    Supplemental movie, appendix, image and software files for, Understanding Human-Machine Networks: A Cross-Disciplinary Survey

    References

    [1]
    Mavis T. Adjei, Stephanie M. Noble, and Charles H. Noble. 2010. The influence of C2C communications in online brand communities on customer purchase behavior. Journal of the Academy of Marketing Science 38 (2010), 634.
    [2]
    Eugene Agichtein, Carlos Castillo, Debora Donato, Aristides Gionis, and Gilad Mishne. 2008. Finding high-quality content in social media. In Proceedings of the International Conference on Web Search and Web Data Mining (WSDM’08). ACM, New York, 183.
    [3]
    B. E. Aguirre, Dennis Wenger, and Gabriela Vigo. 1998. A test of the emergent norm theory of collective behavior. Sociological Forum 13, 2 (1998), 301--320.
    [4]
    Mohammad Allahbakhsh, Boualem Benatallah, Aleksandar Ignjatovic, Hamid Reza Motahari-Nezhad, Elisa Bertino, and Schahram Dustdar. 2013. Quality control in crowdsourcing systems: Issues and directions. IEEE Internet Computing 17, 2 (2013), 76--81.
    [5]
    David P. Anderson. 2004. BOINC: A system for public-resource computing and storage. In Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing. IEEE, 4--10.
    [6]
    David P. Anderson, Jeff Cobb, Eric Korpela, Matt Lebofsky, and Dan Werthimer. 2002. SETI@home: An experiment in public-resource computing. Communications of the ACM 45, 11 (2002), 56--61.
    [7]
    Arvind Arasu, Junghoo Cho, Hector Garcia-Molina, Andreas Paepcke, and Sriram Raghavan. 2001. Searching the web. ACM Transactions on Internet Technology 1, 1 (2001), 2--43.
    [8]
    Alexandre Ardichvili. 2008. Learning and knowledge sharing in virtual communities of practice: Motivators, barriers, and enablers. Advances in Developing Human Resources 10, 4 (2008), 541--554.
    [9]
    Ilkka Arminen. 2006. Social functions of location in mobile telephony. Personal and Ubiquitous Computing 10, 5 (2006), 319--323.
    [10]
    Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The internet of things: A survey. Computer Networks 54, 15 (2010), 2787--2805.
    [11]
    Hyunmi Baek, JoongHo Ahn, and Youngseok Choi. 2012. Helpfulness of online consumer reviews: Readers’ objectives and review cues. International Journal of Electronic Commerce 17, 2 (2012), 99--126.
    [12]
    Richard P. Bagozzi and Utpal M. Dholakia. 2006. Open source software user communities: A study of participation in Linux user groups. Management Science 52, 7 (2006), 1099--1115.
    [13]
    Eytan Bakshy, Solomon Messing, and Lada Adamic. 2015. Exposure to ideologically diverse news and opinion on facebook. Science 348, 6239 (2015), 1130--1132.
    [14]
    Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. 2012. The role of social networks in information diffusion. In Proceedings of the 21st International Conference on World Wide Web (WWW’12). ACM, 519.
    [15]
    Carliss Y. Baldwin and Kim B. Clark. 2006. The architecture of participation: Does code architecture mitigate free riding in the open source development model? Management Science 52, 7 (2006), 1116--1127.
    [16]
    Mesut E. Baran and Felix F. Wu. 1989. Network reconfiguration in distribution systems for loss reduction and load balancing. IEEE Transactions on Power Delivery 4, 2 (1989), 1401--1407.
    [17]
    Barry L. Bayus. 2013. Crowdsourcing new product ideas over time: An analysis of the Dell ideastorm community. Management Science 59, 1 (2013), 226--244.
    [18]
    Adam L. Beberg, Daniel L. Ensign, Guha Jayachandran, Siraj Khaliq, and Vijay S. Pande. 2009. Folding@home: Lessons from eight years of volunteer distributed computing. In Proceedings of the 2009 IEEE International Symposium on Parallel 8 Distributed Processing. IEEE, 1--8.
    [19]
    Hind Benbya and Bill McKelvey. 2006. Toward a complexity theory of information systems development. Information Technology 8 People 19, 1 (2006), 12--34.
    [20]
    Tim Berners-Lee. 2000. Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web. Collins Business, London. 256 pages.
    [21]
    Michael S. Bernstein, Greg Little, Robert C. Miller, Björn Hartmann, Mark S. Ackerman, David R. Karger, David Crowell, and Katrina Panovich. 2010. Soylent: A word processor with a crowd inside. In Proceedings of the 23nd Annual ACM Symposium on User Interface Software and Technology (UIST’10). ACM, New York, 313.
    [22]
    Christian Bird, David Pattison, Raissa D’Souza, Vladimir Filkov, and Premkumar Devanbu. 2008. Latent social structure in open source projects. In Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering (SIGSOFT’08/FSE-16). ACM, New York, 24.
    [23]
    Stefano Boccaletti, Vito Latora, Yamir Moreno, Martin Chavez, and Dong-Uk Hwang. 2006. Complex networks: Structure and dynamics. Physics Reports 424, 4--5 (2006), 175--308.
    [24]
    Robert M. Bond, Christopher J. Fariss, Jason J. Jones, Adam D. I. Kramer, Cameron Marlow, Jaime E. Settle, and James H. Fowler. 2012. A 61-million-person experiment in social influence and political mobilization. Nature 489, 7415 (2012), 295--298.
    [25]
    Richard E. Boyatzis. 2006. An overview of intentional change from a complexity perspective. Journal of Management Development 25, 7 (2006), 607--623.
    [26]
    Danah M. Boyd and Nicole B. Ellison. 2007. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13, 1 (2007), 210--230.
    [27]
    Daren C. Brabham. 2008. Crowdsourcing as a model for problem solving. Convergence: The International Journal of Research into New Media Technologies 14, 1 (2008), 75--90.
    [28]
    Sergey Brin and Lawrence Page. 2012. Reprint of: The anatomy of a large-scale hypertextual web search engine. Computer Networks 56, 18 (2012), 3825--3833.
    [29]
    Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva. 1998. A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking. ACM, 85--97.
    [30]
    André Brock. 2012. From the blackhand side: Twitter as a cultural conversation. Journal of Broadcasting 8 Electronic Media 56, 4 (2012), 529--549.
    [31]
    Ignasi Buch, Matt J. Harvey, Toni Giorgino, David P. Anderson, and Gianni De Fabritiis. 2010. High-throughput all-atom molecular dynamics simulations using distributed computing. Journal of Chemical Information and Modeling 50, 3 (2010), 397--403.
    [32]
    Vanilson Burégio, Silvio Meira, and Nelson Rosa. 2013. Social machines: A unified paradigm to describe social Web-oriented systems. In International World Wide Web Conference Committee (IW3C2). WWW 2013 Companion, 1--5.
