Group Privacy: New Challenges of Data Technologies

Total Page:16

File Type:pdf, Size:1020Kb

Group Privacy: New Challenges of Data Technologies Authors’ final draft: Taylor, L., Floridi, L., van der Sloot, B. eds. (2017) Group Privacy: new challenges of data technologies. Dordrecht: Springer. Group Privacy: New Challenges of Data Technologies Editors: Linnet Taylor Tilburg Institute for Law, Technology, and Society (TILT), P.O. Box 90153, 5000 LE Tilburg, The Netherlands [email protected] Luciano Floridi Oxford Internet Institute, University of Oxford, 1 St Giles Oxford, OX1 3JS, United Kingdom [email protected] Bart van der Sloot Tilburg Institute for Law, Technology, and Society (TILT), P.O. Box 90153, 5000 LE Tilburg, The Netherlands [email protected] 1 Authors’ final draft: Taylor, L., Floridi, L., van der Sloot, B. eds. (2017) Group Privacy: new challenges of data technologies. Dordrecht: Springer. Contents Acknowledgements Notes on Contributors 1. Introduction: a new perspective on privacy Linnet Taylor, Luciano Floridi and Bart van der Sloot 2. Group privacy and data ethics in the developing world Linnet Taylor Tilburg Institute for Law, Technology, and Society (TILT), P.O. Box 90153, 5000 LE Tilburg, The Netherlands; email: [email protected]; tel: 0031 616626953 3. Group privacy in the age of Big Data Lanah Kammourieh, Thomas Baar, Jos Berens, Emmanuel Letouzé, Julia Manske, John Palmer, David Sangokoya, Patrick Vinck [email protected]; [email protected] 4. Beyond “Do No Harm” and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data Nathaniel A. Raymond Signal Program on Human Security and Technology, Harvard University, [email protected] 5. Group Privacy: a Defence and an Interpretation Luciano Floridi Oxford Internet Institute, University of Oxford, 1 St Giles Oxford, OX1 3JS, United Kingdom; [email protected] 6. Social Machines as an Approach to Group Privacy Kieron O’Hara and Dave Robertson Corresponding author: Kieron O’Hara Southampton University; [email protected] 2 Authors’ final draft: Taylor, L., Floridi, L., van der Sloot, B. eds. (2017) Group Privacy: new challenges of data technologies. Dordrecht: Springer. 7. Indiscriminate Bulk Data Interception and Group Privacy: Do Human Rights Organisations Retaliate Through Strategic Litigation? Quirine Eijkman Leiden University, [email protected] 8. From group privacy to collective privacy: towards a new dimension of privacy and data protection in the big data era Alessandro Mantelero Politecnico di Torino, [email protected] 9. The Group, the Private, and the Individual: A New Level of Data Protection? Ugo Pagallo Law School, University of Turin; [email protected] 10. Genetic Classes and Genetic Categories: Protecting Genetic Groups through Data Protection Law Dara Hallinan and Paul de Hert Corresponding author: Dara Hallinan, Vrije Universiteit Brussel; [email protected] 11. Do groups have a right to protect their group interest in privacy and should they? Peeling the onion of rights and interests protected under Article 8 ECHR Bart van der Sloot, Tilburg Institute for Law, Technology, and Society (TILT), P.O. Box 90153, 5000 LE Tilburg, The Netherlands; email: [email protected] 12. Conclusion: what do we know about group privacy? Linnet Taylor, Luciano Floridi and Bart van der Sloot 3 Authors’ final draft: Taylor, L., Floridi, L., van der Sloot, B. eds. (2017) Group Privacy: new challenges of data technologies. Dordrecht: Springer. Acknowledgements This book had its genesis in a serendipitous conversation between Linnet Taylor and Luciano Floridi at the Oxford Internet Institute in early 2014. Subsequently Mireille Hildebrandt became part of this discussion, and in September 2014, in cooperation with Bart van der Sloot, we organised a workshop on the topic of group privacy at the University of Amsterdam which generated several of the chapters that follow. We thank Isa Baud, Karin Pfeffer and the Governance and International Development group at the University of Amsterdam for supporting that workshop, and also to attendees including Mireille Hildebrandt, Beate Roessler, Nico van Eijk, Julia Hoffman and Nishant Shah, who contributed important ideas and insights to the discussion. For further illuminating conversations, insights and opportunities we also thank Julie Cohen, Nicolas de Cordes, Rohan Samarajiva and Gus Hosein. 