{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T22:10:31Z","timestamp":1773007831255,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,21]]},"DOI":"10.1145\/3531146.3533779","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T14:27:10Z","timestamp":1655735230000},"page":"2035-2046","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Limits and Possibilities for \u201cEthical AI\u201d in Open Source: A Study of Deepfakes"],"prefix":"10.1145","author":[{"given":"David Gray","family":"Widder","sequence":"first","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University, USA"}]},{"given":"Dawn","family":"Nafus","sequence":"additional","affiliation":[{"name":"Intel Labs, Intel Corporation, USA"}]},{"given":"Laura","family":"Dabbish","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University, USA"}]},{"given":"James","family":"Herbsleb","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The 82nd Academy Awards (2010) Nominees and Winners","unstructured":"2010. The 82nd Academy Awards (2010) Nominees and Winners. http:\/\/www.oscars.org\/awards\/academyawards\/legacy\/ceremony\/82nd-winners.html\/. The Academy of Motion Picture Arts and Sciences (2010). Accessed: 2022-004-25."},{"key":"e_1_3_2_1_2_1","volume-title":"Google Will Not Renew Pentagon Contract That Upset Employees. https:\/\/deon.drivendata.org. DrivenData","year":"2019","unstructured":"2019. Google Will Not Renew Pentagon Contract That Upset Employees. https:\/\/deon.drivendata.org. DrivenData (2019). Accessed: 2021-07-7."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. A Tech Workers\u2019 Bill of Rights. https:\/\/techworkerscoalition.org\/bill-of-rights\/. Tech Workers Coalition(2020). Accessed: 2021-010-1."},{"key":"e_1_3_2_1_4_1","unstructured":"Christophe Abrassart Yoshua Bengio G Chicoisine N De\u00a0Marcellis M Warin Gambs Dilhac 2018. Montreal Declaration for Responsible Development of Artificial Intelligence. (2018)."},{"key":"e_1_3_2_1_5_1","unstructured":"[5] Christophe Abrassart and Marc-Antoine Dilhac.2018."},{"key":"e_1_3_2_1_6_1","volume-title":"The state of deepfakes: Landscape, threats, and impact","author":"Ajder Henry","year":"2019","unstructured":"Henry Ajder, Giorgio Patrini, Francesco Cavalli, and Laurence Cullen. 2019. The state of deepfakes: Landscape, threats, and impact. Amsterdam: Deeptrace(2019)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.72"},{"key":"e_1_3_2_1_8_1","volume-title":"International journal of electronic commerce 6, 3","author":"Alexander\u00a0Hars Shaosong\u00a0Ou","year":"2002","unstructured":"Shaosong\u00a0Ou Alexander\u00a0Hars. 2002. Working for free? Motivations for participating in open-source projects. International journal of electronic commerce 6, 3 (2002), 25\u201339."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314243"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243915606523"},{"key":"e_1_3_2_1_11_1","volume-title":"Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability. new media & society 20, 3","author":"Ananny Mike","year":"2018","unstructured":"Mike Ananny and Kate Crawford. 2018. Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability. new media & society 20, 3 (2018), 973\u2013989."},{"key":"e_1_3_2_1_12_1","volume-title":"Amor mundi","author":"Arendt Hannah","unstructured":"Hannah Arendt. 1987. Collective responsibility. In Amor mundi. Springer, 43\u201350."},{"key":"e_1_3_2_1_13_1","volume-title":"The moral machine experiment. Nature 563, 7729","author":"Awad Edmond","year":"2018","unstructured":"Edmond Awad, Sohan Dsouza, Richard Kim, Jonathan Schulz, Joseph Henrich, Azim Shariff, Jean-Fran\u00e7ois Bonnefon, and Iyad Rahwan. 2018. The moral machine experiment. Nature 563, 7729 (2018), 59\u201364."},{"key":"e_1_3_2_1_14_1","unstructured":"Justin\u00a0B Biddle. 2020. On predicting recidivism: epistemic risk tradeoffs and values in machine learning. Canadian Journal of Philosophy(2020) 1\u201321."