{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T17:48:20Z","timestamp":1774460900357,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1650589"],"award-info":[{"award-number":["1650589"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,29]]},"DOI":"10.1145\/3287560.3287568","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T21:42:15Z","timestamp":1547070135000},"page":"110-119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["The Profiling Potential of Computer Vision and the Challenge of Computational Empiricism"],"prefix":"10.1145","author":[{"given":"Jake","family":"Goldenfein","sequence":"first","affiliation":[{"name":"Cornell Tech, New York, New York and Cornell Tech, Cornell University and Swinburne University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1898. The New Sight and the New Photography.  1898. The New Sight and the New Photography."},{"key":"e_1_3_2_1_2_1","unstructured":"2016-05-04. REGULATION (EU) No 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). OJ L 119 (2016-05-04) 1--88.  2016-05-04. REGULATION (EU) No 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). OJ L 119 (2016-05-04) 1--88."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocv200"},{"key":"e_1_3_2_1_4_1","volume-title":"Social and Applied Aspects of Perceiving Faces","author":"Alley Thomas"},{"key":"e_1_3_2_1_5_1","volume-title":"d.}. First Impressions, year =","author":"Ambady Nalini","year":"2008"},{"key":"e_1_3_2_1_6_1","volume-title":"Brain Whisperers: Cutting Through the Clutter with Neuromarketing. Somatechnics 2(2)","author":"Andrejevic Mark","year":"2012"},{"key":"e_1_3_2_1_7_1","volume-title":"Shibboleth: Policing by Ear and Forensic Listening in Projects by Lawrence Abu Hamdan. October 156","author":"Apter Emily","year":"2016"},{"key":"e_1_3_2_1_8_1","volume-title":"Unsupervised Feature Learning and Deep Learning: A Review and New Perspectives. CoRR abs\/1206.5538","author":"Bengio Yoshua","year":"2012"},{"key":"e_1_3_2_1_9_1","volume-title":"A Short History of Photography","author":"Benjamin Walter","year":"1934"},{"key":"e_1_3_2_1_10_1","unstructured":"Margaret Mitchell Blaise Ag\u00fcera y Arcas and Alexander Todorov. 2017. Physiognomy's new Clothes. https:\/\/medium.com\/@blaisea\/physiognomys-new-clothes-f2d4b59fdd6a  Margaret Mitchell Blaise Ag\u00fcera y Arcas and Alexander Todorov. 2017. Physiognomy's new Clothes. https:\/\/medium.com\/@blaisea\/physiognomys-new-clothes-f2d4b59fdd6a"},{"key":"e_1_3_2_1_11_1","volume-title":"Big Data's Disparate Impact. California Law Review 104(3)","author":"Borocas Solon","year":"2016"},{"key":"e_1_3_2_1_12_1","unstructured":"James Bridle. 18 December 2013. How Britain Exported Next-Generation Surveillance. https:\/\/medium.com\/matter\/how-britain-exported-next-generation-surveillance-d15b5801b79e  James Bridle. 18 December 2013. How Britain Exported Next-Generation Surveillance. https:\/\/medium.com\/matter\/how-britain-exported-next-generation-surveillance-d15b5801b79e"},{"key":"e_1_3_2_1_13_1","volume-title":"Computer Vision and Natural Constraints. 224, 4655","author":"Brown C. M.","year":"1984"},{"key":"e_1_3_2_1_14_1","volume-title":"Privacy and Data Protection in an international perspective. Scandinavian Studies in Law 56(8)","author":"Bygrave Lee","year":"2010"},{"key":"e_1_3_2_1_15_1","unstructured":"Alvaro Bedoya Clare Garvie and Jonathan Frankle. 18 October 2018. The Perpetual Lineup: Unregulated Police Face Recognition in America. https:\/www.perpetuallineup.org\/  Alvaro Bedoya Clare Garvie and Jonathan Frankle. 18 October 2018. The Perpetual Lineup: Unregulated Police Face Recognition in America. https:\/www.perpetuallineup.org\/"},{"key":"e_1_3_2_1_16_1","first-page":"6","article-title":"Being and Media: Digital Ontology after the Event of the End of Media","volume":"24","author":"Clemens Justin","year":"2015","journal-title":"The Fibreculture Journal"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243915589635"},{"key":"e_1_3_2_1_18_1","unstructured":"Lorraine Daston and Peter Galison. 2007. Objectivity. Zone Books.  Lorraine Daston and Peter Galison. 2007. Objectivity. Zone Books."