{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T16:27:02Z","timestamp":1769099222397,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,21]]},"DOI":"10.1145\/3461702.3462626","type":"proceedings-article","created":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T01:21:32Z","timestamp":1627694492000},"page":"967-977","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Digital Voodoo Dolls"],"prefix":"10.1145","author":[{"given":"Marija","family":"Slavkovik","sequence":"first","affiliation":[{"name":"University of Bergen, Bergen, Norway"}]},{"given":"Clemens","family":"Stachl","sequence":"additional","affiliation":[{"name":"Stanford University, Palo Alto , CA, USA"}]},{"given":"Caroline","family":"Pitman","sequence":"additional","affiliation":[{"name":"The Catholic University of America, Washington, DC, USA"}]},{"given":"Jonathan","family":"Askonas","sequence":"additional","affiliation":[{"name":"The Catholic University of America, Washington, DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,7,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/344949.344988"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 2nd International Symposium on Human Aspects of Information Security and Assurance, HAISA","author":"Ahmed A.","year":"2008","unstructured":"A. Ahmed , Issa Traore , and Ahmad Almulhem . 2008 . Digital fingerprinting based on keystroke dynamics . In Proceedings of the 2nd International Symposium on Human Aspects of Information Security and Assurance, HAISA 2008. 94--104. A. Ahmed, Issa Traore, and Ahmad Almulhem. 2008. Digital fingerprinting based on keystroke dynamics. In Proceedings of the 2nd International Symposium on Human Aspects of Information Security and Assurance, HAISA 2008. 94--104."},{"key":"e_1_3_2_2_4_1","volume-title":"International Journal of Computer Science and Information Security (IJCSIS)16, 3","author":"Alghannam Bareeq A","year":"2018","unstructured":"Bareeq A Alghannam , Eiman Alessa , and Manal Almukhaizim . 2018. Mobile First Companies: A Case of App Usability in Kuwait . International Journal of Computer Science and Information Security (IJCSIS)16, 3 ( 2018 ), 105. https:\/\/sites.google.com\/site\/ijcsis\/ Bareeq A Alghannam, Eiman Alessa, and Manal Almukhaizim. 2018. Mobile First Companies: A Case of App Usability in Kuwait. International Journal of Computer Science and Information Security (IJCSIS)16, 3 (2018), 105. https:\/\/sites.google.com\/site\/ijcsis\/"},{"key":"e_1_3_2_2_5_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings","volume":"796","author":"Almuhimedi Hazim","year":"2015","unstructured":"Hazim Almuhimedi , Florian Schaub , Norman Sadeh , Idris Adjerid , Alessandro Acquisti , Joshua Gluck , Lorrie Cranor , and Yuvraj Agarwal . 2015 . Your location has been shared 5,398 times! A field study on mobile app privacy nudging . In Conference on Human Factors in Computing Systems - Proceedings , Vol. 2015-April. Association for Computing Machinery, 787-- 796 . https:\/\/doi.org\/10.1145\/2702123.2702210 Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Cranor, and Yuvraj Agarwal. 2015. Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In Conference on Human Factors in Computing Systems - Proceedings, Vol. 2015-April. Association for Computing Machinery, 787--796. https:\/\/doi.org\/10.1145\/2702123.2702210"},{"key":"e_1_3_2_2_6_1","unstructured":"Ross Andersen. 2020. China's Artificial Intelligence Surveillance State Goes Global - The Atlantic. https:\/\/www.theatlantic.com\/magazine\/archive\/2020\/09\/china-ai-surveillance\/614197\/  Ross Andersen. 2020. China's Artificial Intelligence Surveillance State Goes Global - The Atlantic. https:\/\/www.theatlantic.com\/magazine\/archive\/2020\/09\/china-ai-surveillance\/614197\/"},{"key":"e_1_3_2_2_8_1","volume-title":"Predicting the Big 5 personality traits from digital footprints on social media: A meta-analysis. Personality and Individual Differences 124 (apr","author":"Azucar Danny","year":"2018","unstructured":"Danny Azucar , Davide Marengo , and Michele Settanni . 