{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T21:49:45Z","timestamp":1771624185089,"version":"3.50.1"},"reference-count":118,"publisher":"Cambridge University Press (CUP)","issue":"2","license":[{"start":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T00:00:00Z","timestamp":1671408000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["cambridge.org"],"crossmark-restriction":true},"short-container-title":["Nat. Lang. Eng."],"published-print":{"date-parts":[[2023,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>There has been considerable work recently in the natural language community and elsewhere on Responsible AI. Much of this work focuses on fairness and biases (henceforth Risks 1.0), following the 2016 best seller:<jats:italic>Weapons of Math Destruction<\/jats:italic>. Two books published in 2022,\u00a0<jats:italic>The Chaos Machine<\/jats:italic>and<jats:italic>Like, Comment, Subscribe<\/jats:italic>, raise additional risks to public health\/safety\/security such as genocide, insurrection, polarized politics, vaccinations (henceforth, Risks 2.0). These books suggest that the use of machine learning to maximize engagement in social media has created a Frankenstein Monster that is exploiting human weaknesses with persuasive technology, the illusory truth effect, Pavlovian conditioning, and Skinner\u2019s intermittent variable reinforcement. Just as we cannot expect tobacco companies to sell fewer cigarettes and prioritize public health ahead of profits, so too, it may be asking too much of companies (and countries) to stop trafficking in misinformation given that it is so effective and so insanely profitable (at least in the short term). Eventually, we believe the current chaos will end, like the lawlessness in Wild West, because chaos is bad for business. As computer scientists, this paper will summarize criticisms from other fields and focus on implications for computer science; we will not attempt to contribute to those other fields. There is quite a bit of work in computer science on these risks, especially on Risks 1.0 (bias and fairness), but more work is needed, especially on Risks 2.0 (addictive, dangerous, and deadly).<\/jats:p>","DOI":"10.1017\/s1351324922000481","type":"journal-article","created":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T06:25:30Z","timestamp":1671431130000},"page":"483-508","update-policy":"https:\/\/doi.org\/10.1017\/policypage","source":"Crossref","is-referenced-by-count":7,"title":["Emerging trends: Unfair, biased, addictive, dangerous, deadly, and insanely profitable"],"prefix":"10.1017","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8378-6069","authenticated-orcid":false,"given":"Kenneth","family":"Church","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9248-617X","authenticated-orcid":false,"given":"Annika","family":"Schoene","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2328-3205","authenticated-orcid":false,"given":"John E.","family":"Ortega","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2755-0745","authenticated-orcid":false,"given":"Raman","family":"Chandrasekar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7515-427X","authenticated-orcid":false,"given":"Valia","family":"Kordoni","sequence":"additional","affiliation":[]}],"member":"56","published-online":{"date-parts":[[2022,12,19]]},"reference":[{"key":"S1351324922000481_ref74","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao2998"},{"key":"S1351324922000481_ref14","volume-title":"Like, Comment, Subscribe: Inside YouTube\u2019s Chaotic Rise to World Domination","author":"Bergen","year":"2022"},{"key":"S1351324922000481_ref53","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.301"},{"key":"S1351324922000481_ref30","volume-title":"What Happened","author":"Clinton","year":"2017"},{"key":"S1351324922000481_ref67","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-2281-1"},{"key":"S1351324922000481_ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.361"},{"key":"S1351324922000481_ref84","doi-asserted-by":"publisher","DOI":"10.1057\/s42984-020-00012-z"},{"key":"S1351324922000481_ref104","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X00052031"},{"key":"S1351324922000481_ref8","volume-title":"The Hype Machine: How Social Media Disrupts Our Elections, Our Economy, and Our Health\u2013and How We Must