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2007.10.012"},{"key":"e_1_3_2_1_21_1","unstructured":"Didier Ottinger (ed). 2008. Futurism. Centre Pompidou Five Continent Editions.  Didier Ottinger (ed). 2008. Futurism. Centre Pompidou Five Continent Editions."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Paul Edwards. 1996. The Closed World: Computers and the Politics of Discourse in Cold War America. MIT.   Paul Edwards. 1996. The Closed World: Computers and the Politics of Discourse in Cold War America. MIT.","DOI":"10.7551\/mitpress\/1871.001.0001"},{"key":"e_1_3_2_1_23_1","volume-title":"Hugo Jair Escalante, and Isabelle Guyon","author":"Escalera Sergio","year":"2017"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1068\/p261271"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Virginia Eubanks. 2018. Automating Inequality. St Martins Press.  Virginia Eubanks. 2018. Automating Inequality. St Martins Press.","DOI":"10.1038\/scientificamerican1118-68"},{"key":"e_1_3_2_1_27_1","unstructured":"Vil\u00e9m Flusser. 2000. Towards a Philosophy of Photography. Anthony Mathews trans in Reaktion Books.  Vil\u00e9m Flusser. 2000. Towards a Philosophy of Photography. Anthony Mathews trans in Reaktion Books."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/2841021"},{"key":"e_1_3_2_1_29_1","unstructured":"William Gibson. 1984. Neuromancer. ACE Books.  William Gibson. 1984. Neuromancer. ACE Books."},{"key":"e_1_3_2_1_30_1","volume-title":"A Checklist. The Papers of the Bibliographical Society of America 55(4)","author":"Graham John","year":"1961"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","volume-title":"The Taming of Chance","author":"Hacking Ian","DOI":"10.1017\/CBO9780511819766"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2911282"},{"key":"e_1_3_2_1_33_1","volume-title":"Collected Papers of Charles Sanders Peirce","author":"Hartshorne Charles"},{"key":"e_1_3_2_1_34_1","volume-title":"How We Became Post-Human: Virtual Bodies in Cybernetics, Literature and Infomatics","author":"Hayles N Katherine"},{"key":"e_1_3_2_1_35_1","unstructured":"Douglas Heaven. 31 October 2018. An AI lie detector will interrogate travellers at some EU borders. https:\/www.newscientist.com\/article\/mg24032023-400-an-ai-lie-detector-will-interrogate-travellers-at-some-eu-borders\/  Douglas Heaven. 31 October 2018. An AI lie detector will interrogate travellers at some EU borders. https:\/www.newscientist.com\/article\/mg24032023-400-an-ai-lie-detector-will-interrogate-travellers-at-some-eu-borders\/"},{"key":"e_1_3_2_1_36_1","unstructured":"Mireille Hildebrandt. {n. d.}. Privacy as Protection of the Incomputable Self: From Agnostic to Agonistic Machine Learning. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3081776  Mireille Hildebrandt. {n. d.}. Privacy as Protection of the Incomputable Self: From Agnostic to Agonistic Machine Learning. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3081776"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3138\/utlj.2017-0044"},{"key":"e_1_3_2_1_38_1","unstructured":"Anna Hoffman and Luke Stark. 11 September 2015. Are Face Recognition Systems Accurate? Depends on Your Race. https:\/www.technologyreview.com\/s\/601786\/are-face-recognition-systems-accurate-depends-on-your-race  Anna Hoffman and Luke Stark. 11 September 2015. Are Face Recognition Systems Accurate? Depends on Your Race. https:\/www.technologyreview.com\/s\/601786\/are-face-recognition-systems-accurate-depends-on-your-race"},{"key":"e_1_3_2_1_39_1","volume-title":"Topics in the Foundation of Statistics, Bas C","author":"Humphries Paul"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951717724477"},{"key":"e_1_3_2_1_41_1","volume-title":"Statistical Surveillance: Remote Sensing in the Digital Age","author":"Gandy Oscar H","year":"2012"},{"key":"e_1_3_2_1_42_1","volume-title":"Isabelle Guyon, Marcel A. J. van Gerven, Rob van Lier, and Sergio Escalera.","author":"Jacques J\u00fanior J\u00falio C. S.","year":"2018"},{"key":"e_1_3_2_1_43_1","first-page":"1850","article-title":"Photography: a means of surveillance","author":"J\u00e4ger Jens","year":"2001","journal-title":"Judicial Photography"},{"key":"e_1_3_2_1_44_1","unstructured":"Yarden Katz. {n. d.