{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:03:19Z","timestamp":1772060599928,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":116,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"UKRI","award":["EP\/S023356\/1"],"award-info":[{"award-number":["EP\/S023356\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,3]]},"DOI":"10.1145\/3630106.3658900","type":"proceedings-article","created":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T13:14:21Z","timestamp":1717593261000},"page":"207-220","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A Framework for Exploring the Consequences of AI-Mediated Enterprise Knowledge Access and Identifying Risks to Workers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1692-5943","authenticated-orcid":false,"given":"Anna","family":"Gausen","sequence":"first","affiliation":[{"name":"Imperial College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5270-5550","authenticated-orcid":false,"given":"Bhaskar","family":"Mitra","sequence":"additional","affiliation":[{"name":"Microsoft Research, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6841-614X","authenticated-orcid":false,"given":"Si\u00e2n","family":"Lindley","sequence":"additional","affiliation":[{"name":"Microsoft Research, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00359-2"},{"key":"e_1_3_2_1_2_1","unstructured":"Danielle Abril. 2023. Companies want to use AI tracking to make you better at your job. The Washington Post. https:\/\/www.washingtonpost.com\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/S10606-013-9192-8"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1999.772789"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/572524"},{"key":"e_1_3_2_1_6_1","volume-title":"The datafication of employment: How surveillance and capitalism are shaping workers","author":"Adler-Bell Sam","unstructured":"Sam Adler-Bell and Michelle Miller. 2018. The datafication of employment: How surveillance and capitalism are shaping workers\u2019 futures without their knowledge. The Century Foundation, New York, NY."},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate","volume":"4","author":"Agrafiotis Ioannis","year":"2018","unstructured":"Ioannis Agrafiotis, Jason\u00a0RC Nurse, Michael Goldsmith, Sadie Creese, and David Upton. 2018. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity 4, 1 (2018), 1\u201315.","journal-title":"Journal of Cybersecurity"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"The \u201cBlack Box\u201d at Work","volume":"7","author":"Ajunwa Ifeoma","year":"2020","unstructured":"Ifeoma Ajunwa. 2020. The \u201cBlack Box\u201d at Work. Big Data & Society 7, 2 (2020), 1\u20135.","journal-title":"Big Data & Society"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1017\/9781316888681"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.15779\/Z38BR8MF94"},{"key":"e_1_3_2_1_11_1","volume-title":"Work and labor in the digital age. Vol.\u00a033","author":"Ajunwa Ifeoma","unstructured":"Ifeoma Ajunwa and Daniel Greene. 2019. Platforms at work: Automated hiring platforms and other new intermediaries in the organization of work. In Work and labor in the digital age. Vol.\u00a033. Emerald Publishing Limited, Bingley, UK, 61\u201391."},{"key":"e_1_3_2_1_12_1","volume-title":"Employers","author":"Akhtar Saima","unstructured":"Saima Akhtar. 2021. Employers\u2019 new tools to surveil and monitor workers are historically rooted. Washington Post. https:\/\/www.washingtonpost.com\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445740"},{"key":"e_1_3_2_1_14_1","unstructured":"Julia Angwin Jeff Larson Surya Mattu and Lauren Kirchner. 2016. Machine bias: There\u2019s software used across the country to predict future criminals. And it\u2019s biased against blacks. ProPublica."