    [33]
    Francesco Calabrese, Massimo Colonna, Piero Lovisolo, Dario Parata, and Carlo Ratti. 2011. Real-time urban monitoring using cell phones: A case study in rome. IEEE Transactions on Intelligent Transport Systems 12, 1 (2011), 141--151.
    [34]
    Valeria Cardellini, Michele Colajanni, and S. Yu Philip. 1999. Dynamic load balancing on web-server systems. IEEE Internet Computing 3, 3 (1999), 28--39.
    [35]
    Claudio Carpineto and Giovanni Romano. 2012. A survey of automatic query expansion in information retrieval. ACM Computing Surveys 44, 1 (2012), 1--50.
    [36]
    Manuel Castells. 2011. The Rise of the Network Society: The Information Age: Economy, Society, and Culture. Vol. 1. John Wiley 8 Sons.
    [37]
    Damon Centola and Arnout van de Rijt. 2015. Choosing your network: Social preferences in an online health community. Social Science 8 Medicine (1982) 125 (2015), 19--31.
    [38]
    David Chen, Guy Doumeingts, and François Vernadat. 2008. Architectures for enterprise integration and interoperability: Past, present and future. Computers in Industry 59, 7 (2008), 647--659.
    [39]
    Duan-Bing Chen, Hui Gao, Linyuan Lü, and Tao Zhou. 2013. Identifying influential nodes in large-scale directed networks: The role of clustering. PloS One 8, 10 (2013), e77455.
    [40]
    Coye Cheshire. 2011. Online trust, trustworthiness, or assurance? Daedalus 140, 4 (2011), 49--58.
    [41]
    Francesco Chiti, Romano Fantacci, Leonardo Maccari, Dania Marabissi, and Daniele Tarchi. 2008. A broadband wireless communications system for emergency management. IEEE Wireless Communications 15, 3 (2008), 8--14.
    [42]
    Chao-Min Chiu, Meng-Hsiang Hsu, and Eric T. G. Wang. 2006. Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories. Decision Support Systems 42, 3 (2006), 1872--1888.
    [43]
    Dongseong Choi and Jinwoo Kim. 2004. Why people continue to play online games: In search of critical design factors to increase customer loyalty to online contents. Cyberpsychology 8 Behavior 7, 1 (2004), 11--24.
    [44]
    Delphine Christin, Andreas Reinhardt, Salil S. Kanhere, and Matthias Hollick. 2011. A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software 84, 11 (2011), 1928--1946.
    [45]
    Mark Claypool and Kajal Claypool. 2006. Latency and player actions in online games. Communications of the ACM 49, 11 (2006), 40.
    [46]
    Kevyn Collins-Thompson, Paul N. Bennett, Ryen W. White, Sebastian de la Chica, and David Sontag. 2011. Personalizing web search results by reading level. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM’11). ACM, New York, 403.
    [47]
    Sunny Consolvo, Ryan Libby, Ian Smith, James A. Landay, David W. McDonald, Tammy Toscos, Mike Y. Chen, Jon Froehlich, Beverly Harrison, Predrag Klasnja, Anthony LaMarca, and Louis LeGrand. 2008. Activity sensing in the wild: A field trial of UbiFit garden. In Proceedings of the 26th Annual CHI Conference on Human Factors in Computing Systems (CHI’08). ACM, New York, 1797.
    [48]
    Seth Cooper, Firas Khatib, Adrien Treuille, Janos Barbero, Jeehyung Lee, Michael Beenen, Andrew Leaver-Fay, David Baker, Zoran Popović, and Foldit Players. 2010. Predicting protein structures with a multiplayer online game. Nature 466, 7307 (2010), 756--760.
    [49]
    Cynthia L. Corritore, Beverly Kracher, and Susan Wiedenbeck. 2003. On-line trust: Concepts, evolving themes, a model. International Journal of Human-Computer Studies 58, 6 (2003), 737--758.
    [50]
    Kevin Crowston and James Howison. 2005. The social structure of free and open source software development. First Monday 10, 2 (2005).
    [51]
    Kevin Crowston, Kangning Wei, James Howison, and Andrea Wiggins. 2012. Free/libre open-source software development. ACM Computing Surveys 44, 2 (2012), 1--35.
    [52]
    Antonio Cuomo, Giuseppe Di Modica, Salvatore Distefano, Antonio Puliafito, Massimiliano Rak, Orazio Tomarchio, Salvatore Venticinque, and Umberto Villano. 2012. An SLA-based broker for cloud infrastructures. Journal of Grid Computing 11, 1 (2012), 1--25.
    [53]
    Leucio Cutillo, Refik Molva, and Thorsten Strufe. 2009. Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47, 12 (2009), 94--101.
    [54]
    Yves-Alexandre de Montjoye, César A. Hidalgo, Michel Verleysen, and Vincent D. Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific Reports 3 (2013), 1376.
    [55]
    Travis Desell, Robert Bergman, Kyle Goehner, Ronald Marsh, Rebecca VanderClute, and Susan Ellis-Felege. 2013. Wildlife@Home: Combining crowd sourcing and volunteer computing to analyze avian nesting video. In Proceedings of the 2013 IEEE 9th International Conference on e-Science. IEEE, 107--115.
    [56]
    Anhai Doan, Raghu Ramakrishnan, and Alon Y. Halevy. 2011. Crowdsourcing systems on the world-wide web. Communications of the ACM 54, 4 (2011), 86.
    [57]
    Vanessa Doctor. 2013. Hashtag history: When and what started it? Retrieved from https://www.hashtags.org/featured/hashtag-history-when-and-what-started-it/.
    [58]
    Judith Donath and Danah Boyd. 2004. Public displays of connection. BT Technology Journal 22, 4 (2004), 71--82.
    [59]
    Joan Antoni Donet Donet, Cristina Pérez-Solà, and Jordi Herrera-Joancomartí. 2014. The bitcoin P2P network. In Financial Cryptography and Data Security, Rainer Böhme, Michael Brenner, Tyler Moore, and Matthew Smith (Eds.). Lecture Notes in Computer Science, Vol. 8438. Springer, Berlin, 87--102.
    [60]
    Nicolas Ducheneaut and Robert J. Moore. 2004. The social side of gaming: A study of interaction patterns in a massively multiplayer online game. In Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW’04). ACM, New York, 360.
    [61]
    Nicolas Ducheneaut, Nicholas Yee, Eric Nickell, and Robert J. Moore. 2006. Alone together? Exploring the social dynamics of massively multiplayer online games. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’06). ACM, New York, 407.
    [62]
    Nicolas Ducheneaut, Nicholas Yee, Eric Nickell, and Robert J. Moore. 2007. The life and death of online gaming communities: A look at guilds in world of warcraft. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07). ACM, New York, 839.
    [63]
    Catherine Dwyer, Starr Roxanne Hiltz, and Katia Passerini. 2007. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. Retrieved from http://aisel.aisnet.org/cgi/viewcontent.cgi?article=18498context=amcis2007.
