{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T23:23:31Z","timestamp":1778887411145,"version":"3.51.4"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031255984","type":"print"},{"value":"9783031255991","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25599-1_29","type":"book-chapter","created":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T04:32:27Z","timestamp":1678249947000},"page":"384-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Aspects and\u00a0Views on\u00a0Responsible Artificial Intelligence"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0560-1230","authenticated-orcid":false,"given":"Bo\u0161tjan","family":"Brumen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1817-7440","authenticated-orcid":false,"given":"Sabrina","family":"G\u00f6llner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1623-5309","authenticated-orcid":false,"given":"Marina","family":"Tropmann-Frick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,9]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, A.: Privacy preservation through facial de-identification with simultaneous emotion preservation. Signal Image Video Process. (2020)","DOI":"10.1007\/s11760-020-01819-9"},{"issue":"3","key":"29_CR2","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s00146-019-00931-w","volume":"35","author":"T Araujo","year":"2020","unstructured":"Araujo, T., Helberger, N., Kruikemeier, S., de Vreese, C.H.: In AI we trust? Perceptions about automated decision-making by artificial intelligence. AI Soc. 35(3), 611\u2013623 (2020)","journal-title":"AI Soc."},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"AB Arrieta","year":"2020","unstructured":"Arrieta, A.B., et al.: Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI. Inf. Fusion 58, 82\u2013115 (2020)","journal-title":"Inf. Fusion"},{"issue":"1","key":"29_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s43681-020-00012-5","volume":"1","author":"R Benjamins","year":"2021","unstructured":"Benjamins, R.: A choices framework for the responsible use of AI. AI Ethics 1(1), 49\u201353 (2021)","journal-title":"AI Ethics"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Bertino, E.: Privacy in the era of 5G, IoT, big data and machine learning. In: 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 134\u2013137 (2020)","DOI":"10.1109\/TPS-ISA50397.2020.00027"},{"key":"29_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.neucom.2019.11.041","volume":"384","author":"A Boulemtafes","year":"2020","unstructured":"Boulemtafes, A., Derhab, A., Challal, Y.: A review of privacy-preserving techniques for deep learning. Neurocomputing 384, 21\u201345 (2020)","journal-title":"Neurocomputing"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Chai, Z., Chen, Y., Anwar, A., Zhao, L., Cheng, Y., Rangwala, H.: FedAT: a high-performance and communication-efficient federated learning system with asynchronous tiers. In: Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis. SC \u201921, pp. 1\u201316. ACM, NY, USA, November 2021","DOI":"10.1145\/3458817.3476211"},{"key":"29_CR8","first-page":"1137","volume":"71","author":"L Cheng","year":"2021","unstructured":"Cheng, L., Varshney, K.R., Liu, H.: Socially responsible AI algorithms: issues, purposes, and challenges. J. Artif. Int. Res. 71, 1137\u20131181 (2021)","journal-title":"J. Artif. Int. Res."},{"issue":"1","key":"29_CR9","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s43681-020-00011-6","volume":"1","author":"R Eitel-Porter","year":"2021","unstructured":"Eitel-Porter, R.: Beyond the promise: implementing ethical AI. AI Ethics 1(1), 73\u201380 (2021)","journal-title":"AI Ethics"},{"key":"29_CR10","unstructured":"EU-Commission: White paper on artificial intelligence a European approach to excellence and trust (2020)"},{"key":"29_CR11","unstructured":"EU-Commission: Coordinated plan on artificial intelligence 2021 review (2021)"},{"key":"29_CR12","unstructured":"EU-Commission: Proposal for a regulation of the European parliament and of the council laying down harmonised rules on artificial intelligence (artificial intelligence act) and amending certain union legislative acts (2021)"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Fereidooni, H., et