Skip to main content
Springer Nature - PMC COVID-19 Collection logoLink to Springer Nature - PMC COVID-19 Collection
. 2011 May 30;195(1):3. doi: 10.1140/epjst/e2011-01401-8

From social data mining to forecasting socio-economic crises

D Helbing 1,2,, S Balietti 1
PMCID: PMC7088654  PMID: 32215190

Abstract.

The purpose of this White Paper of the EU Support Action “Visioneer”(see www.visioneer.ethz.ch) is to address the following goals:

  1. Develop strategies to quickly increase the objective knowledge about social and economic systems.

  2. Describe requirements for efficient large-scale scientific data mining of anonymized social and economic data.

  3. Formulate strategies how to collect stylized facts extracted from large data set.

  4. Sketch ways how to successfully build up centers for computational social science.

  5. Propose plans how to create centers for risk analysis and crisis forecasting.

  6. Elaborate ethical standards regarding the storage, processing, evaluation, and publication of social and economic data.

Keywords: Recommender System, European Physical Journal Special Topic, Reality Mining, Computational Social Science, Electronic Frontier Foundation

References

  • 1.Visioneer, envisioning a socio-economic knowledge collider, http://www.visioneer. ethz.ch
  • 2.Helbing D., Balietti S. From Social Simulation to Integrative System Design. Eur. Phys. J. Special Topics. 2011;195:69. doi: 10.1140/epjst/e2011-01402-7. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 3.Helbing D., Balietti S. How to create an Innovation Accelerator. Eur. Phys. J. Special Topics. 2011;195:101. doi: 10.1140/epjst/e2011-01403-6. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 4.D. Helbing, S. Balietti, Formulating grand fundamental challenges. Visioneer White Paper (2010), see http://www.visioneer.ethz.ch
  • 5.D. Helbing, Pluralistic Modeling of Complex Systems (July 18, 2010). CCSS-10-009, available at SSRN: http://ssrn.com/abstract=1646314(2010)
  • 6.D. Helbing, S. Balietti, Fundamental and real world challenges in economics (in print) (2010)
  • 7.D. Helbing, Systemic risks in society and economics, Sante Fe Institute, working paper (2009)
  • 8.Buldyrev S.V., Parshani R., Paul G., Stanley H.E., Havlin S. Nature. 2010;465:08932. doi: 10.1038/nature08932. [DOI] [PubMed] [Google Scholar]
  • 9.D. Helbing, W. Yu, K.-D. Opp, H. Rauhut, Amer. J. Sociol. (submitted) (2010
  • 10.See http://hussonet.free.fr/toxicap.xls
  • 11.Smith K.P., Christakis N.A. Ann. Rev. Sociol. 2008;34:405. doi: 10.1146/annurev.soc.34.040507.134601. [DOI] [Google Scholar]
  • 12.Privatsphäre als Luxusgut, http://www.nzz.ch/blogs/nzz_blogs/betablog/ privatsphaere_als_luxusgut_1.7266824.html
  • 13.D. Helbing, M. Christen, Mit Rauschen und Reibung gegen finanzielle Blasen (submitted to Wirtschaftswoche) (2010)
  • 14.M. Mäs, A. Flache, D. Helbing, PLoS Computational Biology (in print) (2010) [DOI] [PMC free article] [PubMed]
  • 15.The Future of Social Experimenting: The Full Story, http://www.soms.ethz.ch/ research/socialexperimenting
  • 16.J. Surowiecki, The wisdom of crowds: Why the many are smarter than the few and how collective wisdom shapes business, economics, societies, and nations (Random House, Inc., 2004)
