{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T18:42:41Z","timestamp":1774291361552,"version":"3.50.1"},"reference-count":107,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,1,11]],"date-time":"2020-01-11T00:00:00Z","timestamp":1578700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,1,11]],"date-time":"2020-01-11T00:00:00Z","timestamp":1578700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2020,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology (not incorporated here are empirical and technical investigations). Here, we explicate and analyse the expression of values of accuracy, privacy, fairness and equality, property and ownership, and accountability and transparency in this context. We find that values are sensitive to disvalue if algorithms are designed, implemented or deployed inappropriately or without sufficient consideration for their value impacts, potentially resulting in problems including discrimination and constrained autonomy. Furthermore, we outline a framework of conceptual relations of values indicated by our analysis, and potential value tensions in their implementation and deployment with a view towards supporting future research, and supporting the value sensitive design of algorithms in justice and security.<\/jats:p>","DOI":"10.1007\/s00146-019-00932-9","type":"journal-article","created":{"date-parts":[[2020,1,11]],"date-time":"2020-01-11T06:02:42Z","timestamp":1578722562000},"page":"533-555","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Algorithms and values in justice and security"],"prefix":"10.1007","volume":"35","author":[{"given":"Paul","family":"Hayes","sequence":"first","affiliation":[]},{"given":"Ibo","family":"van de Poel","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Steen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,11]]},"reference":[{"issue":"3","key":"932_CR205","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1177\/1461444816676645","volume":"20","author":"M Ananny","year":"2018","unstructured":"Ananny M, Crawford K (2018) Seeing without knowing: limitations of the transparency ideal and its application to algorithmic accountability. New Media Soc 20(3):973\u2013989. https:\/\/doi.org\/10.1177\/1461444816676645","journal-title":"New Media Society"},{"issue":"6","key":"932_CR1","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/0263276411417430","volume":"28","author":"L Amoore","year":"2011","unstructured":"Amoore L (2011) Data derivatives: on the emergence of a security risk calculus for our times. Theory Cult Soc 28(6):24\u201343. https:\/\/doi.org\/10.1177\/0263276411417430","journal-title":"Theory Cult Soc"},{"issue":"2","key":"932_CR2","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s10611-005-1717-8","volume":"43","author":"L Amoore","year":"2005","unstructured":"Amoore L, De Goede M (2005) Governance, risk and dataveillance in the war on terror. Crime Law Soc Change 43(2):149\u2013173. https:\/\/doi.org\/10.1007\/s10611-005-1717-8","journal-title":"Crime Law Soc Change"},{"key":"932_CR3","unstructured":"Angwin J, Larson J, Mattu S, Kirchner L (2016) Machine Bias, ProPublica. https:\/\/www.propublica.org\/article\/machine-bias-risk-assessments-in-criminal-sentencing. Accessed 19 Oct 2018"},{"key":"932_CR4","unstructured":"Aristotle (2004) The Nicomachean ethics. New edition. English edition: Tredennick H. (Trans: Thomson JAK). Penguin Classics, NY"},{"key":"932_CR5","doi-asserted-by":"crossref","DOI":"10.1515\/9781400826070","volume-title":"The good in the right: a theory of intuition and intrinsic value","author":"R Audi","year":"2005","unstructured":"Audi R (2005) The good in the right: a theory of intuition and intrinsic value. Princeton University Press, Princeton"},{"key":"932_CR6","doi-asserted-by":"crossref","unstructured":"Barocas S, Nissenbaum H (2013) Big data\u2019s end run around anonymity and consent. In: Privacy, Big Data, and the Public Good: Frameworks for Engagement, pp 44\u201375. https:\/\/doi.org\/10.1017\/CBO9781107590205.004","DOI":"10.1017\/CBO9781107590205.004"},{"key":"932_CR7","first-page":"671","volume":"104","author":"S Barocas","year":"2016","unstructured":"Barocas S, Selbst AD (2016) Big data\u2019s disparate impact. Calif Law Rev 104:671\u2013732","journal-title":"Calif Law Rev"},{"key":"932_CR8","first-page":"1","volume":"81","author":"R Binns","year":"2018","unstructured":"Binns R (2018) Fairness in machine learning: lessons from political philosophy. J Mach Learn Res 81:1\u201311","journal-title":"J Mach Learn Res"},{"issue":"18","key":"932_CR9","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.1177\/0886260516632356","volume":"33","author":"FD Boateng","year":"2018","unstructured":"Boateng FD (2018) Crime reporting behavior: do attitudes toward the police matter? J Interpers Violence 