{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:50:47Z","timestamp":1774129847378,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Hochschule D\u00fcsseldorf University of Applied Sciences"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI Ethics"],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the increasing capabilities of machine learning systems and their potential use in safety-critical systems, ensuring high-quality data is becoming increasingly important. In this paper, we present a novel approach for the assurance of data quality. For this purpose, the mathematical basics are first discussed and the approach is presented using multiple examples. This results in the detection of data points with potentially harmful properties for the use in safety-critical systems.<\/jats:p>","DOI":"10.1007\/s43681-023-00393-3","type":"journal-article","created":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T13:02:51Z","timestamp":1704718971000},"page":"131-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["ECS: an interactive tool for data quality assurance"],"prefix":"10.1007","volume":"4","author":[{"given":"Christian","family":"Sieberichs","sequence":"first","affiliation":[]},{"given":"Simon","family":"Geerkens","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Braun","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Waschulzik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,8]]},"reference":[{"key":"393_CR1","doi-asserted-by":"crossref","unstructured":"Ankerst, M., Breunig, M. M., Kriegel, H.-P., Sander, J.: OPTICS: Ordering Points to Identify the Clustering Structure. In: Proceedings of the 1999 ACM SIGMOD International Conference on Management of Data, SIGMOD \u201999, 49\u201360. New York, NY, USA: Association for Computing Machinery. ISBN 1-58113-084-8. Event-place: Philadelphia, Pennsylvania, USA (1999)","DOI":"10.1145\/304181.304187"},{"key":"393_CR2","doi-asserted-by":"crossref","unstructured":"Breunig, M. M., Kriegel, H.-P., Ng, R. T., Sander, J.: LOF: Identifying Density-Based Local Outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD \u201900, 93\u2013104. New York, NY, USA: Association for Computing Machinery. ISBN 1-58113-217-4. Event-place: Dallas, Texas, USA (2000)","DOI":"10.1145\/335191.335388"},{"key":"393_CR3","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, KDD\u201996, pp. 226\u2013231. AAAI Press. Event-place: Portland, Oregon (1996)"},{"key":"393_CR4","unstructured":"European Commission. Laying down harmonised rules on artificial intelligence (Artificial Intelligence Act) and amending certain union legislative acts (2021)"},{"issue":"3","key":"393_CR5","doi-asserted-by":"publisher","DOI":"10.1136\/bmjopen-2018-024722","volume":"9","author":"KP Fadahunsi","year":"2019","unstructured":"Fadahunsi, K.P., Akinlua, J.T., O\u2019Connor, S., Wark, P.A., Gallagher, J., Carroll, C., Majeed, A., O\u2019Donoghue, J.: Protocol for a systematic review and qualitative synthesis of information quality frameworks in eHealth. BMJ Open 9(3), e024722 (2019)","journal-title":"BMJ Open"},{"issue":"2","key":"393_CR6","first-page":"157","volume":"14","author":"A Fawzy","year":"2013","unstructured":"Fawzy, A., Mokhtar, H.M.O., Hegazy, O.: Outliers detection and classification in wireless sensor networks. Egypt. Inf. J. 14(2), 157\u2013164 (2013)","journal-title":"Egypt. Inf. J."},{"key":"393_CR7","unstructured":"Geerkens, S.: Anwendung und Validierung des SHLQI$$^{2}$$ auf realen Beispielmengen und neuronale Netzwerke (2021)"},{"key":"393_CR8","doi-asserted-by":"crossref","unstructured":"Geerkens, S., Sieberichs, C., Braun, A., Waschulzik, T.: QI2 - an Interactive Tool for Data Quality Assurance (2023)","DOI":"10.1007\/s43681-024-00422-9"},{"key":"393_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110938","volume":"176","author":"F Gualo","year":"2021","unstructured":"Gualo, F., Rodriguez, M., Verdugo, J., Caballero, I., Piattini, M.: Data quality certification using ISO\/IEC 25012: Industrial experiences. J. Syst. Softw. 176, 110938 (2021)","journal-title":"J. Syst. Softw."},{"key":"393_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.dss.2018.03.011","volume":"110","author":"B Heinrich","year":"2018","unstructured":"Heinrich, B., Klier, M., Schiller, A., Wagner, G.: Assessing data quality - a probability-based metric for semantic consistency. Decis. Support Syst. 110, 95\u2013106 (2018)","journal-title":"Decis. Support Syst."},{"key":"393_CR11","unstructured":"Holcomb, Z.: Fundamentals of Descriptive Statistics. Routledge, 0 edition. ISBN 978-1-351-97033-4 (2016)"},{"key":"393_CR12","unstructured":"Iannone, R., Vargas, M.: pointblank: Data Validation and Organization of Metadata for Local and Remote Tables. R package version 0.11.4.9000. https:\/\/rstudio.github.io\/pointblank\/ (2022)"},{"issue":"10","key":"393_CR13","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1002\/j.1477-8696.1990.tb05558.x","volume":"45","author":"IT Jolliffe","year":"1990","unstructured":"Jolliffe, I.T.: Principal component analysis: a beginner\u2019s guide - I. Introduction and application. Weather 45(10), 375\u2013382 (1990)","journal-title":"Weather"},{"key":"393_CR14","unstructured":"LeCun, Y., Cortes, C.: MNIST handwritten digit database. http:\/\/yann.lecun.com\/exdb\/mnist\/(2010)"},{"key":"393_CR15","first-page":"2579","volume":"9","author":"Lvd Maaten","year":"2008","unstructured":"Maaten, Lvd, Hinton, G.E.