{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T20:50:10Z","timestamp":1760647810769,"version":"3.44.0"},"reference-count":114,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2023,4,16]],"date-time":"2023-04-16T00:00:00Z","timestamp":1681603200000},"content-version":"vor","delay-in-days":2,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1704303"],"award-info":[{"award-number":["1704303"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2023,4,14]]},"abstract":"<jats:p>Computer vision is a \"data hungry\" field. Researchers and practitioners who work on human-centric computer vision, like facial recognition, emphasize the necessity of vast amounts of data for more robust and accurate models. Humans are seen as a data resource which can be converted into datasets. The necessity of data has led to a proliferation of gathering data from easily available sources, including \"public\" data from the web. Yet the use of public data has significant ethical implications for the human subjects in datasets. We bridge academic conversations on the ethics of using publicly obtained data with concerns about privacy and agency associated with computer vision applications. Specifically, we examine how practices of dataset construction from public data-not only from websites, but also from public settings and public records-make it extremely difficult for human subjects to trace their images as they are collected, converted into datasets, distributed for use, and, in some cases, retracted. We discuss two interconnected barriers current data practices present to providing an ethics of traceability for human subjects: awareness and control. We conclude with key intervention points for enabling traceability for data subjects. We also offer suggestions for an improved ethics of traceability to enable both awareness and control for individual subjects in dataset curation practices.<\/jats:p>","DOI":"10.1145\/3579488","type":"journal-article","created":{"date-parts":[[2023,4,16]],"date-time":"2023-04-16T13:23:07Z","timestamp":1681651387000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["From Human to Data to Dataset: Mapping the Traceability of Human Subjects in Computer Vision Datasets"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6049-3965","authenticated-orcid":false,"given":"Morgan Klaus","family":"Scheuerman","sequence":"first","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9691-0591","authenticated-orcid":false,"given":"Katy","family":"Weathington","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4561-7261","authenticated-orcid":false,"given":"Tarun","family":"Mugunthan","sequence":"additional","affiliation":[{"name":"University of California Berkely, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4915-0512","authenticated-orcid":false,"given":"Remi","family":"Denton","sequence":"additional","affiliation":[{"name":"Google, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8743-4201","authenticated-orcid":false,"given":"Casey","family":"Fiesler","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,16]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"ACLU. 2020. Federal court rules 'Big Data' discrimination studies do not violate Federal anti-hacking law. https:\/\/www.aclu.org\/press-releases\/federal-court-rules-big-data-discrimination-studies-do-not-violate-federal-anti"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2109.13228"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-018-0036--2"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716654502"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/24701475.2018.1455412"},{"key":"e_1_2_1_6_1","volume-title":"Yoshua Bengio, and Alex Shee.","author":"Benjamin Misha","year":"2019","unstructured":"Misha Benjamin, Paul Gagnon, Negar Rostamzadeh, Christopher Joseph Pal, Yoshua Bengio, and Alex Shee. 2019. Towards Standardization of Data Licenses: The Montreal Data License. ArXiv, Vol. abs\/1903.1 (2019)."