33(18):2891\u20132916. https:\/\/doi.org\/10.1177\/0886260516632356","journal-title":"J Interpers Violence"},{"issue":"5","key":"932_CR10","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1177\/0003122417725865","volume":"82","author":"S Brayne","year":"2017","unstructured":"Brayne S (2017) Big data surveillance: the case of policing. Am Sociol Rev 82(5):977\u20131008. https:\/\/doi.org\/10.1177\/0003122417725865","journal-title":"Am Sociol Rev"},{"issue":"1","key":"932_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1177\/0093854808326545","volume":"36","author":"T Brennan","year":"2009","unstructured":"Brennan T, Dieterich W, Ehret B (2009) Evaluating the predictive validity of the compas risk and needs assessment system. Crim Justice Behav 36(1):21\u201340. https:\/\/doi.org\/10.1177\/0093854808326545","journal-title":"Crim Justice Behav"},{"key":"932_CR12","unstructured":"Brink D (2018) Mill\u2019s moral and political philosophy. In: Zalta EN (ed) The Stanford encyclopedia of philosophy. Winter 2018. Metaphysics Research Lab, Stanford University. https:\/\/plato.stanford.edu\/archives\/win2018\/entries\/mill-moral-political\/. Accessed 8 Oct 2019"},{"issue":"1","key":"932_CR13","doi-asserted-by":"publisher","first-page":"205395171562251","DOI":"10.1177\/2053951715622512","volume":"3","author":"J Burrell","year":"2016","unstructured":"Burrell J (2016) How the machine \u201cthinks\u201d: understanding opacity in machine learning algorithms. Big Data Soc 3(1):2053951715622512. https:\/\/doi.org\/10.1177\/2053951715622512","journal-title":"Big Data Soc"},{"key":"932_CR14","doi-asserted-by":"crossref","unstructured":"Carton S, Helsby J, Joseph K, Mahmud A, Park Y, Walsh J, Cody C, Patterson C, Haynes L, Ghani R (2016) Identifying police officers at risk of adverse events. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. NY, USA: ACM (KDD \u201916), pp 67\u201376. https:\/\/doi.org\/10.1145\/2939672.2939698","DOI":"10.1145\/2939672.2939698"},{"key":"932_CR16","first-page":"93","volume":"55","author":"K Crawford","year":"2014","unstructured":"Crawford K, Schultz J (2014) Big data and due process: toward a framework to redress predictive privacy harms. Boston Coll Law Rev 55:93\u2013128","journal-title":"Boston Coll Law Rev"},{"issue":"1","key":"932_CR17","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1353\/hrq.2012.0001","volume":"34","author":"EJ Criddle","year":"2012","unstructured":"Criddle EJ, Fox-Decent E (2012) Human rights, emergencies, and the rule of law. Hum Rights Q 34(1):39\u201387. https:\/\/doi.org\/10.1353\/hrq.2012.0001","journal-title":"Hum Rights Q"},{"key":"932_CR18","doi-asserted-by":"crossref","unstructured":"D\u2019Ignazio C, Klein L (2018, draft) Data feminism. MIT Press. https:\/\/bookbook.pubpub.org\/data-feminism. Accessed 17 Sept 2019","DOI":"10.7551\/mitpress\/11805.001.0001"},{"issue":"3","key":"932_CR19","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s13347-015-0211-1","volume":"29","author":"J Danaher","year":"2016","unstructured":"Danaher J (2016) The threat of algocracy: reality, resistance and accommodation. Philos Technol 29(3):245\u2013268. https:\/\/doi.org\/10.1007\/s13347-015-0211-1","journal-title":"Philos Technol"},{"issue":"2","key":"932_CR20","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1086\/498461","volume":"116","author":"S Darwall","year":"2006","unstructured":"Darwall S (2006) The value of autonomy and autonomy of the will. Ethics 116(2):263\u2013284","journal-title":"Ethics"},{"issue":"4","key":"932_CR21","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s13347-017-0293-z","volume":"31","author":"PB De Laat","year":"2018","unstructured":"De Laat PB (2018) Algorithmic decision-making based on machine learning from big data: can transparency restore accountability? Philos Technol 31(4):525\u2013541. https:\/\/doi.org\/10.1007\/s13347-017-0293-z","journal-title":"Philos Technol"},{"key":"932_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-019-09509-y","author":"PB De Laat","year":"2019","unstructured":"De Laat PB (2019) The disciplinary power of predictive algorithms: a Foucauldian perspective. Ethics Inf Technol. https:\/\/doi.org\/10.1007\/s10676-019-09509-y","journal-title":"Ethics Inf Technol"},{"issue":"1","key":"932_CR23","doi-asserted-by":"publisher","first-page":"eaao5580","DOI":"10.1126\/sciadv.aao5580","volume":"4","author":"J Dressel","year":"2018","unstructured":"Dressel J, Farid H (2018) The accuracy, fairness, and limits of predicting recidivism. Sci Adv 4(1):eaao5580. https:\/\/doi.org\/10.1126\/sciadv.aao5580","journal-title":"Sci Adv"},{"key":"932_CR24","volume-title":"Automating inequality: how high-tech tools profile, police, and punish the poor","author":"V Eubanks","year":"2018","unstructured":"Eubanks V (2018) Automating inequality: how high-tech tools profile, police, and punish the poor. St. Martin\u2019s