{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T22:44:55Z","timestamp":1776033895405,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T00:00:00Z","timestamp":1685491200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T00:00:00Z","timestamp":1685491200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100014815","name":"GKN Aerospace Services","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014815","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001734","name":"K\u00f8benhavns Universitet","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001734","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004418","name":"Vrije Universiteit Brussel","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004418","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Royal Library, Copenhagen University Library"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Deep learning developers typically rely on deep learning software frameworks (DLSFs)\u2014simply described as pre-packaged libraries of programming components that provide high-level access to deep learning functionality. New DLSFs progressively encapsulate mathematical, statistical and computational complexity. Such higher levels of abstraction subsequently make it easier for deep learning methodology to spread through mimesis (i.e., imitation of models perceived as successful). In this study, we quantify this increase in abstraction and discuss its implications. Analyzing publicly available code from Github, we found that the introduction of DLSFs correlates both with significant increases in the number of deep learning projects and substantial reductions in the number of lines of code used. We subsequently discuss and argue the importance of abstraction in deep learning with respect to ephemeralization, technological advancement, democratization, adopting timely levels of abstraction, the emergence of mimetic deadlocks, issues related to the use of black box methods including privacy and fairness, and the concentration of technological power. Finally, we also discuss abstraction as a symptom of an ongoing technological metatransition.<\/jats:p>","DOI":"10.1007\/s00146-023-01688-z","type":"journal-article","created":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T14:02:33Z","timestamp":1685541753000},"page":"2349-2357","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Abstraction, mimesis and the evolution of deep learning"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0284-3437","authenticated-orcid":false,"given":"Jon","family":"Ekl\u00f6f","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Hamelryck","sequence":"additional","affiliation":[]},{"given":"Cadell","family":"Last","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Grima","sequence":"additional","affiliation":[]},{"given":"Ulrika Lundh","family":"Snis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"1688_CR1","doi-asserted-by":"crossref","unstructured":"Becker B, Denny P, Pettit R, Bouchard D, Bouvier D, Harrington B, Prather J (2019) Compiler error messages considered unhelpful: the landscape of text-based programming error message research. IN: Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education, pp 177\u2013210","DOI":"10.1145\/3344429.3372508"},{"key":"1688_CR2","first-page":"973","volume":"20","author":"E Bingham","year":"2019","unstructured":"Bingham E, Chen J, Jankowiak M, Obermeyer F, Pradhan N, Karaletsos T, Goodman N (2019) Pyro: deep universal probabilistic programming. J Mach Learn Res 20:973\u2013978","journal-title":"J Mach Learn Res"},{"key":"1688_CR3","unstructured":"Bommasani R, Liang P, Hudson D, Adeli E, Altman R, Arora SV, Etchemendy (2021) On the opportunities and risks of foundational models. arXiv preprint, http:\/\/arXiv.org\/2108.07258"},{"issue":"4","key":"1688_CR4","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1145\/2163.358083","volume":"26","author":"P Brown","year":"1983","unstructured":"Brown P (1983) Error messages: the neglected area of the man\/machine interface. Commun ACM 26(4):246\u2013249","journal-title":"Commun ACM"},{"key":"1688_CR5","unstructured":"Brownlee J (2016) Deep learning with python: develop deep learning models on Theano and TensorFlow using Keras. In: Machine learning mastery"},{"key":"1688_CR6","unstructured":"Buolamwini JG (2018) Gender shades: intersectional accuracy disparities in commercial gender classification. In: Proceedings of machine learning research, 