{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:38:46Z","timestamp":1774946326144,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["823783"],"award-info":[{"award-number":["823783"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,26]]},"DOI":"10.1145\/3514094.3534149","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T22:25:13Z","timestamp":1658960713000},"page":"324-334","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Diversity by Design?"],"prefix":"10.1145","author":[{"given":"Paula","family":"Helm","sequence":"first","affiliation":[{"name":"Technical University Munich, Munich, Germany"}]},{"given":"Loizos","family":"Michael","sequence":"additional","affiliation":[{"name":"Open University of Cyprus &amp; CYENS Center of Excellence, Nicosia, Cyprus"}]},{"given":"Laura","family":"Schelenz","sequence":"additional","affiliation":[{"name":"University of Tuebingen, T\u00fcbingen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,7,27]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314309"},{"key":"e_1_3_2_2_2_1","volume-title":"Utb-studi-e-book","volume":"3519","author":"Bendl Regine","year":"2012","unstructured":"Regine Bendl , Edeltraud Hanappi-Egger , and Roswitha Hofmann . 2012 . Diversit\u00e4t und Diversit\u00e4tsmanagement (1. aufl. ed.) . Utb-studi-e-book , Vol. 3519 . UTB GmbH, Stuttgart. Regine Bendl, Edeltraud Hanappi-Egger, and Roswitha Hofmann. 2012. Diversit\u00e4t und Diversit\u00e4tsmanagement (1. aufl. ed.). Utb-studi-e-book, Vol. 3519. UTB GmbH, Stuttgart."},{"key":"e_1_3_2_2_3_1","volume-title":"Race After Technology: Abolitionist Tools for the New Jim Code (1. edition ed.)","author":"Benjamin Ruha","unstructured":"Ruha Benjamin . 2019. Race After Technology: Abolitionist Tools for the New Jim Code (1. edition ed.) . Polity . Ruha Benjamin. 2019. Race After Technology: Abolitionist Tools for the New Jim Code (1. edition ed.). Polity."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.17351\/ests2017.170"},{"key":"e_1_3_2_2_5_1","volume-title":"Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit","author":"Bird Steven","unstructured":"Steven Bird , Ewan Klein , and Edward Loper . 2009. Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit . O'Reilly Media, Inc. Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit. O'Reilly Media, Inc."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.14763\/2019.4.1426"},{"key":"e_1_3_2_2_7_1","volume-title":"The Rise of the Network Society: The Information Age: Economy, Society, and Culture","author":"Castells Manuel","unstructured":"Manuel Castells . 2009. The Rise of the Network Society: The Information Age: Economy, Society, and Culture Volume I (2. edition ed.). Wiley-Blackwell . Manuel Castells. 2009. The Rise of the Network Society: The Information Age: Economy, Society, and Culture Volume I (2. edition ed.). Wiley-Blackwell."},{"key":"e_1_3_2_2_8_1","volume-title":"Mulligan","author":"Chi Nicole","year":"2021","unstructured":"Nicole Chi , Emma Lurie , and Deirdre K . Mulligan . 2021 . Reconfiguring Diversity and Inclusion for AI Ethics . (2021). https:\/\/doi.org\/10.1145\/11952.107 arXiv:2105.02407 10.1145\/11952.107 Nicole Chi, Emma Lurie, and Deirdre K. Mulligan. 2021. Reconfiguring Diversity and Inclusion for AI Ethics. (2021). https:\/\/doi.org\/10.1145\/11952.107 arXiv:2105.02407"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/12255.001.0001"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/1341398"},{"key":"e_1_3_2_2_11_1","volume-title":"Cyber Racism: White Supremacy Online and the New Attack on Civil Rights","author":"Daniels Jessie","year":"2009","unstructured":"Jessie Daniels . 2009 . Cyber Racism: White Supremacy Online and the New Attack on Civil Rights . Rowman & Littlefield Publishers , Lanham and Boulder and New York and Toronto and Plymouth, UK. Jessie Daniels. 2009. Cyber Racism: White Supremacy Online and the New Attack on Civil Rights. Rowman & Littlefield Publishers, Lanham and Boulder and New York and Toronto and Plymouth, UK."},{"key":"e_1_3_2_2_12_1","volume-title":"Scenario Planning: A Literature Review. https:\/\/www.doi.org\/ 10.13140\/RG.2.2.12629.24802","author":"Dean Marco","year":"2019","unstructured":"Marco Dean . 