Results for 'Data Encryption'

970 found
Order:
  1.  17
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  21
    Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study.Effy Vayena, Marcello Ienca & James Scheibner - 2022 - BMC Medical Ethics 23 (1):1-13.
    BackgroundIncreasingly, hospitals and research institutes are developing technical solutions for sharing patient data in a privacy preserving manner. Two of these technical solutions are homomorphic encryption and distributed ledger technology. Homomorphic encryption allows computations to be performed on data without this data ever being decrypted. Therefore, homomorphic encryption represents a potential solution for conducting feasibility studies on cohorts of sensitive patient data stored in distributed locations. Distributed ledger technology provides a permanent record on (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  27
    Encryption of Data Streams using Pauli spins ½ matrices.D. Sravana Kurmar, C. H. Suneetha & A. Chandra Sekhar - 2010 - In Giselle Walker & Elisabeth Leedham-Green (eds.), Identity. New York: Cambridge University Press. pp. 10--01.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service.Huijuan Lian, Weidong Qiu, Zheng di YanHuang & Jie Guo - 2017 - Complexity:1-14.
    With the development of mobile communication technology, location-based services are booming prosperously. Meanwhile privacy protection has become the main obstacle for the further development of LBS. The k-nearest neighbor search is one of the most common types of LBS. In this paper, we propose an efficient private circular query protocol with high accuracy rate and low computation and communication cost. We adopt the Moore curve to convert two-dimensional spatial data into one-dimensional sequence and encrypt the points of interest information (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  41
    Synergistic Information Processing Encrypts Strategic Reasoning in Poker.Seth Frey, Dominic K. Albino & Paul L. Williams - 2018 - Cognitive Science 42 (5):1457-1476.
    There is a tendency in decision‐making research to treat uncertainty only as a problem to be overcome. But it is also a feature that can be leveraged, particularly in social interaction. Comparing the behavior of profitable and unprofitable poker players, we reveal a strategic use of information processing that keeps decision makers unpredictable. To win at poker, a player must exploit public signals from others. But using public inputs makes it easier for an observer to reconstruct that player's strategy and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  31
    Encrypting human rights: The intertwining of resistant voices in the UK state surveillance debate.James Allen-Robertson & Amy Stevens - 2021 - Big Data and Society 8 (1).
    The Snowden revelations in 2013 redrew the lines of debate surrounding surveillance, exposing the extent of state surveillance across multiple nations and triggering legislative reform in many. In the UK, this was in the form of the Investigatory Powers Act. As a contribution to understanding resistance to expanding state surveillance activities, this article reveals the intertwining of diverse interests and voices which speak in opposition to UK state surveillance. Through a computational topic modelling-based mixed methods analysis of the submissions made (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  18
    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.Adel R. Alharbi, Jawad Ahmad, Undefined Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis & William J. Buchanan - 2022 - Complexity 2022:1-15.
    With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. Such a solution relies on chaos encryption algorithms over standard cryptographic methods that possess multistage encryption levels, including high speed, high security, low compute overheads, and procedural power, among other characteristics. In this work, a secure image (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  19
    HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme.Alagarswamy Ramaprasath & Heggere Rangaswamaiah Latha - 2023 - Journal of Intelligent Systems 32 (1).
    Image data play important role in various real-time online and offline applications. Biomedical field has adopted the imaging system to detect, diagnose, and prevent several types of diseases and abnormalities. The biomedical imaging data contain huge information which requires huge storage space. Moreover, currently telemedicine and IoT based remote health monitoring systems are widely developed where data is transmitted from one place to another. Transmission of this type of huge data consumes more bandwidth. Along with this, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  36
    Towards data justice? The ambiguity of anti-surveillance resistance in political activism.Jonathan Cable, Arne Hintz & Lina Dencik - 2016 - Big Data and Society 3 (2).
    The Snowden leaks, first published in June 2013, provided unprecedented insights into the operations of state-corporate surveillance, highlighting the extent to which everyday communication is integrated into an extensive regime of control that relies on the ‘datafication’ of social life. Whilst such data-driven forms of governance have significant implications for citizenship and society, resistance to surveillance in the wake of the Snowden leaks has predominantly centred on techno-legal responses relating to the development and use of encryption and policy (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  10. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  48
    Cryptography, data retention, and the panopticon society (abstract).Jean-François Blanchette & Deborah G. Johnson - 1998 - Acm Sigcas Computers and Society 28 (2):1-2.
    As we move our social institutions from paper and ink based operations to the electronic medium, we invisibly create a type of surveillance society, a panopticon society. It is not the traditional surveillance society in which government officials follow citizens around because they are concerned about threats to the political order. Instead it is piecemeal surveillance by public and private organizations. Piecemeal though it is, It creates the potential for the old kind of surveillance on an even grander scale. The (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  31
