{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T14:10:23Z","timestamp":1765807823759},"reference-count":112,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T00:00:00Z","timestamp":1598400000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T00:00:00Z","timestamp":1598400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2021,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Certain research strands can yield \u201cforbidden knowledge\u201d. This term refers to knowledge that is considered too sensitive, dangerous or taboo to be produced or shared. Discourses about such publication restrictions are already entrenched in scientific fields like IT security, synthetic biology or nuclear physics research. This paper makes the case for transferring this discourse to machine learning research. Some machine learning applications can very easily be misused and unfold harmful consequences, for instance, with regard to generative video or text synthesis, personality analysis, behavior manipulation, software vulnerability detection and the like. Up till now, the machine learning research community embraces the idea of open access. However, this is opposed to precautionary efforts to prevent the malicious use of machine learning applications. Information about or from such applications may, if improperly disclosed, cause harm to people, organizations or whole societies. Hence, the goal of this work is to outline deliberations on how to deal with questions concerning the dissemination of such information. It proposes a tentative ethical framework for the machine learning community on how to deal with forbidden knowledge and dual-use applications.<\/jats:p>","DOI":"10.1007\/s00146-020-01045-4","type":"journal-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T19:02:47Z","timestamp":1598468567000},"page":"767-781","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Forbidden knowledge in machine learning reflections on the limits of research and publication"],"prefix":"10.1007","volume":"36","author":[{"given":"Thilo","family":"Hagendorff","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,26]]},"reference":[{"key":"1045_CR1","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1126\/science.299.5610.1149","volume":"299","author":"R Atlas","year":"2003","unstructured":"Atlas R, Campbell P, Cozzarelli NR, Curfman G, Enquist L, Fink G, Flanagin A, Fletcher J, George E, Hammes G, Heyman D, Inglesby T, Kaplan S, Kennedy D, Krug J, Levinson R, Marcus E, Metzger H, Morse SS, O'Brien A, Onderdonk A, Poste G, Renault B, Rich R, Rosengard A, Salzberg S, Scanlan M, Shenk T, Tabor H, Varmus H, Wimmer E, Yamamoto K (2003) Statement on scientific publication and security. Science 299:1149","journal-title":"Science"},{"key":"1045_CR2","doi-asserted-by":"publisher","DOI":"10.14361\/9783839442135","volume-title":"Network public governance: on privacy and the informational self","author":"A Belliger","year":"2018","unstructured":"Belliger A, Krieger DJ (2018) Network public governance: on privacy and the informational self. Transcript, Bielefeld"},{"key":"1045_CR3","first-page":"737","volume":"82","author":"O Bendel","year":"2017","unstructured":"Bendel O (2017) The synthetization of human voices. AI Soc J Knowl Cult Commun 82:737","journal-title":"AI Soc J Knowl Cult Commun"},{"key":"1045_CR4","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1287\/mksc.1120.0727","volume":"31","author":"B Bollinger","year":"2012","unstructured":"Bollinger B, Gillingham K (2012) Peer effects in the diffusion of solar photovoltaic panels. Mark Sci 31:900\u2013912","journal-title":"Mark Sci"},{"key":"1045_CR5","unstructured":"Bolukbasi T, Chang K-W, Zou J, Saligrama V, Kalai A (2016) Man is to computer programmer as woman is to homemaker? Debiasing word embeddings. arXiv:1607.06520"},{"key":"1045_CR6","first-page":"1","volume":"10","author":"N Bostrom","year":"2011","unstructured":"Bostrom N (2011) Information hazards: a typology of potential harms from knowledge. Rev Contemp Philos 10:1\u201334","journal-title":"Rev Contemp Philos"},{"key":"1045_CR7","volume-title":"Superintelligence: paths, dangers, strategies","author":"N Bostrom","year":"2014","unstructured":"Bostrom N (2014) Superintelligence: paths, dangers, strategies. Oxford University Press, Oxford"},{"key":"1045_CR8","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1111\/1758-5899.12403","volume":"8","author":"N Bostrom","year":"2017","unstructured":"Bostrom N (2017) Strategic implications of openness in AI development. Glob