    [64]
    Aslak Wegner Eide, J. Brian Pickering, Taha Yasseri, George Bravos, Asbjørn Følstad, Vegard Engen, Paul Walland, Eric T. Meyer, and Milena Tsvetkova. 2016. Human-machine networks: Towards a typology and profiling framework. In HCI International. Springer, Toronto, Canada.
    [65]
    Fred E. Emery and Eric L. Trist. 1965. The causal texture of organizational environments. Human Relations 18, 1 (1965), 21--32.
    [66]
    Enrique Estelles-Arolas and Fernando González-Ladrón-de Guevara. 2012. Towards an integrated crowdsourcing definition. Journal of Information Science 38, 2 (2012), 189--200.
    [67]
    Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, New York, 351.
    [68]
    Yulin Fang and Derrick Neufeld. 2009. Understanding sustained participation in open source software projects. Journal of Management Information Systems 25, 4 (2009), 9--50.
    [69]
    Matthew Faulkner, MingHei Cheng, Andreas Krause, Robert Clayton, Thomas Heaton, K. Mani Chandy, Monica Kohler, Julian Bunn, Richard Guy, Annie Liu, and Michael Olson. 2014. Community sense and response systems: Your phone as quake detector. Communications of the ACM 57, 7 (2014), 66--75.
    [70]
    Joe Fortunato. 2013. The hastag: A history deeper than Twitter. (2013). http://www.copypress.com/blog/the-hashtag-a-history-deeper-than-twitter/.
    [71]
    Santo Fortunato. 2010. Community detection in graphs. Physics Reports 486, 3--5 (2010), 75--174.
    [72]
    Ian Foster, Carl Kesselman, and Steven Tuecke. 2001. The anatomy of the grid: Enabling scalable virtual organizations. International Journal of High Performance Computing Applications 15, 3 (2001), 200--222.
    [73]
    Bruno S. Frey and Reto Jegen. 1999. Motivation Crowding Theory: A Survey of Empirical Evidence. Institute for Empirical Research in Economics, University of Zurich.
    [74]
    Jon Froehlich, Tawanna Dillahunt, Predrag Klasnja, Jennifer Mankoff, Sunny Consolvo, Beverly Harrison, and James A. Landay. 2009. UbiGreen: Investigating a mobile tool for tracking and supporting green transportation habits. In Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI’09). ACM, New York, 1043.
    [75]
    Raghu Ganti, Fan Ye, and Hui Lei. 2011. Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine 49, 11 (2011), 32--39.
    [76]
    Raghu K. Ganti, Nam Pham, Hossein Ahmadi, Saurabh Nangia, and Tarek F. Abdelzaher. 2010. GreenGPS: A participatory sensing fuel-efficient maps application. In Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys’10). ACM, New York, 151.
    [77]
    Bura Gedik and Ling Liu. 2008. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7, 1 (2008), 1--18.
    [78]
    David Geiger, Stefan Seedorf, Thimo Schulze, Robert C. Nickerson, and Martin Schader. 2011. Managing the crowd: Towards a taxonomy of crowdsourcing processes. (2011). http://aisel.aisnet.org/amcis2011_submissions/430
    [79]
    Eric Gilbert and Karrie Karahalios. 2009. Predicting tie strength with social media. In Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI’09). ACM, New York, 211.
    [80]
    Howard Giles and Jane Giles. 2012. Ingroups and outgroups. In Inter/Cultural Communication: Representation and Construction of Culture., Anastacia Kurylo (Ed.). Sage Publications, Chapter 7, 141--161.
    [81]
    Kimberly Glasgow and Clayton Fink. 2013. Hashtag lifespan and social networks during the London riots. In Social Computing, Behavioral-Cultural Modeling and Prediction. Springer, 311--320.
    [82]
    Lakshmi Goel, Norman Johnson, Iris Junglas, and Blake Ives. 2013. Predicting users’ return to virtual worlds: A social perspective. Information Systems Journal 23, 1 (2013), 35--63.
    [83]
    Sreenivas Gollapudi and Aneesh Sharma. 2009. An axiomatic approach for result diversification. In Proceedings of the 18th International Conference on World Wide Web (WWW’09). ACM, New York, 381.
    [84]
    Rajdeep Grewal, Gary L. Lilien, and Girish Mallapragada. 2006. Location, location, location: How network embeddedness affects project success in open source systems. Management Science 52, 7 (2006), 1043--1056.
    [85]
    Bin Guo, Zhu Wang, Zhiwen Yu, Yu Wang, Neil Y. Yen, Runhe Huang, and Xingshe Zhou. 2015. Mobile crowd sensing and computing. ACM Computing Surveys 48, 1 (2015), 1--31.
    [86]
    Bin Guo, Daqing Zhang, Zhu Wang, Zhiwen Yu, and Xingshe Zhou. 2013. Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things. Journal of Network and Computer Applications 36, 6 (2013), 1531--1539.
    [87]
    Johannes Hachmann, Roberto Olivares-Amaya, Sule Atahan-Evrenk, Carlos Amador-Bedolla, Roel S. Sanchez-Carrera, Aryeh Gold-Parker, Leslie Vogt, Anna M. Brockway, and Alan Aspuru-Guzik. 2011. The Harvard clean energy project: Large-scale computational screening and design of organic photovoltaics on the World Community Grid. The Journal of Physical Chemistry Letters 2, 17 (2011), 2241--2251.
    [88]
    Jungpil Hahn, Jae Yun Moon, and Chen Zhang. 2008. Emergence of new project teams from open source software developer networks: Impact of prior collaboration ties. Information Systems Research 19, 3 (2008), 369--391.
    [89]
    Robin Hanson, Ryan Oprea, and David Porter. 2006. Information aggregation and manipulation in an experimental market. Journal of Economic Behavior 8 Organization 60, 4 (2006), 449--459.
    [90]
    Thomas Hardjono and Brian Weis. 2004. The multicast group security architecture. (2004). https://tools.ietf.org/html/rfc3740
    [91]
    Alexander Hars and Shaosong Ou. 2001. Working for free? Motivations of participating in open source projects. In Proceedings of the 34th Annual Hawaii International Conference on System Sciences. IEEE.
    [92]
    Yongqiang He, Rubao Lee, Yin Huai, Zheng Shao, Namit Jain, Xiaodong Zhang, and Zhiwei Xu. 2011. RCFile: A fast and space-efficient data placement structure in MapReduce-based warehouse systems. In Proceedings of the 27th International Conference on Data Engineering. IEEE, 1199--1208.
    [93]
    Guido Hertel, Sven Niedner, and Stefanie Herrmann. 2003. Motivation of software developers in open source projects: An internet-based survey of contributors to the linux kernel. Research Policy 32, 7 (2003), 1159--1177.
