{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:04:29Z","timestamp":1772301869219,"version":"3.50.1"},"reference-count":90,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T00:00:00Z","timestamp":1553731200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T00:00:00Z","timestamp":1553731200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s00146-019-00886-y","type":"journal-article","created":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T12:21:56Z","timestamp":1553775716000},"page":"355-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":92,"title":["15 challenges for AI: or what AI (currently) can\u2019t do"],"prefix":"10.1007","volume":"35","author":[{"given":"Thilo","family":"Hagendorff","sequence":"first","affiliation":[]},{"given":"Katharina","family":"Wezel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,28]]},"reference":[{"key":"886_CR1","first-page":"167","volume-title":"Managing technology in society: the approach of constructive technology assessment","author":"M Akrich","year":"1995","unstructured":"Akrich M (1995) User representations: practice, methods and sociology. In: Rip A, Misa TJ, Schot J (eds) Managing technology in society: the approach of constructive technology assessment. Pinter, London, pp\u00a0167\u2013184"},{"key":"886_CR2","unstructured":"Alcorn MA, Li Q, Gong Z, Wang C, Mai L, Ku W-S, Nguyen A (2018) Strike (with) a pose: neural networks are easily fooled by strange poses of familiar objects. arXiv:1811.11553"},{"key":"886_CR3","unstructured":"Amodei D, Olah C, Steinhardt J, Christiano P, Schulman J, Man\u00e9 D (2017) Concrete problems in AI safety. arXiv:1606.06565"},{"key":"886_CR4","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1177\/1461444816676645","volume":"20","author":"M Ananny","year":"2017","unstructured":"Ananny M, Crawford K (2017) Seeing without knowing: limitations of the transparency ideal and its application to algorithmic accountability. New Media Soc 20:973\u2013989","journal-title":"New Media Soc"},{"key":"886_CR5","unstructured":"Angwin J, Larson J, Mattu S, Kirchner L (2016) Machine bias: there\u2019s software used across the country to predict future criminals. And it\u2019s biased against blacks. https:\/\/www.propublica.org\/article\/machine-bias-risk-assessments-in-criminal-sentencing . Accessed 18 Jan 2018"},{"key":"886_CR6","first-page":"671","volume":"104","author":"S Barocas","year":"2016","unstructured":"Barocas S, Selbst AD (2016) Big data\u2019s disparate impact. Calif Law Rev 104:671\u2013732","journal-title":"Calif Law Rev"},{"key":"886_CR7","doi-asserted-by":"publisher","DOI":"10.14361\/9783839442135","volume-title":"Network public governance: on privacy and the informational self","author":"A Belliger","year":"2018","unstructured":"Belliger A, Krieger DJ (2018) Network public governance: on privacy and the informational self. Transcript, Bielefeld"},{"key":"886_CR8","unstructured":"Bhattacharya A (2016) Elon Musk\u2019s OpenAI is using Reddit to teach AI to speak like humans. https:\/\/qz.com\/806321\/open-ai-reddit-human-conversation\/ . Accessed 24 Oct 2018"},{"key":"886_CR9","unstructured":"Biggio B, Nelson B, Laskov P (2013) Poisoning attacks against support vector machines. arXiv:1206.6389"},{"key":"886_CR10","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"D Boyd","year":"2012","unstructured":"Boyd D, Crawford K (2012) Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf Commun Soc 15:662\u2013679","journal-title":"Inf Commun Soc"},{"key":"886_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1017\/CBO9780511845239.004","volume-title":"The Cambridge handbook of information and computer ethics","author":"P Brey","year":"2010","unstructured":"Brey P (2010) Values in technology and disclosive computer ethics. In: Floridi