-
1
-
-
84929212571
-
-
Harvard University Press, Cambridge: Book for general public on widespread use and implications of algorithmic decision-maki
-
•Pasquale F. The black box society. The secret algorithms that control money and information. Cambridge: Harvard University Press; 2015. Book for general public on widespread use and implications of algorithmic decision-making.
-
(2015)
The black box society. The secret algorithms that control money and information
-
-
Pasquale, F.1
-
2
-
-
84979663487
-
Big data, big decisions for science, society, and business: report on a research agenda setting workshop
-
Markus ML, Topi H. Big data, big decisions for science, society, and business: report on a research agenda setting workshop. ACM Technical Report. 2015. http://dl.acm.org/citation.cfm?id=2849516. Accessed 1 Aug 2016.
-
(2015)
ACM Technical Report
-
-
Markus, M.L.1
Topi, H.2
-
3
-
-
84912571809
-
New measures of mental state and behavior based on data collected from sensors, smartphones, and the Internet
-
Glenn T, Monteith S. New measures of mental state and behavior based on data collected from sensors, smartphones, and the Internet. Curr Psychiatr Rep. 2014;16:1.
-
(2014)
Curr Psychiatr Rep
, vol.16
, pp. 1
-
-
Glenn, T.1
Monteith, S.2
-
5
-
-
84992583335
-
-
MIT Technology Review. . 2013. Accessed 1 Aug 201
-
MIT Technology Review. Big data gets personal business report. 2013. https://www.technologyreview.com/business-report/big-data-gets-personal/. Accessed 1 Aug 2016.
-
(2013)
Big data gets personal business report
-
-
-
7
-
-
84950980895
-
The filter bubble: how the new personalized web is changing what we read and how we think
-
Pariser E. The filter bubble: how the new personalized web is changing what we read and how we think. Penguin Books; 2011.
-
(2011)
Penguin Books
-
-
Pariser, E.1
-
8
-
-
77954749027
-
Technological due process
-
Citron DK. Technological due process. Wash Univ Law Rev. 2008;85:1249–313.
-
(2008)
Wash Univ Law Rev
, vol.85
, pp. 1249-1313
-
-
Citron, D.K.1
-
9
-
-
84992637313
-
From daguerreotypes to algorithms: machines, expertise, and three forms of objectivity
-
Christin A. From daguerreotypes to algorithms: machines, expertise, and three forms of objectivity. ACM SIGCAS Comput Soc. 2016;46:27–32.
-
(2016)
ACM SIGCAS Comput Soc
, vol.46
, pp. 27-32
-
-
Christin, A.1
-
11
-
-
84992563672
-
-
•. 2016. Accessed 1 Aug 2016. Report of potential negative impacts of big data on civil rights with recommendations
-
•Executive Office of the President. Big data: a report on algorithmic systems, opportunity, and civil rights. 2016. https://www.whitehouse.gov/sites/default/files/microsites/ostp/2016_0504_data_discrimination.pdf Accessed 1 Aug 2016. Report of potential negative impacts of big data on civil rights with recommendations.
-
(2016)
Executive Office of the President. Big data: a report on algorithmic systems, opportunity, and civil rights
-
-
-
12
-
-
84992649767
-
The personalized and the personal: socially responsible innovation through big data
-
Guszcza J, Schweidel D, Dutta S. The personalized and the personal: socially responsible innovation through big data. Deloitte Review No 14. 2014. http://dupress.com/articles/dr14-personalized-and-personal/. Accessed 1 Aug 2016.
-
(2014)
Deloitte Review No
, pp. 14
-
-
Guszcza, J.1
Schweidel, D.2
Dutta, S.3
-
13
-
-
82455191171
-
-
WEF (World Economic Forum). . 2011. Accessed 1 Aug 201
-
WEF (World Economic Forum). Personal data: the emergence of a new asset class. 2011. https://www.weforum.org/reports/personal-data-emergence-new-asset-class/. Accessed 1 Aug 2016.
-
(2011)
Personal data: the emergence of a new asset class
-
-
-
14
-
-
85056226112
-
Big data: a tool for inclusion or Exclusion?
-
FTC (Federal Trade Commission). Big data: a tool for inclusion or Exclusion? Understanding the issues (FTC Report). 2016. https://www.ftc.gov/reports/big-data-tool-inclusion-or-exclusion-understanding-issues-ftc-report. Accessed 1 Aug 2016.
-
(2016)
Understanding the issues (FTC Report)
-
-
-
15
-
-
84861974217
-
Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon
-
Boyd D, Crawford K. Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf Commun Soc. 2012;15:662–79.
-
(2012)
Inf Commun Soc
, vol.15
, pp. 662-679
-
-
Boyd, D.1
Crawford, K.2
-
16
-
-
84948706272
-
A theory of creepy: technology, privacy and shifting social norms
-
Report on big data and changing social norms from legal perspecti
-
•Tene O, Polonetsky J. A theory of creepy: technology, privacy and shifting social norms. Yale JL Technol. 2013;16:59. Report on big data and changing social norms from legal perspective.
-
(2013)
Yale JL Technol
, vol.16
, pp. 59
-
-
Tene, O.1
Polonetsky, J.2
-
17
-
-
84992546468
-
-
. Accessed 1 Aug 201
-
NIMH. Statistics. http://www.nimh.nih.gov/health/statistics/index.shtml. 2016. Accessed 1 Aug 2016.
-
(2016)
NIMH. Statistics
-
-
-
18
-
-
84912527446
-
Privacy in the digital world: medical and health data outside of HIPAA protections
-
Glenn T, Monteith S. Privacy in the digital world: medical and health data outside of HIPAA protections. Curr Psychiatr Rep. 2014;16:494.
-
(2014)
Curr Psychiatr Rep
, vol.16
, pp. 494
-
-
Glenn, T.1
Monteith, S.2
-
19
-
-
84953316131
-
Availability of prescription drugs for bipolar disorder at online pharmacies
-
PID: 267660
-
Monteith S, Glenn T, Bauer R, et al. Availability of prescription drugs for bipolar disorder at online pharmacies. J Affect Disord. 2016;193:59–65.
-
(2016)
J Affect Disord
, vol.193
, pp. 59-65
-
-
Monteith, S.1
Glenn, T.2
Bauer, R.3
-
20
-
-
84952812203
-
-
OPC (Office of the Privacy Commissioner of Canada).. 2014. Accessed 1 Aug 201
-
OPC (Office of the Privacy Commissioner of Canada). Metadata and privacy—a technical and legal overview. 2014. https://www.priv.gc.ca/information/research-recherche/2014/md_201410_e.asp. Accessed 1 Aug 2016.
