Results for 'data fraud'

931 found
Order:
  1. Data frauds, health risks, and the growing question of ethics during the COVID-19 pandemic.Vuong Quan-Hoang, Le Tam-Tri & Nguyen Minh-Hoang - manuscript
    In this essay, we advocate that the issue of health data ethics should no longer be considered on the level of individual scientists or research labs, but rather as a problem involving all stakeholders, from publishers, funders, ethical committees to governments, for the sake of research integrity.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  60
    Lecturers’ and Students’ Perception on Role of Social Support and Psychological First Aid in Assisting Financial Fraud Victims in South-East, Nigeria.Princess Chidinma Nwangwu & Ngozi Mary Eze - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):325-339.
    The study ascertained the perception of lecturers and students on the role of social support and psychological first aid in assisting financial fraud victims in South East Nigeria. The study adopted a descriptive survey design. The study was carried out in three Universities in the South East, Nigeria: the University of Nigeria, Nsukka; Nnamdi Azikiwe University, Awka; and Michael Okpara University of Agriculture, Umudike. The population comprises of 135 students and 52 lecturers in Home Economics programme of the three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. All (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The use of confidentiality and anonymity protections as a cover for fraudulent fieldwork data.M. V. Dougherty - 2021 - Research Ethics 17 (4):480-500.
    Qualitative fieldwork research on sensitive topics sometimes requires that interviewees be granted confidentiality and anonymity. When qualitative researchers later publish their findings, they must ensure that any statements obtained during fieldwork interviews cannot be traced back to the interviewees. Given these protections to interviewees, the integrity of the published findings cannot usually be verified or replicated by third parties, and the scholarly community must trust the word of qualitative researchers when they publish their results. This trust is fundamentally abused, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. A Survey of Business Intelligence Solutions in Banking Industry and Big Data Applications.Elaheh Radmehr & Mohammad Bazmara - 2017 - International Journal of Mechatronics, Electrical and Computer Technology 7 (23):3280-3298.
    Nowadays, the economic and social nature of contemporary business organizations chiefly banks binds them to face with the sheer volume of data and information and the key to commercial success in this area is the proper use of data for making better, faster and flawless decisions. To achieve this goal organizations requires strong and effective tools to enable them in automating task analysis, decision-making, strategy formulation and risk prediction to prevent bankruptcy and fraud .Business Intelligence is a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Exploratory hypothesis tests can be more compelling than confirmatory hypothesis tests.Mark Rubin & Chris Donkin - 2022 - Philosophical Psychology.
    Preregistration has been proposed as a useful method for making a publicly verifiable distinction between confirmatory hypothesis tests, which involve planned tests of ante hoc hypotheses, and exploratory hypothesis tests, which involve unplanned tests of post hoc hypotheses. This distinction is thought to be important because it has been proposed that confirmatory hypothesis tests provide more compelling results (less uncertain, less tentative, less open to bias) than exploratory hypothesis tests. In this article, we challenge this proposition and argue that there (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  9. An Epistemic Advantage of Accommodation over Prediction.Finnur Dellsén - forthcoming - Philosophers' Imprint.
    Many philosophers have argued that a hypothesis is better confirmed by some data if the hypothesis was not specifically designed to fit the data. ‘Prediction’, they argue, is superior to ‘accommodation’. Others deny that there is any epistemic advantage to prediction, and conclude that prediction and accommodation are epistemically on a par. This paper argues that there is a respect in which accommodation is superior to prediction. Specifically, the information that the data was accommodated rather than predicted (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Cryptographic Methods with a Pli Cachete: Towards the Computational Assurance of Integrity.Thatcher Collins - 2020 - In Gerhard R. Joubert Ian Foster (ed.), Advances in Parallel Computing. Amsterdam: IOS Press. pp. 10.
