-
1
-
-
84896882531
-
Harvard personal genome project: Lessons from participatory public research
-
Ball, M. P., Bobe, J. R., Chou, M. F., Clegg, T., Estep, P. W., Lunshof, J. E., et al. (2014). Harvard Personal Genome Project: Lessons from participatory public research. GenomeMedicine, 6(2), 10.
-
(2014)
Genomemedicine
, vol.6
, Issue.2
, pp. 10
-
-
Ball, M.P.1
Bobe, J.R.2
Chou, M.F.3
Clegg, T.4
Estep, P.W.5
Lunshof, J.E.6
-
2
-
-
84944564720
-
What does the facebook experiment teach us? The medium
-
July 1
-
Boyd, D. (2014, July 1) What does the Facebook Experiment teach us? The Medium. Online.
-
(2014)
Online
-
-
Boyd, D.1
-
3
-
-
84861974217
-
Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon
-
Boyd, D., & Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5), 662-679.
-
(2012)
Information, Communication & Society
, vol.15
, Issue.5
, pp. 662-679
-
-
Boyd, D.1
Crawford, K.2
-
4
-
-
0347315050
-
Examined lives: Informational privacy and the subject as object
-
Cohen, J. (2000). Examined lives: Informational privacy and the subject as object. Stanford Law Review, 52, 1373-1438.
-
(2000)
Stanford Law Review
, vol.52
, pp. 1373-1438
-
-
Cohen, J.1
-
5
-
-
84923198441
-
Configuring the networked citizen
-
A. Sarat, L. Douglas, & M. M. Umphrey (Eds.), Stanford, CA: Stanford University Press
-
Cohen, J. (2012). Configuring the networked citizen. In A. Sarat, L. Douglas, & M. M. Umphrey (Eds.), Imagining new legalities: Privacy and its possibilities in the 21st century (129-153). Stanford, CA: Stanford University Press.
-
(2012)
Imagining New Legalities: Privacy and Its Possibilities in the 21St Century
, pp. 129-153
-
-
Cohen, J.1
-
6
-
-
84944558423
-
Designing ethical practice in biosurveillance: The project argus doctrine
-
D. Zeng, H. Chen, C. Castillo-Chavez, B. Lober, & M. Thurmond (Eds.), New York: Springer
-
Collmann, J., & Robinson, A. (2010). Designing ethical practice in biosurveillance: The project Argus doctrine. In D. Zeng, H. Chen, C. Castillo-Chavez, B. Lober, & M. Thurmond (Eds.), Infectious disease informatics and biosurveillance: Research, systems, and case studies. New York: Springer.
-
(2010)
Infectious Disease Informatics and Biosurveillance: Research, Systems, and Case Studies
-
-
Collmann, J.1
Robinson, A.2
-
7
-
-
84876230367
-
Managing information security and privacy in health care data mining
-
H. Chen, S. Fuller, C. Friedman, & W. Hersh (Eds.), Springer’s integrated series in information systems, New York: Springer
-
Cooper, T., & Collmann, J. (2005). Managing information security and privacy in health care data mining. In H. Chen, S. Fuller, C. Friedman, & W. Hersh (Eds.), Advances in medical informatics: Knowledge management and data mining in biomedicine (Springer’s integrated series in information systems, Vol. 8). New York: Springer.
-
(2005)
Advances in Medical Informatics: Knowledge Management and Data Mining in Biomedicine
, vol.8
-
-
Cooper, T.1
Collmann, J.2
-
8
-
-
50249159954
-
Organizational repertoires and rites in health information security
-
Cooper, T., Collmann, J., & Neidermeier, H. (2008). Organizational repertoires and rites in health information security. Cambridge Quarterly of Healthcare Ethics, 17(4), 441-452.
-
(2008)
Cambridge Quarterly of Healthcare Ethics
, vol.17
, Issue.4
, pp. 441-452
-
-
Cooper, T.1
Collmann, J.2
Neidermeier, H.3
-
10
-
-
84944597262
-
-
Office of the Inspector General, Information Technology Management, Arlington, VA
-
Department of Defense, Office of the Inspector General, Information Technology Management. (2003). Terrorist Information Awareness Program (D-2004-033). Arlington, VA.
-
(2003)
Terrorist Information Awareness Program (D-2004-033)
-
-
-
11
-
-
84871477186
-
-
US Department of Homeland Security, 2014, November 4, from
-
Dittrich, D., Kenneally, E. (2012). The Menlo report: Ethical principles guiding information and communication technology research. US Department of Homeland Security. Retrieved 2014, November 4, from http://www.dhs.gov/sites/default/files/publications/CSD- MenloPrinciplesCORE-20120803.pdf
-
(2012)
The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research
-
-
Dittrich, D.1
Kenneally, E.2
-
12
-
-
84944589852
-
What is big data?
-
January 12
-
Dumbill, E. (2012, January 12). What is big data?O’Reilly Radar. Online.