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445498"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287575"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00158"},{"key":"e_1_2_1_10_1","unstructured":"Rishi Bommasani Drew A Hudson Ehsan Adeli Russ Altman Simran Arora Sydney von Arx Michael S Bernstein Jeannette Bohg Antoine Bosselut Emma Brunskill Erik Brynjolfsson S Buch Dallas Card Rodrigo Castellon Niladri S Chatterji Annie S Chen Kathleen A Creel Jared Davis Dora Demszky Chris Donahue Moussa Doumbouya Esin Durmus Stefano Ermon John Etchemendy Kawin Ethayarajh Li Fei-Fei Chelsea Finn Trevor Gale Lauren E Gillespie Karan Goel Noah D Goodman Shelby Grossman Neel Guha Tatsunori Hashimoto Peter Henderson John Hewitt Daniel E Ho Jenny Hong Kyle Hsu Jing Huang Thomas F Icard Saahil Jain Dan Jurafsky Pratyusha Kalluri Siddharth Karamcheti Geoff Keeling Fereshte Khani O Khattab Pang Wei Koh Mark S Krass Ranjay Krishna Rohith Kuditipudi Ananya Kumar Faisal Ladhak Mina Lee Tony Lee Jure Leskovec Isabelle Levent Xiang Lisa Li Xuechen Li Tengyu Ma Ali Malik Christopher D Manning Suvir P Mirchandani Eric Mitchell Zanele Munyikwa Suraj Nair Avanika Narayan Deepak Narayanan Benjamin Newman Allen Nie Juan Carlos Niebles Hamed Nilforoshan J F Nyarko Giray Ogut Laurel Orr Isabel Papadimitriou Joon Sung Park Chris Piech Eva Portelance Christopher Potts Aditi Raghunathan Robert Reich Hongyu Ren Frieda Rong Yusuf H Roohani Camilo Ruiz Jack Ryan Christopher R'e Dorsa Sadigh Shiori Sagawa Keshav Santhanam Andy Shih Krishna Parasuram Srinivasan Alex Tamkin Rohan Taori Armin W Thomas Florian Tram\u00e8 r Rose E Wang William Wang Bohan Wu Jiajun Wu Yuhuai Wu Sang Michael Xie Michihiro Yasunaga Jiaxuan You Matei A Zaharia Michael Zhang Tianyi Zhang Xikun Zhang Yuhui Zhang Lucia Zheng Kaitlyn Zhou and Percy Liang. 2021. On the Opportunities and Risks of Foundation Models. ArXiv Vol. abs\/2108.0 (2021)."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/15614263.2021.1942873"},{"key":"e_1_2_1_12_1","volume-title":"Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification *. Technical Report. 1--15 pages.","author":"Buolamwini Joy","year":"2018","unstructured":"Joy Buolamwini and Timnit Gebru. 2018. Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification *. Technical Report. 1--15 pages."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359249"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Emil Chiauzzi and Paul Wicks. 2019. Digital trespass: Ethical and terms-of-use violations by researchers accessing data from an online patient community. e11985 pages. https:\/\/doi.org\/10.2196\/11985","DOI":"10.2196\/11985"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.3627170"},{"key":"e_1_2_1_16_1","volume-title":"Mike Ananny, Jason Schultz, and Kate Crawford.","author":"Corry Frances","year":"2021","unstructured":"Frances Corry, Hamsini Sridharan, Alexandra Sasha Luccioni, Mike Ananny, Jason Schultz, and Kate Crawford. 2021. The Problem of Zombie Datasets: A Framework For Deprecating Datasets. (2021). arxiv: 2111.04424 http:\/\/arxiv.org\/abs\/2111.04424"},{"key":"e_1_2_1_17_1","unstructured":"Alexander D'Amour Katherine Heller Dan Moldovan Ben Adlam Babak Alipanahi Alex Beutel Christina Chen Jonathan Deaton Jacob Eisenstein Matthew D. Hoffman Farhad Hormozdiari Neil Houlsby Shaobo Hou Ghassen Jerfel Alan Karthikesalingam Mario Lucic Yian Ma Cory McLean Diana Mincu Akinori Mitani Andrea Montanari Zachary Nado Vivek Natarajan Christopher Nielson Thomas F. Osborne Rajiv Raman Kim Ramasamy Rory Sayres Jessica Schrouff Martin Seneviratne Shannon Sequeira Harini Suresh Victor Veitch Max Vladymyrov Xuezhi Wang Kellie Webster Steve Yadlowsky Taedong Yun Xiaohua Zhai and D. Sculley. 2020. Underspecification presents challenges for credibility in modern machine learning. arxiv: 2011.03395 https:\/\/arxiv.org\/abs\/2011.03395v2"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1629\/2048-7754.171"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406865.3419015"},{"key":"e_1_2_1_21_1","volume-title":"Hilary Nicole, and Morgan Klaus Scheuerman.","author":"Denton Remi","year":"2020","unstructured":"Remi Denton, Alex Hanna, Razvan Amironesei, Andrew Smart, Hilary Nicole, and Morgan Klaus Scheuerman. 