2892
www.theguardian.com
How statistics lost their power – and why we should fear what comes next | William Davies I n theory, statistics should help settle arguments. They ought to provide stable reference points that everyone – no matter what their politics – can agree on.…
IFTTT  Instapaper 
yesterday
Fifteen modifications later, he threw it into her fantasies — The Warren Ellis Gun Machine remix
Fifteen modifications later, he threw it into her fantasies — The Warren Ellis Gun Machine remix …
IFTTT  Instapaper 
yesterday
"Creating a financial model that benefits the many over the few" - A Q&A with Brianna Wettlaufer, CEO of Stocksy - The Open Co-op
"Creating a financial model that benefits the many over the few" - A Q&A with Brianna Wettlaufer, CEO of Stocksy - The Open Co-op http://ift.tt/2kGBLa2
IFTTT  Instapaper 
5 days ago
Europa - RAMON - Welcome page
RAMON - Reference And Management Of Nomenclatures
SKOS  RDF  statistics 
7 days ago
Guidance on data markers
Annotations in statistical tables
GSS  datamarkers 
8 days ago
How private contractors are taking over data in the public domain | Reveal
How private contractors are taking over data in the public domain Tom MacWright, a software engineer who cycles to work in Washington, D.C., would be breezing along 14th Street NW when he suddenly would find himself boxed out…
IFTTT  Instapaper 
12 days ago
George Orwell: Politics and the English Language
George Orwell: Politics and the English Language Most people who bother with the matter at all would admit that the English language is in a bad way, but it is generally assumed that we cannot by conscious…
IFTTT  Instapaper 
12 days ago
IIIF, Webmentions, and Collaboration between Institutions and Research Communities
IIIF, Webmentions, and Collaboration between Institutions and Research Communities A post by Jeffrey C. Witt (LombardPress and SCTA) and Rafael Schwemmer (text & bytes) Introduction In this post, we want to describe a new possibility for…
IFTTT  Instapaper 
12 days ago
Ur-Fascism | by Umberto Eco | The New York Review of Books
Ur-Fascism In 1942, at the age of ten, I received the First Provincial Award of Ludi Juveniles (a voluntary, compulsory competition for young Italian Fascists—that is, for…
IFTTT  Instapaper 
12 days ago
GitHub - google/open-location-code: Open Location Codes are short, generated codes that can be used like street addresses, for places where street addresses don't exist.
google/open-location-code Abstract Many parts of the world and more than half the world’s urban populationlack street addresses . The falling prices of smartphones, andtheir increasing…
IFTTT  Instapaper 
14 days ago
Making it simpler to publish data | Data in government
Making it simpler to publish data | Data in government Data.gov.uk exists for two reasons: to facilitate the publication of good quality open data by government organisations and to make it easy for users to find…
IFTTT  Instapaper 
14 days ago
How city “smell-mappers” can help with virtual reality, real estate and how we understand the past | CityMetric
How city “smell-mappers” can help with virtual reality, real estate and how we understand the past Data scientists, artists and urban planners are mapping digital “smellscapes”, opening up new possibilities for virtual reality, real estate and how we…
IFTTT  Instapaper 
14 days ago
Cannabis Data | DOPE Magazine | Marijuana News & Reviews
Cannabis Data | DOPE Magazine | Marijuana News & Reviews Keep Cannabis Data Open and Free For All More and more cannabis trade shows feature companies that provide cannabis data and analytics for the industry. Coming…
IFTTT  Instapaper 
14 days ago
The Provenance alpha: building trust from transparency – Digital blogs
The Provenance alpha: building trust from transparency The Co-op is committed to being radically transparent. A decade ahead of the government’s traffic light system, we campaigned for food and nutrition labelling…
IFTTT  Instapaper 
20 days ago
How to Avoid Being Psychologically Destroyed by Your Newsfeed — Parenting Through the Storm
How to Avoid Being Psychologically Destroyed by Your Newsfeed This past week has been brutal , in terms of what has been coming across my newsfeed . And 2016 wasn't exactly a picnic either . So lately I've been thinking a…
IFTTT  Instapaper 
20 days ago
XCOM 2: Long War 2 turning Geoscape to battlefield | Rock, Paper, Shotgun
XCOM 2: Long War 2 turning Geoscape to battlefield XCOM 2: Long War 2 , the officially-sanctioned sequel to the venerated XCOM mod, will expand the ‘Geoscape’ global strategy layer in new and awful ways. Long…
IFTTT  Instapaper 
21 days ago
SHARE: system design and case studies for statistical health information release
SHARE is one of the first systems to provide a mechanism for custodians to release differentially private aggregate statistics for a variety of use cases in the medical domain. This proof-of-concept system is intended to be applied to large-scale medical data warehouses.
