Results for 'Copyright and electronic data processing. '

993 found
Order:
  1.  4
    Content: selected essays on technology, creativity, copyright, and the future of the future.Cory Doctorow - 2008 - San Francisco: Tachyon Publications.
    A collection of previously published articles and essays.
    Direct download  
     
    Export citation  
     
    Bookmark  
  2. Electronic-data-processing and lexicography-the newest brainstorm for the application of edp is anticipated for historical-philosophical work and texts.N. Hinske - 1981 - Philosophisches Jahrbuch 88 (1):153-159.
    No categories
     
    Export citation  
     
    Bookmark  
  3.  6
    The Two-Tiered Ethics of Electronic Data Processing.Edmund Byrne - 1996 - Society for Philosophy and Technology Quarterly Electronic Journal 2 (1):18-27.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  37
    Dynamics of Crimes against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
    The development of an information society and information technologies does not result in positive consequences only. Individuals with criminal intent also find their niche. Information security includes the creation of the input, processing and output processes of protection. The objective of information security is to protect the system of values, to protect and ensure accuracy and integrity and to minimize losses that may be incurred if the information is modified or destroyed. In the development of an information society, the new (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  37
    Consumer protection and electronic commerce in the Sultanate of Oman.Rakesh Belwal, Rahima Al Shibli & Shweta Belwal - 2021 - Journal of Information, Communication and Ethics in Society 19 (1):38-60.
    PurposeWithin a larger mandate of reviewing the key global trends concerning consumer protection in the electronic commerce (e-commerce) literature, this study aims to study the legal framework concerning e-commerce and consumer protection in the Sultanate of Oman and to analyse the current regulations concerning e-commerce and consumer protection.Design/methodology/approachThis study followed the normative legal research approach and resorted to the desk research process to facilitate content analysis of literature containing consumer protection legislation and regulatory provisions in Oman in particular and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  19
    Hypocrisy Around Medical Patient Data: Issues of Access for Biomedical Research, Data Quality, Usefulness for the Purpose and Omics Data as Game Changer.Erwin Tantoso, Wing-Cheong Wong, Wei Hong Tay, Joanne Lee, Swati Sinha, Birgit Eisenhaber & Frank Eisenhaber - 2019 - Asian Bioethics Review 11 (2):189-207.
    Whether due to simplicity or hypocrisy, the question of access to patient data for biomedical research is widely seen in the public discourse only from the angle of patient privacy. At the same time, the desire to live and to live without disability is of much higher value to the patients. This goal can only be achieved by extracting research insight from patient data in addition to working on model organisms, something that is well understood by many patients. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  9
    Privacy, due process and the computational turn.Mireille Hildebrandt & Katja de Vries (eds.) - 2013 - Abingdon, Oxon, [England] ; New York: Routledge.
    Privacy, Due process and the Computational Turn: The Philosophy of Law Meets the Philosophy of Technology engages with the rapidly developing computational aspects of our world including data mining, behavioural advertising, iGovernment, profiling for intelligence, customer relationship management, smart search engines, personalized news feeds, and so on in order to consider their implications for the assumptions on which our legal framework has been built. The contributions to this volume focus on the issue of privacy, which is often equated with (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  8. Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets.
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  35
    Kenyan health stakeholder views on individual consent, general notification and governance processes for the re-use of hospital inpatient data to support learning on healthcare systems.Daniel Mbuthia, Sassy Molyneux, Maureen Njue, Salim Mwalukore & Vicki Marsh - 2019 - BMC Medical Ethics 20 (1):3.
    Increasing adoption of electronic health records in hospitals provides new opportunities for patient data to support public health advances. Such learning healthcare models have generated ethical debate in high-income countries, including on the role of patient and public consent and engagement. Increasing use of electronic health records in low-middle income countries offers important potential to fast-track healthcare improvements in these settings, where a disproportionate burden of global morbidity occurs. Core ethical issues have been raised around the role (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  10. Electronic-data-processing experiences in editing.H. Schepers - 1981 - Philosophisches Jahrbuch 88 (1):159-164.
    No categories
     
