{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T23:06:04Z","timestamp":1756076764889,"version":"3.37.3"},"reference-count":100,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10676-019-09510-5","type":"journal-article","created":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T11:02:45Z","timestamp":1565002965000},"page":"331-343","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["From privacy to anti-discrimination in times of machine learning"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4633-2153","authenticated-orcid":false,"given":"Thilo","family":"Hagendorff","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,5]]},"reference":[{"issue":"3","key":"9510_CR1","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1111\/j.1540-4560.1977.tb01883.x","volume":"33","author":"I Altman","year":"1977","unstructured":"Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues,33(3), 66\u201384.","journal-title":"Journal of Social Issues"},{"key":"9510_CR2","first-page":"671","volume":"104","author":"S Barocas","year":"2016","unstructured":"Barocas, S., & Selbst, A. D. (2016). Big datas disparate impact. California Law Review,104, 671\u2013732.","journal-title":"California Law Review"},{"issue":"4","key":"9510_CR3","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1017\/S0963180111000259","volume":"20","author":"TL Beauchamp","year":"2011","unstructured":"Beauchamp, T. L. (2011). Informed consent: Its history, meaning, and present challenges. Cambridge Quarterly of Healthcare Ethics: CQ: The International Journal of Healthcare Ethics Committees,20(4), 515\u2013523.","journal-title":"Cambridge Quarterly of Healthcare Ethics: CQ: The International Journal of Healthcare Ethics Committees"},{"issue":"2","key":"9510_CR4","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1037\/1082-989X.2.2.131","volume":"2","author":"JT Behrens","year":"1997","unstructured":"Behrens, J. T. (1997). Principles and procedures of exploratory data analysis. Psychological Methods,2(2), 131\u2013160.","journal-title":"Psychological Methods"},{"key":"9510_CR5","doi-asserted-by":"crossref","DOI":"10.14361\/9783839442135","volume-title":"Network public governance: On privacy and the informational self","author":"A Belliger","year":"2018","unstructured":"Belliger, A., & Krieger, D. J. (2018). Network public governance: On privacy and the informational self. Bielefeld: Transcript."},{"key":"9510_CR6","volume-title":"Interdependent privacy: Let me share your data","author":"G Bicz\u00f3k","year":"2013","unstructured":"Bicz\u00f3k, G., & Chia, P. H. (2013). Interdependent privacy: Let me share your data. Berlin: Springer."},{"key":"9510_CR7","unstructured":"Binns, R. (2018). Fairness in machine learning: Lessons from political philosophy. In A. F. Sorelle & C. Wilson (Eds.), Conference on fairness, accountability, and transparency, New York (81st ed., pp. 1\u201311). PMLR."},{"issue":"2","key":"9510_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2450142.2450148","volume":"60","author":"A Blum","year":"2013","unstructured":"Blum, A., Ligett, K., & Roth, A. (2013). A learning theory approach to noninteractive database privacy. Journal of the ACM,60(2), 1\u201325.","journal-title":"Journal of the ACM"},{"key":"9510_CR9","doi-asserted-by":"crossref","unstructured":"Bordes, A., Weston, J., & Chopra, S. (2014). Question answering with subgraph embeddings. In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), October 25\u201329, 2014, Doha, Qatar (pp. 1\u201310). ACM.","DOI":"10.3115\/v1\/D14-1067"},{"key":"9510_CR10","first-page":"4110","volume-title":"The international encyclopedia of ethics","author":"NE Bowie","year":"2013","unstructured":"Bowie, N. E. (2013). Privacy and the Internet. In H. LaFollette (Ed.), The international encyclopedia of ethics (pp. 4110\u20134114). Hoboken, NJ: Wiley-Blackwell."