Abstract.
The purpose of this White Paper of the EU Support Action “Visioneer”(see www.visioneer.ethz.ch) is to address the following goals:
-
1.
Develop strategies to quickly increase the objective knowledge about social and economic systems.
-
2.
Describe requirements for efficient large-scale scientific data mining of anonymized social and economic data.
-
3.
Formulate strategies how to collect stylized facts extracted from large data set.
-
4.
Sketch ways how to successfully build up centers for computational social science.
-
5.
Propose plans how to create centers for risk analysis and crisis forecasting.
-
6.
Elaborate ethical standards regarding the storage, processing, evaluation, and publication of social and economic data.
Article PDF
Similar content being viewed by others
References
Visioneer, envisioning a socio-economic knowledge collider, http://www.visioneer. ethz.ch
D. Helbing, S. Balietti, From Social Simulation to Integrative System Design. Eur. Phys. J. Special Topics 195, 69 (2011), see http://www.visioneer.ethz.ch
D. Helbing, S. Balietti, How to create an Innovation Accelerator. Eur. Phys. J. Special Topics 195, 101 (2011), see http://www.visioneer.ethz.ch
D. Helbing, S. Balietti, Formulating grand fundamental challenges. Visioneer White Paper (2010), see http://www.visioneer.ethz.ch
D. Helbing, Pluralistic Modeling of Complex Systems (July 18, 2010). CCSS-10-009, available at SSRN: http://ssrn.com/abstract=1646314(2010)
D. Helbing, S. Balietti, Fundamental and real world challenges in economics (in print) (2010)
D. Helbing, Systemic risks in society and economics, Sante Fe Institute, working paper (2009)
S.V. Buldyrev, R. Parshani, G. Paul, H.E. Stanley, S. Havlin, Nature 465, 08932 (2010)
D. Helbing, W. Yu, K.-D. Opp, H. Rauhut, Amer. J. Sociol. (submitted) (2010
See http://hussonet.free.fr/toxicap.xls
K.P. Smith, N.A. Christakis, Ann. Rev. Sociol. 34, 405 (2008)
Privatsphäre als Luxusgut, http://www.nzz.ch/blogs/nzz_blogs/betablog/ privatsphaere_als_luxusgut_1.7266824.html
D. Helbing, M. Christen, Mit Rauschen und Reibung gegen finanzielle Blasen (submitted to Wirtschaftswoche) (2010)
M. Mäs, A. Flache, D. Helbing, PLoS Computational Biology (in print) (2010)
The Future of Social Experimenting: The Full Story, http://www.soms.ethz.ch/ research/socialexperimenting
J. Surowiecki, The wisdom of crowds: Why the many are smarter than the few and how collective wisdom shapes business, economics, societies, and nations (Random House, Inc., 2004)
J.H. Kagel, A.E. Roth, The Handbook of Experimental Economics (Princeton University, 1997)
M.J. Salganik, P.S. Dodds, D.J. Watts, Science 311, 854 (2006)
W.S. Bainbridge, Science 317, 472 (2007)
N.F. Johnson, C. Xu, Z. Zhao, N. Ducheneaut, N. Yee, G. Tita, P.M. Hui, Phys. Rev. E 79, 066117 (2009)
M. Szell, S. Thurner, Social Networks (2009) (submitted) [E-print http://arxiv.org/ abs/0911.1084]
N.A. Christakis, J.H. Fowler, New Engl. J. Med. 357, 370 (2007)
N.A. Christakis, J.H. Fowler, New Engl. J. Med. 358, 2249 (2008)
J.H. Fowler, N.A. Christakis, British Med. J. 337, a2338 (2008)
J.H. Fowler, N.A. Christakis, Cooperative behavior cascades in human social networks (2009) [E-print http://arxiv.org/abs/0908.3497]
J. Howe, Wired Mag. 14, (2006)
J. Howe, Crown Busin. (2009)
D. Tapscott, A.D. Williams, Portfolio Hardcover (2008)
C.R. Sunstein, Infotopia: How Many Minds Produce Knowledge (Oxford University Press, USA, 2006)
M. Abramowicz, Predictocracy: Market Mechanisms for Public and Private Decision Making (Yale University Press, 2009)
Designing E-Business Systems. Markets, Services, and Networks. 7th Workshop on E-Business, WEB 2008, edited by C. Weinhardt, S. Luckner, J. Stösser (Paris, France, 2008)