Press, New York"},{"key":"932_CR25","unstructured":"Ferguson AG (2017a) Is \u201cBig Data\u201d racist? Why policing by data isn\u2019t necessarily objective, Ars Technica. https:\/\/arstechnica.com\/tech-policy\/2017\/12\/is-big-data-racist-why-policing-by-data-isnt-necessarily-objective\/. Accessed 26 Mar 2019"},{"issue":"5","key":"932_CR26","first-page":"1109","volume":"94","author":"AG Ferguson","year":"2017","unstructured":"Ferguson AG (2017b) Policing predictive policing. Washington Univ Law Rev 94(5):1109\u20131189","journal-title":"Washington Univ Law Rev"},{"issue":"4","key":"932_CR28","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s10676-006-0001-7","volume":"7","author":"L Floridi","year":"2005","unstructured":"Floridi L (2005) The ontological interpretation of informational privacy. Ethics Inf Technol 7(4):185\u2013200. https:\/\/doi.org\/10.1007\/s10676-006-0001-7","journal-title":"Ethics Inf Technol"},{"key":"932_CR29","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199641321.001.0001","volume-title":"The ethics of information","author":"L Floridi","year":"2013","unstructured":"Floridi L (2013) The ethics of information. Oxford University Press, Oxford"},{"key":"932_CR30","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-46608-8_5","volume-title":"Group privacy: new challenges of data technologies","author":"L Floridi","year":"2017","unstructured":"Floridi L (2017) Group privacy: a defence and an interpretation. In: Taylor L, Floridi L, Sloot B (eds) Group privacy: new challenges of data technologies. Springer International Publishing, Cham, pp 83\u2013100 https:\/\/doi.org\/10.1007\/978-3-319-46608-8_5(Philosophical Studies Series)"},{"issue":"4","key":"932_CR31","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1007\/s11023-018-9482-5","volume":"28","author":"L Floridi","year":"2018","unstructured":"Floridi L, Cowls J, Beltrametti M, Chatila R, Chazerand P, Dignum V, Luetege C, Madelin R, Pagallo U, Rossi F, Schafer B, Valcke P, Vayena E (2018) AI4People\u2014an ethical framework for a good AI Society: opportunities, risks, principles, and recommendations. Mind Mach 28(4):689\u2013707. https:\/\/doi.org\/10.1007\/s11023-018-9482-5","journal-title":"Mind Mach"},{"issue":"1","key":"932_CR32","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/0306-4573(94)90020-5","volume":"30","author":"C Fox","year":"1994","unstructured":"Fox C, Levitin A, Redman T (1994) The notion of data and its quality dimensions. Inf Process Manag 30(1):9\u201319. https:\/\/doi.org\/10.1016\/0306-4573(94)90020-5","journal-title":"Inf Process Manag"},{"key":"932_CR33","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199698318.001.0001","volume-title":"Sovereignty\u2019s promise: the state as fiduciary","author":"E Fox-Decent","year":"2011","unstructured":"Fox-Decent E (2011) Sovereignty\u2019s promise: the state as fiduciary. Oxford University Press, New York (Oxford Constitutional Theory)"},{"issue":"4","key":"932_CR34","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1017\/S1352325210000017","volume":"15","author":"E Fox-Decent","year":"2009","unstructured":"Fox-Decent E, Criddle EJ (2009) The fiduciary constitution of human rights. Leg Theory 15(4):301\u2013336. https:\/\/doi.org\/10.1017\/S1352325210000017","journal-title":"Leg Theory"},{"key":"932_CR35","doi-asserted-by":"crossref","unstructured":"Friedman B, Khan PH, Borning A (2013) Value sensitive design and information systems. In: Early engagement and new technologies: Opening up the laboratory, pp 55\u201395. https:\/\/doi.org\/10.1007\/978-94-007-7844-3_4","DOI":"10.1007\/978-94-007-7844-3_4"},{"key":"932_CR36","first-page":"348","volume-title":"Human-computer interaction and management information systems: foundations","author":"B Friedman","year":"2006","unstructured":"Friedman B, Khan PH, Borning A (2006) Value sensitive design and information systems. In: Zhang P, Galletta DF (eds) Human-computer interaction and management information systems: foundations, 1st edn. Routledge, New York, pp 348\u2013372","edition":"1"},{"key":"932_CR37","unstructured":"Garvie C, Alvaro B, Frankle J (2016) The perpetual line-up, perpetual line up. https:\/\/www.perpetuallineup.org\/. Accessed 27 Mar 2019"},{"issue":"1","key":"932_CR38","doi-asserted-by":"publisher","first-page":"3","DOI":"10.24908\/ss.v7i1.3304","volume":"7","author":"K Guzik","year":"2009","unstructured":"Guzik K (2009) Discrimination by design: predictive data mining as security practice in the United States\u2019 \u201cwar on terrorism\u201d. Surveill Soc 7(1):3\u201320. https:\/\/doi.org\/10.24908\/ss.v7i1.3304","journal-title":"Surveill Soc"},{"key":"932_CR39","doi-asserted-by":"crossref","unstructured":"Harcourt B (2005) Against prediction: sentencing, policing, and punishing in an actuarial age. Public Law & Legal