Results for 'Data Storage'

999 found
Order:
  1. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Data management practices and educational research effectiveness of university lecturers in South-South Nigeria.Valentine Joseph Owan, Francisca Nonyelum Odigwe & Bassey Asuquo Bassey - 2020 - Journal of Educational and Social Research 10 (3):24-34.
    The existing body of knowledge has witnessed gaps arising from the paucity of research literature on the quality of educational research output in higher education. This study shows how the management of data in higher education affects the quality of academic research conducted by university lecturers in South-South Nigeria. A sample of 602 lecturers were accessed during data collection and responded to two questionnaires (Data Management Practices Questionnaire – DMPQ and "Educational Research Effectiveness Questionnaire – EREQ). Multiple (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  3. Big data and their epistemological challenge.Luciano Floridi - 2012 - Philosophy and Technology 25 (4):435-437.
    Between 2006 and 2011, humanity accumulated 1,600 EB of data. As a result of this growth, there is now more data produced than available storage. This article explores the problem of “Big Data,” arguing for an epistemological approach as a possible solution to this ever-increasing challenge.
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  4. Data management practices and educational research effectiveness of university lecturers in South-South Nigeria.Valentine Joseph Owan & Francisca N. Odigwe - 2019 - In Charles A. Shoniregun (ed.), Proceedings of the London International Conference on Education (LICE-2019). London, UK: pp. 86-94.
    The dishonest practices in the conduct of educational research in South-South region particularly, and Nigeria generally, has called for urgent intervention. This study assessed data management practices and educational research effectiveness of University Lecturers in South-South Nigeria. A sample of 602 lecturers that were accessible during data collection responded to two questionnaires (Data Management Practices Questionnaire – DMPQ and "Educational Research Effectiveness Questionnaire – EREQ). Multiple regression was employed in the analysis of data. Findings revealed amongst (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Integration of Intelligence Data through Semantic Enhancement.David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith - 2011 - In Proceedings of the Conference on Semantic Technology in Intelligence, Defense and Security (STIDS). CEUR, Vol. 808.
    We describe a strategy for integration of data that is based on the idea of semantic enhancement. The strategy promises a number of benefits: it can be applied incrementally; it creates minimal barriers to the incorporation of new data into the semantically enhanced system; it preserves the existing data (including any existing data-semantics) in their original form (thus all provenance information is retained, and no heavy preprocessing is required); and it embraces the full spectrum of (...) sources, types, models, and modalities (including text, images, audio, and signals). The result of applying this strategy to a given body of data is an evolving Dataspace that allows the application of a variety of integration and analytic processes to diverse data contents. We conceive semantic enhancement (SE) as a lightweight and flexible process that leverages the richness of the structured contents of the Dataspace without adding storage and processing burdens to what, in the intelligence domain, will be an already storage- and processing-heavy starting point. SE works not by changing the data to which it is applied, but rather by adding an extra semantic layer to this data. We sketch how the semantic enhancement approach can be applied consistently and in cumulative fashion to new data and data-models that enter the Dataspace. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  6. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Management of data in higher education and the quality of academic research of university lecturers : A case study in South-South Nigeria.Francisca Nonyelum Odigwe & Valentine Joseph Owan - 2020 - International Journal of Innovative Business Strategies (IJIBS) 6 (1):378-387.
    The existing body of knowledge has witnessed gaps arising from the paucity of research literature on the quality of educational research output in higher education. This study shows how the management of data in higher education affects the quality of academic research conducted by university lecturers in South-South Nigeria. The study adopted a factorial research design. The population of this study includes all the Faculty of Education academic staff in both public and private universities situated in South-South Nigeria. Using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. UTILIZATION OF A DUAL-AXIS SOLAR TRACKER TO INCREASE THE EFFECTIVENESS OF SOLAR PANELS IN THE STORAGE OF POWER IN LITHIUM-ION BATTERIES.Geodizon Iman C. Bermudez, Joanna Patricia U. Develleres, Danniah Shamella N. Palao, Kate Aileen M. Gromia, Rainer Jade T. Daingan & Raffy S. Virtucio - 2023 - Get International Research Journal 1 (2).
