{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:34:10Z","timestamp":1767141250953,"version":"build-2238731810"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T00:00:00Z","timestamp":1717977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T00:00:00Z","timestamp":1717977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2025,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    Decision-making systems are prone to discrimination against individuals with regard to protected characteristics such as gender and ethnicity. Detecting and explaining the discriminatory behavior of implemented software is difficult. To avoid the possibility of discrimination from the onset of software development, we propose a model-based methodology called\n                    <jats:italic>MBFair<\/jats:italic>\n                    that allows for verifying UML-based software designs with regard to individual fairness. The verification in MBFair is performed by generating temporal logic clauses, whose verification results enable reporting on the individual fairness of the targeted software. We study the applicability of MBFair using three case studies in real-world settings including a bank services system, a delivery system, and a loan system. We empirically evaluate the necessity of MBFair in a user study and compare it against a baseline scenario in which no modeling and tool support is offered. Our empirical evaluation indicates that analyzing the UML models manually produces unreliable results with a high chance of 46% that analysts overlook true-positive discrimination. We conclude that analysts require support for fairness-related analysis, such as our MBFair methodology.\n                  <\/jats:p>","DOI":"10.1007\/s10270-024-01184-y","type":"journal-article","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T04:02:37Z","timestamp":1717992157000},"page":"111-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["MBFair: a model-based verification methodology for detecting violations of individual fairness"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8159-918X","authenticated-orcid":false,"given":"Qusai","family":"Ramadan","sequence":"first","affiliation":[]},{"given":"Marco","family":"Konersmann","sequence":"additional","affiliation":[]},{"given":"Amir Shayan","family":"Ahmadian","sequence":"additional","affiliation":[]},{"given":"Jan","family":"J\u00fcrjens","sequence":"additional","affiliation":[]},{"given":"Steffen","family":"Staab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,10]]},"reference":[{"issue":"6","key":"1184_CR1","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MIS.2016.96","volume":"31","author":"L Carmichael","year":"2016","unstructured":"Carmichael, L., Stalla-Bourdillon, S., Staab, S.: Data mining and automated discrimination: a mixed legal\/technical perspective. IEEE Intell. Syst. 31(6), 51\u201355 (2016)","journal-title":"IEEE Intell. Syst."},{"key":"1184_CR2","unstructured":"Staab, S., Stalla-Bourdillon, S., Carmichael, L.: Observing and recommending from a social web with biases. arXiv:1604.07180 (2016). Accessed 06 Nov 2022"},{"issue":"1","key":"1184_CR3","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1177\/0162243915605575","volume":"41","author":"T Zarsky","year":"2016","unstructured":"Zarsky, T.: The trouble with algorithmic decisions: an analytic road map to examine efficiency and fairness in automated and opaque decision making. Sci. Technol. Hum. Values 41(1), 118\u2013132 (2016)","journal-title":"Sci. Technol. Hum. Values"},{"key":"1184_CR4","unstructured":"Regulation (EU) 2016\/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Union (2016)"},{"key":"1184_CR5","doi-asserted-by":"crossref","unstructured":"Galhotra, S., Brun, Y., Meliou, A.: Fairness testing: testing software for discrimination. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 498\u2013510. ACM (2017)","DOI":"10.1145\/3106237.3106277"},{"key":"1184_CR6","doi-asserted-by":"crossref","unstructured":"Dwork, C., Hardt, M., Pitassi, T., Reingold, O., Zemel, R.: Fairness through awareness. In: Proceedings of the 3rd Innovations in Teoretical Cmputer Sience Cnference, pp. 214\u2013226. ACM (2012)","DOI":"10.1145\/2090236.2090255"},{"key":"1184_CR7","doi-asserted-by":"crossref","unstructured":"Verma, S., Rubin, J.: Fairness definitions explained. In: 2018 IEEE\/ACM International Workshop on Software Fairness (FairWare), pp. 1\u20137. IEEE (2018)","DOI":"10.1145\/3194770.3194776"},{"key":"1184_CR8","doi-asserted-by":"crossref","unstructured":"Ramadan, Q., Ahmadian, A.S., Str\u00fcber, D., J\u00fcrjens, J., Staab, S.: Model-based discrimination analysis: a position paper. In: 2018 IEEE\/ACM International Workshop on Software Fairness (FairWare), pp. 22\u201328. IEEE (2018)","DOI":"10.1145\/3194770.3194775"},{"key":"1184_CR9","unstructured":"Dwork, C., Ilvento, C.: Fairness under composition. arXiv:1806.06122 (2018). Accessed 05 Nov 2022"},{"key":"1184_CR10","doi-asserted-by":"crossref","unstructured":"Brun, Y., Meliou, A.: Software fairness. In: Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 754\u2013759. ACM (2018)","DOI":"10.1145\/3236024.3264838"},{"key":"1184_CR11","doi-asserted-by":"crossref","unstructured":"St\u00f6rrle, H.: How are conceptual models used in industrial software development?: A descriptive survey. In: Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, pp. 160\u2013169. ACM (2017)","DOI":"10.1145\/3084226.3084256"},{"key":"1184_CR12","unstructured":"OMG\u00aeUnified Modeling Language\u00ae(OMG UML\u00ae) Version 2.5.1. formal\/2017-12-05. Object Management Group (OMG) (2017). https:\/\/www.omg.org\/spec\/UML\/2.5.1\/PDF. Accessed 23 Oct 2022"},{"key":"1184_CR13","doi-asserted-by":"crossref","unstructured":"France, R., Rumpe, B.: Model-driven development of complex software: a research roadmap. In: 2007 Future of Software Engineering, pp. 37\u201354. IEEE Computer Society (2007)","DOI":"10.1109\/FOSE.2007.14"},{"key":"1184_CR14","volume-title":"Secure Systems Development with UML","author":"J J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Berlin (2005)"},{"key":"1184_CR15","doi-asserted-by":"crossref","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: International Conference on the Unified Modeling Language, pp. 426\u2013441. Springer (2002)","DOI":"10.1007\/3-540-45800-X_33"},{"key":"1184_CR16","doi-asserted-by":"crossref","unstructured":"Datta, A., Fredrikson, M., Ko, G., Mardziel, P., Sen, S.: Proxy non-discrimination in data-driven systems. arXiv:1707.08120 (2017). Accessed 06 Nov 2022","DOI":"10.1145\/3133956.3134097"},{"key":"1184_CR17","doi-asserted-by":"crossref","unstructured":"Albarghouthi, A., D\u2019Antoni, L., Drews, S., Nori, A.V.: FairSquare: probabilistic verification of program fairness. In: Proceedings of the ACM on Programming Languages (Object-Oriented Programming, Systems, Languages & Applications) (2017)","DOI":"10.1145\/3133904"},{"key":"1184_CR18","doi-asserted-by":"crossref","unstructured":"Albarghouthi, A., Vinitsky, S.: Fairness-aware programming. In: Proceedings of the Conference on Fairness, Accountability, and Transparency, pp. 211\u2013219. ACM (2019)","DOI":"10.1145\/3287560.3287588"},{"key":"1184_CR19","unstructured":"Tram\u00e8r, F., Atlidakis, V., Geambasu, R., Hsu, D.J., Hubaux, J.P., Humbert, M., Juels, A., Lin, H.: Discovering Unwarranted Associations in Data-Driven Applications with the Fairtest Testing Toolkit. CoRR, abs\/1510.02377 (2015)"},{"key":"1184_CR20","unstructured":"The German General Act on Equal Treatment (2006). http:\/\/www.gesetze-im-internet.de\/englisch_agg\/. Accessed 04 Oct 2022"},{"key":"1184_CR21","doi-asserted-by":"crossref","unstructured":"Katoen, J.P.: 22 labelled