Results for 'data protection'

999 found
Order:
  1. Open data, data protection, and group privacy.Luciano Floridi - 2014 - Philosophy and Technology 27 (1):1–3.
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  2. Why a right to explanation of automated decision-making does not exist in the General Data Protection Regulation.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - International Data Privacy Law 1 (2):76-99.
    Since approval of the EU General Data Protection Regulation (GDPR) in 2016, it has been widely and repeatedly claimed that the GDPR will legally mandate a ‘right to explanation’ of all decisions made by automated or artificially intelligent algorithmic systems. This right to explanation is viewed as an ideal mechanism to enhance the accountability and transparency of automated decision-making. However, there are several reasons to doubt both the legal existence and the feasibility of such a right. In contrast (...)
    Download  
     
    Export citation  
     
    Bookmark   62 citations  
  3. Soft ethics: its application to the General Data Protection Regulation and its dual advantage.Luciano Floridi - 2018 - Philosophy and Technology 31 (1):163-167.
    In previous works (Floridi 2018) I introduced the distinction between hard ethics (which may broadly be described as what is morally right and wrong independently of whether something is legal or illegal), and soft or post-compliance ethics (which focuses on what ought to be done over and above existing legislation). This paper analyses the applicability of soft ethics to the General Data Protection Regulation and advances the theory that soft ethics has a dual advantage—as both an opportunity strategy (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  4. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. The use of confidentiality and anonymity protections as a cover for fraudulent fieldwork data.M. V. Dougherty - 2021 - Research Ethics 17 (4):480-500.
    Qualitative fieldwork research on sensitive topics sometimes requires that interviewees be granted confidentiality and anonymity. When qualitative researchers later publish their findings, they must ensure that any statements obtained during fieldwork interviews cannot be traced back to the interviewees. Given these protections to interviewees, the integrity of the published findings cannot usually be verified or replicated by third parties, and the scholarly community must trust the word of qualitative researchers when they publish their results. This trust is fundamentally abused, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. ICTs, data and vulnerable people: a guide for citizens.Alexandra Castańeda, Andreas Matheus, Andrzej Klimczuk, Anna BertiSuman, Annelies Duerinckx, Christoforos Pavlakis, Corelia Baibarac-Duignan, Elisabetta Broglio, Federico Caruso, Gefion Thuermer, Helen Feord, Janice Asine, Jaume Piera, Karen Soacha, Katerina Zourou, Katherin Wagenknecht, Katrin Vohland, Linda Freyburg, Marcel Leppée, Marta CamaraOliveira, Mieke Sterken & Tim Woods - 2021 - Bilbao: Upv-Ehu.
    ICTs, personal data, digital rights, the GDPR, data privacy, online security… these terms, and the concepts behind them, are increasingly common in our lives. Some of us may be familiar with them, but others are less aware of the growing role of ICTs and data in our lives - and the potential risks this creates. These risks are even more pronounced for vulnerable groups in society. People can be vulnerable in different, often overlapping, ways, which place them (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Open data, open review and open dialogue in making social sciences plausible.Quan-Hoang Vuong - 2017 - Nature: Scientific Data Updates 2017.
    Nowadays, protecting trust in social sciences also means engaging in open community dialogue, which helps to safeguard robustness and improve efficiency of research methods. The combination of open data, open review and open dialogue may sound simple but implementation in the real world will not be straightforward. However, in view of Begley and Ellis’s (2012) statement that, “the scientific process demands the highest standards of quality, ethics and rigour,” they are worth implementing. More importantly, they are feasible to work (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  8.  57
    The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The complaint about ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Big Data Ethics.Nicolae Sfetcu - manuscript
    Big Data ethics involves adherence to the concepts of right and wrong behavior regarding data, especially personal data. Big Data ethics focuses on structured or unstructured data collectors and disseminators. Big Data ethics is supported, at EU level, by extensive documentation, which seeks to find concrete solutions to maximize the value of Big Data without sacrificing fundamental human rights. The European Data Protection Supervisor (EDPS) supports the right to privacy and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Data subject rights as a research methodology: A systematic literature review.Adamu Adamu Habu & Tristan Henderson - 2023 - Journal of Responsible Technology 16 (C):100070.
