Results for 'Data Preservation'

1000+ found
Order:
  1.  4
    A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics.Gongzheng Liu, Jingsha He & Xinggang Xuan - 2021 - Complexity 2021:1-12.
    Since digital forensics becomes more and more popular, more and more attention has been paid to the originality and validity of data, and data preservation technology emerges as the times require. However, the current data preservation models and technologies are only the combination of cryptography technology, and there is a risk of being attacked and cracked. And in the process of data preservation, human participation is also needed, which may lead to data (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  6
    Is it Possible to Preserve a Language using only Data?Joshua Bensemann, Jason Brown, Michael Witbrock & Vithya Yogarajan - 2023 - Cognitive Science 47 (6):e13300.
    Many of our spoken languages are endangered and rapidly becoming extinct. Due to this, there are attempts to preserve as many of those languages as possible. One preservation approach is combining data collection and artificial intelligence‐based language models. However, current data collection methods may only capture static data from a dynamic cognitive process. If data are not genuinely capturing the dynamic process, it raises questions about whether they capture all the essential knowledge about how a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service.Huijuan Lian, Weidong Qiu, Zheng di YanHuang & Jie Guo - 2017 - Complexity:1-14.
    With the development of mobile communication technology, location-based services are booming prosperously. Meanwhile privacy protection has become the main obstacle for the further development of LBS. The k-nearest neighbor search is one of the most common types of LBS. In this paper, we propose an efficient private circular query protocol with high accuracy rate and low computation and communication cost. We adopt the Moore curve to convert two-dimensional spatial data into one-dimensional sequence and encrypt the points of interest information (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4. HIV-positive status and preservation of privacy: a recent decision from the Italian Data Protection Authority on the procedure of gathering personal patient data in the dental office.Adelaide Conti, Paola Delbon, Laura Laffranchi, Corrado Paganelli & Francesco De Ferrari - 2012 - Journal of Medical Ethics 38 (6):386-388.
    The processing of sensitive information in the health field is subject to rigorous standards that guarantee the protection of information confidentiality. Recently, the Italian Data Protection Authority (Garante per la Protezione dei Dati Personali) stated their formal opinion on a standard procedure in dental offices involving the submission of a questionnaire that includes the patient's health status. HIV infection status is included on the form. The Authority has stated that all health data collection must be in accordance with (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  5.  18
    Policymaking to preserve privacy in disclosure of public health data: a suggested framework.Mehrdad A. Mizani & Nazife Baykal - 2015 - Journal of Medical Ethics 41 (3):263-267.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  3
    The role of matrices in preserving non-genetic data.Sergei Proskurin - 2010 - Semiotica 2010 (182):397-408.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  11
    Data, Instruments, and Theory: A Dialectical Approach to Understanding Science.Robert John Ackermann - 1985 - Princeton University Press.
    Robert John Ackermann deals decisively with the problem of relativism that has plagued post-empiricist philosophy of science. Recognizing that theory and data are mediated by data domains (bordered data sets produced by scientific instruments), he argues that the use of instruments breaks the dependency of observation on theory and thus creates a reasoned basis for scientific objectivity. Originally published in 1985. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   53 citations  
  8.  2
    Data Safety Monitoring during Covid-19: Keep On Keeping On.Deborah Barnbaum - 2020 - Ethics and Human Research 42 (3):43-44.
    A discussion of lessons learned in the first months of the COVID-19 pandemic which allowed data safety monitoring boards (DSMBs) to continue their work protecting the interests of human research participants while preserving research studies.
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  29
    Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment.Yanwei Xu, Lianyong Qi, Wanchun Dou & Jiguo Yu - 2017 - Complexity:1-9.
    With the increasing volume of web services in the cloud environment, Collaborative Filtering- based service recommendation has become one of the most effective techniques to alleviate the heavy burden on the service selection decisions of a target user. However, the service recommendation bases, that is, historical service usage data, are often distributed in different cloud platforms. Two challenges are present in such a cross-cloud service recommendation scenario. First, a cloud platform is often not willing to share its data (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  10. Preserving Electronically Encoded Evidence.E. Davis Robert - 2009 - ISACA Journal 1:1-2.
