{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T07:27:46Z","timestamp":1766647666060,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030712914"},{"type":"electronic","value":"9783030712921"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-71292-1_3","type":"book-chapter","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:16:30Z","timestamp":1616112990000},"page":"24-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Something New Versus Tried and True: Ensuring \u2018Innovative\u2019 AI is \u2018Good\u2019 AI"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6526-8030","authenticated-orcid":false,"given":"Stephen C.","family":"Slota","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0323-3526","authenticated-orcid":false,"given":"Kenneth R.","family":"Fleischmann","sequence":"additional","affiliation":[]},{"given":"Sherri","family":"Greenberg","sequence":"additional","affiliation":[]},{"given":"Nitin","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Brenna","family":"Cummings","sequence":"additional","affiliation":[]},{"given":"Lan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Shenefiel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,19]]},"reference":[{"issue":"5","key":"3_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MC.2018.2381135","volume":"51","author":"H Berghel","year":"2018","unstructured":"Berghel, H.: Malice domestic: the Cambridge analytica dystopia. Computer 51(5), 84\u201389 (2018). https:\/\/doi.org\/10.1109\/MC.2018.2381135","journal-title":"Computer"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"B\u00fcrcher, S., Habersetzer, A.: Entrepreneurship in peripheral regions: a relational perspective. In: Mack, E.A., Qian, H. (eds.) Geographies of Entrepreneurship, pp. 161\u2013182. Routledge, Taylor & Francis Group, London (2016)","DOI":"10.4324\/9781315686653-19"},{"key":"3_CR3","first-page":"222","volume-title":"Qualitative Psychology: A Practical Guide to Research Methods","author":"V Clarke","year":"2015","unstructured":"Clarke, V., Braun, V., Hayfield, N.: Thematic analysis. In: Smith, J.A. (ed.) Qualitative Psychology: A Practical Guide to Research Methods, pp. 222\u2013248. Sage Publishing, Los Angeles (2015)"},{"volume-title":"Black Mirror and Critical Media Theory","year":"2018","key":"3_CR4","unstructured":"Cirucci, A.M., Vacker, B. (eds.): Black Mirror and Critical Media Theory. Lexington Books, Lanham (2018)"},{"issue":"3","key":"3_CR5","doi-asserted-by":"publisher","first-page":"147","DOI":"10.5367\/oa.2014.0174","volume":"43","author":"M Crivits","year":"2014","unstructured":"Crivits, M., de Krom, M.P., Dessein, J., Block, T.: Why innovation is not always good: innovation discourses and political accountability. Outlook Agric. 43(3), 147\u2013155 (2014). https:\/\/doi.org\/10.5367\/oa.2014.0174","journal-title":"Outlook Agric."},{"issue":"4","key":"3_CR6","doi-asserted-by":"publisher","first-page":"345","DOI":"10.2307\/3594105","volume":"77","author":"P Dicken","year":"2001","unstructured":"Dicken, P., Malmberg, A.: Firms in territories: a relational perspective. Econ. Geogr. 77(4), 345\u2013363 (2001). https:\/\/doi.org\/10.2307\/3594105","journal-title":"Econ. Geogr."},{"issue":"1","key":"3_CR7","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/03637751.2017.1375130","volume":"85","author":"MC Elish","year":"2018","unstructured":"Elish, M.C., Boyd, D.: Situating methods in the magic of big data and AI. Commun. Monogr. 85(1), 57\u201380 (2018). https:\/\/doi.org\/10.1080\/03637751.2017.1375130","journal-title":"Commun. Monogr."},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"671","DOI":"10.4337\/9781782548522.00054","volume-title":"The Elgar Companion to Innovation and Knowledge Creation","author":"JR Faulconbridge","year":"2017","unstructured":"Faulconbridge, J.R.: Relational geographies of knowledge and innovation. In: Bathelt, H., Cohendet, P., Henn, S., Simon, L. (eds.) The Elgar Companion to Innovation and Knowledge Creation, pp. 671\u2013684. Edward Elgar Publishing, Northampton (2017)"},{"key":"3_CR9","unstructured":"Flanagan, J.C.: The critical incident technique. Psychol. Bull. 51(4), 327\u2013358 (1954). https:\/\/psycnet.apa.org\/doi\/10.1037\/h0061470"},{"key":"3_CR10","unstructured":"Fleischmann, K.R., Wallace, W.A.: Value conflicts in computational modeling. Computer 43(7), 57\u201363 (2010). https:\/\/doi.ieeecomputersociety.org\/10.1109\/MC.2010.120"},{"issue":"4","key":"3_CR11","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1007\/s11023-018-9482-5","volume":"28","author":"L Floridi","year":"2018","unstructured":"Floridi, L., et al.: AI4People\u2014an ethical framework for a good AI society: opportunities, risks, principles, and recommendations. Mind. Mach. 28(4), 689\u2013707 (2018). https:\/\/doi.org\/10.1007\/s11023-018-9482-5","journal-title":"Mind. Mach."