Results for 'data-security'

1000+ found
Order:
  1.  11
    The (Big) Data-security assemblage: Knowledge and critique.Tobias Blanke & Claudia Aradau - 2015 - Big Data and Society 2 (2).
    The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security practices are deployed in a digital age and with what political effects. While critical scholars have drawn attention to the social, political and legal challenges to these practices, the debates in computer and information science have received less analytical attention. This paper proposes to take seriously the critical knowledge developed in information and computer science and reinterpret their debates to develop a critical intervention (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  2.  24
    Ethical concerns around privacy and data security in AI health monitoring for Parkinson’s disease: insights from patients, family members, and healthcare professionals.Itai Bavli, Anita Ho, Ravneet Mahal & Martin J. McKeown - forthcoming - AI and Society:1-11.
    Artificial intelligence (AI) technologies in medicine are gradually changing biomedical research and patient care. High expectations and promises from novel AI applications aiming to positively impact society raise new ethical considerations for patients and caregivers who use these technologies. Based on a qualitative content analysis of semi-structured interviews and focus groups with healthcare professionals (HCPs), patients, and family members of patients with Parkinson’s Disease (PD), the present study investigates participant views on the comparative benefits and problems of using human versus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  15
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  72
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  37
    Security Assessment of Teachers' Right to Healthy and Safe Working Environment: Data from a Mass Written Survey (article in Lithuanian).Gediminas Merkys, Algimantas Urmonas & Daiva Bubelienė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):575-594.
    This paper presents the results of an empirical study that reflects monitoring and evaluation of the implementation of some legal acts on the labour of the Republic of Lithuania. The analysis of legal documents at the national and international level is provided. A review of cognate studies conducted by foreign and Lithuanian researchers is presented and the professional situation of a Lithuanian teacher from the employee rights perspective is highlighted. The professional activities contexts and sectors, wherein systematic violations of teachers’ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  18
    Use of Official Data of State Institutions in the Scientific Research of the Population Security.Vidmantas Egidijus Kurapka & Viktoras Justickis - 2010 - Jurisprudencija: Mokslo darbu žurnalas 121 (3):283-294.
    The paper discusses the problems in the detection of security information in legal and other administrative data. The authors analyse the prospects of the use of datamining in the solution of two key problems: abundance and indirectness of these data. Security research uses two kinds of data. The first one is scientific data, designed and gathered specially for the verification of certain security theories. They are the data of criminological, sociological, psychological surveys, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  27
    Politics of prediction: Security and the time/space of governmentality in the age of big data.Tobias Blanke & Claudia Aradau - 2017 - European Journal of Social Theory 20 (3):373-391.
    From ‘connecting the dots’ and finding ‘the needle in the haystack’ to predictive policing and data mining for counterinsurgency, security professionals have increasingly adopted the language and methods of computing for the purposes of prediction. Digital devices and big data appear to offer answers to a wide array of problems of (in)security by promising insights into unknown futures. This article investigates the transformation of prediction today by placing it within governmental apparatuses of discipline, biopower and big (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  8.  9
    Security and Sharing of NIPT Data Are the Basis of Ethical Decision-Making Related to Non-Medical Traits.Wenke Yang, Zhenglong Guo, Weili Shi, Litao Qin, Xiaoliang Xia, Bingtao Hao & Shixiu Liao - 2023 - American Journal of Bioethics 23 (3):29-31.
    Bowman-Smart et al. (2023) outlined the scenario that with the content expansion of noninvasive prenatal testing (NIPT) in the future, its application is not limited to the screening for aneuploidi...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  20
    Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules.Zhi Li, Xuyu Li, Runhua Tang & Lin Zhang - 2021 - Frontiers in Psychology 11.
    This study explored the global cyberspace security issues, with the purpose of breaking the stereotype of people’s cognition of cyberspace problems, which reflects the relationship between interdependence and association. Based on the Apriori algorithm in association rules, a total of 181 strong rules were mined from 40 target websites and 56,096 web pages were associated with global cyberspace security. Moreover, this study analyzed support, confidence, promotion, leverage, and reliability to achieve comprehensive coverage of data. A total of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  7
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  7
    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication.Banghua Wu, Shah Nazir & Neelam Mukhtar - 2020 - Complexity 2020:1-12.
    Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  7
    Cultivating famine: data, experimentation and food security, 1795–1848.John Lidwell-Durnin - 2020 - British Journal for the History of Science 53 (2):159-181.
    Collecting seeds and specimens was an integral aspect of botany and natural history in the eighteenth century. Historians have until recently paid less attention to the importance of collecting, trading and compiling knowledge of their cultivation, but knowing how to grow and maintain plants free from disease was crucial to agricultural and botanical projects. This is particularly true in the case of food security. At the close of the eighteenth century, European diets (particularly among the poor) began shifting from (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  9
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  3
    Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining.Zhibin Yang, Gang Wang, Shuheng Xu, Yaodong Tao, Defeng Chen & Shuai Ren - 2022 - Journal of Intelligent Systems 31 (1):817-834.
    The power grid is an important connection between power sources and users, responsible for supplying and distributing electric energy to users. Modern power grids are widely distributed and large in scale, and their security faces new problems and challenges. Information entropy theory is an objective weighting method that compares the information order of each evaluation index to judge the weight value. With the wide application of entropy theory in various disciplines, the subject of introducing entropy into the power system (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  11
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  19
    The Problem of Proliferation: Guidelines for Improving the Security of Qualitative Data in a Digital Age.Judith Aldridge, Juanjo Medina & Robert Ralphs - 2010 - Research Ethics 6 (1):3-9.
    High profile breaches of data security in government and other organizations are becoming an increasing concern amongst members of the public. Academic researchers have rarely discussed data security issues as they affect research, and this is especially the case for qualitative social researchers, who are sometimes disinclined to technical solutions. This paper describes 14 guidelines developed to help qualitative researchers improve the security of their digitally-created and stored data. We developed these procedures after the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  3
    Construction of Social Security Fund Cloud Audit Platform Based on Fuzzy Data Mining Algorithm.Yangting Huai & Qianxiao Zhang - 2021 - Complexity 2021:1-11.
    Guided by the theories of system theory, synergetic theory, and other disciplines and based on fuzzy data mining algorithm, this article constructs a three-tier social security fund cloud audit platform. Firstly, the article systematically expounds the current situation of social security fund and social security fund audit, such as the technical basis of cloud computing and data mining. Combined with the actual work, the necessity and feasibility of building a cloud audit platform for social (...) funds are analyzed. This article focuses on the construction of the cloud audit platform for social security funds. The general idea of using fuzzy data mining algorithm to build the social security fund audit cloud platform is to compress the knowledge contained in a large number of data into the weights between nodes and optimize the weights through the learning of the neural network system. Through the optimization function, the information contained in the neural network is stored in a few weights as far as possible. The main information is further highlighted by network clipping and removing weights that have little impact on the output. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  6
    The Emergence of State Data Privacy and Security Laws Affects Employers.Joseph J. Lazzarotti - unknown - Emergence: Complexity and Organization 1:1-2008.
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  34
    Dynamics of Crimes against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
    The development of an information society and information technologies does not result in positive consequences only. Individuals with criminal intent also find their niche. Information security includes the creation of the input, processing and output processes of protection. The objective of information security is to protect the system of values, to protect and ensure accuracy and integrity and to minimize losses that may be incurred if the information is modified or destroyed. In the development of an information society, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  56
    The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework.Jozef Andraško, Matúš Mesarčík & Ondrej Hamuľák - forthcoming - AI and Society:1-14.
    The presented paper focuses on the analysis of strategic documents at the level of the European Union concerning the regulation of artificial intelligence as one of the so-called disruptive technologies. In the first part of the article, we outline the basic terminology. Subsequently, we focus on the summarizing and systemizing of the key documents adopted at the EU level in terms of artificial intelligence regulation. The focus of the paper is devoted to issues of personal data protection and cyber (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  5
    Is it becoming harder to secure reviewers for peer review? A test with data from five ecology journals.Timothy H. Vines, Alison Cobra, Jennifer L. Gow & Arianne Y. K. Albert - 2016 - Research Integrity and Peer Review 1 (1).