    Seeking to preserve electronically encoded evidence implies that an incident or event has occurred requiring fact extrapolation for presentation, as proof of an irregularity or illegal act. Whether target data are in transit or at rest, it is critical that measures be in place to prevent the sought information from being destroyed, corrupted or becoming unavailable for forensic investigation.
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  17
    Agents preserving privacy on intelligent transportation systems according to EU law.Javier Carbo, Juanita Pedraza & Jose M. Molina - forthcoming - Artificial Intelligence and Law:1-34.
    Intelligent Transportation Systems are expected to automate how parking slots are booked by trucks. The intrinsic dynamic nature of this problem, the need of explanations and the inclusion of private data justify an agent-based solution. Agents solving this problem act with a Believe Desire Intentions reasoning, and are implemented with JASON. Privacy of trucks becomes protected sharing a list of parkings ordered by preference. Furthermore, the process of assigning parking slots takes into account legal requirements on breaks and driving (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  21
    Privacy preserving or trapping?Xiao-yu Sun & Bin Ye - forthcoming - AI and Society:1-11.
    The development and application of artificial intelligence (AI) technology has raised many concerns about privacy violations in the public. Thus, privacy-preserving computation technologies (PPCTs) have been developed, and it is expected that these new privacy protection technologies can solve the current privacy problems. By not directly using raw data provided by users, PPCTs claim to protect privacy in a better way than their predecessors. They still have technical limitations, and considerable research has treated PPCTs as a privacy-protecting tool and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  9
    Preserving the values of cultural negotiation through social learning: ‘Two Religion Community Life’ case study in Phattalung, Southeast Thailand.Sri Sumarni & Abdulaziz K. Kalupae - 2020 - HTS Theological Studies 76 (1):12.
    Prolonged conflict on the southern Thailand border still continues, especially in four provinces – Pattani, Yala, Narathivat, and Satun. These four provinces are the home base of the Malay-Muslim community. However, conflicts have almost never occurred in the province of Phattalung, particularly in the region called ‘Two Religion Community Life’. This is because people can find solutions to every problem using cultural negotiation. This research aims to describe the results of cultural negotiation and social learning between Muslims and Buddhists in (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  12
    Anonymity preserving sequential pattern mining.Anna Monreale, Dino Pedreschi, Ruggero G. Pensa & Fabio Pinelli - 2014 - Artificial Intelligence and Law 22 (2):141-173.
    The increasing availability of personal data of a sequential nature, such as time-stamped transaction or location data, enables increasingly sophisticated sequential pattern mining techniques. However, privacy is at risk if it is possible to reconstruct the identity of individuals from sequential data. Therefore, it is important to develop privacy-preserving techniques that support publishing of really anonymous data, without altering the analysis results significantly. In this paper we propose to apply the Privacy-by-design paradigm for designing a technological (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  81
    Privacy preserving electronic petitions.Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss & Girma Nigusse - 2008 - Identity in the Information Society 1 (1):203-219.
    We present the design of a secure and privacy preserving e-petition system that we have implemented as a proof-of-concept demonstrator. We use the Belgian e-ID card as source of authentication, and then proceed to issue an anonymous credential that is used to sign petitions. Our system ensures that duplicate signatures are detectable, while preserving the anonymity of petition signers. We analyze the privacy and security requirements of our application, present an overview of its architecture, and discuss the applicability of (...) protection legislation to our system. (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  16
    Preserving Integrity: experiences of people with mental health problems living in their own home in a new neighbourhood.Arild Granerud & Elisabeth Severinsson - 2003 - Nursing Ethics 10 (6):602-613.
    For patients with mental health problems, de-institutionalization has meant a shift from institutional care to living in the community. However, several studies show that problems of stigmatization, loneliness and negative attitudes devalue the dignity and autonomy of these patients. The aim of this study was to gain a deeper understanding of how people with mental health problems experience living in an apartment of their own. The data collection method was focus group interviews. The constant comparative method revealed the main (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  10
    Preserving client autonomy when guiding medicine taking in telehomecare: A conversation analytic case study.Sakari Ilomäki & Johanna Ruusuvuori - 2022 - Nursing Ethics 29 (3):719-732.