-
(2014)
Metadata and privacy—a technical and legal overview
-
-
-
21
-
-
84961586769
-
-
•ACLU of California. . 2014. Accessed 1 Aug 2016. Report on the importance and sensitivity of metadat
-
•ACLU of California. Metadata: piecing together a Format solution. 2014. https://www.aclunc.org/publications/metadata-piecing-together-privacy-solution Accessed 1 Aug 2016. Report on the importance and sensitivity of metadata.
-
(2014)
Metadata: piecing together a Format solution
-
-
-
22
-
-
84992647826
-
Why should we care what Fitbit shares—a proposed statutory solution to protect sensitive personal fitness information
-
Christovich MM. Why should we care what Fitbit shares—a proposed statutory solution to protect sensitive personal fitness information. Hast Commun Ent LJ. 2016;38:91.
-
(2016)
Hast Commun Ent LJ
, vol.38
, pp. 91
-
-
Christovich, M.M.1
-
23
-
-
84992668228
-
The Internet of Things that talk about you behind your back
-
Schneier B. The Internet of Things that talk about you behind your back. Schneier on Security. 2016. https://www.schneier.com/blog/archives/2016/01/the_internet_of.html. Accessed 1 Aug 2016.
-
(2016)
Schneier on Security
-
-
Schneier, B.1
-
24
-
-
84992666502
-
-
•Pentland A. Reinventing society in the wake of big data. Edge. 2012. Accessed 1 Aug 2016
-
•Pentland A. Reinventing society in the wake of big data. Edge. 2012. https://www.edge.org/conversation/alex_sandy_pentland-reinventing-society-in-the-wake-of-big-data. Accessed 1 Aug 2016. Short interview with Alex (Sandy) Pentland, pioneering computer scientist from MIT Media Lab.
-
(2012)
Short interview with Alex (Sandy) Pentland, pioneering computer scientist from MIT Media Lab.
-
-
-
25
-
-
84936941103
-
-
Martin KE. Ethical issues in the big data industry. . (14:2
-
Martin KE. Ethical issues in the big data industry. MIS Quarterly Executive. 2015 (14:2).
-
(2015)
MIS Quarterly Executive
-
-
-
27
-
-
84992569945
-
-
Washington AL. Accessed 1 Aug 201
-
Washington AL. Can big data be described as a data supply chain? 2014. Available at SSRN: http://ssrn.com/abstract=2577989. Accessed 1 Aug 2016.
-
(2014)
Can big data be described as a data supply chain?
-
-
-
28
-
-
84992667123
-
-
••PCAST (President’s Council of Advisors on Science and Technology). Big data and privacy: a technological perspective. 2014. Accessed 1 Aug 2016
-
••PCAST (President’s Council of Advisors on Science and Technology). Big data and privacy: a technological perspective. 2014. http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf Accessed 1 Aug 2016. Report on challenges to privacy from big data with recommendations.
-
(2014)
Report on challenges to privacy from big data with recommendations
-
-
-
30
-
-
84892154560
-
The hidden biases in big data
-
Crawford, K. The hidden biases in big data. Harv Bus Rev. 2013. http://blogs.hbr.org/2013/04/the-hidden-biases-in-big-data. Accessed 1 Aug 2016.
-
(2013)
Harv Bus Rev
-
-
Crawford, K.1
-
31
-
-
85046284551
-
Big data are coming to psychiatry: a general introduction
-
PID: 264405
-
Monteith S, Glenn T, Geddes J, et al. Big data are coming to psychiatry: a general introduction. Int J Bipolar Disord. 2015;3(1):21.
-
(2015)
Int J Bipolar Disord
, vol.3
, Issue.1
, pp. 21
-
-
Monteith, S.1
Glenn, T.2
Geddes, J.3
-
33
-
-
84992677984
-
-
••NRC (National Research Council US) Commititee on the Analysis of Massive Data. Frontiers in massive data analysis. 2013. Accessed 1 Aug 2016
-
••NRC (National Research Council US) Commititee on the Analysis of Massive Data. Frontiers in massive data analysis. 2013. http://www.nap.edu/catalog/18374/frontiers-in-massive-data-analysis Accessed 1 Aug 2016. Overview book on the technical challenges in the analysis of big data.
-
Overview book on the technical challenges in the analysis of big data
-
-
-
35
-
-
85104787192
-
Credit scoring, statistical techniques and evaluation criteria: a review of the literature
-
Abdou HA, Pointon J. Credit scoring, statistical techniques and evaluation criteria: a review of the literature. Intell Syst Account Finan Manag. 2011;18:59–88.
-
(2011)
Intell Syst Account Finan Manag
, vol.18
, pp. 59-88
-
-
Abdou, H.A.1
Pointon, J.2
-
36
-
-
84957863731
-
Accountability in algorithmic decision making
-
Diakopoulos N. Accountability in algorithmic decision making. Commun ACM. 2016;59:56–62.
-
(2016)
Commun ACM
, vol.59
, pp. 56-62
-
-
Diakopoulos, N.1
-
38
-
-
84919389078
-
Challenges of big data analysis
-
PID: 254194
-
Fan J, Han F, Liu H. Challenges of big data analysis. Natl Sci Rev. 2014;1:293–314.
-
(2014)
Natl Sci Rev
, vol.1
, pp. 293-314
-
-
Fan, J.1
Han, F.2
Liu, H.3
-
39
-
-
84867539048
-
A few useful things to know about machine learning
-
Domingos P. A few useful things to know about machine learning. Commun ACM. 2012;55:78–87.
-
(2012)
Commun ACM
, vol.55
, pp. 78-87
-
-
Domingos, P.1
-
40
-
-
84890008245
-
The impact of overfitting and overgeneralization on the classification accuracy in data mining
-
Soft computing for knowledge discovery and data mining, Springe
-
Pham HN, Triantaphyllou E. The impact of overfitting and overgeneralization on the classification accuracy in data mining. In: Maimon O, Rokach L, editors. Soft computing for knowledge discovery and data mining. Springer US. 2008. p. 391–431.
-
(2008)
Maimon O
, pp. 391-431
-
-
Pham, H.N.1
Triantaphyllou, E.2
Rokach, L.3
-
41
-
-
84894107954
-
Selection bias in credit scorecard evaluation
-
Hand DJ, Adams NM. Selection bias in credit scorecard evaluation. J Oper Res Soc. 2014;65:408–15.
