-
1
-
-
84909198468
-
-
(McKinsey Global Institute, March
-
Jonathan Woetzel et al., “Preparing for China’s Urban Billion” (McKinsey Global Institute, March 2009), http://www.mckinsey.com/insights/urbanization/preparing_for_urban_billion_in_china.
-
(2009)
Preparing for China’s Urban Billion
-
-
Woetzel, J.1
-
2
-
-
59849122652
-
Life in the network: The coming age of computational social science
-
David Lazer, Alex Sandy Pentland, Lada Adamic, Sinan Aral, Albert Laszlo Barabasi, Devon Brewer, Nicholas Christakis, Noshir Contractor, James Fowler, and Myron Gutmann, “Life in the Network: The Coming Age of Computational Social Science,” Science 323 (2009): 721-723.
-
(2009)
Science
, vol.323
, pp. 721-723
-
-
Lazer, D.1
Pentland, A.S.2
Adamic, L.3
Aral, S.4
Barabasi, A.L.5
Brewer, D.6
Christakis, N.7
Contractor, N.8
Fowler, J.9
Gutmann, M.10
-
3
-
-
84863993298
-
Identifying influential and susceptible members of social networks
-
Sinan Aral and Dylan Walker, “Identifying Influential And Susceptible Members Of Social Networks,” Science 337 (2012): 337-341
-
(2012)
Science
, vol.337
, pp. 337-341
-
-
Aral, S.1
Walker, D.2
-
4
-
-
79960592203
-
-
(website), (accessed November 22
-
Alan Mislove, Sune Lehmann, Yong-Yeol Ahn, Jukka-Pekka Onnela, and J. Niels Rosenquist, Pulse of the Nation: U.S. Mood throughout the Day Inferred from Twitter (website), http://www.ccs.neu.edu/home/amislove/twittermood/ (accessed November 22, 2013)
-
(2013)
Pulse of the Nation: U.S. Mood throughout the Day Inferred from Twitter
-
-
Mislove, A.1
Lehmann, S.2
Ahn, Y.-Y.3
Onnela, J.-P.4
Niels Rosenquist, J.5
-
5
-
-
79960995158
-
It’s complicated: Facebook users’ political participation in the 2008 election
-
Jessica Vitak, Paul Zube, Andrew Smock, Caleb T. Carr, Nicole Ellison, and Cliff Lampe, “It’s Complicated: Facebook Users’ Political Participation in the 2008 Election,” Cyberpsychology, Behavior, and Social Networking 14 (2011): 107-114.
-
(2011)
Cyberpsychology, Behavior, and Social Networking
, vol.14
, pp. 107-114
-
-
Vitak, J.1
Zube, P.2
Smock, A.3
Carr, C.T.4
Ellison, N.5
Lampe, C.6
-
6
-
-
85024916953
-
Dark social: We have the whole history of the web wrong
-
October 12
-
Alexis Madrigal, “Dark Social: We Have the Whole History of the Web Wrong,” The Atlantic, October 12, 2013, http://www.theatlantic.com/technology/archive/2012/10/dark-social-we-have-the-whole-history-of-the-web-wrong/263523/.
-
(2013)
The Atlantic
-
-
Madrigal, A.1
-
7
-
-
33645311516
-
Reality mining: Sensing complex social systems
-
Nathan Eagle and Alex Pentland, “Reality Mining: Sensing Complex Social Systems,” Personal and Ubiquitous Computing 10 (2006): 255-268
-
(2006)
Personal and Ubiquitous Computing
, vol.10
, pp. 255-268
-
-
Eagle, N.1
Pentland, A.2
-
8
-
-
76049097415
-
Reality mining of mobile communications: Toward a new deal on data
-
Geneva: World Economic Forum
-
Alex Pentland, “Reality Mining of Mobile Communications: Toward a New Deal on Data,” The Global Information Technology Report 2008-2009 (Geneva: World Economic Forum, 2009), 75-80.