R. Kalakota, M. Robinson, E-business 2.0: Roadmap for Success (Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 2001)
C.S.R. Prabhu, E-governance: Concepts and Case Studies (PHI Learning, 2006)
Electronic Government: 8th International Conference, EGOV 2009, edited by M.A. Wimmer, H.J. Scholl, M. Janssen, R. Traunmller (Linz, Austria, 31 August—3 September, 2009)
G.E. Moore, Electronics Magazine 4 (1965), ftp://download.intel.com/museum/ Moores_Law/Articles-Press_Releases/Gordon_Moore_1965_Article.pdf
I. Fisher, The Theory of Interest (NY, Macmillan, 1930)
B.B. Mandelbrot, J. Busin. 36, 394 (1963)
E.F. Fama, J. Busin. 38, 34 (1965)
R.K. Merton, Science 159, 56 (1968)
A. Barabasi, Science 286, 509 (1999)
R. Dunbar, Grooming, Gossip, and the Evolution of Language (Harvard University Press, 1998)
V. Pareto, Translation of Manuale di economia politica (“Manual of political economy”), A.M. Kelley (1971)
G.K. Zipf, Human Behavior and the Principle of Least-Effort (Addison-Wesley, 1949)
E. Ravenstein, The Geographical Magazine III, 173, 201, 229 (1876)
G.K. Zipf, Amer. Sociol. Rev. 11, 677 (1946)
J. Tinbergen, Shaping the World Economy: Suggestions for an International Economic policy, Twentieth Century Fund (1962)
C.A.E. Goodhart, Papers in Monetary Economics (Reserve Bank of Australia) (1975)
K.A. Chrystal, P.D. Mizen, Vol. 1 of Central Banking, Monetary Theory and Practice: Essays in Honour of Charles Goodhart, edited by P.D. Mizen (Northampton, MA, Edward Elgar, 2003)
J. Danãelsson, J. Banking Finance 26, 127396 (2002)
Ioannidis P.A. , John, PLos Med. 2, 8 (2005)
D. Lazer, et al., Science 323, 721 (2009)
Recommendations of the Association of Internet Researchers (AoIR) Ethics Working Committee, http://www.aoir.org/reports/ethics.pdf
Research Methods in the Social Sciences, edited by C. Frankfort-Nachmias, D. Nachmias (Worth Publishers, New York, 2008)
L.C. Bollinger, Announcing the Columbia committee on global thought, http://www. columbia.edu/cu/president/.../051214-committee-global-thought.html
H. Spencer, The Principles of Sociology (Appleton, New York, 1898; the three volumes were originally published in serial form between 1874 and 1896)
L. von Bertalanffy, General System Theory: Foundations, Development, Applications (George Braziller, New York, 1968)
J.M. Epstein, Generative Social Science. Studies in Agent-Based Computational Modeling (Princeton University, 2006), p. 51
J. Lorenz, H. Rauhut, F. Schweitzer D. Helbing, How social influence undermines the wisdom of crowds (submitted) (2010)
L. Molgedey, W. Ebeling, Eur. Phys. J. B-Cond. Matter Complex Syst. 15, 733737 (2000)
G. Sugihara, R.M. May, Nature 344, 734741 (1990)
D. Helbing, et al., Human Behaviour and Traffic Networks, edited by M. Schreckenberg, R. Selten (Springer, Berlin, 2004), p. 47
N. Bardsley, R. Cubitt, G. Loomes, G.P. Moffatt, R. Sugden, Experimental Economics: Rethinking the Rule (Princeton University Press, 2009)
D. Friedman, Cassar A., Economics Lab: An Intensive Course in Experimental Economics (Routledge, 2004)
D. Friedman, S. Sunder, Experimental Methods: A Primer for Economists (Cambridge University Press, 1994)
F. Guala, The Methodology of Experimental Economics (Cambridge University Press, 2005)
S. Lämmer, D. Helbing, JSTAT P04019 (2008)
M. Scheffer, J. Bascompte, W.A. Brock, V. Brovkin, S.R. Carpenter, V. Dakos, H. Held, E.H. van Nes, M Rietkerk, Nature 461, 53 (2009)
D. Helbing, S. Lämmer, D. Armbruster, A.S. Mikhailov, K. Kaneko, Networks of Interacting Machines: Production Organization in Complex Industrial Systems and Biological Cells, edited by D. Armbruster, A.S. Mikhailov, K. Kaneko (World Scientific, Singapore, 2005), p. 33