    This study was conducted to determine the effectiveness of utilizing the Dual-axis Solar Tracker in harnessing solar energy and storing it in lithium-ion batteries in terms of voltage and milliamps per hour gained. This study utilized two solar panel systems, the Static Solar Panel System and the Dual-Axis Solar Tracker and aimed to prove the significant difference generated by solar panel systems in terms of voltage and milliamps per hour. This study employed an Applied Experimental Research Design utilizing Arduino Uno, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the rise of new information and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  50
    “A Thousand Words”: How Shannon Entropy perspective provides link among exponential data growth, average temperature of the Earth, declining Earth magnetic field, and global consciousness.Victor Christianto & Florentin Smarandache - manuscript
    The sunspot data seems to indicate that the Sun is likely to enter Maunder Minimum, then it will mean that low Sun activity may cause low temperature in Earth. If this happens then it will cause a phenomenon which is called by some climatology experts as “The Little Ice Age” for the next 20-30 years, starting from the next few years. Therefore, the Earth climate in the coming years tend to be cooler than before. This phenomenon then causes us (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Surviving global risks through the preservation of humanity's data on the Moon.Alexey Turchin & D. Denkenberger - 2018 - Acta Astronautica:in press.
    Many global catastrophic risks are threatening human civilization, and a number of ideas have been suggested for preventing or surviving them. However, if these interventions fail, society could preserve information about the human race and human DNA samples in the hopes that the next civilization on Earth will be able to reconstruct Homo sapiens and our culture. This requires information preservation of an order of magnitude of 100 million years, a little-explored topic thus far. It is important that a potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. NEUTROSOPHIC THEORY AND SENTIMENT ANALYSIS TECHNIQUE FOR MINING AND RANKING BIG DATA FROM ONLINE EVALUATION.C. Manju Priya - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):124-142.
    A huge amount of data is being generated everyday through different transactions in industries, social networking, communication systems etc. Big data is a term that represents vast volumes of high speed, complex and variable data that require advanced procedures and technologies to enable the capture, storage, management, and analysis of the data. Big data analysis is the capacity of representing useful information from these large datasets. Due to characteristics like volume, veracity, and velocity, big (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The 1 law of "absolute reality"." ~, , Data", , ", , Value", , = O. &Gt, Being", & Human - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  18.  90
    Data is the new gold, but efficiently mining it requires a philosophy of data.Data Thinkerr - 2023 - Data Thinking.
    Fixing the problem won’t be easy, but humans’ sharpened focus on an emerging philosophy of data might give us some clue about where we will be heading for.
    Download  
     
    Export citation  
     
    Bookmark  
  19. Without a Trace: Why did Corona Apps Fail?Lucie White & Philippe van Basshuysen - 2021 - Journal of Medical Ethics 47 (12):1-4.
    At the beginning of the COVID-19 pandemic, high hopes were put on digital contact tracing, using mobile phone apps to record and immediately notify contacts when a user reports as infected. Such apps can now be downloaded in many countries, but as second waves of COVID-19 are raging, these apps are playing a less important role than anticipated. We argue that this is because most countries have opted for app configurations that cannot provide a means of rapidly informing users of (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  20. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. The Neoclassical Interpretation of Modern Physics and it Implications for an Information Based Interpretation of Spirituality.Shiva Meucci - 2015 - Cosmos and History 11 (2):8-27.
    The neoclassical interpretation of quantum mechanics which re-introduces older conceptual models of gravity and electromagnetism transformed by modern advancements in the field is discussed as a natural outcome from the interchangeability of quantum mechanics and fluid dynamics in light of recent macro-level experiments which show behaviors previously believed to be confined to the quantum world. This superfluid model of mechanics and the known behaviors of superfluids is suggested as a possible substrate and system for the storage and processing of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Technology and Privacy.Edmund Byrne - 1991 - In Byrne Edmund (ed.), The Technology of Discovery and the Discovery of Technology. Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential treatment (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  74
    Superbimatrices and Their Generalizations.W. B. Vasantha Kandasamy & Florentin Smarandache - 2009 - Slatina, Romania: CuArt.
    The systematic study of supermatrices and super linear algebra has been carried out in 2008. These new algebraic structures find their applications in fuzzy models, Leontief economic models and data-storage in computers.
