{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T08:25:52Z","timestamp":1774513552424,"version":"3.50.1"},"reference-count":138,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T00:00:00Z","timestamp":1769126400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T00:00:00Z","timestamp":1769126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100019180","name":"HORIZON EUROPE European Research Council","doi-asserted-by":"publisher","award":["833168"],"award-info":[{"award-number":["833168"]}],"id":[{"id":"10.13039\/100019180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s10676-026-09888-z","type":"journal-article","created":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T03:32:55Z","timestamp":1769139175000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revisiting big data optimism: risks of data-driven black box algorithms for society"],"prefix":"10.1007","volume":"28","author":[{"given":"Sachit","family":"Mahajan","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Helbing","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,23]]},"reference":[{"key":"9888_CR1","doi-asserted-by":"crossref","unstructured":"Alikhademi, K., Drobina, E., Prioleau, D., Alikhademi, K., Drobina, E., Prioleau, D., Richardson, B., Purves, D., & Gilbert, J. E. (2022). A review of predictive policing from the perspective of fairness. Artificial Intelligence and Law, 1\u201317.","DOI":"10.1007\/s10506-021-09286-4"},{"issue":"1\u20132","key":"9888_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1332\/273241721X16295348549014","volume":"1","author":"J Alimahomed-Wilson","year":"2021","unstructured":"Alimahomed-Wilson, J., & Reese, E. (2021). Surveilling Amazon\u2019s warehouse workers: Racism, retaliation, and worker resistance amid the pandemic. Work in the Global Economy, 1(1\u20132), 55\u201373.","journal-title":"Work in the Global Economy"},{"issue":"6","key":"9888_CR3","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1038\/s41592-018-0019-x","volume":"15","author":"N Altman","year":"2018","unstructured":"Altman, N., & Krzywinski, M. (2018). The curse (s) of dimensionality. Nature Methods, 15(6), 399\u2013400.","journal-title":"Nature Methods"},{"issue":"3","key":"9888_CR4","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1177\/1461444816676645","volume":"20","author":"M Ananny","year":"2018","unstructured":"Ananny, M., & Crawford, K. (2018). Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability. New Media & Society, 20(3), 973\u2013989.","journal-title":"New Media & Society"},{"issue":"7","key":"9888_CR5","first-page":"16","volume":"16","author":"C Anderson","year":"2008","unstructured":"Anderson, C. (2008). The end of theory: The data deluge makes the scientific method obsolete. Wired Magazine, 16(7), 16\u201307.","journal-title":"Wired Magazine"},{"key":"9888_CR6","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1201\/9781003278290-37","volume-title":"Ethics of data and analytics","author":"J Angwin","year":"2022","unstructured":"Angwin, J., Larson, J., Mattu, S., et al. (2022). Machine bias. Ethics of data and analytics (pp. 254\u2013264). Auerbach Publications."},{"key":"9888_CR7","doi-asserted-by":"publisher","DOI":"10.1214\/09-aoas291","author":"KA Baggerly","year":"2009","unstructured":"Baggerly, K. A., & Coombes, K. R. (2009). Deriving chemosensitivity from cell lines: Forensic bioinformatics and reproducible research in high-throughput biology. The Annals of Applied Statistics. https:\/\/doi.org\/10.1214\/09-aoas291","journal-title":"The Annals of Applied Statistics"},{"key":"9888_CR8","doi-asserted-by":"crossref","unstructured":"Banchio, M., & Mantegazza, G. and others. (2023). Adaptive algorithms and collusion via coupling. EC, (p 208)","DOI":"10.1145\/3580507.3597726"},{"key":"9888_CR9","first-page":"671","volume":"104","author":"S Barocas","year":"2016","unstructured":"Barocas, S., & Selbst, A. D. (2016). Big data\u2019s disparate impact. California Law Review, 104, 671.","journal-title":"California Law Review"},{"key":"9888_CR10","volume-title":"Race After Technology: Abolitionist tools for the new jim code","author":"R Benjamin","year":"2019","unstructured":"Benjamin, R. (2019). Race After Technology: Abolitionist tools for the new jim code. Polity Press."},{"key":"9888_CR11","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013699998","author":"Y Benjamini","year":"2001","unstructured":"Benjamini, Y., & Yekutieli, D. (2001). The control of the false discovery rate in multiple testing under dependency. The Annals of Statistics. https:\/\/doi.org\/10.1214\/aos\/1013699998","journal-title":"The Annals of Statistics"},{"issue":"1","key":"9888_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3427376","volume":"54","author":"SL Bernal","year":"2021","unstructured":"Bernal, S. L., Celdr\u00e1n, A. H., P\u00e9rez, G. M., et al. (2021). Security in brain-computer interfaces: State-of-the-art, opportunities, and future challenges. ACM Computing Surveys (CSUR), 54(1), 1\u201335.