{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T02:40:50Z","timestamp":1760668850945,"version":"build-2065373602"},"reference-count":91,"publisher":"Association for Computing Machinery (ACM)","issue":"7","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,18]]},"abstract":"<jats:p>The rapid integration of generative artificial intelligence (GenAI) across diverse fields underscores the critical need for red teaming efforts to proactively identify and mitigate associated risks. While previous research primarily addresses technical aspects, this paper highlights organizational factors that hinder the effectiveness of red teaming in real-world settings. Through qualitative analysis of 17 semi-structured interviews with red teamers from various organizations, we uncover challenges such as the marginalization of vulnerable red teamers, the invisibility of nuanced AI risks to vulnerable users until post-deployment, and the lack of user-centered red teaming approaches. These issues often arise from underlying organizational dynamics, including organizational resistance, organizational inertia, and organizational mediocracy. To mitigate these dynamics, we discuss the implications of user research for red teaming and the importance of embedding red teaming throughout the entire development cycle of GenAI systems.<\/jats:p>","DOI":"10.1145\/3757641","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:59:10Z","timestamp":1760633950000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Organization Matters: A Qualitative Study of Organizational Dynamics in Red Teaming Practices For Generative AI"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2706-3672","authenticated-orcid":false,"given":"Bixuan","family":"Ren","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0515-6675","authenticated-orcid":false,"given":"EunJeong","family":"Cheon","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9800-6859","authenticated-orcid":false,"given":"Jianghui","family":"Li","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2024. AI Safety - ETO Research Almanac. https:\/\/almanac.eto.tech\/topics\/ai-safety\/."},{"volume-title":"Research Report","year":"2024","key":"e_1_2_1_2_1","unstructured":"2024. Large Model Security and Ethics Research Report 2024. Technical Report. Tencent Research Institute (TRI), Tencent Zhuque lab, Tencent Hunyuan model team, Tsinghua Shenzhen International Graduate School, and Zhejiang University State Key Lab of Blockchain and Data Security."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2010.939578"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2010.939578"},{"key":"e_1_2_1_5_1","unstructured":"Zara Abrams. 2024. What Psychologists Need to Know about the Evolution of Generative AI. https:\/\/www.apa.org\/monitor\/2024\/01\/trends-generative-ai-evolution-psychology."},{"volume-title":"Oxford Research Encyclopedia of Politics.","author":"Ackerman Gary","key":"e_1_2_1_6_1","unstructured":"Gary Ackerman and Douglas Clifford. 2021. Red Teaming and Crisis Preparedness. In Oxford Research Encyclopedia of Politics."},{"key":"e_1_2_1_7_1","volume-title":"Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. PACIS 230","author":"Al-Banna Mortada","year":"2018","unstructured":"Mortada Al-Banna, Boualem Benatallah, Daniel Schlagwein, Elisa Bertino, and Moshe Chai Barukh. 2018. Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. PACIS 230 (2018)."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3593990"},{"key":"e_1_2_1_9_1","volume-title":"The human cost of online content moderation. Harvard Journal of Law and Technology 2","author":"Arsht Andrew","year":"2018","unstructured":"Andrew Arsht and Daniel Etcovitch. 2018. The human cost of online content moderation. Harvard Journal of Law and Technology 2 (2018)."},{"key":"e_1_2_1_10_1","volume-title":"Silverstein","author":"Auerbach Carl F.","year":"2003","unstructured":"Carl F. Auerbach and Louise B. Silverstein. 