{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:05:45Z","timestamp":1730322345340,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","funder":[{"name":"University of Cambridge"},{"name":"Microsoft","award":["Microsoft Cloud Computing Research Centre"]},{"name":"Engineering and Physical Sciences Research Council"},{"name":"Aviva"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,7]]},"DOI":"10.1145\/3375627.3375873","type":"proceedings-article","created":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T01:10:22Z","timestamp":1580865022000},"page":"300-306","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Monitoring Misuse for Accountable 'Artificial Intelligence as a Service'"],"prefix":"10.1145","author":[{"given":"Seyyed Ahmad","family":"Javadi","sequence":"first","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Richard","family":"Cloete","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Jennifer","family":"Cobbe","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Michelle Seng Ah","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Jatinder","family":"Singh","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon. 2019. Build an AI-driven Application. https:\/\/aws.amazon.com\/machine-learning\/ai-services\/ Amazon. 2019. Build an AI-driven Application. https:\/\/aws.amazon.com\/machine-learning\/ai-services\/"},{"volume-title":"et almbox","year":"2018","author":"Brundage Miles","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"volume-title":"Administrative Law and the Machines of Government: Judicial Review of Automated Public-Sector Decision-Making. Legal Studies","year":"2019","author":"Cobbe J.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Kate Conger Richard Fausset and Serge F Kovaleski. 2019. San Francisco Bans Facial Recognition Technology. https:\/\/www.nytimes.com\/2019\/05\/14\/us\/facial-recognition-ban-san-francisco.html Kate Conger Richard Fausset and Serge F Kovaleski. 2019. San Francisco Bans Facial Recognition Technology. https:\/\/www.nytimes.com\/2019\/05\/14\/us\/facial-recognition-ban-san-francisco.html"},{"key":"e_1_3_2_1_7_1","unstructured":"Sabbagh Dan. 2019. Facial Recognition Technology Scrapped at King's Cross Site. https:\/\/www.theguardian.com\/technology\/2019\/sep\/02\/facial-recognition-technology-scrapped-at-kings-cross-development Sabbagh Dan. 2019. Facial Recognition Technology Scrapped at King's Cross Site. https:\/\/www.theguardian.com\/technology\/2019\/sep\/02\/facial-recognition-technology-scrapped-at-kings-cross-development"},{"volume-title":"Big data, data mining, and machine learning value creation for business leaders and practitioners \/ Jared Dean","author":"Dean Jared","key":"e_1_3_2_1_8_1"},{"volume-title":"Media & Sport","year":"2019","author":"Department for Digital, Culture","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"European Union Agency for Fundamental Rights. 2019. Facial Recognition Technology: Fundamental Rights Considerations in the Context of Law Enforcement. https:\/\/fra.europa.eu\/en\/publication\/2019\/facial-recognition European Union Agency for Fundamental Rights. 2019. Facial Recognition Technology: Fundamental Rights Considerations in the Context of Law Enforcement. https:\/\/fra.europa.eu\/en\/publication\/2019\/facial-recognition"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_12_1","unstructured":"Google. 2019 a. AI and machine learning products. https:\/\/cloud.google.com\/products\/ai\/building-blocks\/ Google. 2019 a. AI and machine learning products. https:\/\/cloud.google.com\/products\/ai\/building-blocks\/"},{"key":"e_1_3_2_1_13_1","unstructured":"Google. 2019 b. Our approach to facial recongition . https:\/\/ai.google\/responsibilities\/facial-recognition\/ Google. 2019 b. Our approach to facial recongition . https:\/\/ai.google\/responsibilities\/facial-recognition\/"},{"key":"e_1_3_2_1_14_1","first-page":"99","article-title":"Deepfakes: False Pornography Is Here and the Law Cannot Protect You","volume":"17","author":"Harris Douglas","year":"2018","journal-title":"Duke L. & Tech. Rev."