Adapt","author":"Aral","year":"2020"},{"key":"S1351324922000481_ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.013"},{"key":"S1351324922000481_ref82","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.154"},{"key":"S1351324922000481_ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2015.10.001"},{"key":"S1351324922000481_ref9","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1804840115"},{"key":"S1351324922000481_ref96","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-emnlp.414"},{"key":"S1351324922000481_ref29","doi-asserted-by":"publisher","DOI":"10.1017\/S135132492100005X"},{"key":"S1351324922000481_ref60","doi-asserted-by":"publisher","DOI":"10.1001\/jamapediatrics.2015.0944"},{"key":"S1351324922000481_ref97","volume-title":"Extremism, Fake News and Hate: Effects of Social Media in the Post-Truth Era","author":"Schackmuth","year":"2018"},{"key":"S1351324922000481_ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.485"},{"key":"S1351324922000481_ref87","volume-title":"Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy","author":"O\u2019Neil","year":"2016"},{"key":"S1351324922000481_ref77","volume-title":"Zucked: Waking up to the Facebook Catastrophe","author":"McNamee","year":"2020"},{"key":"S1351324922000481_ref31","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12084"},{"key":"S1351324922000481_ref102","doi-asserted-by":"publisher","DOI":"10.1037\/h0054118"},{"key":"S1351324922000481_ref116","doi-asserted-by":"publisher","DOI":"10.1177\/0022002717721392"},{"key":"S1351324922000481_ref99","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-1101"},{"key":"S1351324922000481_ref41","doi-asserted-by":"publisher","DOI":"10.1177\/1088868309352251"},{"key":"S1351324922000481_ref45","doi-asserted-by":"publisher","DOI":"10.1037\/xge0000098"},{"key":"S1351324922000481_ref112","first-page":"141","article-title":"Network neutrality, broadband discrimination","volume":"2","author":"Wu","year":"2003","journal-title":"Journal on Telecommunications and High Technology Law"},{"key":"S1351324922000481_ref13","doi-asserted-by":"crossref","unstructured":"Bender, E.M. , Gebru, T. , McMillan-Major, A. and Shmitchell, S. (2021). On the dangers of stochastic parrots: Can language models be too big? In Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 610\u2013623.","DOI":"10.1145\/3442188.3445922"},{"key":"S1351324922000481_ref81","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv270kv9x"},{"key":"S1351324922000481_ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133147"},{"key":"S1351324922000481_ref55","article-title":"Artificial intelligence in the United States","volume":"5","author":"Goralski","year":"2022","journal-title":"International Perspectives on Artificial Intelligence"},{"key":"S1351324922000481_ref76","volume-title":"Chaos Monkeys: Obscene Fortune and Random Failure in Silicon Valley","author":"Martinez","year":"2018"},{"key":"S1351324922000481_ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858207"},{"key":"S1351324922000481_ref50","doi-asserted-by":"publisher","DOI":"10.1080\/17547075.2019.1684698"},{"key":"S1351324922000481_ref62","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12001"},{"key":"S1351324922000481_ref52","doi-asserted-by":"publisher","DOI":"10.1177\/0309816812453613"},{"key":"S1351324922000481_ref58","doi-asserted-by":"publisher","DOI":"10.1126\/science.aau2706"},{"key":"S1351324922000481_ref11","doi-asserted-by":"publisher","DOI":"10.1080\/14782804.2020.1843415"},{"key":"S1351324922000481_ref117","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-economics-081919-050239"},{"key":"S1351324922000481_ref64","volume-title":"The Rise of Viral Epistemology Dissecting a New Knowledge Ideal","author":"Ihle","year":"2019"},{"key":"S1351324922000481_ref93","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2020.1799690"},{"key":"S1351324922000481_ref113","volume-title":"Mindf*ck: Cambridge Analytica and the Plot to Break America","author":"Wylie","year":"2019"},{"key":"S1351324922000481_ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2011.12.023"},{"key":"S1351324922000481_ref59","first-page":"83","article-title":"How social media companies could be complicit in incitement to genocide","volume":"21","author":"Hakim","year":"2020","journal-title":"Chicago Journal of International