2003. Qualitative Data: An Introduction to Coding and Analysis. New York University Press, New York, NY, US. ix, 202 pages."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449148"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Yoshua Bengio Geoffrey Hinton Andrew Yao Dawn Song Pieter Abbeel Trevor Darrell Yuval Noah Harari Ya-Qin Zhang Lan Xue Shai Shalev-Shwartz Gillian Hadfield Jeff Clune Tegan Maharaj Frank Hutter Atilim G\u00fcnes Baydin Sheila McIlraith Qiqi Gao Ashwin Acharya David Krueger Anca Dragan Philip Torr Stuart Russell Daniel Kahneman Jan Brauner and S\u00f6ren Mindermann. 2024. Managing Extreme AI Risks amid Rapid Progress. arXiv:2310.17688 doi:10.48550\/arXiv.2310.17688","DOI":"10.48550\/arXiv.2310.17688"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/19416520.2012.684462"},{"key":"e_1_2_1_14_1","unstructured":"Jake Bryant Christine Heitz Saurabh Sanghvi and Dilip Wagle. 2020. Artificial Intelligence in Education: How Will It Impact K-12 Teachers | McKinsey. https:\/\/www.mckinsey.com\/industries\/education\/our-insights\/how-artificialintelligence-will-impact-k-12-teachers."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2023.3300574"},{"key":"e_1_2_1_16_1","volume-title":"Charbel Bou-Khalil, Ye-Jean Park, Akshay Swaminathan, Jesutofunmi A Omiye, Akaash Kolluri, Akash Chaurasia, et al.","author":"Tin-Tin Chang Crystal","year":"2024","unstructured":"Crystal Tin-Tin Chang, Hodan Farah, Haiwen Gui, Shawheen Justin Rezaei, Charbel Bou-Khalil, Ye-Jean Park, Akshay Swaminathan, Jesutofunmi A Omiye, Akaash Kolluri, Akash Chaurasia, et al. 2024. Red Teaming Large Language Models in Medicine: Real-World Insights on Model Behavior. medRxiv (2024), 2024-04."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610103"},{"key":"e_1_2_1_18_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 9, CSCW","author":"Cheon EunJeong","year":"2025","unstructured":"EunJeong Cheon and Ingrid Erickson. 2025. Fulfillment of the Work Games: Warehouse Workers' Experiences with Algorithmic Management. Proceedings of the ACM on Human-Computer Interaction 9, CSCW (2025), 1-30."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3661561"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555558"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3661545"},{"volume-title":"The Innovator's Dilemma: The Revolutionary Book That Will Change the Way You Do Business (reprint edition ed.)","author":"Christensen Clayton M.","key":"e_1_2_1_22_1","unstructured":"Clayton M. Christensen. 2011. The Innovator's Dilemma: The Revolutionary Book That Will Change the Way You Do Business (reprint edition ed.). HarperBusiness, New York, NY."},{"key":"e_1_2_1_23_1","unstructured":"Ingo Dachwitz. 2024. Data Workers' Inquiry: The hidden workers behind AI tell their stories. https:\/\/netzpolitik.org\/2024\/data-workers-inquiry-the-hidden-workers-behind-ai-tell-their-stories\/."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581026"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533113"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594037"},{"key":"e_1_2_1_27_1","volume-title":"Prompt Templates: A Methodology for Improving Manual Red Teaming Performance. In ACM CHI Conference on Human Factors in Computing Systems.","author":"Dominique Brandon","year":"2024","unstructured":"Brandon Dominique, David Piorkowski, Manish Nagireddy, and Ioana Baldini. 2024. Prompt Templates: A Methodology for Improving Manual Red Teaming Performance. In ACM CHI Conference on Human Factors in Computing Systems."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2023.08.010"},{"key":"e_1_2_1_29_1","unstructured":"Daniel Fabian. 2023. Google's AI Red Team: The Ethical Hackers Making AI Safer. https:\/\/blog.google\/technology\/safetysecurity\/googles-ai-red-team-the-ethical-hackers-making-ai-safer\/."},{"key":"e_1_2_1_30_1","first-page":"421","volume-title":"Proceedings of the AAAI\/ACM Conference on AI, Ethics, and Society","volume":"7","author":"Feffer Michael","year":"2024","unstructured":"Michael Feffer, Anusha Sinha, Wesley H Deng, Zachary C Lipton, and Hoda Heidari. 