2019 . Scenario Planning: A Literature Review. https:\/\/www.doi.org\/ 10.13140\/RG.2.2.12629.24802 (2019). 10.13140\/RG.2.2.12629.24802 Marco Dean. 2019. Scenario Planning: A Literature Review. https:\/\/www.doi.org\/ 10.13140\/RG.2.2.12629.24802 (2019)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(94)00041-X"},{"key":"e_1_3_2_2_14_1","volume-title":"Automating Inequality: How High-tech Tools Profile, Police, and Punish the Poor (illustrated edition ed.)","author":"Eubanks Virginia","year":"2018","unstructured":"Virginia Eubanks . 2018 . Automating Inequality: How High-tech Tools Profile, Police, and Punish the Poor (illustrated edition ed.) . St Martin's Press . Virginia Eubanks. 2018. Automating Inequality: How High-tech Tools Profile, Police, and Punish the Poor (illustrated edition ed.). St Martin's Press."},{"key":"e_1_3_2_2_15_1","unstructured":"European Commission. 1999. The EU Values. https:\/\/ec.europa.eu\/componentlibrary\/ eu\/about\/eu-values\/  European Commission. 1999. The EU Values. https:\/\/ec.europa.eu\/componentlibrary\/ eu\/about\/eu-values\/"},{"key":"e_1_3_2_2_16_1","volume-title":"Toward a Feminist Theory of Caring. Circles of Care: Work and Identity in Women's Lives","author":"Fisher Berenice","year":"1990","unstructured":"Berenice Fisher and Joan Tronto . 1990. Toward a Feminist Theory of Caring. Circles of Care: Work and Identity in Women's Lives ( 1990 ), 35--62. Berenice Fisher and Joan Tronto. 1990. Toward a Feminist Theory of Caring. Circles of Care: Work and Identity in Women's Lives (1990), 35--62."},{"key":"e_1_3_2_2_17_1","volume-title":"The Cambridge Handbook of Information and Computer Ethics","author":"Floridi Luciano","unstructured":"Luciano Floridi . 2010. The Cambridge Handbook of Information and Computer Ethics . Cambridge University Press . Luciano Floridi. 2010. The Cambridge Handbook of Information and Computer Ethics. Cambridge University Press."},{"key":"e_1_3_2_2_18_1","volume-title":"Toleration in Conflict: Past and Present","author":"Forst Rainer","unstructured":"Rainer Forst . 2013. Toleration in Conflict: Past and Present . Cambridge University Press . https:\/\/doi.org\/10.1017\/CBO9781139051200 10.1017\/CBO9781139051200 Rainer Forst. 2013. Toleration in Conflict: Past and Present. Cambridge University Press. https:\/\/doi.org\/10.1017\/CBO9781139051200"},{"key":"e_1_3_2_2_19_1","volume-title":"Value Sensitive Design: Shaping Technology with Moral Imagination","author":"Friedman Batya","unstructured":"Batya Friedman and David Hendry . 2019. Value Sensitive Design: Shaping Technology with Moral Imagination . The MIT Press , Cambridge, MA . Batya Friedman and David Hendry. 2019. Value Sensitive Design: Shaping Technology with Moral Imagination. The MIT Press, Cambridge, MA."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/230538.230561"},{"key":"e_1_3_2_2_21_1","volume-title":"Content Moderation, and the Hidden Decisions That Shape Social Media (illustrated edition ed.)","author":"Gillespie Tarleton","unstructured":"Tarleton Gillespie . 2018. Custodians of the Internet: Platforms , Content Moderation, and the Hidden Decisions That Shape Social Media (illustrated edition ed.) . Yale University Press . Tarleton Gillespie. 2018. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media (illustrated edition ed.). Yale University Press."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720943234"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951719897945"},{"key":"e_1_3_2_2_24_1","volume-title":"Gray and Siddharth Suri","author":"Mary","year":"2019","unstructured":"Mary L. Gray and Siddharth Suri . 2019 . Ghost Work : How to Stop Silicon Valley from Building a New Global Underclass. Houghton Mifflin Harcourt, Boston . Mary L. Gray and Siddharth Suri. 2019. Ghost Work: How to Stop Silicon Valley from Building a New Global Underclass. Houghton Mifflin Harcourt, Boston."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2019.1623700"},{"key":"e_1_3_2_2_26_1","volume-title":"What Can Self-Organised Group Therapy Teach Us About Anonymity? Ephemera. Theory and Politics in Organization 17\/2","author":"Helm Paula","year":"2017","unstructured":"Paula Helm . 