    Download  
     
    Export citation  
     
    Bookmark  
  24. Islands as refuges for surviving global catastrophes.Alexey Turchin & Brian Patrick Green - 2018 - Foresight.
    Purpose Islands have long been discussed as refuges from global catastrophes; this paper will evaluate them systematically, discussing both the positives and negatives of islands as refuges. There are examples of isolated human communities surviving for thousands of years on places like Easter Island. Islands could provide protection against many low-level risks, notably including bio-risks. However, they are vulnerable to tsunamis, bird-transmitted diseases, and other risks. This article explores how to use the advantages of islands for survival during global catastrophes. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Design of Interface System With Hmi (Human Machine Interface) Based For Monitoring System of Generator With 3dr Telemetry 433mhz Communication. Sudjadi, Sumardi & Wildan Abdul Jabbar - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 4 (2):11-18.
    Abstract—Generator set (genset) is a backup power supply which is used when the PLN supply is off. With such an important function, the generator set maintenance must be taken care of for long life durability. Monitoring activity is usually conducted on a regular basis, but still run manually by relying on operators who go directly to the plant. This research goes over the making of HMI remote control system for generator set in order to produce effective and continuous reporting. HMI (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. The Neurological Disease Ontology.Mark Jensen, Alexander P. Cox, Naveed Chaudhry, Marcus Ng, Donat Sule, William Duncan, Patrick Ray, Bianca Weinstock-Guttman, Barry Smith, Alan Ruttenberg, Kinga Szigeti & Alexander D. Diehl - 2013 - Journal of Biomedical Semantics 4 (42):42.
    We are developing the Neurological Disease Ontology (ND) to provide a framework to enable representation of aspects of neurological diseases that are relevant to their treatment and study. ND is a representational tool that addresses the need for unambiguous annotation, storage, and retrieval of data associated with the treatment and study of neurological diseases. ND is being developed in compliance with the Open Biomedical Ontology Foundry principles and builds upon the paradigm established by the Ontology for General Medical (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27. The science of belief: A progress report.Nicolas Porot & Eric Mandelbaum - forthcoming - WIREs Cognitive Science 1.
    The empirical study of belief is emerging at a rapid clip, uniting work from all corners of cognitive science. Reliance on belief in understanding and predicting behavior is widespread. Examples can be found, inter alia, in the placebo, attribution theory, theory of mind, and comparative psychological literatures. Research on belief also provides evidence for robust generalizations, including about how we fix, store, and change our beliefs. Evidence supports the existence of a Spinozan system of belief fixation: one that is automatic (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  28. Ethical pitfalls for natural language processing in psychology.Mark Alfano, Emily Sullivan & Amir Ebrahimi Fard - forthcoming - In Morteza Dehghani & Ryan Boyd (eds.), The Atlas of Language Analysis in Psychology. Guilford Press.
    Knowledge is power. Knowledge about human psychology is increasingly being produced using natural language processing (NLP) and related techniques. The power that accompanies and harnesses this knowledge should be subject to ethical controls and oversight. In this chapter, we address the ethical pitfalls that are likely to be encountered in the context of such research. These pitfalls occur at various stages of the NLP pipeline, including data acquisition, enrichment, analysis, storage, and sharing. We also address secondary uses of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. SNOMED CT standard ontology based on the ontology for general medical science.Shaker El-Sappagh, Francesco Franda, Ali Farman & Kyung-Sup Kwak - 2018 - BMC Medical Informatics and Decision Making 76 (18):1-19.
    Background: Systematized Nomenclature of Medicine—Clinical Terms (SNOMED CT, hereafter abbreviated SCT) is acomprehensive medical terminology used for standardizing the storage, retrieval, and exchange of electronic healthdata. Some efforts have been made to capture the contents of SCT as Web Ontology Language (OWL), but theseefforts have been hampered by the size and complexity of SCT. Method: Our proposal here is to develop an upper-level ontology and to use it as the basis for defining the termsin SCT in a way that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Referent Tracking for Command and Control Messaging Systems.Shahid Manzoor, Werner Ceusters & Barry Smith - 2009 - CEUR, Volume 555.
    The Joint Battle Management Language (JBML) is an XML-based language designed to allow Command and Control (C2) systems to interface easily with Modeling and Simulation (M&S) systems. While some of the XML-tags defined in this language correspond to types of entities that exist in reality, others are mere syntactic artifacts used to structure the messages themselves. Because these two kinds of tags are not formally distinguishable, JBML messages in effect confuse data with what the data represent. In this (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Availability of Digital Resources and Institutional Compliance with COVID-19 Mitigation Measures in a Nigerian University: A Descriptive Study.Valentine Joseph Owan & Mercy Valentine Owan - 2022 - Electronic Journal of Medical and Educational Technologies 15 (4):Article em2208.