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"3","key":"9888_CR13","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1017\/beq.2020.32","volume":"31","author":"VR Bhargava","year":"2021","unstructured":"Bhargava, V. R., & Velasquez, M. (2021). Ethics of the attention economy: The problem of social media addiction. Business Ethics Quarterly, 31(3), 321\u2013359.","journal-title":"Business Ethics Quarterly"},{"issue":"5","key":"9888_CR14","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"D Boyd","year":"2012","unstructured":"Boyd, D., & Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5), 662\u2013679.","journal-title":"Information, Communication & Society"},{"issue":"11","key":"9888_CR15","doi-asserted-by":"publisher","first-page":"e607","DOI":"10.1016\/S2589-7500(20)30184-9","volume":"2","author":"I Braithwaite","year":"2020","unstructured":"Braithwaite, I., Callender, T., Bullock, M., & Aldridge, R. W. (2020). Automated and partly automated contact tracing: A systematic review to inform the control of covid-19. The Lancet Digital Health, 2(11), e607\u2013e621.","journal-title":"The Lancet Digital Health"},{"issue":"1","key":"9888_CR16","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716648174","volume":"3","author":"K Bronson","year":"2016","unstructured":"Bronson, K., & Knezevic, I. (2016). Big data in food and agriculture. Big Data & Society, 3(1), Article 2053951716648174.","journal-title":"Big Data & Society"},{"key":"9888_CR17","unstructured":"Buolamwini, J., & Gebru, T. (2018). Gender shades: Intersectional accuracy disparities in commercial gender classification. Conference on fairness, accountability and transparency. PMLR. (pp 77\u201391)."},{"issue":"7436","key":"9888_CR18","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1038\/494155a","volume":"494","author":"D Butler","year":"2013","unstructured":"Butler, D. (2013). When Google got flu wrong: Us outbreak foxes a leading web-based method for tracking seasonal flu. Nature, 494(7436), 155\u2013157.","journal-title":"Nature"},{"issue":"1","key":"9888_CR19","first-page":"22","volume":"17","author":"C Cadwalladr","year":"2018","unstructured":"Cadwalladr, C., & Graham-Harrison, E. (2018). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian, 17(1), 22.","journal-title":"The Guardian"},{"issue":"5","key":"9888_CR20","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1038\/s43588-023-00431-4","volume":"3","author":"G Caldarelli","year":"2023","unstructured":"Caldarelli, G., Arcaute, E., Barthelemy, M., Batty, M., Gershenson, C., Helbing, D., Mancuso, S., Moreno, Y., Ramasco, J. J., Rozenblat, C., S\u00e1nchez, A., & Fern\u00e1ndez-Villaca\u00f1as, J. L. (2023). The role of complexity for digital twins of cities. Nature Computational Science, 3(5), 374\u2013381.","journal-title":"Nature Computational Science"},{"issue":"6280","key":"9888_CR21","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1126\/science.aaf0918","volume":"351","author":"CF Camerer","year":"2016","unstructured":"Camerer, C. F., Dreber, A., Forsell, E., Ho, T.-H., Huber, J., Johannesson, M., Kirchler, M., Almenberg, J., Altmejd, A., Chan, T., Heikensten, E., Holzmeister, F., Imai, T., Isaksson, S., Nave, G., Pfeiffer, T., Razen, M., & Wu, H. (2016). Evaluating replicability of laboratory experiments in economics. Science, 351(6280), 1433\u20131436.","journal-title":"Science"},{"issue":"3","key":"9888_CR22","first-page":"17","volume":"9","author":"B Carlson","year":"2012","unstructured":"Carlson, B. (2012). Putting oncology patients at risk. Biotechnology Healthcare, 9(3), 17.","journal-title":"Biotechnology Healthcare"},{"issue":"26","key":"9888_CR23","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1056\/NEJMp1702071","volume":"376","author":"JH Chen","year":"2017","unstructured":"Chen, J. H., & Asch, S. M. (2017). Machine learning and prediction in medicine-beyond the peak of inflated expectations. The New England Journal of Medicine, 376(26), 2507.","journal-title":"The New England Journal of Medicine"},{"key":"9888_CR24","first-page":"1753","volume":"107","author":"B Chesney","year":"2019","unstructured":"Chesney, B., & Citron, D. (2019). Deep fakes: A looming challenge for privacy, democracy, and national security. California Law Review, 107, 1753.","journal-title":"California Law Review"},{"key":"9888_CR25","unstructured":"Cho, H., Ippolito, D., & Yu, Y.W. (2020). Contact tracing mobile apps for covid-19: Privacy considerations and related trade-offs. arXiv:2003.11511"},{"key":"9888_CR26","volume-title":"The costs of connection","author":"N Couldry","year":"2019","unstructured":"Couldry, N., & Mejias, U. A. (2019). The costs of connection: How data is colonizing human life and appropriating it for capitalism. The costs of connection. Stanford University Press."},{"key":"9888_CR27","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1201\/9781003278290-44","volume-title":"Ethics of data and analytics","author":"J Dastin","year":"2022","unstructured":"Dastin, J. (2022). Amazon scraps secret ai recruiting tool that showed bias against women. Ethics of data and analytics (pp. 296\u2013299). Auerbach Publications."},{"issue":"3","key":"9888_CR28","doi-asserted-by":"publisher","first-page":"101963","DOI":"10.1016\/j.giq.2024.101963","volume":"41","author":"J Delfos","year":"2024","unstructured":"Delfos, J., Zuiderwijk, A., van Cranenburgh, S., et al. (2024). Integral system safety for machine learning in the public sector: An empirical account. Government Information Quarterly, 41(3), 101963.","journal-title":"Government Information Quarterly"},{"issue":"1","key":"9888_CR29","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.aao5580","volume":"4","author":"J Dressel","year":"2018","unstructured":"Dressel, J., & Farid, H. (2018). The accuracy, fairness, and limits of predicting recidivism. Science Advances, 4(1), Article eaao5580.","journal-title":"Science Advances"},{"issue":"1","key":"9888_CR30","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-11112-0","volume":"10","author":"L Duncan","year":"2019","unstructured":"Duncan, L., Shen, H., Gelaye, B., et al. (2019). Analysis of polygenic risk score usage and performance in diverse human populations. Nature Communications, 10(1), Article 3328.","journal-title":"Nature Communications"},{"key":"9888_CR31","first-page":"18","volume":"16","author":"L Edwards","year":"2017","unstructured":"Edwards, L., & Veale, M. (2017). Slave to the algorithm? Why a\u2019right to an explanation\u2019is probably not the remedy you are looking for. Duke Law & Technology Review, 16, 18.","journal-title":"Duke Law & Technology Review"},{"issue":"6415","key":"9888_CR32","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1126\/science.aau4832","volume":"362","author":"Y Erlich","year":"2018","unstructured":"Erlich, Y., Shor, T., Peter, I., & Carmi, S. (2018). Identity inference of genomic data using long-range familial searches. Science, 362(6415), 690\u2013694.","journal-title":"Science"},{"key":"9888_CR33","volume-title":"Automating inequality: How high-tech tools profile, police, and punish the poor","author":"V Eubanks","year":"2018","unstructured":"Eubanks, V. (2018). Automating inequality: How high-tech tools profile, police, and punish the poor. St. Martin\u2019s Press."