    Unreproducibility stemming from a loss of data integrity can be prevented with hash functions, secure sketches, and Benford's Law when combined with the historical practice of a Pli Cacheté where scientific discoveries were archived with a 3rd party to later prove the date of discovery. Including the distinct systems of preregistation and data provenance tracking becomes the starting point for the creation of a complete ontology of scientific documentation. The ultimate goals in such a system--ideally mandated--would rule out (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian cybercriminals' (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  12. Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation.Sally Serena Ramage - 2010 - Current Criminal Law 2 (3):2-7.
    Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation Pages 2-7 Current Criminal Law ISSN 1758-8405 Volume 2 Issue 3 March 2010 Author SALLY RAMAGE WIPO 900614 UK TM 2401827 USA TM 3,440.910 Orchid ID 0000-0002-8854-4293 Sally Ramage, BA (Hons), MBA, LLM, MPhil, MCIJ, MCMI, DA., ASLS, BAWP. Publisher & Managing Editor, Criminal Lawyer series [1980-2022](ISSN 2049-8047); Current Criminal Law series [2008-2022] (ISSN 1758-8405) and Criminal Law News series [2008-2022] (ISSN 1758-8421). Sweet & Maxwell (Thomson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Neural Network-Based Audit Risk Prediction: A Comprehensive Study.Saif al-Din Yusuf Al-Hayik & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):43-51.
    Abstract: This research focuses on utilizing Artificial Neural Networks (ANNs) to predict Audit Risk accurately, a critical aspect of ensuring financial system integrity and preventing fraud. Our dataset, gathered from Kaggle, comprises 18 diverse features, including financial and historical parameters, offering a comprehensive view of audit-related factors. These features encompass 'Sector_score,' 'PARA_A,' 'SCORE_A,' 'PARA_B,' 'SCORE_B,' 'TOTAL,' 'numbers,' 'marks,' 'Money_Value,' 'District,' 'Loss,' 'Loss_SCORE,' 'History,' 'History_score,' 'score,' and 'Risk,' with a total of 774 samples. Our proposed neural network architecture, consisting of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Artificial Intelligence and Punjabi Culture.D. P. Singh - 2023 - International Culture and Art (Ica) 5 (4):11-14.
    Artificial Intelligence (AI) is a technology that makes machines smart and capable of doing things that usually require human intelligence. AI works by training machines to learn from data and experiences. Such devices can recognize patterns, understand spoken language, see and understand images, and even make predictions based on their learning. Voice assistants like Siri or Alexa can understand our voice commands, answer questions, and perform tasks for us. AI-based self-driving cars can sense their surroundings, make decisions, and drive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Peer Review system: A Golden standard for publications process.Shamima Parvin Lasker - 2018 - Bangladesh Journal of Bioethics 9 (1):13-23.
    Peer review process helps in evaluating and validating of research that is published in the journals. U.S. Office of Research Integrity reported that data fraudulence was found to be involved in 94% cases of misconduct from 228 identified articles between 1994–2012. If fraud in published article are significantly as high as reported, the question arise in mind, were these articles peer reviewed? Another report said that the reviewers failed to detect 16 cases of fabricated article of Jan Hendrick (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  69
    An Experimental Analysis of Revolutionizing Banking and Healthcare with Generative AI.Sankara Reddy Thamma - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):580-590.
    Generative AI is reshaping sectors like banking and healthcare by enabling innovative applications such as personalized service offerings, predictive analytics, and automated content generation. In banking, generative AI drives customer engagement through tailored financial advice, fraud detection, and streamlined customer service. Meanwhile, in healthcare, it enhances medical imaging analysis, drug discovery, and patient diagnostics, significantly impacting patient care and operational efficiency. This paper presents an experimental study examining the implementation and effectiveness of generative AI in these sectors.
    Download  
     