2018. Predicting the Big 5 personality traits from digital footprints on social media: A meta-analysis. Personality and Individual Differences 124 (apr 2018 ), 150--159. https:\/\/doi.org\/10.1016\/j.paid.2017.12.018 Danny Azucar, Davide Marengo, and Michele Settanni. 2018. Predicting the Big 5 personality traits from digital footprints on social media: A meta-analysis. Personality and Individual Differences 124 (apr 2018), 150--159. https:\/\/doi.org\/10.1016\/j.paid.2017.12.018"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.665935"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Matthias B\u00f6hmer Brent Hecht Johannes Sch\u00f6ning Antonio Kr\u00fcger and Gernot Bauer. 2011. Falling asleep with Angry Birds Facebook and Kindle -- A Large Scale Study on Mobile Application Usage.Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services -MobileHCI '11(2011) 47. https:\/\/doi.org\/10.1145\/2037373.2037383  Matthias B\u00f6hmer Brent Hecht Johannes Sch\u00f6ning Antonio Kr\u00fcger and Gernot Bauer. 2011. Falling asleep with Angry Birds Facebook and Kindle -- A Large Scale Study on Mobile Application Usage.Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services -MobileHCI '11(2011) 47. https:\/\/doi.org\/10.1145\/2037373.2037383","DOI":"10.1145\/2037373.2037383"},{"key":"e_1_3_2_2_11_1","first-page":"3","article-title":"Freedom and Privacy in Ambient Intelligence.Ethics and","volume":"7","author":"Brey Philip","year":"2005","unstructured":"Philip Brey . 2005 . Freedom and Privacy in Ambient Intelligence.Ethics and Inf. Technol. 7 , 3 (Sept. 2005), 157--166. https:\/\/doi.org\/10.1007\/s10676-006-0005--3 Philip Brey. 2005. Freedom and Privacy in Ambient Intelligence.Ethics and Inf. Technol. 7, 3 (Sept. 2005), 157--166. https:\/\/doi.org\/10.1007\/s10676-006-0005--3","journal-title":"Inf. Technol."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702252"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/0263276411424420"},{"key":"e_1_3_2_2_14_1","volume-title":"Author gender identification from text.Digital Investigation 8, 1","author":"Cheng Na","year":"2011","unstructured":"Na Cheng , Rajarathnam Chandramouli , and KP Subbalakshmi . 2011. Author gender identification from text.Digital Investigation 8, 1 ( 2011 ), 78--88. Na Cheng, Rajarathnam Chandramouli, and KP Subbalakshmi. 2011. Author gender identification from text.Digital Investigation 8, 1 (2011), 78--88."},{"key":"e_1_3_2_2_15_1","volume-title":"A snapshot of the frontiers of fairness in machine learning. Commun. ACM63, 5","author":"Chouldechova Alexandra","year":"2020","unstructured":"Alexandra Chouldechova and Aaron Roth . 2020. A snapshot of the frontiers of fairness in machine learning. Commun. ACM63, 5 ( 2020 ), 82--89. https:\/\/doi.org\/10.1145\/3376898 Alexandra Chouldechova and Aaron Roth. 2020. A snapshot of the frontiers of fairness in machine learning. Commun. ACM63, 5 (2020), 82--89. https:\/\/doi.org\/10.1145\/3376898"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58112-1_31"},{"key":"e_1_3_2_2_17_1","unstructured":"Datatylsinet. 2018. Artificial intelligence and privacy. https:\/\/www.datatilsynet.no\/globalassets\/global\/english\/ai-and-privacy.pdf.  Datatylsinet. 2018. Artificial intelligence and privacy. https:\/\/www.datatilsynet.no\/globalassets\/global\/english\/ai-and-privacy.pdf."},{"key":"e_1_3_2_2_18_1","volume-title":"Automata","author":"Dwork Cynthia","unstructured":"Cynthia Dwork . 2006. Differential Privacy . In Automata , Languages and Programming, Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener(Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 1--12. Cynthia Dwork. 2006. Differential Privacy. In Automata, Languages and Programming, Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener(Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--12."},{"key":"e_1_3_2_2_19_1","volume-title":"Zemel","author":"Dwork Cynthia","year":"2011","unstructured":"Cynthia Dwork , Moritz Hardt , Toniann Pitassi , Omer Reingold , and Richard S . Zemel . 