},{"key":"9888_CR34","unstructured":"Ezrachi, A., & Stucke, M.E. (2017). Artificial intelligence & collusion: When computers inhibit competition. U Ill L Rev, 1775."},{"issue":"2","key":"9888_CR35","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1093\/nsr\/nwt032","volume":"1","author":"J Fan","year":"2014","unstructured":"Fan, J., Han, F., & Liu, H. (2014). Challenges of big data analysis. National Science Review, 1(2), 293\u2013314.","journal-title":"National Science Review"},{"key":"9888_CR36","doi-asserted-by":"crossref","unstructured":"Favela, L. H., & Amon, M. J. (2023). The ethics of human digital twins: Counterfeit people, personhood, and the right to privacy. 2023 IEEE 3rd international conference on digital twins and parallel intelligence (DTPI) (pp. 1\u20136). IEEE.","DOI":"10.1109\/DTPI59677.2023.10365409"},{"issue":"6","key":"9888_CR37","first-page":"378","volume":"105","author":"AG Ferguson","year":"2017","unstructured":"Ferguson, A. G. (2017). Beyond data-driven policing. American Scientist, 105(6), 378\u2013381.","journal-title":"American Scientist"},{"key":"9888_CR38","doi-asserted-by":"publisher","DOI":"10.18574\/nyu\/9781479854608.001.0001","volume-title":"The rise of big data policing: Surveillance, race, and the future of law enforcement","author":"AG Ferguson","year":"2017","unstructured":"Ferguson, A. G. (2017). The rise of big data policing: Surveillance, race, and the future of law enforcement. New York University Press."},{"key":"9888_CR39","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s13347-012-0093-4","volume":"25","author":"L Floridi","year":"2012","unstructured":"Floridi, L. (2012). Big data and their epistemological challenge. Philosophy & Technology, 25, 435\u2013437.","journal-title":"Philosophy & Technology"},{"issue":"3","key":"9888_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-024-09787-1","volume":"26","author":"C Fontes","year":"2024","unstructured":"Fontes, C., Carpentras, D., & Mahajan, S. (2024). Human digital twins unlocking society 5.0? Approaches, emerging risks and disruptions. Ethics and Information Technology, 26(3), Article 54.","journal-title":"Ethics and Information Technology"},{"key":"9888_CR41","doi-asserted-by":"crossref","unstructured":"Friedman, B., Kahn, P. H., Borning, A., & Huldtgren, A. (2013). Value sensitive design and information systems. Early engagement and new technologies: Opening up the laboratory, 55\u201395.","DOI":"10.1007\/978-94-007-7844-3_4"},{"key":"9888_CR42","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.paid.2013.10.001","volume":"67","author":"D Garcia","year":"2014","unstructured":"Garcia, D., & Sikstr\u00f6m, S. (2014). The dark side of Facebook: Semantic representations of status updates predict the dark triad of personality. Personality and Individual Differences, 67, 92\u201396.","journal-title":"Personality and Individual Differences"},{"key":"9888_CR43","doi-asserted-by":"publisher","unstructured":"Gless, S. (2019). Predictive Policing. In Defence Of \u2018True Positives\u2019, (pp. 62\u201365). Amsterdam University Press, Amsterdam, https:\/\/doi.org\/10.1515\/9789048550180-012","DOI":"10.1515\/9789048550180-012"},{"issue":"3","key":"9888_CR44","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1609\/aimag.v38i3.2741","volume":"38","author":"B Goodman","year":"2017","unstructured":"Goodman, B., & Flaxman, S. (2017). European Union regulations on algorithmic decision-making and a \u201cright to explanation\u2019\u2019. AI Magazine, 38(3), 50\u201357.","journal-title":"AI Magazine"},{"key":"9888_CR45","volume-title":"Ghost work: How to stop silicon valley from building a new global underclass","author":"ML Gray","year":"2019","unstructured":"Gray, M. L., & Suri, S. (2019). Ghost work: How to stop silicon valley from building a new global underclass. Harper Business."},{"issue":"1","key":"9888_CR46","doi-asserted-by":"publisher","first-page":"67","DOI":"10.62273\/TRCF3655","volume":"35","author":"N Gudigantala","year":"2024","unstructured":"Gudigantala, N., & Mehrotra, V. (2024). Teaching case: When strength turns into weakness: Exploring the role of AI in the closure of Zillow offers. Journal of Information Systems Education, 35(1), 67\u201372.","journal-title":"Journal of Information Systems Education"},{"key":"9888_CR47","doi-asserted-by":"publisher","DOI":"10.59403\/27410pa","author":"D Hadwick","year":"2021","unstructured":"Hadwick, D., & Lan, S. (2021). Lessons to be learned from the Dutch childcare allowance scandal: A comparative review of algorithmic governance by tax administrations in the Netherlands, France and Germany. World Tax Journal. https:\/\/doi.org\/10.59403\/27410pa","journal-title":"World Tax Journal"},{"key":"9888_CR48","unstructured":"Hagerty, A., & Rubinov, I. (2019). Global ai ethics: a review of the social impacts and ethical implications of artificial intelligence. arXiv:1907.07892"},{"key":"9888_CR49","doi-asserted-by":"crossref","unstructured":"Hand, D.J. (2006). Classifier technology and the illusion of progress. Statistical Science","DOI":"10.1214\/088342306000000060"},{"issue":"1","key":"9888_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1021\/ci0342472","volume":"44","author":"DM Hawkins","year":"2004","unstructured":"Hawkins, D. M. (2004). The problem of overfitting. Journal of Chemical Information and Computer Sciences, 44(1), 1\u201312.","journal-title":"Journal of Chemical Information and Computer Sciences"},{"key":"9888_CR51","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.elerap.2018.03.005","volume":"29","author":"F Hawlitschek","year":"2018","unstructured":"Hawlitschek, F., Notheisen, B., & Teubner, T. (2018). The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy. Electronic Commerce Research and Applications, 29, 50\u201363.