-
1
-
-
70849127154
-
Defining Profiling: A New Type of Knowledge?
-
(Hildebrandt, M., Gutwirth, S., eds.), Springer Science
-
Hildebrandt, M. (2008), Defining Profiling: A New Type of Knowledge? In: Profiling the European Citizen, Cross-Disciplinary Perspectives (Hildebrandt, M., Gutwirth, S., eds.), Springer Science, p. 17.
-
(2008)
Profiling the European Citizen, Cross-Disciplinary Perspectives
, pp. 17
-
-
Hildebrandt, M.1
-
2
-
-
0002169158
-
Knowledge Discovery in Databases: An Overview
-
1992 Fall
-
Frawley, W.J., Piatetsky-Shapiro, G., Matheus, C.J. (1992), Knowledge Discovery in Databases: An Overview. In: AAAI Magazine, Fall 1992, p. 58.
-
(1992)
AAAI Magazine
, pp. 58
-
-
Frawley, W.J.1
Piatetsky-Shapiro, G.2
Matheus, C.J.3
-
3
-
-
84928216121
-
The surveillance society: The threat of 1984-style techniques
-
June 21-6
-
See for instance: Marx, G.T. (1985), The surveillance society: the threat of 1984-style techniques. In: The Futurist, June 21-6;
-
(1985)
The Futurist
-
-
Marx, G.T.1
-
4
-
-
10944246068
-
KDD: The challenge to individualism
-
Number 4/December, 1999
-
Vedder, A. (1999), KDD: The challenge to individualism. In: Ethics and Information Technology, Volume 1, Number 4/December, 1999;
-
(1999)
Ethics and Information Technology
, vol.1
-
-
Vedder, A.1
-
6
-
-
0242329354
-
Effects of Unreliable Group Profiling by means of Data Mining
-
2003, Springer
-
Custers, B. (2003), Effects of Unreliable Group Profiling by means of Data Mining. In: Lecture Notes in Computer Science, Volume 2843/2003, Springer;
-
(2003)
Lecture Notes in Computer Science
, vol.2843
-
-
Custers, B.1
-
10
-
-
10944246068
-
KDD: The challenge to individualism
-
December, 1999
-
Vedder, A. (1999), KDD: The challenge to individualism. In: Ethics and Information Technology, Volume 1, Number 4/December, 1999.
-
(1999)
Ethics and Information Technology
, vol.1
, Issue.4
-
-
Vedder, A.1
-
11
-
-
79551522405
-
Data Mining with Discrimination Sensitive and Privacy Sensitive Attributes
-
12-14 July 2010, Orlando, Florida (forthcoming)
-
Custers, B.H.M. (2010), Data Mining with Discrimination Sensitive and Privacy Sensitive Attributes. Proceedings of ISP 2010, International Conference on Information Security and Privacy, 12-14 July 2010, Orlando, Florida (forthcoming).
-
(2010)
Proceedings of ISP 2010, International Conference on Information Security and Privacy
-
-
Custers, B.H.M.1
-
12
-
-
57049103886
-
-
PhD. Thesis, Leiden University
-
Schermer, B.W. (2007), Software Agents, Surveillance, and the Right to Privacy: a Legislative Framework for Agent-enabled Surveillance, PhD. Thesis, Leiden University, p. 42.
-
(2007)
Software Agents, Surveillance, and the Right to Privacy: A Legislative Framework for Agent-enabled Surveillance
, pp. 42
-
-
Schermer, B.W.1
-
13
-
-
33750010030
-
Online Privacy, Tailoring, and Persuasion
-
Strandburg, K., Stan Raicu, D. (eds), Chapter 12 Springer, 2006
-
Zarsky, T.Z. (2006), Online Privacy, Tailoring, and Persuasion. In: Privacy and technologies of Identity, a cross disciplinary conversation, Strandburg, K., Stan Raicu, D. (eds), Chapter 12, pp. 209-224, Springer, 2006.
-
(2006)
Privacy and Technologies of Identity, A Cross Disciplinary Conversation
, pp. 209-224
-
-
Zarsky, T.Z.1
-
15
-
-
0003398906
-
-
Cambridge: Cambridge University Press, (2nd edition)
-
See for an in depth analysis of causation: Pearl, D. (2009), Causality: Models, Reasoning, and Inference, Cambridge: Cambridge University Press, (2nd edition).
