{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T07:10:01Z","timestamp":1715929801649},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T00:00:00Z","timestamp":1625184000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T00:00:00Z","timestamp":1625184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12525-021-00480-5","type":"journal-article","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T05:02:34Z","timestamp":1625202154000},"page":"59-71","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Categorization and eccentricity of AI risks: a comparative study of the global AI guidelines"],"prefix":"10.1007","volume":"32","author":[{"given":"Kai","family":"Jia","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9947-3948","authenticated-orcid":false,"given":"Nan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,2]]},"reference":[{"key":"480_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.ijinfomgt.2019.02.006","volume":"49","author":"AM Abubakar","year":"2019","unstructured":"Abubakar, A. M., Behravesh, E., Rezapouraghdam, H., & Yildiz, S. B. (2019). Applying artificial intelligence technique to predict knowledge hiding behavior. International Journal of Information Management, 49, 45\u201357.\u00a0https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.02.006","journal-title":"International Journal of Information Management"},{"issue":"1","key":"480_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1093\/cjres\/rsz022","volume":"13","author":"D Acemoglu","year":"2020","unstructured":"Acemoglu, D., & Restrepo, P. (2020). The wrong kind of AI? Artificial intelligence and the future of labour demand. Cambridge Journal of Regions, Economy and Society, 13(1), 25\u201335.\u00a0https:\/\/doi.org\/10.1093\/cjres\/rsz022","journal-title":"Cambridge Journal of Regions, Economy and Society"},{"issue":"2011","key":"480_CR3","first-page":"C2","volume":"20","author":"M Andreessen","year":"2011","unstructured":"Andreessen, M. (2011). Why software is eating the world. Wall Street Journal, 20(2011), C2.","journal-title":"Wall Street Journal"},{"issue":"2","key":"480_CR4","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1111\/j.1539-6924.2008.01030.x","volume":"28","author":"Anthony (Tony) Cox Jr, L.","year":"2008","unstructured":"Anthony (Tony) Cox Jr, L. (2008). What\u2019s wrong with risk matrices? Risk Analysis: an International Journal, 28(2), 497\u2013512.\u00a0https:\/\/doi.org\/10.1111\/j.1539-6924.2008.01030.x","journal-title":"Risk Analysis: an International Journal"},{"key":"480_CR5","volume-title":"The AI revolution in science","author":"T Appenzeller","year":"2017","unstructured":"Appenzeller, T. (2017). The AI revolution in science. Science.\u00a0https:\/\/www.sciencemag.org\/news\/2017\/07\/ai-revolution-science"},{"key":"480_CR6","doi-asserted-by":"publisher","unstructured":"Arksey, H., & O'Malley, L. (2005). Scoping studies: towards a methodological framework. International Journal of Social Research Methodology, pp. 19\u201332.\u00a0https:\/\/doi.org\/10.1080\/1364557032000119616","DOI":"10.1080\/1364557032000119616"},{"issue":"7729","key":"480_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1038\/s41586-018-0637-6","volume":"563","author":"E Awad","year":"2018","unstructured":"Awad, E., Dsouza, S., Kim, R., Schulz, J., Henrich, J., Shariff, A., & Rahwan, I. (2018). The moral machine experiment. Nature, 563(7729), 59\u201364.\u00a0https:\/\/doi.org\/10.1038\/s41586-018-0637-6","journal-title":"Nature"},{"key":"480_CR8","doi-asserted-by":"publisher","first-page":"103349","DOI":"10.1016\/j.artint.2020.103349","volume":"287","author":"E Awad","year":"2020","unstructured":"Awad, E., Anderson, M., Anderson, S. L., & Liao, B. (2020). An approach for combining ethical principles with public opinion to guide public policy. Artificial Intelligence, 287, 103349.