-
(2009)
The Global Information Technology Report 2008-2009
, pp. 75-80
-
-
Pentland, A.1
-
9
-
-
71749113097
-
Using reality mining to improve public health and medicine
-
Alex Pentland, David Lazer, Devon Brewer, and Tracy Heibeck, “Using Reality Mining to Improve Public Health and Medicine,” Studies in Health Technology and Informatics 149 (2009): 93-102.
-
(2009)
Studies in Health Technology and Informatics
, vol.149
, pp. 93-102
-
-
Pentland, A.1
Lazer, D.2
Brewer, D.3
Heibeck, T.4
-
10
-
-
84914159282
-
Classifying spending behavior using socio-mobile data
-
Vivek K. Singh, Laura Freeman, Bruno Lepri, and Alex Sandy Pentland, “Classifying Spending Behavior using Socio-Mobile Data,” HUMAN 2 (2013): 99-111.
-
(2013)
HUMAN
, vol.2
, pp. 99-111
-
-
Singh, V.K.1
Freeman, L.2
Lepri, B.3
Pentland, A.S.4
-
11
-
-
84873623812
-
Decoding social influence and the wisdom of the crowd in financial trading network
-
Wei Pan, Yaniv Altshuler, and Alex Sandy Pentland, “Decoding Social Influence and the Wisdom of the Crowd in Financial Trading Network,” in 2012 International Conference on Privacy, Security, Riskand Trust (PASSAT), and 2012 International Conference on Social Computing (SocialCom), 203-209.
-
2012 International Conference on Privacy, Security, Riskand Trust (PASSAT), and 2012 International Conference on Social Computing (Socialcom)
, pp. 203-209
-
-
Pan, W.1
Altshuler, Y.2
Pentland, A.S.3
-
12
-
-
84923603856
-
Reality mining
-
March/April
-
Kate Greene, “Reality Mining,” MIT Technology Review, March/April 2008, http://pubs.media.mit.edu/pubs/papers/tr10pdfdownload.pdf.
-
(2008)
MIT Technology Review
-
-
Greene, K.1
-
13
-
-
84923615484
-
Keynote speech
-
European Consumer Commissioner, March 31
-
Meglena Kuneva, European Consumer Commissioner, “Keynote Speech,” in Roundtable on Online Data Collection, Targeting and Profiling, March 31,2009, http://europa.eu/rapid/press-release_SPEECH-09-156_en.htm.
-
(2009)
Roundtable on Online Data Collection, Targeting and Profiling
-
-
Kuneva, M.1
-
14
-
-
84936948609
-
How big data is changing the cost of insurance
-
November 14
-
Kim Gittleson, “How Big Data Is Changing The Cost Of Insurance,” BBC News, November 14, 2013, http://www.bbc.co.uk/news/business-24941415.
-
(2013)
BBC News
-
-
Gittleson, K.1
-
15
-
-
84893154542
-
Measuring personalization of web search
-
Aniko Hannak, Piotr Sapiezynski, Kakhki Arash Molavi, Balachander Krishna-murthy, David Lazer, Alan Mislove, and Christo Wilson, “Measuring Personalization of Web Search,” in Proc. 22nd International Conference on World Wide Web (WWW 2013), 527-538.
-
Proc. 22Nd International Conference on World Wide Web (WWW 2013)
, pp. 527-538
-
-
Hannak, A.1
Sapiezynski, P.2
Molavi, K.A.3
Krishna-Murthy, B.4
Lazer, D.5
Mislove, A.6
Wilson, C.7
-
16
-
-
78650008157
-
Social sensing for epidemiological behavior change
-
Anmol Madan, Manuel Cebrian, David Lazer, and Alex Pentland, “Social Sensing for Epidemiological Behavior Change,” in Proc. 12th ACM International Conference on Ubiquitous Computing (Ubicomp 2010), 291-300
-
Proc. 12Th ACM International Conference on Ubiquitous Computing (Ubicomp 2010)
, pp. 291-300
-
-
Madan, A.1
Cebrian, M.2
Lazer, D.3
Pentland, A.4
-
17
-
-
84891618833
-
Urban characteristics attributable to density-driven tie formation
-
article 1961
-
Wei Pan, Gourab Ghoshal, Coco Krumme, Manuel Cebrian, and Alex Pentland, “Urban Characteristics Attributable to Density-Driven Tie Formation,” Nature Communications 4 (2013): article 1961.
