{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:05:44Z","timestamp":1740099944581,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":133,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1815507,1707296"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,3]]},"DOI":"10.1145\/3442188.3445885","type":"proceedings-article","created":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T01:26:24Z","timestamp":1614734784000},"page":"215-227","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Data Leverage"],"prefix":"10.1145","author":[{"given":"Nicholas","family":"Vincent","sequence":"first","affiliation":[{"name":"Northwestern University"}]},{"given":"Hanlin","family":"Li","sequence":"additional","affiliation":[{"name":"Northwestern University"}]},{"given":"Nicole","family":"Tilly","sequence":"additional","affiliation":[{"name":"Northwestern University"}]},{"given":"Stevie","family":"Chancellor","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]},{"given":"Brent","family":"Hecht","sequence":"additional","affiliation":[{"name":"Northwestern University"}]}],"member":"320","published-online":{"date-parts":[[2021,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Art. 20 GDPR - Right to data portability | General Data Protection Regulation (GDPR). https:\/\/gdpr-info.eu\/art-20-gdpr 2018. Art. 20 GDPR - Right to data portability | General Data Protection Regulation (GDPR). https:\/\/gdpr-info.eu\/art-20-gdpr"},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/www.law.cornell.edu\/uscode\/text\/18\/1030 [Online","author":"Code U.S.","year":"2020","unstructured":"2020. 18 U.S. Code § 1030 - Fraud and related activity in connection with computers. https:\/\/www.law.cornell.edu\/uscode\/text\/18\/1030 [Online ; accessed 7. Oct. 2020 ]. 2020. 18 U.S. Code § 1030 - Fraud and related activity in connection with computers. https:\/\/www.law.cornell.edu\/uscode\/text\/18\/1030 [Online; accessed 7. Oct. 2020]."},{"volume-title":"Tech Workers Coalition. https:\/\/techworkerscoalition.org [Online","year":"2020","key":"e_1_3_2_1_3_1","unstructured":"2020. Tech Workers Coalition. https:\/\/techworkerscoalition.org [Online ; accessed 6. Oct. 2020 ]. 2020. Tech Workers Coalition. https:\/\/techworkerscoalition.org [Online; accessed 6. Oct. 2020]."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/en.wikipedia.org\/w\/index.php?title=Wikipedia:Academic_studies_of_Wikipedia&oldid=971074694 [Online","author":"Wikipedia Academic","year":"2020","unstructured":"2020. Wikipedia: Academic studies of Wikipedia - Wikipedia . https:\/\/en.wikipedia.org\/w\/index.php?title=Wikipedia:Academic_studies_of_Wikipedia&oldid=971074694 [Online ; accessed 29. Sep. 2020 ]. 2020. Wikipedia:Academic studies of Wikipedia - Wikipedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Wikipedia:Academic_studies_of_Wikipedia&oldid=971074694 [Online; accessed 29. Sep. 2020]."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372871"},{"key":"e_1_3_2_1_7_1","volume-title":"Politics of Adversarial Machine Learning. In Towards Trustworthy ML: Rethinking Security and Privacy for ML Workshop, Eighth International Conference on Learning Representations (ICLR).","author":"Albert Kendra","year":"2020","unstructured":"Kendra Albert , Jon Penney , Bruce Schneier , and Ram Shankar Siva Kumar . 2020 . Politics of Adversarial Machine Learning. In Towards Trustworthy ML: Rethinking Security and Privacy for ML Workshop, Eighth International Conference on Learning Representations (ICLR). Kendra Albert, Jon Penney, Bruce Schneier, and Ram Shankar Siva Kumar. 2020. Politics of Adversarial Machine Learning. In Towards Trustworthy ML: Rethinking Security and Privacy for ML Workshop, Eighth International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"American Economic Association Papers & Proceedings 1","author":"Ibarra Imanol Arrieta","year":"2018","unstructured":"Imanol Arrieta Ibarra , Leonard Goff , Diego Jim\u00e9nez Hern\u00e1ndez , Jaron Lanier , and E Weyl . 2018 . Should We Treat Data as Labor? Moving Beyond 'Free '. American Economic Association Papers & Proceedings 1 , 1 (2018). Imanol Arrieta Ibarra, Leonard Goff, Diego Jim\u00e9nez Hern\u00e1ndez, Jaron Lanier, and E Weyl. 2018. Should We Treat Data as Labor? Moving Beyond 'Free'. American Economic Association Papers & Proceedings 1, 1 (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715594634"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"e_1_3_2_1_11_1","volume-title":"Eric PS.","author":"Brubaker Ames Morgan G.","year":"2014","unstructured":"Ames Morgan G. Brubaker Jed R. Burrell Jenna Dourish Paul Baumer , Eric PS. 2014 . Refusing, Limiting, Departing : Why We Should Study Technology Non-Use. In CHI EA '14: CHI '14 Extended Abstracts on Human Factors in Computing Systems . 65--68. Ames Morgan G. Brubaker Jed R. Burrell Jenna Dourish Paul Baumer, Eric PS. 2014. Refusing, Limiting, Departing: Why We Should Study Technology Non-Use. In CHI EA '14: CHI '14 Extended Abstracts on Human Factors in Computing Systems. 65--68."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174190"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466446"},{"key":"e_1_3_2_1_14_1","volume-title":"Missing photos, suffering withdrawal, or finding freedom? How experiences of social media non-use influence the likelihood of reversion. Social Media+ Society 1, 2","author":"Baumer Eric PS","year":"2015","unstructured":"Eric PS Baumer , Shion Guha , Emily Quan , David Mimno , and Geri K Gay . 2015. Missing photos, suffering withdrawal, or finding freedom? How experiences of social media non-use influence the likelihood of reversion. Social Media+ Society 1, 2 ( 2015 ), 2056305115614851. Eric PS Baumer, Shion Guha, Emily Quan, David Mimno, and Geri K Gay. 2015. Missing photos, suffering withdrawal, or finding freedom? How experiences of social media non-use influence the likelihood of reversion. Social Media+ Society 1, 2 (2015), 2056305115614851."