{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T03:02:16Z","timestamp":1767927736753,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T00:00:00Z","timestamp":1580083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1633400"],"award-info":[{"award-number":["IIS-1633400"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,27]]},"DOI":"10.1145\/3351095.3372830","type":"proceedings-article","created":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T13:43:02Z","timestamp":1579786982000},"page":"80-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":123,"title":["The hidden assumptions behind counterfactual explanations and principal reasons"],"prefix":"10.1145","author":[{"given":"Solon","family":"Barocas","sequence":"first","affiliation":[{"name":"Microsoft Research and Cornell University"}]},{"given":"Andrew D.","family":"Selbst","sequence":"additional","affiliation":[{"name":"University of California Los Angeles"}]},{"given":"Manish","family":"Raghavan","sequence":"additional","affiliation":[{"name":"Cornell University"}]}],"member":"320","published-online":{"date-parts":[[2020,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Article 29 Data Protection Working Party 2017. Guidelines on Automated individual decision-making and Profiling for the purposes of Regulation 2016\/679. https:\/\/ec.europa.eu\/newsroom\/article29\/item-detail.cfm?item_id=612053.  Article 29 Data Protection Working Party 2017. Guidelines on Automated individual decision-making and Profiling for the purposes of Regulation 2016\/679. https:\/\/ec.europa.eu\/newsroom\/article29\/item-detail.cfm?item_id=612053."},{"key":"e_1_3_2_1_2_1","first-page":"1183","article-title":"Information fiduciaries and the first amendment","volume":"49","author":"Balkin Jack M","year":"2015","journal-title":"UC Davis Law Review"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"The algorithm game","volume":"94","author":"Bambauer Jane","year":"2018","journal-title":"Notre Dame L. Rev."},{"key":"e_1_3_2_1_4_1","volume-title":"International journal of law and information technology 27, 2","author":"Brkan Maja","year":"2019"},{"key":"e_1_3_2_1_5_1","first-page":"143","article-title":"Rethinking Explainable Machines: The GDPR's Right to Explanation Debate and the Rise of Algorithmic Audits in Enterprise","volume":"34","author":"Casey Bryan","year":"2019","journal-title":"Berkeley Technology Law Journal"},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"The scored society: Due process for automated predictions","volume":"89","author":"Citron Danielle Keats","year":"2014","journal-title":"Washington Law Review"},{"key":"e_1_3_2_1_7_1","volume-title":"Configuring the networked self: Law, code, and the play of everyday practice","author":"Cohen Julie E"},{"key":"e_1_3_2_1_8_1","first-page":"1904","article-title":"What privacy is for","volume":"126","author":"Cohen Julie E","year":"2012","journal-title":"Harvard Law Review"},{"key":"e_1_3_2_1_9_1","unstructured":"Amit Dhurandhar Pin-Yu Chen Ronny Luss Chun-Chen Tu Paishun Ting Karthikeyan Shanmugam and Payel Das. 2018. Explanations based on the missing: Towards contrastive explanations with pertinent negatives. In Advances in Neural Information Processing Systems. 592--603.  Amit Dhurandhar Pin-Yu Chen Ronny Luss Chun-Chen Tu Paishun Ting Karthikeyan Shanmugam and Payel Das. 2018. Explanations based on the missing: Towards contrastive explanations with pertinent negatives. In Advances in Neural Information Processing Systems. 592--603."},{"key":"e_1_3_2_1_10_1","first-page":"18","article-title":"Slave to the algorithm: Why a right to an explanation is probably not the remedy you are looking for","volume":"16","author":"Edwards Lilian","year":"2017","journal-title":"Duke Law & Technology Review"},{"key":"e_1_3_2_1_11_1","unstructured":"Equal Credit Opportunities Act Public Law 93-495 1974. Codified at 15 U.S.C. &sect; 1691 et seq.  Equal Credit Opportunities Act Public Law 93-495 1974. Codified at 15 U.S.C. &sect; 1691 et seq."},{"key":"e_1_3_2_1_12_1","volume-title":"Automating inequality: How high-tech tools profile, police, and punish the poor","author":"Eubanks Virginia"},{"key":"e_1_3_2_1_13_1","unstructured":"Fair Credit Reporting Act Public Law 91-508 1970. Codified at 15 U.S.C. &sect; 1681 et seq.  Fair Credit Reporting Act Public Law 91-508 1970. Codified at 15 U.S.C. &sect; 1681 et seq."},{"key":"e_1_3_2_1_14_1","unstructured":"Federal Register 1985. 50 Fed. Reg. 10915.  Federal Register 1985. 50 Fed. Reg. 10915."