},{"key":"e_1_3_2_1_15_1","unstructured":"AWS. 2024 (Accessed). Amazon Kendra. https:\/\/aws.amazon.com\/kendra\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449148"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_1_18_1","volume-title":"9th Annual conference of the special interest group for computing, information and society, SIGCIS.","author":"Barocas Solon","year":"2017","unstructured":"Solon Barocas, Kate Crawford, Aaron Shapiro, and Hanna Wallach. 2017. The problem with bias: Allocative versus representational harms in machine learning. 9th Annual conference of the special interest group for computing, information and society, SIGCIS."},{"key":"e_1_3_2_1_19_1","first-page":"671","article-title":"Big Data\u2019s Disparate Impact","volume":"104","author":"Barocas Solon","year":"2016","unstructured":"Solon Barocas and Andrew\u00a0D Selbst. 2016. Big Data\u2019s Disparate Impact. California Law Review 104, 3 (2016), 671\u2013732.","journal-title":"California Law Review"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1093\/JCMC"},{"key":"e_1_3_2_1_21_1","unstructured":"Nancy Baym Jonathan Larson and Ronnie Martin. 2021. What a Year of WFH Has Done to Our Relationships at Work. Harvard Business Review. https:\/\/hbr.org\/2021\/03\/what-a-year-of-wfh-has-done-to-our-relationships-at-work"},{"key":"e_1_3_2_1_22_1","volume-title":"Race After Technology: Abolitionist Tools for the New Jim Code","author":"Benjamin Ruha","unstructured":"Ruha Benjamin. 2019. Race After Technology: Abolitionist Tools for the New Jim Code. Polity, Cambridge, UK."},{"key":"e_1_3_2_1_23_1","volume-title":"Data and Algorithms at Work: The Case for Worker Technology Rights. UC","author":"Bernhardt Annette","unstructured":"Annette Bernhardt, Lisa Kresge, and Reem Suleiman. 2021. Data and Algorithms at Work: The Case for Worker Technology Rights. UC Berkeley: Center for Labor Research and Education. https:\/\/escholarship.org\/uc\/item\/9831k83p"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_1_25_1","unstructured":"Miranda Bogen and A. Rieke. 2018. Help wanted: an examination of hiring algorithms equity and bias. Upturn Los Angeles CA."},{"key":"e_1_3_2_1_26_1","unstructured":"Rishi Bommasani Drew\u00a0A Hudson Ehsan Adeli Russ Altman 2022. On the Opportunities and Risks of Foundation Models. arxiv:2108.07258\u00a0[cs.LG]"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/380681"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_01915"},{"key":"e_1_3_2_1_29_1","volume-title":"The Social Power of Algorithms","author":"Bucher Taina","unstructured":"Taina Bucher. 2019. The algorithmic imaginary: Exploring the ordinary affects of Facebook algorithms. In The Social Power of Algorithms. Routledge, London, UK, 30\u201344."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 1st Conference on Fairness, Accountability and Transparency(Proceedings of Machine Learning Research, Vol.\u00a081)","author":"Buolamwini Joy","year":"2018","unstructured":"Joy Buolamwini and Timnit Gebru. 2018. Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification. In Proceedings of the 1st Conference on Fairness, Accountability and Transparency(Proceedings of Machine Learning Research, Vol.\u00a081), Sorelle\u00a0A. Friedler and Christo Wilson (Eds.). PMLR, online, 77\u201391. https:\/\/proceedings.mlr.press\/v81\/buolamwini18a.html"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1215\/01642472-4362325","article-title":"Predatory value: Economies of dispossession and disturbed relationalities","volume":"36","author":"Byrd A","year":"2018","unstructured":"Jodi\u00a0A Byrd, Alyosha Goldstein, Jodi Melamed, and Chandan Reddy. 2018. Predatory value: Economies of dispossession and disturbed relationalities. Social Text 36, 2 (2018), 1\u201318.","journal-title":"Social Text"},{"key":"e_1_3_2_1_32_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, 2021. Extracting training data from large language models. 30th USENIX Security Symposium (USENIX Security 21) 30, 21 (2021), 2633\u20132650."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594023"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1093\/JCMC"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551518770969"},{"key":"e_1_3_2_1_36_1","unstructured":"Karina Corti\u00f1as-Lorenzo Si\u00e2n Lindley Ida Larsen-Ledet and Bhaskar Mitra. 