    Prosody in spontaneous humor: Evidence for encryption.Thomas Flamson, Gregory A. Bryant & H. Clark Barrett - 2011 - Pragmatics and Cognition 19 (2):248-267.
    The study of conversational humor has received relatively little empirical attention with almost no examinations of the role of vocal signals in spontaneous humor production. Here we report an analysis of spontaneous humorous speech in a rural Brazilian collective farm. The sample was collected over the course of ethnographic fieldwork in northeastern Brazil, and is drawn specifically from the monthly communal business meetings conducted in Portuguese. Our analyses focused on humorous utterances identified by the subsequent presence of laughter. Acoustic features (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  79
    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices.Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli & Kim Smith - 2021 - Complexity 2021:1-15.
    Coordination of a power system with the phasor measurement devices in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  58
    Trusting third-party storage providers for holding personal information. A context-based approach to protect identity-related data in untrusted domains.Giulio Galiero & Gabriele Giammatteo - 2009 - Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, are two (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  15.  53
    Knowledge and practice of confidential data handling in the Welsh Deanery: a brief report.L. E. Jackson & M. W. Lim - 2011 - Journal of Medical Ethics 37 (1):58-60.
    Recent large-scale personal data loss incidents highlighted the need for public bodies to more securely handle confidential data. We surveyed trainees from all specialties in the Welsh Deanery for their knowledge and practice. All registered trainees were invited to participate in an online anonymised survey. There were 880 completed and non-duplicated responses (52.9% response rate). Responses were analysed using Microsoft Access. Over 40% (388/880 (44.1%)) did not use formal guidelines on storage or disposal of confidential data. The (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  16.  13
    Research on the Key Issues of Big Data Quality Management, Evaluation, and Testing for Automotive Application Scenarios.Yingzi Wang, Ce Yu, Jue Hou, Yongjia Zhang, Xiangyi Fang & Shuyue Wu - 2021 - Complexity 2021:1-10.
    This paper provides an in-depth analysis and discussion of the key issues of quality management, evaluation, and detection contained in big data for automotive application scenarios. A generalized big data quality management model and programming framework are proposed, and a series of data quality detection and repair interfaces are built to express the processing semantics of various data quality issues. Through this data quality management model and detection and repair interfaces, users can quickly build custom (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  28
    Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: No malicious intent.Caron Jack, Yashik Singh & Maurice Mars - 2013 - BMC Medical Ethics 14 (S1):S8.
    IntroductionInformation and communication technologies are becoming an integral part of medical practice, research and administration and their use will grow as telemedicine and electronic medical record use become part of routine practice. Security in maintaining patient data is important and there is a statuary obligation to do so, but few health professionals have been trained on how to achieve this. There is no information on the use of computers and email by doctors and nurses in South Africa in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18.  30
    (1 other version)A concise introduction to pure mathematics.M. W. Liebeck - 2006 - Boca Raton: Chapman & Hall/CRC.
    Written in a relaxed, readable style, A Concise Introduction to Pure Mathematics leads students gently but firmly into the world of higher mathematics. It provides beginning undergraduates with a rigourous grounding in the basic tools and techniques of the discipline and prepares them for further more advanced studies in analysis, differential equations, and algebra. This edition contains additional material on secret codes, permutations, and prime numbers. It features more than 200 exercises, with many completely new. The text is organized into (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19. Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  13
    Professional values and ethical ideology: Perceptions of nursing students.Ebin J. Arries - 2020 - Nursing Ethics 27 (3):726-740.
    Background: Moral philosophical positions and professional values have been shown to influence nurses’ practice behaviours. Understanding nursing students’ professional values and ethical ideologies, therefore, is important as they may help inform evidence-informed curriculum decisions and education strategies to develop students’ professional reflective competencies. However, there is a dearth in current empirical data on Canadian nursing students’ perceptions of professional values and ethical positions. Objectives: This study’s purpose was to examine undergraduate nursing student’s perceptions of professional values and ethical ideology (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  21. Does CTCF mediate between nuclear organization and gene expression?Rolf Ohlsson, Victor Lobanenkov & Elena Klenova - 2010 - Bioessays 32 (1):37-50.
    The multifunctional zinc‐finger protein CCCTC‐binding factor (CTCF) is a very strong candidate for the role of coordinating the expression level of coding sequences with their three‐dimensional position in the nucleus, apparently responding to a “code” in the DNA itself. Dynamic interactions between chromatin fibers in the context of nuclear architecture have been implicated in various aspects of genome functions. However, the molecular basis of these interactions still remains elusive and is a subject of intense debate. Here we discuss the nature (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  22.  41
    Privacy for the weak, transparency for the powerful: the cypherpunk ethics of Julian Assange.Patrick D. Anderson - 2020 - Ethics and Information Technology 23 (3):295-308.
