{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T09:26:43Z","timestamp":1772616403638,"version":"3.50.1"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030578107","type":"print"},{"value":"9783030578114","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T00:00:00Z","timestamp":1597881600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T00:00:00Z","timestamp":1597881600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57811-4_11","type":"book-chapter","created":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T06:03:43Z","timestamp":1597817023000},"page":"105-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Requirements for Trustworthy Artificial Intelligence \u2013 A Review"],"prefix":"10.1007","author":[{"given":"Davinder","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Suleyman","family":"Uslu","sequence":"additional","affiliation":[]},{"given":"Arjan","family":"Durresi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,20]]},"reference":[{"key":"11_CR1","unstructured":"International Data Corporation IDC. Worldwide Spending on Artificial Intelligence Systems Will Be Nearly $98 Billion in 2023, According to New IDC Spending Guide (2019). \nhttps:\/\/www.idc.com\/getdoc.jsp?containerId=prUS45481219"},{"key":"11_CR2","unstructured":"Angwin, J., et al.: Machine bias. ProPublica (2016). \nhttps:\/\/www.propublica.org\/article\/machine-bias-risk-assessments-in-criminal-sentencing"},{"key":"11_CR3","unstructured":"Dastin, J.: Amazon Scraps Secret AI Recruiting Tool that Showed Bias Against Women. Reuters, San Fransico (2018). Accessed 9 Oct 2018"},{"key":"11_CR4","unstructured":"Thomas, M.: Six Dangerous Risks of Artificial Intelligence. Builtin. 14 January 2019"},{"key":"11_CR5","unstructured":"Levin, S., Carrie, J.: Wong \u201cSelf-driving Uber kills Arizona woman in first fatal crash involving pedestrian\u201d TheGuardian, 19 March 2018"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Schlesinger, A., O\u2019Hara, K.P., Taylor, A.S.: Let\u2019s talk about race: identity, chatbots, and AI. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (2018)","DOI":"10.1145\/3173574.3173889"},{"issue":"1","key":"11_CR7","first-page":"127","volume":"72","author":"F Rossi","year":"2018","unstructured":"Rossi, F.: Building trust in artificial intelligence. J. Int. Aff. 72(1), 127\u2013134 (2018)","journal-title":"J. Int. Aff."},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1609\/aimag.v38i3.2741","volume":"38","author":"B Goodman","year":"2017","unstructured":"Goodman, B., Flaxman, S.: European Union regulations on algorithmic decision-making and a \u201cright to explanation\u201d. AI Mag. 38(3), 50\u201357 (2017)","journal-title":"AI Mag."},{"key":"11_CR9","unstructured":"Joshi, N.: How we can build Trustworthy AI. Forbes, 30 July 2019"},{"issue":"9","key":"11_CR10","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1038\/s42256-019-0088-2","volume":"1","author":"A Jobin","year":"2019","unstructured":"Jobin, A., Ienca, M., Vayena, E.: The global landscape of AI ethics guidelines. Nat. Mach. Intell. 1(9), 389\u2013399 (2019)","journal-title":"Nat. Mach. Intell."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Smuha, N.A.: The EU approach to ethics guidelines for trustworthy artificial intelligence. In: CRi-Computer Law Review International (2019)","DOI":"10.9785\/cri-2019-200402"},{"key":"11_CR12","volume-title":"Human + Machine: Reimagining Work in the Age of AI","author":"PR Daugherty","year":"2018","unstructured":"Daugherty, P.R., James Wilson, H.: Human + Machine: Reimagining Work in the Age of AI. Harvard Business Review Press, Boston (2018)"},{"key":"11_CR13","unstructured":"European Commission. White paper on artificial intelligence\u2013a European approach to excellence and trust (2020)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Veeramachaneni, K., et al.: AI^ 2: training a big data machine to defend. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC) (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"issue":"2","key":"11_CR15","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/3015771","volume":"17","author":"Y Ruan","year":"2017","unstructured":"Ruan, Y., Zhang, P., Alfantoukh, L., Durresi, A.: Measurement theory-based trust management framework for online social communities. ACM Trans. Internet Technol. 17(2), 24 (2017). Article 16","journal-title":"ACM Trans. Internet Technol."