2024. Red-teaming for generative ai: Silver bullet or security theater?. In Proceedings of the AAAI\/ACM Conference on AI, Ethics, and Society, Vol. 7. 421-437."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533229"},{"key":"e_1_2_1_32_1","unstructured":"Deep Ganguli Liane Lovitt Jackson Kernion Amanda Askell Yuntao Bai Saurav Kadavath Ben Mann Ethan Perez Nicholas Schiefer Kamal Ndousse et al. 2022. Red teaming language models to reduce harms: Methods scaling behaviors and lessons learned. arXiv preprint arXiv:2209.07858 (2022)."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2005.18803920"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","unstructured":"Tarleton Gillespie Ryland Shaw Mary L. Gray and Jina Suh. 2025. AI Red-Teaming Is a Sociotechnical Challenge: On Values Labor and Harms. arXiv:2412.09751 [cs] doi:10.48550\/arXiv.2412.09751","DOI":"10.48550\/arXiv.2412.09751"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2021.101750"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1108\/JOCM-04-2012-0047"},{"key":"e_1_2_1_37_1","volume-title":"AI hype as a cyber security risk: the moral responsibility of implementing generative AI in business. AI and Ethics","author":"Humphreys Declan","year":"2024","unstructured":"Declan Humphreys, Abigail Koay, Dennis Desmond, and Erica Mealy. 2024. AI hype as a cyber security risk: the moral responsibility of implementing generative AI in business. AI and Ethics (2024), 1-14."},{"key":"e_1_2_1_38_1","volume-title":"B Christopher Rinderspacher,Walter Peregrim, Sue Kase, Simon Su, Adrienne Raglin, and John T Richardson.","author":"Hung Chou P","year":"2022","unstructured":"Chou P Hung, James Zachary Hare, B Christopher Rinderspacher,Walter Peregrim, Sue Kase, Simon Su, Adrienne Raglin, and John T Richardson. 2022. ARL Battlespace: a platform for developing novel AI for complex adversarial reasoning in MDO. In Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications IV, Vol. 12113. SPIE, 294-304."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0314658"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.26717\/BJSTR.2024.58.009203"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","unstructured":"Jason Jabbour and Vijay Janapa Reddi. 2024. Generative AI Agents in Autonomous Machines: A Safety Perspective. doi:10.48550\/arXiv.2410.15489","DOI":"10.48550\/arXiv.2410.15489"},{"key":"e_1_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Qiao Jin Fangyuan Chen Yiliang Zhou Ziyang Xu Justin M Cheung Robert Chen Ronald M Summers Justin F Rousseau Peiyun Ni Marc J Landsman et al. 2024. Hidden Flaws Behind Expert-Level Accuracy of Multimodal GPT-4 Vision in Medicine. ArXiv (2024).","DOI":"10.1038\/s41746-024-01185-7"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658619.3658627"},{"key":"e_1_2_1_44_1","volume-title":"Personalisation within bounds: A risk taxonomy and policy framework for the alignment of large language models with personalised feedback. arXiv preprint arXiv:2303.05453","author":"Kirk Hannah Rose","year":"2023","unstructured":"Hannah Rose Kirk, Bertie Vidgen, Paul R\u00f6ttger, and Scott A Hale. 2023. Personalisation within bounds: A risk taxonomy and policy framework for the alignment of large language models with personalised feedback. arXiv preprint arXiv:2303.05453 (2023)."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.21428\/e4baedd9.81164b06"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","unstructured":"Leonie Koessler and Jonas Schuett. 2023. Risk Assessment at AGI Companies: A Review of Popular Risk Assessment Techniques from Other Safety-Critical Industries. arXiv:2307.08823 doi:10.48550\/arXiv.2307.08823","DOI":"10.48550\/arXiv.2307.08823"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193120404801410"},{"key":"e_1_2_1_48_1","unstructured":"Ram Kumar. 2023. Microsoft AI Red Team Building Future of Safer AI. https:\/\/www.microsoft.com\/enus\/ security\/blog\/2023\/08\/07\/microsoft-ai-red-team-building-future-of-safer-ai\/."