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"3","key":"9888_CR52","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pbio.1002106","volume":"13","author":"ML Head","year":"2015","unstructured":"Head, M. L., Holman, L., Lanfear, R., Kahn, A. T., & Jennions, M. D. (2015). The extent and consequences of p-hacking in science. PLoS Biology, 13(3), Article e1002106.","journal-title":"PLoS Biology"},{"key":"9888_CR53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62330-2","volume-title":"Next civilization: Digital democracy and socio-ecological finance-how to avoid dystopia and upgrade society by digital means","author":"D Helbing","year":"2021","unstructured":"Helbing, D. (2021). Next civilization: Digital democracy and socio-ecological finance-how to avoid dystopia and upgrade society by digital means. Springer Nature."},{"issue":"1","key":"9888_CR54","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-024-09756-8","volume":"26","author":"D Helbing","year":"2024","unstructured":"Helbing, D., & Ienca, M. (2024). Why converging technologies need converging international regulation. Ethics and Information Technology, 26(1), Article 15.","journal-title":"Ethics and Information Technology"},{"key":"9888_CR55","doi-asserted-by":"publisher","first-page":"64","DOI":"10.4337\/9781800887374.00013","volume-title":"Handbook on the politics and governance of big data and artificial intelligence","author":"D Helbing","year":"2023","unstructured":"Helbing, D., & S\u00e1nchez-Vaquerizo, J. A. (2023). Digital twins: Potentials, ethical issues and limitations. Handbook on the politics and governance of big data and artificial intelligence (pp. 64\u2013104). Edward Elgar Publishing."},{"issue":"1","key":"9888_CR56","doi-asserted-by":"publisher","DOI":"10.1080\/21614083.2021.1989243","volume":"10","author":"D Helbing","year":"2021","unstructured":"Helbing, D., Beschorner, T., Frey, B., Diekmann, A., Hagendorff, T., Seele, P., Spiekermann-Hoff, S., van den Hoven, J., & Zwitter, A. (2021). Triage 4.0: On death algorithms and technological selection is today\u2019s data-driven medical system still compatible with the constitution? Journal of European CME, 10(1), Article 1989243.","journal-title":"Journal of European CME"},{"key":"9888_CR57","doi-asserted-by":"crossref","unstructured":"Helbing, D., Mahajan, S., Fricker, R., Musso, A., Hausladen, C.I., Carissimo, C., Carpentras, D., Stockinger, E., Sanchez-Vaquerizo, J.A., & Yang, J.C. and others. (2023). Democracy by design: Perspectives for digitally assisted, participatory upgrades of society. Journal of Computational Science, 71, 102061.","DOI":"10.1016\/j.jocs.2023.102061"},{"key":"9888_CR58","unstructured":"Holligan, A. (2021). Dutch rutte government resigns over child welfare fraud scandal"},{"key":"9888_CR59","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/gm483","volume":"5","author":"L Hood","year":"2013","unstructured":"Hood, L., & Rowen, L. (2013). The human genome project: Big science transforms biology and medicine. Genome Medicine, 5, 1\u20138.","journal-title":"Genome Medicine"},{"issue":"6377","key":"9888_CR60","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1126\/science.359.6377.725","volume":"359","author":"M Hutson","year":"2018","unstructured":"Hutson, M. (2018). Artificial intelligence faces reproducibility crisis. Science, 359(6377), 725\u2013726.","journal-title":"Science"},{"key":"9888_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40504-017-0050-1","volume":"13","author":"M Ienca","year":"2017","unstructured":"Ienca, M., & Andorno, R. (2017). Towards new human rights in the age of neuroscience and neurotechnology. Life Sciences, Society and Policy, 13, 1\u201327.","journal-title":"Life Sciences, Society and Policy"},{"issue":"9","key":"9888_CR62","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1038\/nbt.4240","volume":"36","author":"M Ienca","year":"2018","unstructured":"Ienca, M., Haselager, P., & Emanuel, E. J. (2018). Brain leaks and consumer neurotechnology. Nature Biotechnology, 36(9), 805\u2013810.","journal-title":"Nature Biotechnology"},{"issue":"8","key":"9888_CR63","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pmed.0020124","volume":"2","author":"JP Ioannidis","year":"2005","unstructured":"Ioannidis, J. P. (2005). Why most published research findings are false. PLoS Medicine, 2(8), Article e124.","journal-title":"PLoS Medicine"},{"issue":"2","key":"9888_CR64","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.ijforecast.2020.08.004","volume":"38","author":"JP Ioannidis","year":"2022","unstructured":"Ioannidis, J. P., Cripps, S., & Tanner, M. A. (2022). Forecasting for covid-19 has failed. International Journal of Forecasting, 38(2), 423\u2013438.","journal-title":"International Journal of Forecasting"},{"issue":"8","key":"9888_CR65","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MC.2018.3191268","volume":"51","author":"J Isaak","year":"2018","unstructured":"Isaak, J., & Hanna, M. J. (2018). User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer, 51(8), 56\u201359.","journal-title":"Computer"},{"issue":"4","key":"9888_CR66","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1111\/cts.12178","volume":"7","author":"RM