}. Manufacturing an Artificial Intelligence Revolution. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3078224  Yarden Katz. {n. d.}. Manufacturing an Artificial Intelligence Revolution. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3078224"},{"key":"e_1_3_2_1_45_1","first-page":"1","article-title":"The scored society: Due process for automated predictions","volume":"89","author":"Citron Danielle Keats","year":"2014","journal-title":"Washington Law Review"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951714528481"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Rob Kichin and Martin Dodge. 2011. Code\/Space: Software and Everyday Life. MIT.   Rob Kichin and Martin Dodge. 2011. Code\/Space: Software and Everyday Life. MIT.","DOI":"10.7551\/mitpress\/9780262042482.001.0001"},{"key":"e_1_3_2_1_48_1","volume-title":"Experimentelle Untersuchungen zur Ausdruckskunde mittel photographisch-statisticher Methode. Archive f\u00fcr die gesamte psychologic 114","author":"Kozeny E","year":"1962"},{"key":"e_1_3_2_1_49_1","unstructured":"Robin Kramer and Kay Ritchie. 14 December 2016. The Trouble with Facial Recognition technology (in the real world). https:\/\/theconversation.com\/the-trouble-with-facial-recognition-technology-in-the-real-world-69685  Robin Kramer and Kay Ritchie. 14 December 2016. The Trouble with Facial Recognition technology (in the real world). https:\/\/theconversation.com\/the-trouble-with-facial-recognition-technology-in-the-real-world-69685"},{"key":"e_1_3_2_1_50_1","volume-title":"Advances in Neural Information Processing Systems 25","author":"Krizhevsky Alex"},{"key":"e_1_3_2_1_51_1","volume-title":"The Function of Measurement in Modern Physical Science. Isis 52(2)","author":"Kuhn Thomas","year":"1961"},{"key":"e_1_3_2_1_52_1","volume-title":"Hinton","author":"LeCun Yann","year":"2015"},{"key":"e_1_3_2_1_53_1","first-page":"121","article-title":"Automated facial recognition technology: Recent developments and approaches to oversight","volume":"40","author":"Mann Monique","year":"2017","journal-title":"University of New South Wales Law journal"},{"key":"e_1_3_2_1_54_1","volume-title":"Photography: A Cultural History","author":"Marien Mary Warner","year":"2015","edition":"4"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785866"},{"key":"e_1_3_2_1_56_1","volume-title":"Seeing her sex: Medical archives and the female body","author":"McGrath Roberta"},{"key":"e_1_3_2_1_57_1","volume-title":"Data Science as Machinic Neoplatanism. Philosophy & Technology 31(2)","author":"McQuillan Dan","year":"2017"},{"key":"e_1_3_2_1_58_1","volume-title":"A Short History of Photography","author":"Mendoza Isak","year":"1934"},{"key":"e_1_3_2_1_59_1","volume-title":"Jeremy Bentham's Panoptic Device. October 41","author":"Miller Jacques-Alain","year":"1987"},{"key":"e_1_3_2_1_60_1","volume-title":"Axiomatism and Computational Positivism: Two Mathematical Cultures in Pursuit of Exact Sciences. Journal of Medical Humanities 22(2)","author":"Narasimha Roddam","year":"2001"},{"key":"e_1_3_2_1_61_1","volume-title":"Weapons of Math Destruction","author":"O'Neil Cathy"},{"key":"e_1_3_2_1_62_1","unstructured":"Mike Orcutt. 6 July 2016. Are Face Recognition Systems Accurate? Depends on Your Race. https:\/www.technologyreview.com\/s\/601786\/are-face-recognition-systems-accurate-depends-on-your-race  Mike Orcutt. 6 July 2016. Are Face Recognition Systems Accurate? Depends on Your Race. https:\/www.technologyreview.com\/s\/601786\/are-face-recognition-systems-accurate-depends-on-your-race"},{"key":"e_1_3_2_1_63_1","unstructured":"Trevor Paglen. 8 December 2016. Invisible Images (Your Pictures are Looking at You). https:\/\/thenewinquiry.com\/invisible-images-your-pictures-are-looking-at-you\/  Trevor Paglen. 8 December 2016. Invisible Images (Your Pictures are Looking at You). https:\/\/thenewinquiry.com\/invisible-images-your-pictures-are-looking-at-you\/"},{"key":"e_1_3_2_1_64_1","unstructured":"Frank Pasquale. 20 Aug 2018. Odd Numbers. http:\/\/reallifemag.com\/odd-numbers\/  Frank Pasquale. 