{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:04:04Z","timestamp":1776110644005,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Knight Foundation","award":["G-2022-65438"],"award-info":[{"award-number":["G-2022-65438"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,12]]},"DOI":"10.1145\/3593013.3594064","type":"proceedings-article","created":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T14:40:46Z","timestamp":1686580846000},"page":"1076-1087","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Co-Design Perspectives on Algorithm Transparency Reporting: Guidelines and Prototypes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9779-5003","authenticated-orcid":false,"given":"Michal","family":"Luria","sequence":"first","affiliation":[{"name":"Center for Democracy &amp; Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,12]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Asha Allan. 2022. A Series on the EU Digital Services Act: Due Diligence in Content Moderation. https:\/\/cdt.org\/insights\/a-series-on-the-eu-digital-services-act-due-diligence-in-content-moderation\/"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3421237"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816676645"},{"key":"e_1_3_2_2_4_1","unstructured":"Albert Prince III Antonie. 2022. Hiding OUT: A Case for Queer Experiences Informing Data Privacy Laws. https:\/\/publicknowledge.org\/hiding-out-a-case-for-queer-experiences-informing-data-privacy-laws\/"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445875"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2018.1510741"},{"key":"e_1_3_2_2_7_1","volume-title":"Contextual design. interactions 6, 1","author":"Beyer Hugh","year":"1999","unstructured":"Hugh Beyer and Karen Holtzblatt. 1999. Contextual design. interactions 6, 1 (1999), 32\u201342."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401034"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817750396"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365964"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"John Bowers. 2012. The logic of annotated portfolios: communicating the value of \u2019research through design\u2019. (2012) 10.","DOI":"10.1145\/2317956.2317968"},{"key":"e_1_3_2_2_12_1","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. (2006) 26."},{"key":"e_1_3_2_2_13_1","volume-title":"Experience Prototyping. In Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques.","author":"Buchenau Marion","year":"2000","unstructured":"Marion Buchenau and Jane Fulton. 2000. Experience Prototyping. In Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715622512"},{"key":"e_1_3_2_2_15_1","volume-title":"Exploring the function of member checking. The qualitative report 24, 3","author":"Candela Amber G","year":"2019","unstructured":"Amber G Candela. 2019. Exploring the function of member checking. The qualitative report 24, 3 (2019), 619\u2013628."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518735"},{"key":"e_1_3_2_2_17_1","unstructured":"Rumman Chowdhury and Jutta Williams. 2021. Introducing Twitter\u2019s first algorithmic bias bounty challenge. https:\/\/blog.twitter.com\/engineering\/en_us\/topics\/insights\/2021\/algorithmic-bias-bounty-challenge"},{"key":"e_1_3_2_2_18_1","volume-title":"Congress.","author":"US","year":"2021","unstructured":"US Congress. 2021. Algorithmic Justice and Online Platform Transparency Act. https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/3611."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533108"},{"key":"e_1_3_2_2_20_1","volume-title":"Aggarwal","author":"Davis Jason","year":"2020","unstructured":"Jason Davis and Vikas A. Aggarwal. 2020. How Spotify and TikTok Beat Their Copycats. Harvard Business Review (July 2020). https:\/\/hbr.org\/2020\/07\/how-spotify-and-tiktok-beat-their-copycats Section: Innovation."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462131"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2844110"},{"key":"e_1_3_2_2_23_1","volume-title":"Klein","author":"D\u2019Ignazio Catherine","year":"2020","unstructured":"Catherine D\u2019Ignazio and Lauren F. Klein. 