D. Helbing, H. Ammoser, C. Khnert, Extreme Events in Nature and Society, edited by S. Albeverio, V. Jentsch, H. Kantz (Springer, Berlin, 2005)
Google chief: Only miscreants worry about net privacy, http://www.theregister. co.uk/2009/12/07/schmidt_on_privacy/
Details of 100 m Facebook users collected and published, http://www.bbc.co.uk/ news/technology-10796584
L. Odling-Smee, Nature 446, 10 (2007)
The Data Deluge, The Economist, Feb 25th 2010, http://www.economist.com/node/ 15579717
Information is Power, The Guardian Data Blog, http://www.guardian.co.uk/media/ 2010/may/24/data-journalism
Building Big Society, www.cabinetoffice.gov.uk/media/407789/building-big- society.pdf
Apple confirms $1bn data center, http://www.theregister.co.uk/2009/06/04/ apple_1bn_north_carolina_data_center/
NSA plans massive, 65MW, $2bn data center in Utah, http://www.theregister. co.uk/2009/07/03/new_nsa_data_center/
Microsoft consumes Chicago data center, http://www.theregister.co.uk/2009/05/ 20/ascent_ch2_datacenter/
Google admits Scandinavian data center landing, http://www.theregister. co.uk/2009/03/05/google_finland_data_center/
Google pays $51.7m for newspaper destruction metaphor, http://www.theregister. co.uk/2009/02/12/google_buys_defunct_paper_mill/
Intel sees future in Mega Data Center, http://www.theregister.co.uk/2009/02/18/ the_intel_cloud/
R. Axelrod, The Evolution of Cooperation (Basic Books, 1984), p. 169
A. Leventhal, ACM Queue 7 (2009)
T. Hey, S. Tansley, K. Tolle, The Fourth Paradigm: Data-Intensive Scientific Discovery, edited by T. Hey, S. Tansley, K. Tolle (Microsoft Research, Redmond, Washington, 2009)
M. Banko, E. Brill, Proceedings of the 39th Annual Meeting of the Association for Computational Linguistics (ACL 2001) (Toulouse, France, 2001), p. 26
A. Halevy, P. Norvig, F. Pereira, Comm. ACM 24, 812 (2009)
T. Brants, C. Ashok, Popat, P. Xu, F.J. Och, J. Dean, Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (Prague, Czech Republic, 2007), p. 858
J. Lin, C. Dyer, Synthesis Lectures on Human Language Technologies (Morgan & Claypool, 2010)
J. Dean, S. Ghemawat, Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004) (San Francisco, California, 2004), p. 137
R. Pike, S. Dorward, R. Griesemer, S. Quinlan, Scientific Programming Journal Special Issue on Grids and Worldwide Computing Programming Models and Infrastructure 13, 227
A. Awadallah, How Hadoop Revolutionized Data Warehousing at Yahoo and Facebook (CTO, Cloudera, Inc., 2009), http://www.slideshare.net/awadallah/ how-hadoop-revolutionized-data-warehousing-at-yahoo-and-facebook
J. Hofman, Large-Scale Social Media Analysis with Hadoop (Yahoo! Research, 2010) http://www.slideshare.net/jakehofman/largescale-social-media-analysis- with-hadoop
A. Manus Mc, M.-T. Kechadi, Data Mining V: Data Mining, Text Mining and Their Business Applications (2004), p. 189
S.H. Muggleton, Nature 440, 409410 (2006)
A. Szalay, J. Gray, Nature 440, 413414 (2006)
I. Foster, Nature 440, 419 (2006)
Eds., Nature 455, 1 (2008)
S. Nelson, Nature 455, 36 (2008)
C. Lynch, Nature 455, 28 (2008)
C. Doctorow, Nature, 455, 16 (2008)
Google spotlights data center inner workings, http://news.cnet.com/8301-10784_3- 9955184-7.html
D. Butler, Nature 449, 644
Eds., Nature 449, 637
G. Pass, A. Chowdhury, C. Torgeson, Proc. 1st Int. Conference on Scalable Information Systems (Hong Kong, 2006)
N. Eagle, A. Pentland, Personal Ubiquitous Comput 10 (2006)
N. Eagle, A. Pentland, D. Lazer, PNAS 106, 36 (2009)
The Jerusalem Declaration is part of the WP9 “Data in complex systems” of the GIACS Coordination Action n. 012380, http://portale.unipa.it/ocs/home/ jerusalemSubscription.html