},{"issue":"6","key":"3_CR12","doi-asserted-by":"publisher","first-page":"703","DOI":"10.2501\/IJMR-2017-050","volume":"59","author":"M Goddard","year":"2017","unstructured":"Goddard, M.: The EU general data protection regulation (GDPR): european regulation that has a global impact. Int. J. Market Res. 59(6), 703\u2013705 (2017). https:\/\/doi.org\/10.2501\/IJMR-2017-050","journal-title":"Int. J. Market Res."},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Godin, B.: The linear model of innovation: the historical construction of an analytical framework. Sci. Technol. Hum. Values 31(6), 639\u2013667 (2006). https:\/\/doi.org\/10.1177\/0162243906291865","DOI":"10.1177\/0162243906291865"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Jackson, S.J., Gillespie, T., Payette, S.: The policy knot: re-integrating policy, practice and design in CSCW studies of social computing. In: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, pp. 588\u2013602 (2014). https:\/\/doi.org\/10.1145\/2531602.2531674","DOI":"10.1145\/2531602.2531674"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Karppi, T., Nieborg, D.B.: Facebook confessions: corporate abdication and Silicon Valley dystopianism. New Media & Society (in press). https:\/\/doi.org\/10.1177\/1461444820933549","DOI":"10.1177\/1461444820933549"},{"issue":"2","key":"3_CR16","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1080\/13892240902909064","volume":"15","author":"K Knickel","year":"2009","unstructured":"Knickel, K., Brunori, G., Rand, S., Proost, J.: Towards a better conceptual framework for innovation processes in agriculture and rural development: from linear models to systemic approaches. J. Agric. Educ. Extension 15(2), 131\u2013146 (2009). https:\/\/doi.org\/10.1080\/13892240902909064","journal-title":"J. Agric. Educ. Extension"},{"key":"3_CR17","unstructured":"Latour, B.: The Pasteurization of France (Alan Sheridan and John Law, trans.). Harvard University Press, Cambridge (1988)"},{"key":"3_CR18","first-page":"225","volume-title":"Shaping Technology\/Building Society","author":"B Latour","year":"1992","unstructured":"Latour, B.: Where are the missing masses? The sociology of a few mundane artifacts. In: Bijker, W., Law, J. (eds.) Shaping Technology\/Building Society, pp. 225\u2013258. MIT Press, Cambridge (1992)"},{"issue":"6","key":"3_CR19","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1007\/s10796-019-09974-2","volume":"21","author":"N Martin","year":"2019","unstructured":"Martin, N., Matt, C., Niebel, C., Blind, K.: How data protection regulation affects startup innovation. Inf. Syst. Front. 21(6), 1307\u20131324 (2019). https:\/\/doi.org\/10.1007\/s10796-019-09974-2","journal-title":"Inf. Syst. Front."},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Minssen, T., Rajam, N., Bogers, M.: Clinical trial data transparency and GDPR compliance: implications for data sharing and open innovation. Sci. Public Policy scaa014 (in press). https:\/\/doi.org\/10.2139\/ssrn.3413035","DOI":"10.2139\/ssrn.3413035"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1038\/s42256-019-0114-4","volume":"1","author":"B Mittelstadt","year":"2019","unstructured":"Mittelstadt, B.: Principles alone cannot guarantee ethical AI. Nat. Mach. Intell. 1, 501\u2013507 (2019). https:\/\/doi.org\/10.1038\/s42256-019-0114-4","journal-title":"Nat. Mach. Intell."