4 Authors’ final draft: Taylor, L., Floridi, L., van der Sloot, B. eds. (2017) Group Privacy: new challenges of data technologies. Dordrecht: Springer. Notes on contributors Thomas Barr works within HumanityX (Centre for Innovation, Leiden University), Thomas supports organisations working in the peace, justice and humanitarian sector to spearhead innovations in order to increase their impact on society. As part of an interdisciplinary team, he helps partners to turn ideas into working prototypes over short periods of time. With a background in conflict studies and responsible innovation, he focuses in his work and research on both the opportunities and (data responsibility) challenges offered by data-driven innovations for peace and justice. Jos Berens is educated in law and philosophy, and has held prior positions at the Dutch Foreign Ministry and the World Economic Forum. He currently heads the Secretariat of the International Data Responsibility Group, a collaboration between the Data & Society Research Institute, Data-Pop Alliance, the GovLab at NYU, Leiden University and UN Global Pulse. Together, these partners advance the agenda of responsible us of digital data for vulnerable and crisis affected populations. Jos is project officer at Leiden University’s Centre for Innovation, where he focuses on the risks, and the ethical and legal aspects of projects in the HumanityX program. Paul De Hert is full-time professor at the Vrije Universiteit Brussel (VUB), associated professor at Tilburg University and Director of the Fundamental Rights and Constitutionalism Research Group (FRC) at VUB. After having written extensively on defence rights and the right to privacy, De Hert now writes on a broader range of topics including elderly rights, patient rights and global criminal law. Quirine Eijkman (Phd.) is a Senior-Researcher/Lecturer at the Centre for Terrorism and Counterterrorism of the Faculty Campus The Hague, Leiden University and the head of the Political Affairs & Press Office of Amnesty International Dutch section. This paper is written in her personal capacity. Her research focuses on the (side) effects of security governance for human rights, transitional justice and the sociology of law. She teaches (master)courses on Security and the Rule of Law and International Crisis and Security Management. Luciano Floridi is Professor of Philosophy and Ethics of Information at the University of Oxford, where he is the Director of Research of the Oxford Internet Institute. Among his recent books, all published by Oxford University Press: The Fourth Revolution - How the infosphere is reshaping human reality (2014), The Ethics of Information (2013), The Philosophy of Information (2011). He is a member of the EU's Ethics Advisory Group on Ethical Dimensions of Data Protection, of Google Advisory Board on “the right to be forgotten”, and Chairman of the Ethics Advisory Board of the European Medical Information Framework. Dara Hallinan studied law in the UK and in Germany and completed a Master’s in Human Rights and Democracy in Italy and Estonia. Since May 2011, he has been a researcher at Fraunhofer ISI and 5 Authors’ final draft: Taylor, L., Floridi, L., van der Sloot, B. eds. (2017) Group Privacy: new challenges of data technologies. Dordrecht: Springer. since June 2016 at the Leibniz Institute for Information Infrastructure. The focus of his work is the interaction between new technologies - particularly ICT and biotechnologies - and society. He is writing his PhD under the supervision of Paul De Hert at the Vrije Universiteit Brussel on the possibilities presented by data protection law for the better regulation of biobanks and genomic research in Europe. Lanah Kammourieh is a privacy and cybersecurity lawyer and policy professional. She is also a doctoral candidate at Université Panthéon-Assas (Paris 2). Her legal research has spanned topics in public international law, such as the lawfulness of drones as a weapons delivery platform, as well as privacy law, such as the compared protection of email privacy under U.S. and E.U. legislation. She is a graduate of Université Panthéon-Assas, Sciences Po Paris, Columbia University, and Yale Law School. Emmanuel Letouzé is the Director and co-Founder of Data-Pop Alliance. He is a Visiting Scholar at MIT Media Lab, a Fellow at HHI, a Senior Research Associate at