-
1
-
-
80053360508
-
Cheap and fast-but is it good?: Evaluating non-expert annotations for natural language tasks
-
Honolulu, Hawaii, 2008). Association for Computational Linguistics
-
Snow, R., O'Connor, B., Jurafsky, D. and Ng, A. Y. Cheap and fast-but is it good?: evaluating non-expert annotations for natural language tasks. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (Honolulu, Hawaii, 2008). Association for Computational Linguistics, 2008.
-
(2008)
Proceedings of the Conference on Empirical Methods in Natural Language Processing
-
-
Snow, R.1
O'Connor, B.2
Jurafsky, D.3
Ng, A.Y.4
-
2
-
-
80053402398
-
Fast, cheap, and creative: Evaluating translation quality using amazon's mechanical turk
-
Singapore, 2009. Association for Computational Linguistics
-
Callison-Burch, C. Fast, cheap, and creative: evaluating translation quality using Amazon's Mechanical Turk. In Proceedings of the 2009 Conference on Empirical Methods in NLP: Volume 1 (Singapore, 2009). Association for Computational Linguistics, 2009.
-
(2009)
Proceedings of the 2009 Conference on Empirical Methods in NLP
, vol.1
-
-
Callison-Burch, C.1
-
4
-
-
79957943664
-
Ethics and tactics of professional crowdwork
-
Silberman, M., Irani, L. and Ross, J. Ethics and tactics of professional crowdwork. XRDS: Crossroads, The ACM Magazine for Students, 17:2 2010, pp 39-43.
-
(2010)
XRDS: Crossroads, the ACM Magazine for Students
, vol.17
, Issue.2
, pp. 39-43
-
-
Silberman, M.1
Irani, L.2
Ross, J.3
-
5
-
-
22044447885
-
Generation Y attitudes towards e-ethics and internet-related misbehaviours
-
DOI 10.1007/s10551-004-1571-0
-
Freestone, O. and Mitchell, V. Generation Y attitudes towards e-ethics and internet-related misbehaviours. Journal of Business Ethics, 54:2 2004, pp. 121-128. (Pubitemid 40965582)
-
(2004)
Journal of Business Ethics
, vol.54
, Issue.2
, pp. 121-128
-
-
Freestone, O.1
Mitchell, V.2
-
7
-
-
70449657723
-
Financial incentives and the performance of crowds
-
Mason, W. and Watts, D. J. Financial incentives and the performance of crowds. ACM SIGKDD Explorations Newsletter, 11:2 2010, pp. 100-108.
-
(2010)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.2
, pp. 100-108
-
-
Mason, W.1
Watts, D.J.2
-
8
-
-
77954742475
-
The labor economics of paid crowdsourcing
-
Horton, J. J. and Chilton, L. B. The labor economics of paid crowdsourcing. ACM, 2010.
-
(2010)
ACM
-
-
Horton, J.J.1
Chilton, L.B.2
-
11
-
-
84856151950
-
The computer is the new sewing machine: Benefits and perils of crowdsourcing
-
India, ACM
-
Paritosh, P., Ipeirotis, P., Cooper, M. and Suri, S. The computer is the new sewing machine: benefits and perils of crowdsourcing. WWW 11 Hyderabad, India, ACM, 2011.
-
(2011)
WWW 11 Hyderabad
-
-
Paritosh, P.1
Ipeirotis, P.2
Cooper, M.3
Suri, S.4
-
13
-
-
84856151955
-
Social engineering: The dark art
-
Thornburgh, T. Social engineering: the dark art. ACM, 2004.
-
(2004)
ACM
-
-
Thornburgh, T.1
-
14
-
-
12244282921
-
CAPTCHA: Using hard AI problems for security
-
Von Ahn, L., Blum, M., Hopper, N. and Langford, J. CAPTCHA: Using hard AI problems for security. Advances in Cryptology-EUROCRYPT 2003. p 646.
-
(2003)
Advances in Cryptology-EUROCRYPT
, pp. 646
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
15
-
-
85076285223
-
Re: CAPTCHAs-understanding CAPTCHA-solving services in an economic context
-
August 11-13, Washington, DC
-
Motoyama, M., Levchenko, K., Kanich, C., McCoy, D., Voelker, G. M. and Savage, S. Re: CAPTCHAs-Understanding CAPTCHA-solving services in an economic context. In Proceedings of the 19th USENIX Security Symposium, USESEC'10, August 11-13, 2010, Washington, DC.
-
(2010)
Proceedings of the 19th USENIX Security Symposium, USESEC'10
-
-
Motoyama, M.1
Levchenko, K.2
Kanich, C.3
McCoy, D.4
Voelker, G.M.5
Savage, S.6
-
16
-
-
66249097513
-
A low-cost attack on a Microsoft CAPTCHA
-
Yan, J. and El Ahmad, A. S. A Low-cost Attack on a Microsoft CAPTCHA. ACM, 2008.