L (ed) The Cambridge handbook of information and computer ethics. Cambridge University Press, Cambridge, pp\u00a041\u201358"},{"key":"886_CR12","unstructured":"Brundage M, Avin S, Clark J, Toner H, Eckersley P, Garfinkel B, Dafoe A, Scharre P, Zeitziff T, Filar B, Anderson H, Roff H, Allen GC, Steinhardt J, Flynn C, h\u00c9igeartaigh S, Beard S, Belfield H, Farquhar S, Lyle C, Crootof R, Evans O, Page M, Bryson J, Yampolskiy R, Amodei D (2018) The malicious use of artificial intelligence: forecasting, prevention, and mitigation. arXiv:1802.07228"},{"key":"886_CR13","unstructured":"Buolamwini J, Gebru T (2018) Gender shades: intersectional accuracy disparities in commercial gender classification. In: Sorelle AF, Wilson C (eds) Proceedings of machine learning research, 81st edn. PMLR, pp\u00a01\u201315"},{"key":"886_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2053951715622512","volume":"3","author":"J Burrell","year":"2016","unstructured":"Burrell J (2016) How the machine \u2018thinks\u2019: understanding opacity in machine learning algorithms. Big Data Soc 3:1\u201312","journal-title":"Big Data Soc"},{"key":"886_CR15","first-page":"22","volume":"38","author":"E Burton","year":"2017","unstructured":"Burton E, Goldsmith J, Koening S, Kuipers B, Mattei N, Walsh T (2017) Ethical considerations in artificial intelligence courses. Artif Intell Mag 38:22\u201336","journal-title":"Artif Intell Mag"},{"key":"886_CR16","unstructured":"Campolo A, Sanfilippo M, Whittaker M, Crawford K (2017) AI now 2017 report. https:\/\/assets.ctfassets.net\/8wprhhvnpfc0\/1A9c3ZTCZa2KEYM64Wsc2a\/8636557c5fb14f2b74b2be64c3ce0c78\/_AI_Now_Institute_2017_Report_.pdf . Accessed 2 Oct 2018"},{"key":"886_CR17","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2018) Audio adversarial examples: targeted attacks on speech-to-text. arXiv:1801.01944","DOI":"10.1109\/SPW.2018.00009"},{"key":"886_CR18","first-page":"1934","volume":"11","author":"AA Casilli","year":"2017","unstructured":"Casilli AA (2017) Digital labor studies go global: toward a digital decolonial turn. Int J Commun 11:1934\u20133954","journal-title":"Int J Commun"},{"key":"886_CR19","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1080\/01972243.1994.9960160","volume":"10","author":"R Clarke","year":"1994","unstructured":"Clarke R (1994) The digital persona and its application to data surveillance. Inf Soc 10:77\u201392","journal-title":"Inf Soc"},{"key":"886_CR20","unstructured":"Crawford K, Joler V (2018) Anatomy of an AI system. https:\/\/anatomyof.ai\/ . Accessed 6 Feb 2019"},{"key":"886_CR21","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1038\/nature14422","volume":"521","author":"A Cully","year":"2015","unstructured":"Cully A, Clune J, Tarapore D, Mouret J-B (2015) Robots that can adapt like animals. Nature 521:503\u2013507","journal-title":"Nature"},{"key":"886_CR22","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1515\/popets-2015-0007","volume":"2015","author":"A Datta","year":"2015","unstructured":"Datta A, Tschantz CM, Datta A (2015) Automated experiments on ad privacy settings: a tale of opacity, choice, and discrimination. Proc Priv Enhancing Technol 2015:92\u2013112. arXiv:1408.6491","journal-title":"Proc Priv Enhancing Technol"},{"key":"886_CR23","unstructured":"Diakopoulos N (2014) Algorithmic accountability reporting: on the investigation of black boxes. Tow Center for Digital Journalism, Columbia Academic Commons, pp 1\u201333"},{"key":"886_CR24","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/2347736.2347755","volume":"55","author":"P Domingos","year":"2012","unstructured":"Domingos P (2012) A Few useful things to know about machine learning. Commun ACM 55:78\u201387","journal-title":"Commun ACM"},{"key":"886_CR25","volume-title":"What computers can\u2019t