165 items found

Filter Results
  • JournalArticle

    Big Data Ethics

    The speed of development in Big Data and associated phenomena, such as social media, has surpassed the capacity of the average consumer to understand his or her actions and...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Democratizing Algorithmic Fairness

    Machine learning algorithms can now identify patterns and correlations in (big) datasets and predict outcomes based on the identified patterns and correlations. They can then...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Designing for human rights in AI

    In the age of Big Data, companies and governments are increasingly using algorithms to inform hiring decisions, employee management, policing, credit scoring, insurance...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Conformity a Path-Aware Homophily measure for Node-Attributed Networks

    Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Fair detection of poisoning attacks in federated learning

    Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Fairness and Abstraction in Sociotechnical Systems

    A key goal of the fair-ML community is to develop machine-learning based systems that, once introduced into a social context, can achieve social and legal outcomes such as...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Efficient detection of Byzantine attacks in federated learning using last lay...

    Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Epidemics and city. How mobility and well being changed with COVID19 era

    How did the COVID-19 epidemics change our mobility habits, and how did it impact on people’s well-being and on the virus transmissibility? In the first webinar of the seminar...
    • HTML
      The resource: 'Epidemics and the city: ...' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Ethical Value Centric Cybersecurity. A Methodology Based on a Value Graph

    Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies (ICTs). The...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Identifying and exploiting homogeneous communities in labeled networks

    Attribute-aware community discovery aims to find well-connected communities that are also homogeneous w.r.t. the labels carried by the nodes. In this work, we address such a...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • BookChapter

    Information Technology Privacy and the Protection of Personal Data

    Information technology allows us to generate, store, and process huge quantities of data. Search engines, satellites, sensor networks, scientists, security agencies,...
    • HTML
      The resource: 'DOI: ...' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'Web page' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Book chapter' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Explaining misclassification and attacks in deep learning via random forests

    Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Measuring discrimination in algorithmic decision making

    Society is increasingly relying on data-driven predictive models for automated decision making. This is not by design, but due to the nature and noisiness of observational...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Privacy in the clouds

    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by...
    • HTML
      The resource: 'DOI: 10.1007/s12394-008-0005-z' is not accessible as guest user. You must login to access it!
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Recommender systems and their ethical challenges

    This article presents the first, systematic analysis of the ethical challenges posed by recommender systems through a literature review. The article identifies six areas of...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The ambiguity of nestedness under soft and hard constraints

    Many real networks feature the property of nestedness, i.e. the neighbours of nodes with a few connections are hierarchically nested within the neighbours of nodes with more...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The democracy of emergency at the time of the coronavirus the virtues of privacy

    The emergency of the Coronavirus imposes a cultural debate on the balancing of rights, freedoms and social responsibilities, finalized to the protection of individual and...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The fundamental rights challenges of algorithms

    Algorithms form an increasingly important part of our daily lives, even if we are often unaware of it. They are enormously useful in many different ways. They facilitate the...
    • HTML
      The resource: 'DOI: 10.1177/0924051919861773' is not accessible as guest user. You must login to access it!
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The role of geography in the complex diffusion of innovations

    The urban–rural divide is increasing in modern societies calling for geographical extensions of social influence modelling. Improved understanding of innovation diffusion...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Structural Invariants in Individuals Language Use The Ego Network of Words

    The cognitive constraints that humans exhibit in their social interactions have been extensively studied by anthropologists, who have highlighted their regularities across...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!