메뉴 건너뛰기




Volumn , Issue , 2015, Pages 277-302

Embedding privacy and ethical values in big data technology

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; PHILOSOPHICAL ASPECTS;

EID: 84944521694     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-3-319-18552-1_15     Document Type: Chapter
Times cited : (6)

References (46)
  • 1
    • 84896882531 scopus 로고    scopus 로고
    • Harvard personal genome project: Lessons from participatory public research
    • Ball, M. P., Bobe, J. R., Chou, M. F., Clegg, T., Estep, P. W., Lunshof, J. E., et al. (2014). Harvard Personal Genome Project: Lessons from participatory public research. GenomeMedicine, 6(2), 10.
    • (2014) Genomemedicine , vol.6 , Issue.2 , pp. 10
    • Ball, M.P.1    Bobe, J.R.2    Chou, M.F.3    Clegg, T.4    Estep, P.W.5    Lunshof, J.E.6
  • 2
    • 84944564720 scopus 로고    scopus 로고
    • What does the facebook experiment teach us? The medium
    • July 1
    • Boyd, D. (2014, July 1) What does the Facebook Experiment teach us? The Medium. Online.
    • (2014) Online
    • Boyd, D.1
  • 3
    • 84861974217 scopus 로고    scopus 로고
    • Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon
    • Boyd, D., & Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5), 662-679.
    • (2012) Information, Communication & Society , vol.15 , Issue.5 , pp. 662-679
    • Boyd, D.1    Crawford, K.2
  • 4
    • 0347315050 scopus 로고    scopus 로고
    • Examined lives: Informational privacy and the subject as object
    • Cohen, J. (2000). Examined lives: Informational privacy and the subject as object. Stanford Law Review, 52, 1373-1438.
    • (2000) Stanford Law Review , vol.52 , pp. 1373-1438
    • Cohen, J.1
  • 5
    • 84923198441 scopus 로고    scopus 로고
    • Configuring the networked citizen
    • A. Sarat, L. Douglas, & M. M. Umphrey (Eds.), Stanford, CA: Stanford University Press
    • Cohen, J. (2012). Configuring the networked citizen. In A. Sarat, L. Douglas, & M. M. Umphrey (Eds.), Imagining new legalities: Privacy and its possibilities in the 21st century (129-153). Stanford, CA: Stanford University Press.
    • (2012) Imagining New Legalities: Privacy and Its Possibilities in the 21St Century , pp. 129-153
    • Cohen, J.1
  • 6
    • 84944558423 scopus 로고    scopus 로고
    • Designing ethical practice in biosurveillance: The project argus doctrine
    • D. Zeng, H. Chen, C. Castillo-Chavez, B. Lober, & M. Thurmond (Eds.), New York: Springer
    • Collmann, J., & Robinson, A. (2010). Designing ethical practice in biosurveillance: The project Argus doctrine. In D. Zeng, H. Chen, C. Castillo-Chavez, B. Lober, & M. Thurmond (Eds.), Infectious disease informatics and biosurveillance: Research, systems, and case studies. New York: Springer.
    • (2010) Infectious Disease Informatics and Biosurveillance: Research, Systems, and Case Studies
    • Collmann, J.1    Robinson, A.2
  • 7
    • 84876230367 scopus 로고    scopus 로고
    • Managing information security and privacy in health care data mining
    • H. Chen, S. Fuller, C. Friedman, & W. Hersh (Eds.), Springer’s integrated series in information systems, New York: Springer
    • Cooper, T., & Collmann, J. (2005). Managing information security and privacy in health care data mining. In H. Chen, S. Fuller, C. Friedman, & W. Hersh (Eds.), Advances in medical informatics: Knowledge management and data mining in biomedicine (Springer’s integrated series in information systems, Vol. 8). New York: Springer.
    • (2005) Advances in Medical Informatics: Knowledge Management and Data Mining in Biomedicine , vol.8
    • Cooper, T.1    Collmann, J.2
  • 10
    • 84944597262 scopus 로고    scopus 로고
    • Office of the Inspector General, Information Technology Management, Arlington, VA
    • Department of Defense, Office of the Inspector General, Information Technology Management. (2003). Terrorist Information Awareness Program (D-2004-033). Arlington, VA.
    • (2003) Terrorist Information Awareness Program (D-2004-033)
  • 12
    • 84944589852 scopus 로고    scopus 로고
    • What is big data?
    • January 12
    • Dumbill, E. (2012, January 12). What is big data?O’Reilly Radar. Online.
    • (2012) Online
    • Dumbill, E.1
  • 13
    • 84896047357 scopus 로고    scopus 로고
    • The data revolution and economic analysis
    • J. Lerner & S. Stern (Eds.), Cambridge, MA: MIT Press
    • Einav, L., & Levin, J. D. (2013). The data revolution and economic analysis. In J. Lerner & S. Stern (Eds.), Innovation policy and the economy. Cambridge, MA: MIT Press. doi:10.3386/w19035.
    • (2013) Innovation Policy and the Economy
