{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T16:57:30Z","timestamp":1767891450310,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":104,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,21]]},"DOI":"10.1145\/3531146.3533151","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T14:27:10Z","timestamp":1655735230000},"page":"877-889","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Promoting Ethical Awareness in Communication Analysis: Investigating Potentials and Limits of Visual Analytics for Intelligence Applications"],"prefix":"10.1145","author":[{"given":"Maximilian T.","family":"Fischer","sequence":"first","affiliation":[{"name":"University of Konstanz, Germany"}]},{"given":"Simon David","family":"Hirsbrunner","sequence":"additional","affiliation":[{"name":"International Center for Ethics in the Sciences (IZEW), University of T\u00fcbingen, Germany"}]},{"given":"Wolfgang","family":"Jentner","sequence":"additional","affiliation":[{"name":"University of Konstanz, Germany"}]},{"given":"Matthias","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Konstanz, Germany"}]},{"given":"Daniel A.","family":"Keim","sequence":"additional","affiliation":[{"name":"University of Konstanz, Germany"}]},{"given":"Paula","family":"Helm","sequence":"additional","affiliation":[{"name":"International Center for Ethics in the Sciences (IZEW), University of T\u00fcbingen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AI Ethics Impact Group. 2020. From Principles to Practice An Interdisciplinary Framework to Operationalise AI Ethics. https:\/\/www.bertelsmann-stiftung.de\/fileadmin\/files\/BSt\/Publikationen\/GrauePublikationen\/WKIO_2020_final.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.93"},{"key":"e_1_3_2_1_3_1","unstructured":"American Civil Liberties Union. 2016. Statement of Concern About Predictive Policing by ACLU and 16 Civil Rights Privacy Racial Justice and Technology Organizations. https:\/\/www.aclu.org\/other\/statement-concern-about-predictive-policing-aclu-and-16-civil-rights-privacy-racial-justice"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.7146\/aahcc.v1i1.21199"},{"key":"e_1_3_2_1_5_1","volume-title":"The Charisma Machine: The Life, Death, and Legacy of One Laptop per Child","author":"Ames G.","unstructured":"Morgan\u00a0G. Ames. 2019. The Charisma Machine: The Life, Death, and Legacy of One Laptop per Child. MIT Press, Cambridge, MA, USA."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/ips.12044"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/0263276419851846"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816676645"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40685-018-0074-2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2012.01.006"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-018-0309-3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/13534645.2014.927623"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Jascha Bareis and Christian Katzenbach. 2021. Talking AI into Being: The Narratives and Imaginaries of National AI Strategies and Their Performative Politics. Science Technology & Human Values(2021) 01622439211030007. https:\/\/doi.org\/10.1177\/01622439211030007","DOI":"10.1177\/01622439211030007"},{"key":"e_1_3_2_1_14_1","unstructured":"Solon Barocas Moritz Hardt and Arvind Narayanan. 2017. Fairness and Machine Learning. Nips Tutorial 1(2017)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702234"},{"key":"e_1_3_2_1_16_1","volume-title":"Race After Technology: Abolitionist Tools for the New Jim Code","author":"Benjamin Ruha","unstructured":"Ruha Benjamin. 2019. Race After Technology: Abolitionist Tools for the New Jim Code. Polity, Medford MA."},{"key":"e_1_3_2_1_17_1","volume-title":"Readings in Information Visualization: Using Vision to Think. Morgan Kaufmann","author":"Card K.","unstructured":"Stuart\u00a0K. Card, Jock\u00a0D. Mackinlay, and Ben Shneiderman. 1999. Readings in Information Visualization: Using Vision to Think. Morgan Kaufmann, San Francisco, CA."