do: a critique of artificial reason","author":"H Dreyfu\u00df","year":"1972","unstructured":"Dreyfu\u00df H (1972) What computers can\u2019t do: a critique of artificial reason. Harper & Row, New York"},{"key":"886_CR26","unstructured":"Elgammal A, Liu B, Elhoseiny M, Mazzone M (2017) CAN: creative adversarial networks, generating \u201cArt\u201d by Learning about styles and deviating from style norms. arXiv:1706.07068"},{"key":"886_CR27","first-page":"1","volume":"85","author":"MC Elish","year":"2017","unstructured":"Elish MC, Boyd D (2017) Situating methods in the magic of big data and AI. Commun Monogr 85:1\u201324","journal-title":"Commun Monogr"},{"key":"886_CR28","doi-asserted-by":"publisher","first-page":"247","DOI":"10.14361\/9783839435304-011","volume-title":"Machine learning\u2014Medien, Infrastrukturen und Technologien der K\u00fcnstlichen Intelligenz","author":"C Engemann","year":"2018","unstructured":"Engemann C (2018) Rekursionen \u00fcber K\u00f6rper: machine learning-trainingsdatens\u00e4tze als Arbeit am Index. In: Engemann C, Sudmann A (eds) Machine learning\u2014Medien, Infrastrukturen und Technologien der K\u00fcnstlichen Intelligenz. Transcript, Bielefeld, pp\u00a0247\u2013268"},{"key":"886_CR29","unstructured":"Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Xiao C, Prakash A, Kohno T, Song D (2018) Robust physical-world attacks on deep learning models. arXiv:1707.08945"},{"key":"886_CR30","unstructured":"Fang L (2019) Google hired gig economy workers to improve artificial intelligence in controversial drone-targeting project. https:\/\/theintercept.com\/2019\/02\/04\/google-ai-project-maven-figure-eight\/ . Accessed 13 Feb 2019"},{"key":"886_CR31","unstructured":"Fink M (2004) Object classification from a single example utilizing class relevance metrics. In: Advances in neural information processing systems 17 (NIPS 2004), pp 1\u20138"},{"key":"886_CR32","unstructured":"Gebru T, Morgenstern J, Vecchione B, Vaughan JW, Wallach H, Daume\u00e9 H III, Crawford K (2018) Datasheets for datasets. arXiv:1803.09010"},{"key":"886_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7551\/mitpress\/9302.001.0001","volume-title":"\u201cRaw Data\u201d is an oxymoron","author":"L Gitelman","year":"2013","unstructured":"Gitelman L, Jackson V (2013) Introduction. In: Gitelman L (ed) \u201cRaw Data\u201d is an oxymoron. The MIT Press, Cambridge, pp\u00a01\u201314"},{"key":"886_CR34","doi-asserted-by":"crossref","unstructured":"Goldsmith J, Burton E (2017) Why teaching ethics to AI practitioners is important. ACM SIGCAS Comput Soc 110\u2013114","DOI":"10.1609\/aaai.v31i1.11139"},{"key":"886_CR35","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/3134599","volume":"61","author":"I Goodfellow","year":"2018","unstructured":"Goodfellow I, McDaniel P, Papernot N (2018) Making machine learning robust against adversarial inputs. Commun ACM 61:56\u201366","journal-title":"Commun ACM"},{"key":"886_CR36","doi-asserted-by":"crossref","unstructured":"Goswami G, Ratha N, Agarwal A, Singh R, Vatsa M (2018) Unravelling robustness of deep learning based face recognition against adversarial attacks. arXiv:1803.00401","DOI":"10.1609\/aaai.v32i1.12341"},{"key":"886_CR37","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1080\/00071310020015280","volume":"51","author":"KD Haggerty","year":"2000","unstructured":"Haggerty KD, Ericson RV (2000) The surveillant assemblage. Br J Sociol 51:605\u2013622","journal-title":"Br J Sociol"},{"key":"886_CR38","unstructured":"Hendrycks D, Dietterich TG (2018) Benchmarking neural network robustness to common corruptions and surface variations. arXiv:1807.01697"},{"key":"886_CR39","volume-title":"Zur Kritik der instrumentellen Vernunft","author":"M Horkheimer","year":"2007","unstructured":"Horkheimer