-
(2014)
J Oper Res Soc
, vol.65
, pp. 408-415
-
-
Hand, D.J.1
Adams, N.M.2
-
42
-
-
84897791696
-
Beyond big data
-
Varian HR. Beyond big data. Bus Econ. 2014;49:27–31.
-
(2014)
Bus Econ
, vol.49
, pp. 27-31
-
-
Varian, H.R.1
-
43
-
-
85011556815
-
Big data, big questions: the big data divide
-
Andrejevic M. Big data, big questions: the big data divide. Int J Commun. 2014;8:1673–89.
-
(2014)
Int J Commun
, vol.8
, pp. 1673-1689
-
-
Andrejevic, M.1
-
44
-
-
84953212588
-
Degrees of freedom, dimensions of power
-
Benkler Y. Degrees of freedom, dimensions of power. Daedalus. 2016;145:18–32.
-
(2016)
Daedalus
, vol.145
, pp. 18-32
-
-
Benkler, Y.1
-
45
-
-
84992581631
-
-
Accessed 1 Aug 201
-
Acxiom. Acxiom Corporation annual report 2014. http://files.shareholder.com/downloads/ACXM/0x0x763250/A1DBFBD8-E136-4701-B0F2-3DC695E5ED08/acxiom2014_Annual_Report_FINAL_RRD_PDF_.pdf. Accessed 1 Aug 2016.
-
Acxiom. Acxiom Corporation annual report 2014
-
-
-
46
-
-
84876343343
-
New directions in privacy: disclosure, unfairness and externalities
-
MacCarthy M. New directions in privacy: disclosure, unfairness and externalities. ISJLP. 2010;6:425.
-
(2010)
ISJLP
, vol.6
, pp. 425
-
-
MacCarthy, M.1
-
47
-
-
84952317192
-
Privacy as a public good
-
Fairfield JA, Engel C. Privacy as a public good. Duke Law J. 2015;65:385–569.
-
(2015)
Duke Law J
, vol.65
, pp. 385-569
-
-
Fairfield, J.A.1
Engel, C.2
-
48
-
-
84906046016
-
-
Accessed 1 Aug 201
-
FTC. Data brokers a call for transparency and accountability. 2014. https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf. Accessed 1 Aug 2016.
-
(2014)
FTC. Data brokers a call for transparency and accountability
-
-
-
49
-
-
84992581630
-
Secret consumer scores and segmentations: separating consumer ‘haves’ from ‘have-nots’
-
Schmitz A. Secret consumer scores and segmentations: separating consumer ‘haves’ from ‘have-nots’. Michigan State Law Rev. 2014:1411.
-
(2014)
Michigan State Law Rev
, pp. 1411
-
-
Schmitz, A.1
-
51
-
-
84894276563
-
The relevance of algorithms
-
Gillespie T, Boczkowski PJ, Foot KA, (eds), MIT Press, Cambrid
-
Gillepsie T. The relevance of algorithms. In: Gillespie T, Boczkowski PJ, Foot KA, editors. Media technologies: essays on communication, materiality, and society. Cambridge: MIT Press; 2014. p. 167–95.
-
(2014)
Media technologies: essays on communication, materiality, and society
, pp. 167-195
-
-
Gillepsie, T.1
-
52
-
-
84900551156
-
Prediction, preemption, presumption: how big data threatens big picture privacy
-
Kerr I, Earle J. Prediction, preemption, presumption: how big data threatens big picture privacy. Stanf Law Rev Online. 2013;66:65.
-
(2013)
Stanf Law Rev Online
, vol.66
, pp. 65
-
-
Kerr, I.1
Earle, J.2
-
53
-
-
84992534842
-
The scoring of America: how secret consumer scores threaten your privacy and your future
-
Dixon P, Gellman B. The scoring of America: how secret consumer scores threaten your privacy and your future. World Privacy Forum. 2014. https://www.worldprivacyforum.org/2014/04/wpf-report-the-scoring-of-america-how-secret-consumer-scores-threaten-your-privacy-and-your-future/. Accessed 1 Aug 2016.
-
(2014)
World Privacy Forum
-
-
Dixon, P.1
Gellman, B.2
-
54
-
-
84957400719
-
-
FDIC (Federal Deposit Insurance Corporation). . Accessed 1 Aug 201
-
FDIC (Federal Deposit Insurance Corporation). Scoring and modeling. 2007. https://www.fdic.gov/regulations/examinations/credit_card/pdf_version/ch8.pdf. Accessed 1 Aug 2016.
-
(2007)
Scoring and modeling
-
-
-
55
-
-
84897434478
-
The scored society: due process for automated predictions
-
Citron DK, Pasquale FA. The scored society: due process for automated predictions. Washington Law Rev. 2014;89.
-
(2014)
Washington Law Rev
, pp. 89
-
-
Citron, D.K.1
Pasquale, F.A.2
-
56
-
-
84981271501
-
Thinking critically about and researching algorithms
-
Kitchin R. Thinking critically about and researching algorithms. The Programmable City. 2014. http://eprints.maynoothuniversity.ie/5715/1/RK_Thinking-Critically.pdf. Accessed 1 Aug 2016.
-
(2014)
The Programmable City
-
-
Kitchin, R.1
-
57
-
-
79951867801
-
-
Citron, DK, . University of Chicago Legal Forum. 2008. p 355–387. U of Maryland Legal Studies Research Paper No. 2008-1. Accessed 1 Aug 201
-
Citron, DK, Open code governance. University of Chicago Legal Forum. 2008. p 355–387. U of Maryland Legal Studies Research Paper No. 2008-1. http://ssrn.com/abstract=1081689. Accessed 1 Aug 2016.
-
(2008)
Open code governance
-
-
-
58
-
-
84992677929
-
Algorithmic accountability reporting: on the investigation of black boxes. Tow Center for Digital Journalism, Columbia Journalism School
-
Diakopoulos N. Algorithmic accountability reporting: on the investigation of black boxes. Tow Center for Digital Journalism, Columbia Journalism School, New York NY. 2013. http://towcenter.org/research/algorithmic-accountability-on-the-investigation-of-black-boxes-2/. Accessed 1 Aug 2016.
-
(2013)
New York NY
-
-
Diakopoulos, N.1
-
60
-
-
84900849170
-
A multidisciplinary survey on discrimination analysis
-
Romei A, Ruggieri S. A multidisciplinary survey on discrimination analysis. Knowl Eng Rev. 2014;29:582–638.
