{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:25:07Z","timestamp":1742984707188,"version":"3.40.3"},"publisher-location":"Cham","reference-count":120,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031432637"},{"type":"electronic","value":"9783031432644"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-43264-4_11","type":"book-chapter","created":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T23:03:02Z","timestamp":1694041382000},"page":"167-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SHAPE: A Framework for\u00a0Evaluating the\u00a0Ethicality of\u00a0Influence"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8954-246X","authenticated-orcid":false,"given":"Elfia","family":"Bezou-Vrakatseli","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0699-1688","authenticated-orcid":false,"given":"Benedikt","family":"Br\u00fcckner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4120-5056","authenticated-orcid":false,"given":"Luke","family":"Thorburn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,7]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318. CCS 2016, Association for Computing Machinery, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"issue":"2","key":"11_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0031578","volume":"7","author":"J Adams","year":"2012","unstructured":"Adams, J., Tyrrell, R., Adamson, A.J., White, M.: Effect of restrictions on television food advertising to children on exposure to advertisements for \u2018less healthy\u2019 foods: Repeat cross-sectional study. PLOS ONE 7(2), 1\u20136 (2012). https:\/\/doi.org\/10.1371\/journal.pone.0031578","journal-title":"PLOS ONE"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Adar, E., Tan, D.S., Teevan, J.: Benevolent deception in human computer interaction. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1863\u20131872 (2013)","DOI":"10.1145\/2470654.2466246"},{"key":"11_CR4","unstructured":"Adobe Inc.: AI Ethics. https:\/\/www.adobe.com\/uk\/about-adobe\/aiethics.html"},{"issue":"4","key":"11_CR5","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1287\/isre.2013.0497","volume":"24","author":"G Adomavicius","year":"2013","unstructured":"Adomavicius, G., Bockstedt, J.C., Curley, S.P., Zhang, J.: Do recommender systems manipulate consumer preferences? A study of anchoring effects. Inf. Syst. Res. 24(4), 956\u2013975 (2013). https:\/\/doi.org\/10.1287\/isre.2013.0497","journal-title":"Inf. Syst. Res."},{"issue":"3","key":"11_CR6","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1080\/02691728.2020.1855485","volume":"35","author":"D Anderson","year":"2021","unstructured":"Anderson, D.: An epistemological conception of safe spaces. Soc. Epistemology 35(3), 285\u2013311 (2021). https:\/\/doi.org\/10.1080\/02691728.2020.1855485","journal-title":"Soc. Epistemology"},{"issue":"5","key":"11_CR7","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1038\/scientificamerican1155-31","volume":"193","author":"SE Asch","year":"1955","unstructured":"Asch, S.E.: Opinions and social pressure. Sci. Am. 193(5), 31\u201335 (1955). https:\/\/doi.org\/10.1038\/scientificamerican1155-31","journal-title":"Sci. Am."},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1258\/ce.2008.008047","volume":"4","author":"N Athanassoulis","year":"2009","unstructured":"Athanassoulis, N., Wilson, J.: When is deception in research ethical? Clin. Ethics 4(1), 44\u201349 (2009). https:\/\/doi.org\/10.1258\/ce.2008.008047","journal-title":"Clin. Ethics"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Aytac, U.: Digital domination: Social media and contestatory democracy. Polit. Stud. 00323217221096564 (2022). https:\/\/doi.org\/10.1177\/00323217221096564","DOI":"10.1177\/00323217221096564"},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Bai, H., Voelkel, J.G., Eichstaedt, J.C., Willer, R.: Artificial intelligence can persuade humans on political issues (2023). https:\/\/doi.org\/10.31219\/osf.io\/stakv. https:\/\/osf.io\/stakv\/","DOI":"10.31219\/osf.io\/stakv"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1017\/CBO9781107590205.004","volume":"1","author":"S Barocas","year":"2014","unstructured":"Barocas, S., Nissenbaum, H.: Big data\u2019s end run around anonymity and consent. Priv. Big Data Public Good: Frameworks Engagem. 1, 44\u201375 (2014)","journal-title":"Priv. Big Data Public Good: Frameworks Engagem."