Results for 'Data privacy'

1000+ found
Order:
  1. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Privacy, Autonomy, and Personalised Targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2019 - In Carissa Véliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Why Data Privacy is Key To a Smart Energy Future.Carissa Véliz & Philipp Grunewald - 2018 - Nature Energy 3:702-704.
    The ability to collect fine-grained energy data from smart meters has benefits for utilities and consumers. However, a proactive approach to data privacy is necessary to maximize the potential of these data to support low-carbon energy systems, and innovative business models.
    Download  
     
    Export citation  
     
    Bookmark  
  4.  83
    Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In T. C. de Campos, J. Herring & A. M. Phillips (eds.), Philosophical Foundations of Medical Law. Oxford, U.K.: Oxford University Press. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  30
    Not the Doctor’s Business: Privacy, Personal Responsibility and Data Rights in Medical Settings.Carissa Véliz - forthcoming - Bioethics.
    This paper argues that assessing personal responsibility in healthcare settings for the allocation of medical resources would be too privacy-invasive to be morally justifiable. In addition to being an inappropriate and moralizing intrusion into the private lives of patients, it would put patients’ sensitive data at risk, making data subjects vulnerable to a variety of privacy-related harms. Even though we allow privacy-invasive investigations to take place in legal trials, the justice and healthcare systems are not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Would You Mind Being Watched by Machines? Privacy Concerns in Data Mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Views on Privacy. A Survey.Siân Brooke & Carissa Véliz - 2020 - In Data, Privacy, and the Individual.
    The purpose of this survey was to gather individual’s attitudes and feelings towards privacy and the selling of data. A total (N) of 1,107 people responded to the survey. -/- Across continents, age, gender, and levels of education, people overwhelmingly think privacy is important. An impressive 82% of respondents deem privacy extremely or very important, and only 1% deem privacy unimportant. Similarly, 88% of participants either agree or strongly agree with the statement that ‘violations to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. What to Do When Privacy Is Gone.James Brusseau - 2019 - In Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Norfolk, VA, USA: pp. 1 - 8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  63
    What to Do When Privacy Is Gone.James Brusseau - 2019 - In D. E. Wittkower (ed.), Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Norfolk, VA, USA: Old Dominion. pp. 2-8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Anti-Doping, Purported Rights to Privacy and WADA's Whereabouts Requirements: A Legal Analysis.Oskar MacGregor, Richard Griffith, Daniele Ruggiu & Mike McNamee - 2013 - Fair Play 1 (2):13-38.
    Recent discussions among lawyers, philosophers, policy researchers and athletes have focused on the potential threat to privacy posed by the World Anti-Doping Agency’s (WADA) whereabouts requirements. These requirements demand, among other things, that all elite athletes file their whereabouts information for the subsequent quarter on a quarterly basis and comprise data for one hour of each day when the athlete will be available and accessible for no advance notice testing at a specified location of their choosing. Failure to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. Introduction to Data Ethics.James Brusseau - 2018 - In The Business Ethics Workshop, 3rd Edition. Boston, USA: Boston Academic Publishing / Flatworld Knowledge. pp. 349-376.
    An Introduction to data ethics, focusing on questions of privacy and personal identity in the economic world as it is defined by big data technologies, artificial intelligence, and algorithmic capitalism. -/- Originally published in The Business Ethics Workshop, 3rd Edition, by Boston Acacdemic Publishing / FlatWorld Knowledge.
    Download  
     
    Export citation  
     
    Bookmark  
  13.  97
    From Public Data to Private Information: The Case of the Supermarket.Vincent C. Müller - 2009 - In Maria Bottis (ed.), Proceedings of the 8th International Conference Computer Ethics: Philosophical Enquiry. Corfu, Greece: Nomiki Bibliothiki. pp. 500-507.
    The background to this paper is that in our world of massively increasing personal digital data any control over the data about me seems illusionary – informational privacy seems a lost cause. On the other hand, the production of this digital data seems a necessary component of our present life in the industrialized world. A framework for a resolution of this apparent dilemma is provided if by the distinction between (meaningless) data and (meaningful) information. I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  39
    Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Ethics of Identity in the Time of Big Data.James Brusseau - 2019 - First Monday 24 (5-6):00-11.
    Compartmentalizing our distinct personal identities is increasingly difficult in big data reality. Pictures of the person we were on past vacations resurface in employers’ Google searches; LinkedIn which exhibits our income level is increasingly used as a dating web site. Whether on vacation, at work, or seeking romance, our digital selves stream together. One result is that a perennial ethical question about personal identity has spilled out of philosophy departments and into the real world. Ought we possess one, unified (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Engaging the Public in Ethical Reasoning About Big Data.Justin Anthony Knapp - 2016 - In Soren Adam Matei & Jeff Collman (eds.), Ethical Reasoning in Big Data: An Exploratory Analysis. Springer. pp. 43-52.
    The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  42
    What If Banks Were the Main Protectors of Customers’ Private Data?Carissa Véliz - 2018 - Harvard Business Review 1.
    In this article I argue that we are in urgent need for institutional guardianship and management of our personal data. I suggest banks may be in a good position to take on that role. Perhaps that's the future of banking.
    Download  
     