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Keiko Hashizume Nobukazu Yoshioka and Eduardo B Fernandez. 2013. Three Misuse Patterns for Cloud Computing . In Security Engineering for Cloud Computing: Approaches and Tools. IGI Global 36--53. Keiko Hashizume Nobukazu Yoshioka and Eduardo B Fernandez. 2013. Three Misuse Patterns for Cloud Computing . In Security Engineering for Cloud Computing: Approaches and Tools. IGI Global 36--53.","DOI":"10.4018\/978-1-4666-2125-1.ch003"},{"volume-title":"Towards Digital Enlightenment","author":"Helbing Dirk","key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-90869-4"},{"key":"e_1_3_2_1_17_1","unstructured":"Vincent James. 2019. Microsoft Denied Police Facial Recognition Tech Over Human Rights Concerns. https:\/\/www.theverge.com\/2019\/4\/17\/18411757\/microsoft-facial-recognition-sales-refused-police-access Vincent James. 2019. Microsoft Denied Police Facial Recognition Tech Over Human Rights Concerns. https:\/\/www.theverge.com\/2019\/4\/17\/18411757\/microsoft-facial-recognition-sales-refused-police-access"},{"volume-title":"Towards Abuse Detection and Prevention in IaaS Cloud Computing. In 2015 10th International Conference on Availability, Reliability and Security. IEEE, 211--217","year":"2015","author":"Lindemann Jens","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"Bernard Marr. 2018. The AI Skills Crisis And How To Close The Gap. https:\/\/www.forbes.com\/sites\/bernardmarr\/2018\/06\/25\/the-ai-skills-crisis-and-how-to-close-the-gap\/ Bernard Marr. 2018. The AI Skills Crisis And How To Close The Gap. https:\/\/www.forbes.com\/sites\/bernardmarr\/2018\/06\/25\/the-ai-skills-crisis-and-how-to-close-the-gap\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Microsoft. 2019 a. Cognitive Services. https:\/\/azure.microsoft.com\/en-gb\/services\/cognitive-services Microsoft. 2019 a. Cognitive Services. https:\/\/azure.microsoft.com\/en-gb\/services\/cognitive-services"},{"key":"e_1_3_2_1_21_1","unstructured":"Microsoft. 2019 b. Six Principles For Developing and Deploying Facial Recognition Technology . https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2018\/12\/MSFT-Principles-on-Facial-Recognition.pdf Microsoft. 2019 b. Six Principles For Developing and Deploying Facial Recognition Technology . https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2018\/12\/MSFT-Principles-on-Facial-Recognition.pdf"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/19419899.2018.1468353"},{"key":"e_1_3_2_1_23_1","unstructured":"European Court of Justice. [n.d.]. LF v YouTube (C-682\/18). European Court of Justice. [n.d.]. LF v YouTube (C-682\/18)."},{"key":"e_1_3_2_1_24_1","unstructured":"European Court of Justice. 2010. Google France SARL and Google Inc. v Louis Vuitton (C-236\/08) ECLI:EU:C:2010:159. European Court of Justice. 2010. Google France SARL and Google Inc. v Louis Vuitton (C-236\/08) ECLI:EU:C:2010:159."},{"key":"e_1_3_2_1_25_1","unstructured":"European Court of Justice. 2011. L'Or\u00e8al SA and Others v eBay International AG and Others (C-324\/09) ECLI:EU:C:2011:474. European Court of Justice. 2011. L'Or\u00e8al SA and Others v eBay International AG and Others (C-324\/09) ECLI:EU:C:2011:474."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Saeedeh Parsaeefard Iman Tabrizian and Alberto Leon-Garcia. 2019. Artificial Intelligence as a Services (AI-aaS) on Software-Defined Infrastructure .arxiv: cs.LG\/1907.05505 Saeedeh Parsaeefard Iman Tabrizian and Alberto Leon-Garcia. 