Theory. https:\/\/chicagounbound.uchicago.edu\/public_law_and_legal_theory\/22","DOI":"10.2139\/ssrn.756945"},{"key":"932_CR40","volume-title":"Harris, O\u2019Boyle & Warbrick: law of the european convention on human rights","author":"D Harris","year":"2009","unstructured":"Harris D, O\u2019Boyle M, Bates EP, Buckley C (2009) Harris, O\u2019Boyle & Warbrick: law of the european convention on human rights, 2nd edn. OUP Oxford, Oxford","edition":"2"},{"key":"932_CR41","unstructured":"Hautala L (2018) Facebook kept sharing users\u2019 friend data in special deals, report says, CNET. https:\/\/www.cnet.com\/news\/facebook-kept-sharing-users-friend-data-in-special-deals-report-says\/. Accessed 1 Mar 2019"},{"key":"932_CR42","unstructured":"Hayes PD (2018) An analysis of emerging ethical and human rights issues in the harvesting of data from social media during emergency response to natural hazards. Thesis. Trinity College Dublin. School of Religions, Theology & Ecumenics. Irish School of Ecumenics. https:\/\/www.tara.tcd.ie\/handle\/2262\/82930. Accessed 25 Oct 2018"},{"key":"932_CR43","doi-asserted-by":"crossref","unstructured":"Heald D (2006) Varieties of transparency. In: Hood C, Heald D (eds) Transparency: the key to better governance? Oxford University Press for The British Academy, Oxford, pp 25\u201343.https:\/\/global.oup.com\/academic\/product\/transparency-the-key-to-better-governance-9780197263839?q=9780197263839&lang=en&cc=gb. Accessed 19 Oct 2018","DOI":"10.5871\/bacad\/9780197263839.003.0002"},{"key":"932_CR44","unstructured":"High-Level Expert Group on AI (2019) Ethics guidelines for trustworthy AI. https:\/\/ec.europa.eu\/futurium\/en\/ai-alliance-consultation\/guidelines#Top. Accessed 4 Oct 2019"},{"key":"932_CR45","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-1-4020-6914-7_2","volume-title":"Profiling the European citizen: cross-disciplinary perspectives","author":"M Hildebrandt","year":"2008","unstructured":"Hildebrandt M (2008) Defining profiling: a new type of knowledge? In: Hildebrandt M, Gutwirth S (eds) Profiling the European citizen: cross-disciplinary perspectives. Springer, Dordrecht, pp 17\u201345 https:\/\/doi.org\/10.1007\/978-1-4020-6914-7_2"},{"key":"932_CR46","volume-title":"Oxford essays in jurisprudence: a collaborative work","author":"T Honor\u00e9","year":"1961","unstructured":"Honor\u00e9 T (1961) Ownership. In: Guest AG (ed) Oxford essays in jurisprudence: a collaborative work, 1st edn. Oxford University Press, Oxford","edition":"1"},{"key":"932_CR201","unstructured":"Hursthouse R, Pettigrove G (2016) Virtue ethics. In: Zalta EN (ed) The stanford encyclopedia of philosophy. https:\/\/plato.stanford.edu\/archives\/win2018\/entries\/ethics-virtue\/. Accessed 30 Dec 2019"},{"key":"932_CR47","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v2i2\/3.3373","author":"L Introna","year":"2004","unstructured":"Introna L, Wood D (2004) Picturing algorithmic surveillance: the politics of facial recognition systems. Surveill Soc. https:\/\/doi.org\/10.24908\/ss.v2i2\/3.3373","journal-title":"Surveill Soc"},{"issue":"1","key":"932_CR48","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1177\/1477370810376562","volume":"8","author":"J K\u00e4\u00e4ri\u00e4inen","year":"2011","unstructured":"K\u00e4\u00e4ri\u00e4inen J, Sir\u00e9n R (2011) Trust in the police, generalized trust and reporting crime. Eur J Criminol 8(1):65\u201381. https:\/\/doi.org\/10.1177\/1477370810376562","journal-title":"Eur J Criminol"},{"key":"932_CR49","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-319-46608-8_3","volume-title":"Group privacy: new challenges of data technologies","author":"L Kammourieh","year":"2017","unstructured":"Kammourieh L, Baar T, Berens J, Letouz\u00e9 E, Manske J, Palmer J, Sangokoya D, Vinck P (2017) Group privacy in the age of big data. In: Taylor L, Floridi L, Sloot B (eds) Group privacy: new challenges of data technologies. Springer International Publishing, Cham, pp 37\u201366 https:\/\/doi.org\/10.1007\/978-3-319-46608-8_3(Philosophical Studies Series)"},{"key":"932_CR50","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11140.001.0001","volume-title":"Data science","author":"JD Kelleher","year":"2018","unstructured":"Kelleher JD, Tierney B (2018) Data science. The MIT Press, Cambridge"},{"issue":"2083","key":"932_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1098\/rsta.2016.0115","volume":"374","author":"R Kitchin","year":"2016","unstructured":"Kitchin R (2016) The ethics of smart cities and urban science. Philos Trans R Soc A Math Phys Eng Sci 374(2083):1\u201315. https:\/\/doi.org\/10.1098\/rsta.2016.0115","journal-title":"Philos Trans R Soc A Math Phys Eng Sci"},{"issue":"1","key":"932_CR52","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1080\/1369118X.2016.1154087","volume":"20","author":"R