{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T01:44:44Z","timestamp":1771465484403,"version":"3.50.1"},"publisher-location":"Cham","reference-count":80,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030778569","type":"print"},{"value":"9783030778576","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77857-6_18","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:04:56Z","timestamp":1625267096000},"page":"265-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Designing Ethical Agency for Adaptive Instructional Systems: The FATE of Learning and Assessment"],"prefix":"10.1007","author":[{"given":"Jordan Richard","family":"Schoenherr","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1518\/hfes.46.1.50.30392","volume":"46","author":"JD Lee","year":"2004","unstructured":"Lee, J.D., See, K.A.: Trust in automation: designing for appropriate reliance. Hum. Factors 46, 50\u201380 (2004)","journal-title":"Hum. Factors"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1518\/001872097778543886","volume":"39","author":"R Parasuraman","year":"1997","unstructured":"Parasuraman, R., Riley, V.: Humans and automation: Use, misuse, disuse, abuse. Hum. Factors 39, 230\u2013253 (1997)","journal-title":"Hum. Factors"},{"key":"18_CR3","unstructured":"Parasuraman, R., Mouloua, M., Hilburn, B.: Adaptive aiding and adaptive task allocation enhance human-machine interaction. In: Automation Technology and Human Performance: Current Research and Trend, pp. 119\u2013123 (1999)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Moor, J.H.: What is computer ethics? Metaphilosophy 16, 266\u2013275 (1985)","DOI":"10.1111\/j.1467-9973.1985.tb00173.x"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Gray, C.M., Kou, Y., Battles, B., Hoggatt, J.T.A.L.: The dark (patterns) side of UX design. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314 (2018)","DOI":"10.1145\/3173574.3174108"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Friedman, B., Kahn, P.H., Borning, A.: Value sensitive design and information systems. In: The Handbook of Information and Computer Ethics, pp. 69\u2013101","DOI":"10.1002\/9780470281819.ch4"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Sengers, P., Boehner, K., David, S., Kaye, J.J.: Reflective design. In: Proceedings of the 4th Decennial Conference on Critical Computing: between Sense and Sensibility, pp. 49\u201358 (2005)","DOI":"10.1145\/1094562.1094569"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11948-006-0065-0","volume":"12","author":"ML Cummings","year":"2006","unstructured":"Cummings, M.L.: Integrating ethics in design through the value-sensitive design approach. Sci. Eng. Ethics 12, 701\u2013715 (2006)","journal-title":"Sci. Eng. Ethics"},{"key":"18_CR9","first-page":"5","volume":"11","author":"RA Sottilare","year":"2018","unstructured":"Sottilare, R.A.: A comprehensive review of design goals and emerging solutions for adaptive instructional systems. Technol. Instr. Cogn. Learn. 11, 5\u201338 (2018)","journal-title":"Technol. Instr. Cogn. Learn."},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1037\/0003-066X.50.9.741","volume":"50","author":"S Messick","year":"1995","unstructured":"Messick, S.: Validity of psychological assessment: validation of inferences from persons\u2019 responses and performances as scientific inquiry into score meaning. Am. Psychol. 50, 741\u2013749 (1995)","journal-title":"Am. Psychol."