{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:55:13Z","timestamp":1729652113393,"version":"3.28.0"},"reference-count":64,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/sds49233.2020.00015","type":"proceedings-article","created":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T17:15:17Z","timestamp":1595351717000},"page":"41-46","source":"Crossref","is-referenced-by-count":10,"title":["A Comparative Assessment and Synthesis of Twenty Ethics Codes on AI and Big Data"],"prefix":"10.1109","author":[{"given":"Michele","family":"Loi","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Heitz","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Christen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"journal-title":"Privacy and Freedom","year":"1967","author":"westin","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-019-00378-3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1086\/233695"},{"journal-title":"The Limits of Organization","year":"1974","author":"arrow","key":"ref31"},{"journal-title":"The malicious use of artificial intelligence Forecasting prevention and mitigation","year":"2018","key":"ref30"},{"key":"ref37","first-page":"83","article-title":"Group Privacy: a defence and an interpretation","author":"floridi","year":"2016","journal-title":"Group Privacy New Challenges of Data Technologies"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-019-00351-0"},{"journal-title":"Individual and Group Privacy","year":"2003","author":"bloustein","key":"ref35"},{"journal-title":"Liberty","year":"1859","author":"mill","key":"ref34"},{"journal-title":"Groundwork for the Metaphysics of Morals","year":"2002","author":"kant","key":"ref60"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-12-2018-0095"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/BF00872305"},{"key":"ref63","article-title":"The malicious use of Artificial Intelligence: Forecasting, Prevention, and Mitigation","author":"brundage","year":"2018","journal-title":"ArXiv180207228 Cs"},{"journal-title":"GUIDELINES FOR AIDS","year":"2018","key":"ref28"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2019.00-15"},{"journal-title":"Ethically aligned design A vision for prioritizing human wellbeing with autonomous and intelligent systems version 1","year":"2019","key":"ref27"},{"key":"ref65","article-title":"People Analytics must benefit the people. An ethical analysis of data-driven algorithmic systems in human resources management","author":"loi","year":"2020","journal-title":"Algorithm"},{"journal-title":"Charlevoix Common Vision for the Future of Artificial Intelligence","article-title":"Leaders of the G7","year":"2018","key":"ref29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1162\/99608f92.8cd550d1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0088-2"},{"journal-title":"For a meaningful Artificial Intelligence Towards a French and European strategy","year":"2018","key":"ref20"},{"journal-title":"Universal guidelines for artificial intelligence","year":"2018","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-015-9375-8"},{"journal-title":"Why should I trust you?’ Explaining the predictions of any classifier","year":"2016","author":"ribeiro","key":"ref24"},{"journal-title":"ITI AI Policy Principles","year":"2017","key":"ref23"},{"journal-title":"Report of COMEST on Robotics Ethics","year":"2017","key":"ref26"},{"key":"ref25","first-page":"841","article-title":"Counterfactual explanations without opening the black box: Automated decisions and the GDPR.(2017)","volume":"31","author":"wachter","year":"2017","journal-title":"Harv J Law Technol"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372849"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372873"},{"key":"ref59","doi-asserted-by":"crossref","DOI":"10.4159\/9780674042582","author":"rawls","year":"1999","journal-title":"A Theory of Justice"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.4159\/9780674029651"},{"key":"ref56","article-title":"Fairness in machine learning: Lessons from political philosophy","author":"binns","year":"2018","journal-title":"J Mach Learn Res"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287584"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375854"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372838"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314248"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-020-09517-8"},{"journal-title":"Ethical principles for artificial intelligence and data analytics","year":"2017","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511625138.017"},{"journal-title":"Artificial Intelligence and Machine Learning Policy Paper","year":"2017","key":"ref12"},{"journal-title":"White Paper How to prevent discriminatory outcomes in machine learning","year":"2018","key":"ref13"},{"journal-title":"Ethics guidelines for trustworthy ai","year":"2019","key":"ref14"},{"journal-title":"10 Principles of responsible AI","article-title":"Women leading in AI","year":"0","key":"ref15"},{"journal-title":"Principles for accountable algorithms and a social impact statement for algorithms","year":"2016","key":"ref16"},{"journal-title":"Top 10 principles for ethical artificial intelligence","year":"2017","key":"ref17"},{"journal-title":"The Toronto Declaration Protecting the right to equality and nondiscrimination in machine learning systems","year":"2018","key":"ref18"},{"journal-title":"Declaration on Ethics and Data Protection in Artificial Intelligence","year":"2018","key":"ref19"},{"journal-title":"Asilomar AI Principle","year":"0","key":"ref4"},{"journal-title":"Directorate-General for Research and Innovation European Commission","article-title":"Statement on Artificial Intelligence, Robotics and ‘Autonomous’ Systems","year":"2018","key":"ref3"},{"journal-title":"Ethically aligned design A vision for prioritizing human wellbeing with autonomous and intelligent systems version 2","year":"2017","key":"ref6"},{"journal-title":"AI in the UK Ready Willing and Able?","year":"0","key":"ref5"},{"journal-title":"Montreal Declaration for a responsible development of AI","year":"2017","key":"ref8"},{"journal-title":"Tenets","year":"2016","key":"ref7"},{"key":"ref49","article-title":"On the (im)possibility of fairness","author":"friedler","year":"2016","journal-title":"ArXiv160907236 Cs Stat"},{"journal-title":"Principles of Biomedical Ethics","year":"2008","author":"beauchamp","key":"ref9"},{"journal-title":"Human Rights Quart","year":"2008","author":"griffin","key":"ref46"},{"journal-title":"Artificial Intelligence open questions about gender inclusion","year":"2018","key":"ref45"},{"journal-title":"Machine Learning","year":"1997","author":"mitchell","key":"ref48"},{"journal-title":"International Covenant on Civil and Political Rights","year":"0","key":"ref47"},{"journal-title":"Privacy and freedom of expression in the age of Artificial Intelligence","year":"2018","key":"ref42"},{"key":"ref41","first-page":"26","article-title":"Privacy, intimacy and personhood","volume":"6","author":"reiman","year":"1976","journal-title":"Philos Public Aff"},{"journal-title":"Ethical framework for a good AI society","year":"2019","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3388639"}],"event":{"name":"2020 7th Swiss Conference on Data Science (SDS)","start":{"date-parts":[[2020,6,26]]},"location":"Luzern, Switzerland","end":{"date-parts":[[2020,6,26]]}},"container-title":["2020 7th Swiss Conference on Data Science (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9142329\/9144743\/09145014.pdf?arnumber=9145014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T16:50:52Z","timestamp":1667494252000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9145014\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/sds49233.2020.00015","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}