{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T22:44:54Z","timestamp":1776033894485,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T00:00:00Z","timestamp":1671408000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T00:00:00Z","timestamp":1671408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s00146-022-01616-7","type":"journal-article","created":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T15:02:46Z","timestamp":1671462166000},"page":"1397-1409","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["The paradoxical transparency of opaque machine learning"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1949-8286","authenticated-orcid":false,"given":"Felix Tun Han","family":"Lo","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,19]]},"reference":[{"key":"1616_CR1","volume-title":"State of exception","author":"G Agamben","year":"2005","unstructured":"Agamben G (2005) State of exception. University of Chicago Press, Chicago"},{"key":"1616_CR2","unstructured":"Agamben G (2020) Giorgio Agamben, \u201cThe state of exception provoked by an unmotivated emergency\u201d. In: positions politics. https:\/\/positionspolitics.org\/giorgio-agamben-the-state-of-exception-provoked-by-an-unmotivated-emergency\/. Accessed 17 Aug 2021."},{"issue":"3","key":"1616_CR3","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1177\/1461444816676645","volume":"20","author":"M Ananny","year":"2018","unstructured":"Ananny M, Crawford K (2018) Seeing without knowing: limitations of the transparency ideal and its application to algorithmic accountability. New Media Soc 20(3):973\u2013989","journal-title":"New Media Soc"},{"issue":"3","key":"1616_CR4","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s00146-019-00931-w","volume":"35","author":"T Araujo","year":"2020","unstructured":"Araujo T, Helberger N, Kruikemeier S et al (2020) In AI we trust? Perceptions about automated decision-making by artificial intelligence. AI Soc 35(3):611\u2013623. https:\/\/doi.org\/10.1007\/s00146-019-00931-w","journal-title":"AI Soc"},{"key":"1616_CR5","doi-asserted-by":"crossref","unstructured":"Banko M and Brill E (2001) Scaling to very very large corpora for natural language disambiguation. In: Proceedings of the 39th annual meeting of the Association for Computational Linguistics, 2001, pp. 26\u201333","DOI":"10.3115\/1073012.1073017"},{"key":"1616_CR6","unstructured":"Berghoff C, Biggio B, Brummel E et al. (2021) Whitepaper: towards auditable AI systems, pp. 32"},{"key":"1616_CR7","unstructured":"Boyd D, Crawford K (2011) Six provocations for big data. In: A decade in internet time: symposium on the dynamics of the internet and society, 2011"},{"key":"1616_CR8","unstructured":"Brill J (2015) Scalable approaches to transparency and accountability in decisionmaking algorithms: remarks at the NYU conference on algorithms and accountability. Federal Trade Commission 28"},{"key":"1616_CR9","volume-title":"The mythical man-month: essays on software engineering","author":"FP Brooks","year":"1975","unstructured":"Brooks FP (1975) The mythical man-month: essays on software engineering. Addison-Wesley Publisher Co, Reading"},{"issue":"1","key":"1616_CR10","doi-asserted-by":"publisher","first-page":"205395172098386","DOI":"10.1177\/2053951720983865","volume":"8","author":"S Brown","year":"2021","unstructured":"Brown S, Davidovic J, Hasan A (2021) The algorithm audit: scoring the algorithms that score us. Big Data Soc 8(1):2053951720983865. https:\/\/doi.org\/10.1177\/2053951720983865","journal-title":"Big Data Soc"},{"issue":"1","key":"1616_CR11","doi-asserted-by":"publisher","first-page":"205395171562251","DOI":"10.1177\/2053951715622512","volume":"3","author":"J Burrell","year":"2016","unstructured":"Burrell J (2016) How the machine \u2018thinks\u2019: understanding opacity in machine learning algorithms. Big Data Soc 3(1):2053951715622512","journal-title":"Big Data Soc"},{"issue":"2","key":"1616_CR12","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s00146-019-00888-w","volume":"35","author":"M Carabantes","year":"2020","unstructured":"Carabantes M (2020) Black-box artificial intelligence: an epistemological and critical analysis. AI Soc 35(2):309\u2013317","journal-title":"AI Soc"},{"key":"1616_CR13","unstructured":"Chan L (2021) Explainable AI as epistemic representation. In: Overcoming opacity in machine learning, pp. 7\u20138"},{"key":"1616_CR14","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/14050.001.0001","volume-title":"Discriminating data: correlation, neighborhoods, and the new politics of recognition","author":"WHK