Adtech and Children’s Data Rights

2021 ◽  
Vol 44 (3) ◽  
Author(s):  
Lisa Archbold ◽  
Damian Clifford ◽  
Moira Paterson ◽  
Megan Richardson ◽  
Normann Witzleb

The advertising technology industry, known as ‘adtech’, is a complicated network of organisations and individuals that collect, aggregate and deal with large amounts of personal data. As children engage with digital networks for many aspects of their lives, they are increasingly exposed to adtech practices. Depending on their age, children may have less knowledge of the commercial digital environment and less maturity in their decision-making processes than adults have. Their limited resilience in the face of adtech’s onslaught offers a particularly stark illustration of why it is problematic to look to ‘consent’ as the exclusive or predominant mechanism to control the use of consumer data in the digital ecosystem. This article examines the problems arising from adtech’s data practices and makes recommendations on how to strengthen the agency and control exercised by children and protect their best interests in the context of adtech.

2018 ◽  
Vol 62 (10) ◽  
pp. 1319-1337 ◽  
Author(s):  
Yong Jin Park ◽  
Jae Eun Chung ◽  
Dong Hee Shin

This study presents a conceptual model of understanding algorithmic digital surveillance systems, borrowing insight from Giddens, who proposed the notion of structuration as social practices deriving from the intersection between structure and agents. We argue that the status of privacy, or lack of it, is a product of these interactions, of which the personal data practices and related interests constitute the reproduction of a data ecosystem. We trace the process of data production and consumption, dissecting the interactive dynamics between digital media producers (personal data users) and users (personal data producers). Inadequacies, limits, and social and policy implications of data surveillance and its algorithmic reproduction of identities are discussed.


2020 ◽  
Author(s):  
Qiangsheng Huang

BACKGROUND As of the end of February 2020, 2019-nCoV is currently well controlled in China. However, the virus is now spreading globally. OBJECTIVE This study aimed to evaluate the effectiveness of outbreak prevention and control measures in a region. METHODS A model is built for find the best fit for two sets of data (the number of daily new diagnosed, and the risk value of incoming immigration population). The parameters (offset and time window) in the model can be used as the evaluation of effectiveness of outbreak prevention and control. RESULTS Through study, it is found that the parameter offset and time window in the model can accurately reflect the prevention effectiveness. Some related data and public news confirm this result. And this method has advantages over the method using R0 in two aspects. CONCLUSIONS If the epidemic situation is well controlled, the virus is not terrible. Now the daily new diagnosed patients in most regions of China is quickly reduced to zero or close to zero. Chinese can do a good job in the face of huge epidemic pressure. Therefore, if other countries can do well in prevention and control, the epidemic in those places can also pass quickly.


Electronics ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 1208
Author(s):  
Francisco Alonso ◽  
Mireia Faus ◽  
Cristina Esteban ◽  
Sergio A. Useche

Technological devices are becoming more and more integrated in the management and control of traffic in big cities. The population perceives the benefits provided by these systems, and, therefore, citizens usually have a favorable opinion of them. However, emerging countries, which have fewer available infrastructures, could present a certain lack of trust. The objective of this work is to detect the level of knowledge and predisposition towards the use of new technologies in the transportation field of the Dominican Republic. For this study, the National Survey on Mobility was administered to a sample of Dominican citizens, proportional to the ONE census and to sex, age and province. The knowledge of ITS topics, as well as the use of mobile applications for mobility, are scarce; however, there was a significant increase that can be observed in only one year. Moreover, technology is, in general, positively assessed for what concerns the improvement of the traffic field, even though there is a lack of predisposition to provide one’s personal data, which is necessary for these devices. The process of technological development in the country must be backed up by laws that protect the citizens’ privacy. Thus, technologies that can improve road safety, mobility and sustainability can be implemented in the country.


2021 ◽  
Vol 43 (2) ◽  
pp. 262-278
Author(s):  
Ariane Dupont-Kieffer ◽  
Sylvie Rivot ◽  
Jean-Loup Madre

The golden age of road demand modeling began in the 1950s and flourished in the 1960s in the face of major road construction needs. These macro models, as well as the econometrics and the data to be processed, were provided mainly by engineers. A division of tasks can be observed between the engineers in charge of estimating the flows within the network and the transport economists in charge of managing these flows once they are on the road network. Yet the inability to explain their decision-making processes and individual drives gave some room to economists to introduce economic analysis, so as to better understand individual or collective decisions between transport alternatives. Economists, in particular Daniel McFadden, began to offer methods to improve the measure of utility linked to transport and to inform the engineering approach. This paper explores the challenges to the boundaries between economics and engineering in road demand analysis.