    The state of the availability of digital resources and institutional compliance to COVID-19 mitigation measures was evaluated by the researchers in this study. Informed by the need to answer two research questions, the study adopted the descriptive survey design. A sample of 409 participants was drawn from a population of 2,410 academic staff at the University of Calabar, leveraging the multistage sampling process. “Availability of digital resources and institutional compliance with COVID-19 mitigation measures questionnaire” was used for data collection. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Enhancing FunGramKB: Further Verbs of Feeling in English.Eugenia D. G. - 2012 - Dissertation,
    The present dissertation aims at analyzing some linguistic aspects related to the lexical, semantic and syntactic behaviour of a number of verbs of FEELING in English whose lexical, grammatical and idiosyncratic properties have been entered into the FunGramKB Editor in application of study of the theoretical assumptions propounded by the Lexical-Constructional Model. -/- Analysis and subsequent input of data have been assessed against the background of some of the 20th-century trends in linguistics which find their expression in the first (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Perception as a Dynamic Activation of Relational Matrices.Stenfinn Olivecrona & Dirk Derom - manuscript
    Here we present an experimental model to be applied to the storage and retrieval of information based on an associative information system’s sensory and motor state change data, aiming to represent the dynamics of a dynamic perceptual system. The model and database implementation use a universal information storage structure holding both data and metadata within the same structure. This model is characterized by the emphasis on associative information about the represented system derived from raw data, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Data subject rights as a research methodology: A systematic literature review.Adamu Adamu Habu & Tristan Henderson - 2023 - Journal of Responsible Technology 16 (C):100070.
    Data subject rights provide data controllers with obligations that can help with transparency, giving data subjects some control over their personal data. To date, a growing number of researchers have used these data subject rights as a methodology for data collection in research studies. No one, however, has gathered and analysed different academic research studies that use data subject rights as a methodology for data collection. To this end, we conducted a systematic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  27
    Big Data Analytics in Healthcare: Exploring the Role of Machine Learning in Predicting Patient Outcomes and Improving Healthcare Delivery.Federico Del Giorgio Solfa & Fernando Rogelio Simonato - 2023 - International Journal of Computations Information and Manufacturing (Ijcim) 3 (1):1-9.
    Healthcare professionals decide wisely about personalized medicine, treatment plans, and resource allocation by utilizing big data analytics and machine learning. To guarantee that algorithmic recommendations are impartial and fair, however, ethical issues relating to prejudice and data privacy must be taken into account. Big data analytics and machine learning have a great potential to disrupt healthcare, and as these technologies continue to evolve, new opportunities to reform healthcare and enhance patient outcomes may arise. In order to investigate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. The Sense-Data Language and External World Skepticism.Jared Warren - 2024 - In Uriah Kriegel (ed.), Oxford Studies in Philosophy of Mind Vol 4. Oxford University Press.
    We face reality presented with the data of conscious experience and nothing else. The project of early modern philosophy was to build a complete theory of the world from this starting point, with no cheating. Crucial to this starting point is the data of conscious sensory experience – sense data. Attempts to avoid this project often argue that the very idea of sense data is confused. But the sense-data way of talking, the sense-data language, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Open data, open review and open dialogue in making social sciences plausible.Quan-Hoang Vuong - 2017 - Nature: Scientific Data Updates 2017.
    Nowadays, protecting trust in social sciences also means engaging in open community dialogue, which helps to safeguard robustness and improve efficiency of research methods. The combination of open data, open review and open dialogue may sound simple but implementation in the real world will not be straightforward. However, in view of Begley and Ellis’s (2012) statement that, “the scientific process demands the highest standards of quality, ethics and rigour,” they are worth implementing. More importantly, they are feasible to work (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  40.  84
    Big Data as Tracking Technology and Problems of the Group and its Members.Haleh Asgarinia - 2023 - In Kevin Macnish & Adam Henschke (eds.), The Ethics of Surveillance in Times of Emergency. Oxford University Press. pp. 60-75.
