Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-sh8wx Total loading time: 0 Render date: 2024-07-19T09:34:34.175Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  29 September 2022

Alfred Z. Spector
Affiliation:
Massachusetts Institute of Technology
Peter Norvig
Affiliation:
Stanford University, California
Chris Wiggins
Affiliation:
Columbia University, New York
Jeannette M. Wing
Affiliation:
Columbia University, New York
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Data Science in Context
Foundations, Challenges, Opportunities
, pp. 282 - 305
Publisher: Cambridge University Press
Print publication year: 2022

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abadie, A. (2021). Using Synthetic Controls: Feasibility, Data Requirements, and Methodological Aspects. Journal of Economic Literature, 59(2), 391425. https://doi.org/10.1257/jel.20191450CrossRefGoogle Scholar
ACM. (2007). ACM RECSYS 2007. 1st ACM Conference on Recommender Systems, Minneapolis, MN. https://recsys.acm.org/recsys07/Google Scholar
ACM CIGCHI. (n.d.). Conference History – ACM CIGCHI. Retrieved January 8, 2022, from https://sigchi.org/conferences/conference-history/CHI/Google Scholar
Adams, G. S., Converse, B. A., Hales, A. H., & Klotz, L. E. (2021). People Systematically Overlook Subtractive Changes. Nature, 592(7853), 258261. https://doi.org/10.1038/s41586-021-03380-yCrossRefGoogle ScholarPubMed
Adhikari, A., Denero, J., & Jordan, M. I. (2021). Interleaving Computational and Inferential Thinking in an Undergraduate Data Science Curriculum. Harvard Data Science Review, 3(2). https://doi.org/10.1162/99608f92.cb0fa8d2Google Scholar
Akerlof, G. A. & Shiller, R. J. (2015). Phishing for Phools: The Economics of Manipulation and Deception. Princeton University Press. https://press.princeton.edu/books/hardcover/9780691168319/phishing-for-phoolsCrossRefGoogle Scholar
Aktay, A., Bavadekar, S., Cossoul, G., et al. (2020). Google COVID-19 Community Mobility Reports: Anonymization Process Description (version 1.1). arXiv [cs.CR]. https://arxiv.org/pdf/2004.04145v4Google Scholar
Alfano, M., Carter, J. A., & Cheong, M. (2018). Technological Seduction and Self-Radicalization. Journal of the American Philosophical Association, 4(3), 298322. https://doi.org/10.1017/apa.2018.27Google Scholar
Amazon Web Services (2006). Announcing Amazon Elastic Compute Cloud (Amazon EC2) – Beta, August 24. https://aws.amazon.com/about-aws/whats-new/2006/08/24/announcing-amazon-elastic-compute-cloud-amazon-ec2---beta/Google Scholar
American Statistical Association (ASA). (n.d.). Ethical Guidelines for Statistical Practice. American Statistical Association. Retrieved December 11, 2021, from www.amstat.org/ASA/Your-Career/Ethical-Guidelines-for-Statistical-Practice.aspxGoogle Scholar
Amershi, S., Begel, A., Bird, C., et al. (2019). Software Engineering for Machine Learning: A Case Study. 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), pp. 291300. https://doi.org/10.1109/ICSE-SEIP.2019.00042Google Scholar
Andrews, R. J. (2019). Florence Nightingale is a Design Hero. Nightingale. https://medium.com/nightingale/florence-nightingale-is-a-design-hero-8bf6e5f2147Google Scholar
Anfinsen, C. B. (1973). Principles That Govern the Folding of Protein Chains. Science, 181(4096), 223230. https://doi.org/10.1126/science.181.4096.223CrossRefGoogle ScholarPubMed
Angwin, J., Larson, J., Kirchner, L., & Mattu, S. (2016). Machine Bias, May 23. ProPublica. www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencingGoogle Scholar
Apache. (n.d.). Apache Log4j 2. The Apache Software Foundation. Retrieved January 7, 2022, from https://logging.apache.org/log4j/2.x/Google Scholar
Apple Inc. (2021). Expanded Protections for Children: Frequently Asked Questions, August. Apple Inc. www.apple.com/child-safety/Google Scholar
Apple Support. (2019). Get a Copy of the Data Associated With Your Apple ID Account, May 16. Apple Inc. https://support.apple.com/en-us/HT208502Google Scholar
Aristophanes. (414 BC). The Birds. In E. O’Neill Jr, ed., unknown transl. See www.perseus.tufts.edu/hopper/text?doc=urn:cts:greekLit:tlg0019.tlg006.perseus-eng1:1-48Google Scholar
Associated Press. (2021). News Values and Principles, December 14. Associated Press. www.ap.org/about/news-values-and-principles/Google Scholar
Association for Computing Machinery (ACM). (2018). ACM Code of Ethics and Professional Conduct, June 22. Association for Computing Machinery (ACM). www.acm.org/code-of-ethicsGoogle Scholar
Autor, D., Mindell, D., & Reynolds, E. (2020). The Work of the Future: Building Better Jobs in an Age of Intelligent Machines. Massachusetts Institute of Technology. https://workofthefuture.mit.edu/research-post/the-work-of-the-future-building-better-jobs-in-an-age-of-intelligent-machines/Google Scholar
Baek, M., DiMaio, F., Anishchenko, I., et al. (2021). Accurate Prediction of Protein Structures and Interactions Using a Three-Track Neural Network. Science, 373(6557), 871876. https://doi.org/10.1126/science.abj8754CrossRefGoogle ScholarPubMed
Baker, M. (2016). 1,500 Scientists Lift the Lid on Reproducibility. Nature, 533(7604), 452454. https://doi.org/10.1038/533452aGoogle Scholar
Banko, M. & Brill, E. (2001). Scaling to Very Very Large Corpora for Natural Language Disambiguation. Proceedings of the 39th Annual Meeting on Association for Computational Linguistics, pp. 2633. https://doi.org/10.3115/1073012.1073017Google Scholar
Barocas, S. & Nissenbaum, H. (2014). Big Data’s End Run Around Procedural Privacy Protections. Communications of the ACM, 57(11), 3133. https://doi.org/10.1145/2668897Google Scholar
Barrio, P. J., Goldstein, D. G., & Hofman, J. M. (2016). Improving Comprehension of Numbers in the News. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 27292739. https://doi.org/10.1145/2858036.2858510Google Scholar
BBC. (n.d.). Guidance: Reporting Statistics. Retrieved December 20, 2021, from www.bbc.com/editorialguidelines/guidance/reporting-statistics/Google Scholar
Bendavid, E., Mulaney, B., Sood, N., et al. (2020). COVID-19 Antibody Seroprevalence in Santa Clara County, California. Preprint. https://doi.org/10.1101/2020.04.14.20062463CrossRefGoogle Scholar
Bendavid, E., Mulaney, B., Sood, N., et al. (2021). COVID-19 Antibody Seroprevalence in Santa Clara County, California. International Journal of Epidemiology, 50(2), 410419. https://doi.org/10.1093/ije/dyab010Google Scholar
Bensinger, G. (2020). Google Redraws the Borders on Maps Depending on Who’s Looking. Washington Post, February 14. www.washingtonpost.com/technology/2020/02/14/google-maps-political-borders/Google Scholar
Berners-Lee, T. (1990). Information Management: A Proposal. www.w3.org/History/1989/proposal.htmlGoogle Scholar
Beutel, A., Chi, E. H., Diaz, F., & Burke, R. (2020). Responsible Recommendation and Search Systems. WWW 2020, April 19, Taipei. http://alexbeutel.com/www2020_resprecs/Google Scholar
Bhuiyan, M. M., Zhang, A. X., Sehat, C. M., & Mitra, T. (2020). Investigating Differences in Crowdsourced News Credibility Assessment: Raters, Tasks, and Expert Criteria. Proceedings of the ACM on Human–Computer Interaction, vol. 4 (CSCW2), New York, October. Association for Computing Machinery, Art. 93, pp. 1–26. https://doi.org/10.1145/3415164Google Scholar
Bishop, D. & Gill, E. (2019). Robert Boyle on the Importance of Reporting and Replicating Experiments. Illustrating the Development of Fair Tests of Treatments in Health Care. The James Lind Library. www.jameslindlibrary.org/articles/robert-boyle-on-the-importance-of-reporting-and-replicating-experiments/Google Scholar
Blackbaud. (2020). Security Incident. Blackbaud, September 29. See www.blackbaud.com/securityincidentGoogle Scholar
Bloom, B. S. (1984). The 2 Sigma Problem: The Search for Methods of Group Instruction as Effective as One-to-One Tutoring. Educational Researcher, 13(6), 416. https://doi.org/10.3102/0013189X013006004CrossRefGoogle Scholar
Bogetoft, P., Christensen, D. L., Damgård, I., et al. (2009). Secure Multiparty Computation Goes Live. In Dingledine, R. & Golle, P., eds., Financial Cryptography and Data Security, Revised Selected Papers, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23–26, 2009 (Lecture Notes in Computer Science, 5628), Springer, pp. 325343. https://doi.org/10.1007/978-3-642-03549-4_20Google Scholar
Bonifacic, I. (2020). Artist Creates Traffic Jams in Google Maps With a Wagon Full of Phones. Engadget, February 3. www.engadget.com/2020-02-03-google-maps-traffic-jams-art-project.htmlGoogle Scholar
Boston University School of Public Health. (2016). John Snow – The Father of Epidemiology. MPH Online Learning Modules. https://sphweb.bumc.bu.edu/otlt/mph-modules/ph/publichealthhistory/publichealthhistory6.htmlGoogle Scholar
Bostrom, N. (2014). Superintelligence: Paths, Dangers, Strategies. Oxford University Press. https://global.oup.com/academic/product/superintelligence-9780199678112?cc=us&lang=en&Google Scholar
Box, G. E. P. (1979). Robustness in the Strategy of Scientific Model Building. In Launer, R. L. & Wilkinson, G. N., eds., Robustness in Statistics, Academic Press, pp. 201236. https://doi.org/10.1016/C2013-0-11050-1CrossRefGoogle Scholar
Box, G. E. P., Hunter, J. S., & Hunter, W. G. (2005). Statistics for Experimenters: Design, Innovation, and Discovery. Wiley-Interscience. www.worldcat.org/title/statistics-for-experimenters-design-innovation-and-discovery/oclc/474755360Google Scholar
boyd, d. m. & Ellison, N. B. (2007). Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication: JCMC, 13(1), 210230. https://doi.org/10.1111/j.1083-6101.2007.00393.xGoogle Scholar
Brand, S. (2000). Is Technology Moving Too Fast? The Long Now Foundation, June 19. https://longnow.org/essays/technology-moving-too-fast/Google Scholar
Breiman, L. (2001). Statistical Modeling: The Two Cultures (With Comments and a Rejoinder by the Author). Statistical Science, 16(3), 199231. https://doi.org/10.1214/ss/1009213726Google Scholar
Brill, J. (2020). Technology, Society and the State: How Do We Remain Competitive, and True to Our Values, as the Technological Revolution Unfolds and Accelerates? The Ditchley Foundation Meeting on Technology, Society and the State, Chipping Norton, UK. www.ditchley.com/programme/past-events/2020/technology-society-and-state-how-do-we-remain-competitive-and-true-ourGoogle Scholar
Brin, S. & Page, L. (1998). The Anatomy of a Large-Scale Hypertextual Web Search Engine. Computer Networks and ISDN Systems, 30(1–7), 107117. https://doi.org/10.1016/s0169-7552(98)00110-xGoogle Scholar
Broder, A. (2002). A Taxonomy of Web Search. ACM SIGIR Forum, 36(2), 310. https://doi.org/10.1145/792550.792552Google Scholar
Brown, T. B., Mann, B., Ryder, N., et al. (2020). Language Models Are Few-Shot Learners. arXiv [cs.CL]. http://arxiv.org/abs/2005.14165Google Scholar