\u00a0https:\/\/doi.org\/10.1016\/j.artint.2020.103349","journal-title":"Artificial Intelligence"},{"issue":"7","key":"480_CR9","first-page":"2011","volume":"118","author":"JM Balkin","year":"2018","unstructured":"Balkin, J. M. (2018). Free Speech is a Triangle. Columbia Law Review, 118(7), 2011\u20132056.","journal-title":"Columbia Law Review"},{"key":"480_CR10","doi-asserted-by":"publisher","unstructured":"Bandara, R., Fernando, M., & Akter, S. (2020). Privacy concerns in E-commerce: A taxonomy and a future research agenda.\u00a0Electronic Markets, 30(3) 629\u2013647.\u00a0https:\/\/doi.org\/10.1007\/s12525-019-00375-6","DOI":"10.1007\/s12525-019-00375-6"},{"key":"480_CR11","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1038\/d41586-019-01413-1","volume":"569","author":"Y Benkler","year":"2019","unstructured":"Benkler, Y. (2019). Don\u2019t let industry write the rules for AI. Nature, 569, 161.","journal-title":"Nature"},{"issue":"2","key":"480_CR12","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1108\/JEIM-05-2017-0069","volume":"31","author":"B Biswas","year":"2018","unstructured":"Biswas, B., & Mukhopadhyay, A. (2018). G-RAM framework for software risk assessment and mitigation strategies in organizations. Journal of Enterprise Information Management, 31(2), 276\u2013299.\u00a0https:\/\/doi.org\/10.1108\/JEIM-05-2017-0069","journal-title":"Journal of Enterprise Information Management"},{"key":"480_CR13","unstructured":"Boddington, P. (2018). Alphabetical list of resources. Ethics for Artificial Intelligence. https:\/\/www.cs.ox.ac.uk\/efai\/resources\/alphabetical-list-of-resources\/"},{"key":"480_CR14","first-page":"399","volume":"51","author":"R Calo","year":"2017","unstructured":"Calo, R. (2017). Artificial Intelligence policy: a primer and roadmap. UCDL Review, 51, 399.","journal-title":"UCDL Review"},{"issue":"2","key":"480_CR15","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s11948-017-9901-7","volume":"24","author":"C Cath","year":"2018","unstructured":"Cath, C., Wachter, S., Mittelstadt, B., Taddeo, M., & Floridi, L. (2018). Artificial intelligence and the \u2018good society\u2019: the US, EU, and UK approach. Science and Engineering Ethics, 24(2), 505\u2013528.\u00a0https:\/\/doi.org\/10.1007\/s11948-017-9901-7","journal-title":"Science and Engineering Ethics"},{"key":"480_CR16","unstructured":"Chinese National Governance Committee for the New Generation Artificial Intelligence. (2019). Governance Principles for the New Generation Artificial Intelligence\u2013Developing Responsible Artificial Intelligence.\u00a0China Daily.\u00a0https:\/\/www.chinadaily.com.cn\/a\/201906\/17\/WS5d07486ba3103dbf14328ab7.html"},{"issue":"3","key":"480_CR17","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1111\/j.1539-6924.2005.00615.x","volume":"25","author":"LA Cox Jr","year":"2005","unstructured":"Cox, L. A., Jr., Babayev, D., & Huber, W. (2005). Some limitations of qualitative risk rating systems. Risk Analysis: an International Journal, 25(3), 651\u2013662.\u00a0https:\/\/doi.org\/10.1111\/j.1539-6924.2005.00615.x","journal-title":"Risk Analysis: an International Journal"},{"key":"480_CR18","doi-asserted-by":"publisher","unstructured":"Floridi, L., & Cowls, J. (2019). A unified framework of five principles for AI in society.\u00a0Harvard Data Science Review,\u00a01(1).