-
(2014)
Knowl Eng Rev
, vol.29
, pp. 582-638
-
-
Romei, A.1
Ruggieri, S.2
-
61
-
-
84992585222
-
Future of privacy forum workshop on big data and privacy: making ends meet
-
Hoofnagle CJ. How the fair credit reporting act regulates big data (September 10, 2013). Future of privacy forum workshop on big data and privacy: making ends meet. 2013 http://ssrn.com/abstract=2432955. Accessed 1 Aug 2016.
-
(2013)
2013
-
-
-
62
-
-
84992638522
-
Find out what big data knows about you (it may be very wrong)
-
Hicken M. Find out what big data knows about you (it may be very wrong). CNN. 2013. http://money.cnn.com/2013/09/05/pf/acxiom-consumer-data/. Accessed 1 Aug 2016.
-
(2013)
CNN
-
-
Hicken, M.1
-
64
-
-
84992589332
-
A review of the data broker industry: collection, use
-
Senate. A review of the data broker industry: collection, use, and sale of consumer data for marketing purposes. 2013. https://www.commerce.senate.gov/public/_cache/files/0d2b3642-6221-4888-a631-08f2f255b577/AE5D72CBE7F44F5BFC846BECE22C875B.12.18.13-senate-commerce-committee-report-on-data-broker-industry.pdf. Accessed 1 Aug 2016.
-
(2013)
and sale of consumer data for marketing purposes
-
-
-
65
-
-
84959138494
-
Why Ben Bernanke can’t refinance his mortgage
-
Irwin N. Why Ben Bernanke can’t refinance his mortgage. The New York Times. 2014. http://www.nytimes.com/2014/10/03/upshot/why-ben-bernanke-cant-refinance-his-mortgage.html?_r=0. Accessed 1 Aug 2016.
-
(2014)
The New York Times
-
-
Irwin, N.1
-
66
-
-
84992585237
-
FDA: software failures responsible for 24 percent of all medical device recalls
-
FDA. FDA: software failures responsible for 24 percent of all medical device recalls. FDAnews Device Daily Bulletin. 2012. http://www.fdanews.com/articles/147391-fda-software-failures-responsible-for-24-percent-of-all-medical-device-recalls. Accessed 1 Aug 2016.
-
(2012)
FDAnews Device Daily Bulletin
-
-
-
67
-
-
84992531893
-
Successful and schizophrenic
-
Saks ER. Successful and schizophrenic. The New York Times. 2013. http://www.nytimes.com/2013/01/27/opinion/sunday/schizophrenic-not-stupid.html?_r=0. Accessed 1 Aug 2016.
-
(2013)
The New York Times
-
-
Saks, E.R.1
-
68
-
-
84922012959
-
-
Zarsky T. Understanding discrimination in the scored society. . ;89(4
-
Zarsky T. Understanding discrimination in the scored society. Washington Law Review. 2014;89(4).
-
(2014)
Washington Law Review
-
-
-
69
-
-
79953743364
-
Relationship between household income and mental disorders: findings from a population-based longitudinal study
-
PID: 214643
-
Sareen J, Afifi TO, McMillan KA, et al. Relationship between household income and mental disorders: findings from a population-based longitudinal study. Arch Gen Psychiatry. 2011;68:419–27.
-
(2011)
Arch Gen Psychiatry
, vol.68
, pp. 419-427
-
-
Sareen, J.1
Afifi, T.O.2
McMillan, K.A.3
-
70
-
-
84945490441
-
Long-term effects of mental disorders on employment in the National Comorbidity Survey ten-year follow-up
-
PID: 262116
-
Mojtabai R, Stuart EA, Hwang I, et al. Long-term effects of mental disorders on employment in the National Comorbidity Survey ten-year follow-up. Soc Psychiatry Psychiatr Epidemiol. 2015;50:1657–68.
-
(2015)
Soc Psychiatry Psychiatr Epidemiol
, vol.50
, pp. 1657-1668
-
-
Mojtabai, R.1
Stuart, E.A.2
Hwang, I.3
-
71
-
-
33750547095
-
Employment barriers for persons with psychiatric disabilities: update of a report for the President’s Commission
-
PID: 170355
-
Cook JA. Employment barriers for persons with psychiatric disabilities: update of a report for the President’s Commission. Psychiatr Serv. 2006;57:1391–405.
-
(2006)
Psychiatr Serv
, vol.57
, pp. 1391-1405
-
-
Cook, J.A.1
-
72
-
-
84960855606
-
Interest in technology-based therapies hampered by access: a survey of veterans with serious mental illnesses
-
Klee A, Stacy M, Rosenheck R et al. Interest in technology-based therapies hampered by access: a survey of veterans with serious mental illnesses. Psychiatr Rehabil J. 2016.
-
(2016)
Psychiatr Rehabil J
-
-
Klee, A.1
Stacy, M.2
Rosenheck, R.3
-
73
-
-
84991478637
-
Interest in use of technology for healthcare among veterans receiving treatment for mental health
-
Miller CJ, McInnes DK, Stolzmann K et al. Interest in use of technology for healthcare among veterans receiving treatment for mental health. Telemed J E Health. 2016.
-
(2016)
Telemed J E Health
-
-
Miller, C.J.1
McInnes, D.K.2
Stolzmann, K.3
-
74
-
-
27844598334
-
-
Blumberg SJ, Luke JV. Wireless substitution: early release of estimates from the National Health Interview Survey, July–December 2014. CDC, , Released 06/2015. Accessed 1 Aug 201
-
Blumberg SJ, Luke JV. Wireless substitution: early release of estimates from the National Health Interview Survey, July–December 2014. CDC, National Center for Health Statistics, Released 06/2015. http://www.cdc.gov/nchs/data/nhis/earlyrelease/wireless201506.pdf. Accessed 1 Aug 2016.
-
(2014)
National Center for Health Statistics
-
-
-
75
-
-
84983250963
-
-
Gonzales AL, Ems L, Suri VR. Cell phone disconnection disrupts access to healthcare and health resources: a technology maintenance perspective. .;146144481455867
-
Gonzales AL, Ems L, Suri VR. Cell phone disconnection disrupts access to healthcare and health resources: a technology maintenance perspective. New Media Soc. 2014;1461444814558670.
-
(2014)
New Media Soc
-
-
-
76
-
-
84948586375
-
The contemporary US digital divide: from initial access to technology maintenance
-
Study finding that US poor have inconsistent access to technology and resulting impac
-
••Gonzales A. The contemporary US digital divide: from initial access to technology maintenance. Inf Commun Soc. 2016;19:234–48. Study finding that US poor have inconsistent access to technology and resulting impacts.