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"393_CR16","unstructured":"McInnes, L., Healy, J., Melville, J.: UMAP: Uniform manifold approximation and projection for dimension reduction. arXiv:1802.03426 [cs, stat] (2020)"},{"key":"393_CR17","unstructured":"Mock, M., Scholz, S., Blank, F., H\u00fcger, F., Rohatschek, A., Schwarz, L., Stauner, T.: An Integrated Approach to a Safety Argumentation for AI-Based Perception Functions in Automated Driving. In: Habli, I., Sujan, M., Gerasimou, S., Schoitsch, E., and Bitsch, F. (eds.) Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops, vol. 12853, pp. 265\u2013271. Springer International Publishing, Cham. ISBN 978-3-030-83905-5 978-3-030-83906-2. Series Title: Lecture Notes in Computer Science (2021)"},{"issue":"4","key":"393_CR18","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/505248.506010","volume":"45","author":"LL Pipino","year":"2002","unstructured":"Pipino, L.L., Lee, Y.W., Wang, R.Y.: Data quality assessment. Commun. ACM 45(4), 211\u2013218 (2002)","journal-title":"Commun. ACM"},{"key":"393_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2022.102618","volume":"120","author":"MA Samara","year":"2022","unstructured":"Samara, M.A., Bennis, I., Abouaissa, A., Lorenz, P.: Enhanced efficient outlier detection and classification approach for WSNs. Simul. Model. Pract. Theory 120, 102618 (2022)","journal-title":"Simul. Model. Pract. Theory"},{"key":"393_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103563","volume":"211","author":"MA Samara","year":"2023","unstructured":"Samara, M.A., Bennis, I., Abouaissa, A., Lorenz, P.: Complete outlier detection and classification framework for WSNs based on OPTICS. J. Netw. Comput. Appl. 211, 103563 (2023)","journal-title":"J. Netw. Comput. Appl."},{"issue":"12","key":"393_CR21","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.14778\/3229863.3229867","volume":"11","author":"S Schelter","year":"2018","unstructured":"Schelter, S., Lange, D., Schmidt, P., Celikel, M., Biessmann, F., Grafberger, A.: Automating large-scale data quality verification. Proc. VLDB Endow. 11(12), 1781\u20131794 (2018)","journal-title":"Proc. VLDB Endow."},{"key":"393_CR22","unstructured":"Schelter, S., Schmidt, P., Rukat, T., Kiessling, M., Taptunov, A., Biessmann, F., Lange, D.: DEEQU - Data quality validation for machine learning pipelines. In: Machine Learning Systems workshop at the conference on Neural Information Processing Systems (NeurIPS) 2018. https:\/\/ssc.io\/pdf\/deequ.pdf (2018b)"},{"key":"393_CR23","doi-asserted-by":"crossref","unstructured":"Sidi, F., Shariat Panahy, P. H., Affendey, L. S., Jabar, M. A., Ibrahim, H., Mustapha, A.: Data quality: A survey of data quality dimensions. In 2012 International Conference on Information Retrieval & Knowledge Management, 300\u2013304. Kuala Lumpur: IEEE. ISBN 978-1-4673-1091-8 978-1-4673-1090-1 (2012)","DOI":"10.1109\/InfRKM.2012.6204995"},{"key":"393_CR24","unstructured":"Sieberichs, C.: Anwendung und Validierung des ECS auf reale Beispielmengen und neuronale Netzwerke (2021)"},{"key":"393_CR25","unstructured":"Siemens, A. G.: Digitalisierung und Automatisierung f\u00fcr fahrerlosen Regionalverkehr. https:\/\/press.siemens.com\/global\/de\/pressemitteilung\/digitalisierung-und-automatisierung-fuer-fahrerlosen-regionalverkehr (2022)"},{"key":"393_CR26","doi-asserted-by":"crossref","unstructured":"Thang, T.M., Kim, J.: The Anomaly Detection by Using DBSCAN Clustering with Multiple Parameters. In: 2011 International Conference on Information Science and Applications, 1\u20135. Jeju Island: IEEE. ISBN 978-1-4244-9222-0 (2011)","DOI":"10.1109\/ICISA.2011.5772437"},{"issue":"4","key":"393_CR27","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/07421222.1996.11518099","volume":"12","author":"RY Wang","year":"1996","unstructured":"Wang, R.Y., Strong, D.M.: Beyond accuracy: what data quality means to data consumers. J. Manag. Inf. Syst. 12(4), 5\u201333 (1996)","journal-title":"J. Manag. Inf. Syst."},{"key":"393_CR28","unstructured":"Waschulzik, T.: Qualit\u00e4tsgesicherte effiziente Entwicklung vorw\u00e4rtsgerichteter k\u00fcnstlicher Neuronaler Netze mit \u00fcberwachtem Lernen (QUEEN). Ph.D. thesis, Technische Universit\u00e4t M\u00fcnchen, M\u00fcnchen (1999)"}],"updated-by":[{"DOI":"10.1007\/s43681-024-00429-2","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T00:00:00Z","timestamp":1707091200000}}],"container-title":["AI and Ethics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43681-023-00393-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43681-023-00393-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43681-023-00393-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T17:29:49Z","timestamp":1731000589000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43681-023-00393-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["393"],"URL":"https:\/\/doi.org\/10.1007\/s43681-023-00393-3","relation":{},"ISSN":["2730-5953","2730-5961"],"issn-type":[{"value":"2730-5953","type":"print"},{"value":"2730-5961","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,8]]},"assertion":[{"value":"8 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2024","order":2,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s43681-024-00429-2","URL":"https:\/\/doi.org\/10.1007\/s43681-024-00429-2","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}