    Background: Enhancing client autonomy requires close coordination of interactional practices between nurse and client, which can cause challenges when interaction takes place in video-mediated settings. While video-mediated services have become more common, it remains unclear how they shape client autonomy in telehomecare. Research aim: To analyse how video mediation shapes client autonomy when nurses guide medicine taking remotely through video-mediated home care. Research design: This is a conversation analytic case study using video recordings of telehomecare encounters. The theoretical approach draws (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  8
    Relational data paradigms: What do we learn by taking the materiality of databases seriously?Karen M. Wickett & Andrea K. Thomer - 2020 - Big Data and Society 7 (1).
    Although databases have been well-defined and thoroughly discussed in the computer science literature, the actual users of databases often have varying definitions and expectations of this essential computational infrastructure. Systems administrators and computer science textbooks may expect databases to be instantiated in a small number of technologies, but there are numerous examples of databases in non-conventional or unexpected technologies, such as spreadsheets or other assemblages of files linked through code. Consequently, we ask: How do the materialities of non-conventional databases differ (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  10
    Big Data solutions on a small scale: Evaluating accessible high-performance computing for social research.Sawyer A. Bowman & Dhiraj Murthy - 2014 - Big Data and Society 1 (2).
    Though full of promise, Big Data research success is often contingent on access to the newest, most advanced, and often expensive hardware systems and the expertise needed to build and implement such systems. As a result, the accessibility of the growing number of Big Data-capable technology solutions has often been the preserve of business analytics. Pay as you store/process services like Amazon Web Services have opened up possibilities for smaller scale Big Data projects. There is high demand (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20. Chapter 10: Preserving Authenticity in Virtual Heritage, Virtual Heritage: A Guide.Erik M. Champion - 2021 - In Erik Malcolm Champion (ed.), Virtual Heritage: A Guide. London:
    Virtual heritage has been explained as virtual reality applied to cultural heritage, but this definition only scratches the surface of the fascinating applications, tools and challenges of this fast-changing interdisciplinary field. This book provides an accessible but concise edited coverage of the main topics, tools and issues in virtual heritage. -/- Leading international scholars have provided chapters to explain current issues in accuracy and precision; challenges in adopting advanced animation techniques; shows how archaeological learning can be developed in Minecraft; they (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  24
    How Does Digital Competence Preserve University Students’ Psychological Well-Being During the Pandemic? An Investigation From Self-Determined Theory.Xinghua Wang, Ruixue Zhang, Zhuo Wang & Tiantian Li - 2021 - Frontiers in Psychology 12.
    This study conceptualized digital competence in line with self-determined theory and investigated how it alongside help-seeking and learning agency collectively preserved university students’ psychological well-being by assisting them to manage cognitive load and academic burnout, as well as increasing their engagement in online learning during the coronavirus disease 2019 pandemic. Moreover, students’ socioeconomic status and demographic variables were examined. Partial least square modeling and cluster analysis were performed on the survey data collected from 695 students. The findings show that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  61
    Data Science and Designing for Privacy.Michael Falgoust - 2016 - Techné: Research in Philosophy and Technology 20 (1):51-68.
    Unprecedented advances in the ability to store, analyze, and retrieve data is the hallmark of the information age. Along with enhanced capability to identify meaningful patterns in large data sets, contemporary data science renders many classical models of privacy protection ineffective. Addressing these issues through privacy-sensitive design is insufficient because advanced data science is mutually exclusive with preserving privacy. The special privacy problem posed by data analysis has so far escaped even leading accounts of informational (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  7
    Telling Stories with Data.Kelly Armstrong & Stowe Locke Teti - 2022 - Journal of Clinical Ethics 33 (4):277-296.
    The fidelity provided by rich, nuanced ethics consult narratives does not proscribe efforts to advance the profession by using data to assess performance and demonstrate value. While these two approaches have been described as in conflict with one another, the former sets the bar to which the latter should aim; to achieve this, consult data should, minimally, do two things: (1) tell the story of the case, as best as possible, in language easily accessible to both ethicists and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  16
    Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study.Effy Vayena, Marcello Ienca & James Scheibner - 2022 - BMC Medical Ethics 23 (1):1-13.