},{"issue":"1","key":"9510_CR11","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1177\/1354856507084416","volume":"14","author":"D Boyd","year":"2008","unstructured":"Boyd, D. (2008). Facebook\u2019s Privacy Trainwreck: Exposure, invasion, and social convergence. Convergence: The International Journal of Research in New Media Technologies,14(1), 13\u201320.","journal-title":"Convergence: The International Journal of Research in New Media Technologies"},{"key":"9510_CR12","first-page":"39","volume-title":"A networked self: Identity, community, and culture on social network sites","author":"D Boyd","year":"2011","unstructured":"Boyd, D. (2011). Social network sites as networked publics: Affordances, dynamics and implications. In Z. Papacharissi (Ed.), A networked self: Identity, community, and culture on social network sites (pp. 39\u201358). New York: Routledge."},{"key":"9510_CR13","volume-title":"It\u2019s complicated: The social lives of networked teens","author":"D Boyd","year":"2014","unstructured":"Boyd, D. (2014). It\u2019s complicated: The social lives of networked teens. New Haven, CT: Yale University Press."},{"key":"9510_CR14","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1177\/0093854808326545","volume":"36","author":"T Brennan","year":"2008","unstructured":"Brennan, T., Dieterich, W., & Ehret, B. (2008). Evaluating the predictive validity of the COMPAS risk and needs assessment system. Criminal Justice and Behavior,36, 21\u201340. \nhttps:\/\/doi.org\/10.1177\/0093854808326545\n\n.","journal-title":"Criminal Justice and Behavior"},{"key":"9510_CR15","doi-asserted-by":"publisher","unstructured":"Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., et al. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation (pp. 1\u2013101). \nhttps:\/\/doi.org\/10.17863\/CAM.22520\n\n.","DOI":"10.17863\/CAM.22520"},{"issue":"2","key":"9510_CR16","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s10618-010-0190-x","volume":"21","author":"T Calders","year":"2010","unstructured":"Calders, T., & Verwer, S. (2010). Three naive Bayes approaches for discrimination-free classification. Data Mining and Knowledge Discovery,21(2), 277\u2013292.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"9510_CR17","unstructured":"Cavoukian, A. (2011). Privacy by design: The 7 foundational principles: implementation and mapping of fair information practices. \nhttps:\/\/iapp.org\/media\/pdf\/resource_center\/Privacy%20by%20Design%20-%207%20Foundational%20Principles.pdf\n\n. Accessed 21 June 2018."},{"issue":"2","key":"9510_CR18","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s12394-010-0053-z","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A., Taylor, S., & Abrams, M. E. (2010). Privacy by Design: Essential for organizational accountability and strong business practices. Identity in the Information Society,3(2), 405\u2013413.","journal-title":"Identity in the Information Society"},{"key":"9510_CR19","doi-asserted-by":"publisher","first-page":"12030","DOI":"10.1088\/1742-6596\/368\/1\/012030","volume":"368","author":"T Ciodaro","year":"2012","unstructured":"Ciodaro, T., Deva, D., de Seixas, J. M., & Damazio, D. (2012). Online particle detection with Neural Networks based on topological calorimetry information. Journal of Physics: Conference Series,368, 12030. \nhttps:\/\/doi.org\/10.1088\/1742-6596\/368\/1\/012030\n\n.","journal-title":"Journal of Physics: Conference Series"},{"key":"9510_CR20","first-page":"1","volume":"89","author":"DK Citron","year":"2014","unstructured":"Citron, D. K., & Pasquale, F. (2014). The scored society: Due process for automated predictions. Washington Law Review,89, 1\u201333.","journal-title":"Washington Law Review"},{"key":"9510_CR21","first-page":"2493","volume":"12","author":"R Collobert","year":"2011","unstructured":"Collobert, R., Weston, J., Bottou, L., Karlen, M., Kavukcuoglu, K., & Kuksa, P. (2011). Natural language processing (almost) from scratch. Journal of Machine Learning Research,12, 2493\u20132537.","journal-title":"Journal of Machine Learning Research"},{"issue":"7553","key":"9510_CR22","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1038\/nature14422","volume":"521","author":"A Cully","year":"2015","unstructured":"Cully, A., Clune, J., Tarapore, D., & Mouret, J.