Results for 'data fraud'

966 found
Order:
  1. Data frauds, health risks, and the growing question of ethics during the COVID-19 pandemic.Vuong Quan-Hoang, Le Tam-Tri & Nguyen Minh-Hoang - manuscript
    In this essay, we advocate that the issue of health data ethics should no longer be considered on the level of individual scientists or research labs, but rather as a problem involving all stakeholders, from publishers, funders, ethical committees to governments, for the sake of research integrity.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. All (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  75
    Lecturers’ and Students’ Perception on Role of Social Support and Psychological First Aid in Assisting Financial Fraud Victims in South-East, Nigeria.Princess Chidinma Nwangwu & Ngozi Mary Eze - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):325-339.
    The study ascertained the perception of lecturers and students on the role of social support and psychological first aid in assisting financial fraud victims in South East Nigeria. The study adopted a descriptive survey design. The study was carried out in three Universities in the South East, Nigeria: the University of Nigeria, Nsukka; Nnamdi Azikiwe University, Awka; and Michael Okpara University of Agriculture, Umudike. The population comprises of 135 students and 52 lecturers in Home Economics programme of the three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The use of confidentiality and anonymity protections as a cover for fraudulent fieldwork data.M. V. Dougherty - 2021 - Research Ethics 17 (4):480-500.
    Qualitative fieldwork research on sensitive topics sometimes requires that interviewees be granted confidentiality and anonymity. When qualitative researchers later publish their findings, they must ensure that any statements obtained during fieldwork interviews cannot be traced back to the interviewees. Given these protections to interviewees, the integrity of the published findings cannot usually be verified or replicated by third parties, and the scholarly community must trust the word of qualitative researchers when they publish their results. This trust is fundamentally abused, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. A Survey of Business Intelligence Solutions in Banking Industry and Big Data Applications.Elaheh Radmehr & Mohammad Bazmara - 2017 - International Journal of Mechatronics, Electrical and Computer Technology 7 (23):3280-3298.
    Nowadays, the economic and social nature of contemporary business organizations chiefly banks binds them to face with the sheer volume of data and information and the key to commercial success in this area is the proper use of data for making better, faster and flawless decisions. To achieve this goal organizations requires strong and effective tools to enable them in automating task analysis, decision-making, strategy formulation and risk prediction to prevent bankruptcy and fraud .Business Intelligence is a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Exploratory hypothesis tests can be more compelling than confirmatory hypothesis tests.Mark Rubin & Chris Donkin - 2022 - Philosophical Psychology.
    Preregistration has been proposed as a useful method for making a publicly verifiable distinction between confirmatory hypothesis tests, which involve planned tests of ante hoc hypotheses, and exploratory hypothesis tests, which involve unplanned tests of post hoc hypotheses. This distinction is thought to be important because it has been proposed that confirmatory hypothesis tests provide more compelling results (less uncertain, less tentative, less open to bias) than exploratory hypothesis tests. In this article, we challenge this proposition and argue that there (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  9. An Epistemic Advantage of Accommodation over Prediction.Finnur Dellsén - forthcoming - Philosophers' Imprint.
    Many philosophers have argued that a hypothesis is better confirmed by some data if the hypothesis was not specifically designed to fit the data. ‘Prediction’, they argue, is superior to ‘accommodation’. Others deny that there is any epistemic advantage to prediction, and conclude that prediction and accommodation are epistemically on a par. This paper argues that there is a respect in which accommodation is superior to prediction. Specifically, the information that the data was accommodated rather than predicted (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Cryptographic Methods with a Pli Cachete: Towards the Computational Assurance of Integrity.Thatcher Collins - 2020 - In Gerhard R. Joubert Ian Foster (ed.), Advances in Parallel Computing. Amsterdam: IOS Press. pp. 10.