    [94]
    Paul Heymann, Georgia Koutrika, and Hector Garcia-Molina. 2008. Can social bookmarking improve web search?. In Proceedings of the International Conference on Web Search and Web Data Mining (WSDM’08). ACM, New York, 195.
    [95]
    Michael A. Hogg and Scott A. Reid. 2006. Social identity, self-categorization, and the communication of group norms. Communication Theory 16 (2006), 7--30.
    [96]
    Susan Horwitz, Thomas Reps, and David Binkley. 2004. Interprocedural slicing using dependence graphs. ACM SIGPLAN Notices 39, 4 (2004), 229.
    [97]
    Jeff Howe. 2006. The rise of crowdsourcing. Wired Magazine 14, 6 (2006), 1--4.
    [98]
    Desislava Hristova, Giovanni Quattrone, Afra J. Mashhadi, and Licia Capra. 2013. The life of the party: Impact of social mapping in OpenStreetMap. In Proceedings of the 7th International Conference on Weblogs and Social Media (ICWSM’13). 234--243.
    [99]
    Shun-Yun Hu, Jui-Fa Chen, and Tsu-Han Chen. 2006. VON: A scalable peer-to-peer network for virtual environments. IEEE Network 20, 4 (2006), 22--31.
    [100]
    Jeff Huang and Efthimis N. Efthimiadis. 2009. Analyzing and evaluating query reformulation strategies in web search logs. In Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM’09). ACM, New York, 77.
    [101]
    Kuan Lun Huang, Salil S. Kanhere, and Wen Hu. 2010. Preserving privacy in participatory sensing systems. Computer Communications 33, 11 (2010), 1266--1280.
    [102]
    Markus C. Huebscher and Julie A. McCann. 2008. A survey of autonomic computing degrees, models, and applications. ACM Computing Surveys 40, 3 (2008), 7.
    [103]
    Daniel Hughes, Geoff Coulson, and James Walkerdine. 2005. Free riding on gnutella revisited: The bell tolls? IEEE Distributed Systems Online 6, 6 (2005), 1.
    [104]
    Panagiotis G. Ipeirotis, Foster Provost, and Jing Wang. 2010. Quality management on amazon mechanical turk. In Proceedings of the ACM SIGKDD Workshop on Human Computation (HCOMP’10). ACM, New York, 64.
    [105]
    Bernard J. Jansen, Danielle L. Booth, and Amanda Spink. 2008. Determining the informational, navigational, and transactional intent of web queries. Information Processing 8 Management 44, 3 (2008), 1251--1266.
    [106]
    Haiyan Jia, Mu Wu, Eunhwa Jung, Alice Shapiro, and S. Shyam Sundar. 2012. Balancing human agency and object agency: An end-user interview study of the internet of things. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, 1185--1188.
    [107]
    Jeff Jones. 2010. The emergence and dynamical evolution of complex transport networks from simple low-level behaviours. International Journal of Unconventional Computing 6, 2 (2010), 125--144.
    [108]
    Kiku Jones and Lori N. K. Leonard. 2008. Trust in consumer-to-consumer electronic commerce. Information 8 Management 45, 2 (2008), 88--95.
    [109]
    Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (2007), 618--644.
    [110]
    David Julian, Mung Chiang, Daniel O’Neill, and Stephen Boyd. 2002. QoS and fairness constrained convex optimization of resource allocation for wireless cellular and ad hoc networks. In Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’02), Vol. 2. IEEE, 477--486.
    [111]
    Vihang Kamble and Vinod Sharma. 2004. A simple approach to provide QoS and fairness in internet. In Proceedings of the International Conference on Signal Processing and Communications. 412--417.
    [112]
    Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International Conference on World Wide Web (WWW’03). ACM, New York, 640.
    [113]
    Andreas M. Kaplan and Michael Haenlein. 2010. Users of the world, unite! The challenges and opportunities of social media. Business Horizons 53, 1 (2010), 59--68.
    [114]
    Alexander Kawrykow, Gary Roumanis, Alfred Kam, Daniel Kwak, Clarence Leung, Chu Wu, Eleyine Zarour, Luis Sarmenta, Mathieu Blanchette, and Jérôme Waldispühl. 2012. Phylo: A citizen science approach for improving multiple sequence alignment. PloS One 7, 3 (2012), e31362.
    [115]
    Jeffrey O. Kephart and David M. Chess. 2003. The vision of autonomic computing. Computer 36, 1 (2003), 41--50.
    [116]
    Wazir Zada Khan, Yang Xiang, Mohammed Y. Aalsalem, and Quratulain Arshad. 2013. Mobile phone sensing systems: A survey. IEEE Communications Surveys 8 Tutorials 15, 1 (2013), 402--427.
    [117]
    Firas Khatib, Seth Cooper, Michael D. Tyka, Kefan Xu, Ilya Makedon, Zoran Popovic, David Baker, and Foldit Players. 2011. Algorithm discovery by protein folding game players. Proceedings of the National Academy of Sciences 108, 47 (2011), 18949--18953.
    [118]
    Jan H. Kietzmann, Bruno S. Silvestre, Ian P. McCarthy, and Leyland F. Pitt. 2012. Unpacking the social media phenomenon: Towards a research agenda. Journal of Public Affairs 12, 2 (2012), 109--119.
    [119]
    Won Kim, Ok-Ran Jeong, and Sang-Won Lee. 2010. On social web sites. Information Systems 35, 2 (2010), 215--236.
    [120]
    Aniket Kittur, Jeffrey V. Nickerson, Michael Bernstein, Elizabeth Gerber, Aaron Shaw, John Zimmerman, Matt Lease, and John Horton. 2013. The future of crowd work. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW’13). ACM, New York, 1301.
    [121]
    Aniket Kittur, Boris Smus, Susheel Khamkar, and Robert E. Kraut. 2011. CrowdForge: Crowdsourcing complex work. In Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology (UIST’11). ACM, New York, 43.
    [122]
    Jon M. Kleinberg. 1999. Authoritative sources in a hyperlinked environment. Journal of the ACM 46, 5 (1999), 604--632.
    [123]
    Michal Kosinski, David Stillwell, and Thore Graepel. 2013. Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences 110, 15 (2013), 5802--5805.
    [124]
    Iordanis Koutsopoulos. 2013. Optimal incentive-driven design of participatory sensing systems. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’13). 1402--1410.
    [125]
    Adam D. I. Kramer, Jamie E. Guillory, and Jeffrey T. Hancock. 2014. Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences 111, 24 (2014), 8788--8790.
    [126]
    Hanna Krasnova, Sarah Spiekermann, Ksenia Koroleva, and Thomas Hildebrand. 2010. Online social networks: Why we disclose. Journal of Information Technology 25, 2 (2010), 109--125.
    [127]
    Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. 2010. What is twitter, a social network or a news media?. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, New York, 591.
