{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:07:05Z","timestamp":1777493225044,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":145,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3581308","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:26:08Z","timestamp":1681964768000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Rethinking \"Risk\" in Algorithmic Systems Through A Computational Narrative Analysis of Casenotes in Child-Welfare"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5566-7409","authenticated-orcid":false,"given":"Devansh","family":"Saxena","sequence":"first","affiliation":[{"name":"Department of Computer Science, Marquette University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3233-9773","authenticated-orcid":false,"given":"Erina Seh-Young","family":"Moon","sequence":"additional","affiliation":[{"name":"University of Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5665-3874","authenticated-orcid":false,"given":"Aryan","family":"Chaurasia","sequence":"additional","affiliation":[{"name":"University of Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1507-3371","authenticated-orcid":false,"given":"Yixin","family":"Guan","sequence":"additional","affiliation":[{"name":"Faculty of Information, University of Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0073-2378","authenticated-orcid":false,"given":"Shion","family":"Guha","sequence":"additional","affiliation":[{"name":"Faculty of Information, University of Toronto, Canada and Department of Computer Science, University of Toronto, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003370"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.52214\/cjrl.v11i4.8741"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372871"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380066"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1523_5"},{"key":"e_1_3_3_3_6_1","unstructured":"Social\u00a0Security Administration. 2021. State-specific data. https:\/\/www.ssa.gov\/OACT\/babynames\/limits.html"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300760"},{"key":"e_1_3_3_3_8_1","unstructured":"Philip Alston. 2019. Report of the Special Rapporteur on Extreme Poverty and Human Rights Seventy-Fourth Session."},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449114"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v17i1\/2.12930"},{"key":"e_1_3_3_3_11_1","unstructured":"Maria Antoniak. 2022. Modeling Personal Experiences Shared in Online Communities. (2022)."},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","unstructured":"Maria Antoniak and David Mimno. 2021. Bad Seeds: Evaluating Lexical Methods for Bias Measurement. In Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers). Association for Computational Linguistics Online 1889\u20131904. https:\/\/doi.org\/10.18653\/v1\/2021.acl-long.148","DOI":"10.18653\/v1"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359190"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359190"},{"key":"e_1_3_3_3_15_1","volume-title":"Human-Centered Data Science: An Introduction","author":"Aragon Cecilia","unstructured":"Cecilia Aragon, Shion Guha, Marina Kogan, Michael Muller, and Gina Neff. 2022. Human-Centered Data Science: An Introduction. MIT Press."},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2021.104318"},{"key":"e_1_3_3_3_17_1","volume-title":"SOCIAL IMPACT MEETS AI: We exist to give clinicians a deeper understanding of the people they care for. Link: https:\/\/www.augintel.us\/about.","year":"2022","unstructured":"Augintel. 2022. SOCIAL IMPACT MEETS AI: We exist to give clinicians a deeper understanding of the people they care for. Link: https:\/\/www.augintel.us\/about."