77\u201391"},{"issue":"7623","key":"1688_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1038\/538020a","volume":"538","author":"D Castelvecchi","year":"2016","unstructured":"Castelvecchi D (2016) Can we open the black box of AI? Nat News 538(7623):20\u201323. https:\/\/doi.org\/10.1038\/538020a","journal-title":"Nat News"},{"key":"1688_CR8","doi-asserted-by":"publisher","unstructured":"Demirovi\u0107 D, Skeji\u0107 E, \u0160erifovi\u0107-Trbali\u0107 A (2018) Performance of some image processing algorithms in Tensorflow. In: 25th International Conference on Systems, Signals and Image Processing (IWSSIP), 1\u20134. https:\/\/doi.org\/10.1109\/IWSSIP.2018.8439714","DOI":"10.1109\/IWSSIP.2018.8439714"},{"key":"1688_CR9","unstructured":"Economist (2020) Businesses are finding AI hard to adopt. Retrieved March 15, 2023, from https:\/\/www.economist.com\/technology-quarterly\/2020\/06\/11\/businesses-are-finding-ai-hard-to-adopt"},{"key":"1688_CR10","unstructured":"Economist (2022) What if all workers wrote software, not just the geek elite? Economist. Retrieved March 15, 2023, from https:\/\/www.economist.com\/business\/2022\/01\/29\/what-if-all-workers-wrote-software-not-just-the-geek-elite?giftId=e827aa1a-7c4e-4ca0-85c3-f9d2953ab719"},{"key":"1688_CR11","unstructured":"Fuller B (1938) Nine chains to the moon, Anchor Books, 1938, 1973. Anchor Books"},{"issue":"1","key":"1688_CR12","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1080\/0952813X.2014.940685","volume":"27","author":"J-G Ganascia","year":"2015","unstructured":"Ganascia J-G (2015) Abstraction of levels of abstraction. J Exp Theor Artif Intell 27(1):23\u201335","journal-title":"J Exp Theor Artif Intell"},{"key":"1688_CR13","volume-title":"Deceit desire and the novel","author":"R Girard","year":"1965","unstructured":"Girard R (1965) Deceit desire and the novel. Johns Hopkins Press"},{"key":"1688_CR14","first-page":"73","volume-title":"Violent origins: Walter Burkert, Ren\u00e9 Girard, and Jonathan Z. Smith on Ritual Killing and cultural formation","author":"R Girard","year":"1988","unstructured":"Girard R (1988) Generative Scapegoating. Violent origins: Walter Burkert, Ren\u00e9 Girard, and Jonathan Z. Smith on Ritual Killing and cultural formation. Stanford University Press, pp 73\u2013105"},{"key":"1688_CR15","volume-title":"Battling to the end: conversations with Beno\u00eet Chantre","author":"R Girard","year":"2009","unstructured":"Girard R (2009) Battling to the end: conversations with Beno\u00eet Chantre. MSU Press"},{"key":"1688_CR16","volume-title":"Things hidden since the foundation of the world","author":"R Girard","year":"2002","unstructured":"Girard R, Oughourlian J-M, Lefort G (2002) Things hidden since the foundation of the world. Stanford University Press"},{"key":"1688_CR17","unstructured":"GitHub (2022a) About GitHub. Retrieved Feb 14, 2022a, from https:\/\/github.com\/about"},{"key":"1688_CR18","unstructured":"GitHub (2022b) PyTorch. Retrieved Feb 02, 2022b, from GitHub: https:\/\/github.com\/pytorch\/pytorch\/releases\/tag\/v0.1.1"},{"key":"1688_CR19","unstructured":"Google AI (2015) Google AI Blog. Retrieved 02 Apr 2022, from https:\/\/ai.googleblog.com\/2015\/11\/tensorflow-googles-latest-machine.html"},{"issue":"7747","key":"1688_CR20","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1038\/s41586-019-0980-2","volume":"567","author":"V Havl\u00ed\u010dek","year":"2019","unstructured":"Havl\u00ed\u010dek V, C\u00f3rcoles A, Temme K, Harrow A, Kandala A, Chow J, Gambetta J (2019) Supervised learning with quantum-enhanced feature spaces. Nature 567(7747):209\u2013212. https:\/\/doi.org\/10.1038\/s41586-019-0980-2","journal-title":"Nature"},{"key":"1688_CR21","unstructured":"Heylighen F (2003) Introduction to principia cybernetica. Retrieved February 09, 2022, from Principia Cybernitica Web: http:\/\/pespmc1.vub.ac.be\/INTRO.html"},{"key":"1688_CR22","first-page":"304","volume-title":"Globalization as evolutionary process","author":"F Heylighen","year":"2007","unstructured":"Heylighen F (2007) Accelerating socio-technological evolution: from ephemeralization and stigmergy to the global brain. Globalization as evolutionary process. Routledge, pp 304\u2013329"},{"key":"1688_CR23","unstructured":"Holweg M, Younger R, Wen Y (2022).The reputational risks of AI. Calif Manag Rev Insights, 64(2)"},{"key":"1688_CR24","unstructured":"Kaye K (2022) Should just anyone be given keys to the AI machine? Why low-code AI tools pose new risks. (protocol.com) Retrieved Mar 15, 2023, from https:\/\/www.protocol.com\/enterprise\/no-low-code-ai-risks"},{"key":"1688_CR25","unstructured":"Keras (2016) Keras Blog. Retrieved Feb 14, 2022, from https:\/\/blog.keras.io\/introducing-keras-10.html"},{"key":"1688_CR26","doi-asserted-by":"crossref","unstructured":"Kiritchenko S, Mohammad S (2018) Examining gender and race bias in two hundred sentiment analysis systems. In: Proceedings of the 7th Joint Conference on Lexical and Computational Semantics (*SEM), New Orleans)","DOI":"10.18653\/v1\/S18-2005"},{"key":"1688_CR27","doi-asserted-by":"publisher","unstructured":"Kleinberg J, Mullainathan S, Raghavan M (2017) Inherent trade-offs in the fair determination of risk scores. In: 8th Innovations in Theoretical Computer Science Conference, pp. 43:1\u201343:23. https:\/\/doi.org\/10.4230\/LIPIcs.ITCS.2017.43","DOI":"10.4230\/LIPIcs.ITCS.2017.43"},{"key":"1688_CR28","unstructured":"Ko AJ (2014) Programming languages are the least usable, but most powerful human-computer interfaces ever invented. Retrieved Feb 14, 2022, from https:\/\/medium.com\/bits-and-behavior\/programming-languages-are-the-least-usable-but-most-powerful-human-computer-interfaces-ever-invented-7509348dedc"},{"key":"1688_CR29","first-page":"1097","volume":"25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky A, Sutskever I, Hinton G (2012) ImageNet classification with deep convolutional neural networks. Adv Neural Inf Process Syst 25:1097\u20131105","journal-title":"Adv Neural Inf Process Syst"},{"key":"1688_CR30","unstructured":"Kurzweil R (2001) The law of accelerating returns. Retrieved Mar 15, 2023, from https:\/\/www.kurzweilai.net\/the-law-of-accelerating-returns"},{"key":"1688_CR31","unstructured":"Lamblin P (2017) Theano Users Google group. Retrieved Feb 14, 2022, from https:\/\/groups.google.com\/g\/theano-users\/c\/7Poq8BZutbY"},{"key":"1688_CR32","volume-title":"Feeling and form: a theory of art developed from philosophy in a new key","author":"S Langer","year":"1953","unstructured":"Langer S (1953) Feeling and form: a theory of art developed from philosophy in a new key. Charles Scribner\u2019s Sons, New York"},{"key":"1688_CR33","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.techfore.2016.06.013","volume":"114","author":"C Last","year":"2017","unstructured":"Last C (2017) Global commons in the global brain. Technol Forecast Soc Chang 114:48\u201364. https:\/\/doi.org\/10.1016\/j.techfore.2016.06.013","journal-title":"Technol Forecast Soc Chang"},{"key":"1688_CR34","unstructured":"Marcus G (2018) Deep learning: a critical appraisal. arXiv preprint, https:\/\/arxiv.org\/1801.00631. Retrieved Mar 15, 2023, from https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1801\/1801.00631.pdf"},{"key":"1688_CR35","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198502944.001.0001","volume-title":"The major transitions in evolution","author":"J Maynard Smith","year":"1997","unstructured":"Maynard Smith J, Szathmary E (1997) The major transitions in evolution. Oxford University Press"},{"issue":"1","key":"1688_CR36","first-page":"7503","volume":"21","author":"G Naizat","year":"2020","unstructured":"Naizat G, Zhitnikov A, Lim L-H (2020) Topology of deep neural networks. J Mach Learn Res 21(1):7503\u20137532","journal-title":"J Mach Learn Res"},{"key":"1688_CR37","unstructured":"Norwegian Consumer Council (2018) Deceived by design, how tech companies use dark patterns to discourage us from exercising our rights to privacy. Retrieved Mar 15, 2023, from https:\/\/fil.forbrukerradet.no\/wp-content\/uploads\/2018\/06\/2018-06-27-deceived-by-design-final.pdf"},{"key":"1688_CR38","doi-asserted-by":"crossref","unstructured":"Oneto N, Anguita L, Navarin A, Sperduti D (2019) Recent advances in big data and deep learning. In: Proceedings of the INNS Big Data and Deep Learning Conference INNSBDDL2019, held at Sestri Levante, Genova, Italy 16\u201318 April 2019","DOI":"10.1007\/978-3-030-16841-4"},{"key":"1688_CR39","unstructured":"OpenAI (2023) Introducing ChatGPT. (openAI.com) Retrieved Mar 15, 2023, from https:\/\/openai.com\/blog\/chatgpt"},{"key":"1688_CR40","volume-title":"Causality: models, reasoning and inference","author":"J Pearl","year":"2000","unstructured":"Pearl J (2000) Causality: models, reasoning and inference, vol 19.2. Cambridge University Press, Cambridge"},{"issue":"6","key":"1688_CR41","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1177\/0163443712449497","volume":"34","author":"A Powell","year":"2012","unstructured":"Powell A (2012) Democratizing production through open source knowledge: from open software to open hardware. Media