2021 ◽  
pp. 194173812110282
Author(s):  
Ayami Yoshihara ◽  
Erin E. Dierickx ◽  
Gabrielle J. Brewer ◽  
Yasuki Sekiguchi ◽  
Rebecca L. Stearns ◽  
...  

Background: While increased face mask use has helped reduce COVID-19 transmission, there have been concerns about its influence on thermoregulation during exercise in the heat, but consistent, evidence-based recommendations are lacking. Hypothesis: No physiological differences would exist during low-to-moderate exercise intensity in the heat between trials with and without face masks, but perceptual sensations could vary. Study Design: Crossover study. Level of Evidence: Level 2. Methods: Twelve physically active participants (8 male, 4 female; age = 24 ± 3 years) completed 4 face mask trials and 1 control trial (no mask) in the heat (32.3°C ± 0.04°C; 54.4% ± 0.7% relative humidity [RH]). The protocol was 60 minutes of walking and jogging between 35% and 60% of relative VO2max. Rectal temperature (Trec), heart rate (HR), temperature and humidity inside and outside of the face mask (Tmicro_in, Tmicro_out, RHmicro_in, RHmicro_out) and perceptual variables (rating of perceived exertion (RPE), thermal sensation, thirst sensation, fatigue level, and overall breathing discomfort) were monitored throughout all trials. Results: Mean Trec and HR increased at 30- and 60-minute time points compared with 0-minute time points, but no difference existed between face mask trials and control trials ( P > 0.05). Mean Tmicro_in, RHmicro_in, and humidity difference inside and outside of the face mask (ΔRHmicro) were significantly different between face mask trials ( P < 0.05). There was no significant difference in perceptual variables between face mask trials and control trials ( P > 0.05), except overall breathing discomfort ( P < 0.01). Higher RHmicro_in, RPE, and thermal sensation significantly predicted higher overall breathing discomfort ( r2 = 0.418; P < 0.01). Conclusion: Face mask use during 60 minutes of low-to-moderate exercise intensity in the heat did not significantly affect Trec or HR. Although face mask use may affect overall breathing discomfort due to the changes in the face mask microenvironment, face mask use itself did not cause an increase in whole body thermal stress. Clinical Relevance: Face mask use is feasible and safe during exercise in the heat, at low-to-moderate exercise intensities, for physically active, healthy individuals.


2020 ◽  
pp. 096973302096677
Author(s):  
Michael Wilson ◽  
Marie Wilson ◽  
Suzanne Edwards ◽  
Lynette Cusack ◽  
Richard Wiechula

Background: Legal assisted dying is a rare event, but as legalisation expands, requests for it will likely increase, and the nurse most often receives the informal, initial request. Objectives: To assess the effects of attitude in interaction with normative and control beliefs on an intention to respond to a request for legal assisted dying. Ethical considerations: The study had the lead author’s institutional ethics approval, and participants were informed that participation was both anonymous and voluntary. Methodology: This was a cross-sectional correlational study of 377 Australian registered nurses who completed an online survey. Generalised linear modelling assessed the effects of independent variables against intended responses to requests for legal assisted dying. Results: Compared to nurses who did not support legal assisted dying, nurses who did had stronger beliefs in patient rights, perceived social expectations to refer the request and stronger control in that intention. Nurses who did not support legal assisted dying had stronger beliefs in ethics of duty to the patient and often held dual intentions to discuss the request with the patient but also held an intention to deflect the request to consideration of alternatives. Discussion: This study advances the international literature by developing quantified models explaining the complexity of nurses’ experiences with requests for an assisted death. Attitude was operationalised in interaction with other beliefs and was identified as the strongest influence on intentions, but significantly moderated by ethical norms. Conclusion: The complex of determinants of those intentions to respond to requests for an assisted death suggests they are not isolated from each other. Nurses might have distinct intentions, but they can also hold multiple intentions even when they prioritise one. These findings present opportunities to prepare nurses in a way that enhances moral resilience in the face of complex moral encounters.