    WikiLeaks is among the most controversial institutions of the last decade, and this essay contributes to an understanding of WikiLeaks by revealing the philosophical paradigm at the foundation of Julian Assange’s worldview: cypherpunk ethics. The cypherpunk movement emerged in the early-1990s, advocating the widespread use of strong cryptography as the best means for defending individual privacy and resisting authoritarian governments in the digital age. For the cypherpunks, censorship and surveillance were the twin evils of the computer age, but they viewed (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  2
    Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition.Darel W. Hardy, Fred Richman & Carol L. Walker - 2009 - Crc Press.
    Using mathematical tools from number theory and finite fields, Applied Algebra: Codes, Ciphers, and Discrete Algorithms, Second Edition presents practical methods for solving problems in data security and data integrity. It is designed for an applied algebra course for students who have had prior classes in abstract or linear algebra. While the content has been reworked and improved, this edition continues to cover many algorithms that arise in cryptography and error-control codes. New to the Second Edition A CD-ROM (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  35
    Hybrid Real-Time Protection System for Online Social Networks.Muneer Bani Yassein, Shadi Aljawarneh & Yarub Wahsheh - 2020 - Foundations of Science 25 (4):1095-1124.
    The impact of Online Social Networks on human lives is foreseen to be very large with unprecedented amount of data and users. OSN users share their ideas, photos, daily life events, feelings and news. Since OSNs’ security and privacy challenges are more potential than ever before, it is necessary to enhance the protection and filtering approaches of OSNs contents. This paper explores OSNs’ threats and challenges, and categorize them into: account-based, URL-based and content-based threats. In addition, we analyze the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  40
    Researching the Mexico-US border: a tale of dataveillance.Mitxy Mabel Meneses Gutierrez - 2023 - Journal of Global Ethics 19 (3):347-358.
    The Mexico-U.S. border is a space considered `smart´ due to the amount of surveillance technology used for national security purposes. The technological ecology consists of integrated fixed towers, remote video surveillance systems, mobile video surveillance systems, Predator B surveillance drones, mobile X-ray units, automated license plate readers, cell phone tracking towers, implanted motion sensors, biometric data collection, and DNA sampling (Aizeki et al. Citation2021). Whilst these instruments are usually linked to irregular border crossers, transborder commuters, who physically cross the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  13
    Security in advanced metering infrastructures: Lightweight cryptography.Luis Hernández-Álvarez, Juan José Bullón Pérez & Araceli Queiruga-Dios - forthcoming - Logic Journal of the IGPL.
    Smart grids are designed to revolutionize the energy sector by creating a smarter, more efficient and reliable power supply network. The rise of smart grids is a response to the need for a more comprehensive and sophisticated energy system that caters to the needs of homes and businesses. Key features of smart grids include the integration of renewable energy sources, decentralized generation and advanced distribution networks. At the heart of smart grids is a sophisticated metering system, consisting of intelligent electronic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  14
    Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications.Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez & Doris Esenarro Vargas - 2021 - Complexity 2021:1-13.
    As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things has been introduced that revolves around smart devicesʼ conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  27
    DWT-SVD Based Watermarking for High-Resolution Medical Holographic Images.Fahrettin Horasan, Muhammed Ali Pala, Ali Durdu, Akif Akgül, Ömer Faruk Akmeşe & Mustafa Zahid Yıldız - 2022 - Complexity 2022:1-21.
    Watermarking is one of the most common techniques used to protect data’s authenticity, integrity, and security. The obfuscation in the frequency domain used in the watermarking method makes the watermarking stronger than the obfuscation in the spatial domain. It occupies an important place in watermarking works in imperceptibility, capacity, and robustness. Finding the optimal location to hide the watermarking is one of the most challenging tasks in these methods and affects the method’s performance. In this article, sample identification information (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  41
    Lockbox: mobility, privacy and values in cloud storage. [REVIEW]Luke Stark & Matt Tierney - 2014 - Ethics and Information Technology 16 (1):1-13.
    This paper examines one particular problem of values in cloud computing: how individuals can take advantage of the cloud to store data without compromising their privacy and autonomy. Through the creation of Lockbox, an encrypted cloud storage application, we explore how designers can use reflection in designing for human values to maintain both privacy and usability in the cloud.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  24
    Digital Face Forgery and the Role of Digital Forensics.Manotar Tampubolon - 2024 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 37 (3):753-767.
    Advancements in digital technology have made it easy to alter faces using editing software, posing challenges for industries in verifying photograph authenticity. Digital image forensics, a scientific method, is employed to gather data and determine the veracity of faces. This study assesses the effectiveness of digital image forensics in detecting fake digital faces using tools such as Foto Forensics, Forensically Beta, and Opanda IExif. Foto Forensics analyzes JPEG picture compression levels to detect image edits, revealing metadata differences compared to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  13
    Ordinary language analysis as'therapy'eugen Fischer Ludwig-maximilians-university, munich.Austin On Sense-Data - 2006 - Grazer Philosophische Studien 70 (1):67-99.
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  31
    On board computing system for AMS-02 mission.Data Link Lrdl - 2005 - In Alan F. Blackwell & David MacKay (eds.), Power. New York: Cambridge University Press. pp. x2.
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. B line.Kbytes Data Flash - 2009 - Nexus 2:3.
    No categories
     
