6 items found

Tags: Privacy Ethics

Filter Results
  • Dataset

    Multi-Task Faces (MTF) dataset

    The Multi-Task Faces (MTF) dataset consists of cropped human faces for classification tasks or other research purposes. Each image in the dataset is labelled according to four...
    • ZIP
      The resource: 'MTF_dataset_20230701' is not accessible as guest user. You must login to access it!
  • Method

    Python library for direct and indirect discrimination prevention in data mining

    This python library implements the discrimination discovery and prevention method proposed in the paper: “A methodology for direct and indirect discrimination prevention in...
    • GitHub
      The resource: 'Link to library' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Tutorials on anonymization and antidiscrimination of datasets

    These tutorials show how to use the already implemented libraries for the anonymization and antidiscrimination of data sets: - Anonymization library:...
    • The resource: 'Anonymization library ...' is not accessible as guest user. You must login to access it!
    • The resource: 'Antidiscrimination library ...' is not accessible as guest user. You must login to access it!
    • ipynb
      The resource: 'anonymization_training' is not accessible as guest user. You must login to access it!
    • ipynb
      The resource: 'antiDiscrimination_training' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'Unnamed resource' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Second SoBigData Plus Plus Awareness Panel R. I. Platforms Data Protection an...

    This webinar, which took place on 10 November 2020, was aimed at exploring the theme of data protection and intellectual property issues in platforms. The first speaker was...
    • HTML
      The resource: 'Second SoBigData++ ...' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Ethical Value Centric Cybersecurity. A Methodology Based on a Value Graph

    Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies (ICTs). The...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
You can also access this registry using the API (see API Docs).