    [128]
    Karim R. Lakhani, Kevin J. Boudreau, Po-Ru Loh, Lars Backstrom, Carliss Baldwin, Eric Lonstein, Mike Lydon, Alan MacCormack, Ramy A. Arnaout, and Eva C. Guinan. 2013. Prize-based contests can provide solutions to computational biology problems. Nature Biotechnology 31, 2 (2013), 108--111.
    [129]
    Karim R. Lakhani and Eric von Hippel. 2003. How open source software works: “Free” user-to-user assistance. Research Policy 32, 6 (2003), 923--943.
    [130]
    Nicholas Lane, Emiliano Miluzzo, Hong Lu, Daniel Peebles, Tanzeem Choudhury, and Andrew Campbell. 2010. A survey of mobile phone sensing. IEEE Communications Magazine 48, 9 (2010), 140--150.
    [131]
    David J. Langley, Maarten C. Hoeve, J. Roland Ortt, Nico Pals, and Bob van der Vecht. 2014. Patterns of herding and their occurrence in an online setting. Journal of Interactive Marketing 28, 1 (2014), 16--25.
    [132]
    Bruno Latour. 2005. Reassembling the Social—An Introduction to Actor-Network-Theory. Oxford University Press, Oxford, UK.
    [133]
    John Law. 1992. Notes on the theory of the actor-network: Ordering, strategy, and heterogeneity. Systems Practice 5, 4 (1992), 379--393.
    [134]
    Jeehyung Lee, Wipapat Kladwang, Minjae Lee, Daniel Cantu, Martin Azizyan, Hanjoo Kim, Alex Limpaecher, Sungroh Yoon, Adrien Treuille, and Rhiju Das. 2014. RNA design rules from a massive open laboratory. Proceedings of the National Academy of Sciences 111, 6 (2014), 2122--2127.
    [135]
    John D. Lee and Neville Moray. 1992. Trust, control strategies and allocation of function in human-machine systems. Ergonomics 35, 10 (1992), 1243--1270.
    [136]
    John D. Lee and Katrina A. See. 2004. Trust in automation: Designing for appropriate reliance. The Journal of the Human Factors and Ergonomics of Society 46, 1 (2004), 50--80.
    [137]
    Juong-Sik Lee and Baik Hoh. 2010. Sell your experiences: A market mechanism based incentive for participatory sensing. In Proceedings of the 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom). 60--68.
    [138]
    Kyu-Min Lee, Byungjoon Min, and Kwang-Il Goh. 2015. Towards real-world complexity: An introduction to multiplex networks. The European Physical Journal B 88, 2 (2015), 1--20.
    [139]
    Mikaila Mariel Lemonik Arthur. 2013. Emergent norm theory. In The Wiley-Blackwell Encyclopedia of Social and Political Movements. Blackwell Publishing Ltd, Oxford, UK.
    [140]
    Paul M. Leonardi. 2012. Materiality, sociomateriality, and socio-technical systems: What do these terms mean? How are they related? Do we need them? In Materiality and Organizing: Social Interaction in a Technological World, Paul M. Leonardi, B. A. Nardi, and J. Kallinikos (Eds.). Oxford University Press, Oxford, 25--48.
    [141]
    Loet Leydesdorff, Félix de Moya-Anegón, and Vicente P. Guerrero-Bote. 2015. Journal maps, interactive overlays, and the measurement of interdisciplinarity on the basis of scopus data (1996--2012). Journal of the Association for Information Science and Technology 66, 5 (2015), 1001--1016.
    [142]
    Loet Leydesdorff, Ismael Rafols, and Chaomei Chen. 2013. Interactive overlays of journals and the measurement of interdisciplinarity on the basis of aggregated journal-journal citations. Journal of the American Society of Information Science 8 Technology 64, 12 (2013), 2573--2586.
    [143]
    Qinghua Li, Guohong Cao, and Thomas F. La Porta. 2014. Efficient and privacy-aware data aggregation in mobile sensing. IEEE Transactions on Dependable and Secure Computing 11, 2 (2014), 115--129.
    [144]
    Carolyn A. Lin. 2003. An interactive communication technology adoption model. Communication Theory 13, 4 (2003), 345--365.
    [145]
    Heshan Lin, Xiaosong Ma, Jeremy Archuleta, Wu-chun Feng, Mark Gardner, and Zhe Zhang. 2010. MOON: MapReduce on opportunistic environments. In Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing (HPDC’10). ACM, New York, 95.
    [146]
    Kuan-Yu Lin and Hsi-Peng Lu. 2011. Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior 27, 3 (2011), 1152--1161.
    [147]
    Yingzi Lin, W. J. Zhang, and L. Glen Watson. 2003. Using eye movement parameters for evaluating human-machine interface frameworks under normal control operation and fault detection situations. International Journal of Human-Computer Studies 59, 6 (2003), 837--873.
    [148]
    Jan Lorenz, Heiko Rauhut, Frank Schweitzer, and Dirk Helbing. 2011. How social influence can undermine the wisdom of crowd effect. Proceedings of the National Academy of Sciences 108, 22 (2011), 9020--9025.
    [149]
    Long J. Lu, Andrea Sboner, Yuanpeng J. Huang, Hao Xin Lu, Tara A Gianoulis, Kevin Y. Yip, Philip M. Kim, Gaetano T. Montelione, and Mark B. Gerstein. 2007. Comparing classical pathways and modern networks: Towards the development of an edge ontology. Trends in Biochemical Sciences 32, 7 (2007), 320--331.
    [150]
    Yaobin Lu, Ling Zhao, and Bin Wang. 2010. From virtual community members to C2C e-commerce buyers: Trust in virtual communities and its effect on consumers’ purchase intention. Electronic Commerce Research and Applications 9, 4 (2010), 346--360.
    [151]
    David Lusseau. 2003. The emergent properties of a dolphin social network. Proceedings of the Royal Society B: Biological Sciences 270, Suppl._2 (2003), S186--S188.
    [152]
    Fabrizio Marozzo, Domenico Talia, and Paolo Trunfio. 2012. P2P-MapReduce: Parallel data processing in dynamic cloud environments. Journal of Computer and System Sciences 78, 5 (2012), 1382--1402.
    [153]
    Winter Mason and Duncan J. Watts. 2010. Financial incentives and the “performance of crowds.” ACM SIGKDD Explorations Newsletter 11, 2 (2010), 100.
    [154]
    Philip Mayer, José Velasco, Annabelle Klarl, Rolf Hennicker, Mariachiara Puviani, Francesco Tiezzi, Rosario Pugliese, Jaroslav Keznikl, and Tomáš Bureš. 2015. The autonomic cloud. In Software Engineering for Collective Autonomic Systems, Martin Wirsing, Matthias Hölzl, Nora Koch, and Philip Mayer (Eds.). Lecture Notes in Computer Science, Vol. 8998. Springer International Publishing, 495--512.