A. Vespignani, Science 325, 425 (2009)
A. Barabasi, Science 325, 412 (2009)
E. Ostrom, Science 325, 419 (2009
Google Flu Trends, http://www.google.org/flutrends/
N.A. Christakis, J.H. Fowler, PLoS ONE 5, e12948 (2010)
J.V. Henderson, A. Storeygard, D.N. Weil, NBER Working Paper No. w15199 (2009)
L. Backstrom, C. Dwork, J. Kleinberg, Proc. 16th Int. World Wide Web Conference (2007)
EU Commission plans more harmonisation of data protection law. http://www.out-law.com/default.aspx?page=11228
P. Bajaria, J. Yeo, Inf. Econom. Policy 21, 90 (2009)
C. Schultz, Transparency and tacit collusion (2001)
B. Kluger, S.B. Wyatt, J. Financial Quant. Anal. 37, 449 (2002)
M. Michael, J.E. Moreira, D. Shiloach, R.W. Wisniewski, Parallel and Distributed Processing Symposium, IEEE International (2007)
L.A. Barroso, Hölzle, The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines (Morgan & Claypool Publishers, 2009)
A. Jacobs, ACM Queue 7 (2009)
SSD Myths and Legends - “write endurance”, http://www.storagesearch.com/ ssdmyths-endurance.html
A. Mazlouimian, D. Helbing, Y.-H. Eom, S. Lozano, S. Fortunato, How citation boosts trigger scientific paradigm shifts (2010) (in preparation)
D. Helbing, M. Treiber, N.J. Saam, Phys. Rev. E 71, 067101 (2005)
S.E. Asch, Psychol. Monogr. 70, 9 (1956)
F. Winter, H. Rauhut, D. Helbing, Jena Economic Research Papers (2009)
D. Helbing, A. Johansson, SFI Working Paper #09-09-040 (2009)
D. Helbing, W. Yu, Proceedings of the National Academy of Sciences USA (PNAS) 106, 3680 (2009)
D. Helbing, W. Yu, H. Rauhut, Self-organization and emergence in social systems, Modeling the coevolution of social environments and cooperative behavior, SFI Working Paper #09-07-026 (2009)
Four million British identities are up for sale on the Internet, http://technology. timesonline.co.uk/tol/news/tech_and_web/the_web/article6718560.ece
E. Diener, R. Crandall, Ethics in Social and Behavioral Research (University of Chicago Press, Chicago, 1978)
R. Geambasu, T. Kohno, A. Levy, H.M. Levy, Proceedings of the USENIX Security Symposium (Montreal, Canada, 2009)
It seems it not so easy to clear ones name on-line, even when trying hard. This is specially true for traces left on social network Web sites, for which specific applications, such as http://suicidemachine.org/, have been created in order to accomplish this task. For a discussion based on a true story see http://ask.slashdot.org/story/09/12/10/2115238/Best-Way-To-Clear-Your- Name-Online
Data, data everywhere, The Economist (2010)
L. Lessig, Against Transparency, The New Republic (2009), http://www.tnr.com/ article/books-and-arts/against-transparency
A. Diekmann, W. Przepiorka, H. Rauhut, Z. Soziol. 40, 74 (2011)
A.C. Kinsey, W.B. Pomeroy, C.E. Martin, Sexual Behavior in the Human Male (Saunders, Philadelphia, 1948)
A.C. Kinsey, W.B. Pomeroy, C.E. Martin, P.H. Gebhard, Sexual Behavior in the Human Female (Saunders, Philadelphia, 1953)
Symantec Internet Security Threat Report, http://www.symantec.com/business/ theme.jsp?themeid=threatreport
A. Janc, L. Olejnik, Feasibility and Real-World Implications of Web Browser History Detection
G. Wondracek, T. Holz, E. Kirda, C. Kruegel, A Practical Attack to De-Anonymize Social Network Users. Technical Report TR-iSecLab-0110-001
Google admits it accidentally gathered WiFi data, http://www.ft.com/cms/s/2/ 8a23b394-5fab-11df-a670-00144feab49a.html
Google to hand over intercepted data, http://www.ft.com/cms/s/2/db664044-6f43- 11df-9f43-00144feabdc0.html
Lawyers Claim Google Wi-Fi Sniffing “Is Not an Accident”, http://gizmodo. com/5554960/lawyers-claim-google-wi+fi-sniffing-is-not-an-accident
