scholarly journals Reimagining data responsibility: 10 new approaches toward a culture of trust in re-using data to address critical public needs

Data & Policy ◽  
2021 ◽  
Vol 3 ◽  
Author(s):  
Stefaan G. Verhulst

Abstract Data and data science offer tremendous potential to address some of our most intractable public problems (including the Covid-19 pandemic). At the same time, recent years have shown some of the risks of existing and emerging technologies. An updated framework is required to balance potential and risk, and to ensure that data is used responsibly. Data responsibility is not itself a new concept. However, amid a rapidly changing technology landscape, it has become increasingly clear that the concept may need updating, in order to keep up with new trends such as big data, open data, the Internet of things, and artificial intelligence, and machine learning. This paper seeks to outline 10 approaches and innovations for data responsibility in the 21st century. The 10 emerging concepts we have identified include: End-to-end data responsibility Decision provenance Professionalizing data stewardship From data science to question science Contextual consent Responsibility by design Data asymmetries and data collaboratives Personally identifiable inference Group privacy Data assemblies Each of these is described at greater length in the paper, and illustrated with examples from around the world. Put together, they add up to a framework or outline for policy makers, scholars, and activists who seek to harness the potential of data to solve complex social problems and advance the public good. Needless to say, the 10 approaches outlined here represent just a start. We envision this paper more as an exercise in agenda-setting than a comprehensive survey.

Author(s):  
Jock R. Anderson ◽  
Regina Birner ◽  
Latha Najarajan ◽  
Anwar Naseem ◽  
Carl E. Pray

Abstract Private agricultural research and development can foster the growth of agricultural productivity in the diverse farming systems of the developing world comparable to the public sector. We examine the extent to which technologies developed by private entities reach smallholder and resource-poor farmers, and the impact they have on poverty reduction. We critically review cases of successfully deployed improved agricultural technologies delivered by the private sector in both large and small developing countries for instructive lessons for policy makers around the world.


Games ◽  
2021 ◽  
Vol 12 (3) ◽  
pp. 63
Author(s):  
Ramzi Suleiman ◽  
Yuval Samid

Experiments using the public goods game have repeatedly shown that in cooperative social environments, punishment makes cooperation flourish, and withholding punishment makes cooperation collapse. In less cooperative social environments, where antisocial punishment has been detected, punishment was detrimental to cooperation. The success of punishment in enhancing cooperation was explained as deterrence of free riders by cooperative strong reciprocators, who were willing to pay the cost of punishing them, whereas in environments in which punishment diminished cooperation, antisocial punishment was explained as revenge by low cooperators against high cooperators suspected of punishing them in previous rounds. The present paper reconsiders the generality of both explanations. Using data from a public goods experiment with punishment, conducted by the authors on Israeli subjects (Study 1), and from a study published in Science using sixteen participant pools from cities around the world (Study 2), we found that: 1. The effect of punishment on the emergence of cooperation was mainly due to contributors increasing their cooperation, rather than from free riders being deterred. 2. Participants adhered to different contribution and punishment strategies. Some cooperated and did not punish (‘cooperators’); others cooperated and punished free riders (‘strong reciprocators’); a third subgroup punished upward and downward relative to their own contribution (‘norm-keepers’); and a small sub-group punished only cooperators (‘antisocial punishers’). 3. Clear societal differences emerged in the mix of the four participant types, with high-contributing pools characterized by higher ratios of ‘strong reciprocators’, and ‘cooperators’, and low-contributing pools characterized by a higher ratio of ‘norm keepers’. 4. The fraction of ‘strong reciprocators’ out of the total punishers emerged as a strong predictor of the groups’ level of cooperation and success in providing the public goods.


Author(s):  
Osmat Azzam Jefferson ◽  
Simon Lang ◽  
Kenny Williams ◽  
Deniz Koellhofer ◽  
Aaron Ballagh ◽  
...  

AbstractCRISPR-Cas9 is a revolutionary technology because it is precise, fast and easy to implement, cheap and components are readily accessible. This versatility means that the technology can deliver a timely end product and can be used by many stakeholders. In plant cells, the technology can be applied to knockout genes by using CRISPR–Cas nucleases that can alter coding gene regions or regulatory elements, alter precisely a genome by base editing to delete or regulate gene expression, edit precisely a genome by homology-directed repair mechanism (cellular DNA), or regulate transcriptional machinery by using dead Cas proteins to recruit regulators to the promoter region of a gene. All these applications can be for: 1) Research use (Non commercial), 2) Uses related product components for the technology itself (reagents, equipment, toolkits, vectors etc), and 3) Uses related to the development and sale of derived end products based on this technology. In this contribution, we present a prototype report that can engage the community in open, inclusive and collaborative innovation mapping. Using the open data at the Lens.org platform and other relevant sources, we tracked, analyzed, organized, and assembled contextual and bridged patent and scholarly knowledge about CRISPR-Cas9 and with the assistance of a new Lens institutional capability, The Lens Report Builder, currently in beta release, mapped the public and commercial innovation pathways of the technology. When scaled, this capability will also enable coordinated editing and curation by credentialed experts to inform policy makers, businesses and private or public investment.


2020 ◽  
Vol 9 (2) ◽  
pp. 136-138 ◽  
Author(s):  
Md. Siddikur Rahman ◽  
Noah C. Peeri ◽  
Nistha Shrestha ◽  
Rafdzah Zaki ◽  
Ubydul Haque ◽  
...  

2019 ◽  
Vol 21 (2) ◽  
pp. 1676-1717 ◽  
Author(s):  
Muhammad Salek Ali ◽  
Massimo Vecchio ◽  
Miguel Pincheira ◽  
Koustabh Dolui ◽  
Fabio Antonelli ◽  
...  

2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


F1000Research ◽  
2017 ◽  
Vol 6 ◽  
pp. 12 ◽  
Author(s):  
Stéphanie Boué ◽  
Thomas Exner ◽  
Samik Ghosh ◽  
Vincenzo Belcastro ◽  
Joh Dokler ◽  
...  

The US FDA defines modified risk tobacco products (MRTPs) as products that aim to reduce harm or the risk of tobacco-related disease associated with commercially marketed tobacco products.  Establishing a product’s potential as an MRTP requires scientific substantiation including toxicity studies and measures of disease risk relative to those of cigarette smoking.  Best practices encourage verification of the data from such studies through sharing and open standards. Building on the experience gained from the OpenTox project, a proof-of-concept database and website (INTERVALS) has been developed to share results from both in vivo inhalation studies and in vitro studies conducted by Philip Morris International R&D to assess candidate MRTPs. As datasets are often generated by diverse methods and standards, they need to be traceable, curated, and the methods used well described so that knowledge can be gained using data science principles and tools. The data-management framework described here accounts for the latest standards of data sharing and research reproducibility. Curated data and methods descriptions have been prepared in ISA-Tab format and stored in a database accessible via a search portal on the INTERVALS website. The portal allows users to browse the data by study or mechanism (e.g., inflammation, oxidative stress) and obtain information relevant to study design, methods, and the most important results. Given the successful development of the initial infrastructure, the goal is to grow this initiative and establish a public repository for 21st-century preclinical systems toxicology MRTP assessment data and results that supports open data principles.


Sign in / Sign up

Export Citation Format

Share Document