privacy-preserving-analytics 
4 weeks ago
Publishing data from electronic health records while preserving privacy: A survey of algorithms
he dissemination of Electronic Health Records (EHRs) can be highly beneficial for a range of medical studies, spanning from clinical trials to epidemic control studies, but it must be performed in a way that preserves patients’ privacy. This is not straightforward, because the disseminated data need to be protected against several privacy threats, while remaining useful for subsequent analysis tasks. In this work, we present a survey of algorithms that have been proposed for publishing structured patient data, in a privacy-preserving way. We review more than 45 algorithms, derive insights on their operation, and highlight their advantages and disadvantages. We also provide a discussion of some promising directions for future research in this area.
privacy-preserving-analytics 
4 weeks ago
Reconsidering Anonymization-Related Concepts and the Term "Identification" Against the Backdrop of the European Legal Framework. - PubMed - NCBI
we have tried to circumvent a circular definition for the term "identification" by making two decisions: first, deciding which (natural) identifier should stand for the individual; second, deciding how to recognize the individual. In addition, we provide an overview of anonymization techniques/methods for preventing re-identification. The discussion of basic notions related to anonymization shows that there is some work to be done in order to achieve a mutual understanding between legal and technical experts concerning some of these notions
privacy-preserving-analytics 
4 weeks ago
The Importance of Context: Risk-based De-identification of Biomedical Data. - PubMed - NCBI
Accurately measuring the risk of re-identification in a specific data sharing scenario is an important aspect of data de-identification. Overestimation of risks will significantly deteriorate data quality, while underestimation will leave data prone to attacks on privacy. Several models have been proposed for measuring risks, but there is a lack of generic methods for risk-based data de-identification. The aim of the work described in this article was to bridge this gap and to show how the quality of de-identified datasets can be improved by using risk models to tailor the process of de-identification to a concrete context.
privacy-preserving-analytics 
4 weeks ago
The risk of re-identification versus the need to identify individuals in rare disease research. - PubMed - NCBI
In this article, we identify the needs and arguments related to de-identification and re-identification of patients and research subjects and suggest how the different needs may be balanced within a framework of using unique encrypted identifiers
privacy-preserving-analytics 
4 weeks ago
Anonymization for outputs of population health and health services research conducted via an online data center. - PubMed - NCBI
We propose a two-step approach to anonymizing analysis outputs from an ODC. A data preparation stage requires data custodians to apply some basic treatments to the dataset before making it available. A subsequent output anonymization stage requires researchers to use a checklist at the point of downloading analysis output. The checklist assists researchers with highlighting potential privacy concerns, then applying appropriate anonymization treatments.
privacy-preserving-analytics 
4 weeks ago
Big Data Analytics over Encrypted Datasets with Seabed - Microsoft Research
This paper presents Seabed, a system that enables efficient analytics over large encrypted data sets.
privacy-preserving-analytics 
4 weeks ago
[1412.7584] Differential Privacy and Machine Learning: a Survey and Review
n this paper, we consider differential privacy, one of the most popular and powerful definitions of privacy. We explore the interplay between machine learning and differential privacy, namely privacy-preserving machine learning algorithms and learning-based data release mechanisms
privacy-preserving-analytics 
4 weeks ago
A Literature analysis on Privacy Preserving Data Mining
We provide a review of the state-of-the-art
methods for privacy and analyze the representative technique for privacy preserving data mining
privacy-preserving-analytics 
4 weeks ago
A GENERAL SURVEY OF PRIVACY-PRESERVING DATA MINING MODELS AND ALGORITHMS
In this paper, we provide a review of the state-of-the-art methods
for privacy
privacy-preserving-analytics 
4 weeks ago
A Review on Data Anonymization in Privacy Preserving Data Mining
This paper provides a review of different approaches for privacy preserving data
mining along with merits and demerits. It provides a brief explanation of anonymization approach along with its
different techniques like k-anonymity, l-diversity and t-closeness. It also includes comparison between different
algorithms of anonymization with their advantages and disadvantages.