    • Einav, L.1    Levin, J.D.2
  • 14
    • 84926623018 scopus 로고    scopus 로고
    • Retrieved 2014, November 4
    • Executive Office of the President. (2014). Big Data: Seizing opportunities preserving values. Retrieved 2014, November 4, from http://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
    • (2014) Big Data: Seizing Opportunities Preserving Values
  • 16
    • 84944547200 scopus 로고    scopus 로고
    • Why civil rights groups are warning against ‘big data’
    • February 27
    • Fung, B. (2014, February 27). Why civil rights groups are warning against ‘big data’. The Washington Post. Online
    • (2014) The Washington Post
    • Fung, B.1
  • 17
    • 84944588603 scopus 로고    scopus 로고
    • Big data and privacy
    • 2014, November 4
    • Future of Privacy Forum. (2013). Big data and privacy. Making ends meet. Retrieved 2014, November 4, from http://www.futureofprivacy.org/big-data-privacy-workshop-paper- collection/
    • Making Ends Meet
  • 18
    • 41149088350 scopus 로고    scopus 로고
    • Definition, structure, content, use and impacts of electronic health records: A review of the research literature
    • Hayrinen, K., Saranto, K., & Nykanen, P. (2008). Definition, structure, content, use and impacts of electronic health records: A review of the research literature. International Journal of Medical Informatics, 77(5), 291-304.
    • (2008) International Journal of Medical Informatics , vol.77 , Issue.5 , pp. 291
    • Hayrinen, K.1    Saranto, K.2    Nykanen, P.3
  • 19
    • 84856442812 scopus 로고    scopus 로고
    • Who needs stories if you can get the data? Isps in the era of big data crunching
    • Hildebrandt, M. (2011). Who needs stories if you can get the data? ISPs in the era of big data crunching. Philosophy of Technology, 24, 371-390.
    • (2011) Philosophy of Technology , vol.24 , pp. 371
    • Hildebrandt, M.1
  • 20
    • 84866002283 scopus 로고    scopus 로고
    • 2014, November 4
    • IBM. (2014). What is big data? Retrieved 2014, November 4, from http://www.ibm.com/big-data/us/en/
    • (2014) What is Big Data
  • 21
    • 84875482216 scopus 로고    scopus 로고
    • Big data: Issues and challenges moving forward
    • 46th Hawaii International Conference, Maui
    • Kaisler, S., Armour, F., Espinosa, J.A., & Money, W. (2013) Big data: Issues and challenges moving forward. In System Sciences (HICSS). 46th Hawaii International Conference, Maui,2013.
    • (2013) System Sciences (HICSS)
    • Kaisler, S.1    Armour, F.2    Espinosa, J.A.3    Money, W.4
  • 22
    • 84944594659 scopus 로고    scopus 로고
    • 2014, November 4
    • Knewton Inc. (2014). About Knewton. Retrieved 2014, November 4, from http://www.knewton. com/about/
    • About Knewton
  • 23
    • 84911185040 scopus 로고    scopus 로고
    • The data brokers: Selling your personal information
    • August 24, Online
    • Kroft, S. (2014, August 24) The data brokers: Selling your personal information. 60 Minutes. Online.
    • (2014) 60 Minutes
    • Kroft, S.1
  • 24
    • 84944569466 scopus 로고    scopus 로고
    • Verizon wireless sells out customers with creepy new tactic
    • April 24, Online
    • Lazarus, D. (2014, April 24) Verizon wireless sells out customers with creepy new tactic. LosAngeles Times. Online.
    • (2014) Losangeles Times
    • Lazarus, D.1
  • 25
    • 84892530859 scopus 로고    scopus 로고
    • How your data are being deeply mined
    • RetrievedNovember 4
    • Marwick, A. (2014). How your data are being deeply mined. New York Review of Books. RetrievedNovember 4, from http://www.nybooks.com/articles/archives/2014/jan/09/how-your- data-are-being-deeply-mined/?pagination=false
    • (2014) New York Review of Books
    • Marwick, A.1
  • 26
    • 85025656229 scopus 로고    scopus 로고
    • Matei, S. (2014). Email correspondence 2014.
    • (2014)
    • Matei, S.1
  • 27
    • 84944527126 scopus 로고    scopus 로고
    • Everything we know about facebook’s secret mood manipulation experiment
    • June 28, Online
    • Meyer, R. (2014, June 28). Everything we know about Facebook’s secret mood manipulation experiment. The Atlantic. Online.
    • (2014) The Atlantic
    • Meyer, R.1
  • 28
    • 0042923706 scopus 로고    scopus 로고
    • Towards a theory of privacy in the information age
    • Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27-32.
    • (1997) Computers and Society , vol.27 , Issue.3 , pp. 27
    • Moor, J.1
  • 29
    • 84944624933 scopus 로고    scopus 로고
    • Twitter to release all tweets to scientists
    • Moyer, M. (2014). Twitter to release all tweets to scientists. Scientific American, 310(6).