ODI, a Non-Resident Adviser at the International Peace Institute, and a PhD candidate (ABD) in Demography at UC Berkeley. His interests are in Big Data and development, conflict and fragile states, poverty, migration, official statistics and fiscal policy. He is the author of the UN Global Pulse's White Paper, “Big Data for Development: Challenges and Opportunities", where he worked as Senior Development Economist in 2011-12, and the lead author of the report "Big Data for Conflict Prevention" and of the 2013 and 2014 OECD Fragile States reports. In 2006-09 he worked for UNDP in New York, including on the Human Development Report research team. In 2000-04 he worked in Hanoi, Vietnam, for the French Ministry of Finance as a technical assistant on public finance and official statistics. He is a graduate of Sciences Po Paris (BA, Political Science, 1999, MA, Economic Demography, 2000) and Columbia University (MA, 2006), where he was a Fulbright fellow. Julia Manske co-leads the project ”Open Data & Privacy“ at Stiftung Neue Verantwortung (SNV), a Berlin-based think tank. In this responsibility she works on the development of privacy frameworks for sharing and using data, for instance in smart city contexts. Furthermore, Julia has expertise in digital policies and digital rights in the context of global development. She is a member of Think Tank 30, an offshoot of the Club of Rome, a Research Affiliate with Data-Pop Alliance in New York and is a Global Policy Fellow of ITS in Rio de Janeiro.
Recommended publications
  • Recaptcha: Human-Based Character Recognition Via Web Security
    REPORTS on September 12, 2008 and blogs. For example, CAPTCHAs prevent www.sciencemag.org reCAPTCHA: Human-Based Character ticket scalpers from using computer programs to buy large numbers of concert tickets, only to re Recognition via Web Security Measures sell them at an inflated price. Sites such as Gmail and Yahoo Mail use CAPTCHAs to stop spam Luis von Ahn,* Benjamin Maurer, Colin McMillen, David Abraham, Manuel Blum mers from obtaining millions of free e mail accounts, which they would use to send spam CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are e mail. Downloaded from widespread security measures on the World Wide Web that prevent automated programs from According to our estimates, humans around abusing online services. They do so by asking humans to perform a task that computers cannot yet the world type more than 100 million CAPTCHAs perform, such as deciphering distorted characters. Our research explored whether such human every day (see supporting online text), in each case effort can be channeled into a useful purpose: helping to digitize old printed material by asking spending a few seconds typing the distorted char users to decipher scanned words from books that computerized optical character recognition failed acters. In aggregate, this amounts to hundreds of to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, thousands of human hours per day. We report on matching the guarantee of professional human transcribers. Our apparatus is deployed in more an experiment that attempts to make positive use than 40,000 Web sites and has transcribed over 440 million words.
    [Show full text]
  • Engaging All Readers Through Explorations of Literacy, Language, and Culture
    Engaging All Readers Through Explorations of Literacy, Language, and Culture The Fortieth Yearbook: A Double Peer-Reviewed Publication of the Association of Literacy Educators and Researchers Co-Editors Juan J. Araujo Alexandra Babino Texas A&M University-Commerce Texas A&M University-Commerce Nedra Cossa Robin D. Johnson Georgia Southern University Texas A&M University-Corpus Christi Copyright 2018 Association of Literacy Educators and Researchers Photocopy/reprint Permission Statement: Permission is hereby granted to profes- sors and teachers to reprint or photocopy any article in the Yearbook for use in their classes, provided each copy of the article made shows the author and year- book information sited in APA style. Such copies may not be sold, and further distribution is expressly prohibited. Except as authorized above, prior written permission must be obtained from the Association of Literacy Educators and Researchers to reproduce or transmit this work or portions thereof in any other form or by another electronic or mechanical means, including any informa- tion storage or retrieval system, unless expressly permitted by federal copyright laws. Address inquiries to the Association of Literacy Educators and Researchers (ALER) April Blakely. ISBN: 978-1-883604-04-2 ALER Board of Directors 2017-18 Executive Officers President: David Paige, Bellarmine University President-Elect: Tami Craft Al-Hazza, Old Dominion University Vice President: Past President: Julie Kidd, George Mason University Past-Past President: J. Helen Perkins, University