-
(2008)
ACM
-
-
Yan, J.1
El Ahmad, A.S.2
-
17
-
-
84856195136
-
Spammers pay others to answer security tests
-
April 25
-
Bajaj, V. Spammers pay others to answer security tests. NY Times, April 25, 2010.
-
(2010)
NY Times
-
-
Bajaj, V.1
-
18
-
-
84856150067
-
-
Springer-Verlag, New York
-
Bonneau, J., Just, M. and Matthews, G. Evaluating Statistical Attacks on Personal Knowledge Questions. Springer-Verlag, New York, 2010.
-
(2010)
Evaluating Statistical Attacks on Personal Knowledge Questions
-
-
Bonneau, J.1
Just, M.2
Matthews, G.3
-
19
-
-
84856151953
-
Dirty jobs: The role of freelance labor in web service abuse
-
August 8-12, San Francisco, CA
-
Levchenko, M. M. D. M. C. K. and Voelker, S. S. G. M. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. In Proceedings of the 20th USENIX Security Symposium, USESEC'11, August 8-12, 2011, San Francisco, CA.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, USESEC'11
-
-
Levchenko, M.M.D.M.C.K.1
Voelker, S.S.G.M.2
-
22
-
-
77956703196
-
Deconstructing tripAdvisor
-
October 13, pW1
-
Keates, N. Deconstructing TripAdvisor. The Wall Street Journal, October 13, 2007. pW1.
-
(2007)
The Wall Street Journal
-
-
Keates, N.1
-
24
-
-
83255191401
-
Finding deceptive opinion spam by any stretch of the imagination
-
Ott, M., Choi, Y., Cardie, C. and Hancock, J. T. Finding deceptive opinion spam by any stretch of the imagination. Association for Computational Linguistics, 2011.
-
(2011)
Association for Computational Linguistics
-
-
Ott, M.1
Choi, Y.2
Cardie, C.3
Hancock, J.T.4
-
25
-
-
84988299645
-
High-order concept associations mining and inferential language modeling for online review spam detection
-
Lai, C., Xu, K., Lau, R. Y. K., Li, Y. and Song, D. High-Order Concept Associations Mining and Inferential Language Modeling for Online Review Spam Detection. In Proceedings of ICDM Workshops'2010. pp.1120-1127.
-
(2010)
Proceedings of ICDM Workshops
, pp. 1120-1127
-
-
Lai, C.1
Xu, K.2
Lau, R.Y.K.3
Li, Y.4
Song, D.5
-
26
-
-
38849145587
-
Electronic word-of-mouth in hospitality and tourism management
-
Litvin, S. W., Goldsmith, R. E. and Pan, B. Electronic word-of-mouth in hospitality and tourism management. Tourism management, 29:3 2008. pp 458-468.
-
(2008)
Tourism Management
, vol.29
, Issue.3
, pp. 458-468
-
-
Litvin, S.W.1
Goldsmith, R.E.2
Pan, B.3
-
29
-
-
84963060367
-
Social norms and community enforcement
-
Kandori, M. Social norms and community enforcement. The Review of Economic Studies, 59:1 1992. pp 63-80.
-
(1992)
The Review of Economic Studies
, vol.59
, Issue.1
, pp. 63-80
-
-
Kandori, M.1
-
30
-
-
26644459995
-
Governmental action, social norms, and criminal behavior
-
DOI 10.1628/093245605774259363
-
Funk, P. Governmental action, social norms and criminal behavior. Jour Inst & TheorEcon, 161 3 2005. pp 522-535. (Pubitemid 41441018)
-
(2005)
Journal of Institutional and Theoretical Economics
, vol.161
, Issue.3
, pp. 522-535
-
-
Funk, P.1
-
31
-
-
84856181918
-
Internet dating websites: A refuge for internet fraud
-
Winter
-
Gray, T. E. Internet dating websites: A refuge for internet fraud. Fl. Coastal L. Rev., Winter 2011, pp 389-407.
-
(2011)
Fl. Coastal L. Rev.
, pp. 389-407
-
-
Gray, T.E.1
-
34
-
-
34247508664
-
Through a glass darkly: IT design, identity verification, and knowledge contribution in online communities
-
Ma, M. and Agarwal, R. Through a glass darkly: IT design, identity verification, and knowledge contribution in online communities. Info Sys Research, 18:1 2007. pp 42-67.
-
(2007)
Info Sys Research
, vol.18
, Issue.1
, pp. 42-67
-
-
Ma, M.1
Agarwal, R.2
-
35
-
-
84885873215
-
Signature based detection of user events for post-mortem forensic analysis
-
James, J. I., Gladyshev, P. and Zhu, Y. Signature Based Detection of User Events for Post-mortem Forensic Analysis. Digital Forensics and Cyber Crime 2011, pp 96-109.
-
(2011)
Digital Forensics and Cyber Crime
, pp. 96-109
-
-
James, J.I.1
Gladyshev, P.2
Zhu, Y.3
|