then mediated by conceiving of artistic research as a new, autonomous discipline. This fosters attention both for the implications of the introduction of a research component to artistic practices and for the heterogeneity of its perspectives and outcomes. In short, artistic research outcomes should not be assessed by purely artistic nor by purely scientific standards, but by standards particular to the field of artistic research.
Establishing artistic research as a new and autonomous discipline supposes not only a collaborative effort of those involved in artistic
_Inorganic_&_Nuclear; 7: Chemistry_Multidisciplinary; 8: Chemistry_Physical; 9: Computer_Science_Hardware_&_Architecture; 10: Electrochemistry.
Analysis of Disciplinary Network Structure and Each Discipline’s Mediating Effect
After obtaining the WC co-occurrence matrix, we can map the disciplinary network by employing Netdraw ( Johnson et al., 2009 ). The WC co-occurrence matrix we used here is the original matrix derived from the bibliographic data, and the Jaccard index method proposed by Leydesdorff (2008) has not been employed here, for the total disciplines
Jose A. Moral-Munoz, Manuel Arroyo-Morales, Barbara F. Piper, Antonio I. Cuesta-Vargas, Lourdes Díaz-Rodríguez, William C.S. Cho, Enrique Herrera-Viedma and Manuel J. Cobo
In the thematic evolution diagram shown in Figure 5 , each column corresponds to a period, 1980–2008 and 2009–2013 respectively. The volume of the spheres is proportional to the number of documents associated with each theme. Solid lines mean that the linked themes share the name: both themes have the same name, or the name of one of the themes is part of the other theme. A dotted line means that the themes share elements that are not the
Dr Ying Ding is an Associate Professor of Indiana University, USA, Co-Editor-in-Chief of Journal of Data and Information Science (JDIS). She is Associate Director of Data Science Online Program, and Director of Web Science Lab. She is Changjiang Scholar at Wuhan University and Elsevier Guest Professor at Tongji University. Her research interests include scholarly communication for knowledge discovery, semantic Web for drug discovery, social network analysis for research impact, and data integration and mediation in Web 2.0. She has published more than 200
which two or more communication parties can act on each other, on the communication medium, and on the messages and also the degree to which these influences are synchronized during interaction.” This process-related variable relies on web interaction and shows the quality or condition of interaction ( Liang et al., 2010 ).
Web interaction, involved with interactive tools, tools or devices, allows various entities to engage in mediated communication ( Varadarajan et al., 2010 ). Bauer et al. (2002) suggested that Internet-related technologies, especially
’s disease and other dementias: A priority for European science and society. The Lancet Neurology, 15(5), 455–532. 10.1016/S1474-4422(16)00062-4 Winblad B. Amouyel P. Andrieu S. Ballard C. Brayne C. Brodaty H. Zetterberg H. 2016 Defeating Alzheimer’s disease and other dementias: A priority for European science and society The Lancet Neurology 15 5 455 532
Yokoyama, J.S., Wang, Y., Schork, A.J., Thompson, W.K., Karch, C.M., Cruchaga, C., . . . & Desikan, R.S. (2016). Association between genetic traits for immune-mediated diseases and Alzheimer disease. JAMA Neurology, 73
hypothesis ( Swanson, 1993 ).
Don made further analyses of complementary un-connected literatures, both by himself ( Swanson, 1990 ) and in collaboration with me (e.g. Swanson, Smalheiser, & Bookstein, 2001 ; Smalheiser & Swanson, 1994 , 1996a , 1996b , 1998 ). It is noteworthy that late in his career, Don proposed a link between atrial fibrillation and running ( Swanson, 2006 ). Exercise is known to be a risk factor for atrial fibrillation, and he proposed that this may be mediated by gastroesophageal reflux, which in turn may be alleviated by taking proton pump
Irwin Reyes, Primal Wijesekera, Joel Reardon, Amit Elazari Bar On, Abbas Razaghpanah, Narseo Vallina-Rodriguez and Serge Egelman
We present a scalable dynamic analysis framework that allows for the automatic evaluation of the privacy behaviors of Android apps. We use our system to analyze mobile apps’ compliance with the Children’s Online Privacy Protection Act (COPPA), one of the few stringent privacy laws in the U.S. Based on our automated analysis of 5,855 of the most popular free children’s apps, we found that a majority are potentially in violation of COPPA, mainly due to their use of thirdparty SDKs. While many of these SDKs offer configuration options to respect COPPA by disabling tracking and behavioral advertising, our data suggest that a majority of apps either do not make use of these options or incorrectly propagate them across mediation SDKs. Worse, we observed that 19% of children’s apps collect identifiers or other personally identifiable information (PII) via SDKs whose terms of service outright prohibit their use in child-directed apps. Finally, we show that efforts by Google to limit tracking through the use of a resettable advertising ID have had little success: of the 3,454 apps that share the resettable ID with advertisers, 66% transmit other, non-resettable, persistent identifiers as well, negating any intended privacy-preserving properties of the advertising ID.
Luís T. A. N. Brandão, Nicolas Christin, George Danezis and Anonymous
Available online public/governmental services requiring authentication by citizens have considerably expanded in recent years. This has hindered the usability and security associated with credential management by users and service providers. To address the problem, some countries have proposed nation-scale identification/authentication systems that intend to greatly reduce the burden of credential management, while seemingly offering desirable privacy benefits. In this paper we analyze two such systems: the Federal Cloud Credential Exchange (FCCX) in the United States and GOV.UK Verify in the United Kingdom, which altogether aim at serving more than a hundred million citizens. Both systems propose a brokered identification architecture, where an online central hub mediates user authentications between identity providers and service providers. We show that both FCCX and GOV.UK Verify suffer from serious privacy and security shortcomings, fail to comply with privacy-preserving guidelines they are meant to follow, and may actually degrade user privacy. Notably, the hub can link interactions of the same user across different service providers and has visibility over private identifiable information of citizens. In case of malicious compromise it is also able to undetectably impersonate users. Within the structural design constraints placed on these nation-scale brokered identification systems, we propose feasible technical solutions to the privacy and security issues we identified. We conclude with a strong recommendation that FCCX and GOV.UK Verify be subject to a more in-depth technical and public review, based on a defined and comprehensive threat model, and adopt adequate structural adjustments.
Computation based on genomic data is becoming increasingly popular today, be it for medical or other purposes. Non-medical uses of genomic data in a computation often take place in a server-mediated setting where the server offers the ability for joint genomic testing between the users. Undeniably, genomic data is highly sensitive, which in contrast to other biometry types, discloses a plethora of information not only about the data owner, but also about his or her relatives. Thus, there is an urgent need to protect genomic data. This is particularly true when the data is used in computation for what we call recreational non-health-related purposes. Towards this goal, in this work we put forward a framework for server-aided secure two-party computation with the security model motivated by genomic applications. One particular security setting that we treat in this work provides stronger security guarantees with respect to malicious users than the traditional malicious model. In particular, we incorporate certified inputs into secure computation based on garbled circuit evaluation to guarantee that a malicious user is unable to modify her inputs in order to learn unauthorized information about the other user’s data. Our solutions are general in the sense that they can be used to securely evaluate arbitrary functions and offer attractive performance compared to the state of the art. We apply the general constructions to three specific types of genomic tests: paternity, genetic compatibility, and ancestry testing and implement the constructions. The results show that all such private tests can be executed within a matter of seconds or less despite the large size of one’s genomic data.