-
(2016)
Inf Commun Soc
, vol.19
, pp. 234-248
-
-
Gonzales, A.1
-
77
-
-
84921495826
-
Big data and its exclusions
-
Lerman J. Big data and its exclusions. Stanf Law Rev Online. 2013;3:66.
-
(2013)
Stanf Law Rev Online
, vol.3
, pp. 66
-
-
Lerman, J.1
-
79
-
-
84860506437
-
What is the 1% rule?
-
Arthur C. What is the 1% rule? The Guardian. 2006. https://www.theguardian.com/technology/2006/jul/20/guardianweeklytechnologysection2. Accessed 1 Aug 2016.
-
(2006)
The Guardian
-
-
Arthur, C.1
-
80
-
-
84920113698
-
Describing the distribution of engagement in an Internet support group by post frequency: a comparison of the 90-9-1 principle and Zipf’s Law
-
Carron-Arthur B, Cunningham JA, Griffiths KM. Describing the distribution of engagement in an Internet support group by post frequency: a comparison of the 90-9-1 principle and Zipf’s Law. Internet Interv. 2014;1:165–8.
-
(2014)
Internet Interv
, vol.1
, pp. 165-168
-
-
Carron-Arthur, B.1
Cunningham, J.A.2
Griffiths, K.M.3
-
81
-
-
84897652680
-
The 1% rule in four digital health social networks: an observational study
-
PID: 24496109, Study confirming the 90-9-1 rule for participation in 4 mental health related online communities (90% observe only, 9% contribute rarely, and 1% create the vast majority of conten
-
•van Mierlo T. The 1% rule in four digital health social networks: an observational study. J Med Internet Res. 2014;16:e33. Study confirming the 90-9-1 rule for participation in 4 mental health related online communities (90% observe only, 9% contribute rarely, and 1% create the vast majority of content).
-
(2014)
J Med Internet Res
, vol.16
-
-
van Mierlo, T.1
-
82
-
-
84957014894
-
Comparison of drug information on consumer drug review sites versus authoritative health information websites
-
COI: 1:CAS:528:DC%2BC28XhsVGru7c%
-
Chew SW, Khoo CS. Comparison of drug information on consumer drug review sites versus authoritative health information websites. J Assoc Inf Sci Technol. 2016;67:333–49.
-
(2016)
J Assoc Inf Sci Technol
, vol.67
, pp. 333-349
-
-
Chew, S.W.1
Khoo, C.S.2
-
83
-
-
80053496725
-
Can online consumers contribute to drug knowledge? A mixed-methods comparison of consumer-generated and professionally controlled psychotropic medication information on the internet
-
PID: 218076
-
Hughes S, Cohen D. Can online consumers contribute to drug knowledge? A mixed-methods comparison of consumer-generated and professionally controlled psychotropic medication information on the internet. J Med Internet Res. 2011;13:e53.
-
(2011)
J Med Internet Res
, vol.13
-
-
Hughes, S.1
Cohen, D.2
-
84
-
-
84898604274
-
Health research 2.0
-
COI: 1:CAS:528:DC%2BC2cXhtVKjur7O, PID: 245179
-
Weigmann K. Health research 2.0. EMBO Rep. 2014;15:223–6.
-
(2014)
EMBO Rep
, vol.15
, pp. 223-226
-
-
Weigmann, K.1
-
85
-
-
84992543934
-
-
Schneier B. . 2013. Accessed 1 Aug 201
-
Schneier B. Phishing has gotten very good. 2013. https://www.schneier.com/blog/archives/2013/03/phishing_has_go.html. Accessed 1 Aug 2016.
-
(2013)
Phishing has gotten very good
-
-
-
86
-
-
84968927988
-
Could you fall for a scam? Spam filters are passe. What we need is software that unmasks fraudsters
-
Short article on modern e-mail sca
-
•Jakobsson M, Leddy W. Could you fall for a scam? Spam filters are passe. What we need is software that unmasks fraudsters. IEEE Spectr. 2016;53:40–55. Short article on modern e-mail scams.
-
(2016)
IEEE Spectr
, vol.53
, pp. 40-55
-
-
Jakobsson, M.1
Leddy, W.2
-
88
-
-
84992648452
-
-
The social engineering behind phishing, The Next Wa
-
Mayhorn CB, Murphy-Hill E, Zielinska OA, et al. The social engineering behind phishing. The Next Wave. 2015. https://www.nsa.gov/resources/everyone/digital-media-center/publications/the-next-wave/assets/files/TNW-21-1.pdf. Accessed 1 Aug 2016.
-
(2015)
et al
-
-
Mayhorn, C.B.1
Murphy-Hill, E.2
Zielinska, O.A.3
-
89
-
-
79955890012
-
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
-
Vishwanath A, Herath T, Chen R, et al. Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis Support Syst. 2011;51:576–86.
-
(2011)
Decis Support Syst
, vol.51
, pp. 576-586
-
-
Vishwanath, A.1
Herath, T.2
Chen, R.3
-
90
-
-
84859817405
-
Training users to counteract phishing
-
PID: 223172
-
Mayhorn CB, Nyeste PG. Training users to counteract phishing. Work. 2012;41(Supplement 1):3549–52.
-
(2012)
Work
, vol.41
, pp. 3549-3552
-
-
Mayhorn, C.B.1
Nyeste, P.G.2
-
91
-
-
85142754377
-
pilot study of cyber security and privacy related behavior and personality traits. Proceedings of the 22nd International Conference on World Wide Web
-
Halevi T, Lewis J, Memon N. A pilot study of cyber security and privacy related behavior and personality traits. Proceedings of the 22nd International Conference on World Wide Web. ACM. 2013.
-
(2013)
ACM
-
-
Halevi, T.1
Lewis, J.2
Memon, N.A.3
-
92
-
-
84992648439
-
-
Van Wilsem J. ‘Bought it, but never got it’assessing risk factors for online consumer fraud victimization. . 2011;jcr05
-
Van Wilsem J. ‘Bought it, but never got it’assessing risk factors for online consumer fraud victimization. Eur Sociol Rev. 2011;jcr053.
-
(2011)
Eur Sociol Rev
-
-
-
93
-
-
84893921823
-
The online dating romance scam: causes and consequences of victimhood
-
Buchanan T, Whitty MT. The online dating romance scam: causes and consequences of victimhood. Psychol Crime Law. 2014;20:261–83.