    BackgroundThere is concern in the academic publishing community that it is becoming more difficult to secure reviews for peer-reviewed manuscripts, but much of this concern stems from anecdotal and rhetorical evidence.MethodsWe examined the proportion of review requests that led to a completed review over a 6-year period (2009–2015) in a mid-tier biology journal (Molecular Ecology). We also re-analyzed previously published data from four other mid-tier ecology journals (Functional Ecology, Journal of Ecology, Journal of Animal Ecology, and Journal of Applied (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  18
    The Schengen Information System and Data Retention. On Surveillance, Security and Legitimacy in the European Union.Elisa Orrù - 2017 - In Elisa Orrù, Maria Grazia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking Surveillance and Control. Beyond the 'Security vs. Privacy' Debate. Baden-Baden: Nomos. pp. 115-136.
    As a technique of social control based on the collection of information, surveillance has been a central instrument of any administrative power since the modern era. Surveillance, however, can be carried out in different ways and these can provide important information on the basic features of a particular political system. Indeed, the introduction of surveillance measures has an impact on key relationships of a political system, such as liberty and security, autonomy and authority. When a political system is, like (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  17
    Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma.H. M. Verhelst, A. W. Stannat & G. Mecacci - 2020 - Science and Engineering Ethics 26 (6):2975-2984.
    Rapid advancements in machine learning techniques allow mass surveillance to be applied on larger scales and utilize more and more personal data. These developments demand reconsideration of the privacy-security dilemma, which describes the tradeoffs between national security interests and individual privacy concerns. By investigating mass surveillance techniques that use bulk data collection and machine learning algorithms, we show why these methods are unlikely to pinpoint terrorists in order to prevent attacks. The diverse characteristics of terrorist attacks—especially (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  5
    Ai Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws.Max Parasol - 2021 - Cambridge University Press.
    The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws affect innovation in artificial intelligence. The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017–2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the Cyber (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  5
    Generative AI Security: Theories and Practices.Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.) - 2024 - Springer Nature Switzerland.
    This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level (...), and the emerging fields of LLMOps and DevSecOps. It explores AI regulations around the globe, ethical considerations, the threat landscape, and privacy preservation. Further, it assesses the transformative potential of GenAI in reshaping the cybersecurity landscape, the ethical implications of using advanced models, and the innovative strategies required to secure GenAI applications. Lastly, the book presents an in-depth analysis of the security challenges and potential solutions specific to GenAI, and a forward-looking view of how it can redefine cybersecurity practices. By addressing these topics, it provides answers to questions on how to secure GenAI applications, as well as vital support with understanding and navigating the complex and ever-evolving regulatory environments, and how to build a resilient GenAI security program. The book offers actionable insights and hands-on resources for anyone engaged in the rapidly evolving world of GenAI and cybersecurity. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  6
    Reforming European Data Protection Law.Paul de Hert, Serge Gutwirth & Ronald Leenes (eds.) - 2015 - Dordrecht: Imprint: Springer.
    This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  28.  7
    GenAI Model Security.Ken Huang, Ben Goertzel, Daniel Wu & Anita Xie - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 163-198.
    Safeguarding GenAI models against threats and aligning them with security requirements is imperative yet challenging. This chapter provides an overview of the security landscape for generative models. It begins by elucidating common vulnerabilities and attack vectors, including adversarial attacks, model inversion, backdoors, data extraction, and algorithmic bias. The practical implications of these threats are discussed, spanning domains like finance, healthcare, and content creation. The narrative then shifts to exploring mitigation strategies and innovative security paradigms. Differential privacy, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  70
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
    I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  31.  14
    Significant Differences in Personality Styles of Securely and Insecurely Attached Psychotherapists: Data, Reflections and Implications.Burkhard Peter & Eva Böbel - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  28
    A security framework for dynamic collaborative working environments.Matthias Assel, Stefan Wesner & Alexander Kipp - 2009 - Identity in the Information Society 2 (2):171-187.