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1999.772890"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300418"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/12255.001.0001"},{"key":"e_1_3_2_1_21_1","unstructured":"DataWalk Inc.2020. DataWalk. https:\/\/datawalk.com\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"e_1_3_2_1_23_1","volume-title":"ROXSD: A Simulated Dataset of Communication in Organized Crime. ISCA Symposium on Security and Privacy in Speech Communication","author":"Dikici Erin\u00e7","year":"2021","unstructured":"Erin\u00e7 Dikici, Ma\u00ebl Fabien, Jan Hor\u0131nek, Joshua Hughes, Miroslav Jano\u0161ik, Marek Kovac, Petr Motlicek, Hoang\u00a0H. Nguyen, Shantipriya Parida, Johan Rohdin, 2021. ROXSD: A Simulated Dataset of Communication in Organized Crime. ISCA Symposium on Security and Privacy in Speech Communication (2021), 32\u201336."},{"key":"e_1_3_2_1_24_1","volume-title":"Visual Text Analytics in Context of Digital Humanities. In 1st IEEE VIS Workshop on Visualization for the Digital Humanities (Vis4DH) as part of the IEEE VIS","author":"El-Assady Mennatallah","year":"2016","unstructured":"Mennatallah El-Assady, Valentin Gold, Markus John, Thomas Ertl, and Daniel\u00a0A. Keim. 2016. Visual Text Analytics in Context of Digital Humanities. In 1st IEEE VIS Workshop on Visualization for the Digital Humanities (Vis4DH) as part of the IEEE VIS 2016. https:\/\/scibib.dbvis.de\/publications\/view\/686"},{"key":"e_1_3_2_1_25_1","unstructured":"Geoffrey Ellis (Ed.). 2018. Cognitive Biases in Visualizations(1st ed. 2018 ed.). Springer International Publishing and Imprint: Springer Cham."},{"key":"e_1_3_2_1_26_1","volume-title":"Automating Inequality: How High-tech Tools Profile, Police, and Punish the Poor (illustrated edition ed.)","author":"Eubanks Virginia","year":"2018","unstructured":"Virginia Eubanks. 2018. Automating Inequality: How High-tech Tools Profile, Police, and Punish the Poor (illustrated edition ed.). St Martin\u2019s Press."},{"key":"e_1_3_2_1_27_1","unstructured":"European Commission. 2021. White Paper on Artificial Intelligence - A European Approach to Excellence and Trust. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:52020DC0065&from=EN"},{"key":"e_1_3_2_1_28_1","volume-title":"Proposal for a Regulation of the European Parliament and of the Council Laying down Harmonised Rules on Artificial Intelligence","author":"European Commission","year":"2021","unstructured":"European Commission. 2021-04-21. Proposal for a Regulation of the European Parliament and of the Council Laying down Harmonised Rules on Artificial Intelligence (Artificial Intelligence Act) and Amending Certain Union Legislative Acts (COM\/2021\/206 final): Artifical Intelligence Act. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A52021PC0206"},{"key":"e_1_3_2_1_29_1","unstructured":"European Commission. 2021-12-09. Proposal for a Directive of the European Parliament and of the Council on Improving Working Conditions in Platform Work (COM(2021) 762). https:\/\/ec.europa.eu\/social\/BlobServlet?docId=24992&langId=en"},{"key":"e_1_3_2_1_30_1","unstructured":"European Parliament and the European Council. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data and Repealing Directive 95\/46\/EC (General Data Protection Regulation): GDPR."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Europol. 2021. European Union Serious and Organised Crime Threat Assessment (SOCTA): A Corrupting Influence: The Infiltration and Undermining of Europe\u2019s Economy and Society by Organised Crime. https:\/\/www.europol.europa.eu\/cms\/sites\/default\/files\/documents\/socta2021_1.pdf","DOI":"10.1016\/S1361-3723(21)00125-1"},{"key":"e_1_3_2_1_32_1","first-page":"77","article-title":"Stops and Stares: Street Stops, Surveillance, and Race in the New Policing","volume":"43","author":"Fagan Jeffrey","year":"2016","unstructured":"Jeffrey Fagan, Anthony\u00a0A. Braga, Rod\u00a0K. Brunson, and April Pattavina. 2016. Stops and Stares: Street Stops, Surveillance, and Race in the New Policing. Fordham Urban Law Journal 43, 3 (2016), 77.","journal-title":"Fordham Urban Law Journal"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3030408"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Maximilian\u00a0T. Fischer Frederik Dennig Daniel Seebacher Daniel\u00a0A. Keim and Mennatallah El-Assady. 