},{"key":"e_1_3_2_1_15_1","volume-title":"Strategic implications of openness in AI development. Global policy 8, 2","author":"Bostrom Nick","year":"2017","unstructured":"Nick Bostrom. 2017. Strategic implications of openness in AI development. Global policy 8, 2 (2017), 135\u2013148."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Marcus Burkhardt. 2019. Mapping the Democratization of AI on GitHub. A First Approach. (2019).","DOI":"10.1515\/9783839447192-013"},{"key":"e_1_3_2_1_17_1","unstructured":"Daniel Chandler. 1995. Technological or media determinism."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3376898"},{"key":"e_1_3_2_1_19_1","volume-title":"The RIAA is coming for the YouTube downloaders. https:\/\/techcrunch.com\/2020\/10\/23\/the-riaa-is-coming-for-the-youtube-downloaders\/. Tech Crunch (23","author":"Coldewey Devin","year":"2020","unstructured":"Devin Coldewey. 2020. The RIAA is coming for the YouTube downloaders. https:\/\/techcrunch.com\/2020\/10\/23\/the-riaa-is-coming-for-the-youtube-downloaders\/. Tech Crunch (23 Oct. 2020). Accessed: 2021-07-1."},{"key":"e_1_3_2_1_20_1","volume-title":"Coding freedom: The ethics and aesthetics of hacking","author":"Coleman E\u00a0Gabriella","unstructured":"E\u00a0Gabriella Coleman. 2012. Coding freedom: The ethics and aesthetics of hacking. Princeton University Press."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3299057"},{"key":"e_1_3_2_1_22_1","volume-title":"Challenges of incorporating algorithmic fairness into industry practice. FAT* Tutorial","author":"Cramer Henriette","year":"2019","unstructured":"Henriette Cramer, Jenn\u00a0Wortman Vaughan, Ken Holstein, Hanna Wallach, Jean Garcia-Gathright, Hal Daum\u00e9\u00a0III, Miroslav Dud\u00edk, and Sravana Reddy. 2019. Challenges of incorporating algorithmic fairness into industry practice. FAT* Tutorial (2019)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145396"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.17705\/1thci.00133"},{"key":"e_1_3_2_1_25_1","volume-title":"Responsible AI with TensorFlow. https:\/\/blog.tensorflow.org\/2020\/06\/responsible-ai-with-tensorflow.html. TensorFlow Blog (29","author":"Doshi Tulsee","year":"2020","unstructured":"Tulsee Doshi and Andrew Zaldivar. 2020. Responsible AI with TensorFlow. https:\/\/blog.tensorflow.org\/2020\/06\/responsible-ai-with-tensorflow.html. TensorFlow Blog (29 June 2020). Accessed: 2021-07-7."},{"key":"e_1_3_2_1_26_1","first-page":"115","article-title":"Gun Torts: Defining a cause of action for victims in suits against gun manufacturers","volume":"81","author":"Eggen Jean\u00a0Macchiaroli","year":"2002","unstructured":"Jean\u00a0Macchiaroli Eggen and John\u00a0G Culhane. 2002. Gun Torts: Defining a cause of action for victims in suits against gun manufacturers. NCL Rev. 81(2002), 115.","journal-title":"NCL Rev."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/2024543"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"R\u00a0Stuart Geiger. 2017. Summary analysis of the 2017 github open source survey. arXiv preprint arXiv:1706.02777(2017).","DOI":"10.31235\/osf.io\/qps53"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/15295036.2020.1832697"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.258"},{"key":"e_1_3_2_1_31_1","volume-title":"Ethical issues in open source software. Journal of Information, Communication and Ethics in Society","author":"Grodzinsky S","year":"2003","unstructured":"Frances\u00a0S Grodzinsky, Keith Miller, and Marty\u00a0J Wolf. 2003. Ethical issues in open source software. Journal of Information, Communication and Ethics in Society (2003)."},{"key":"e_1_3_2_1_32_1","volume-title":"Motivation of software developers in Open Source projects: an Internet-based survey of contributors to the Linux kernel. Research policy 32, 7","author":"Hertel Guido","year":"2003","unstructured":"Guido Hertel, Sven Niedner, and Stefanie Herrmann. 