. 8, iss. 1, pp. 178–194, Jan. 2005. https://doi.org/10.1016/j.red.2004.10.003
 R. Zhao, G. Neighbour, J. Han, M. McGuire, and P. Deutz, “Using game theory to describe strategy selection for environmental risk and carbon emissions reduction in the green supply chain,” Journal of Loss Prevention in the Process Industries , vol. 25, iss. 6, pp. 927–936, Nov. 2012. https://doi.org/10.1016/j.jlp.2012.05.004
 J. Scheffran, “The dynamic interaction between economy and ecology: Cooperation, stability and sustainability for a dynamic-game model of
Damien Desfontaines, Andreas Lochbihler and David Basin
extension extension adding HyperLogLog data structures as a native data type. https://github.com/citusdata/postgresql-hll . Accessed: 2018-05-03.
 Vikas G Ashok and Ravi Mukkamala. 2014. A scalable and efficient privacy preserving global itemset support approximation using Bloom filters. In IFIP Annual Conference on Data and Applications Security and Privacy . Springer, 382–389.
 Ziv Bar-Yossef, TS Jayram, Ravi Kumar, D Sivakumar, and Luca Trevisan. 2002. Counting distinct elements in a data stream. In International Workshop on Randomization and
Anh Pham, Italo Dacosta, Bastien Jacot-Guillarmod, Kévin Huguenin, Taha Hajar, Florian Tramèr, Virgil Gligor and Jean-Pierre Hubaux
: May 2016.
 http://www.businessinsider.com/blake-jareds-50000-uber-credit-free-rides-for-life-2014-4 . Last visited: May 2016.
 http://fortune.com/2015/03/30/uber-stolen-account-credentials-alphabay/ . Last visited: May 2016.
 Cryptographic key length recommendation. http://www.keylength.com/en/ . Last visited: May 2016.
 G. Arfaoui, J.-F. Lalande, J. Traoré, N. Desmoulins, P. Berthomé, and S. Gharout. A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. Proc. of the 15th Privacy Enhancing Technologies
,” Complex Systems Informatics and Modeling Quarterly, no. 7, pp. 51–59, 2016. https://doi.org/10.7250/csimq.2016-7.03
 “Latvian positive and negative sentiment words.” [Online]. Available: https://github.com/pumpurs/SentimentWordsLV . [Accessed: Mar. 10, 2018].
 G. Špats, “Resources for opinion mining for written content classification in Latvian text.” [Online]. Available: https://github.com/gatis/om/tree/master/lexicon . [Accessed: Mar. 10, 2018].
 N. Loukachevitch and Y. Rubtsova, “Entity-Oriented Sentiment Analysis of Tweets: Results
Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks
Michael Backes, Sebastian Meiser and Marcin Slowik
), CCS ’14, pages 513-524. ACM, ACM, 2014.
 M. Backes and B. Köpf. Quantifying information flow in cryptographic systems. Mathematical Structures in Computer Science, 25(2):457-479, 2015.
 M. Backes, S. Meiser, and M. Slowik. Your choice mator(s): Large-scale quantitative anonymity assessment of tor path selection algorithms against structural attacks. Technical Report A/03/2015, Saarland University, December 2015.
 C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In Privacy
William Melicher, Mahmood Sharif, Joshua Tan, Lujo Bauer, Mihai Christodorescu and Pedro Giovanni Leon
. Privacy, trust, and self-disclosure online. Human- Computer Interaction, 25(1):1-24, 2010.
 A. Lambrecht and C. Tucker. When does retargeting work? Information specificity in online advertising. Journal of Marketing Research, 2013.
 P. Leon, B. Ur, R. Shay, Y. Wang, R. Balebako, and L. Cranor. Why Johnny can’t opt out: A usability evaluation of tools to limit online behavioral advertising. In Proc. CHI, 2012.
 P. G. Leon, B. Ur, Y. Wang, M. Sleeper, R. Balebako, R. Shay, L. Bauer, M. Christodorescu, and L. F
Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker and Michael Zohner
. In USENIX Security’11 , pages 539–554. USENIX, 2011.
 S. G. Choi, K.-W. Hwang, J. Katz, T. Malkin, and D. Rubenstein. Secure multi-party computation of Boolean circuits with applications to privacy in on-line marketplaces. In CT-RSA’12 , volume 7178 of LNCS , pages 416–432. Springer, 2012.
 P. Bogetoft, D. L. Christensen, I. Damgård, M. Geisler, T. Jakobsen, M. Krøigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, and T. Toft. Secure multiparty computation goes live. In FC’09 , volume 5628 of LNCS , pages 325
Modelling & Sources, vol. 25, no. 2, pp. 82-198, Feb. 2010. Available: Sciencedirect, http://www.sciencedirect.com. [Accessed: Sept. 23, 2010]. http://www.sciencedirect.com
C. Kiehle , "Business Logic for Geoprocessing of Distributed Geodata", Computers & Geosciences, Vol. 32, Issue 10, Elsevier Ltd, pp. 1746-1757, 2006. Available: Sciencedirect, http://www.sciencedirect.com [Accessed: Sept. 23, 2010]. http://www.sciencedirect.com
S. Steiniger, A. J. S. Hunter , Free and Open Source GIS Software for Building a Spatial
 Miller, J. and Mukerji, J., “MDA Guide Version 1.0.1”, OMG. [Online]. Available: http://www.omg.org/cgi-bin/doc?omg/03-06-01 . [Accessed: 14 March 2015].
 Osis, J., Asnina, E. and Grave, A., “Formal Computation Independent Model of the Problem Domain within the MDA,” in Information Systems and Formal Models, Proc. of the 10 th Int. Conf., ISIM’07 , Silesian University in Opava, Czech Republic, 2007, pp. 47–54.
 Osis, J., Asnina, E. and Grave, A., “Computation Independent Modeling within the MDA,” in Proc. of the IEEE
Esingbemi Princewill Ebietomere and Godspower Osaretin Ekuobase
system,” Communications of the ACM , vol. 32, no. 8, pp. 928–938, 1989. https://doi.org/10.1145/65971.65972
 P. Jackson, K. Al-Kofahi, A. Tyrrell, and A Vachher, “Information Extraction from Case Law and Retrieval of Prior Cases,” Artificial Intelligence Journal, vol. 150, no. 1–2, pp. 239–290, 2003. https://doi.org/10.1016/S0004-3702(03)00106-1
 E. M. Uijttenbroek, A. R. Lodder, M. C. A. Klein, W. G. Rildeboer, W. V. Steenbergen, R. L. L. Sie, P. E. M. Huygen, and F. van Harmelen, “Retrieval of Case Law to Provide Layman with Information about