M (2007) Zur Kritik der instrumentellen Vernunft. Fischer Taschenbuch Verlag, Frankfurt"},{"key":"886_CR40","volume-title":"Dialektik der Aufkl\u00e4rung: Philosophische Fragmente","author":"M Horkheimer","year":"1947","unstructured":"Horkheimer M, Adorno TW (1947) Dialektik der Aufkl\u00e4rung: Philosophische Fragmente. Querido Verlag, Amsterdam"},{"key":"886_CR41","unstructured":"Humphries C (2018) Digital immortality: how your life\u2019s data means a version of you could live forever. https:\/\/www.technologyreview.com\/s\/612257\/digital-version-after-death\/ . Accessed 26 Oct 2018"},{"key":"886_CR42","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1177\/0306312706058426","volume":"36","author":"S Hyysalo","year":"2016","unstructured":"Hyysalo S (2016) Representations of use and practice-bound imaginaries in automating the safety of the elderly. Soc Stud Sci 36:599\u2013626","journal-title":"Soc Stud Sci"},{"key":"886_CR43","doi-asserted-by":"crossref","unstructured":"Jagielski M, Oprea A, Biggio B, Liu C, Nita-Rotaru C, Li B (2018) Manipulating machine learning: poisoning attacks and countermeasures for regression learning. arXiv:1804.00308","DOI":"10.1109\/SP.2018.00057"},{"key":"886_CR44","doi-asserted-by":"crossref","unstructured":"Jia R, Liang P (2017) Adversarial examples for evaluating reading comprehension systems. arXiv:1707.07328","DOI":"10.18653\/v1\/D17-1215"},{"key":"886_CR45","doi-asserted-by":"crossref","unstructured":"Jiang L, Stocco A, Losey DM, Abernethy JA, Prat CS, Rao RPN (2018) BrainNet: a multi-person brain-to-brain interface for direct collaboration between brains","DOI":"10.1101\/425066"},{"key":"886_CR46","unstructured":"Kansky K, Silver D, M\u00e9ly DA, Eldawy M, L\u00e1zaro-Gredilla M, Lou X, Dorfman N, Sidor S, Phoenix S, George D (2017) Schema networks: zero-shot transfer with a generative causal model of intuitive physics. arXiv:1706.04317"},{"key":"886_CR47","first-page":"607","volume":"15","author":"S Karas","year":"2004","unstructured":"Karas S (2004) Loving big brother. Albany Law J Sci Technol 15:607\u2013637","journal-title":"Albany Law J Sci Technol"},{"key":"886_CR48","unstructured":"Khan B, Gawalt JR, Cook FL (2016) Science & engineering indicators. National Science Foundation, pp 1\u2013893"},{"key":"886_CR49","doi-asserted-by":"crossref","unstructured":"Kitchin R (2014) Thinking critically about and researching algorithms. The Programmable City Working Paper, vol 5, pp 1\u201329","DOI":"10.2139\/ssrn.2515786"},{"key":"886_CR50","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s10708-014-9601-7","volume":"80","author":"R Kitchin","year":"2015","unstructured":"Kitchin R, Lauriault TP (2015) Small data in the era of big data. GeoJournal 80:463\u2013475","journal-title":"GeoJournal"},{"key":"886_CR51","first-page":"1","volume":"40","author":"BM Lake","year":"2016","unstructured":"Lake BM, Ullman TD, Tenenbaum JB, Gershman SJ (2016) Building machines that learn and think like people. Behav Brain Sci 40:1\u201358. arXiv:1604.00289","journal-title":"Behav Brain Sci"},{"key":"886_CR52","unstructured":"Lehman J, Clune J, Misevic D, Adami C, Altenberg L, Beaulieu J, Bentley PJ, Bernard S, Beslon G, Bryson DM, Chrabaszcz P, Cheney N, Cully A, Doncieux S, Dyer FC, Ellefsen KO, Feldt R, Fischer S, Forrest S, Fr\u00e9noy A, Gagn\u00e9 C, Le Goff L, Grabowski LM, Hodjat B, Hutter F, Keller L, Knibbe C, Krcah P, Lenski RE, Lipson H, MacCurdy R, Maestre C, Miikkulainen R, Mitri S, Moriarty DE, Mouret J-B, Nguyen A, Ofria C, Parizeau M, Parsons D, Pennock RT, Punch WF, Ray TS, Schoenauer M, Shulte E, Sims K, Stanley KO, Taddei F, Tarapore D, Thibault S, Weimer W, Watson R, Yosinski J (2018) The surprising creativity of digital evolution: a collection of anecdotes from the evolutionary computation