Law"},{"key":"S1351324922000481_ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.08.026"},{"key":"S1351324922000481_ref78","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"S1351324922000481_ref2","doi-asserted-by":"publisher","DOI":"10.1257\/aer.20190658"},{"key":"S1351324922000481_ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959190"},{"key":"S1351324922000481_ref44","first-page":"202","volume-title":"Routledge International Handbook of Participatory Design","author":"DiSalvo","year":"2012"},{"key":"S1351324922000481_ref16","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.10.4.365"},{"key":"S1351324922000481_ref118","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1005399"},{"key":"S1351324922000481_ref39","doi-asserted-by":"publisher","DOI":"10.5840\/teachphil199316449"},{"key":"S1351324922000481_ref40","doi-asserted-by":"publisher","DOI":"10.1080\/13691180802266665"},{"key":"S1351324922000481_ref5","doi-asserted-by":"publisher","DOI":"10.1037\/adb0000160"},{"key":"S1351324922000481_ref43","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.656"},{"key":"S1351324922000481_ref23","first-page":"34","author":"Senthil Kumar","year":"2021"},{"key":"S1351324922000481_ref7","doi-asserted-by":"publisher","DOI":"10.2466\/02.09.18.PR0.110.2.501-517"},{"key":"S1351324922000481_ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864770"},{"key":"S1351324922000481_ref90","volume-title":"Imperial Twilight: The Opium War and the End of China\u2019s Last Golden Age","author":"Platt","year":"2018"},{"key":"S1351324922000481_ref12","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mpu011"},{"key":"S1351324922000481_ref110","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"S1351324922000481_ref115","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.semeval-1.188"},{"key":"S1351324922000481_ref19","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.2018.304567"},{"key":"S1351324922000481_ref111","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-3012"},{"key":"S1351324922000481_ref114","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.1998.1.237"},{"key":"S1351324922000481_ref89","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1514483113"},{"key":"S1351324922000481_ref42","doi-asserted-by":"crossref","unstructured":"Delobelle, P. , Winters, T. and Berendt, B. (2020). RobBERT: a\u00a0Dutch\u00a0RoBERTa-based\u00a0Language\u00a0Model, Findings of the Association for Computational Linguistics: EMNLP 2020, pp. 3255\u20133265.","DOI":"10.18653\/v1\/2020.findings-emnlp.292"},{"key":"S1351324922000481_ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44816-0_11"},{"key":"S1351324922000481_ref107","unstructured":"Taplin, J. (2017). Move Fast and Break Things: How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy. New York, NY, USA: Little, Brown and Company, Hachette Book Group."},{"key":"S1351324922000481_ref38","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"S1351324922000481_ref101","doi-asserted-by":"crossref","unstructured":"Simonsen, J. and Robertson, T. (2013). Routledge International Handbook of Participatory Design, vol. 711. Routledge New York.","DOI":"10.4324\/9780203108543"},{"key":"S1351324922000481_ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.invent.2015.03.005"},{"key":"S1351324922000481_ref75","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.2011.300608"},{"key":"S1351324922000481_ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-011-9318-5"},{"key":"S1351324922000481_ref3","doi-asserted-by":"publisher","DOI":"10.3386\/w23089"},{"key":"S1351324922000481_ref24","unstructured":"Chen, J. , Dong, H. , Wang, X. , Feng, F. , Wang, M. and He, X. (2020). Bias and debias in recommender system: A survey and future directions. ArXiv, abs\/2010.03240."},{"key":"S1351324922000481_ref88","unstructured":"Ouyang, L. , Wu, J. , Jiang, X. , Almeida, D. , Wainwright, C.L. , Mishkin, P. , Zhang, C. , Agarwal, S. , Slama, K. , Ray, A. , Schulman, J. , Hilton, J. , Kelton, F. , Miller, L.E. , Simens, M. , Askell, A. , Welinder, P. , Christiano, P.F. , Leike, J. and Lowe, R.J. (2022). Training language models to follow instructions with human feedback. ArXiv, abs\/2203.02155."