2017. What Can Self-Organised Group Therapy Teach Us About Anonymity? Ephemera. Theory and Politics in Organization 17\/2 ( 2017 ), 327--350. Paula Helm. 2017. What Can Self-Organised Group Therapy Teach Us About Anonymity? Ephemera. Theory and Politics in Organization 17\/2 (2017), 327--350."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-018-9482-4"},{"key":"e_1_3_2_2_28_1","first-page":"14","article-title":"Cognitive Systems: Argument and Cognition","volume":"17","author":"Kakas Antonis C.","year":"2016","unstructured":"Antonis C. Kakas and Loizos Michael . 2016 . Cognitive Systems: Argument and Cognition . IEEE Intelligent Informatics Bulletin 17 , 1 (2016), 14 -- 20 . Antonis C. Kakas and Loizos Michael. 2016. Cognitive Systems: Argument and Cognition. IEEE Intelligent Informatics Bulletin 17, 1 (2016), 14--20.","journal-title":"IEEE Intelligent Informatics Bulletin"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1965724.1965735"},{"key":"e_1_3_2_2_30_1","volume-title":"After Method: Mess in Social Science Research","author":"Law John","year":"2007","unstructured":"John Law . 2007 . After Method: Mess in Social Science Research . Routledge , London . John Law. 2007. After Method: Mess in Social Science Research. Routledge, London."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12633-9"},{"key":"e_1_3_2_2_32_1","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems. 4768--4777","author":"Scott","unstructured":"Scott M. Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions . In Proceedings of the 31st International Conference on Neural Information Processing Systems. 4768--4777 . Scott M. Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Proceedings of the 31st International Conference on Neural Information Processing Systems. 4768--4777."},{"key":"e_1_3_2_2_33_1","volume-title":"Toward a Feminist Theory of the State","author":"MacKinnon Catharine A.","unstructured":"Catharine A. MacKinnon . 1989. Toward a Feminist Theory of the State . Harvard University Press . Catharine A. MacKinnon. 1989. Toward a Feminist Theory of the State. Harvard University Press."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1353\/cjp.0.0050"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 4th International BICAWorkshop on Artificial Intelligence and Cognition (CEUR Workshop Proceedings","author":"Michael Loizos","year":"2016","unstructured":"Loizos Michael . 2016 . Cognitive Reasoning and Learning Mechanisms . In Proceedings of the 4th International BICAWorkshop on Artificial Intelligence and Cognition (CEUR Workshop Proceedings 1895). New York City, New York, U.S.A., 2--23. Loizos Michael. 2016. Cognitive Reasoning and Learning Mechanisms. In Proceedings of the 4th International BICAWorkshop on Artificial Intelligence and Cognition (CEUR Workshop Proceedings 1895). New York City, New York, U.S.A., 2--23."},{"key":"e_1_3_2_2_36_1","volume-title":"Machine Coaching. In Proceedings of the IJCAI Workshop on Explainable Artificial Intelligence. Macao SAR, P.R. China, 80--86","author":"Michael Loizos","year":"2019","unstructured":"Loizos Michael . 2019 . Machine Coaching. In Proceedings of the IJCAI Workshop on Explainable Artificial Intelligence. Macao SAR, P.R. China, 80--86 . Loizos Michael. 2019. Machine Coaching. In Proceedings of the IJCAI Workshop on Explainable Artificial Intelligence. Macao SAR, P.R. China, 80--86."},{"key":"e_1_3_2_2_37_1","volume-title":"Proceedings of the 2nd Workshop in Implementing Machine Ethics.","author":"Michael Loizos","year":"2020","unstructured":"Loizos Michael . 2020 . Machine Ethics through Machine Coaching . In Proceedings of the 2nd Workshop in Implementing Machine Ethics. Loizos Michael. 2020. Machine Ethics through Machine Coaching. In Proceedings of the 2nd Workshop in Implementing Machine Ethics."},{"key":"e_1_3_2_2_38_1","volume-title":"Explainability and the Fourth AI Revolution. CoRR abs\/2111.06773","author":"Michael Loizos","year":"2021","unstructured":"Loizos Michael . 2021. Explainability and the Fourth AI Revolution. CoRR abs\/2111.06773 ( 2021 ). arXiv:2111.06773 Loizos Michael. 2021. Explainability and the Fourth AI Revolution. CoRR abs\/2111.06773 (2021). arXiv:2111.06773"},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the 11th International Conference on Principles of Knowledge Representation and Reasoning, Gerhard Brewka and J\u00e9r\u00f4me Lang (Eds.). AAAI Press","author":"Michael Loizos","unstructured":"Loizos Michael and Leslie G. Valiant . 