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359182"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7347"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/jla\/laz005"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243916656059"},{"key":"e_1_3_2_1_19_1","volume-title":"Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389","author":"Biggio Battista","year":"2012","unstructured":"Battista Biggio , Blaine Nelson , and Pavel Laskov . 2012. Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389 ( 2012 ). Battista Biggio, Blaine Nelson, and Pavel Laskov. 2012. Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389 (2012)."},{"key":"e_1_3_2_1_20_1","volume-title":"Conference on Fairness, Accountability and Transparency. 149--159","author":"Binns Reuben","year":"2018","unstructured":"Reuben Binns . 2018 . Fairness in machine learning: Lessons from political philosophy . In Conference on Fairness, Accountability and Transparency. 149--159 . Reuben Binns. 2018. Fairness in machine learning: Lessons from political philosophy. In Conference on Fairness, Accountability and Transparency. 149--159."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics, 854--864","author":"Bloodgood Michael","year":"2010","unstructured":"Michael Bloodgood and Chris Callison-Burch . 2010 . Bucking the trend: large-scale cost-focused active learning for statistical machine translation . In Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics, 854--864 . Michael Bloodgood and Chris Callison-Burch. 2010. Bucking the trend: large-scale cost-focused active learning for statistical machine translation. In Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics, 854--864."},{"key":"e_1_3_2_1_22_1","unstructured":"Tom B. Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell Sandhini Agarwal Ariel Herbert-Voss Gretchen Krueger Tom Henighan Rewon Child Aditya Ramesh Daniel M. Ziegler Jeffrey Wu Clemens Winter Christopher Hesse Mark Chen Eric Sigler Mateusz Litwin Scott Gray Benjamin Chess Jack Clark Christopher Berner Sam McCandlish Alec Radford Ilya Sutskever and Dario Amodei. 2020. Language Models are Few-Shot Learners. arXiv:cs.CL\/2005.14165 Tom B. Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell Sandhini Agarwal Ariel Herbert-Voss Gretchen Krueger Tom Henighan Rewon Child Aditya Ramesh Daniel M. Ziegler Jeffrey Wu Clemens Winter Christopher Hesse Mark Chen Eric Sigler Mateusz Litwin Scott Gray Benjamin Chess Jack Clark Christopher Berner Sam McCandlish Alec Radford Ilya Sutskever and Dario Amodei. 2020. Language Models are Few-Shot Learners. arXiv:cs.CL\/2005.14165"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814542311"},{"volume-title":"Obfuscation: a user's guide for privacy and protest","author":"Brunton Finn","key":"e_1_3_2_1_24_1","unstructured":"Finn Brunton and Helen Fay Nissenbaum . 2015. Obfuscation: a user's guide for privacy and protest . MIT Press , Cambridge, Massachusetts . Finn Brunton and Helen Fay Nissenbaum. 2015. Obfuscation: a user's guide for privacy and protest. MIT Press, Cambridge, Massachusetts."},{"volume-title":"The second machine age: Work, progress, and prosperity in a time of brilliant technologies","author":"Brynjolfsson Erik","key":"e_1_3_2_1_25_1","unstructured":"Erik Brynjolfsson and Andrew McAfee . 2014. The second machine age: Work, progress, and prosperity in a time of brilliant technologies . WW Norton & Company . Erik Brynjolfsson and Andrew McAfee. 2014. The second machine age: Work, progress, and prosperity in a time of brilliant technologies. WW Norton & Company."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.p20161016"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940787"},{"key":"e_1_3_2_1_28_1","volume-title":"Non-participation in digital media: toward a framework of mediated political action. Media","author":"Casemajor Nathalie","year":"2015","unstructured":"Nathalie Casemajor , Stifmmode\\acutee\\else\u00e9\\fiphane Couture, Mauricio Delfin , Matthew Goerzen , and Alessandro Delfanti . 2015. Non-participation in digital media: toward a framework of mediated political action. Media , Culture & Society 37, 6 ( May 2015 ), 850--866. https:\/\/doi.org\/10.1177\/0163443715584098 Publisher : SAGE Publications Ltd . 10.1177\/0163443715584098 Nathalie Casemajor, Stifmmode\\acutee\\else\u00e9\\fiphane Couture, Mauricio Delfin, Matthew Goerzen, and Alessandro Delfanti. 2015. Non-participation in digital media: toward a framework of mediated political action. Media, Culture & Society 37, 6 (May 2015), 850--866. https:\/\/doi.org\/10.1177\/0163443715584098 Publisher: SAGE Publications Ltd."},{"key":"e_1_3_2_1_29_1","volume-title":"Eric PS Baumer, and Munmun De Choudhury","author":"Chancellor Stevie","year":"2019","unstructured":"Stevie Chancellor , Eric PS Baumer, and Munmun De Choudhury . 2019 . Who is the\" Human\" in Human-Centered Machine Learning : The Case of Predicting Mental Health from Social Media. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1--32. Stevie Chancellor, Eric PS Baumer, and Munmun De Choudhury. 2019. Who is the\" Human\" in Human-Centered Machine Learning: The Case of Predicting Mental Health from Social Media. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1--32."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1097047.1097061"},{"key":"e_1_3_2_1_31_1","volume-title":"How much data is needed to train a medical image deep learning system to achieve necessary high accuracy? arXiv preprint arXiv:1511.06348","author":"Cho Junghwan","year":"2015","unstructured":"Junghwan Cho , Kyewook Lee , Ellie Shin , Garry Choy , and Synho Do. 2015. How much data is needed to train a medical image deep learning system to achieve necessary high accuracy? arXiv preprint arXiv:1511.06348 ( 2015 ). Junghwan Cho, Kyewook Lee, Ellie Shin, Garry Choy, and Synho Do. 2015. How much data is needed to train a medical image deep learning system to achieve necessary high accuracy? arXiv preprint arXiv:1511.06348 (2015)."},{"key":"e_1_3_2_1_32_1","volume-title":"Unsell Yourself---A Protest Model Against Facebook. Yale Law & Technology","author":"Cho Max","year":"2011","unstructured":"Max Cho . 2011. Unsell Yourself---A Protest Model Against Facebook. Yale Law & Technology ( 2011 ). Max Cho. 2011. Unsell Yourself---A Protest Model Against Facebook. Yale Law & Technology (2011)."