},{"key":"18_CR11","unstructured":"Messick, S.: Validity. In: Linn, R. L. (ed.) Educational Measurement, 3rd edn., pp. 13\u2013103. American Council on Education\/Macmillan Publishing Company, New York"},{"key":"18_CR12","volume-title":"Values in Education and Society","author":"NT Feather","year":"1975","unstructured":"Feather, N.T.: Values in Education and Society. Free Press, New York (1975)"},{"key":"18_CR13","volume-title":"Values in Education and Education in Values","author":"JM Halstead","year":"1996","unstructured":"Halstead, J.M., Taylor, M.J.: Values in Education and Education in Values. Psychology Press, Hove (1996)"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1080\/03057240701325357","volume":"36","author":"JS Dill","year":"2007","unstructured":"Dill, J.S.: Durkheim and Dewey and the challenge of contemporary moral education. J. Moral Educ. 36, 221\u2013237 (2007)","journal-title":"J. Moral Educ."},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1086\/442759","volume":"74","author":"L Kohlberg","year":"1966","unstructured":"Kohlberg, L.: Moral education in the schools: a developmental view. School Rev. 74, 1\u201330 (1966)","journal-title":"School Rev."},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1080\/0305724042000327975","volume":"33","author":"L Maosen","year":"2004","unstructured":"Maosen, L., Taylor, M.J., Shaogang, Y.: Moral education in Chinese societies: changes and challenges. J. Moral Educ. 33, 405\u2013428 (2004)","journal-title":"J. Moral Educ."},{"key":"18_CR17","unstructured":"Yu, E., Cysneiros, L.: Designing for privacy and other competing requirements. In: 2nd Symposium on Requirements Engineering for Information Security (SREIS 2002), Raleigh, 2002, pp. 15\u201316 (2002)"},{"key":"18_CR18","unstructured":"Blackman, R.: A practical guide to building ethical AI. Harvard Bus. Rev. 15 October 2020. https:\/\/hbr.org\/2020\/10\/a-practical-guide-to-building-ethical-ai"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Arkin, R.C., Ulam, P., Duncan, B.: An ethical governor for constraining lethal action in an autonomous system. Technical report GIT-GVU-09-02 (2009)","DOI":"10.21236\/ADA493563"},{"key":"18_CR20","unstructured":"Moor, J.: Four kinds of ethical robots. Philos. Now 72, 12\u20134 (2009)"},{"key":"18_CR21","unstructured":"Schoenherr, J.R.: Ethics Sensemaking and Autonomous and Intelligent Systems: Ethical Features of A\/IS Affordances. In: Frontiers of AI Ethics (DeFalco, J. & Hampton, A.). Routledge Publishing, forthcoming"},{"key":"18_CR22","unstructured":"Kohlberg, L.: Moral stages and moralization. In: Lickona, T. (ed.), Moral Development and Behavior: Theory, Research and Social Issues, pp. 31\u201353. Rinehart and Winston, New York (1976)"},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1037\/0033-2909.97.2.202","volume":"97","author":"JR Snarey","year":"1985","unstructured":"Snarey, J.R.: The cross-cultural universality of social-moral development: a critical review of Kohlbergian research. Psychol. Bull. 97, 202\u2013232 (1985)","journal-title":"Psychol. Bull."},{"key":"18_CR24","doi-asserted-by":"publisher","first-page":"813","DOI":"10.2224\/sbp.2002.30.8.813","volume":"30","author":"AJ Al-Shehab","year":"2002","unstructured":"Al-Shehab, A.J.: A cross-sectional examination of levels of moral reasoning in a sample of Kuwait University faculty members. Soc. Behav. Pers. 30, 813\u2013820 (2002)","journal-title":"Soc. Behav. Pers."},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-94-6300-079-6_11","volume-title":"Lawrence Kohlberg Consensus and Controversy","author":"L Kohlberg","year":"1986","unstructured":"Kohlberg, L.: A current statement on some theoretical issues. In: Modgil, S., Modgil, C. (eds.) Lawrence Kohlberg Consensus and Controversy, pp. 485\u2013546. Falmer Press, Philadelphia (1986). https:\/\/doi.org\/10.1007\/978-94-6300-079-6_11"},{"key":"18_CR26","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/j.dr.2007.04.001","volume":"27","author":"JC Gibbs","year":"2007","unstructured":"Gibbs, J.C., Basinger, K.S., Grime, R.L., Snarey, J.R.: Moral judgment development across cultures: revisiting Kohlberg\u2019s universality claims. Dev. Rev. 27, 443\u2013500 (2007)","journal-title":"Dev. Rev."