    Data subject rights provide data controllers with obligations that can help with transparency, giving data subjects some control over their personal data. To date, a growing number of researchers have used these data subject rights as a methodology for data collection in research studies. No one, however, has gathered and analysed different academic research studies that use data subject rights as a methodology for data collection. To this end, we conducted a systematic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Big Data as Tracking Technology and Problems of the Group and its Members.Haleh Asgarinia - 2023 - In Kevin Macnish & Adam Henschke (eds.), The Ethics of Surveillance in Times of Emergency. Oxford University Press. pp. 60-75.
    Digital data help data scientists and epidemiologists track and predict outbreaks of disease. Mobile phone GPS data, social media data, or other forms of information updates such as the progress of epidemics are used by epidemiologists to recognize disease spread among specific groups of people. Targeting groups as potential carriers of a disease, rather than addressing individuals as patients, risks causing harm to groups. While there are rules and obligations at the level of the individual, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Reframing data ethics in research methods education: a pathway to critical data literacy.Javiera Atenas, Leo Havemann & Cristian Timmermann - 2023 - International Journal of Educational Technology in Higher Education 20:11.
    This paper presents an ethical framework designed to support the development of critical data literacy for research methods courses and data training programmes in higher education. The framework we present draws upon our reviews of literature, course syllabi and existing frameworks on data ethics. For this research we reviewed 250 research methods syllabi from across the disciplines, as well as 80 syllabi from data science programmes to understand how or if data ethics was taught. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Data and Afrofuturism: an emancipated subject?Aisha Paulina Lami Kadiri - 2021 - Internet Policy Review 10 (4):1-26.
    The concept of an individual, liberal data subject, who was traditionally at the centre of data protection efforts has recently come under scrutiny. At the same time, the particularly destructive effect of digital technology on Black people establishes the need for an analysis that not only considers but brings racial dimensions to the forefront. I argue that because Afrofuturism situates the Black struggle in persistent, yet continuously changing structural disparities and power relations, it offers a powerful departure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Data management practices in Educational Research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2019 - In P. N. Ololube & G. U. Nwiyi (eds.), Encyclopedia of institutional leadership, policy, and management: A handbook of research in honour of Professor Ozo-Mekuri Ndimele. Port Harcourt, Nigeria: pp. 1251-1265.
    Data is very important in any research experiment because it occupies a central place in making decisions based on findings resulting from the analysis of such data. Given its central role, it follows that such an important asset as data, deserve effective management in order to protect the integrity and provide an opportunity for effective problem-solving. The main thrust of this paper was to examine data management practices that should be adopted by scholars in maintaining the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  15. Big Data Ethics in Research.Nicolae Sfetcu - 2019 - Bucharest, Romania: MultiMedia Publishing.
    The main problems faced by scientists in working with Big Data sets, highlighting the main ethical issues, taking into account the legislation of the European Union. After a brief Introduction to Big Data, the Technology section presents specific research applications. There is an approach to the main philosophical issues in Philosophical Aspects, and Legal Aspects with specific ethical issues in the EU Regulation on the protection of natural persons with regard to the processing of personal data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  37
    Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to this viewpoint, this right (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the rise of new information and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Etica Big Data în cercetare.Nicolae Sfetcu - manuscript
    Principalele probleme cu care se confruntă oamenii de știință în lucrul cu seturile mari de date (Big Data), evidențiind principale aspecte etice, luând în considerare inclusiv legislația din Uniunea Europeană. După o scurtă Introducere despre Big Data, secțiunea Tehnologia prezintă aplicațiile specifice în cercetare. Urmează o abordare a principalelor probleme filosofice specifice în Aspecte filosofice, și Aspecte legale cu evidențierea problemelor etice specifice din Regulamentul UE privind protecția datelor 2016/679 (General Data Protection Regulation, "GDPR"). Secțiunea Probleme (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  20. From public data to private information: The case of the supermarket.Vincent C. Müller - 2009 - In Bottis Maria (ed.), Proceedings of the 8th International Conference Computer Ethics: Philosophical Enquiry. Nomiki Bibliothiki. pp. 500-507.