    Export citation  
     
    Bookmark  
  18. Ethics for Records and Information Management.Norman Mooradian - 2018 - Chicago, IL, USA: American Library Association.
    The scope and reach of information, driven by the explosive growth of information technologies and content types, has expanded dramatically over the past 30 years. The consequences of these changes to records and information management (RIM) professionals are profound, necessitating not only specialized knowledge but added responsibilities. RIM professionals require a professional ethics to guide them in their daily practice and to form a basis for developing and implementing organizational policies, and Mooradian’s new book provides a rigorous outline of such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  31
    Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  21. Four Facets of Privacy and Intellectual Freedom in Licensing Contracts for Electronic Journals.Alan Rubel & Mei Zhang - 2015 - College and Research Libraries 4 (76):427-449.
    This is a study of the treatment of library patron privacy in licenses for electronic journals in academic libraries. We begin by distinguishing four facets of privacy and intellectual freedom based on the LIS and philosophical literature. Next, we perform a content analysis of 42 license agreements for electronic journals, focusing on terms for enforcing authorized use and collection and sharing of user data. We compare our findings to model licenses, to recommendations proposed in a recent treatise (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  23.  35
    Technology and Privacy.Edmund Byrne - 1991 - In The Technology of Discovery and the Discovery of Technology. Blacksburg, VA: Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Transparent, Explainable, and Accountable AI for Robotics.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - Science (Robotics) 2 (6):eaan6080.
    To create fair and accountable AI and robotics, we need precise regulation and better methods to certify, explain, and audit inscrutable systems.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  25.  94
    Big Data Ethics in Research.Nicolae Sfetcu - manuscript
    The main problems faced by scientists in working with Big Data sets, highlighting the main ethical issues, taking into account the legislation of the European Union. After a brief Introduction to Big Data, the Technology section presents specific research applications. There is an approach to the main philosophical issues in Philosophical Aspects, and Legal Aspects with specific ethical issues in the EU Regulation on the protection of natural persons with regard to the processing of personal data and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2).
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access account (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  27.  20
    Legal Aspects of Big Data - GDPR.Nicolae Sfetcu - manuscript
    The use of Big Data presents significant legal problems, especially in terms of data protection. The existing legal framework of the European Union based in particular on the Directive no. 46/95/EC and the General Regulation on the Protection of Personal Data provide adequate protection. But for Big Data, a comprehensive and global strategy is needed. The evolution over time was from the right to exclude others to the right to control their own data and, at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  17
    Big Data Ethics.Nicolae Sfetcu - manuscript
    Big Data ethics involves adherence to the concepts of right and wrong behavior regarding data, especially personal data. Big Data ethics focuses on structured or unstructured data collectors and disseminators. Big Data ethics is supported, at EU level, by extensive documentation, which seeks to find concrete solutions to maximize the value of Big Data without sacrificing fundamental human rights. The European Data Protection Supervisor (EDPS) supports the right to privacy and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Commentary to "Turning Virtual Public Spaces Into Laboratories".Mark Tunick - 2014 - Analyses of Social Issues and Public Policy 14 (1):371-73.
    Evaluates a criticism based on privacy and other ethical grounds of Bond's study using 61 million persons on Facebook to determine whether political mobilization messages shared on social media can influence voting behavior.
    Download  
     