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2022.103648"},{"key":"e_1_2_1_50_1","unstructured":"Zhimin Li Jianwei Zhang Qin Lin Jiangfeng Xiong Yanxin Long Xinchi Deng Yingfang Zhang Xingchao Liu Minbin Huang Zedong Xiao et al. 2024. Hunyuan-DiT: A Powerful Multi-Resolution Diffusion Transformer with Fine-Grained Chinese Understanding. arXiv preprint arXiv:2405.08748 (2024)."},{"key":"e_1_2_1_51_1","volume-title":"Rethinking model evaluation as narrowing the socio-technical gap. arXiv preprint arXiv:2306.03100","author":"Vera Liao Q","year":"2023","unstructured":"Q Vera Liao and Ziang Xiao. 2023. Rethinking model evaluation as narrowing the socio-technical gap. arXiv preprint arXiv:2306.03100 (2023)."},{"key":"e_1_2_1_52_1","volume-title":"Red teaming: past and present. School of Advanced Military Studies","author":"Longbine David F","year":"2008","unstructured":"David F Longbine. 2008. Red teaming: past and present. School of Advanced Military Studies, Army Command and General Staff College (2008)."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594079"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512899"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","unstructured":"Krishnaveni Manubolu and Raveesha Peeriga. 2024. Generative AI in Disease Diagnosis. doi:10.20944\/preprints202410. 1555.v1","DOI":"10.20944\/preprints202410"},{"key":"e_1_2_1_56_1","volume-title":"Flirt: Feedback loop in-context red teaming. arXiv preprint arXiv:2308.04265","author":"Mehrabi Ninareh","year":"2023","unstructured":"Ninareh Mehrabi, Palash Goyal, Christophe Dupuy, Qian Hu, Shalini Ghosh, Richard Zemel, Kai-Wei Chang, Aram Galstyan, and Rahul Gupta. 2023. Flirt: Feedback loop in-context red teaming. arXiv preprint arXiv:2308.04265 (2023)."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1152\/physiol.2024.39.S1.1164"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i19.30142"},{"key":"e_1_2_1_59_1","unstructured":"Arvind Narayanan. 2023. Model alignment protects against accidental harms not intentional ones. https:\/\/www.aisnakeoil.com\/p\/model-alignment-protects-against."},{"key":"e_1_2_1_60_1","first-page":"4","article-title":"Auditing Algorithmic Risk","volume":"65","author":"O'Neil Cathy","year":"2024","unstructured":"Cathy O'Neil, Jake Appel, and Sam Tyner-Monroe. 2024. Auditing Algorithmic Risk. MIT Sloan Management Review 65, 4 (June 2024).","journal-title":"MIT Sloan Management Review"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","unstructured":"OpenAI Josh Achiam Steven Adler Sandhini Agarwal Lama Ahmad et al. 2024. GPT-4 Technical Report. arXiv:2303.08774 [cs] doi:10.48550\/arXiv.2303.08774","DOI":"10.48550\/arXiv.2303.08774"},{"key":"e_1_2_1_62_1","unstructured":"Billy Perrigo. 2023. 150 AI Workers Vote to Unionize at Nairobi Meeting. https:\/\/time.com\/6275995\/chatgpt-facebookafrican-workers-union\/."},{"key":"e_1_2_1_63_1","unstructured":"Jordan Potti. 2023. The Emotional Toll of Red Teaming. https:\/\/dispatch.redteams.fyi\/the-emotional-toll-of-redteaming\/."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449081"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-92190-7"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3234688"},{"key":"e_1_2_1_67_1","volume-title":"Kieran Fraser, Erik Miehling, Beat Buesser, Elizabeth M Daly, Mark Purcell, et al.","author":"Rawat Ambrish","year":"2024","unstructured":"Ambrish Rawat, Stefan Schoepf, Giulio Zizzo, Giandomenico Cornacchia, Muhammad Zaid Hameed, Kieran Fraser, Erik Miehling, Beat Buesser, Elizabeth M Daly, Mark Purcell, et al. 2024. Attack Atlas: A Practitioner's Perspective on Challenges and Pitfalls in Red Teaming GenAI. arXiv preprint arXiv:2409.15398 (2024)."