},{"key":"e_1_3_2_1_33_1","volume-title":"Jennifer Rode, Anna Lauren Hoffmann, Niloufar Salehi, and Lisa Nakamura.","author":"Cifor Marika","year":"2019","unstructured":"Marika Cifor , Patricia Garcia , TL Cowan , Jasmine Rault , Tonia Sutherland , Anita Say Chan , Jennifer Rode, Anna Lauren Hoffmann, Niloufar Salehi, and Lisa Nakamura. 2019 . Feminist data manifest-no. Marika Cifor, Patricia Garcia, TL Cowan, Jasmine Rault, Tonia Sutherland, Anita Say Chan, Jennifer Rode, Anna Lauren Hoffmann, Niloufar Salehi, and Lisa Nakamura. 2019. Feminist data manifest-no."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951714539277"},{"key":"e_1_3_2_1_35_1","volume-title":"Anatomy of an AI System-The Amazon Echo as an anatomical map of human labor, data and planetary resources","author":"Crawford Kate","year":"2018","unstructured":"Kate Crawford and Vladan Joler . 2018. Anatomy of an AI System-The Amazon Echo as an anatomical map of human labor, data and planetary resources . AI Now Institute and Share Lab 7 ( 2018 ). Kate Crawford and Vladan Joler. 2018. Anatomy of an AI System-The Amazon Echo as an anatomical map of human labor, data and planetary resources. AI Now Institute and Share Lab 7 (2018)."},{"volume-title":"Data feminism","author":"D'Ignazio Catherine","key":"e_1_3_2_1_37_1","unstructured":"Catherine D'Ignazio and Lauren F Klein . 2020. Data feminism . MIT Press . Catherine D'Ignazio and Lauren F Klein. 2020. Data feminism. MIT Press."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025728"},{"key":"e_1_3_2_1_39_1","volume-title":"Increased Diels-Alderase activity through backbone remodeling guided by Foldit players. Nature biotechnology 30, 2","author":"Eiben Christopher B","year":"2012","unstructured":"Christopher B Eiben , Justin B Siegel , Jacob B Bale , Seth Cooper , Firas Khatib , Betty W Shen , Barry L Stoddard , Zoran Popovic , and David Baker . 2012. Increased Diels-Alderase activity through backbone remodeling guided by Foldit players. Nature biotechnology 30, 2 ( 2012 ), 190--192. Christopher B Eiben, Justin B Siegel, Jacob B Bale, Seth Cooper, Firas Khatib, Betty W Shen, Barry L Stoddard, Zoran Popovic, and David Baker. 2012. Increased Diels-Alderase activity through backbone remodeling guided by Foldit players. Nature biotechnology 30, 2 (2012), 190--192."},{"key":"e_1_3_2_1_40_1","volume-title":"Sorelle A. Friedler and Christo Wilson (Eds.)","volume":"81","author":"Ekstrand Michael D.","year":"2018","unstructured":"Michael D. Ekstrand , Rezvan Joshaghani , and Hoda Mehrpouyan . 2018 . Privacy for All: Ensuring Fair and Equitable Privacy Protections (Proceedings of Machine Learning Research) , Sorelle A. Friedler and Christo Wilson (Eds.) , Vol. 81 . PMLR, New York, NY, USA, 35--47. http:\/\/proceedings.mlr.press\/v81\/ekstrand18a.html Michael D. Ekstrand, Rezvan Joshaghani, and Hoda Mehrpouyan. 2018. Privacy for All: Ensuring Fair and Equitable Privacy Protections (Proceedings of Machine Learning Research), Sorelle A. Friedler and Christo Wilson (Eds.), Vol. 81. PMLR, New York, NY, USA, 35--47. http:\/\/proceedings.mlr.press\/v81\/ekstrand18a.html"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320435.3320464"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Motahhare Eslami Kristen Vaccaro Karrie Karahalios and Kevin Hamilton. 2017. \" Be Careful; Things Can Be Worse than They Appear\": Understanding Biased Algorithms and Users' Behavior Around Them in Rating Platforms.. In ICWSM. 62--71. Motahhare Eslami Kristen Vaccaro Karrie Karahalios and Kevin Hamilton. 2017. \" Be Careful; Things Can Be Worse than They Appear\": Understanding Biased Algorithms and Users' Behavior Around Them in Rating Platforms.. In ICWSM. 62--71.","DOI":"10.1609\/icwsm.v11i1.14898"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300724"},{"volume-title":"Automating inequality: How high-tech tools profile, police, and punish the poor","author":"Eubanks Virginia","key":"e_1_3_2_1_44_1","unstructured":"Virginia Eubanks . 2018. Automating inequality: How high-tech tools profile, police, and punish the poor . St. Martin's Press . Virginia Eubanks. 2018. Automating inequality: How high-tech tools profile, police, and punish the poor. St. Martin's Press."},{"key":"e_1_3_2_1_45_1","volume-title":"Neil Zhenqiang Gong, and Jia Liu","author":"Fang Minghong","year":"2020","unstructured":"Minghong Fang , Neil Zhenqiang Gong, and Jia Liu . 2020 . Influence Function based Data Poisoning Attacks to Top-N Recommender Systems. Association for Computing Machinery , New York, NY, USA. https:\/\/doi.org\/10.1145\/3366423.3380072 10.1145\/3366423.3380072 Minghong Fang, Neil Zhenqiang Gong, and Jia Liu. 2020. Influence Function based Data Poisoning Attacks to Top-N Recommender Systems. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3366423.3380072"},{"key":"e_1_3_2_1_46_1","volume-title":"Predicting sample size required for classification performance. BMC medical informatics and decision making 12, 1","author":"Figueroa Rosa L","year":"2012","unstructured":"Rosa L Figueroa , Qing Zeng-Treitler , Sasikiran Kandula , and Long H Ngo . 2012. Predicting sample size required for classification performance. BMC medical informatics and decision making 12, 1 ( 2012 ), 8. https:\/\/link.springer.com\/article\/10.1186\/1472-6947-12-8 Publisher : Springer . Rosa L Figueroa, Qing Zeng-Treitler, Sasikiran Kandula, and Long H Ngo. 2012. Predicting sample size required for classification performance. BMC medical informatics and decision making 12, 1 (2012), 8. https:\/\/link.springer.com\/article\/10.1186\/1472-6947-12-8 Publisher: Springer."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512938.2512946"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406865.3419014"},{"key":"e_1_3_2_1_49_1","volume-title":"Oxford Handbook on AI Ethics Book","author":"Gebru Timnit","year":"1908","unstructured":"Timnit Gebru . 2019. Oxford Handbook on AI Ethics Book Chapter on Race and Gender. arXiv preprint arXiv: 1908 .06165 (2019). Timnit Gebru. 2019. Oxford Handbook on AI Ethics Book Chapter on Race and Gender. arXiv preprint arXiv:1908.06165 (2019)."