-
(2009)
Causality: Models, Reasoning, and Inference
-
-
Pearl, D.1
-
17
-
-
33645796029
-
Mine Your Own Business! Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion
-
Zarsky, T.Z. (2002), Mine Your Own Business! Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion. In: Yale Journal of Law and Technology, pp. 1-57.
-
(2002)
Yale Journal of Law and Technology
, pp. 1-57
-
-
Zarsky, T.Z.1
-
21
-
-
57049103886
-
-
PhD. Thesis, Leiden University
-
Schermer, B.W. (2007), Software Agents, Surveillance, and the Right to Privacy: a Legislative Framework for Agent-enabled Surveillance, PhD. Thesis, Leiden University, p. 198.
-
(2007)
Software Agents, Surveillance, and the Right to Privacy: A Legislative Framework for Agent-enabled Surveillance
, pp. 198
-
-
Schermer, B.W.1
-
22
-
-
57049103886
-
-
PhD. Thesis, Leiden University
-
Schermer, B.W. (2007), Software Agents, Surveillance, and the Right to Privacy: a Legislative Framework for Agent-enabled Surveillance, PhD. Thesis, Leiden University, p. 115.
-
(2007)
Software Agents, Surveillance, and the Right to Privacy: A Legislative Framework for Agent-enabled Surveillance
, pp. 115
-
-
Schermer, B.W.1
-
23
-
-
33750037698
-
Transparent Accountable Data Mining: New Strategies for Privacy Protection
-
Weitzner et al. (2006), Transparent Accountable Data Mining: New Strategies for Privacy Protection, MIT Technical Report.
-
(2006)
MIT Technical Report
-
-
Weitzner1
-
24
-
-
79551571894
-
-
note
-
The recent retrial and subsequent acquittal of Dutch murder suspect Lucia de Berk after serving six years in prison highlights the impact faulty (interpretation of) statistics may have on a persons life.
-
-
-
-
25
-
-
79551511878
-
-
COM (92) 422 finaleSYN 287, 15 October 1992, p. 26
-
COM (92) 422 finaleSYN 287, 15 October 1992, p. 26.
-
-
-
-
26
-
-
79551512629
-
-
I use the term accountability here in the sense of answerability
-
I use the term accountability here in the sense of answerability.
-
-
-
-
27
-
-
34548221015
-
Detecting privacy and ethical sensitivity in data mining results
-
Fule, P., Roddick, J.F. (2006), Detecting privacy and ethical sensitivity in data mining results. In: Proceedings of the 27th Australasian conference on Computer science, Volume 26, pp. 159-166.
-
(2006)
Proceedings of the 27th Australasian Conference on Computer Science
, vol.26
, pp. 159-166
-
-
Fule, P.1
Roddick, J.F.2
-
29
-
-
77952999035
-
Integrating induction and deduction for finding evidence of discrimination
-
Springer
-
Ruggieri, S., Pedreschi, D., and Turini, F. (2010), Integrating induction and deduction for finding evidence of discrimination. In: Artificial Intelligence & Law, 18:1-43; Springer.
-
(2010)
Artificial Intelligence & Law
, vol.18
, pp. 1-43
-
-
Ruggieri, S.1
Pedreschi, D.2
Turini, F.3
-
30
-
-
84979834490
-
Minding the machine: Article 15 of the EC data protection directive and automated profiling
-
Bygrave, L. (2001), Minding the machine: article 15 of the EC data protection directive and automated profiling. In: Computer Law & Security Report, 2001, Volume 17, pp. 17-24.
-
(2001)
Computer Law & Security Report, 2001
, vol.17
, pp. 17-24
-
-
Bygrave, L.1
-
32
-
-
45949108644
-
-
New York: Perseus Book Group
-
Lessig, L. (2006), Code 2.0, New York: Perseus Book Group.
-
(2006)
Code 2.0
-
-
Lessig, L.1
-
33
-
-
0041783510
-
Privacy-Preserving Data Mining
-
(June 2000)
-
Agrawal, R., Srikant, R. (2000), Privacy-Preserving Data Mining. In: ACM SIGMOD Record, Volume 29, Issue 2 (June 2000), pp. 439-450.
-
(2000)
ACM SIGMOD Record
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
|