2003. Motivation of software developers in Open Source projects: an Internet-based survey of contributors to the Linux kernel. Research policy 32, 7 (2003), 1159\u20131177."},{"key":"e_1_3_2_1_33_1","first-page":"473","article-title":"Open source AI","volume":"171","author":"Hibbard Bill","year":"2008","unstructured":"Bill Hibbard. 2008. Open source AI. Frontiers in Artificial Intelligence and Applications 171 (2008), 473.","journal-title":"Frontiers in Artificial Intelligence and Applications"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300830"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.02.005"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Don Ihde. 1990. Technology and the lifeworld: From garden to earth. (1990).","DOI":"10.2979\/3108.0"},{"key":"e_1_3_2_1_37_1","unstructured":"Sue\u00a0Curry Jansen and Brian Martin. 2015. The Streisand effect and censorship backfire. (2015)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/0049124114523396"},{"key":"e_1_3_2_1_39_1","volume-title":"The RIAA is coming for the YouTube downloaders. https:\/\/www.japantimes.co.jp\/news\/2020\/10\/02\/national\/crime-legal\/two-men-arrested-deepfake-pornography-videos\/. The Japan Times (2","year":"2020","unstructured":"Jiji. 2020. The RIAA is coming for the YouTube downloaders. https:\/\/www.japantimes.co.jp\/news\/2020\/10\/02\/national\/crime-legal\/two-men-arrested-deepfake-pornography-videos\/. The Japan Times (2 Oct. 2020). Accessed: 2021-07-1."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0088-2"},{"key":"e_1_3_2_1_41_1","volume-title":"Two bits: The cultural significance of free software","author":"Kelty M","unstructured":"Christopher\u00a0M Kelty. 2008. Two bits: The cultural significance of free software. Duke University Press."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3310433"},{"key":"e_1_3_2_1_43_1","volume-title":"Deepfakes: Trick or treat?Business Horizons 63, 2","author":"Kietzmann Jan","year":"2020","unstructured":"Jan Kietzmann, Linda\u00a0W Lee, Ian\u00a0P McCarthy, and Tim\u00a0C Kietzmann. 2020. Deepfakes: Trick or treat?Business Horizons 63, 2 (2020), 135\u2013146."},{"key":"e_1_3_2_1_44_1","unstructured":"Bruno Latour. 1994. On technical mediation. (1994)."},{"key":"e_1_3_2_1_45_1","unstructured":"Bruno Latour Wiebe\u00a0E Bijker and John Law. 1992. Shaping technology\/building society: Studies in sociotechnical change. W. Bijker & J. Law (Eds.)(1992) 225\u2013258."},{"key":"e_1_3_2_1_46_1","volume-title":"Paradigmatic controversies, contradictions, and emerging confluences, revisited","author":"Lincoln S","year":"2011","unstructured":"Yvonna\u00a0S Lincoln, Susan\u00a0A Lynham, and Egon\u00a0G Guba. 2011. Paradigmatic controversies, contradictions, and emerging confluences, revisited. The Sage handbook of qualitative research 4 (2011), 97\u2013128."},{"key":"e_1_3_2_1_47_1","volume-title":"The Mythos of Model Interpretability: In machine learning, the concept of interpretability is both important and slippery.Queue 16, 3","author":"Lipton C","year":"2018","unstructured":"Zachary\u00a0C Lipton. 2018. The Mythos of Model Interpretability: In machine learning, the concept of interpretability is both important and slippery.Queue 16, 3 (2018), 31\u201357."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X980100020301"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376445"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/23268743.2020.1757499"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.29173\/irie87"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441794"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1353\/sor.2019.0022"},{"key":"e_1_3_2_1_54_1","unstructured":"Matthew\u00a0B Miles and A\u00a0Michael Huberman. 1994. Qualitative data analysis: An expanded sourcebook. sage."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0114-4"},{"key":"e_1_3_2_1_56_1","unstructured":"Lewis Mumford. 