{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T20:55:37Z","timestamp":1726174537637},"publisher-location":"Cham","reference-count":70,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031155642"},{"type":"electronic","value":"9783031155659"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15565-9_13","type":"book-chapter","created":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T10:15:45Z","timestamp":1663841745000},"page":"204-220","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Risk and Exposure of XAI in Persuasion and Argumentation: The case of Manipulation"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8689-285X","authenticated-orcid":false,"given":"Rachele","family":"Carli","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7784-6176","authenticated-orcid":false,"given":"Amro","family":"Najjar","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9816-7439","authenticated-orcid":false,"given":"Davide","family":"Calvaresi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,23]]},"reference":[{"key":"13_CR1","unstructured":"AI, H.: High-level expert group on artificial intelligence (2019)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Albert, E.T.: AI in talent acquisition: a review of AI-applications used in recruitment and selection. Strategic HR Review (2019)","DOI":"10.1108\/SHR-04-2019-0024"},{"key":"13_CR3","unstructured":"Anjomshoae, S., Najjar, A., Calvaresi, D., Fr\u00e4mling, K.: Explainable agents and robots: results from a systematic literature review. In: 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019), Montreal, Canada, 13\u201317 May 2019, pp. 1078\u20131088. International Foundation for Autonomous Agents and Multiagent Systems (2019)"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-030-38399-2_9","volume-title":"The EU in the 21st Century","author":"A Antonov","year":"2020","unstructured":"Antonov, A., Kerikm\u00e4e, T.: Trustworthy AI as a future driver for competitiveness and social change in the EU. In: Ramiro Troiti\u00f1o, D., Kerikm\u00e4e, T., de la Guardia, R.M., P\u00e9rez S\u00e1nchez, G.\u00c1. (eds.) The EU in the 21st Century, pp. 135\u2013154. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38399-2_9"},{"issue":"3","key":"13_CR5","first-page":"291","volume":"16","author":"A Bertolini","year":"2016","unstructured":"Bertolini, A.: Insurance and risk management for robotic devices: identifying the problems. Glob. Jurist 16(3), 291\u2013314 (2016)","journal-title":"Glob. Jurist"},{"issue":"4","key":"13_CR6","doi-asserted-by":"publisher","first-page":"2332","DOI":"10.3390\/su13042332","volume":"13","author":"L Bj\u00f8rlo","year":"2021","unstructured":"Bj\u00f8rlo, L., Moen, \u00d8., Pasquine, M.: The role of consumer autonomy in developing sustainable Ai: a conceptual framework. Sustainability 13(4), 2332 (2021)","journal-title":"Sustainability"},{"issue":"5","key":"13_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/15265161.2016.1159750","volume":"16","author":"JS Blumenthal-Barby","year":"2016","unstructured":"Blumenthal-Barby, J.S.: Biases and heuristics in decision making and their impact on autonomy. Am. J. Bioeth. 16(5), 5\u201315 (2016)","journal-title":"Am. J. Bioeth."},{"key":"13_CR8","volume-title":"Other People\u2019s Money and How the Bankers Use It, 1914","author":"LD Brandeis","year":"1995","unstructured":"Brandeis, L.D.: Other People\u2019s Money and How the Bankers Use It, 1914. Bedford\/St. Martin\u2019s, Boston (1995)"},{"key":"13_CR9","unstructured":"Calderai, V.: Consenso informato (2015)"},{"issue":"2","key":"13_CR10","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s12652-016-0374-3","volume":"8","author":"D Calvaresi","year":"2017","unstructured":"Calvaresi, D., Cesarini, D., Sernani, P., Marinoni, M., Dragoni, A.F., Sturm, A.: Exploring the ambient assisted living domain: a systematic review. J. Ambient Intell. Humanized Comput. 8(2), 239\u2013257 (2017)","journal-title":"J. Ambient Intell. Humanized Comput."},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-51924-7_1","volume-title":"Explainable, Transparent Autonomous Agents and Multi-Agent Systems","author":"G Ciatto","year":"2020","unstructured":"Ciatto, G., Schumacher, M.I., Omicini, A., Calvaresi, D.: Agent-based explanations in AI: towards an abstract framework. In: Calvaresi, D., Najjar, A., Winikoff, M., Fr\u00e4mling, K. (eds.) EXTRAAMAS 2020. LNCS (LNAI), vol. 12175, pp. 3\u201320. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51924-7_1"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Confalonieri, R., Coba, L., Wagner, B., Besold, T.R.: A historical perspective of explainable artificial intelligence. Wiley Interdis. Rev.: Data Min. Knowl. Discov. 11(1), e1391 (2021)","DOI":"10.1002\/widm.1391"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Contissa, G., et al.: Claudette meets GDPR: automating the evaluation of privacy policies using artificial intelligence. Available at SSRN 3208596 (2018)","DOI":"10.2139\/ssrn.3208596"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Coons, C., Weber, M.: Manipulation: Theory and Practice. Oxford University Press, Oxford (2014)","DOI":"10.1093\/acprof:oso\/9780199338207.001.0001"},{"key":"13_CR15","unstructured":"Craven, M., Shavlik, J.: Extracting tree-structured representations of trained networks. In: Advances in Neural Information Processing Systems, vol. 8 (1995)"},{"key":"13_CR16","first-page":"93","volume":"55","author":"K Crawford","year":"2014","unstructured":"Crawford, K., Schultz, J.: Big data and due process: toward a framework to redress predictive privacy harms. BCL Rev. 55, 93 (2014)","journal-title":"BCL Rev."},{"issue":"2","key":"13_CR17","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/s11948-019-00120-4","volume":"26","author":"R De Jong","year":"2020","unstructured":"De Jong, R.: The retribution-gap and responsibility-loci related to robots and automated technologies: a reply to Nyholm. Sci. Eng. Ethics 26(2), 727\u2013735 (2020). https:\/\/doi.org\/10.1007\/s11948-019-00120-4","journal-title":"Sci. Eng. Ethics"},{"key":"13_CR18","unstructured":"Directive, C.: 88\/627\/eec of 12 december 1988 on the information to be published when a major holding in a listed company is acquired or disposed of. OJ L348, 62\u201365 (1988)"},{"key":"13_CR19","unstructured":"Directive, T.: Directive 2004\/109\/EC of the European parliament and of the council of 15 december 2004 on the harmonisation of transparency requirements in relation to information about issuers whose securities are admitted to trading on a regulated market and amending directive 2001\/34\/ec. OJ L 390(15.12) (2004)"},{"key":"13_CR20","unstructured":"Druce, J., Niehaus, J., Moody, V., Jensen, D., Littman, M.L.: Brittle AI, causal confusion, and bad mental models: challenges and successes in the XAI program. arXiv preprint arXiv:2106.05506 (2021)"},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"Emilien, Gerard, Weitkunat, Rolf, L\u00fcdicke, Frank (eds.): Consumer Perception of Product Risks and Benefits. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-50530-5","DOI":"10.1007\/978-3-319-50530-5"},{"issue":"2","key":"13_CR22","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1037\/0022-3514.94.2.94.2.231","volume":"94","author":"P Fischer","year":"2008","unstructured":"Fischer, P., Schulz-Hardt, S., Frey, D.: Selective exposure and information quantity: how different information quantities moderate decision makers\u2019 preference for consistent and inconsistent information. J. Pers. Soc. Psychol. 94(2), 231 (2008)","journal-title":"J. Pers. Soc. Psychol."},{"key":"13_CR23","unstructured":"Fox, M., Long, D., Magazzeni, D.: Explainable planning. arXiv preprint arXiv:1709.10256 (2017)"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Gandy, O.H.: Coming to Terms with Chance: Engaging Rational Discrimination and Cumulative Disadvantage. Routledge, Milton Park (2016)","DOI":"10.4324\/9781315572758"},{"key":"13_CR25","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"issue":"5","key":"13_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3236009","volume":"51","author":"R Guidotti","year":"2018","unstructured":"Guidotti, R., Monreale, A., Ruggieri, S., Turini, F., Giannotti, F., Pedreschi, D.: A survey of methods for explaining black box models. ACM Comput. surv. (CSUR) 51(5), 1\u201342 (2018)","journal-title":"ACM Comput. surv. (CSUR)"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Gunning, D., Stefik, M., Choi, J., Miller, T., Stumpf, S., Yang, G.Z.: XAI-explainable artificial intelligence. Sci. Rob. 4(37), eaay7120 (2019)","DOI":"10.1126\/scirobotics.aay7120"},{"issue":"1","key":"13_CR28","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0020-7373(84)80003-6","volume":"20","author":"DW Hasling","year":"1984","unstructured":"Hasling, D.W., Clancey, W.J., Rennels, G.: Strategic explanations for a diagnostic consultation system. Int. J. Man Mach. Stud. 20(1), 3\u201319 (1984)","journal-title":"Int. J. Man Mach. Stud."