2020. Bringing the People Back In: Contesting Benchmark Machine Learning Datasets. (jul 2020). arxiv: 2007.07399 http:\/\/arxiv.org\/abs\/2007.07399"},{"key":"e_1_2_1_22_1","volume-title":"CVPR Workshops. 52--59","author":"DeVries Terrance","year":"1906","unstructured":"Terrance DeVries, Ishan Misra, Changhan Wang, and Laurens van der Maaten. 2019. Does Object Recognition Work for Everyone?. In CVPR Workshops. 52--59. arxiv: 1906.02659 http:\/\/arxiv.org\/abs\/1906.02659"},{"key":"e_1_2_1_23_1","volume-title":"Auditing ImageNet: Towards a Model-driven Framework for Annotating Demographic Attributes of Large-Scale Image Datasets. (may","author":"Dulhanty Chris","year":"2019","unstructured":"Chris Dulhanty and Alexander Wong. 2019. Auditing ImageNet: Towards a Model-driven Framework for Annotating Demographic Attributes of Large-Scale Image Datasets. (may 2019). arxiv: 1905.01347 http:\/\/arxiv.org\/abs\/1905.01347"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375875"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 14th International AAAI Conference on Web and Social Media, ICWSM 2020","volume":"14","author":"Fiesler Casey","unstructured":"Casey Fiesler, Nathan Beard, and Brian C. Keegan. 2020. No robots, spiders, or scrapers: Legal and ethical regulation of data collection methods in social media terms of service. In Proceedings of the 14th International AAAI Conference on Web and Social Media, ICWSM 2020, Vol. 14. 187--196. https:\/\/ojs.aaai.org\/index.php\/ICWSM\/article\/view\/7290"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3483283"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173627"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118763366"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458723"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372862"},{"key":"e_1_2_1_31_1","unstructured":"Dave Gershgorn. 2017. The data that transformed AI research - and possibly the world. https:\/\/qz.com\/1034972\/the-data-that-changed-the-direction-of-ai-research-and-possibly-the-world\/"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211033824"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","unstructured":"Sarah Gilbert Jessica Vitak and Katie Shilton. 2021b. Measuring Americans' Comfort With Research Uses of Their Social Media Data. https:\/\/doi.org\/10.1177\/20563051211033824","DOI":"10.1177\/20563051211033824"},{"key":"e_1_2_1_34_1","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Ginart Antonio A","year":"2019","unstructured":"Antonio A Ginart, Melody Y Guan, Gregory Valiant, and James Zou. 2019. Making AI forget you: Data deletion in machine learning. In Advances in Neural Information Processing Systems, Vol. 32. arxiv: 1907.05012"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--1--4471--2239--5_1"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819876944"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173582"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb"},{"key":"e_1_2_1_39_1","volume-title":"An Ethical Highlighter for People-Centric Dataset Creation. (nov","author":"Hanley Margot","year":"2020","unstructured":"Margot Hanley, Apoorv Khandelwal, Hadar Averbuch-Elor, Noah Snavely, and Helen Nissenbaum. 2020. An Ethical Highlighter for People-Centric Dataset Creation. (nov 2020). arxiv: 2011.13583 http:\/\/arxiv.org\/abs\/2011.13583"},{"key":"e_1_2_1_40_1","unstructured":"Adam Harvey and Jules LaPlace. 2021. Exposing.ai. https:\/\/exposing.ai\/"},{"key":"e_1_2_1_41_1","unstructured":"Christine Hauser. 2018. $6.4 Million Judgment in Revenge Porn Case Is Among Largest Ever. https:\/\/www.nytimes.com\/2018\/04\/11\/us\/revenge-porn-california.html"},{"key":"e_1_2_1_42_1","volume-title":"European Parliament calls for a ban on facial recognition ' POLITICO. POLITICO","author":"Melissa","year":"2021","unstructured":"Melissa Heikkil\"a. 2021. European Parliament calls for a ban on facial recognition ' POLITICO. POLITICO (2021). https:\/\/www.politico.eu\/article\/european-parliament-ban-facial-recognition-brussels\/"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/1556264617751510"},{"key":"e_1_2_1_44_1","unstructured":"Kashmir Hill and Aaron Krolik. 