2008. A First Experimental Demonstration of Massive Knowledge Infusion . In Proceedings of the 11th International Conference on Principles of Knowledge Representation and Reasoning, Gerhard Brewka and J\u00e9r\u00f4me Lang (Eds.). AAAI Press , Sydney, Australia, 378--389. Loizos Michael and Leslie G. Valiant. 2008. A First Experimental Demonstration of Massive Knowledge Infusion. In Proceedings of the 11th International Conference on Principles of Knowledge Representation and Reasoning, Gerhard Brewka and J\u00e9r\u00f4me Lang (Eds.). AAAI Press, Sydney, Australia, 378--389."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_2_2_41_1","volume-title":"Information Disorder, Fake News and the Future of Democracy. Globalizations","author":"Monsees Linda","year":"2021","unstructured":"Linda Monsees . 2021. Information Disorder, Fake News and the Future of Democracy. Globalizations ( 2021 ), 1--16. https:\/\/doi.org\/10.1080\/14747731.2021.1927470 10.1080\/14747731.2021.1927470 Linda Monsees. 2021. Information Disorder, Fake News and the Future of Democracy. Globalizations (2021), 1--16. https:\/\/doi.org\/10.1080\/14747731.2021.1927470"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240866.1241046"},{"key":"e_1_3_2_2_43_1","volume-title":"Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy","author":"O'Neil Cathy","unstructured":"Cathy O'Neil . 2017. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy ( 1 st edition ed.). Penguin Books UK. Cathy O'Neil. 2017. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy (1st edition ed.). Penguin Books UK.","edition":"1"},{"key":"e_1_3_2_2_44_1","volume-title":"The Filter Bubble: What the Internet is Hiding From You","author":"Pariser Eli","unstructured":"Eli Pariser . 2012. The Filter Bubble: What the Internet is Hiding From You . Penguin Books , London . Eli Pariser. 2012. The Filter Bubble: What the Internet is Hiding From You. Penguin Books, London."},{"key":"e_1_3_2_2_45_1","volume-title":"Re-Scripting the Nation in \"Post Truth' Era: The Indian Story. Asian Ethnicity","author":"Ranganathan Maya","year":"2019","unstructured":"Maya Ranganathan . 2019. Re-Scripting the Nation in \"Post Truth' Era: The Indian Story. Asian Ethnicity ( 2019 ), 1--15. Maya Ranganathan. 2019. Re-Scripting the Nation in \"Post Truth' Era: The Indian Story. Asian Ethnicity (2019), 1--15."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/13684310222225432"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_2_48_1","volume-title":"Behind the Screen","author":"Roberts Sarah T.","unstructured":"Sarah T. Roberts . 2019. Behind the Screen . Yale University Press . Sarah T. Roberts. 2019. Behind the Screen. Yale University Press."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462595"},{"key":"e_1_3_2_2_50_1","article-title":"Scenario Planning: A Tool for Strategic Thinking","volume":"36","author":"Schoemaker Paul J. H.","year":"1995","unstructured":"Paul J. H. Schoemaker . 1995 . Scenario Planning: A Tool for Strategic Thinking . HMIT Sloan Management Review 36 , 2 (1995). Paul J. H. Schoemaker. 1995. Scenario Planning: A Tool for Strategic Thinking. HMIT Sloan Management Review 36, 2 (1995).","journal-title":"HMIT Sloan Management Review"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180492"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11164"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242667"},{"key":"e_1_3_2_2_54_1","volume-title":"Modern Social Imaginaries","author":"Taylor Charles","unstructured":"Charles Taylor . 2004. Modern Social Imaginaries . Duke University Press . Charles Taylor. 2004. Modern Social Imaginaries. Duke University Press."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"crossref","unstructured":"Charles Taylor. 2007. A Secular Age. Harvard University Press.  Charles Taylor. 2007. A Secular Age. Harvard University Press.","DOI":"10.4159\/9780674044289"},{"key":"e_1_3_2_2_56_1","volume-title":"Studien und Beitr\u00e4ge zum \u00d6ffentlichen Recht","author":"Tischbirek Alexander","unstructured":"Alexander Tischbirek . 2017. Die Verh\u00e4ltnism\u00e4\u00dfigkeitspr\u00fcfung (1 ed.). Studien und Beitr\u00e4ge zum \u00d6ffentlichen Recht , Vol. 35 . Mohr Siebeck. X, 239 pages. Alexander Tischbirek. 