2011 .Fairness Through Awareness. CoRRabs\/ 1104.3913 (2011). arXiv:1104.3913 http:\/\/arxiv.org\/abs\/1104.3913 Cynthia Dwork, Moritz Hardt, Toniann Pitassi, Omer Reingold, and Richard S. Zemel. 2011.Fairness Through Awareness. CoRRabs\/1104.3913 (2011). arXiv:1104.3913 http:\/\/arxiv.org\/abs\/1104.3913"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1802331115"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444803005002005"},{"key":"e_1_3_2_2_22_1","volume-title":"User Modeling in Human--Computer Interaction. User Modeling and User-Adapted Interaction 11, 1 (01","author":"Fischer Gerhard","year":"2001","unstructured":"Gerhard Fischer . 2001. User Modeling in Human--Computer Interaction. User Modeling and User-Adapted Interaction 11, 1 (01 Mar 2001 ), 65--86. https:\/\/doi.org\/10.1023\/A:1011145532042 Gerhard Fischer. 2001. User Modeling in Human--Computer Interaction. User Modeling and User-Adapted Interaction 11, 1 (01 Mar 2001), 65--86. https:\/\/doi.org\/10.1023\/A:1011145532042"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1004-76"},{"key":"e_1_3_2_2_24_1","volume-title":"Can Psychological Traits Be Inferred From Spending? Evidence From Transaction Data. Psychological Science(jun","author":"Gladstone Joe J.","year":"2019","unstructured":"Joe J. Gladstone , Sandra C. Matz , and Alain Lemaire . 2019. Can Psychological Traits Be Inferred From Spending? Evidence From Transaction Data. Psychological Science(jun 2019 ), 095679761984943. https:\/\/doi.org\/10.1177\/0956797619849435 Joe J. Gladstone, Sandra C. Matz, and Alain Lemaire. 2019. Can Psychological Traits Be Inferred From Spending? Evidence From Transaction Data. Psychological Science(jun 2019), 095679761984943. https:\/\/doi.org\/10.1177\/0956797619849435"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300398"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Kevin D. Haggerty and Richard V. Ericson. [n.d.]. The Surveillant Assemblage. 51 4 ([n. d.]) 605--622. https:\/\/doi.org\/10.1080\/00071310020015280  Kevin D. Haggerty and Richard V. Ericson. [n.d.]. The Surveillant Assemblage. 51 4 ([n. d.]) 605--622. https:\/\/doi.org\/10.1080\/00071310020015280","DOI":"10.1080\/00071310020015280"},{"key":"e_1_3_2_2_27_1","volume-title":"Gosling","author":"Harari Gabriella M.","year":"2016","unstructured":"Gabriella M. Harari , Nicholas D. Lane , Rui Wang , Benjamin S. Crosier , Andrew T. Campbell , and Samuel D . Gosling . 2016 . Using smartphones to collect behavioral data in psychological science: Opportunities, practical considerations, and challenges. Perspectives on Psychological Science 11, 6 (2016), 838--854. https:\/\/doi.org\/10.1177\/1745691616650285 Gabriella M. Harari, Nicholas D. Lane, Rui Wang, Benjamin S. Crosier, Andrew T. Campbell, and Samuel D. Gosling. 2016. Using smartphones to collect behavioral data in psychological science: Opportunities, practical considerations, and challenges. Perspectives on Psychological Science11, 6 (2016), 838--854. https:\/\/doi.org\/10.1177\/1745691616650285"},{"key":"e_1_3_2_2_28_1","volume-title":"Gosling","author":"Harari Gabriella M.","year":"2018","unstructured":"Gabriella M. Harari , Sandrine R. M\u00fcller , and Samuel D . Gosling . 2018 . Naturalistic Assessment of Situations Using Mobile Sensing Methods. In The Oxford Handbook of Psychological Situations . https:\/\/doi.org\/10.1093\/oxfordhb\/9780190263348.013.14 Gabriella M. Harari, Sandrine R. M\u00fcller, and Samuel D. Gosling. 2018. Naturalistic Assessment of Situations Using Mobile Sensing Methods. In The Oxford Handbook of Psychological Situations. https:\/\/doi.org\/10.1093\/oxfordhb\/9780190263348.013.14"},{"key":"e_1_3_2_2_29_1","volume-title":"Gosling","author":"Harari Gabriella M.","year":"2019","unstructured":"Gabriella M. Harari , Sandrine R. M\u00fcller , Clemens Stachl , Rui Wang , Weichen Wang , Markus B\u00fchner , Peter J. Rentfrow , Andrew T. Campbell , and Samuel D . Gosling . 