2020. Data Feminism. MIT Press. Google-Books-ID: x5nSDwAAQBAJ."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445188"},{"key":"e_1_3_2_2_25_1","unstructured":"Kim Elsesser. 2021. Here\u2019s How Instagram Harms Young Women According To Research. https:\/\/www.forbes.com\/sites\/kimelsesser\/2021\/10\/05\/heres-how-instagram-harms-young-women-according-to-research\/ Section: Careers."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702556"},{"key":"e_1_3_2_2_27_1","unstructured":"Michael Friendly. 2006. A Brief History of Data Visualization."},{"key":"e_1_3_2_2_28_1","volume-title":"Hanna Wallach, Hal Daum\u00e9 III, and Kate Crawford.","author":"Gebru Timnit","year":"2021","unstructured":"Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna Wallach, Hal Daum\u00e9 III, and Kate Crawford. 2021. Datasheets for Datasets. http:\/\/arxiv.org\/abs\/1803.09010 arXiv:1803.09010 [cs]."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858171.1858189"},{"key":"e_1_3_2_2_30_1","unstructured":"Nekesha Green Chavez Procope Adeel Cheema and Adekunle Adediji. 2021. System Cards a new resource for understanding how AI systems work. https:\/\/ai.facebook.com\/blog\/system-cards-a-new-resource-for-understanding-how-ai-systems-work\/"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479610"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Kevin Hamilton Karrie Karahalios Christian Sandvig and Motahhare Eslami. 2014. A path to understanding the effects of algorithm awareness. In CHI\u201914 extended abstracts on human factors in computing systems. 631\u2013642.","DOI":"10.1145\/2559206.2578883"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.02.013"},{"key":"e_1_3_2_2_34_1","volume-title":"Voter Suppression and Racial Targeting: In Facebook\u2019s and Twitter\u2019s Words. The New York Times (Dec","author":"Hsu Tiffany","year":"2018","unstructured":"Tiffany Hsu. 2018. Voter Suppression and Racial Targeting: In Facebook\u2019s and Twitter\u2019s Words. The New York Times (Dec. 2018). https:\/\/www.nytimes.com\/2018\/12\/17\/business\/russia-voter-suppression-facebook-twitter.html"},{"key":"e_1_3_2_2_35_1","volume-title":"Food Businesses Lose Faith in Instagram After Algorithm Changes. The New York Times (March","author":"Hughes Becky","year":"2022","unstructured":"Becky Hughes. 2022. Food Businesses Lose Faith in Instagram After Algorithm Changes. The New York Times (March 2022). https:\/\/www.nytimes.com\/2022\/03\/22\/dining\/instagram-algorithm-reels.html"},{"key":"e_1_3_2_2_36_1","unstructured":"Wall Street Journal. 2021. Investigation: How TikTok\u2019s Algorithm Figures Out Your Deepest Desires. https:\/\/www.wsj.com\/video\/series\/inside-tiktoks-highly-secretive-algorithm\/investigation-how-tiktok-algorithm-figures-out-your-deepest-desires Section: Video."},{"key":"e_1_3_2_2_37_1","volume-title":"Intrusion of software robots into journalism: The public\u2019s and journalists","author":"Jung Jaemin","year":"2017","unstructured":"Jaemin Jung, Haeyeop Song, Youngju Kim, Hyunsuk Im, and Sewook Oh. 2017. Intrusion of software robots into journalism: The public\u2019s and journalists\u2019 perceptions of news written by algorithms and human journalists. Computers in human behavior 71 (2017), 291\u2013298."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_2_39_1","unstructured":"Ansgar Koene Chris Clifton Yohko Hatada Helena Webb and Rashida Richardson. 2019. A governance framework for algorithmic accountability and transparency. (2019)."},{"key":"e_1_3_2_2_40_1","volume-title":"Recommender systems: from algorithms to user experience. User modeling and user-adapted interaction 22","author":"Konstan Joseph A","year":"2012","unstructured":"Joseph A Konstan and John Riedl. 2012. Recommender systems: from algorithms to user experience. User modeling and user-adapted interaction 22 (2012), 101\u2013123."},{"key":"e_1_3_2_2_41_1","volume-title":"Design research through practice: From the lab, field, and showroom","author":"Koskinen Ilpo","unstructured":"Ilpo Koskinen, John Zimmerman, Thomas Binder, Johan Redstrom, and Stephan Wensveen. 2011. Design research through practice: From the lab, field, and showroom. Elsevier."