and artificial life research communities. arXiv:1803.03453"},{"key":"886_CR53","unstructured":"Levin S (2016) A beauty contest was judged by AI and the robots didn\u2019t like dark skin. https:\/\/www.theguardian.com\/technology\/2016\/sep\/08\/artificial-intelligence-beauty-contest-doesnt-like-black-people . Accessed 10 Sept 2016"},{"key":"886_CR54","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TAFFC.2017.2667642","volume":"9","author":"X Li","year":"2018","unstructured":"Li X, Hong X, Moilanen A, Huang X, Pfister T, Zhao G, Pietik\u00e4inen M (2018) Towards reading hidden emotions: a comparative study of spontaneous micro-expression spotting and recognition methods. IEEE Trans Affect Comput 9:563\u2013577","journal-title":"IEEE Trans Affect Comput"},{"key":"886_CR55","doi-asserted-by":"publisher","first-page":"3187","DOI":"10.1007\/s00330-015-3743-y","volume":"25","author":"GJS Litjens","year":"2015","unstructured":"Litjens GJS, Barentsz JO, Karssemeijer N, Huisman HJ (2015) Clinical evaluation of a computer-aided diagnosis system for determining cancer aggressiveness in prostate MRI. Eur Radiol 25:3187\u20133199","journal-title":"Eur Radiol"},{"key":"886_CR56","first-page":"69","volume-title":"Theorizing surveillance: the panopticon and beyond","author":"M Los","year":"2006","unstructured":"Los M (2006) Looking into the future: surveillance, globalization and the totalitarian potential. In: Lyon D (ed) Theorizing surveillance: the panopticon and beyond. Willan Publishing, Cullompton, pp\u00a069\u201394"},{"key":"886_CR57","first-page":"13","volume-title":"Surveillance as social sorting: privacy, risk, and digital discrimination","author":"D Lyon","year":"2003","unstructured":"Lyon D (2003) Surveillance as social sorting: computer codes and mobile bodies. In: Lyon D (ed) Surveillance as social sorting: privacy, risk, and digital discrimination. Routledge, London, pp\u00a013\u201330"},{"key":"886_CR58","unstructured":"Marcus G (2018) Deep learning: a critical appraisal. arXiv:1801.00631"},{"key":"886_CR59","unstructured":"Markow W, Braganza S, Taska B, Miller SM, Hughes D (2017) The quant crunch: how the demand for data science skills is disrupting the job market. Burning Glass Technologies, pp 1\u201325"},{"key":"886_CR60","unstructured":"Metz C (2017) Tech giants are paying huge salaries for scarce A.I. talent. https:\/\/www.nytimes.com\/2017\/10\/22\/technology\/artificial-intelligence-experts-salaries.html . Accessed 25 Feb 2019"},{"key":"886_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2053951716679679","volume":"3","author":"BD Mittelstadt","year":"2016","unstructured":"Mittelstadt BD, Allo P, Taddeo M, Wachter S, Floridi L (2016) The ethics of algorithms: mapping the debate. Big Data Soc 3:1\u201321","journal-title":"Big Data Soc"},{"key":"886_CR62","doi-asserted-by":"crossref","unstructured":"Mittelstadt B, Russell C, Wachter S (2019) Explaining explanations in AI. In: Proceedings of the conference on fairness, accountability, and transparency\u2014FAT* \u201919, pp 1\u201310","DOI":"10.1145\/3287560.3287574"},{"key":"886_CR63","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih V, Kavukcuoglu K, Silver D, Rusu AA, Veness J, Bellemare MG, Graves A, Riedmiller M, Fidjeland AK, Ostrovski G, Petersen S, Beattie C, Sadik A, Antonoglou I, King H, Kumaran D, Wierstra D, Legg S, Hassabis D (2015) Human-level control through deep reinforcement learning. Nature 518:529\u2013533","journal-title":"Nature"},{"key":"886_CR64","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MRA.2012.2192811","volume":"19","author":"M Mori","year":"2012","unstructured":"Mori M (2012) The uncanny valley. Robot Autom Mag IEEE 19:98\u2013100","journal-title":"Robot Autom Mag IEEE"},{"key":"886_CR65","volume-title":"Weapons of math