2019 . Sensing Sociability : Individual Differences in Young Adults' Conversation, Calling, Texting, and App Use Behaviors in Daily Life.Journal of Personality and Social Psychology( may 2019). https:\/\/doi.org\/10.1037\/pspp0000245 Gabriella M. Harari, Sandrine R. M\u00fcller, Clemens Stachl, Rui Wang, Weichen Wang, Markus B\u00fchner, Peter J. Rentfrow, Andrew T. Campbell, and Samuel D.Gosling. 2019. Sensing Sociability: Individual Differences in Young Adults' Conversation, Calling, Texting, and App Use Behaviors in Daily Life.Journal of Personality and Social Psychology(may 2019). https:\/\/doi.org\/10.1037\/pspp0000245"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242594"},{"key":"e_1_3_2_2_32_1","unstructured":"Craig Kanalley. 2013. Why Twitter Verifies Users: The History Behind the Blue Checkmark. https:\/\/www.huffpost.com\/entry\/twitter-verified-accounts_b_2863282.  Craig Kanalley. 2013. Why Twitter Verifies Users: The History Behind the Blue Checkmark. https:\/\/www.huffpost.com\/entry\/twitter-verified-accounts_b_2863282."},{"key":"e_1_3_2_2_33_1","volume-title":"The Science of Socially Aware Algorithm Design","author":"Kearns Michael","unstructured":"Michael Kearns and Aaron Roth . 2019. The Ethical Algorithm : The Science of Socially Aware Algorithm Design . Oxford University Press . Michael Kearns and Aaron Roth. 2019.The Ethical Algorithm: The Science of Socially Aware Algorithm Design. Oxford University Press."},{"key":"e_1_3_2_2_34_1","unstructured":"Richie Koch. 2018. What is the LGPD? Brazil's version of the GDPR. https:\/\/bit.ly\/2RptBUD. Accessed 25\/01\/2021.  Richie Koch. 2018. What is the LGPD? Brazil's version of the GDPR. https:\/\/bit.ly\/2RptBUD. Accessed 25\/01\/2021."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-79310-1"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"e_1_3_2_2_37_1","volume-title":"Surveillance Studies: An Overview","author":"Lyon David","unstructured":"David Lyon . [n.d.]. Surveillance Studies: An Overview ( 1 st edition ed.). Polity . David Lyon. [n.d.]. Surveillance Studies: An Overview(1st edition ed.). Polity.","edition":"1"},{"key":"e_1_3_2_2_38_1","volume-title":"Whiteman","author":"Matthews I.J.","year":"2009","unstructured":"I.J. & Matthews , G., Deary, Martha C. M.C. Whiteman , Gerald Matthews , Ian J. Deary , and Martha C. M.C . Whiteman . 2009 . Personality Traits. Cambridge University Press , Cambridge. 602 pages. https:\/\/doi.org\/10.1017\/CBO9780511812736 I.J. & Matthews, G., Deary, Martha C. M.C. Whiteman, Gerald Matthews, Ian J.Deary, and Martha C. M.C. Whiteman. 2009. Personality Traits. Cambridge University Press, Cambridge. 602 pages. https:\/\/doi.org\/10.1017\/CBO9780511812736"},{"key":"e_1_3_2_2_39_1","volume-title":"A Survey on Bias and Fairness in Machine Learning. CoRRabs\/1908.09635","author":"Mehrabi Ninareh","year":"2019","unstructured":"Ninareh Mehrabi , Fred Morstatter , Nripsuta Saxena , Kristina Lerman , and Aram Galstyan . 2019. A Survey on Bias and Fairness in Machine Learning. CoRRabs\/1908.09635 ( 2019 ). arXiv:1908.09635 http:\/\/arxiv.org\/abs\/1908.09635 Ninareh Mehrabi, Fred Morstatter, Nripsuta Saxena, Kristina Lerman, and Aram Galstyan. 2019. A Survey on Bias and Fairness in Machine Learning. CoRRabs\/1908.09635 (2019). arXiv:1908.09635 http:\/\/arxiv.org\/abs\/1908.09635"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13104-015-1280-z"},{"key":"e_1_3_2_2_41_1","first-page":"4","article-title":"The Nature, Importance, and Difficulty of Machine Ethics","volume":"21","author":"Moor J. H.","year":"2006","unstructured":"J. H. Moor . 2006 . The Nature, Importance, and Difficulty of Machine Ethics . IEEE Intelligent Systems 21 , 4 (July 2006), 18--21. https:\/\/doi.org\/10.1109\/MIS.2006.80 J. H. Moor. 2006. The Nature, Importance, and Difficulty of Machine Ethics. IEEE Intelligent Systems 21, 4 (July 2006), 18--21. https:\/\/doi.org\/10.1109\/MIS.2006.80","journal-title":"IEEE Intelligent Systems"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/0956797618761659"},{"key":"e_1_3_2_2_43_1","volume-title":"Yong Haur Tay, and Bok Min Goi","author":"Ng Choon Boon","year":"2015","unstructured":"Choon Boon Ng , Yong Haur Tay, and Bok Min Goi . 