Privacy in the digital world: medical and health data outside of HIPAA protections

T Glenn, S Monteith - Current psychiatry reports, 2014 - Springer
Increasing quantities of medical and health data are being created outside of HIPAA
protection, primarily by patients. Data sources are varied, including the use of credit cards for …

Toward an ethics of algorithms: Convening, observation, probability, and timeliness

M Ananny - Science, Technology, & Human Values, 2016 - journals.sagepub.com
Part of understanding the meaning and power of algorithms means asking what new
demands they might make of ethical frameworks, and how they might be held accountable to …

[图书][B] The US intelligence community

JT Richelson - 2018 - taylorfrancis.com
The role of intelligence in US government operations has changed dramatically and is now
more critical than ever to domestic security and foreign policy. This authoritative and highly …

[图书][B] Die Macht der digitalen Plattformen

M Jaekel - 2017 - Springer
Die Macht der digitalen Plattformen Page 1 Die Macht der digitalen Plattformen Michael Jaekel
Wegweiser im Zeitalter einer expandierenden Digitalsphäre und künstlicher Intelligenz Page 2 Die …

Safer field research in the social sciences: A guide to human and digital security in hostile environments

The vigil of Giulio Regeni in Cairo, from a distance, would have looked like any other protest–
banners and posters fluttering in the wind. Only, that winter morning, in 2016, was muted …

Evidence and future potential of mobile phone data for disease disaster management

J Cinnamon, SK Jones, WN Adger - Geoforum, 2016 - Elsevier
Global health threats such as the recent Ebola and Zika virus outbreaks require rapid and
robust responses to prevent, reduce and recover from disease dispersion. As part of broader …

[图书][B] The Smartphone: Anatomy of an industry

E Woyke - 2014 - books.google.com
A technology reporter's behind-the-scenes history of the device that has taken over our lives.
How have smartphones shaped the way we socialize and interact? Who tracks our actions …

Alpenhorn: Bootstrapping secure communication without leaking metadata

D Lazar, N Zeldovich - 12th USENIX Symposium on Operating Systems …, 2016 - usenix.org
Alpenhorn is the first system for initiating an encrypted connection between two users that
provides strong privacy and forward secrecy guarantees for metadata (ie, information about …

Data science and ethical issues: between knowledge gain and ethical responsibility

R Egger, L Neuburger, M Mattuzzi - Applied Data Science in Tourism …, 2022 - Springer
Despite the numerous possibilities and advantages of data science to solve complex
problems and gain new insights, the appropriate way of using and analyzing data …

Constrained UAV mission planning: A comparison of approaches

S Leary, M Deittert, J Bookless - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
In this paper the optimal timing of air-to-ground tasks is considered. A scenario is examined,
where multiple unmanned air vehicles (UAVs) must perform one or more tasks on a set of …