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Baron, M.: Manipulativeness. In: Proceedings and Addresses of the American Philosophical Association, vol. 77, no. 2, pp. 37\u201354 (2003). http:\/\/www.jstor.org\/stable\/3219740","DOI":"10.2307\/3219740"},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1017\/can.2021.23","volume":"52","author":"C Benn","year":"2022","unstructured":"Benn, C., Lazar, S.: What\u2019s wrong with automated influence. Can. J. Philos. 52(1), 125\u2013148 (2022). https:\/\/doi.org\/10.1017\/can.2021.23","journal-title":"Can. J. Philos."},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Benthall, S., G\u00fcrses, S., Nissenbaum, H., et al.: Contextual integrity through the lens of computer science. Now Publishers (2017)","DOI":"10.1561\/9781680833850"},{"issue":"5","key":"11_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/301353.301410","volume":"42","author":"D Berdichevsky","year":"1999","unstructured":"Berdichevsky, D., Neuenschwander, E.: Toward an ethics of persuasive technology. Commun. ACM 42(5), 51\u201358 (1999). https:\/\/doi.org\/10.1145\/301353.301410","journal-title":"Commun. ACM"},{"issue":"4","key":"11_CR16","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1111\/j.1467-6486.1992.tb00674.x","volume":"29","author":"BP Bloomfield","year":"1992","unstructured":"Bloomfield, B.P., Coombs, R.: Information technology, control and power: the centralization and decentralization debate revisited. J. Manage. Stud. 29(4), 459\u2013459 (1992)","journal-title":"J. Manage. Stud."},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Blumenthal-Barby, J.S.: A framework for assessing the moral status of manipulation, In: Weber, C.C.M. (ed.) Manipulation, pp. 121\u2013134. Oxford University Press (2014)","DOI":"10.1093\/acprof:oso\/9780199338207.003.0006"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"Boine, C.: AI-enabled manipulation and EU law (2021). https:\/\/doi.org\/10.2139\/ssrn.4042321","DOI":"10.2139\/ssrn.4042321"},{"issue":"1","key":"11_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNSRE.2005.843443","volume":"13","author":"BR Brewer","year":"2005","unstructured":"Brewer, B.R., Fagan, M., Klatzky, R.L., Matsuoka, Y.: Perceptual limits for a robotic rehabilitation environment using visual feedback distortion. IEEE Trans. Neural Syst. Rehab. Eng. 13(1), 1\u201311 (2005)","journal-title":"IEEE Trans. Neural Syst. Rehab. Eng."},{"key":"11_CR20","unstructured":"BCS, The Chartered Institute for IT: Code of conduct for BCS members (2022). https:\/\/www.bcs.org\/media\/2211\/bcs-code-of-conduct.pdf"},{"issue":"1","key":"11_CR21","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s11572-012-9172-y","volume":"8","author":"JC Bublitz","year":"2014","unstructured":"Bublitz, J.C., Merkel, R.: Crimes against minds: on mental manipulations, harms and a human right to mental self-determination. Crim. Law Philos. 8(1), 51\u201377 (2014). https:\/\/doi.org\/10.1007\/s11572-012-9172-y","journal-title":"Crim. Law Philos."},{"issue":"2","key":"11_CR22","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1086\/426304","volume":"115","author":"S Buss","year":"2005","unstructured":"Buss, S.: Valuing autonomy and respecting persons: manipulation, seduction, and the basis of moral constraints. Ethics 115(2), 195\u2013235 (2005). https:\/\/doi.org\/10.1086\/426304","journal-title":"Ethics"},{"key":"11_CR23","unstructured":"Cambridge dictionary (2023). https:\/\/dictionary.cambridge.org. Accessed 23 July 2023"},{"key":"11_CR24","unstructured":"Carlson, M.: Whither anonymity? journalism and unnamed sources in a changing media environment. In: Journalists, Sources, and Credibility, pp. 49\u201360. Routledge (2010)"},{"key":"11_CR25","doi-asserted-by":"publisher","unstructured":"Carroll, M., Hadfield-Menell, D., Russell, S., Dragan, A.: Estimating and penalizing preference shift in recommender systems. In: Proceedings of the 15th ACM Conference on Recommender Systems, pp. 661\u2013667. RecSys 2021, Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3460231.3478849","DOI":"10.1145\/3460231.3478849"},{"key":"11_CR26","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199577415.001.0001","volume-title":"Lying and Deception: Theory and practice","author":"TL Carson","year":"2010","unstructured":"Carson, T.L.: Lying and Deception: Theory and practice. OUP Oxford, Oxford (2010)"},{"key":"11_CR27","doi-asserted-by":"publisher","unstructured":"Carvalho, D.V., Pereira, E.M., Cardoso, J.S.: Machine learning interpretability: a survey on methods and metrics. Electronics 8(8), 832 (2019). https:\/\/doi.org\/10.3390\/electronics8080832. https:\/\/www.mdpi.com\/2079-9292\/8\/8\/832","DOI":"10.3390\/electronics8080832"},{"issue":"2","key":"11_CR28","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s10677-006-9052-4","volume":"10","author":"EM Cave","year":"2007","unstructured":"Cave, E.M.: What\u2019s wrong with motive manipulation? Ethical Theor. Moral Pract. 