    BackgroundIncreasingly, hospitals and research institutes are developing technical solutions for sharing patient data in a privacy preserving manner. Two of these technical solutions are homomorphic encryption and distributed ledger technology. Homomorphic encryption allows computations to be performed on data without this data ever being decrypted. Therefore, homomorphic encryption represents a potential solution for conducting feasibility studies on cohorts of sensitive patient data stored in distributed locations. Distributed ledger technology provides a permanent record on all transfers and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  8
    Concrete Data and Abstract Notions in the Philosophical Study of Indigenous African Thought: The Struggle for Disciplinary Identity in the Era of the Near-Hegemonic Natural and Social Sciences.Reginald M. J. Oduor - 2021 - Philosophia Africana 20 (2):153-167.
    Due to the growth of neo-liberalism with its emphasis on “market-driven courses,” the humanities, of which philosophy is a part, find themselves disparaged and under-funded. As a result, some African philosophers have yielded to the temptation to deploy the empirical methodology of the natural and social sciences in a bid to illustrate the practical value of their discipline, thereby eroding philosophy’s distinctive characteristic, namely, reflection. Consequently, drawing from the contemporary discourse on methodology in African philosophy, this article argues that in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. Integration of Intelligence Data through Semantic Enhancement.David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith - 2011 - In Proceedings of the Conference on Semantic Technology in Intelligence, Defense and Security (STIDS). CEUR, Vol. 808.
    We describe a strategy for integration of data that is based on the idea of semantic enhancement. The strategy promises a number of benefits: it can be applied incrementally; it creates minimal barriers to the incorporation of new data into the semantically enhanced system; it preserves the existing data (including any existing data-semantics) in their original form (thus all provenance information is retained, and no heavy preprocessing is required); and it embraces the full spectrum of (...) sources, types, models, and modalities (including text, images, audio, and signals). The result of applying this strategy to a given body of data is an evolving Dataspace that allows the application of a variety of integration and analytic processes to diverse data contents. We conceive semantic enhancement (SE) as a lightweight and flexible process that leverages the richness of the structured contents of the Dataspace without adding storage and processing burdens to what, in the intelligence domain, will be an already storage- and processing-heavy starting point. SE works not by changing the data to which it is applied, but rather by adding an extra semantic layer to this data. We sketch how the semantic enhancement approach can be applied consistently and in cumulative fashion to new data and data-models that enter the Dataspace. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  27.  4
    The data of modern ethics examined.John Joseph Ming - 1894 - Cincinnati: Benziger.
    This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  24
    Representing the absent: The limits and possibilities of digital memory and preservation.Smiljana Antonijevic & Jeff Ubois - 2022 - Filozofija I Društvo 33 (2):311-325.
    Digital preservation has significantly expanded over the past few decades, renewing old and creating new challenges related to provenance, integrity, completeness, and context in memory and preservation practices. In this paper we explore how, perhaps counterintuitively, a more extensive digital historical record offers greater opportunities to misrepresent reality. We first review a set of concepts and socio-cultural approaches to memory and preservation. We then focus on the multiplicity of digital memory and preservation practices today, examining their (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  24
    Personal choices and situated data: Privacy negotiations and the acceptance of household Intelligent Personal Assistants.Anouk Mols & Jason Pridmore - 2020 - Big Data and Society 7 (1).
    The emergence of personal assistants in the form of smart speakers has begun to significantly alter people’s everyday experiences with technology. The rate at which household Intelligent Personal Assistants such as Amazon’s Echo and Google Home emerged in household spaces has been rapid. They have begun to move human–computer interaction from text-based to voice-activated input, offering a multiplicity of features through speech. The supporting infrastructure connects with artificial intelligence and the internet of things, allowing digital interfaces with domestic appliances, lighting (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  8
    Formative encounters: Colonial data collection on land and law in German Micronesia.Anna Echterhölter - 2021 - Science in Context 34 (4):527-552.
    ArgumentData collections are a hallmark of nineteenth-century administrative knowledge making, and they were by no means confined to Europe. All colonial empires transferred and translated these techniques of serialised and quantified information gathering to their dominions overseas. The colonial situation affected the encounters underlying vital statistics, enquête methods and land surveying. In this paper, two of those data collections will be investigated—a survey on land and a survey on indigenous law, both conducted around 1910 on the Micronesian island of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  6
    Missouri Citizen Perceptions: Giving Second Amendment Preservation Legislation a Second Look.Kerri M. Raissian, Jennifer Dineen, Mitchell Doucette, Damion Grasso & Cassandra Devaney - 2023 - Journal of Law, Medicine and Ethics 51 (1):32-52.