},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40471-020-00252-3"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300497"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2005.06.003"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"crossref","unstructured":"Eric\u00a0PS Baumer David Mimno Shion Guha Emily Quan and Geri\u00a0K Gay. 2017. Comparing grounded theory and topic modeling: Extreme divergence or unlikely convergence?Journal of the Association for Information Science and Technology 68 6(2017) 1397\u20131410.","DOI":"10.1002\/asi.23786"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445481"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533083"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_3_3_25_1","volume-title":"From street-level to system-level bureaucracies: how information and communication technology is transforming administrative discretion and constitutional control. Public administration review 62, 2","author":"Bovens Mark","year":"2002","unstructured":"Mark Bovens and Stavros Zouridis. 2002. From street-level to system-level bureaucracies: how information and communication technology is transforming administrative discretion and constitutional control. Public administration review 62, 2 (2002), 174\u2013184."},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"crossref","unstructured":"Jordan Boyd-Graber Yuening Hu David Mimno 2017. Applications of topic models. Foundations and Trends\u00ae in Information Retrieval 11 2-3(2017) 143\u2013296.","DOI":"10.1561\/1500000030"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300271"},{"key":"e_1_3_3_3_28_1","unstructured":"United States\u00a0Census Bureau. 2016. File B: Surnames occurring 100 or more times. https:\/\/www.census.gov\/topics\/population\/genealogy\/data\/2010_surnames.html"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.3233\/IP-170050"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aal4230"},{"key":"e_1_3_3_3_31_1","volume-title":"Revitalising communities in a globalising world","author":"Callahan Marilyn","unstructured":"Marilyn Callahan and Karen Swift. 2018. The paradox of risk assessment, child safety and empowerment in child welfare. In Revitalising communities in a globalising world. Routledge, 67\u201377."},{"key":"e_1_3_3_3_32_1","volume-title":"Model Positionality and Computational Reflexivity: Promoting Reflexivity in Data Science. In CHI Conference on Human Factors in Computing Systems. 1\u201319","author":"Cambo Scott\u00a0Allen","year":"2022","unstructured":"Scott\u00a0Allen Cambo and Darren Gergle. 2022. Model Positionality and Computational Reflexivity: Promoting Reflexivity in Data Science. In CHI Conference on Human Factors in Computing Systems. 1\u201319."},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52705-1_10"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/15433714.2013.788953"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819963"},{"key":"e_1_3_3_3_36_1","volume-title":"How Child Welfare Workers Reduce Racial Disparities in Algorithmic Decisions. In CHI Conference on Human Factors in Computing Systems. 1\u201322","author":"Cheng Hao-Fei","year":"2022","unstructured":"Hao-Fei Cheng, Logan Stapleton, Anna Kawakami, Venkatesh Sivaraman, Yanghuidi Cheng, Diana Qing, Adam Perer, Kenneth Holstein, Zhiwei\u00a0Steven Wu, and Haiyi Zhu. 2022. How Child Welfare Workers Reduce Racial Disparities in Algorithmic Decisions. In CHI Conference on Human Factors in Computing Systems. 1\u201322."},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501831"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517716"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.52214\/cjrl.v11i3.8740"},{"key":"e_1_3_3_3_40_1","unstructured":"Common Core. 2018. Knowledge & Skill Reinforcement Lab: Case Planning Service Delivery Block. (2018)."},{"key":"e_1_3_3_3_41_1","volume-title":"Developing predictive risk models to support child maltreatment hotline screening decisions","author":"County Allegheny","unstructured":"Allegheny County. 2017. Developing predictive risk models to support child maltreatment hotline screening decisions. Pittsburgh, PA, Allegheny County Department of Human Services, available online at: https:\/\/www. alleghenycountyanalytics. us\/index. php\/2017\/04\/17\/developing-predictive-risk-models-support-child-maltreatment-hotline-screening-decisions\/(accessed November 22, 2018) (2017)."