    Export citation  
     
    Bookmark  
  30. Digital Rights and Freedoms: A Framework for Surveying Users and Analyzing Policies.Todd Davies - 2014 - In Luca Maria Aiello & Daniel McFarland (eds.), Social Informatics: Proceedings of the 6th International Conference (SocInfo 2014). Springer Lecture Notes in Computer Science Vol. 8851. pp. 428-443.
    Interest has been revived in the creation of a "bill of rights" for Internet users. This paper analyzes users' rights into ten broad principles, as a basis for assessing what users regard as important and for comparing different multi-issue Internet policy proposals. Stability of the principles is demonstrated in an experimental survey, which also shows that freedoms of users to participate in the design and coding of platforms appear to be viewed as inessential relative to other rights. An analysis of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Digital Alienation as the Foundation of Online Privacy Concerns.Brandt Dainow - 2015 - Acm Sigcas Computers and Society 45 (3):109-117.
    The term ‘digital alienation’ is used in critical IS research to refer to manifestations of alienation online. This paper explores the difficulties of using a traditional Marxist analysis to account for digital alienation. The problem is that the activity people undertake online does not look coerced or estranged from the creator’s individuality, both of which are typically seen as necessary for the production of alienation. As a result of this apparent difficulty, much of the research has focused on the relationship (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. The Threat of Algocracy: Reality, Resistance and Accommodation.John Danaher - 2016 - Philosophy and Technology 29 (3):245-268.
    One of the most noticeable trends in recent years has been the increasing reliance of public decision-making processes on algorithms, i.e. computer-programmed step-by-step instructions for taking a given set of inputs and producing an output. The question raised by this article is whether the rise of such algorithmic governance creates problems for the moral or political legitimacy of our public decision-making processes. Ignoring common concerns with data protection and privacy, it is argued that algorithmic governance does pose a (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  34. Indiscriminate Mass Surveillance and the Public Sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  35. The Ethics of Cloud Computing.Boudewijn de Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, Dropbox, Salesforce). And it (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  36. In the Privacy of Our Streets.Carissa Véliz - 2018 - In Bryce Newell, Tjerk Timan & Bert-Jaap Koops (eds.), Surveillance, Privacy and Public Space. pp. 16-32.
    If one lives in a city and wants to be by oneself or have a private conversation with someone else, there are two ways to set about it: either one finds a place of solitude, such as one’s bedroom, or one finds a place crowded enough, public enough, that attention to each person dilutes so much so as to resemble a deserted refuge. Often, one can get more privacy in public places than in the most private of spaces. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  87
    Open Data, Open Review and Open Dialogue in Making Social Sciences Plausible.Quan-Hoang Vuong - 2017 - Nature: Scientific Data Updates 2017.
    Nowadays, protecting trust in social sciences also means engaging in open community dialogue, which helps to safeguard robustness and improve efficiency of research methods. The combination of open data, open review and open dialogue may sound simple but implementation in the real world will not be straightforward. However, in view of Begley and Ellis’s (2012) statement that, “the scientific process demands the highest standards of quality, ethics and rigour,” they are worth implementing. More importantly, they are feasible to work (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  38. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security, and Accountability: Ethics, Law, and Policy. London, UK: pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  29
    Open Data, Open Review and Open Dialogue in Making Social Sciences Plausible.Quan-Hoang Vuong - 2017 - Scientific Data 4.
    A growing awareness of the lack of reproducibility has undermined society’s trust and esteem in social sciences. In some cases, well-known results have been fabricated or the underlying data have turned out to have weak technical foundations.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  40. Privacy in Public and the Contextual Conditions of Agency.Maria Brincker - 2017 - In Tjerk Timan, Bert-Jaap Koops & Bryce Newell (eds.), Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. The Ethics of Uncertainty for Data Subjects.Philip Nickel - 2019 - In Jenny Krutzinna & Luciano Floridi (eds.), The Ethics of Medical Data Donation. Springer Verlag. pp. 55-74.
    Modern health data practices come with many practical uncertainties. In this paper, I argue that data subjects’ trust in the institutions and organizations that control their data, and their ability to know their own moral obligations in relation to their data, are undermined by significant uncertainties regarding the what, how, and who of mass data collection and analysis. I conclude by considering how proposals for managing situations of high uncertainty might be applied to this problem. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Big Data, Epistemology and Causality: Knowledge in and Knowledge Out in EXPOsOMICS.Stefano Canali - 2016 - Big Data and Society 3 (2).
    Recently, it has been argued that the use of Big Data transforms the sciences, making data-driven research possible and studying causality redundant. In this paper, I focus on the claim on causal knowledge by examining the Big Data project EXPOsOMICS, whose research is funded by the European Commission and considered capable of improving our understanding of the relation between exposure and disease. While EXPOsOMICS may seem the perfect exemplification of the data-driven view, I show how causal (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  43. Ontology-Based Knowledge Representation of Experiment Metadata in Biological Data Mining.Scheuermann Richard, Kong Megan, Dahlke Carl, Cai Jennifer, Lee Jamie, Qian Yu, Squires Burke, Dunn Patrick, Wiser Jeff, Hagler Herb, Herb Hagler, Barry Smith & David Karp - 2009 - In Jake Chen & Stefano Lonardi (eds.), Biological Data Mining. Boca Raton: Chapman Hall / Taylor and Francis. pp. 529-559.
    According to the PubMed resource from the U.S. National Library of Medicine, over 750,000 scientific articles have been published in the ~5000 biomedical journals worldwide in the year 2007 alone. The vast majority of these publications include results from hypothesis-driven experimentation in overlapping biomedical research domains. Unfortunately, the sheer volume of information being generated by the biomedical research enterprise has made it virtually impossible for investigators to stay aware of the latest findings in their domain of interest, let alone to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. ImmPort, Toward Repurposing of Open Access Immunological Assay Data for Translational and Clinical Research.Sanchita Bhattacharya, Patrick Dunn, Cristel Thomas, Barry Smith, Henry Schaefer, Jieming Chen, Zicheng Hu, Kelly Zalocusky, Ravi Shankar & Shai Shen-Orr - 2018 - Scientific Data 5:180015.
    Immunology researchers are beginning to explore the possibilities of reproducibility, reuse and secondary analyses of immunology data. Open-access datasets are being applied in the validation of the methods used in the original studies, leveraging studies for meta-analysis, or generating new hypotheses. To promote these goals, the ImmPort data repository was created for the broader research community to explore the wide spectrum of clinical and basic research data and associated findings. The ImmPort ecosystem consists of four components–Private (...), Shared Data, Data Analysis, and Resources—for data archiving, dissemination, analyses, and reuse. To date, more than 300 studies have been made freely available through the Shared Data portal (immport.org/immportopen), which allows research data to be repurposed to accelerate the translation of new insights into discoveries. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Neuroscience V. Privacy? : A Democratic Perspective.Annabelle Lever - 2012 - In Sarah Richmond, Geraint Rees & Sarah J. L. Edwards (eds.), I Know What You're Thinking: Brain Imaging and Mental Privacy. Oxford University Press. pp. 205.
    Recent developments in neuroscience create new opportunities for understanding the human brain. The power to do good, however, is also the power to harm, so scientific advances inevitably foster as many dystopian fears as utopian hopes. For instance, neuroscience lends itself to the fear that people will be forced to reveal thoughts and feelings which they would not have chosen to reveal, and of which they may be unaware. It also lends itself to the worry that people will be encouraged (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. LinkSuite™: Software Tools for Formally Robust Ontology-Based Data and Information Integration.Werner Ceusters, Barry Smith & James Matthew Fielding - 2004 - In Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics, 2994). Springer. pp. 1-16.
    The integration of information resources in the life sciences is one of the most challenging problems facing bioinformatics today. We describe how Language and Computing nv, originally a developer of ontology-based natural language understanding systems for the healthcare domain, is developing a framework for the integration of structured data with unstructured information contained in natural language texts. L&C’s LinkSuite™ combines the flexibility of a modular software architecture with an ontology based on rigorous philosophical and logical principles that is designed (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   2 citations  
  47. The Internet and Privacy.Carissa Véliz - 2019 - In David Edmonds (ed.), Ethics and the Contemporary World. Abingdon, UK: pp. 149-159.
    In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is important because violations of the right to privacy can harm us individually and collectively, and offer some advice as to how to protect our privacy online.
    Download  
     
