{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:18:37Z","timestamp":1732040317456,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","funder":[{"name":"ESRC","award":["ES\/T012382\/1"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,3]]},"DOI":"10.1145\/3442188.3445890","type":"proceedings-article","created":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T01:26:24Z","timestamp":1614734784000},"page":"262-271","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["The Sanction of Authority"],"prefix":"10.1145","author":[{"given":"Bran","family":"Knowles","sequence":"first","affiliation":[{"name":"Lancaster University, Lancaster, UK"}]},{"given":"John T.","family":"Richards","sequence":"additional","affiliation":[{"name":"TJ Watson Research Center, IBM Yorktown Heights, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IBM Research AI. 2020. Trusting AI. https:\/\/www.research.ibm.com\/artificial-intelligence\/trusted-ai\/. IBM Research AI. 2020. Trusting AI. https:\/\/www.research.ibm.com\/artificial-intelligence\/trusted-ai\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Malta The Ultimate Launchpad: A Strategy and Vision for Artificial Intelligence in Malta","author":"Malta AI.","year":"2030","unstructured":"Malta AI. 2019. Malta The Ultimate Launchpad: A Strategy and Vision for Artificial Intelligence in Malta 2030 . https:\/\/malta.ai\/wp-content\/uploads\/2019\/11\/Malta_The_Ultimate_AI_Launchpad_vFinal.pdf. Malta AI. 2019. Malta The Ultimate Launchpad: A Strategy and Vision for Artificial Intelligence in Malta 2030. https:\/\/malta.ai\/wp-content\/uploads\/2019\/11\/Malta_The_Ultimate_AI_Launchpad_vFinal.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2019.2942288"},{"key":"e_1_3_2_1_4_1","volume-title":"IBM","author":"Banavar Guruduth","year":"2016","unstructured":"Guruduth Banavar . 2016. Learning to trust artificial intelligence systems. Report , IBM , Armonk , NY ( 2016 ). Guruduth Banavar. 2016. Learning to trust artificial intelligence systems. Report, IBM, Armonk, NY (2016)."},{"key":"e_1_3_2_1_5_1","volume-title":"Institutionalization and structuration: Studying the links between action and institution","author":"Barley Stephen R","year":"1997","unstructured":"Stephen R Barley and Pamela S Tolbert . 1997. Institutionalization and structuration: Studying the links between action and institution . Organization studies 18, 1 ( 1997 ), 93--117. Stephen R Barley and Pamela S Tolbert. 1997. Institutionalization and structuration: Studying the links between action and institution. Organization studies 18, 1 (1997), 93--117."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00041"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/01402382.2010.486119"},{"key":"e_1_3_2_1_8_1","unstructured":"Joanna Bryson. 2018. AI Global Governance: No One Should Trust AI. https:\/\/cpr.unu.edu\/ai-global-governance-no-one-should-trust-ai.html. Joanna Bryson. 2018. AI Global Governance: No One Should Trust AI. https:\/\/cpr.unu.edu\/ai-global-governance-no-one-should-trust-ai.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Berkman Klein Center. 2020. Fairness and AI: Sandra Wachter on why fairness cannot be automated. https:\/\/medium.com\/berkman-klein-center\/fairness-and-ai-c5596faddd20. Berkman Klein Center. 2020. Fairness and AI: Sandra Wachter on why fairness cannot be automated. https:\/\/medium.com\/berkman-klein-center\/fairness-and-ai-c5596faddd20."},{"key":"e_1_3_2_1_10_1","unstructured":"European Commission. 2020. Denmark AI Strategy Report. https:\/\/ec.europa.eu\/knowledge4policy\/ai-watch\/denmark-ai-strategy-report_en. European Commission. 2020. Denmark AI Strategy Report. https:\/\/ec.europa.eu\/knowledge4policy\/ai-watch\/denmark-ai-strategy-report_en."},{"key":"e_1_3_2_1_11_1","volume-title":"White Paper: On Artificial Intelligence---A European approach to excellence and trust. https:\/\/ec.europa.eu\/info\/sites\/info\/files\/commission-white-paper-artificial-intelligence-feb2020_en.pdf.","author":"European Commission","year":"2020","unstructured":"European Commission . 2020 . White Paper: On Artificial Intelligence---A European approach to excellence and trust. https:\/\/ec.europa.eu\/info\/sites\/info\/files\/commission-white-paper-artificial-intelligence-feb2020_en.pdf. European Commission. 