Siddique Latif (Author)
Adnan Qayyum (Author)
Muhammad Usama (Author)
Junaid Qadir (Author)
Andrej Zwitter (Author)
Muhammad Shahzad (Author)
"Big Data" has the potential to facilitate sustainable development in many sectors of life such as education, health, agriculture, and in combating humanitarian crises and violent conflicts. However, lurking beneath the immense promises of Big Data are some significant risks such as 1) the potential use of Big Data for unethical ends; 2) its ability to mislead through reliance on unrepresentative and biased data; and 3) the various privacy and security challenges associated with data (including the danger of an adversary tampering with the data to harm people). These risks can have severe consequences and a better understanding of these risks is the first step towards their mitigation of these risks. In this article, we highlight the potential dangers associated with using Big Data, particularly for human development. [Peer reviewed]
...More
Article
Alexander Trauth-Goik;
(December 2019)
"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System
(/isis/citation/CBB323886145/)
Article
Jeremy Pitt;
Agnieszka Rychwalska;
Magdalena Roszczynska-Kurasinska;
Andrzej Nowak;
(March 2019)
Democratizing Platforms for Social Coordination
(/isis/citation/CBB485378597/)
Article
Ons Al-Shamaileh;
(June 2018)
I Have Issues with Facebook: But I Will Keep Using It
(/isis/citation/CBB503279988/)
Article
Roesner, Franziska;
(Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering
(/isis/citation/CBB605988846/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Article
Kasperson, Roger E.;
(Fall 2012)
A Perspective on the Social Amplifications of Risk
(/isis/citation/CBB771024272/)
Article
Fabrizio Li Vigni;
(2022)
Hayek at the Santa Fe Institute: Origins, Models, and Organization of the Cradle of Complexity Sciences
(/isis/citation/CBB101266514/)
Article
Peter M. Asaro;
(June 2019)
AI Ethics in Predictive Policing: From Models of Threat to an Ethics of Care
(/isis/citation/CBB655687648/)
Article
Fang, Xiang;
(2014)
Local People's Understanding of Risk from Civil Nuclear Power in the Chinese Context
(/isis/citation/CBB001420063/)
Thesis
Williams, Lambert;
(2012)
Modeling, Building, Writing: A History of Nonlinear Dynamics and Complex Systems
(/isis/citation/CBB001561027/)
Article
Sugiman, Toshio;
(2014)
Lessons Learned from the 2011 Debacle of the Fukushima Nuclear Power Plant
(/isis/citation/CBB001420061/)
Article
Watts, Duncan J.;
(Winter 2013)
Computational Social Science: Exciting Progress and Future Directions
(/isis/citation/CBB953214411/)
Article
Moa Carlsson;
(April 2022)
Computing views, remodeling environments
(/isis/citation/CBB726932342/)
Book
Ashley Sweetman;
(2022)
Cyber and the City: Securing London’s Banks in the Computer Age
(/isis/citation/CBB340774234/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB758382142/)
Book
James B. McSwain;
(2018)
Petroleum and Public Safety: Risk Management in the Gulf South, 1901-2015
(/isis/citation/CBB127804806/)
Article
Tal Zarsky;
(January 2016)
The Trouble with Algorithmic Decisions: An Analytic Road Map to Examine Efficiency and Fairness in Automated and Opaque Decision Making
(/isis/citation/CBB775587512/)
Book
Colin Koopman;
(2019)
How We Became Our Data: A Genealogy of the Informational Person
(/isis/citation/CBB981384434/)
Article
Linda F Hogle;
(August 2019)
Accounting for accountable care: Value-based population health management
(/isis/citation/CBB281463388/)
Article
Yoshiyasu Takefuji;
(March 2018)
Connected Vehicle Security Vulnerabilities
(/isis/citation/CBB280716653/)
Be the first to comment!