},{"key":"e_1_3_3_3_42_1","volume-title":"Educational research: Planning, conducting, and evaluating quantitative and qualitative research","author":"W Cresswell","year":"2012","unstructured":"John\u00a0W Cresswell 2012. Educational research: Planning, conducting, and evaluating quantitative and qualitative research. Lincoln: Pearson (2012)."},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2012.07.008"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.erss.2020.101704"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2011.04.005"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174016"},{"key":"e_1_3_3_3_47_1","volume-title":"The accuracy, fairness, and limits of predicting recidivism. Science advances 4, 1","author":"Dressel Julia","year":"2018","unstructured":"Julia Dressel and Hany Farid. 2018. The accuracy, fairness, and limits of predicting recidivism. Science advances 4, 1 (2018), eaao5580."},{"key":"e_1_3_3_3_48_1","volume-title":"Automating inequality: How high-tech tools profile, police, and punish the poor","author":"Eubanks Virginia","unstructured":"Virginia Eubanks. 2018. Automating inequality: How high-tech tools profile, police, and punish the poor. St. Martin\u2019s Press."},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1086\/589780"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_3_3_51_1","volume-title":"National\u00a0Coalition for Child Protection\u00a0Reform","author":"NCCPR","year":"2017","unstructured":"NCCPR: National\u00a0Coalition for Child Protection\u00a0Reform. 2017. Los Angeles County quietly drops its first child welfare predictive analytics experiment. Link: https:\/\/www.nccprblog.org\/2017\/05\/los-angeles-county-quietly-drops-its.html."},{"key":"e_1_3_3_3_52_1","unstructured":"Capacity Building\u00a0Center for States. 2018. Child Protective Services: A Guide for Caseworkers. https:\/\/www.childwelfare.gov\/pubPDFs\/cps2018.pdf"},{"key":"e_1_3_3_3_53_1","volume-title":"international conference on machine learning. PMLR, 1050\u20131059","author":"Gal Yarin","year":"2016","unstructured":"Yarin Gal and Zoubin Ghahramani. 2016. Dropout as a bayesian approximation: Representing model uncertainty in deep learning. In international conference on machine learning. PMLR, 1050\u20131059."},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1111\/soc4.12416"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00078"},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00078"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"crossref","unstructured":"Eileen Gambrill and Aron Shlonsky. 2000. Risk assessment in context.","DOI":"10.1016\/S0190-7409(00)00123-7"},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0190-7409(00)00124-9"},{"key":"e_1_3_3_3_59_1","unstructured":"Child Welfare\u00a0Information Gateway. 2022. Community and Environmental Factors That Contribute to Child Abuse and Neglect. Link: https:\/\/www.childwelfare.gov\/topics\/can\/factors\/environmental\/."},{"key":"e_1_3_3_3_60_1","unstructured":"Child Welfare\u00a0Information Gateway. 2022. Family Preservation Services. https:\/\/www.childwelfare.gov\/topics\/supporting\/preservation"},{"key":"e_1_3_3_3_61_1","unstructured":"Child Welfare\u00a0Information Gateway. 2022. Poverty and Economic Conditions. https:\/\/www.childwelfare.gov\/topics\/can\/factors\/contribute\/environmental."},{"key":"e_1_3_3_3_62_1","unstructured":"Child Welfare\u00a0Information Gateway. 2022. Risk Factors That Contribute to Child Abuse and Neglect. Link: https:\/\/www.childwelfare.gov\/topics\/can\/factors\/."},{"key":"e_1_3_3_3_63_1","unstructured":"Child Welfare\u00a0Information Gateway. 2022. Substance Use by Parents and Caregivers. Link: www.childwelfare.gov\/topics\/can\/factors\/parentcaregiver\/substance."},{"key":"e_1_3_3_3_64_1","volume-title":"Community Approaches to Child Welfare","author":"Gilroy Joan","unstructured":"Joan Gilroy. 2018. Critical issues in child welfare: Perspectives from the field. In Community Approaches to Child Welfare. Routledge, 25\u201344."