    Export citation  
     
    Bookmark  
  20. Data is the new gold, but efficiently mining it requires a philosophy of data.Data Thinkerr - 2023 - Data Thinking.
    Fixing the problem won’t be easy, but humans’ sharpened focus on an emerging philosophy of data might give us some clue about where we will be heading for.
    Download  
     
    Export citation  
     
    Bookmark  
  21. The 1 law of "absolute reality"." ~, , Data", , ", , Value", , = O. &Gt, Being", & Human - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  22. Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering” (Sha Zhu Pan, 杀猪盘).Jack Whittaker, Suleman Lazarus & Taidgh Corcoran - 2024 - Journal of Economic Criminology 3.
    This is a theoretical treatment of the term "Sha Zhu Pan" (杀猪盘) in Chinese, which translates to “Pig-Butchering” in English. The article critically examines the propagation and validation of "Pig Butchering," an animal metaphor, and its implications for the dehumanisation of victims of online fraud across various discourses. The study provides background information about this type of fraud before investigating its theoretical foundations and linking its emergence to the dehumanisation of fraud victims. The analysis highlights the disparity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Racial Fraud and the American Binary.Kevin J. Harrelson - 2022 - Eidos. A Journal for Philosophy of Culture 6 (3):44-61.
    In response to recent controversies about racial transitioning, I provide an argument that deceptions about ancestry may sometimes constitute fraud. In order to arrive at this conclusion, I criticize the arguments from analogy made famous by Rebecca Tuvel and Christine Overall. My claim is that we should not think of racial transitioning as similar to gender transitioning, because different identity groups possess different kinds of obstacles to entry. I then provide historical surveys of American racial categories and the various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. A FRAUD PREVENTION POLICY: ITS RELEVANCE AND IMPLICATION AT A UNIVERSITY OF TECHNOLOGY IN SOUTH AFRICA.Amelia Rorwana, Robertson K. Tengeh & Tichaona B. Musikavanhu - 2015 - Journal of Governance and Regulation 4 (3):212-221.
    Using research grants administrators and their clients (academic researchers) as the lens, this paper investigated the relevance and implication of a fraud prevention policy at a University of Technology (UoT) in South Africa. The paper adopted a quantitative approach in which closed-ended questions were complemented by open-ended questions in the survey questionnaire in the attempt to capture the perceptions of both research grants administrators and their clients on the relevance and implications of a fraud and irregularity prevention policy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. (1 other version)Open data, open review and open dialogue in making social sciences plausible.Quan-Hoang Vuong - 2017 - Nature: Scientific Data Updates 2017.
    Nowadays, protecting trust in social sciences also means engaging in open community dialogue, which helps to safeguard robustness and improve efficiency of research methods. The combination of open data, open review and open dialogue may sound simple but implementation in the real world will not be straightforward. However, in view of Begley and Ellis’s (2012) statement that, “the scientific process demands the highest standards of quality, ethics and rigour,” they are worth implementing. More importantly, they are feasible to work (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  26. Big data and their epistemological challenge.Luciano Floridi - 2012 - Philosophy and Technology 25 (4):435-437.
    Between 2006 and 2011, humanity accumulated 1,600 EB of data. As a result of this growth, there is now more data produced than available storage. This article explores the problem of “Big Data,” arguing for an epistemological approach as a possible solution to this ever-increasing challenge.
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  27. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood (...) collection technologies, such as gene sequencing tools and online surveillance. To better understand the privacy stakes of brain data, we suggest the use of a conceptual framework from information ethics, Helen Nissenbaum’s “contextual integrity” theory. To illustrate the importance of context, we examine neurotechnologies and the information flows they produce in three familiar contexts—healthcare and medical research, criminal justice, and consumer marketing. We argue that by emphasizing what is distinct about brain privacy issues, rather than what they share with other data privacy concerns, risks weakening broader efforts to enact more robust privacy law and policy. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  28. The Complex relationship between fraud and technology - Should we ignore or regulate online platforms? (12th edition).Jack Mark Whittaker - 2024 - Public Sector Counter Fraud Journal 1 (12):21-22.
    This short article introduces the notion that there is a historical relationship between technology and fraud, that two opposing viewpoints argue whether technology is or is not capable of harm, and lastly that platforms can in fact benefit from fraudsters operating on them parasitically.
    Download  
     