    [155]
    Bill McEvily, Vincenzo Perrone, and Akbar Zaheer. 2003. Trust as an organizing principle. Organization Science 14, 1 (2003), 91--103.
    [156]
    Kurt Mehlhorn and Stefan Näher. 1989. LEDA a library of efficient data types and algorithms. In Mathematical Foundations of Computer Science 1989. Springer, 88--106.
    [157]
    Diego Mendez, Miguel Labrador, and Kandethody Ramachandran. 2013. Data interpolation for participatory sensing systems. Pervasive and Mobile Computing 9, 1 (2013), 132--148.
    [158]
    Ron Milo. 2002. Network motifs: Simple building blocks of complex networks. Science 298, 5594 (2002), 824--827.
    [159]
    Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, and Bobby Bhattacharjee. 2007. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC’07). ACM, New York, 29.
    [160]
    Audris Mockus, Roy T. Fielding, and James D. Herbsleb. 2002. Two case studies of open source software development: Apache and Mozilla. ACM Transactions on Software Engineering and Methodology 11, 3 (2002), 309--346.
    [161]
    Meredith Ringel Morris. 2013. Collaborative search revisited. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW’13). ACM, New York, 1181.
    [162]
    Meredith Ringel Morris and Eric Horvitz. 2007. SearchTogether. In Proceedings of the 20th Annual ACM Symposium on User Interface Software and Technology (UIST’07). ACM, New York, 3.
    [163]
    Meredith Ringel Morris, Jaime Teevan, and Katrina Panovich. 2010. What do people ask their social networks, and why? In Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI’10). ACM, New York, 1739.
    [164]
    Lev Muchnik, Sinan Aral, and Sean J. Taylor. 2013. Social influence bias: A randomized experiment. Science (New York, N.Y.) 341, 6146 (2013), 647--651.
    [165]
    Tom Murray, Beverly Woolf, Ethan Katsh, Leon Osterweil, Lori Carlke, and Leah Wing. 2014. SoCS: The fourth party: Improving computer-mediated deliberation through cognitive, social and emotional support. In Final Report of the Social Deliverative Skills (SoCS) Project. ACM, 62.
    [166]
    Dave Murray-Rust, Ognjen Scekic, Hong-Linh Truong, Dave Robertson, and Schahram Dustdar. 2014. A collaboration model for community-based software development with social machines. In Proceedings of the COLLABORATECOM Conference. ICST, 10.
    [167]
    Mark E. J. Newman. 2003. The structure and function of complex networks. SIAM Review 45, 2 (2003), 167--256.
    [168]
    Mark E. J. Newman and Juyong Park. 2003. Why social networks are different from other types of networks. Physical Review E 68, 3 (2003), 036122.
    [169]
    Donald A. Norman, Andrew Ortony, and Daniel M. Russell. 2003. Affect and machine design: Lessons for the development of autonomous machines. IBM Systems Journal 42, 1 (2003), 38--44.
    [170]
    Oded Nov, David Anderson, and Ofer Arazy. 2010. Volunteer computing: A model of the factors determining contribution to community-based scientific research. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, New York, 741.
    [171]
    Cory R. Ondrejka. 2004. Aviators, moguls, fashionistas and barons: Economics and ownership in second life. Available at SSRN: https://ssrn.com/abstract=614663 (2004).
    [172]
    Jukka-Pekka Onnela and Felix Reed-Tsochas. 2010. Spontaneous emergence of social influence in online systems. Proceedings of the National Academy of Sciences 107, 43 (2010), 18375--18380.
    [173]
    Shaul Oreg and Oded Nov. 2008. Exploring motivations for contributing to open source initiatives: The roles of contribution context and personal values. Computers in Human Behavior 24, 5 (2008), 2055--2073.
    [174]
    Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The PageRank citation ranking: Bringing order to the Web. Retrieved from http://ilpubs.stanford.edu:8090/422/1/1999-66.pdf.
    [175]
    Maja Pantic and Leon J. M. Rothkrantz. 2003. Toward an affect-sensitive multimodal human-computer interaction. Proceedings of the IEEE 91, 9 (2003), 1370--1390.
    [176]
    Eli Pariser. 2011. The Filter Bubble: What the Internet is Hiding from You. Penguin, UK.
    [177]
    Veljko Pejovic and Mirco Musolesi. 2015. Anticipatory mobile computing: A survey of the state of the art and research challenges. ACM Computing Surveys 47, 3 (2015), 1--29.
    [178]
    Rosalind W. Picard, Elias Vyzas, and Jennifer Healey. 2001. Toward machine emotional intelligence: Analysis of affective physiological state. IEEE Transactions on Pattern Analysis and Machine Intelligence 23, 10 (2001), 1175--1191.
    [179]
    Johan A. Pouwelse, Pawel Garbacki, Jun Wang, Arno Bakker, Jie Yang, Alexandru Iosup, Dick H. J. Epema, Marcel Reinders, Maarten R. van Steen, and Henk J. Sips. 2008. TRIBLER: A social-based peer-to-peer system. Concurrency and Computation: Practice and Experience 20, 2 (2008), 127--138.
    [180]
    Tobias Prokesch, Heiko A. von der Gracht, and Holger Wohlenberg. 2015. Integrating prediction market and delphi methodology into a foresight support system Insights from an online game. Technological Forecasting and Social Change 97 (2015), 47--64.
    [181]
    Alexander J. Quinn and Benjamin B. Bederson. 2011. Human computation: A survey and taxonomy of a growing field. In Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems (CHI’11). ACM, New York, 1403.
    [182]
    Moo-Ryong Ra, Bin Liu, Tom F. La Porta, and Ramesh Govindan. 2012. Medusa: A programming framework for crowd-sensing applications. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys’12). ACM, New York, 337.
    [183]
    Mika Raento, Antti Oulasvirta, and Nathan Eagle. 2009. Smartphones: An emerging tool for social scientists. Sociological Methods 8 Research 37, 3 (2009), 426--454.
    [184]
    Vikas C. Raykar and Shipeng Yu. 2011. Ranking annotators for crowdsourced labeling tasks. In Advances in Neural Information Processing Systems. 1809--1817.
    [185]
    Vikas C. Raykar, Shipeng Yu, Linda H. Zhao, Gerardo Hermosillo Valadez, Charles Florin, Luca Bogoni, and Linda Moy. 2010. Learning from crowds. The Journal of Machine Learning Research 11 (2010), 1297--1322.
    [186]
    Patricia J. Rogers. 2008. Using programme theory to evaluate complicated and complex aspects of interventions. Evaluation 14, 1 (2008), 29--48.
    [187]
    Jon Ronson. 2015. So You’ve Been Publicly Shamed. Picador, Oxford, England.
    [188]
    Jeremy Rose, Matthew Jones, and Duane Truex. 2005. Socio-theoretic accounts of IS: The problem of agency. Scandinavian Journal of Information Systems 17, 1 (2005), 8.