},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901877"},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502004"},{"key":"e_1_3_3_3_67_1","first-page":"753","article-title":"The Client: How States Are Profiting from the Child\u2019s Right to Protection","volume":"48","author":"Gossett Leith\u00a0Duke","year":"2017","unstructured":"DeLeith\u00a0Duke Gossett. 2017. The Client: How States Are Profiting from the Child\u2019s Right to Protection. U. Mem. L. Rev. 48(2017), 753.","journal-title":"U. Mem. L. Rev."},{"key":"e_1_3_3_3_68_1","unstructured":"Travis Greene Galit Shmueli Jan Fell Ching-Fu Lin Mark\u00a0L Shope and Han-Wei Liu. 2020. The Hidden Inconsistencies Introduced by Predictive Algorithms in Judicial Decision Making. arXiv preprint arXiv:2012.00289(2020)."},{"key":"e_1_3_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.52214\/cjrl.v11i3.8749"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209281.3209404"},{"key":"e_1_3_3_3_71_1","unstructured":"Sally Ho and Garance Burke.\u00a0Associated Press. April 2022. An algorithm that screens for child neglect raises concerns. Link: https:\/\/apnews.com\/article\/child-welfare-algorithm-investigation-9497ee937e0053ad4144a86c68241ef1."},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420149"},{"key":"e_1_3_3_3_73_1","unstructured":"SAS Institute. 2022. Analytics for Child Well-Being. Link: https:\/\/www.sas.com\/en_us\/software\/analytics-for-child-well-being.html."},{"key":"e_1_3_3_3_74_1","unstructured":"SAS Institute. 2022. ECKERD RAPID SAFETY FEEDBACK. Link: https:\/\/eckerd.org\/family-children-services\/ersf\/."},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1111\/psj.12343"},{"key":"e_1_3_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6894-4"},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.poetic.2013.08.005"},{"key":"e_1_3_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517439"},{"key":"e_1_3_3_3_79_1","volume-title":"Worker-AI Interface Design Concepts. In Designing Interactive Systems Conference. 454\u2013470","author":"Kawakami Anna","year":"2022","unstructured":"Anna Kawakami, Venkatesh Sivaraman, Logan Stapleton, Hao-Fei Cheng, Adam Perer, Zhiwei\u00a0Steven Wu, Haiyi Zhu, and Kenneth Holstein. 2022. \u201cWhy Do I Care What\u2019s Similar?\u201d Probing Challenges in AI-Assisted Child Welfare Decision-Making through Worker-AI Interface Design Concepts. In Designing Interactive Systems Conference. 454\u2013470."},{"key":"e_1_3_3_3_80_1","volume-title":"The ethics of predictive risk modelling in the Aotearoa\/New Zealand child welfare context: Child abuse prevention or neo-liberal tool?Critical Social Policy 35, 1","author":"Keddell Emily","year":"2015","unstructured":"Emily Keddell. 2015. The ethics of predictive risk modelling in the Aotearoa\/New Zealand child welfare context: Child abuse prevention or neo-liberal tool?Critical Social Policy 35, 1 (2015), 69\u201388."},{"key":"e_1_3_3_3_81_1","volume-title":"What uncertainties do we need in bayesian deep learning for computer vision?Advances in neural information processing systems 30","author":"Kendall Alex","year":"2017","unstructured":"Alex Kendall and Yarin Gal. 2017. What uncertainties do we need in bayesian deep learning for computer vision?Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_3_3_82_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition. 7482\u20137491","author":"Kendall Alex","year":"2018","unstructured":"Alex Kendall, Yarin Gal, and Roberto Cipolla. 2018. Multi-task learning using uncertainty to weigh losses for scene geometry and semantics. In Proceedings of the IEEE conference on computer vision and pattern recognition. 7482\u20137491."},{"key":"e_1_3_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/15228835.2022.2042461"},{"key":"e_1_3_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2014.03.009"},{"key":"e_1_3_3_3_85_1","volume-title":"Proceedings of the 33rd annual ACM conference on human factors in computing systems. 3127\u20133136","author":"Koeman Lisa","year":"2015","unstructured":"Lisa Koeman, Vaiva Kalnikait\u00e9, and Yvonne Rogers. 