2019. How Photos of Your Kids Are Powering Surveillance Technology. https:\/\/www.nytimes.com\/interactive\/2019\/10\/11\/technology\/flickr-facial-recognition.html"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820958725"},{"key":"e_1_2_1_46_1","volume-title":"The Dataset Nutrition Label: A Framework To Drive Higher Data Quality Standards. (may","author":"Holland Sarah","year":"2018","unstructured":"Sarah Holland, Ahmed Hosny, Sarah Newman, Joshua Joseph, and Kasia Chmielinski. 2018. The Dataset Nutrition Label: A Framework To Drive Higher Data Quality Standards. (may 2018). arxiv: 1805.03677 http:\/\/arxiv.org\/abs\/1805.03677"},{"key":"e_1_2_1_47_1","unstructured":"James Vincent. 2017. Transgender YouTubers had their videos grabbed to train facial recognition software."},{"key":"e_1_2_1_48_1","volume-title":"The Conundrum Of User Data Deletion From ML Models. Analytics India Mag","author":"Jeevanandam Nivash","year":"2021","unstructured":"Nivash Jeevanandam. 2021. The Conundrum Of User Data Deletion From ML Models. Analytics India Mag (2021). https:\/\/analyticsindiamag.com\/data-deletion-from-ml-models\/"},{"key":"e_1_2_1_49_1","unstructured":"Sarah Jeong. 2014. Reddit As A Government. https:\/\/www.forbes.com\/sites\/sarahjeong\/2014\/09\/08\/reddit-as-a-government\/'sh=10ebeb57856d"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372829"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274357"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445920"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v17i5.12957"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12130-009--9086--8"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3528447"},{"key":"e_1_2_1_56_1","unstructured":"Amanda Levendowski. [n.d.]. Resisting Face Surveillance with Copyright Law. https:\/\/papers.ssrn.com\/abstract=3924647"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1093\/jiplp"},{"key":"e_1_2_1_58_1","volume-title":"Scraping the Web Is a Powerful Tool. Clearview AI Abused It. WIRED","author":"Matsakis Louise","year":"2020","unstructured":"Louise Matsakis. 2020. Scraping the Web Is a Powerful Tool. Clearview AI Abused It. WIRED (2020). https:\/\/www.wired.com\/story\/clearview-ai-scraping-web\/"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.2481\/dsj.12-039"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1126\/SCITRANSLMED.ABB1655"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. 23 pages. https:\/\/doi.org\/10.1145\/3359174","DOI":"10.1145\/3359174"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.2218\/ijdc.v7i1.216"},{"key":"e_1_2_1_63_1","unstructured":"Ryan Merkley. 2019. Use and Fair Use: Statement on shared images in facial recognition AI. https:\/\/creativecommons.org\/2019\/03\/13\/statement-on-shared-images-in-facial-recognition-ai\/"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716650211"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492853"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415186"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445880"},{"key":"e_1_2_1_68_1","volume-title":"Microsoft quietly deletes largest public face recognition data set. Financial Times","author":"Murgia Madhumita","year":"2019","unstructured":"Madhumita Murgia. 2019a. Microsoft quietly deletes largest public face recognition data set. Financial Times (2019). https:\/\/www.ft.com\/content\/7d3e0d6a-87a0--11e9-a028--86cea8523dc2"},{"key":"e_1_2_1_69_1","volume-title":"Who's using your face? The ugly truth about facial recognition. Financial Times","author":"Murgia Madhumita","year":"2019","unstructured":"Madhumita Murgia. 2019b. Who's using your face? The ugly truth about facial recognition. Financial Times (2019). https:\/\/www.ft.com\/content\/cf19b956--60a2--11e9-b285--3acd5d43599e"},{"key":"e_1_2_1_70_1","unstructured":"National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. 1979. The Belmont Report: Ethical principles and guidelines for the protection of human subjects of research. Technical Report. .S. Department of Health and Human Services."