transition systems. Model-Based Testing of Reactive Systems, p. 615 (2005)","DOI":"10.1007\/11498490_29"},{"key":"1184_CR22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511810275","volume-title":"Logic in Computer Science: Modelling and Reasoning About Systems","author":"M Huth","year":"2004","unstructured":"Huth, M., Ryan, M.: Logic in Computer Science: Modelling and Reasoning About Systems. Cambridge University Press, Cambridge (2004)"},{"key":"1184_CR23","unstructured":"SPIN. Bell Labs in the Unix group of the Computing Sciences Research Center (1991). http:\/\/spinroot.com\/spin\/whatispin.html (Version 6.4.9, release date: 2018. Accessed 17 Oct 2022)"},{"key":"1184_CR24","unstructured":"Hugo\/RT. Department of computer science, Augsburg University (2015). https:\/\/www.informatik.uni-augsburg.de\/en\/chairs\/swt\/sse\/hugort\/ (Version 0.8a). Accessed 06 Nov 2022"},{"issue":"5","key":"1184_CR25","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/32.588521","volume":"23","author":"GJ Holzmann","year":"1997","unstructured":"Holzmann, G.J.: The model checker spin. IEEE Trans. Softw. Eng. 23(5), 279\u2013295 (1997)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"1184_CR26","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.cosrev.2010.06.002","volume":"5","author":"KY Rozier","year":"2011","unstructured":"Rozier, K.Y.: Linear temporal logic symbolic model checking. Comput. Sci. Rev. 5(2), 163\u2013203 (2011)","journal-title":"Comput. Sci. Rev."},{"issue":"5","key":"1184_CR27","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"1184_CR28","unstructured":"Healthy life. Public Health UK (2017). https:\/\/www.gov.uk\/government\/publications\/health-profile-for-england\/chapter-1-life-expectancy-and-healthy-life-expectancy. Accessed 06 Nov 2022"},{"key":"1184_CR29","unstructured":"Distribution of median and mean income and tax by age range and gender. Office for National Statistics (2020)"},{"key":"1184_CR30","first-page":"377","volume-title":"The Effects of Income on Health: New Evidence from the Earned Income Tax Credit","author":"O Lenhart","year":"2019","unstructured":"Lenhart, O.: The Effects of Income on Health: New Evidence from the Earned Income Tax Credit, pp. 377\u2013410. Springer, Berlin (2019)"},{"key":"1184_CR31","unstructured":"Papyrus. https:\/\/www.eclipse.org\/papyrus\/. Accessed 11 May 2023"},{"key":"1184_CR32","doi-asserted-by":"crossref","unstructured":"Wei\u00dfleder, S.: Test models and coverage criteria for automatic model-based test generation with UML state machines. Ph.D. thesis, Humboldt University of Berlin (2010)","DOI":"10.1201\/b11321-5"},{"issue":"3","key":"1184_CR33","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/TSE.2006.22","volume":"32","author":"C Nebut","year":"2006","unstructured":"Nebut, C., Fleurey, F., Le Traon, Y., Jezequel, J.M.: Automatic test generation: a use case driven approach. IEEE Trans. Softw. Eng. 32(3), 140\u2013155 (2006)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1184_CR34","doi-asserted-by":"crossref","unstructured":"Nguyen, C.D., Marchetto, A., Tonella, P.: Combining model-based and combinatorial testing for effective test case generation. In: Proceedings of the 2012 International Symposium on Software Testing and Analysis, pp. 100\u2013110 (2012)","DOI":"10.1145\/2338965.2336765"},{"issue":"4","key":"1184_CR35","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1049\/ip-sen:19990602","volume":"146","author":"YG Kim","year":"1999","unstructured":"Kim, Y.G., Hong, H.S., Bae, D.H., Cha, S.D.: Test cases generation from UML state diagrams. IEE Proc.-Softw. 146(4), 187\u2013192 (1999)","journal-title":"IEE Proc.-Softw."