{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:06:30Z","timestamp":1776114390763,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T00:00:00Z","timestamp":1726876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,21]]},"DOI":"10.1145\/3640471.3680447","type":"proceedings-article","created":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T12:03:49Z","timestamp":1731585829000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The Atlas of AI Incidents in Mobile Computing: Visualizing the Risks and Benefits of AI Gone Mobile"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8774-2386","authenticated-orcid":false,"given":"Edyta Paulina","family":"Bogucka","sequence":"first","affiliation":[{"name":"Nokia Bell Labs, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1454-0641","authenticated-orcid":false,"given":"Marios","family":"Constantinides","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5724-8275","authenticated-orcid":false,"given":"Julia","family":"De Miguel Velazquez","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1534-8128","authenticated-orcid":false,"given":"Sanja","family":"Scepanovic","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9461-5804","authenticated-orcid":false,"given":"Daniele","family":"Quercia","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5815-7164","authenticated-orcid":false,"given":"Andr\u00e9s","family":"Gvirtz","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AIAAIC. 2023. AI Algorithmic and Automation Incidents and Controversies (AIAAIC) Repository. https:\/\/www.aiaaic.org\/aiaaic-repository"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIS47514.2020.00054"},{"key":"e_1_3_2_1_3_1","unstructured":"AVID. 2022. AI Vulnerability Database. https:\/\/avidml.org\/database\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Rachel\u00a0K.E. Bellamy Kuntal Dey Michael Hind Samuel\u00a0C. Hoffman 2018. AI Fairness 360: An Extensible Toolkit for Detecting Understanding and Mitigating Unwanted Algorithmic Bias. https:\/\/arxiv.org\/abs\/1810.01943"},{"key":"e_1_3_2_1_5_1","volume-title":"Facilitating AI Impact Assessment by Generating Examples of Harms. arXiv preprint arXiv:2306.03280","author":"Bu\u00e7inca Zana","year":"2023","unstructured":"Zana Bu\u00e7inca, Chau\u00a0Minh Pham, Maurice Jakesch, Marco\u00a0Tulio Ribeiro, Alexandra Olteanu, and Saleema Amershi. 2023. AHA!: Facilitating AI Impact Assessment by Generating Examples of Harms. arXiv preprint arXiv:2306.03280 (2023)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446382.3448361"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIITME47687.2019.8990825"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3686927"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3676507"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267305.3267536"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3676507"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432234"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00296-0"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581376"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"e_1_3_2_1_16_1","unstructured":"European Comission. 2024. Regulation of the European Parliament and of the Council on laying down harmonised rules on artificial intelligence and amending Regulations (EC) No 300\/2008 (EU) No 167\/2013 (EU) No 168\/2013 (EU) 2018\/858 (EU) 2018\/1139 and (EU) 2019\/2144 and Directives 2014\/90\/EU (EU) 2016\/797 and (EU) 2020\/1828 (Artificial Intelligence Act). Retrieved August 13 2024 from https:\/\/www.europarl.europa.eu\/doceo\/document\/TA-9-2024-0138-FNL-COR01_EN.pdf"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3617694.3623223"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/15291006211051956"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594050"},{"key":"e_1_3_2_1_20_1","volume-title":"CHI 2024 Papers Explorer. Retrieved","author":"Alexis\u00a0Guerra G\u00f3mez John","year":"2024","unstructured":"John Alexis\u00a0Guerra G\u00f3mez. 2024. CHI 2024 Papers Explorer. Retrieved June 8, 2024 from https:\/\/johnguerra.co\/viz\/chi2024Papers"},{"key":"e_1_3_2_1_21_1","volume-title":"Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics. arXiv preprint arXiv:1410.4978","author":"Haris Muhammad","year":"2014","unstructured":"Muhammad Haris, Hamed Haddadi, and Pan Hui. 2014. Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics. arXiv preprint arXiv:1410.4978 (2014)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392878"},{"key":"e_1_3_2_1_23_1","volume-title":"AI Risk Atlas. Retrieved","author":"IBM","year":"2023","unstructured":"IBM watsonx. 2023. AI Risk Atlas. Retrieved November 8, 2023 from https:\/\/dataplatform.cloud.ibm.com\/docs\/content\/wsj\/ai-risk-atlas\/ai-risk-atlas.html?context=wx"},{"key":"e_1_3_2_1_24_1","volume-title":"Workshop on Visualization for AI Explainability. Retrieved","author":"IEEE","year":"2018","unstructured":"IEEE VIS. 2018. Workshop on Visualization for AI Explainability. Retrieved December 2023 from https:\/\/visxai.io\/2023.html"},{"key":"e_1_3_2_1_25_1","unstructured":"Heather Kelly. 2014. Fitbit Recalls Activity Tracker Due to Skin Rashes. CNN. https:\/\/edition.cnn.com\/2014\/02\/21\/tech\/gaming-gadgets\/fitbit-force-recall\/"},{"key":"e_1_3_2_1_26_1","volume-title":"Retrieved","author":"Lam Khoa","year":"2022","unstructured":"Khoa Lam. 2022. AI-Based Vehicle Speed Estimation App Denounced by UK Drivers as Surveillance Technology. Retrieved June 28, 2024 from https:\/\/incidentdatabase.ai\/cite\/264\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2020.3025425"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i17.17817"},{"key":"e_1_3_2_1_29_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise\u00a0Aguera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Artificial Intelligence and Statistics. PMLR 1273\u20131282. https:\/\/proceedings.mlr.press\/v54\/mcmahan17a\/mcmahan17a.pdf"},{"key":"e_1_3_2_1_30_1","volume-title":"Retrieved","year":"2022","unstructured":"Microsoft. 