  • 17.J.H. Kagel, A.E. Roth, The Handbook of Experimental Economics (Princeton University, 1997)
  • 18.Salganik M.J., Dodds P.S., Watts D.J. Science. 2006;311:854. doi: 10.1126/science.1121066. [DOI] [PubMed] [Google Scholar]
  • 19.Bainbridge W.S. Science. 2007;317:472. doi: 10.1126/science.1146930. [DOI] [PubMed] [Google Scholar]
  • 20.Johnson N.F., Xu C., Zhao Z., Ducheneaut N., Yee N., Tita G., Hui P.M. Phys. Rev. E. 2009;79:066117. doi: 10.1103/PhysRevE.79.066117. [DOI] [PubMed] [Google Scholar]
  • 21.M. Szell, S. Thurner, Social Networks (2009) (submitted) [E-print http://arxiv.org/ abs/0911.1084]
  • 22.Christakis N.A., Fowler J.H. New Engl. J. Med. 2007;357:370. doi: 10.1056/NEJMsa066082. [DOI] [PubMed] [Google Scholar]
  • 23.Christakis N.A., Fowler J.H. New Engl. J. Med. 2008;358:2249. doi: 10.1056/NEJMsa0706154. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 24.Fowler J.H., Christakis N.A. British Med. J. 2008;337:a2338. doi: 10.1136/bmj.a2338. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 25.J.H. Fowler, N.A. Christakis, Cooperative behavior cascades in human social networks (2009) [E-print http://arxiv.org/abs/0908.3497] [DOI] [PMC free article] [PubMed]
  • 26.J. Howe, Wired Mag. 14, (2006)
  • 27.J. Howe, Crown Busin. (2009)
  • 28.D. Tapscott, A.D. Williams, Portfolio Hardcover (2008)
  • 29.C.R. Sunstein, Infotopia: How Many Minds Produce Knowledge (Oxford University Press, USA, 2006)
  • 30.M. Abramowicz, Predictocracy: Market Mechanisms for Public and Private Decision Making (Yale University Press, 2009)
  • 31.Designing E-Business Systems. Markets, Services, and Networks. 7th Workshop on E-Business, WEB 2008, edited by C. Weinhardt, S. Luckner, J. Stösser (Paris, France, 2008)
  • 32.R. Kalakota, M. Robinson, E-business 2.0: Roadmap for Success (Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 2001)
  • 33.C.S.R. Prabhu, E-governance: Concepts and Case Studies (PHI Learning, 2006)
  • 34.Electronic Government: 8th International Conference, EGOV 2009, edited by M.A. Wimmer, H.J. Scholl, M. Janssen, R. Traunmller (Linz, Austria, 31 August—3 September, 2009)
  • 35.G.E. Moore, Electronics Magazine 4 (1965), ftp://download.intel.com/museum/ Moores_Law/Articles-Press_Releases/Gordon_Moore_1965_Article.pdf
  • 36.I. Fisher, The Theory of Interest (NY, Macmillan, 1930)
  • 37.Mandelbrot B.B. J. Busin. 1963;36:394. [Google Scholar]
  • 38.Fama E.F. J. Busin. 1965;38:34. doi: 10.1086/294743. [DOI] [Google Scholar]
  • 39.Merton R.K. Science. 1968;159:56. doi: 10.1126/science.159.3810.56. [DOI] [PubMed] [Google Scholar]
  • 40.Barabasi A. Science. 1999;286:509. doi: 10.1126/science.286.5439.509. [DOI] [PubMed] [Google Scholar]
  • 41.R. Dunbar, Grooming, Gossip, and the Evolution of Language (Harvard University Press, 1998)
  • 42.V. Pareto, Translation of Manuale di economia politica (“Manual of political economy”), A.M. Kelley (1971)
  • 43.G.K. Zipf, Human Behavior and the Principle of Least-Effort (Addison-Wesley, 1949)
  • 44.Ravenstein E. The Geographical Magazine. 1876;III:173, 201, 229. [Google Scholar]
  • 45.Zipf G.K. Amer. Sociol. Rev. 1946;11:677. doi: 10.2307/2087063. [DOI] [Google Scholar]
  • 46.J. Tinbergen, Shaping the World Economy: Suggestions for an International Economic policy, Twentieth Century Fund (1962)