Bryan, C. J., Tipton, E., & Yeager, D. S. (2021). Behavioural Science Is Unlikely to Change the World Without a Heterogeneity Revolution. Nature Human Behaviour, 5(8), 980989. https://doi.org/10.1038/s41562-021-01143-3Google Scholar
Brynjolfsson, E., Eggers, F., & Gannamaneni, A. (2018). Using Massive Online Choice Experiments to Measure Changes in Well-being (Working Paper Series No. 24514). National Bureau of Economic Research. https://doi.org/10.3386/w24514Google Scholar
Bryson, S. (1996). Virtual Reality in Scientific Visualization. Communications of the ACM, 39(5), 6271. https://doi.org/10.1145/229459.229467Google Scholar
Bubar, K. M., Reinholt, K., Kissler, S. M., et al. (2021). Model-Informed COVID-19 Vaccine Prioritization Strategies by Age and Serostatus. Science, 371(6532), 916921. https://doi.org/10.1126/science.abe6959CrossRefGoogle ScholarPubMed
Bunnik, E. M., Janssens, A. C. J. W., & Schermer, M. H. N. (2013). A Tiered-Layered-Staged Model for Informed Consent in Personal Genome Testing. European Journal of Human Genetics, 21(6), 596601. https://doi.org/10.1038/ejhg.2012.237CrossRefGoogle ScholarPubMed
Candès, E., Fan, Y., Janson, L., & Lv, J. (2018). Panning for Gold: “Model‐X” Knockoffs for High Dimensional Controlled Variable Selection. Journal of the Royal Statistical Society. Series B, Statistical Methodology, 80(3), 551577. https://doi.org/10.1111/rssb.12265Google Scholar
Cannell, J. J. (2006). “Lake Woebegone,” Twenty Years Later. Independent Education Review, 2(1). www.researchgate.net/publication/24089508_Lake_Woebegone_Twenty_Years_LaterGoogle Scholar
Card, S. K., Mackinlay, J., & Shneiderman, B. (1999). Readings in Information Visualization: Using Vision to Think. Morgan Kaufmann. https://books.google.com/books/about/Readings_in_Information_Visualization.html?hl=&id=wdh2gqWfQmgCGoogle Scholar
Carlyle, T. (1841). On Heroes, Hero-Worship, & the Heroic in History: Six Lectures; Reported, With Emendations and Additions. James Fraser. www.worldcat.org/title/on-heroes-hero-worship-the-heroic-in-history-six-lectures-reported-with-emendations-and-additions/oclc/2158602Google Scholar
Carr, N. (2008). Is Google Making Us Stupid? The Atlantic, July. www.theatlantic.com/magazine/archive/2008/07/is-google-making-us-stupid/306868/Google Scholar
Carr, N. (2014). The Glass Cage: How Our Computers Are Changing Us. W. W. Norton. https://wwnorton.com/books/the-glass-cage/Google Scholar
Carter, B., Jain, S., Mueller, J., & Gifford, D. (2021). Overinterpretation Reveals Image Classification Model Pathologies. arXiv [cs.LG]. https://arxiv.org/pdf/2003.08907v3Google Scholar
CCC (Computer Community Consortium). (n.d.). CCC/ACM SIGAI/INFORMS Workshop 1 Report Out – Artificial Intelligence & Operations Research (November 2021). Artificial Intelligence/Operations Research Workshop, September 23–24, 2021. https://cra.org/crn/2021/11/ccc-acm-sigai-informs-workshop-1-report-out-artificial-intelligence-operations-research/Google Scholar
CDC. (2020). COVID Data Tracker. Centers for Disease Control and Prevention (CDC), March 28. https://covid.cdc.gov/covid-data-tracker/Google Scholar
CDC. (2021). V-safe After Vaccination Health Checker. Centers for Disease Control and Prevention (CDC), November 10. www.cdc.gov/coronavirus/2019-ncov/vaccines/safety/vsafe.htmlGoogle Scholar
Center for Humane Technology. (n.d.). How Social Media Hacks Our Brains. Brain Science. Retrieved January 17, 2022, from www.humanetech.com/brain-scienceGoogle Scholar
Chatfield, T. (n.d.). The Trouble With Big Data? It’s Called the “Recency Bias.” BBC. Retrieved December 20, 2021, from www.bbc.com/future/article/20160605-the-trouble-with-big-data-its-called-the-recency-biasGoogle Scholar
Chatzimparmpas, A., Martins, R. M., Jusufi, I., & Kerren, A. (2020). A Survey of Surveys on the Use of Visualization for Interpreting Machine Learning Models. Information Visualization, 19(3), 207233. https://doi.org/10.1177/1473871620904671CrossRefGoogle Scholar
Cheeseman, P. (1985). In Defense of Probability. Proceedings of the 9th International Joint Conference on Artificial Intelligence, vol. 2, pp. 10021009. https://dl.acm.org/doi/abs/10.5555/1623611.1623677Google Scholar
Chen, J. (2021). Risk-Adjusted Return Definition. Investopedia, November 30. www.investopedia.com/terms/r/riskadjustedreturn.aspGoogle Scholar
Chen, M., Tworek, J., Jun, H., et al. (2021). Evaluating Large Language Models Trained on Code. arXiv [cs.LG]. http://arxiv.org/abs/2107.03374Google Scholar
Chen, M. X., Lee, B. N., Bansal, G., et al. (2019). Gmail Smart Compose: Real-Time Assisted Writing. arXiv [cs.CL]. http://arxiv.org/abs/1906.00080Google Scholar
Chiang, Y.-K., Makiya, R., Ménard, B., & Komatsu, E. (2020). The Cosmic Thermal History Probed by Sunyaev–Zeldovich Effect Tomography. Astrophysical Journal, 902(1), 56. https://doi.org/10.3847/1538-4357/abb403Google Scholar
Choi, H. & Varian, H. (2012). Predicting the Present With Google Trends. Economic Record, 88, 29. https://doi.org/10.1111/j.1475-4932.2012.00809.xGoogle Scholar
Chouldechova, A. (2017). Fair Prediction with Disparate Impact: A Study of Bias in Recidivism Prediction Instruments. Big Data, 5(2), 153163. https://doi.org/10.1089/big.2016.0047Google Scholar
Chouldechova, A. & Roth, A. (2020). A Snapshot of the Frontiers of Fairness in Machine Learning. Communications of the ACM, 63(5), 8289. https://doi.org/10.1145/3376898Google Scholar
Churchman, C. (1967). Free for All – Wicked Problems. Management Science, 14(4), B141B146. https://doi.org/10.1287/mnsc.14.4.B141Google Scholar
Cicero, . (n.d.). Cicero: On the Orator, Books I–II (English and Latin Edition), Sutton, E. W. & Rackham, H., transl. (Loeb Classical Library No. 348), 1948. Harvard University Press. www.amazon.com/Cicero-Orator-Classical-Library-English/dp/0674993837Google Scholar
Claussnitzer, M., Dankel, S. N., Kim, K.-H., et al. (2015). FTO Obesity Variant Circuitry and Adipocyte Browning in Humans. New England Journal of Medicine, 373(10), 895907. https://doi.org/10.1056/NEJMoa1502214Google Scholar
Clifford Chance & Milltown Partners. (2021). Our Relationship With AI: Friend or Foe? Summary of Our Global Study, November 9. Clifford Chance. www.cliffordchance.com/briefings/2021/11/our-relationship-with-ai--friend-or-foe--summary-of-our-global-s.htmlGoogle Scholar
Coenen, A. (2019). How The New York Times is Experimenting with Recommendation Algorithms. NYT Open, October 17. https://open.nytimes.com/how-the-new-york-times-is-experimenting-with-recommendation-algorithms-562f78624d26Google Scholar
Collins, F. S. (n.d.). Genome-Wide Association Studies (GWAS). Retrieved December 14, 2021, from www.genome.gov/genetics-glossary/Genome-Wide-Association-StudiesGoogle Scholar
Concorde. (n.d.). Concorde TSP Solver (The Traveling Salesman Problem). Retrieved December 27, 2021, from www.math.uwaterloo.ca/tsp/concorde/index.htmlGoogle Scholar
Connelly, M. J., Hicks, R., Jervis, R., Spirling, A., & Suong, C. H. (2021). Diplomatic Documents Data for International Relations: The Freedom of Information Archive Database. Conflict Management and Peace Science, 38(6), 762781. https://doi.org/10.1177/0738894220930326Google Scholar
Cook, W. (2012). In Pursuit of the Traveling Salesman: Mathematics at the Limits of Computation. Princeton University Press. https://press.princeton.edu/books/paperback/9780691163529/in-pursuit-of-the-traveling-salesmanGoogle Scholar
Corrigan, J. R., Alhabash, S., Rousu, M., & Cash, S. B. (2018). How Much is Social Media Worth? Estimating the Value of Facebook by Paying Users to Stop Using It. PloS One, 13(12), e0207101. https://doi.org/10.1371/journal.pone.0207101Google Scholar
Costa, B. (2016). Golfers Join the Rest of World, Use Data. Wall Street Journal (Eastern Edn.), May 16. www.wsj.com/articles/golfers-join-rest-of-world-use-data-1463434676Google Scholar
COVID-19 Forecast Hub. (n.d.). COVID19 Forecast Hub Home page. Retrieved December 13, 2021, from http://covid19forecasthub.orgGoogle Scholar
Cox, M. & Ellsworth, D. (1997). Managing Big Data for Scientific Visualization. ACM Siggraph ’97 Course #4, Exploring Gigabyte Datasets in Real-Time: Algorithms, Data Management, and Time-Critical Design, pp. 2138. www.researchgate.net/profile/David-Ellsworth-2/publication/238704525_Managing_big_data_for_scientific_visualization/links/54ad79d20cf2213c5fe4081a/Managing-big-data-for-scientific-visualization.pdfGoogle Scholar
Cramer, E. Y., Ray, E. L., Lopez, V. K., et al. (2021). Evaluation of Individual and Ensemble Probabilistic Forecasts of COVID-19 Mortality in the US. medRxiv. www.medrxiv.org/content/10.1101/2021.02.03.21250974v3Google Scholar
Dartmouth. (2018). Artificial Intelligence (AI) Coined at Dartmouth – Celebrate Our 250th, October 12. Dartmouth College. https://250.dartmouth.edu/highlights/artificial-intelligence-ai-coined-dartmouthGoogle Scholar
Data Transfer Project. (n.d.). About Us. Retrieved March 9, 2022, from https://datatransferproject.dev/Google Scholar
Datta, A., Tschantz, M. C., & Datta, A. (2015). Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination. arXiv [cs.CR]. https://arxiv.org/abs/1408.6491v2Google Scholar
Davis, J. (2020). Blackbaud Confirms Hackers Stole Some SSNs, as Lawsuits Increase, September 30. HealthITSecurity. https://healthitsecurity.com/news/blackbaud-confirms-hackers-stole-some-ssns-as-lawsuits-increaseGoogle Scholar
DeMarco, T. (2002). Slack: Getting Past Burnout, Busywork, and the Myth of Total Efficiency. Broadway Books.Google Scholar
Deng, L., Hinton, G., & Kingsbury, B. (2013, May). New Types of Deep Neural Network Learning for Speech Recognition and Related Applications: An Overview. 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013, Vancouver, BC, Canada. https://doi.org/10.1109/icassp.2013.6639344CrossRefGoogle Scholar
Devlin, J., Chang, M.-W., Lee, K., & Toutanova, K. (2019). BERT: Pre-Training of Deep Bidirectional Transformers for Language Understanding. arXiv [cs.CL]. http://arxiv.org/abs/1810.04805Google Scholar
DHS Privacy Office. (2017). Handbook for Safeguarding Sensitive PII (Privacy Policy Directive 047-01-007, Revision 3). US Department of Homeland Security (DHS). www.dhs.gov/sites/default/files/publications/dhs%20policy%20directive%20047-01-007%20handbook%20for%20safeguarding%20sensitive%20PII%2012-4-2017.pdfGoogle Scholar
Diamond, J. (2020). The World Series-Bound Rays Epitomize Baseball in 2020 – For Better or for Worse. Wall Street Journal (Eastern Edn.), October 18. www.wsj.com/articles/the-world-series-bound-rays-epitomize-baseball-in-2020for-better-or-for-worse-11603022401Google Scholar
Dieterich, W., Mendoza, C., & Brennan, T. (2016). COMPAS Risk Scales: Demonstrating Accuracy Equity and Predictive Parity Performance of the COMPAS Risk Scales in Broward County. Northpointe Inc. Research Department. http://go.volarisgroup.com/rs/430-MBX-989/images/ProPublica_Commentary_Final_070616.pdfGoogle Scholar