    In June 2021, Missouri passed the “Second Amendment Preservation Act” (SAPA). Though SAPA passed easily and had gubernatorial support, many Missouri law enforcement agencies, including the Missouri Sheriff’s Association, oppose it. Missing from this policy conversation, and deserving of analysis, is the voice of Missouri citizens. Using qualitative interview data and survey data, we explored what if anything Missouri gun owners knew about SAPA and what they perceived its effects would be on gun-related murders, suicides, gun thefts, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  10
    Challenges in administrative data linkage for research.Harvey Goldstein, Mauricio L. Barreto, Mahmoud Azimaee, Anders Hjern, James Boyd, Chris Dibben & Katie Harron - 2017 - Big Data and Society 4 (2).
    Linkage of population-based administrative data is a valuable tool for combining detailed individual-level information from different sources for research. While not a substitute for classical studies based on primary data collection, analyses of linked administrative data can answer questions that require large sample sizes or detailed data on hard-to-reach populations, and generate evidence with a high level of external validity and applicability for policy making. There are unique challenges in the appropriate research use of linked administrative (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  28
    The social licence for data-intensive health research: towards co-creation, public value and trust.Johannes J. M. van Delden, Menno Mostert, Ghislaine J. M. W. van Thiel, Shona Kalkman & Sam H. A. Muller - 2021 - BMC Medical Ethics 22 (1):1-9.
    BackgroundThe rise of Big Data-driven health research challenges the assumed contribution of medical research to the public good, raising questions about whether the status of such research as a common good should be taken for granted, and how public trust can be preserved. Scandals arising out of sharing data during medical research have pointed out that going beyond the requirements of law may be necessary for sustaining trust in data-intensive health research. We propose building upon the use (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  40
    Fairer machine learning in the real world: Mitigating discrimination without collecting sensitive data.Reuben Binns & Michael Veale - 2017 - Big Data and Society 4 (2).
    Decisions based on algorithmic, machine learning models can be unfair, reproducing biases in historical data used to train them. While computational techniques are emerging to address aspects of these concerns through communities such as discrimination-aware data mining and fairness, accountability and transparency machine learning, their practical implementation faces real-world challenges. For legal, institutional or commercial reasons, organisations might not hold the data on sensitive attributes such as gender, ethnicity, sexuality or disability needed to diagnose and mitigate emergent (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  36.  4
    Linked Conservation Data: the Adoption and Use of Vocabularies in the Field of Heritage Conservation for Publishing Conservation Records as Linked Data.Kristen StJohn & Athanasios Velios - 2021 - Knowledge Organization 48 (4):282-290.
    One of the fundamental roles of memory organisations is to safe-keep collections and this includes activities around their preservation and conservation. Conservators produce documentation records of their work to assist future interpretation of objects and to explain decision making for conservation. This documentation may exist as structured data or free text and in both cases they require vocabularies that can be understood widely in the domain. This paper describes a survey of conservation professionals which allowed us to compile (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  18
    Sharing Research Data and Confidentiality: Restrictions Caused by Deficient Consent Forms.Veerle Van Den Eynden - 2008 - Research Ethics 4 (1):37-38.
    Deficiencies or unclear statements in consent forms used for research with human participants may lead to publicly-funded research data being unsuitable for sharing with other researchers. Long-term data use is encouraged or required by many of the UK research councils and other funding bodies. Researchers may fail to address long-term use and sharing of data when obtaining informed consent and when arranging to keep data obtained from participants confidential. Sharing data should not compromise confidentiality if (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  2
    On Mr. Spencer's Data of Ethics.Malcolm Guthrie - 2015 - Forgotten Books.
    Excerpt from On Mr. Spencer's Data of Ethics This volume completes the critical examination of Mr. Spencer's system of Philosophy already pursued through two previous volumes entitled respectively "On Mr. Spencer's Formula of Evolution," and "On Mr. Spencer's Unification of Knowledge." The entire task has been undertaken by a student for the use of students. It cannot be of much use to the general reader, as it presumes and indeed requires a very intimate knowledge of Mr. Spencer's works. For (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  15
    Archival strategies for contemporary collecting in a world of big data: Challenges and opportunities with curating the UK web archive.Helena Byrne & Nicola Jayne Bingham - 2021 - Big Data and Society 8 (1).