Kitchin","year":"2017","unstructured":"Kitchin R (2017) Thinking critically about and researching algorithms. Inf Commun Soc 20(1):14\u201329. https:\/\/doi.org\/10.1080\/1369118X.2016.1154087","journal-title":"Inf Commun Soc"},{"key":"932_CR53","doi-asserted-by":"crossref","unstructured":"Kleinig J, Mameli P, Miller S, Salane D, Schwartz A (2011) Security and privacy: global standards for ethical identity management in contemporary liberal democratic states. ANU E Press, Acton. http:\/\/doi.org\/10.22459\/SP.12.2011. Accessed 28 Feb 2019","DOI":"10.22459\/SP.12.2011"},{"issue":"2","key":"932_CR54","first-page":"483","volume":"38","author":"B-J Koops","year":"2017","unstructured":"Koops B-J, Newell BC, Timan T, \u0160korv\u00e1nek I, Chokrevski T, Gali\u010d M (2017) A typology of privacy. Univ Pa J Int Law 38(2):483\u2013575","journal-title":"Univ Pa J Int Law"},{"issue":"4","key":"932_CR55","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s13347-017-0279-x","volume":"31","author":"B Lepri","year":"2018","unstructured":"Lepri B, Oliver N, Letouz\u00e9 E, Pentland A, Vinck P (2018) Fair, transparent, and accountable algorithmic decision-making processes. Philos Technol 31(4):611\u2013627. https:\/\/doi.org\/10.1007\/s13347-017-0279-x","journal-title":"Philos Technol"},{"key":"932_CR56","volume-title":"Chicago police department and predictive policing","author":"J Lewin","year":"2015","unstructured":"Lewin J, Wernick M (2015) Chicago police department and predictive policing. International Association of Chief\u2019s of Police, Chicago"},{"issue":"5","key":"932_CR57","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1111\/j.1740-9713.2016.00960.x","volume":"13","author":"K Lum","year":"2016","unstructured":"Lum K, Isaac W (2016) To predict and serve? Significance 13(5):14\u201319. https:\/\/doi.org\/10.1111\/j.1740-9713.2016.00960.x","journal-title":"Significance"},{"key":"932_CR58","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-319-46608-8_8","volume-title":"Group privacy: new challenges of data technologies","author":"A Mantelero","year":"2017","unstructured":"Mantelero A (2017) From group privacy to collective privacy: towards a new dimension of privacy and data protection in the big data era. In: Taylor L, Floridi L, Sloot B (eds) Group privacy: new challenges of data technologies. Springer International Publishing, Cham, pp 139\u2013158 https:\/\/doi.org\/10.1007\/978-3-319-46608-8_8(Philosophical Studies Series)"},{"issue":"2","key":"932_CR59","first-page":"133","volume":"31","author":"T May","year":"1994","unstructured":"May T (1994) The concept of autonomy. Am Philos Q 31(2):133\u2013144","journal-title":"Am Philos Q"},{"key":"932_CR60","volume-title":"Big data: a revolution that will transform how we live, work and think","author":"V Mayer-Schonberger","year":"2013","unstructured":"Mayer-Schonberger V, Cukier K (2013) Big data: a revolution that will transform how we live, work and think. John Murray, London"},{"key":"932_CR61","volume-title":"Data mining and predictive analysis: intelligence gathering and crime analysis","author":"C McCue","year":"2015","unstructured":"McCue C (2015) Data mining and predictive analysis: intelligence gathering and crime analysis, 2nd edn. Butterworth-Heinemann, Waltham","edition":"2"},{"issue":"2","key":"932_CR62","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s10676-009-9194-x","volume":"11","author":"A Men\u00e9ndez-Viso","year":"2009","unstructured":"Men\u00e9ndez-Viso A (2009) Black and white transparency: contradictions of a moral metaphor. Ethics Inf Technol 11(2):155\u2013162","journal-title":"Ethics Inf Technol"},{"key":"932_CR202","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511818622","volume-title":"The moral foundations of social institutions: a philosophical study","author":"S Miller","year":"2009","unstructured":"Miller S (2009) The moral foundations of social institutions: a philosophical study, 1st edn. Cambridge University Press, Cambridge, New York","edition":"1"},{"key":"932_CR63","unstructured":"Miller D (2017) Justice. https:\/\/plato.stanford.edu\/archives\/fall2017\/entries\/justice\/. Accessed 28 Feb 2019"},{"issue":"2","key":"932_CR64","doi-asserted-by":"publisher","first-page":"205395171667967","DOI":"10.1177\/2053951716679679","volume":"3","author":"BD Mittelstadt","year":"2016","unstructured":"Mittelstadt BD, Allo P, Taddeo M, Mariarosario T, Wachter S, Floridi L (2016) The ethics of algorithms: mapping the debate. Big Data Soc 3(2):2053951716679679. https:\/\/doi.org\/10.1177\/2053951716679679","journal-title":"Big Data Soc"},{"issue":"3","key":"932_CR65","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/270858.270866","volume":"27","author":"JH Moor","year":"1997","unstructured":"Moor JH (1997) Towards a theory of privacy in the information age. SIGCAS Comput Soc 