Dietz, K. & Heesterbeek, J. A. P. (2002). Daniel Bernoulli’s Epidemiological Model Revisited. Mathematical Biosciences, 180(1–2), 121. https://doi.org/10.1016/s0025-5564(02)00122-0CrossRefGoogle ScholarPubMed
Donoho, D. (2017). 50 Years of Data Science. Journal of Computational and Graphical Statistics, 26(4), 745766. https://doi.org/10.1080/10618600.2017.1384734Google Scholar
Dorman, C. (2018). Building the Next Generation of Personalized Themed Playlists. Algorithm and Blues, May 23. https://engineering.pandora.com/building-the-next-generation-of-personalized-themed-playlists-43f567b964f9Google Scholar
Druckman, J. N. (2001). Using Credible Advice to Overcome Framing Effects. Journal of Law, Economics, & Organization, 17(1), 6282. https://doi.org/10.1093/jleo/17.1.62Google Scholar
Ducato, R. (2020). Data Protection, Scientific Research, and the Role of Information. Computer Law & Security Review, 37, 105412. https://doi.org/10.1016/j.clsr.2020.105412Google Scholar
Duhigg, C. (2012). How Companies Learn Your Secrets. The New York Times, February 16. www.nytimes.com/2012/02/19/magazine/shopping-habits.htmlGoogle Scholar
Dwork, C. (2008). Differential Privacy: A Survey of Results. In Agrawal, M., Du, D., Duan, Z., & Li, A., eds., Theory and Applications of Models of Computation (Lecture Notes in Computer Science, 4978), Springer, pp. 119. https://doi.org/10.1007/978-3-540-79228-4_1Google Scholar
Dwork, C. & Roth, A. (2014). The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science, 9(3–4), 211407. https://doi.org/10.1561/0400000042Google Scholar
Dwork, C., Hardt, M., Pitassi, T., Reingold, O., & Zemel, R. (2012). Fairness Through Awareness. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference – ITCS ’12, pp. 214226. https://doi.org/10.1145/2090236.2090255Google Scholar
Eckhouse, L., Lum, K., Conti-Cook, C., & Ciccolini, J. (2019). Layers of Bias: A Unified Approach for Understanding Problems With Risk Assessment. Criminal Justice and Behavior, 46(2), 185209. https://doi.org/10.1177/0093854818811379Google Scholar
Economist, The. (2013). How Science Goes Wrong. The Economist, October 17. www.economist.com/leaders/2013/10/21/how-science-goes-wrongGoogle Scholar
Economist, The. (2021a). Tracking Covid-19 Excess Deaths Across Countries. The Economist, October 20. www.economist.com/graphic-detail/coronavirus-excess-deaths-trackerGoogle Scholar
Economist, The. (2021b). Instant Economics: The Real-Time Revolution. The Economist, October 23. www.economist.com/weeklyedition/2021-10-23Google Scholar
Economist, The. (2022a). The Growing Demand for More Vigorous Antitrust Action. The Economist, January 7. www.economist.com/special-report/2022/01/10/the-growing-demand-for-more-vigorous-antitrust-actionGoogle Scholar
Economist, The. (2022b). Predicting Earthquakes Is Not Possible. Yet. The Economist, January 12. www.economist.com/science-and-technology/predicting-earthquakes-is-not-possible-yet/21807129Google Scholar
Einav, L. & Levin, J. (2014). Economics in the Age of Big Data. Science, 346(6210), 1243089. https://doi.org/10.1126/science.1243089Google Scholar
Eisenstadt, L. (2017). After a Decade of Genome-Wide Association Studies, a New Phase of Discovery Pushes On, August 14. Broad Institute. www.broadinstitute.org/news/after-decade-genome-wide-association-studies-new-phase-discovery-pushesGoogle Scholar
El-Bermawy, M. M. (2016). Your Filter Bubble is Destroying Democracy. Wired, November 18. www.wired.com/2016/11/filter-bubble-destroying-democracy/Google Scholar
Ellison, A. M., Boose, E. R., Lerner, B. S., Fong, E., & Seltzer, M. (2020). The End-to-End Provenance Project. Patterns, 1(2), 100016. https://doi.org/10.1016/j.patter.2020.100016Google Scholar
Engineers Yukon. (n.d.). Code of Ethics. Engineers Canada. Retrieved April 7, 2022, from https://engineerscanada.ca/sites/default/files/Yukon/APEY_Code_Of_Ethics.pdfGoogle Scholar
Eriksson, J., Girod, L., Hull, B., et al. (2008). The Pothole Patrol: Using a Mobile Sensor Network for Road Surface Monitoring, Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 2939. https://doi.org/10.1145/1378600.1378605Google Scholar
Esteva, A., Kuprel, B., Novoa, R. A., et al. (2017). Dermatologist-Level Classification of Skin Cancer with Deep Neural Networks. Nature, 542(7639), 115118. https://doi.org/10.1038/nature21056Google Scholar
European Commission High-Level Expert Group on AI. (2019). Ethics Guidelines for Trustworthy AI. European Commission. https://digital-strategy.ec.europa.eu/en/library/ethics-guidelines-trustworthy-aiGoogle Scholar
European Parliament and Council of the European Union. (2016). Regulation EU 2016/679 of the European Parliament and of the Council of 27 April 2016 (General Data Protection Regulation). Official Journal of the European Union. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679Google Scholar
Facebook Help Center. (n.d.). What Categories of My Facebook Data Are Available to Me? Facebook. Retrieved December 16, 2021, from www.facebook.com/help/930396167085762Google Scholar
FASB. (n.d.). FASB Home page. Financial Accounting Standards Board. Retrieved December 23, 2021, from www.fasb.org/homeGoogle Scholar
Fiesler, C., Young, A., Peyton, T., et al. (2015). Ethics for Studying Online Sociotechnical Systems in a Big Data World. Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing, CSCW ’15, February 28, Vancouver, BC, Canada. https://doi.org/10.1145/2685553.2685558Google Scholar
FINRA. (n.d.). Rules & Guidance. FINRA Financial Industry Regulatory Authority, Inc. Retrieved December 23, 2021, from www.finra.org/rules-guidanceGoogle Scholar
Fisher, R. A. (1935). The Design of Experiments. Oliver and Boyd. www.worldcat.org/title/design-of-experiments/oclc/905516590Google Scholar
Fletcher, R. (2020). The Truth Behind Filter Bubbles: Bursting Some Myths, January 24. Reuters Institute for the Study of Journalism. https://reutersinstitute.politics.ox.ac.uk/news/truth-behind-filter-bubbles-bursting-some-mythsGoogle Scholar
Fletcher, R., Kalogeropoulos, A., & Nielsen, R. K. (2021). More Diverse, More Politically Varied: How Social Media, Search Engines and Aggregators Shape News Repertoires in the United Kingdom. New Media & Society, 22. https://doi.org/10.1177/14614448211027393Google Scholar
Frazier, P. I. (2022). Fighting the Pandemic With Mathematical Modeling: A Case Study at Cornell University. The Bridge – Linking Engineering and Society, 51(4), 1822. www.nae.edu/266395/Fighting-the-Pandemic-with-Mathematical-Modeling-A-Case-Study-at-Cornell-UniversityGoogle Scholar
Gallagher, J. (2021). Covid: Trigger of Rare Blood Clots With AstraZeneca Jab Found by Scientists, December 2. BBC. www.bbc.com/news/health-59418123Google Scholar
Garcia-Retamero, R., Galesic, M., & Gigerenzer, G. (2010). Do Icon Arrays Help Reduce Denominator Neglect? Medical Decision Making, 30(6), 672684. https://doi.org/10.1177/0272989X10369000Google Scholar
Gawande, A. (2009). The Checklist Manifesto: How to Get Things Right. Picador. https://us.macmillan.com/books/9780312430009/thechecklistmanifestoGoogle Scholar
Gebru, T., Morgenstern, J., Vecchione, B., et al. (2021). Datasheets for Datasets. Communications of the ACM, 64(12), 8692. https://doi.org/10.1145/3458723Google Scholar
Gee, J., Marquez, P., Su, J., et al. (2021). First Month of COVID-19 Vaccine Safety Monitoring – United States, December 14, 2020–January 13, 2021. Morbidity and Mortality Weekly Report (MMWR), 70(8), 283288. https://doi.org/10.15585/mmwr.mm7008e3CrossRefGoogle Scholar
Gelman, A. & Carpenter, B. (2020). Bayesian Analysis of Tests with Unknown Specificity and Sensitivity. Journal of the Royal Statistical Society. Series C, Applied Statistics, 69(5), 12691283. https://doi.org/10.1111/rssc.12435Google Scholar
Gelman, A. & Loken, E. (2013). The Garden of Forking Paths: Why Multiple Comparisons Can Be a Problem, Even When There is no “Fishing Expedition” or “p-hacking” and The Research Hypothesis Was Posited Ahead of Time. www.stat.columbia.edu/~gelman/research/unpublished/p_hacking.pdfGoogle Scholar
Gelman, A. & Loken, E. (2016). The Statistical Crisis in Science. In Pitici, M., ed., The Best Writing on Mathematics 2015, Princeton University Press, pp. 305318. https://doi.org/10.1515/9781400873371-028Google Scholar
Gentry, C. (2009). Fully Homomorphic Encryption Using Ideal Lattices. Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 169178. https://doi.org/10.1145/1536414.1536440Google Scholar
Ginsberg, J., Mohebbi, M. H., Patel, R. S., et al. (2009). Detecting Influenza Epidemics Using Search Engine Query Data. Nature, 457(7232), 10121014. https://doi.org/10.1038/nature07634Google Scholar
Gitlin, J. M. (2017). Hacking Street Signs With Stickers Could Confuse Self-Driving Cars. Ars Technica. https://arstechnica.com/cars/2017/09/hacking-street-signs-with-stickers-could-confuse-self-driving-cars/Google Scholar
Global Change Data Lab. (n.d.). Our World in Data. Retrieved December 10, 2021, from https://ourworldindata.org/Google Scholar
Goodfellow, I. J., Shlens, J., & Szegedy, C. (2015). Explaining and Harnessing Adversarial Examples. arXiv [stat.ML]. http://arxiv.org/abs/1412.6572Google Scholar
Google. (n.d.-a). COVID-19 Community Mobility Reports [Dataset]. Retrieved December 14, 2021, from www.google.com/covid19/mobility/Google Scholar
Google. (n.d.-b). How Google Anonymizes Data – Privacy & Terms – Google. Retrieved December 15, 2021, from https://policies.google.com/technologies/anonymizationGoogle Scholar
Google. (n.d.-c). Google Transparency Report. Retrieved December 16, 2021, from https://transparencyreport.google.com/user-data/overviewGoogle Scholar
Google Books. (2010). Google Ngram Viewer. https://books.google.com/ngramsGoogle Scholar
Google, Inc. (n.d.). Google Takeout. Google Account. Retrieved December 16, 2021, from https://takeout.google.com/Google Scholar
Gootman, S. (2016). OPM Hack: The Most Dangerous Threat to the Federal Government Today. Journal of Applied Security Research, 11(4), 517525. https://doi.org/10.1080/19361610.2016.1211876Google Scholar
Gostin, L. O., Salmon, D. A., & Larson, H. J. (2021). Mandating COVID-19 Vaccines. Journal of the American Medical Association, 325(6), 532533. https://doi.org/10.1001/jama.2020.26553Google Scholar
Gotterbarn, D., Brinkman, B., Flick, C., et al. (2018). A Guide for Positive Action. Association for Computing Machinery. https://doi.org/10.1145/3274591Google Scholar
Gray, J. (2009). Jim Gray on eScience: A Transformed Scientific Method. In Hey, A., Tansley, S., & Tolle, K., eds., The Fourth Paradigm: Data-Intensive Scientific Discovery, Microsoft Research, pp. xviixxxi. www.microsoft.com/en-us/research/publication/fourth-paradigm-data-intensive-scientific-discovery/Google Scholar
