Results for ' Data Protection Law'

919 found
Order:
  1. Why a right to explanation of automated decision-making does not exist in the General Data Protection Regulation.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - International Data Privacy Law 1 (2):76-99.
    Since approval of the EU General Data Protection Regulation (GDPR) in 2016, it has been widely and repeatedly claimed that the GDPR will legally mandate a ‘right to explanation’ of all decisions made by automated or artificially intelligent algorithmic systems. This right to explanation is viewed as an ideal mechanism to enhance the accountability and transparency of automated decision-making. However, there are several reasons to doubt both the legal existence and the feasibility of such a right. In contrast (...)
    Download  
     
    Export citation  
     
    Bookmark   63 citations  
  2. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  3. The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The complaint about ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Digital privacy and the law: the challenge of regulatory capture.Bartek Chomanski & Lode Lauwaert - 2024 - AI and Society.
    Digital privacy scholars tend to bemoan ordinary people’s limited knowledge of and lukewarm interest in what happens to their digital data. This general lack of interest and knowledge is often taken as a consideration in favor of legislation aiming to force internet companies into adopting more responsible data practices. While we remain silent on whether any new laws are called for, in this paper we wish to underline a neglected consequence of people’s ignorance of and apathy for digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Towards a digital ethics: EDPS ethics advisory group.J. Peter Burgess, Luciano Floridi, Aurélie Pols & Jeroen van den Hoven - 2018 - EDPS Ethics Advisory Group.
    The EDPS Ethics Advisory Group (EAG) has carried out its work against the backdrop of two significant social-political moments: a growing interest in ethical issues, both in the public and in the private spheres and the imminent entry into force of the General Data Protection Regulation (GDPR) in May 2018. For some, this may nourish a perception that the work of the EAG represents a challenge to data protection professionals, particularly to lawyers in the field, as (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Anti-doping, purported rights to privacy and WADA's whereabouts requirements: A legal analysis.Oskar MacGregor, Richard Griffith, Daniele Ruggiu & Mike McNamee - 2013 - Fair Play 1 (2):13-38.
    Recent discussions among lawyers, philosophers, policy researchers and athletes have focused on the potential threat to privacy posed by the World Anti-Doping Agency’s (WADA) whereabouts requirements. These requirements demand, among other things, that all elite athletes file their whereabouts information for the subsequent quarter on a quarterly basis and comprise data for one hour of each day when the athlete will be available and accessible for no advance notice testing at a specified location of their choosing. Failure to file (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  7. Engaging the Public in Ethical Reasoning About Big Data.Justin Anthony Knapp - 2016 - In Soren Adam Matei & Jeff Collman (eds.), Ethical Reasoning in Big Data: An Exploratory Analysis. Springer. pp. 43-52.
    The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia that contrast with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Ownership of personal data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  9. Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In Philosophical Foundations of Medical Law. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. W poszukiwaniu ontologicznych podstaw prawa. Arthura Kaufmanna teoria sprawiedliwości [In Search for Ontological Foundations of Law: Arthur Kaufmann’s Theory of Justice].Marek Piechowiak - 1992 - Instytut Nauk Prawnych PAN.
    Arthur Kaufmann is one of the most prominent figures among the contemporary philosophers of law in German speaking countries. For many years he was a director of the Institute of Philosophy of Law and Computer Sciences for Law at the University in Munich. Presently, he is a retired professor of this university. Rare in the contemporary legal thought, Arthur Kaufmann's philosophy of law is one with the highest ambitions — it aspires to pinpoint the ultimate foundations of law by explicitly (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Functioning of Healthcare Facilities under the Martial Law.Tetiana Sviatenko, Inna Gogunska, Oleksandr P. Krupskyi, Tetiana Ihnatova & Liubov Bilyk - 2023 - Khazar Journal of Humanities and Social Sciences 26 (3):24-27.
    This topic focuses on the problems that arise in providing medical care to the population during armed conflict or martial law. Under such conditions, hospitals, clinics, and other healthcare facilities have to work in challenging circumstances with limited resources and reduced security for medical personnel. This topic explores such issues as how martial law affects the work of medical institutions, what problems arise in providing medical care to the population in war, how war affects the health of the people, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation.Sally Serena Ramage - 2010 - Current Criminal Law 2 (3):2-7.
    Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation Pages 2-7 Current Criminal Law ISSN 1758-8405 Volume 2 Issue 3 March 2010 Author SALLY RAMAGE WIPO 900614 UK TM 2401827 USA TM 3,440.910 Orchid ID 0000-0002-8854-4293 Sally Ramage, BA (Hons), MBA, LLM, MPhil, MCIJ, MCMI, DA., ASLS, BAWP. Publisher & Managing Editor, Criminal Lawyer series [1980-2022](ISSN 2049-8047); Current Criminal Law series [2008-2022] (ISSN 1758-8405) and Criminal Law News series [2008-2022] (ISSN 1758-8421). Sweet & Maxwell (Thomson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Is Time Travel Too Strange to Be Possible? - Determinism and Indeterminism on Closed Timelike Curves.Ruward A. Mulder & Dennis Dieks - 2017 - In Anguel S. Stefanov & Marco Giovanelli (eds.), General Relativity 1916 - 2016. Minkowski Institute Press. pp. 93-114.
    Notoriously, the Einstein equations of general relativity have solutions in which closed timelike curves occur. On these curves time loops back onto itself, which has exotic consequences: for example, traveling back into one's own past becomes possible. However, in order to make time travel stories consistent constraints have to be satisfied, which prevents seemingly ordinary and plausible processes from occurring. This, and several other "unphysical" features, have motivated many authors to exclude solutions with CTCs from consideration, e.g. by conjecturing a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. A practical checklist for return of results from genomic research in the European context.Danya F. Vears, Signe Mežinska, Nina Hallowell, Heidi Beate Hallowell, Bridget Ellul, Therese Haugdahl Nøst, , Berge Solberg, Angeliki Kerasidou, Shona M. Kerr, Michaela Th Mayrhofer, Elizabeth Ormondroyd, Birgitte Wirum Sand & Isabelle Budin-Ljøsne - 2023 - European Journal of Human Genetics 1:1-9.
    An increasing number of European research projects return, or plan to return, individual genomic research results (IRR) to participants. While data access is a data subject’s right under the General Data Protection Regulation (GDPR), and many legal and ethical guidelines allow or require participants to receive personal data generated in research, the practice of returning results is not straightforward and raises several practical and ethical issues. Existing guidelines focusing on return of IRR are mostly project-specific, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  75
    Trustworthy use of artificial intelligence: Priorities from a philosophical, ethical, legal, and technological viewpoint as a basis for certification of artificial intelligence.Jan Voosholz, Maximilian Poretschkin, Frauke Rostalski, Armin B. Cremers, Alex Englander, Markus Gabriel, Hecker Dirk, Michael Mock, Julia Rosenzweig, Joachim Sicking, Julia Volmer, Angelika Voss & Stefan Wrobel - 2019 - Fraunhofer Institute for Intelligent Analysis and Information Systems Iais.
    This publication forms a basis for the interdisciplinary development of a certification system for artificial intelligence. In view of the rapid development of artificial intelligence with disruptive and lasting consequences for the economy, society, and everyday life, it highlights the resulting challenges that can be tackled only through interdisciplinary dialogue between IT, law, philosophy, and ethics. As a result of this interdisciplinary exchange, it also defines six AI-specific audit areas for trustworthy use of artificial intelligence. They comprise fairness, transparency, autonomy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Open data, data protection, and group privacy.Luciano Floridi - 2014 - Philosophy and Technology 27 (1):1–3.
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  17. Soft ethics: its application to the General Data Protection Regulation and its dual advantage.Luciano Floridi - 2018 - Philosophy and Technology 31 (1):163-167.