-
(2013)
Nature Communications
, vol.4
-
-
Pan, W.1
Ghoshal, G.2
Krumme, C.3
Cebrian, M.4
Pentland, A.5
-
18
-
-
77951537803
-
Iran protests: Twitter, the medium of the movement
-
June 17
-
Lev Grossman, “Iran Protests: Twitter, the Medium of the Movement,” Time Magazine, June 17, 2009
-
(2009)
Time Magazine
-
-
Grossman, L.1
-
19
-
-
84911028526
-
Protests in moldova explode, with help of twitter
-
April 8
-
Ellen Barry, “Protests in Moldova Explode, with Help of Twitter,” The New York Times, April 8, 2009.
-
(2009)
The New York Times
-
-
Barry, E.1
-
20
-
-
0003187764
-
Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
November 23
-
“Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data,” Official Journal L281 (November 23, 1995): 31-50.
-
(1995)
Official Journal L281
, pp. 31-50
-
-
-
22
-
-
84923606049
-
-
School of Computer Science Technical Report CSR-13-01, University of Birmingham, May
-
Antonio Lima, Manlio De Domenico, Veljko Pejovic, and Mirco Musolesi, “Exploiting Cellular Data for Disease Containment and Information Campaign Strategies in Country-Wide Epidemics,” School of Computer Science Technical Report CSR-13-01, University of Birmingham, May 2013.
-
(2013)
Exploiting Cellular Data for Disease Containment and Information Campaign Strategies in Country-Wide Epidemics
-
-
Lima, A.1
Domenico, M.D.2
Pejovic, V.3
Musolesi, M.4
-
25
-
-
84896624238
-
On the trusted use of large-scale personal data
-
de Montjoye, Yves Alexandre, Samuel S. Wang, Alex Pentland, “On the Trusted Use of Large-Scale Personal Data,” IEEE Data Engineering Bulletin 35, no. 4 (2012): 5-8.
-
(2012)
IEEE Data Engineering Bulletin
, vol.35
, Issue.4
, pp. 5-8
-
-
de Montjoye1
Alexandre, Y.2
Wang, S.S.3
Pentland, A.4
-
26
-
-
77149139158
-
Limits of predictability in human mobility
-
Chaoming Song, Zehui Qu, Nicholas Blumm, and Albert-Laszlo Barabasi, “Limits of Predictability in Human Mobility,” Science 327 (2010): 1018-1021.
-
(2010)
Science
, vol.327
, pp. 1018-1021
-
-
Song, C.1
Zehui, Q.2
Blumm, N.3
Barabasi, A.-L.4
-
27
-
-
85089792332
-
Activity and emotion recognition to support early diagnosis of psychiatric diseases
-
David Tacconi, Oscar Mayora, Paul Lukowicz, Bert Arnrich, Cornelia Setz, Gerhard Troster, and Christian Haring, “Activity and Emotion Recognition to Support Early Diagnosis of Psychiatric Diseases,” in Proc. 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 100-102.
-
Proc. 2Nd International ICST Conference on Pervasive Computing Technologies for Healthcare
, pp. 100-102
-
-
Tacconi, D.1
Mayora, O.2
Lukowicz, P.3
Arnrich, B.4
Setz, C.5
Troster, G.6
Haring, C.7
-
28
-
-
84858050360
-
-
Washington, DC, April
-
The White House, “National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy,” Washington, DC, April 2011, http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf.