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Uslu, S., et al.: Control theoretical modeling of trust-based decision making in food-energy-water management. In: Conference on Complex, Intelligent, and Software Intensive Systems. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-50454-0_10"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Uslu, S., et al.: Trust-based decision making for food-energy-water actors. In: International Conference on Advanced Information Networking and Applications. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-44041-1_53"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Uslu, S., et al.: Trust-based game-theoretical decision making for food-energy-water management. In: International Conference on Broadband and Wireless Computing, Communication and Applications. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-33506-9_12"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Kaur, D., Uslu, S., Durresi, A.: Trust-based security mechanism for detecting clusters of fake users in social networks. In: Workshops of the International Conference on Advanced Information Networking and Applications. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-15035-8_62"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Kaur, D., et al.: Trust-based human-machine collaboration mechanism for predicting crimes. In: International Conference on Advanced Information Networking and Applications. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-44041-1_54"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Xu, W., Evans, D., Qi, Y.: Feature squeezing: detecting adversarial examples in deep neural networks. In: Proceedings 2018 Network and Distributed System Security Symposium (2018): n. pag. Crossref. Web","DOI":"10.14722\/ndss.2018.23198"},{"key":"11_CR22","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint \narXiv:1412.6572\n\n (2014)"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Raji, I.D., et al.: Closing the AI accountability gap: defining an end-to-end framework for internal algorithmic auditing. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency (2020)","DOI":"10.1145\/3351095.3372873"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Katell, M., et al.: Toward situated interventions for algorithmic equity: lessons from the field. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency (2020)","DOI":"10.1145\/3351095.3372874"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Wieringa, M.: What to account for when accounting for algorithms: a systematic literature review on algorithmic accountability. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency (2020)","DOI":"10.1145\/3351095.3372833"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Mehri, V.A., Ilie, D., Tutschku, K.: Privacy and DRM requirements for collaborative development of AI applications. In: Proceedings of the 13th International Conference on Availability, Reliability and Security (2018)","DOI":"10.1145\/3230833.3233268"},{"key":"11_CR27","unstructured":"He, Y., et al.: Towards privacy and security of deep learning systems: a survey. arXiv preprint \narXiv:1911.12562\n\n (2019)"},{"key":"11_CR28","unstructured":"Hintze, M.: Science and Privacy: Data Protection Laws and Their Impact on Research, vol. 14, p. 103. Wash. JL Tech. & Arts (2018)"},{"key":"11_CR29","doi-asserted-by":"publisher","unstructured":"Cao, Y., Yang, J.: Towards making systems forget with machine unlearning. In: 2015 IEEE Symposium on Security and Privacy, San Jose, CA, 2015, pp. 463\u2013480 (2015). \nhttps:\/\/doi.org\/10.1109\/sp.2015.35","DOI":"10.1109\/sp.2015.35"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Ragot, M., Martin, N., Cojean, S.: AI-generated vs. human artworks. a perception bias towards artificial intelligence? In: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (2020)","DOI":"10.1145\/3334480.3382892"},{"key":"11_CR31","unstructured":"Brown, A.: Biased Algorithms Learn From Biased Data: 3 Kinds of Biases Found in AI datasets. Forbes, 7 February 2020 (2020)"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Stock, P., Cisse, M.: Convnets and imagenet beyond accuracy: understanding mistakes and uncovering biases. In: Proceedings of the European Conference on Computer Vision (ECCV) (2018)","DOI":"10.1007\/978-3-030-01231-1_31"},{"key":"11_CR33","unstructured":"Mehrabi, N., et al.: A survey on bias and fairness in machine learning. arXiv