},{"key":"e_1_3_2_1_50_1","unstructured":"Jonas Geiping Liam Fowl W. Ronny Huang Wojciech Czaja Gavin Taylor Michael Moeller and Tom Goldstein. 2020. Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching. arXiv:cs.CV\/2009.02276 Jonas Geiping Liam Fowl W. Ronny Huang Wojciech Czaja Gavin Taylor Michael Moeller and Tom Goldstein. 2020. Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching. arXiv:cs.CV\/2009.02276"},{"key":"e_1_3_2_1_51_1","volume-title":"Algorithmically recognizable: Santorum's Google problem, and Google's Santorum problem. Information, communication & society 20, 1","author":"Gillespie Tarleton","year":"2017","unstructured":"Tarleton Gillespie . 2017. Algorithmically recognizable: Santorum's Google problem, and Google's Santorum problem. Information, communication & society 20, 1 ( 2017 ), 63--80. Tarleton Gillespie. 2017. Algorithmically recognizable: Santorum's Google problem, and Google's Santorum problem. Information, communication & society 20, 1 (2017), 63--80."},{"volume-title":"Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media","author":"Gillespie Tarleton","key":"e_1_3_2_1_52_1","unstructured":"Tarleton Gillespie . 2018. Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media . Yale University Press . Tarleton Gillespie. 2018. Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media. Yale University Press."},{"key":"e_1_3_2_1_53_1","volume-title":"Data voids: Where missing data can easily be exploited","author":"Golebiewski Michael","year":"2019","unstructured":"Michael Golebiewski and Danah Boyd . 2019. Data voids: Where missing data can easily be exploited . Data & Society ( 2019 ). Michael Golebiewski and Danah Boyd. 2019. Data voids: Where missing data can easily be exploited. Data & Society (2019)."},{"key":"e_1_3_2_1_54_1","volume-title":"5th Workshop on fairness, accountability, and transparency in machine learning.","author":"Green Ben","year":"2018","unstructured":"Ben Green . 2018 . ' Fair' Risk Assessments: A Precarious Approach for Criminal Justice Reform . In 5th Workshop on fairness, accountability, and transparency in machine learning. Ben Green. 2018. 'Fair' Risk Assessments: A Precarious Approach for Criminal Justice Reform. In 5th Workshop on fairness, accountability, and transparency in machine learning."},{"key":"e_1_3_2_1_55_1","volume-title":"NAACP Seeks Week-Long Facebook Boycott Over Racial Targeting. Bloomberg.com (Dec","author":"Greenfield Rebecca","year":"2018","unstructured":"Rebecca Greenfield , Sarah Frier , and Ben Brody . 2018. NAACP Seeks Week-Long Facebook Boycott Over Racial Targeting. Bloomberg.com (Dec . 2018 ). https:\/\/www.bloomberg.com\/news\/articles\/2018-12-17\/naacp-calls-for-week-long-facebook-boycott-over-racial-targeting Rebecca Greenfield, Sarah Frier, and Ben Brody. 2018. NAACP Seeks Week-Long Facebook Boycott Over Racial Targeting. Bloomberg.com (Dec. 2018). https:\/\/www.bloomberg.com\/news\/articles\/2018-12-17\/naacp-calls-for-week-long-facebook-boycott-over-racial-targeting"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9364-9"},{"key":"e_1_3_2_1_57_1","volume-title":"Open data: Empowering the empowered or effective data use for everyone? First Monday 16 (02","author":"Gurstein Michael","year":"2011","unstructured":"Michael Gurstein . 2011. Open data: Empowering the empowered or effective data use for everyone? First Monday 16 (02 2011 ). https:\/\/doi.org\/10.5210\/fm.v16i2.3316 10.5210\/fm.v16i2.3316 Michael Gurstein. 2011. Open data: Empowering the empowered or effective data use for everyone? First Monday 16 (02 2011). https:\/\/doi.org\/10.5210\/fm.v16i2.3316"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240697"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174023"},{"key":"e_1_3_2_1_60_1","unstructured":"B Hecht L Wilcox JP Bigham J Sch\u00f6ning E Hoque J Ernst Y Bisk L De Russis L Yarosh B Anjum and others. 2018. It's time to do something: Mitigating the negative impacts of computing through a change to the peer review process. B Hecht L Wilcox JP Bigham J Sch\u00f6ning E Hoque J Ernst Y Bisk L De Russis L Yarosh B Anjum and others. 2018. It's time to do something: Mitigating the negative impacts of computing through a change to the peer review process."},{"key":"e_1_3_2_1_61_1","volume-title":"Deep learning scaling is predictable, empirically. arXiv preprint arXiv:1712.00409","author":"Hestness Joel","year":"2017","unstructured":"Joel Hestness , Sharan Narang , Newsha Ardalani , Gregory Diamos , Heewoo Jun , Hassan Kianinejad , Md Patwary , Mostofa Ali , Yang Yang , and Yanqi Zhou . 2017. Deep learning scaling is predictable, empirically. arXiv preprint arXiv:1712.00409 ( 2017 ). Joel Hestness, Sharan Narang, Newsha Ardalani, Gregory Diamos, Heewoo Jun, Hassan Kianinejad, Md Patwary, Mostofa Ali, Yang Yang, and Yanqi Zhou. 2017. Deep learning scaling is predictable, empirically. arXiv preprint arXiv:1712.00409 (2017)."},{"key":"e_1_3_2_1_62_1","volume-title":"Wikipedia matters. Available at SSRN 3046400","author":"Hinnosaar Marit","year":"2019","unstructured":"Marit Hinnosaar , Toomas Hinnosaar , Michael E Kummer , and Olga Slivko . 2019. Wikipedia matters. Available at SSRN 3046400 ( 2019 ). Marit Hinnosaar, Toomas Hinnosaar, Michael E Kummer, and Olga Slivko. 2019. Wikipedia matters. Available at SSRN 3046400 (2019)."},{"key":"e_1_3_2_1_63_1","unstructured":"Daniel C Howe and Helen Nissenbaum. 2017. Engineering Privacy and Protest: A Case Study of AdNauseam.. In IWPE@ SP. 57--64. Daniel C Howe and Helen Nissenbaum. 2017. Engineering Privacy and Protest: A Case Study of AdNauseam.. In IWPE@ SP. 57--64."},{"key":"e_1_3_2_1_64_1","volume-title":"Gaming the system: Fake online reviews v. consumer law. Computer law & security review 31, 1","author":"Hunt Kate Mathews","year":"2015","unstructured":"Kate Mathews Hunt . 2015. Gaming the system: Fake online reviews v. consumer law. Computer law & security review 31, 1 ( 2015 ), 3--25. Kate Mathews Hunt. 2015. Gaming the system: Fake online reviews v. consumer law. Computer law & security review 31, 1 (2015), 3--25."