Repository for Publications and Research Data

Search ETH Zurich’s Research Collection for scientific publications and research data or submit your own research output. Read more

News 

Boost your skills in research data management!

The ETH RDM Summer School furnishes early-career scientists with a comprehensive understanding of research data management. Following a practice-oriented approach, you will learn the basics and the most important tools and boost your FAIR Data skills. Read more

Successful negotiations with publishers: new agreements with ACM and APS

Agreements made by the ETH Library open up further possibilities for publishing open access. Read more

Whose data is it, anyway? Research data management today.

Under the motto “whose data is it, anyway?”, the ETH Library and Scientific IT Services will be celebrating their love for data from 10 to 14 February 2025 and jointly providing insight into research data management. Read more

Recently Added 

  1. Analysis insights to support the use of wastewater and environmental surveillance data for infectious diseases and pandemic preparedness 

    O'Reilly K.M.; Wade M.J.; Farkas K.; et al. (2025)
    Epidemics
    Wastewater-based epidemiology is the detection of pathogens from sewage systems and the interpretation of these data to improve public health. Its use has increased in scope since 2020, when it was demonstrated that SARS-CoV-2 RNA could be successfully extracted from the wastewater of affected populations. In this Perspective we provide an overview of recent advances in pathogen detection within wastewater, propose a framework for identifying ...
    Journal Article
  2. Noninvasive estimation of internal spinal alignment in patients with adolescent idiopathic scoliosis using PCdare and back shape asymmetry 

    Kaiser M.; McLaughlin E.; Bertsch M.; et al. (2025)
    Scientific Reports
    Optical 3D surface scanning is used increasingly to assess spinal deformity in patients with adolescent idiopathic scoliosis (AIS), largely because it avoids additional radiation burden. However, such approaches generally underestimate the extent of the abnormality. Improving the accuracy of such estimates requires a deeper understanding of AIS and its effect on back shape. We present a unique platform with publicly available code that ...
    Journal Article
  3. Plaintiffs Exploiting Plaintiffs 

    Rutkowski, Karol; Stremitzer, Alexander (2025)
    Center for Law & Economics Working Paper Series
    We consider a model of a single defendant and N plaintiffs where the total cost of litigation is fixed on the part of the plaintiffs and shared among the members of a suing coalition. By settling and dropping out of the coalition, a plaintiff therefore creates a negative externality on the other plaintiffs. It was shown in Che and Spier (2008) that failure to internalize this externality can often be exploited by the defendant. However, ...
    Working Paper
  4. Inhibition of PRC2 enables self-renewal of blastoid-competent naive pluripotent stem cells from chimpanzee 

    Huang T.; Radley A.; Yanagida A.; et al. (2025)
    Cell Stem Cell
    Naive pluripotent stem cells (PSCs) are counterparts of early epiblast in the mammalian embryo. Mouse and human naive PSCs differ in self-renewal requirements and extraembryonic lineage potency. Here, we investigated the generation of chimpanzee naive PSCs. Colonies generated by resetting or reprogramming failed to propagate. We discovered that self-renewal is enabled by inhibition of Polycomb repressive complex 2 (PRC2). Expanded cells ...
    Journal Article
  5. Cybersecurity and human rights 

    Dunn Cavelty M.; Kavanagh C. (2025)
    Research Handbook on Human Rights and Digital Technology: Global Politics, Law and International Relations, Second Edition
    This chapter bridges the gap between cybersecurity politics and human rights literature by discussing the threat to the right to privacy, freedom of expression and the free flow of information posed by state and non-state actors’ actions as well as detailing the various efforts by supranational organizations and advocacy groups to strengthen human rights protection in the digital realm. Based on the work of some of these advocacy groups, ...
    Book Chapter

View more