Greengard, S. (2019). Will Deepfakes Do Deep Damage? Communications of the ACM, 63(1), 1719. https://doi.org/10.1145/3371409Google Scholar
Hale, J. (2019). More Than 500 Hours of Content Are Now Being Uploaded to YouTube Every Minute, May 7. Tubefilter. www.tubefilter.com/2019/05/07/number-hours-video-uploaded-to-youtube-per-minute/Google Scholar
Halevy, A., Norvig, P., & Pereira, F. (2009). The Unreasonable Effectiveness of Data. IEEE Intelligent Systems, 24(2), 812. https://doi.org/10.1109/mis.2009.36Google Scholar
Hansen, M. (2019). The Reporter’s Notebook, Jupytercon 2018, New York, March 21. Youtube. www.youtube.com/watch?v=IzUEWgC7-LsGoogle Scholar
Hardt, M., Price, E., & Srebro, N. (2016). Equality of Opportunity in Supervised Learning. arXiv [cs.LG]. http://arxiv.org/abs/1610.02413Google Scholar
Harford, T. (2021). The Data Detective: Ten Easy Rules to Make Sense of Statistics. Riverhead Books. www.penguinrandomhouse.com/books/610963/the-data-detective-by-tim-harford/Google Scholar
He, X., Madigan, D., Yu, B., & Wellner, J. (2019). Statistics at a Crossroads: Who Is for the Challenge? National Science Foundation. www.nsf.gov/mps/dms/documents/Statistics_at_a_Crossroads_Workshop_Report_2019.pdfGoogle Scholar
Heckerman, D. E., Horvitz, E. J., & Nathwani, B. N. (1992). Toward Normative Expert Systems: Part I. The Pathfinder Project. Methods of Information in Medicine, 31(2), 90105. www.ncbi.nlm.nih.gov/pubmed/1635470Google Scholar
Held, M. & Karp, R. M. (1962). A Dynamic Programming Approach to Sequencing Problems. Journal of the Society for Industrial and Applied Mathematics, 10(1), 196210. https://doi.org/10.1137/0110015Google Scholar
Hicks, J. R. (1935). Annual Survey of Economic Theory: The Theory of Monopoly. Econometrica, 3(1), 120. https://doi.org/10.2307/1907343Google Scholar
Hinton, G. E., Osindero, S., & Teh, Y.-W. (2006). A Fast Learning Algorithm for Deep Belief Nets. Neural Computation, 18(7), 15271554. https://doi.org/10.1162/neco.2006.18.7.1527Google Scholar
Hinton, G., Deng, L., Yu, D., et al. (2012). Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups. IEEE Signal Processing Magazine, 29(6), 8297. https://doi.org/10.1109/MSP.2012.2205597Google Scholar
Hripcsak, G., Duke, J. D., Shah, N. H., et al. (2015). Observational Health Data Sciences and Informatics (OHDSI): Opportunities for Observational Researchers. Studies in Health Technology and Informatics, 216, 574578. www.ncbi.nlm.nih.gov/pmc/articles/PMC4815923/Google Scholar
Hripcsak, G., Ryan, P. B., Duke, J. D., et al. (2016). Characterizing Treatment Pathways at Scale Using the OHDSI Network. Proceedings of the National Academy of Sciences of the United States of America, 113(27), 73297336. https://doi.org/10.1073/pnas.1510502113Google Scholar
Hripcsak, G., Suchard, M. A., Shea, S., et al. (2020). Comparison of Cardiovascular and Safety Outcomes of Chlorthalidone vs Hydrochlorothiazide to Treat Hypertension. JAMA Internal Medicine, 180(4), 542551. https://doi.org/10.1001/jamainternmed.2019.7454Google Scholar
Huff, D. (1993). How to Lie With Statistics (Reissue edition; original work published 1954). W. W. Norton. https://wwnorton.com/books/How-to-Lie-with-Statistics/Google Scholar
Hullman, J. (2020). Why Authors Don’t Visualize Uncertainty. IEEE Transactions on Visualization and Computer Graphics, 26(1), 130139. https://doi.org/10.1109/TVCG.2019.2934287Google Scholar
Institute for Operations Research and the Management Sciences (INFORMS). (n.d.). INFORMS Ethics Guidelines. INFORMS. Retrieved December 11, 2021, from www.informs.org/About-INFORMS/Governance/INFORMS-Ethics-GuidelinesGoogle Scholar
Institute of Medicine of the National Academies. (2009). Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research. Nass, S. J., Levit, L. A., & Gostin, L. O., eds., National Academies Press. https://doi.org/10.17226/12458Google Scholar
Ioannidis, J. P. A. (2005). Why Most Published Research Findings Are False. PLoS Medicine, 2(8), e124. https://doi.org/10.1371/journal.pmed.0020124Google Scholar
Ion, M., Kreuter, B., Nergiz, E., et al. (2017). Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions. Cryptology ePrint Archive, Report 2017/738. https://eprint.iacr.org/2017/738.pdfGoogle Scholar
Jacob, R., Zhu, P., Somers, M.-A., & Bloom, H. (2012). A Practical Guide to Regression Discontinuity. MDRC. https://eric.ed.gov/?id=ED565862Google Scholar
Johnson, A. G., Amin, A. B., Ali, A. R., et al. (2022). COVID-19 Incidence and Death Rates Among Unvaccinated and Fully Vaccinated Adults With and Without Booster Doses During Periods of Delta and Omicron Variant Emergence – 25 U.S. Jurisdictions, April 4–December 25, 2021. Morbidity and Mortality Weekly Report (MMWR), 71(4), 132138. https://doi.org/10.15585/mmwr.mm7104e2Google Scholar
Jouppi, N. P., Young, C., Patil, N., et al. (2017). In-Datacenter Performance Analysis of a Tensor Processing Unit. Proceedings of the 44th Annual International Symposium on Computer Architecture, pp. 112. https://doi.org/10.1145/3079856.3080246Google Scholar
Juang, B. H. & Rabiner, L. R. (2005). Automatic Speech Recognition – A Brief History of the Technology Development. https://web.ece.ucsb.edu/Faculty/Rabiner/ece259/Reprints/354_LALI-ASRHistory-final-10-8.pdfGoogle Scholar
Jumper, J., Evans, R., Pritzel, A., et al. (2021). Highly Accurate Protein Structure Prediction with AlphaFold. Nature, 596(7873), 583589. https://doi.org/10.1038/s41586-021-03819-2CrossRefGoogle ScholarPubMed
Jurafsky, D. & Martin, J. H. (2009). Speech and Language Processing, 2nd edn. Pearson. www.pearson.com/us/higher-education/program/Jurafsky-Speech-and-Language-Processing-2nd-Edition/PGM181706.htmlGoogle Scholar
Kahneman, D. & Tversky, A. (1996). On the Reality of Cognitive Illusions. Psychological Review, 103(3),582591; Discussion 592596. https://doi.org/10.1037/0033-295x.103.3.582Google Scholar
Kamara, S., Mohassel, P., Raykova, M., & Sadeghian, S. (2014). Scaling Private Set Intersection to Billion-Element Sets. In Financial Cryptography and Data Security, Springer, pp. 195215. https://doi.org/10.1007/978-3-662-45472-5_13Google Scholar
Katz, L. (2019). Evaluation of the Moore–Sloan Data Science Environments. Alfred P. Sloan Foundation; Gordon and Betty Moore Foundation. http://msdse.org/files/MSDSE_Eval_Final_Report_Feb_2019_v2.pdfGoogle Scholar
Kennedy, L. (2019). Did Yellow Journalism Fuel the Outbreak of the Spanish–American War? History, August 21. www.history.com/news/spanish-american-war-yellow-journalism-hearst-pulitzerGoogle Scholar
Kirschenbaum, M. (2012). What is Digital Humanities and What’s It Doing in English Departments? In Gold, M. K., ed., Debates in the Digital Humanities, University of Minnesota Press, pp. 311. https://doi.org/10.5749/minnesota/9780816677948.003.0001Google Scholar
Kissinger, H. A., Schmidt, E., & Huttenlocher, D. (2021). The Age of AI: And Our Human Future. Little, Brown. www.littlebrown.com/titles/henry-a-kissinger/the-age-of-ai/9780316273800/Google Scholar
Kleinberg, J., Mullainathan, S., & Raghavan, M. (2017). Inherent Trade-offs in the Fair Determination of Risk Scores. In Papadimitriou, C. H., ed., 8th Innovations in Theoretical Computer Science Conference (ITCS 2017) (Leibniz International Proceedings in Informatics, vol. 67), Schloss Dagstuhl, pp. 43:1–43:23. https://doi.org/10.4230/LIPIcs.ITCS.2017.43Google Scholar
Kleinberg, J., Lakkaraju, H., Leskovec, J., Ludwig, J., & Mullainathan, S. (2018). Human Decisions and Machine Predictions. Quarterly Journal of Economics, 133(1), 287293. https://doi.org/10.3386/w23180Google Scholar
Kleinberg, J., Ludwig, J., Mullainathan, S., & Sunstein, C. R. (2019). Discrimination in the Age of Algorithms. Journal of Legal Analysis, 10, 113174. https://doi.org/10.1093/jla/laz001Google Scholar
Kliff, S. & Bhatia, A. (2022). These Prenatal Tests Are Usually Wrong When Warning of Rare Disorders. The New York Times, January 1. www.nytimes.com/2022/01/01/upshot/pregnancy-birth-genetic-testing.htmlGoogle Scholar
Knight, W. (2017). The Dark Secret at the Heart of AI. Technology Review, 120(3), 5461. www.technologyreview.com/2017/04/11/5113/the-dark-secret-at-the-heart-of-ai/Google Scholar
Knight, W. (2021). Clearview AI Has New Tools to Identify You in Photos. Wired, October 4. www.wired.com/story/clearview-ai-new-tools-identify-you-photos/Google Scholar
Knorr, E. (2021). CSO Global Intelligence Report: The State of Cybersecurity in 2021, July 30. CSO Online. www.csoonline.com/article/3627274/cso-global-intelligence-report-the-state-of-cybersecurity-in-2021.htmlGoogle Scholar
Koenig, F. (2020). Technology Can Benefit a Few Superstar Workers, at the Expense of Everyone Else. LSE Business Review, February 29. https://blogs.lse.ac.uk/businessreview/2020/02/29/technology-can-benefit-a-few-superstar-workers-at-the-expense-of-everyone-else/Google Scholar
Kohavi, R., Tang, D., & Xu, Y. (2020). Trustworthy Online Controlled Experiments: A Practical Guide to A/B Testing. Cambridge University Press. https://doi.org/10.1017/9781108653985Google Scholar
Korinek, A. & Ng, D. X. (2017). The Macroeconomics of Superstars. 5th IMF Statistical Forum, November, Washington, DC. www.imf.org/-/media/Files/Conferences/2017-stats-forum/session-3-korinek.ashxGoogle Scholar
Kost, R. G., Corregano, L. M., Rainer, T.-L., Melendez, C., & Coller, B. S. (2015). A Data-Rich Recruitment Core to Support Translational Clinical Research. Clinical and Translational Science, 8(2), 9199. https://doi.org/10.1111/cts.12240Google Scholar
Kozyrkov, C. (2018). What on Earth is Data Science? HackerNoon, August. https://medium.com/hackernoon/what-on-earth-is-data-science-eb1237d8cb37Google Scholar
Kramer, A. D. I. (2012). The Spread of Emotion via Facebook. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Austin, Texas, USA. https://doi.org/10.1145/2207676.2207787Google Scholar
Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012). ImageNet Classification With Deep Convolutional Neural Networks. In P. Bartlett, ed., Advances in Neural Information Processing Systems, pp. 10971105. https://doi.org/10.1.1.299.205Google Scholar
Lane, J. C. E., Weaver, J., Kostka, K., et al. (2020). Risk of Hydroxychloroquine Alone and in Combination With Azithromycin in the Treatment of Rheumatoid Arthritis: A Multinational, Retrospective Study. The Lancet. Rheumatology, 2(11), E698E711. https://doi.org/10.1016/S2665-9913(20)30276-9Google Scholar
Lapets, A., Volgushev, N., Bestavros, A., Jansen, F., & Varia, M. (2016). Secure MPC for Analytics as a Web Application. 2016 IEEE Cybersecurity Development (SecDev), Boston, MA, USA, November. https://doi.org/10.1109/secdev.2016.027Google Scholar