  • 47.C.A.E. Goodhart, Papers in Monetary Economics (Reserve Bank of Australia) (1975)
  • 48.K.A. Chrystal, P.D. Mizen, Vol. 1 of Central Banking, Monetary Theory and Practice: Essays in Honour of Charles Goodhart, edited by P.D. Mizen (Northampton, MA, Edward Elgar, 2003)
  • 49.Danãelsson J. J. Banking Finance. 2002;26:127396. [Google Scholar]
  • 50.John Ioannidis P.A. PLos Med. 2005;2:8. doi: 10.1371/journal.pmed.0020008. [DOI] [Google Scholar]
  • 51.Lazer D. Science. 2009;323:721. doi: 10.1126/science.1167742. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 52.Recommendations of the Association of Internet Researchers (AoIR) Ethics Working Committee, http://www.aoir.org/reports/ethics.pdf
  • 53.Research Methods in the Social Sciences, edited by C. Frankfort-Nachmias, D. Nachmias (Worth Publishers, New York, 2008)
  • 54.L.C. Bollinger, Announcing the Columbia committee on global thought, http://www. columbia.edu/cu/president/.../051214-committee-global-thought.html
  • 55.H. Spencer, The Principles of Sociology (Appleton, New York, 1898; the three volumes were originally published in serial form between 1874 and 1896)
  • 56.L. von Bertalanffy, General System Theory: Foundations, Development, Applications (George Braziller, New York, 1968)
  • 57.J.M. Epstein, Generative Social Science. Studies in Agent-Based Computational Modeling (Princeton University, 2006), p. 51
  • 58.J. Lorenz, H. Rauhut, F. Schweitzer D. Helbing, How social influence undermines the wisdom of crowds (submitted) (2010) [DOI] [PMC free article] [PubMed]
  • 59.Molgedey L., Ebeling W. Eur. Phys. J. B-Cond. Matter Complex Syst. 2000;15:733737. [Google Scholar]
  • 60.Sugihara G., May R.M. Nature. 1990;344:734741. doi: 10.1038/344734a0. [DOI] [PubMed] [Google Scholar]
  • 61.D. Helbing, et al., Human Behaviour and Traffic Networks, edited by M. Schreckenberg, R. Selten (Springer, Berlin, 2004), p. 47
  • 62.N. Bardsley, R. Cubitt, G. Loomes, G.P. Moffatt, R. Sugden, Experimental Economics: Rethinking the Rule (Princeton University Press, 2009)
  • 63.D. Friedman, Cassar A., Economics Lab: An Intensive Course in Experimental Economics (Routledge, 2004)
  • 64.D. Friedman, S. Sunder, Experimental Methods: A Primer for Economists (Cambridge University Press, 1994)
  • 65.F. Guala, The Methodology of Experimental Economics (Cambridge University Press, 2005)
  • 66.S. Lämmer, D. Helbing, JSTAT P04019 (2008)
  • 67.Scheffer M., Bascompte J., Brock W.A., Brovkin V., Carpenter S.R., Dakos V., Held H., van Nes E.H., Rietkerk M. Nature. 2009;461:53. doi: 10.1038/nature08227. [DOI] [PubMed] [Google Scholar]
  • 68.D. Helbing, S. Lämmer, D. Armbruster, A.S. Mikhailov, K. Kaneko, Networks of Interacting Machines: Production Organization in Complex Industrial Systems and Biological Cells, edited by D. Armbruster, A.S. Mikhailov, K. Kaneko (World Scientific, Singapore, 2005), p. 33
  • 69.D. Helbing, H. Ammoser, C. Khnert, Extreme Events in Nature and Society, edited by S. Albeverio, V. Jentsch, H. Kantz (Springer, Berlin, 2005)
  • 70.Google chief: Only miscreants worry about net privacy, http://www.theregister. co.uk/2009/12/07/schmidt_on_privacy/
  • 71.Details of 100 m Facebook users collected and published, http://www.bbc.co.uk/ news/technology-10796584