2022. Microsoft\u2019s Framework for Building AI Systems Responsibly. Retrieved January 22, 2024 from https:\/\/blogs.microsoft.com\/on-the-issues\/2022\/06\/21\/microsofts-framework-for-building-ai-systems-responsibly\/"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2016.08.003"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328908"},{"key":"e_1_3_2_1_33_1","unstructured":"MITRE ATLAS. 2022. Adversarial Threat Landscape for Artificial-Intelligene Systems (MITRE) ATLAS. https:\/\/atlas.mitre.org\/studies"},{"key":"e_1_3_2_1_34_1","unstructured":"Chloe Ye\u00a0Eun Moon and Dario Rodighiero. 2020. Mapping as a Contemporary Instrument for Orientation in Conferences. https:\/\/api.semanticscholar.org\/CorpusID:244991909"},{"key":"e_1_3_2_1_35_1","unstructured":"OECD Patrick J. McGovern Foundation. 2024. The AI Incidents Monitor (AIM). https:\/\/oecd.ai\/en\/incidents-methodology"},{"key":"e_1_3_2_1_36_1","volume-title":"Towards AI Accountability Infrastructure: Gaps and Opportunities in AI Audit Tooling. arXiv preprint arXiv:2402.17861","author":"Ojewale Victor","year":"2024","unstructured":"Victor Ojewale, Ryan Steed, Briana Vecchione, Abeba Birhane, and Inioluwa\u00a0Deborah Raji. 2024. Towards AI Accountability Infrastructure: Gaps and Opportunities in AI Audit Tooling. arXiv preprint arXiv:2402.17861 (2024)."},{"key":"e_1_3_2_1_37_1","volume-title":"Research on GPT-4 - Latest Updates. Retrieved","author":"AI.","year":"2023","unstructured":"OpenAI. 2023. Research on GPT-4 - Latest Updates. Retrieved August 7, 2023 from https:\/\/openai.com\/research\/gpt-4"},{"key":"e_1_3_2_1_38_1","first-page":"1","article-title":"Social Dimensions Impact Individual Sleep Quantity and Quality","volume":"13","author":"Park Sungkyu","year":"2023","unstructured":"Sungkyu Park, Assem Zhunis, Marios Constantinides, Luca\u00a0Maria Aiello, Daniele Quercia, and Meeyoung Cha. 2023. Social Dimensions Impact Individual Sleep Quantity and Quality. Scientific Reports 13, 1 (2023), 1\u201311.","journal-title":"Scientific Reports"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-820077-3.00003-1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_1_41_1","volume-title":"AI Risk Databases. Retrieved","author":"Intelligence Robust","year":"2024","unstructured":"Robust Intelligence. 2023. AI Risk Databases. Retrieved January 8, 2024 from https:\/\/airisk.io"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3197671"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2010.179"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/VL.1996.545307"},{"key":"e_1_3_2_1_45_1","volume-title":"Retrieved","author":"McGregor Sean","year":"2022","unstructured":"Sean SMcGregor and Khoa Lam. 2022. TikTok\u2019s \"For You\" Algorithm Directed New Users towards Disinformation about the War in Ukraine. Retrieved June 28, 2024 from https:\/\/incidentdatabase.ai\/cite\/185"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10420-8"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2023.3326591"},{"key":"e_1_3_2_1_48_1","volume-title":"The 17 Sustainable Development Goals. Retrieved","author":"United Nations. 2023.","year":"2023","unstructured":"United Nations. 2023. The 17 Sustainable Development Goals. Retrieved November 8, 2023 from https:\/\/sdgs.un.org\/goals"},{"key":"e_1_3_2_1_49_1","first-page":"2579","article-title":"Visualizing Data using t-SNE","volume":"9","author":"van\u00a0der Maaten Laurens","year":"2008","unstructured":"Laurens van\u00a0der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research 9, 86 (2008), 2579\u20132605. http:\/\/jmlr.org\/papers\/v9\/vandermaaten08a.html","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3623509.3633355"},{"key":"e_1_3_2_1_51_1","volume-title":"AI ethics issues in real world: Evidence from AI Incident Database. arXiv preprint arXiv:2206.07635","author":"Wei Mengyi","year":"2022","unstructured":"Mengyi Wei and Zhixuan Zhou. 2022. AI ethics issues in real world: Evidence from AI Incident Database. arXiv preprint arXiv:2206.07635 (2022)."},{"key":"e_1_3_2_1_52_1","volume-title":"Retrieved","author":"Zelenka Natalie","year":"2021","unstructured":"Natalie Zelenka, Nina Di\u00a0Cara, Huw Day, 2021. Data Hazard Labels. Retrieved March 12, 2024 from https:\/\/datahazards.com\/index.html"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v17i1.22202"}],"event":{"name":"MobileHCI '24: 26th International Conference on Mobile Human-Computer Interaction","location":"Melbourne VIC Australia","acronym":"MobileHCI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["26th International Conference on Mobile Human-Computer Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640471.3680447","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640471.3680447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T15:03:12Z","timestamp":1756825392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640471.3680447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,21]]},"references-count":53,"alternative-id":["10.1145\/3640471.3680447","10.1145\/3640471"],"URL":"https:\/\/doi.org\/10.1145\/3640471.3680447","relation":{},"subject":[],"published":{"date-parts":[[2024,9,21]]},"assertion":[{"value":"2024-09-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}