Cult Soc 34(6):691\u2013708","journal-title":"Media Cult Soc"},{"key":"1688_CR42","unstructured":"Press G (2020) 54 predictions about the state of data In: 2021. Retrieved Mar 15, 2023, from forbes.com: https:\/\/www.forbes.com\/sites\/gilpress\/2021\/12\/30\/54-predictions-about-the-state-of-data-in-2021\/?sh=6af0ecb0397d"},{"key":"1688_CR43","unstructured":"PyTorch (2018) PyTorch blog. Retrieved Feb 14, 2022, from https:\/\/pytorch.org\/blog\/a-year-in\/"},{"key":"1688_CR44","doi-asserted-by":"publisher","DOI":"10.4324\/9780203875476","volume-title":"The ABC of relativity","author":"B Russell","year":"2009","unstructured":"Russell B (2009) The ABC of relativity. Routledge"},{"key":"1688_CR45","doi-asserted-by":"crossref","unstructured":"Sady, W. (2001). Ludwik Fleck\u2013Thought Collectives and Thought Styles. In Polish philosophers of science and nature in the 20th century (pp. 197\u2013205). Brill.","DOI":"10.1163\/9789004457799_025"},{"key":"1688_CR46","doi-asserted-by":"publisher","unstructured":"Shi S, Wang Q, Xu P, Chu X (2016) Benchmarking state-of-the-art deep learning software tools. In: 7th International Conference on Cloud Computing and Big Data (CCBD), 99\u2013104. https:\/\/doi.org\/10.1109\/CCBD.2016.029","DOI":"10.1109\/CCBD.2016.029"},{"issue":"33","key":"1688_CR47","doi-asserted-by":"publisher","first-page":"10104","DOI":"10.1073\/pnas.1421398112","volume":"112","author":"E Szathm\u00e1ry","year":"2015","unstructured":"Szathm\u00e1ry E (2015) Toward major evolutionary transitions theory 2.0. Proc Natl Acad Sci 112(33):10104\u201310111. https:\/\/doi.org\/10.1073\/pnas.1421398112","journal-title":"Proc Natl Acad Sci"},{"issue":"6519","key":"1688_CR48","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1038\/374227a0","volume":"374","author":"E Szathm\u00e1ry","year":"1995","unstructured":"Szathm\u00e1ry E, Maynard Smith J (1995) The major evolutionary transitions. Nature 374(6519):227\u2013232. https:\/\/doi.org\/10.1038\/374227a0","journal-title":"Nature"},{"key":"1688_CR49","volume-title":"The phenomenon of science: a cybernetic approach to human evolution","author":"V Turchin","year":"1977","unstructured":"Turchin V (1977) The phenomenon of science: a cybernetic approach to human evolution. Columbia University Press, New York"},{"key":"1688_CR50","doi-asserted-by":"crossref","unstructured":"Wang T, Zhao J, Yatskar M, Chang K, Ordonez V (2019) Balanced datasets are not enough: estimating and mitigating gender bias in deep image representations. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision","DOI":"10.1109\/ICCV.2019.00541"},{"issue":"4","key":"1688_CR51","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/s13042-020-01096-5","volume":"11","author":"X Wang","year":"2020","unstructured":"Wang X, Zhao Y, Pourpanah F (2020) Recent advances in deep learning. Int J Mach Learn Cybern 11(4):747\u2013750","journal-title":"Int J Mach Learn Cybern"},{"key":"1688_CR52","unstructured":"Wolff G, Anderson J, Viry P (2020) Europe has an artificial-intelligence skills shortage. Retrieved Mar 15, 2023, from https:\/\/www.bruegel.org\/2020\/08\/europe-has-an-artificial-intelligence-skills-shortage\/"},{"key":"1688_CR53","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1038\/d41586-021-03041-0","volume":"599","author":"C Woolston","year":"2021","unstructured":"Woolston C (2021) Stagnating salaries present hurdles to career satisfaction. Nature 599:519\u2013521. https:\/\/doi.org\/10.1038\/d41586-021-03041-0","journal-title":"Nature"},{"key":"1688_CR54","unstructured":"Yu E (2022) Singapore releases software toolkit to guide financial sector on AI ethics. Retrieved Mar 15, 2023, from https:\/\/www.zdnet.com\/article\/singapore-releases-software-toolkit-to-guide-financial-sector-on-ai-ethics\/"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-023-01688-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00146-023-01688-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-023-01688-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T04:06:24Z","timestamp":1726805184000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00146-023-01688-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,31]]},"references-count":54,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1688"],"URL":"https:\/\/doi.org\/10.1007\/s00146-023-01688-z","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,31]]},"assertion":[{"value":"23 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all the authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}