    In previous works (Floridi 2018) I introduced the distinction between hard ethics (which may broadly be described as what is morally right and wrong independently of whether something is legal or illegal), and soft or post-compliance ethics (which focuses on what ought to be done over and above existing legislation). This paper analyses the applicability of soft ethics to the General Data Protection Regulation and advances the theory that soft ethics has a dual advantage—as both an opportunity strategy (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  18. 50 questions on Active Assisted Living technologies. Global edition.Francisco Florez-Revuelta, Alin Ake-Kob, Pau Climent-Perez, Paulo Coelho, Liane Colonna, Laila Dahabiyeh, Carina Dantas, Esra Dogru-Huzmeli, Hazim Kemal Ekenel, Aleksandar Jevremovic, Nina Hosseini-Kivanani, Aysegul Ilgaz, Mladjan Jovanovic, Andrzej Klimczuk, Maksymilian M. Kuźmicz, Petre Lameski, Ferlanda Luna, Natália Machado, Tamara Mujirishvili, Zada Pajalic, Galidiya Petrova, Nathalie G. S. Puaschitz, Maria Jose Santofimia, Agusti Solanas, Wilhelmina van Staalduinen & Ziya Ata Yazici - 2024 - Alicante: University of Alicante.
    This booklet on Active Assisted Living (AAL) technologies has been created as part of the GoodBrother COST Action, which has run from 2020 to 2024. COST Actions are European research programs that promote collaboration across borders, uniting researchers, professionals, and institutions to address key societal challenges. GoodBrother focused on ethical and privacy concerns surrounding video and audio monitoring in care settings. The aim was to ensure that while AAL technologies help older adults and vulnerable individuals, their privacy and data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. The 1 law of "absolute reality"." ~, , Data", , ", , Value", , = O. &Gt, Being", & Human - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  20. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in Gaza (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. The DNA Technology (Use and Application) Regulation Bill, 2019: A Critical Analysis.Deepa Kansra, Manpreet Dhillon, Mandira Narain, Prabhat Mishra, Nupur Chowdhury & P. Puneeth - 2021 - Indian Law Institute Law Review 1 (Winter):278-301.
    The aim of this paper is to explain the emergence and use of DNA fingerprinting technology in India, noting the specific concerns faced by the Indian Legal System related to the use of this novel forensic technology in the justice process. Furthermore, the proposed construction of a National DNA Data Bank is discussed taking into consideration the challenges faced by the government in legislating the DNA Bill into law. A critical analysis of the DNA Technology (Use and Application) Regulation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. The Two-Tiered Ethics of EDP.Edmund F. Byrne - 1995 - Journal of Business Ethics 14 (1):53-61.
    Ethical questions regarding access to and use of electronically generated data are (if asked) commonly resolved by distinguishing in Lockean fashion between raw (unworked) and refined (worked) data. The former is thought to belong to no one, the latter to the collector and those to whom the collector grants access. Comparative power separates free riders from rightful owners. The resulting two-tiered ethics of access is here challenged on the grounds that it inequitably establishes a rule of law for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  59
    Are publicly available (personal) data “up for grabs”? Three privacy arguments.Elisa Orrù - 2024 - In Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta (eds.), Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World. London: Hart. pp. 105-123.
    The re-use of publicly available (personal) data for originally unanticipated purposes has become common practice. Without such secondary uses, the development of many AI systems like large language models (LLMs) and ChatGPT would not even have been possible. This chapter addresses the ethical implications of such secondary processing, with a particular focus on data protection and privacy issues. Legal and ethical evaluations of secondary processing of publicly available personal data diverge considerably both among scholars and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Developing a Trusted Human-AI Network for Humanitarian Benefit.Susannah Kate Devitt, Jason Scholz, Timo Schless & Larry Lewis - forthcoming - Journal of Digital War:TBD.
    Humans and artificial intelligences (AI) will increasingly participate digitally and physically in conflicts yet there is a lack of trusted communications across agents and platforms. For example, humans in disasters and conflict already use messaging and social media to share information, however, international humanitarian relief organisations treat this information as unverifiable and untrustworthy. AI may reduce the ‘fog-of-war’ and improve outcomes, however current AI implementations are often brittle, have a narrow scope of application and wide ethical risks. Meanwhile, human error (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Impossibility of Emergent Works’ Protection in U.S. and EU Copyright Law.Matt Blaszczyk - 2023 - North Carolina Journal of Law and Technology 25 (1):1-55.
