{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T05:15:21Z","timestamp":1741238121605,"version":"3.38.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100005869","name":"University of Fribourg","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005869","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Informatik Spektrum"],"published-print":{"date-parts":[[2024,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>This academic paper delves into the captivating intersection of life engineering and algorithms, artificial intelligence (AI), social media, and quantitative metrics on human life, through a\u00a0comprehensive review of three thought-provoking books. In each critical review, the authors add their own thoughts and impressions, as Computer Science graduates and scholars, illustrating the impact that these eye-opening books have on them. The first book, \u201cWeapons of Math Destruction\u201d by Cathy O\u2019Neil, delves into the hidden dangers of algorithmic decision-making. O\u2019Neil uncovers how algorithms can perpetuate discrimination, biases, and unfairness in domains such as education, advertising, criminal justice, employment, and finance, and emphasizes the need for ethical considerations, transparency, and human judgment in algorithmic systems. The second book, \u201cAtlas of AI\u201d by Kate Crawford, takes a\u00a0multidimensional approach to AI beyond mere algorithms and deep learning. Crawford addresses issues such as labor exploitation, surveillance technologies, classification systems, wealth concentration, and environmental consequences due to AI. The book calls for responsible and ethical considerations in the development and usage of AI. Shoshana Zuboff\u2019s \u201cThe Age of Surveillance Capitalism\u201d is the third book, focusing on the pervasive influence of tech giants like Google and Facebook. Zuboff exposes the dynamics of surveillance capitalism, wherein personal data is extracted and exploited for economic gains. The book illuminates how this form of capitalism erodes privacy, reshapes societal structures, and challenges democratic norms. Illustrating the essence of these disruptive narratives and the tense dialogue taking place between ethicians or scholars and technology developers, this research examines the profound social, economic, and environmental implications brought forth by these transformative technologies. Ultimately, the paper advocates for the embrace of responsible and ethical technology development that not only safeguards the well-being of individuals but also fosters a\u00a0harmonious coexistence between humans and machines amidst the winds of disruption.<\/jats:p>","DOI":"10.1007\/s00287-024-01569-9","type":"journal-article","created":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T08:02:44Z","timestamp":1723795364000},"page":"141-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A\u00a0life engineering perspective on algorithms, AI, social media, and quantitative metrics"],"prefix":"10.1007","volume":"47","author":[{"given":"Georgiana","family":"Bigea","sequence":"first","affiliation":[]},{"given":"Maria","family":"Mumtaz","sequence":"additional","affiliation":[]},{"given":"Edy","family":"Portmann","sequence":"additional","affiliation":[]},{"given":"Jennifer","family":"Swaminathan","sequence":"additional","affiliation":[]},{"given":"Nakka","family":"Vedasri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,16]]},"reference":[{"key":"1569_CR1","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s12599-020-00680-x","volume":"63","author":"R Alt","year":"2021","unstructured":"Alt\u00a0R, G\u00f6ldi\u00a0A, \u00d6sterle\u00a0H et\u00a0al (2021) Life engineering. Bus Inf Syst Eng, 63:191\u2013205. https:\/\/doi.org\/10.1007\/s12599-020-00680-x","journal-title":"Bus Inf Syst Eng"},{"key":"1569_CR2","volume-title":"Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy: By Cathy O\u2019Neil","author":"A Jain","year":"2017","unstructured":"Jain\u00a0A (2017) Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy: By Cathy O\u2019Neil. Crown Publishing Group, pp. 259. https:\/\/link.springer.com\/article\/10.1057\/s11369-017-0027-3"},{"key":"1569_CR3","volume-title":"Is US News College Ranking a\u00a0Weapon of Math Destruction?","author":"Z Kui","year":"2022","unstructured":"Kui\u00a0Z (2022) Is US News College Ranking a\u00a0Weapon of Math Destruction? https:\/\/digitalcommons.hamilton.edu\/cgi\/viewcontent.cgi?article=1011&context=posters"},{"key":"1569_CR4","volume-title":"Weapons of mass instruction: A&nbsp;schoolteacher\u2019s journey through the dark world of compulsory schooling","author":"JT Gatto","year":"2010","unstructured":"Gatto\u00a0JT (2010) Weapons of mass instruction: A\u00a0schoolteacher\u2019s journey through the dark world of compulsory schooling. New Society Publishers"},{"issue":"3","key":"1569_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1257\/jep.23.3.37","volume":"23","author":"DS Evans","year":"2009","unstructured":"Evans\u00a0DS (2009) The online advertising industry: Economics, evolution, and privacy. J\u00a0Econ Perspect, 23(3):37\u201360","journal-title":"J Econ Perspect"},{"key":"1569_CR6","doi-asserted-by":"crossref","unstructured":"Evans DS (2008) The economics of the online advertising industry. Rev Netw Econ 7(3)","DOI":"10.2202\/1446-9022.1154"},{"issue":"1","key":"1569_CR7","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1037\/lhb0000360","volume":"44","author":"J Skeem","year":"2020","unstructured":"Skeem\u00a0J, Scurich\u00a0N, Monahan\u00a0J (2020) Impact of risk assessment on judges\u2019 fairness in sentencing relatively poor defendants. Law Hum Behav 44(1):51","journal-title":"Law Hum Behav"},{"key":"1569_CR8","first-page":"458","volume-title":"What does it mean to \u2018solve\u2019 the problem of discrimination in hiring? Social, technical and legal perspectives from the UK on automated hiring systems","author":"J S\u00e1nchez-Monedero","year":"2020","unstructured":"S\u00e1nchez-Monedero\u00a0J, Dencik\u00a0L, Edwards\u00a0L (2020) What does it mean to \u2018solve\u2019 the problem of discrimination in hiring? Social, technical and legal perspectives from the UK on automated hiring systems. Proceedings of the 2020 conference on fairness, accountability, and transparency, pp. 458\u2013468"},{"volume-title":"Big data, political campaigning and the law: Democracy and privacy in the age of micro-targeting","year":"2019","key":"1569_CR9","unstructured":"Witzleb\u00a0N, Paterson\u00a0M, Richardson\u00a0J (eds) (2019) Big data, political campaigning and the law: Democracy and privacy in the age of micro-targeting. Routledge"},{"key":"1569_CR10","doi-asserted-by":"crossref","unstructured":"Kreiss D (2017) Micro-targeting, the quantified persuasion. Internet Policy Rev 6(4)","DOI":"10.14763\/2017.4.774"},{"key":"1569_CR11","doi-asserted-by":"publisher","first-page":"336","DOI":"10.12987\/9780300252392","volume-title":"Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence","author":"K Crawford","year":"2021","unstructured":"Crawford\u00a0K (2021) Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence. Yale University Press, New Haven, Conn., p\u00a0336"},{"key":"1569_CR12","unstructured":"Zewe\u00a0A (2022) Does this artificial intelligence think like a human? https:\/\/news.mit.edu\/2022\/does-this-artificial-intelligence-think-human-0406. Accessed 25. July 2024"},{"key":"1569_CR13","volume-title":"Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification","author":"T Gebru","year":"2018","unstructured":"Gebru\u00a0T, Buolamwini\u00a0J.,2018. Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification. Proceedings of the 1st\u00a0Conference on Fairness, Accountability, and Transparency (FAT* \u203218)"},{"key":"1569_CR14","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278773","volume-title":"Subbarao Kambhampati \u201cWhat\u2019s up with Privacy?: User Preferences and Privacy Concerns in Intelligent Personal Assistants\u201d","author":"L Manikonda","year":"2018","unstructured":"Manikonda\u00a0L, Deotale\u00a0A (2018) Subbarao Kambhampati \u201cWhat\u2019s up with Privacy?: User Preferences and Privacy Concerns in Intelligent Personal Assistants\u201d. AIES \u203218: Proceedings of the 2018 AAAI\/ACM Conference on AI, Ethics, and Society"},{"key":"1569_CR15","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613089","volume-title":"Re-thinking networked privacy, security, identity and access control in our surveillance states","author":"A Clement","year":"2014","unstructured":"Clement\u00a0A (2014) Re-thinking networked privacy, security, identity and access control in our surveillance states. SACMAT \u203214: Proceedings of the 19th\u00a0ACM symposium on Access control models and technologies"},{"issue":"3","key":"1569_CR16","first-page":"123","volume":"10","author":"J Smith","year":"2020","unstructured":"Smith\u00a0J, Johnson\u00a0M (2020) Classification and Its Impact on Society: A\u00a0Critical Analysis. J\u00a0of Social Sciences 10(3):123\u2013145","journal-title":"J of Social Sciences"},{"key":"1569_CR17","unstructured":"Kirvan\u00a0P (2022) How much energy do data centers consume? https:\/\/www.techtarget.com\/searchdatacenter\/tip\/How-much-energy-do-data-centers-consume#:~:text=Data%20centers%20are%20among%20the,annually%2C%20with%20two%20identifiable%20trends. Accessed 25 July 