    Moving away from simple data sharing within the science community towards cross-organizational collaboration scenarios significantly increased challenges related to security and privacy. They need to be addressed in order to make cross-organizational applications such as collaborative working environments a business proposition within communities such as eHealth, construction or manufacturing. Increasingly distributed scenarios where many different types of services need to be combined in order to implement semantically enriched business processes demand new approaches to security within such dynamic (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  33.  10
    Secure Attachment Representation in Adolescence Buffers Heart-Rate Reactivity in Response to Attachment-Related Stressors.Manuela Gander, Alexander Karabatsiakis, Katharina Nuderscher, Dorothee Bernheim, Cornelia Doyen-Waldecker & Anna Buchheim - 2022 - Frontiers in Human Neuroscience 16.
    To date, we know very little about the effects of the differences in attachment classifications on the physiological correlates of stress regulation in adolescent age groups. The present study examined for the first time heart rate and heart rate variability during an attachment interview in adolescents. HR and HRV data were collected during a baseline assessment as well as during the administration of the Adult Attachment Projective Picture System in a community-based sample of 56 adolescents. We additionally used the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made such surveillance (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  35.  4
    Job Security and Organizational Citizenship Behaviors in Chinese Hybrid Employment Context: Organizational Identification Versus Psychological Contract Breach Perspective Differences Across Employment Status.Wenzhu Lu, Xiaolang Liu, Shanshi Liu & Chuanyan Qin - 2021 - Frontiers in Psychology 12.
    The goal of the present research was to identify the mechanism through which job security exerts its different effects on organizational citizenship behaviors among contract and permanent employees from social identity and social exchange perspectives. Our research suggests two distinct, yet related explanatory mechanisms: organizational identification and psychological contract breach, to extend the job security literature by examining whether psychological contract breach and organization identity complement each other and explaining the mechanism of different behaviors response to job (...) across employment status. Data were collected from 211 Chinese employees and 61 supervisory ratings of OCBs. Our results showed that relative to psychological contract breach, organizational identification plays a stronger mediating role in the association between job security and OCBs. Evidence from multi-group analyses also suggested employment status moderated the mediation mechanism of organizational identification between job security and OCB. Implications for job security and hybrid employment management are discussed. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  5
    Balancing security and care: Gender relations of nursing staff in forensic psychiatric care.Esa Kumpula, Per Ekstrand & Lena-Karin Gustafsson - 2022 - Nursing Inquiry 29 (4):e12478.
    This study departs from the built-in tension of the dual goals of forensic psychiatric care in Sweden, which are to protect society as well as to care for patients. The majority of violence that takes place is perpetrated by men. Therefore, the views of nursing staff on violence as a gendered phenomenon have an impact on the care provision. There is a need for further knowledge of how norms of violence are intertwined with the construction of gender. The aim of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  14
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  13
    Genomic Data as a National Strategic Resource: Implications for the Genomic Commons and International Data Sharing for Biomedical Research and Innovation.Kyle McKibbin & Mahsa Shabani - 2023 - Journal of Law, Medicine and Ethics 51 (2):301-313.
    This article provides a critical review of new policies in China, the United States, and the European Union that characterize genomic data as a national strategic resource. Specifically, we review policies that regulate human genomic data for economic, national security, or other strategic purposes rather than ethical or individual rights purposes.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  6
    Big Data and the danger of being precisely inaccurate.H. Richard McFarland & Daniel A. McFarland - 2015 - Big Data and Society 2 (2).
    Social scientists and data analysts are increasingly making use of Big Data in their analyses. These data sets are often “found data” arising from purely observational sources rather than data derived under strict rules of a statistically designed experiment. However, since these large data sets easily meet the sample size requirements of most statistical procedures, they give analysts a false sense of security as they proceed to focus on employing traditional statistical methods. We (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  39
    Human Security and Citizenship in Finnish Religious Education: Rethinking Security Within the Human Rights Horizon.Gabriel O. Adebayo & Jan-Erik Mansikka - 2018 - Human Rights Review 19 (4):447-469.
    This paper discusses citizenship in Finnish religious education in relation to human security. It traces the characteristics of human security that connect citizenship, religion, and education in Finnish policy documents. The article focuses on basic education. Its data were analyzed employing qualitative content analysis. The findings indicate that citizenship in Finnish RE entails personal security concerns dealing with psychological and human rights issues. These are found to be essentially human security as conceptualized by the United (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  11
    Security Glitches: The Failure of the Universal Camouflage Pattern and the Fantasy of “Identity Intelligence”.Rebecca A. Adelman - 2018 - Science, Technology, and Human Values 43 (3):431-463.