},{"volume-title":"Networks of Race and Gender Justice","author":"Jackson Sarah J","key":"e_1_3_2_1_65_1","unstructured":"Sarah J Jackson , Moya Bailey , and Brooke Foucault Welles . 2020. # HashtagActivism : Networks of Race and Gender Justice . MIT Press . Sarah J Jackson, Moya Bailey, and Brooke Foucault Welles. 2020. # HashtagActivism: Networks of Race and Gender Justice. MIT Press."},{"key":"e_1_3_2_1_66_1","volume-title":"How to use Google Takeout to download your Google data-Business Insider. Business Insider (Jan","author":"James Ross","year":"2020","unstructured":"Ross James . 2020. How to use Google Takeout to download your Google data-Business Insider. Business Insider (Jan 2020 ). https:\/\/www.businessinsider.com\/what-is-google-takeout Ross James. 2020. How to use Google Takeout to download your Google data-Business Insider. Business Insider (Jan 2020). https:\/\/www.businessinsider.com\/what-is-google-takeout"},{"key":"e_1_3_2_1_67_1","volume-title":"Towards Efficient Data Valuation Based on the Shapley Value. In The 22nd International Conference on Artificial Intelligence and Statistics. 1167--1176","author":"Jia Ruoxi","year":"2019","unstructured":"Ruoxi Jia , David Dao , Boxin Wang , Frances Ann Hubis , Nick Hynes , Nezihe Merve G\u00fcrel , Bo Li , Ce Zhang , Dawn Song , and Costas J Spanos . 2019 . Towards Efficient Data Valuation Based on the Shapley Value. In The 22nd International Conference on Artificial Intelligence and Statistics. 1167--1176 . Ruoxi Jia, David Dao, Boxin Wang, Frances Ann Hubis, Nick Hynes, Nezihe Merve G\u00fcrel, Bo Li, Ce Zhang, Dawn Song, and Costas J Spanos. 2019. Towards Efficient Data Valuation Based on the Shapley Value. In The 22nd International Conference on Artificial Intelligence and Statistics. 1167--1176."},{"key":"e_1_3_2_1_68_1","volume-title":"Andrew Hall, Aaron Halfaker, Johannes Sch\u00f6ning, and Brent Hecht.","author":"Johnson Isaac L.","year":"2016","unstructured":"Isaac L. Johnson , Yilun Lin , Toby Jia-Jun Li , Andrew Hall, Aaron Halfaker, Johannes Sch\u00f6ning, and Brent Hecht. 2016 . Not at Home on the Range : Peer Production and the Urban\/Rural Divide. Association for Computing Machinery , New York, NY, USA, 13--25. https:\/\/doi.org\/10.1145\/2858036.2858123 10.1145\/2858036.2858123 Isaac L. Johnson, Yilun Lin, Toby Jia-Jun Li, Andrew Hall, Aaron Halfaker, Johannes Sch\u00f6ning, and Brent Hecht. 2016. Not at Home on the Range: Peer Production and the Urban\/Rural Divide. Association for Computing Machinery, New York, NY, USA, 13--25. https:\/\/doi.org\/10.1145\/2858036.2858123"},{"key":"e_1_3_2_1_70_1","unstructured":"Pang Wei W Koh Kai-Siang Ang Hubert Teo and Percy S Liang. 2019. On the accuracy of influence functions for measuring group effects. In Advances in Neural Information Processing Systems. 5254--5264. Pang Wei W Koh Kai-Siang Ang Hubert Teo and Percy S Liang. 2019. On the accuracy of influence functions for measuring group effects. In Advances in Neural Information Processing Systems. 5254--5264."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1177\/0001699311431594"},{"volume-title":"Building successful online communities: Evidence-based social design","author":"Kraut Robert E","key":"e_1_3_2_1_72_1","unstructured":"Robert E Kraut , Paul Resnick , Sara Kiesler , Moira Burke , Yan Chen , Niki Kittur , Joseph Konstan , Yuqing Ren , and John Riedl . 2012. Building successful online communities: Evidence-based social design . Mit Press . Robert E Kraut, Paul Resnick, Sara Kiesler, Moira Burke, Yan Chen, Niki Kittur, Joseph Konstan, Yuqing Ren, and John Riedl. 2012. Building successful online communities: Evidence-based social design. Mit Press."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372853"},{"key":"e_1_3_2_1_74_1","first-page":"8","article-title":"Understanding User Migration Patterns in Social Media","volume":"11","author":"Kumar Shamanth","year":"2011","unstructured":"Shamanth Kumar , Reza Zafarani , and Huan Liu . 2011 . Understanding User Migration Patterns in Social Media .. In AAAI , Vol. 11. 8 -- 11 . Shamanth Kumar, Reza Zafarani, and Huan Liu. 2011. Understanding User Migration Patterns in Social Media.. In AAAI, Vol. 11. 8--11.","journal-title":"AAAI"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460675"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441867"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.1100.0440"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702548"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951718821146"},{"key":"e_1_3_2_1_81_1","unstructured":"Bo Li Yining Wang Aarti Singh and Yevgeniy Vorobeychik. 2016. Data poisoning attacks on factorization-based collaborative filtering. In Advances in neural information processing systems. 1885--1893. Bo Li Yining Wang Aarti Singh and Yevgeniy Vorobeychik. 2016. Data poisoning attacks on factorization-based collaborative filtering. In Advances in neural information processing systems. 1885--1893."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274375"},{"key":"e_1_3_2_1_83_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 4, CSCW","author":"Li Hanlin","year":"2020","unstructured":"Hanlin Li and Brent Hecht . 2020 . 3 Stars on Yelp, 4 Stars on Google Maps: A Cross-Platform Examination of Restaurant Ratings . Proceedings of the ACM on Human-Computer Interaction 4, CSCW (2020). Hanlin Li and Brent Hecht. 2020. 3 Stars on Yelp, 4 Stars on Google Maps: A Cross-Platform Examination of Restaurant Ratings. Proceedings of the ACM on Human-Computer Interaction 4, CSCW (2020)."},{"key":"e_1_3_2_1_84_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 3, CSCW","author":"Li Hanlin","year":"2019","unstructured":"Hanlin Li , Nicholas Vincent , Janice Tsai , Jofish Kaye , and Brent Hecht . 2019 . How do people change their technology use in protest?: Understanding \"protest users \". Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 87. Hanlin Li, Nicholas Vincent, Janice Tsai, Jofish Kaye, and Brent Hecht. 2019. How do people change their technology use in protest?: Understanding \"protest users\". Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 87."