2024. Through the Looking Glass: Transparency Implications and Challenges in Enterprise AI Knowledge Systems. arXiv:2401.09410."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.7551\/MITPRESS"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/1527476418796632"},{"key":"e_1_3_2_1_39_1","volume-title":"The atlas of AI: Power, politics, and the planetary costs of artificial intelligence","author":"Crawford Kate","unstructured":"Kate Crawford. 2021. The atlas of AI: Power, politics, and the planetary costs of artificial intelligence. Yale University Press, New Haven, CT."},{"key":"e_1_3_2_1_40_1","unstructured":"Kate Crawford. 2023. Unpacking AI: \"An Exponential Disruption\". https:\/\/www.msnbc.com\/msnbc-podcast\/"},{"key":"e_1_3_2_1_41_1","volume-title":"On Intersectionality: Essential Writings","author":"Crenshaw Kimberl\u00e9","year":"2017","unstructured":"Kimberl\u00e9 Crenshaw. 2017. On Intersectionality: Essential Writings. Faculty Books 255 (2017), 320."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2021.1920081"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372878"},{"key":"e_1_3_2_1_44_1","volume-title":"CSCW2","author":"Das Dipto","year":"2021","unstructured":"Dipto Das, Carsten \u00d8sterlund, and Bryan Semaan. 2021. \" Jol\" or\" Pani\"?: How Does Governance Shape a Platform\u2019s Identity?Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021), 1\u201325."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476080"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3186320"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411962"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","first-page":"975","DOI":"10.1177\/0731121417719697","article-title":"Beyond color-blindness: (Re)theorizing racial ideology","volume":"60","author":"Doane Ashley","year":"2017","unstructured":"Ashley Doane. 2017. Beyond color-blindness: (Re)theorizing racial ideology. Sociological Perspectives 60, 5 (2017), 975\u2013991.","journal-title":"Sociological Perspectives"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","unstructured":"Veena Dubal. 2023. On Algorithmic Wage Discrimination. https:\/\/doi.org\/10.2139\/SSRN.4331080","DOI":"10.2139\/SSRN.4331080"},{"key":"e_1_3_2_1_50_1","volume-title":"Fairness in Information Access Systems. Foundations and Trends\u00ae in Information Retrieval 16, 1-2","author":"Ekstrand D","year":"2022","unstructured":"Michael\u00a0D Ekstrand, Anubrata Das, Robin Burke, Fernando Diaz, 2022. Fairness in Information Access Systems. Foundations and Trends\u00ae in Information Retrieval 16, 1-2 (2022), 1\u2013177."},{"key":"e_1_3_2_1_51_1","volume-title":"Commensuration as a social process. Annual review of sociology 24, 1","author":"Espeland Wendy\u00a0Nelson","year":"1998","unstructured":"Wendy\u00a0Nelson Espeland and Mitchell\u00a0L Stevens. 1998. Commensuration as a social process. Annual review of sociology 24, 1 (1998), 313\u2013343."},{"key":"e_1_3_2_1_52_1","unstructured":"Iason Gabriel and Vafa Ghazavi. 2021. The Challenge of Value Alignment: from Fairer Algorithms to AI Safety. https:\/\/arxiv.org\/abs\/2101.06060v2"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458723"},{"key":"e_1_3_2_1_54_1","unstructured":"Andrew\u00a0D Gordon Carina Negreanu Jos\u00e9 Cambronero Rasika Chakravarthy Ian Drosos Hao Fang Bhaskar Mitra Hannah Richardson Advait Sarkar Stephanie Simmons 2023. Co-audit: tools to help humans double-check AI-generated content. arXiv preprint arXiv:2310.01297."},{"key":"e_1_3_2_1_55_1","volume-title":"Ghost work: How to stop Silicon Valley from building a new global underclass","author":"Gray L","unstructured":"Mary\u00a0L Gray and Siddharth Suri. 2019. Ghost work: How to stop Silicon Valley from building a new global underclass. Harper Collins, New York, NY."},{"key":"e_1_3_2_1_56_1","unstructured":"People +\u00a0AI Guidebook. 