    In this contribution, we will discuss the opportunities and challenges arising from memory institutions' need to redefine their archival strategies for contemporary collecting in a world of big data. We will reflect on this topic by critically examining the case study of the UK Web Archive, which is made up of the six UK Legal Deposit Libraries: the British Library, National Library of Scotland, National Library of Wales, Bodleian Libraries Oxford, Cambridge University Library and Trinity College Dublin. The UK (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  40. Give more data, awareness and control to individual citizens, and they will help COVID-19 containment.Mirco Nanni, Gennady Andrienko, Albert-László Barabási, Chiara Boldrini, Francesco Bonchi, Ciro Cattuto, Francesca Chiaromonte, Giovanni Comandé, Marco Conti, Mark Coté, Frank Dignum, Virginia Dignum, Josep Domingo-Ferrer, Paolo Ferragina, Fosca Giannotti, Riccardo Guidotti, Dirk Helbing, Kimmo Kaski, Janos Kertesz, Sune Lehmann, Bruno Lepri, Paul Lukowicz, Stan Matwin, David Megías Jiménez, Anna Monreale, Katharina Morik, Nuria Oliver, Andrea Passarella, Andrea Passerini, Dino Pedreschi, Alex Pentland, Fabio Pianesi, Francesca Pratesi, Salvatore Rinzivillo, Salvatore Ruggieri, Arno Siebes, Vicenc Torra, Roberto Trasarti, Jeroen van den Hoven & Alessandro Vespignani - 2021 - Ethics and Information Technology 23 (S1):1-6.
    The rapid dynamics of COVID-19 calls for quick and effective tracking of virus transmission chains and early detection of outbreaks, especially in the “phase 2” of the pandemic, when lockdown and other restriction measures are progressively withdrawn, in order to avoid or minimize contagion resurgence. For this purpose, contact-tracing apps are being proposed for large scale adoption by many countries. A centralized approach, where data sensed by the app are all sent to a nation-wide server, raises concerns about citizens’ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  8
    Virtuality and Capabilities in a World of Ambient Intelligence: New Challenges to Privacy and Data Protection.Luiz Costa - 2016 - Cham: Imprint: Springer.
    This book is about power and freedoms in our technological world and has two main objectives. The first is to demonstrate that a theoretical exploration of the algorithmic governmentality hypothesis combined with the capability approach is useful for a better understanding of power and freedoms in Ambient Intelligence, a world where information and communication technologies are invisible, interconnected, context aware, personalized, adaptive to humans and act autonomously. The second is to argue that these theories are useful for a better comprehension (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Towards More-than-Human Heritage: Arboreal Habitats as a Challenge for Heritage Preservation.Stanislav Roudavski & Julian Rutten - 2020 - Built Heritage 4 (4):1-17.
    Trees belong to humanity’s heritage, but they are more than that. Their loss, through catastrophic fires or under business-as-usual, is devastating to many forms of life. Moved by this fact, we begin with an assertion that heritage can have an active role in the design of future places. Written from within the field of architecture, this article focuses on structures that house life. Habitat features of trees and artificial replacement habitats for arboreal wildlife serve as concrete examples. Designs of such (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  43
    Ethical issues in HIV/STD prevention research with high risk youth: Providing help, preserving validity.Laurie J. Bauman, Jamie Heather Sclafane, Marni LoIacono, Ken Wilson & Ruth Macklin - 2008 - Ethics and Behavior 18 (2-3):247 – 265.
    Many preventive intervention studies with adolescents address high-risk behaviors such as drug and alcohol use, and unprotected sex. Randomized controlled trials (RCT) are the gold standard methodology used to test the effectiveness of these behavioral interventions. Interventions outside the rigidly described protocol are prohibited. However, there are ethical challenges to implementing inflexible intervention protocols, especially when the target population is young, experiences many stressful events, and lives in a resource-poor environment. Teens who are at high risk for substance use or (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  44.  16
    Coding the Dead: Cardiopulmonary Resuscitation for Organ Preservation.Colin Eversmann, Ayush Shah, Christos Lazaridis & Lainie F. Ross - 2023 - AJOB Empirical Bioethics 14 (3):167-173.