    The background to this paper is that in our world of massively increasing personal digital data any control over the data about me seems illusionary – informational privacy seems a lost cause. On the other hand, the production of this digital data seems a necessary component of our present life in the industrialized world. A framework for a resolution of this apparent dilemma is provided if by the distinction between (meaningless) data and (meaningful) information. I argue (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. PROTECTIVE BEHAVIOR AGAINST COVID-19 AMONG VIETNAMESE PEOPLE IN THE SOCIAL DISTANCING CAMPAIGN: A CROSS-SECTIONAL STUDY.Tu Phung Tran, Vu Dinh Phi Le & Thanh Hoa Diep - 2022 - DALAT UNIVERSITY JOURNAL OF SCIENCE 12 (1):20-38.
    In the global fight against the rapid spread of COVID-19, a variety of unprecedented preventive measures have been implemented across the globe, as well as in Vietnam. How Vietnamese people respond to threats to their health and life remains unclear. For this reason, the current study aims to examine Vietnamese people’s protective behavior and its factors. Based on 1,798 online survey respondents’ data collected on the last three days of the nationwide social distancing campaign in mid-April, it is found (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Protecting Australia against Cyberterrorism.Marcia Ricci Pinheiro - 2017 - IOSR Journal Of Humanities And Social Science (IOSR-JHSS) 22 (9):1-6.
    We talk about how to best protect Australia against cyberterrorist attacks of the type in which the offenders use a computer to attack or in which the offenders attack computers. Our concern is phenomena like Stuxnet and Ransomware, but also any attack that has not yet happened, as for our official records, so say hacking of satellite and use of its allowances to burn people alive to death. We talk about the basics, which could be the advice of FireEye, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. An Introduction to Hard and Soft Data Fusion via Conceptual Spaces Modeling for Space Event Characterization.Jeremy Chapman, David Kasmier, John L. Crassidis, James L. Llinas, Barry Smith & Alex P. Cox - 2021 - In Jeremy Chapman, David Kasmier, John L. Crassidis, James L. Llinas, Barry Smith & Alex P. Cox (eds.), National Symposium on Sensor & Data Fusion (NSSDF), Military Sensing Symposia (MSS).
    This paper describes an AFOSR-supported basic research program that focuses on developing a new framework for combining hard with soft data in order to improve space situational awareness. The goal is to provide, in an automatic and near real-time fashion, a ranking of possible threats to blue assets (assets trying to be protected) from red assets (assets with hostile intentions). The approach is based on Conceptual Spaces models, which combine features from traditional associative and symbolic cognitive models. While Conceptual (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Legal aspects of Big Data - GDPR.Nicolae Sfetcu - manuscript
    The use of Big Data presents significant legal problems, especially in terms of data protection. The existing legal framework of the European Union based in particular on the Directive no. 46/95/EC and the General Regulation on the Protection of Personal Data provide adequate protection. But for Big Data, a comprehensive and global strategy is needed. The evolution over time was from the right to exclude others to the right to control their own (...) and, at present, to the rethinking of the right to (digital) identity. The General Data Protection Regulation, "GDPR" (Regulation EU 2016/679) deals with data protection and privacy of persons in the European Union and the European Economic Area. DOI: 10.13140/RG.2.2.29614.46400. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In Philosophical Foundations of Medical Law. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. What drives people’s protective behaviors during the early stage of the COVID-19 pandemic in China.Zhenjing Pang, Ce Zhao & Lan Xue - 2022 - Frontiers in Psychology 13:781279.
    This study systematically examined people’s protective behaviors against COVID-19 in China, and particular attention was given to people’s perceived threat and information-processing strategies. This study constructed a conceptual model and used structural equation modeling to explore this issue, and a questionnaire survey was conducted to collect data involving 4,605 participants during the early stage of the COVID-19 pandemic in China. The results showed that people’s initial information acquisition played an essential role in their behavioral responses; acquiring more initial information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  81
    La regulación de los drones y la protección de los derechos fundamentales: especial atención a la tutela del menor (The regulation of drones and the protection of fundamental rights: special attention to the protection of minors).Joaquin Sarrión - 2018 - In Desafíos de la protección de menores en la sociedad digital: Internet, redes sociales y comunicación, Francisco Javier Durán Ruiz (dir.), Tirant lo blanch, 2018, ISBN 978-84-9169-753-4,. Valencia: Tirant lo Blanch. pp. 385-411.