Policy 8:135\u2013148","journal-title":"Glob Policy"},{"key":"1045_CR9","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1126\/science.aay2400","volume":"365","author":"N Brown","year":"2019","unstructured":"Brown N, Sandholm T (2019) Superhuman AI for multiplayer poker. Science 365:885\u2013890","journal-title":"Science"},{"key":"1045_CR10","unstructured":"Brundage M, Avin S, Clark J, Toner H, Eckersley P, Garfinkel B, Dafoe A, Scharre P, Zeitziff T, Filar B, Anderson H, Roff H, Allen GC, Steinhardt J, Flynn C, h\u00c9igeartaigh S\u00d3, Beard S, Belfield H, Farquhar S, Lyle C, Crootof R, Evans O, Page M, Bryson J, Yampolskiy R, Amodei D (2018) The malicious use of artificial intelligence: forecasting, prevention, and mitigation. arXiv:1802.07228"},{"key":"1045_CR11","unstructured":"Cadwalladr C (2019) The Great Hack: the film that goes behind the scenes of the Facebook data scandal. https:\/\/www.theguardian.com\/uk-news\/2019\/jul\/20\/the-great-hack-cambridge-analytica-scandal-facebook-netflix. Accessed 11 Oct 2019"},{"key":"1045_CR12","doi-asserted-by":"crossref","unstructured":"Calo R (2017) Artificial intelligence policy: a primer and roadmap. SSRN, pp 1\u201328. https:\/\/ssrn.com\/abstract=3015350","DOI":"10.2139\/ssrn.3015350"},{"key":"1045_CR13","doi-asserted-by":"crossref","unstructured":"Cao B, Zheng L, Zhang C, Yu PS, Piscitello A, Zulueta J, Ajilore O, Ryan K, Leow AD (2017) DeepMood. In: Matwin S, Yu S, Farooq F (eds) Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining\u2014KDD \u201817. ACM Press, New York, pp 747\u2013755","DOI":"10.1145\/3097983.3098086"},{"key":"1045_CR14","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1126\/science.1072266","volume":"297","author":"J Cello","year":"2002","unstructured":"Cello J, Paul AV, Wimmer E (2002) Chemical synthesis of poliovirus cDNA: generation of infectious virus in the absence of natural template. Science 297:1016\u20131018","journal-title":"Science"},{"key":"1045_CR15","doi-asserted-by":"crossref","unstructured":"Chesney R, Citron DK (2018) Deep fakes: a looming challenge for privacy, democracy, and national security. SSRN, pp 1\u201359. https:\/\/ssrn.com\/abstract=3213954","DOI":"10.2139\/ssrn.3213954"},{"key":"1045_CR16","doi-asserted-by":"crossref","unstructured":"Chiodo M, Clifton T (2019) The importance of ethics in mathematics. LMS Newsl, pp 34\u201337","DOI":"10.4171\/NEWS\/114\/9"},{"key":"1045_CR17","unstructured":"Choudhury M de, Counts S, Horvitz E (2013) Social media as a measurement tool of depression in populations. In: Davis H, Halpin H, Pentland A, Bernstein M, Adamic L (eds) Proceedings of the 5th annual ACM web science conference on\u2014WebSci \u201813. ACM Press, New York, pp 47\u201356"},{"key":"1045_CR18","unstructured":"Clark J, Brundage M, Solaiman I (2019) GPT-2: 6-month follow-up. https:\/\/openai.com\/blog\/gpt-2\u20136-month-follow-up\/. Accessed 23 Aug 2019"},{"key":"1045_CR19","volume-title":"The social control of technology","author":"D Collingridge","year":"1980","unstructured":"Collingridge D (1980) The social control of technology. Pinter, New York"},{"key":"1045_CR20","unstructured":"Crootof R (2019) Artificial intelligence research needs responsible publications norms. https:\/\/www.lawfareblog.com\/artificial-intelligence-research-needs-responsible-publication-norms. Accessed 9 Nov 2019"},{"key":"1045_CR21","doi-asserted-by":"crossref","unstructured":"Daly A, Hagendorff T, Hui L, Mann M, Marda V, Wagner B, Wang W, Witteborn S (2019) Artificial intelligence governance and ethics: global perspectives. arXiv:1907.03848v1","DOI":"10.2139\/ssrn.3414805"},{"key":"1045_CR22","doi-asserted-by":"crossref","unstructured":"Das A, Kottur S, Moura JMF, Lee S, Batra D (2017) Learning cooperative visual dialog agents with deep reinforcement learning. arXiv:1\u201311","DOI":"10.1109\/ICCV.2017.321"},{"key":"1045_CR23","unstructured":"Dastin J (2018) Amazon scraps secret AI recruiting tool that showed bias against women. https:\/\/www.reuters.com\/article\/us-amazon-com-jobs-automation-insight\/amazon-scraps-secret-ai-recruiting-tool-that-showed-bias-against-women-idUSKCN1MK08G. Accessed 7 Oct 2019"},{"key":"1045_CR24","volume-title":"Die Physiker: Eine Kom\u00f6die in zwei Akten","author":"F D\u00fcrrenmatt","year":"1980","unstructured":"D\u00fcrrenmatt F (1980) Die Physiker: Eine Kom\u00f6die in zwei Akten. Diogenes, Zurich"},{"key":"1045_CR25","doi-asserted-by":"crossref","unstructured":"Eichstaedt JC, Smith RJ, Merchant RM, Ungar LH, Crutchley