10(2), 129\u2013144 (2007). https:\/\/doi.org\/10.1007\/s10677-006-9052-4","journal-title":"Ethical Theor. Moral Pract."},{"key":"11_CR29","doi-asserted-by":"publisher","unstructured":"Chan, A., et al.: Harms from increasingly agentic algorithmic systems. In: Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency, pp. 651\u2013666. FAccT 2023, Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3593013.3594033","DOI":"10.1145\/3593013.3594033"},{"key":"11_CR30","unstructured":"Association for Computer Machinery: ACM code of ethics and professional conduct (2018). https:\/\/www.acm.org\/code-of-ethics"},{"key":"11_CR31","doi-asserted-by":"publisher","unstructured":"Coppock, A., Hill, S.J., Vavreck, L.: The small effects of political advertising are small regardless of context, message, sender, or receiver: evidence from 59 real-time randomized experiments. Sci. Adv. 6(36), eabc4046 (2020). https:\/\/doi.org\/10.1126\/sciadv.abc4046","DOI":"10.1126\/sciadv.abc4046"},{"key":"11_CR32","unstructured":"Coy, P.: Can A.I. and democracy fix each other? New York Times (2023). https:\/\/www.nytimes.com\/2023\/04\/05\/opinion\/artificial-intelligence-democracy-chatgpt.html"},{"key":"11_CR33","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.ins.2015.07.013","volume":"325","author":"N Criado","year":"2015","unstructured":"Criado, N., Such, J.M.: Implicit contextual integrity in online social networks. Infor. Sci. 325, 48\u201369 (2015). https:\/\/doi.org\/10.1016\/j.ins.2015.07.013","journal-title":"Infor. Sci."},{"issue":"1","key":"11_CR34","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1186\/s41239-020-00219-w","volume":"17","author":"M Desch\u00eanes","year":"2020","unstructured":"Desch\u00eanes, M.: Recommender systems to support learners\u2019 agency in a learning context: a systematic review. Int. J. Educ. Technol. High. Educ. 17(1), 50 (2020). https:\/\/doi.org\/10.1186\/s41239-020-00219-w","journal-title":"Int. J. Educ. Technol. High. Educ."},{"issue":"2","key":"11_CR35","doi-asserted-by":"publisher","first-page":"181","DOI":"10.2307\/2331264","volume":"26","author":"N Dierkens","year":"1991","unstructured":"Dierkens, N.: Information asymmetry and equity issues. J. Financ. Quant. Anal. 26(2), 181\u2013199 (1991)","journal-title":"J. Financ. Quant. Anal."},{"issue":"5","key":"11_CR36","doi-asserted-by":"publisher","first-page":"2396","DOI":"10.3390\/ijerph18052396","volume":"18","author":"J Domaradzki","year":"2021","unstructured":"Domaradzki, J.: The Werther effect, the Papageno effect or no effect? A literature review. Int. J. Environ. Res. Public Health 18(5), 2396 (2021). https:\/\/doi.org\/10.3390\/ijerph18052396","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"11_CR37","doi-asserted-by":"publisher","unstructured":"Douglas, T., Forsberg, L.: Three rationales for a legal right to mental integrity. In: Ligthart, S., van Toor, D., Kooijmans, T., Douglas, T., Meynen, G. (eds.) Neurolaw. Palgrave Studies in Law. Neuroscience, and Human Behavior, pp. 179\u2013201. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-69277-3_8","DOI":"10.1007\/978-3-030-69277-3_8"},{"key":"11_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"issue":"1","key":"11_CR39","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1075\/pc.23.1.08dyn","volume":"23","author":"M Dynel","year":"2016","unstructured":"Dynel, M.: Comparing and combining covert and overt untruthfulness: on lying, deception, irony and metaphor. Pragmatics Cogn. 23(1), 174\u2013208 (2016)","journal-title":"Pragmatics Cogn."