Algorithmic Accountability Reporting: On the Investigation of Black Boxes

I'm indebted to a number of people who were generous with their time in providing feedback and helping me to think through and shape the ideas presented here. I'm grateful to those whom I interviewed about their experience reverse engineering stories, including and Cliff Stein, whose collective feedback greatly improved the work. I've also benefited from the intellectual environment at the Tow Center at Columbia University, created by Emily Bell and Taylor Owen, the helpful feedback from other Tow Fellows, and the copyediting of Abigail Ronck. Any mistakes left are on me. 1 " We should interrogate the architecture of cyberspace as we interrogate the code of Congress. " – Lawrence Lessig

[1]  James H. Cross,et al.  Reverse engineering and design recovery: a taxonomy , 1990, IEEE Software.

[2]  Helen Nissenbaum,et al.  Bias in computer systems , 1996, TOIS.

[3]  Eldad Eilam,et al.  Reversing: Secrets of Reverse Engineering , 2005 .

[4]  S. van der Hof,et al.  Code As Law , 2006 .

[5]  Brian J. Cook,et al.  Full Disclosure: The Perils and Promise of Transparency , 2007, Perspectives on Politics.

[6]  D. Citron Technological Due Process , 2007 .

[7]  Peter J. Denning,et al.  Computing is a natural science , 2007, CACM.

[8]  Martin Peterson,et al.  Is there an ethics of algorithms? , 2011, Ethics and Information Technology.

[9]  Saikat Guha,et al.  Challenges in measuring online advertising systems , 2010, IMC '10.

[10]  Frank Pasquale,et al.  Restoring Transparency to Automated Authority , 2011, J. Telecommun. High Technol. Law.

[11]  Helen Nissenbaum,et al.  From Preemption to Circumvention: If Technology Regulates Why Do We Need Regulation (and Vice Versa)? , 2011 .

[12]  Eli Pariser,et al.  The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think , 2012 .

[13]  Tom Rosenstiel,et al.  The New Ethics of Journalism: Principles for the 21st Century , 2013 .

[14]  Balachander Krishnamurthy,et al.  Measuring personalization of web search , 2013, WWW.

[15]  Latanya Sweeney,et al.  Discrimination in online ad delivery , 2013, CACM.

[16]  Ramandeep Singh A Review of Reverse Engineering Theories and Tools , 2013 .

[17]  Arjun Mukherjee,et al.  What Yelp Fake Review Filter Might Be Doing? , 2013, ICWSM.

[18]  Anil Kalhan,et al.  Immigration Policing and Federalism Through the Lens of Technology, Surveillance, and Privacy , 2013 .

[19]  Carter C. Price,et al.  Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations , 2013 .

[20]  Paul Baker,et al.  ‘Why do white people have thin lips?’ Google and the perpetuation of stereotypes via auto-complete search forms , 2013 .