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1147"},{"key":"e_1_3_2_1_86_1","volume-title":"FTC settles with photo storage app that pivoted to facial recognition. The Verge (Jan","author":"Lyons Kim","year":"2021","unstructured":"Kim Lyons . 2021. FTC settles with photo storage app that pivoted to facial recognition. The Verge (Jan . 2021 ). https:\/\/www.theverge.com\/2021\/1\/11\/22225171\/ftc-facial-recognition-ever-settled-paravision-privacy-photos Publisher : The Verge . Kim Lyons. 2021. FTC settles with photo storage app that pivoted to facial recognition. The Verge (Jan. 2021). https:\/\/www.theverge.com\/2021\/1\/11\/22225171\/ftc-facial-recognition-ever-settled-paravision-privacy-photos Publisher: The Verge."},{"volume-title":"Political turbulence: How social media shape collective action","author":"Margetts Helen","key":"e_1_3_2_1_87_1","unstructured":"Helen Margetts , Peter John , Scott Hale , and Taha Yasseri . 2015. Political turbulence: How social media shape collective action . Princeton University Press . Helen Margetts, Peter John, Scott Hale, and Taha Yasseri. 2015. Political turbulence: How social media shape collective action. Princeton University Press."},{"key":"e_1_3_2_1_88_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Mathur Arunesh","year":"2018","unstructured":"Arunesh Mathur , Jessica Vitak , Arvind Narayanan , and Marshini Chetty . 2018 . Characterizing the use of browser-based blocking extensions to prevent online tracking . In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 103--116. Arunesh Mathur, Jessica Vitak, Arvind Narayanan, and Marshini Chetty. 2018. Characterizing the use of browser-based blocking extensions to prevent online tracking. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 103--116."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858391"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"crossref","unstructured":"Connor McMahon Isaac L Johnson and Brent Hecht. 2017. The Substantial Interdependence of Wikipedia and Google: A Case Study on the Relationship Between Peer Production Communities and Information Technologies.. In ICWSM. 142--151. Connor McMahon Isaac L Johnson and Brent Hecht. 2017. The Substantial Interdependence of Wikipedia and Google: A Case Study on the Relationship Between Peer Production Communities and Information Technologies.. In ICWSM. 142--151.","DOI":"10.1609\/icwsm.v11i1.14883"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.14361\/dcs-2016-0205"},{"key":"e_1_3_2_1_92_1","volume-title":"Proceedings of the WebKDD Workshop. Citeseer, 13--23","author":"Mobasher Bamshad","year":"2005","unstructured":"Bamshad Mobasher , Robin Burke , Runa Bhaumik , and Chad Williams . 2005 . Effective attack models for shilling item-based collaborative filtering systems . In Proceedings of the WebKDD Workshop. Citeseer, 13--23 . Bamshad Mobasher, Robin Burke, Runa Bhaumik, and Chad Williams. 2005. Effective attack models for shilling item-based collaborative filtering systems. In Proceedings of the WebKDD Workshop. Citeseer, 13--23."},{"key":"e_1_3_2_1_93_1","unstructured":"Yaroslav Nechaev Francesco Corcoglioniti and Claudio Giuliano. 2017. Concealing Interests of Passive Users in Social Media.. In BlackMirror@ ISWC. Yaroslav Nechaev Francesco Corcoglioniti and Claudio Giuliano. 2017. Concealing Interests of Passive Users in Social Media.. In BlackMirror@ ISWC."},{"key":"e_1_3_2_1_94_1","volume-title":"Hardik Vala, Jad Sassine, Caitrin Armstrong, and Derek Ruths.","author":"Newell Edward","year":"2016","unstructured":"Edward Newell , David Jurgens , Haji Mohammad Saleem , Hardik Vala, Jad Sassine, Caitrin Armstrong, and Derek Ruths. 2016 . User Migration in Online Social Networks: A Case Study on Reddit During a Period of Community Unrest.. In ICWSM. 279--288. Edward Newell, David Jurgens, Haji Mohammad Saleem, Hardik Vala, Jad Sassine, Caitrin Armstrong, and Derek Ruths. 2016. User Migration in Online Social Networks: A Case Study on Reddit During a Period of Community Unrest.. In ICWSM. 279--288."},{"key":"e_1_3_2_1_95_1","unstructured":"Safiya Umoja Noble. 2018. Algorithms of oppression: How search engines reinforce racism. nyu Press. Safiya Umoja Noble. 2018. Algorithms of oppression: How search engines reinforce racism. nyu Press."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187864"},{"key":"e_1_3_2_1_97_1","volume-title":"Prime Day: activists protest against Amazon in cities across US. the Guardian (Apr","author":"Paul Kari","year":"2020","unstructured":"Kari Paul . 2020. Prime Day: activists protest against Amazon in cities across US. the Guardian (Apr 2020 ). https:\/\/www.theguardian.com\/technology\/2019\/jul\/15\/prime-day-activists-plan-protests-in-us-cities-and-a-boycott-of-e-commerce-giant Kari Paul. 2020. Prime Day: activists protest against Amazon in cities across US. the Guardian (Apr 2020). https:\/\/www.theguardian.com\/technology\/2019\/jul\/15\/prime-day-activists-plan-protests-in-us-cities-and-a-boycott-of-e-commerce-giant"},{"key":"e_1_3_2_1_98_1","volume-title":"Tech's magnificent seven are worth $7.7 trillion. https:\/\/www.cnn.com\/2020\/08\/20\/investing\/faang-microsoft-tesla\/index.html [Online","author":"La Monica Business Paul R.","year":"2020","unstructured":"Business Paul R. La Monica . 2020. Tech's magnificent seven are worth $7.7 trillion. https:\/\/www.cnn.com\/2020\/08\/20\/investing\/faang-microsoft-tesla\/index.html [Online ; accessed 6. Oct. 2020 ]. Business Paul R. La Monica. 2020. Tech's magnificent seven are worth $7.7 trillion. https:\/\/www.cnn.com\/2020\/08\/20\/investing\/faang-microsoft-tesla\/index.html [Online; accessed 6. Oct. 2020]."},{"key":"e_1_3_2_1_99_1","volume-title":"A taxonomy and survey of attacks against machine learning. Computer Science Review 34 (Nov","author":"Pitropakis Nikolaos","year":"2019","unstructured":"Nikolaos Pitropakis , Emmanouil Panaousis , Thanassis Giannetsos , Eleftherios Anastasiadis , and George Loukas . 2019. A taxonomy and survey of attacks against machine learning. Computer Science Review 34 (Nov . 2019 ), 100199. https:\/\/doi.org\/10.1016\/j.cosrev.2019.100199 Publisher : Elsevier . 