2020. White Paper: On Artificial Intelligence---A European approach to excellence and trust. https:\/\/ec.europa.eu\/info\/sites\/info\/files\/commission-white-paper-artificial-intelligence-feb2020_en.pdf."},{"key":"e_1_3_2_1_12_1","volume-title":"Situating methods in the magic of Big Data and AI. Communication monographs 85, 1","author":"Elish Madeleine Clare","year":"2018","unstructured":"Madeleine Clare Elish and Danah Boyd . 2018. Situating methods in the magic of Big Data and AI. Communication monographs 85, 1 ( 2018 ), 57--80. Madeleine Clare Elish and Danah Boyd. 2018. Situating methods in the magic of Big Data and AI. Communication monographs 85, 1 (2018), 57--80."},{"key":"e_1_3_2_1_13_1","volume-title":"First workshop on security in ubiquitous computing at the fourth annual conference on ubiquitous computing (Ubicomp2002)","author":"English Colin","year":"2002","unstructured":"Colin English , Paddy Nixon , Sotirios Terzis , Andrew McGettrick , and Helen Lowe . 2002 . Dynamic trust models for ubiquitous computing environments . In First workshop on security in ubiquitous computing at the fourth annual conference on ubiquitous computing (Ubicomp2002) . Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, and Helen Lowe. 2002. Dynamic trust models for ubiquitous computing environments. In First workshop on security in ubiquitous computing at the fourth annual conference on ubiquitous computing (Ubicomp2002)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/344949.345004"},{"key":"e_1_3_2_1_15_1","volume-title":"Hanna Wallach, Hal Daum\u00e9 III, and Kate Crawford.","author":"Gebru Timnit","year":"2018","unstructured":"Timnit Gebru , Jamie Morgenstern , Briana Vecchione , Jennifer Wortman Vaughan , Hanna Wallach, Hal Daum\u00e9 III, and Kate Crawford. 2018 . Datasheets for datasets. arXiv preprint arXiv:1803.09010 (2018). Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna Wallach, Hal Daum\u00e9 III, and Kate Crawford. 2018. Datasheets for datasets. arXiv preprint arXiv:1803.09010 (2018)."},{"volume-title":"The constitution of society: Outline of the theory of structuration","author":"Giddens Anthony","key":"e_1_3_2_1_16_1","unstructured":"Anthony Giddens . 1984. The constitution of society: Outline of the theory of structuration . Univ of California Press . Anthony Giddens. 1984. The constitution of society: Outline of the theory of structuration. Univ of California Press."},{"key":"e_1_3_2_1_17_1","volume-title":"The consequences of modernity","author":"Giddens Anthony","year":"1990","unstructured":"Anthony Giddens . 1990. The consequences of modernity . Cambridge : Polity ( 1990 ). Anthony Giddens. 1990. The consequences of modernity. Cambridge: Polity (1990)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378773.1378804"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/00332747.1955.11023008"},{"volume-title":"computing, and society","author":"Harper Richard","key":"e_1_3_2_1_20_1","unstructured":"Richard Harper . 2014. Trust , computing, and society . Cambridge University Press . Richard Harper. 2014. Trust, computing, and society. Cambridge University Press."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2015.12.014"},{"key":"e_1_3_2_1_22_1","volume-title":"Alexandra Olteanu, and Kush R Varshney.","author":"Hind Michael","year":"2018","unstructured":"Michael Hind , Sameep Mehta , Aleksandra Mojsilovic , Ravi Nair , Karthikeyan Natesan Ramamurthy , Alexandra Olteanu, and Kush R Varshney. 2018 . Increasing trust in AI services through supplier's declarations of conformity. arXiv preprint arXiv:1808.07261 (2018). Michael Hind, Sameep Mehta, Aleksandra Mojsilovic, Ravi Nair, Karthikeyan Natesan Ramamurthy, Alexandra Olteanu, and Kush R Varshney. 2018. Increasing trust in AI services through supplier's declarations of conformity. arXiv preprint arXiv:1808.07261 (2018)."},{"key":"e_1_3_2_1_23_1","volume-title":"The Dataset Nutrition Label. Data Protection and Privacy: Data Protection and Democracy","author":"Holland Sarah","year":"2020","unstructured":"Sarah Holland , Ahmed Hosny , and Sarah Newman . 2020. The Dataset Nutrition Label. Data Protection and Privacy: Data Protection and Democracy ( 2020 ), 1. Sarah Holland, Ahmed Hosny, and Sarah Newman. 2020. The Dataset Nutrition Label. Data Protection and Privacy: Data Protection and Democracy (2020), 1."