2015 . A review of facial gender recognition.Pattern Analysis and Applications 18, 4 (nov 2015), 739--755.https:\/\/doi.org\/10.1007\/s10044-015-0499--6 Choon Boon Ng, Yong Haur Tay, and Bok Min Goi. 2015. A review of facial gender recognition.Pattern Analysis and Applications 18, 4 (nov 2015), 739--755.https:\/\/doi.org\/10.1007\/s10044-015-0499--6"},{"key":"e_1_3_2_2_44_1","volume-title":"Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images. CoRRabs\/1412.1897","author":"Nguyen Anh Mai","year":"2014","unstructured":"Anh Mai Nguyen , Jason Yosinski , and Jeff Clune . 2014. Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images. CoRRabs\/1412.1897 ( 2014 ). arXiv:1412.1897 http:\/\/arxiv.org\/abs\/1412.1897 Anh Mai Nguyen, Jason Yosinski, and Jeff Clune. 2014. Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images. CoRRabs\/1412.1897 (2014). arXiv:1412.1897 http:\/\/arxiv.org\/abs\/1412.1897"},{"key":"e_1_3_2_2_45_1","volume-title":"Algorithms of Oppression: How Search Engines Reinforce Racism","author":"Noble Safiya Umoja","unstructured":"Safiya Umoja Noble . 2018. Algorithms of Oppression: How Search Engines Reinforce Racism . NYU Press . Safiya Umoja Noble. 2018. Algorithms of Oppression: How Search Engines Reinforce Racism. NYU Press."},{"key":"e_1_3_2_2_46_1","volume-title":"Weapons of Math Destruction","author":"O'Neil Cathy","unstructured":"Cathy O'Neil . 2016. Weapons of Math Destruction . Crown Books . Cathy O'Neil. 2016. Weapons of Math Destruction. Crown Books."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.57.102904.190127"},{"key":"e_1_3_2_2_48_1","volume-title":"Seligman","author":"Park Gregory","year":"2015","unstructured":"Gregory Park , H. Andrew Schwartz , Johannes C. Eichstaedt , Margaret L. Kern , Michal Kosinski , David J. Stillwell , Lyle H. Ungar , and Martin E. P . Seligman . 2015 . Automatic Personality Assessment through Social Media Language.Journal of Personality and Social Psychology 108, 6 (2015). https:\/\/doi.org\/10.1037\/pspp0000020 Gregory Park, H. Andrew Schwartz, Johannes C. Eichstaedt, Margaret L. Kern, Michal Kosinski, David J. Stillwell, Lyle H. Ungar, and Martin E. P. Seligman. 2015. Automatic Personality Assessment through Social Media Language.Journal of Personality and Social Psychology 108, 6 (2015). https:\/\/doi.org\/10.1037\/pspp0000020"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1177\/0743558419883362"},{"key":"e_1_3_2_2_50_1","unstructured":"Francesco Ricci Lior Rokach and Bracha Shapira. 2011.Introduction to Recommender Systems Handbook. Springer US Boston MA 1--35. https:\/\/doi.org\/10.1007\/978-0--387--85820--3_1  Francesco Ricci Lior Rokach and Bracha Shapira. 2011.Introduction to Recommender Systems Handbook. Springer US Boston MA 1--35. https:\/\/doi.org\/10.1007\/978-0--387--85820--3_1"},{"key":"e_1_3_2_2_51_1","volume-title":"Socioeconomic Status, and Cognitive Ability for Predicting Important Life Outcomes.Perspectives on psychological science: a journal of the Association for Psychological Science 2, 4 (Dec","author":"Roberts Brent W","year":"2007","unstructured":"Brent W Roberts , Nathan R Kuncel , Rebecca Shiner , Avshalom Caspi , and Lewis R Goldberg . 2007. The Power of Personality: The Comparative Validity of Personality Traits , Socioeconomic Status, and Cognitive Ability for Predicting Important Life Outcomes.Perspectives on psychological science: a journal of the Association for Psychological Science 2, 4 (Dec 2007 ), 313--45. https:\/\/doi.org\/10.1111\/j.1745--6916.2007.00047.x Brent W Roberts, Nathan R Kuncel, Rebecca Shiner, Avshalom Caspi, and Lewis R Goldberg. 2007. The Power of Personality: The Comparative Validity of Personality Traits, Socioeconomic Status, and Cognitive Ability for Predicting Important Life Outcomes.Perspectives on psychological science: a journal of the Association for Psychological Science 2, 4 (Dec 2007), 313--45. https:\/\/doi.org\/10.1111\/j.1745--6916.2007.00047.x"},{"key":"e_1_3_2_2_52_1","volume-title":"Symposium Issue: The Right to be Forgotten.Stanford Law Review Online 64","author":"Rosen Jeffrey","year":"2012","unstructured":"Jeffrey Rosen . 