},{"key":"11_CR40","unstructured":"Ekstrand, J.D., Ekstrand, M.D.: First do no harm: considering and minimizing harm in recommender systems designed for engendering health. In: Engendering Health Workshop at the RecSys 2016 Conference, pp. 1\u20132. ACM (2016)"},{"issue":"4","key":"11_CR41","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s10892-017-9252-2","volume":"21","author":"A Etzioni","year":"2017","unstructured":"Etzioni, A., Etzioni, O.: Incorporating ethics into artificial intelligence. J. Ethics 21(4), 403\u2013418 (2017). https:\/\/doi.org\/10.1007\/s10892-017-9252-2","journal-title":"J. Ethics"},{"key":"11_CR42","unstructured":"European Parliament: EU AI Act: First regulation on Artificial Intelligence (2023). https:\/\/www.europarl.europa.eu\/news\/en\/headlines\/society\/20230601STO93804\/eu-ai-act-first-regulation-on-artificial-intelligence"},{"key":"11_CR43","doi-asserted-by":"crossref","unstructured":"Evans, C., Kasirzadeh, A.: User tampering in reinforcement learning recommender systems (2022)","DOI":"10.1145\/3600211.3604669"},{"issue":"Suppl 27","key":"11_CR44","doi-asserted-by":"publisher","first-page":"6435","DOI":"10.1007\/s11229-021-03141-4","volume":"198","author":"T Everitt","year":"2021","unstructured":"Everitt, T., Hutter, M., Kumar, R., Krakovna, V.: Reward tampering problems and solutions in reinforcement learning: a causal influence diagram perspective. Synthese 198(Suppl 27), 6435\u20136467 (2021)","journal-title":"Synthese"},{"key":"11_CR45","volume-title":"A History and Theory of Informed Consent","author":"RR Faden","year":"1986","unstructured":"Faden, R.R., Beauchamp, T.L.: A History and Theory of Informed Consent. Oxford University Press, Oxford (1986)"},{"key":"11_CR46","doi-asserted-by":"crossref","unstructured":"Ferrero, L.: An introduction to the philosophy of agency. In: The Routledge Handbook of Philosophy of Agency. Routledge (2022)","DOI":"10.4324\/9780429202131"},{"issue":"2","key":"11_CR47","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1023\/B:JOET.0000018773.97209.84","volume":"8","author":"JM Fischer","year":"2004","unstructured":"Fischer, J.M.: Responsibility and manipulation. J. Ethics 8(2), 145\u2013177 (2004). https:\/\/doi.org\/10.1023\/B:JOET.0000018773.97209.84","journal-title":"J. Ethics"},{"key":"11_CR48","doi-asserted-by":"crossref","unstructured":"Frost, C.: Journalism Ethics and Regulation. Taylor & Francis, Milton Park (2015). https:\/\/books.google.co.uk\/books?id=K5b4CgAAQBAJ","DOI":"10.4324\/9781315757810"},{"key":"11_CR49","doi-asserted-by":"crossref","unstructured":"Garnett, M.: Agency and inner freedom. No\u00fbs 51(1), 3\u201323 (2017). http:\/\/www.jstor.org\/stable\/26631435","DOI":"10.1111\/nous.12106"},{"key":"11_CR50","unstructured":"Google LLC: Google AI Review Process. https:\/\/ai.google\/responsibility\/ai-governance-operations\/"},{"issue":"1","key":"11_CR51","first-page":"51","volume":"51","author":"M Gorin","year":"2014","unstructured":"Gorin, M.: Do manipulators always threaten rationality? Am. Philos. Q. 51(1), 51\u201361 (2014)","journal-title":"Am. Philos. Q."},{"key":"11_CR52","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1564.001.0001","volume-title":"Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy","author":"J Habermas","year":"1996","unstructured":"Habermas, J.: Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy. The MIT Press, Cambridge (1996)"},{"issue":"1","key":"11_CR53","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0022-5371(77)80012-1","volume":"16","author":"L Hasher","year":"1977","unstructured":"Hasher, L., Goldstein, D., Toppino, T.: Frequency and the conference of referential validity. J. Verbal Learn. Verbal Behav. 16(1), 107\u2013112 (1977). https:\/\/doi.org\/10.1016\/S0022-5371(77)80012-1","journal-title":"J. Verbal Learn. Verbal Behav."},{"key":"11_CR54","unstructured":"High Level Expert Group on Artificial Intelligence: Ethics Guidelines for Trustworthy AI (2019)"},{"issue":"1","key":"11_CR55","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1146\/annurev-anthro-102313-030413","volume":"43","author":"K Hoeyer","year":"2014","unstructured":"Hoeyer, K., Hogle, L.F.: Informed consent: the politics of intent and practice in medical research ethics. Ann. Rev. Anthropol. 43(1), 347\u2013362 (2014). https:\/\/doi.org\/10.1146\/annurev-anthro-102313-030413","journal-title":"Ann. Rev. Anthropol."