  • 72.Odling-Smee L. Nature. 2007;446:10. doi: 10.1038/446010a. [DOI] [PubMed] [Google Scholar]
  • 73.The Data Deluge, The Economist, Feb 25th 2010, http://www.economist.com/node/ 15579717
  • 74.Information is Power, The Guardian Data Blog, http://www.guardian.co.uk/media/ 2010/may/24/data-journalism
  • 75.Building Big Society, www.cabinetoffice.gov.uk/media/407789/building-big- society.pdf
  • 76.Apple confirms $1bn data center, http://www.theregister.co.uk/2009/06/04/ apple_1bn_north_carolina_data_center/
  • 77.NSA plans massive, 65MW, $2bn data center in Utah, http://www.theregister. co.uk/2009/07/03/new_nsa_data_center/
  • 78.Microsoft consumes Chicago data center, http://www.theregister.co.uk/2009/05/ 20/ascent_ch2_datacenter/
  • 79.Google admits Scandinavian data center landing, http://www.theregister. co.uk/2009/03/05/google_finland_data_center/
  • 80.Google pays $51.7m for newspaper destruction metaphor, http://www.theregister. co.uk/2009/02/12/google_buys_defunct_paper_mill/
  • 81.Intel sees future in Mega Data Center, http://www.theregister.co.uk/2009/02/18/ the_intel_cloud/
  • 82.R. Axelrod, The Evolution of Cooperation (Basic Books, 1984), p. 169
  • 83.A. Leventhal, ACM Queue 7 (2009)
  • 84.T. Hey, S. Tansley, K. Tolle, The Fourth Paradigm: Data-Intensive Scientific Discovery, edited by T. Hey, S. Tansley, K. Tolle (Microsoft Research, Redmond, Washington, 2009)
  • 85.M. Banko, E. Brill, Proceedings of the 39th Annual Meeting of the Association for Computational Linguistics (ACL 2001) (Toulouse, France, 2001), p. 26
  • 86.Halevy A., Norvig P., Pereira F. Comm. ACM. 2009;24:812. [Google Scholar]
  • 87.T. Brants, C. Ashok, Popat, P. Xu, F.J. Och, J. Dean, Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (Prague, Czech Republic, 2007), p. 858
  • 88.J. Lin, C. Dyer, Synthesis Lectures on Human Language Technologies (Morgan & Claypool, 2010)
  • 89.J. Dean, S. Ghemawat, Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004) (San Francisco, California, 2004), p. 137
  • 90.R. Pike, S. Dorward, R. Griesemer, S. Quinlan, Scientific Programming Journal Special Issue on Grids and Worldwide Computing Programming Models and Infrastructure 13, 227
  • 91.A. Awadallah, How Hadoop Revolutionized Data Warehousing at Yahoo and Facebook (CTO, Cloudera, Inc., 2009), http://www.slideshare.net/awadallah/ how-hadoop-revolutionized-data-warehousing-at-yahoo-and-facebook
  • 92.J. Hofman, Large-Scale Social Media Analysis with Hadoop (Yahoo! Research, 2010) http://www.slideshare.net/jakehofman/largescale-social-media-analysis- with-hadoop
  • 93.A. Manus Mc, M.-T. Kechadi, Data Mining V: Data Mining, Text Mining and Their Business Applications (2004), p. 189
  • 94.Muggleton S.H. Nature. 2006;440:409410. doi: 10.1038/440409a. [DOI] [PubMed] [Google Scholar]
  • 95.Szalay A., Gray J. Nature. 2006;440:413414. doi: 10.1038/440413a. [DOI] [PubMed] [Google Scholar]
  • 96.Foster I. Nature. 2006;440:419. doi: 10.1038/440419a. [DOI] [PubMed] [Google Scholar]
  • 97.Eds., Nature 455, 1 (2008)
  • 98.Nelson S. Nature. 2008;455:36. doi: 10.1038/455036a. [DOI] [PubMed] [Google Scholar]
  • 99.Lynch C. Nature. 2008;455:28. doi: 10.1038/455028a. [DOI] [PubMed] [Google Scholar]
  • 100.Doctorow C. Nature. 2008;455:16. doi: 10.1038/455016a. [DOI] [PubMed] [Google Scholar]