2021. Communication Analysis through Visual Analytics: Current Practices Challenges and New Frontiers. arxiv:2106.14802","DOI":"10.36227\/techrxiv.15022791"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.14286"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/0163443719876533"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1300\/J012v16n03_01"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v13i3.1011"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2016.2549018"},{"key":"e_1_3_2_1_40_1","volume-title":"The Interface Effect","author":"Galloway R.","unstructured":"Alexander\u00a0R. Galloway. 2012. The Interface Effect. Wiley."},{"key":"e_1_3_2_1_41_1","volume-title":"Facial-Recognition Software Might Have a Racial Bias Problem. The Atlantic","author":"Garvie Clare","year":"2016","unstructured":"Clare Garvie and Jonathan Frankle. 2016. Facial-Recognition Software Might Have a Racial Bias Problem. The Atlantic (2016). https:\/\/www.theatlantic.com\/technology\/archive\/2016\/04\/the-underlying-bias-of-facial-recognition-systems\/476991\/"},{"key":"e_1_3_2_1_42_1","volume-title":"Raw Data is an Oxymoron","author":"Gitelman Lisa","unstructured":"Lisa Gitelman. 2013. Raw Data is an Oxymoron. The MIT Press, Cambridge, Massachusetts."},{"key":"e_1_3_2_1_43_1","unstructured":"Ben Green. 2018. Putting the J(ustice) in FAT. https:\/\/medium.com\/berkman-klein-center\/putting-the-j-ustice-in-fat-28da2b8eae6d"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.01.004"},{"key":"e_1_3_2_1_45_1","volume-title":"Staying with the Trouble: Making Kin in the Chthulucene. Experimental Futures (illustrated edition ed.)","author":"Haraway J.","unstructured":"Donna\u00a0J. Haraway. 2017. Staying with the Trouble: Making Kin in the Chthulucene. Experimental Futures (illustrated edition ed.). Academic Press."},{"key":"e_1_3_2_1_46_1","first-page":"1","article-title":"Beyond the Prediction Paradigm: Challenges for AI in the Struggle Against Organized Crime","volume":"84","author":"Helm Paula","year":"2021","unstructured":"Paula Helm and Thilo Hagendorff. 2021. Beyond the Prediction Paradigm: Challenges for AI in the Struggle Against Organized Crime. Law and Contemporary Problems 84, 3 (2021), 1\u201317.","journal-title":"Law and Contemporary Problems"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/016224399101600402"},{"key":"e_1_3_2_1_48_1","unstructured":"Matthew Honnibal. 2019. SpaCy: An NLP library. https:\/\/www.spacy.io"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2019.1573501"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Branden Hookway. 2014. Interface. MIT Press.","DOI":"10.7551\/mitpress\/9919.001.0001"},{"key":"e_1_3_2_1_51_1","unstructured":"IBM. 2020. i2 Analyst\u2019s Notebook. https:\/\/www.ibm.com\/us-en\/marketplace\/analysts-notebook"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.7208\/9780226276663-001"},{"key":"e_1_3_2_1_53_1","volume-title":"Workshop on Visualization for AI Explainability at IEEE. https:\/\/bib.dbvis.de\/uploadedFiles\/minionssheepfruits.pdf","author":"Jentner Wolfgang","year":"2018","unstructured":"Wolfgang Jentner, Rita Sevastjanova, Florian Stoffel, Daniel\u00a0A. Keim, J\u00fcrgen Bernard, and Mennatallah El-Assady. 2018. Minions, Sheep, and Fruits : Metaphorical Narratives to Explain Artificial Intelligence and Build Trust. In Workshop on Visualization for AI Explainability at IEEE. https:\/\/bib.dbvis.de\/uploadedFiles\/minionssheepfruits.pdf"},{"key":"e_1_3_2_1_54_1","first-page":"287","article-title":"Feeding the Machine: Policing Crime Data & Algorithms","volume":"26","author":"Joh E.","year":"2017","unstructured":"Elizabeth\u00a0E. Joh. 2017. Feeding the Machine: Policing Crime Data & Algorithms. William & Mary Bill of Rights Journal 26 (2017), 287.","journal-title":"William & Mary Bill of Rights Journal"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.940003"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70956-5-7"},{"key":"e_1_3_2_1_58_1","volume-title":"Mastering the Information Age Solving Problems with Visual Analytics","author":"Keim A.","unstructured":"Daniel\u00a0A. Keim, J\u00f6rn Kohlhammer, Geoffrey\u00a0P. Ellis, and Florian Mansmann. 