},{"key":"1184_CR36","doi-asserted-by":"crossref","unstructured":"Offutt, J., Abdurazik, A.: Generating tests from UML specifications. In: International Conference on the Unified Modeling Language, pp. 416\u2013429. Springer (1999)","DOI":"10.1007\/3-540-46852-8_30"},{"key":"1184_CR37","doi-asserted-by":"crossref","unstructured":"Chevalley, P., Thevenod-Fosse, P.: Automated generation of statistical test cases from UML state diagrams. In: 25th Annual International Computer Software and Applications Conference. COMPSAC 2001, pp. 205\u2013214. IEEE (2001)","DOI":"10.1109\/CMPSAC.2001.960618"},{"key":"1184_CR38","unstructured":"Sharma, C., Sabharwal, S., Sibal, R.: Applying genetic algorithm for prioritization of test case scenarios derived from UML diagrams. arXiv:1410.4838 (2014)"},{"key":"1184_CR39","doi-asserted-by":"crossref","unstructured":"Doungsa-ard, C., Dahal, K., Hossain, A., Suwannasart, T.: Test data generation from UML state machine diagrams using gas. In: International Conference on Software Engineering Advances (ICSEA 2007), pp. 47\u201347. IEEE (2007)","DOI":"10.1109\/ICSEA.2007.70"},{"key":"1184_CR40","doi-asserted-by":"crossref","unstructured":"Arifiani, S., Rochimah, S.: Generating test data using ant Colony Optimization (ACO) algorithm and UML state machine diagram in gray box testing approach. In: 2016 International Seminar on Application for Technology of Information and Communication (ISemantic), pp. 217\u2013222. IEEE (2016)","DOI":"10.1109\/ISEMANTIC.2016.7873841"},{"key":"1184_CR41","doi-asserted-by":"crossref","unstructured":"Al-Refai, M., Cazzola, W., Ghosh, S.: A fuzzy logic based approach for model-based regression test selection. In: 2017 ACM\/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS), pp. 55\u201362. IEEE (2017)","DOI":"10.1109\/MODELS.2017.17"},{"key":"1184_CR42","volume-title":"Practical Model-Based Testing: A Tools Approach","author":"M Utting","year":"2010","unstructured":"Utting, M., Legeard, B.: Practical Model-Based Testing: A Tools Approach. Elsevier, Amsterdam (2010)"},{"issue":"7","key":"1184_CR43","first-page":"26","volume":"42","author":"R Swain","year":"2012","unstructured":"Swain, R., Panthi, V., Behera, P.K., Mohapatra, D.P.: Automatic test case generation from UML state chart diagram. Int. J. Comput. Appl. 42(7), 26\u201336 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"1184_CR44","unstructured":"Ingold, D., Soper, S.: Amazon Doesn\u2019t Consider the Race of Its Customers. Should It? (2016). https:\/\/www.bloomberg.com\/graphics\/2016-amazon-same-day\/. Accessed 19 Oct 2022"},{"key":"1184_CR45","doi-asserted-by":"crossref","unstructured":"Salnitri, M., Alizadeh, M., Giovanella, D., Zannone, N., Giorgini, P.: From security-by-design to the identification of security-critical deviations in process executions. In: International Conference on Advanced Information Systems Engineering, pp. 218\u2013234. Springer (2018)","DOI":"10.1007\/978-3-319-92901-9_19"},{"key":"1184_CR46","unstructured":"BPI 2012 (2012). https:\/\/www.win.tue.nl\/bpi\/doku.php?id=2012:challenge. Accessed 23 Oct 2022"},{"issue":"3","key":"1184_CR47","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1016\/j.dss.2011.01.018","volume":"51","author":"A Rodr\u00edguez","year":"2011","unstructured":"Rodr\u00edguez, A., Fern\u00e1ndez-Medina, E., Trujillo, J., Piattini, M.: Secure business process model specification through a UML 2.0 activity diagram profile. Decis. Support Syst. 51(3), 446\u2013465 (2011)","journal-title":"Decis. Support Syst."},{"key":"1184_CR48","unstructured":"Hofmann, H.: Statlog (German credit data) data set. Hamburg University, UCI Machine Learning Repository (1994). https:\/\/archive.ics.uci.edu\/ml\/datasets\/statlog+(german+credit+data). Accessed 17 Oct 2022"},{"issue":"1","key":"1184_CR49","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s10515-010-0075-7","volume":"18","author":"J Liu","year":"2011","unstructured":"Liu, J., Basu, S., Lutz, R.R.: Compositional model checking of software product lines using variation point obligations. Autom. Softw. Eng. 18(1), 39\u201376 (2011)","journal-title":"Autom. Softw. Eng."