2024"},{"key":"1569_CR18","doi-asserted-by":"crossref","unstructured":"O\u02bcKeeffe\u00a0G.S. and Clarke-Pearson\u00a0K (2011) The impact of social media on children, adolescents, and families. Pediatrics 127(4):800\u2013804","DOI":"10.1542\/peds.2011-0054"},{"key":"1569_CR19","doi-asserted-by":"crossref","unstructured":"Liaw\u00a0S.S and Huang\u00a0H.M (2003) An investigation of user attitudes toward search engines as an information retrieval tool. Computers in human behavior 19(6): 751\u2013765","DOI":"10.1016\/S0747-5632(03)00009-8"},{"key":"1569_CR20","doi-asserted-by":"crossref","unstructured":"Cleff\u00a0E.B (2007) Implementing the legal criteria of meaningful consent in the concept of mobile advertising. Computer Law & Security Review 23(3)262\u2013269","DOI":"10.1016\/j.clsr.2007.03.005"},{"key":"1569_CR21","doi-asserted-by":"publisher","DOI":"10.1145\/3338103.3338106","volume-title":"\u201cThe high cost of free services: problems with surveillance capitalism and possible alternatives for IT infrastructure,\u201d Proceedings of the Fifth Workshop on Computing within Limits","author":"M Landwehr","year":"2019","unstructured":"Landwehr, M., Borning, A. and Wulf, V., 2019, June. The high cost of free services: problems with surveillance capitalism and possible alternatives for IT infrastructure. In Proceedings of the Fifth Workshop on Computing within Limits (pp. 1\u201310)"},{"key":"1569_CR22","volume-title":"The age of surveillance capitalism: The fight for a&nbsp;human future at the new frontier of power","author":"Shoshana Zuboff","year":"2019","unstructured":"Zuboff\u00a0S (2019) The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power, edn. PublicAffairs, New York"},{"issue":"43","key":"1569_CR23","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MC.2010.170","volume":"6","author":"D Anguelov","year":"2010","unstructured":"Anguelov\u00a0D, Dulong\u00a0C, Filip\u00a0D, Frueh\u00a0C, Lafon\u00a0S, Lyon\u00a0R, Ogale\u00a0A, Vincent\u00a0L and Weaver\u00a0J (2010) Google street view: Capturing the world at street level. Computer 43(6):32\u201338","journal-title":"Computer"},{"key":"1569_CR24","doi-asserted-by":"crossref","unstructured":"Kausar\u00a0M.A, Dhaka\u00a0V.S and Singh\u00a0S.K (2013) Web crawler: a review. International Journal of Computer Applications 63(2):31\u201336","DOI":"10.5120\/10440-5125"},{"key":"1569_CR25","doi-asserted-by":"crossref","unstructured":"Di Domenico\u00a0G, Sit\u00a0J, Ishizaka\u00a0A and Nunan\u00a0D (2021) Fake news, social media and marketing: A systematic review. Journal of Business Research 124:329\u2013341","DOI":"10.1016\/j.jbusres.2020.11.037"},{"key":"1569_CR26","doi-asserted-by":"crossref","unstructured":"Van der Schyff\u00a0K, Flowerday\u00a0S and Furnell\u00a0S (2020) Duplicitous social media and data surveillance: An evaluation of privacy risk. Computers & Security 94:101822","DOI":"10.1016\/j.cose.2020.101822"},{"key":"1569_CR27","doi-asserted-by":"crossref","unstructured":"Varian\u00a0H.R. (2009) Online ad auctions. American Economic Review 99(2):430\u2013434","DOI":"10.1257\/aer.99.2.430"},{"key":"1569_CR28","doi-asserted-by":"crossref","unstructured":"Dunia\u00a0A.I.M, Rambe\u00a0A.H and Fauzi\u00a0R (2018) Measuring the power consumption of social media applications on a mobile device. In Journal of Physics: Conference Series 978(1):012104","DOI":"10.1088\/1742-6596\/978\/1\/012104"},{"key":"1569_CR29","doi-asserted-by":"publisher","unstructured":"Robinson\u00a0B. H (2009) E-waste: An assessment of global production and environmental impacts. Science of the Total Environment 408(2):183\u2013191. https:\/\/doi.org\/10.1016\/j.scitotenv.2009.09.044","DOI":"10.1016\/j.scitotenv.2009.09.044"}],"container-title":["Informatik Spektrum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-024-01569-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00287-024-01569-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-024-01569-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T11:15:35Z","timestamp":1741173335000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00287-024-01569-9"}},"subtitle":["A\u00a0review of three of the most thought-provoking books on the impact of tech on human life"],"short-title":[],"issued":{"date-parts":[[2024,8,16]]},"references-count":29,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["1569"],"URL":"https:\/\/doi.org\/10.1007\/s00287-024-01569-9","relation":{},"ISSN":["0170-6012","1432-122X"],"issn-type":[{"type":"print","value":"0170-6012"},{"type":"electronic","value":"1432-122X"}],"subject":[],"published":{"date-parts":[[2024,8,16]]},"assertion":[{"value":"2 May 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}