    Protection of emergent works is impossible. Without an author, there is no expression of ideas which can be original, and thus no copyrightable work. Indeed, the whole system of copyright law, its conceptual building blocks of idea-expression dichotomy, originality, authorship, and the concept of a protectable work operate in the notation of human creativity. Emergent works fall outside of copyright’s positive ontology, being akin to ideas, facts, or subject-matter predicated by technical considerations, rather than authorial creativity. In other words, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Kuhn’s ‘5th Law of Thermodynamics’: Measurement, Data, and Anomalies.Alisa Bokulich & Federica Bocchi - 2024 - In K. Brad Wray (ed.), Kuhn's The Structure of Scientific Revolutions at 60. Cambridge University Press.
    We reconstruct Kuhn’s philosophy of measurement and data paying special attention to what he calls the “fifth law of thermodynamics”. According to this "law," there will always be discrepancies between experimental results and scientists’ prior expectations. The history of experiments to determine the values of the fundamental constants offers a striking illustration of Kuhn’s fifth law of thermodynamics, with no experiment giving quite the expected result. We highlight the synergy between Kuhn’s view and the systematic project of iteratively determining (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Can Human Rights Law Protect Against Humiliation?Deepa Kansra - 2023 - Psychology Today Blog.
    Humiliation, as dealt with under different legal jurisdictions, poses a question about how these systems perceive and respond to humiliation. Are the laws' definitions, approach, and punishment appropriately determined? And if there are challenges to implementation, what are they?
    Download  
     
    Export citation  
     
    Bookmark  
  29. The use of confidentiality and anonymity protections as a cover for fraudulent fieldwork data.M. V. Dougherty - 2021 - Research Ethics 17 (4):480-500.
    Qualitative fieldwork research on sensitive topics sometimes requires that interviewees be granted confidentiality and anonymity. When qualitative researchers later publish their findings, they must ensure that any statements obtained during fieldwork interviews cannot be traced back to the interviewees. Given these protections to interviewees, the integrity of the published findings cannot usually be verified or replicated by third parties, and the scholarly community must trust the word of qualitative researchers when they publish their results. This trust is fundamentally abused, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. (1 other version)Open data, open review and open dialogue in making social sciences plausible.Quan-Hoang Vuong - 2017 - Nature: Scientific Data Updates 2017.
    Nowadays, protecting trust in social sciences also means engaging in open community dialogue, which helps to safeguard robustness and improve efficiency of research methods. The combination of open data, open review and open dialogue may sound simple but implementation in the real world will not be straightforward. However, in view of Begley and Ellis’s (2012) statement that, “the scientific process demands the highest standards of quality, ethics and rigour,” they are worth implementing. More importantly, they are feasible to work (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  31. The Law of Political Economy: Transformation in the Function of Law. Edited by Poul F. Kjaer.Poul F. Kjaer - 2020 - Cambridge, Storbritannien: Cambridge University Press.
    This book develops the law of political economy as a new field of scholarly enquiry. Bringing together an exceptional group of scholars, it provides a novel conceptual framework for studying the role of law and legal instruments in political economy contexts, with a focus on historical transformations and central challenges in both European and global contexts. Its chapters reconstruct how the law of political economy plays out in diverse but central fields, ranging from competition and consumer protection law to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Data subject rights as a research methodology: A systematic literature review.Adamu Adamu Habu & Tristan Henderson - 2023 - Journal of Responsible Technology 16 (C):100070.
    Data subject rights provide data controllers with obligations that can help with transparency, giving data subjects some control over their personal data. To date, a growing number of researchers have used these data subject rights as a methodology for data collection in research studies. No one, however, has gathered and analysed different academic research studies that use data subject rights as a methodology for data collection. To this end, we conducted a systematic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Data and Afrofuturism: an emancipated subject?Aisha Paulina Lami Kadiri - 2021 - Internet Policy Review 10 (4):1-26.