    Export citation  
     
    Bookmark  
  29. Big Data, epistemology and causality: Knowledge in and knowledge out in EXPOsOMICS.Stefano Canali - 2016 - Big Data and Society 3 (2).
    Recently, it has been argued that the use of Big Data transforms the sciences, making data-driven research possible and studying causality redundant. In this paper, I focus on the claim on causal knowledge by examining the Big Data project EXPOsOMICS, whose research is funded by the European Commission and considered capable of improving our understanding of the relation between exposure and disease. While EXPOsOMICS may seem the perfect exemplification of the data-driven view, I show how causal (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  30. Data models, representation and adequacy-for-purpose.Alisa Bokulich & Wendy Parker - 2021 - European Journal for Philosophy of Science 11 (1):1-26.
    We critically engage two traditional views of scientific data and outline a novel philosophical view that we call the pragmatic-representational view of data. On the PR view, data are representations that are the product of a process of inquiry, and they should be evaluated in terms of their adequacy or fitness for particular purposes. Some important implications of the PR view for data assessment, related to misrepresentation, context-sensitivity, and complementary use, are highlighted. The PR view provides (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  31.  79
    A Critical Analysis of Falsification as Fraud.La Shun L. Carroll - 2024 - Ethics in Progress 15 (1):174-206.
    This paper critically evaluates the classification of research-related fraudulent activities, with an emphasis on the specific misconduct falsification. The analysis begins by interrogating the assumption that all acts of fraud in research are intentional, suggesting that some instances may inadvertently arise during the course of scholarly activities. Misconducts like fabrication and falsification are categorized as fraudulent primarily due to their generation during research activities and their direct contribution to the distortion of scientific knowledge. Plagiarism, while deceptive, does not necessarily (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  62
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Big Data and Changing Concepts of the Human.Carrie Figdor - 2019 - European Review 27 (3):328-340.
    Big Data has the potential to enable unprecedentedly rigorous quantitative modeling of complex human social relationships and social structures. When such models are extended to nonhuman domains, they can undermine anthropocentric assumptions about the extent to which these relationships and structures are specifically human. Discoveries of relevant commonalities with nonhumans may not make us less human, but they promise to challenge fundamental views of what it is to be human.
    Download  
     
    Export citation  
     
    Bookmark  
  34. Data quality, experimental artifacts, and the reactivity of the psychological subject matter.Uljana Feest - 2022 - European Journal for Philosophy of Science 12 (1):1-25.
    While the term “reactivity” has come to be associated with specific phenomena in the social sciences, having to do with subjects’ awareness of being studied, this paper takes a broader stance on this concept. I argue that reactivity is a ubiquitous feature of the psychological subject matter and that this fact is a precondition of experimental research, while also posing potential problems for the experimenter. The latter are connected to the worry about distorted data and experimental artifacts. But what (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  35. Big Data Analytics and How to Buy an Election.Jakob Mainz, Rasmus Uhrenfeldt & Jorn Sonderholm - 2021 - Public Affairs Quarterly 32 (2):119-139.
    In this article, we show how it is possible to lawfully buy an election. The method we describe for buying an election is novel. The key things that make it possible to buy an election are the existence of public voter registration lists where one can see whether a given elector has voted in a particular election, and the existence of Big Data Analytics that with a high degree of accuracy can predict what a given elector will vote in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Big Data, Scientific Research and Philosophy.Giovanni Landi - 2020 - Www.Intelligenzaartificialecomefilosofia.Com.
    What is the epistemological status of Big Data? Is there really place for them in a scientific search for new empirical laws?
    Download  
     