    Export citation  
     
    Bookmark  
  34. Electro Industries/Gauge Tech.Power Meter & Data Acquisition Node - 2003 - Nexus 1250.
     
    Export citation  
     
    Bookmark  
  35. Sem tarefa.Turma Disciplina Data Entrega Tarefa, Prova Quimica, Tabela Periodica, Ed Fisica, Terminar Tarefa da, Pesquisar Sobre A. Vida Do, Educador Paulo Freire & Tarefa Guia de Estudo Pagina - 1928 - História 8 (4/09):08.
    No categories
     
    Export citation  
     
    Bookmark   3 citations  
  36. An Ecofeminist Philosophical Perspective.".Taking Empirical Data Seriously - 1997 - In Karen Warren (ed.), Ecofeminism: Women, Culture, Nature. Indiana Univ Pr.
     
    Export citation  
     
    Bookmark  
  37.  25
    PMR-2450 Projeto de Máquinas agosto/2005 Professores.Julio C. Adamowski, Tarcisio Hess Coelho, Gilberto F. Martha de Souza, Cronograma de Atividades, Data Atividade Tipo de Atividade & C. N. C. Máquina - 2005 - Princípios 9:08.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38. Classificatory Theory in Data-intensive Science: The Case of Open Biomedical Ontologies.Sabina Leonelli - 2012 - International Studies in the Philosophy of Science 26 (1):47 - 65.
    Knowledge-making practices in biology are being strongly affected by the availability of data on an unprecedented scale, the insistence on systemic approaches and growing reliance on bioinformatics and digital infrastructures. What role does theory play within data-intensive science, and what does that tell us about scientific theories in general? To answer these questions, I focus on Open Biomedical Ontologies, digital classification tools that have become crucial to sharing results across research contexts in the biological and biomedical sciences, and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  39. Reasoning about data and information: Abstraction between states and commodities.Patrick Allo - 2009 - Synthese 167 (2):231-249.
    Cognitive states as well as cognitive commodities play central though distinct roles in our epistemological theories. By being attentive to how a difference in their roles affects our way of referring to them, we can undoubtedly accrue our understanding of the structure and functioning of our main epistemological theories. In this paper we propose an analysis of the dichotomy between states and commodities in terms of the method of abstraction, and more specifically by means of infomorphisms between different ways to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  16
    Critical care for the early web: ethical digital methods for archived youth data.Katie Mackinnon - 2022 - Journal of Information, Communication and Ethics in Society 20 (3):349-361.
    This paper aims to provide a brief overview of the ethical challenges facing researchers engaging with web archival materials and demonstrates a framework and method for conducting research with historical web data created by young people.,This paper’s methodology is informed by the conceptual framing of data materials in research on the “right to be forgotten” (Crossen-White, 2015; GDPR, 2018; Tsesis, 2014), data afterlives (Agostinho, 2019; Stevenson and Gehl, 2019; Sutherland, 2017), indigenous data sovereignty and governance (Wemigwans, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  65
    The acceptability of conducting data linkage research without obtaining consent: lay people’s views and justifications.Vicki Xafis - 2015 - BMC Medical Ethics 16 (1):79.
    A key ethical issue arising in data linkage research relates to consent requirements. Patients’ consent preferences in the context of health research have been explored but their consent preferences regarding data linkage specifically have been under-explored. In addition, the views on data linkage are often those of patient groups. As a result, little is known about lay people’s views and their preferences about consent requirements in the context of data linkage. This study explores lay people’s views (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  42.  45