preprint \narXiv:1908.09635\n\n (2019)"},{"key":"11_CR34","unstructured":"Agarwal, A., et al.: Automated test generation to detect individual discrimination in AI models. arXiv preprint \narXiv:1809.03260\n\n (2018)"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Srivastava, B., Rossi, F.: Towards composable bias rating of AI services. In: Proceedings of the 2018 AAAI\/ACM Conference on AI, Ethics, and Society (2018)","DOI":"10.1145\/3278721.3278744"},{"key":"11_CR36","unstructured":"Celis, L.E., et al.: How to be fair and diverse? arXiv preprint \narXiv:1610.07183\n\n (2016)"},{"key":"11_CR37","unstructured":"Sablayrolles, A., et al.: Radioactive data: tracing through training. arXiv preprint \narXiv:2002.00937\n\n (2020)"},{"issue":"4","key":"11_CR38","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s13347-017-0279-x","volume":"31","author":"B Lepri","year":"2018","unstructured":"Lepri, B., et al.: Fair, transparent, and accountable algorithmic decision-making processes. Philos. Technol. 31(4), 611\u2013627 (2018)","journal-title":"Philos. Technol."},{"issue":"4\/5","key":"11_CR39","doi-asserted-by":"publisher","first-page":"4:1","DOI":"10.1147\/JRD.2019.2942287","volume":"63","author":"RKE Bellamy","year":"2019","unstructured":"Bellamy, R.K.E., et al.: AI Fairness 360: an extensible toolkit for detecting and mitigating algorithmic bias. IBM J. Res. Dev. 63(4\/5), 4:1\u20134:15 (2019)","journal-title":"IBM J. Res. Dev."},{"key":"11_CR40","unstructured":"Mueller, S.T., et al.: Explanation in human-AI systems: a literature meta-review, synopsis of key ideas and publications, and bibliography for explainable AI. arXiv preprint \narXiv:1902.01876\n\n (2019)"},{"key":"11_CR41","doi-asserted-by":"crossref","unstructured":"Wang, D., et al.: Designing theory-driven user-centric explainable AI. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (2019)","DOI":"10.1145\/3290605.3300831"},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Why should I trust you? explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"11_CR43","doi-asserted-by":"crossref","unstructured":"Zeiler, M.D., Fergus, R.: Visualizing and understanding convolutional networks. In: European Conference on Computer Vision. Springer, Cham (2014)","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"11_CR44","doi-asserted-by":"crossref","unstructured":"Mothilal, R.K., Sharma, A., Tan, C.: Explaining machine learning classifiers through diverse counterfactual explanations. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency (2020)","DOI":"10.1145\/3351095.3372850"},{"issue":"1","key":"11_CR45","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1631\/FITEE.1700808","volume":"19","author":"Q-s Zhang","year":"2018","unstructured":"Zhang, Q.-s., Zhu, S.-C.: Visual interpretability for deep learning: a survey. Front. Inf. Technol. Electron. Eng. 19(1), 27\u201339 (2018)","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"11_CR46","unstructured":"Kim, B., et al.: Interpretability beyond feature attribution: quantitative testing with concept activation vectors (TCAV). In: International Conference on Machine Learning (2018)"},{"key":"11_CR47","unstructured":"Madumal, P., et al.: Explainable reinforcement learning through a causal lens. arXiv preprint \narXiv:1905.10958\n\n (2019)"},{"key":"11_CR48","doi-asserted-by":"crossref","unstructured":"Mahendran, A., Vedaldi, A.: Understanding deep image representations by inverting them. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2015)","DOI":"10.1109\/CVPR.2015.7299155"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Networked-Based Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57811-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T06:07:24Z","timestamp":1597817244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57811-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,20]]},"ISBN":["9783030578107","9783030578114"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57811-4_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,20]]},"assertion":[{"value":"20 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NBiS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network-Based Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Victoria, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nbis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/nbis\/2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}