Tene-Polonetsky-Beyond-IRBs-Ethical-Guidelines-for-Data-Research
!1!Beyond’IRBs:’Ethical’Guidelines’for’Data’Research”’Omer%Tene%and%Jules%Polonetsky%*%!!The! ethical! framework! applying! to! human! subject! research! in! the! biomedical! and!behavioral! research! fields! dates! back! to! the! Belmont! Report.1!Drafted! in! 1976! and!adopted!by!the!United!States!government!in1991!as!the!Common!Rule,2!the!Belmont!principles! were! geared! towards!a! paradigmatic! controlled! scientific! experiment!with!a! limited! population!of! human! subjects! interacting! directly! with!researchers!and!manifesting!their! informed! consent.! These! days,! researchers! in! academic!institutions! as! well! as! private! sector! businesses! not! subject! to! the! Common! […]
Jetten-Sharon-Selected-Issues-Concerning-the-Ethical-Use-of-Big-Data
Selected Issues Concerning the Ethical Use of Big Data Health Analytics I. Introduction a. Big Data Generally T he terms Big Data and Big Data analytics originally derive from the terms artificial intelligence, business intelligence , and business analytics ; terms used in the 1950s, 1990s, and 2000s, respectively . 1 Although some argue that […]
Tene-Polonetsky-Beyond-IRBs-Ethical-Guidelines-for-Data-Research1
!1!Beyond’IRBs:’Ethical’Guidelines’for’Data’Research”’Omer%Tene%and%Jules%Polonetsky%*%!!The! ethical! framework! applying! to! human! subject! research! in! the! biomedical! and!behavioral! research! fields! dates! back! to! the! Belmont! Report.1!Drafted! in! 1976! and!adopted!by!the!United!States!government!in1991!as!the!Common!Rule,2!the!Belmont!principles! were! geared! towards!a! paradigmatic! controlled! scientific! experiment!with!a! limited! population!of! human! subjects! interacting! directly! with!researchers!and!manifesting!their! informed! consent.! These! days,! researchers! in! academic!institutions! as! well! as! private! sector! businesses! not! subject! to! the! Common! […]
Harbour_&_ Koslov_ALJ 76-3_ANT314
SECTION 2 IN A WEB 2.0 WORLD: AN EXPANDED VISION OF RELEVANT PRODUCT MARKETS PAMELA JONES H ARBOUR TARA ISA K OSLOV * Section 2 enforcement by the U.S. antitrust authorities is back—at least, that is what the antitrust enforcers themselves have been saying. 1 An examination of Section 2 enforcement principles could not be […]
Privacy_Ethical_and_Legal_Considerations
Communication Law Review47 Privacy: Ethical and Legal Considerations 1 Raphael Cohen-Almagor, University of Haifa, Mount Carmel 2 Abstract Privacy is commonly understood as insulation from observability, a value asserted by individuals against the demands of a curious and intrusive society. It is intimately associated with our most profound values, our understanding of what it means […]
Richards-Hartzog-Trusting-Big-Data-Research-FPF-Conference-Draft
Trusting Big Data Research Neil Richards * & Woodrow Hartzog ** Abstract Although it might puzzle or even infuriate data scientists, suspicion about big data is understandable. The concept doesn’t seem promising to most people. It seems scary. This is partly because big data research is shrouded in mystery. People are unsure about organizations’ motives […]
Polonetsky-Tene-final