    This paper is an approach to the regulation of drones and the protection of fundamental rights, particularly in relation to the use of drones equipped with image and data capture technologies, with special attention to the position and protection of minors.
    Download  
     
    Export citation  
     
    Bookmark  
  28. Accessing Online Data for Youth Mental Health Research: Meeting the Ethical Challenges.Elvira Perez Vallejos, Ansgar Koene, Christopher James Carter, Daniel Hunt, Christopher Woodard, Lachlan Urquhart, Aislinn Bergin & Ramona Statache - 2019 - Philosophy and Technology 32 (1):87-110.
    This article addresses the general ethical issues of accessing online personal data for research purposes. The authors discuss the practical aspects of online research with a specific case study that illustrates the ethical challenges encountered when accessing data from Kooth, an online youth web-counselling service. This paper firstly highlights the relevance of a process-based approach to ethics when accessing highly sensitive data and then discusses the ethical considerations and potential challenges regarding the accessing of public data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Ownership of personal data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  30. Analysis of Institutional Capacity of National Social Protection Policy Framework.Narith Por - 2018 - World Journal of Research and Review 6 (4):66-71.
    Cambodians are still vulnerable. To reverse those conditions, National Social Protection Strategy (N.S.P.S) was developed for the poor and vulnerable people to promote their livelihoods. Royal Government of Cambodia (R.G.C) has paid attention to social assistance. In strategic plans, highlights on strengthening, and collectively developing social security, consistent and effective. With these issues, the government establishes a national social protection policy framework to help all people in particular poor and vulnerable people (M.o.E.F, 2017, p.1). The research aims at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  65
    Ethical and social reflections on the proposed European Health Data Space.Ciara Staunton, Mahsa Shabani, Deborah Mascalzoni, Signe Mezinska & Santa Slokenberga - 2024 - European Journal of Human Genetics 1 (1):1-9.
    The COVID-19 pandemic demonstrated the benefits of international data sharing. Data sharing enabled the health care policy makers to make decisions based on real-time data, it enabled the tracking of the virus, and importantly it enabled the development of vaccines that were crucial to mitigating the impact of the virus. This data sharing is not the norm as data sharing needs to navigate complex ethical and legal rules, and in particular, the fragmented application of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Is co-management a double-edged sword in the protected areas of Sundarbans mangrove?Md Mizanur Rahman - 2022 - Biology and Philosophy 37 (1):1-22.
    The overall objective of the study was to examine the pros and cons of the participatory approach adopted in natural resource management in the ecologically protected areas of the Sundarbans mangrove of Bangladesh. A comparative study was done between the people who are involved and non-involved in this approach. Empirical data was collected through personal interviews with a structured questionnaire. The Gini coefficient was measured first and then embedded with the Lorenz curve to draw a line between perfect equality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Risk assessment tools in criminal justice and forensic psychiatry: The need for better data.Thomas Douglas, Jonathan Pugh, Illina Singh, Julian Savulescu & Seena Fazel - 2017 - European Psychiatry 42:134-137.
    Violence risk assessment tools are increasingly used within criminal justice and forensic psychiatry, however there is little relevant, reliable and unbiased data regarding their predictive accuracy. We argue that such data are needed to (i) prevent excessive reliance on risk assessment scores, (ii) allow matching of different risk assessment tools to different contexts of application, (iii) protect against problematic forms of discrimination and stigmatisation, and (iv) ensure that contentious demographic variables are not prematurely removed from risk assessment tools.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  35. Hey, Google, leave those kids alone: Against hypernudging children in the age of big data.James Smith & Tanya de Villiers-Botha - 2021 - AI and Society.
    Children continue to be overlooked as a topic of concern in discussions around the ethical use of people’s data and information. Where children are the subject of such discussions, the focus is often primarily on privacy concerns and consent relating to the use of their data. This paper highlights the unique challenges children face when it comes to online interferences with their decision-making, primarily due to their vulnerability, impressionability, the increased likelihood of disclosing personal information online, and their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. L’éthique des mégadonnées (Big Data) en recherche.Nicolae Sfetcu - 2020 - Drobeta Turnu Severin: MultiMedia Publishing.
