Collections and strategies of seeded users Problems and strategies of 5S Techniques and strategies for detection