    [Show full text]
  • Study Guid E
    Year: 5 Subject: RE Unit of Study: Sikhism Linked Literature: We are Sikhs/My Sikh Faith or Ada Twist, Scientist by Andrea Beaty Special people in the Sikh Who are Sikhs? Special books in Sikhism Sikh places of worship Sikh family life Sikh celebrations faith Vocabulary I need to know: I need to do: Prior knowledge: Sikhism is a monotheistic religion because they believe in only one God Describe the key teachings and beliefs of Different religions have different be- Sikh Means disciple in Punjabi (Waheguru) who created the world and that different religions are all paths to this a religion, explaining how they shape the liefs and practises lives of individuals and contribute to Disciple Follower of God same God. It is one of the world’s youngest religions, founded about 500 years ago, in 1499, by Guru Nanak in the Punjab, Northern India. It is the fifth largest religion society. Some religious beliefs and practises Waheguru Wonderful lord or God in the world with over 20 million followers. People who follow Sikhism are called Explain practises and lifestyles associated with belonging to a faith. are similar across religions Cycle of many lives - rebirth of a soul in Sikhs. The word Sikh means ‘disciple’ in Punjabi. Sikhs are the disciples of God Reincarnation another body who follow the writings and teachings of the Ten Sikh Gurus. Devotion to God Explain some of the different ways indi- should be shown daily by meditating, praying and following the core beliefs, as well viduals show their beliefs. Religions have different place of wor- Released from the cycle of rebirth impelled by Explain own ideas about ‘tricky’ ques- ship, special (holy) books and tradi- Mukti/moksha the law of karma as behaving in a manner that creates good karma.
    [Show full text]
  • Experiments in Torture: Evidence of Human Subject Research and Experimentation in the “Enhanced” Interrogation Program
    EXPERIMENTS IN TORTURE: Evidence of Human Subject Research and Experimentation in the “Enhanced” Interrogation Program A White Paper by Physicians for Human Rights June 2010 Authors & This report was reviewed and edited by Stephen Greene, Communications Consultant to PHR. It was prepared for Acknowledgements publication by Gurukarm Khalsa, PHR Web Editor/ Producer. Jared Voss, PHR Web Editor/Producer, produced the video associated with the report. The lead author for this report is Nathaniel Raymond, Director of the Campaign Against Torture/Campaign for PHR is deeply indebted to critical research performed Accountability at Physicians for Human Rights (PHR). The by Daniel Scarvalone, Louise Place, and Jesse Hamlin. lead medical author is Scott Allen, MD, Co-Director of the This report could not have been written without their Center for Prisoner Health and Human Rights at Brown contributions. University and Medical Advisor to PHR. They were joined in writing the report by Vincent Iacopino, MD, PhD, PHR Senior Medical Advisor; Allen Keller, MD, Bellevue/NYU Program for Survivors of Torture; Stephen Soldz, PhD, President-elect of Psychologists for Social Responsibility and Director of the Center for Research, Evaluation and Physicians for Program Development at the Boston Graduate School of Psychoanalysis; Steven Reisner, PhD, PHR Advisor on Human Rights Ethics and Psychology; and John Bradshaw, JD, PHR Chief Policy Officer and Director of PHR’s Washington DC Office. PHR was founded in 1986 on the idea that health profes- sionals, with their specialized skills, ethical commitments, This report has benefited from review by Deborah and credible voices, are uniquely positioned to investigate Ascheim, MD, Associate Professor of Health Policy and the health consequences of human rights violations and Medicine, Mount Sinai School of Medicine, and PHR board work to stop them.