2019. Mental Models. Google PAIR. https:\/\/pair.withgoogle.com\/chapter\/mental-models\/"},{"key":"e_1_3_2_1_57_1","volume-title":"Technological Change in Five Industries: Threats to Jobs, Wages, and Working Conditions","author":"Hammerling Jessie","unstructured":"Jessie Hammerling, Chris Benner, Jeffrey Buchanan, Fran\u00e7oise Carr\u00e9, Beth Gutelius, Sara Hinkley, Ken Jacobs, Lisa Kresge, Adam\u00a0Seth Litwin, Jenifer MacGillvary, Chris Tilly, and Steve Viscelli. 2022. Technological Change in Five Industries: Threats to Jobs, Wages, and Working Conditions. Berkeley Labor Center. https:\/\/laborcenter.berkeley.edu\/"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.2307\/3178066"},{"key":"e_1_3_2_1_59_1","unstructured":"Moritz Hardt Eric Mazumdar Celestine Mendler-D\u00fcnner and Tijana Zrnic. 2023. Algorithmic Collective Action in Machine Learning. https:\/\/arxiv.org\/abs\/2302.04262v2"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203413845"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229179.1229181"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","unstructured":"Gabbrielle\u00a0M. Johnson. 2020. Are Algorithms Value-Free? Feminist Theoretical Virtues in Machine Learning. 35\u00a0pages. https:\/\/doi.org\/10.1163\/17455243-20234372","DOI":"10.1163\/17455243-20234372"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/S10676-014-9351-8"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.560"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1162\/desi.2008.24.3.72"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.7551\/MITPRESS"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Jared Katzman Angelina Wang Morgan Scheuerman Su\u00a0Lin Blodgett Kristen Laird Hanna Wallach and Solon Barocas. 2023. Taxonomizing and Measuring Representational Harms: A Look at Image Tagging. arXiv preprint arXiv:2305.01776.","DOI":"10.1609\/aaai.v37i12.26670"},{"key":"e_1_3_2_1_68_1","volume-title":"Bias Out-of-the-Box: An Empirical Analysis of Intersectional Occupational Biases in Popular Generative Language Models. Advances in Neural Information Processing Systems 4 (2","author":"Kirk Hannah\u00a0Rose","year":"2021","unstructured":"Hannah\u00a0Rose Kirk, Yennie Jun, Haider Iqbal, Elias Benussi, Filippo Volpin, Frederic\u00a0A. Dreyer, Aleksandar Shtedritski, and Yuki\u00a0M. Asano. 2021. Bias Out-of-the-Box: An Empirical Analysis of Intersectional Occupational Biases in Popular Generative Language Models. Advances in Neural Information Processing Systems 4 (2 2021), 2611\u20132624. https:\/\/arxiv.org\/abs\/2102.04130v3"},{"key":"e_1_3_2_1_69_1","unstructured":"Hannah\u00a0Rose Kirk Bertie Vidgen Paul R\u00f6ttger and Scott\u00a0A Hale. 2023. Personalisation within bounds: A risk taxonomy and policy framework for the alignment of large language models with personalised feedback. arXiv preprint arXiv:2303.05453."},{"key":"e_1_3_2_1_70_1","volume-title":"Workshop at the 20th Eur. Conf. Comput.-Supported Cooperative Work.","author":"Larsen-Ledet Ida","year":"2022","unstructured":"Ida Larsen-Ledet and Si\u00e2n Lindley. 2022. Ways of seeing and being seen: People in the algorithmic knowledge base. Workshop at the 20th Eur. Conf. Comput.-Supported Cooperative Work."},{"key":"e_1_3_2_1_71_1","volume-title":"Proceedings of the 5th FAccTRec Workshop on Responsible Recommendation at RecSys","author":"Larsen-Ledet Ida","year":"2022","unstructured":"Ida Larsen-Ledet, Bhaskar Mitra, and Si\u00e2n Lindley. 2022. Ethical and Social Considerations in Automatic Expert Identification and People Recommendation in Organizational Knowledge Management Systems. In Proceedings of the 5th FAccTRec Workshop on Responsible Recommendation at RecSys 2022. ACM, New York, NY, 1\u20136."},{"key":"e_1_3_2_1_72_1","unstructured":"Si\u00e2n Lindley Denise Wilkins and Britta Burlin. 2021. Actions and their Consequences? Implicit Interactions with Workplace Knowledge Bases. 6\u00a0pages. AutomationXP CHI."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584947"},{"key":"e_1_3_2_1_74_1","unstructured":"Karl Marx. 1844. Comments on James Mill \u00c9l\u00e9ments D\u2019\u00e9conomie Politique."