10.1016\/j.cosrev.2019.100199 Nikolaos Pitropakis, Emmanouil Panaousis, Thanassis Giannetsos, Eleftherios Anastasiadis, and George Loukas. 2019. A taxonomy and survey of attacks against machine learning. Computer Science Review 34 (Nov. 2019), 100199. https:\/\/doi.org\/10.1016\/j.cosrev.2019.100199 Publisher: Elsevier."},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812465139"},{"key":"e_1_3_2_1_101_1","volume-title":"Radical Markets: Uprooting Capitalism and Democracy for a Just Society","author":"Posner Eric A","year":"2018","unstructured":"Eric A Posner and E Glen Weyl . 2018 . Radical Markets: Uprooting Capitalism and Democracy for a Just Society . Princeton University Press . Eric A Posner and E Glen Weyl. 2018. Radical Markets: Uprooting Capitalism and Democracy for a Just Society. Princeton University Press."},{"volume-title":"The ethics of medical data donation","author":"Prainsack Barbara","key":"e_1_3_2_1_102_1","unstructured":"Barbara Prainsack . 2019. Data donation: How to resist the iLeviathan . In The ethics of medical data donation . Springer , Cham , 9--22. Barbara Prainsack. 2019. Data donation: How to resist the iLeviathan. In The ethics of medical data donation. Springer, Cham, 9--22."},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979148"},{"key":"e_1_3_2_1_104_1","volume-title":"Europe's Tough New Data Law, Means for You. N.Y. Times (May","author":"Satariano Adam","year":"2020","unstructured":"Adam Satariano . 2020. What the G.D.P.R ., Europe's Tough New Data Law, Means for You. N.Y. Times (May 2020 ). https:\/\/www.nytimes.com\/2018\/05\/06\/technology\/gdpr-european-privacy-law.html Publisher : The New York Times Company . Adam Satariano. 2020. What the G.D.P.R., Europe's Tough New Data Law, Means for You. N.Y. Times (May 2020). https:\/\/www.nytimes.com\/2018\/05\/06\/technology\/gdpr-european-privacy-law.html Publisher: The New York Times Company."},{"key":"e_1_3_2_1_105_1","first-page":"9","article-title":"Beyond the user: use and non-use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design","volume":"24","author":"Satchell Christine","year":"2009","unstructured":"Christine Satchell and Paul Dourish . 2009 . Beyond the user: use and non-use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design : Open 24\/7 . 9 -- 16 . Christine Satchell and Paul Dourish. 2009. Beyond the user: use and non-use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24\/7. 9--16.","journal-title":"Open"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392832"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556983"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381831"},{"key":"e_1_3_2_1_109_1","volume-title":"Apart from technology: understanding people's non-use of information and communication technologies in everyday life. Technology in society 25, 1","author":"Selwyn Neil","year":"2003","unstructured":"Neil Selwyn . 2003. Apart from technology: understanding people's non-use of information and communication technologies in everyday life. Technology in society 25, 1 ( 2003 ), 99--116. Neil Selwyn. 2003. Apart from technology: understanding people's non-use of information and communication technologies in everyday life. Technology in society 25, 1 (2003), 99--116."},{"key":"e_1_3_2_1_110_1","unstructured":"Alana Semuels. 2017. Why #DeleteUber and Other Boycotts Matter. Atlantic (Feb 2017). https:\/\/www.theatlantic.com\/business\/archive\/2017\/02\/why-deleteuber-and-other-boycotts-matter\/517416 Alana Semuels. 2017. Why #DeleteUber and Other Boycotts Matter. Atlantic (Feb 2017). https:\/\/www.theatlantic.com\/business\/archive\/2017\/02\/why-deleteuber-and-other-boycotts-matter\/517416"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3155055.3155058"},{"key":"e_1_3_2_1_112_1","unstructured":"Ali Shafahi W Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In Advances in Neural Information Processing Systems. 6103--6113. Ali Shafahi W Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In Advances in Neural Information Processing Systems. 6103--6113."},{"key":"e_1_3_2_1_113_1","volume-title":"Zhao","author":"Shan Shawn","year":"2020","unstructured":"Shawn Shan , Emily Wenger , Jiayun Zhang , Huiying Li , Haitao Zheng , and Ben Y . Zhao . 2020 . Fawkes : Protecting Privacy against Unauthorized Deep Learning Models. In 29th { USENIX} Security Symposium ({ USENIX} Security 20). 1589--1604. Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, and Ben Y. Zhao. 2020. Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. In 29th { USENIX} Security Symposium ({ USENIX} Security 20). 1589--1604."},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380109"},{"key":"e_1_3_2_1_115_1","volume-title":"Pang Wei W Koh, and Percy S Liang","author":"Steinhardt Jacob","year":"2017","unstructured":"Jacob Steinhardt , Pang Wei W Koh, and Percy S Liang . 2017 . Certified defenses for data poisoning attacks. In Advances in neural information processing systems. 3517--3529. Jacob Steinhardt, Pang Wei W Koh, and Percy S Liang. 2017. Certified defenses for data poisoning attacks. In Advances in neural information processing systems. 3517--3529."},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0323"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49669-2_18"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718921"},{"key":"e_1_3_2_1_119_1","volume-title":"Keynote Address: PETs, POTs, and Pitfalls: Rethinking the Protection of Users against Machine Learning","author":"Troncoso Carmela","year":"2019","unstructured":"Carmela Troncoso . 2019 . Keynote Address: PETs, POTs, and Pitfalls: Rethinking the Protection of Users against Machine Learning . USENIX Association , Santa Clara, CA . Carmela Troncoso. 2019. Keynote Address: PETs, POTs, and Pitfalls: Rethinking the Protection of Users against Machine Learning. USENIX Association, Santa Clara, CA."},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858060"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449177"},{"key":"e_1_3_2_1_122_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction CSCW","author":"Vincent Nicholas","year":"2021","unstructured":"Nicholas Vincent and Brent Hecht . 