  • 101.Google spotlights data center inner workings, http://news.cnet.com/8301-10784_3- 9955184-7.html
  • 102.D. Butler, Nature 449, 644
  • 103.Eds., Nature 449, 637
  • 104.G. Pass, A. Chowdhury, C. Torgeson, Proc. 1st Int. Conference on Scalable Information Systems (Hong Kong, 2006)
  • 105.N. Eagle, A. Pentland, Personal Ubiquitous Comput 10 (2006)
  • 106.Eagle N., Pentland A., Lazer D. PNAS. 2009;106:36. doi: 10.1073/pnas.0900282106. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 107.The Jerusalem Declaration is part of the WP9 “Data in complex systems” of the GIACS Coordination Action n. 012380, http://portale.unipa.it/ocs/home/ jerusalemSubscription.html
  • 108.Vespignani A. Science. 2009;325:425. doi: 10.1126/science.1171990. [DOI] [PubMed] [Google Scholar]
  • 109.Barabasi A. Science. 2009;325:412. doi: 10.1126/science.1173299. [DOI] [PubMed] [Google Scholar]
  • 110.Ostrom E. Science. 2009;325:419. doi: 10.1126/science.1172133. [DOI] [PubMed] [Google Scholar]
  • 111.Google Flu Trends, http://www.google.org/flutrends/
  • 112.Christakis N.A., Fowler J.H. PLoS ONE. 2010;5:e12948. doi: 10.1371/journal.pone.0012948. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 113.J.V. Henderson, A. Storeygard, D.N. Weil, NBER Working Paper No. w15199 (2009)
  • 114.L. Backstrom, C. Dwork, J. Kleinberg, Proc. 16th Int. World Wide Web Conference (2007)
  • 115.EU Commission plans more harmonisation of data protection law. http://www.out-law.com/default.aspx?page=11228
  • 116.Bajaria P., Yeo J. Inf. Econom. Policy. 2009;21:90. doi: 10.1016/j.infoecopol.2009.04.001. [DOI] [Google Scholar]
  • 117.C. Schultz, Transparency and tacit collusion (2001)
  • 118.Kluger B., Wyatt S.B. J. Financial Quant. Anal. 2002;37:449. doi: 10.2307/3594988. [DOI] [Google Scholar]
  • 119.M. Michael, J.E. Moreira, D. Shiloach, R.W. Wisniewski, Parallel and Distributed Processing Symposium, IEEE International (2007)
  • 120.L.A. Barroso, Hölzle, The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines (Morgan & Claypool Publishers, 2009)
  • 121.A. Jacobs, ACM Queue 7 (2009)
  • 122.SSD Myths and Legends - “write endurance”, http://www.storagesearch.com/ ssdmyths-endurance.html
  • 123.A. Mazlouimian, D. Helbing, Y.-H. Eom, S. Lozano, S. Fortunato, How citation boosts trigger scientific paradigm shifts (2010) (in preparation) [DOI] [PMC free article] [PubMed]
  • 124.Helbing D., Treiber M. N.J. Saam, Phys. Rev. E. 2005;71:067101. doi: 10.1103/PhysRevE.71.067101. [DOI] [PubMed] [Google Scholar]
  • 125.Asch S.E. Psychol. Monogr. 1956;70:9. doi: 10.1037/h0093718. [DOI] [Google Scholar]
  • 126.F. Winter, H. Rauhut, D. Helbing, Jena Economic Research Papers (2009)
  • 127.D. Helbing, A. Johansson, SFI Working Paper #09-09-040 (2009)
  • 128.Helbing D., Yu W. Proceedings of the National Academy of Sciences USA (PNAS) 2009;106:3680. doi: 10.1073/pnas.0811503106. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 129.D. Helbing, W. Yu, H. Rauhut, Self-organization and emergence in social systems, Modeling the coevolution of social environments and cooperative behavior, SFI Working Paper #09-07-026 (2009)
  • 130.Four million British identities are up for sale on the Internet, http://technology. timesonline.co.uk/tol/news/tech_and_web/the_web/article6718560.ece