-B. (2015). Robots that can adapt like animals. Nature,521(7553), 503\u2013507.","journal-title":"Nature"},{"key":"9510_CR23","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.paid.2013.12.020","volume":"61\u201362","author":"K Dhont","year":"2014","unstructured":"Dhont, K., Hodson, G., Costello, K., & MacInnis, C. C. (2014). Social dominance orientation connects prejudicial human\u2013human and human\u2013animal relations. Personality and Individual Differences,61\u201362, 105\u2013108.","journal-title":"Personality and Individual Differences"},{"key":"9510_CR97","unstructured":"Diakopoulos, N., Friedler, S. A., Arenas, M., Barocas, S., Hay, M., Howe, B., et al. (2017). Principles for accountable algorithms and a social impact statement for algorithms. In Fairness, accountability, and transparency. \nhttps:\/\/www.fatml.org\/resources\/principles-for-accountable-algorithms\n\n. Accessed 31 July 2019."},{"key":"9510_CR24","first-page":"1","volume-title":"Privacy aware learning","author":"JC Duchi","year":"2013","unstructured":"Duchi, J. C., Jordan, M. I., & Wainwright, M. J. (2013). Privacy aware learning (pp. 1\u201360). Berkeley, CA: University of California."},{"key":"9510_CR25","unstructured":"Dwork, C., Hardt, M., Pitassi, T., Reingold, O., & Zemel, R. (2011). Fairness through awareness (pp. 1\u201324). arxiv.org:1104.3913."},{"key":"9510_CR26","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1802331115","author":"JC Eichstaedt","year":"2018","unstructured":"Eichstaedt, J. C., Smith, R. J., Merchant, R. M., Ungar, L. H., Crutchley, P., Preo\u0163iuc-Pietro, D., et al. (2018). Facebook language predicts depression in medical records. Proceedings of the National Academy of Sciences of the United States of America. \nhttps:\/\/doi.org\/10.1073\/pnas.1802331115\n\n.","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"key":"9510_CR27","unstructured":"Ekstrand, M. D., Joshaghani, R., & Mehrpouyan, H. (2018). Privacy for all: Ensuring fair and equitable privacy protections. In A. F. Sorelle & C. Wilson (Eds.), Conference on fairness, accountability, and transparency, New York (81st ed., pp. 1\u201313). PMLR."},{"key":"9510_CR28","first-page":"45","volume-title":"Philosophical perspectives on computer-mediated communication","author":"D Elgesem","year":"1996","unstructured":"Elgesem, D. (1996). Privacy, respect for persons, and risk. In C. Ess (Ed.), Philosophical perspectives on computer-mediated communication (pp. 45\u201366). New York: State University of New York Press."},{"issue":"4","key":"9510_CR29","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s10676-006-0001-7","volume":"7","author":"L Floridi","year":"2005","unstructured":"Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology,7(4), 185\u2013200.","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9510_CR30","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s10676-006-9121-3","volume":"8","author":"L Floridi","year":"2006","unstructured":"Floridi, L. (2006). Four challenges for a theory of informational privacy. Ethics and Information Technology,8(3), 109\u2013119.","journal-title":"Ethics and Information Technology"},{"key":"9510_CR31","doi-asserted-by":"crossref","first-page":"407","DOI":"10.3233\/JAD-150520","volume":"49","author":"KC Fraser","year":"2016","unstructured":"Fraser, K. C., Meltzer, J. A., & Rudzicz, F. (2016). Linguistic features identify Alzheimer\u2019s disease in narrative speech. Journal of Alzheimer\u2019s Disease,49, 407\u2013422.","journal-title":"Journal of Alzheimer\u2019s Disease"},{"issue":"50","key":"9510_CR32","doi-asserted-by":"crossref","first-page":"13108","DOI":"10.1073\/pnas.1700035114","volume":"114","author":"T Gebru","year":"2017","unstructured":"Gebru, T., Krause, J., Wang, Y., Chen, D., Deng, J., Aiden, E. L., et al. (2017). Using deep learning and Google Street View to estimate the demographic makeup of neighborhoods across the United States. Proceedings of the National Academy of Sciences of the United States of America,114(50), 13108\u201313113.","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"issue":"2","key":"9510_CR33","doi-asserted-by":"crossref","first-page":"11","DOI":"10.5121\/ijsptm.2013.2402","volume":"2","author":"K Ghazinour","year":"2013","unstructured":"Ghazinour, K., Matwin, S., & Sokolova, M. (2013). YourPrivacyProtector: A recommender system for privacy settings in social networks. International Journal of Security, Privacy and Trust Management,2(2), 11\u201325.","journal-title":"International Journal of Security, Privacy and Trust Management"},{"volume-title":"Reforming European data protection law","year":"2015","key":"9510_CR34","unstructured":"Gutwirth, S., Leenes, R., & de Hert, P. (Eds.). (2015). Reforming European data protection law. Dordrecht: Springer."