    Digital data help data scientists and epidemiologists track and predict outbreaks of disease. Mobile phone GPS data, social media data, or other forms of information updates such as the progress of epidemics are used by epidemiologists to recognize disease spread among specific groups of people. Targeting groups as potential carriers of a disease, rather than addressing individuals as patients, risks causing harm to groups. While there are rules and obligations at the level of the individual, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Carbon capture and storage: where should the world store CO₂? It’s a moral dilemma.Kian Mintz-Woo - 2021 - The Conversation.
    [Newspaper opinion] To give carbon storage sites the greatest chance of success, it makes sense to develop them in places where the geology has been thoroughly explored and where there is lots of relevant expertise. This would imply pumping carbon into underground storage sites in northern Europe, the Middle East and the US, where companies have spent centuries looking for and extracting fossil fuels. On the other hand, it might be important to develop storage sites in economies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Data models, representation and adequacy-for-purpose.Alisa Bokulich & Wendy Parker - 2021 - European Journal for Philosophy of Science 11 (1):1-26.
    We critically engage two traditional views of scientific data and outline a novel philosophical view that we call the pragmatic-representational view of data. On the PR view, data are representations that are the product of a process of inquiry, and they should be evaluated in terms of their adequacy or fitness for particular purposes. Some important implications of the PR view for data assessment, related to misrepresentation, context-sensitivity, and complementary use, are highlighted. The PR view provides (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  43. Data quality, experimental artifacts, and the reactivity of the psychological subject matter.Uljana Feest - 2022 - European Journal for Philosophy of Science 12 (1):1-25.
    While the term “reactivity” has come to be associated with specific phenomena in the social sciences, having to do with subjects’ awareness of being studied, this paper takes a broader stance on this concept. I argue that reactivity is a ubiquitous feature of the psychological subject matter and that this fact is a precondition of experimental research, while also posing potential problems for the experimenter. The latter are connected to the worry about distorted data and experimental artifacts. But what (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  44. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience:1-12.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood (...) collection technologies, such as gene sequencing tools and online surveillance. To better understand the privacy stakes of brain data, we suggest the use of a conceptual framework from information ethics, Helen Nissenbaum’s “contextual integrity” theory. To illustrate the importance of context, we examine neurotechnologies and the information flows they produce in three familiar contexts—healthcare and medical research, criminal justice, and consumer marketing. We argue that by emphasizing what is distinct about brain privacy issues, rather than what they share with other data privacy concerns, risks weakening broader efforts to enact more robust privacy law and policy. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  45. Why and Where to Fund Carbon Capture and Storage.Kian Mintz-Woo & Joe Lane - 2021 - Science and Engineering Ethics 27 (6):70.
    This paper puts forward two claims about funding carbon capture and storage. The first claim is that there are moral justifications supporting strategic investment into CO2 storage from global and regional perspectives. One argument draws on the empirical evidence which suggests carbon capture and storage would play a significant role in a portfolio of global solutions to climate change; the other draws on Rawls' notion of legitimate expectations and Moellendorf's Anti-Poverty principle. The second claim is that where (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  46. Big Data, epistemology and causality: Knowledge in and knowledge out in EXPOsOMICS.Stefano Canali - 2016 - Big Data and Society 3 (2).
    Recently, it has been argued that the use of Big Data transforms the sciences, making data-driven research possible and studying causality redundant. In this paper, I focus on the claim on causal knowledge by examining the Big Data project EXPOsOMICS, whose research is funded by the European Commission and considered capable of improving our understanding of the relation between exposure and disease. While EXPOsOMICS may seem the perfect exemplification of the data-driven view, I show how causal (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  47. Open data, open review and open dialogue in making social sciences plausible.Quan-Hoang Vuong - 2017 - Scientific Data 4.
    A growing awareness of the lack of reproducibility has undermined society’s trust and esteem in social sciences. In some cases, well-known results have been fabricated or the underlying data have turned out to have weak technical foundations.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  48. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and ethicality on (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Simulation of Trial Data to Test Speculative Hypotheses about Research Methods.Hamed Tabatabaei Ghomi & Jacob Stegenga - 2023 - In Kristien Hens & Andreas de Block (eds.), Advances in experimental philosophy of medicine. New York: Bloomsbury Academic. pp. 111-128.
    We simulate trial data to test speculative claims about research methods, such as the impact of publication bias.
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999