destruction: how big data increases inequality and threatens democracy","author":"C O\u2019Neil","year":"2016","unstructured":"O\u2019Neil C (2016) Weapons of math destruction: how big data increases inequality and threatens democracy. Crown Publishers, New York"},{"key":"886_CR66","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1038\/s41562-018-0335-2","volume":"2","author":"C \u00d6hman","year":"2018","unstructured":"\u00d6hman C, Floridi L (2018) An ethical framework for the digital afterlife industry. Nat Hum Behav 2:318\u2013320","journal-title":"Nat Hum Behav"},{"key":"886_CR67","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1177\/0162243903259190","volume":"29","author":"N Oudshoorn","year":"2016","unstructured":"Oudshoorn N, Rommes E, Stienstra M (2016) Configuring the user as everybody: gender and design cultures in information and communication technologies. Sci Technol Hum Values 29:30\u201363","journal-title":"Sci Technol Hum Values"},{"key":"886_CR68","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061","volume-title":"The black box society: the secret algorithms that control money and information","author":"F Pasquale","year":"2015","unstructured":"Pasquale F (2015) The black box society: the secret algorithms that control money and information. Harvard University Press, Cambridge"},{"key":"886_CR69","doi-asserted-by":"crossref","first-page":"121","DOI":"10.7551\/mitpress\/9302.003.0009","volume-title":"\u201cRaw Data\u201d is an oxymoron","author":"R Raley","year":"2013","unstructured":"Raley R (2013) Dataveillance and counterveillance. In: Gitelman L (ed) \u201cRaw Data\u201d is an oxymoron. The MIT Press, Cambridge, pp\u00a0121\u2013146"},{"key":"886_CR70","unstructured":"Ribeiro MT, Singh S, Guestrin C (2016) Introduction to local interpretable model-agnostic explanations (LIME). https:\/\/www.oreilly.com\/learning\/introduction-to-local-interpretable-model-agnostic-explanations-lime . Accessed 26 Oct 2018"},{"key":"886_CR71","unstructured":"Rosenfeld A, Zemel R, Tsotsos JK (2018) The elephant in the room. arXiv:1808.03305"},{"key":"886_CR72","first-page":"143","volume-title":"Privacy, due process and the computational turn: the philosophy of law meets the philosophy of technology","author":"A Rouvroy","year":"2013","unstructured":"Rouvroy A (2013) The end(s) of critique: data behaviourism versus due process. In: Hildebrandt M, Vries K de (eds) Privacy, due process and the computational turn: the philosophy of law meets the philosophy of technology. Routledge, Abingdon, pp\u00a0143\u2013168"},{"key":"886_CR73","unstructured":"Rusu AA, Rabinowitz NC, Desjardins G, Soyer H, Kirkpatrick J, Kavukcuoglu K, Pascanu R, Hadsell R (2016) Progressive neural networks. arXiv:1606.04671"},{"key":"886_CR74","unstructured":"Samek W, Binder A, Montavon G, Bach S, M\u00fcller K-R (2015) Evaluating the visualization of what a deep neural network has learned. arXiv:1509.06321"},{"key":"886_CR75","volume-title":"Click here to kill everybody","author":"B Schneier","year":"2018","unstructured":"Schneier B (2018) Click here to kill everybody. W. W. Norton & Company, New York"},{"key":"886_CR76","unstructured":"Shillingford B, Assael Y, Hoffman MW, Paine T, Hughes C, Prabhu U, Liao H, Sak H, Rao K, Bennett L, Mulville M, Coppin B, Laurie B, Senior A, Freitas Nd (2018) Large-scale visual speech recognition. arXiv:1807.05162"},{"key":"886_CR77","unstructured":"Shoham Y, Perrault R, Brynjolfsson E, Clark J, Manyika J, Niebles JC, Lyons T, Etchemendy J, Grosz B, Bauer Z (2018) The AI Index 2018 Annual Report, pp 1\u201394"},{"key":"886_CR78","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1038\/nature24270","volume":"550","author":"D Silver","year":"2017","unstructured":"Silver D, Schrittwieser J, Simonyan K, Antonoglou I, Huang