2012 . Symposium Issue: The Right to be Forgotten.Stanford Law Review Online 64 (2012). Jeffrey Rosen. 2012. Symposium Issue: The Right to be Forgotten.Stanford Law Review Online 64 (2012)."},{"key":"e_1_3_2_2_53_1","volume-title":"Tobias Schuwerk, Markus B\u00fchner, and Clemens Stachl.","author":"Schoedel Ramona","year":"2020","unstructured":"Ramona Schoedel , Florian Pargent , Quay Au , Sarah Theres V\u00f6lkel , Tobias Schuwerk, Markus B\u00fchner, and Clemens Stachl. 2020 . To Challenge the Morning Lark and the Night Owl : Using Smartphone Sensing Data to Investigate Day-Night Behaviour Patterns.European Journal of Personality( may 2020), per.2258.https:\/\/doi.org\/10.1002\/per.2258 Ramona Schoedel, Florian Pargent, Quay Au, Sarah Theres V\u00f6lkel, Tobias Schuwerk, Markus B\u00fchner, and Clemens Stachl. 2020. To Challenge the Morning Lark and the Night Owl: Using Smartphone Sensing Data to Investigate Day-Night Behaviour Patterns.European Journal of Personality(may 2020), per.2258.https:\/\/doi.org\/10.1002\/per.2258"},{"key":"e_1_3_2_2_54_1","volume-title":"26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, 103--112","author":"Servia-Rodr\u00edguez Sandra","unstructured":"Sandra Servia-Rodr\u00edguez , Kiran K. Rachuri , Cecilia Mascolo , Peter J. Rentfrow , Neal Lathia , and Gillian M. Sandstrom . 2017. Mobile sensing at the service of mental well-being: A large-scale longitudinal study . In 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, 103--112 . https:\/\/doi.org\/10.1145\/3038912.3052618 Sandra Servia-Rodr\u00edguez, Kiran K. Rachuri, Cecilia Mascolo, Peter J. Rentfrow, Neal Lathia, and Gillian M. Sandstrom. 2017. Mobile sensing at the service of mental well-being: A large-scale longitudinal study. In 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, 103--112. https:\/\/doi.org\/10.1145\/3038912.3052618"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/0956797619831612"},{"key":"e_1_3_2_2_56_1","first-page":"30","article-title":"Predicting personality from patterns of behavior collected with smart-phones","volume":"117","author":"Stachl Clemens","year":"2020","unstructured":"Clemens Stachl , Quay Au , Ramona Schoedel , Samuel D Gosling , Gabriella M Harari , Daniel Buschek , Sarah Theres V\u00f6lkel , Tobias Schuwerk , Michelle Oldemeier , Theresa Ullmann , Heinrich Hussmann , Bernd Bischl , and Markus Buhner . 2020 . Predicting personality from patterns of behavior collected with smart-phones . Proceedings of the National Academy of Sciences of the United States of America 117 , 30 (jul 2020), 17680--17687. https:\/\/doi.org\/10.1073\/pnas.1920484117 Clemens Stachl, Quay Au, Ramona Schoedel, Samuel D Gosling, Gabriella M Harari, Daniel Buschek, Sarah Theres V\u00f6lkel, Tobias Schuwerk, Michelle Oldemeier, Theresa Ullmann, Heinrich Hussmann, Bernd Bischl, and Markus Buhner. 2020. Predicting personality from patterns of behavior collected with smart-phones. Proceedings of the National Academy of Sciences of the United States of America 117, 30 (jul 2020), 17680--17687. https:\/\/doi.org\/10.1073\/pnas.1920484117","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.743"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1002\/per.2113"},{"key":"e_1_3_2_2_59_1","volume-title":"Just Not Through Your Phone's Mic. Wall Street Journal(7 mar","author":"Stern Joanna","year":"2018","unstructured":"Joanna Stern . 2018. Facebook Really Is Spying on You , Just Not Through Your Phone's Mic. Wall Street Journal(7 mar 2018 ). Joanna Stern. 2018. Facebook Really Is Spying on You, Just Not Through Your Phone's Mic. Wall Street Journal(7 mar 2018)."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"crossref","unstructured":"Mariarosaria Taddeo and Luciano Floridi. 2018. How AI can be a force for good. 751--752 pages. https:\/\/doi.org\/10.1126\/science.aat5991  Mariarosaria Taddeo and Luciano Floridi. 