    Background There is lack of consensus in the bioethics literature regarding the use of cardiopulmonary resuscitation (CPR) for organ-preserving purposes. In this study, we assessed the perspectives of clinicians in critical care settings to better inform donor management policy and practice.Methods An online anonymous survey of members of the Society of Critical Care Medicine that presented various scenarios about CPR for organ preservation.Results The email was sent to 10,340 members. It was opened by 5,416 (52%) of members and 405 (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  27
    Are the dead taking over Facebook? A Big Data approach to the future of death online.David S. Watson & Carl J. Öhman - 2019 - Big Data and Society 6 (1).
    We project the future accumulation of profiles belonging to deceased Facebook users. Our analysis suggests that a minimum of 1.4 billion users will pass away before 2100 if Facebook ceases to attract new users as of 2018. If the network continues expanding at current rates, however, this number will exceed 4.9 billion. In both cases, a majority of the profiles will belong to non-Western users. In discussing our findings, we draw on the emerging scholarship on digital preservation and stress (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  10
    Psychological Aspects Associated With Fertility Preservation in Oncology: An Exploratory Study.Valentina Elisabetta Di Mattei, Gaia Perego, Paola Maria Vittoria Rancoita, Paola Taranto, Letizia Carnelli, Giorgia Mangili, Veronica Sarais, Alice Bergamini & Massimo Candiani - 2020 - Frontiers in Psychology 11.
    ObjectiveGonadotoxicity is considered one of the most distressing side effects of cancer treatment. Although fertility preservation can be a valid solution, it also involves a challenging process. A clear understanding of the features of women who decide to pursue fertility preservation after cancer diagnosis is missing. The purpose of the present study was therefore to analyze the personality profile of female patients referred to oncofertility prior to gonadotoxic treatment.MethodsFifty-two female cancer patients took part in the study. The Temperament (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  30
    Transformation of the Doctor–Patient Relationship: Big Data, Accountable Care, and Predictive Health Analytics.Seuli Bose Brill, Karen O. Moss & Laura Prater - 2019 - HEC Forum 31 (4):261-282.
    The medical profession is steeped in traditions that guide its practice. These traditions were developed to preserve the well-being of patients. Transformations in science, technology, and society, while maintaining a self-governance structure that drives the goal of care provision, have remained hallmarks of the profession. The purpose of this paper is to examine ethical challenges in health care as it relates to Big Data, Accountable Care Organizations, and Health Care Predictive Analytics using the principles of biomedical ethics laid out (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  19
    Contextual Exceptionalism After Death: An Information Ethics Approach to Post-Mortem Privacy in Health Data Research.Marieke A. R. Bak & Dick L. Willems - 2022 - Science and Engineering Ethics 28 (4):1-20.
    In this article, we use the theory of Information Ethics to argue that deceased people have a prima facie moral right to privacy in the context of health data research, and that this should be reflected in regulation and guidelines. After death, people are no longer biological subjects but continue to exist as informational entities which can still be harmed/damaged. We find that while the instrumental value of recognising post-mortem privacy lies in the preservation of the social contract (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  9
    Anatomical, physiological, and psychophysical data show that the nature of conscious perception is incompatible with the integrated information theory.Moshe Gur - 2022 - Behavioral and Brain Sciences 45.
    The integrated information theory equates levels of consciousness with the amount of information integrated over the elements that constitute a system. Conscious visual perception provides two observations that contradict the IIT. First, objects are accurately perceived when presented for ≪100 ms during which time no neural integration is possible. Second, an object is seen as an integrated whole and, concurrently, all constituent elements are evident. Because integration destroys information about details, IIT cannot account for perceptual detail preservation.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  13
    Principle-based recommendations for big data and machine learning in food safety: the P-SAFETY model.Salvatore Sapienza & Anton Vedder - 2023 - AI and Society 38 (1):5-20.
    Big data and Machine learning Techniques are reshaping the way in which food safety risk assessment is conducted. The ongoing ‘datafication’ of food safety risk assessment activities and the progressive deployment of probabilistic models in their practices requires a discussion on the advantages and disadvantages of these advances. In particular, the low level of trust in EU food safety risk assessment framework highlighted in 2019 by an EU-funded survey could be exacerbated by novel methods of analysis. The variety of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000