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","unstructured":"Salil\u00a0K. Mehra. 2011. Paradise is a Walled Garden? Trust Antitrust and User Dynamism. George Mason Law Review doi: 10.1016\/B978-0-407-76001-1.50020-X.","DOI":"10.1016\/B978-0-407-76001-1.50020-X"},{"key":"e_1_3_2_1_76_1","unstructured":"Microsoft 2023. Microsoft Viva Topics Overview. Microsoft. https:\/\/learn.microsoft.com"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-020-00405-8"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1371\/JOURNAL.PONE.0183537"},{"key":"e_1_3_2_1_79_1","unstructured":"Sarah Myers\u00a0West Veena Dubal Zephyr Teachout and Zubin Soleimany. 2023. Algorithmic Management. AI Now Salons. https:\/\/ainowinstitute.org\/series\/ai-now-salon-series"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","unstructured":"Nathan Newman. 2016. UnMarginalizing Workers: How Big Data Drives Lower Wages and How Reframing Labor Law Can Restore Information Equality in the Workplace. https:\/\/doi.org\/10.2139\/SSRN.2819142","DOI":"10.2139\/SSRN.2819142"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1609\/ICWSM.V7I1.14381"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.5.1.14"},{"key":"e_1_3_2_1_83_1","volume-title":"The knowledge-creating theory revisited: knowledge creation as a synthesizing process. Knowledge management research & practice 1, 1","author":"Nonaka Ikujiro","year":"2015","unstructured":"Ikujiro Nonaka and Ryoko Toyama. 2015. The knowledge-creating theory revisited: knowledge creation as a synthesizing process. Knowledge management research & practice 1, 1 (2015), 95\u2013110."},{"key":"e_1_3_2_1_84_1","volume-title":"Ba and leadership: a unified model of dynamic knowledge creation. Long range planning 33, 1","author":"Nonaka Ikujiro","year":"2000","unstructured":"Ikujiro Nonaka, Ryoko Toyama, and Noboru Konno. 2000. SECI, Ba and leadership: a unified model of dynamic knowledge creation. Long range planning 33, 1 (2000), 5\u201334."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.13.3.249.2776"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000639"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/S00146-020-01097-6"},{"key":"e_1_3_2_1_89_1","volume-title":"Knowledge creation in strategic alliances: Another look at organizational learning. Asia Pacific journal of management 17","author":"Phan H","year":"2000","unstructured":"Phillip\u00a0H Phan and Theodore Peridis. 2000. Knowledge creation in strategic alliances: Another look at organizational learning. Asia Pacific journal of management 17 (2000), 201\u2013222."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1093\/OSO"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533158"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533237"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000396"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.JRT.2020.100005"},{"key":"e_1_3_2_1_95_1","unstructured":"Ruder. 2020. Why You Should Do NLP Beyond English. https:\/\/www.ruder.io\/nlp-beyond-english\/"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3582735"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479512"},{"key":"e_1_3_2_1_98_1","volume-title":"The Semantic Web: ESWC 2019 Satellite Events: ESWC 2019 Satellite Events. Springer, online, 262\u2013266","author":"Schmid Stefan","year":"2019","unstructured":"Stefan Schmid, Cory Henson, and Tuan Tran. 2019. Using knowledge graphs to search an enterprise data lake. In The Semantic Web: ESWC 2019 Satellite Events: ESWC 2019 Satellite Events. Springer, online, 262\u2013266."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300647"},{"key":"e_1_3_2_1_100_1","volume-title":"Emilio Garcia","author":"Shelby Renee","year":"2022","unstructured":"Renee Shelby, Shalaleh Rismani, Kathryn Henne, AJung Moon, Negar Rostamzadeh, Paul Nicholas, N\u2019Mah Yilla, Jess Gallegos, Andrew Smart, Emilio Garcia, 2022. Sociotechnical harms: scoping a taxonomy for harm reduction. arXiv preprint arXiv:2210.05791."