P, Preo\u0163iuc-Pietro D, Asch DA, Schwartz HA (2018) Facebook language predicts depression in medical records. In: Proceedings of the national academy of sciences of the United States of America, pp 1\u20136","DOI":"10.1073\/pnas.1802331115"},{"key":"1045_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.31629\/sustainable.v8i1.1319","volume":"8","author":"S Eker","year":"2019","unstructured":"Eker S, Reese G, Obersteiner M (2019) Modelling the drivers of a widespread shift to sustainable diets. Nat Sustain 8:1\u201313","journal-title":"Nat Sustain"},{"key":"1045_CR27","unstructured":"Fan J, Ma C, Zhong Y (2019) A selective overview of deep learning. arXiv:1904.05526v2"},{"key":"1045_CR28","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s10676-006-0001-7","volume":"7","author":"L Floridi","year":"2005","unstructured":"Floridi L (2005) The ontological interpretation of informational privacy. Ethics Inf Technol 7:185\u2013200","journal-title":"Ethics Inf Technol"},{"key":"1045_CR29","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10676-006-9121-3","volume":"8","author":"L Floridi","year":"2006","unstructured":"Floridi L (2006) Four challenges for a theory of informational privacy. Ethics Inf Technol 8:109\u2013119","journal-title":"Ethics Inf Technol"},{"key":"1045_CR30","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1017\/CBO9780511845239.002","volume-title":"The Cambridge handbook of information and computer ethics","author":"L Floridi","year":"2010","unstructured":"Floridi L (2010) Ethics after the information revolution. In: Floridi L (ed) The Cambridge handbook of information and computer ethics. Cambridge University Press, Cambridge, pp 3\u201319"},{"key":"1045_CR31","first-page":"15","volume":"2","author":"RA Freitas","year":"2006","unstructured":"Freitas RA (2006) Molecular manufacturing: too dangerous to allow? Nanotechnol Percept 2:15\u201324","journal-title":"Nanotechnol Percept"},{"key":"1045_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323028","volume":"38","author":"O Fried","year":"2019","unstructured":"Fried O, Agrawala M, Tewari A, Zollh\u00f6fer M, Finkelstein A, Shechtman E, Goldman DB, Genova K, Jin Z, Theobalt C (2019) Text-based editing of talking-head video. ACM Trans Gr 38:1\u201314","journal-title":"ACM Trans Gr"},{"key":"1045_CR33","unstructured":"Grassegger H, Krogerus M (2016) Ich habe nur gezeigt, dass es die Bombe gibt. https:\/\/web.archive.org\/web\/20170127181034\/https:\/\/www.dasmagazin.ch\/2016\/12\/03\/ich-habe-nur-gezeigt-dass-es-die-bombe-gibt\/. Accessed 6 Septe2019"},{"key":"1045_CR34","unstructured":"Groh M, Epstein Z, Obradovich N, Cebrian M, Rahwan I (2019) Human detection of machine manipulated media. arXiv:1907.05276v1"},{"key":"1045_CR35","doi-asserted-by":"publisher","DOI":"10.14361\/9783839437773","volume-title":"Das Ende der Informationskontrolle: Zur Nutzung digitaler Medien jenseits von Privatheit und Datenschutz","author":"T Hagendorff","year":"2017","unstructured":"Hagendorff T (2017) Das Ende der Informationskontrolle: Zur Nutzung digitaler Medien jenseits von Privatheit und Datenschutz. Transcript, Bielefeld"},{"key":"1045_CR36","first-page":"342","volume-title":"Vernetzung: Stabilit\u00e4t und Wandel gesellschaftlicher Kommunikation","author":"T Hagendorff","year":"2018","unstructured":"Hagendorff T (2018) Vernetzung oder Informationskontrolle?: Analyse eines widerspr\u00fcchlichen Verh\u00e4ltnisses. In: Eilders C, Jandura O, Bause H, Frie\u00df D (eds) Vernetzung: Stabilit\u00e4t und Wandel gesellschaftlicher Kommunikation. Herbert von Halem Verlag, K\u00f6ln, pp 342\u2013363"},{"key":"1045_CR37","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s10676-019-09510-5","volume":"33","author":"T Hagendorff","year":"2019","unstructured":"Hagendorff T (2019a) From privacy to anti-discrimination in times of machine learning. Ethics Inf Technol 33:331\u2013343","journal-title":"Ethics Inf Technol"},{"key":"1045_CR38","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s11614-019-00347-2","volume":"44","author":"T Hagendorff","year":"2019","unstructured":"Hagendorff T (2019b) Maschinelles Lernen und Diskriminierung: Probleme und L\u00f6sungsans\u00e4tze. \u00d6sterreichische Zeitschrift f\u00fcr Soziologie 44:53\u201366","journal-title":"\u00d6sterreichische Zeitschrift f\u00fcr Soziologie"},{"key":"1045_CR39","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1515\/9783110609103-003","volume-title":"Diskurs der Daten: Qualitative Zug\u00e4nge zu einem quantitativen Ph\u00e4nomen","author":"T