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0088-2"},{"key":"e_1_3_2_1_25_1","volume-title":"Giddens's structuration theory and information systems research. MIS quarterly 32, 1","author":"Jones Matthew R","year":"2008","unstructured":"Matthew R Jones and Helena Karsten . 2008. Giddens's structuration theory and information systems research. MIS quarterly 32, 1 ( 2008 ), 127--157. Matthew R Jones and Helena Karsten. 2008. Giddens's structuration theory and information systems research. MIS quarterly 32, 1 (2008), 127--157."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858402"},{"key":"e_1_3_2_1_27_1","first-page":"487","article-title":"Facework: creating trust in systems, institutions and organisations","volume":"41","author":"Kroeger Frens","year":"2017","unstructured":"Frens Kroeger . 2017 . Facework: creating trust in systems, institutions and organisations . Cambridge Journal of Economics 41 , 2 (2017), 487 -- 514 . Frens Kroeger. 2017. Facework: creating trust in systems, institutions and organisations. Cambridge Journal of Economics 41, 2 (2017), 487--514.","journal-title":"Cambridge Journal of Economics"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2008.0134"},{"key":"e_1_3_2_1_29_1","volume-title":"Workshop on Privacy at UBICOMP","volume":"2003","author":"Langheinrich Marc","year":"2003","unstructured":"Marc Langheinrich . 2003 . When trust does not compute-the role of trust in ubiquitous computing . In Workshop on Privacy at UBICOMP , Vol. 2003 . Marc Langheinrich. 2003. When trust does not compute-the role of trust in ubiquitous computing. In Workshop on Privacy at UBICOMP, Vol. 2003."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951718756684"},{"key":"e_1_3_2_1_31_1","volume-title":"Trust as a social reality. Social forces 63, 4","author":"David Lewis J","year":"1985","unstructured":"J David Lewis and Andrew Weigert . 1985. Trust as a social reality. Social forces 63, 4 ( 1985 ), 967--985. J David Lewis and Andrew Weigert. 1985. Trust as a social reality. Social forces 63, 4 (1985), 967--985."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2008.01.001"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2020.100039"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.2307\/258792"},{"key":"e_1_3_2_1_35_1","volume-title":"Developing and validating trust measures for e-commerce: An integrative typology. Information systems research 13, 3","author":"McKnight D Harrison","year":"2002","unstructured":"D Harrison McKnight , Vivek Choudhury , and Charles Kacmar . 2002. Developing and validating trust measures for e-commerce: An integrative typology. Information systems research 13, 3 ( 2002 ), 334--359. D Harrison McKnight, Vivek Choudhury, and Charles Kacmar. 2002. Developing and validating trust measures for e-commerce: An integrative typology. Information systems research 13, 3 (2002), 334--359."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.2307\/259290"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287596"},{"key":"e_1_3_2_1_38_1","volume-title":"AI Ethics-Too principled to fail. arXiv preprint arXiv:1906.06668","author":"Mittelstadt Brent","year":"2019","unstructured":"Brent Mittelstadt . 2019. AI Ethics-Too principled to fail. arXiv preprint arXiv:1906.06668 ( 2019 ). Brent Mittelstadt. 2019. AI Ethics-Too principled to fail. arXiv preprint arXiv:1906.06668 (2019)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287574"},{"key":"e_1_3_2_1_40_1","volume-title":"ABOUT ML: Annotation and Benchmarking on Understanding and Transparency of Machine Learning Lifecycles. arXiv preprint arXiv:1912.06166","author":"Raji Inioluwa Deborah","year":"2019","unstructured":"Inioluwa Deborah Raji and Jingying Yang . 2019 . ABOUT ML: Annotation and Benchmarking on Understanding and Transparency of Machine Learning Lifecycles. arXiv preprint arXiv:1912.06166 (2019). Inioluwa Deborah Raji and Jingying Yang. 2019. ABOUT ML: Annotation and Benchmarking on Understanding and Transparency of Machine Learning Lifecycles. arXiv preprint arXiv:1912.06166 (2019)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_42_1","volume-title":"A Methodology for Creating AI FactSheets. arXiv preprint arXiv:2006.13796","author":"Richards John","year":"2020","unstructured":"John Richards , David Piorkowski , Michael Hind , Stephanie Houde , and Aleksandra Mojsilovi\u0107 . 2020. A Methodology for Creating AI FactSheets. arXiv preprint arXiv:2006.13796 ( 2020 ). John Richards, David Piorkowski, Michael Hind, Stephanie Houde, and Aleksandra Mojsilovi\u0107. 