-
(2012)
Online
-
-
Dumbill, E.1
-
13
-
-
84896047357
-
The data revolution and economic analysis
-
J. Lerner & S. Stern (Eds.), Cambridge, MA: MIT Press
-
Einav, L., & Levin, J. D. (2013). The data revolution and economic analysis. In J. Lerner & S. Stern (Eds.), Innovation policy and the economy. Cambridge, MA: MIT Press. doi:10.3386/w19035.
-
(2013)
Innovation Policy and the Economy
-
-
Einav, L.1
Levin, J.D.2
-
14
-
-
84926623018
-
-
Retrieved 2014, November 4
-
Executive Office of the President. (2014). Big Data: Seizing opportunities preserving values. Retrieved 2014, November 4, from http://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
-
(2014)
Big Data: Seizing Opportunities Preserving Values
-
-
-
15
-
-
0442298965
-
-
Retrieved 2014, November 2
-
Friedman, B., Kahn, P. H., Jr., & Borning, A. (2001). Value sensitive design: Theory and methods (UW CSE Technical Report 02-12-01). Retrieved 2014, November 2, from http://www. urbansim.org/pub/Research/ResearchPapers/vsd-theory-methods-tr.pdf
-
(2001)
Value Sensitive Design: Theory and Methods
-
-
Friedman, B.1
Kahn, P.H.2
Borning, A.3
-
16
-
-
84944547200
-
Why civil rights groups are warning against ‘big data’
-
February 27
-
Fung, B. (2014, February 27). Why civil rights groups are warning against ‘big data’. The Washington Post. Online
-
(2014)
The Washington Post
-
-
Fung, B.1
-
17
-
-
84944588603
-
Big data and privacy
-
2014, November 4
-
Future of Privacy Forum. (2013). Big data and privacy. Making ends meet. Retrieved 2014, November 4, from http://www.futureofprivacy.org/big-data-privacy-workshop-paper- collection/
-
Making Ends Meet
-
-
-
18
-
-
41149088350
-
Definition, structure, content, use and impacts of electronic health records: A review of the research literature
-
Hayrinen, K., Saranto, K., & Nykanen, P. (2008). Definition, structure, content, use and impacts of electronic health records: A review of the research literature. International Journal of Medical Informatics, 77(5), 291-304.
-
(2008)
International Journal of Medical Informatics
, vol.77
, Issue.5
, pp. 291
-
-
Hayrinen, K.1
Saranto, K.2
Nykanen, P.3
-
19
-
-
84856442812
-
Who needs stories if you can get the data? Isps in the era of big data crunching
-
Hildebrandt, M. (2011). Who needs stories if you can get the data? ISPs in the era of big data crunching. Philosophy of Technology, 24, 371-390.
-
(2011)
Philosophy of Technology
, vol.24
, pp. 371
-
-
Hildebrandt, M.1
-
20
-
-
84866002283
-
-
2014, November 4
-
IBM. (2014). What is big data? Retrieved 2014, November 4, from http://www.ibm.com/big-data/us/en/
-
(2014)
What is Big Data
-
-
-
21
-
-
84875482216
-
Big data: Issues and challenges moving forward
-
46th Hawaii International Conference, Maui
-
Kaisler, S., Armour, F., Espinosa, J.A., & Money, W. (2013) Big data: Issues and challenges moving forward. In System Sciences (HICSS). 46th Hawaii International Conference, Maui,2013.
-
(2013)
System Sciences (HICSS)
-
-
Kaisler, S.1
Armour, F.2
Espinosa, J.A.3
Money, W.4
-
22
-
-
84944594659
-
-
2014, November 4
-
Knewton Inc. (2014). About Knewton. Retrieved 2014, November 4, from http://www.knewton. com/about/
-
About Knewton
-
-
-
23
-
-
84911185040
-
The data brokers: Selling your personal information
-
August 24, Online
-
Kroft, S. (2014, August 24) The data brokers: Selling your personal information. 60 Minutes. Online.
-
(2014)
60 Minutes
-
-
Kroft, S.1
-
24
-
-
84944569466
-
Verizon wireless sells out customers with creepy new tactic
-
April 24, Online
-
Lazarus, D. (2014, April 24) Verizon wireless sells out customers with creepy new tactic. LosAngeles Times. Online.
-
(2014)
Losangeles Times
-
-
Lazarus, D.1
-
25
-
-
84892530859
-
How your data are being deeply mined
-
RetrievedNovember 4
-
Marwick, A. (2014). How your data are being deeply mined. New York Review of Books. RetrievedNovember 4, from http://www.nybooks.com/articles/archives/2014/jan/09/how-your- data-are-being-deeply-mined/?pagination=false
-
(2014)
New York Review of Books
-
-
Marwick, A.1
-
26
-
-
85025656229
-
-
Matei, S. (2014). Email correspondence 2014.
-
(2014)
-
-
Matei, S.1
-
27
-
-
84944527126
-
Everything we know about facebook’s secret mood manipulation experiment
-
June 28, Online
-
Meyer, R. (2014, June 28). Everything we know about Facebook’s secret mood manipulation experiment. The Atlantic. Online.
-
(2014)
The Atlantic
-
-
Meyer, R.1
-
28
-
-
0042923706
-
Towards a theory of privacy in the information age
-
Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27-32.