\u00a0https:\/\/doi.org\/10.1162\/99608f92.8cd550d1","DOI":"10.1162\/99608f92.8cd550d1"},{"key":"480_CR19","doi-asserted-by":"publisher","unstructured":"Floridi, L., Cowls, J., Beltrametti, M.,\u00a0Chatila, R., Chazerand, P., Dignum, V., Luetge, C., Madelin, R.,\u00a0Pagallo, U., Rossi, F., Schafer, B., Valcke, P., & Vayena, E. (2018). AI4People\u2014An ethical framework for a good AI society: opportunities, risks, principles, and recommendations. Minds and Machines 28(4), 689\u2013707.\u00a0https:\/\/doi.org\/10.1007\/s11023-018-9482-5","DOI":"10.1007\/s11023-018-9482-5"},{"issue":"3","key":"480_CR20","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1007\/s11948-020-00213-5","volume":"26","author":"L Floridi","year":"2020","unstructured":"Floridi, L., Cowls, J., King, T. C., & Taddeo, M. (2020). How to design AI for social good: seven essential factors. Science and Engineering Ethics, 26(3), 1771\u20131796.\u00a0https:\/\/doi.org\/10.1007\/s11948-020-00213-5","journal-title":"Science and Engineering Ethics"},{"key":"480_CR21","unstructured":"Future of Life Institute. (2017). Asilomar AI Principles.\u00a0https:\/\/futureoflife.org\/ai-principles\/"},{"key":"480_CR22","unstructured":"Goldacre, B. (2014). When data gets creepy: the secrets we don\u2019t realize we\u2019re giving away.\u00a0The Guardian.\u00a0https:\/\/www.theguardian.com\/technology\/2014\/dec\/05\/when-data-gets-creepy-secrets-were-giving-away"},{"key":"480_CR23","doi-asserted-by":"publisher","unstructured":"Greene, D., Hoffman, A. L., & Stark, L. (2019). Better, nicer, clearer, fairer: a critical assessment of the movement for ethical artificial intelligence and machine learning. Hawaii International Conference on System Sciences (HICSS),\u00a01\u201310.\u00a0https:\/\/doi.org\/10.24251\/HICSS.2019.258","DOI":"10.24251\/HICSS.2019.258"},{"key":"480_CR24","first-page":"1719","volume":"114","author":"J Grimmelmann","year":"2004","unstructured":"Grimmelmann, J. (2004). Regulation by Software. Yale LJ, 114, 1719.","journal-title":"Regulation by Software. Yale LJ"},{"key":"480_CR25","doi-asserted-by":"publisher","unstructured":"Hagendorff, T. (2020). The ethics of AI ethics: an evaluation of guidelines.\u00a0Minds and Machines, 1\u201322.\u00a0https:\/\/doi.org\/10.1007\/s11023-020-09517-8","DOI":"10.1007\/s11023-020-09517-8"},{"key":"480_CR26","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1038\/550324a","volume":"550","author":"YN Harari","year":"2017","unstructured":"Harari, Y. N. (2017). Reboot for the AI revolution. Nature, 550, 324\u2013327.\u00a0https:\/\/doi.org\/10.1038\/550324a","journal-title":"Nature"},{"key":"480_CR27","doi-asserted-by":"publisher","unstructured":"Heckmann, I., Comes, T., & Nickel, S. (2015). A critical review on supply chain risk\u2014definition, measure and modeling, Omega, 52, 119\u2013132.\u00a0https:\/\/doi.org\/10.1016\/j.omega.2014.10.004","DOI":"10.1016\/j.omega.2014.10.004"},{"key":"480_CR28","doi-asserted-by":"publisher","unstructured":"Hong, J. I., & Landay, J. A. (2004). An architecture for privacy-sensitive ubiquitous computing. Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, 177\u2013189.\u00a0https:\/\/doi.org\/10.1145\/990064.990087","DOI":"10.1145\/990064.990087"},{"key":"480_CR29","unstructured":"ISO. (2002). Risk Management: Guidelines for use in standards. ISO\/IEC Guide 73."},{"issue":"9","key":"480_CR30","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1038\/s42256-019-0088-2","volume":"1","author":"A Jobin","year":"2019","unstructured":"Jobin, A., Ienca, M., & Vayena, E. (2019). The global landscape of AI ethics guidelines. Nature Machine Intelligence, 1(9), 389\u2013399.\u00a0https:\/\/doi.org\/10.1038\/s42256-019-0088-2","journal-title":"Nature Machine Intelligence"},{"key":"480_CR31","doi-asserted-by":"publisher","unstructured":"Krafft, T. D., Zweig, K. A., & K\u00f6nig, P. D. (2020). How to regulate algorithmic decision\u2010making: a framework of regulatory requirements for different applications. Regulation & Governance.