Hagendorff","year":"2019","unstructured":"Hagendorff T (2019c) Resilienz und Mediennutzungsstrategien angesichts des digitalen Kontrollverlusts. In: Steen P, Liedtke F (eds) Diskurs der Daten: Qualitative Zug\u00e4nge zu einem quantitativen Ph\u00e4nomen. De Gruyter, Berlin, pp 25\u201340"},{"key":"1045_CR40","doi-asserted-by":"crossref","unstructured":"Hagendorff T, Meding K (2020) The big picture: ethical considerations and statistical analysis of industry involvement in machine learning research. arXiv:2006.04541v1","DOI":"10.1007\/s00146-021-01284-z"},{"key":"1045_CR41","unstructured":"Harwell D (2018) Fake-porn videos are being weaponized to harass and humiliate women: \u2018Everybody is a potential target\u2019. https:\/\/www.washingtonpost.com\/technology\/2018\/12\/30\/fake-porn-videos-are-being-weaponized-harass-humiliate-women-everybody-is-potential-target\/?noredirect=on. Accessed 29 Aug 2019"},{"key":"1045_CR42","unstructured":"Hecht B, Wilcox L, Bigham J, Sch\u00f6ning J, Hoque E, Ernst J, Bisk Y, Russis L de, Yarosh L, Anjum B, Contractor D, Wu C (2018) It\u2019s time to do something: mitigating the negative impacts of computing through a change to the peer review process. https:\/\/www.acm-fca.org\/2018\/03\/29\/negativeimpacts\/. Accessed 28 June 2019"},{"key":"1045_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fncom.2017.00004","volume":"11","author":"T Horikawa","year":"2017","unstructured":"Horikawa T, Kamitani Y (2017) Hierarchical neural representation of dreamed objects revealed by brain decoding with deep neural network features. Front Comput Neurosci 11:1\u201311","journal-title":"Front Comput Neurosci"},{"key":"1045_CR44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-018-37186-2","volume":"9","author":"L Jiang","year":"2019","unstructured":"Jiang L, Stocco A, Losey DM, Abernethy JA, Prat CS, Rao RPN (2019) BrainNet: a multi-person brain-to-brain interface for direct collaboration between brains. Sci Rep 9:1\u201311","journal-title":"Sci Rep"},{"key":"1045_CR45","doi-asserted-by":"publisher","first-page":"197","DOI":"10.5840\/monist19967927","volume":"79","author":"DG Johnson","year":"1996","unstructured":"Johnson DG (1996) Forbidden knowledge and science as professional activity. Monist 79:197\u2013217","journal-title":"Monist"},{"key":"1045_CR46","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s11948-999-0045-2","volume":"5","author":"DG Johnson","year":"1999","unstructured":"Johnson DG (1999) Reframing the question of forbidden knowledge for modern science. Sci Eng Ethics 5:445\u2013461","journal-title":"Sci Eng Ethics"},{"key":"1045_CR47","first-page":"1","volume":"800\u2013150","author":"C Johnson","year":"2016","unstructured":"Johnson C, Badger L, Waltermire D, Snyder J, Skorupka C (2016) Guide to cyber threat information sharing. NIST Spec Publ 800\u2013150:1\u201343","journal-title":"NIST Spec Publ"},{"key":"1045_CR48","unstructured":"Karras T, Aila T, Laine S, Lehtinen J (2017) Progressive growing of GANs for improved quality, stability, and variation. arXiv:1710.10196"},{"key":"1045_CR49","unstructured":"Keller M (2018) Facebook-Scan zur Suizidpr\u00e4vention. https:\/\/www.pcspezialist.de\/blog\/2018\/04\/24\/facebook-scan-suizidpraevention\/. Accessed 30 Sept 2019"},{"key":"1045_CR50","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1111\/j.1573-7861.2011.01259.x","volume":"26","author":"J Kempner","year":"2011","unstructured":"Kempner J, Merz JF, Bosk CL (2011) Forbidden knowledge: public controversy and the production of nonknowledge1. Sociol Forum 26:475\u2013500","journal-title":"Sociol Forum"},{"key":"1045_CR51","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11948-018-00081-0","volume":"26","author":"TC King","year":"2020","unstructured":"King TC, Aggarwal N, Taddeo M, Floridi L (2020) Artificial intelligence crime: an interdisciplinary analysis of foreseeable threats and solutions. Sci Eng Ethics 26:89\u2013120","journal-title":"Sci Eng Ethics"},{"key":"1045_CR52","unstructured":"Knight W, Hao K (2019) Never mind killer robots\u2014here are six real AI dangers to watch out for in 2019. https:\/\/www.technologyreview.com\/s\/612689\/never-mind-killer-robotshere-are-six-real-ai-dangers-to-watch-out-for-in-2019\/. Accessed 25 Jan 2019"},{"key":"1045_CR53","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1037\/pspa0000098","volume":"114","author":"M Kosinski","year":"2018","unstructured":"Kosinski M, Wang Y (2018) Deep neural networks are more accurate than humans at detecting sexual orientation