    Living with Data: Aligning Data Studies and Data Activism Through a Focus on Everyday Experiences of Datafication.Helen Kennedy - 2018 - Krisis 38 (1):18-30.
    In this paper I argue that there is an urgent need for more empirical research into everyday experiences of living with datafication, something that has not been prioritised in the emerging field of data studies to date. As a result of this absence, the knowledge produced within data studies is not as aligned to the aims of data activism as it might be. Data activism seeks to challenge existing, unequal data power relations and to mobilise (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  43.  12
    Self-Identification: Sociological Research Data.Arvydas Virgilijus Matulionis & A. Savicka - 2007 - Lithuanian Identity and Values, Lithuanian Philosophical Studies V, Cultural Heritage and Contemporary Change Series Iva, Eastern and Central Europe 31:83 - 99.
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  59
    Are there vague sense-data?Virgil C. Aldrich - 1934 - Mind 43 (172):477-482.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  45.  30
    Health and Big Data: An Ethical Framework for Health Information Collection by Corporate Wellness Programs.Ifeoma Ajunwa, Kate Crawford & Joel S. Ford - 2016 - Journal of Law, Medicine and Ethics 44 (3):474-480.
    This essay details the resurgence of wellness program as employed by large corporations with the aim of reducing healthcare costs. The essay narrows in on a discussion of how Big Data collection practices are being utilized in wellness programs and the potential negative impact on the worker in regards to privacy and employment discrimination. The essay offers an ethical framework to be adopted by wellness program vendors in order to conduct wellness programs that would achieve cost-saving goals without undue (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  46.  11
    Use of Apology Strategies in Emails by Chinese Learners of English: Evidence Based on Naturally Occurring Data.Ying Chen, Qi Lu & Yuxuanjing Wei - 2022 - Frontiers in Psychology 12.
    Using a data set of 30 authentic institutional emails written by Chinese college students to their native English teacher, this article investigates the frequency and combinations of apology strategies used by English as a Foreign Language learners in natural contexts. Drawing on the coding framework adapted from previous studies, this article carries out a fine-grained analysis of apology behaviors of Chinese EFL learners when they offended their teacher for various reasons. Results revealed that the most frequently used strategy was (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  92
    The Analysis of Sense-Data.J. O. Wisdom - 1934 - Analysis 2 (5):78 - 80.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  48. Privacy and data privacy issues in contemporary china.Lü Yao-Huai - 2005 - Ethics and Information Technology 7 (1):7-15.
    Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional Chinese emphases on the importance of (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  49.  30
    Health Care Markets: Concepts, Data, Measures, and Current Research Challenges.Michael Hagan & William Encinosa - 2008 - Inquiry: The Journal of Health Care Organization, Provision, and Financing 45 (1):15-18.
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  23
    Complex Algorithms for Data-Driven Model Learning in Science and Engineering.Francisco J. Montáns, Francisco Chinesta, Rafael Gómez-Bombarelli & J. Nathan Kutz - 2019 - Complexity 2019:1-3.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 970