},{"key":"S1351324922000481_ref20","unstructured":"Brown, T.B. , Mann, B. , Ryder, N. , Subbiah, M. , Kaplan, J. , Dhariwal, P. , Neelakantan, A. , Shyam, P. , Sastry, G. , Askell, A. , Agarwal, S. , Herbert-Voss, A. , Krueger, G. , Henighan, T. , Child, R. , Ramesh, A. , Ziegler, D.M. , Wu, J. , Winter, C. , Hesse, C. , Chen, M. , Sigler, E. , Litwin, M. , Gray, S. , Chess, B. , Clark, J. , Berner, C. , McCandlish, S. , Radford, A. , Sutskever, I. and Amodei, D. (2020). Language models are few-shot learners. NeurIPS."},{"key":"S1351324922000481_ref48","volume-title":"THE CHAOS MACHINE: The Inside Story of How Social Media Rewired Our Minds and Our World","author":"Fisher","year":"2022"},{"key":"S1351324922000481_ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.006"},{"key":"S1351324922000481_ref103","volume-title":"Science and Human Behavior","volume":"92904","author":"Skinner","year":"1965"},{"key":"S1351324922000481_ref21","unstructured":"Buolamwini, J. and Gebru, T. (2018). Gender shades: Intersectional accuracy disparities in commercial gender classification. In Friedler, S.A. and Wilson, C. (eds), Proceedings of the 1st Conference on Fairness, Accountability and Transparency, Proceedings of Machine Learning Research, vol. 81, PMLR, pp. 77\u201391."},{"key":"S1351324922000481_ref61","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.89.3.416"},{"key":"S1351324922000481_ref80","doi-asserted-by":"publisher","DOI":"10.1093\/jeea\/jvaa045"},{"key":"S1351324922000481_ref83","first-page":"560","article-title":"How does fake news spread? understanding pathways of disinformation spread through apis","volume":"13","author":"Ng","year":"2021","journal-title":"Policy and Internet"},{"key":"S1351324922000481_ref15","article-title":"Social bots distort the 2016 US presidential election online discussion","volume":"21","author":"Bessi","year":"2016","journal-title":"First Monday"},{"key":"S1351324922000481_ref63","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2595096"},{"key":"S1351324922000481_ref106","doi-asserted-by":"publisher","DOI":"10.2196\/17187"},{"key":"S1351324922000481_ref56","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.74.6.1464"},{"key":"S1351324922000481_ref47","volume-title":"To Dwell Among Friends: Personal Networks in Town and City","author":"Fischer","year":"1982"},{"key":"S1351324922000481_ref18","unstructured":"Bolukbasi, T. , Chang, K.-W. , Zou, J.Y. , Saligrama, V. and Kalai, A.T. (2016). Man is to computer programmer as woman is to homemaker? debiasing word embeddings. In NIPS."},{"key":"S1351324922000481_ref27","unstructured":"Chowdhery, A. , Narang, S. , Devlin, J. , Bosma, M. , Mishra, G. , Roberts, A. , Barham, P. , Chung, H.W. , Sutton, C. , Gehrmann, S. , Schuh, P. , Shi, K. , Tsvyashchenko, S. , Maynez, J. , Rao, A. , Barnes, P. , Tay, Y. , Shazeer, N. , Prabhakaran, V. , Reif, E. , Du, N. , Hutchinson, B. , Pope, R. , Bradbury, J. , Austin, J. , Isard, M. , Gur-Ari, G. , Yin, P. , Duke, T. , Levskaya, A. , Ghemawat, S. , Dev, S. , Michalewski, H. , Garcia, X. , Misra, V. , Robinson, K. , Fedus, L. , Zhou, D. , Ippolito, D. , Luan, D. , Lim, H. , Zoph, B. , Spiridonov, A. , Sepassi, R. , Dohan, D. , Agrawal, S. , Omernick, M. , Dai, A.M. , Pillai, T.S. , Pellat, M. , Lewkowycz, A. , Moreira, E. , Child, R. , Polozov, O. , Lee, K. , Zhou, Z. , Wang, X. , Saeta, B. , Diaz, M. , Firat, O. , Catasta, M. , Wei, J. , Meier-Hellstern, K. , Eck, D. , Dean, J. , Petrov, S. and Fiedel, N. (2022). Palm: Scaling language modeling with pathways."},{"key":"S1351324922000481_ref49","doi-asserted-by":"publisher","DOI":"10.1145\/764008.763957"},{"key":"S1351324922000481_ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287596"},{"key":"S1351324922000481_ref94","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.43.3.151"},{"key":"S1351324922000481_ref25","unstructured":"Chen, M. , Tworek, J. , Jun, H. , Yuan, Q. , Ponde, H. , Kaplan, J. , Edwards, H. , Burda, Y. , Joseph, N. , Brockman, G. , Ray, A. , Puri, R. , Krueger, G. , Petrov, M. , Khlaaf, H. , Sastry, G. , Mishkin, P. , Chan, B. , Gray, S. , Ryder, N. , Pavlov, M. , Power, A. , Kaiser, L. , Bavarian, M. , Winter, C. , Tillet, P. , Such, F.P. , Cummings, D.W. , Plappert, M. , Chantzis, F. , Barnes, E. , Herbert-Voss, A. , Guss, W.H. , Nichol, A. , Babuschkin, I. , Balaji, S.A. , Jain, S. , Carr, A. , Leike, J. , Achiam, J. , Misra, V. , Morikawa, E. , Radford, A. , Knight, M.M. , Brundage, M. , Murati, M. , Mayer, K. , Welinder, P. , McGrew, B. , Amodei, D. , McCandlish, S. , Sutskever, I. and Zaremba, W. (2021). Evaluating large language models trained on code. ArXiv, abs\/2107.03374."