Aspects of Data Ethics in a Changing World: Where Are We Now?
暂无分享,去创建一个
[1] Daniel W. Tigard. Changing the mindset for precision medicine: from incentivized biobanking models to genomic data , 2019, Genetics research.
[2] E. Chiauzzi,et al. Digital Trespass: Ethical and Terms-of-Use Violations by Researchers Accessing Data From an Online Patient Community , 2019, Journal of medical Internet research.
[3] W. B. Gallie. Essentially Contested Concepts , 1994, The Importance of Language.
[4] Appendix A: Personal Data: The Emergence of a New Asset Class , 2019, Trusted Data.
[5] David J. Hand. Who told you that , 2018 .
[6] D. Hand. Statistical challenges of administrative and transaction data , 2018 .
[7] B. Wittes,et al. The privacy paradox II : Measuring the privacy benefits of privacy threats , 2017 .
[8] Cat Drew,et al. Data science ethics in government , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[9] Nick Doty,et al. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[10] L. Floridi,et al. Data ethics , 2021, Effective Directors.
[11] K. Crawford,et al. Where are human subjects in Big Data research? The emerging ethics divide , 2016, Big Data Soc..
[12] D. Boyd,et al. Perspectives on Big Data, Ethics, and Society , 2016 .
[13] Lizzie Presser,et al. Care.data and access to UK health records: patient privacy and public trust , 2015 .
[14] Bob L. Sturm. A Simple Method to Determine if a Music Information Retrieval System is a “Horse” , 2014, IEEE Transactions on Multimedia.
[15] Jeffrey T. Hancock,et al. Experimental evidence of massive-scale emotional contagion through social networks , 2014, Proceedings of the National Academy of Sciences.
[16] T. Hardjono,et al. Privacy, Big Data, and the Public Good: The New Deal on Data: A Framework for Institutional Controls , 2014 .
[17] Peter Christen,et al. Data Matching , 2012, Data-Centric Systems and Applications.
[18] Peter Christen,et al. Data Matching , 2012, Data-Centric Systems and Applications.
[19] D. W. Black. The Contradiction Between Equal Protection’s Meaning and Its Legal Substance: How Deliberate Indifference Can Cure It , 2011 .
[20] A. Sharma,et al. IT in Governance in the 21st Century , 2011, IT Prof..
[21] Galit Shmueli,et al. To Explain or To Predict? , 2010, 1101.0891.
[22] L. Azeez,et al. Available Online at www , 2010 .
[23] David J. Hand,et al. Mining the past to determine the future: Problems and possibilities , 2009 .
[24] David J. Hand,et al. Modern statistics: the myth and the magic , 2009 .
[25] David J. Hand,et al. Justifying adverse actions with new scorecard technologies , 2009 .
[26] Jenny Fry,et al. Engaging Privacy and Information Technology in a Digital Age , 2008 .
[27] Vitaly Shmatikov,et al. How To Break Anonymity of the Netflix Prize Dataset , 2006, ArXiv.
[28] B. McCullough,et al. Measurement Theory and Practice: The World Through Quantification , 2005 .
[29] Marcus R. Wigan. Data Ownership , 1991, Managing Information Technology's Organisational Impact.
[30] David R. Cox,et al. Role of Models in Statistical Analysis , 1990 .
[31] E. Lehmann. Model Specification: The Views of Fisher and Neyman, and Later Developments , 1990 .
[32] T. H. Allegri. The Code of Federal Regulations , 1986 .
[33] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[34] W. G. Hunter,et al. The Experimental Study of Physical Mechanisms , 1965 .
[35] W. B. Gallie. IX.—Essentially Contested Concepts , 1956 .