\u00a0https:\/\/doi.org\/10.1111\/rego.12369","DOI":"10.1111\/rego.12369"},{"key":"480_CR32","unstructured":"Lessig, L. (2009).\u00a0Code: And other laws of cyberspace.Version 2.0. New York: Basic Books."},{"issue":"2","key":"480_CR33","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1093\/ijlit\/eaz001","volume":"27","author":"HW Liu","year":"2019","unstructured":"Liu, H. W., Lin, C. F., & Chen, Y. J. (2019). Beyond State v Loomis: artificial intelligence, government algorithmization and accountability. International Journal of Law and Information Technology, 27(2), 122\u2013141.\u00a0https:\/\/doi.org\/10.1093\/ijlit\/eaz001","journal-title":"International Journal of Law and Information Technology"},{"issue":"1","key":"480_CR34","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jhazmat.2008.03.055","volume":"159","author":"AS Markowski","year":"2008","unstructured":"Markowski, A. S., & Mannan, M. S. (2008). Fuzzy risk matrix. Journal of Hazardous Materials, 159(1), 152\u2013157.\u00a0https:\/\/doi.org\/10.1016\/j.jhazmat.2008.03.055","journal-title":"Journal of Hazardous Materials"},{"key":"480_CR35","doi-asserted-by":"publisher","unstructured":"McNamara, A., Smith, J., & Murphy-Hill, E. (2018). Does ACM\u2019s code of ethics change ethical decision making in software development? In G. T. Leavens, A. Garcia, C. S. Pa\u0306sa\u0306reanu (Eds.) Proceedings of the 26th ACM joint meeting on european software engineering conference and sym- posium on the foundations of software engineering\u2014ESEC\/FSE 2018,\u00a01\u20137. New York: ACM Press.\u00a0https:\/\/doi.org\/10.1145\/3236024.3264833","DOI":"10.1145\/3236024.3264833"},{"key":"480_CR36","doi-asserted-by":"publisher","unstructured":"Meek, T., Barham, H., Beltaif, N., Kaadoor, A., & Akhter, T. (2016). Managing the ethical and risk implications of rapid advances in Artificial Intelligence.\u00a0International Conference on Management of Engineering and Technology (PICMET),\u00a0Portland, 682\u2013693, 108.\u00a0https:\/\/doi.org\/10.1109\/PICMET.2016.7806752","DOI":"10.1109\/PICMET.2016.7806752"},{"key":"480_CR37","unstructured":"Microsoft. (2018). Responsible bots: 10 guidelines for developers of conversational AI.\u00a0https:\/\/www.microsoft.com\/en-us\/research\/publication\/responsible-bots\/"},{"key":"480_CR38","unstructured":"National and international AI strategies. (2018). Future of Life Institute. https:\/\/futureoflife.org\/national-international-ai-strategies"},{"issue":"4","key":"480_CR39","doi-asserted-by":"publisher","first-page":"220","DOI":"10.18043\/ncm.80.4.220","volume":"80","author":"GS Nelson","year":"2019","unstructured":"Nelson, G. S. (2019). Bias in Artificial Intelligence. North Carolina Medical Journal, 80(4), 220\u2013222.\u00a0https:\/\/doi.org\/10.18043\/ncm.80.4.220","journal-title":"North Carolina Medical Journal"},{"key":"480_CR40","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1016\/j.ssci.2010.04.005","volume":"48","author":"H Ni","year":"2010","unstructured":"Ni, H., Chen, A., & Chen, N. (2010). Some extensions on risk matric approach. Safety Science, 48, 1269\u20131278.\u00a0https:\/\/doi.org\/10.1016\/j.ssci.2010.04.005","journal-title":"Safety Science"},{"issue":"6464","key":"480_CR41","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1126\/science.aax2342","volume":"366","author":"Z Obermeyer","year":"2019","unstructured":"Obermeyer, Z., Powers, B., Vogeli, C., & Mullainathan, S. (2019). Dissecting racial bias in an algorithm used to manage the health of populations. Science, 366(6464), 447\u2013453.