2015. \" Everyone Is Talking about It!\" A Distributed Approach to Urban Voting Technology and Visualisations. In Proceedings of the 33rd annual ACM conference on human factors in computing systems. 3127\u20133136."},{"key":"e_1_3_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2021.106039"},{"key":"e_1_3_3_3_87_1","volume-title":"Does playing violent video games cause aggression? A longitudinal intervention study. Molecular psychiatry 24, 8","author":"K\u00fchn Simone","year":"2019","unstructured":"Simone K\u00fchn, Dimitrij\u00a0Tycho Kugler, Katharina Schmalen, Markus Weichenberger, Charlotte Witt, and J\u00fcrgen Gallinat. 2019. Does playing violent video games cause aggression? A longitudinal intervention study. Molecular psychiatry 24, 8 (2019), 1220\u20131234."},{"key":"e_1_3_3_3_88_1","volume-title":"Resilience in children, families, and communities","author":"Leadbeater Bonnie","unstructured":"Bonnie Leadbeater, Dan Dodgen, and Andrea Solarz. 2005. The resilience revolution. In Resilience in children, families, and communities. Springer, 47\u201361."},{"key":"e_1_3_3_3_89_1","volume-title":"Transcending new public management: the transformation of public sector reforms","author":"L\u00cagreid Per","unstructured":"Per L\u00cagreid. 2017. Transcending new public management: the transformation of public sector reforms. Routledge."},{"key":"e_1_3_3_3_90_1","volume-title":"Stories of successful reunification: A narrative study of family resilience in child welfare. Families in society 92, 2","author":"Lietz A","year":"2011","unstructured":"Cynthia\u00a0A Lietz and Margaret Strength. 2011. Stories of successful reunification: A narrative study of family resilience in child welfare. Families in society 92, 2 (2011), 203\u2013210."},{"key":"e_1_3_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1080\/15710882.2019.1631354"},{"key":"e_1_3_3_3_92_1","volume-title":"Street-level bureaucracy: Dilemmas of the individual in public service","author":"Lipsky Michael","unstructured":"Michael Lipsky. 2010. Street-level bureaucracy: Dilemmas of the individual in public service. Russell Sage Foundation."},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210586.3210595"},{"key":"e_1_3_3_3_94_1","volume-title":"Predictive uncertainty estimation via prior networks. Advances in neural information processing systems 31","author":"Malinin Andrey","year":"2018","unstructured":"Andrey Malinin and Mark Gales. 2018. Predictive uncertainty estimation via prior networks. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470708"},{"key":"e_1_3_3_3_96_1","unstructured":"Curtis McMillen Jill Rowe and Nicole Fedoravicuis. 2006. Views of the Quality of Mental Health Services Received by Child Welfare Consumers. (2006)."},{"key":"e_1_3_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359144"},{"key":"e_1_3_3_3_98_1","unstructured":"Lynne Miller. 2009. \u201cYou Have to Get It Together\u201d ASFA\u2019s Impact on Parents and Families. Intentions and Results(2009) 36."},{"key":"e_1_3_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-soc-073117-041106"},{"key":"e_1_3_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957280"},{"key":"e_1_3_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1111\/cfs.12589"},{"key":"e_1_3_3_3_102_1","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2020.00062"},{"key":"e_1_3_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2019.03.034"},{"key":"e_1_3_3_3_104_1","unstructured":"NPR. June 2022. Oregon is dropping an artificial intelligence tool used in child welfare system. Link: https:\/\/www.npr.org\/2022\/06\/02\/1102661376\/oregon-drops-artificial-intelligence-child-abuse-cases."},{"key":"e_1_3_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376780"},{"key":"e_1_3_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chiabu.2022.105856"},{"key":"e_1_3_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445103"},{"key":"e_1_3_3_3_108_1","doi-asserted-by":"publisher","DOI":"10.1080\/15548732.2015.1060918"},{"key":"e_1_3_3_3_109_1","unstructured":"Predict-Align-Prevent. 