al.: SafeLearn: secure aggregation for private federated learning. In: 2021 IEEE Security and Privacy Workshops (SPW), pp. 56\u201362 (2021)","DOI":"10.1109\/SPW53761.2021.00017"},{"issue":"2","key":"29_CR14","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/3434228","volume":"64","author":"M Guevara","year":"2021","unstructured":"Guevara, M., Desfontaines, D., Waldo, J., Coatta, T.: Differential privacy: the pursuit of protections by default. Commun. ACM 64(2), 36\u201343 (2021)","journal-title":"Commun. ACM"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Hailemariam, Y., Yazdinejad, A., Parizi, R.M., Srivastava, G., Dehghantanha, A.: An empirical evaluation of AI deep explainable tools. In: 2020 IEEE Globecom Workshops (GC Wkshps), pp. 1\u20136 (2020)","DOI":"10.1109\/GCWkshps50303.2020.9367541"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Hanna, R., Kazim, E.: Philosophical foundations for digital ethics and AI ethics: a dignitarian approach. AI Ethics (2021)","DOI":"10.1007\/s43681-021-00040-9"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Hao, M., Li, H., Xu, G., Chen, H., Zhang, T.: Efficient, private and robust federated learning. In: Annual Computer Security Applications Conference. ACSAC, pp. 45\u201360. ACM, New York, NY, USA, December 2021","DOI":"10.1145\/3485832.3488014"},{"key":"29_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106685","volume":"214","author":"A Heuillet","year":"2021","unstructured":"Heuillet, A., Couthouis, F., D\u00edaz-Rodr\u00edguez, N.: Explainability in deep reinforcement learning. Knowl.-Based Syst. 214, 106685 (2021)","journal-title":"Knowl.-Based Syst."},{"issue":"1","key":"29_CR19","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s43681-020-00008-1","volume":"1","author":"M Hickok","year":"2021","unstructured":"Hickok, M.: Lessons learned from AI ethics principles for future actions. AI Ethics 1(1), 41\u201347 (2021)","journal-title":"AI Ethics"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Jacovi, A., Marasovi\u0107, A., Miller, T., Goldberg, Y.: Formalizing trust in artificial intelligence: prerequisites, causes and goals of human trust in AI. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency. FAccT \u201921, pp. 624\u2013635. ACM, New York, NY, USA (2021)","DOI":"10.1145\/3442188.3445923"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Jain, S., Luthra, M., Sharma, S., Fatima, M.: Trustworthiness of artificial intelligence. In: 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 907\u2013912 (2020)","DOI":"10.1109\/ICACCS48705.2020.9074237"},{"key":"29_CR22","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham, B., Brereton, O.P., Budgen, D., Turne, M., Bailey, J., Linkman, S.: Systematic literature reviews in software engineering - a systematic literature review. Inf. Softw. Technol. 51, 7\u201315 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Lee, M.K., Rich, K.: Who is included in human perceptions of AI?: trust and perceived fairness around healthcare AI and cultural mistrust. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA (2021)","DOI":"10.1145\/3411764.3445570"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Maree, C., Modal, J.E., Omlin, C.W.: Towards responsible AI for financial transactions. In: 2020 IEEE Symposium Series on Computational Intelligence, pp. 16\u201321 (2020)","DOI":"10.1109\/SSCI47803.2020.9308456"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Mohseni, S., Zarei, N., Ragan, E.D.: A multidisciplinary survey and framework for design and evaluation of explainable AI systems. ACM Trans. Interact. Intell. Syst. 11(3\u20134) (2021)","DOI":"10.1145\/3387166"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Morley, J., Elhalal, A., Garcia, F., Kinsey, L., M\u00f6kander, J., Floridi, L.: Ethics as a service: a pragmatic operationalisation of AI ethics. Minds Mach. (2021)","DOI":"10.2139\/ssrn.3784238"},{"key":"29_CR27","doi-asserted-by":"crossref","unstructured":"Rochel, J., Ev\u00e9quoz, F.: Getting into the engine room: a blueprint to investigate the shadowy steps of AI ethics. AI Soc. (2020)","DOI":"10.1007\/s00146-020-01069-w"},{"key":"29_CR28","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez-Barroso, N., et