},{"key":"11_CR56","doi-asserted-by":"crossref","unstructured":"Hofmann, B.: Suffering: harm to bodies, minds, and persons. In: Handbook of the Philosophy of Medicine, pp. 129\u2013145 (2017)","DOI":"10.1007\/978-94-017-8688-1_63"},{"key":"11_CR57","unstructured":"Howard, P., Ganesh, B., Liotsiou, D., Kelly, J., Fran\u00e7ois, C.: The IRA, social media and political polarization in the United States, 2012\u20132018. U.S, Senate Documents ((2019)"},{"key":"11_CR58","doi-asserted-by":"publisher","unstructured":"Jakesch, M., Bhat, A., Buschek, D., Zalmanson, L., Naaman, M.: Co-writing with opinionated language models affects users\u2019 views. In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. CHI 2023, Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3544548.3581196","DOI":"10.1145\/3544548.3581196"},{"key":"11_CR59","doi-asserted-by":"publisher","unstructured":"Kang, H., Lou, C.: AI agency vs. human agency: understanding human\u2013AI interactions on TikTok and their implications for user engagement. J. Comput.-Mediated Commun. 27(5), zmac014 (2022). https:\/\/doi.org\/10.1093\/jcmc\/zmac014","DOI":"10.1093\/jcmc\/zmac014"},{"key":"11_CR60","doi-asserted-by":"crossref","unstructured":"Kenton, Z., Kumar, R., Farquhar, S., Richens, J., MacDermott, M., Everitt, T.: Discovering agents (2022)","DOI":"10.1016\/j.artint.2023.103963"},{"key":"11_CR61","doi-asserted-by":"publisher","unstructured":"Kidd, I.J.K., Medina, J., Pohlhaus Jr., G. (eds.): The Routledge Handbook of Epistemic Injustice. Routledge, London (2017). https:\/\/doi.org\/10.4324\/9781315212043","DOI":"10.4324\/9781315212043"},{"key":"11_CR62","doi-asserted-by":"publisher","unstructured":"Kligman, M., Culver, C.M.: An analysis of interpersonal manipulation. J. Med. Philos. A Forum Bioeth. Philos. Med. 17(2), 173\u2013197 (1992). https:\/\/doi.org\/10.1093\/jmp\/17.2.173","DOI":"10.1093\/jmp\/17.2.173"},{"issue":"24","key":"11_CR63","doi-asserted-by":"publisher","first-page":"8788","DOI":"10.1073\/pnas.1320040111","volume":"111","author":"ADI Kramer","year":"2014","unstructured":"Kramer, A.D.I., Guillory, J.E., Hancock, J.T.: Experimental evidence of massive-scale emotional contagion through social networks. Proc. Natl Acad. Sci. 111(24), 8788\u20138790 (2014). https:\/\/doi.org\/10.1073\/pnas.1320040111","journal-title":"Proc. Natl Acad. Sci."},{"key":"11_CR64","unstructured":"Krueger, D., Maharaj, T., Leike, J.: Hidden incentives for auto-induced distributional shift (2020)"},{"key":"11_CR65","doi-asserted-by":"publisher","unstructured":"Lavazza, A.: Freedom of thought and mental integrity: The moral requirements for any neural prosthesis. Front. Neurosci. 12, 82 (2018). https:\/\/doi.org\/10.3389\/fnins.2018.00082.https:\/\/www.frontiersin.org\/articles\/10.3389\/fnins.2018.00082","DOI":"10.3389\/fnins.2018.00082."},{"key":"11_CR66","doi-asserted-by":"crossref","unstructured":"Lee, M.K., et al.: WeBuildAI: participatory framework for algorithmic governance. Proc. ACM Hum.-Comput. Interact. 3(CSCW), 1\u201335 (2019)","DOI":"10.1145\/3359283"},{"key":"11_CR67","doi-asserted-by":"publisher","DOI":"10.4135\/9781483306902","volume-title":"Encyclopedia of Deception","author":"TR Levine","year":"2014","unstructured":"Levine, T.R.: Encyclopedia of Deception, vol. 2. Sage Publications, Thousand Oaks (2014)"},{"issue":"2","key":"11_CR68","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1080\/10463283.2021.1876983","volume":"32","author":"S Lewandowsky","year":"2021","unstructured":"Lewandowsky, S., Van Der Linden, S.: Countering misinformation and fake news through inoculation and Prebunking. Eur. Rev. Soc. Psychol. 32(2), 348\u2013384 (2021)","journal-title":"Eur. Rev. Soc. Psychol."},{"key":"11_CR69","doi-asserted-by":"publisher","unstructured":"Linardatos, P., Papastefanopoulos, V., Kotsiantis, S.: Explainable AI: a review of machine learning interpretability methods. Entropy 23(1), 18 (2021). https:\/\/doi.org\/10.3390\/e23010018. https:\/\/www.mdpi.com\/1099-4300\/23\/1\/18","DOI":"10.3390\/e23010018"},{"key":"11_CR70","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"11_CR71","doi-asserted-by":"publisher","unstructured":"Mahon, J.E.: Contemporary Approaches to the Philosophy of Lying. In: The Oxford Handbook of Lying. Oxford University Press, Oxford (2018). https:\/\/doi.org\/10.1093\/oxfordhb\/9780198736578.013.3","DOI":"10.1093\/oxfordhb\/9780198736578.013.3"},{"key":"11_CR72","doi-asserted-by":"crossref","unstructured":"Martin, C.W.: The Philosophy of Deception. Oxford University Press, Oxford (2009)","DOI":"10.1093\/acprof:oso\/9780195327939.001.0001"},{"issue":"1","key":"11_CR73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3425780","volume":"54","author":"Y Mirsky","year":"2021","unstructured":"Mirsky, Y., Lee, W.: The creation and detection of deepfakes: a survey. ACM Comput. Surv. (CSUR) 54(1), 1\u201341 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"11_CR74","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Wash. L. Rev. 79, 119 (2004)","journal-title":"Wash. L. Rev."