privacy-preserving-analytics 
4 weeks ago
A comprehensive review on privacy preserving data mining | SpringerPlus | Full Text
The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses
privacy-preserving-analytics 
4 weeks ago
Privacy Preserving Data Analytics for Smart Homes
A framework for maintaining security &
preserving privacy for analysis of sensor data from smart homes,
without compromising on data utility is presented
privacy-preserving-analytics 
4 weeks ago
Privacy-Preserving Data Analysis - Mechanisms and Formal Guarantees (EINS Summer School 2012) - YouTube
In this lecture, Joss Wright of the Oxford Internet Institute, examines from a technological angle, the problems involved with gathering, storing and accessing data about individuals in databases whilst preserving their individual privacy. Starting with basic computer-science definitions of privacy, this lecture explores early work in reidentifying individuals and their sensitive characteristics in apparently anonymous and anonymised data. It presents early approaches used to prevent such reidentification, the limitations of these methods, and examples of high-profile reidentifications performed on real-world data. Finally the current state of the art, differential privacy, is introduced and explained, along with its strengths, limitations and practical applications.
privacy-preserving-analytics 
4 weeks ago
Privacy Preserving Data Analysis (PDF)
Presentation introducing differential privacy and its applications
privacy-preserving-analytics 
4 weeks ago
"Anonymization and Risk" by Ira S. Rubinstein and Woodrow Hartzog
We argue that the best way to move data release policy past the alleged failures of anonymization is to focus on the process of minimizing risk of reidentification and sensitive attribute disclosure, not preventing harm
privacy-preserving-analytics 
4 weeks ago
Differential Privacy - Microsoft Research
This state of affairs suggests a new measure, differential privacy, which, intuitively, captures the increased risk to one’s privacy incurred by participating in a database
privacy-preserving-analytics 
4 weeks ago
Privacy-Preserving Data Analysis and Computational Learning: A Match made in Heaven | Windows On Theory
In this post, I hope to give a (fairly) non-technical overview of a promising approach for designing privacy-preserving algorithms that has emerged in a line of recent works, and to highlight an intriguing connection between learning theory and privacy-preserving data analysis
privacy-preserving-analytics 
4 weeks ago
Occupy Database – Privacy is a Social Choice | Windows On Theory
I’ll try to explain here how differential privacy and its generalizations can provide a framework for the social quest for privacy. Nevertheless, and here I am stating the obvious, no mathematical notion can replace the need for social debate. The right definition of privacy is context dependent and a matter for social choice
privacy-preserving-analytics 
4 weeks ago
SAGE Journals: Your gateway to world-class journal research
Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability - Dec 13, 2016 http://ift.tt/2gAInTV
IFTTT  Instapaper 
4 weeks ago
[1104.3913] Fairness Through Awareness
We study fairness in classification, where individuals are classified, e.g., admitted to a university, and the goal is to prevent discrimination against individuals based on their membership in some group, while maintaining utility for the classifier (the university)
privacy-preserving-analytics 
4 weeks ago
A Typology of Privacy by Bert-Jaap Koops, Bryce Clayton Newell, Tjerk Timan, Ivan Škorvánek, Tom Chokrevski, Maša Galič :: SSRN
A Typology of Privacy by Bert-Jaap Koops, Bryce Clayton Newell, Tjerk Timan, Ivan Škorvánek, Tom Chokrevski, Maša Galič :: SSRN Browse Subscriptions Top Papers Top Authors Top Organizations Submit a paper Blog Email This field is required Password This field is required Remember me…
IFTTT  Instapaper 
4 weeks ago
Anonymization and Risk | UW School of Law
Anonymization and Risk WLR Print Edition Anonymization and Risk Article Anonymization and Risk June 21, 2016 | 91 Wash. L. Rev. 703 Ira S. Rubinstein & Woodrow Hartzog Abstract :…
IFTTT  Instapaper 
4 weeks ago
[1510.02377] FairTest: Discovering Unwarranted Associations in Data-Driven Applications
[1510.02377] Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit http://ift.tt/21JnETM
IFTTT  Instapaper 
4 weeks ago
[1502.03519v1] Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources
[1502.03519v1] Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources Cornell University Library We gratefully acknowledge support from the Simons Foundation and member institutions arXiv.org > cs > arXiv:1502.03519v1 Full-text…
IFTTT  Instapaper 
4 weeks ago
Metaphors We Compute By
Metaphors We Compute By Metaphors We Compute By January 17 2017 In the book Metaphors We Live By, George Lakoff and Mark Johnson setout to show the linguistic and philosophical worlds…
IFTTT  Instapaper 
5 weeks ago
The Privatized City Where Everything Is Tolled | Co.Design | business + design
The Privatized City Where Everything Is Tolled This article is part of our seven-part series on the future of cities under President-elect Trump, for which we asked experts in urban planning, city…
IFTTT  Instapaper 
5 weeks ago
All I Know Is What’s on the Internet — Real Life
All I Know Is What’s on the Internet — Real Life Fake news elected Donald Trump. At least, judging by media attention — social or otherwise — one might come to that conclusion. Something must be responsible…
IFTTT  Instapaper 
5 weeks ago
302 Found
Why America is Self-Segregating – Data & Society: Points The United States has always been a diverse but segregated country. This has shaped American politics profoundly. Yet, throughout history, Americans have had to…
IFTTT  Instapaper 
5 weeks ago
ijnet.org
Why publishing more open data isn’t enough to empower citizens When I attended the International Open Data Conference last October in Madrid, there was plenty of talk about whether open data has failed to live up to its…
IFTTT  Instapaper 
5 weeks ago
Oxfam Responsible Program Data Policy | Oxfam GB | Policy & Practice
Oxfam Responsible Program Data Policy | Oxfam GB | Policy & Practice You are here: Home Publications > Oxfam Responsible Program Data Policy Search for publications Search for publications Our work ICT in Programme Email Signup…
IFTTT  Instapaper 
5 weeks ago
A typology of caveats - Full Fact
A typology of caveats Full Fact - The UK’s independent factchecking charity Home About Blog Contact Donate Economy Europe Health Crime Education Immigration Law Facebook Twitter…
IFTTT  Instapaper 
5 weeks ago
Statistics are not just numbers: they require context to be useful - Full Fact
Statistics are not just numbers: they require context to be useful Full Fact - The UK’s independent factchecking charity Home About Blog Contact Donate Economy Europe Health Crime Education Immigration Law Facebook Twitter…
IFTTT  Instapaper 
5 weeks ago
« earlier      
advertising ajax algorithms algowars alpsp-2006-03 alpsp_web2.0 amazon annotation api architecture art atom attention authorid authority bath_images bathhacked bbc bibliographic bigchill bioinformatics biology blog blogging boardgamedesign book bookmarking books caching charleston-2007-11 charts chemistry citation classification cloudcomputing cms coding comics commons community conference creativecommons css csvschema culture data database datacube datainfrastructure datamining del.icio.us design domainmodelling eclipse ecology education excel extension filetype:jpg filetype:pdf firefox flash flex flickr foaf folksonomy food framework free fun games geo google government graph graphics greasemonkey gui hadoop history html http hypertext ia identifiers identity ifttt images ingenta-pubforum-2006-11 instapaper internet java javascript jena jisc jquery jsf json kasabi kids lectures lego libraries library library2.0 lifebits linkeddata linking lucene mailinglist management mapping mapreduce maps mashups me me/articles me/friends me/toread media media:document media:image metadata microformats mobile mp3 music nasa oai ontology openaccess opendata openid opensource openurl owl patterns pdf peerreview performance personal pipelining platform plugin policy presentation presentations privacy-preserving-analytics programming proxy publishing python radio rails rdf rdf/advocacy rdf/foaf rdf/schema rdf/scutter rdfa recipes reference research rest rest/advocacy rss ruby saas scalability science science2.0 scifi screencast search security selftracking semanticweb shibboleth skos socialsoftware space sparklines sparql sparql/endpoint ssp-2007-06 standards starwars statistics stm-2006-11 storage storieswithdata strategy svg talis testing timeline tool tools trackback triplestore trust tshirt tutorial twitter unicode uri url video visualisation visualization w3c web web2.0 webdesign webservices widget wiki wikipedia wildlifefinder xhtml xml xslt xtech xtech-06-sparqling-services

Copy this bookmark:



description:


tags: