المراجع
-
Anderson, Chris. 2008. The Long Tail: Why the Future of Business Is Selling Less of More. Rev. ed. New York: Hachette Books.
-
Baldridge, Jason. 2015. “Machine Learning and Human Bias: An Uneasy Pair.” TechCrunch, August 2. http://social.techcrunch.com/2015/08/02/machine-learning-and-human-bias-an-uneasy-pair.
-
Barry-Jester, Anna Maria, Ben Casselman, and Dana Goldstein. 2015. “Should Prison Sentences Be Based on Crimes That Haven’t Been Committed Yet?” FiveThirtyEight, August 4. https://fivethirtyeight.com/features/prison-reform-risk-assessment.
-
Batty, Mike, Arun Tripathi, Alice Kroll, Peter Wu Cheng-sheng, David Moore, Chris Stehno, Lucas Lau, Jim Guszcza, and Mitch Katcher. 2010. “Predictive Modeling for Life Insurance: Ways Life Insurers Can Participate in the Business Analytics Revolution.” Society of Actuaries. https://www.soa.org/files/pdf/research-pred-mod-life-batty.pdf.
-
Beales, Howard. 2010. “The Value of Behavioral Targeting.” Network Advertising Initiative. http://www.networkadvertising.org/pdfs/Beales_NAI_Study.pdf.
-
Berk, Richard A., and Justin Bleich. 2013. “Statistical Procedures for Forecasting Criminal Behavior.” Criminology & Public Policy 12 (3): 513–544.
-
Box, George E. P. 1979. “Robustness in the Strategy of Scientific Model Building.” In Robustness in Statistics, ed. R. L. Launer and G. N. Wilkinson, 201–236. New York: Academic Press.
-
Breiman, Leo. 2001. “Statistical Modeling: The Two Cultures (with Comments and a Rejoinder by the Author).” Statistical Science 16 (3): 199–231. doi:10.1214/ss/1009213726.
-
Brown, Meta S. 2014. Data Mining for Dummies. New York: Wiley. http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118893174,subjectCd-STB0.html.
-
Brynjolfsson, Erik, Lorin M. Hitt, and Heekyung Hellen Kim. 2011. “Strength in Numbers: How Does Data-Driven Decisionmaking Affect Firm Performance?” SSRN Scholarly Paper ID 1819486. Social Science Research Network, Rochester, NY. https://papers.ssrn.com/abstract=1819486.
-
Burt, Andrew. 2017. “Is There a ‘Right to Explanation’ for Machine Learning in the GDPR?” https://iapp.org/news/a/is-there-a-right-to-explanation-for-machine-learning-in-the-gdpr.
-
Buytendijk, Frank, and Jay Heiser. 2013. “Confronting the Privacy and Ethical Risks of Big Data.” Financial Times, September 24. https://www.ft.com/content/105e30a4-2549-11e3-b349-00144feab7de.
-
Carroll, Rory. 2013. “Welcome to Utah, the NSA’s Desert Home for Eavesdropping on America.” Guardian, June 14. https://www.theguardian.com/world/2013/jun/14/nsa-utah-data-facility.
-
Cavoukian, Ann. 2013. “Privacy by Design: The 7 Foundation Principles (Primer).” Information and Privacy Commissioner, Ontario, Canada. https://www.ipc.on.ca/wp-content/uploads/2013/09/pbd-primer.pdf.
-
Chapman, Pete, Julian Clinton, Randy Kerber, Thomas Khabaza, Thomas Reinartz, Colin Shearer, and Rudiger Wirth. 1999. “CRISP-DM 1.0: Step-by-Step Data Mining Guide.” ftp://ftp.software.ibm.com/software/analytics/spss/support/Modeler/Documentation/14/UserManual/CRISP-DM.pdf.
-
Charter of Fundamental Rights of the European Union. 2000. Official Journal of the European Communities C (364): 1–22.
-
Cleveland, William S. 2001. “Data Science: An Action Plan for Expanding the Technical Areas of the Field of Statistics.” International Statistical Review 69 (1): 21–26. doi:10.1111/j.1751-5823.2001.tb00477.x.
-
Clifford, Stephanie. 2012. “Supermarkets Try Customizing Prices for Shoppers.” New York Times, August 9. http://www.nytimes.com/2012/08/10/business/supermarkets-try-customizing-prices-for-shoppers.html.
-
Council of the European Union and European Parliament. 1995. “95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data.” Official Journal of the European Community L 281: 38-1995: 31–50.
-
Council of the European Union and European Parliament. 2016. “General Data Protection Regulation of the European Council and Parliament.” Official Journal of the European Union L 119: 1-2016. http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf.
-
CrowdFlower. 2016. 2016 Data Science Report. http://visit.crowdflower.com/rs/416-ZBE-142/images/CrowdFlower_DataScienceReport_2016.pdf.
-
Datta, Amit, Michael Carl Tschantz, and Anupam Datta. 2015. “Automated Experiments on Ad Privacy Settings.” Proceedings on Privacy Enhancing Technologies 2015 (1): 92–112.
-
DeZyre. 2015. “How Big Data Analysis Helped Increase Walmart’s Sales Turnover.” May 23. https://www.dezyre.com/article/how-big-data-analysis-helped-increase-walmarts-sales-turnover/109.
-
Dodge, Martin, and Rob Kitchin. 2007. “The Automatic Management of Drivers and Driving Spaces.” Geoforum 38 (2): 264–275.
-
Dokoupil, Tony. 2013. “‘Small World of Murder’: As Homicides Drop, Chicago Police Focus on Social Networks of Gangs.” NBC News, December 17. http://www.nbcnews.com/news/other/small-world-murder-homicides-drop-chicago-police-focus-social-networks-f2D11758025.
-
Duhigg, Charles. 2012. “How Companies Learn Your Secrets.” New York Times, February 16. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html.
-
Dwork, Cynthia, and Aaron Roth. 2014. “The Algorithmic Foundations of Differential Privacy.” Foundations and Trends® in Theoretical Computer Science 9 (3-4): 211–407.
-
Eliot, T. S. 1934 [1952]. “Choruses from ‘The Rock.’” In T. S. Eliot: The Complete Poems and Plays—1909–1950. San Diego: Harcourt, Brace and Co.
-
Elliott, Christopher. 2004. “BUSINESS TRAVEL; Some Rental Cars Are Keeping Tabs on the Drivers.” New York Times, January 13. http://www.nytimes.com/2004/01/13/business/business-travel-some-rental-cars-are-keeping-tabs-on-the-drivers.html.
-
Eurobarometer. 2015. “Data Protection.” Special Eurobarometer 431. http://ec.europa.eu/COMMFrontOffice/publicopinion/index.cfm/Survey/index#p=1&instruments=SPECIAL.
-
European Commission. 2012. “Commission Proposes a Comprehensive Reform of the Data Protection Rules-European Commission.” January 25. http://ec.europa.eu/justice/newsroom/data-protection/news/120125_en.htm.
-
European Commission. 2016. “The EU-U.S. Privacy Shield.” December 7. http://ec.europa.eu/justice/data-protection/international-transfers/eu-us-privacy-shield/index_en.htm.
-
Federal Trade Commission. 2012. Protecting Consumer Privacy in an Era of Rapid Change. Washington, DC: Federal Trade Commission. https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf.
-
Few, Stephen. 2012. Show Me the Numbers: Designing Tables and Graphs to Enlighten. 2nd ed. Burlingame, CA: Analytics Press.
-
Goldfarb, Avi, and Catherine E. Tucker. 2011. “Online Advertising, Behavioral Targeting, and Privacy.” Communications of the ACM 54 (5): 25–27.
-
Gorner, Jeremy. 2013. “Chicago Police Use Heat List as Strategy to Prevent Violence.” Chicago Tribune, August 21. http://articles.chicagotribune.com/2013-08-21/news/ct-met-heat-list-20130821_1_chicago-police-commander-andrew-papachristos-heat-list.
-
Hall, Mark, Ian Witten, and Eibe Frank. 2011. Data Mining: Practical Machine Learning Tools and Techniques. Amsterdam: Morgan Kaufmann.
-
Han, Jiawei, Micheline Kamber, and Jian Pei. 2011. Data Mining: Concepts and Techniques. 3rd ed. Haryana, India: Morgan Kaufmann.
-
Harkness, Timandra. 2016. Big Data: Does Size Matter? New York: Bloomsbury Sigma.
-
Henke, Nicolaus, Jacques Bughin, Michael Chui, James Manyika, Tamim Saleh, and Bill Wiseman. 2016. The Age of Analytics: Competing in a Data-Driven World. Chicago: McKinsey Global Institute. http://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/the-age-of-analytics-competing-in-a-data-driven-world.
-
Hill, Shawndra, Foster Provost, and Chris Volinsky. 2006. “Network-Based Marketing: Identifying Likely Adopters via Consumer Networks.” Statistical Science 21 (2): 256–276. doi:10.1214/088342306000000222.
-
Hunt, Priscillia, Jessica Saunders, and John S. Hollywood. 2014. Evaluation of the Shreveport Predictive Policing Experiment. Santa Monica, CA: Rand Corporation. http://www.rand.org/pubs/research_reports/RR531.
-
Innes, Martin. 2001. “Control Creep.” Sociological Research Online 6 (3). https://ideas.repec.org/a/sro/srosro/2001-45-2.html.
-
Kelleher, John D. 2016. “Fundamentals of Machine Learning for Neural Machine Translation.” In Proceedings of the European Translation Forum, 1–15. Brussels: European Commission Directorate-General for Translation. https://tinyurl.com/RecurrentNeuralNetworks.
-
Kelleher, John D., Brian Mac Namee, and Aoife D’Arcy. 2015. Fundamentals of Machine Learning for Predictive Data Analytics. Cambridge, MA: MIT Press.
-
Kerr, Aphra. 2017. Global Games: Production, Circulation, and Policy in the Networked Era. New York: Routledge.
-
Kitchin, Rob. 2014a. The Data Revolution: Big Data, Open Data, Data Infrastructures, and Their Consequences. Los Angeles: Sage.
-
Kitchin, Rob. 2014b. “The Real-Time City? Big Data and Smart Urbanism.” GeoJournal 79 (1): 1–14. doi:10.1007/s10708-013-9516-8.
-
Koops, Bert-Jaap. 2011. “Forgetting Footprints, Shunning Shadows: A Critical Analysis of the ‘Right to Be Forgotten’ in Big Data Practice.” Tilburg Law School Legal Studies Research Paper no. 08/2012. SCRIPTed 8 (3): 229–56. doi:10.2139/ssrn.1986719.
-
Korzybski, Alfred. 1996. “On Structure.” In Science and Sanity: An Introduction to Non-Aristotelian Systems and General Semantics, CD-ROM, ed. Charlotte Schuchardt-Read. Englewood, NJ: Institute of General Semantics. http://esgs.free.fr/uk/art/sands.htm.
-
Kosinski, Michal, David Stillwell, and Thore Graepel. 2013. “Private Traits and Attributes Are Predictable from Digital Records of Human Behavior.” Proceedings of the National Academy of Sciences of the United States of America 110 (15): 5802–5805. doi:10.1073/pnas.1218772110.
-
Le Cun, Yann. 1989. Generalization and Network Design Strategies. Technical Report CRG-TR-89-4. Toronto: University of Toronto Connectionist Research Group.
-
Levitt, Steven D., and Stephen J. Dubner. 2009. Freakonomics: A Rogue Economist Explores the Hidden Side of Everything. New York: William Morrow Paperbacks.
-
Lewis, Michael. 2004. Moneyball: The Art of Winning an Unfair Game. New York: Norton.
-
Linoff, Gordon S., and Michael J. A. Berry. 2011. Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management. Indianapolis, IN: Wiley.
-
Manyika, James, Michael Chui, Brad Brown, Jacques Bughin, Richard Dobbs, Charles Roxburgh, and Angela Hung Byers. 2011. Big Data: The Next Frontier for Innovation, Competition, and Productivity. Chicago: McKinsey Global Institute. http://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/big-data-the-next-frontier-for-innovation.
-
Marr, Bernard. 2015. Big Data: Using SMART Big Data, Analytics, and Metrics to Make Better Decisions and Improve Performance. Chichester, UK: Wiley.
-
Mayer, J. R., and J. C. Mitchell. 2012. “Third-Party Web Tracking: Policy and Technology.” In 2012 IEEE Symposium on Security and Privacy, 413–27. Piscataway, NJ: IEEE. doi:10.1109/SP.2012.47.
-
Mayer, Jonathan, and Patrick Mutchler. 2014. “MetaPhone: The Sensitivity of Telephone Metadata.” Web Policy, March 12. http://webpolicy.org/2014/03/12/metaphone-the-sensitivity-of-telephone-metadata.
-
Mayer-Schönberger, Viktor, and Kenneth Cukier. 2014. Big Data: A Revolution That Will Transform How We Live, Work, and Think. Reprint. Boston: Eamon Dolan/Mariner Books.
-
McMahan, Brendan, and Daniel Ramage. 2017. “Federated Learning: Collaborative Machine Learning without Centralized Training Data.” Google Research Blog, April. https://research.googleblog.com/2017/04/federated-learning-collaborative.html.
-
Nilsson, Nils. 1965. Learning Machines: Foundations of Trainable Pattern-Classifying Systems. New York: McGraw-Hill.
-
Oakland Privacy Working Group. 2015. “PredPol: An Open Letter to the Oakland City Council.” June 25. https://www.indybay.org/newsitems/2015/06/25/18773987.php.
-
Organisation for Economic Co-operation and Development (OECD). 1980. Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Paris: OECD. https://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm.
-
Organisation for Economic Co-operation and Development (OECD). 2013. 2013 OECD Privacy Guidelines. Paris: OECD. https://www.oecd.org/internet/ieconomy/privacy-guidelines.htm.
-
O’Rourke, Cristín, and Aphra Kerr. 2017. “Privacy Shield for Whom? Key Actors and Privacy Discourse on Twitter and in Newspapers.” In “Redesigning or Redefining Privacy?,” special issue of Westminster Papers in Communication and Culture 12 (3): 21–36. doi:http://doi.org/10.16997/wpcc.264.
-
Pomerantz, Jeffrey. 2015. Metadata. Cambridge, MA: MIT Press. https://mitpress.mit.edu/books/metadata-0.
-
Purcell, Kristen, Joanna Brenner, and Lee Rainie. 2012. “Search Engine Use 2012.” Pew Research Center, March 9. http://www.pewinternet.org/2012/03/09/main-findings-11/.
-
Quinlan, J. R. 1986. “Induction of Decision Trees.” Machine Learning 1 (1): 81–106. doi:10.1023/A:1022643204877.
-
Rainie, Lee, and Mary Madden. 2015. “Americans’ Privacy Strategies Post-Snowden.” Pew Research Center, March. http://www.pewinternet.org/files/2015/03/PI_AmericansPrivacyStrategies_0316151.pdf.
-
Rhee, Nissa. 2016. “Study Casts Doubt on Chicago Police’s Secretive ‘Heat List.’” Chicago Magazine, August 17. http://www.chicagomag.com/city-life/August-2016/Chicago-Police-Data/.
-
Saunders, Jessica, Priscillia Hunt, and John S. Hollywood. 2016. “Predictions Put into Practice: A Quasi-Experimental Evaluation of Chicago’s Predictive Policing Pilot.” Journal of Experimental Criminology 12 (3): 347–371. doi:10.1007/s11292-016-9272-0.
-
Shmueli, Galit. 2010. “To Explain or to Predict?” Statistical Science 25 (3): 289–310. doi:10.1214/10-STS330.
-
Shubber, Kadhim. 2013. “A Simple Guide to GCHQ’s Internet Surveillance Programme Tempora.” WIRED UK, July 24. http://www.wired.co.uk/article/gchq-tempora-101.
-
Silver, David, Aja Huang, Chris J. Maddison, Arthur Guez, Laurent Sifre, George van den Driessche, Julian Schrittwieser, et al. 2016. “Mastering the Game of Go with Deep Neural Networks and Tree Search.” Nature 529 (7587): 484–489. doi:10.1038/nature16961.
-
Soldatov, Andrei, and Irina Borogan. 2012. “In Ex-Soviet States, Russian Spy Tech Still Watches You.” WIRED, December 21. https://www.wired.com/2012/12/russias-hand.
-
Steinberg, Dan. 2013. “How Much Time Needs to Be Spent Preparing Data for Analysis?” http://info.salford-systems.com/blog/bid/299181/How-Much-Time-Needs-to-be-Spent-Preparing-Data-for-Analysis.
-
Taylor, David. 2016. “Battle of the Data Science Venn Diagrams.” KDnuggets, October. http://www.kdnuggets.com/2016/10/battle-data-science-venn-diagrams.html.
-
Tufte, Edward R. 2001. The Visual Display of Quantitative Information. 2nd ed. Cheshire, CT: Graphics Press.
-
Turow, Joseph. 2013. The Daily You: How the New Advertising Industry Is Defining Your Identity and Your Worth. New Haven, CT: Yale University Press.
-
Verbeke, Wouter, David Martens, Christophe Mues, and Bart Baesens. 2011. “Building Comprehensible Customer Churn Prediction Models with Advanced Rule Induction Techniques.” Expert Systems with Applications 38 (3): 2354–2364.
-
Weissman, Cale Gutherie. 2015. “The NYPD’s Newest Technology May Be Recording Conversations.” Business Insider, March 26. http://uk.businessinsider.com/the-nypds-newest-technology-may-be-recording-conversations-2015-3.
-
Wolpert, D. H., and W. G. Macready. 1997. “No Free Lunch Theorems for Optimization.” IEEE Transactions on Evolutionary Computation 1 (1): 67–82. doi:10.1109/4235.585893.