},{"issue":"1","key":"11_CR75","first-page":"43","volume":"33","author":"R Noggle","year":"1996","unstructured":"Noggle, R.: Manipulative actions: a conceptual and moral analysis. Am. Philoso. Q. 33(1), 43\u201355 (1996)","journal-title":"Am. Philoso. Q."},{"key":"11_CR76","unstructured":"Noggle, R.: The ethics of manipulation. In: Zalta, E.N. (ed.) The Stanford Encyclopedia of Philosophy. Metaphysics Research Lab, Stanford University. Summer 2022 edn. (2022)"},{"key":"11_CR77","unstructured":"Nozick, R.: Coercion. In: Morgenbesser, M.P.S.S.W. (ed.) Philosophy, Science, and Method: Essays in Honor of Ernest Nagel, pp. 440\u201372. St Martin\u2019s Press, New York (1969)"},{"key":"11_CR78","unstructured":"World Health Organization, et al.: Ethics and governance of artificial intelligence for health: WHO guidance (2021)"},{"key":"11_CR79","unstructured":"Ovadya, A.: Towards platform democracy: Policymaking beyond corporate CEOs and partisan pressure. https:\/\/www.belfercenter.org\/publication\/towards-platform-democracy-policymaking-beyond-corporate-ceos-and-partisan-pressure"},{"key":"11_CR80","unstructured":"Ovadya, A.: \u2018Generative CI\u2019 through collective response systems (2023)"},{"key":"11_CR81","unstructured":"Peczenik, A., Karlsson, M.M.: Law, justice and the state: essays on justice and rights. In: Proceedings of the 16th World Congress of the International Association for Philosophy of Law and Social Philosophy (IVR) Reykjav\u00edk, 26 May-2 June, 1993, vol. 1. Franz Steiner Verlag (1995)"},{"key":"11_CR82","doi-asserted-by":"publisher","unstructured":"Pessach, D., Shmueli, E.: A review on fairness in machine learning. ACM Comput. Surv. 55(3), 51:1\u201351:44 (2023). https:\/\/doi.org\/10.1145\/3494672","DOI":"10.1145\/3494672"},{"key":"11_CR83","doi-asserted-by":"publisher","unstructured":"Porlezza, C.: Accuracy in journalism (2019). https:\/\/doi.org\/10.1093\/acrefore\/9780190228613.013.773","DOI":"10.1093\/acrefore\/9780190228613.013.773"},{"key":"11_CR84","volume-title":"Foundations of Ethics","author":"WD Ross","year":"2011","unstructured":"Ross, W.D.: Foundations of Ethics. Read Books Ltd., Redditch (2011)"},{"key":"11_CR85","doi-asserted-by":"publisher","unstructured":"Rubel, A., Castro, C., Pham, A.: Autonomy, agency, and responsibility, pp. 21\u201342. Cambridge University Press (2021). https:\/\/doi.org\/10.1017\/9781108895057.002","DOI":"10.1017\/9781108895057.002"},{"issue":"4","key":"11_CR86","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1086\/292086","volume":"88","author":"J Rudinow","year":"1978","unstructured":"Rudinow, J.: Manipulation. Ethics 88(4), 338\u2013347 (1978). https:\/\/doi.org\/10.1086\/292086","journal-title":"Ethics"},{"issue":"1","key":"11_CR87","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/00048402.2011.646280","volume":"91","author":"B Sachs","year":"2013","unstructured":"Sachs, B.: Why coercion is wrong when it\u2019s wrong. Australas. J. Philos. 91(1), 63\u201382 (2013). https:\/\/doi.org\/10.1080\/00048402.2011.646280","journal-title":"Australas. J. Philos."},{"key":"11_CR88","unstructured":"Sahbane, I., Ward, F.R., \u00c5slund, C.H.: Experiments with detecting and mitigating AI deception (2023)"},{"key":"11_CR89","unstructured":"Sanders, K.: Ethics and Journalism. SAGE Publications, Thousand Oaks (2003). https:\/\/books.google.co.uk\/books?id=5khuTNSQ6rYC"},{"key":"11_CR90","unstructured":"Schlosser, M.: Agency. In: Zalta, E.N. (ed.) The Stanford Encyclopedia of Philosophy. Metaphysics Research Lab. Winter 2019 edn. Stanford University, Stanford (2019)"},{"issue":"4","key":"11_CR91","doi-asserted-by":"publisher","DOI":"10.1111\/phc3.12658","volume":"15","author":"AT Schmidt","year":"2020","unstructured":"Schmidt, A.T., Engelen, B.: The ethics of nudging: an overview. Philos. Compass 15(4), e12658 (2020). https:\/\/doi.org\/10.1111\/phc3.12658","journal-title":"Philos. Compass"},{"issue":"3","key":"11_CR92","doi-asserted-by":"publisher","first-page":"393","DOI":"10.2307\/1422132","volume":"95","author":"M Schwartz","year":"1982","unstructured":"Schwartz, M.: Repetition and rated truth value of statements. Am. J. Psychol. 