27(3):27\u201332. https:\/\/doi.org\/10.1145\/270858.270866","journal-title":"SIGCAS Comput Soc"},{"issue":"7","key":"932_CR66","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1080\/10439463.2016.1253695","volume":"28","author":"LB Moses","year":"2018","unstructured":"Moses LB, Chan J (2018) Algorithmic prediction in policing: assumptions, evaluation, and accountability. Polic Soc 28(7):806\u2013822. https:\/\/doi.org\/10.1080\/10439463.2016.1253695","journal-title":"Polic Soc"},{"key":"932_CR67","unstructured":"Niculescu Dinca V (2016) Policing matter(s). Datawyse \/ Universitaire Pers Maastricht. https:\/\/cris.maastrichtuniversity.nl\/portal\/en\/publications\/policing-matters(b911f31c-f8e8-44e9-999c-5c8edcafd7b7).html. Accessed 19 Oct 2018"},{"issue":"1","key":"932_CR68","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/BF02639315","volume":"2","author":"H Nissenbaum","year":"1996","unstructured":"Nissenbaum H (1996) Accountability in a computerized society. Sci Eng Ethics 2(1):25\u201342. https:\/\/doi.org\/10.1007\/BF02639315","journal-title":"Sci Eng Ethics"},{"key":"932_CR69","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891","volume-title":"Privacy in context: technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2009","unstructured":"Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life, 1st edn. Stanford Law Books, Stanford","edition":"1"},{"key":"932_CR70","volume-title":"Weapons of math destruction: how big data increases inequality and threatens democracy","author":"C O\u2019Neil","year":"2016","unstructured":"O\u2019Neil C (2016) Weapons of math destruction: how big data increases inequality and threatens democracy, 1st edn. Crown, New York","edition":"1"},{"key":"932_CR71","unstructured":"Palantir (n.d.) Law enforcement, Palantir. https:\/\/palantir.com\/solutions\/law-enforcement\/index.html. Accessed 21 Jan 2019"},{"key":"932_CR72","volume-title":"The Black Box Society: the secret algorithms that control money and information","author":"F Pasquale","year":"2016","unstructured":"Pasquale F (2016) The Black Box Society: the secret algorithms that control money and information, Reprint edn. Harvard University Press, Cambridge","edition":"Reprint"},{"issue":"3","key":"932_CR73","doi-asserted-by":"publisher","first-page":"267","DOI":"10.3233\/IP-180074","volume":"23","author":"R Peeters","year":"2018","unstructured":"Peeters R, Schuilenburg M (2018) Machine justice: governing security through the bureaucracy of algorithms. Inf Polity 23(3):267\u2013280. https:\/\/doi.org\/10.3233\/IP-180074","journal-title":"Inf Polity"},{"issue":"1","key":"932_CR74","doi-asserted-by":"publisher","first-page":"117","DOI":"10.15779\/Z38SS13","volume":"31","author":"J Penney","year":"2016","unstructured":"Penney J (2016) Chilling effects: online surveillance and wikipedia use. Berkeley Technol Law J 31(1):117. https:\/\/doi.org\/10.15779\/Z38SS13","journal-title":"Berkeley Technol Law J"},{"key":"932_CR75","doi-asserted-by":"crossref","unstructured":"Perry WL, McInnis B, Price CC, Smith S, Hollywood JS (2013) Predictive policing; the role of crime forecasting in law enforcement operations. RR-233-NIJ. RAND. https:\/\/www.rand.org\/pubs\/research_reports\/RR233.html. Accessed 20 Dec 2018","DOI":"10.7249\/RR233"},{"key":"932_CR76","unstructured":"Police (UK) (nd) Automatic Number Plate Recognition\u2014Police.uk. https:\/\/www.police.uk\/information-and-advice\/automatic-number-plate-recognition\/. Accessed 27 Mar 2019"},{"key":"932_CR77","unstructured":"Privacy International (nd) Social media intelligence, privacy international. https:\/\/privacyinternational.org\/explainer\/55\/social-media-intelligence. Accessed 26 Mar 2019"},{"key":"932_CR78","doi-asserted-by":"crossref","DOI":"10.4159\/9780674042582","volume-title":"A theory of justice","author":"J Rawls","year":"1999","unstructured":"Rawls J (1999) A theory of justice, Revised edn. Harvard University Press, Cambridge","edition":"Revised"},{"issue":"2","key":"932_CR79","first-page":"192","volume":"94","author":"R Richardson","year":"2019","unstructured":"Richardson R, Schultz J, Crawford K (2019) Dirty data, bad predictions: how civil rights violations impact police data, predictive policing systems, and justice. N Y Univ Law Rev 94(2):192\u2013233","journal-title":"N Y Univ Law Rev"},{"issue":"1","key":"932_CR80","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10806-014-9517-8","volume":"28","author":"Z Robaey","year":"2015","unstructured":"Robaey Z (2015) Looking for moral responsibility in ownership: a way to deal with hazards of GMOs. J Agric Environ Ethics 28(1):43\u201356. https:\/\/doi.org\/10.1007\/s10806-014-9517-8","journal-title":"J Agric Environ Ethics"},{"issue":"1","key":"932_CR81","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10676-009-9183-0","volume":"11","author":"E Rooksby","year":"2009","unstructured":"Rooksby