2022. Stopping Child Maltreatment Before it Happens. Link: https:\/\/papreports.org\/little-rock-ar\/."},{"key":"e_1_3_3_3_110_1","volume-title":"Datafied child welfare services: unpacking politics, economics and power. Policy Studies","author":"Redden Joanna","year":"2020","unstructured":"Joanna Redden, Lina Dencik, and Harry Warne. 2020. Datafied child welfare services: unpacking politics, economics and power. Policy Studies (2020), 1\u201320."},{"key":"e_1_3_3_3_111_1","volume-title":"Analyzing Social Media Data to Understand Consumer Information Needs on Dietary Supplements. Stud Health Technol Inform 264 (Aug","author":"Rizvi F","year":"2019","unstructured":"Rubina\u00a0F Rizvi, Yefeng Wang, Thao Nguyen, Jake Vasilakes, Jiang Bian, Zhe He, and Rui Zhang. 2019. Analyzing Social Media Data to Understand Consumer Information Needs on Dietary Supplements. Stud Health Technol Inform 264 (Aug. 2019), 323\u2013327."},{"key":"e_1_3_3_3_112_1","first-page":"881","article-title":"Child welfare\u2019s paradox","volume":"49","author":"Roberts E","year":"2007","unstructured":"Dorothy\u00a0E Roberts. 2007. Child welfare\u2019s paradox. Wm. & Mary L. Rev. 49(2007), 881.","journal-title":"Wm. & Mary L. Rev."},{"key":"e_1_3_3_3_113_1","doi-asserted-by":"crossref","unstructured":"Samantha Robertson Tonya Nguyen and Niloufar Salehi. 2021. Modeling Assumptions Clash with the Real World: Transparency Equity and Community Challenges for Student Assignment Algorithms. arXiv preprint arXiv:2101.10367(2021).","DOI":"10.1145\/3411764.3445748"},{"key":"e_1_3_3_3_114_1","unstructured":"Samantha Robertson and Niloufar Salehi. 2020. What If I Don\u2019t Like Any Of The Choices? The Limits of Preference Elicitation for Participatory Algorithm Design. arXiv preprint arXiv:2007.06718(2020)."},{"key":"e_1_3_3_3_115_1","doi-asserted-by":"publisher","DOI":"10.1080\/15228835.2019.1616350"},{"key":"e_1_3_3_3_116_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2005.10.013"},{"key":"e_1_3_3_3_117_1","volume-title":"Family surveillance by algorithm: The rapidly spreading tools few have heard of","author":"Samant Anjana","year":"2021","unstructured":"Anjana Samant, Aaron Horowitz, Kath Xu, and Sophie Beiers. 2021. Family surveillance by algorithm: The rapidly spreading tools few have heard of. American Civil Liberties Union (ACLU)(2021)."},{"key":"e_1_3_3_3_118_1","volume-title":"Research Methods to Study & Empower Crowd Workers. Oxford","author":"Savage S","year":"2021","unstructured":"S Savage, C Toxtli, and E Betanzos. 2021. Research Methods to Study & Empower Crowd Workers. Oxford (2021)."},{"key":"e_1_3_3_3_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323994.3369888"},{"key":"e_1_3_3_3_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476089"},{"key":"e_1_3_3_3_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376229"},{"key":"e_1_3_3_3_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406865.3418331"},{"key":"e_1_3_3_3_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517742"},{"key":"e_1_3_3_3_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519771"},{"key":"e_1_3_3_3_125_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2069"},{"key":"e_1_3_3_3_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287598"},{"key":"e_1_3_3_3_127_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2010.02.004"},{"key":"e_1_3_3_3_128_1","volume-title":"The next step: Integrating actuarial risk assessment and clinical judgment into an evidence-based practice framework in CPS case management. Children and youth services review 27, 4","author":"Shlonsky Aron","year":"2005","unstructured":"Aron Shlonsky and Dennis Wagner. 2005. The next step: Integrating actuarial risk assessment and clinical judgment into an evidence-based practice framework in CPS case management. Children and youth services review 27, 4 (2005), 409\u2013427."},{"key":"e_1_3_3_3_129_1","volume-title":"Values Expectations for NLP Automation.","author":"Showkat Dilruba","year":"2022","unstructured":"Dilruba Showkat and Eric\u00a0PS Baumer. 