Kaplan","year":"2014","unstructured":"Kaplan, R. M., Chambers, D. A., & Glasgow, R. E. (2014). Big data and large sample size: A cautionary note on the potential for bias. Clinical and Translational Science, 7(4), 342\u2013346.","journal-title":"Clinical and Translational Science"},{"key":"9888_CR67","doi-asserted-by":"crossref","unstructured":"Kapoor, S., & Narayanan, A. (2022). Leakage and the reproducibility crisis in ml-based science. arXiv:2207.07048","DOI":"10.1016\/j.patter.2023.100804"},{"key":"9888_CR68","doi-asserted-by":"crossref","DOI":"10.62441\/nano-ntp.v20i7.4609","volume":"20","author":"S Khan","year":"2024","unstructured":"Khan, S., Krishnamoorthy, P., Goswami, M., Rakhimjonovna, F. M., Mohammed, S. A., & Menaga, D. (2024). Quantum computing and its implications for cybersecurity: A comprehensive review of emerging threats and defenses. Nanotechnology Perceptions, 20, Article S13.","journal-title":"Nanotechnology Perceptions"},{"issue":"3","key":"9888_CR69","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1111\/jofi.12498","volume":"72","author":"A Kirilenko","year":"2017","unstructured":"Kirilenko, A., Kyle, A. S., Samadi, M., et al. (2017). The flash crash: High-frequency trading in an electronic market. Journal of Finance, 72(3), 967\u2013998.","journal-title":"Journal of Finance"},{"key":"9888_CR70","volume-title":"The data revolution: Big data, open data, data infrastructures and their consequences","author":"R Kitchin","year":"2014","unstructured":"Kitchin, R. (2014). The data revolution: Big data, open data, data infrastructures and their consequences. Sage."},{"key":"9888_CR71","unstructured":"Kitchin, R. (2016). Getting smarter about smart cities: Improving data privacy and data security."},{"key":"9888_CR72","doi-asserted-by":"crossref","unstructured":"Lakkaraju, H., & Bastani, O. (2020). \u201c how do i fool you?\u201d manipulating user trust via misleading black box explanations. Proceedings of the AAAI\/ACM conference on AI, ethics, and society, (pp. 79\u201385)","DOI":"10.1145\/3375627.3375833"},{"issue":"5915","key":"9888_CR73","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1126\/science.1167742","volume":"323","author":"D Lazer","year":"2009","unstructured":"Lazer, D., Pentland, A., Adamic, L., Aral, S., Barab\u00e1si, A., Brewer, D., Christakis, N., Contractor, N., Fowler, J., Gutmann, M., Barab\u00e1si, A.-L., Jebara, T., King, G., Macy, M., Roy, D., & Van Alstyne, M. (2009). Computational social science. Science, 323(5915), 721\u2013723.","journal-title":"Science"},{"issue":"6176","key":"9888_CR74","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1126\/science.1248506","volume":"343","author":"D Lazer","year":"2014","unstructured":"Lazer, D., Kennedy, R., King, G., & Vespignani, A. (2014). The parable of Google flu: Traps in big data analysis. Science, 343(6176), 1203\u20131205.","journal-title":"Science"},{"key":"9888_CR75","volume-title":"Data-centric biology: A philosophical study","author":"S Leonelli","year":"2019","unstructured":"Leonelli, S. (2019). Data-centric biology: A philosophical study. University of Chicago Press."},{"key":"9888_CR76","volume-title":"The big short: Inside the doomsday machine","author":"M Lewis","year":"2011","unstructured":"Lewis, M. (2011). The big short: Inside the doomsday machine. Penguin UK."},{"issue":"4","key":"9888_CR77","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1002\/poi3.183","volume":"10","author":"F Liang","year":"2018","unstructured":"Liang, F., Das, V., Kostyuk, N., & Hussain, M. M. (2018). Constructing a data-driven society: China\u2019s social credit system as a state surveillance infrastructure. Policy & Internet, 10(4), 415\u2013453.","journal-title":"Policy & Internet"},{"key":"9888_CR78","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-025-09771-9","author":"H Lin","year":"2025","unstructured":"Lin, H., Czarnek, G., Lewis, B., White, J. P., Berinsky, A. J., Costello, T., Pennycook, G., & Rand, D. G. (2025). Persuading voters using human-artificial intelligence dialogues. Nature. https:\/\/doi.org\/10.1038\/s41586-025-09771-9","journal-title":"Nature"},{"key":"9888_CR79","doi-asserted-by":"publisher","DOI":"10.1080\/07418825.2025.2501544","author":"K Logie","year":"2025","unstructured":"Logie, K., Cohen, N. D., Taylor, E., & Perry, K. (2025). Hidden hate: Analysis of hate speech on a darknet forum. Justice Quarterly. https:\/\/doi.org\/10.1080\/07418825.2025.2501544","journal-title":"Justice Quarterly"},{"key":"9888_CR80","volume-title":"When genius failed: The rise and fall of long-term capital management","author":"R Lowenstein","year":"2001","unstructured":"Lowenstein, R. (2001). When genius failed: The rise and fall of long-term capital management. Random House trade paperbacks."},{"issue":"5","key":"9888_CR81","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1111\/j.1740-9713.2016.00960.x","volume":"13","author":"K Lum","year":"2016","unstructured":"Lum, K., & Isaac, W. (2016). To predict and serve? Significance, 13(5), 14\u201319.","journal-title":"Significance"},{"key":"9888_CR82","volume-title":"The culture of surveillance: Watching as a way of life","author":"D Lyon","year":"2018","unstructured":"Lyon, D. (2018). The culture of surveillance: Watching as a way of life. John Wiley & Sons."},{"key":"9888_CR83","volume-title":"An engine, not a camera: How financial models shape markets","author":"D MacKenzie","year":"2008","unstructured":"MacKenzie, D. (2008). An engine, not a camera: How financial models shape markets. Mit Press."