Model-Based Discrimination Analysis: A Position Paper

Decision-making software may exhibit biases due to hidden dependencies between protected characteristics and the data used as input for making decisions. To uncover such dependencies, we propose the development of a framework to support discrimination analysis during the system design phase, based on system models and available data.

[1]  Jun Sakuma,et al.  Fairness-aware Learning through Regularization Approach , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.

[2]  Toon Calders,et al.  Three naive Bayes approaches for discrimination-free classification , 2010, Data Mining and Knowledge Discovery.

[3]  ChenPeter Pin-Shan The entity-relationship modeltoward a unified view of data , 1976 .

[4]  José Meseguer,et al.  Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.

[5]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[6]  Krishna P. Gummadi,et al.  Learning Fair Classifiers , 2015, 1507.05259.

[7]  Toon Calders,et al.  Discrimination Aware Decision Tree Learning , 2010, 2010 IEEE International Conference on Data Mining.

[8]  Andrew D. Selbst,et al.  Big Data's Disparate Impact , 2016 .

[9]  Catuscia Palamidessi CONCUR 2000 — Concurrency Theory , 2000, Lecture Notes in Computer Science.

[10]  Josep Domingo-Ferrer,et al.  Discrimination- and privacy-aware patterns , 2014, Data Mining and Knowledge Discovery.

[11]  Jan Jürjens,et al.  Secure systems development with UML , 2004 .

[12]  Yuriy Brun,et al.  Fairness testing: testing software for discrimination , 2017, ESEC/SIGSOFT FSE.

[13]  Matt Fredrikson,et al.  Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs , 2017, CCS.

[14]  Frank A. Pasquale The Black Box Society: The Secret Algorithms That Control Money and Information , 2015 .

[15]  Jan Jürjens,et al.  Secure Information Flow for Concurrent Processes , 2000, CONCUR.

[16]  Steffen Staab,et al.  Data Mining and Automated Discrimination: A Mixed Legal/Technical Perspective , 2016, IEEE Intelligent Systems.

[17]  Kousha Etessami,et al.  Optimizing Büchi Automata , 2000, CONCUR.

[18]  Jan Jürjens,et al.  Model-Based Privacy Analysis in Industrial Ecosystems , 2017, ECMFA.

[19]  Jan Jürjens,et al.  Model-based privacy and security analysis with CARiSMA , 2017, ESEC/SIGSOFT FSE.

[20]  Matt Fredrikson,et al.  Proxy Discrimination∗ in Data-Driven Systems Theory and Experiments with Machine Learnt Programs , 2017 .