},{"key":"e_1_3_2_1_15_1","volume-title":"Paul Sweeney, Farbod Kamiab, Zhao Shen, and Freddy Lecue.","author":"Grath Rory Mc","year":"2018"},{"key":"e_1_3_2_1_16_1","unstructured":"Patrick Hall Wen Phan and SriSatish Ambati. 2017. Ideas on interpreting machine learning. https:\/\/www.oreilly.com\/ideas\/ideas-on-interpreting-machine-learning.  Patrick Hall Wen Phan and SriSatish Ambati. 2017. Ideas on interpreting machine learning. https:\/\/www.oreilly.com\/ideas\/ideas-on-interpreting-machine-learning."},{"key":"e_1_3_2_1_17_1","volume-title":"Generating counterfactual explanations with natural language. arXiv preprint arXiv:1806.09809","author":"Hendricks Lisa Anne","year":"2018"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-006-0140-3"},{"key":"e_1_3_2_1_19_1","first-page":"189","article-title":"The right to explanation, explained","volume":"34","author":"Kaminski Margot E","year":"2019","journal-title":"Berkeley Tech. LJ"},{"key":"e_1_3_2_1_20_1","volume-title":"Model-Agnostic Counterfactual Explanations for Consequential Decisions. arXiv preprint arXiv:1905.11190","author":"Karimi Amir-Hossein","year":"2019"},{"key":"e_1_3_2_1_21_1","volume-title":"A Skeptical View of Information Fiduciaries. Harvard Law Review 133","author":"Khan Lina","year":"2019"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329584"},{"key":"e_1_3_2_1_23_1","volume-title":"NYU Algorithms and Explanations Conference.","author":"Lipton Zachary","year":"2017"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan","author":"Liu Lydia T.","year":"2018"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339556"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipx019"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.1.04"},{"key":"e_1_3_2_1_28_1","volume-title":"EU Internet Law","author":"Mendoza Isak"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372850"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","DOI":"10.1515\/9780804772891"},{"key":"e_1_3_2_1_31_1","volume-title":"On social credit and the right to be unnetworked. Columbia Business Law Review","author":"Packin Nizan Geslevich","year":"2016"},{"key":"e_1_3_2_1_32_1","unstructured":"Regulation B [n. d.]. 12 C.F.R. &sect; 1002 et seq.  Regulation B [n. d.]. 12 C.F.R. &sect; 1002 et seq."},{"key":"e_1_3_2_1_33_1","volume-title":"intimacy, and personhood. Philosophy & Public Affairs","author":"Reiman Jeffrey H","year":"1976"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287569"},{"key":"e_1_3_2_1_37_1","first-page":"1085","article-title":"The intuitive appeal of explainable machines","volume":"87","author":"Selbst Andrew D.","year":"2018","journal-title":"Fordham Law Review"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287598"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipx022"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Senate Report No. 94-589 1976.  Senate Report No. 94-589 1976.","DOI":"10.1111\/j.1365-2133.1976.tb05153.x"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_1_42_1","volume-title":"25th {USENIX} Security Symposium ({USENIX} Security 16). 601--618.","author":"Tram\u00e8r Florian"},{"key":"e_1_3_2_1_43_1","volume-title":"Why people obey the law","author":"Tyler Tom R."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287566"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372876"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipx005"},{"key":"e_1_3_2_1_47_1","first-page":"841","article-title":"Counterfactual Explanations without Opening the Black Box: Automated Decisions and the GPDR","volume":"31","author":"Wachter Sandra","year":"2017","journal-title":"Journal of Law & Technology"}],"event":{"name":"FAT* '20: Conference on Fairness, Accountability, and Transparency","location":"Barcelona Spain","acronym":"FAT* '20","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351095.3372830","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351095.3372830","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351095.3372830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:22Z","timestamp":1750200082000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351095.3372830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,27]]},"references-count":47,"alternative-id":["10.1145\/3351095.3372830","10.1145\/3351095"],"URL":"https:\/\/doi.org\/10.1145\/3351095.3372830","relation":{},"subject":[],"published":{"date-parts":[[2020,1,27]]},"assertion":[{"value":"2020-01-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}