  • 131.E. Diener, R. Crandall, Ethics in Social and Behavioral Research (University of Chicago Press, Chicago, 1978)
  • 132.R. Geambasu, T. Kohno, A. Levy, H.M. Levy, Proceedings of the USENIX Security Symposium (Montreal, Canada, 2009)
  • 133.It seems it not so easy to clear ones name on-line, even when trying hard. This is specially true for traces left on social network Web sites, for which specific applications, such as http://suicidemachine.org/, have been created in order to accomplish this task. For a discussion based on a true story see http://ask.slashdot.org/story/09/12/10/2115238/Best-Way-To-Clear-Your- Name-Online
  • 134.Data, data everywhere, The Economist (2010)
  • 135.L. Lessig, Against Transparency, The New Republic (2009), http://www.tnr.com/ article/books-and-arts/against-transparency
  • 136.Diekmann A., Przepiorka W., Rauhut H. Z. Soziol. 2011;40:74. [Google Scholar]
  • 137.A.C. Kinsey, W.B. Pomeroy, C.E. Martin, Sexual Behavior in the Human Male (Saunders, Philadelphia, 1948)
  • 138.A.C. Kinsey, W.B. Pomeroy, C.E. Martin, P.H. Gebhard, Sexual Behavior in the Human Female (Saunders, Philadelphia, 1953)
  • 139.Symantec Internet Security Threat Report, http://www.symantec.com/business/ theme.jsp?themeid=threatreport
  • 140.A. Janc, L. Olejnik, Feasibility and Real-World Implications of Web Browser History Detection
  • 141.G. Wondracek, T. Holz, E. Kirda, C. Kruegel, A Practical Attack to De-Anonymize Social Network Users. Technical Report TR-iSecLab-0110-001
  • 142.Google admits it accidentally gathered WiFi data, http://www.ft.com/cms/s/2/ 8a23b394-5fab-11df-a670-00144feab49a.html
  • 143.Google to hand over intercepted data, http://www.ft.com/cms/s/2/db664044-6f43- 11df-9f43-00144feabdc0.html
  • 144.Lawyers Claim Google Wi-Fi Sniffing “Is Not an Accident”, http://gizmodo. com/5554960/lawyers-claim-google-wi+fi-sniffing-is-not-an-accident
  • 145.Wi-Fi Data Captured By Google Street View Cars Included Passwords, http://gizmodo.com/5567460/wi+fi-data-captured-by-google-street-view- cars-included-passwords
  • 146.Statement of Ethical Practice for the British Sociological Association, BSA, the British Sociological Society, 2002, http://www.britsoc.co.uk/equality/ Statement+Ethical+Practice.htm
  • 147.Ethical Guidelines, Social Research Association (2003), http://www.the-sra. org.uk/ethical.htm
  • 148.D. Sally, I. Ron, H. Ursula, An EU Code of Ethics for Socio-Economic Research (The Institute of Employment Studies, 2004)
  • 149.The British Psychological Society, Report of the Working Party on Conducting Research on the Internet (2007), http://www.bps.org.uk/the-society/code-of- conduct/
  • 150.Senator calls on FTC to tackle social-net privacy, http://news.cnet.com/ 8301-13577_3-20003415-36.html
  • 151.The Electronic Frontier Foundation published a timeline of Facebook’s privacy policy modifications over the years, http://www.eff.org/deeplinks/2010/04/ facebook-timeline
  • 152.Watchdog files complaint over Facebook “privacy” settings, http://www. theregister.co.uk/2009/12/17/epic_facebook_privacy_complain/
  • 153.Exclusive: Google, CIA Invest in “Future” of Web Monitoring, http://www. wired.com/dangerroom/2010/07/exclusive-google-cia/
  • 154.X. Su, T.M. Khoshgoftaar, Adv. Artificial Intell. (2009)