},{"issue":"1","key":"9888_CR84","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1057\/s41599-025-04734-x","volume":"12","author":"S Mahajan","year":"2025","unstructured":"Mahajan, S. (2025). The democratization dilemma: When everyone is an expert, who do we trust? Humanities and Social Sciences Communications, 12(1), 1\u20135.","journal-title":"Humanities and Social Sciences Communications"},{"key":"9888_CR85","doi-asserted-by":"crossref","unstructured":"Mahajan, S. (2025b). Mapping moral reasoning in llms: A multi-dimensional analysis of safety principle conflicts. Proceedings of the AAAI\/ACM conference on AI, ethics, and society, (pp. 1674\u20131685).","DOI":"10.1609\/aies.v8i2.36665"},{"key":"9888_CR86","doi-asserted-by":"crossref","unstructured":"Mahajan, S. (2025c). Participatory provenance: Measuring input transformation in ai-mediated collective synthesis. Available at SSRN 5709064.","DOI":"10.2139\/ssrn.5709064"},{"key":"9888_CR87","doi-asserted-by":"crossref","unstructured":"Mahajan, S., & Helbing, D. (2025). Co-designing ai systems with value-sensitive citizen science. Available at SSRN 5217120.","DOI":"10.2139\/ssrn.5217120"},{"key":"9888_CR88","unstructured":"Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., & Hung Byers, A.(2011). Big data: The next frontier for innovation, competition, and productivity."},{"issue":"7453","key":"9888_CR89","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1038\/498255a","volume":"498","author":"V Marx","year":"2013","unstructured":"Marx, V. (2013). The big challenges of big data. Nature, 498(7453), 255\u2013260.","journal-title":"Nature"},{"key":"9888_CR90","unstructured":"Mikell, S. (2021). A unified panopticon: Insights from a study on workplace surveillance at amazon and uber."},{"issue":"10","key":"9888_CR91","first-page":"2018","volume":"15","author":"P Mozur","year":"2018","unstructured":"Mozur, P. (2018). A genocide incited on facebook, with posts from myanmar\u2019s military. The New York Times, 15(10), 2018.","journal-title":"The New York Times"},{"key":"9888_CR92","doi-asserted-by":"publisher","first-page":"e5","DOI":"10.1016\/j.forsciint.2018.08.027","volume":"292","author":"E Murphy","year":"2018","unstructured":"Murphy, E. (2018). Law and policy oversight of familial searches in recreational genealogy databases. Forensic Science International, 292, e5\u2013e9.","journal-title":"Forensic Science International"},{"key":"9888_CR93","doi-asserted-by":"crossref","unstructured":"Narayanan, A., & Shmatikov, V. (2008). Robust de-anonymization of large sparse datasets. 2008 IEEE symposium on security and privacy (sp 2008). IEEE. (pp 111\u2013125).","DOI":"10.1109\/SP.2008.33"},{"key":"9888_CR94","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Privacy in context. Stanford University Press, Stanford, CA","DOI":"10.1515\/9780804772891"},{"key":"9888_CR95","doi-asserted-by":"publisher","DOI":"10.18574\/nyu\/9781479833641.001.0001","volume-title":"Algorithms of oppression: How search engines reinforce racism","author":"SU Noble","year":"2018","unstructured":"Noble, S. U. (2018). Algorithms of oppression: How search engines reinforce racism. New York University Press."},{"key":"9888_CR96","first-page":"263","volume-title":"Surveillance as social sorting","author":"C Norris","year":"2005","unstructured":"Norris, C. (2005). From personal to digital: Cctv, the panopticon, and the technological mediation of suspicion and social control. Surveillance as social sorting (pp. 263\u2013295). Routledge."},{"issue":"3","key":"9888_CR97","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1177\/0163443719890530","volume":"42","author":"T Nothias","year":"2020","unstructured":"Nothias, T. (2020). Access granted: Facebook\u2019s free basics in Africa. Media, Culture & Society, 42(3), 329\u2013348.","journal-title":"Media, Culture & Society"},{"issue":"6464","key":"9888_CR98","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1126\/science.aax2342","volume":"366","author":"Z Obermeyer","year":"2019","unstructured":"Obermeyer, Z., Powers, B., Vogeli, C., & Mullainathan, S. (2019). Dissecting racial bias in an algorithm used to manage the health of populations. Science, 366(6464), 447\u2013453.","journal-title":"Science"},{"key":"9888_CR99","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2019.00013","volume":"2","author":"A Olteanu","year":"2019","unstructured":"Olteanu, A., Castillo, C., Diaz, F., & K\u0131c\u0131man, E. (2019). Social data: Biases, methodological pitfalls, and ethical boundaries. Frontiers in Big Data, 2, Article 13.","journal-title":"Frontiers in Big Data"},{"key":"9888_CR100","volume-title":"Weapons of math destruction: How big data increases inequality and threatens democracy","author":"C O\u2019Neil","year":"2016","unstructured":"O\u2019Neil, C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy (1st ed). Crown.","edition":"1st ed"},{"key":"9888_CR101","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061","volume-title":"The black box society: The secret algorithms that control money and information","author":"F Pasquale","year":"2015","unstructured":"Pasquale, F. (2015). The black box society: The secret algorithms that control money and information. Harvard University Press."},{"issue":"6","key":"9888_CR102","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/S0092-6566(02)00505-6","volume":"36","author":"DL Paulhus","year":"2002","unstructured":"Paulhus, D. L., & Williams, K. M. (2002). The dark triad of personality: Narcissism, machiavellianism, and psychopathy. Journal of Research in Personality, 36(6), 556\u2013563.","journal-title":"Journal of Research in Personality"},{"key":"9888_CR103","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803161","volume-title":"Causality: Models, reasoning, and inference","author":"J Pearl","year":"2009","unstructured":"Pearl, J. (2009). Causality: Models, reasoning, and inference. Cambridge University Press."},{"key":"9888_CR104","volume-title":"The book of why: The new science of cause and effect","author":"J Pearl","year":"2018","unstructured":"Pearl, J., & Mackenzie, D. (2018). The book of why: The new science of cause and effect. Basic books."