95(3), 393\u2013407 (1982). https:\/\/doi.org\/10.2307\/1422132","journal-title":"Am. J. Psychol."},{"key":"11_CR93","unstructured":"E.P. for the Future of Science: Technology: the impact of the general data protection regulation (GDPR) on artificial intelligence (2020)"},{"issue":"10","key":"11_CR94","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1111\/j.1751-9020.2011.00413.x","volume":"5","author":"E Selinger","year":"2011","unstructured":"Selinger, E., Whyte, K.: Is there a right way to nudge? The practice and ethics of choice architecture. Soc. Compass 5(10), 923\u2013935 (2011). https:\/\/doi.org\/10.1111\/j.1751-9020.2011.00413.x","journal-title":"Soc. Compass"},{"issue":"1","key":"11_CR95","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1196\/annals.1305.014","volume":"1013","author":"W Sententia","year":"2004","unstructured":"Sententia, W.: Neuroethical considerations: cognitive liberty and converging technologies for improving human cognition. Ann. New York Acad. Sci. 1013(1), 221\u2013228 (2004). https:\/\/doi.org\/10.1196\/annals.1305.014","journal-title":"Ann. New York Acad. Sci."},{"issue":"2","key":"11_CR96","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1111\/j.1468-0114.2011.01390.x","volume":"92","author":"M Seymour Fahmy","year":"2011","unstructured":"Seymour Fahmy, M.: Love, respect, and interfering with others. Pacific Philos. Q. 92(2), 174\u2013192 (2011). https:\/\/doi.org\/10.1111\/j.1468-0114.2011.01390.x","journal-title":"Pacific Philos. Q."},{"key":"11_CR97","doi-asserted-by":"publisher","unstructured":"Shiffrin, S.V.: Speech Matters: On Lying, Morality, and the Law. Princeton University Press, Princeton (2014). https:\/\/doi.org\/10.1515\/9781400852529","DOI":"10.1515\/9781400852529"},{"key":"11_CR98","doi-asserted-by":"publisher","unstructured":"Spahn, A.: And lead us (not) into persuasion...? Persuasive technology and the ethics of communication. Sci. Eng. Ethics 18(4), 633\u2013650 (2012). https:\/\/doi.org\/10.1007\/s11948-011-9278-y","DOI":"10.1007\/s11948-011-9278-y"},{"issue":"12","key":"11_CR99","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1038\/s42256-022-00585-2","volume":"4","author":"M Srikumar","year":"2022","unstructured":"Srikumar, M., et al.: Advancing ethics review practices in AI research. Nat. Mach. Intell. 4(12), 1061\u20131064 (2022). https:\/\/doi.org\/10.1038\/s42256-022-00585-2","journal-title":"Nat. Mach. Intell."},{"issue":"3","key":"11_CR100","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1111\/j.1933-1592.2011.00527.x","volume":"85","author":"CS Sripada","year":"2012","unstructured":"Sripada, C.S.: What makes a manipulated agent unfree? Philos. Phenomenological Res. 85(3), 563\u2013593 (2012). https:\/\/doi.org\/10.1111\/j.1933-1592.2011.00527.x","journal-title":"Philos. Phenomenological Res."},{"issue":"2","key":"11_CR101","first-page":"413","volume":"32","author":"CR Sunstein","year":"2015","unstructured":"Sunstein, C.R.: The ethics of nudging. Yale J. Regul. 32(2), 413\u2013450 (2015)","journal-title":"Yale J. Regul."},{"key":"11_CR102","doi-asserted-by":"crossref","unstructured":"Sunstein, C.R.: The Ethics of Influence: Government in the Age of Behavioral Science. Cambridge University Press, Cambridge (2016)","DOI":"10.1017\/CBO9781316493021"},{"key":"11_CR103","doi-asserted-by":"publisher","unstructured":"Taylor, J.S.: Practical Autonomy and Bioethics. Routledge, New York (2009). https:\/\/doi.org\/10.4324\/9780203873991","DOI":"10.4324\/9780203873991"},{"issue":"1","key":"11_CR104","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1186\/s12954-018-0254-6","volume":"15","author":"SL Thomas","year":"2018","unstructured":"Thomas, S.L., et al.: Young people\u2019s awareness of the timing and placement of gambling advertising on traditional and social media platforms: a study of 11\u201316-year-old\u2019s in Australia. Harm Reduction J. 15(1), 51 (2018). https:\/\/doi.org\/10.1186\/s12954-018-0254-6","journal-title":"Harm Reduction J."