},{"key":"9510_CR35","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-3-642-30487-3_13","volume-title":"Discrimination and privacy in the information society: Data mining and profiling in large databases","author":"S Hajian","year":"2013","unstructured":"Hajian, S., & Domingo-Ferrer, J. (2013). Direct and indirect discrimination prevention methods. In B. Custers, T. Calders, B. Schermer, & T. Zarsky (Eds.), Discrimination and privacy in the information society: Data mining and profiling in large databases (pp. 241\u2013256). Berlin: Springer."},{"key":"9510_CR36","unstructured":"Haque, A., Guo, M., Miner, A. S., & Fei-Fei, L. (2018). Measuring depression symptom severity from spoken language and 3D facial expressions (pp. 1\u20137). \nhttps:\/\/arxiv.org\/abs\/1811.08592\n\n."},{"issue":"6","key":"9510_CR37","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1177\/0956797611436349","volume":"23","author":"JB Hirsh","year":"2012","unstructured":"Hirsh, J. B., Kang, S. K., & Bodenhausen, G. V. (2012). Personalized persuasion: Tailoring persuasive appeals to recipients\u2019 personality traits. Psychological Science,23(6), 578\u2013581.","journal-title":"Psychological Science"},{"key":"9510_CR38","unstructured":"Howard, J., & Ruder, S. (2018). Universal language model fine-tuning for text classification (pp. 1\u201312). \nhttps:\/\/arxiv.org\/abs\/1801.06146v5\n\n."},{"key":"9510_CR39","unstructured":"Hutchinson, B., & Mitchell, M. (2018). 50 Years of test (un)fairness: Lessons for machine learning (pp. 1\u201311). \nhttps:\/\/arxiv.org\/abs\/1811.10104v2\n\n."},{"issue":"6301","key":"9510_CR40","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1126\/science.aaf7894","volume":"353","author":"N Jean","year":"2016","unstructured":"Jean, N., Burke, M., Xie, M., Davis, W. M., Lobell, D. B., & Ermon, S. (2016). Combining satellite imagery and machine learning to predict poverty. Science,353(6301), 790\u2013794.","journal-title":"Science"},{"key":"9510_CR41","doi-asserted-by":"crossref","unstructured":"Jean, S., Cho, K., Memisevic, R., & Bengio, Y. (2015). On using very large target vocabulary for neural machine translation. In Proceedings of the 53rd annual meeting of the Association for Computational Linguistics and the 7th international joint conference on natural language processing, Beijing, China, July 26\u201331, 2015 (pp.1\u201310). Association for Computational Linguistics.","DOI":"10.3115\/v1\/P15-1001"},{"issue":"6245","key":"9510_CR42","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1126\/science.aaa8415","volume":"349","author":"MI Jordan","year":"2015","unstructured":"Jordan, M. I., & Mitchell, T. M. (2015). Machine learning: Trends, perspectives, and prospects. Science,349(6245), 255\u2013260.","journal-title":"Science"},{"issue":"1","key":"9510_CR43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-011-0463-8","volume":"33","author":"F Kamiran","year":"2012","unstructured":"Kamiran, F., & Calders, T. (2012). Data preprocessing techniques for classification without discrimination. Knowledge and Information Systems,33(1), 1\u201333.","journal-title":"Knowledge and Information Systems"},{"key":"9510_CR44","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-642-30487-3_12","volume-title":"Discrimination and privacy in the information society: Data mining and profiling in large databases","author":"F Kamiran","year":"2013","unstructured":"Kamiran, F., Calders, T., & Pechenizkiy, M. (2013). Techniques for discrimination-free predictive models. In B. Custers, T. Calders, B. Schermer, & T. Zarsky (Eds.), Discrimination and privacy in the information society: Data mining and profiling in large databases (pp. 223\u2013239). Berlin: Springer."},{"key":"9510_CR45","doi-asserted-by":"publisher","first-page":"2767","DOI":"10.1016\/j.jbankfin.2010.06.001","volume":"34","author":"AE Khandani","year":"2010","unstructured":"Khandani, A. E., Kim, A. J., & Lo, A. W. (2010). Consumer credit-risk models via machine-learning algorithms. Journal of Banking and Finance,34, 2767\u20132787. \nhttps:\/\/doi.org\/10.1016\/j.jbankfin.2010.06.001\n\n.","journal-title":"Journal of Banking and Finance"},{"key":"9510_CR46","doi-asserted-by":"crossref","unstructured":"King, T. C., Aggarwal, N., Taddeo, M., & Floridi, L. (2018). Artificial intelligence crime: An interdisciplinary analysis of foreseeable threats and solutions. SSRN Electronic Journal, 1\u201336. \nhttps:\/\/dx.doi.org\/10.2139\/ssrn.3183238\n\n.","DOI":"10.2139\/ssrn.3183238"},{"key":"9510_CR47","unstructured":"Kleinberg, J. M., Mullainathan, S., & Raghavan, M. (2016). Inherent trade-offs in the fair determination of risk scores (pp. 1\u201323). \nhttps:\/\/arxiv.org\/abs\/1609.05807v2\n\n."