2010. Mastering the Information Age Solving Problems with Visual Analytics. Eurographics Association."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1515\/mks-2020-2048"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.2307\/20049052"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1154087"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.36"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_1_64_1","volume-title":"Technical Response to Northpointe. ProPublica","author":"Larson Jeff","year":"2016","unstructured":"Jeff Larson and Julia Angwin. 2016. Technical Response to Northpointe. ProPublica (2016). https:\/\/www.propublica.org\/article\/technical-response-to-northpointe"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-017-0279-x"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","unstructured":"Benjamin Lipp. 2017. Analytik des Interfacing. Zur Materialit\u00e4t technologischer Verschaltung in prototypischen Milieus robotisierter Pflege. 1866-2447 10(2017) 107\u2013129. https:\/\/doi.org\/10.6094\/behemoth.2017.10.1.948","DOI":"10.6094\/behemoth.2017.10.1.948"},{"key":"e_1_3_2_1_67_1","volume-title":"Theorising Interfaces \/ Interface Theories. In EASST","author":"Lipp Benjamin","year":"2022","unstructured":"Benjamin Lipp, Paula Helm, Athanasios Karafillidis, and Roser Pujadas. 2022. Theorising Interfaces \/ Interface Theories. In EASST 2022."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376533"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1740-9713.2016.00960.x"},{"key":"e_1_3_2_1_70_1","volume-title":"The Production of Prediction: What Does Machine Learning Want?European Journal of Cultural Studies 18, 4\/5","author":"Mackenzie Adrian","year":"2015","unstructured":"Adrian Mackenzie. 2015. The Production of Prediction: What Does Machine Learning Want?European Journal of Cultural Studies 18, 4\/5 (2015), 429\u2013445."},{"key":"e_1_3_2_1_71_1","volume-title":"The Ethics of Surveillance: An Introduction","author":"Macnish Kevin","unstructured":"Kevin Macnish. 2018. The Ethics of Surveillance: An Introduction. Routledge Taylor & Francis Group, London and New York."},{"key":"e_1_3_2_1_72_1","volume-title":"Manning and Hinrich Sch\u00fctze","author":"D.","year":"1999","unstructured":"Christopher\u00a0D. Manning and Hinrich Sch\u00fctze. 1999. Foundations of Statistical Natural Language Processing. MIT Press, Cambridge, Mass. and London."},{"key":"e_1_3_2_1_73_1","volume-title":"Big Data: Die Revolution, die unser Leben ver\u00e4ndern wird (1. ed ed.)","author":"Mayer-Sch\u00f6nberger Viktor","year":"2013","unstructured":"Viktor Mayer-Sch\u00f6nberger and Kenneth Cukier. 2013. Big Data: Die Revolution, die unser Leben ver\u00e4ndern wird (1. ed ed.). Redline-Verlag, M\u00fcnchen."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457607"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716650211"},{"key":"e_1_3_2_1_76_1","volume-title":"Interpretable Machine Learning: A Guide for Making Black Box Models Interpretable. Lulu","author":"Molnar Christoph","unstructured":"Christoph Molnar. 2019. Interpretable Machine Learning: A Guide for Making Black Box Models Interpretable. Lulu, Morisville, North Carolina."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2016.1234938"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/175222.175228"},{"key":"e_1_3_2_1_79_1","volume-title":"Algorithms of Oppression: How Search Engines Reinforce Racism","author":"Noble Safiya\u00a0Umoja","unstructured":"Safiya\u00a0Umoja Noble. 2018. Algorithms of Oppression: How Search Engines Reinforce Racism. New York University Press, New York."},{"key":"e_1_3_2_1_80_1","unstructured":"Nuix Pty Ltd. 2020. Nuix Discover and Nuix Investigate. https:\/\/www.nuix.com\/products"},{"key":"e_1_3_2_1_81_1","volume-title":"Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy","author":"O\u2019Neil Cathy","unstructured":"Cathy O\u2019Neil. 2016. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy (1st edition ed.). Penguin Books UK.","edition":"1"},{"key":"e_1_3_2_1_82_1","unstructured":"Palantir Technologies Inc.2020. Gotham. https:\/\/www.palantir.com\/palantir-gotham\/"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013355122531"},{"key":"e_1_3_2_1_84_1","volume-title":"The Black Box Society: The Secret Algorithms That Control Money and Information","author":"Pasquale Frank","unstructured":"Frank Pasquale. 2015. The Black Box Society: The Secret Algorithms That Control Money and Information. Harvard University Press."},{"key":"e_1_3_2_1_85_1","volume-title":"Human Communication","author":"Pearson C.","unstructured":"Judy\u00a0C. Pearson. 2011. Human Communication(4th ed.). McGraw-Hill, New York.","edition":"4"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.0956-7976.2005.00800.x"},{"key":"e_1_3_2_1_87_1","volume-title":"Interfaces and the Dynamics of Digital Ecosystems: A Study of the Online Travel Ecosystem. International Conference on Information Systems (ICIS)","author":"Pujadas Roser","year":"2020","unstructured":"Roser Pujadas, Erika Valderrama, and Will Venters. 2020. Interfaces and the Dynamics of Digital Ecosystems: A Study of the Online Travel Ecosystem. International Conference on Information Systems (ICIS) (2020)."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2014.2346481"},{"key":"e_1_3_2_1_90_1","volume-title":"Psychological perspectives on motivation through gamification. Interaction Design and Architecture Journal19","author":"Sailer Michael","year":"2014","unstructured":"Michael Sailer, Jan Hense, J Mandl, and Markus Klevers. 2014. Psychological perspectives on motivation through gamification. Interaction Design and Architecture Journal19 (2014), 28\u201337."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809336513"},{"key":"e_1_3_2_1_92_1","volume-title":"Social Network Analysis","author":"Scott John","unstructured":"John Scott. 2017. Social Network Analysis(4th ed.). SAGE, Los Angeles.","edition":"4"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.2312\/eurova.20191130"},{"key":"e_1_3_2_1_94_1","first-page":"3373","article-title":"Disparate Impact in Big Data Policing","volume":"52","author":"Selbst D.","year":"2018","unstructured":"Andrew\u00a0D. Selbst. 2018. Disparate Impact in Big Data Policing. Georgia Law Review 52, 1 (2018), 3373.","journal-title":"Georgia Law Review"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094562.1094569"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2021.06.016"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.2312\/eurova.20201088"},{"key":"e_1_3_2_1_98_1","unstructured":"Matthias Spielkamp. 2017. Inspecting Algorithms for Bias. MIT Technology Review(2017). https:\/\/www.technologyreview.com\/2017\/06\/12\/105804\/inspecting-algorithms-for-bias\/"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13179"},{"key":"e_1_3_2_1_100_1","volume-title":"Human-Machine Reconfigurations: Plans and Situated Actions","author":"Suchman Lucille\u00a0Alice","unstructured":"Lucille\u00a0Alice Suchman. 2007. Human-Machine Reconfigurations: Plans and Situated Actions (2nd ed.). Cambridge University Press, Cambridge.","edition":"2"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1080\/19312458.2018.1458084"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.2019.8933611"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01159-8_30"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243915605575"}],"event":{"name":"FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency","location":"Seoul Republic of Korea","acronym":"FAccT '22","sponsor":["ACM Association for Computing Machinery"]},"container-title":["2022 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533151","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531146.3533151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:08Z","timestamp":1750186928000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,20]]},"references-count":104,"alternative-id":["10.1145\/3531146.3533151","10.1145\/3531146"],"URL":"https:\/\/doi.org\/10.1145\/3531146.3533151","relation":{},"subject":[],"published":{"date-parts":[[2022,6,20]]},"assertion":[{"value":"2022-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}