    Export citation  
     
    Bookmark  
  11.  12
    Electronic Cigarette Vaping Did Not Enhance the Neural Process of Working Memory for Regular Cigarette Smokers.Dong-Youl Kim, Yujin Jang, Da-Woon Heo, Sungman Jo, Hyun-Chul Kim & Jong-Hwan Lee - 2022 - Frontiers in Human Neuroscience 16.
    BackgroundElectronic cigarettes as substitute devices for regular tobacco cigarettes have been increasing in recent times. We investigated neuronal substrates of vaping e-cigs and smoking r-cigs from r-cig smokers.MethodsTwenty-two r-cig smokers made two visits following overnight smoking cessation. Functional magnetic resonance imaging data were acquired while participants watched smoking images. Participants were then allowed to smoke either an e-cig or r-cig until satiated and fMRI data were acquired. Their craving levels and performance on the Montreal Imaging Stress Task and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  15
    Should free-text data in electronic medical records be shared for research? A citizens’ jury study in the UK.Elizabeth Ford, Malcolm Oswald, Lamiece Hassan, Kyle Bozentko, Goran Nenadic & Jackie Cassell - 2020 - Journal of Medical Ethics 46 (6):367-377.
    BackgroundUse of routinely collected patient data for research and service planning is an explicit policy of the UK National Health Service and UK government. Much clinical information is recorded in free-text letters, reports and notes. These text data are generally lost to research, due to the increased privacy risk compared with structured data. We conducted a citizens’ jury which asked members of the public whether their medical free-text data should be shared for research for public benefit, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  27
    The electronic Cumulative Illness Rating Scale: a reliable and valid tool to assess multi‐morbidity in primary care.Martin Fortin, Karin Steenbakkers, Catherine Hudon, Marie-Eve Poitras, José Almirall & Marjan van den Akker - 2011 - Journal of Evaluation in Clinical Practice 17 (6):1089-1093.
  14.  9
    Bio-electronic aggregates on Neon-Paleolitikos strata.André Sier - 2019 - Technoetic Arts 17 (3):215-228.
    Electronic machinic phenomena yield fascinating links with biological processes. Either in the macro-micro-structure of binary encoded information ‐ bytes on media ‐ to the processual flow programs execute on hardware while operating it. Observing micro-electronic worlds akin to living entities: electronic voltages running throughout electronic architectures pipelining data to memory registers; operating systems executing programs on electronic substrates; data flows taking place in machines and in communications protocols within networks. Static art-sci constructs explore (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  83
    On Systems Thinking and the Systems Approach.Asterios G. “Stell” Kefalas - 2011 - World Futures 67 (4-5):343 - 371.
    Despite the frequent use of the term systems by academicians and management practitioners, there is little agreement as to what the term really means. Experts in different fields talk about accounting systems, production systems, electronic data processing systems, market systems, financial systems, reward and motivation systems, and so on, but the student of management is confused by the nebulous and, at times, seemingly contradictory terms. This article uses the term Systems Approach as a convenient handle to pull together (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  9
    Democracy and the Environment on the Internet: Electronic Citizen Participation in Regulatory Rulemaking.David Schlosberg, Stuart Shulman & Stephen Zavestoski - 2006 - Science, Technology, and Human Values 31 (4):383-408.
    We hypothesize that recent uses of the Internet as a public-participation mechanism in the United States fail to overcome the adversarial culture that characterizes the American regulatory process. Although the Internet has the potential to facilitate deliberative processes that could result in more widespread public involvement, greater transparency in government processes, and a more satisfied citizenry, we argue that efforts to implement Internet-based public participation have overlaid existing problematic government processes without fully harnessing the transformative power of information technologies. Public (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  17. Ethics of Big Data.Kord Davis - 2012 - O'reilly. Edited by Doug Patterson.
    Big data, big impact -- Values and actions -- Current practices -- Aligning values and actions.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  18. Personal privacy and electronic data transfers.David Perry - manuscript
    From a speech given at a conference sponsored by the Electronic Funds Transfer Association (EFTA) on "The Puzzle of Data Security and Consumer Privacy," Washington, DC, 16 November 1992. At that time, Dr. Perry was a Consultant in Advisory Services for the Ethics Resource Center.
     