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626772.3657882"},{"key":"e_1_2_1_69_1","volume-title":"The Coding Manual for Qualitative Researchers","author":"Salda\u00f1a Johnny","unstructured":"Johnny Salda\u00f1a. 2015. The Coding Manual for Qualitative Researchers (3rd edition ed.). SAGE Publications Ltd, Los Angeles, Calif. London New Delhi Singapore Washington DC.","edition":"3"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517578"},{"key":"e_1_2_1_71_1","volume-title":"Towards best practices in AGI safety and governance: A survey of expert opinion. arXiv preprint arXiv:2305.07153","author":"Schuett Jonas","year":"2023","unstructured":"Jonas Schuett, Noemi Dreksler, Markus Anderljung, David McCaffary, Lennart Heim, Emma Bluemke, and Ben Garfinkel. 2023. Towards best practices in AGI safety and governance: A survey of expert opinion. arXiv preprint arXiv:2305.07153 (2023)."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-84260-3_16"},{"key":"e_1_2_1_73_1","volume-title":"Reese","author":"Shoemaker Pamela J.","year":"2013","unstructured":"Pamela J. Shoemaker and Stephen D. Reese. 2013. Mediating the Message in the 21st Century (1st edition ed.). Routledge, New York."},{"key":"e_1_2_1_74_1","unstructured":"Ranjit Singh Borhane Blili-Hamelin Carol Anderson Emnet Tafesse Briana Vecchione Beth Duckles and Jacob Metcalf. 2025. Red-Teaming in the Public Interest. Technical Report. DATA & SOCIETY."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2225931"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583204"},{"key":"e_1_2_1_77_1","volume-title":"Content Moderation Is Terrible by Design. Harvard Business Review (Nov","author":"Stackpole Thomas","year":"2022","unstructured":"Thomas Stackpole. 2022. Content Moderation Is Terrible by Design. Harvard Business Review (Nov. 2022)."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3630106.3658992"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12874-024-02253-y"},{"key":"e_1_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Helen Toner and Ashwin Acharya. 2022. Exploring Clusters of Research in Three Areas of AI Safety.","DOI":"10.51593\/20210026"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","unstructured":"Renato Umeton Anne Kwok Rahul Maurya Domenic Leco Naomi Lenane Jennifer Willcox Dana-Farber Committee and Jason Johnson. 2023. GPT-4 in a Cancer Center: Institute-Wide Deployment Challenges and Lessons Learned. doi:10.31219\/osf.io\/bqv4f","DOI":"10.31219\/osf.io\/bqv4f"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581278"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2016.2641929"},{"key":"e_1_2_1_84_1","unstructured":"LauraWeidinger John Mellor Maribeth Rauh Conor Griffin Jonathan Uesato Po-Sen Huang Myra Cheng Mia Glaese Borja Balle Atoosa Kasirzadeh et al. 2021. Ethical and social risks of harm from language models. arXiv. arXiv preprint arXiv:2112.04359 10 (2021)."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3686938"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479499"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.235"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580900"},{"key":"e_1_2_1_89_1","volume-title":"China Tech Workers Wanted: Women Need Not Apply. Wall Street Journal (Aug","author":"Yuan Li","year":"2017","unstructured":"Li Yuan. 2017. China Tech Workers Wanted: Women Need Not Apply. Wall Street Journal (Aug. 2017)."},{"volume-title":"Strategies for Planned Change","author":"Zaltman Gerald","key":"e_1_2_1_90_1","unstructured":"Gerald Zaltman and Robert Duncan. 1977. Strategies for Planned Change. Wiley-Interscience, New York."},{"key":"e_1_2_1_91_1","volume-title":"Red Team: How to succeed by thinking like the enemy","author":"Zenko Micah","year":"2015","unstructured":"Micah Zenko. 2015. Red Team: How to succeed by thinking like the enemy. Basic Books."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T02:03:46Z","timestamp":1760666626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757641"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":91,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1145\/3757641"],"URL":"https:\/\/doi.org\/10.1145\/3757641","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"2025-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}