Layton, R. (2019). The 10 Problems of the GDPR. Statement before the Senate Judiciary Committee, March 12. www.judiciary.senate.gov/imo/media/doc/Layton%20Testimony1.pdfGoogle Scholar
Lazer, D. & Kennedy, R. (2015). What We Can Learn From the Epic Failure of Google Flu Trends. Wired, October 1. www.wired.com/2015/10/can-learn-epic-failure-google-flu-trends/Google Scholar
Lazowska, E. (2009). Computing Research That Changed the World – VIDEOS! Computer Community Consortium Catalyst, June 7. https://cccblog.org/2009/06/07/computing-research-that-changed-the-world-videos/Google Scholar
Lee, K.-F. (2018). AI Superpowers: China, Silicon Valley, and the New World Order. Houghton Mifflin Harcourt. https://books.google.co.uk/books/about/AI_Superpowers.html?id=g7JvtAEACAAJ&redir_esc=yGoogle Scholar
Lee, P. (2016). Learning from Tay’s Introduction. Official Microsoft Blog, March. https://blogs.microsoft.com/blog/2016/03/25/learning-tays-introduction/Google Scholar
Lee, S.-M., Kang, J.-O., & Suh, Y.-M. (2004). Comparison of Hospital Charge Prediction Models for Colorectal Cancer Patients: Neural Network vs. Decision Tree Models. Journal of Korean Medical Science, 19(5), 677681. https://doi.org/10.3346/jkms.2004.19.5.677Google Scholar
Leo, S. (2019). Mistakes, We’ve Drawn a Few. The Economist, March 27. https://medium.economist.com/mistakes-weve-drawn-a-few-8cdd8a42d368Google Scholar
Lepore, J. (2018). MLTalks: How Data Killed Facts (A. Lippman, Interviewer), April 24, ML Talks, MIT Media Lab, Cambridge, MA. www.media.mit.edu/videos/ml-talks-2018-04-23/Google Scholar
Lepore, J. (2020). If Then: How the Simulmatics Corporation Invented the Future. Liveright Publishing. https://wwnorton.com/books/9781324091127Google Scholar
Levitin, D. J. (2019). A Field Guide to Lies: Critical Thinking With Statistics and the Scientific Method. Dutton. www.penguinrandomhouse.com/books/318650/a-field-guide-to-lies-by-daniel-j-levitin/9780593182512Google Scholar
Levitt, S. D. (2021). America’s Math Curriculum Doesn’t Add Up [Podcast]. In Freakonomics, No. 42. Freakonomics Radio. August 27 https://freakonomics.com/podcast/americas-math-curriculum-doesnt-add-up/Google Scholar
Lewis, M. (2004). Moneyball: The Art of Winning an Unfair Game. W. W. Norton. https://play.google.com/store/books/details?id=oIYNBodW-ZECGoogle Scholar
Li, L., Chu, W., Langford, J., & Wang, X. (2011). Unbiased Offline Evaluation of Contextual-Bandit-Based News Article Recommendation Algorithms. Proceedings of the Fourth ACM International Conference on Web Search and Data Mining – WSDM ’11, Hong Kong, China. https://doi.org/10.1145/1935826.1935878Google Scholar
Liebman, B. L., Roberts, M. E., Stern, R. E., & Wang, A. Z. (2020). Mass Digitization of Chinese Court Decisions: How to Use Text as Data in the Field of Chinese Law. Journal of Law and Courts, 8(2), 177201. https://doi.org/10.1086/709916Google Scholar
Lifchits, G., Anderson, A., Goldstein, D. G., Hofman, J. M., & Watts, D. J. (2021). Success Stories Cause False Beliefs About Success. Judgment and Decision Making, 16(6), 14391463. http://journal.sjdm.org/21/210225/jdm210225.pdfGoogle Scholar
Lohr, S. (2013). The Origins of “Big Data”: An Etymological Detective Story. New York Times, February 1. https://bits.blogs.nytimes.com/2013/02/01/the-origins-of-big-data-an-etymological-detective-story/Google Scholar
Lohr, S. L. (2021). Sampling: Design and Analysis. Chapman and Hall/CRC. https://doi.org/10.1201/9780429298899Google Scholar
Loukides, M. (2011). What Is Data Science? O’Reilly Media. www.oreilly.com/library/view/what-is-data/9781449336080/Google Scholar
Madiega, T. (2019). EU Guidelines on Ethics in Artificial Intelligence: Context and Implementation (PE 640.163). European Parliamentary Research Service. www.europarl.europa.eu/RegData/etudes/BRIE/2019/640163/EPRS_BRI(2019)640163_EN.pdfGoogle Scholar
Marcus, J. L., Hurley, L. B., Krakower, D. S., et al. (2019). Use of Electronic Health Record Data and Machine Learning to Identify Potential Candidates for HIV Preexposure Prophylaxis: A Modelling Study. The Lancet HIV, 6(10), E688E695. https://doi.org/10.1016/S2352-3018(19)30137-7Google Scholar
Markoff, J. (2011). Computer Wins on “Jeopardy!”: Trivial, It’s Not. The New York Times, February 16. www.nytimes.com/2011/02/17/science/17jeopardy-watson.htmlGoogle Scholar
Mastrandrea, M. D., Field, C. B., Stocker, T. F., et al. (2010). Guidance Note for Lead Authors of the IPCC Fifth Assessment Report on Consistent Treatment of Uncertainties. Intergovernmental Panel on Climate Change. www.ipcc.ch/publication/ipcc-cross-working-group-meeting-on-consistent-treatment-of-uncertainties/Google Scholar
McCulloch, W. S. & Pitts, W. (1943). A Logical Calculus of the Ideas Immanent in Nervous Activity. Bulletin of Mathematical Biology, 5(4), 115133. https://doi.org/10.1007/BF02478259Google Scholar
McMillan, G. P. & Lapham, S. (2006). Effectiveness of Bans and Laws in Reducing Traffic Deaths: Legalized Sunday Packaged Alcohol Sales and Alcohol-Related Traffic Crashes and Crash Fatalities in New Mexico. American Journal of Public Health, 96(11), 19441948. https://doi.org/10.2105/AJPH.2005.069153Google Scholar
Mehrabi, N., Morstatter, F., Saxena, N., Lerman, K., & Galstyan, A. (2021). A Survey on Bias and Fairness in Machine Learning. ACM Computing Surveys, 54(6), 135. https://doi.org/10.1145/3457607Google Scholar
Michel, J.-B., Shen, Y. K., Aiden, A. P., et al. (2011). Quantitative Analysis of Culture Using Millions of Digitized Books. Science, 331(6014), 176182. https://doi.org/10.1126/science.1199644Google Scholar
Microsoft. (n.d.). Law Enforcement Request Report. Retrieved December 16, 2021, from www.microsoft.com/en-us/corporate-responsibility/law-enforcement-requests-reportGoogle Scholar
Miller, A. P. (2018). Want Less-Biased Decisions? Use Algorithms. Harvard Business Review, July 26. https://hbr.org/2018/07/want-less-biased-decisions-use-algorithmsGoogle Scholar
Mintrom, M. (2015). Herbert A. Simon, Administrative Behavior: A Study of Decision-Making Processes in Administrative Organization. In Lodge, M., Page, E. C., & Balla, S. J., eds., The Oxford Handbook of Classics in Public Policy and Administration, Oxford University Press, pp. 1221. https://doi.org/10.1093/oxfordhb/9780199646135.001.0001Google Scholar
Mirhoseini, A., Goldie, A., Yazgan, M., et al. (2021). A Graph Placement Methodology for Fast Chip Design. Nature, 594(7862), 207212. https://doi.org/10.1038/s41586-021-03544-wGoogle Scholar
MIT Schwarzman College of Computing. (2021). Common Ground Subjects. MIT, February 9. See https://computing.mit.edu/cross-cutting/common-ground-for-computing-education/common-ground-subjects/Google Scholar
Mohamed, A.-R., Dahl, G., & Hinton, G. (2009). Deep Belief Networks for Phone Recognition. Proceedings of the NIPS Workshop on Deep Learning for Speech Recognition and Related Applications. https://nips.cc/Conferences/2009/Schedule?showEvent=1512Google Scholar
Moore, G. E. (1965). Cramming More Components onto Integrated Circuits. Electronics, 38(8), 114117. For reprint, see https://doi.org/10.1109/n-ssc.2006.4785860Google Scholar
Morgan, S. L. & Winship, C. (2014). Counterfactuals and Causal Inference, 2nd edn. Cambridge University Press. https://play.google.com/store/books/details?id=Q6YaBQAAQBAJGoogle Scholar
Morris, R. G. (1999). D.O. Hebb: The Organization of Behavior, Wiley: New York; 1949. Brain Research Bulletin, 50(5–6), 437. https://doi.org/10.1016/s0361-9230(99)00182-3Google Scholar
Moseley, A. (n.d.). Just War Theory. Internet Encyclopedia of Philosophy. Retrieved May 20, 2022, from https://iep.utm.edu/justwar/Google Scholar
Mullard, A. (2021). What Does AlphaFold Mean for Drug Discovery? Nature Reviews. Drug Discovery, 20(10), 725727. https://doi.org/10.1038/d41573-021-00161-0Google Scholar
Nabulsi, Z., Sellergren, A., Jamshy, S., et al. (2021). Deep Learning for Distinguishing Normal Versus Abnormal Chest Radiographs and Generalization to Two Unseen Diseases Tuberculosis and COVID-19. Scientific Reports, 11(1), 15523. https://doi.org/10.1038/s41598-021-93967-2Google Scholar
Narang, R. K. (2013). Inside the Black Box: A Simple Guide to Quantitative and High-Frequency Trading, 2nd edn. John Wiley & Sons. https://onlinelibrary.wiley.com/doi/book/10.1002/9781118662717Google Scholar
Narayanan, A. (2018). 21 Fairness Definitions and Their Politics. Machine Learning Research Conference on Fairness, Accountability, and Transparency (FAT), New York University, February 23 and 24. YouTube. www.youtube.com/watch?v=jIXIuYdnyykGoogle Scholar
Narayanan, A. & Shmatikov, V. (2007). How To Break Anonymity of the Netflix Prize Dataset. arXiv [cs.CR]. https://arxiv.org/pdf/cs/0610105v2.pdfGoogle Scholar
Narayanan, A. & Shmatikov, V. (2008). Robust De-anonymization of Large Sparse Datasets. 2008 IEEE Symposium on Security and Privacy (SP 2008), Oakland, CA, USA, May. https://doi.org/10.1109/sp.2008.33Google Scholar
National Academies of Sciences, Engineering, and Medicine. (2018). Data Science for Undergraduates: Opportunities and Options. National Academies Press. https://doi.org/10.17226/25104Google Scholar
National Cancer Institute. (2022). Surveillance, Epidemiology and End Results Program. ICD-0-3 SEER Site/Histology Validation List [dataset]. See www.datascienceincontext/seerGoogle Scholar
National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. (1978). The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research. Department of Health, Education, and Welfare. www.hhs.gov/ohrp/regulations-and-policy/belmont-report/read-the-belmont-report/index.htmlGoogle Scholar
National Institutes of Health, Office of Science Policy. (n.d.). Significant Research Advances Enabled by HeLa Cells. National Institutes of Health. Retrieved December 16, 2021, from https://osp.od.nih.gov/scientific-sharing/hela-cells-timeline/Google Scholar
National Research Council. (2007). Toward a Safer and More Secure Cyberspace, Goodman, S. E. & Lin, H. S., eds., National Academies Press. https://doi.org/10.17226/11925Google Scholar
National Science Board. (2005). Long-Lived Digital Data Collections: Enabling Research and Education in the 21st Century (NSB-O5-40). National Science Foundation. www.nsf.gov/pubs/2005/nsb0540/Google Scholar
Naur, P. (1974). Concise Survey of Computer Methods. Studentlitteratur, Lund, Sweden. www.google.com/books/edition/Concise_Survey_of_Computer_Methods/0KEpAQAAIAAJ?hl=en&gbpv=0Google Scholar
Navalpakkam, V. & Churchill, E. (2012). Mouse Tracking: Measuring and Predicting Users’ Experience of Web-Based Content. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 29632972. https://doi.org/10.1145/2207676.2208705Google Scholar
NCSL. (2021). Differential Privacy for Census Data Explained. National Conference of State Legislatures, November 10. NCSL. www.ncsl.org/research/redistricting/differential-privacy-for-census-data-explained.aspxGoogle Scholar