},{"key":"1184_CR50","doi-asserted-by":"crossref","unstructured":"Xie, F., Browne, J.C.: Verified systems by composition from verified components. In: Proceedings of the 9th European Software Engineering Conference Held Jointly with 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 277\u2013286 (2003)","DOI":"10.1145\/940071.940109"},{"key":"1184_CR51","doi-asserted-by":"crossref","unstructured":"Ochoa, M., J\u00fcrjens, J., Warzecha, D.: A sound decision procedure for the compositionality of secrecy. In: International Symposium on Engineering Secure Software and Systems, pp. 97\u2013105. Springer (2012)","DOI":"10.1007\/978-3-642-28166-2_10"},{"key":"1184_CR52","doi-asserted-by":"crossref","unstructured":"Salman, I., Misirli, A.T., Juristo, N.: Are students representatives of professionals in software engineering experiments? In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering (ICSE), Vol.\u00a01, pp. 666\u2013676. IEEE (2015)","DOI":"10.1109\/ICSE.2015.82"},{"issue":"1","key":"1184_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jebo.2011.08.009","volume":"81","author":"G Charness","year":"2012","unstructured":"Charness, G., Gneezy, U., Kuhn, M.A.: Experimental methods: between-subject and within-subject design. J. Econ. Behav. Organ. 81(1), 1\u20138 (2012)","journal-title":"J. Econ. Behav. Organ."},{"key":"1184_CR54","unstructured":"MBFair: User Experiment (2022). The artifacts of our user experiment are available online at https:\/\/github.com\/mbfairness\/userExp\/blob\/main\/README.md"},{"issue":"5","key":"1184_CR55","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1037\/h0031619","volume":"76","author":"JL Fleiss","year":"1971","unstructured":"Fleiss, J.L.: Measuring nominal scale agreement among many raters. Psychol. Bull. 76(5), 378 (1971)","journal-title":"Psychol. Bull."},{"issue":"3","key":"1184_CR56","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1356","volume":"10","author":"E Ntoutsi","year":"2020","unstructured":"Ntoutsi, E., Fafalios, P., Gadiraju, U., Iosifidis, V., Nejdl, W., Vidal, M.E., Ruggieri, S., Turini, F., Papadopoulos, S., Krasanakis, E., et al.: Bias in data-driven artificial intelligence systems-an introductory survey. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 10(3), e1356 (2020)","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"1184_CR57","doi-asserted-by":"crossref","unstructured":"Hutchinson, B., Mitchell, M.: 50 years of test (un) fairness: Lessons for machine learning. In: Proceedings of the Conference on Fairness, Accountability, and Transparency, pp. 49\u201358 (2019)","DOI":"10.1145\/3287560.3287600"},{"key":"1184_CR58","unstructured":"Calmon, F., Wei, D., Vinzamuri, B., Ramamurthy, K.N., Varshney, K.R.: Optimized pre-processing for discrimination prevention. In: Advances in Neural Information Processing Systems, pp. 3992\u20134001 (2017)"},{"key":"1184_CR59","doi-asserted-by":"crossref","unstructured":"Zafar, M.B., Valera, I., Gomez\u00a0Rodriguez, M., Gummadi, K.P.: Fairness beyond disparate treatment and disparate impact: learning classification without disparate mistreatment. In: Proceedings of the 26th International Conference on World Wide Web, pp. 1171\u20131180 (2017)","DOI":"10.1145\/3038912.3052660"},{"key":"1184_CR60","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.ins.2017.09.064","volume":"425","author":"F Kamiran","year":"2018","unstructured":"Kamiran, F., Mansha, S., Karim, A., Zhang, X.: Exploiting reject option in classification for social discrimination control. Inf. Sci. 425, 18\u201333 (2018)","journal-title":"Inf. Sci."