2018. How AI can be a force for good. 751--752 pages. https:\/\/doi.org\/10.1126\/science.aat5991","DOI":"10.1126\/science.aat5991"},{"key":"e_1_3_2_2_61_1","volume-title":"Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing","author":"Tavani Herman T.","unstructured":"Herman T. Tavani . 2012. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing ( 4 th ed.). Wiley Publishing . Herman T. Tavani. 2012. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing(4th ed.). Wiley Publishing.","edition":"4"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aau9241"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0017908"},{"key":"e_1_3_2_2_64_1","volume-title":"Deep neural networks are more accurate than humans at detecting sexual orientation from facial images.Journal of Personality and Social Psychology114, 2 (feb","author":"Wang Yilun","year":"2018","unstructured":"Yilun Wang and Michal Kosinski . 2018. Deep neural networks are more accurate than humans at detecting sexual orientation from facial images.Journal of Personality and Social Psychology114, 2 (feb 2018 ), 246--257. https:\/\/doi.org\/10.1037\/pspa0000098 Yilun Wang and Michal Kosinski. 2018. Deep neural networks are more accurate than humans at detecting sexual orientation from facial images.Journal of Personality and Social Psychology114, 2 (feb 2018), 246--257. https:\/\/doi.org\/10.1037\/pspa0000098"},{"key":"e_1_3_2_2_65_1","volume-title":"WSDM 2017 -Proceedings of the 10th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, 33--40","author":"Wei Xingjie","year":"2017","unstructured":"Xingjie Wei and David Stillwell . 2017 . How smart does your profile image look? Estimating intelligence from social network profile images . In WSDM 2017 -Proceedings of the 10th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, 33--40 . https:\/\/doi.org\/10.1145\/3018661.3018663 arXiv:1606.09264 Xingjie Wei and David Stillwell. 2017. How smart does your profile image look? Estimating intelligence from social network profile images. In WSDM 2017 -Proceedings of the 10th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, 33--40. https:\/\/doi.org\/10.1145\/3018661.3018663 arXiv:1606.09264"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372833"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.51"},{"key":"e_1_3_2_2_68_1","volume-title":"The Attention Merchants: The Epic Scramble to Get Inside Our Heads","author":"Tim Wu.","unstructured":"Tim Wu. 2016. The Attention Merchants: The Epic Scramble to Get Inside Our Heads . Knopf . Tim Wu. 2016. The Attention Merchants: The Epic Scramble to Get Inside Our Heads. Knopf."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1418680112"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2020535"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.07.009"},{"key":"e_1_3_2_2_72_1","volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"Zuboff Shoshana","unstructured":"Shoshana Zuboff . 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power . Profile Books Ltd , London, UK . Shoshana Zuboff. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. Profile Books Ltd, London, UK."}],"event":{"name":"AIES '21: AAAI\/ACM Conference on AI, Ethics, and Society","location":"Virtual Event USA","acronym":"AIES '21","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","AAAI"]},"container-title":["Proceedings of the 2021 AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461702.3462626","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3461702.3462626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:06Z","timestamp":1750191426000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461702.3462626"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,21]]},"references-count":70,"alternative-id":["10.1145\/3461702.3462626","10.1145\/3461702"],"URL":"https:\/\/doi.org\/10.1145\/3461702.3462626","relation":{},"subject":[],"published":{"date-parts":[[2021,7,21]]},"assertion":[{"value":"2021-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}