    Export citation  
     
    Bookmark  
  19. Technology and Privacy.Edmund Byrne - 1991 - In Byrne Edmund (ed.), The Technology of Discovery and the Discovery of Technology. Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential treatment (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  6
    Grammar, Meaning and the Machine Analysis of Language.Yorick Wilks - 1972 - Routledge & Kegan Paul Books.
  21.  11
    Stochastic Parameter Identification Method for Driving Trajectory Simulation Processes Based on Mobile Edge Computing and Self-Organizing Feature Mapping.Jingfeng Yang, Zhiyong Luo, Nanfeng Zhang, Jinchao Xiao, Honggang Wang, Shengpei Zhou, Xiaosong Liu & Ming Li - 2021 - Complexity 2021:1-8.
    With the rapid development of sensor technology for automated driving applications, the fusion, analysis, and application of multimodal data have become the main focus of different scenarios, especially in the development of mobile edge computing technology that provides more efficient algorithms for realizing the various application scenarios. In the present paper, the vehicle status and operation data were acquired by vehicle-borne and roadside units of electronic registration identification of motor vehicles. In addition, a motion model and an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  15
    D-waste: Data disposal as challenge for waste management in the Internet of Things.Burkhard Schafer - 2014 - International Review of Information Ethics 22:101-107.
    Proliferation of data processing and data storage devices in the Internet of Things poses significant privacy risks. At the same time, faster and faster use-cycles and obsolescence of devices with electronic components causes environmental problems. Some of the solutions to the environmental challenges of e-waste include mandatory recycling schemes as well as informal second hand markets. However, the data security and privacy implications of these green policies are as yet badly understood. This paper argues that based (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  71
    Computers, postmodernism and the culture of the artificial.Colin Beardon - 1994 - AI and Society 8 (1):1-16.
    The term ‘the artificial’ can only be given a precise meaning in the context of the evolution of computational technology and this in turn can only be fully understood within a cultural setting that includes an epistemological perspective. The argument is illustrated in two case studies from the history of computational machinery: the first calculating machines and the first programmable computers. In the early years of electronic computers, the dominant form of computing was data processing which was a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  4
    Familial hegemony:: Gender and production politics on Hong Kong's electronics shopfloor.Ching Kwan Lee - 1993 - Gender and Society 7 (4):529-547.
    Drawing on Burawoy's framework of “factory regimes” and concepts of power and practice from Foucault and de Certeau, this article depicts a production regime of “familial hegemony” found in a Hong Kong electronics factory. It suggests that the social construction of gender has to be inserted into a theory of production politics if the specific forms and processes of this hegemonic regime are to be explained. In this particular case, ethnographic data capture how an everyday culture of familialism, built (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  4
    Understanding the care.data conundrum: New information flows for economic growth.Stephen Timmons & Paraskevas Vezyridis - 2017 - Big Data and Society 4 (1).
    The analysis of data from electronic health records aspires to facilitate healthcare efficiencies and biomedical innovation. There are also ethical, legal and social implications from the handling of sensitive patient information. The paper explores the concerns, expectations and implications of the National Health Service England care.data programme: a national data sharing initiative of linked electronic health records for healthcare and other research purposes. Using Nissenbaum’s contextual integrity of privacy framework through a critical Science and Technology (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  26.  12
    Electronic informed consent criteria for research ethics review: a scoping review.Mohd Yusmiaidil Putera Mohd Yusof, Chin Hai Teo & Chirk Jenn Ng - 2022 - BMC Medical Ethics 23 (1):1-11.
    BackgroundThe research shows a growing trend in using an electronic platform to supplement or replace traditional paper-based informed consent processes. Instead of the traditionally written informed consent document, electronic informed consent may be used to assess the research subject’s comprehension of the information presented. By doing so, respect for persons as one of the research ethical principles can be upheld. Furthermore, these electronic methods may reduce potential airborne infection exposures, particularly during the pandemic, thereby adhering to the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  27.  41
    An investigation of ethical perceptions of public sector Mis professionals.Ken Udas, William L. Fuerst & David B. Paradice - 1996 - Journal of Business Ethics 15 (7):721 - 734.
    Management information system (MIS) professionals have a central role in technology development, determining how technology is used in organizations, and the effects it has on clients and society. MIS stakeholders have expressed concern regarding MIS professional's role in computer crime, and security of electronically stored information. It is recognized that MIS professionals must make decisions based on their professional ethics. The Association for Computing Machinery (ACM) and the Data Processing Management Association (DPMA) have developed codes of ethics to help (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  28. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This process will be done with (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29. The Role of Administrative Procedures and Regulations in Enhancing the Performance of The Educational Institutions - The Islamic University in Gaza is A Model.Ashraf A. M. Salama, Youssef M. Abu Amuna, Mazen J. Al Shobaki & Samy S. Abu-Naser - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (2):14-27.
    The study aimed to identify the role of administrative procedures and systems in enhancing the performance of the educational institutions in the Islamic University in Gaza. To achieve the research objectives, the researchers used the analytical descriptive approach to collect information. The researchers used the questionnaire distributed to three categories of employees at the Islamic University (senior management, faculty members, their assistants and members of the administrative board). A random sample of 314 employees was selected and 276 questionnaires were retrieved (...)
    Direct download  
     