-
(2011)
National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy
-
-
-
30
-
-
84898985376
-
Girls around me: An app takes creepy to a new level
-
March
-
Nick Bilton, “Girls around Me: An App Takes Creepy to a New Level,” The New York Times, Bits (blog), March 30, 2012, http://bits.blogs.nytimes.com/2012/03/30/girls-around-me-ios-app-takes-creepy-to-a-new-level.
-
(2012)
The New York Times, Bits (Blog)
, vol.30
-
-
Bilton, N.1
-
31
-
-
84923603554
-
-
RCRA Corrective Action Program, Washington, DC
-
U.S. Environmental Protection Agency, RCRA Corrective Action Program, “Institutional Controls Glossary,” Washington, DC, 2007, http://www.epa.gov/epawaste/hazard/correctiveaction/resources/guidance/ics/glossary1.pdf.
-
(2007)
Institutional Controls Glossary
-
-
-
32
-
-
77955523248
-
-
Center for Environmental & Human Toxicology, Technical report, Florida Department of Environmental Protection, Division of Waste Management, February
-
University of Florida, Center for Environmental & Human Toxicology, “Development of Cleanup Target Levels (CTLs) for Chapter 62-777, F.A.C.,” Technical report, Florida Department of Environmental Protection, Division of Waste Management, February 2005, http://www.dep.state.fl.us/waste/quick_topics/publications/wc/FinalGuidanceDocumentsFlowCharts_April2005/TechnicalReport2FinalFeb2005(Final3-28-05).pdf.
-
(2005)
Development of Cleanup Target Levels (Ctls) for Chapter 62-777, F.A.C
-
-
-
33
-
-
84923628287
-
-
OSWER 9355.0-89, Washington, DC, December
-
U.S. Environmental Protection Agency, “Institutional Controls: A Guide to Planning, Implementing, Maintaining, and Enforcing Institutional Controls at Contaminated Sites,” OSWER 9355.0-89, Washington, DC, December 2012, http://www.epa.gov/superfund/policy/ic/guide/Final%20PIME% 20Guidance%20December%202012.pdf.
-
(2012)
Institutional Controls: A Guide to Planning, Implementing, Maintaining, and Enforcing Institutional Controls at Contaminated Sites
-
-
-
34
-
-
84923632410
-
Restrictive covenants as institutional controls for remediated sites: Worth the effort?
-
February
-
Ralph A. DeMeo and Sarah Meyer Doar, “Restrictive Covenants as Institutional Controls for Remediated Sites: Worth the Effort?” The Florida Bar Journal 85, no. 2 (February 2011)
-
(2011)
The Florida bar Journal
, vol.85
, Issue.2
-
-
Demeo, R.A.1
Doar, S.M.2
-
35
-
-
84923625071
-
-
Tallahassee, June
-
Florida Department of Environmental Protection, Division of Waste Management, “Institutional Controls Procedures Guidance,” Tallahassee, June 2012, http://www.dep.state.fl.us/waste/quick_topics/publications/wc/csf/ icpg.pdf
-
(2012)
Institutional Controls Procedures Guidance
-
-
-
36
-
-
84901615373
-
Towards a trustworthy digital infrastructure for core identities and personal data stores
-
Thomas Hardjono, Daniel Greenwood, and Alex Pentland, “Towards a Trustworthy Digital Infrastructure for Core Identities and Personal Data Stores,” in Proc. ID360 Conference on Identity, 2013.
-
(2013)
Proc. ID360 Conference on Identity
-
-
Hardjono, T.1
Greenwood, D.2
Pentland, A.3
-
39
-
-
84865819620
-
Bitter to better - how to make bitcoin a better currency
-
LNCS 7397
-
Simon Barber, Xavier Boyen, Elaine Shi, and Ersin Uzun, “Bitter to Better - How to Make Bitcoin a Better Currency,” in Proc. Financial Cryptography and Data Security Conference (2012), LNCS 7397, 399-414.
-
Proc. Financial Cryptography and Data Security Conference (2012)
, pp. 399-414
-
-
Barber, S.1
Boyen, X.2
Shi, E.3
Uzun, E.4
|