-
(2014)
Psychol Crime Law
, vol.20
, pp. 261-283
-
-
Buchanan, T.1
Whitty, M.T.2
-
94
-
-
84992534871
-
-
Algarni A, Xu Y, Chan T, et al. Social engineering in social networking sites: how good becomes evil (). . Paper 271. Accessed 1 Aug 201
-
Algarni A, Xu Y, Chan T, et al. Social engineering in social networking sites: how good becomes evil (2014). PACIS (Pacific Asia Conference on Information Systems) 2014 Proceedings. Paper 271. http://aisel.aisnet.org/pacis2014/271. Accessed 1 Aug 2016.
-
(2014)
PACIS (Pacific Asia Conference on Information Systems) 2014 Proceedings
-
-
-
95
-
-
39749142244
-
Wisecrackers: a theory‐grounded investigation of phishing and pretext social engineering threats to information security
-
Workman M. Wisecrackers: a theory‐grounded investigation of phishing and pretext social engineering threats to information security. J Am Soc Inf Sci Technol. 2008;59:662–74.
-
(2008)
J Am Soc Inf Sci Technol
, vol.59
, pp. 662-674
-
-
Workman, M.1
-
96
-
-
84992667182
-
-
University of Exeter School of Psychology. The psychology of scams: provoking and committing errors of judgement. . . Accessed 1 Aug 201
-
University of Exeter School of Psychology. The psychology of scams: provoking and committing errors of judgement. Prepared for the Office of Fair Trading. 2009. https://ore.exeter.ac.uk/repository/bitstream/handle/10871/20958/OfficeOfFairTrading%202009.pdf?sequence=1. Accessed 1 Aug 2016.
-
(2009)
Prepared for the Office of Fair Trading
-
-
-
98
-
-
77954007030
-
-
Sheng S, Holbrook M, Kumaraguru P, et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. (pp. 373–382). AC
-
Sheng S, Holbrook M, Kumaraguru P, et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2010 Apr 10 (pp. 373–382). ACM.
-
In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2010 Apr 10
-
-
-
99
-
-
84992534884
-
Mobile users 3 times more vulnerable to phishing attacks
-
Boodaei M. Mobile users 3 times more vulnerable to phishing attacks. January 4, 2011. https://securityintelligence.com/mobile-users-3-times-more-vulnerable-to-phishing-attacks/ Accessed 1 Aug 2016.
-
(2011)
January
, pp. 4
-
-
Boodaei, M.1
-
100
-
-
85018974022
-
-
Gangadharan SP. The downside of digital inclusion: expectations and experiences of privacy and surveillance among marginal Internet users. . 2015:146144481561405
-
Gangadharan SP. The downside of digital inclusion: expectations and experiences of privacy and surveillance among marginal Internet users. New Media Soc. 2015:1461444815614053.
-
New Media Soc
-
-
-
101
-
-
84885397448
-
Financial victimization of adults with severe mental illness
-
PID: 240268
-
Claycomb M, Black AC, Wilber C, et al. Financial victimization of adults with severe mental illness. Psychiatr Serv. 2013;64:918–20.
-
(2013)
Psychiatr Serv
, vol.64
, pp. 918-920
-
-
Claycomb, M.1
Black, A.C.2
Wilber, C.3
-
102
-
-
84885337895
-
Correlates of susceptibility to scams in older adults without dementia
-
PID: 244992
-
James BD, Boyle PA, Bennett DA. Correlates of susceptibility to scams in older adults without dementia. J Elder Abuse Negl. 2014;26:107–22.
-
(2014)
J Elder Abuse Negl
, vol.26
, pp. 107-122
-
-
James, B.D.1
Boyle, P.A.2
Bennett, D.A.3
-
103
-
-
84950121802
-
Psychological and functional vulnerability predicts fraud cases in older adults: results of a longitudinal study
-
PID: 270655
-
Lichtenberg PA, Sugarman MA, Paulson D, et al. Psychological and functional vulnerability predicts fraud cases in older adults: results of a longitudinal study. Clin Gerontol. 2016;39:48–63.
-
(2016)
Clin Gerontol
, vol.39
, pp. 48-63
-
-
Lichtenberg, P.A.1
Sugarman, M.A.2
Paulson, D.3
-
104
-
-
84992633600
-
Still no free lunch: recent regulatory initiatives to protect seniors from fraud in the sale of investment products
-
Knauer IB, Zarychta MC. Still no free lunch: recent regulatory initiatives to protect seniors from fraud in the sale of investment products. Secur Regul Law J. 2013;41:397–410.
-
(2013)
Secur Regul Law J
, vol.41
, pp. 397-410
-
-
Knauer, I.B.1
Zarychta, M.C.2
-
106
-
-
84992589858
-
-
Accessed 1 Aug 201
-
FBI. Romance scams. 2015. https://www.fbi.gov/audio-repository/news-podcasts-thisweek-romance-scams.mp3/view. Accessed 1 Aug 2016.
-
(2015)
FBI. Romance scams
-
-
-
108
-
-
84992589859
-
Why the workplace of 2016 could echo Orwell’s 1984
-
Dredge S. Why the workplace of 2016 could echo Orwell’s 1984. The Guardian. 2015. https://www.theguardian.com/technology/2015/aug/23/data-and-tracking-devices-in-the-workplace-amazon. Accessed 1 Aug 2016.
-
(2015)
The Guardian
-
-
Dredge, S.1
-
109
-
-
84992658089
-
Employers still bullish on wellness programs
-
Deloitte. Employers still bullish on wellness programs. Findings from the 2015 surveys of employers and health care consumers. 2015. http://www2.deloitte.com/content/dam/Deloitte/us/Documents/life-sciences-health-care/us-lshc-wellness-programs.pdf. Accessed 1 Aug 2016.
-
(2015)
Findings from the 2015 surveys of employers and health care consumers
-
-
-
110
-
-
78650918350
-
The data-driven life
-
Wolf G. The data-driven life. The New York Times. 2010. http://www.nytimes.com/2010/05/02/magazine/02self-measurement-t.html?_r=0. Accessed 1 Aug 2016.
-
(2010)
The New York Times
-
-
Wolf, G.1
-
111
-
-
84992628698
-
That’s unfair! or is it? Big data, discrimination and the FTC’s unfairness authority
-
Hirsch DD. That’s unfair! or is it? Big data, discrimination and the FTC’s unfairness authority. Ky LJ. 2014;103:345.