},{"key":"e_1_2_1_71_1","volume-title":"Mohammad Mahdi Dehshibi, and Dr. Azam Bastanfard.","author":"Nik Melika Abbasian","year":"2007","unstructured":"Melika Abbasian Nik, Melika Abbasian Nik, Mohammad Mahdi Dehshibi, and Dr. Azam Bastanfard. 2007. Iranian Face Database and Evaluation with a New Detection Algorithm. (2007). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.418.771"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780429468391"},{"key":"e_1_2_1_73_1","unstructured":"Olivia Solon. 2019. Facial recognition's 'dirty little secret': Millions of online photos scraped without consent. https:\/\/www.nbcnews.com\/tech\/internet\/facial-recognition-s-dirty-little-secret-millions-online-photos-scraped-n981921"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","unstructured":"Petter Olsen and Melania Borit. 2013. How to define traceability. 142--150 pages. https:\/\/doi.org\/10.1016\/j.tifs.2012.10.003","DOI":"10.1016\/j.tifs.2012.10.003"},{"key":"e_1_2_1_75_1","volume-title":"5th International Conference on Learning Representations, ICLR 2017 - Conference Track Proceedings. International Conference on Learning Representations, ICLR. arxiv: 1610","author":"Papernot Nicolas","year":"2017","unstructured":"Nicolas Papernot, Ian Goodfellow, Mart\u00ed n Abadi, Kunal Talwar, and \u00da lfar Erlingsson. 2017. Semi-supervised knowledge transfer for deep learning from private training data. In 5th International Conference on Learning Representations, ICLR 2017 - Conference Track Proceedings. International Conference on Learning Representations, ICLR. arxiv: 1610.05755 https:\/\/arxiv.org\/abs\/1610.05755v4"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287567"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492857"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2021.100336"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2021.100336"},{"key":"e_1_2_1_80_1","volume-title":"Mitigating Dataset Harms Requires Stewardship: Lessons from 1000 Papers. (aug","author":"Peng Kenny","year":"2021","unstructured":"Kenny Peng, Arunesh Mathur, and Arvind Narayanan. 2021. Mitigating Dataset Harms Requires Stewardship: Lessons from 1000 Papers. (aug 2021). arxiv: 2108.02922 https:\/\/arxiv.org\/abs\/2108.02922v1 http:\/\/arxiv.org\/abs\/2108.02922"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305117698493"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211019004"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375820"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531627"},{"key":"e_1_2_1_85_1","unstructured":"Jake Satisky. 2019. A Duke study recorded thousands of students' faces. Now they're being used all over the world. https:\/\/www.dukechronicle.com\/article\/2019\/06\/duke-university-facial-recognition-data-set-study-surveillance-video-students-china-uyghur"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476058"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517211053712"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359246"},{"key":"e_1_2_1_89_1","volume-title":"Brubaker","author":"Scheuerman Morgan Klaus","year":"2020","unstructured":"Morgan Klaus Scheuerman, Kandrea Wade, Caitlin Lustig, and Jed R. Brubaker. 2020. How We've Taught Algorithms to See Identity: Constructing Race and Gender in Image Databases for Facial Analysis. Proc. ACM Hum.-Comput. Interact., Vol. 4, CSCW1 (2020)."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102227"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517211040759"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.meatsci.2005.04.002"},{"key":"e_1_2_1_94_1","unstructured":"Julie Carr Smyth. 2021. States push back against use of facial recognition by police. https:\/\/abcnews.go.com\/Politics\/wireStory\/states-push-back-facial-recognition-police-77510175 https:\/\/apnews.com\/article\/race-and-ethnicity-health-coronavirus-pandemic-business-technology-e4266250f7e2d691d4d664735c2c6bc0"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3677548"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1080\/09502386.2021.1895252"},{"key":"e_1_2_1_97_1","volume-title":"A Framework for Understanding Unintended Consequences of Machine Learning. (2019). arxiv","author":"Suresh Harini","year":"1901","unstructured":"Harini Suresh and John V Guttag. 