},{"key":"e_1_3_2_2_42_1","unstructured":"Joshua A Kroll Joanna Huey Solon Barocas Edward W Felten Joel R Reidenberg David G Robinson and Harlan Yu. 2017. Accountable Algorithms. University of Pennsylvania Law Review 165 (2017)."},{"key":"e_1_3_2_2_43_1","first-page":"1","article-title":"What if conversational agents became invisible? comparing users\u2019 mental models according to physical entity of ai speaker","volume":"4","author":"Lee Sunok","year":"2020","unstructured":"Sunok Lee, Minji Cho, and Sangsu Lee. 2020. What if conversational agents became invisible? comparing users\u2019 mental models according to physical entity of ai speaker. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 3 (2020), 1\u201324.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_2_44_1","unstructured":"Kalev Leetaru. 2018. The Data Brokers So Powerful Even Facebook Bought Their Data - But They Got Me Wildly Wrong. https:\/\/www.forbes.com\/sites\/kalevleetaru\/2018\/04\/05\/the-data-brokers-so-powerful-even-facebook-bought-their-data-but-they-got-me-wildly-wrong\/ Section: Tech."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376590"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","unstructured":"Zachary C. Lipton. 2017. The Mythos of Model Interpretability. https:\/\/doi.org\/10.48550\/arXiv.1606.03490 arXiv:1606.03490 [cs stat].","DOI":"10.48550\/arXiv.1606.03490"},{"key":"e_1_3_2_2_47_1","unstructured":"Emma Llanso. 2021. Santa Clara Principles 2.0: Civil society recommendations for how companies states should protect free expression rights online. https:\/\/cdt.org\/insights\/santa-clara-principles-2-0-civil-society-recommendations-for-how-companies-states-should-protect-free-expression-rights-online\/"},{"key":"e_1_3_2_2_48_1","unstructured":"Emma Llans\u00f3 and Susan Morgan. 2014. Getting Specific About Transparency Privacy and Free Expression Online. https:\/\/cdt.nclud.com\/insights\/getting-specific-about-transparency-privacy-and-free-expression-online\/"},{"key":"e_1_3_2_2_49_1","volume-title":"The Quantified Self","author":"Lupton Deborah","unstructured":"Deborah Lupton. 2016. The Quantified Self. John Wiley & Sons. Google-Books-ID: GWdNDwAAQBAJ."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517536"},{"key":"e_1_3_2_2_51_1","volume-title":"Transparency Center: Types of content we demote. https:\/\/transparency.fb.com\/en-gb\/features\/approach-to-ranking\/types-of-content-we-demote\/.","year":"2022","unstructured":"Meta. 2022. Transparency Center: Types of content we demote. https:\/\/transparency.fb.com\/en-gb\/features\/approach-to-ranking\/types-of-content-we-demote\/."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287596"},{"key":"e_1_3_2_2_53_1","unstructured":"Casey Newton. 2017. Twitter begins filtering abusive tweets out of your replies. https:\/\/www.theverge.com\/2017\/2\/7\/14527104\/twitter-reply-filters-safe-search-abuse-harassment"},{"key":"e_1_3_2_2_54_1","unstructured":"Gabriel Nicholas. 2020. Explaining Algorithmic Decisions. https:\/\/papers.ssrn.com\/abstract=3523456"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"crossref","unstructured":"Gabriel Nicholas. 2022. Shedding Light on Shadowbanning. (2022). https:\/\/cdt.org\/wp-content\/uploads\/2022\/04\/remediated-final-shadowbanning-final-050322-upd-ref.pdf","DOI":"10.31219\/osf.io\/xcz2t"},{"key":"e_1_3_2_2_56_1","unstructured":"Access Now. 2021. Transparency Reporting Index. https:\/\/www.accessnow.org\/transparency-reporting-index\/."},{"key":"e_1_3_2_2_57_1","unstructured":"Google PAIR. 2022. AI Explorables: Big ideas in machine learning simply explained. https:\/\/pair.withgoogle.com\/explorables\/."},{"key":"e_1_3_2_2_58_1","first-page":"537","volume-title":"Social media and activist communication","author":"Poell Thomas","year":"2015","unstructured":"Thomas Poell, Jos\u00e9 Van, and Dijck During. 2015. Social media and activist communication. The Routledge companion to alternative and community mediaLondon: Routledge. (2015), pp. 527\u2013537."