    Unreproducibility stemming from a loss of data integrity can be prevented with hash functions, secure sketches, and Benford's Law when combined with the historical practice of a Pli Cacheté where scientific discoveries were archived with a 3rd party to later prove the date of discovery. Including the distinct systems of preregistation and data provenance tracking becomes the starting point for the creation of a complete ontology of scientific documentation. The ultimate goals in such a system--ideally mandated--would rule out (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian cybercriminals' (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  12. Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation.Sally Serena Ramage - 2010 - Current Criminal Law 2 (3):2-7.
    Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation Pages 2-7 Current Criminal Law ISSN 1758-8405 Volume 2 Issue 3 March 2010 Author SALLY RAMAGE WIPO 900614 UK TM 2401827 USA TM 3,440.910 Orchid ID 0000-0002-8854-4293 Sally Ramage, BA (Hons), MBA, LLM, MPhil, MCIJ, MCMI, DA., ASLS, BAWP. Publisher & Managing Editor, Criminal Lawyer series [1980-2022](ISSN 2049-8047); Current Criminal Law series [2008-2022] (ISSN 1758-8405) and Criminal Law News series [2008-2022] (ISSN 1758-8421). Sweet & Maxwell (Thomson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Neural Network-Based Audit Risk Prediction: A Comprehensive Study.Saif al-Din Yusuf Al-Hayik & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):43-51.
    Abstract: This research focuses on utilizing Artificial Neural Networks (ANNs) to predict Audit Risk accurately, a critical aspect of ensuring financial system integrity and preventing fraud. Our dataset, gathered from Kaggle, comprises 18 diverse features, including financial and historical parameters, offering a comprehensive view of audit-related factors. These features encompass 'Sector_score,' 'PARA_A,' 'SCORE_A,' 'PARA_B,' 'SCORE_B,' 'TOTAL,' 'numbers,' 'marks,' 'Money_Value,' 'District,' 'Loss,' 'Loss_SCORE,' 'History,' 'History_score,' 'score,' and 'Risk,' with a total of 774 samples. Our proposed neural network architecture, consisting of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Peer Review system: A Golden standard for publications process.Shamima Parvin Lasker - 2018 - Bangladesh Journal of Bioethics 9 (1):13-23.
    Peer review process helps in evaluating and validating of research that is published in the journals. U.S. Office of Research Integrity reported that data fraudulence was found to be involved in 94% cases of misconduct from 228 identified articles between 1994–2012. If fraud in published article are significantly as high as reported, the question arise in mind, were these articles peer reviewed? Another report said that the reviewers failed to detect 16 cases of fabricated article of Jan Hendrick (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Artificial Intelligence and Punjabi Culture.D. P. Singh - 2023 - International Culture and Art (Ica) 5 (4):11-14.
    Artificial Intelligence (AI) is a technology that makes machines smart and capable of doing things that usually require human intelligence. AI works by training machines to learn from data and experiences. Such devices can recognize patterns, understand spoken language, see and understand images, and even make predictions based on their learning. Voice assistants like Siri or Alexa can understand our voice commands, answer questions, and perform tasks for us. AI-based self-driving cars can sense their surroundings, make decisions, and drive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  18. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  79
    An Experimental Analysis of Revolutionizing Banking and Healthcare with Generative AI.Sankara Reddy Thamma - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):580-590.
    Generative AI is reshaping sectors like banking and healthcare by enabling innovative applications such as personalized service offerings, predictive analytics, and automated content generation. In banking, generative AI drives customer engagement through tailored financial advice, fraud detection, and streamlined customer service. Meanwhile, in healthcare, it enhances medical imaging analysis, drug discovery, and patient diagnostics, significantly impacting patient care and operational efficiency. This paper presents an experimental study examining the implementation and effectiveness of generative AI in these sectors.
    Download  
     