2017. Die Verh\u00e4ltnism\u00e4\u00dfigkeitspr\u00fcfung (1 ed.). Studien und Beitr\u00e4ge zum \u00d6ffentlichen Recht, Vol. 35. Mohr Siebeck. X, 239 pages."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i6.16639"},{"key":"e_1_3_2_2_58_1","volume-title":"Friction: An Ethnography of Global Connection","author":"Tsing Anna Lowenhaupt","year":"2004","unstructured":"Anna Lowenhaupt Tsing . 2004 . Friction: An Ethnography of Global Connection . Princeton University Press . Anna Lowenhaupt Tsing. 2004. Friction: An Ethnography of Global Connection. Princeton University Press."},{"key":"e_1_3_2_2_59_1","volume-title":"The Convention on the Protection and Promotion of the Diversity of Cultural Expressions. https:\/\/en.unesco.org\/creativity\/convention","author":"UNESCO.","year":"2005","unstructured":"UNESCO. 2005 . The Convention on the Protection and Promotion of the Diversity of Cultural Expressions. https:\/\/en.unesco.org\/creativity\/convention (2005). UNESCO. 2005. The Convention on the Protection and Promotion of the Diversity of Cultural Expressions. https:\/\/en.unesco.org\/creativity\/convention (2005)."},{"key":"e_1_3_2_2_60_1","volume-title":"Data Politics","author":"Venturini Tommaso","unstructured":"Tommaso Venturini . 2019. From Fake to Junk News: The Data Politics of Online Virality . In Data Politics . Routledge , 123--144. Tommaso Venturini. 2019. From Fake to Junk News: The Data Politics of Online Virality. In Data Politics. Routledge, 123--144."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1017\/S000397561200015X"},{"key":"e_1_3_2_2_62_1","volume-title":"The Harm in Hate Speech","author":"Waldron Jeremy","unstructured":"Jeremy Waldron . 2012. The Harm in Hate Speech . Harvard University Press , Cambridge, MA . Jeremy Waldron. 2012. The Harm in Hate Speech. Harvard University Press, Cambridge, MA."},{"key":"e_1_3_2_2_63_1","volume-title":"Spheres of Justice: A Defense of Pluralism and Equality","author":"Walzer Michael","unstructured":"Michael Walzer . 1984. Spheres of Justice: A Defense of Pluralism and Equality . Basic Books , New York . Michael Walzer. 1984. Spheres of Justice: A Defense of Pluralism and Equality. Basic Books, New York."},{"key":"e_1_3_2_2_64_1","volume-title":"The Internet of Us","year":"2022","unstructured":"WeNet : The Internet of Us . 2022 . Project Page: https:\/\/www.internetofus.eu\/. WeNet: The Internet of Us. 2022. Project Page: https:\/\/www.internetofus.eu\/."},{"key":"e_1_3_2_2_65_1","volume-title":"The Gig Economy: A Critical Introduction (1 ed.)","author":"Woodcock Jamie","unstructured":"Jamie Woodcock and Mark Graham . 2020. The Gig Economy: A Critical Introduction (1 ed.) . Polity . Jamie Woodcock and Mark Graham. 2020. The Gig Economy: A Critical Introduction (1 ed.). Polity."},{"key":"e_1_3_2_2_66_1","volume-title":"Zimmerman and Ben Bradley","author":"Michael","year":"2019","unstructured":"Michael J. Zimmerman and Ben Bradley . 2019 . Intrinsic vs. Extrinsic Value. In The Stanford Encyclopedia of Philosophy (Spring 2019 ed.), Edward N. Zalta (Ed.). Stanford University . Michael J. Zimmerman and Ben Bradley. 2019. Intrinsic vs. Extrinsic Value. In The Stanford Encyclopedia of Philosophy (Spring 2019 ed.), Edward N. Zalta (Ed.). Stanford University."}],"event":{"name":"AIES '22: AAAI\/ACM Conference on AI, Ethics, and Society","location":"Oxford United Kingdom","acronym":"AIES '22","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","AAAI"]},"container-title":["Proceedings of the 2022 AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514094.3534149","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3514094.3534149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:36Z","timestamp":1750186956000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514094.3534149"}},"subtitle":["Balancing the Inclusion and Protection of Users in an Online Social Platform"],"short-title":[],"issued":{"date-parts":[[2022,7,26]]},"references-count":66,"alternative-id":["10.1145\/3514094.3534149","10.1145\/3514094"],"URL":"https:\/\/doi.org\/10.1145\/3514094.3534149","relation":{},"subject":[],"published":{"date-parts":[[2022,7,26]]},"assertion":[{"value":"2022-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}