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2017.10.003"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173677"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","unstructured":"John Richards David Piorkowski Michael Hind Stephanie Houde and Aleksandra Mojsilovi\u0107. 2020. A Methodology for Creating AI FactSheets. https:\/\/doi.org\/10.48550\/arXiv.2006.13796 arXiv:2006.13796 [cs].","DOI":"10.48550\/arXiv.2006.13796"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386392.3397593"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1093\/joc\/jqy029"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401117"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196772"},{"key":"e_1_3_2_2_66_1","volume-title":"Greg Nojeim, and Dhanaraj Thakur.","author":"Shenkman Carey","year":"2021","unstructured":"Carey Shenkman, Sharon Bradford Franklin, Greg Nojeim, and Dhanaraj Thakur. 2021. Legal Loopholes and Data for Dollars: How Law Enforcement and Intelligence Agencies Are Buying Your Data from Brokers. (2021)."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106344"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102551"},{"key":"e_1_3_2_2_69_1","volume-title":"Proceedings of the ACM on human-computer interaction 4, CSCW3","author":"Simpson Ellen","year":"2021","unstructured":"Ellen Simpson and Bryan Semaan. 2021. For You, or For\" You\"? Everyday LGBTQ+ Encounters with TikTok. Proceedings of the ACM on human-computer interaction 4, CSCW3 (2021), 1\u201334."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372870"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450613.3456835"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1162\/DESI_a_00207"},{"key":"e_1_3_2_2_74_1","unstructured":"Joanna Stern. 2022. You Can Now View Your Instagram Feed in Chronological Order. https:\/\/www.wsj.com\/articles\/instagram-feed-chronological-order-facebook-meta-11648042360 Section: Tech."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3375683"},{"key":"e_1_3_2_2_77_1","unstructured":"TensorFlow. 2022. Model Understanding with the What-If Tool Dashboard. https:\/\/www.tensorflow.org\/tensorboard\/what_if_tool"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12119-020-09790-w"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301275.3302318"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287566"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3434073.3444646"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2811257"},{"key":"e_1_3_2_2_85_1","unstructured":"Bo Westerlund Sinna Lindquist Yngve Sundblad and Wendy Mackay. 2003. Co-designing methods for designing with and for families. http:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:kth:diva-11256"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.5555\/2835577.2835578"},{"key":"e_1_3_2_2_87_1","volume-title":"Ryan Hal Budish, and Kevin Bankston","author":"Woolery Liz","year":"2016","unstructured":"Liz Woolery, Ryan Hal Budish, and Kevin Bankston. 2016. The transparency reporting Toolkit: Best practices for reporting on US government requests for user information. (2016). Publisher: The Berkman Klein Center for Internet & Society."},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3193568"},{"key":"e_1_3_2_2_89_1","unstructured":"Michael Yang. 2021. Explaining \u201cExplainability\u201d. https:\/\/cdt.org\/insights\/explaining-explainability\/"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240704"}],"event":{"name":"FAccT '23: the 2023 ACM Conference on Fairness, Accountability, and Transparency","location":"Chicago IL USA","acronym":"FAccT '23"},"container-title":["2023 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593013.3594064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3593013.3594064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:18Z","timestamp":1750178238000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593013.3594064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":86,"alternative-id":["10.1145\/3593013.3594064","10.1145\/3593013"],"URL":"https:\/\/doi.org\/10.1145\/3593013.3594064","relation":{},"subject":[],"published":{"date-parts":[[2023,6,12]]},"assertion":[{"value":"2023-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}