    [189]
    Denise M. Rousseau, Sim B. Sitkin, Ronald S. Burt, and Colin Camerer. 1998. Not so different after all: A cross-discipline view of trust. Academy of Management Review 23, 3 (1998), 393--404.
    [190]
    Serguei Saavedra, Kathleen Hagerty, and Brian Uzzi. 2011. Synchronicity, instant messaging, and performance among financial traders. Proceedings of the National Academy of Sciences 108, 13 (2011), 5296--5301.
    [191]
    Apostolis K. Salkintzis. 2006. Evolving public safety communication systems by integrating WLAN and TETRA networks. IEEE Communications Magazine 44, 1 (2006), 38--46.
    [192]
    Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble. 2001. A measurement study of peer-to-peer file sharing systems. In Electronic Imaging 2002, Martin G. Kienzle and Prashant J. Shenoy (Eds.). International Society for Optics and Photonics, 156--170.
    [193]
    Gregory D. Saxton, Onook Oh, and Rajiv Kishore. 2013. Rules of crowdsourcing: Models, issues, and systems of control. Information Systems Management 30, 1 (2013), 2--20.
    [194]
    Salvatore Scellato, Anastasios Noulas, and Cecilia Mascolo. 2011. Exploiting place features in link prediction on location-based social networks. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’11). ACM, New York, 1046.
    [195]
    J. Ben Schafer, Joseph Konstan, and John Riedi. 1999. Recommender systems in e-commerce. In Proceedings of the 1st ACM Conference on Electronic Commerce (EC’99). ACM, New York, 158--166.
    [196]
    J. Ben Schafer, Joseph A. Konstan, and John Riedl. 2001. E-commerce recommendation applications. In Applications of Data Mining to Electronic Commerce. Springer, 115--153.
    [197]
    F. David Schoorman, Roger C. Mayer, and James H. Davis. 2007. An integrative model of organizational trust: Past, present, and future. Academy of Management Review 32, 2 (2007), 344--354.
    [198]
    Nigel R. Shadbolt, Daniel Alexander Smith, Elena Simperl, Max Van Kleek, Yang Yang, and Wendy Hall. 2013. Towards a classification framework for social machines. In Proceedings of the 22nd International Conference on World Wide Web (WWW’13). ACM, 905--912.
    [199]
    Sonali K. Shah. 2006. Motivation, governance, and the viability of hybrid forms in open source software development. Management Science 52, 7 (2006), 1000--1014.
    [200]
    Kim Bartel Sheehan. 2002. Toward a typology of internet users and online privacy concerns. The Information Society 18, 1 (2002), 21--32.
    [201]
    Xiang Sheng, Jian Tang, and Weiyi Zhang. 2012. Energy-efficient collaborative sensing with mobile phones. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’12). IEEE, 1916--1924.
    [202]
    Amit Sheth, Pramod Anantharam, and Cory Henson. 2013. Physical-cyber-social computing: An early 21st century approach. IEEE Intelligent Systems 28, 1 (2013), 78--82.
    [203]
    Jonathan Silvertown, Martin Harvey, Richard Greenwood, Mike Dodd, Jon Rosewell, Tony Rebelo, Janice Ansine, and Kevin McConway. 2015. Crowdsourcing the identification of organisms: A case-study of iSpot. ZooKeys 480 (2015), 125--46.
    [204]
    Param Vir Singh, Yong Tan, and Vijay Mookerjee. 2011. Network effects: The influence of structural social capital on open source project success. Management Information Systems Quarterly 35, 4 (2011), 813--829.
    [205]
    Marcin Skowron, Stefan Rank, Aleksandra Świderska, Dennis Küster, and Arvid Kappas. 2014. Applying a text-based affective dialogue system in psychological research: Case studies on the effects of system behaviour, interaction context and social exclusion. Cognitive Computation 6, 4 (2014), 872--891.
    [206]
    Deb Sledgianowski and Songpol Kulviwat. 2009. Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context. The Journal of Computer Information Systems 49, 4 (2009), 74--83.
    [207]
    Paul R. Smart, Elena Simperl, and Nigel Shadbolt. 2014. A taxonomic framework for social machines. In Social Collective Intelligence. Springer, 51--85.
    [208]
    Matthias Söllner, Axel Hoffmann, Holger Hoffmann, Arno Wacker, and Jan Marco Leimeister. 2012. Understanding the formation of trust in IT artifacts. In ICIS 2012 Proceedings. Association for Information Systems, 1--18.
    [209]
    Matthias Söllner and Jan Marco Leimeister. 2013. What we really know about antecedents of trust: A critical review of the empirical information systems literature on trust. In Psychology of Trust: New Research, David Gefen (Ed.). Nove Science Publishers, Hauppauge, NY, Chapter 7, 127--155.
    [210]
    Kunwadee Sripanidkulchai, Bruce Maggs, and Hui Zhang. 2003. Efficient content location using interest-based locality in peer-to-peer systems. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’03), Vol. 3. IEEE, 2166--2176.
    [211]
    Stephen S. Standifird. 2001. Reputation and e-commerce: eBay auctions and the asymmetrical impact of positive and negative ratings. Journal of Management 27, 3 (2001), 279--295.
    [212]
    Ben Steichen, Helen Ashman, and Vincent Wade. 2012. A comparative survey of personalised information retrieval and adaptive hypermedia techniques. Information Processing 8 Management 48, 4 (2012), 698--724.
    [213]
    Constance A. Steinkuehler and Dmitri Williams. 2006. Where everybody knows your (screen) name: Online games as “third places.” Journal of Computer-Mediated Communication 11, 4 (2006), 885--909.
    [214]
    Katherine J. Stewart. 2003. Trust transfer on the World Wide Web. Organization Science 14, 1 (2003), 5--17.
    [215]
    James Surowiecki. 2005. The Wisdom of Crowds. Anchor, New York.
    [216]
    Michael Szell, Renaud Lambiotte, and Stefan Thurner. 2010. Multirelational organization of large-scale social networks in an online world. Proceedings of the National Academy of Sciences 107, 31 (2010), 13636--13641.
    [217]
    Don Tapscott and Anthony Williams. 2011. Wikinomics. Atlantic Books, Limited. 300 pages.
    [218]
    Ching-I Teng. 2010. Customization, immersion satisfaction, and online gamer loyalty. Computers in Human Behavior 26, 6 (2010), 1547--1554.
    [219]
    Catalina L. Toma and Jeffrey T. Hancock. 2013. Self-affirmation underlies Facebook use. Personality 8 Social Psychology Bulletin 39, 3 (2013), 321--331.
    [220]
    Johan Ugander and Lars Backstrom. 2013. Balanced label propagation for partitioning massive graphs. In Proceedings of the 6th ACM International Conference on Web Search and Data Mining (WSDM’13). ACM, New York, 507.