    Export citation  
     
    Bookmark   48 citations  
  30.  3
    La machine univers: création, cognition et culture informatique.Pierre Lévy - 1987 - Editions La Découverte.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  3
    Electronic Data Bases and Privacy: Policy for the 1990s.Susan H. Gray - 1989 - Science, Technology and Human Values 14 (3):242-257.
    This article reviews the debate over electronic data bases and privacy, with an emphasis on the United States since the Privacy Act of 1974. Proposals that have value for the 1990s, both nationally and internationally, are synthesized. Some current controversies are discussed, including some of the reasons for the failure of previous privacy legislation. The way social values affect both statistical and intelligence systems is reviewed, and the debate over organizational necessity and computerization is examined. Some controversial systems (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  24
    Towards responsible, lawful and ethical data processing: Patient data in the UK.Tess Johnson, Konrad Kollnig & Pierre Dewitte - 2022 - Internet Policy Review 1 (11).
    In May 2021, the UK National Health Service (NHS) proposed a scheme—called General Practice Data for Planning Research (GPDPR)—for sharing patients’ data. Under that system, a patient who does not wish to participate must actively opt out of their data being shared with third parties for research and other purposes. In this paper, we analyse the lessons that can be learned for the responsible and ethical governance of health data from the NHS’ new scheme. More specifically, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. Turning queries into questions: For a plurality of perspectives in the age of AI and other frameworks with limited (mind)sets.Claudia Westermann & Tanu Gupta - 2023 - Technoetic Arts 21 (1):3-13.
    The editorial introduces issue 21.1 of Technoetic Arts via a critical reflection on the artificial intelligence hype (AI hype) that emerged in 2022. Tracing the history of the critique of Large Language Models, the editorial underscores that there are substantial ethical challenges related to bias in the training data, copyright issues, as well as ecological challenges which the technology industry has consistently downplayed over the years. -/- The editorial highlights the distinction between the current AI technology’s reliance on (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  24
    Full Disclosure of the ‘Raw Data’ of Research on Humans: Citizens’ Rights, Product Manufacturers’ Obligations and the Quality of the Scientific Database.Dennis J. Mazur - 2011 - Philosophy Compass 6 (2):90-99.
    This guide accompanies the following article(s): ‘Full Disclosure of the “Raw Data” of Research on Humans: Citizens’ Rights, Product Manufacturer’s Obligations and the Quality of the Scientific Database.’Philosophy Compass 6/2 (2011): 90–99. doi: 10.1111/j.1747‐9991.2010.00376.x Author’s Introduction Securing consent (and informed consent) from patients and research study participants is a key concern in patient care and research on humans. Yet, the legal doctrines of consent and informed consent differ in their applications. In patient care, the judicial doctrines of consent and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  25
    Teaching & Learning Guide for: Full Disclosure of the ‘Raw Data’ of Research on Humans: Citizens’ Rights, Product Manufacturers’ Obligations and the Quality of the Scientific Database.Dennis J. Mazur - 2011 - Philosophy Compass 6 (2):152-157.
    This guide accompanies the following article(s): ‘Full Disclosure of the “Raw Data” of Research on Humans: Citizens’ Rights, Product Manufacturer’s Obligations and the Quality of the Scientific Database.’Philosophy Compass 6/2 (2011): 90–99. doi: 10.1111/j.1747‐9991.2010.00376.x Author’s Introduction Securing consent (and informed consent) from patients and research study participants is a key concern in patient care and research on humans. Yet, the legal doctrines of consent and informed consent differ in their applications. In patient care, the judicial doctrines of consent and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36. How Bioethics Principles Can Aid Design of Electronic Health Records to Accommodate Patient Granular Control.Eric M. Meslin & Peter H. Schwartz - 2014 - Journal of General Internal Medicine 30 (1):3-6.
    Ethics should guide the design of electronic health records (EHR), and recognized principles of bioethics can play an important role. This approach was adopted recently by a team of informaticists designing and testing a system where patients exert granular control over who views their personal health information. While this method of building ethics in from the start of the design process has significant benefits, questions remain about how useful the application of bioethics principles can be in this process, especially (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  37. Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  38.  33