A, Guez A, Hubert T, Baker L, Lai M, Bolton A, Chen Y, Lillicrap T, Hui F, Sifre L, van den Driessche G, Graepel T, Hassabis D (2017) Mastering the game of go without human knowledge. Nature 550:354\u2013359","journal-title":"Nature"},{"key":"886_CR79","unstructured":"Simonite T (2016) How google plans to solve artificial intelligence. https:\/\/www.technologyreview.com\/s\/601139\/how-google-plans-to-solve-artificial-intelligence\/ . Accessed 18 Oct 2018"},{"key":"886_CR80","unstructured":"Sitawarin C, Bhagoji AN, Mosenia A, Chiang M, Mittal P (2018) DARTS: deceiving autonomous cars with toxic signs. arXiv:1802.06430"},{"key":"886_CR81","doi-asserted-by":"publisher","first-page":"8252","DOI":"10.1073\/pnas.1810141115","volume":"115","author":"W Steffen","year":"2018","unstructured":"Steffen W, Rockstr\u00f6m J, Richardson K, Lenton TM, Folke C, Liverman D, Summerhayes CP, Barnosky AD, Cornell SE, Crucifix M, Donges JF, Fetzer I, Lade SJ, Scheffer M, Winkelmann R, Schellnhuber HJ (2018) Trajectories of the earth system in the anthropocene. Proc Natl Acad Sci USA 115:8252\u20138259","journal-title":"Proc Natl Acad Sci USA"},{"key":"886_CR82","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv:1312.6199"},{"key":"886_CR83","unstructured":"Tram\u00e9r F, Zhang F, Juels A, Reiter MK, Ristenpart T (2016) Stealing machine learning models via prediction APIs. In: Proceedings of the 25th USENIX security symposium, Austin, pp\u00a0601\u2013618"},{"key":"886_CR84","unstructured":"Whittaker M, Crawford K, Dobbe R, Fried G, Kaziunas E, Mathur V, Myers West S, Richardson R, Schultz J, Schwartz O (2018) AI now report 2018. AI Now, pp 1\u201362"},{"key":"886_CR85","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1136\/amiajnl-2013-002162","volume":"21","author":"J Wiens","year":"2014","unstructured":"Wiens J, Guttag J, Horvitz E (2014) A study in transfer learning: leveraging data from multiple hospitals to enhance hospital-specific predictions. J Am Med Inform Assoc 21:699\u2013706","journal-title":"J Am Med Inform Assoc"},{"key":"886_CR86","unstructured":"Wilkens A (2018) Frauenanteil an Informatik-Studienanf\u00e4ngern stagniert. https:\/\/www.heise.de\/newsticker\/meldung\/Frauenanteil-an-Informatik-Studienanfaengern-stagniert-4035140.html . Accessed 24 Oct 2018"},{"key":"886_CR87","unstructured":"Williams RM, Yampolskiy RV (2018) Optical illusions images dataset. arXiv:1810.00415"},{"key":"886_CR88","unstructured":"Wu X, Zhang X (2016) Responses to critiques on machine learning of criminality perceptions (addendum of arXiv:1611.04135). arXiv:1\u201314"},{"key":"886_CR89","unstructured":"Yuan L (2018) How cheap labor drives China\u2019s A.I. ambitions. https:\/\/www.nytimes.com\/2018\/11\/25\/business\/china-artificial-intelligence-labeling.html . Accessed 30 Nov 2018"},{"key":"886_CR90","doi-asserted-by":"crossref","unstructured":"Zhao M, Li T, Alsheikh MA, Tian Y, Zhao H, Torralba A, Katabi D (2018) Through-wall human pose estimation using radio signals. In: Computer vision and pattern recognition (CVPR), pp 7356\u20137365","DOI":"10.1109\/CVPR.2018.00768"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-019-00886-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00146-019-00886-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-019-00886-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T23:53:51Z","timestamp":1694735631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00146-019-00886-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,28]]},"references-count":90,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["886"],"URL":"https:\/\/doi.org\/10.1007\/s00146-019-00886-y","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,28]]},"assertion":[{"value":"19 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}