    Export citation  
     
    Bookmark  
  37. Making matters of fraud: Sociomaterial technology in the case of Hwang and Schatten.Buhm Soon Park - 2020 - History of Science 58 (4):393-416.
    This paper revisits the “Hwang case,” which shook Korean society and the world of stem cell research in 2005 with the fraudulent claim of creating patient-specific embryonic stem cells. My goal is to overcome a human-centered, Korea-oriented narrative, by illustrating how materials can have an integral role in the construction and judgment of fraud. To this end, I pay attention to Woo Suk Hwang’s lab at Seoul National University as a whole, including human and nonhuman agents, that functioned as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. AI training data, model success likelihood, and informational entropy-based value.Quan-Hoang Vuong, Viet-Phuong La & Minh-Hoang Nguyen - manuscript
    Since the release of OpenAI's ChatGPT, the world has entered a race to develop more capable and powerful AI, including artificial general intelligence (AGI). The development is constrained by the dependency of AI on the model, quality, and quantity of training data, making the AI training process highly costly in terms of resources and environmental consequences. Thus, improving the effectiveness and efficiency of the AI training process is essential, especially when the Earth is approaching the climate tipping points and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. What is data ethics?Luciano Floridi & Mariarosaria Taddeo - 2016 - Philosophical Transactions of the Royal Society A 374 (2083):20160360.
    This theme issue has the founding ambition of landscaping Data Ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including AI, artificial agents, machine learning, and robots), and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data Ethics builds on the foundation provided by (...)
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  41. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and ethicality on (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. (1 other version)Big Data and the Emergence of Zemblanity and Self-Fulfilling Prophecies.Ricardo Peraça Cavassane, Itala M. Loffredo D'Ottaviano & Felipe Sobreira Abrahão - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  43. Cumulative Advantage and the Incentive to Commit Fraud in Science.Remco Heesen - 2024 - British Journal for the Philosophy of Science 75 (3):561-586.
    This paper investigates how the credit incentive to engage in questionable research practices interacts with cumulative advantage, the process whereby high-status academics more easily increase their status than low-status academics. I use a mathematical model to highlight two dynamics that have not yet received much attention. First, due to cumulative advantage, questionable research practices may pay off over the course of an academic career even if they are not attractive at the level of individual publications. Second, because of the role (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Reframing data ethics in research methods education: a pathway to critical data literacy.Javiera Atenas, Leo Havemann & Cristian Timmermann - 2023 - International Journal of Educational Technology in Higher Education 20:11.
    This paper presents an ethical framework designed to support the development of critical data literacy for research methods courses and data training programmes in higher education. The framework we present draws upon our reviews of literature, course syllabi and existing frameworks on data ethics. For this research we reviewed 250 research methods syllabi from across the disciplines, as well as 80 syllabi from data science programmes to understand how or if data ethics was taught. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Data subject rights as a research methodology: A systematic literature review.Adamu Adamu Habu & Tristan Henderson - 2023 - Journal of Responsible Technology 16 (C):100070.
    Data subject rights provide data controllers with obligations that can help with transparency, giving data subjects some control over their personal data. To date, a growing number of researchers have used these data subject rights as a methodology for data collection in research studies. No one, however, has gathered and analysed different academic research studies that use data subject rights as a methodology for data collection. To this end, we conducted a systematic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. In support of fraud trials without a jury.Sally Serena Ramage - 2005 - The Criminal Lawyer 156 (156):1-176.
    The United Kingdom's Parliamentary Bill 'Fraud Trials (Without a Jury) 2007', failed. Nevertheless, fraud trials without a jury do take place and there is much evidence to support this. Today the UK still does not support fraud trials without a jury, even though fraud in the UK today is the highest amount of fraud globally. The longer version of this paper is submitted here since it has become urgent that UK fraud trials be examined (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. When data drive health: an archaeology of medical records technology.Colin Koopman, Paul D. G. Showler, Patrick Jones, Mary McLevey & Valerie Simon - 2022 - Biosocieties 17 (4):782-804.
    Medicine is often thought of as a science of the body, but it is also a science of data. In some contexts, it can even be asserted that data drive health. This article focuses on a key piece of data technology central to contemporary practices of medicine: the medical record. By situating the medical record in the perspective of its history, we inquire into how the kinds of data that are kept at sites of clinical encounter (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  53
    Big Data Ethics in Education and Research.Nicolae Sfetcu - 2023 - It and C 2 (3):26-35.
    Big data ethics involves adherence to the concepts of right and wrong behavior regarding data, especially personal data. Big Data ethics focuses on structured or unstructured data collectors and disseminators. Big data ethics is supported, at EU level, by extensive documentation, which seeks to find concrete solutions to maximize the value of big data without sacrificing fundamental human rights. The European Data Protection Supervisor (EDPS) supports the right to privacy and the right (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Data management practices in Educational Research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2019 - In P. N. Ololube & G. U. Nwiyi (eds.), Encyclopedia of institutional leadership, policy, and management: A handbook of research in honour of Professor Ozo-Mekuri Ndimele. pp. 1251-1265.
    Data is very important in any research experiment because it occupies a central place in making decisions based on findings resulting from the analysis of such data. Given its central role, it follows that such an important asset as data, deserve effective management in order to protect the integrity and provide an opportunity for effective problem-solving. The main thrust of this paper was to examine data management practices that should be adopted by scholars in maintaining the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 931