\u00a0https:\/\/doi.org\/10.1126\/science.aax2342","journal-title":"Science"},{"key":"480_CR42","doi-asserted-by":"crossref","unstructured":"OECD. (2019). OECD Principles on AI.\u00a0https:\/\/www.oecd.org\/going-digital\/ai\/principles\/","DOI":"10.1787\/6ff2a1c4-en"},{"key":"480_CR43","unstructured":"Polanyi, M. (2009).\u00a0The tacit dimension. University of Chicago Press."},{"key":"480_CR44","unstructured":"Renfroe, N. A., & Smith, J. L. (2007). Whole building design guide: threat\/vulnerability assessments and risk analysis. Washington, DC: National Institute of Building Sciences. http:\/\/www.wbdg.org\/design\/riskanalysis.php"},{"key":"480_CR45","doi-asserted-by":"publisher","unstructured":"Roberts, H., Cowls, J., Morley, J., Taddeo, M., Wang, V., & Floridi, L. (2020). The Chinese approach to artificial intelligence: an analysis of policy, ethics, and regulation. AI & Society, 1\u201319.\u00a0https:\/\/doi.org\/10.1007\/s00146-020-00992-2","DOI":"10.1007\/s00146-020-00992-2"},{"key":"480_CR46","unstructured":"Rosenbloom, J.S. (1972). Case Study in Risk Management. Prentice Hall,\u00a063\u201367."},{"issue":"10","key":"480_CR47","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1037\/apl0000405","volume":"104","author":"S Sajjadiani","year":"2019","unstructured":"Sajjadiani, S., Sojourner, A. J., Kammeyer-Mueller, J. D., & Mykerezi, E. (2019). Using machine learning to translate applicant work history into predictors of performance and turnover. Journal of Applied Psychology, 104(10), 1207.\u00a0https:\/\/doi.org\/10.1037\/apl0000405","journal-title":"Journal of Applied Psychology"},{"key":"480_CR48","doi-asserted-by":"publisher","unstructured":"Sampson, C. J., Arnold, R.,\u00a0Bryan, S.,\u00a0Clarke, P.,\u00a0Ekins, S.,\u00a0Hatswell, A.,\u00a0Hawkins, N.,\u00a0Langham, S., Marshall, D.,\u00a0Sadatsafavi, M.,\u00a0Sullivan, W.,\u00a0Wilson, E. C. F., &\u00a0Wrightson, T.\u00a0(2019). Transparency in decision modelling: what, why, who and how?.\u00a0Pharmacoeconomics, 1\u201315.\u00a0https:\/\/doi.org\/10.1007\/s40273-019-00819-z","DOI":"10.1007\/s40273-019-00819-z"},{"key":"480_CR49","doi-asserted-by":"publisher","first-page":"100718","DOI":"10.1016\/j.tmp.2020.100718","volume":"35","author":"EC S\u00e1nchez","year":"2020","unstructured":"S\u00e1nchez, E. C., S\u00e1nchez-Medina, A. J., & Pellejero, M. (2020). Identifying critical hotel cancellations using artificial intelligence. Tourism Management Perspectives, 35, 100718.\u00a0https:\/\/doi.org\/10.1016\/j.tmp.2020.100718","journal-title":"Tourism Management Perspectives"},{"issue":"1","key":"480_CR50","doi-asserted-by":"publisher","first-page":"e03218","DOI":"10.1016\/j.heliyon.2020.e03218","volume":"6","author":"AJ S\u00e1nchez-Medina","year":"2020","unstructured":"S\u00e1nchez-Medina, A. J., Galv\u00e1n-S\u00e1nchez, I., & Fern\u00e1ndez-Monroy, M. (2020). Applying artificial intelligence to explore sexual cyberbullying behaviour. Heliyon, 6(1), e03218.\u00a0https:\/\/doi.org\/10.1016\/j.heliyon.2020.e03218","journal-title":"Heliyon"},{"issue":"2","key":"480_CR51","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s12394-010-0055-x","volume":"3","author":"P Schaar","year":"2010","unstructured":"Schaar, P. (2010). Privacy by design. Identity in the Information Society, 3(2), 267\u2013274.\u00a0https:\/\/doi.org\/10.1007\/s12394-010-0055-x","journal-title":"Identity in the Information Society"},{"key":"480_CR52","unstructured":"Summaries of AI policy resources. (2018). Future of Life Institute. https:\/\/futureoflife.org\/ai-policy-resources\/"},{"key":"480_CR53","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.indmarman.2017.12.019","volume":"69","author":"N Syam","year":"2018","unstructured":"Syam, N., & Sharma, A. (2018). Waiting for a sales renaissance in the fourth industrial revolution: machine learning and Artificial Intelligence in sales research and practice. Industrial Marketing Management, 69, 135\u2013146.