},{"issue":"1","key":"13_CR29","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1515\/pjbr-2018-0009","volume":"9","author":"T Hellstr\u00f6m","year":"2018","unstructured":"Hellstr\u00f6m, T., Bensch, S.: Understandable robots-what, why, and how. Paladyn, J. Behav. Rob. 9(1), 110\u2013123 (2018)","journal-title":"Paladyn, J. Behav. Rob."},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Hoffman, R.R., Klein, G., Mueller, S.T.: Explaining explanation for explainable AI. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 62, pp. 197\u2013201. SAGE Publications Sage CA: Los Angeles, CA (2018)","DOI":"10.1177\/1541931218621047"},{"key":"13_CR31","unstructured":"Hoffman, R.R., Mueller, S.T., Klein, G., Litman, J.: Metrics for explainable AI: challenges and prospects. arXiv preprint arXiv:1812.04608 (2018)"},{"key":"13_CR32","unstructured":"Holzinger, A., Biemann, C., Pattichis, C.S., Kell, D.B.: What do we need to build explainable AI systems for the medical domain? arXiv preprint arXiv:1712.09923 (2017)"},{"issue":"2","key":"13_CR33","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1177\/0306312717699716","volume":"47","author":"ML Jones","year":"2017","unstructured":"Jones, M.L.: The right to a human in the loop: political constructions of computer automation and personhood. Soc. Stud. Sci. 47(2), 216\u2013239 (2017)","journal-title":"Soc. Stud. Sci."},{"issue":"12","key":"13_CR34","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1038\/s41562-018-0401-9","volume":"2","author":"W Kool","year":"2018","unstructured":"Kool, W., Botvinick, M.: Mental labour. Nat. Hum. Behav. 2(12), 899\u2013908 (2018)","journal-title":"Nat. Hum. Behav."},{"issue":"2133","key":"13_CR35","doi-asserted-by":"publisher","first-page":"20180084","DOI":"10.1098\/rsta.2018.0084","volume":"376","author":"JA Kroll","year":"2018","unstructured":"Kroll, J.A.: The fallacy of inscrutability. Philos. Trans. R. Soc. A Math. Phys. Eng. Sci. 376(2133), 20180084 (2018)","journal-title":"Philos. Trans. R. Soc. A Math. Phys. Eng. Sci."},{"key":"13_CR36","unstructured":"Kroll, J.A.: Accountable algorithms. Ph.D. thesis, Princeton University (2015)"},{"key":"13_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/11766155_2","volume-title":"Emerging Trends in Information and Communication Security","author":"SKT Lam","year":"2006","unstructured":"Lam, S.K.T., Frankowski, D., Riedl, J.: Do you trust your recommendations? an exploration of security and privacy issues in recommender systems. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 14\u201329. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11766155_2"},{"issue":"1","key":"13_CR38","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s10676-016-9396-y","volume":"18","author":"M Lanzing","year":"2016","unstructured":"Lanzing, M.: The transparent self. Ethics Inf. Technol. 18(1), 9\u201316 (2016). https:\/\/doi.org\/10.1007\/s10676-016-9396-y","journal-title":"Ethics Inf. Technol."},{"issue":"7553","key":"13_CR39","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"key":"13_CR40","doi-asserted-by":"crossref","unstructured":"Leonard, T.C.: Richard h. thaler, cass r. sunstein, nudge: improving decisions about health, wealth, and happiness (2008)","DOI":"10.1007\/s10602-008-9056-2"},{"key":"13_CR41","unstructured":"Li, Y.: Deep reinforcement learning: an overview. arXiv preprint arXiv:1701.07274 (2017)"},{"key":"13_CR42","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems 30, pp. 4765\u20134774. Curran Associates, Inc. (2017). http:\/\/papers.nips.cc\/paper\/7062-a-unified-approach-to-interpreting-model-predictions.pdf"},{"key":"13_CR43","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195123333.001.0001","volume-title":"Relational Autonomy: Feminist Perspectives on Autonomy, Agency, and The Social Self","author":"C Mackenzie","year":"2000","unstructured":"Mackenzie, C., Stoljar, N.: Relational Autonomy: Feminist Perspectives on Autonomy, Agency, and The Social Self. Oxford University Press, Oxford (2000)"},{"issue":"1","key":"13_CR44","first-page":"102","volume":"14","author":"A Margalit","year":"2016","unstructured":"Margalit, A.: Autonomy: errors and manipulation. Jerusalem Rev. Leg. Stud. 14(1), 102\u2013112 (2016)","journal-title":"Jerusalem Rev. Leg. Stud."