    Export citation  
     
    Bookmark  
  48.  37
    Improving Bayesian Statistics Understanding in the Age of Big Data with the Bayesvl R Package.Quan-Hoang Vuong, Viet-Phuong La, Minh-Hoang Nguyen, Manh-Toan Ho, Manh-Tung Ho & Peter Mantello - 2020 - Software Impacts 4 (1):100016.
    The exponential growth of social data both in volume and complexity has increasingly exposed many of the shortcomings of the conventional frequentist approach to statistics. The scientific community has called for careful usage of the approach and its inference. Meanwhile, the alternative method, Bayesian statistics, still faces considerable barriers toward a more widespread application. The bayesvl R package is an open program, designed for implementing Bayesian modeling and analysis using the Stan language’s no-U-turn (NUTS) sampler. The package combines the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  51
    Forensic Brain-Reading and Mental Privacy in European Human Rights Law: Foundations and Challenges.Sjors Ligthart, Thomas Douglas, Christoph Bublitz, Tijs Kooijmans & Gerben Meynen - forthcoming - Neuroethics:1-13.
    A central question in the current neurolegal and neuroethical literature is how brain-reading technologies could contribute to criminal justice. Some of these technologies have already been deployed within different criminal justice systems in Europe, including Slovenia, Italy, England and Wales, and the Netherlands, typically to determine guilt, legal responsibility, or recidivism risk. In this regard, the question arises whether brain-reading could permissibly be used against the person's will. To provide adequate legal protection from such non-consensual brain-reading in the European legal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  52
    Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000