New York Times. (2020). Coronavirus in the U.S.: Latest Map and Case Count. The New York Times, March 3. www.nytimes.com/interactive/2021/us/covid-cases.htmlGoogle Scholar
Nicas, J., Zhong, R., & Wakabayashi, D. (2021). Censorship, Surveillance and Profits: A Hard Bargain for Apple in China. The New York Times, June 17. www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.htmlGoogle Scholar
Nichols, J. A. & Schneider, M. L., eds. (1982). Proceedings of the 1982 Conference on Human Factors in Computing Systems. ACM. https://dl.acm.org/doi/proceedings/10.1145/800049Google Scholar
Nickerson, D. W. & Rogers, T. (2014). Political Campaigns and Big Data. Journal of Economic Perspectives, 28(2), 5174. https://doi.org/10.1257/jep.28.2.51Google Scholar
Nisbett, R. E. (2021). Thinking: A Memoir. Agora Books. www.worldcat.org/title/thinking-a-memoir/oclc/1240772815Google Scholar
Nissenbaum, H. (2009). Privacy in Context. Stanford University Press. https://doi.org/10.1515/9780804772891Google Scholar
NIST. (n.d.). Computer Security Resource Center (CSRC) – Glossary. National Institute of Standards and Technology (NIST). Retrieved March 7, 2022, from https://csrc.nist.gov/glossary/term/infosecGoogle Scholar
Norman, D. (1993). Things That Make Us Smart: Defending Human Attributes in the Age of the Machine. Perseus Books, p. 43. www.perseusbooks.com/titles/don-norman/things-that-make-us-smart/9780201626957/Google Scholar
Norman, D. (2013). The Design of Everyday Things, Revised and expanded edition. Basic Books. www.basicbooks.com/titles/don-norman/the-design-of-everyday-things/9780465072996/Google Scholar
Norvig, P. (2009). Natural Language Corpus Data. In Segaran, T. & Hammerbacher, J., eds., Beautiful Data: The Stories Behind Elegant Data Solutions. O’Reilly Media, pp. 219242. www.oreilly.com/library/view/beautiful-data/9780596801656/Google Scholar
Nuño, B. S.-A., Vicente, G. S., & Pecherskiy, M. (2020). Google, Apple, and Facebook: Understanding Mobility During Social Distancing With Private Sector Data, May 11. The Development Data Partnership. https://datapartnership.org/updates/mobility-during-social-distancing/Google Scholar
NYU. (n.d.). About SONYC – Sounds of New York City. New York University. Retrieved December 21, 2021, from https://wp.nyu.edu/sonyc/Google Scholar
Office for Civil Rights (OCR). (2008). Summary of the HIPAA Privacy Rule, May 7. US Department of Health & Human Services. www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.htmlGoogle Scholar
Offord, C. (2020). The Surgisphere Scandal: What Went Wrong? The Scientist, October. www.the-scientist.com/features/the-surgisphere-scandal-what-went-wrong--67955Google Scholar
O’Neil, C. (2016). Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Crown. www.penguinrandomhouse.com/books/241363/weapons-of-math-destruction-by-cathy-oneil/Google Scholar
O’Reilly, T. (2021). Data Is the New Sand. The Information, February 24. www.theinformation.com/articles/data-is-the-new-sandGoogle Scholar
OpenSAFELY. (n.d.). About OpenSAFELY – Secure Analytics Platform for NHS Electronic Health Records. Retrieved December 13, 2021, from www.opensafely.org/about/Google Scholar
Orwant, J. (2010). Our Commitment to the Digital Humanities. Google AI Blog: The Latest from Google Research, July 14. https://doi.org/10.1097/NNE.0000000000000892Google Scholar
Pandya, M. & Desai, C. (2013). Compensation in Clinical Research: The Debate Continues. Perspectives in Clinical Research, 4(1), 7074. https://doi.org/10.4103/2229-3485.106394Google Scholar
Papernot, N., Song, S., Mironov, I., et al. (2018). Scalable Private Learning with PATE. arXiv [stat.ML]. http://arxiv.org/abs/1802.08908Google Scholar
Pearl, J. (1988). Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann. www.elsevier.com/books/probabilistic-reasoning-in-intelligent-systems/pearl/978-0-08-051489-5Google Scholar
Pearl, J. & Mackenzie, D. (2020). The Book of Why: The New Science of Cause and Effect. Basic Books. www.basicbooks.com/titles/judea-pearl/the-book-of-why/9781541698963/Google Scholar
Peirce, C. S. (1883). A Theory of Probable Inference. In Peirce, C. S., ed., Studies in Logic by Members of the Johns Hopkins University, vol. 203. Little, Brown, pp. 126181. https://doi.org/10.1037/12811-007Google Scholar
Petruzzi, N. C. & Dada, M. (1999). Pricing and the Newsvendor Problem: A Review With Extensions. Operations Research, 47(2), 183194. https://doi.org/10.1287/opre.47.2.183CrossRefGoogle Scholar
Playfair, W. (1786). The Commercial and Political Atlas: Representing, by Means of Stained Copper-Plate Charts, the Progress of the Commerce, Revenues, Expenditure and Debts of England During the Whole of the Eighteenth Century. London. https://play.google.com/store/books/details?id=dgRdAAAAcAAJGoogle Scholar
Pleiss, G., Raghavan, M., Wu, F., Kleinberg, J., & Weinberger, K. Q. (2017). On Fairness and Calibration. arXiv [cs.LG]. https://arxiv.org/pdf/1709.02012v2Google Scholar
Plonsky, O., Chen, D. L., Netzer, L., Steiner, T., & Feldman, Y. (2021). Best to Be Last: Serial Position Effects in Legal Decisions in the Field and in the Lab. Bar Ilan University Faculty of Law Research Paper No. 19-15. Bar Ilan University. See https://doi.org/10.2139/ssrn.3414155Google Scholar
Porter, J. (2020). Garmin Reportedly Paid Multimillion-Dollar Ransom After Suffering Cyberattack. The Verge, August 4. www.theverge.com/2020/8/4/21353842/garmin-ransomware-attack-wearables-wastedlocker-evil-corpGoogle Scholar
Potvin, R. & Levenberg, J. (2016). Why Google Stores Billions of Lines of Code in a Single Repository. Communications of the ACM, 59(7), 7887. https://doi.org/10.1145/2854146Google Scholar
Poynter Institute. (n.d.). IFCN Code of Principles. International Fact Checking Network. Retrieved December 23, 2021, from www.ifcncodeofprinciples.poynter.org/Google Scholar
Public Face of Science Initiative. (2018). Perceptions of Science in America. American Academy of Arts and Sciences. www.amacad.org/publication/perceptions-science-americaGoogle Scholar
Pullman, J., Thomas, K., Bursztein, E., et al. (2019). New Research: Lessons from Password Checkup in Action. Google Online Security Blog, August 15. https://security.googleblog.com/2019/08/new-research-lessons-from-password.htmlGoogle Scholar
Raina, R., Madhavan, A., & Ng, A. Y. (2009). Large-Scale Deep Unsupervised Learning Using Graphics Processors. Proceedings of the 26th Annual International Conference on Machine Learning, pp. 873880. https://doi.org/10.1145/1553374.1553486Google Scholar
Raponi, S., Caprolu, M., & Di Pietro, R. (2021). Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, and Future Directions. In Armando, A. & Colajanni, M., eds., Proceedings of the Italian Conference on Cybersecurity (ITASEC 2021) (CEUR Workshop Proceedings, vol. 2940). CEUR-WS.org. http://ceur-ws.org/Vol-2940/paper33.pdfGoogle Scholar
Reality Labs. (n.d.). Responsible Innovation Principles. Meta. Retrieved January 27, 2022, from https://about.facebook.com/realitylabs/responsible-innovation-principles/Google Scholar
Rees, V. (2020). Novel Antibiotic Compound Revealed Through Artificial Intelligence Screening. Drug Target Review, February 24. www.drugtargetreview.com/news/56448/novel-antibiotic-compound-revealed-through-artificial-intelligence-screening/Google Scholar
Rehmeyer, J. (2008). Florence Nightingale: The Passionate Statistician. Science News, November 26. www.sciencenews.org/article/florence-nightingale-passionate-statisticianGoogle Scholar
Reich, R., Sahami, M., & Weinstein, J. M. (2021). System Error: Where Big Tech Went Wrong and How We Can Reboot. Hodder and Stoughton. www.hachette.com.au/jeremy-weinstein-rob-reich-mehran-sahami/system-error-where-big-tech-went-wrong-and-how-we-can-rebootGoogle Scholar
Retraction Watch. (2020). Retracted Coronavirus (COVID-19) Papers, April 29. See https://retractionwatch.com/retracted-coronavirus-covid-19-papers/Google Scholar
Rev. (2020). Big Tech Antitrust Hearing, Full Transcript, July 29. REV.com. www.rev.com/blog/transcripts/big-tech-antitrust-hearing-full-transcript-july-29Google Scholar
Rifon, N. J., LaRose, R., & Choi, S. M. (2005). Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures. Journal of Consumer Affairs, 39(2), 339362. https://doi.org/10.1111/j.1745-6606.2005.00018.xGoogle Scholar
Robles, P. (2018). China Plans to be a World Leader in Artificial Intelligence by 2030. South China Morning Post, October 1. https://multimedia.scmp.com/news/china/article/2166148/china-2025-artificial-intelligence/index.htmlGoogle Scholar
Roff, H. M. (2018). The Folly of Trolleys: Ethical Challenges and Autonomous Vehicles, December 17. The Brookings Institution. www.brookings.edu/research/the-folly-of-trolleys-ethical-challenges-and-autonomous-vehicles/Google Scholar
Romeo, N. (2014). Is Google Making Students Stupid? The Atlantic, September. www.theatlantic.com/education/archive/2014/09/is-google-making-students-stupid/380944/Google Scholar
Rosenblatt, F. (1958). The Perceptron: A Probabilistic Model for Information Storage and Organization in the Brain. Psychological Review, 65(6), 386408. https://doi.org/10.1037/h0042519Google Scholar
Rosset, C. (2020). Turing-NLG: A 17-Billion-Parameter Language Model by Microsoft, February 13. Microsoft Research. www.microsoft.com/en-us/research/blog/turing-nlg-a-17-billion-parameter-language-model-by-microsoft/Google Scholar
Royal Statistical Society. (2015). Data Science and Statistics: Different Worlds?, May 19. YouTube. https://youtu.be/C1zMUjHOLr4Google Scholar
Rubiera, C. O. (2021). AlphaFold 2 Is Here: What’s Behind the Structure Prediction Miracle, July. Oxford Protein Informatics Group (OPIG). www.blopig.com/blog/2021/07/alphafold-2-is-here-whats-behind-the-structure-prediction-miracle/Google Scholar
Rudin, C. (2019). Stop Explaining Black Box Machine Learning Models for High Stakes Decisions and Use Interpretable Models Instead. Nature Machine Intelligence, 1(5), 206215. https://doi.org/10.1038/s42256-019-0048-xGoogle Scholar
Rumelhart, D. E., Hinton, G. E., & Williams, R. J. (1986). Learning Representations by Back-Propagating Errors. Nature, 323(6088), 533536. https://doi.org/10.1038/323533a0Google Scholar
Russell, S. & Norvig, P. (2021). Artificial Intelligence: A Modern Approach, 4th edn. Pearson. www.google.com/books/edition/Artificial_Intelligence/B4xczgEACAAJ?hl=enGoogle Scholar
Saey, T. H. (2015). Big Data Studies Come With Replication Challenges. Science News, 187(3), 2227. www.sciencenews.org/article/big-data-studies-come-replication-challengesGoogle Scholar
Salton, G. (1971). Relevance Feedback and the Optimization of Retrieval Effectiveness. The SMART Retrieval System – Experiments in Automatic Document Processing. Prentice Hall.Google Scholar