    The concept of an individual, liberal data subject, who was traditionally at the centre of data protection efforts has recently come under scrutiny. At the same time, the particularly destructive effect of digital technology on Black people establishes the need for an analysis that not only considers but brings racial dimensions to the forefront. I argue that because Afrofuturism situates the Black struggle in persistent, yet continuously changing structural disparities and power relations, it offers a powerful departure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  66
    Big Data Ethics in Education and Research.Nicolae Sfetcu - 2023 - It and C 2 (3):26-35.
    Big data ethics involves adherence to the concepts of right and wrong behavior regarding data, especially personal data. Big Data ethics focuses on structured or unstructured data collectors and disseminators. Big data ethics is supported, at EU level, by extensive documentation, which seeks to find concrete solutions to maximize the value of big data without sacrificing fundamental human rights. The European Data Protection Supervisor (EDPS) supports the right to privacy and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. ICTs, data and vulnerable people: a guide for citizens.Alexandra Castańeda, Andreas Matheus, Andrzej Klimczuk, Anna BertiSuman, Annelies Duerinckx, Christoforos Pavlakis, Corelia Baibarac-Duignan, Elisabetta Broglio, Federico Caruso, Gefion Thuermer, Helen Feord, Janice Asine, Jaume Piera, Karen Soacha, Katerina Zourou, Katherin Wagenknecht, Katrin Vohland, Linda Freyburg, Marcel Leppée, Marta CamaraOliveira, Mieke Sterken & Tim Woods - 2021 - Bilbao: Upv-Ehu.
    ICTs, personal data, digital rights, the GDPR, data privacy, online security… these terms, and the concepts behind them, are increasingly common in our lives. Some of us may be familiar with them, but others are less aware of the growing role of ICTs and data in our lives - and the potential risks this creates. These risks are even more pronounced for vulnerable groups in society. People can be vulnerable in different, often overlapping, ways, which place them (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood (...) collection technologies, such as gene sequencing tools and online surveillance. To better understand the privacy stakes of brain data, we suggest the use of a conceptual framework from information ethics, Helen Nissenbaum’s “contextual integrity” theory. To illustrate the importance of context, we examine neurotechnologies and the information flows they produce in three familiar contexts—healthcare and medical research, criminal justice, and consumer marketing. We argue that by emphasizing what is distinct about brain privacy issues, rather than what they share with other data privacy concerns, risks weakening broader efforts to enact more robust privacy law and policy. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  37. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the rise of new information and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Data management practices in Educational Research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2019 - In P. N. Ololube & G. U. Nwiyi (eds.), Encyclopedia of institutional leadership, policy, and management: A handbook of research in honour of Professor Ozo-Mekuri Ndimele. pp. 1251-1265.
    Data is very important in any research experiment because it occupies a central place in making decisions based on findings resulting from the analysis of such data. Given its central role, it follows that such an important asset as data, deserve effective management in order to protect the integrity and provide an opportunity for effective problem-solving. The main thrust of this paper was to examine data management practices that should be adopted by scholars in maintaining the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  39. Big Data Ethics.Nicolae Sfetcu - manuscript
    Big Data ethics involves adherence to the concepts of right and wrong behavior regarding data, especially personal data. Big Data ethics focuses on structured or unstructured data collectors and disseminators. Big Data ethics is supported, at EU level, by extensive documentation, which seeks to find concrete solutions to maximize the value of Big Data without sacrificing fundamental human rights. The European Data Protection Supervisor (EDPS) supports the right to privacy and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Safeguard Mechanism in Jordan: Protection of the Domestic Industry.Bashar H. Malkawi - manuscript
    The WTO Agreement on Safeguards prescribes each member to adopt appropriate domestic legislation before it imposes safeguard measures. Historically, Jordan enacted its first WTO-compatible safeguard law, known as the National Production Protection Law No.4 of 1998 (“NPP Law”), in 1998 on the eve of Jordan’s accession to the WTO. Afterward, it amended its NPP Law of 1998. So now, Jordan’s safeguard system is based on the amended NPP Law No. 50 of 2002 and Regulation on Safeguard of National Production. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to this viewpoint, this right (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Etica Big Data în cercetare.Nicolae Sfetcu - manuscript
    Principalele probleme cu care se confruntă oamenii de știință în lucrul cu seturile mari de date (Big Data), evidențiind principale aspecte etice, luând în considerare inclusiv legislația din Uniunea Europeană. După o scurtă Introducere despre Big Data, secțiunea Tehnologia prezintă aplicațiile specifice în cercetare. Urmează o abordare a principalelor probleme filosofice specifice în Aspecte filosofice, și Aspecte legale cu evidențierea problemelor etice specifice din Regulamentul UE privind protecția datelor 2016/679 (General Data Protection Regulation, "GDPR"). Secțiunea Probleme (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  43. Big Data Ethics in Research.Nicolae Sfetcu - 2019 - Bucharest, Romania: MultiMedia Publishing.