-
(1997)
Computers and Society
, vol.27
, Issue.3
, pp. 27
-
-
Moor, J.1
-
29
-
-
84944624933
-
Twitter to release all tweets to scientists
-
Moyer, M. (2014). Twitter to release all tweets to scientists. Scientific American, 310(6).
-
(2014)
Scientific American
, vol.310
, Issue.6
-
-
Moyer, M.1
-
30
-
-
84944574791
-
A vast hidden surveillance network runs across america, powered by the repo industry
-
May 3, Online
-
Musgrave, S. (2014, May 3). A vast hidden surveillance network runs across America, powered by the repo industry. The Boston Globe. Online.
-
(2014)
The Boston Globe
-
-
Musgrave, S.1
-
31
-
-
84944600235
-
-
2014, November 4
-
National Science Foundation. (2012). Directorate for computer science & information science & engineering, critical techniques and technologies for advancing big data science &engineer- ing (BIGDATA). Retrieved 2014, November 4, from http://www.nsf.gov/funding/pgm_summ. jsp?pims_id=504767
-
(2012)
-
-
-
32
-
-
1842538795
-
Privacy as contextual integrity
-
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 101-139.
-
(2004)
Washington Law Review
, vol.79
, pp. 101
-
-
Nissenbaum, H.1
-
35
-
-
33744495192
-
You are a suspect
-
November 14, Online
-
Safire, W. (2002, November 14). You are a suspect. New York Times. Online.
-
(2002)
New York Times
-
-
Safire, W.1
-
36
-
-
85018950227
-
Data mining your children
-
May 15, Online
-
Simon, S. (2014, May 15). Data mining your children. Politico. Online.
-
(2014)
Politico
-
-
Simon, S.1
-
37
-
-
84944549180
-
-
January 23, Co-chairs, US ACM Policy Committee, Association for Computing Machinery, Letter to Honorable John Warner, Chairman
-
Simons, B., & Spafford, E. H. (2003, January 23). Co-chairs, US ACM Policy Committee, Association for Computing Machinery, Letter to Honorable John Warner, Chairman, Senate Committee on Armed Forces.
-
(2003)
Senate Committee on Armed Forces
-
-
Simons, B.1
Spafford, E.H.2
-
38
-
-
84944632102
-
Inbloom student data repository to close
-
April 21
-
Singer, N. (2014, April 21). InBloom student data repository to close. New York Times. Online.
-
(2014)
New York Times
-
-
Singer, N.1
-
40
-
-
13844289624
-
-
American Civil Liberties Union, Technology and Liberty Program, 2014, November 4
-
Stanley, J., & Steinhardt, B. (2003). Bigger monster, weaker chains: The growth of an American Surveillance Society. American Civil Liberties Union, Technology and Liberty Program. Retrieved 2014, November 4, from https://www.aclu.org/technology-and-liberty/bigger-mon ster-weaker-chains-growth-american-surveillance-society
-
(2003)
Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society
-
-
Stanley, J.1
Steinhardt, B.2
-
41
-
-
84900839676
-
Making the most of a brave new world: Opportunities and considerations for using twitter as a public health monitoring tool
-
Stoove, M. A., & Pedrana, A. E. (2014). Making the most of a brave new world: Opportunities and considerations for using Twitter as a public health monitoring tool. Preventive Medicine, 63, 109-111.
-
(2014)
Preventive Medicine
, vol.63
-
-
Stoove, M.A.1
Pedrana, A.E.2
-
42
-
-
84944545235
-
Sheryl sandberg not sorry for facebook mood manipulation study
-
July 3, Online
-
Sullivan, G. (2014, July 3). Sheryl Sandberg not sorry for Facebook mood manipulation study.Washington Post. Online.
-
(2014)
Washington Post. Online
-
-
Sullivan, G.1
-
43
-
-
84889497445
-
Informational privacy: Concepts, theories, and controversies
-
K. E. Himma & H. Tavani (Eds.), Hoboken, NJ: Wiley
-
Tavani, H. (2008). Informational privacy: Concepts, theories, and controversies. In K. E. Himma & H. Tavani (Eds.), The handbook of information and computer ethics (131-164). Hoboken, NJ: Wiley.
-
(2008)
The Handbook of Information and Computer Ethics
, pp. 131-164
-
-
Tavani, H.1
-
44
-
-
33744457379
-
Privacy as life, liberty, property
-
Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5, 199-210.
-
(2003)
Ethics and Information Technology
, vol.5
, pp. 199
-
-
Volkman, R.1
-
45
-
-
0004251932
-
-
The German text, with a revised English translation, 3rd ed, Malden, MA: Blackwell
-
Wittgenstein, L. (2001). Philosophical investigations. The German text, with a revised English translation (3rd ed., 27-28). Malden, MA: Blackwell.
-
(2001)
Philosophical Investigations
, pp. 27-28
-
-
Wittgenstein, L.1
-
46
-
-
84944539479
-
Total information awareness
-
November 16
-
Washington Post (2002, November 16). Total information awareness. Washington Post, Saturday.
-
(2002)
Washington Post
-
-
|