},{"key":"9510_CR48","unstructured":"Knight, W., & Hao, K. (2019). Never mind killer robots\u2014Here are six real AI dangers to watch out for in 2019. \nhttps:\/\/www.technologyreview.com\/s\/612689\/never-mind-killer-robotshere-are-six-real-ai-dangers-to-watch-out-for-in-2019\/\n\n. Accessed 25 January 2019."},{"issue":"3","key":"9510_CR49","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s10994-013-5415-y","volume":"95","author":"M Kosinski","year":"2014","unstructured":"Kosinski, M., Bachrach, Y., Kohli, P., Stillwell, D., & Graepel, T. (2014). Manifestations of user personality in website choice and behaviour on online social networks. Machine Learning,95(3), 357\u2013380.","journal-title":"Machine Learning"},{"issue":"15","key":"9510_CR50","doi-asserted-by":"crossref","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences of the United States of America,110(15), 5802\u20135805.","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"key":"9510_CR51","first-page":"1","volume":"114","author":"M Kosinski","year":"2017","unstructured":"Kosinski, M., & Wang, Y. (2017). Deep neural networks are more accurate than humans at detecting sexual orientation from facial images. Journal of Personality and Social Psychology,114, 1\u201347.","journal-title":"Journal of Personality and Social Psychology"},{"issue":"2","key":"9510_CR52","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1191\/030913200668791096","volume":"24","author":"H Koskela","year":"2000","unstructured":"Koskela, H. (2000). \u2018The gaze without eyes\u2019: Video-surveillance and the changing nature of urban space. Progress in Human Geography,24(2), 243\u2013265.","journal-title":"Progress in Human Geography"},{"key":"9510_CR53","first-page":"1090","volume":"25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky, A., Sutskever, I., & Hinton, G. (2012). ImageNet classification with deep convolutional neural networks. Proceedings of Advances in Neural Information Processing Systems,25, 1090\u20131098.","journal-title":"Proceedings of Advances in Neural Information Processing Systems"},{"key":"9510_CR54","unstructured":"Kusner, M. J., Loftus, J. R., Russell, C., & Silva, R. (2017). Counterfactual fairness (pp. 1\u201321). \nhttps:\/\/arxiv.org\/abs\/1703.06856v3\n\n."},{"issue":"12","key":"9510_CR55","doi-asserted-by":"crossref","first-page":"1934","DOI":"10.1109\/JPROC.2014.2359054","volume":"102","author":"R Lambiotte","year":"2014","unstructured":"Lambiotte, R., & Kosinski, M. (2014). Tracking the digital footprints of personality. Proceedings of the IEEE,102(12), 1934\u20131939.","journal-title":"Proceedings of the IEEE"},{"key":"9510_CR56","unstructured":"Leuner, J. (2019). A replication study: Machine learning models are capable of predicting sexual orientation from facial images (pp. 1\u201369). \nhttps:\/\/arxiv.org\/abs\/1902.10739v1\n\n."},{"issue":"12","key":"9510_CR57","doi-asserted-by":"crossref","first-page":"i121","DOI":"10.1093\/bioinformatics\/btu277","volume":"30","author":"MKK Leung","year":"2014","unstructured":"Leung, M. K. K., Xiong, H. Y., Lee, L. J., & Frey, B. J. (2014). Deep learning of the tissue-regulated splicing code. Bioinformatics,30(12), i121\u2013i129.","journal-title":"Bioinformatics"},{"issue":"4","key":"9510_CR58","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/TAFFC.2017.2667642","volume":"9","author":"X Li","year":"2018","unstructured":"Li, X., Hong, X., Moilanen, A., Huang, X., Pfister, T., Zhao, G., et al. (2018). Towards reading hidden emotions: A comparative study of spontaneous micro-expression spotting and recognition methods. IEEE Transactions on Affective Computing,9(4), 563\u2013577.","journal-title":"IEEE Transactions on Affective Computing"},{"issue":"2","key":"9510_CR59","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1021\/ci500747n","volume":"55","author":"J