20 Aug 2018. Odd Numbers. http:\/\/reallifemag.com\/odd-numbers\/"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241367"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/2344089"},{"key":"e_1_3_2_1_67_1","volume-title":"Snyder","author":"Qi Hairong","year":"2004"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/1362480605048943"},{"key":"e_1_3_2_1_69_1","unstructured":"Vlad Savov. 17 May 2018. Google's Selfish Ledger is an Unsettling Vision of Silicon Valley Social Engineering. https:\/www.theverge.com\/2018\/5\/17\/17344250\/google-x-selfish-ledger-video-data-privacy  Vlad Savov. 17 May 2018. Google's Selfish Ledger is an Unsettling Vision of Silicon Valley Social Engineering. https:\/www.theverge.com\/2018\/5\/17\/17344250\/google-x-selfish-ledger-video-data-privacy"},{"key":"e_1_3_2_1_70_1","unstructured":"Joshua Scannell. 17 September 2018. Controlled Measures. http:\/\/reallifemag.com\/controlled-measures\/  Joshua Scannell. 17 September 2018. Controlled Measures. http:\/\/reallifemag.com\/controlled-measures\/"},{"key":"e_1_3_2_1_71_1","volume-title":"Opinion: It's time for an about-face on facial recognition. https:\/www.csmonitor.com\/World\/Passcode\/Passcode-Voices\/2015\/0622\/Opinion-It-s-time-for-an-about-face-on-facial-recognition","author":"Selinger Evan","year":"2015"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009067628620"},{"key":"e_1_3_2_1_73_1","unstructured":"Jordan G Teicher. 18 July 2018. What Do Facial Recognition Technologies Mean for our Privacy? https:\/www.nytimes.com\/2018\/07\/18\/lens\/what-do-facial-recognition-technologies-mean-for-our-privacy.html  Jordan G Teicher. 18 July 2018. What Do Facial Recognition Technologies Mean for our Privacy? https:\/www.nytimes.com\/2018\/07\/18\/lens\/what-do-facial-recognition-technologies-mean-for-our-privacy.html"},{"key":"e_1_3_2_1_74_1","volume-title":"Independently Controllable Factors. CoRR abs\/1708.01289","author":"Thomas Valentin","year":"2017"},{"key":"e_1_3_2_1_75_1","volume-title":"Face Value: The Irresistable Influence of First Impressions","author":"Todorov Alexander","year":"2017"},{"key":"e_1_3_2_1_76_1","volume-title":"The Accuracy of Inferences about Criminality Based on Facial Appearance. Journal of Social, Evolutionary, and Cultural Psychology 5(2)","author":"Valla Jeffrey M","year":"2011"},{"key":"e_1_3_2_1_77_1","volume-title":"Microsoft President: Facial Recognition Technology Needs Government Regulation","author":"Vanian Jonathan","year":"2018"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130976"},{"key":"e_1_3_2_1_79_1","volume-title":"Deep Neural Networks are More Accurate than Humans at Detecting Sexual Orientation from Facial Images. Innovations in Social Psychology 114(2)","author":"Wang Yilun","year":"2018"},{"key":"e_1_3_2_1_80_1","volume-title":"Digital Metaphysics: The Cybernetic Idealism of Warren McCulloch. https:\/\/iasc-culture.org\/THR\/THR_article_2018_Spring_Weatherby.php","author":"Weatherby Leif","year":"2018"},{"key":"e_1_3_2_1_81_1","volume-title":"First Impressions: Making up your mind after 100ms exposure to a face. Psychological Science 17)7)","author":"Willis J","year":"2006"},{"key":"e_1_3_2_1_82_1","volume-title":"Automated Inference on Criminality using Face Images. CoRR abs\/1611.04135","author":"Wu Xiaolin","year":"2016"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.1196"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-017-1085-8"}],"event":{"name":"FAT* '19: Conference on Fairness, Accountability, and Transparency","location":"Atlanta GA USA","acronym":"FAT* '19","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the Conference on Fairness, Accountability, and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287560.3287568","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287560.3287568","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287560.3287568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:59Z","timestamp":1750208519000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287560.3287568"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":82,"alternative-id":["10.1145\/3287560.3287568","10.1145\/3287560"],"URL":"https:\/\/doi.org\/10.1145\/3287560.3287568","relation":{},"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"2019-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}