2019. Artificial Intelligence as a Services (AI-aaS) on Software-Defined Infrastructure .arxiv: cs.LG\/1907.05505","DOI":"10.1109\/CSCN.2019.8931372"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.66"},{"key":"e_1_3_2_1_28_1","article-title":"A Survey of Machine Learning for Big Data Processing","volume":"2016","author":"Qiu Junfei","year":"2016","journal-title":"Eurasip Journal on Advances in Signal Processing"},{"key":"e_1_3_2_1_29_1","first-page":"127","article-title":"Building Trust in Artificial Intelligence","volume":"72","author":"Rossi Francesca","year":"2019","journal-title":"Journal of international affairs"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887201"},{"volume-title":"Facial Recognition: It's Time for Action. https:\/\/blogs.microsoft.com\/on-the-issues\/2018\/12\/06\/facial-recognition-its-time-for-action\/","year":"2018","author":"Smith Brad","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"e_1_3_2_1_33_1","unstructured":"European Union. 2000. Directive 2000\/31\/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services in particular electronic commerce in the Internal Market (E-Commerce Directive) OJ L 178. European Union. 2000. Directive 2000\/31\/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services in particular electronic commerce in the Internal Market (E-Commerce Directive) OJ L 178."},{"key":"e_1_3_2_1_34_1","unstructured":"European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) OJ L 119. European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) OJ L 119."},{"key":"e_1_3_2_1_35_1","unstructured":"European Union. 2019. Directive (EU) 2019\/790 of the European Parliament and of the Council of 17 April 2019 on copyright and related rights in the Digital Single Market and amending Directives 96\/9\/EC and 2001\/29\/EC OJ L 130. European Union. 2019. Directive (EU) 2019\/790 of the European Parliament and of the Council of 17 April 2019 on copyright and related rights in the Digital Single Market and amending Directives 96\/9\/EC and 2001\/29\/EC OJ L 130."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2018.0083"},{"key":"e_1_3_2_1_37_1","unstructured":"Kent Walker. 2018. AI for Social Good in Asia Pacific. https:\/\/www.blog.google\/around-the-globe\/google-asia\/ai-social-good-asia-pacific\/amp\/ Kent Walker. 2018. AI for Social Good in Asia Pacific. https:\/\/www.blog.google\/around-the-globe\/google-asia\/ai-social-good-asia-pacific\/amp\/"},{"key":"e_1_3_2_1_38_1","unstructured":"Sarah Whittaker. 2018. What's The Big Deal? The Controversy on Google's AI and Pentagon Drones. https:\/\/dronebelow.com\/2018\/03\/08\/whats-the-big-deal-the-controversy-on-googles-ai-and-pentagon-drones\/ Sarah Whittaker. 2018. What's The Big Deal? The Controversy on Google's AI and Pentagon Drones. https:\/\/dronebelow.com\/2018\/03\/08\/whats-the-big-deal-the-controversy-on-googles-ai-and-pentagon-drones\/"},{"key":"e_1_3_2_1_39_1","unstructured":"Doffman Zak. 2019. Hong Kong Exposes Both Sides Of China's Relentless Facial Recognition Machine. https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/08\/26\/hong-kong-exposes-both-sides-of-chinas-relentless-facial-recognition-machine\/ Doffman Zak. 2019. Hong Kong Exposes Both Sides Of China's Relentless Facial Recognition Machine. https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/08\/26\/hong-kong-exposes-both-sides-of-chinas-relentless-facial-recognition-machine\/"},{"volume-title":"Responsible Facial Recognition and Beyond . arXiv:1909.12935","year":"2019","author":"Zeng Yi","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.01.026"}],"event":{"name":"AIES '20: AAAI\/ACM Conference on AI, Ethics, and Society","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"New York NY USA","acronym":"AIES '20"},"container-title":["Proceedings of the AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375627.3375873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T19:50:04Z","timestamp":1673034604000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375627.3375873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,7]]},"references-count":41,"alternative-id":["10.1145\/3375627.3375873","10.1145\/3375627"],"URL":"https:\/\/doi.org\/10.1145\/3375627.3375873","relation":{},"subject":[],"published":{"date-parts":[[2020,2,7]]},"assertion":[{"value":"2020-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}