},{"issue":"4","key":"13_CR45","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1111\/j.1467-923X.2011.02253.x","volume":"82","author":"H Margetts","year":"2011","unstructured":"Margetts, H.: The internet and transparency. Polit. Q. 82(4), 518\u2013521 (2011)","journal-title":"Polit. Q."},{"key":"13_CR46","doi-asserted-by":"crossref","unstructured":"Margetts, H., Dorobantu, C.: Rethink government with AI (2019)","DOI":"10.1038\/d41586-019-01099-5"},{"key":"13_CR47","doi-asserted-by":"crossref","unstructured":"Matulionyte, R., Hanif, A.: A call for more explainable AI in law enforcement. In: 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW), pp. 75\u201380. IEEE (2021)","DOI":"10.1109\/EDOCW52865.2021.00035"},{"key":"13_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.artint.2018.07.007","volume":"267","author":"T Miller","year":"2019","unstructured":"Miller, T.: Explanation in artificial intelligence: insights from the social sciences. Artif. Intell. 267, 1\u201338 (2019)","journal-title":"Artif. Intell."},{"key":"13_CR49","doi-asserted-by":"crossref","unstructured":"Mualla, Y., et al.: The quest of parsimonious XAI: a human-agent architecture for explanation formulation. Artif. Intell. 302, 103573 (2022)","DOI":"10.1016\/j.artint.2021.103573"},{"issue":"1","key":"13_CR50","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1080\/1369118X.2018.1486870","volume":"23","author":"JA Obar","year":"2020","unstructured":"Obar, J.A., Oeldorf-Hirsch, A.: The biggest lie on the internet: ignoring the privacy policies and terms of service policies of social networking services. Inf. Commun. Soc. 23(1), 128\u2013147 (2020)","journal-title":"Inf. Commun. Soc."},{"key":"13_CR51","doi-asserted-by":"crossref","unstructured":"Phillips, P.J., Przybocki, M.: Four principles of explainable AI as applied to biometrics and facial forensic algorithms. arXiv preprint arXiv:2002.01014 (2020)","DOI":"10.6028\/NIST.IR.8312-draft"},{"issue":"1","key":"13_CR52","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s11747-019-00710-5","volume":"48","author":"A Rai","year":"2020","unstructured":"Rai, A.: Explainable AI: from black box to glass box. J. Acad. Mark. Sci. 48(1), 137\u2013141 (2020)","journal-title":"J. Acad. Mark. Sci."},{"key":"13_CR53","volume-title":"The Morality of Freedom","author":"J Raz","year":"1986","unstructured":"Raz, J.: The Morality of Freedom. Clarendon Press, Oxford (1986)"},{"key":"13_CR54","unstructured":"Regulation, P.: Regulation (EU) 2016\/679 of the European parliament and of the council. Regulation (EU) 679, 2016 (2016)"},{"key":"13_CR55","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: why should i trust you? explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144 (2016)","DOI":"10.1145\/2939672.2939778"},{"issue":"4","key":"13_CR56","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1086\/292086","volume":"88","author":"J Rudinow","year":"1978","unstructured":"Rudinow, J.: Manipulation. Ethics 88(4), 338\u2013347 (1978)","journal-title":"Ethics"},{"key":"13_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-32785-9_1","volume-title":"How AI Impacts Urban Living and Public Health","author":"I Sadek","year":"2019","unstructured":"Sadek, I., Rehman, S.U., Codjo, J., Abdulrazak, B.: Privacy and security of IoT based healthcare systems: concerns, solutions, and recommendations. In: Pag\u00e1n, J., Mokhtari, M., Aloulou, H., Abdulrazak, B., Cabrera, M.F. (eds.) ICOST 2019. LNCS, vol. 11862, pp. 3\u201317. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32785-9_1"},{"key":"13_CR58","doi-asserted-by":"crossref","unstructured":"Skouby, K.E., Lynggaard, P.: Smart home and smart city solutions enabled by 5G, IoT, AAI and CoT services. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp. 874\u2013878. IEEE (2014)","DOI":"10.1109\/IC3I.2014.7019822"},{"issue":"4","key":"13_CR59","doi-asserted-by":"publisher","first-page":"97","DOI":"10.9785\/cri-2019-200402","volume":"20","author":"NA Smuha","year":"2019","unstructured":"Smuha, N.A.: The EU approach to ethics guidelines for trustworthy artificial intelligence. Comput. Law Rev. Int. 20(4), 97\u2013106 (2019)","journal-title":"Comput. Law Rev. Int."