from facial images. J Pers Soc Psychol 114:246\u2013257","journal-title":"J Pers Soc Psychol"},{"key":"1045_CR54","doi-asserted-by":"publisher","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski M, Stillwell D, Graepel T (2013) Private traits and attributes are predictable from digital records of human behavior. Proc Natl Acad Sci USA 110:5802\u20135805","journal-title":"Proc Natl Acad Sci USA"},{"key":"1045_CR55","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s10994-013-5415-y","volume":"95","author":"M Kosinski","year":"2014","unstructured":"Kosinski M, Bachrach Y, Kohli P, Stillwell D, Graepel T (2014) Manifestations of user personality in website choice and behaviour on online social networks. Mach Learn 95:357\u2013380","journal-title":"Mach Learn"},{"key":"1045_CR56","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1037\/a0039210","volume":"70","author":"M Kosinski","year":"2015","unstructured":"Kosinski M, Matz SC, Gosling SD, Popov V, Stillwell D (2015) Facebook as a research tool for the social sciences: opportunities, challenges, ethical considerations, and practical guidelines. Am Psychol 70:543\u2013556","journal-title":"Am Psychol"},{"key":"1045_CR57","unstructured":"Kova A (2019) It\u2019s sentient. https:\/\/www.theverge.com\/2019\/7\/31\/20746926\/sentient-national-reconnaissance-office-spy-satellites-artificial-intelligence-ai. Accessed 4 Sept 2019"},{"key":"1045_CR58","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1038\/s41586-018-0647-4","volume":"563","author":"GT Kraft-Todd","year":"2018","unstructured":"Kraft-Todd GT, Bollinger B, Gillingham K, Lamp S, Rand DG (2018) Credibility-enhancing displays promote the provision of non-normative public goods. Nature 563:245\u2013248","journal-title":"Nature"},{"key":"1045_CR59","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/JPROC.2014.2359054","volume":"102","author":"R Lambiotte","year":"2014","unstructured":"Lambiotte R, Kosinski M (2014) Tracking the digital footprints of personality. Proc IEEE 102:1934\u20131939","journal-title":"Proc IEEE"},{"key":"1045_CR60","unstructured":"Lazaridou A, Peysakhovich A, Baroni M (2016) Multi-agent cooperation and the emergence of (natural) language. arXiv:1612.07182v2"},{"key":"1045_CR61","unstructured":"Leuner J (2019) A Replication study: machine learning models are capable of predicting sexual orientation from facial images. arXiv:1-69"},{"key":"1045_CR62","doi-asserted-by":"crossref","unstructured":"Lewis M, Yarats D, Dauphin YN, Parikh D, Batra D (2017) Deal or no deal? End-to-end learning for negotiation dialogues. arXiv:1-11","DOI":"10.18653\/v1\/D17-1259"},{"key":"1045_CR63","doi-asserted-by":"crossref","unstructured":"Li Y, Chang M-C, Lyu S (2018) In ictu oculi: exposing AI generated fake face videos by detecting eye blinking. arXiv:1806.02877v2","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"1045_CR64","doi-asserted-by":"crossref","unstructured":"LiKamWa R, Liu Y, Lane ND, Zhong L (2013) MoodScope. In: Chu H-H, Huang P, Choudhury RR, Zhao F (eds) Proceeding of the 11th annual international conference on Mobile systems, applications, and services\u2014 MobiSys '13. ACM Press, New York, p\u00a0389","DOI":"10.1145\/2462456.2464449"},{"key":"1045_CR65","volume-title":"Surveillance as social sorting: privacy, risk, and digital discrimination","year":"2003","unstructured":"Lyon D (ed) (2003) Surveillance as social sorting: privacy, risk, and digital discrimination. Routledge, London"},{"key":"1045_CR66","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1037\/0022-3514.90.6.1014","volume":"90","author":"B Marcus","year":"2006","unstructured":"Marcus B, Machilek F, Sch\u00fctz A (2006) Personality in cyberspace: personal web sites as media for personality expressions and impressions. J Pers Soc Psychol 90:1014\u20131031","journal-title":"J Pers Soc Psychol"},{"key":"1045_CR67","doi-asserted-by":"crossref","unstructured":"Matz SC, Kosinski M, Nave G, Stillwell D (2017) Psychological targeting as an effective approach to digital mass persuasion. In: Proceedings of the national academy of sciences of the United States of America, pp 1\u20136","DOI":"10.1073\/pnas.1710966114"},{"key":"1045_CR68","first-page":"2527","volume":"101","author":"A McAllister","year":"2017","unstructured":"McAllister A (2017) Stranger than science fiction: the rise of AI interrogation in the dawn of autonomous robots and the need for an additional protocol to the UN convention against torture. Minn Law Rev 101:2527\u20132573","journal-title":"Minn