    [Show full text]
  • I Am Not a Robot: an Overview on Google's Captcha
    I AM NOT A ROBOT: - AN OVERVIEW ON GOOGLE’S CAPTCHA A Thesis Presented to the Faculty of California State Polytechnic University, Pomona In Partial Fulfillment Of the Requirements for the Degree Master of Science In Computer Science By Uday Prabhala 2016 SIGNATURE PAGE THESIS: I AM NOT A ROBOT: - AN OVERVIEW ON GOOGLE’S CAPTCHA AUTHOR: Uday Prabhala DATE SUBMITTED: Summer 2016 Computer Science Department. Dr. Gilbert Young ___________________________________________ Thesis Committee Chair Computer Science Dr. Fang D. Tang ___________________________________________ Computer Science Dr. Yu Sun ___________________________________________ Computer Science ii ACKNOWLEDGEMENTS I would like to express my deepest gratitude to my family members, Yashoda, Lucky, and Diskey, as well as my girlfriend Siri, who helped make this endeavor possible. Their limitless support, assistance, and encouragement during the times when I was close to giving up were greatly helpful, and I wouldn’t have been able to overcome the obstacles without them. I would also like to send my appreciation and gratitude to the Professors who were part of my thesis committee. Most notably, I would like to thank Professor Gilbert Young, chair of the committee, for his support, patience, guidance, and sharing of knowledge throughout the program. I would also like to thank Professor Tang and Professor Yusun for reviewing my paper and attending my presentation. The above three Professors not only helped me to complete my program, but also served as an excellent example by exercising professionalism, versatility, and commitment to the developing engineering students at California State Polytechnic University, Pomona. iii ABSTRACT I am not a Robot Overview on Google’s Captcha Uday Kiran Prabhala Computers are one of the greatest inventions done by humans; these devices not only made our work easy, but could also be misused in various ways.
    [Show full text]
  • Modern Password Security for System Designers What to Consider When Building a Password-Based Authentication System
    Modern password security for system designers What to consider when building a password-based authentication system By Ian Maddox and Kyle Moschetto, Google Cloud Solutions Architects This whitepaper describes and models modern password guidance and recommendations for the designers and engineers who create secure online applications. A related whitepaper, Password security ​ for users, offers guidance for end users. This whitepaper covers the wide range of options to consider ​ when building a password-based authentication system. It also establishes a set of user-focused recommendations for password policies and storage, including the balance of password strength and usability. The technology world has been trying to improve on the password since the early days of computing. Shared-knowledge authentication is problematic because information can fall into the wrong hands or be forgotten. The problem is magnified by systems that don't support real-world secure use cases and by the frequent decision of users to take shortcuts. According to a 2019 Yubico/Ponemon study, 69 percent of respondents admit to sharing passwords with ​ ​ their colleagues to access accounts. More than half of respondents (51 percent) reuse an average of five passwords across their business and personal accounts. Furthermore, two-factor authentication is not widely used, even though it adds protection beyond a username and password. Of the respondents, 67 percent don’t use any form of two-factor authentication in their personal life, and 55 percent don’t use it at work. Password systems often allow, or even encourage, users to use insecure passwords. Systems that allow only single-factor credentials and that implement ineffective security policies add to the problem.
    [Show full text]
  • Terrorism: Gender and Identity
    IOSR Journal Of Humanities And Social Science (IOSR-JHSS) Volume 20, Issue 11, Ver. IV (Nov. 2015) PP 01-07 e-ISSN: 2279-0837, p-ISSN: 2279-0845. www.iosrjournals.org Terrorism: Gender and Identity Dr. (Mrs.) Manjeet Hundal Head, Sociology Department S.R.C.S.D. College, Pathankot Abstract: Even in the beginning of the twenty first century with the attack at World Trade Center (America), terrorism continues to be one of the major issues, which the world is facing. In the early 1970's Germany experienced the activities of the ultra left-wing groups such as the Red Army Faction (RAF) and the Baader- Meinhof group. Spain has had the experience of Basque terrorists, Italy of the Red Brigades and Britain of the republican extremist groups such as the Irish Republican Army (IRA) in the Northern Ireland. The Tamil terrorist groups agitating for an independent 'Eelam' state in the North-East of Sri Lanka, Sikh extremists used terrorism for an independent 'Khalistan' in Punjab, India. The extremists in Punjab used extortion, bombings and hit squads to achieve their goal of an independent state. In the face of these terrorist attacks, the Indian government responded severely with torture and summary executions. Terrorism that breeds' violence, by its very nature ultimately becomes indiscriminate and unpredictable, which has an uneven impact on women's status. At the height of violence, the Punjabi women faced the terror of the Indian police by day and of the militants by night. This study based on Punjab terrorism(1978-1993) has been divided into three parts.