2021 . A Deeper Investigation of the Importance of Wikipedia Links to the Success of Search Engines . Proceedings of the ACM on Human-Computer Interaction CSCW (2021). Nicholas Vincent and Brent Hecht. 2021. A Deeper Investigation of the Importance of Wikipedia Links to the Success of Search Engines. Proceedings of the ACM on Human-Computer Interaction CSCW (2021)."},{"key":"e_1_3_2_1_123_1","volume-title":"Proceedings of The Web Conference","author":"Vincent Nicholas","year":"2019","unstructured":"Nicholas Vincent , Brent Hecht , and Shilad Sen . 2019 . \" Data Strikes\": Evaluating the Effectiveness of New Forms of Collective Action Against Technology Platforms . In Proceedings of The Web Conference 2019. Nicholas Vincent, Brent Hecht, and Shilad Sen. 2019. \"Data Strikes\": Evaluating the Effectiveness of New Forms of Collective Action Against Technology Platforms. In Proceedings of The Web Conference 2019."},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174140"},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v13i01.3248"},{"key":"e_1_3_2_1_126_1","volume-title":"Mapping the Potential and Pitfalls of \"Data Dividends\" as a Means of Sharing the Profits of Artificial Intelligence. arXiv preprint arXiv:1912.00757","author":"Vincent Nicholas","year":"2019","unstructured":"Nicholas Vincent , Yichun Li , Renee Zha , and Brent Hecht . 2019. Mapping the Potential and Pitfalls of \"Data Dividends\" as a Means of Sharing the Profits of Artificial Intelligence. arXiv preprint arXiv:1912.00757 ( 2019 ). Nicholas Vincent, Yichun Li, Renee Zha, and Brent Hecht. 2019. Mapping the Potential and Pitfalls of \"Data Dividends\" as a Means of Sharing the Profits of Artificial Intelligence. arXiv preprint arXiv:1912.00757 (2019)."},{"key":"e_1_3_2_1_127_1","volume-title":"Consumer Reports Study Finds. Consum. Rep. (Oct","author":"Waddell Kaveh","year":"2020","unstructured":"Kaveh Waddell . 2020. California's New Privacy Rights Are Tough to Use , Consumer Reports Study Finds. Consum. Rep. (Oct 2020 ). https:\/\/www.consumerreports.org\/privacy\/californias-new-privacy-rights-are-tough-to-use Kaveh Waddell. 2020. California's New Privacy Rights Are Tough to Use, Consumer Reports Study Finds. Consum. Rep. (Oct 2020). https:\/\/www.consumerreports.org\/privacy\/californias-new-privacy-rights-are-tough-to-use"},{"key":"e_1_3_2_1_128_1","volume-title":"California Passes Sweeping Law to Protect Online Privacy. N.Y. Times (Jun","author":"Wakabayashi Daisuke","year":"2018","unstructured":"Daisuke Wakabayashi . 2018. California Passes Sweeping Law to Protect Online Privacy. N.Y. Times (Jun 2018 ). https:\/\/www.nytimes.com\/2018\/06\/28\/technology\/california-online-privacy-law.html Daisuke Wakabayashi. 2018. California Passes Sweeping Law to Protect Online Privacy. N.Y. Times (Jun 2018). https:\/\/www.nytimes.com\/2018\/06\/28\/technology\/california-online-privacy-law.html"},{"key":"e_1_3_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240323.3240399"},{"key":"e_1_3_2_1_130_1","unstructured":"John Wilmhoff. 2017. Tom Brady literally owns the Jets says Google search. https:\/\/www.espn.com\/sportsnation\/story\/_\/page\/170727QTP_BradyOwnsJets\/google-glitch-causes-tom-brady-appear-new-york-jets-owner%7D Publication Title: ESPN. John Wilmhoff. 2017. Tom Brady literally owns the Jets says Google search. https:\/\/www.espn.com\/sportsnation\/story\/_\/page\/170727QTP_BradyOwnsJets\/google-glitch-causes-tom-brady-appear-new-york-jets-owner%7D Publication Title: ESPN."},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2507220"},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08786-3_20"},{"key":"e_1_3_2_1_133_1","volume-title":"Non-users also matter: The construction of users and non-users of the Internet. Now users matter:The co-construction of users and technology","author":"Wyatt Sally ME","year":"2003","unstructured":"Sally ME Wyatt . 2003. Non-users also matter: The construction of users and non-users of the Internet. Now users matter:The co-construction of users and technology ( 2003 ), 67--79. Sally ME Wyatt. 2003. Non-users also matter: The construction of users and non-users of the Internet. Now users matter:The co-construction of users and technology (2003), 67--79."},{"key":"e_1_3_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.03"},{"key":"e_1_3_2_1_135_1","volume-title":"Eighth International AAAI Conference on Weblogs and Social Media.","author":"Zhang Haoqi","year":"2014","unstructured":"Haoqi Zhang , Andr\u00e9s Monroy-Hern\u00e1ndez , Aaron Shaw , Sean A Munson , Elizabeth Gerber , Benjamin Mako Hill , Peter Kinnaird , Shelly D Farnham , and Patrick Minder . 2014 . WeDo: end-to-end computer supported collective action . In Eighth International AAAI Conference on Weblogs and Social Media. Haoqi Zhang, Andr\u00e9s Monroy-Hern\u00e1ndez, Aaron Shaw, Sean A Munson, Elizabeth Gerber, Benjamin Mako Hill, Peter Kinnaird, Shelly D Farnham, and Patrick Minder. 2014. WeDo: end-to-end computer supported collective action. In Eighth International AAAI Conference on Weblogs and Social Media."},{"key":"e_1_3_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879193"}],"event":{"name":"FAccT '21: 2021 ACM Conference on Fairness, Accountability, and Transparency","sponsor":["ACM Association for Computing Machinery"],"location":"Virtual Event Canada","acronym":"FAccT '21"},"container-title":["Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442188.3445885","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442188.3445885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T20:02:04Z","timestamp":1675368124000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442188.3445885"}},"subtitle":["A Framework for Empowering the Public in its Relationship with Technology Companies"],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":133,"alternative-id":["10.1145\/3442188.3445885","10.1145\/3442188"],"URL":"https:\/\/doi.org\/10.1145\/3442188.3445885","relation":{},"subject":[],"published":{"date-parts":[[2021,3]]},"assertion":[{"value":"2021-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}