2021 ◽  
Vol 2021 (2) ◽  
pp. 88-110
Author(s):  
Duc Bui ◽  
Kang G. Shin ◽  
Jong-Min Choi ◽  
Junbum Shin

Abstract Privacy policies are documents required by law and regulations that notify users of the collection, use, and sharing of their personal information on services or applications. While the extraction of personal data objects and their usage thereon is one of the fundamental steps in their automated analysis, it remains challenging due to the complex policy statements written in legal (vague) language. Prior work is limited by small/generated datasets and manually created rules. We formulate the extraction of fine-grained personal data phrases and the corresponding data collection or sharing practices as a sequence-labeling problem that can be solved by an entity-recognition model. We create a large dataset with 4.1k sentences (97k tokens) and 2.6k annotated fine-grained data practices from 30 real-world privacy policies to train and evaluate neural networks. We present a fully automated system, called PI-Extract, which accurately extracts privacy practices by a neural model and outperforms, by a large margin, strong rule-based baselines. We conduct a user study on the effects of data practice annotation which highlights and describes the data practices extracted by PI-Extract to help users better understand privacy-policy documents. Our experimental evaluation results show that the annotation significantly improves the users’ reading comprehension of policy texts, as indicated by a 26.6% increase in the average total reading score.


Author(s):  
Sophy Baird

Children are afforded a number of protections when they encounter the criminal justice system. The need for special protection stems from the vulnerable position children occupy in society. When children form part of the criminal justice system, either by being an offender, victim, or witness, they may be subjected to harm. To mitigate against the potential harm that may be caused, our law provides that criminal proceedings involving children should not be open to the public, subject to the discretion of the court. This protection naturally seems at odds with the principle of open justice. However, the courts have reconciled the limitation with the legal purpose it serves. For all the protection and the lengths that the law goes to protect the identity of children in this regard, it appears there is an unofficial timer dictating when this protection should end. The media have been at the forefront of this conundrum to the extent that they believe that once a child (offender, victim, or witness) turns 18 years old, they are free to reveal the child's identity. This belief, grounded in the right to freedom of expression and the principle of open justice, is at odds with the principle of child's best interests, right to dignity and the right to privacy. It also stares incredulously in the face of the aims of the Child Justice Act and the principles of restorative justice. Measured against the detrimental psychological effects experienced by child victims, witnesses, and offenders, this article aims to critically analyse the legal and practical implications of revealing the identity of child victims, witnesses, and offenders after they turn 18 years old.


Janus Head ◽  
2007 ◽  
Vol 10 (1) ◽  
pp. 217-238
Author(s):  
Kevin Aho ◽  

This paper attempts to reconcile, what appear to be, two conflicting accounts of authenticity in Heidegger's thought. Authenticity in Being and Time (1927) is commonly interpreted in 'existentialist' terms as willful commitment and resoluteness (Entschlossenheit) in the face of one's own death but, by the late 1930's, is reintroduced in terms of Gelassenlieit, as a non-willful openness that "lets beings be." By employing Heidegger's conception of authentic historicality (Geschiclidichkeit), understood as the retrieval of Dasein's past, and drawing on his writings on Hölderlin in the 1930'sand 1940's, I suggest that the ancient interpretation of leisure and festivity may play an important role in unifying these conflicting accounts. Genuine leisure, interpreted as a form of play (Spiel), frees us from inauthentic busy-ness and gives us an opening to face the abyssal nature of our own being and the mystery that "beings are" in the flrst place. To this end, leisure re-connects us with wonder (Erstaunen) as the original temperament of Western thought. In leisurely wonder, the authentic self does not seek purposive mastery and control over beings but calmly accepts the unsettledness ofbeing and is, as a result, allowed into the original openness or space of play of time (Zeit-Spiel-Raum) that lets beings emerge-into-presence on their own terms.


2018 ◽  
Vol 25 (3) ◽  
pp. 284-307
Author(s):  
Giovanni Comandè ◽  
Giulia Schneider

Abstract Health data are the most special of the ‘special categories’ of data under Art. 9 of the General Data Protection Regulation (GDPR). The same Art. 9 GDPR prohibits, with broad exceptions, the processing of ‘data concerning health’. Our thesis is that, through data mining technologies, health data have progressively undergone a process of distancing from the healthcare sphere as far as the generation, the processing and the uses are concerned. The case study aims thus to test the endurance of the ‘special category’ of health data in the face of data mining technologies and the never-ending lifecycles of health data they feed. At a more general level of analysis, the case of health data shows that data mining techniques challenge core data protection notions, such as the distinction between sensitive and non-sensitive personal data, requiring a shift in terms of systemic perspectives that the GDPR only partly addresses.


Sign in / Sign up

Export Citation Format

Share Document