E (2009) How to be a responsible slave: managing the use of expert information systems. Ethics Inf Technol 11(1):81\u201390. https:\/\/doi.org\/10.1007\/s10676-009-9183-0","journal-title":"Ethics Inf Technol"},{"issue":"3","key":"932_CR83","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s11292-016-9272-0","volume":"12","author":"J Saunders","year":"2016","unstructured":"Saunders J, Hunt P, Hollywood JS (2016) Predictions put into practice: a quasi-experimental evaluation of Chicago\u2019s predictive policing pilot. J Exp Criminol 12(3):347\u2013371. https:\/\/doi.org\/10.1007\/s11292-016-9272-0","journal-title":"J Exp Criminol"},{"issue":"3","key":"932_CR84","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1037\/0022-3514.53.3.550","volume":"53","author":"SH Schwartz","year":"1987","unstructured":"Schwartz SH, Bilsky W (1987) Toward a universal psychological structure of human values. J Pers Soc Psychol 53(3):550\u2013562. https:\/\/doi.org\/10.1037\/0022-3514.53.3.550","journal-title":"J Pers Soc Psychol"},{"key":"932_CR85","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-04135-3_9","volume-title":"The ethics of information warfare","author":"TW Simpson","year":"2014","unstructured":"Simpson TW (2014) The wrong in cyberattacks. In: Floridi L, Taddeo M (eds) The ethics of information warfare. Springer International Publishing, Cham, pp 141\u2013154 https:\/\/doi.org\/10.1007\/978-3-319-04135-3_9(Law, Governance and Technology Series)"},{"key":"932_CR86","unstructured":"Solove DJ (2005) A taxonomy of privacy. SSRN Scholarly Paper ID 667622. Social Science Research Network, Rochester, NY. https:\/\/papers.ssrn.com\/abstract=667622. Accessed 19 Oct 2018"},{"key":"932_CR87","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/0-387-31168-8_4","volume-title":"The information society: emerging landscapes","author":"BC Stahl","year":"2006","unstructured":"Stahl BC (2006) Accountability and reflective responsibility in information systems. In: Zielinski C, Duquenoy P, Kimppa K (eds) The information society: emerging landscapes. Springer, US (IFIP International Federation for Information Processing), pp 51\u201368"},{"issue":"1","key":"932_CR88","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/j.1467-9973.2006.00474.x","volume":"38","author":"HT Tavani","year":"2007","unstructured":"Tavani HT (2007) Philosophical theories of privacy: implications for an adequate online privacy policy. Metaphilosophy 38(1):1\u201322","journal-title":"Metaphilosophy"},{"issue":"2","key":"932_CR89","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/269012.269021","volume":"41","author":"GK Tayi","year":"1998","unstructured":"Tayi GK, Ballou DP (1998) Examining data quality. Commun ACM 41(2):54\u201357. https:\/\/doi.org\/10.1145\/269012.269021","journal-title":"Commun ACM"},{"key":"932_CR90","unstructured":"Tu Y-C (2014) Transparency in software engineering. Thesis. ResearchSpace@Auckland. https:\/\/researchspace.auckland.ac.nz\/handle\/2292\/22092. Accessed 19 Oct 2018"},{"issue":"2","key":"932_CR91","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10676-009-9187-9","volume":"11","author":"M Turilli","year":"2009","unstructured":"Turilli M, Floridi L (2009) The ethics of information transparency. Ethics Inf Technol 11(2):105\u2013112. https:\/\/doi.org\/10.1007\/s10676-009-9187-9","journal-title":"Ethics Inf Technol"},{"key":"932_CR203","unstructured":"Vallor S (2018) Technology and the virtues: a philosophical guide to a future worth wanting. Reprint edition. Oxford University Press"},{"key":"932_CR92","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-94-007-1878-4_3","volume-title":"Moral responsibility: beyond free will and determinism","author":"I Van de Poel","year":"2011","unstructured":"Van de Poel I (2011) The relation between forward-looking and backward-looking responsibility. In: Vincent NA, Poel I, Hoven J (eds) Moral responsibility: beyond free will and determinism. Springer, Dordrecht, pp 37\u201352 https:\/\/doi.org\/10.1007\/978-94-007-1878-4_3(Library of Ethics and Applied Philosophy)"},{"key":"932_CR93","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-94-007-7762-0_20","volume-title":"Philosophy and engineering: reflections on practice, principles and process","author":"I Van de Poel","year":"2013","unstructured":"Van de Poel I (2013) Translating values into design requirements. In: Michelfelder DP, McCarthy N, Goldberg DE (eds) Philosophy and engineering: reflections on practice, principles and process. Springer, Dordrecht, pp 253\u2013266 https:\/\/doi.org\/10.1007\/978-94-007-7762-0_20(Philosophy of Engineering and Technology)"},{"key":"932_CR94","unstructured":"Van de Poel I (2018, draft) Core values and value conflicts in cybersecurity; beyond privacy versus security. In: Christen M, Loi M, Gordijn B (eds) The