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479577"},{"key":"e_1_3_2_1_102_1","unstructured":"Divya Siddarth Daron Acemoglu Danielle Allen Kate Crawford James Evans Michael Jordan and E Weyl. 2021. How AI fails us. arXiv preprint arXiv:2201.04200."},{"key":"e_1_3_2_1_103_1","unstructured":"Matthew Sparkes. 2023. Filling the internet with AI-created images will harm future AIs. New Scientist. https:\/\/www.newscientist.com"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","unstructured":"Valerio\u00a0De Stefano. 2018. \u2018Negotiating the Algorithm\u2019: Automation Artificial Intelligence and Labour Protection. https:\/\/doi.org\/10.2139\/SSRN.3178233","DOI":"10.2139\/SSRN.3178233"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-022-00136-w"},{"key":"e_1_3_2_1_106_1","unstructured":"Alex Tamkin Miles Brundage Jack Clark and Deep Ganguli. 2021. Understanding the capabilities limitations and societal impact of large language models. arXiv preprint arXiv:2102.02503."},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1177\/0263775816633195"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3817-9_10"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445885"},{"key":"e_1_3_2_1_110_1","volume-title":"Feminism confronts technology","unstructured":"Judy. Wajcman. 1991. Feminism confronts technology. Penn State Press, University Park, PA. 184 pages."},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376497"},{"key":"e_1_3_2_1_112_1","volume-title":"Proceedings of Machine Learning Research 139 (2","author":"Wang Angelina","year":"2021","unstructured":"Angelina Wang and Olga Russakovsky. 2021. Directional Bias Amplification. Proceedings of Machine Learning Research 139 (2 2021), 10882\u201310893. https:\/\/arxiv.org\/abs\/2102.12594v2"},{"key":"e_1_3_2_1_113_1","unstructured":"Laura Weidinger John Mellor Maribeth Rauh Conor Griffin 2021. Ethical and social risks of harm from Language Models. arXiv preprint arXiv:2112.04359v1."},{"key":"e_1_3_2_1_114_1","unstructured":"Laura Weidinger Maribeth Rauh Nahema Marchal Arianna Manzini 2023. Sociotechnical Safety Evaluation of Generative AI Systems. arXiv preprint arXiv:2310.11986."},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533088"},{"key":"e_1_3_2_1_116_1","volume-title":"Alexandria: Unsupervised high-precision knowledge base construction using a probabilistic program. Automated Knowledge Base Construction (AKBC).","author":"Winn John","year":"2018","unstructured":"John Winn, John Guiver, Sam Webster, Yordan Zaykov, Martin Kukla, and Dany Fabian. 2018. Alexandria: Unsupervised high-precision knowledge base construction using a probabilistic program. Automated Knowledge Base Construction (AKBC)."},{"key":"e_1_3_2_1_117_1","volume-title":"Proceedings of EMNLP 2017 - Conference on Empirical Methods in Natural Language Processing.","author":"Zhao Jieyu","year":"2017","unstructured":"Jieyu Zhao, Tianlu Wang, Mark Yatskar, Vicente Ordonez, and Kai\u00a0Wei Chang. 2017. Men Also Like Shopping: Reducing Gender Bias Amplification using Corpus-level Constraints. In Proceedings of EMNLP 2017 - Conference on Empirical Methods in Natural Language Processing."}],"event":{"name":"FAccT '24: The 2024 ACM Conference on Fairness, Accountability, and Transparency","location":"Rio de Janeiro Brazil","acronym":"FAccT '24"},"container-title":["The 2024 ACM Conference on Fairness, Accountability, and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630106.3658900","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3630106.3658900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:56Z","timestamp":1750287056000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630106.3658900"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":116,"alternative-id":["10.1145\/3630106.3658900","10.1145\/3630106"],"URL":"https:\/\/doi.org\/10.1145\/3630106.3658900","relation":{},"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"2024-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}