},{"key":"13_CR60","unstructured":"Str\u00fcnck, C., et al.: The maturity of consumers: a myth? towards realistic consumer policy (2012)"},{"key":"13_CR61","doi-asserted-by":"crossref","unstructured":"Susser, D., Roessler, B., Nissenbaum, H.: Technology, autonomy, and manipulation. Internet Policy Rev. 8(2) (2019)","DOI":"10.14763\/2019.2.1410"},{"key":"13_CR62","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"13_CR63","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-030-68176-0_7","volume-title":"The Elements of Big Data Value","author":"T Timan","year":"2021","unstructured":"Timan, T., Mann, Z.: Data protection in the era of artificial intelligence: trends, existing solutions and recommendations for privacy-preserving technologies. In: Curry, E., Metzger, A., Zillner, S., Pazzaglia, J.-C., Garc\u00eda Robles, A. (eds.) The Elements of Big Data Value, pp. 153\u2013175. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68176-0_7"},{"issue":"1","key":"13_CR64","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/BF00993103","volume":"13","author":"GG Towell","year":"1993","unstructured":"Towell, G.G., Shavlik, J.W.: Extracting refined rules from knowledge-based neural networks. Mach. Learn. 13(1), 71\u2013101 (1993)","journal-title":"Mach. Learn."},{"key":"13_CR65","first-page":"16","volume":"50","author":"E Union","year":"2003","unstructured":"Union, E.: Directive 2003\/6\/EC of the European parliament and of the council of 28 January 2003 on insider dealing and market manipulation (market abuse). Off. J. Eur. Union 50, 16\u201325 (2003)","journal-title":"Off. J. Eur. Union"},{"issue":"4","key":"13_CR66","doi-asserted-by":"publisher","first-page":"97","DOI":"10.9785\/cri-2021-220402","volume":"22","author":"M Veale","year":"2021","unstructured":"Veale, M., Borgesius, F.Z.: Demystifying the draft EU artificial intelligence act-analysing the good, the bad, and the unclear elements of the proposed approach. Comput. Law Rev. Int. 22(4), 97\u2013112 (2021)","journal-title":"Comput. Law Rev. Int."},{"issue":"1\u20132","key":"13_CR67","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/0004-3702(92)90087-E","volume":"54","author":"MR Wick","year":"1992","unstructured":"Wick, M.R., Thompson, W.B.: Reconstructive expert system explanation. Artif. Intell. 54(1\u20132), 33\u201370 (1992)","journal-title":"Artif. Intell."},{"key":"13_CR68","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-642-30487-3_17","volume-title":"Discrimination and privacy in the information society","author":"T Zarsky","year":"2013","unstructured":"Zarsky, T.: Transparency in data mining: from theory to practice. In: Custers, B., Calders, T., Schermer, B., Zarsky, T. (eds.) Discrimination and privacy in the information society, vol. 3, pp. 301\u2013324. Springer, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-30487-3_17"},{"key":"13_CR69","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chen, X., et al.: Explainable recommendation: a survey and new perspectives. Found. Trends\u00ae Inf. Retrieval 14(1), 1\u2013101 (2020)","DOI":"10.1561\/1500000066"},{"key":"13_CR70","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Liao, Q.V., Bellamy, R.K.: Effect of confidence and explanation on accuracy and trust calibration in AI-assisted decision making. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency, pp. 295\u2013305 (2020)","DOI":"10.1145\/3351095.3372852"}],"container-title":["Lecture Notes in Computer Science","Explainable and Transparent AI and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15565-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T13:43:33Z","timestamp":1701092613000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15565-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031155642","9783031155659"],"references-count":70,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15565-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EXTRAAMAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Explainable, Transparent Autonomous Agents and Multi-Agent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"extraamas2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/extraamas.ehealth.hevs.ch\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}