al.: Federated learning and differential privacy: software tools analysis, the sherpa.ai fl framework and methodological guidelines for preserving data privacy. Inf. Fusion 64, 270\u2013292 (2020)","DOI":"10.1016\/j.inffus.2020.07.009"},{"key":"29_CR29","doi-asserted-by":"crossref","unstructured":"Shneiderman, B.: Bridging the gap between ethics and practice: guidelines for reliable, safe, and trustworthy human-centered AI systems. ACM Trans. Interact. Intell. Syst. 10(4) (2020)","DOI":"10.1145\/3419764"},{"key":"29_CR30","doi-asserted-by":"crossref","unstructured":"Sun, L., Li, Z., Zhang, Y., Liu, Y., Lou, S., Zhou, Z.: Capturing the trends, applications, issues, and potential strategies of designing transparent AI agents. In: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. CHI EA \u201921. ACM, New York, NY, USA (2021)","DOI":"10.1145\/3411763.3451819"},{"key":"29_CR31","doi-asserted-by":"crossref","unstructured":"Suresh, H., Gomez, S.R., Nam, K.K., Satyanarayan, A.: Beyond expertise and roles: a framework to characterize the stakeholders of interpretable machine learning and their needs. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA (2021)","DOI":"10.1145\/3411764.3445088"},{"key":"29_CR32","doi-asserted-by":"crossref","unstructured":"Tartaglione, E., Grangetto, M.: A non-discriminatory approach to ethical deep learning. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 943\u2013950 (2020)","DOI":"10.1109\/TrustCom50675.2020.00126"},{"key":"29_CR33","doi-asserted-by":"crossref","unstructured":"Toreini, E., Aitken, M., Coopamootoo, K., Elliott, K., Zelaya, C.G., van Moorsel, A.: The relationship between trust in AI and trustworthy machine learning technologies. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency. FAT* \u201920, pp. 272\u2013283. ACM, New York, NY, USA (2020)","DOI":"10.1145\/3351095.3372834"},{"key":"29_CR34","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.neucom.2020.10.014","volume":"422","author":"AT Tran","year":"2021","unstructured":"Tran, A.T., Luong, T.D., Karnjana, J., Huynh, V.N.: An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation. Neurocomputing 422, 245\u2013262 (2021)","journal-title":"Neurocomputing"},{"issue":"10","key":"29_CR35","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/3448248","volume":"64","author":"JM Wing","year":"2021","unstructured":"Wing, J.M.: Trustworthy AI. Commun. ACM 64(10), 64\u201371 (2021)","journal-title":"Commun. ACM"},{"key":"29_CR36","doi-asserted-by":"crossref","unstructured":"Xiaoling, P.: Discussion on ethical dilemma caused by artificial intelligence and countermeasures. In: 2021 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC), pp. 453\u2013457 (2021)","DOI":"10.1109\/IPEC51340.2021.9421271"},{"key":"29_CR37","doi-asserted-by":"crossref","unstructured":"Yuan, L., Shen, G.: A training scheme of deep neural networks on encrypted data. In: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies. CIAT 2020, pp. 490\u2013495, ACM, USA (2020)","DOI":"10.1145\/3444370.3444618"},{"key":"29_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, T., Qin, Y., Li, Q.: Trusted artificial intelligence: technique requirements and best practices. In: 2021 International Conference on Cyberworlds (CW), pp. 303\u2013306, September 2021","DOI":"10.1109\/CW52790.2021.00058"}],"container-title":["Lecture Notes in Computer Science","Machine Learning, Optimization, and Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25599-1_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T17:15:04Z","timestamp":1680714904000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25599-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031255984","9783031255991"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25599-1_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LOD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning, Optimization, and Data Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Certosa di Pontignano","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lod2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/lod2022.icas.cc\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"226","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}