    The main problems faced by scientists in working with Big Data sets, highlighting the main ethical issues, taking into account the legislation of the European Union. After a brief Introduction to Big Data, the Technology section presents specific research applications. There is an approach to the main philosophical issues in Philosophical Aspects, and Legal Aspects with specific ethical issues in the EU Regulation on the protection of natural persons with regard to the processing of personal data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the audience (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Protecting Tenants Without Preemption: How State and Local Governments Can Lessen the Impact of HUD's One-Strike Rule.Rob Van Someren Greve - 2017 - Georgetown Journal on Poverty Law and Policy 25 (1):135-167.
    Under a policy first enacted in 1988 and expanded in 1996, federally funded public housing authorities (“PHAs”) and private landlords renting their properties to tenants receiving federal housing assistance have been required to include a provision in all leases under which drug-related criminal activity as well as criminal activity that in any way poses a threat to other tenants or nearby residents constitutes ground for initiating eviction proceedings. This strict liability eviction policy, which has become known as the “One-Strike Rule,” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  56
    Privacy: scepticism, normative approaches and legal protection. A review of the theoretical debate and a discussion of recent developments in the EU.Elisa Orrù - 2022 - Dpce Online 52 (2):779–800.
    Digitalisation has lent the right to privacy increasing philosophical and legal relevance. However, privacy’s epistemic status and associated normative values are constantly subject to radical criticisms. This article investigates the validity, in theory and practice, of three radical critiques of privacy. A review of the philosophical and interdisciplinary discourse on privacy during the last half century is followed by analyses of recent legal developments within the EU. Privacy emerges as a highly differentiated and powerful tool to protect individuals and social (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Reframing data ethics in research methods education: a pathway to critical data literacy.Javiera Atenas, Leo Havemann & Cristian Timmermann - 2023 - International Journal of Educational Technology in Higher Education 20:11.
    This paper presents an ethical framework designed to support the development of critical data literacy for research methods courses and data training programmes in higher education. The framework we present draws upon our reviews of literature, course syllabi and existing frameworks on data ethics. For this research we reviewed 250 research methods syllabi from across the disciplines, as well as 80 syllabi from data science programmes to understand how or if data ethics was taught. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Big Data as Tracking Technology and Problems of the Group and its Members.Haleh Asgarinia - 2023 - In Kevin Macnish & Adam Henschke (eds.), The Ethics of Surveillance in Times of Emergency. Oxford University Press. pp. 60-75.
    Digital data help data scientists and epidemiologists track and predict outbreaks of disease. Mobile phone GPS data, social media data, or other forms of information updates such as the progress of epidemics are used by epidemiologists to recognize disease spread among specific groups of people. Targeting groups as potential carriers of a disease, rather than addressing individuals as patients, risks causing harm to groups. While there are rules and obligations at the level of the individual, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  73
    Safety and Protection Practices in the Early Childhood Education Centres.Ibiwari Caroline Dike & Mkpoikanke Sunday Otu - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):294-305.
    A safe and secure environment is an essential part of the early childhood development of any child. This study aims to investigate the safety and protection practices of early childhood centers in the Anambra state, Nigeria, and to determine if any improvements can be made to them. This study analyzed data collected from 60 Early Childhood Care Centers (ECCE Centers) and 60 Pre-Primary Schools (Preprimary School) in Anambra State using the Evaluation of ECCE Implementation Kit (KEIEP), direct observation, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 919