Ma","year":"2015","unstructured":"Ma, J., Sheridan, R. P., Liaw, A., Dahl, G. E., & Svetnik, V. (2015). Deep neural nets as a method for quantitative structure\u2013activity relationships. Journal of Chemical Information and Modeling,55(2), 263\u2013274.","journal-title":"Journal of Chemical Information and Modeling"},{"issue":"4\u20135","key":"9510_CR60","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1177\/1367549415577384","volume":"18","author":"A Mackenzie","year":"2015","unstructured":"Mackenzie, A. (2015). The production of prediction: What does machine learning want? European Journal of Cultural Studies,18(4\u20135), 429\u2013445.","journal-title":"European Journal of Cultural Studies"},{"key":"9510_CR61","unstructured":"Mahoney, J. F., & Mohen, J. M. (2007). Method and system for loan origination and underwriting. US 09\/475,153."},{"key":"9510_CR62","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1073\/iti0117114","volume":"114","author":"SC Matz","year":"2017","unstructured":"Matz, S. C., Kosinski, M., Nave, G., & Stillwell, D. (2017). Psychological targeting as an effective approach to digital mass persuasion. Proceedings of the National Academy of Sciences of the United States of America,114, 1\u20136.","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"key":"9510_CR63","unstructured":"McCurrie, M., Beletti, F., Parzianello, L., Westendorp, A., Anthony, S., & Scheirer, W. (2017). Predicting first impressions with deep learning (pp. 1\u20138). \nhttps:\/\/arxiv.org\/abs\/1610.08119v2\n\n."},{"key":"9510_CR64","unstructured":"McPherson, R., Shokri, R., & Shmatikov, V. (2016). Defeating image obfuscation with deep learning (pp. 1\u201312). \nhttps:\/\/arxiv.org\/abs\/1609.00408v2\n\n."},{"key":"9510_CR65","unstructured":"Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010). You are who you know: Inferrring user profiles in online social networks. In B. D. Davison (Ed.), Proceedings of the third ACM international conference on Web search and data mining. New York: ACM."},{"issue":"3","key":"9510_CR66","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/270858.270866","volume":"27","author":"JH Moor","year":"1997","unstructured":"Moor, J. H. (1997). Towards a theory of privacy in the information age. Computers and Society,27(3), 27\u201332.","journal-title":"Computers and Society"},{"issue":"3","key":"9510_CR67","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1111\/j.1467-9833.2008.00433.x","volume":"39","author":"A Moore","year":"2008","unstructured":"Moore, A. (2008). Defining privacy. Journal of Social Philosophy,39(3), 411\u2013428.","journal-title":"Journal of Social Philosophy"},{"key":"9510_CR68","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press."},{"key":"9510_CR69","unstructured":"Pedreschi, D., Ruggieri, S., & Turini, F. (2009). Measuring discrimination in socially-sensitive decision records. In C. Apte, H. Park, K. Wang, & M. J. Zaki (Eds.), Proceedings of the 2009 SIAM international conference on data mining (pp. 581\u2013592). Philadelphia: Society for Industrial and Applied Mathematics."},{"key":"9510_CR70","unstructured":"Pedreshi, D., Ruggieri, S., & Turini, F. (2008). Discrimination-aware data mining. In Y. Li, B. Liu, & S. Sarawagi (Eds.), 14th ACM SIGKDD international conference, Las Vegas (pp. 560\u2013568). New York: ACM Press."},{"issue":"2","key":"9510_CR71","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1515\/popets-2016-0005","volume":"2016","author":"Yu Pu","year":"2016","unstructured":"Pu, Y., & Grossklags, J. (2016). Towards a model on the factors influencing social app users\u2019 valuation of interdependent privacy. Proceedings on Privacy Enhancing Technologies (2), 61\u201381. \nhttps:\/\/doi.org\/10.1515\/popets-2016-0005\n\n.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"9510_CR72","volume-title":"Legislating privacy: Technology, social values, and public policy","author":"PM Regan","year":"1995","unstructured":"Regan, P. M. (1995). Legislating privacy: Technology, social values, and public policy. Chapel Hill, NC: University of North Carolina Press."},{"key":"9510_CR73","volume-title":"Der Wert des Privaten","author":"B R\u00f6ssler","year":"2001","unstructured":"R\u00f6ssler, B. (2001). Der Wert des Privaten. Frankfurt am Main: Suhrkamp."