Law Rev"},{"key":"1045_CR69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92606-3","volume-title":"dual use science and technology, ethics and weapons of mass destruction","author":"S Miller","year":"2018","unstructured":"Miller S (2018) dual use science and technology, ethics and weapons of mass destruction. Springer, Cham"},{"key":"1045_CR70","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1177\/153567601001500401","volume":"15","author":"M Minehata","year":"2010","unstructured":"Minehata M, Sture JF (2010) Promoting dual-use education for life scientists: resources and activities. Appl Biosaf 15:164","journal-title":"Appl Biosaf"},{"key":"1045_CR71","unstructured":"Misty A (2016) Microsoft creates AI bot\u2014internet immediately turns it racist. https:\/\/socialhax.com\/2016\/03\/24\/microsoft-creates-ai-bot-internet-immediately-turns-racist\/. Accessed 17 Jan 2018"},{"key":"1045_CR72","doi-asserted-by":"crossref","unstructured":"Mordatch I, Abbeel P (2017) Emergence of grounded compositional language in multi-agent populations. arXiv:1703.04908v2","DOI":"10.1609\/aaai.v32i1.11492"},{"key":"1045_CR73","unstructured":"Murgia M (2019) Why some AI research may be too dangerous to share. https:\/\/www.ft.com\/content\/131f0430-9159-11e9-b7ea-60e35ef678d2. Accessed 4 Nov 2019"},{"key":"1045_CR74","volume-title":"Privacy in context: technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford"},{"key":"1045_CR75","first-page":"483","volume":"171","author":"S Omohundro","year":"2008","unstructured":"Omohundro S (2008) The basic AI drives: conference paper. Front Artif Intell Appl 171:483\u2013492","journal-title":"Front Artif Intell Appl"},{"key":"1045_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/0952813X.2014.895111","volume":"26","author":"S Omohundro","year":"2014","unstructured":"Omohundro S (2014) Autonomous technology and the greater human good. J Exp Theor Artif Intell 26:1\u201313","journal-title":"J Exp Theor Artif Intell"},{"key":"1045_CR77","unstructured":"Ovadya A, Whittlestone J (2019) Reducing malicious use of synthetic media research: considerations and potential release practices for machine learning. arXiv:1907.11274v2"},{"key":"1045_CR78","unstructured":"Perrault R, Shoham Y, Brynjolfsson E, Clark J, Etchemendy J, Grosz B, Lyons T, Manyika J, Niebles JC, Mishra S (2019) Artificial intelligence index report 2019. https:\/\/hai.stanford.edu\/sites\/g\/files\/sbiybj10986\/f\/ai_index_2019_report.pdf. Accessed 4 Mar 2020"},{"key":"1045_CR79","unstructured":"Quach K (2019) DeepNude deep-nuked: AI photo app stripped clothes from women to render them naked. Now, it\u2019s stripped from web. 07.10.2019. Accessed 7 Oct 2019"},{"key":"1045_CR80","unstructured":"Radford A, Wu J, Amodei D, Amodei D, Clark J, Brundage M, Sutskever I (2019a) Better language models and their implications. https:\/\/openai.com\/blog\/better-language-models\/#sample8. Accessed 21 June 2019"},{"key":"1045_CR81","unstructured":"Radford A, Wu J, Child R, Luan D, Amodei D, Sutskever I (2019b) Language models are unsupervised multitask learners.\u00a0https:\/\/d4mucfpksywv.cloudfront.net\/better-language-models\/language_models_are_unsupervised_multitask_learners.pdf. Accessed 21 June 2019"},{"key":"1045_CR82","unstructured":"Ramsay A (2018) Cambridge Analytica is what happens when you privatise military propaganda. https:\/\/www.opendemocracy.net\/en\/dark-money-investigations\/cambridge-analytica-is-what-happens-when-you-privatise-military-propaganda\/. Accessed 10 Feb 2019"},{"key":"1045_CR83","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019) FaceForensics++: learning to detect manipulated facial images. arXiv:1901.08971v3","DOI":"10.1109\/ICCV.2019.00009"},{"key":"1045_CR84","unstructured":"Satter R (2019) Experts: Spy used AI-generated face to connect with targets. https:\/\/www.apnews.com\/bc2f19097a4c4fffaa00de6770b8a60d. Accessed 29 Aug 2019"},{"key":"1045_CR85","unstructured":"Sauerwein C, Sillaber C, Mussmann A, Breu R (2017) Threat intelligence sharing platforms: an exploratory study of software vendors and research perspectives. In: Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik, pp 837\u2013851"},{"key":"1045_CR86","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/TAFFC.2016.2516994","volume":"8","author":"C Segalin","year":"2017","unstructured":"Segalin C, Perina A, Cristani M, Vinciarelli A (2017) The pictures we like are our image: continuous mapping of favorite pictures into self-assessed and attributed personality traits. IEEE Trans Affect Comput 8:268\u2013285","journal-title":"IEEE Trans Affect Comput"},{"key":"1045_CR87","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1353\/hcr.2007.0046","volume":"37","author":"MJ Selgelid","year":"2007","unstructured":"Selgelid MJ (2007) A tale of two studies: ethics, bioterrorism, and the censorship of science. Hastings Cent Rep 37:35\u201343","journal-title":"Hastings Cent Rep"},{"key":"1045_CR88","unstructured":"Seymour J, Tully P (2016) Weaponizing data science for social engineering: automated E2E spear phishing on Twitter, pp 1\u20138.