    Trust and privacy in the future internet—a research perspective.Dirk Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  5
    Design of metaheuristic rough set-based feature selection and rule-based medical data classification model on MapReduce framework.Sadanandam Manchala & Hanumanthu Bhukya - 2022 - Journal of Intelligent Systems 31 (1):1002-1013.
    Recently, big data analytics have gained significant attention in healthcare industry due to generation of massive quantities of data in various forms such as electronic health records, sensors, medical imaging, and pharmaceutical details. However, the data gathered from various sources are intrinsically uncertain owing to noise, incompleteness, and inconsistency. The analysis of such huge data necessitates advanced analytical techniques using machine learning and computational intelligence for effective decision making. To handle data uncertainty in healthcare (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40. OntONeo: The Obstetric and Neonatal Ontology.Fernanda Farinelli, Mauricio Almeida, Peter Elkin & Barry Smith - 2016 - In Farinelli Fernanda, Almeida Mauricio, Elkin Peter & Barry Smith (eds.), Dealing with elements of medical encounters: An approach based on ontological realism. CEUR, vol. 1747.
    This paper presents the Obstetric and Neonatal Ontology (OntONeo). This ontology has been created to provide a consensus representation of salient electronic health record (EHR) data and to serve interoperability of the associated data and information systems. More generally, it will serve interoperability of clinical and translational data, for example deriving from genomics disciplines and from clinical trials. Interoperability of EHR data is important to ensuring continuity of care during the prenatal and postnatal periods for (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  96
    Biology, Power and Responsibility.Joël de Rosnay & Johanna Pick Margulies - 1980 - Diogenes 28 (109):77-91.
    Science is at present passing through a credibility crisis*. One could almost say a moral crisis. As a matter of fact we are standing at a turning point in the relationship between science and society, a turning point marked by the change from a social evolution characterized by high productivity and growth, into an evolution which might lead humanity to a new balance between individuality and collectivity.At the beginning of the 20th century and during its second half the scientific world (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  9
    Genes go digital: Mendelian Inheritance in Man and the genealogy of electronic publishing in biomedicine.Michael F. McGovern - forthcoming - British Journal for the History of Science:1-19.
    Mendelian Inheritance in Man, a computerized catalogue of human genetic disorders authored and maintained by cardiologist and medical genetics pioneer Victor A. McKusick, played a major part in demarcating between a novel biomedical science and the eugenic projects of racial betterment which existed prior to its emergence. Nonetheless, it built upon prior efforts to systematize genetic knowledge tied to individuals and institutions invested in eugenics. By unpacking the process of digitizing a homespun cataloguing project and charting its development into an (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  7
    Regulatory, scientific, and ethical issues arising from institutional activity in one of the 90 Italian Research Ethics Committees.F. Drago & G. Benfatto - 2021 - BMC Medical Ethics 22 (1):1-9.
    BackgroundThis paper highlights the issues that one of the 90 Italian Research Ethics Committees (RECs) might encounter during the approval phase of a clinical trial to identify corrective and preventive actions for promoting a more efficient review process and ensuring review quality. Publications on the subject from Italy and the rest of Europe are limited; encouraging constructive debate can improve RECs’ service to the subject of the clinical trial.MethodsWe retrospectively reviewed a cohort of 822 clinical trial protocols, initially reviewed by (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  58
    A BERT-BiGRU-CRF Model for Entity Recognition of Chinese Electronic Medical Records.Qiuli Qin, Shuang Zhao & Chunmei Liu - 2021 - Complexity 2021:1-11.
    Because of difficulty processing the electronic medical record data of patients with cerebrovascular disease, there is little mature recognition technology capable of identifying the named entity of cerebrovascular disease. Excellent research results have been achieved in the field of named entity recognition, but there are several problems in the pre processing of Chinese named entities that have multiple meanings, of which neglecting the combination of contextual information is one. Therefore, to extract five categories of key entity information for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  55