2019. A Framework for Understanding Unintended Consequences of Machine Learning. (2019). arxiv: 1901.10002 www.aaai.org http:\/\/arxiv.org\/abs\/1901.10002"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3205035"},{"key":"e_1_2_1_99_1","volume-title":"Letter: Video analysis research at Duke. https:\/\/www.dukechronicle.com\/article\/2019\/06\/duke-university-video-analysis-research-at-duke-carlo-tomasi","author":"Tomasi Carlo","year":"2019","unstructured":"Carlo Tomasi. 2019. Letter: Video analysis research at Duke. https:\/\/www.dukechronicle.com\/article\/2019\/06\/duke-university-video-analysis-research-at-duke-carlo-tomasi"},{"key":"e_1_2_1_100_1","unstructured":"Antonio Torralba Rob Fergus and Bill Freeman. 2020. 80 Million Tiny Images. https:\/\/groups.csail.mit.edu\/vision\/TinyImages\/"},{"key":"e_1_2_1_101_1","volume-title":"Vestager: Facial recognition tech breaches EU data protection rules. https:\/\/www.euractiv.com\/section\/digital\/news\/vestager-facial-recognition-tech-breaches-eu-data-protection-rules\/","author":"Valero Jorge","year":"2020","unstructured":"Jorge Valero. 2020. Vestager: Facial recognition tech breaches EU data protection rules. https:\/\/www.euractiv.com\/section\/digital\/news\/vestager-facial-recognition-tech-breaches-eu-data-protection-rules\/"},{"key":"e_1_2_1_102_1","volume-title":"Stereotyping and Bias in the Flickr30K Dataset. (may","author":"van Miltenburg Emiel","year":"2016","unstructured":"Emiel van Miltenburg. 2016. Stereotyping and Bias in the Flickr30K Dataset. (may 2016), 24. arxiv: 1605.06083 https:\/\/arxiv.org\/abs\/1605.06083v1"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1177\/1556264617725200"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820078"},{"key":"e_1_2_1_105_1","volume-title":"Balanced Datasets Are Not Enough: Estimating and Mitigating Gender Bias in Deep Image Representations. In 2019 IEEE\/CVF International Conference on Computer Vision (ICCV).","author":"Wang Tianlu","year":"2019","unstructured":"Tianlu Wang, Jieyu Zhao, Mark Yatskar, Kai-Wei Chang, and Vicente Ordonez. 2019. Balanced Datasets Are Not Enough: Estimating and Mitigating Gender Bias in Deep Image Representations. In 2019 IEEE\/CVF International Conference on Computer Vision (ICCV)."},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1353\/lib.2006.0053"},{"key":"e_1_2_1_107_1","volume-title":"Supreme Court revives LinkedIn case to protect user data from web scrapers. TechCrunch","author":"Whittaker Zack","year":"2021","unstructured":"Zack Whittaker. 2021. Supreme Court revives LinkedIn case to protect user data from web scrapers. TechCrunch (2021). https:\/\/techcrunch.com\/2021\/06\/14\/supreme-court-revives-linkedin-bid-to-protect-user-data-from-web-scrapers\/"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1068\/d7910"},{"key":"e_1_2_1_110_1","unstructured":"Stefan Wojcik Emma Remy and Chris Baronavski. 2019. How does a computer 'see' gender? Pew Research Center. https:\/\/www.pewresearch.org\/interactives\/how-does-a-computer-see-gender\/"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1323"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010--9227--5"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1108\/jices-08--2021-0086"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051221077021"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579488","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579488","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T17:23:33Z","timestamp":1755537813000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,14]]},"references-count":114,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2023,4,14]]}},"alternative-id":["10.1145\/3579488"],"URL":"https:\/\/doi.org\/10.1145\/3579488","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2023,4,14]]},"assertion":[{"value":"2023-04-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}