},{"key":"9888_CR105","first-page":"2023","volume":"18","author":"B Perrigo","year":"2023","unstructured":"Perrigo, B. (2023). Exclusive: Openai used kenyan workers on less than $2 per hour to make chatgpt less toxic. Time Magazine, 18, 2023.","journal-title":"Time Magazine"},{"issue":"164","key":"9888_CR106","first-page":"1","volume":"22","author":"J Pineau","year":"2021","unstructured":"Pineau, J., Vincent-Lamarre, P., Sinha, K., Larivi\u00e8re, V., Beygelzimer, A., d\u2019Alch\u00e9-Buc, F., Fox, E., & Larochelle, H. (2021). Improving reproducibility in machine learning research (a report from the neurips 2019 reproducibility program). Journal of Machine Learning Research, 22(164), 1\u201320.","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"9888_CR107","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1089\/big.2013.1508","volume":"1","author":"F Provost","year":"2013","unstructured":"Provost, F., & Fawcett, T. (2013). Data science and its relationship to big data and data-driven decision making. Big Data, 1(1), 51\u201359.","journal-title":"Big Data"},{"key":"9888_CR108","volume-title":"Data as the new Gold: Digital feudalism and global power structures","author":"YE Rachmad","year":"2012","unstructured":"Rachmad, Y. E. (2012). Data as the new Gold: Digital feudalism and global power structures. The United Nations and The Education Training Centre."},{"key":"9888_CR109","unstructured":"Recht, B., Roelofs, R., Schmidt, L., & Shankar, V. (2019). Do imagenet classifiers generalize to imagenet. International conference on machine learning (pp. 5389\u20135400). PMLR."},{"key":"9888_CR110","unstructured":"Reisman, D., Schultz, J., Crawford, K., & Whittaker, M. (2018). Algorithmic impact assessments: A practical framework for public agency. AI Now, 9."},{"key":"9888_CR111","first-page":"27","volume":"10","author":"A Rosenblat","year":"2016","unstructured":"Rosenblat, A., & Stark, L. (2016). Algorithmic labor and information asymmetries: A case study of uber\u2019s drivers. International Journal of Communication, 10, 27.","journal-title":"International Journal of Communication"},{"key":"9888_CR112","first-page":"1","volume":"25","author":"C Ross","year":"2018","unstructured":"Ross, C., & Swetlitz, I. (2018). IBM\u2019s watson supercomputer recommended \u2018unsafe and incorrect\u2019cancer treatments, internal documents show. Stat, 25, 1\u201310.","journal-title":"Stat"},{"key":"9888_CR113","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.jrurstud.2019.01.023","volume":"68","author":"S Rotz","year":"2019","unstructured":"Rotz, S., Gravely, E., Mosby, I., Duncan, E., Finnis, E., Horgan, M., LeBlanc, J., Martin, R., Neufeld, H. T., Nixon, A., Pant, L., Shalla, V., & Fraser, E. (2019). Automated pastures and the digital divide: How agricultural technologies are shaping labour and rural communities. Journal of Rural Studies, 68, 112\u2013122.","journal-title":"Journal of Rural Studies"},{"key":"9888_CR114","doi-asserted-by":"crossref","unstructured":"Simms, C. (2025). Ai is more persuasive than people in online debates. Nature.","DOI":"10.1038\/d41586-025-01599-7"},{"key":"9888_CR115","doi-asserted-by":"crossref","unstructured":"Slack, D., Hilgard, S., Jia, E., Singh, S., & Lakkaraju, H. (2020). Fooling lime and shap: Adversarial attacks on post hoc explanation methods. Proceedings of the AAAI\/ACM conference on AI, ethics, and society, (pp 180\u2013186)","DOI":"10.1145\/3375627.3375830"},{"issue":"1","key":"9888_CR116","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1086\/269085","volume":"52","author":"P Squire","year":"1988","unstructured":"Squire, P. (1988). Why the 1936 literary digest poll failed. Public Opinion Quarterly, 52(1), 125\u2013133.","journal-title":"Public Opinion Quarterly"},{"issue":"3","key":"9888_CR117","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2018.2701164","volume":"16","author":"BC Stahl","year":"2018","unstructured":"Stahl, B. C., & Wright, D. (2018). Ethics and privacy in ai and big data: Implementing responsible research and innovation. IEEE Security & Privacy, 16(3), 26\u201333.","journal-title":"IEEE Security & Privacy"},{"issue":"6317","key":"9888_CR118","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1126\/science.aah6168","volume":"354","author":"V Stodden","year":"2016","unstructured":"Stodden, V., McNutt, M., Bailey, D. H., Deelman, E., Gil, Y., Hanson, B., Heroux, M. A., Ioannidis, J. P. A., & Taufer, M. (2016). Enhancing reproducibility for computational methods. Science, 354(6317), 1240\u20131241.","journal-title":"Science"},{"issue":"4","key":"9888_CR119","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSPEC.2019.8678513","volume":"56","author":"E Strickland","year":"2019","unstructured":"Strickland, E. (2019). Ibm watson, heal thyself: How IBM overpromised and underdelivered on ai health care. IEEE Spectrum, 56(4), 24\u201331.","journal-title":"IEEE Spectrum"},{"key":"9888_CR120","unstructured":"Sun, J., Gan, W., Chao, H.C., & Yu, P.S. (2022). Metaverse: Survey, applications, security, and opportunities. arXiv:2210.07990"},{"issue":"2000","key":"9888_CR121","first-page":"1","volume":"671","author":"L Sweeney","year":"2000","unstructured":"Sweeney, L. (2000). Simple demographics often identify people uniquely. Health (San Francisco), 671(2000), 1\u201334.","journal-title":"Health (San Francisco)"},{"key":"9888_CR122","unstructured":"Thorat, D. (2020). The colonial roots of technology aid in the global south. Exploring Digital Humanities in India: Pedagogies, Practices, and Institutional Possibilities."},{"key":"9888_CR123","doi-asserted-by":"crossref","unstructured":"Tufekci, Z. (2014). Big questions for social media big data: Representativeness, validity and other methodological pitfalls. Proceedings of the international AAAI conference on web and social media, (pp 505\u2013514).","DOI":"10.1609\/icwsm.v8i1.14517"},{"issue":"3","key":"9888_CR124","first-page":"2018","volume":"10","author":"Z Tufekci","year":"2018","unstructured":"Tufekci, Z. (2018). Youtube, the great radicalizer. The New York Times, 10(3), 2018.","journal-title":"The New York Times"},{"key":"9888_CR125","doi-asserted-by":"crossref","unstructured":"Vargiu, C., & Nai, A. (2025). Ai chatbots can persuade voters to change their minds.","DOI":"10.1038\/d41586-025-03733-x"},{"issue":"1","key":"9888_CR126","doi-asserted-by":"publisher","DOI":"10.1038\/s42005-024-01837-w","volume":"7","author":"V Vasiliauskaite","year":"2024","unstructured":"Vasiliauskaite, V., & Antulov-Fantulin, N. (2024). Generalization of neural network models for complex network dynamics. Communications Physics, 7(1), Article 348.","journal-title":"Communications Physics"},{"issue":"6380","key":"9888_CR127","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi, S., Roy, D., & Aral, S. (2018). The spread of true and false news online. Science, 359(6380), 1146\u20131151.","journal-title":"Science"},{"key":"9888_CR128","volume-title":"Big Data: Principles and best practices of scalable realtime data systems","author":"J Warren","year":"2015","unstructured":"Warren, J., & Marz, N. (2015). Big Data: Principles and best practices of scalable realtime data systems. Simon and Schuster."},{"issue":"2","key":"9888_CR129","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1177\/2059436419856090","volume":"4","author":"KLX Wong","year":"2019","unstructured":"Wong, K. L. X., & Dobson, A. S. (2019). We\u2019re just data: Exploring China\u2019s social credit system in relation to digital platform ratings cultures in westernised democracies. Global Media and China, 4(2), 220\u2013232.","journal-title":"Global Media and China"},{"key":"9888_CR130","doi-asserted-by":"crossref","unstructured":"Wynants, L., Van Calster, B., Collins, G. S., Riley, R. D., Heinze, G., Schuit, E., Arshi, B., Bellou, V., & Bonten, M. M. J. and others. (2020). Prediction models for diagnosis and prognosis of covid-19: Systematic review and critical appraisal. bmj 369.","DOI":"10.1136\/bmj.m1328"},{"issue":"2","key":"9888_CR131","doi-asserted-by":"publisher","first-page":"46","DOI":"10.56397\/SSSH.2025.03.07","volume":"4","author":"Z Yang","year":"2025","unstructured":"Yang, Z., & Yang, Y. (2025). From neurocolonization to cognitive emancipation: The critical turn of neurocapitalism. Studies in Social Science & Humanities, 4(2), 46\u201357.","journal-title":"Studies in Social Science & Humanities"},{"key":"9888_CR132","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11948-021-00312-x","volume":"27","author":"CP Yen","year":"2021","unstructured":"Yen, C. P., & Hung, T. W. (2021). Achieving equity with predictive policing algorithms: A social safety net perspective. Science and Engineering Ethics, 27, 1\u201316.","journal-title":"Science and Engineering Ethics"},{"issue":"7679","key":"9888_CR133","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1038\/551159a","volume":"551","author":"R Yuste","year":"2017","unstructured":"Yuste, R., Goering, S., Arcas, B. A. Y., Bi, G., Carmena, J. M., Carter, A., Fins, J. J., Friesen, P., Gallant, J., Huggins, J. E., Illes, J., Kellmeyer, P., Klein, E., Marblestone, A., Mitchell, C., Parens, E., Pham, M., Rubel, A., Sadato, N., & Wolpaw, J. (2017). Four ethical priorities for neurotechnologies and AI. Nature, 551(7679), 159\u2013163.","journal-title":"Nature"},{"issue":"3","key":"9888_CR134","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCI.2014.2326099","volume":"9","author":"Y Zhai","year":"2014","unstructured":"Zhai, Y., Ong, Y. S., & Tsang, I. W. (2014). The emerging \u201cbig dimensionality\u2019\u2019. IEEE Computational Intelligence Magazine, 9(3), 14\u201326.","journal-title":"IEEE Computational Intelligence Magazine"},{"key":"9888_CR135","unstructured":"Zhang, C., Bengio, S., Hardt, M., Recht, B., & Vinyals, O. (2016). Understanding deep learning requires rethinking generalization. arXiv:1611.03530"},{"issue":"4","key":"9888_CR136","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-023-09729-3","volume":"25","author":"V Zimmermann","year":"2023","unstructured":"Zimmermann, V. (2023). Smart cities as a testbed for experimenting with humans? -Applying psychological ethical guidelines to smart city interventions. Ethics and Information Technology, 25(4), Article 54.","journal-title":"Ethics and Information Technology"},{"key":"9888_CR137","volume-title":"The age of surveillance capitalism: The fight for a human future at the new frontier of power, edn","author":"S Zuboff","year":"2019","unstructured":"Zuboff, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power, edn. PublicAffairs."},{"issue":"2","key":"9888_CR138","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-024-09763-9","volume":"26","author":"A Zwitter","year":"2024","unstructured":"Zwitter, A. (2024). Cybernetic governance: Implications of technology convergence on governance convergence. Ethics and Information Technology, 26(2), Article 24.","journal-title":"Ethics and Information Technology"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-026-09888-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-026-09888-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-026-09888-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T07:03:14Z","timestamp":1774508594000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-026-09888-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,23]]},"references-count":138,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["9888"],"URL":"https:\/\/doi.org\/10.1007\/s10676-026-09888-z","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,23]]},"assertion":[{"value":"23 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"13"}}