    [Show full text]
  • Oral History and Our Times
    The Columbia Center for Oral History, The Oral History Master of Arts Program, INCITE | Interdisciplinary Center for Innovative Theory & Empirics, with Funding from the Paul F. Lazarsfeld Lecture Series, Present: ORAL HISTORY AND OUR TIMES PROGRAM May 1 and May 2, 2013 Maison Française, East Gallery Columbia University New York, New York May 2013 3 CO-SPONSORS Oral History Master of Arts (OHMA) is a one-year interdisciplinary Master of Arts degree program in the field of oral history that focuses on interviewing methodologies and interpretative methods. OHMA links social sciences and humanities research across disciplines including: History, Sociology, Literature, Anthropology, Psychology and Public Health. oralhistory.columbia.edu The Columbia University Center for Oral History [CCOH] is one of the world’s leading centers for the practice and teaching of oral history. Our archive, located in the Columbia University Libraries and open to the public, holds more than 8,000 interviews, in audio, video and text formats, on a wide variety of subjects. Our mission is to record unique life histories, documenting the central historical events and memories of our times, and to teach and do research across the disciplines. library.columbia.edu/indiv/ccoh/about.html INCITE | Interdisciplinary Center for Innovative Theory and Empirics cultivates public intelligence concerning socially and culturally vital ideas that can be advanced by research, education and conversation at the interdisciplinary seams that the social sciences share with the humanities, the sciences and one another. incite.columbia.edu The Paul F. Lazarsfeld Lecture Series explores and forges new methodological connections between the disciplines of the humanities and social sciences, while serving as a site for intellectual cooperation between students, faculty, and guests.
    [Show full text]
  • A New Forensics: Developing Standard Remote Sensing Methodologies to Detect and Document Mass Atrocities Nathaniel A
    Genocide Studies and Prevention: An International Journal Volume 8 | 2014 Humanitarian Technologies and Issue 3 | Article 6 Genocide Prevention A New Forensics: Developing Standard Remote Sensing Methodologies to Detect and Document Mass Atrocities Nathaniel A. Raymond Harvard University, [email protected] Brittany L. Card Harvard University, [email protected] Isaac L. Baker Harvard University, [email protected] Abstract. Aim: The aim of this article is to highlight potential methods applicable to a standard forensic approach for the analysis of high-resolution satellite imagery that may contain evidence of alleged mass atrocities. Methods: The primary method employed is the retrospective analysis of a case study involving the use of high-resolution satellite imagery analysis to document alleged mass atrocities. The case study utilized herein is the Satellite Sentinel Project’s reporting on the May 2011 sacking of Abyei Town by Government of Sudan-aligned armed actors. In the brief case study, categories of objects, patterns of activities, and types of alleged mass atrocity events are applied the Abyei Town incident. Recommended Citation Raymond, Nathaniel A.; Card, Brittany L.; and Baker, Isaac L. (2014) "A New Forensics: Developing Standard Remote Sensing Methodologies to Detect and Document Mass Atrocities," Genocide Studies and Prevention: An International Journal: Vol. 8: Iss. 3: 33-48. DOI: http://dx.doi.org/10.5038/1911-9933.8.3.4 Available at: http://scholarcommons.usf.edu/gsp/vol8/iss3/6 This Article is brought to you for free and open access by the Tampa Library at Scholar Commons. It has been accepted for inclusion in Genocide Studies and Prevention: An International Journal by an authorized administrator of Scholar Commons.