2020. A Methodology for Creating AI FactSheets. arXiv preprint arXiv:2006.13796 (2020)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.01.001"},{"key":"e_1_3_2_1_44_1","volume-title":"Measuring trust inside organisations. Personnel review","author":"Sanders Karin","year":"2006","unstructured":"Karin Sanders , Birgit Schyns , Graham Dietz , and Deanne N Den Hartog . 2006. Measuring trust inside organisations. Personnel review ( 2006 ). Karin Sanders, Birgit Schyns, Graham Dietz, and Deanne N Den Hartog. 2006. Measuring trust inside organisations. Personnel review (2006)."},{"key":"e_1_3_2_1_45_1","volume-title":"Workshop on Security in Ubiquitous Computing, UBICOMP","volume":"32","author":"Shankar Narendar","year":"2002","unstructured":"Narendar Shankar and William Arbaugh . 2002 . On trust for ubiquitous computing . In Workshop on Security in Ubiquitous Computing, UBICOMP , Vol. 32 . Citeseer. Narendar Shankar and William Arbaugh. 2002. On trust for ubiquitous computing. In Workshop on Security in Ubiquitous Computing, UBICOMP, Vol. 32. Citeseer."},{"key":"e_1_3_2_1_46_1","first-page":"47","article-title":"Building trust in artificial intelligence, machine learning, and robotics","volume":"31","author":"Siau Keng","year":"2018","unstructured":"Keng Siau and Weiyu Wang . 2018 . Building trust in artificial intelligence, machine learning, and robotics . Cutter Business Technology Journal 31 , 2 (2018), 47 -- 53 . Keng Siau and Weiyu Wang. 2018. Building trust in artificial intelligence, machine learning, and robotics. Cutter Business Technology Journal 31, 2 (2018), 47--53.","journal-title":"Cutter Business Technology Journal"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.31235\/osf.io\/3xzaf"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372834"},{"key":"e_1_3_2_1_49_1","first-page":"841","article-title":"Counterfactual Explanations without Opening the Black Box: Automated Decisions and the GPDR","volume":"31","author":"Wachter Sandra","year":"2017","unstructured":"Sandra Wachter , Brent Mittelstadt , and Chris Russell . 2017 . Counterfactual Explanations without Opening the Black Box: Automated Decisions and the GPDR . Harv. JL & Tech. 31 (2017), 841 . Sandra Wachter, Brent Mittelstadt, and Chris Russell. 2017. Counterfactual Explanations without Opening the Black Box: Automated Decisions and the GPDR. Harv. JL & Tech. 31 (2017), 841.","journal-title":"Harv. JL & Tech."},{"key":"e_1_3_2_1_50_1","volume-title":"Why fairness cannot be automated: Bridging the gap between EU non-discrimination law and AI. Available at SSRN","author":"Wachter Sandra","year":"2020","unstructured":"Sandra Wachter , Brent Mittelstadt , and Chris Russell . 2020. Why fairness cannot be automated: Bridging the gap between EU non-discrimination law and AI. Available at SSRN ( 2020 ). Sandra Wachter, Brent Mittelstadt, and Chris Russell. 2020. Why fairness cannot be automated: Bridging the gap between EU non-discrimination law and AI. Available at SSRN (2020)."},{"key":"e_1_3_2_1_51_1","volume-title":"Allen","author":"West Darrell M.","year":"2020","unstructured":"Darrell M. West and John R . Allen . 2020 . Turning Point : Policymaking in the Era of Artificial Intelligence. Brookings Institution Press . Darrell M. West and John R. Allen. 2020. Turning Point: Policymaking in the Era of Artificial Intelligence. Brookings Institution Press."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314289"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372833"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1159\/000092659"}],"event":{"name":"FAccT '21: 2021 ACM Conference on Fairness, Accountability, and Transparency","sponsor":["ACM Association for Computing Machinery"],"location":"Virtual Event Canada","acronym":"FAccT '21"},"container-title":["Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442188.3445890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T19:43:45Z","timestamp":1675367025000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442188.3445890"}},"subtitle":["Promoting Public Trust in AI"],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":54,"alternative-id":["10.1145\/3442188.3445890","10.1145\/3442188"],"URL":"https:\/\/doi.org\/10.1145\/3442188.3445890","relation":{},"subject":[],"published":{"date-parts":[[2021,3]]},"assertion":[{"value":"2021-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}