Filters








201 Hits in 2.9 sec

On the Feasibility of a Technological Response to the Surveillance Morass [chapter]

Joan Feigenbaum, Jérémie Koenig
2014 Lecture Notes in Computer Science  
After presenting some objections to the behavior of the US National Security Agency and its counterparts in allied nations (emphasizing technical problems associated with such behavior, rather than political  ...  We consider mass surveillance from a computer-science perspective.  ...  component of the surveillance morass.  ... 
doi:10.1007/978-3-319-12400-1_23 fatcat:eupmk554t5h3xmhhmdds26f7se

Massive data initiatives and AI provide testbed for pandemic forecasting

Cormac Sheridan
2020 Nature Biotechnology  
Behind the slick interfaces of the many dashboards developed to track the virus in real time lies a morass of messy, inconsistent data, which renders any cross-country comparisons invidious.  ...  A key element of their approach is to incorporate a more nuanced description of R 0 , which is the average number of new infections expected to arise in a naïve population from one infected individual.  ...  Controller General of India approves the emergency use of Biocon's biologic drug itolizumab to treat cytokine release syndrome in COVID-19 patients with moderate to severe acute respiratory distress syndrome  ... 
doi:10.1038/s41587-020-0671-4 pmid:32887968 fatcat:2aqnggow5vc5xalgahxkeiwjha

Responsible media technology and AI: challenges and research directions

Christoph Trattner, Dietmar Jannach, Enrico Motta, Irene Costera Meijer, Nicholas Diakopoulos, Mehdi Elahi, Andreas L. Opdahl, Bjørnar Tessem, Njål Borch, Morten Fjeld, Lilja Øvrelid, Koenraad De Smedt (+1 others)
2021 AI and Ethics  
New opportunities and challenges continue to arise, most recently as a result of the rapid advance and adoption of artificial intelligence technologies.  ...  AbstractThe last two decades have witnessed major disruptions to the traditional media industry as a result of technological breakthroughs.  ...  Likewise, they can leverage technology to scale their ability to fact-check the morass of content circulating on platforms to buttress both their own brand credibility and to increase the overall quality  ... 
doi:10.1007/s43681-021-00126-4 fatcat:omhfw2yco5fo3opww5qcqnqui4

Surveillance Duration Doesn't Affect Privacy Expectations: An Empirical Test of the Mosaic Theory

Matthew B. Kugler, Lior Strahilevitz
2015 Social Science Research Network  
Correct responses to our survey were similar to those of a recent poll by the Pew Research Center, which included some of the same questions but permitted respondents to refuse to answer the questions,  ...  The options for the Affordable Care Act question were Clarence Thomas, David Souter, John Roberts, and Anthony Kennedy. The other two questions had fill-in-the-blank style response options.  ...  With respect to less familiar technology, survey designers must do more work explaining the underlying technology to respondents, increasing the danger that responses will be influenced by the researchers  ... 
doi:10.2139/ssrn.2629373 fatcat:wa6payh7arf2jnmriyjujgippu

Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier [article]

Christine L. Borgman
2018 arXiv   pre-print
The boundaries between research and grey data are blurring, making it more difficult to assess the risks and responsibilities associated with any data collection.  ...  This paper explores the competing values inherent in data stewardship and makes recommendations for practice, drawing on the pioneering work of the University of California in privacy and information security  ...  James Dempsey of the Berkeley Center for Law and Technology provided detailed comments on the draft paper.  ... 
arXiv:1802.02953v1 fatcat:uawtmzf6mjgydkw5iegc3vzhf4

Attribution Across Cyber Attack Types: Network Intrusions and Information Operations

Sanjay Goel, Brian Nussbaum
2021 IEEE Open Journal of the Communications Society  
The objective of this paper is to articulate the problem of attribution in cyber warfare incidents, including, surveillance, data theft, espionage, and misinformation campaigns.  ...  Attribution tools and techniques for malicious activities on the internet are still nascent, relying mainly on technical measurements, the provenance of malicious code, and nontechnical assessments of  ...  In the cyber warfare context, gaining such irrefutable evidence is neither feasible nor necessary; it is more pertinent to gather actionable intelligence for a quick assessment and a measured response.  ... 
doi:10.1109/ojcoms.2021.3074591 fatcat:k6vuj2ygnra5plsohkxde2htzy

'Sifting the significance from the data' - the impact of high-throughput genomic technologies on human genetics and health care

Angus J Clarke, David N Cooper, Michael Krawczak, Chris Tyler-Smith, Helen M Wallace, Andrew O M Wilkie, Frances Raymond, Ruth Chadwick, Nick Craddock, Ros John, John Gallacher, Mathias Chiano
2012 Human Genomics  
The meeting was arranged to explore ideas as to the likely future course of human genomics.  ...  This report is of a round-table discussion held in Cardiff in September 2009 for Cesagen, a research centre within the Genomics Network of the UK's Economic and Social Research Council.  ...  The work is part of the research programme of the ESRC Genomics Network at Cesagen (website: http://www.genomicsnetwork.ac.uk/ cesagen/).  ... 
doi:10.1186/1479-7364-6-11 pmid:23244462 pmcid:PMC3500243 fatcat:ol6mww27n5gdzntybvclz6f2qm