},{"key":"18_CR27","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1037\/0012-1649.35.2.323","volume":"35","author":"SJ Thoma","year":"1999","unstructured":"Thoma, S.J., Rest, J.R.: The relationship between moral decision making and patterns of consolidation and transition in moral judgment development. Dev. Psychol. 35, 323\u2013334 (1999)","journal-title":"Dev. Psychol."},{"key":"18_CR28","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1037\/0033-295X.99.4.689","volume":"99","author":"AP Fiske","year":"1992","unstructured":"Fiske, A.P.: The four elementary forms of sociality: framework for a unified theory of social relations. Psychol. Rev. 99, 689\u2013723 (1992)","journal-title":"Psychol. Rev."},{"key":"18_CR29","first-page":"852","volume-title":"Handbook of Affective Sciences","author":"J Haidt","year":"2003","unstructured":"Haidt, J.: \u201cThe moral emotions,\u201d in. In: Davidson, R.J., Scherer, K.R., Goldsmith, H.H. (eds.) Handbook of Affective Sciences, pp. 852\u2013870. Oxford University Press, Oxford (2003)"},{"key":"18_CR30","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1080\/0305724022000029626","volume":"31","author":"H Baek","year":"2002","unstructured":"Baek, H.: A comparative study of moral development of Korean and British children. J. Moral Educ. 31, 373\u2013391 (2002)","journal-title":"J. Moral Educ."},{"key":"18_CR31","doi-asserted-by":"publisher","first-page":"49","DOI":"10.47678\/cjhe.v36i1.183525","volume":"36","author":"JM Hughes","year":"2006","unstructured":"Hughes, J.M., McCabe, D.L.: Understanding academic misconduct. Can. J. High. Educ. 36, 49\u201363 (2006)","journal-title":"Can. J. High. Educ."},{"key":"18_CR32","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s10551-006-9260-9","volume":"75","author":"JL Kisamore","year":"2007","unstructured":"Kisamore, J.L., Stone, T.H., Jawahar, I.M.: Academic integrity: the relationship between individual and situational factors on misconduct contemplations. Academic integrity: the relationship between individual and situational factors on misconduct contemplations. J. Bus. Ethics 75, 381\u2013394 (2007)","journal-title":"J. Bus. Ethics"},{"key":"18_CR33","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1037\/h0034449","volume":"27","author":"JM Darley","year":"1973","unstructured":"Darley, J.M., Batson, C.D.: From Jerusalem to Jericho: a study of situational and dispositional variables in helping behavior. J. Pers. Soc. Psychol. 27, 100\u2013108 (1973)","journal-title":"J. Pers. Soc. Psychol."},{"key":"18_CR34","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1509\/jmkr.45.6.633","volume":"45","author":"N Mazar","year":"2008","unstructured":"Mazar, N., Amir, O., Ariely, D.: The dishonesty of honest people: a theory of self-concept maintenance. J. Mark. Res. 45, 633\u2013644 (2008)","journal-title":"J. Mark. Res."},{"key":"18_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/j.1467-9973.1995.tb00553.x","volume":"26","author":"JH Moor","year":"1995","unstructured":"Moor, J.H.: Is ethics computable? Metaphilosophy 26, 1\u201321 (1995)","journal-title":"Metaphilosophy"},{"key":"18_CR36","volume-title":"Moral Machines: Teaching Robots Right from Wrong","author":"W Wallach","year":"2008","unstructured":"Wallach, W., Allen, C.: Moral Machines: Teaching Robots Right from Wrong. Oxford University Press, Oxford (2008)"},{"key":"18_CR37","doi-asserted-by":"publisher","unstructured":"Pereira, L.M., Saptawijaya, A.: Programming Machine Ethics. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29354-7","DOI":"10.1007\/978-3-319-29354-7"},{"key":"18_CR38","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.cogsys.2017.04.002","volume":"48","author":"D Vanderelst","year":"2018","unstructured":"Vanderelst, D., Winfield, A.: An architecture for ethical robots inspired by the simulation theory of cognition. Cogn. Syst. Res. 48, 56\u201366 (2018)","journal-title":"Cogn. Syst. Res."