Sambasivan, N., Kapania, S., Highfill, H., et al. (2021). “Everyone Wants to Do the Model Work, Not the Data Work”: Data Cascades in High-Stakes AI. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 115. https://doi.org/10.1145/3411764.3445518Google Scholar
Samuel, A. L. (1959). Some Studies in Machine Learning Using the Game of Checkers. IBM Journal of Research and Development, 3(3), 210229. https://doi.org/10.1147/rd.33.0210Google Scholar
Samuelson, P. & Nordhaus, W. (2009). Economics, 19th edn. McGraw-Hill Professional. www.mhprofessional.com/9780073511290-usa-economicsGoogle Scholar
Sankar, P. (2014). ELSI: Origins and Early History. Meeting Sixteen, Presidential Commission for the Study of Bioethical Issues, February 11, Washington, DC. https://bioethicsarchive.georgetown.edu/pcsbi/sites/default/files/Sankar%20Meeting%2016%20Presentation.pdfGoogle Scholar
Schafer, J. B., Konstan, J. A., & Riedl, J. (2001). E-Commerce Recommendation Applications. Data Mining and Knowledge Discovery, 5(1), 115153. https://doi.org/10.1023/A: 1009804230409CrossRefGoogle Scholar
Schiffer, Z. & Robertson, A. (2021). Watch a Police Officer Admit to Playing Taylor Swift to Keep a Video Off YouTube. The Verge, July 1. www.theverge.com/2021/7/1/22558292/police-officer-video-taylor-swift-youtube-copyrightGoogle Scholar
Schmidt, E. (2020). Ethics & Privacy: Terms of Usage, a Data Science Day Virtual Event. Keynote Address. Columbia Data Science Institute, September 18. Youtube. See https://datascience.columbia.edu/news/2020/data-science-day-2020/Google Scholar
Schneier, B. (2006). Security in the Cloud. Schneier on Security, February 15. www.schneier.com/blog/archives/2006/02/security_in_the.htmlGoogle Scholar
Schuemie, M. J., Cepeda, M. S., Suchard, M. A., et al. (2020). How Confident Are We About Observational Findings in Healthcare: A Benchmark Study. Harvard Data Science Review, 2(1). https://doi.org/10.1162/99608f92.147cc28eGoogle Scholar
Schumer, C. & Sanders, B. (2019). Opinion: Limit Corporate Stock Buybacks. The New York Times, February 4. www.nytimes.com/2019/02/03/opinion/chuck-schumer-bernie-sanders.htmlGoogle Scholar
SciLine. (2017). SciLine home page. American Association for the Advancement of Science. See www.sciline.org/Google Scholar
Shaw, D. E., Maragakis, P., Lindorff-Larsen, K., et al. (2010). Atomic-Level Characterization of the Structural Dynamics of Proteins. Science, 330(6002), 341346. https://doi.org/10.1126/science.1187409Google Scholar
Shelley, P. B. (1898). Prometheus Unbound: A Lyrical Drama in Four Acts, Dickinson, G. L., ed., vol. 50. J. M. Dent. www.google.com/books/edition/Prometheus_Unbound/6O6aNo60Pi0CGoogle Scholar
Shen, D., Wu, G., & Suk, H.-I. (2017). Deep Learning in Medical Image Analysis. Annual Review of Biomedical Engineering, 19, 221248. https://doi.org/10.1146/annurev-bioeng-071516-044442Google Scholar
Shift. (n.d.). Shift: The Commission on Work, Workers, and Technology. Retrieved December 21, 2021, from https://shiftcommission.work/Google Scholar
SIAM/ASA. (n.d.). SIAM/ASA Journal on Uncertainty Quantification (JUQ). Retrieved December 21, 2021, from www.siam.org/publications/journals/siam-asa-journal-on-uncertainty-quantification-juqGoogle Scholar
Silver, D., Hubert, T., Schrittwieser, J., et al. (2018). A General Reinforcement Learning Algorithm that Masters Chess, Shogi, and Go Through Self-Play. Science, 362(6419), 11401144. https://doi.org/10.1126/science.aar6404Google Scholar
Sinclair, J. (1794). The Statistical Account of Scotland: Drawn Up From the Communication of the Ministers of the Different Parishes, vol. 12. Creech. www.google.com/books/edition/The_Statistical_Account_of_Scotland/_AA-AAAAcAAJ?hl=enGoogle Scholar
Smith, J. E. & Winkler, R. L. (2006). The Optimizer’s Curse: Skepticism and Postdecision Surprise in Decision Analysis. Management Science, 52(3), 311322. https://doi.org/10.1287/mnsc.1050.0451Google Scholar
Smithsonian Institution. (n.d.). About – Collections Search Center, Smithsonian Institution. The Smithsonian Collections Search Center. Retrieved December 11, 2021, from https://collections.si.edu/search/about.htmGoogle Scholar
Sodhi, M. (2007). What About the “O” in O.R.? ORMS Today, 34(3), December. https://doi.org/10.1287/orms.2007.06.05Google Scholar
Solum, L. (2009). Legal Theory Lexicon: Rules, Standards, and Principles. Legal Theory Blog, September 6. https://lsolum.typepad.com/legaltheory/2009/09/legal-theory-lexicon-rules-standards-and-principles.htmlGoogle Scholar
Sonderegger, P. (2021). Data Hits Peak Metaphor. Data Capital, March 4. https://paulsonderegger.com/2021/03/04/data-hits-peak-metaphor/Google Scholar
Spector, A. Z. (2002). Technology Megatrends Driving the Future of e-Society. In Eberspächer, J. & Hertz, U., eds., Leben in der e-Society: Computerintelligenz für den Alltag. Springer, pp. 3550. https://doi.org/10.1007/978-3-642-56059-0_5Google Scholar
Spector, A. Z. (2004). Research on the Edge of the Expanding Sphere. AZS Services, Google Drive. https://azs-services.com/older-material/Google Scholar
Spector, A. Z. (2016). Opportunities and Perils in Data Science. Unpublished.Google Scholar
Spector, A. Z. (2020). Thought Experiment: Corona Virus and Tracing Contacts. LinkedIn, February 4. www.linkedin.com/pulse/thought-experiment-corona-virus-tracing-contacts-alfred-spector/Google Scholar
Spector, A. Z. (2021). Data Science Goals and Pragmatics. Harvard Data Science Review, 3(2). https://doi.org/10.1162/99608f92.643b1bf8Google Scholar
Spector, A. Z. & Gifford, D. (1984). The Space Shuttle Primary Computer System. Communications of the ACM, 27(9), 872900. https://doi.org/10.1145/358234.358246Google Scholar
Spiegelhalter, D. J. (2014). The Power of the MicroMort. BJOG: An International Journal of Obstetrics and Gynaecology, 121(6), 662663. https://doi.org/10.1111/1471-0528.12663Google Scholar
SRI International, Network Information Center, & US Defense Communications Agency. (1978). ARPANET Directory. The Center. https://books.google.com/books?id=AHo-AQAAIAAJGoogle Scholar
Statista. (n.d.). Facebook Fake Account Deletion per Quarter 2021. Retrieved December 17, 2021, from www.statista.com/statistics/1013474/facebook-fake-account-removal-quarter/Google Scholar
Statt, N. (2021). Slack’s New DM Feature Can Be Used to Send Abuse and Harassment With Just an Invite. The Verge, March 24. www.theverge.com/2021/3/24/22348422/slack-connect-direct-message-abuse-harassmentGoogle Scholar
Stecuła, D. & Motta, M. (2021). Unverified Reports of Vaccine Side Effects in VAERS Aren’t the Smoking Guns Portrayed by Right-Wing Media Outlets – They Can Offer Insight Into Vaccine Hesitancy. The Conversation, August 25. http://theconversation.com/unverified-reports-of-vaccine-side-effects-in-vaers-arent-the-smoking-guns-portrayed-by-right-wing-media-outlets-they-can-offer-insight-into-vaccine-hesitancy-166401Google Scholar
Steele, J. & Iliinsky, N., eds. (2010). Beautiful Visualization: Looking at Data Through the Eyes of Experts. O’Reilly Media. www.oreilly.com/library/view/beautiful-visualization/9781449379889/Google Scholar
Sterne, J. (2021). Real-World Effectiveness of COVID-19 Vaccines. Vaccines and Related Biological Products Advisory Committee Meeting, September 17. www.fda.gov/media/152241/downloadGoogle Scholar
Stokes, J. M., Yang, K., Swanson, K., et al. (2020). A Deep Learning Approach to Antibiotic Discovery. Cell, 181(2), 475483. https://doi.org/10.1016/j.cell.2020.04.001Google Scholar
Sullivan, D. (2021). An Overview of Our Rater Guidelines for Search, October 19. Google. https://blog.google/products/search/overview-our-rater-guidelines-search/Google Scholar
Sweeney, L. (2002). k-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557570. https://doi.org/10.1142/S0218488502001648Google Scholar
Swire, P. P. & Kennedy-Mayo, D. (2020). U.S. Private-Sector Privacy, 3rd edn. International Association of Privacy Professionals. https://iapp.org/resources/article/u-s-private-sector-privacy-third-edition/Google Scholar
Taleb, N. N. (2004). Fooled by Randomness: The Hidden Role of Chance in Life and in the Markets, 2nd edn. TEXERE and Random House. www.penguinrandomhouse.com/books/176225/fooled-by-randomness-by-nassim-nicholas-taleb/Google Scholar
Taleb, N. N. (2007). The Black Swan: The Impact of the Highly Improbable, 2nd edn. TEXERE and Random House. www.penguinrandomhouse.com/books/176226/the-black-swan-second-edition-by-nassim-nicholas-taleb/Google Scholar
Tau, B. (2020). Next Step in Government Data Tracking Is the Internet of Things. Wall Street Journal (Eastern Edn.), November 27. www.wsj.com/articles/next-step-in-government-data-tracking-is-the-internet-of-things-11606478401Google Scholar
Thaler, R. H. & Sunstein, C. R. (2009). Nudge: Improving Decisions About Health, Wealth, and Happiness. Penguin. www.penguinrandomhouse.com/books/304634/nudge-by-richard-h-thaler-and-cass-r-sunstein/Google Scholar
Thistlethwaite, D. L. & Campbell, D. T. (1960). Regression-Discontinuity Analysis: An Alternative to the Ex Post Facto Experiment. Journal of Educational Psychology, 51(6), 309317. https://doi.org/10.1037/h0044319Google Scholar
Tibshirani, R. (1996). Regression Shrinkage and Selection via the Lasso. Journal of the Royal Statistical Society, 58(1), 267288. https://doi.org/10.1111/j.2517-6161.1996.tb02080.xGoogle Scholar
Tony C. (2006). Tacoma Narrows Bridge Collapse “Gallopin’ Gertie”, December 9. Youtube. www.youtube.com/watch?v=j-zczJXSxnwGoogle Scholar
TOR Project. (n.d.). About The Tor Project: History. Retrieved March 16, 2022, from www.torproject.org/about/history/Google Scholar
Troianovski, A. (2021). “You Can’t Trust Anyone”: Russia’s Hidden Covid Toll Is an Open Secret. The New York Times, April 10. www.nytimes.com/2021/04/10/world/europe/covid-russia-death.htmlGoogle Scholar
Trust Project, The. (n.d.). The Trust Project – News With Integrity. Retrieved December 20, 2021, from https://thetrustproject.org/Google Scholar
Tufte, E. R. (2001). The Visual Display of Quantitative Information, 2nd edn. Graphics Press. www.edwardtufte.com/tufte/books_vdqiGoogle Scholar
Tukey, J. W. (1962). The Future of Data Analysis. Annals of Mathematical Statistics, 33(1), 167. www.jstor.org/stable/2237638Google Scholar
Tukey, J. W. (1977). Exploratory Data Analysis. Addison-Wesley. http://theta.edu.pl/wp-content/uploads/2012/10/exploratorydataanalysis_tukey.pdfGoogle Scholar
Turing, A. M. (1950). I. – Computing Machinery and Intelligence. Mind; a Quarterly Review of Psychology and Philosophy, LIX(236), 433460. https://doi.org/10.1093/mind/LIX.236.433Google Scholar
Tversky, A. & Kahneman, D. (1974). Judgment Under Uncertainty: Heuristics and Biases. Science, 185(4157), 11241131. https://doi.org/10.1126/science.185.4157.1124Google Scholar