},{"key":"9510_CR74","unstructured":"Sajjadi, M. S. M., Sch\u00f6lkopf, B., & Hirsch, M. (2017). EnhanceNet: Single image super-resolution through automated texture synthesis (pp. 1\u201319). \nhttps:\/\/arxiv.org\/abs\/1612.07919v2\n\n."},{"key":"9510_CR75","unstructured":"Sarigol, E., Garcia, D., & Schweitzer, F. (2014). Online privacy as a collective phenomenon (pp. 1\u201311). \nhttps:\/\/arxiv.org\/abs\/1409.6197v1\n\n."},{"issue":"5","key":"9510_CR76","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MSP.2013.2259911","volume":"30","author":"AD Sarwate","year":"2013","unstructured":"Sarwate, A. D., & Chaudhuri, K. (2013). Signal processing and machine learning with differential privacy: Algorithms and challenges for continuous data. IEEE Signal Processing Magazine,30(5), 86\u201394.","journal-title":"IEEE Signal Processing Magazine"},{"key":"9510_CR77","unstructured":"Schneier, B. (2015). Das Ende der Geheimnisse. Technology Review (12), 76\u201377."},{"key":"9510_CR78","unstructured":"Selbst, A. D., Boyd, D., Friedler, S. A., Venkatasubramanian, S., & Vertesi, J. (2018). Fairness and abstraction in sociotechnical systems. In ACT conference on fairness, accountability, and transparency (FAT) (Vol. 1(1), pp. 1\u201317)."},{"key":"9510_CR79","unstructured":"Sermanet, P., Kavukcuoglu, K., Chintala, S., & LeCun, Y. (2012). Pedestrian detection with unsupervised multi-stage feature learning (pp. 1\u201312). \nhttps:\/\/arxiv.org\/abs\/1212.0142v2\n\n."},{"key":"9510_CR80","unstructured":"Shillingford, B., Assael, Y., Hoffman, M. W., Paine, T., Hughes, C., Prabhu, U., et al. (2018). Large-scale visual speech recognition (pp. 1\u201321). \nhttps:\/\/arxiv.org\/abs\/1807.05162v3\n\n."},{"issue":"7676","key":"9510_CR81","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1038\/nature24270","volume":"550","author":"D Silver","year":"2017","unstructured":"Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou, I., Huang, A., Guez, A., et al. (2017). Mastering the game of Go without human knowledge. Nature,550(7676), 354\u2013359.","journal-title":"Nature"},{"issue":"1","key":"9510_CR82","first-page":"87","volume":"89","author":"H Surden","year":"2014","unstructured":"Surden, H. (2014). Machine learning and law. Washington Law Review,89(1), 87\u2013115.","journal-title":"Washington Law Review"},{"key":"9510_CR83","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2706669","author":"D Susser","year":"2016","unstructured":"Susser, D. (2016). Information privacy and social self-authorship. Techn\u00e9: Research in Philosophy and Technology. \nhttps:\/\/doi.org\/10.2139\/ssrn.2706669\n\n.","journal-title":"Techn\u00e9: Research in Philosophy and Technology"},{"key":"9510_CR84","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M.\u2019 A., & Wolf, L. (2014). DeepFace: Closing the gap to human-level performance in face verification. In 2014 IEEE conference on computer vision and pattern recognition (CVPR), Columbus, Ohio (pp. 1701\u20131708). IEEE.","DOI":"10.1109\/CVPR.2014.220"},{"issue":"1","key":"9510_CR85","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1467-9973.2006.00474.x","volume":"38","author":"HT Tavani","year":"2007","unstructured":"Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy,38(1), 1\u201322.","journal-title":"Metaphilosophy"},{"key":"9510_CR86","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1002\/9780470281819.ch6","volume-title":"The handbook of information and computer ethics","author":"HT Tavani","year":"2008","unstructured":"Tavani, H. T. (2008). Informational privacy: Concepts, theories, and controversies. In K. E. Himma & H. T. Tavani (Eds.), The handbook of information and computer ethics (pp. 131\u2013164). Hoboken, NJ: Wiley."