    Les principaux problèmes rencontrés par les scientifiques qui travaillent avec des ensembles de données massives (mégadonnées, Big Data), en soulignant les principaux problèmes éthiques, tout en tenant compte de la législation de l'Union européenne. Après une brève Introduction au Big Data, la section Technologie présente les applications spécifiques de la recherche. Il suit une approche des principales questions philosophiques spécifiques dans Aspects philosophiques, et Aspects juridiques en soulignant les problèmes éthiques spécifiques du règlement de l'UE sur la (...) des données 2016/679 (General Data Protection Regulation, « GDPR »). La section Problèmes éthiques détaille les problèmes spécifiques générés par le big data. Après une brève section de Recherche de big data, sont présentées les Conclusions sur l’éthique de la recherche dans l’utilisation du big data. SOMMAIRE: Abstract 1. Introduction - 1.1 Définitions - 1.2 Les dimensions du big data 2. La technologie - 2.1 Applications - - 2.1.1 En recherche 3. Aspects philosophiques 4 Aspects juridiques - 4.1 RGPD (GDPR) - - Étapes du traitement des données personnelles - - Principes du traitement des données - - Politique de confidentialité et transparence - - Finalités du traitement des données - - Confidentialité par conception et confidentialité implicite - - Le paradoxe (juridique) des mégadonnées 5. Problèmes éthiques - L'éthique dans la recherche - Prise de conscience - Consentement - Contrôle - Transparence - Confiance - Propriété - Surveillance et sécurité - Identité numérique - Réalité ajustée - De-anonymisation - Inégalité numérique - Confidentialité 6. Recherche des mégadonnées Conclusions Bibliographie DOI: 10.13140/RG.2.2.10128.56328 . (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Exploring Environmental Kuznets Curves of Kitakyushu: 50-year Time-series Data of the OECD SDGs Pilot City.Quan-Hoang Vuong, Ho Manh Tung, Nguyen To Hong Kong & Nguyen Minh Hoang - manuscript
    Can green growth policies help protect the environment while keeping the industry growing and infrastructure expanding? The City of Kitakyushu, Japan, has actively implemented eco-friendly policies since 1967 and recently inspired the pursuit of sustainable development around the world, especially in the Global South region. However, empirical studies on the effects of green growth policies are still lacking. This study explores the relationship between road infrastructure development and average industrial firm size with air pollution in the city through the Environmental (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Engaging the Public in Ethical Reasoning About Big Data.Justin Anthony Knapp - 2016 - In Soren Adam Matei & Jeff Collman (eds.), Ethical Reasoning in Big Data: An Exploratory Analysis. Springer. pp. 43-52.
    The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia that contrast with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Predictive Modeling of Smoke Potential Using Neural Networks and Environmental Data.Abu Al-Reesh Kamal Ali, Al-Safadi Muhammad Nidal, Al-Tanani Waleed Sami & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):38-46.
    This study presents a neural network-based model for predicting smoke potential in a specific area using a Kaggle-derived dataset with 15 environmental features and 62,631 samples. Our five-layer neural network achieved an accuracy of 89.14% and an average error of 0.000715, demonstrating its effectiveness. Key influential features, including temperature, humidity, crude ethanol, pressure, NC1.0, NC2.5, SCNT, and PM2.5, were identified, providing insights into smoke occurrence. This research aids in proactive smoke mitigation and public health protection. The model's accuracy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Workshop Report: Creating a Citizens’ Information Pack on Ethical and Legal Issues Around Icts: What Should Be Included?Janice Asine, Corelia Baibarac-Duignan, Elisabetta Broglio, Alexandra Castańeda, Helen Feord, Linda Freyburg, Marcel Leppée, Andreas Matheus, Marta Camara Oliveira, Christoforos Pavlakis, Jaume Peira, Karen Soacha, Gefion Thuermer, Katrin Vohland, Katherin Wagenknecht, Tim Woods, Katerina Zourou, Federico Caruso, Annelies Duerinckx, Andrzej Klimczuk, Mieke Sterken & Anna Berti Suman - 2020 - European Citizen Science Association.
    The aim of this workshop was to ask potential end-users of the citizens’ information pack on legal and ethical issues around ICTs the following questions: What is your knowledge of the EU’s General Data Protection Regulation, and what actions have you taken in response to these regulations? What challenges are you experiencing in ensuring the protection and security of your project data, and compliance with the GDPR, within existing data management processes/systems? What information/tools/resources do you (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Data is the new gold, but efficiently mining it requires a philosophy of data.Data Thinkerr - 2023 - Data Thinking.