},{"key":"18_CR39","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1023\/B:MIND.0000035461.63578.9d","volume":"14","author":"L Floridi","year":"2004","unstructured":"Floridi, L., Sanders, J.W.: On the morality of artificial agents. Mind. Mach. 14, 349\u2013379 (2004)","journal-title":"Mind. Mach."},{"key":"18_CR40","unstructured":"Schoenherr, J.R.: Metacognitive assessments of performance: the psychometric properties of confidence scales and confidence models. In: Proceedings of Fechner Day, Antalya, p. 71 (2019)"},{"key":"18_CR41","volume-title":"Trust in the Age of Entanglement","author":"JR Schoenherr","year":"2022","unstructured":"Schoenherr, J.R.: Trust in the Age of Entanglement. Routledge Publishing, London (2022)"},{"key":"18_CR42","volume-title":"The Ethical Algorithm: The Science of Socially Aware Algorithm Design","author":"M Kearns","year":"2019","unstructured":"Kearns, M., Roth, A.: The Ethical Algorithm: The Science of Socially Aware Algorithm Design. Oxford University Press, Oxford (2019)"},{"key":"18_CR43","volume-title":"Contemporary Metaethics: an Introduction","author":"A Miller","year":"2014","unstructured":"Miller, A.: Contemporary Metaethics: an Introduction. Wiley, Hoboken (2014)"},{"key":"18_CR44","doi-asserted-by":"publisher","unstructured":"Hill, T.E.: The kingdom of ends. In: Proceedings of the Third International Kant Congress: Held at the University of Rochester, March 30\u2013April 4, 1970. Springer, Dordrecht (1972). https:\/\/doi.org\/10.1007\/978-94-010-3099-1_26","DOI":"10.1007\/978-94-010-3099-1_26"},{"key":"18_CR45","volume-title":"Acting on Principle","author":"O O\u2019Neill","year":"1975","unstructured":"O\u2019Neill, O.: Acting on Principle. Columbia University Press, New York (1975)"},{"key":"18_CR46","unstructured":"Ross, D.: The Right and the Good. Oxford University Press, Oxford (1930)"},{"key":"18_CR47","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MIS.2006.82","volume":"21","author":"S Bringsjord","year":"2006","unstructured":"Bringsjord, S., Arkoudas, K., Bello, P.: Toward a general logicist methodology for engineering ethically correct robots. IEEE Intell. Syst. 21, 38\u201344 (2006)","journal-title":"IEEE Intell. Syst."},{"key":"18_CR48","doi-asserted-by":"publisher","DOI":"10.1201\/9780429425905","volume-title":"Advancing Diversity, Inclusion, and Social Justice Through Human Systems Engineering","author":"RD Roscoe","year":"2019","unstructured":"Roscoe, R.D., Chiou, E.K., Wooldridge, A.R.: Advancing Diversity, Inclusion, and Social Justice Through Human Systems Engineering. CRC Press, Boca Raton (2019)"},{"key":"18_CR49","unstructured":"Korman, H.T.N., O\u2019Keefe, B., Repka, M.: Missing in the Margins: Estimating the Scale of the COVID-19 Attendance Crisis. Bellwether Education Partners, 21 October 2020. https:\/\/bellwethereducation.org\/publication\/missing-margins-estimating-scale-covid-19-attendance-crisis#How%20did%20you%20estimate%201-3%20million%20missing%20students? Accessed 17 Dec 2020"},{"key":"18_CR50","first-page":"623","volume":"44","author":"JC Harsanyi","year":"1977","unstructured":"Harsanyi, J.C.: Morality and the theory of rational behavior. Soc. Res. 44, 623\u2013656 (1977)","journal-title":"Soc. Res."},{"key":"18_CR51","first-page":"223","volume":"68","author":"JC Hill","year":"1978","unstructured":"Hill, J.C.: Bayesian decision theory and utilitarian ethics. Am. Econ. Rev. 68, 223\u2013228 (1978)","journal-title":"Am. Econ. Rev."