    • (2014) Scientific American , vol.310 , Issue.6
    • Moyer, M.1
  • 30
    • 84944574791 scopus 로고    scopus 로고
    • A vast hidden surveillance network runs across america, powered by the repo industry
    • May 3, Online
    • Musgrave, S. (2014, May 3). A vast hidden surveillance network runs across America, powered by the repo industry. The Boston Globe. Online.
    • (2014) The Boston Globe
    • Musgrave, S.1
  • 31
    • 84944600235 scopus 로고    scopus 로고
    • 2014, November 4
    • National Science Foundation. (2012). Directorate for computer science & information science & engineering, critical techniques and technologies for advancing big data science &engineer- ing (BIGDATA). Retrieved 2014, November 4, from http://www.nsf.gov/funding/pgm_summ. jsp?pims_id=504767
    • (2012)
  • 32
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 101-139.
    • (2004) Washington Law Review , vol.79 , pp. 101
    • Nissenbaum, H.1
  • 35
    • 33744495192 scopus 로고    scopus 로고
    • You are a suspect
    • November 14, Online
    • Safire, W. (2002, November 14). You are a suspect. New York Times. Online.
    • (2002) New York Times
    • Safire, W.1
  • 36
    • 85018950227 scopus 로고    scopus 로고
    • Data mining your children
    • May 15, Online
    • Simon, S. (2014, May 15). Data mining your children. Politico. Online.
    • (2014) Politico
    • Simon, S.1
  • 37
    • 84944549180 scopus 로고    scopus 로고
    • January 23, Co-chairs, US ACM Policy Committee, Association for Computing Machinery, Letter to Honorable John Warner, Chairman
    • Simons, B., & Spafford, E. H. (2003, January 23). Co-chairs, US ACM Policy Committee, Association for Computing Machinery, Letter to Honorable John Warner, Chairman, Senate Committee on Armed Forces.
    • (2003) Senate Committee on Armed Forces
    • Simons, B.1    Spafford, E.H.2
  • 38
    • 84944632102 scopus 로고    scopus 로고
    • Inbloom student data repository to close
    • April 21
    • Singer, N. (2014, April 21). InBloom student data repository to close. New York Times. Online.
    • (2014) New York Times
    • Singer, N.1
  • 40
    • 13844289624 scopus 로고    scopus 로고
    • American Civil Liberties Union, Technology and Liberty Program, 2014, November 4
    • Stanley, J., & Steinhardt, B. (2003). Bigger monster, weaker chains: The growth of an American Surveillance Society. American Civil Liberties Union, Technology and Liberty Program. Retrieved 2014, November 4, from https://www.aclu.org/technology-and-liberty/bigger-mon ster-weaker-chains-growth-american-surveillance-society
    • (2003) Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society
    • Stanley, J.1    Steinhardt, B.2
  • 41
    • 84900839676 scopus 로고    scopus 로고
    • Making the most of a brave new world: Opportunities and considerations for using twitter as a public health monitoring tool
    • Stoove, M. A., & Pedrana, A. E. (2014). Making the most of a brave new world: Opportunities and considerations for using Twitter as a public health monitoring tool. Preventive Medicine, 63, 109-111.
    • (2014) Preventive Medicine , vol.63
    • Stoove, M.A.1    Pedrana, A.E.2
  • 42
    • 84944545235 scopus 로고    scopus 로고
    • Sheryl sandberg not sorry for facebook mood manipulation study
    • July 3, Online
    • Sullivan, G. (2014, July 3). Sheryl Sandberg not sorry for Facebook mood manipulation study.Washington Post. Online.
    • (2014) Washington Post. Online
    • Sullivan, G.1
  • 43
    • 84889497445 scopus 로고    scopus 로고
    • Informational privacy: Concepts, theories, and controversies
    • K. E. Himma & H. Tavani (Eds.), Hoboken, NJ: Wiley
    • Tavani, H. (2008). Informational privacy: Concepts, theories, and controversies. In K. E. Himma & H. Tavani (Eds.), The handbook of information and computer ethics (131-164). Hoboken, NJ: Wiley.
    • (2008) The Handbook of Information and Computer Ethics , pp. 131-164
    • Tavani, H.1
  • 45
    • 0004251932 scopus 로고    scopus 로고
    • The German text, with a revised English translation, 3rd ed, Malden, MA: Blackwell
    • Wittgenstein, L. (2001). Philosophical investigations. The German text, with a revised English translation (3rd ed., 27-28). Malden, MA: Blackwell.
    • (2001) Philosophical Investigations , pp. 27-28
    • Wittgenstein, L.1
  • 46
    • 84944539479 scopus 로고    scopus 로고
    • Total information awareness
    • November 16
    • Washington Post (2002, November 16). Total information awareness. Washington Post, Saturday.
    • (2002) Washington Post


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.