    [221]
    Viswanath Venkatesh. 2000. Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research 11, 4 (2000), 342--365.
    [222]
    Tibert Verhagen, Frans Feldberg, Bart van den Hooff, Selmar Meents, and Jani Merikivi. 2012. Understanding users’ motivations to engage in virtual worlds: A multipurpose model and empirical testing. Computers in Human Behavior 28, 2 (2012), 484--495.
    [223]
    Alessandro Vinciarelli, Maja Pantic, Dirk Heylen, Catherine Pelachaud, Isabella Poggi, Francesca D’Errico, and M. Schroeder. 2012. Bridging the gap between social animal and unsocial machine: A survey of social signal processing. IEEE Transactions on Affective Computing 3, 1 (2012), 69--87.
    [224]
    Luis von Ahn, Benjamin Maurer, Colin McMillen, David Abraham, and Manuel Blum. 2008. reCAPTCHA: Human-based character recognition via web security measures. Science 321, 5895 (2008), 1465--1468.
    [225]
    Georg Von Krogh, Sebastian Spaeth, and Karim R. Lakhani. 2003. Community, joining, and specialization in open source software innovation: A case study. Research Policy 32, 7 (2003), 1217--1241.
    [226]
    Fei-Yue Wang. 2010. The emergence of intelligent enterprises: From CPS to CPSS. IEEE Intelligent Systems 25, 4 (2010), 85--88.
    [227]
    Xinlei Wang, Wei Cheng, Prasant Mohapatra, and Tarek Abdelzaher. 2013. Artsense: Anonymous reputation and trust in participatory sensing. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’13). IEEE, 2517--2525.
    [228]
    Steve R. White, James E. Hanson, Ian Whalley, David M. Chess, and Jeffrey O. Kephart. 2004. An architectural approach to autonomic computing. In Null. IEEE, 2--9.
    [229]
    Justin Wolfers and Eric Zitzewitz. 2004. Prediction markets. The Journal of Economic Perspectives 18, 2 (2004), 107--126.
    [230]
    Jen-Her Wu, Shu-Ching Wang, and Ho-Huang Tsai. 2010. Falling in love with online games: The uses and gratifications perspective. Computers in Human Behavior 26, 6 (2010), 1862--1871.
    [231]
    Chenyan Xu, Sherry Ryan, Victor Prybutok, and Chao Wen. 2012. It is not for fun: An examination of social network site usage. Information 8 Management 49, 5 (2012), 210--217.
    [232]
    Amir Yahyavi and Bettina Kemme. 2013. Peer-to-peer architectures for massively multiplayer online games. ACM Computing Surveys 46, 1 (2013), 1--51.
    [233]
    Nick Yee. 2006. Motivations for play in online games. Cyberpsychology 8 Behavior 9, 6 (2006), 772--775.
    [234]
    Xi Zhang, Patricia Ordóñez de Pablos, Xiaojiong Wang, Weiguang Wang, Yongqiang Sun, and Jinghuai She. 2014. Understanding the users’ continuous adoption of 3D social virtual world in China: A comparative case study. Computers in Human Behavior 35 (2014), 578--585.
    [235]
    Elena Zheleva and Lise Getoor. 2009. To join or not to join. In Proceedings of the 18th International Conference on World Wide Web (WWW’09). ACM, New York, 531.
    [236]
    Pengfei Zhou, Yuanqing Zheng, and Mo Li. 2012. How long to wait?: Predicting bus arrival time with mobile phone based participatory. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys’12). ACM, New York, 379.
    [237]
    Runfang Zhou and Kai Hwang. 2007. Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems 18, 4 (2007), 460--473.
    [238]
    Zhongyun Zhou, Xiao-Ling Jin, Douglas R. Vogel, Yulin Fang, and Xiaojian Chen. 2011. Individual motivations and demographic differences in social virtual world uses: An exploratory investigation in second life. International Journal of Information Management 31, 3 (2011), 261--271.
    [239]
    Matthew Zook, Mark Graham, Taylor Shelton, and Sean Gorman. 2010. Volunteered geographic information and crowdsourcing disaster relief: A case study of the haitian earthquake. World Medical 8 Health Policy 2, 2 (2010), 6--32.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Computing Surveys
    ACM Computing Surveys  Volume 50, Issue 1
    January 2018
    588 pages
    ISSN:0360-0300
    EISSN:1557-7341
    DOI:10.1145/3058791
    • Editor:
    • Sartaj Sahni
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 April 2017
    Accepted: 01 January 2017
    Revised: 01 August 2016
    Received: 01 November 2015
    Published in CSUR Volume 50, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Crowdsourcing
    2. complex networks
    3. crowdsensing
    4. human-machine networks
    5. mass collaboration
    6. peer-to-peer
    7. social media

    Qualifiers

    • Survey
    • Research
    • Refereed

    Funding Sources

    • European Union's Horizon 2020 research and innovation program

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)132
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Collective group drift in a partial-differential-equation-based opinion dynamics model with biased perception kernelsPhysical Review E10.1103/PhysRevE.109.034304109:3Online publication date: 7-Mar-2024
    • (2024)The contribution of students’ learning styles to competences development through the use of Kahoot learning platformCogent Education10.1080/2331186X.2024.235232011:1Online publication date: 25-May-2024
    • (2024)ResilienceDigitally Disrupted Space10.1016/B978-0-443-14150-8.00001-8(167-188)Online publication date: 2024
    • (2023)People in CryptocurrencyMainstreaming Cryptocurrency and the Future of Digital Finance10.4018/978-1-6684-8368-8.ch002(31-57)Online publication date: 30-Jun-2023
    • (2023)The cost of coordination can exceed the benefit of collaboration in performing complex tasksCollective Intelligence10.1177/263391372311569122:2Online publication date: 1-Apr-2023
    • (2023)Social Drivers and Algorithmic Mechanisms on Digital MediaPerspectives on Psychological Science10.1177/17456916231185057Online publication date: 19-Jul-2023
    • (2023)Artificial Collective Intelligence Engineering: A Survey of Concepts and PerspectivesArtificial Life10.1162/artl_a_0040829:4(433-467)Online publication date: 1-Nov-2023
    • (2023)The Construction and Application of the Human-machine Synergy HM-RtI Intervention Model for College Students' Learning Adaptation2023 Twelfth International Conference of Educational Innovation through Technology (EITT)10.1109/EITT61659.2023.00032(130-135)Online publication date: 15-Dec-2023
    • (2023)Complex systems in the spotlight: next steps after the 2021 Nobel Prize in PhysicsJournal of Physics: Complexity10.1088/2632-072X/ac7f754:1(010201)Online publication date: 16-Jan-2023
    • (2023)Banking the unbanked. Constitutive rules and the institutionalization of mobile payment systems in NigeriaJournal of Business Research10.1016/j.jbusres.2023.113845163(113845)Online publication date: Aug-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media