-
(2014)
Ky LJ
, vol.103
, pp. 345
-
-
Hirsch, D.D.1
-
113
-
-
84952683777
-
The stigma of mental illness in the labor market
-
PID: 268571
-
Hipes C, Lucas J, Phelan JC, et al. The stigma of mental illness in the labor market. Soc Sci Res. 2016;56:16–25.
-
(2016)
Soc Sci Res
, vol.56
, pp. 16-25
-
-
Hipes, C.1
Lucas, J.2
Phelan, J.C.3
-
114
-
-
84881557547
-
Public stigma of mental illness in the United States: a systematic literature review
-
PID: 228330
-
Parcesepe AM, Cabassa LJ. Public stigma of mental illness in the United States: a systematic literature review. Adm Policy Ment Health. 2013;40:384–99.
-
(2013)
Adm Policy Ment Health
, vol.40
, pp. 384-399
-
-
Parcesepe, A.M.1
Cabassa, L.J.2
-
115
-
-
84937773817
-
Data, privacy, and the greater good
-
COI: 1:CAS:528:DC%2BC2MXhtFKkt7bL, PID: 26185242, Essay on challenges of balancing privacy and medical resear
-
•Horvitz E, Mulligan D. Data, privacy, and the greater good. Science. 2015;349:253–5. Essay on challenges of balancing privacy and medical research.
-
(2015)
Science
, vol.349
, pp. 253-255
-
-
Horvitz, E.1
Mulligan, D.2
-
116
-
-
84992628717
-
Moneyball at work: they’ve discovered what really makes a great employee
-
Nisen M. Moneyball at work: they’ve discovered what really makes a great employee. Business Insider. 2013. http://www.businessinsider.com/big-data-in-the-workplace-2013-5. Accessed 1 Aug 2016.
-
(2013)
Business Insider
-
-
Nisen, M.1
-
118
-
-
84960442188
-
Today’s personality tests raise the bar for job seekers
-
Weber L. Today’s personality tests raise the bar for job seekers. Wall Street Journal. 2015. http://www.wsj.com/articles/a-personality-test-could-stand-in-the-way-of-your-next-job-1429065001. Accessed 1 Aug 2016
-
(2015)
Wall Street Journal
-
-
Weber, L.1
-
119
-
-
84992662839
-
-
Goldberg R. lack of trust in Internet privacy and security may deter economic and other online activities. . Accessed 1 Aug 201
-
Goldberg R. lack of trust in Internet privacy and security may deter economic and other online activities. NTIA (National Telecommunications & Information Administration). https://www.ntia.doc.gov/blog/2016/lack-trust-internet-privacy-and-security-may-deter-economic-and-other-online-activities. Accessed 1 Aug 2016.
-
NTIA (National Telecommunications & Information Administration)
-
-
-
120
-
-
84903015184
-
The future of reputation: gossip, rumor, and privacy on the Internet
-
Solove DJ. The future of reputation: gossip, rumor, and privacy on the Internet. Yale University Press; 2007. http://ssrn.com/abstract=1019177. Accessed 1 Aug 2016.
-
(2007)
Yale University Press
-
-
Solove, D.J.1
-
122
-
-
84977147370
-
Internet use by patients with bipolar disorder: results from an international multisite survey
-
PID: 273913
-
Bauer R, Conell J, Glenn T, et al. Internet use by patients with bipolar disorder: results from an international multisite survey. Psychiatry Res. 2016;242:388–94.
-
(2016)
Psychiatry Res
, vol.242
, pp. 388-394
-
-
Bauer, R.1
Conell, J.2
Glenn, T.3
-
123
-
-
84861378140
-
Millennials will make online sharing in networks a lifelong habit
-
Anderson JQ, Rainie L. Millennials will make online sharing in networks a lifelong habit. Pew Research. 2010. http://www.pewinternet.org/files/old-media/Files/Reports/2010/PIP_Future_Of_Millennials.pdf. Accessed 1 Aug 2016.
-
(2010)
Pew Research
-
-
Anderson, J.Q.1
Rainie, L.2
-
124
-
-
84921021500
-
How are important life events disclosed on Facebook? Relationships with likelihood of sharing and privacy
-
PID: 255847
-
Bevan JL, Cummings MB, Kubiniec A, et al. How are important life events disclosed on Facebook? Relationships with likelihood of sharing and privacy. Cyberpsychol Behav Soc Netw. 2015;18:8–12.
-
(2015)
Cyberpsychol Behav Soc Netw
, vol.18
, pp. 8-12
-
-
Bevan, J.L.1
Cummings, M.B.2
Kubiniec, A.3
-
125
-
-
84921898213
-
Privacy and human behavior in the age of information
-
COI: 1:CAS:528:DC%2BC2MXhsV2ns7k%3D, PID: 25635091, Review of how privacy influences human behavi
-
•Acquisti A, Brandimarte L, Loewenstein G. Privacy and human behavior in the age of information. Science. 2015;347:509–14. Review of how privacy influences human behavior.
-
(2015)
Science
, vol.347
, pp. 509-514
-
-
Acquisti, A.1
Brandimarte, L.2
Loewenstein, G.3
-
126
-
-
84855384842
-
Privacy no longer a social norm, says Facebook founder
-
Johnson B. Privacy no longer a social norm, says Facebook founder. The Guardian. 2010. https://www.theguardian.com/technology/2010/jan/11/facebook-privacy. Accessed 1 Aug 2016.
-
(2010)
The Guardian
-
-
Johnson, B.1
-
127
-
-
84920281815
-
Google’s Schmidt roasted for privacy comments
-
Newman J. Google’s Schmidt roasted for privacy comments. PC World. 2009. http://www.pcworld.com/article/184446/googles_schmidt_roasted_for_privacy_comments.html. Accessed 1 Aug 2016.
-
(2009)
PC World
-
-
Newman, J.1
-
128
-
-
84962405911
-
-
IOM. Best care at lower cost. 2013. Accessed 1 Aug 201
-
IOM. Best care at lower cost. The path to continuously learning health care in America. 2013. https://www.nationalacademies.org/hmd/~/media/Files/Report%20Files/2012/Best-Care/Best%20Care%20at%20Lower%20Cost_Recs.pdf. Accessed 1 Aug 2016.