},{"key":"1184_CR61","unstructured":"Adebayo, J.A., et\u00a0al.: Fairml: Toolbox for Diagnosing Bias in Predictive Modeling. Ph.D. thesis, Massachusetts Institute of Technology (2016)"},{"key":"1184_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10270-020-00781-x","volume":"19","author":"Q Ramadan","year":"2020","unstructured":"Ramadan, Q., Str\u00fcber, D., Salnitri, M., J\u00fcrjens, J., Riediger, V., Staab, S.: A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements. Softw. Syst. Model. 19, 1\u201337 (2020)","journal-title":"Softw. Syst. Model."},{"issue":"2","key":"1184_CR63","doi-asserted-by":"publisher","first-page":"101","DOI":"10.5381\/jot.2002.1.2.a1","volume":"1","author":"MDM Gallardo","year":"2002","unstructured":"Gallardo, M.D.M., Merino, P., Pimentel, E.: Debugging UML designs with model checking. J. Object Technol. 1(2), 101\u2013117 (2002)","journal-title":"J. Object Technol."},{"issue":"5\u20136","key":"1184_CR64","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s10009-007-0048-8","volume":"9","author":"J J\u00fcrjens","year":"2007","unstructured":"J\u00fcrjens, J., Shabalin, P.: Tools for secure systems development with UML. Int. J. Softw. Tools Technol. Transf. 9(5\u20136), 527\u2013544 (2007)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"issue":"2","key":"1184_CR65","first-page":"9","volume":"4","author":"S Ruggieri","year":"2010","unstructured":"Ruggieri, S., Pedreschi, D., Turini, F.: Data mining for discrimination discovery. ACM Trans. Knowl. Discov. Data (TKDD) 4(2), 9 (2010)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"1184_CR66","doi-asserted-by":"crossref","unstructured":"Pedreschi, D., Ruggieri, S., Turini, F.: Integrating induction and deduction for finding evidence of discrimination. In: Proceedings of the 12th International Conference on Artificial Intelligence and Law, pp. 157\u2013166. ACM (2009)","DOI":"10.1145\/1568234.1568252"},{"key":"1184_CR67","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wu, Y., Wu, X.: On discrimination discovery using causal networks. In: International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation, pp. 83\u201393. Springer (2016)","DOI":"10.1007\/978-3-319-39931-7_9"},{"key":"1184_CR68","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wu, X.: Int. J. Data Sci. Anal. 4(1) (2017)","DOI":"10.1007\/s41060-017-0058-x"},{"key":"1184_CR69","doi-asserted-by":"crossref","unstructured":"Ruggieri, S., Hajian, S., Kamiran, F., Zhang, X.: Anti-discrimination analysis using privacy attack strategies. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 694\u2013710. Springer (2014)","DOI":"10.1007\/978-3-662-44851-9_44"},{"issue":"1","key":"1184_CR70","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1515\/popets-2015-0007","volume":"2015","author":"A Datta","year":"2015","unstructured":"Datta, A., Tschantz, M.C., Datta, A.: Automated experiments on ad privacy settings. Proc. Privacy Enhanc. Technol. 2015(1), 92\u2013112 (2015)","journal-title":"Proc. Privacy Enhanc. Technol."}],"updated-by":[{"DOI":"10.1007\/s10270-024-01262-1","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T00:00:00Z","timestamp":1738281600000}}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-024-01184-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10270-024-01184-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-024-01184-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T03:24:58Z","timestamp":1740713098000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10270-024-01184-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,10]]},"references-count":70,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["1184"],"URL":"https:\/\/doi.org\/10.1007\/s10270-024-01184-y","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,10]]},"assertion":[{"value":"20 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2025","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10270-024-01262-1","URL":"https:\/\/doi.org\/10.1007\/s10270-024-01262-1","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}