Chun","year":"2021","unstructured":"Chun WHK (2021) Discriminating data: correlation, neighborhoods, and the new politics of recognition. The MIT Press, Cambridge"},{"issue":"4","key":"1616_CR15","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1086\/709729","volume":"87","author":"KA Creel","year":"2020","unstructured":"Creel KA (2020) Transparency in complex computational systems. Philos Sci 87(4):568\u2013589","journal-title":"Philos Sci"},{"issue":"98","key":"1616_CR59","doi-asserted-by":"publisher","first-page":"48","DOI":"10.3898\/NEWF:98.04.2019","volume":"98","author":"Patrick Crogan","year":"2019","unstructured":"Crogan P (2019) Bernard Stiegler on Algorithmic Governmentality: A New Regimen of Truth? New Form 98:48\u201367. https:\/\/doi.org\/10.3898\/NEWF:98.04.2019","journal-title":"New Formations"},{"issue":"1","key":"1616_CR16","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1515\/popets-2015-0007","volume":"2015","author":"A Datta","year":"2015","unstructured":"Datta A, Tschantz MC, Datta A (2015) Automated experiments on Ad privacy settings. Proc Priv Enhancing Technol 2015(1):92\u2013112","journal-title":"Proc Priv Enhancing Technol."},{"issue":"2","key":"1616_CR17","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/2844110","volume":"59","author":"N Diakopoulos","year":"2016","unstructured":"Diakopoulos N (2016) Accountability in algorithmic decision making. Commun ACM 59(2):56\u201362","journal-title":"Commun ACM"},{"key":"1616_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2021.103555","volume":"300","author":"R Dobbe","year":"2021","unstructured":"Dobbe R, Krendl Gilbert T, Mintz Y (2021) Hard choices in artificial intelligence. Artif Intell 300:103555. https:\/\/doi.org\/10.1016\/j.artint.2021.103555","journal-title":"Artif Intell"},{"issue":"4","key":"1616_CR19","doi-asserted-by":"publisher","first-page":"44","DOI":"10.36615\/thethinker.v82i4.373","volume":"82","author":"AA Fainman","year":"2019","unstructured":"Fainman AA (2019) The problem with Opaque AI. Thinker 82(4):44\u201355","journal-title":"Thinker"},{"key":"1616_CR20","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780195146158.001.0001","volume-title":"Transforming technology: a critical theory revisited","author":"A Feenberg","year":"2002","unstructured":"Feenberg A (2002) Transforming technology: a critical theory revisited. Oxford University Press, New York"},{"key":"1616_CR21","doi-asserted-by":"publisher","DOI":"10.4159\/9780674982109","volume-title":"Technosystem: the social life of reason","author":"A Feenberg","year":"2017","unstructured":"Feenberg A (2017) Technosystem: the social life of reason. Harvard University Press, Cambridge"},{"key":"1616_CR22","unstructured":"Heath N (2013) Six open source security myths debunked\u2014and eight real challenges to consider. https:\/\/www.zdnet.com\/article\/six-open-source-security-myths-debunked-and-eight-real-challenges-to-consider\/. Accessed 29 Apr 2022"},{"issue":"1","key":"1616_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5617\/jea.8285","volume":"5","author":"G Huby","year":"2021","unstructured":"Huby G, Harries J (2021) Bloody paperwork: algorithmic governance and control in UK integrated health and social care settings. J Extreme Anthropol 5(1):1\u201328. https:\/\/doi.org\/10.5617\/jea.8285","journal-title":"J Extreme Anthropol"},{"issue":"2","key":"1616_CR24","doi-asserted-by":"publisher","first-page":"205395172110203","DOI":"10.1177\/20539517211020332","volume":"8","author":"MH Jarrahi","year":"2021","unstructured":"Jarrahi MH, Newlands G, Lee MK et al (2021) Algorithmic management in a work context. Big Data Soc 8(2):20539517211020332","journal-title":"Big Data Soc"},{"key":"1616_CR25","volume-title":"AI 2041","author":"K-F Lee","year":"2021","unstructured":"Lee K-F, Chen Q (2021) AI 2041, 1st edn. Currency, New York","edition":"1"},{"key":"1616_CR26","unstructured":"Lee E, Taylor H, Hiley L et al (2021) Technical barriers to the adoption of post-hoc explanation methods for black box AI models. In: Overcoming opacity in machine learning, pp. 12\u201313"},{"key":"1616_CR27","unstructured":"Levy E (2000) Wide open source. SecurityFocus. com. Electronic document, p. 19. http:\/\/www.securityfocus.com\/news"},{"issue":"4","key":"1616_CR28","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1093\/jcr\/ucz013","volume":"46","author":"C Longoni","year":"2019","unstructured":"Longoni C, Bonezzi A, Morewedge CK (2019) Resistance to medical artificial intelligence. J Consumer Res 46(4):629\u2013650","journal-title":"J Consumer Res"},{"key":"1616_CR29","unstructured":"Malik MM (2020) A hierarchy of limitations in machine learning. arXiv preprint arXiv:2002.05193"},{"issue":"7788","key":"1616_CR30","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1038\/s41586-019-1799-6","volume":"577","author":"SM McKinney","year":"2020","unstructured":"McKinney SM, Sieniek M, Godbole V et al (2020) International evaluation of an AI system for breast cancer screening. Nature 577(7788):89\u201394","journal-title":"Nature"},{"issue":"4\u20135","key":"1616_CR31","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1177\/1367549415577389","volume":"18","author":"D McQuillan","year":"2015","unstructured":"McQuillan D (2015) Algorithmic states of exception. Eur J Cult Stud 18(4\u20135):564\u2013576","journal-title":"Eur J Cult Stud"},{"issue":"2","key":"1616_CR32","doi-asserted-by":"publisher","first-page":"205395171667134","DOI":"10.1177\/2053951716671340","volume":"3","author":"D McQuillan","year":"2016","unstructured":"McQuillan D (2016) Algorithmic paranoia and the convivial alternative. Big Data Soc 3(2):2053951716671340","journal-title":"Big Data Soc"},{"key":"1616_CR33","unstructured":"Minsky M (1967) Why programming is a good medium for expressing poorly understood and sloppily formulated ideas. In: Design and planning II-computers in design and communication. New York, Hastings House, pp. 120\u2013125"},{"issue":"2","key":"1616_CR34","doi-asserted-by":"publisher","first-page":"205395171667967","DOI":"10.1177\/2053951716679679","volume":"3","author":"BD Mittelstadt","year":"2016","unstructured":"Mittelstadt BD, Allo P, Taddeo M et al (2016) The ethics of algorithms: mapping the debate. Big Data Soc 3(2):2053951716679679","journal-title":"Big Data Soc"},{"key":"1616_CR35","unstructured":"M\u00fcller VC (2021) Deep opacity undermines data protection and explainable artificial intelligence. In: Overcoming opacity in machine learning, pp. 18\u201321"},{"key":"1616_CR36","first-page":"10","volume":"2006","author":"A Ozment","year":"2006","unstructured":"Ozment A, Schechter SE (2006) Milk or wine: does software security improve with age? USENIX Secur Symp 2006:10\u20135555","journal-title":"USENIX Secur Symp"},{"key":"1616_CR37","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061","volume-title":"The black box society","author":"F Pasquale","year":"2015","unstructured":"Pasquale F (2015) The black box society. Harvard University Press"},{"key":"1616_CR38","doi-asserted-by":"crossref","unstructured":"P\u016brait\u0117 A, Zuzevi\u010di\u016bt\u0117 V, Bereikien\u0117 D et al. (2020) Algorithmic governance in public sector: is digitization a key to effective management. https:\/\/repository.mruni.eu\/handle\/007\/17025. Accessed 17 Aug 2021.","DOI":"10.14807\/ijmp.v11i9.1400"},{"key":"1616_CR39","volume-title":"The Cathedral and the Bazaar: musings on Linux and open source by an accidental revolutionary","author":"ES Raymond","year":"2001","unstructured":"Raymond ES (2001) The Cathedral and the Bazaar: musings on Linux and open source by an accidental revolutionary, Rev. O\u2019Reilly, Cambridge","edition":"Rev."},{"issue":"1","key":"1616_CR40","first-page":"163","volume":"177","author":"A Rouvroy","year":"2013","unstructured":"Rouvroy A, Berns T (2013a) Algorithmic governmentality and prospects of emancipation. Reseaux 177(1):163\u2013196","journal-title":"Reseaux"},{"issue":"1","key":"1616_CR41","first-page":"163","volume":"177","author":"A Rouvroy","year":"2013","unstructured":"Rouvroy A, Berns T (2013b) Gouvernementalit\u00e9 algorithmique et perspectives d\u2019\u00e9mancipation. Reseaux 177(1):163\u2013196","journal-title":"Reseaux"},{"key":"1616_CR42","first-page":"4349","volume":"22","author":"C Sandvig","year":"2014","unstructured":"Sandvig C, Hamilton K, Karahalios K et al (2014) Auditing algorithms: research methods for detecting discrimination on internet platforms. Data Discrimination: Converting Critical Concerns into Productive Inquiry 22:4349\u20134357","journal-title":"Data Discrimination: Converting Critical Concerns into Productive Inquiry"},{"issue":"5","key":"1616_CR43","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1145\/1941487.1941516","volume":"54","author":"G Schryen","year":"2011","unstructured":"Schryen G (2011) Is open source security a myth? Commun ACM 54(5):130\u2013140. https:\/\/doi.org\/10.1145\/1941487.1941516","journal-title":"Commun ACM"},{"issue":"2","key":"1616_CR44","doi-asserted-by":"publisher","first-page":"205395171773810","DOI":"10.1177\/2053951717738104","volume":"4","author":"N Seaver","year":"2017","unstructured":"Seaver N (2017) Algorithms as culture: Some tactics for the