\u00a0https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter-wp.pdf. Accessed 22 Aug 2019"},{"key":"1045_CR89","doi-asserted-by":"crossref","unstructured":"Sillaber C, Sauerwein C, Mussmann A, Breu R (2016) Data quality challenges and future research directions in threat intelligence sharing practice. In: Katzenbeisser S, Weippl E, Blass E-O, Kerschbaum F (eds) Proceedings of the 2016 ACM on workshop on information sharing and collaborative security\u2014WISCS\u201916. ACM Press, New York, pp 65\u201370","DOI":"10.1145\/2994539.2994546"},{"key":"1045_CR90","doi-asserted-by":"publisher","first-page":"30","DOI":"10.2307\/3561469","volume":"8","author":"DH Smith","year":"1978","unstructured":"Smith DH (1978) Scientific knowledge and forbidden truths. Hastings Cent Rep 8:30\u201335","journal-title":"Hastings Cent Rep"},{"key":"1045_CR91","unstructured":"Solaiman I, Brundage M, Clark J, Askell A, Herbert-Voss A, Wu J, Radford A, Wang J (2019) Release strategies and the social impacts of language models. arXiv:1908.09203"},{"key":"1045_CR92","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9286.001.0001","volume-title":"Open access","author":"P Suber","year":"2012","unstructured":"Suber P (2012) Open access. The MIT Press, Cambridge"},{"key":"1045_CR93","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1002\/9780470281819.ch6","volume-title":"The handbook of information and computer ethics","author":"HT Tavani","year":"2008","unstructured":"Tavani HT (2008) Informational privacy: concepts, theories, and controversies. In: Himma KE, Tavani HT (eds) The handbook of information and computer ethics. Wiley, Hoboken, pp 131\u2013164"},{"key":"1045_CR94","volume-title":"Life 3.0: being human in the age of artificial intelligence","author":"A Tegmark","year":"2017","unstructured":"Tegmark A (2017) Life 3.0: being human in the age of artificial intelligence. Alfred A. Knopf, New York"},{"key":"1045_CR95","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2816795.2818056","volume":"34","author":"J Thies","year":"2015","unstructured":"Thies J, Zollh\u00f6fer M, Nie\u00dfner M, Valgaerts L, Stamminger M, Theobalt C (2015) Real-time expression transfer for facial reenactment. ACM Trans Gr 34:1\u201314","journal-title":"ACM Trans Gr"},{"key":"1045_CR96","doi-asserted-by":"crossref","unstructured":"Thies J, Zollh\u00f6fer M, Stamminger M, Theobalt C, Nie\u00dfner M (2016) Face2Face: real-time face capture and reenactment of RGB videos. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 2387\u20132395","DOI":"10.1109\/CVPR.2016.262"},{"key":"1045_CR97","doi-asserted-by":"crossref","unstructured":"Thies J, Zollh\u00f6fer M, Theobalt C, Stamminger M, Nie\u00dfner M (2018) HeadOn: real-time reenactment of human portrait videos. ACM Trans Gr. https:\/\/gvv.mpi-inf.mpg.de\/projects\/HeadOn\/headOn.pdf. Accessed 18 Aug 2020","DOI":"10.1145\/3197517.3201350"},{"key":"1045_CR98","doi-asserted-by":"crossref","unstructured":"Thies J, Zollh\u00f6fer M, Nie\u00dfner M (2019) Deferred neural rendering: image synthesis using neural textures. arXiv:1904.12356v1","DOI":"10.1145\/3306346.3323035"},{"key":"1045_CR99","doi-asserted-by":"crossref","unstructured":"Todorov A (2018) Can We read a person\u2019s character from facial images? The discredited \u201cscience\u201d of physiognomy is making an unfortunate comeback. https:\/\/www.blogs.scientificamerican.com\/observations\/can-we-read-a-persons-character-from-facial-images\/. Accessed 11 Oct 2019","DOI":"10.33919\/sledva.19.39.8"},{"key":"1045_CR100","volume-title":"Innovation, dual use, and security: managing the risks of emerging biological and chemical technologies","year":"2012","unstructured":"Tucker JB (ed) (2012a) Innovation, dual use, and security: managing the risks of emerging biological and chemical technologies. The MIT Press, Cambridge"},{"key":"1045_CR101","doi-asserted-by":"publisher","first-page":"19","DOI":"10.7551\/mitpress\/9147.001.0001","volume-title":"Innovation, dual