},{"key":"3_CR22","volume-title":"Averting Catastrophe: Strategies for Regulating Risky Technology","author":"JG Monroe","year":"1988","unstructured":"Monroe, J.G., Woodhouse, E.J.: Averting Catastrophe: Strategies for Regulating Risky Technology. University of California Press, Berkeley (1988)"},{"key":"3_CR23","volume-title":"The Digital Sublime: Myth, Power, and Cyberspace","author":"V Mosco","year":"2005","unstructured":"Mosco, V.: The Digital Sublime: Myth, Power, and Cyberspace. MIT Press, Cambridge (2005)"},{"issue":"2","key":"3_CR24","doi-asserted-by":"crossref","first-page":"145","DOI":"10.69554\/CQSF7736","volume":"11","author":"L Munier","year":"2019","unstructured":"Munier, L., Kemball-Cook, A.: Blockchain and the general data protection regulation: reconciling protection and innovation. J. Securities Oper. Custody 11(2), 145\u2013157 (2019)","journal-title":"J. Securities Oper. Custody"},{"key":"3_CR25","doi-asserted-by":"publisher","unstructured":"Nahuis, R., Van Lente, H.: Where are the politics? Perspectives on democracy and technology. Sci. Technol. Hum. Values 33(5), 559\u2013581 (2008). https:\/\/doi.org\/10.1177\/0162243907306700","DOI":"10.1177\/0162243907306700"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Nissenbaum, H.: How computer systems embody values. Computer 34(3), 120-119 (2001). https:\/\/doi.org\/10.1109\/2.910905","DOI":"10.1109\/2.910905"},{"key":"3_CR27","unstructured":"Noble, D.F.: America by design: science, technology, and the rise of corporate capitalism, No. 588, Oxford University Press USA, New York (1979)"},{"key":"3_CR28","volume-title":"American Technological Sublime","author":"DE Nye","year":"1996","unstructured":"Nye, D.E.: American Technological Sublime. MIT Press, Cambridge (1996)"},{"issue":"11","key":"3_CR29","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/S0166-4972(99)00062-0","volume":"19","author":"J Phillimore","year":"1999","unstructured":"Phillimore, J.: Beyond the linear view of innovation in science park evaluation: an analysis of Western Australian Technology Park. Technovation 19(11), 673\u2013680 (1999). https:\/\/doi.org\/10.1016\/S0166-4972(99)00062-0","journal-title":"Technovation"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Shilton, K.: Values levers: building ethics into design. Sci. Technol. Hum. Values 38(3), 374\u2013397 (2013). https:\/\/doi.org\/10.1177\/0162243912436985","DOI":"10.1177\/0162243912436985"},{"key":"3_CR31","doi-asserted-by":"publisher","unstructured":"Slota, S.C., et al.: Good systems, bad data? Interpretations of AI hype and failures. In: Proceedings of the 83rd Annual Meeting of the Association for Information Science and Technology, vol. 57, no. e275, pp. 1\u201311 (2020). https:\/\/doi.org\/10.1002\/pra2.275","DOI":"10.1002\/pra2.275"},{"key":"3_CR32","unstructured":"Tufekci, Z.: How social media took us from Tahrir Square to Donald Trump. MIT Technology Review, 14 August 2018. https:\/\/www.technologyreview.com\/2018\/08\/14\/240325\/how-social-media-took-us-from-tahrir-square-to-donald-trump\/. Accessed 25 Sept 2020"},{"key":"3_CR33","unstructured":"Winner, L.: Do artifacts have politics? Daedalus 109(1), 121\u2013136 (1980). https:\/\/www.jstor.org\/stable\/20024652"},{"key":"3_CR34","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226902098.001.0001","volume-title":"The Whale and the Reactor: A Search for Limits in an Age of High Technology","author":"L Winner","year":"1988","unstructured":"Winner, L.: The Whale and the Reactor: A Search for Limits in an Age of High Technology. University of Chicago Press, Chicago (1988)"},{"key":"3_CR35","doi-asserted-by":"publisher","unstructured":"Winner, L.: Upon opening the black box and finding it empty: social constructivism and the philosophy of technology. Sci. Technol. Hum. Values 18(3), 362\u2013378 (1993). https:\/\/doi.org\/10.1177\/016224399301800306","DOI":"10.1177\/016224399301800306"}],"container-title":["Lecture Notes in Computer Science","Diversity, Divergence, Dialogue"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-71292-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T09:18:20Z","timestamp":1724663900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-71292-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030712914","9783030712921"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-71292-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"19 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iConference","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconference2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ischools.org\/iConference","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfTool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"225","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}