ethics of cybersecurity. Springer, Dordrecht"},{"key":"932_CR95","volume-title":"Ethics, technology, and engineering: an introduction","author":"I Van de Poel","year":"2011","unstructured":"Van de Poel I, Royakkers L (2011) Ethics, technology, and engineering: an introduction, 1st edn. Wiley-Blackwell, Malden","edition":"1"},{"issue":"1","key":"932_CR96","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s11948-011-9277-z","volume":"18","author":"J Van den Hoven","year":"2012","unstructured":"Van den Hoven J, Lokhorst G-J, van de Poel I (2012) Engineering and the problem of moral overload. Sci Eng Ethics 18(1):143\u2013155. https:\/\/doi.org\/10.1007\/s11948-011-9277-z","journal-title":"Sci Eng Ethics"},{"key":"932_CR97","first-page":"97","volume-title":"Public administration in an information age: a handbook","author":"MJ Van den Hoven","year":"1998","unstructured":"Van den Hoven MJ (1998) Moral responsibility, public office and information technology. In: Snellen ITM, Donk WBH (eds) Public administration in an information age: a handbook. IOS Press, Amsterdam, pp 97\u2013112"},{"issue":"2","key":"932_CR98","doi-asserted-by":"publisher","first-page":"182","DOI":"10.24908\/ss.v13i2.5315","volume":"13","author":"L Van der Velden","year":"2015","unstructured":"Van der Velden L (2015) Leaky apps and data shots: technologies of leakage and insertion in NSA-surveillance. Surveill Soc 13(2):182\u2013196. https:\/\/doi.org\/10.24908\/ss.v13i2.5315","journal-title":"Surveill Soc"},{"issue":"1","key":"932_CR99","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.giq.2018.10.011","volume":"36","author":"HG Van der Voort","year":"2019","unstructured":"Van der Voort HG, Klievink AJ, Arnaboldi M, Meijir AJ (2019) Rationality and politics of algorithms. Will the promise of big data survive the dynamics of public decision making? Gov Inf Q 36(1):27\u201338. https:\/\/doi.org\/10.1016\/j.giq.2018.10.011","journal-title":"Gov Inf Q"},{"issue":"1","key":"932_CR100","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.giq.2018.10.011","volume":"36","author":"HG Van der Voort","year":"2019","unstructured":"Van der Voort HG et al (2019) Rationality and politics of algorithms. Will the promise of big data survive the dynamics of public decision making? Gov Inf Q 36(1):27\u201338. https:\/\/doi.org\/10.1016\/j.giq.2018.10.011","journal-title":"Gov Inf Q"},{"issue":"2","key":"932_CR101","doi-asserted-by":"publisher","first-page":"197","DOI":"10.24908\/ss.v12i2.4776","volume":"12","author":"J Van Dijck","year":"2014","unstructured":"Van Dijck J (2014) Datafication, dataism and dataveillance: big data between scientific paradigm and ideology. Surveill Soc 12(2):197\u2013208. https:\/\/doi.org\/10.24908\/ss.v12i2.4776","journal-title":"Surveill Soc"},{"key":"932_CR102","volume-title":"Spheres of justice: a defense of pluralism and equality","author":"M Walzer","year":"1983","unstructured":"Walzer M (1983) Spheres of justice: a defense of pluralism and equality, Reprint edn. Basic Books, New York","edition":"Reprint"},{"issue":"5","key":"932_CR103","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"SD Warren","year":"1890","unstructured":"Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Rev 4(5):193\u2013220. https:\/\/doi.org\/10.2307\/1321160","journal-title":"Harv Law Rev"},{"key":"932_CR204","volume-title":"Computer power and human reason: from judgement to calculation. New edition","author":"J Weizenbaum","year":"1977","unstructured":"Weizenbaum J (1977) Computer power and human reason: from judgement to calculation. New edition. W.H.Freeman & Co Ltd., San Francisco"},{"key":"932_CR104","unstructured":"Wenar L (2017) John Rawls. In: Zalta EN (ed) The Stanford encyclopedia of philosophy. Spring 2017. Metaphysics Research Lab, Stanford University. https:\/\/plato.stanford.edu\/archives\/spr2017\/entries\/rawls\/. Accessed 25 Oct 2018"},{"key":"932_CR105","unstructured":"Winston A (2018) Palantir has secretly been using New Orleans to test its predictive policing technology, The Verge. https:\/\/www.theverge.com\/2018\/2\/27\/17054740\/palantir-predictive-policing-tool-new-orleans-nopd. Accessed 26 Mar 2019"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-019-00932-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00146-019-00932-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-019-00932-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T21:47:48Z","timestamp":1665438468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00146-019-00932-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,11]]},"references-count":107,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["932"],"URL":"https:\/\/doi.org\/10.1007\/s00146-019-00932-9","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,11]]},"assertion":[{"value":"2 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}