    Export citation  
     
    Bookmark  
  20. Data is the new gold, but efficiently mining it requires a philosophy of data.Data Thinkerr - 2023 - Data Thinking.
    Fixing the problem won’t be easy, but humans’ sharpened focus on an emerging philosophy of data might give us some clue about where we will be heading for.
    Download  
     
    Export citation  
     
    Bookmark  
  21. The 1 law of "absolute reality"." ~, , Data", , ", , Value", , = O. &Gt, Being", & Human - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  22. Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering” (Sha Zhu Pan, 杀猪盘).Jack Whittaker, Suleman Lazarus & Taidgh Corcoran - 2024 - Journal of Economic Criminology 3.
    This is a theoretical treatment of the term "Sha Zhu Pan" (杀猪盘) in Chinese, which translates to “Pig-Butchering” in English. The article critically examines the propagation and validation of "Pig Butchering," an animal metaphor, and its implications for the dehumanisation of victims of online fraud across various discourses. The study provides background information about this type of fraud before investigating its theoretical foundations and linking its emergence to the dehumanisation of fraud victims. The analysis highlights the disparity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Racial Fraud and the American Binary.Kevin J. Harrelson - 2022 - Eidos. A Journal for Philosophy of Culture 6 (3):44-61.
    In response to recent controversies about racial transitioning, I provide an argument that deceptions about ancestry may sometimes constitute fraud. In order to arrive at this conclusion, I criticize the arguments from analogy made famous by Rebecca Tuvel and Christine Overall. My claim is that we should not think of racial transitioning as similar to gender transitioning, because different identity groups possess different kinds of obstacles to entry. I then provide historical surveys of American racial categories and the various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. A FRAUD PREVENTION POLICY: ITS RELEVANCE AND IMPLICATION AT A UNIVERSITY OF TECHNOLOGY IN SOUTH AFRICA.Amelia Rorwana, Robertson K. Tengeh & Tichaona B. Musikavanhu - 2015 - Journal of Governance and Regulation 4 (3):212-221.
    Using research grants administrators and their clients (academic researchers) as the lens, this paper investigated the relevance and implication of a fraud prevention policy at a University of Technology (UoT) in South Africa. The paper adopted a quantitative approach in which closed-ended questions were complemented by open-ended questions in the survey questionnaire in the attempt to capture the perceptions of both research grants administrators and their clients on the relevance and implications of a fraud and irregularity prevention policy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  62
    Optimizing Data Center Operations with Enhanced SLA-Driven Load Balancing".S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    The research introduces a novel framework that incorporates real-time monitoring, dynamic resource allocation, and adaptive threshold settings to ensure consistent SLA adherence while optimizing computing performance. Extensive simulations are conducted using synthetic and real-world datasets to evaluate the performance of the proposed algorithm. The results demonstrate that the optimized load balancing approach outperforms traditional algorithms in terms of SLA compliance, resource utilization, and energy efficiency. The findings suggest that the integration of optimization techniques into load balancing algorithms can significantly enhance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Data models, representation and adequacy-for-purpose.Alisa Bokulich & Wendy Parker - 2021 - European Journal for Philosophy of Science 11 (1):1-26.
    We critically engage two traditional views of scientific data and outline a novel philosophical view that we call the pragmatic-representational view of data. On the PR view, data are representations that are the product of a process of inquiry, and they should be evaluated in terms of their adequacy or fitness for particular purposes. Some important implications of the PR view for data assessment, related to misrepresentation, context-sensitivity, and complementary use, are highlighted. The PR view provides (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  27. (1 other version)Open data, open review and open dialogue in making social sciences plausible.Quan-Hoang Vuong - 2017 - Nature: Scientific Data Updates 2017.
    Nowadays, protecting trust in social sciences also means engaging in open community dialogue, which helps to safeguard robustness and improve efficiency of research methods. The combination of open data, open review and open dialogue may sound simple but implementation in the real world will not be straightforward. However, in view of Begley and Ellis’s (2012) statement that, “the scientific process demands the highest standards of quality, ethics and rigour,” they are worth implementing. More importantly, they are feasible to work (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  28. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood (...) collection technologies, such as gene sequencing tools and online surveillance. To better understand the privacy stakes of brain data, we suggest the use of a conceptual framework from information ethics, Helen Nissenbaum’s “contextual integrity” theory. To illustrate the importance of context, we examine neurotechnologies and the information flows they produce in three familiar contexts—healthcare and medical research, criminal justice, and consumer marketing. We argue that by emphasizing what is distinct about brain privacy issues, rather than what they share with other data privacy concerns, risks weakening broader efforts to enact more robust privacy law and policy. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  29. Data quality, experimental artifacts, and the reactivity of the psychological subject matter.Uljana Feest - 2022 - European Journal for Philosophy of Science 12 (1):1-25.
    While the term “reactivity” has come to be associated with specific phenomena in the social sciences, having to do with subjects’ awareness of being studied, this paper takes a broader stance on this concept. I argue that reactivity is a ubiquitous feature of the psychological subject matter and that this fact is a precondition of experimental research, while also posing potential problems for the experimenter. The latter are connected to the worry about distorted data and experimental artifacts. But what (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  30. Big data and their epistemological challenge.Luciano Floridi - 2012 - Philosophy and Technology 25 (4):435-437.
    Between 2006 and 2011, humanity accumulated 1,600 EB of data. As a result of this growth, there is now more data produced than available storage. This article explores the problem of “Big Data,” arguing for an epistemological approach as a possible solution to this ever-increasing challenge.
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  31. The Complex relationship between fraud and technology - Should we ignore or regulate online platforms? (12th edition).Jack Mark Whittaker - 2024 - Public Sector Counter Fraud Journal 1 (12):21-22.
    This short article introduces the notion that there is a historical relationship between technology and fraud, that two opposing viewpoints argue whether technology is or is not capable of harm, and lastly that platforms can in fact benefit from fraudsters operating on them parasitically.
    Download  
     