    Fixing the problem won’t be easy, but humans’ sharpened focus on an emerging philosophy of data might give us some clue about where we will be heading for.
    Download  
     
    Export citation  
     
    Bookmark  
  42. Towards a digital ethics: EDPS ethics advisory group.J. Peter Burgess, Luciano Floridi, Aurélie Pols & Jeroen van den Hoven - 2018 - EDPS Ethics Advisory Group.
    The EDPS Ethics Advisory Group (EAG) has carried out its work against the backdrop of two significant social-political moments: a growing interest in ethical issues, both in the public and in the private spheres and the imminent entry into force of the General Data Protection Regulation (GDPR) in May 2018. For some, this may nourish a perception that the work of the EAG represents a challenge to data protection professionals, particularly to lawyers in the field, as (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. The 1 law of "absolute reality"." ~, , Data", , ", , Value", , = O. &Gt, Being", & Human - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  44. State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Anti-doping, purported rights to privacy and WADA's whereabouts requirements: A legal analysis.Oskar MacGregor, Richard Griffith, Daniele Ruggiu & Mike McNamee - 2013 - Fair Play 1 (2):13-38.
    Recent discussions among lawyers, philosophers, policy researchers and athletes have focused on the potential threat to privacy posed by the World Anti-Doping Agency’s (WADA) whereabouts requirements. These requirements demand, among other things, that all elite athletes file their whereabouts information for the subsequent quarter on a quarterly basis and comprise data for one hour of each day when the athlete will be available and accessible for no advance notice testing at a specified location of their choosing. Failure to file (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46. Group privacy: a defence and an interpretation.Luciano Floridi - 2017 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group Privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove the (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  47. Derecho al olvido en Internet: Google y la doctrina europea.David Villena Saldaña - 2015 - Contratexto 23 (23):259-269.
    This essay accounts for part of the moral, social and legal problems behind the attempts for justifying and implementing the so-called right to be forgotten in the Internet. Such right implies that –under certain circumstances–individuals are entitled to demand that search engines remove links containing their personal information. Our inquiry reflects on a ruling issued by the Court of Justice of the European Union and made public on May 13th 2014, as well as on the recommendations conveyed in Article 29 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. The Threat of Algocracy: Reality, Resistance and Accommodation.John Danaher - 2016 - Philosophy and Technology 29 (3):245-268.
    One of the most noticeable trends in recent years has been the increasing reliance of public decision-making processes on algorithms, i.e. computer-programmed step-by-step instructions for taking a given set of inputs and producing an output. The question raised by this article is whether the rise of such algorithmic governance creates problems for the moral or political legitimacy of our public decision-making processes. Ignoring common concerns with data protection and privacy, it is argued that algorithmic governance does pose a (...)
    Download  
     
    Export citation  
     
    Bookmark   51 citations  
  49. Key ethical challenges in the European Medical Information Framework.Luciano Floridi, Christoph Luetge, Ugo Pagallo, Burkhard Schafer, Peggy Valcke, Effy Vayena, Janet Addison, Nigel Hughes, Nathan Lea, Caroline Sage, Bart Vannieuwenhuyse & Dipak Kalra - 2019 - Minds and Machines 29 (3):355-371.
    The European Medical Information Framework project, funded through the IMI programme, has designed and implemented a federated platform to connect health data from a variety of sources across Europe, to facilitate large scale clinical and life sciences research. It enables approved users to analyse securely multiple, diverse, data via a single portal, thereby mediating research opportunities across a large quantity of research data. EMIF developed a code of practice to ensure the privacy protection of data (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  50. What We Informationally Owe Each Other.Alan Rubel, Clinton Castro & Adam Pham - forthcoming - In Algorithms & Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press: Cambridge University Press. pp. 21-42.
    ABSTRACT: One important criticism of algorithmic systems is that they lack transparency. Such systems can be opaque because they are complex, protected by patent or trade secret, or deliberately obscure. In the EU, there is a debate about whether the General Data Protection Regulation (GDPR) contains a “right to explanation,” and if so what such a right entails. Our task in this chapter is to address this informational component of algorithmic systems. We argue that information access is integral (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999