1970. The pentagon of power. Vol.\u00a02. Houghton Mifflin Harcourt P."},{"key":"e_1_3_2_1_57_1","volume-title":"Beyond Asimov: the three laws of responsible robotics","author":"Murphy Robin","year":"2009","unstructured":"Robin Murphy and David\u00a0D Woods. 2009. Beyond Asimov: the three laws of responsible robotics. IEEE intelligent systems 24, 4 (2009), 14\u201320."},{"key":"e_1_3_2_1_58_1","volume-title":"Computer Ethics","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum. 2017. Computing and accountability. In Computer Ethics. Routledge, 273\u2013280."},{"key":"e_1_3_2_1_59_1","volume-title":"Membership herding and network stability in the open source community: The Ising perspective. Management science 53, 7","author":"Oh Wonseok","year":"2007","unstructured":"Wonseok Oh and Sangyong Jeon. 2007. Membership herding and network stability in the open source community: The Ising perspective. Management science 53, 7 (2007), 1086\u20131101."},{"key":"e_1_3_2_1_60_1","volume-title":"Backstabber\u2019s Knife Collection: A Review of Open Source Software Supply Chain Attacks. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 23\u201343","author":"Ohm Marc","year":"2020","unstructured":"Marc Ohm, Henrik Plate, Arnold Sykosch, and Michael Meier. 2020. Backstabber\u2019s Knife Collection: A Review of Open Source Software Supply Chain Attacks. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 23\u201343."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2020.1713842"},{"key":"e_1_3_2_1_62_1","volume-title":"The culture of technology","author":"Pacey Arnold","unstructured":"Arnold Pacey. 1983. The culture of technology. MIT press."},{"key":"e_1_3_2_1_63_1","volume-title":"The emerging economic paradigm of open source. First Monday","author":"Perens Bruce","year":"2005","unstructured":"Bruce Perens. 2005. The emerging economic paradigm of open source. First Monday (2005)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/2817915.2817918"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023395631811"},{"key":"e_1_3_2_1_66_1","unstructured":"Cynthia Rudin Caroline Wang and Beau Coker. 2018. The age of secrecy and unfairness in recidivism prediction. arXiv preprint arXiv:1811.00731(2018)."},{"key":"e_1_3_2_1_67_1","unstructured":"John Ruggie. 2011.."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1891\/0886-6708.8.4.339"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.2307\/222715"},{"key":"e_1_3_2_1_70_1","unstructured":"Evan Selinger. 2012. The Philosophy of the Technology of the Gun. The Atlantic 23(2012)."},{"key":"e_1_3_2_1_71_1","volume-title":"Why programs must not limit the freedom to run them. https:\/\/www.gnu.org\/philosophy\/free-sw.en.html","author":"Stallman Richard","year":"2016","unstructured":"Richard Stallman. 2016. Why programs must not limit the freedom to run them. https:\/\/www.gnu.org\/philosophy\/free-sw.en.html. The Free Software Foundation (18 Nov. 2016). Accessed: 2021-07-1."},{"key":"e_1_3_2_1_72_1","first-page":"169","article-title":"What is free software?, The Free Software Definition","volume":"1","author":"Stallman Richard","year":"2021","unstructured":"Richard Stallman 2021. What is free software?, The Free Software Definition, Version 1.169. https:\/\/www.gnu.org\/philosophy\/free-sw.en.html. The Free Software Foundation (2 Feb. 2021). Accessed: 2021-07-1.","journal-title":"Version"},{"key":"e_1_3_2_1_73_1","volume-title":"The Cultural Life of Machine Learning","author":"Stark Luke","unstructured":"Luke Stark, Daniel Greene, and Anna\u00a0Lauren Hoffmann. 2021. Critical Perspectives on Governance Mechanisms for AI\/ML Systems. In The Cultural Life of Machine Learning. Springer, 257\u2013280."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9.552"},{"key":"e_1_3_2_1_75_1","volume-title":"Grounded theory in practice","author":"Strauss Anselm","unstructured":"Anselm Strauss and Juliet\u00a0M Corbin. 