\u00a0https:\/\/doi.org\/10.1016\/j.indmarman.2017.12.019.","journal-title":"Industrial Marketing Management"},{"issue":"6","key":"480_CR54","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1007\/s10664-013-9258-8","volume":"19","author":"L Tan","year":"2014","unstructured":"Tan, L., Liu, C., Li, Z., Wang, X., Zhou, Y., & Zhai, C. (2014). Bug characteristics in open source software. Empirical Software Engineering, 19(6), 1665\u20131705. https:\/\/doi.org\/10.1007\/s10664-013-9258-8","journal-title":"Empirical Software Engineering"},{"key":"480_CR55","doi-asserted-by":"publisher","unstructured":"Thiebes, S., Lins, S., & Sunyaev, A. (2020). Trustworthy artificial intelligence.\u00a0Electronic Markets, 1\u201318.\u00a0https:\/\/doi.org\/10.1007\/s12525-020-00441-4","DOI":"10.1007\/s12525-020-00441-4"},{"key":"480_CR56","doi-asserted-by":"publisher","first-page":"75","DOI":"10.3389\/frobt.2017.00075","volume":"4","author":"J Torresen","year":"2018","unstructured":"Torresen, J. (2018). A review of future and ethical perspectives of robotics and AI. Frontiers in Robotics and AI, 4, 75.\u00a0https:\/\/doi.org\/10.3389\/frobt.2017.00075","journal-title":"Frontiers in Robotics and AI"},{"key":"480_CR57","unstructured":"Turton, W., & Martin, A. (2020). How deepfakes make disinformation more real than ever. Bloomberg.\u00a0https:\/\/www.bloomberg.com\/news\/articles\/2020-01-06\/how-deepfakes-make-disinformation-more-real-than-ever-quicktake"},{"key":"480_CR58","doi-asserted-by":"publisher","unstructured":"Vogl, T. M., Seidelin, C., Ganesh, B., & Bright, J. (2020). Smart technology and the emergence of algorithmic bureaucracy: Artificial Intelligence in UK local authorities. Public Administration Review, 80(6), 946\u2013961.\u00a0https:\/\/doi.org\/10.1111\/puar.13286","DOI":"10.1111\/puar.13286"},{"key":"480_CR59","first-page":"7","volume-title":"Risk Management and Insurance","author":"CA Williams","year":"1985","unstructured":"Williams, C. A., & Heins, R. M. (1985). Risk Management and Insurance,\u00a07\u20139. McGraw Hill."},{"key":"480_CR60","unstructured":"Winfield, A. (2017). A round up of robotics and AI ethics. Alan Winfield\u2019s Web Log. http:\/\/alanwinfield.blogspot.com\/2019\/04\/an-updated-round-up-of-ethical"},{"issue":"1","key":"480_CR61","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MCSE.2017.17","volume":"19","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Guo, K., Ren, J., Zhou, Y., Wang, J., & Chen, J. (2017). Transparent computing: A promising network computing paradigm. Computing in Science & Engineering, 19(1), 7\u201320.\u00a0https:\/\/doi.org\/10.1109\/MCSE.2017.17","journal-title":"Computing in Science & Engineering"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-021-00480-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12525-021-00480-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-021-00480-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,5]],"date-time":"2023-11-05T15:07:11Z","timestamp":1699196831000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12525-021-00480-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,2]]},"references-count":61,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["480"],"URL":"https:\/\/doi.org\/10.1007\/s12525-021-00480-5","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"value":"1019-6781","type":"print"},{"value":"1422-8890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,2]]},"assertion":[{"value":"31 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}