},{"key":"11_CR105","unstructured":"Thorburn, L., Stray, J., Bengani, P.: Is optimizing for engagement changing us? Understanding recommenders (2022). https:\/\/medium.com\/understanding-recommenders\/is-optimizing-for-engagement-changing-us-9d0ddfb0c65e"},{"key":"11_CR106","doi-asserted-by":"publisher","unstructured":"Tushnet, R.: Chapter 11: Truth and Advertising: The Lanham Act and Commercial Speech Doctrine. Edward Elgar Publishing, Cheltenham, UK (2008). https:\/\/doi.org\/10.4337\/9781848441316.00020","DOI":"10.4337\/9781848441316.00020"},{"key":"11_CR107","unstructured":"UK Department for Science, Innovation and Technology: A Pro-innovation Approach to AI Regulation (2023)"},{"key":"11_CR108","unstructured":"US Office of Science and Technology Policy: Blueprint for an AI Bill of Rights (2022)"},{"key":"11_CR109","doi-asserted-by":"publisher","unstructured":"Vold, K., Whittlestone, J.: Privacy, Autonomy, and Personalised Targeting: rethinking how personal data is used. Apollo-University of Cambridge Repository (2019). https:\/\/doi.org\/10.17863\/CAM.43129","DOI":"10.17863\/CAM.43129"},{"key":"11_CR110","volume-title":"Privacy is Power: Why and How You Should Take Back Control of Your Data","author":"C V\u00e9liz","year":"2020","unstructured":"V\u00e9liz, C.: Privacy is Power: Why and How You Should Take Back Control of Your Data. Transworld Digital, London (2020)"},{"key":"11_CR111","volume-title":"Personal Information: Privacy and the Law","author":"R Wacks","year":"1989","unstructured":"Wacks, R.: Personal Information: Privacy and the Law. Clarendon Press, Oxford (1989)"},{"key":"11_CR112","unstructured":"Waller, M., Rodrigues, O., Cocarascu, O.: Bias mitigation methods for binary classification decision-making systems: survey and recommendations (2023)"},{"key":"11_CR113","unstructured":"Ward, F.R., Everitt, T., Belardinelli, F., Toni, F.: Honesty is the best policy: defining and mitigating AI deception. https:\/\/causalincentives.com\/pdfs\/deception-ward-2023.pdf"},{"key":"11_CR114","unstructured":"Ward, F.R., Toni, F., Belardinelli, F.: A causal perspective on AI deception in games. In: Proceedings of the 2022 International Conference on Logic Programming Workshops (2022)"},{"key":"11_CR115","unstructured":"Ward, F.R., Toni, F., Belardinelli, F.: On agent incentives to manipulate human feedback in multi-agent reward learning scenarios. In: AAMAS, pp. 1759\u20131761 (2022)"},{"key":"11_CR116","unstructured":"Ward, F.R., Toni, F., Belardinelli, F.: Defining deception in structural causal games. In: Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, pp. 2902\u20132904 (2023)"},{"key":"11_CR117","doi-asserted-by":"publisher","unstructured":"Ward, S.J.A.: Objectivity and bias in journalism (2019). https:\/\/doi.org\/10.1093\/acrefore\/9780190228613.013.853","DOI":"10.1093\/acrefore\/9780190228613.013.853"},{"key":"11_CR118","unstructured":"Weidinger, L., et al.: Ethical and social risks of harm from language models (2021). https:\/\/arxiv.org\/abs\/2112.04359"},{"key":"11_CR119","doi-asserted-by":"publisher","unstructured":"Wood, A.W.: Coercion, manipulation, exploitation. In: Manipulation: Theory and Practice. Oxford University Press, Oxford (2014). https:\/\/doi.org\/10.1093\/acprof:oso\/9780199338207.003.0002","DOI":"10.1093\/acprof:oso\/9780199338207.003.0002"},{"key":"11_CR120","volume-title":"The Age of Surveillance Capitalism","author":"S Zuboff","year":"2019","unstructured":"Zuboff, S.: The Age of Surveillance Capitalism. Public Affairs, New York (2019)"}],"container-title":["Lecture Notes in Computer Science","Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43264-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T16:21:54Z","timestamp":1730046114000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43264-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031432637","9783031432644"],"references-count":120,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43264-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"7 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EUMAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Multi-Agent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eumas2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/vadimmalvone.github.io\/eumas2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PhD - Short Papers (20 submissions; 16 short papers accepted for proceedings)","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}