Systematic evaluation of immune regulation and modulation

David F. Stroncek, Lisa H. Butterfield, Michael A. Cannarile, Madhav V. Dhodapkar, Tim F. Greten, Jean Charles Grivel, David R. Kaufman, Heidi H. Kong, Firouzeh Korangy, Peter P. Lee, Francesco Marincola, Sergio Rutella (+3 others)
2017 Journal for ImmunoTherapy of Cancer  
As a part of this Task Force, Working Group 3 (WG3) consisting of multidisciplinary experts from industry, academia, and government focused on the systematic assessment of immune regulation and modulation  ...  Thus, it is critical to develop systematic approaches to monitor the immune response and to interpret the data obtained from these assays.  ...  Acknowledgements The authors thank Chelsey Meier and Stefanie Haasken for helping to prepare the manuscript and Alissa Fiorentino for helping to organize the Immune Biomarkers Task Force, Working Group  ... 
doi:10.1186/s40425-017-0223-8 pmid:28331613 pmcid:PMC5359947 fatcat:rw4hmor7qvfdhpkwfj7hjf2zfa

Ferret models of viral pathogenesis

T. Enkirch, V. von Messling
2015 Virology  
A better understanding of their pathogenesis and mechanisms of transmission requires animal models that accurately reproduce these aspects of the disease.  ...  We will describe the anatomic and physiologic characteristics that contribute to the natural susceptibility of ferrets to these viruses, and provide an overview of the approaches available to analyze their  ...  In a first proof-of-concept study, a PR8-HA-expressing RNA vaccine induced an immune response similar to approved influenza vaccines in ferrets and pigs (Petsch et al., 2012) , indicating the feasibility  ... 
doi:10.1016/j.virol.2015.03.017 pmid:25816764 pmcid:PMC7111696 fatcat:5si7p4mpdjfj5nfs7ao7noa4ze

Constructing Crashworthiness. The Experimental Safety Vehicle (ESV) Program and the Global Renegotiation of Automobile Safety in the 1970s / Die Konstruktion von "Crashworthiness". Das Experimental-Safety-Vehicle-(ESV)-Programm und die globale Neuverhandlung automobiler Sicherheit in den 1970er Jahren

Stefan Esselborn
2020 Technikgeschichte  
The article proposes to take a fresh look at the global ascent of "crashworthiness" as a "dominant paradigm" (Peter Norton) of automobile safety by focusing on the so-called Experimental Safety Vehicle  ...  It also supplied a platform for a transnational re-negotiation of the distribution of responsibility for automobile safety, in which differences between engineering cultures and user perceptions in North  ...  On the one hand, ESVs were used to generate and validate specifi c technical knowledge, for example on the technical feasibility and consequences of certain safety specifi cations.  ... 
doi:10.5771/0040-117x-2020-1-11 fatcat:hh3b4afuijahdldhfzro7vdyye

Technology and Innovation Management in Higher Education—Cases from Latin America and Europe

Antonio Arciénaga Morales, Janni Nielsen, Hernán Bacarini, Silvia Martinelli, Sergio Kofuji, Juan García Díaz
2018 Administrative Sciences  
The main objective of this study is to analyze different cases from Europe and Latin America to synthetize a model of technology and innovation management.  ...  Our model of learning includes different ways to obtain a panoply of competencies to identify technology and innovation management issues at individual business and regional level, particularly for small-and-medium-sized  ...  Author Contributions: All authors contributed intellectually and significantly to the paper. Conflicts of Interest: The authors declare there are no conflict of interest.  ... 
doi:10.3390/admsci8020011 fatcat:6hamhgrsufbodlevuqkoauw3ga

e-Government, e-Society and Jordan: Strategy, theory, practice, and assessment (originally published in November 2003)

Michael Blakemore, Roderic Dutton
2007 First Monday  
Unlike the development of a complex piece of engineering it is not feasible to model the impact of e-Government on a nation in the same way that deterministic models do for the design and testing of a  ...  in the morass of unstructured noise.  ... 
doi:10.5210/fm.v0i0.1776 fatcat:cd3pe57ndfgrraruyr3ghulygu

Policy development and quality of care

R L Kane
1993 The Journal of long term care administration  
This response is under- standable. The innovations will have a great advantage if they are not encumbered with a morass of regula- tions governing their every move.  ...  It is feasible, for instance, to use case mix on admission and rely on outcomes to encourage subsequent behavior.  ... 
pmid:10133926 fatcat:q623ujegobfpvlnnviqae3dype

From playfulness and self-centredness via grand expectations to normalisation: a psychoanalytical rereading of the history of molecular genetics

H. A. E. Zwart
2013 Medicine, Health care and Philosophy  
Acknowledgments This paper is part of the research programme of the Centre for Society and the Life Sciences (CSG), funded by the Netherlands Genomics Initiative (NGI).  ...  Christine Hauskeller (Exeter), on earlier versions, as well as from the very helpful comments and suggestions made by two anonymous referees.  ...  of: focussed on the elaboration of basic technologies and dexterity in handling them.  ... 
doi:10.1007/s11019-013-9482-4 pmid:23595614 fatcat:ync7ff4syvcwtntaazwxbnhepm

Privacy and security of health information in the emerging health care system

L O Gostin, J Turek-Brezina, M Powers, R Kozloff
1995 Health matrix (Cleveland, Ohio : 1991)  
In a 1993 Harris poll on consumer privacy conducted for Equifax, Inc., 78 % of the respondents indicated their concern about threats to privacy.  ...  The success of the system will depend, in part, on the accuracy, correctness, and trustworthiness of the information and the privacy rights of individuals to control the disclosure of personal information  ...  or information about the person to the senses or surveillance devices of others.  ... 
pmid:10141742 fatcat:hg5p4iurhbhrvn5oqt534ugxci
« Previous Showing results 1 — 15 out of 201 results