Wi-Fi Data Captured By Google Street View Cars Included Passwords, http://gizmodo.com/5567460/wi+fi-data-captured-by-google-street-view- cars-included-passwords
Statement of Ethical Practice for the British Sociological Association, BSA, the British Sociological Society, 2002, http://www.britsoc.co.uk/equality/ Statement+Ethical+Practice.htm
Ethical Guidelines, Social Research Association (2003), http://www.the-sra. org.uk/ethical.htm
D. Sally, I. Ron, H. Ursula, An EU Code of Ethics for Socio-Economic Research (The Institute of Employment Studies, 2004)
The British Psychological Society, Report of the Working Party on Conducting Research on the Internet (2007), http://www.bps.org.uk/the-society/code-of- conduct/
Senator calls on FTC to tackle social-net privacy, http://news.cnet.com/ 8301-13577_3-20003415-36.html
The Electronic Frontier Foundation published a timeline of Facebook’s privacy policy modifications over the years, http://www.eff.org/deeplinks/2010/04/ facebook-timeline
Watchdog files complaint over Facebook “privacy” settings, http://www. theregister.co.uk/2009/12/17/epic_facebook_privacy_complain/
Exclusive: Google, CIA Invest in “Future” of Web Monitoring, http://www. wired.com/dangerroom/2010/07/exclusive-google-cia/
X. Su, T.M. Khoshgoftaar, Adv. Artificial Intell. (2009)
E.J. Candes, T. Tao, IEEE Trans. Inform. Theory 56, 2053 (2009)
M. Bezzi, et al. (eds.), Privacy and Identity Management for Life (Springer, 2009)
G. Ziegler, C. Farkas, A. Lörincz, Inf. Software Technol. 48, 726 (2006)
Apple’s Worst Security Breach: 114,000 iPad Owners Exposed, http://gawker. com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed
T-Mobile confirms biggest phone customer data breach, http://www.guardian. co.uk/uk/2009/nov/17/t-mobile-phone-data-privacy
EU warns on Facebook privacy, http://www.nytimes.com/2009/01/27/technology/ 27iht-facebook.4-417144.html
German minister warns Facebook over privacy rules, http://blog.foreignpolicy. com/posts/2010/04/05/german_minister_warns_facebook_over_privacy_rules
C. Cattuto, W. Van den Broeck, A. Barrat, V. Colizza, J.-F. Pinton, A. Vespignani, PLoS ONE 5, e11596 (2010)
J. Krumm, Person. Ubiquit. Comp. 13, 391 (2009)
D. Helbing, W. Yu, PNAS 107, 5265 (2010)
Internet Reputation Management: neutralize negative publicity, http://www. internet-reputation-management.com/
Reputation Management Consultants, http://www.reputationmanagementconsultants. com/
Reputation Defender, http://www.reputationdefender.com/
Squidoo: Internet Reputation Management, http://www.squidoo.com/internet- reputation-management
European privacy seals for IT products and IT-based services, https://www. european-privacy-seal.eu/
Ixquick: the world’s most private search engine, http://ixquick.com/
RottenNeighbor.com was a website created to post information about neighbors and find information about new potential neighbors before moving. Launched in July 2007, it was discontinued in July 2009
Digging into Data List of Data Repositories, http://www.diggingintodata.org/ Repositories/tabid/167/Default.aspx
Digging into Data, http://www.diggingintodata.org/
Transparency is at the heart of this Government, Data.gov.uk is home to national & local data for free re-use, http://data.gov.uk
Data.Gov Empowering people, http://www.data.gov
Dataverse Project: An Open-Source Application for Publishing, Citing and Discovering Research Data, http://thedata.org/
Apache WSIF: Web Service Invocation Framework, http://ws.apache.org/wsif/
ETH Financial Crisis Observatory, http://www.er.ethz.ch/fco/index
123 People, http://www.123people.com