ethnography of algorithmic systems. Big Data Soc 4(2):2053951717738104","journal-title":"Big Data Soc"},{"issue":"6419","key":"1616_CR45","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1126\/science.aar6404","volume":"362","author":"D Silver","year":"2018","unstructured":"Silver D, Hubert T, Schrittwieser J et al (2018) A general reinforcement learning algorithm that masters chess, shogi, and Go through self-play. Science 362(6419):1140\u20131144","journal-title":"Science"},{"key":"1616_CR46","volume-title":"On the mode of existence of technical objects","author":"G Simondon","year":"2016","unstructured":"Simondon G (2016) On the mode of existence of technical objects. Univocal Publisher, Minneapolis"},{"issue":"2","key":"1616_CR47","doi-asserted-by":"publisher","first-page":"205395172093398","DOI":"10.1177\/2053951720933989","volume":"7","author":"GJ Smith","year":"2020","unstructured":"Smith GJ (2020) The politics of algorithmic governance in the black box city. Big Data Soc 7(2):2053951720933989. https:\/\/doi.org\/10.1177\/2053951720933989","journal-title":"Big Data Soc"},{"key":"1616_CR48","volume-title":"Automatic society: the future of work","author":"B Stiegler","year":"2016","unstructured":"Stiegler B (2016) Automatic society: the future of work. Polity Press, Cambridge"},{"issue":"4","key":"1616_CR49","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1016\/j.cell.2020.01.021","volume":"180","author":"JM Stokes","year":"2020","unstructured":"Stokes JM, Yang K, Swanson K et al (2020) A deep learning approach to antibiotic discovery. Cell 180(4):688\u2013702","journal-title":"Cell"},{"key":"1616_CR50","volume-title":"The British journal for the philosophy of science","author":"E Sullivan","year":"2020","unstructured":"Sullivan E (2020) Understanding from machine learning models. In: Sps S (ed) The British journal for the philosophy of science. The University of Chicago Press, Chicago"},{"key":"1616_CR51","unstructured":"Supreme Audit Institutions (2020) Auditing Machine Learning Algorithms. https:\/\/www.auditingalgorithms.net\/index.html. Accessed 16 August 2021"},{"key":"1616_CR52","unstructured":"US National Security Commission (2021) NSCAI Final Report. https:\/\/www.nscai.gov\/. Accessed 20 May 2021."},{"issue":"2","key":"1616_CR53","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1037\/pspa0000098","volume":"114","author":"Y Wang","year":"2018","unstructured":"Wang Y, Kosinski M (2018) Deep neural networks are more accurate than humans at detecting sexual orientation from facial images. J Personal Soc Psychol 114(2):246","journal-title":"J Personal Soc Psychol"},{"key":"1616_CR54","unstructured":"Watson DS (2021) No explanation without inference. In: Overcoming opacity in machine learning, pp. 9\u201311"},{"key":"1616_CR55","volume-title":"Computer power and human reason: from judgment to calculation","author":"J Weizenbaum","year":"1976","unstructured":"Weizenbaum J (1976) Computer power and human reason: from judgment to calculation. Freeman, San Francisco"},{"key":"1616_CR56","unstructured":"Zednik C, Boelsen H (2021) Preface: overcoming opacity in machine learning. In: Overcoming opacity in machine learning, pp. 1\u20132"},{"issue":"2","key":"1616_CR57","doi-asserted-by":"publisher","first-page":"140","DOI":"10.17645\/mac.v9i2.3806","volume":"9","author":"S Zou","year":"2021","unstructured":"Zou S (2021) Disenchanting trust: instrumental reason, algorithmic governance, and China\u2019s emerging social credit system. Media Commun 9(2):140\u2013149. https:\/\/doi.org\/10.17645\/mac.v9i2.3806","journal-title":"Media Commun"},{"key":"1616_CR58","volume-title":"The age of surveillance capitalism: the fight for a human future at the new frontier of power","author":"S Zuboff","year":"2019","unstructured":"Zuboff S (2019) The age of surveillance capitalism: the fight for a human future at the new frontier of power, 1st edn. PublicAffairs, New York","edition":"1"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-022-01616-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00146-022-01616-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-022-01616-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T17:11:13Z","timestamp":1719594673000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00146-022-01616-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,19]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1616"],"URL":"https:\/\/doi.org\/10.1007\/s00146-022-01616-7","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,19]]},"assertion":[{"value":"27 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}