    Focusing on the paradoxes revealed in the multibillion dollar mistake of the Universal Camouflage Pattern and the expansive ambit of a leaked National Security Agency briefing on its approach to “identity intelligence,” this article analyzes security glitches arising from the state’s application of mechanized logics to security and visibility. Presuming that a digital-looking pattern would be more deceptive than designs inspired by natural forms, in 2004, the US Army adopted a pixelated “digital” camouflage pattern, a print that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  30
    Genomic Data-Sharing Practices.Angela G. Villanueva, Robert Cook-Deegan, Jill O. Robinson, Amy L. McGuire & Mary A. Majumder - 2019 - Journal of Law, Medicine and Ethics 47 (1):31-40.
    Making data broadly accessible is essential to creating a medical information commons. Transparency about data-sharing practices can cultivate trust among prospective and existing MIC participants. We present an analysis of 34 initiatives sharing DNA-derived data based on public information. We describe data-sharing practices captured, including practices related to consent, privacy and security, data access, oversight, and participant engagement. Our results reveal that data-sharing initiatives have some distance to go in achieving transparency.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  44. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  25
    Unlocking data: Where is the key?María C. Sánchez & Antonio Sarría‐Santamera - 2019 - Bioethics 33 (3):367-376.
    Health‐related data uses and data sharing have been in the spotlight for a while. Since the beginning of the big data era, massive data mining and its inherent possibilities have only increased the debate about what the limits are. Data governance is a relevant aspect addressed in ethics guidelines. In this context, the European project BRIDGE Health (BRidging Information and Data Generation for Evidence‐based Health policy and research) strove to achieve a comprehensive, integrated and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  85
    Online Security and the Protection of Civil Rights: A Legal Overview. [REVIEW]Ugo Pagallo - 2013 - Philosophy and Technology 26 (4):381-395.
    The paper examines the connection between online security and the protection of civil rights from a legal viewpoint, that is, considering the different types of rights and interests that are at stake in national and international law and whether, and to what extent, they concern matters of balancing. Over the past years, the purpose of several laws, and legislative drafts such as ACTA, has been to impose “zero-sum games”. In light of current statutes, such as HADOPI in France, or (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  47.  47
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48. Reframing data ethics in research methods education: a pathway to critical data literacy.Javiera Atenas, Leo Havemann & Cristian Timmermann - 2023 - International Journal of Educational Technology in Higher Education 20:11.
    This paper presents an ethical framework designed to support the development of critical data literacy for research methods courses and data training programmes in higher education. The framework we present draws upon our reviews of literature, course syllabi and existing frameworks on data ethics. For this research we reviewed 250 research methods syllabi from across the disciplines, as well as 80 syllabi from data science programmes to understand how or if data ethics was taught. We (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  5
    Data leaking scandal, risks, and financial consumption behaviors in online tourism platforms: The role of trust on college students and teachers.Mingfen Feng, Bin Hu, Yaqi Tian & Huabing Wang - 2022 - Frontiers in Psychology 13.
    Given the importance of data safety for psychology, the present study investigated the influence of data leaking scandal on campus customers’ financial consumption behaviors at intelligent tourism platforms in China, and explored the roles that individual characteristics play in this process by focusing on a set of participants from colleges. Data were collected through sending out an online questionnaire, where respondents were asked to finish a series of questions about their background information, their trust, future consuming intention, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  36
    Social Security Satisfaction and People’s Subjective Wellbeing in China: The Serial Mediation Effect of Social Fairness and Social Trust.Na Li & Mang He - 2022 - Frontiers in Psychology 13.
    ObjectiveTo test the relationship between social security satisfaction, social fairness, social trust, and people’s subjective wellbeing in China and the serial mediation effect in this study.MethodsWe utilized the data from Chinese Social Survey in 2017 and 2019, involving 31 provinces across the country. There were 5,398 samples in 2017CSS and 2,580 samples in 2019CSS selected by the research objectives. There were 4,269 women and 3,709 men with the average age of participants being 43.ResultsThe results showed that the actual (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000