POLONETSKY*&*TENE*FINAL.DOCX*(DO*NOT*DELETE)*6/4/15*6:51*PM**333*BEYOND’THE’COMMON’RULE:””””””””’ETHICAL’STRUCTURES’FOR’DATA’RESEARCH’IN’NON4ACADEMIC’SETTINGS’JULES*POLONETSKY,*OMER*TENE,*&*JOSEPH*JEROME**ABSTRACT*…………………………………………………………………………………………………….*333!INTRODUCTION*…………………………………………………………………………………………….*334!I.!BIG*DATA*BENEFITS—AND*RISKS*……………………………………………………………*337!II.!CONTEXTUAL*AND*NONGCONTEXTUAL*DATA*USE*…………………………………..*339!III.!WHAT*SHOULD*BE*COVERED*BY*A*CSRB*………………………………………………..*341!A.!Data&experimentation*………………………………………………………………*341!B.!Non1contextual&data&uses*………………………………………………………..*346!C.!Disparate&impact*………………………………………………………………………*349!IV.!CSRB*STRUCTURE*………………………………………………………………………………….*352!A.!Who&is&covered*…………………………………………………………………………..*352!B.!External&(FTC1approved)&or&Internal&(Organization1led)*…*353!V.!GUIDELINES*FOR*CSRB*ENGAGEMENT*…………………………………………………….*356!A.!Guiding&Substantive&Principles*……………………………………………….*356!1.!Respect*for*persons*…………………………………………………………*357!2.!Beneficence*………………………………………………………………………..*358!3.!Justice*………………………………………………………………………………….*360!4.*Respect*for*law*………………………………………………………………….*361!B.!Promoting&Independence&and&Trust*………………………………………*362!C.&Documentation&and&Accountability*……………………………………….*365!CONCLUSION*…………………………………………………………………………………………………*366!*ABSTRACT*As* scientific* knowledge* advances,* new* data* uses* continuously*emerge* in* a* wide* variety* of* contexts,* from* combating* fraud* in* the*payment* card* industry,*to*reducing* the* time* commuters*spend* on*the* road,*detecting* harmful* drug* interactions,* improving* marketing*mechanisms,* personalizing* the* delivery* of* education* in* K–12*************Jules*Polonetsky*is*CoGchair*and*Executive*Director,*Omer*Tene*Senior*Fellow,*and*Joseph* Jerome* Policy* Counsel* at* the* Future* of* Privacy* Forum.* We* would* like* to* thank*Arielle*Brown*for*excellent*assistance*with*research*and*drafting.** POLONETSKY*&*TENE*FINAL.DOCX*(DO*NOT*DELETE)*6/4/15**6:51*PM*334*COLO.&TECH.&L.J.*[Vol.*13*schools,*encouraging*exercise*and*weight*loss,*and*much*more.1*At* corporations,* notGforGprofits,* […]
FPF-Privacy-Papers-2013
Privacy Papers for Policy Makers 2013 The publication of “Privacy P apers for Policy M akers” was supported by AT&T, Microsoft, and GMAC. January 1 st, 2014 We are delighted to provide you with FPF’s fourth annual “Privacy Papers for Policy Makers,” representing cutting -edge research and analytical work on a variety of important privacy […]
Dutch-Treat-Collaborative-Dutch-Privacy-Regulation
Dutch Treat? Collaborative Dutch Privacy Regulation and the Lessons it Holds for U.S. Privacy LawDennis D. HirschGeraldine W. Howell Professor of LawCapital University Law [email protected] (614) 236-6685July 19, 2012Paper Submitted for the Future of Privacy ForumPrivacy Papers for Policy Makers Initiative 2012Do not use, cite or circulate this manuscriptwithout the author’s permission -i-TABLE OF CONTENTSI.Introduction […]
Differential-Privacy-as-a-Response-to-the-Reidentification-Threat-Klinefelter-and-Chin
Electronic copy available at: http://ssrn.com/abstract=2062447 CHIN &K LINEFELTER .FPP 5/8/2012 2:02 PM DIFFERENTIAL PRIVACY AS A RESPONSE TO THE REIDENTIFICATION THREAT: THE FACEBOOK ADVERTISER CASE STUDY * A NDREW CHIN ** & ANNE KLINEFELTER *** Recent computer science research on the reidentification of indi viduals from anonymized data has given some observers in the legal […]