{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:20:18Z","timestamp":1767918018817,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"DOI":"10.1109\/acit62805.2024.10876926","type":"proceedings-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:27:16Z","timestamp":1739816836000},"page":"1-6","source":"Crossref","is-referenced-by-count":25,"title":["Ethical Considerations in AI-Driven HCI Systems in Software Engineering"],"prefix":"10.1109","author":[{"given":"Hamzeh","family":"Aljawawdeh","sequence":"first","affiliation":[{"name":"Zarqa University,Department of Software Engineering,Zarqa,Jordan"}]},{"given":"Hamed","family":"Fawareh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Software Engineering,Zarqa,Jordan"}]},{"given":"Mohammed","family":"Al Refai","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Software Engineering,Zarqa,Jordan"}]},{"given":"Fuad","family":"Alshraideh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Software Engineering,Zarqa,Jordan"}]},{"given":"Randa","family":"Salman","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Software Engineering,Zarqa,Jordan"}]},{"given":"Sara Abu","family":"Dabaa\u2019t","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Software Engineering,Zarqa,Jordan"}]},{"given":"Heba","family":"Alazzeh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Software Engineering,Zarqa,Jordan"}]},{"given":"Hazim","family":"Al-Shdaifat","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Software Engineering,Zarqa,Jordan"}]},{"given":"Mohammed","family":"Khouj","sequence":"additional","affiliation":[{"name":"University of Business and Technology,Department of Electrical Engineering,Jeddah,Saudi Arabia,21432"}]}],"member":"263","reference":[{"issue":"4","key":"ref1","first-page":"1","article-title":"Human-computer interaction: Enhancing user experience and productivity","volume":"1","author":"Smith","year":"2022","journal-title":"International Multidisciplinary Journal Of Science, Technology & Business"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3233\/IDT-230092"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1201\/9781410615862.ch22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.53469\/jtpes.2024.04(03).01"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2016.04.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50585-1_2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2701155"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462631"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-020-00276-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2016.7945813"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2812"},{"key":"ref13","article-title":"An interactive metaheuristic search framework for software service identification from business process models","volume-title":"PhD thesis","author":"Aljawawdeh","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-023-43214-1"},{"key":"ref15","article-title":"Aequitas: A bias and fairness audit toolkit","author":"Saleiro","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14763\/2020.4.1534"},{"key":"ref17","article-title":"Explainable ai","year":"2023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-021-09583-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2768498"},{"key":"ref20","article-title":"Privacy by design in the age of big data","author":"Cavoukian","year":"2012"}],"event":{"name":"2024 25th International Arab Conference on Information Technology (ACIT)","location":"Zarqa, Jordan","start":{"date-parts":[[2024,12,10]]},"end":{"date-parts":[[2024,12,12]]}},"container-title":["2024 25th International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10876862\/10876868\/10876926.pdf?arnumber=10876926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:57:26Z","timestamp":1740081446000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10876926\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/acit62805.2024.10876926","relation":{},"subject":[],"published":{"date-parts":[[2024,12,10]]}}}