Tversky, A. & Kahneman, D. (1982). Judgments of and by Representativeness. In Judgment Under Uncertainty: Heuristics and Biases. Cambridge University Press, pp. 8498. https://doi.org/10.1017/CBO9780511809477.007Google Scholar
US Bureau of Economic Analysis. (n.d.). Interactive Access to Industry Economic Accounts Data – Value Added by Industry [Dataset]. Bureau of Economic Analysis – US Department of Commerce (BEA). Retrieved December 10, 2021, from https://apps.bea.gov/iTable/iTable.cfm?reqid=150&step=2&isuri=1&categories=gdpxindGoogle Scholar
US Census Bureau. (n.d.). North American Industry Classification System (NAICS). US Census Bureau. Retrieved December 10, 2021, from www.census.gov/naics/Google Scholar
US Department of Homeland Security. (2012). The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. US Department of Homeland Security. https://doi.org/10.2139/SSRN.2445102Google Scholar
US Department of Transportation. (n.d.). Automated Vehicles for Safety. National Highway Traffic Safety Administration. Retrieved December 14, 2021, from www.nhtsa.gov/technology-innovation/automated-vehicles-safetyGoogle Scholar
US Federal Trade Commission. (1998). Fair Information Practice Principles. Internet Archive. https://web.archive.org/web/20131110022137/http://www.ftc.gov/reports/privacy3/fairinfo.shtmGoogle Scholar
US National Library of Medicine. (n.d.). ClinicalTrials.gov. Homepage. US National Library of Medicine. Retrieved December 20, 2021, from https://clinicaltrials.gov/Google Scholar
van der Bles, A. M., van der Linden, S., Freeman, A. L. J., et al. (2019). Communicating Uncertainty About Facts, Numbers and Science. Royal Society Open Science, 6(5), 181870. https://doi.org/10.1098/rsos.181870Google Scholar
Van Hoeve, W.-J. (2014). Operations Research: Opportunities and Challenges. INFORMS IE Seminar, University of Pittsburgh. www.andrew.cmu.edu/user/vanhoeve/papers/u_pitt_2014_OR.pdfGoogle Scholar
Vaswani, A., Shazeer, N., Parmar, N., et al. (2017). Attention Is All You Need. In Guyon, I., Luxburg, U. V., Bengio, S., et al., eds., Advances in Neural Information Processing Systems, vol. 30. Curran Associates, pp. 59986008. https://proceedings.neurips.cc/paper/2017/file/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdfGoogle Scholar
Verma, I. M. (2014). Editorial Expression of Concern: Experimental Evidence of Massive-Scale Emotional Contagion Through Social Networks. Proceedings of the National Academy of Sciences of the United States of America, 111(29), 10779. https://doi.org/10.1073/pnas.1412469111Google Scholar
Vigen, T. (n.d.). 15 Insane Things That Correlate With Each Other. Tylervigen.com. Retrieved January 17, 2022, from http://tylervigen.com/spurious-correlationsGoogle Scholar
Vitak, J., Shilton, K., & Ashktorab, Z. (2016). Beyond the Belmont Principles: Ethical Challenges, Practices, and Beliefs in the Online Data Research Community. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing – CSCW ’16, pp. 941953. https://doi.org/10.1145/2818048.2820078Google Scholar
Vodrahalli, K., Gerstenberg, T., & Zou, J. (2022). Uncalibrated Models Can Improve Human–AI Collaboration. arXiv [cs.AI]. http://arxiv.org/abs/2202.05983Google Scholar
von Borzyskowski, I., Mazumder, A., Mateen, B., & Wooldridge, M., eds. (2021). Data Science and AI in the Age of COVID-19 – Reflections on the Response of the UK’s Data Science and AI Community to the COVID-19 Pandemic. Alan Turing Institute. www.turing.ac.uk/sites/default/files/2021-06/data-science-and-ai-in-the-age-of-covid_full-report_2.pdfGoogle Scholar
Wang, G., Sarkar, A., Carbonetto, P., & Stephens, M. (2020). A Simple New Approach to Variable Selection in Regression, With Application to Genetic Fine Mapping. Journal of the Royal Statistical Society. Series B, Statistical Methodology, 82(5), 12731300. https://doi.org/10.1111/rssb.12388Google Scholar
Wang, P. & Johnson, C. (2018). Cybersecurity Incident Handling: A Case Study of the Equifax Data Breach. Issues in Information Systems, 19(3), 150159. https://doi.org/10.48009/3_iis_2018_150-159Google Scholar
Wang, Y. & Blei, D. M. (2019). The Blessings of Multiple Causes. Journal of the American Statistical Association, 114(528), 15741596. https://doi.org/10.1080/01621459.2019.1686987Google Scholar
Wason, P. C. (1960). On the Failure to Eliminate Hypotheses in a Conceptual Task. Quarterly Journal of Experimental Psychology, 12(3), 129140. https://doi.org/10.1080/17470216008416717Google Scholar
Wells, G., Horwitz, J., & Seetharaman, D. (2021). Facebook Knows Instagram Is Toxic for Teen Girls, Company Documents Show. Wall Street Journal, September 14. www.wsj.com/articles/facebook-knows-instagram-is-toxic-for-teen-girls-company-documents-show-11631620739Google Scholar
Whipple, K. N. & Shermak, J. L. (2018). Quality, Quantity and Policy: How Newspaper Journalists Use Digital Metrics to Evaluate Their Performance and Their Papers’ Strategies. ISOJ (International Symposium on Online Journalism), 8(1), 6788. https://isoj.org/research/quality-quantity-and-policy-how-newspaper-journalists-use-digital-metrics-to-evaluate-their-performance-and-their-papers-strategies/Google Scholar
White, R. W., Harpaz, R., Shah, N. H., DuMouchel, W., & Horvitz, E. (2014). Toward Enhanced Pharmacovigilance Using Patient-Generated Data on the Internet. Clinical Pharmacology and Therapeutics, 96(2), 239246. https://doi.org/10.1038/clpt.2014.77Google Scholar
Wikipedia contributors. (n.d.). Category: Lists of Albums by Release Date [Dataset]. Wikipedia, The Free Encyclopedia. Retrieved December 14, 2021, from https://en.wikipedia.org/wiki/Category:Lists_of_albums_by_release_dateGoogle Scholar
Wikipedia contributors. (2021). Metcalfe’s Law. Wikipedia, The Free Encyclopedia, December 9. https://en.wikipedia.org/w/index.php?title=Metcalfe%27s_law&oldid=1059470400Google Scholar
Wikipedia contributors. (2022). Goodhart’s Law. Wikipedia, The Free Encyclopedia, March 8. https://en.wikipedia.org/w/index.php?title=Goodhart%27s_law&oldid=1076008798Google Scholar
Wild Sky Media. (n.d.). Baby Names Popularity – NameVoyager: Baby Name Wizard Graph of Most Popular Baby Names. Internet Archive. See www.datascienceincontext.com/babynameGoogle Scholar
Williams, J. J., Lombrozo, T., & Rehder, B. (2013). The Hazards of Explanation: Overgeneralization in the Face of Exceptions. Journal of Experimental Psychology, General, 142(4), 10061014. https://doi.org/10.1037/a0030996Google Scholar
Williams, M. (2020). The Average Temperature of the Universe Has Been Getting Hotter and Hotter. Universe Today - Space and Astronomy News, November 14. www.universetoday.com/148794/the-average-temperature-of-the-universe-has-been-getting-hotter-and-hotter/Google Scholar
Wing, J. M. (2006). Computational Thinking. Communications of the ACM, 49(3), 3335. https://doi.org/10.1145/1118178.1118215Google Scholar
Wing, J. M. (2019). The Data Life Cycle. Harvard Data Science Review, 1(1). https://doi.org/10.1162/99608f92.e26845b4Google Scholar
Wing, J. M. (2020). Ten Research Challenge Areas in Data Science. Harvard Data Science Review. https://doi.org/10.1162/99608f92.c6577b1fGoogle Scholar
Wing, J. M. (2021). Trustworthy AI. Communications of the ACM, 64(10), 6471. https://doi.org/10.1145/3448248Google Scholar
Wing, J. M., Janeja, V. P., Kloefkorn, T., & Erickson, L. C. (2018). Data Science Leadership Summit: Summary Report. National Science Foundation. https://dl.acm.org/doi/10.5555/3293458Google Scholar
Wingrove, J. (2021). Vaccine Data Gaps Point to Millions More in U.S. Who Lack Shots. Bloomberg News, December 18. www.bloomberg.com/news/articles/2021-12-18/vaccine-data-gaps-point-to-millions-more-in-u-s-who-lack-shotsGoogle Scholar
Wise, C. (2011). Chomsky and Deconstruction: The Politics of Unconscious Knowledge. Palgrave Macmillan US. https://doi.org/10.1057/9780230117051Google Scholar
Wolkin, J. (2020). Richard Childress Racing Enhances Performance With Predictive Analytics. Forbes Magazine, August 2. www.forbes.com/sites/josephwolkin/2020/08/02/richard-childress-racing-enhances-performance-with-predictive-analytics/Google Scholar
Won, M. (n.d.). PLATO (Programmed Logic for Automatic Teaching Operations) System. HistoryIT. Retrieved April 7, 2022, from https://chip.web.ischool.illinois.edu/people/projects/timeline/1960won.htmlGoogle Scholar
Wong, J. C., Lewis, P., & Davies, H. (2018). How Academic at Centre of Facebook Scandal Tried – and Failed – to Spin Personal Data Into Gold. The Guardian, April 24. www.theguardian.com/news/2018/apr/24/aleksandr-kogan-cambridge-analytica-facebook-data-business-venturesGoogle Scholar
World Health Organization. (n.d.). International Statistical Classification of Diseases and Related Health Problems (ICD). ICD-11. Retrieved December 20, 2021, from www.who.int/standards/classifications/classification-of-diseasesGoogle Scholar
World Traveling Salesman Problem. (n.d.). TSP: The Traveling Salesman Problem. Retrieved December 27, 2021, from www.math.uwaterloo.ca/tsp/world/Google Scholar
wwPDB consortium. (2019). Protein Data Bank: The Single Global Archive for 3D Macromolecular Structure Data. Nucleic Acids Research, 47(D1), D520D528. https://doi.org/10.1093/nar/gky949Google Scholar
Wymant, C., Ferretti, L., Tsallis, D., et al. (2021). The Epidemiological Impact of the NHS COVID-19 App. Nature, 594(7863), 408412. https://doi.org/10.1038/s41586-021-03606-zGoogle Scholar
Xu, S., Huang, R., Sy, L. S., et al. (2021). COVID-19 Vaccination and Non-COVID-19 Mortality Risk – Seven Integrated Health Care Organizations, United States, December 14, 2020–July 31, 2021. Morbidity and Mortality Weekly Report (MMWR), 70(43), 15201524. https://doi.org/10.15585/mmwr.mm7043e2Google Scholar
Yau, N. (n.d.). FlowingData Data Visualization and Statistics. FlowingData. Retrieved December 10, 2021, from www.flowingdata.com/Google Scholar
Young, M. D. (1958). The Rise of the Meritocracy, 1870–2033: An Essay on Education and Equality. Thames and Hudson. https://books.google.com/books?id=TdMVAAAAIAAJGoogle Scholar
Zaugg, I. A., Culligan, P. J., Witten, R., & Zheng, T. (2021). Collaboratory at Columbia: An Aspen Grove of Data Science Education. Harvard Data Science Review, 3(4). https://doi.org/10.1162/99608f92.53c4a1b4Google Scholar
Zhang, Y. & Zhao, Y. (2015). Astronomy in the Big Data Era. Data Science Journal, 14, 11. https://doi.org/10.5334/dsj-2015-011Google Scholar
Zheng, S., Trott, A., Srinivasa, S., et al. (2020). The AI Economist: Improving Equality and Productivity with AI-Driven Tax Policies. arXiv [econ.GN]. http://arxiv.org/abs/2004.13332Google Scholar
Zuiderveen Borgesius, F., Trilling, D., Möller, J., et al. (2016). Should We Worry About Filter Bubbles? Internet Policy Review, 5(1). https://doi.org/10.14763/2016.1.401Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×