1997. Grounded theory in practice. Sage."},{"key":"e_1_3_2_1_76_1","unstructured":"David\u00a0R Thomas. 2003. A general inductive approach for qualitative data analysis. (2003)."},{"key":"e_1_3_2_1_77_1","volume-title":"History of the OSI (Open Source Initiative). Retrieved February 4(2009)","author":"Tiemann M","year":"2009","unstructured":"M Tiemann and Open\u00a0Source Initiative. 2009. History of the OSI (Open Source Initiative). Retrieved February 4(2009), 2009."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Marcus Tomalin Bill Byrne Shauna Concannon Danielle Saunders and Stefanie Ullmann. 2021. The practical ethics of bias reduction in machine translation: Why domain adaptation is better than data debiasing. Ethics and Information Technology(2021) 1\u201315.","DOI":"10.1007\/s10676-021-09583-1"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Joachim Van\u00a0den Bergh and Dirk Deschoolmeester. 2010. Ethical decision making in ICT: discussing the impact of an ethical code of conduct. Communications of the IBIMA(2010) 1\u201310.","DOI":"10.5171\/2010.127497"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174014"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1515\/opis-2019-0003"},{"key":"e_1_3_2_1_82_1","volume-title":"Google Will Not Renew Pentagon Contract That Upset Employees. https:\/\/www.nytimes.com\/2018\/06\/01\/technology\/google-pentagon-project-maven.html. The New York Times (1","author":"Wakabayashi Daisuke","year":"2018","unstructured":"Daisuke Wakabayashi and Scott Shane. 2018. Google Will Not Renew Pentagon Contract That Upset Employees. https:\/\/www.nytimes.com\/2018\/06\/01\/technology\/google-pentagon-project-maven.html. The New York Times (1 June 2018). Accessed: 2021-07-1."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2328909.2328916"},{"key":"e_1_3_2_1_84_1","volume-title":"Learning from strangers: The art and method of qualitative interview studies","author":"Weiss S","unstructured":"Robert\u00a0S Weiss. 1995. Learning from strangers: The art and method of qualitative interview studies. Simon and Schuster."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488666"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1080\/23268743.2019.1642794"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/563517.563464"},{"key":"e_1_3_2_1_88_1","first-page":"3","article-title":"On the Responsibility for Uses of Downstream Software","volume":"2019","author":"Wolf J","year":"2019","unstructured":"Marty\u00a0J Wolf, Keith\u00a0W Miller, and Frances\u00a0S Grodzinsky. 2019. On the Responsibility for Uses of Downstream Software. Computer Ethics-Philosophical Enquiry (CEPE) Proceedings 2019, 1(2019), 3.","journal-title":"Computer Ethics-Philosophical Enquiry (CEPE) Proceedings"},{"key":"e_1_3_2_1_89_1","volume-title":"Case study research and applications: Design and methods","author":"Yin K","unstructured":"Robert\u00a0K Yin. 2017. Case study research and applications: Design and methods. Sage publications."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338918"}],"event":{"name":"FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency","location":"Seoul Republic of Korea","acronym":"FAccT '22","sponsor":["ACM Association for Computing Machinery"]},"container-title":["2022 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533779","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531146.3533779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:30Z","timestamp":1750188690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533779"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,20]]},"references-count":90,"alternative-id":["10.1145\/3531146.3533779","10.1145\/3531146"],"URL":"https:\/\/doi.org\/10.1145\/3531146.3533779","relation":{},"subject":[],"published":{"date-parts":[[2022,6,20]]},"assertion":[{"value":"2022-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}