use, and security: managing the risks of emerging biological and chemical technologies","author":"JB Tucker","year":"2012","unstructured":"Tucker JB (2012b) Review of the literature on dual use. In: Tucker JB (ed) Innovation, dual use, and security: managing the risks of emerging biological and chemical technologies. The MIT Press, Cambridge, pp 19\u201344"},{"key":"1045_CR102","doi-asserted-by":"publisher","first-page":"67","DOI":"10.7551\/mitpress\/9147.001.0001","volume-title":"Innovation, dual use, and security: managing the risks of emerging biological and chemical technologies","author":"JB Tucker","year":"2012","unstructured":"Tucker JB (2012c) The decision framework. In: Tucker JB (ed) Innovation, dual use, and security: managing the risks of emerging biological and chemical technologies. The MIT Press, Cambridge, pp 67\u201383"},{"key":"1045_CR103","unstructured":"Valle R, Cai W, Doshi A (2018) TequilaGAN: how to easily identify GAN\u00a0samples. arXiv:1807.04919v1"},{"key":"1045_CR104","doi-asserted-by":"publisher","first-page":"704","DOI":"10.29302\/oeconomica.2012.14.2.36","volume":"14","author":"C Veghes","year":"2012","unstructured":"Veghes C, Orzan M, Acatrinei C, Dugulan D (2012) Privacy literacy: what is and how it can be measuared? Annales Universitatis Apulensis Seires Oeconomica 14:704\u2013711","journal-title":"Annales Universitatis Apulensis Seires Oeconomica"},{"key":"1045_CR105","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195374049.001.0001","volume-title":"Moral machines: teaching robots right from wrong","author":"W Wallach","year":"2009","unstructured":"Wallach W, Allen C (2009) Moral machines: teaching robots right from wrong. Oxford University Press, New York"},{"key":"1045_CR106","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/s11023-017-9419-4","volume":"27","author":"MP Wellman","year":"2017","unstructured":"Wellman MP, Rajan U (2017) Ethical issues for autonomous trading agents. Mind Mach 27:609\u2013624","journal-title":"Mind Mach"},{"key":"1045_CR107","first-page":"289","volume-title":"Innovation, dual use, and security: managing the risks of emerging biological and chemical technologies","author":"M Wheelis","year":"2012","unstructured":"Wheelis M (2012) The Use and misuse of LSD by the US army and the CIA. In: Tucker JB (ed) Innovation, dual use, and security: managing the risks of emerging biological and chemical technologies. The MIT Press, Cambridge, pp 289\u2013301"},{"key":"1045_CR108","unstructured":"Wilson M (2017) AI is inventing languages humans can\u2019t understand. should we stop it? https:\/\/www.fastcompany.com\/90132632\/ai-is-inventing-its-own-perfect-languages-should-we-let-it. Accessed 30 Sept 2019"},{"key":"1045_CR109","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.jrp.2010.04.001","volume":"44","author":"T Yarkoni","year":"2010","unstructured":"Yarkoni T (2010) Personality in 100,000 words: a large-scale analysis of personality and word use among bloggers. J Res Pers 44:363\u2013373","journal-title":"J Res Pers"},{"key":"1045_CR110","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1073\/pnas.1418680112","volume":"112","author":"W Youyou","year":"2015","unstructured":"Youyou W, Kosinski M, Stillwell D (2015) Computer-based personality judgments are more accurate than those made by humans. Proc Natl Acad Sci USA 112:1036\u20131040","journal-title":"Proc Natl Acad Sci USA"},{"key":"1045_CR111","unstructured":"Zellers R, Holtzman A, Rashkin H, Bisk Y, Farhadi A, Roesner F, Choi Y (2019) Defending against neural fake news. arXiv:1905.12616v1"},{"key":"1045_CR112","volume-title":"The Lucifer effect: understanding how good people turn evil","author":"P Zimbardo","year":"2007","unstructured":"Zimbardo P (2007) The Lucifer effect: understanding how good people turn evil. Random House, New York"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-020-01045-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00146-020-01045-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-020-01045-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T03:56:31Z","timestamp":1668052591000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00146-020-01045-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,26]]},"references-count":112,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["1045"],"URL":"https:\/\/doi.org\/10.1007\/s00146-020-01045-4","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,26]]},"assertion":[{"value":"25 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}