},{"issue":"1","key":"9510_CR87","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/572277.572278","volume":"31","author":"HT Tavani","year":"2001","unstructured":"Tavani, H. T., & Moor, J. H. (2001). Privacy protection, control of information, and privacy-enhancing technologies. ACM SIGCAS Computers and Society,31(1), 6\u201311.","journal-title":"ACM SIGCAS Computers and Society"},{"key":"9510_CR88","first-page":"83","volume":"83","author":"A Tutt","year":"2017","unstructured":"Tutt, A. (2017). An FDA for algorithms. Administrative Law Review,83, 83\u2013123.","journal-title":"Administrative Law Review"},{"key":"9510_CR89","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/270858.270868","volume":"27","author":"J Van den Hoven","year":"1997","unstructured":"Van den Hoven, J. (1997). Privacy and the varieties of moral wrong-doing in an information age. Computers and Society,27, 33\u201337.","journal-title":"Computers and Society"},{"key":"9510_CR90","unstructured":"Van den Hoven, J. (2001). Privacy and the varieties of informational wrongdoing. In Readings in Cyberethics (pp. 430\u2013442). London: Taylor and Francis."},{"issue":"2","key":"9510_CR91","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/2053951717743530","volume":"4","author":"M Veale","year":"2017","unstructured":"Veale, M., & Binns, R. (2017). Fairer machine learning in the real world: Mitigating discrimination without collecting sensitive data. Big Data and Society,4(2), 1\u201317.","journal-title":"Big Data and Society"},{"issue":"2","key":"9510_CR92","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1080\/13600869.2017.1298547","volume":"31","author":"A Vedder","year":"2017","unstructured":"Vedder, A., & Naudts, L. (2017). Accountability for the use of algorithms in a big data environment. International Review of Law, Computers and Technology,31(2), 206\u2013224.","journal-title":"International Review of Law, Computers and Technology"},{"key":"9510_CR93","volume-title":"Privacy and freedom","author":"AF Westin","year":"1967","unstructured":"Westin, A. F. (1967). Privacy and freedom. New York: Atheneum."},{"key":"9510_CR94","first-page":"1","volume-title":"The Routledge companion to philosophy of social science","author":"G Wheeler","year":"2017","unstructured":"Wheeler, G. (2017). Machine epistemology and big data. In L. C. McIntyre & A. Rosenberg (Eds.), The Routledge companion to philosophy of social science (pp. 1\u201311). London: Routledge Taylor and Francis Group."},{"key":"9510_CR95","unstructured":"Wu, X., & Zhang, X. (2016). Responses to critiques on machine learning of criminality perceptions (Addendum of \narXiv:1611.04135\n\n) (pp. 1\u201314). \nhttps:\/\/arxiv.org\/abs\/1611.04135v3\n\n."},{"issue":"6218","key":"9510_CR96","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1126\/science.1254806","volume":"347","author":"HY Xiong","year":"2015","unstructured":"Xiong, H. Y., Alipanahi, B., Lee, L. J., Bretschneider, H., Merico, D., Yuen, R. K. C., et al. (2015). RNA splicing. The human splicing code reveals new insights into the genetic determinants of disease. Science,347(6218), 1\u201320.","journal-title":"Science"},{"key":"9510_CR98","volume-title":"Justice and the politics of difference","author":"IM Young","year":"1990","unstructured":"Young, I. M. (1990). Justice and the politics of difference. Princeton, NJ: Princeton University Press."},{"issue":"4","key":"9510_CR99","doi-asserted-by":"crossref","first-page":"1036","DOI":"10.1073\/pnas.1418680112","volume":"112","author":"W Youyou","year":"2015","unstructured":"Youyou, W., Kosinski, M., & Stillwell, D. (2015). Computer-based personality judgments are more accurate than those made by humans. Proceedings of the National Academy of Sciences of the United States of America,112(4), 1036\u20131040.","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"key":"9510_CR100","unstructured":"Zafar, M. B., Valera, I., Rodriguez, M. G., & Gummadi, K. P. (2017). Fairness beyond disparate treatment & disparate impact: Learning classification without disparate mistreatment (pp. 1\u201310). \nhttps:\/\/arxiv.org\/abs\/1610.08452v2\n\n."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09510-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-019-09510-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09510-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,3]],"date-time":"2020-08-03T23:17:02Z","timestamp":1596496622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-019-09510-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,5]]},"references-count":100,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["9510"],"URL":"https:\/\/doi.org\/10.1007\/s10676-019-09510-5","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2019,8,5]]},"assertion":[{"value":"5 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}