Page 172 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 172
2019 ITU Kaleidoscope Academic Conference
[13] J. Rooksby et al., “Personal tracking as lived [25] B. Jacobs and J. Popma, “Medical research, Big
informatics,” in Proceedings of the 32nd annual Data and the need for privacy by design,” Big Data
ACM conference on Human factors in computing Soc., vol. 6, no. 1, p. 205395171882435, 2019.
systems - CHI ’14, 2014, pp. 1163–1172.
[26] H. F. Nissenbaum, Privacy in context : technology,
[14] S. Nambiar, “Capabilities, conversion factors and policy, and the integrity of social life. Stanford Law
institutions,” Prog. Dev. Stud., vol. 13, no. 3, pp. Books, 2010.
221–230, Jul. 2013.
[27] L. Taylor, “What is data justice? The case for
[15] K. D. Haggerty, Richard V. Ericson, “The connecting digital rights and freedoms globally,”
surveillant assemblage,” Br. J. Sociol., vol. 51, no. Big Data Soc., vol. 4, no. 2, p. 205395171773633,
4, pp. 605–622, 2000. Dec. 2017.
[16] J. Morley and L. Floridi, “The Limits of [28] R. Heeks and J. Renken, “Data justice for
Empowerment: How to Reframe the Role of development,” Inf. Dev., vol. 34, no. 1, pp. 90–102,
mHealth Tools in the Healthcare Ecosystem,” Sci. Jan. 2018.
Eng. Ethics, no. 0123456789, 2019.
[29] J. Johnson, “The question of information justice,”
[17] T. Sharon, “When digital health meets digital Commun. ACM, vol. 59, no. 3, pp. 27–29, 2016.
capitalism, how many common goods are at stake?”
Big Data Soc., vol. 5, no. 2, p. 205395171881903, [30] L. Dencik, A. Hintz, and J. Cable, “Towards data
2018. justice? The ambiguity of anti-surveillance
resistance in political activism,” Big Data Soc., vol.
[18] S. Sterckx, J. Cockbain, H. Howard, I. Huys, and P. 3, no. 2, p. 205395171667967, Dec. 2016.
Borry, “‘Trust is not something you can reclaim
easily’: patenting in the field of direct-to-consumer [31] R. Mortier, H. Haddadi, T. Henderson, D.
genetic testing,” Genet. Med., vol. 15, no. 5, pp. McAuley, and J. Crowcroft, “Human-Data
382–387, May 2013. Interaction: The Human Face of the Data-Driven
Society,” SSRN Electron. J., Oct. 2014.
[19] S. Zuboff, “Big other: Surveillance Capitalism and
the Prospects of an Information Civilization,” J. Inf. [32] J. P. Ruger, “Toward a Theory of a Right to Health:
Technol., vol. 30, no. 1, pp. 75–89, Mar. 2015. Capability and Incompletely Theorized
Agreements.,” Yale J. law Humanit., vol. 18, no. 2,
[20] A. Puussaar, A. Clear, and P. Wright, “Better p. 3, 2006.
together: Reciprocal sharing and social
sensemaking of data,” in Workshop on “Quantified [33] J. Burrell, “How the machine ‘thinks’:
Data and Social Relationships” -CHI2017, 2017. Understanding opacity in machine learning
algorithms,” Big Data Soc., vol. 3, no. 1, p.
[21] R. Fleck and D. Harrison, “Shared PI: Sharing 205395171562251, Jan. 2016.
personal data to support reflection and behaviour
change,” in Workshop on" Beyond Personal [34] M. Loi, “The Digital Phenotype: a Philosophical
Informatics: Designing for Experiences of Data"- and Ethical Exploration,” Philos. Technol., vol. 32,
CHI2015, 2015. no. 1, pp. 155–171, Mar. 2019.
[22] S. Stals, M. Smyth, and O. Mival, “Sharing and [35] H. S. Gardiyawasam Pussewalage and V. A.
exploring Quantified-Self Data on In-Place Oleshchuk, “Privacy preserving mechanisms for
experiences and emotions,” in ACM CHI 2017 - enforcing security and privacy requirements in E-
Quantified Data and Social Relationships, 2017. health solutions,” Int. J. Inf. Manage., vol. 36, no.
6, pp. 1161–1173, 2016.
[23] B. M. Knoppers and A. M. Thorogood, “Ethics and
Big Data in health,” Curr. Opin. Syst. Biol., vol. 4, [36] F. Bellifemine, A. Poggi, and G. Rimassa, “JADE –
pp. 53–57, Aug. 2017. A FIPA-compliant Agent Framework,” Fourth Int.
Conf. Pract. Appl. Intell. Agents Multi-Agent
[24] J. P. Woolley et al., “Citizen science or scientific Technol. (PAAM 1999), pp. 97–108, 1999.
citizenship? Disentangling the uses of public
engagement rhetoric in national research [37] E. K. Adams, M. Intwala, and A. Kapadia,
initiatives,” BMC Med. Ethics, vol. 17, no. 1, p. 33, “{MeD}-Lights: A Usable Metaphor for Patient
Dec. 2016. Controlled Access to Electronic Health Records,”
in Proceedings of the 1st {ACM} International
Health Informatics Symposium, 2010.
– 152 –