    [Show full text]
  • BULLETIN of the Ohio Agricultural Experiment Station
    BULLETIN OF THE Ohio Agricultural Experiment Station NuMBER 280 DECEMBER, 1914 SOME IMPORTANT ANIMAL PARASITES AFFECTING OHIO LIVE STOCK DON C. MOTE INTRODUCTION Parasites that infest farm animals cause enormous losses to the livestock interests of Ohio. The exact, or even approximate, ex~ tent of these losses is not known and probably never will be deter~ mmed. However, sufficient information is at hand to show that the damage done by the more common parasites, external and internal, is of great economic consequence as well as of much scientific in~ terest. While the study of this subj ~t at this Station has only begun, it has already shown that the field is an important one, and it is be~ lieved that Ohio stockmen will be interested in acquainting them­ selves with some facts concerning the more common and im­ portant parasites that infest Ohio livestock. All who know of the existence of parasites in their flocks and herds are requested to send specimens and complete information concerning them to the Experi­ ment Station, to aid in this study. This publication is not issued 3JS an exhaustive treatise, but rather, as an introduction to the subject, callmg attention to some of the parasites that are prevalent in the state and suggesting some measures to be taken in combating them. DESIRABILITY OF A KNOWLEDGE OF DISTRIBUTION The importance of a knowledge of the distribution of an animal parasite throughout the state is not generally appreciated. A re­ view of the history of the hook worm in man, of sheep scab, and of Texas fever in cattle-three of the most widely known diseases due to animal 'Parasites, will indicate how absolutely essenti~ are (23) 24 OHIO EXPERIMENT STATION: BULLETIN 280 the records of distribution.
    [Show full text]
  • Remembering Partition: Violence, Nationalism and History in India
    Remembering Partition: Violence, Nationalism and History in India Gyanendra Pandey CAMBRIDGE UNIVERSITY PRESS Remembering Partition Violence, Nationalism and History in India Through an investigation of the violence that marked the partition of British India in 1947, this book analyses questions of history and mem- ory, the nationalisation of populations and their pasts, and the ways in which violent events are remembered (or forgotten) in order to en- sure the unity of the collective subject – community or nation. Stressing the continuous entanglement of ‘event’ and ‘interpretation’, the author emphasises both the enormity of the violence of 1947 and its shifting meanings and contours. The book provides a sustained critique of the procedures of history-writing and nationalist myth-making on the ques- tion of violence, and examines how local forms of sociality are consti- tuted and reconstituted by the experience and representation of violent events. It concludes with a comment on the different kinds of political community that may still be imagined even in the wake of Partition and events like it. GYANENDRA PANDEY is Professor of Anthropology and History at Johns Hopkins University. He was a founder member of the Subaltern Studies group and is the author of many publications including The Con- struction of Communalism in Colonial North India (1990) and, as editor, Hindus and Others: the Question of Identity in India Today (1993). This page intentionally left blank Contemporary South Asia 7 Editorial board Jan Breman, G.P. Hawthorn, Ayesha Jalal, Patricia Jeffery, Atul Kohli Contemporary South Asia has been established to publish books on the politics, society and culture of South Asia since 1947.
    [Show full text]
  • Critical Questions in Education Conference Academy For
    Critical Questions in Education Conference Presented by the Academy for Educational Studies 2018 Conversation Themes: 1. What book has changed the way you understand human life, teaching, learning, and the task of education? 2. How should we assess (and grade) students—from elementary school to graduate school? 3. What is the best, deepest, and richest kind of professional development we can offer teachers? Benson Hotel Portland, Oregon March 5—7, 2018 The Academy for Educational Studies is an independent, non-profit corporation registered in the state of Missouri. Please see our website for more information about the Academy: https://academyforeducationalstudies.org/ Co-chairs of the conference: Christopher Clark, Michigan State University Steven P. Jones, Missouri State University Cover design: Carsen Miller, MAT student, Missouri State University 1 Critical Questions in Education Conference Monday, March 5th Conference Registration Light breakfast buffet Cambridge / Oxford 7:30—9:30 Greetings and Announcements Cambridge / Oxford 8:00 Steven P. Jones and Christopher Clark Co-chairs of the conference ________________________________________ First Concurrent Session 8:20 – 9:20 1. Building cultural competence Paper/presentation — Windsor Building cultural competence: Helping teachers close the achievement gap Linda E. Denault, Becker College Nadine M. Bonda, American International College Judith L. Klimkiewicz, American International College Building cultural capital may provide a way for educators to support all students in closing the achievement gap among diverse groups of students. This presentation explores that potential impact. The involvement of teachers in global education: Promoting the development of cultural awareness and understanding Melinda R. Pierson, California State University, Fullerton Practical ideas will be presented for how teachers currently enrolled in a teacher induction program or master’s degree can become involved in international contexts around the world to improve understanding of cultural diversity.
    [Show full text]