2022. \u201cIt\u2019s Like the Value System in the Loop\u201d: Domain Experts\u2019 Values Expectations for NLP Automation. (2022)."},{"key":"e_1_3_3_3_130_1","volume-title":"Social Work Documentation","author":"Sidell L.","unstructured":"Nancy\u00a0L. Sidell. 2015. Social Work Documentation. NASW Press, Washington, DC, USA."},{"key":"e_1_3_3_3_131_1","volume-title":"Ann Light","author":"Soden Robert","year":"2022","unstructured":"Robert Soden, Laura Devendorf, Richmond Wong, Yoko Akama, Ann Light, 2022. Modes of Uncertainty in HCI. Foundations and Trends\u00ae in Human\u2013Computer Interaction 15, 4(2022), 317\u2013426."},{"key":"e_1_3_3_3_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533177"},{"key":"e_1_3_3_3_133_1","volume-title":"Critical Questions for Working with Local Governments & Impacted Communities. In Companion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing. 282\u2013286","author":"Stapleton Logan","year":"2022","unstructured":"Logan Stapleton, Devansh Saxena, Anna Kawakami, Tonya Nguyen, Asbj\u00f8rn Ammitzb\u00f8ll\u00a0Fl\u00fcgge, Motahhare Eslami, Naja Holten\u00a0M\u00f8ller, Min\u00a0Kyung Lee, Shion Guha, Kenneth Holstein, 2022. Who Has an Interest in \u201cPublic Interest Technology\u201d?: Critical Questions for Working with Local Governments & Impacted Communities. In Companion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing. 282\u2013286."},{"key":"e_1_3_3_3_134_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_3_3_135_1","unstructured":"Sarah Tan Julius Adebayo Kori Inkpen and Ece Kamar. 2018. Investigating human+ machine complementarity for recidivism predictions. arXiv preprint arXiv:1808.09123(2018)."},{"key":"e_1_3_3_3_136_1","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.2007.126722"},{"key":"e_1_3_3_3_137_1","unstructured":"MindShare Technology. 2022. Improving Outcomes using data you already have. Link: https:\/\/mindshare-technology.com\/analytics\/."},{"key":"e_1_3_3_3_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197391.3197394"},{"key":"e_1_3_3_3_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380199"},{"key":"e_1_3_3_3_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476060"},{"key":"e_1_3_3_3_141_1","unstructured":"Chicago Tribune. 2017. Data mining program designed to predict child abuse proves unreliable DCFS says. Link: https:\/\/www.chicagotribune.com\/investigations\/ct-dcfs-eckerd-met-20171206-story.html."},{"key":"e_1_3_3_3_142_1","volume-title":"Contextual and cultural aspects of resilience in child welfare settings. Putting a human face on child welfare: Voices from the Prairies","author":"Ungar Michael","year":"2007","unstructured":"Michael Ungar. 2007. Contextual and cultural aspects of resilience in child welfare settings. Putting a human face on child welfare: Voices from the Prairies (2007), 1\u201323."},{"key":"e_1_3_3_3_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174014"},{"key":"e_1_3_3_3_144_1","first-page":"301","article-title":"Artificial discretion as a tool of governance: a framework for understanding the impact of artificial intelligence on public administration","volume":"2","author":"Young M","year":"2019","unstructured":"Matthew\u00a0M Young, Justin\u00a0B Bullock, and Jesse\u00a0D Lecy. 2019. Artificial discretion as a tool of governance: a framework for understanding the impact of artificial intelligence on public administration. Perspectives on Public Management and Governance 2, 4 (2019), 301\u2013313.","journal-title":"Perspectives on Public Management and Governance"},{"key":"e_1_3_3_3_145_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501866"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581308","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:28Z","timestamp":1750178848000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":145,"alternative-id":["10.1145\/3544548.3581308","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3581308","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}