},{"key":"S1351324922000481_ref70","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120969914"},{"key":"S1351324922000481_ref95","doi-asserted-by":"publisher","DOI":"10.1111\/eip.12229"},{"key":"S1351324922000481_ref100","first-page":"335","article-title":"What\u2019s in a name?","volume":"27","author":"Shprintzen","year":"1990","journal-title":"The Cleft Palate Journal"},{"key":"S1351324922000481_ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.03.038"},{"key":"S1351324922000481_ref22","doi-asserted-by":"publisher","DOI":"10.1126\/science.aal4230"},{"key":"S1351324922000481_ref108","doi-asserted-by":"publisher","DOI":"10.1177\/0963721419827854"},{"key":"S1351324922000481_ref65","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0135"},{"key":"S1351324922000481_ref105","doi-asserted-by":"publisher","DOI":"10.1177\/0974928417700798"},{"key":"S1351324922000481_ref71","unstructured":"Kurka, D.B. , Godoy, A. and Zuben, F.J.V. (2016). Birds of a feather tweet together: Computational techniques to understand user communities in social networks. In #Microposts."},{"key":"S1351324922000481_ref10","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1160"},{"key":"S1351324922000481_ref28","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0163"},{"key":"S1351324922000481_ref36","article-title":"Demarginalizing the intersection of race and sex: A black feminist critique of antidiscrimination doctrine, feminist theory and antiracist politics","volume":"1989","author":"Crenshaw","year":"1989","journal-title":"University of Chicago Legal Forum"},{"key":"S1351324922000481_ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.addbeh.2016.03.006"},{"key":"S1351324922000481_ref46","first-page":"993","article-title":"Disinformation and social bot operations in the run up to the 2017 french presidential election","volume":"22","author":"Ferrara","year":"2017","journal-title":"Interorganizational Networks and Organizational Behavior eJournal"},{"key":"S1351324922000481_ref57","doi-asserted-by":"publisher","DOI":"10.1089\/109493100316067"},{"key":"S1351324922000481_ref54","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9042.003.0013","article-title":"The relevance of algorithms","volume":"167","author":"Gillespie","year":"2014","journal-title":"Media Technologies: Essays on Communication, Materiality, and Society"},{"key":"S1351324922000481_ref1","volume-title":"Fascism","author":"Albright","year":"2018"},{"key":"S1351324922000481_ref85","doi-asserted-by":"publisher","DOI":"10.1177\/0894439314555329"},{"key":"S1351324922000481_ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s40429-015-0056-9"},{"key":"S1351324922000481_ref34","volume-title":"The Age of Addiction: How Bad Habits Became Big Business","author":"Courtwright","year":"2019"},{"key":"S1351324922000481_ref32","volume-title":"A Higher Loyalty: Truth, Lies, and Leadership","author":"Comey","year":"2018"},{"key":"S1351324922000481_ref73","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph8093528"}],"container-title":["Natural Language Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/S1351324922000481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T17:09:15Z","timestamp":1728580155000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/S1351324922000481\/type\/journal_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,19]]},"references-count":118,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["S1351324922000481"],"URL":"https:\/\/doi.org\/10.1017\/s1351324922000481","relation":{},"ISSN":["1351-3249","1469-8110"],"issn-type":[{"value":"1351-3249","type":"print"},{"value":"1469-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,19]]},"assertion":[{"value":"\u00a9 The Author(s), 2022. Published by Cambridge University Press","name":"copyright","label":"Copyright","group":{"name":"copyright_and_licensing","label":"Copyright and Licensing"}},{"value":"This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (https:\/\/creativecommons.org\/licenses\/by\/4.0\/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited.","name":"license","label":"License","group":{"name":"copyright_and_licensing","label":"Copyright and Licensing"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}