-
(2013)
The path to continuously learning health care in America
-
-
-
129
-
-
84880065191
-
The ‘big data’ revolution in healthcare: accelerating value and innovation
-
Groves P, Kayyali B, Knott D, et al. The ‘big data’ revolution in healthcare: accelerating value and innovation. McKinsey & Company. 2013. http://www.mckinsey.com/industries/healthcare-systems-and-services/our-insights/the-big-data-revolution-in-us-health-care. Accessed 1 Aug 2016.
-
(2013)
McKinsey & Company
-
-
Groves, P.1
Kayyali, B.2
Knott, D.3
-
130
-
-
85020173286
-
Online privacy and the invisible market for our data (January 18, 2016)
-
Lipman R. Online privacy and the invisible market for our data (January 18, 2016). Penn State Law Rev. 2016.
-
(2016)
Penn State Law Rev
-
-
Lipman, R.1
-
132
-
-
84992534926
-
-
••Solove DJ. Why privacy matters even if you have ‘nothing to hide’. Chronicle of Higher Education. 2011;15
-
••Solove DJ. Why privacy matters even if you have ‘nothing to hide’. Chronicle of Higher Education. 2011;15. Essay on importance of privacy from an expert in privacy law
-
(2011)
Essay on importance of privacy from an expert in privacy law
-
-
-
133
-
-
84992569969
-
-
PCLOB (US Privacy and Civil Liberties Oversight Board). November 12: . 2014. Accessed 1 Aug 201
-
PCLOB (US Privacy and Civil Liberties Oversight Board). November 12: public meeting on “defining privacy”—transcript. 2014. https://www.pclob.gov/events/2014/november12.html. Accessed 1 Aug 2016.
-
(2014)
public meeting on “defining privacy”—transcript
-
-
-
134
-
-
84954535425
-
Chief Justice Roberts admits he doesn’t read the computer fine print
-
Weiss DC. Chief Justice Roberts admits he doesn’t read the computer fine print. ABA Journal. 2010. http://www.abajournal.com/news/article/chief_justice_roberts_admits_he_doesnt_read_the_computer_fine_print/. Accessed 1 Aug 2016.
-
(2010)
ABA Journal
-
-
Weiss, D.C.1
-
135
-
-
84861971498
-
Private ordering: a contractual approach to online interpersonal privacy
-
Abril PS. Private ordering: a contractual approach to online interpersonal privacy. Wake For L Rev. 2010;45:689.
-
(2010)
Wake For L Rev
, vol.45
, pp. 689
-
-
Abril, P.S.1
-
136
-
-
84873889715
-
Branding privacy
-
Ohm P. Branding privacy. Minn L Rev. 2013;97:907–89.
-
(2013)
Minn L Rev
, vol.97
, pp. 907-989
-
-
Ohm, P.1
-
137
-
-
84893391169
-
Keeping score on how you take your medicine
-
Parker-Pope T. Keeping score on how you take your medicine. The New York Times. 2011 http://well.blogs.nytimes.com/2011/06/20/keeping-score-on-how-you-take-your-medicine/?_r=0. Accessed 1 Aug 2016.
-
(2011)
The New York Times
-
-
Parker-Pope, T.1
-
138
-
-
84992570190
-
-
•Walker J. Data mining to recruit sick people. Wall Street Journal. 2013. Accessed 1 Aug 2016
-
•Walker J. Data mining to recruit sick people. Wall Street Journal. 2013. http://www.wsj.com/articles/SB10001424052702303722104579240140554518458. Accessed 1 Aug 2016. Article describing recruiting for clinical trials without using medical records.
-
(2013)
Article describing recruiting for clinical trials without using medical records
-
-
-
139
-
-
84992570174
-
New technologies close the recruitment gap
-
Gebhart F. New technologies close the recruitment gap. Applied Clinical Trials. 2014. http://www.appliedclinicaltrialsonline.com/new-technologies-close-recruitment-gap. Accessed 1 Aug 2016.
-
(2014)
Applied Clinical Trials
-
-
Gebhart, F.1
-
140
-
-
84876061994
-
Private traits and attributes are predictable from digital records of human behavior
-
COI: 1:CAS:528:DC%2BC3sXnsFKksLw%3D, PID: 23479631, Highly sensitive personal attributes detected using Facebook lik
-
••Kosinski M, Stillwell D, Graepel T. Private traits and attributes are predictable from digital records of human behavior. Proc Natl Acad Sci U S A. 2013;110:5802–5. Highly sensitive personal attributes detected using Facebook likes.
-
(2013)
Proc Natl Acad Sci U S A
, vol.110
, pp. 5802-5805
-
-
Kosinski, M.1
Stillwell, D.2
Graepel, T.3
-
141
-
-
84921802546
-
Computer-based personality judgments are more accurate than those made by humans
-
COI: 1:CAS:528:DC%2BC2MXmtFGhsA%3D%3D, PID: 255835
-
Youyou W, Kosinski M, Stillwell D. Computer-based personality judgments are more accurate than those made by humans. Proc Natl Acad Sci U S A. 2015;112:1036–40.
-
(2015)
Proc Natl Acad Sci U S A
, vol.112
, pp. 1036-1040
-
-
Youyou, W.1
Kosinski, M.2
Stillwell, D.3
-
142
-
-
84900027892
-
Predicting depression via social media
-
De Choudhury M, Gamon M, Counts S, Horvitz E. Predicting depression via social media. InICWSM 2013. https://www.microsoft.com/en-us/research/publication/predicting-depression-via-social-media/. Accessed 1 Aug 2016.
-
(2013)
InICWSM
-
-
De Choudhury, M.1
Gamon, M.2
Counts, S.3
Horvitz, E.4
-
145
-
-
84884968070
-
Can an algorithm be wrong? Twitter trends, the specter of censorship, and our faith in the algorithms around us
-
Gillespie T. Can an algorithm be wrong? Twitter trends, the specter of censorship, and our faith in the algorithms around us. Culture Digitally. 2011. http://culturedigitally.org/2011/10/can-an-algorithm-be-wrong/. Accessed 1 Aug 2016.
-
(2011)
Culture Digitally
-
-
Gillespie, T.1
-
148
-
-
33846477416
-
-
SPACE Conferences and Exposition, San Jose
-
Morse E, Easter R, Lee Y, et al. Integrating systems- and human-centered design approaches for constellation via control authority analysis, Space 2006, SPACE Conferences and Exposition, 2006, San Jose, CA. doi:10.2514/6.2006-7450. Accessed 1 Aug 2016.
-
(2006)
Integrating systems- and human-centered design approaches for constellation via control authority analysis, Space
, vol.2006
-
-
Morse, E.1
Easter, R.2
Lee, Y.3
|