Oakland Crimespotting is an interactive map of crimes in Oakland and a tool for understanding crime in cities, http://oakland.crimespotting.org
Government requests directed to Google and YouTube, http://www.google.com/ governmentrequests/
Mechanical Turk is a market place for work, https://www.mturk.com/mturk/welcome
Micro Payment: professional payment provider, http://micropayment.de
Vanish: self-destructing digital data, http://vanish.cs.washington.edu
Did you watch porn? http://www.didyouwatchporn.com
What the Internet knows about you, This page checks your browser history and determines which of the 5000 most popular Internet websites you’ve recently visited, http://www.whattheinternetknowsaboutyou.com
P. Eckersley, How Unique Is Your Web Browser? (Electronic Frontier Foundation, 2009)
Panopticlick: How unique and trackable is your browser? https://panopticlick. eff.org
EFF: Forget cookies, your browser has fingerprints, http://www.computerworld. com/s/article/9176904/EFF_Forget_cookies_your_browser_has_fingerprints
WUALA, Backup. Store. Share. Access Everywhere, http://www.wuala.com/
Tor: anonymity online, http://www.torproject.org/
Freenet, the free network, http://freenetproject.org/
QLectives (Quality Collectives), http://www.qlectives.eu
Datenschutz fr iPhone-Apps, http://www.ethlife.ethz.ch/archive_articles/ 100930_MBusiness_Apps_sch/index
DIASPORA, The privacy aware, personally controlled, do-it-all, open source social network, http://www.joindiaspora.com/
Security Focus, http://www.securityfocus.com
ICKN Galaxy Advisors, http://ickn.org
PostRank: Intelligence from the social web, http://www.postrank.com/
Soziale Netzwerke verraten künftiges Käuferverhalten, http://www.tagesanzeiger. ch/digital/internet/Soziale-Netzwerke-verraten-kuenftiges-Kaeuferverhalten/ story/19928880
M.M. Gaber, A. Zaslavsky, S. Krishnaswamy, ACM SIGMOD Record Arch. 34, 18 (2005)
A. Bifet, R.K. August, Data Stream Mining: A Practical Approach (The University of Waikato, 2009)
J. Leskovec, L. Backstrom, J. Kleinberg, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (2009), p. 497
R. Agrawal, R. Srikant, Proceedings of the 2000 ACM SIGMOD international conference on Management of data (2000), p. 439
P. Samarati, L. Sweeney, Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (ACM Press, 1998)
C.C. Aggarwal, P.S. Yu, Privacy-Preserving Data Mining: Models and Algorithms (Springer, 2008), p. 530
M. Atzori, F. Bonchi, F. Giannotti, D. Pedreschi, VLDB J. 17, 703 (2006)
B.C. Chen, D. Kifer, K. LeFevre, A., Machanavajjhala, Found. Trends Databases 2, 1167 (2009)
B.-C. Chen, D. Kifer, K. LeFevre, A., Machanavajjhala, Found. Trends Databases 2, 1167 (2009)
A. Narayanan, V. Shmatikov, IEEE Symposium on In Security and Privacy SP 2008 (IEEE Symposium, 2008), p. 111
R. Jones, R. Kumar, B. Pang, A. Tomkins, CIKM ’08: Proceeding of the 17th ACM conference on Information and knowledge management (2008), p. 853
F. Giannotti, D. Pedreschi, Mobility, Data Mining and Privacy: Geographic Knowledge Discovery (Springer, 2008), p. 410
A. Monreale, G. Andrienko, N. Andrienko, F. Giannotti, D. Pedreschi, S. Rinzivillo, S. Wrobel, Transactions on Data Privacy 3, 91 (2010), http://www.tdp.cat/ issues/abs.a045a10.php
Project Gaydar, http://www.boston.com/bostonglobe/ideas/articles/2009/09/20/ project_gaydar_an_mit_experiment_raises_new_questions_about_online_privacy/
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Helbing, D., Balietti, S. From social data mining to forecasting socio-economic crises. Eur. Phys. J. Spec. Top. 195, 3–68 (2011). https://doi.org/10.1140/epjst/e2011-01401-8
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1140/epjst/e2011-01401-8