    The introduction of online authentication as part of the new electronic national identity card in Germany.Torsten Noack & Herbert Kubicek - 2010 - Identity in the Information Society 3 (1):87-110.
    This chapter provides an analysis of the long process of introducing an electronic identity for online authentication in Germany. This process is described as a multi-facet innovation, involving actors from different policy fields shifting over time. The eID process started in the late ‘90s in the context of eGovernment and eCommerce with the legislation on e-signatures, which were supposed to allow for online authentication of citizens. When after 5 years it was recognized that this was not the case, a (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  46.  15
    Damage Detection of Refractory Based on Principle Component Analysis and Gaussian Mixture Model.Changming Liu, Zhigang di ZhouWang, Dan Yang & Gangbing Song - 2018 - Complexity 2018:1-9.
    Acoustic emission technique is a common approach to identify the damage of the refractories; however, there is a complex problem since there are as many as fifteen involved parameters, which calls for effective data processing and classification algorithms to reduce the level of complexity. In this paper, experiments involving three-point bending tests of refractories were conducted and AE signals were collected. A new data processing method of merging the similar parameters in the description of the damage and reducing (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  40
    Application of IT Examination in Investigation of Crimes on Safety of Electronic Data and Information Systems.Lina Novikoviene & Egle Bileviciute - 2010 - Jurisprudencija: Mokslo darbu žurnalas 119 (1):317-329.
    As an EU state, Lithuania has become an active member of the eEurope 2005 initiative, implementing the goals set forth in the strategic plan for the development of information society in Lithuania. Information technologies introduced into various areas of life open up new, more convenient opportunities to receive services and information. The modernization of state management becomes an integral factor for ensuring continuous social development. The objective of this paper is to study practical aspects of the application of specialized knowledge (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  27
    Jizya Tax Levied on Mawālī By Al-Ḥajjāj ibn Yūsuf’s Period in Umayyads and Its Background.Yunus Akyürek - 2019 - Cumhuriyet İlahiyat Dergisi 23 (1):331-351.
    The Umayyad State is widely criticized in the West as well as in its own region. Actually, this is normal situation. Because Hijaz Arabs who had no state experience, built a multinational state in short period of time. Yet, this caused serious matters. The fundamental point of the criticism is the payment of tax, also called jizya, which is taken from residents (mawālī) of Khorasan and Transoxania. However, in most studies on this subject, it is understood that the jizya taken (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  55
    Unlocking digital archives: cross-disciplinary perspectives on AI and born-digital data.Lise Jaillant & Annalina Caputo - 2022 - AI and Society 37 (3):823-835.
    Co-authored by a Computer Scientist and a Digital Humanist, this article examines the challenges faced by cultural heritage institutions in the digital age, which have led to the closure of the vast majority of born-digital archival collections. It focuses particularly on cultural organizations such as libraries, museums and archives, used by historians, literary scholars and other Humanities scholars. Most born-digital records held by cultural organizations are inaccessible due to privacy, copyright, commercial and technical issues. Even when born-digital data (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  5
    Computer applications for handling legal evidence, police investigation, and case argumentation.Ephraim Nissan - 2012 - New York: Springer.
    This book provides an overview of computer techniques and tools — especially from artificial intelligence (AI) — for handling legal evidence, police intelligence, crime analysis or detection, and forensic testing, with a sustained discussion of methods for the modelling of reasoning and forming an opinion about the evidence, methods for the modelling of argumentation, and computational approaches to dealing with legal, or any, narratives. By the 2000s, the modelling of reasoning on legal evidence has emerged as a significant area within (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 993