    Export citation  
     
    Bookmark  
  32. Data subject rights as a research methodology: A systematic literature review.Adamu Adamu Habu & Tristan Henderson - 2023 - Journal of Responsible Technology 16 (C):100070.
    Data subject rights provide data controllers with obligations that can help with transparency, giving data subjects some control over their personal data. To date, a growing number of researchers have used these data subject rights as a methodology for data collection in research studies. No one, however, has gathered and analysed different academic research studies that use data subject rights as a methodology for data collection. To this end, we conducted a systematic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and ethicality on (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Big Data, epistemology and causality: Knowledge in and knowledge out in EXPOsOMICS.Stefano Canali - 2016 - Big Data and Society 3 (2).
    Recently, it has been argued that the use of Big Data transforms the sciences, making data-driven research possible and studying causality redundant. In this paper, I focus on the claim on causal knowledge by examining the Big Data project EXPOsOMICS, whose research is funded by the European Commission and considered capable of improving our understanding of the relation between exposure and disease. While EXPOsOMICS may seem the perfect exemplification of the data-driven view, I show how causal (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  35. Big Data Analytics in Healthcare: Exploring the Role of Machine Learning in Predicting Patient Outcomes and Improving Healthcare Delivery.Federico Del Giorgio Solfa & Fernando Rogelio Simonato - 2023 - International Journal of Computations Information and Manufacturing (Ijcim) 3 (1):1-9.
    Healthcare professionals decide wisely about personalized medicine, treatment plans, and resource allocation by utilizing big data analytics and machine learning. To guarantee that algorithmic recommendations are impartial and fair, however, ethical issues relating to prejudice and data privacy must be taken into account. Big data analytics and machine learning have a great potential to disrupt healthcare, and as these technologies continue to evolve, new opportunities to reform healthcare and enhance patient outcomes may arise. In order to investigate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Making matters of fraud: Sociomaterial technology in the case of Hwang and Schatten.Buhm Soon Park - 2020 - History of Science 58 (4):393-416.
    This paper revisits the “Hwang case,” which shook Korean society and the world of stem cell research in 2005 with the fraudulent claim of creating patient-specific embryonic stem cells. My goal is to overcome a human-centered, Korea-oriented narrative, by illustrating how materials can have an integral role in the construction and judgment of fraud. To this end, I pay attention to Woo Suk Hwang’s lab at Seoul National University as a whole, including human and nonhuman agents, that functioned as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Big Data and Changing Concepts of the Human.Carrie Figdor - 2019 - European Review 27 (3):328-340.
    Big Data has the potential to enable unprecedentedly rigorous quantitative modeling of complex human social relationships and social structures. When such models are extended to nonhuman domains, they can undermine anthropocentric assumptions about the extent to which these relationships and structures are specifically human. Discoveries of relevant commonalities with nonhumans may not make us less human, but they promise to challenge fundamental views of what it is to be human.
    Download  
     