  • 155.Candes E.J., Tao T. IEEE Trans. Inform. Theory. 2009;56:2053. doi: 10.1109/TIT.2010.2044061. [DOI] [Google Scholar]
  • 156.M. Bezzi, et al. (eds.), Privacy and Identity Management for Life (Springer, 2009)
  • 157.Ziegler G., Farkas C., Lörincz A. Inf. Software Technol. 2006;48:726. doi: 10.1016/j.infsof.2005.08.007. [DOI] [Google Scholar]
  • 158.Apple’s Worst Security Breach: 114,000 iPad Owners Exposed, http://gawker. com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed
  • 159.T-Mobile confirms biggest phone customer data breach, http://www.guardian. co.uk/uk/2009/nov/17/t-mobile-phone-data-privacy
  • 160.EU warns on Facebook privacy, http://www.nytimes.com/2009/01/27/technology/ 27iht-facebook.4-417144.html
  • 161.German minister warns Facebook over privacy rules, http://blog.foreignpolicy. com/posts/2010/04/05/german_minister_warns_facebook_over_privacy_rules
  • 162.Cattuto C., Van den Broeck W., Barrat A., Colizza V., Pinton J.-F., Vespignani A. PLoS ONE. 2010;5:e11596. doi: 10.1371/journal.pone.0011596. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 163.Krumm J. Person. Ubiquit. Comp. 2009;13:391. doi: 10.1007/s00779-008-0212-5. [DOI] [Google Scholar]
  • 164.Helbing D., Yu W. PNAS. 2010;107:5265. doi: 10.1073/pnas.1000140107. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 165.Internet Reputation Management: neutralize negative publicity, http://www. internet-reputation-management.com/
  • 166.Reputation Management Consultants, http://www.reputationmanagementconsultants. com/
  • 167.Reputation Defender, http://www.reputationdefender.com/
  • 168.Squidoo: Internet Reputation Management, http://www.squidoo.com/internet- reputation-management
  • 169.European privacy seals for IT products and IT-based services, https://www. european-privacy-seal.eu/
  • 170.Ixquick: the world’s most private search engine, http://ixquick.com/
  • 171.RottenNeighbor.com was a website created to post information about neighbors and find information about new potential neighbors before moving. Launched in July 2007, it was discontinued in July 2009
  • 172.Digging into Data List of Data Repositories, http://www.diggingintodata.org/ Repositories/tabid/167/Default.aspx
  • 173.Digging into Data, http://www.diggingintodata.org/
  • 174.Transparency is at the heart of this Government, Data.gov.uk is home to national & local data for free re-use, http://data.gov.uk
  • 175.Data.Gov Empowering people, http://www.data.gov
  • 176.Dataverse Project: An Open-Source Application for Publishing, Citing and Discovering Research Data, http://thedata.org/
  • 177.Apache WSIF: Web Service Invocation Framework, http://ws.apache.org/wsif/
  • 178.ETH Financial Crisis Observatory, http://www.er.ethz.ch/fco/index
  • 179.123 People, http://www.123people.com
  • 180.Oakland Crimespotting is an interactive map of crimes in Oakland and a tool for understanding crime in cities, http://oakland.crimespotting.org
  • 181.Government requests directed to Google and YouTube, http://www.google.com/ governmentrequests/
  • 182.Mechanical Turk is a market place for work, https://www.mturk.com/mturk/welcome
  • 183.Micro Payment: professional payment provider, http://micropayment.de
  • 184.Vanish: self-destructing digital data, http://vanish.cs.washington.edu
  • 185.Did you watch porn? http://www.didyouwatchporn.com