},{"key":"18_CR52","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190498511.001.0001","volume-title":"Technology and the Virtues: A Philosophical Guide to a Future Worth Wanting","author":"S Vallor","year":"2016","unstructured":"Vallor, S.: Technology and the Virtues: A Philosophical Guide to a Future Worth Wanting. Oxford University Press, Oxford (2016)"},{"key":"18_CR53","doi-asserted-by":"publisher","unstructured":"Winfield, A.F., Jirotka, M.: Ethical governance is essential to building trust in robotics and artificial intelligence systems. Philos. Trans. R. Soc. A Math. Phys. Eng. Sci. 376 (2018). https:\/\/doi.org\/10.1098\/rsta.2018.0085","DOI":"10.1098\/rsta.2018.0085"},{"key":"18_CR54","doi-asserted-by":"crossref","unstructured":"Dennis, L., Fisher, M., Slavkovik, M., Webster, M.: Formal verification of ethical choices in autonomous systems. Robot. Auton. Syst. 1, 1\u20134 (2016)","DOI":"10.1016\/j.robot.2015.11.012"},{"key":"18_CR55","doi-asserted-by":"crossref","DOI":"10.5771\/9780815725725","volume-title":"Social Ethics in a Changing China: Moral Decay Or Ethical Awakening?","author":"H He","year":"2015","unstructured":"He, H.: Social Ethics in a Changing China: Moral Decay Or Ethical Awakening? Brookings Institution Press, Washington (2015)"},{"key":"18_CR56","doi-asserted-by":"crossref","unstructured":"Do\u0161ilovi\u0107, F., Br\u010di\u0107, M., Hlupi\u0107, N.: Explainable artificial intelligence: a survey. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (2018)","DOI":"10.23919\/MIPRO.2018.8400040"},{"key":"18_CR57","unstructured":"Gunning, D.: DARPA XAI BAA, DARPA (2016). https:\/\/www.darpa.mil\/attachments\/DARPA-BAA-16-53.pdf. Accessed 20 Feb 2020"},{"key":"18_CR58","doi-asserted-by":"publisher","unstructured":"Thomson, R., Schoenherr, J.R.: Knowledge-to-information translation training (KITT): an adaptive approach to explainable artificial intelligence. In: International Conference on Human-Computer Interaction, pp. 187\u2013204. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-50788-6_14","DOI":"10.1007\/978-3-030-50788-6_14"},{"key":"18_CR59","unstructured":"IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems, Ethically Aligned Design: A Vision for Prioritizing Human Well-being with Autonomous and Intelligent Systems. IEEE (2019)"},{"key":"18_CR60","unstructured":"Schoenherr, J.R.: Ethics of psychometrics: value implications of validity and integrated learner records in AIS. In: Learning Technology - Where we are Today (2021)"},{"key":"18_CR61","doi-asserted-by":"crossref","unstructured":"Kane, T.: An argument-based approach to validity. Psychol. Bull. 112, 527\u2013535 (1992)","DOI":"10.1037\/\/0033-2909.112.3.527"},{"key":"18_CR62","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1037\/h0057079","volume":"23","author":"HC Taylor","year":"1939","unstructured":"Taylor, H.C., Russell, J.T.: The relationship of validity coefficients to the practical effectiveness of tests in selection: discussion and tables. J. Appl. Psychol. 23, 565\u2013578 (1939)","journal-title":"J. Appl. Psychol."},{"key":"18_CR63","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1111\/j.1745-3984.2005.00007","volume":"42","author":"AS Cohen","year":"2005","unstructured":"Cohen, A.S., Bolt, D.M.: A mixture model analysis of differential item functioning. J. Educ. Meas. 42, 133\u2013148 (2005)","journal-title":"J. Educ. Meas."},{"key":"18_CR64","doi-asserted-by":"crossref","unstructured":"Holland, P.W., Thayer, D.T.: Differential item functioning and the Mantel\u2010Haenszel procedure. ETS Research Report Series, pp. i-24 (1986)","DOI":"10.1002\/j.2330-8516.1986.tb00186.x"},{"key":"18_CR65","doi-asserted-by":"crossref","unstructured":"Osterlind, S.J., Everson, H.T.: Differential Item Functioning, vol. 161. Sage Publications, London (2009)","DOI":"10.4135\/9781412993913"},{"key":"18_CR66","volume-title":"Psychometric Theory","author":"JC Nunnally","year":"1994","unstructured":"Nunnally, J.C., Bernstein, I.H.: Psychometric Theory. McGraw-Hill, New York (1994)"},{"key":"18_CR67","unstructured":"Rasch, G.: Studies in mathematical psychology: I. Probabilistic models for some intelligence and attainment tests. Nielsen & Lydiche (1960)"},{"key":"18_CR68","unstructured":"News, B.: University of York students targeted in data hack. BBC News, 1 July 2019. https:\/\/www.bbc.com\/news\/uk-england-york-north-yorkshire-49182179. Accessed 1 Aug 2020"},{"key":"18_CR69","unstructured":"Association, P.: Lancaster University Students Data Stolen in Cyber Attack. The Guardian, 23 July 2019. https:\/\/www.theguardian.com\/technology\/2019\/jul\/23\/lancaster-university-students-data-stolen-cyber-attack. Accessed 1 Aug 2020"},{"key":"18_CR70","unstructured":"Doran, L.: Ransomware Attacks Force School Districts to Shore Up\u2014or Pay Up. Education Week, 10 January 2017. https:\/\/www.edweek.org\/ew\/articles\/2017\/01\/11\/ransomware-attacks-force-school-districts-to.html. Accessed 3 July 2020"},{"key":"18_CR71","unstructured":"Erazo, F.: University of Utah Pays Ransomware Gang to Prevent Student Data Leak, Cointelegraph, 22 August 2020. https:\/\/cointelegraph.com\/news\/university-of-utah-pays-ransomware-gang-to-prevent-student-data-leak. Accessed 4 Sept 2020"},{"key":"18_CR72","unstructured":"Sweeney, L., Samarati, P.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report SRI-CSL-98-04. SRI Computer Science Laboratory, Pal Alto (1998)"},{"key":"18_CR73","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1, 3-es (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"18_CR74","doi-asserted-by":"crossref","unstructured":"Schoenherr, J.R., Thomson, R.: Insider threat detection: a solution in search of a problem. In: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/CyberSecurity49315.2020.9138862"},{"key":"18_CR75","doi-asserted-by":"crossref","unstructured":"Pasquale, F.: The Black Box Society, Harvard University Press (2015)","DOI":"10.4159\/harvard.9780674736061"},{"key":"18_CR76","first-page":"46","volume":"2020","author":"JR Schoenherr","year":"2020","unstructured":"Schoenherr, J.R.: Black boxes of the mind: from psychophysics to explainable artificial intelligence. Proc. Fechner Day 2020, 46\u201351 (2020)","journal-title":"Proc. Fechner Day"},{"key":"18_CR77","unstructured":"Anderson, M., Anderson, S., Armen, C.: Towards machine ethics: implementing two action-based ethical theories, pp. 1\u20137. In: Proceedings of the AAAI 2005 Fall Symposium on Machine Ethics (2005)"},{"key":"18_CR78","doi-asserted-by":"crossref","unstructured":"Schoenherr, J.R.: Learning engineering is ethical. In: Goodell, J. (ed.) Learning Engineering Toolkit, pp. 193\u2013221 (2022)","DOI":"10.4324\/9781003276579-11"},{"key":"18_CR79","doi-asserted-by":"crossref","unstructured":"Ashby, F.G., Valentin, V.V.: Multiple systems of perceptual category learning: theory and cognitive tests. In: Handbook of Categorization in Cognitive Science, pp. 157\u2013188. Elsevier (2017)","DOI":"10.1016\/B978-0-08-101107-2.00007-5"},{"key":"18_CR80","doi-asserted-by":"crossref","unstructured":"Schoenherr, J.R.: Adapting the zone of proximal development to the wicked environments of professional practice. In: International Conference on Human-Computer Interaction, pp. 394\u2013410. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-50788-6_29"}],"container-title":["Lecture Notes in Computer Science","Adaptive Instructional Systems. Design and Evaluation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77857-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:12:02Z","timestamp":1751494322000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77857-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030778569","9783030778576"],"references-count":80,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77857-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}