    Export citation  
     
    Bookmark  
  38. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39. ICTs, data and vulnerable people: a guide for citizens.Alexandra Castańeda, Andreas Matheus, Andrzej Klimczuk, Anna BertiSuman, Annelies Duerinckx, Christoforos Pavlakis, Corelia Baibarac-Duignan, Elisabetta Broglio, Federico Caruso, Gefion Thuermer, Helen Feord, Janice Asine, Jaume Piera, Karen Soacha, Katerina Zourou, Katherin Wagenknecht, Katrin Vohland, Linda Freyburg, Marcel Leppée, Marta CamaraOliveira, Mieke Sterken & Tim Woods - 2021 - Bilbao: Upv-Ehu.
    ICTs, personal data, digital rights, the GDPR, data privacy, online security… these terms, and the concepts behind them, are increasingly common in our lives. Some of us may be familiar with them, but others are less aware of the growing role of ICTs and data in our lives - and the potential risks this creates. These risks are even more pronounced for vulnerable groups in society. People can be vulnerable in different, often overlapping, ways, which place them (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. In support of fraud trials without a jury.Sally Serena Ramage - 2005 - The Criminal Lawyer 156 (156):1-176.
    The United Kingdom's Parliamentary Bill 'Fraud Trials (Without a Jury) 2007', failed. Nevertheless, fraud trials without a jury do take place and there is much evidence to support this. Today the UK still does not support fraud trials without a jury, even though fraud in the UK today is the highest amount of fraud globally. The longer version of this paper is submitted here since it has become urgent that UK fraud trials be examined (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Sense-data and the philosophy of mind: Russell, James, and Mach.Gary Hatfield - 2002 - Principia 6 (2):203-230.
    The theory of knowledge in early twentieth-century Anglo American philosophy was oriented toward phenomenally described cognition. There was a healthy respect for the mind-body problem, which meant that phenomena in both the mental and physical domains were taken seriously. Bertrand Russell's developing position on sense-data and momentary particulars drew upon, and ultimately became like, the neutral monism of Ernst Mach and William James. Due to a more recent behaviorist and physicalist inspired "fear of the mental", this development has been (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  42. When data drive health: an archaeology of medical records technology.Colin Koopman, Paul D. G. Showler, Patrick Jones, Mary McLevey & Valerie Simon - 2022 - Biosocieties 17 (4):782-804.
    Medicine is often thought of as a science of the body, but it is also a science of data. In some contexts, it can even be asserted that data drive health. This article focuses on a key piece of data technology central to contemporary practices of medicine: the medical record. By situating the medical record in the perspective of its history, we inquire into how the kinds of data that are kept at sites of clinical encounter (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Data management practices in Educational Research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2019 - In P. N. Ololube & G. U. Nwiyi (eds.), Encyclopedia of institutional leadership, policy, and management: A handbook of research in honour of Professor Ozo-Mekuri Ndimele. pp. 1251-1265.
    Data is very important in any research experiment because it occupies a central place in making decisions based on findings resulting from the analysis of such data. Given its central role, it follows that such an important asset as data, deserve effective management in order to protect the integrity and provide an opportunity for effective problem-solving. The main thrust of this paper was to examine data management practices that should be adopted by scholars in maintaining the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  44. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the audience (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  75
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  53
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. How Data Governance Principles Influence Participation in Biodiversity Science.Beckett Sterner & Steve Elliott - 2023 - Science as Culture.
    Biodiversity science is in a pivotal period when diverse groups of actors—including researchers, businesses, national governments, and Indigenous Peoples—are negotiating wide-ranging norms for governing and managing biodiversity data in digital repositories. These repositories, often called biodiversity data portals, are a type of organization for which governance can address or perpetuate the colonial history of biodiversity science and current inequities. Researchers and Indigenous Peoples are developing and implementing new strategies to examine and change assumptions about which agents should count (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Data Synthesis for Big Questions: From Animal Tracks to Ecological Models.Rose Trappes - 2024 - Philosophy, Theory, and Practice in Biology 16 (1):4.
    This paper addresses a relatively new mode of ecological research: data synthesis studies. Data synthesis studies involve reusing data to create a general model as well as a reusable, aggregated dataset. Using a case from movement ecology, I analyse the trade-offs and strategies involved in data synthesis. Like theoretical ecological modelling, I find that synthesis studies involve a modelling trade-off between generality, precision and realism; they deal with this trade-off by adopting a pragmatic kludging strategy. I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. What is data ethics?Luciano Floridi & Mariarosaria Taddeo - 2016 - Philosophical Transactions of the Royal Society A 374 (2083):20160360.
    This theme issue has the founding ambition of landscaping Data Ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including AI, artificial agents, machine learning, and robots), and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data Ethics builds on the foundation provided by (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  50. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 966