  • 186.What the Internet knows about you, This page checks your browser history and determines which of the 5000 most popular Internet websites you’ve recently visited, http://www.whattheinternetknowsaboutyou.com
  • 187.P. Eckersley, How Unique Is Your Web Browser? (Electronic Frontier Foundation, 2009)
  • 188.Panopticlick: How unique and trackable is your browser? https://panopticlick. eff.org
  • 189.EFF: Forget cookies, your browser has fingerprints, http://www.computerworld. com/s/article/9176904/EFF_Forget_cookies_your_browser_has_fingerprints
  • 190.WUALA, Backup. Store. Share. Access Everywhere, http://www.wuala.com/
  • 191.Tor: anonymity online, http://www.torproject.org/
  • 192.Freenet, the free network, http://freenetproject.org/
  • 193.QLectives (Quality Collectives), http://www.qlectives.eu
  • 194.Datenschutz fr iPhone-Apps, http://www.ethlife.ethz.ch/archive_articles/ 100930_MBusiness_Apps_sch/index
  • 195.DIASPORA, The privacy aware, personally controlled, do-it-all, open source social network, http://www.joindiaspora.com/
  • 196.Security Focus, http://www.securityfocus.com
  • 197.ICKN Galaxy Advisors, http://ickn.org
  • 198.PostRank: Intelligence from the social web, http://www.postrank.com/
  • 199.Soziale Netzwerke verraten künftiges Käuferverhalten, http://www.tagesanzeiger. ch/digital/internet/Soziale-Netzwerke-verraten-kuenftiges-Kaeuferverhalten/ story/19928880
  • 200.Gaber M.M., Zaslavsky A., Krishnaswamy S. ACM SIGMOD Record Arch. 2005;34:18. doi: 10.1145/1083784.1083789. [DOI] [Google Scholar]
  • 201.A. Bifet, R.K. August, Data Stream Mining: A Practical Approach (The University of Waikato, 2009)
  • 202.J. Leskovec, L. Backstrom, J. Kleinberg, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (2009), p. 497
  • 203.R. Agrawal, R. Srikant, Proceedings of the 2000 ACM SIGMOD international conference on Management of data (2000), p. 439
  • 204.P. Samarati, L. Sweeney, Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (ACM Press, 1998)
  • 205.C.C. Aggarwal, P.S. Yu, Privacy-Preserving Data Mining: Models and Algorithms (Springer, 2008), p. 530
  • 206.Atzori M., Bonchi F., Giannotti F., Pedreschi D. VLDB J. 2006;17:703. [Google Scholar]
  • 207.Chen B.C., Kifer D., LeFevre K., Machanavajjhala A. Found. Trends Databases. 2009;2:1167. [Google Scholar]
  • 208.Chen B.-C., Kifer D., LeFevre K., Machanavajjhala A. Found. Trends Databases. 2009;2:1167. [Google Scholar]
  • 209.A. Narayanan, V. Shmatikov, IEEE Symposium on In Security and Privacy SP 2008 (IEEE Symposium, 2008), p. 111
  • 210.R. Jones, R. Kumar, B. Pang, A. Tomkins, CIKM ’08: Proceeding of the 17th ACM conference on Information and knowledge management (2008), p. 853
  • 211.F. Giannotti, D. Pedreschi, Mobility, Data Mining and Privacy: Geographic Knowledge Discovery (Springer, 2008), p. 410
  • 212.Monreale A., Andrienko G., Andrienko N., Giannotti F., Pedreschi D., Rinzivillo S., Wrobel S. Transactions on Data Privacy. 2010;3:91. [Google Scholar]
  • 213.Project Gaydar, http://www.boston.com/bostonglobe/ideas/articles/2009/09/20/ project_gaydar_an_mit_experiment_raises_new_questions_about_online_privacy/

Articles from The European Physical Journal. Special Topics are provided here courtesy of Nature Publishing Group

RESOURCES