{"id":"https://openalex.org/W4417132235","doi":"https://doi.org/10.1109/saner-c66551.2025.00010","title":"An Exploratory Analysis of Available Fairness Interventions in Open Source","display_name":"An Exploratory Analysis of Available Fairness Interventions in Open Source","publication_year":2025,"publication_date":"2025-03-04","ids":{"openalex":"https://openalex.org/W4417132235","doi":"https://doi.org/10.1109/saner-c66551.2025.00010"},"language":null,"primary_location":{"id":"doi:10.1109/saner-c66551.2025.00010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saner-c66551.2025.00010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000155769","display_name":"Sadia Afrin Mim","orcid":"https://orcid.org/0000-0002-9303-4677"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sadia Afrin Mim","raw_affiliation_strings":["George Mason University,Department of Computer Science"],"affiliations":[{"raw_affiliation_string":"George Mason University,Department of Computer Science","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119327550","display_name":"Fatema Tuz Zohra","orcid":"https://orcid.org/0000-0003-0623-4978"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fatema Tuz Zohra","raw_affiliation_strings":["George Mason University,Department of Computer Science"],"affiliations":[{"raw_affiliation_string":"George Mason University,Department of Computer Science","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070405946","display_name":"Justin Smith","orcid":null},"institutions":[{"id":"https://openalex.org/I184759092","display_name":"Lafayette College","ror":"https://ror.org/036n0x007","country_code":"US","type":"education","lineage":["https://openalex.org/I184759092"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Justin Smith","raw_affiliation_strings":["Lafayette College,Department of Computer Science"],"affiliations":[{"raw_affiliation_string":"Lafayette College,Department of Computer Science","institution_ids":["https://openalex.org/I184759092"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115076637","display_name":"Brittany Johnson","orcid":"https://orcid.org/0000-0002-0271-9647"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brittany Johnson","raw_affiliation_strings":["George Mason University,Department of Computer Science"],"affiliations":[{"raw_affiliation_string":"George Mason University,Department of Computer Science","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000155769"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40911684,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"17","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9240000247955322,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9240000247955322,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.023600000888109207,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.01679999940097332,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/psychological-intervention","display_name":"Psychological intervention","score":0.8167999982833862},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6608999967575073},{"id":"https://openalex.org/keywords/exploratory-analysis","display_name":"Exploratory analysis","score":0.5414999723434448},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.42489999532699585},{"id":"https://openalex.org/keywords/preference","display_name":"Preference","score":0.39259999990463257},{"id":"https://openalex.org/keywords/intervention","display_name":"Intervention (counseling)","score":0.33480000495910645}],"concepts":[{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.8167999982833862},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6608999967575073},{"id":"https://openalex.org/C3018260909","wikidata":"https://www.wikidata.org/wiki/Q1322871","display_name":"Exploratory analysis","level":2,"score":0.5414999723434448},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.48010000586509705},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.42910000681877136},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.42489999532699585},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.41179999709129333},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4043999910354614},{"id":"https://openalex.org/C2781249084","wikidata":"https://www.wikidata.org/wiki/Q908656","display_name":"Preference","level":2,"score":0.39259999990463257},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.38609999418258667},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.36410000920295715},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.34709998965263367},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34279999136924744},{"id":"https://openalex.org/C2780665704","wikidata":"https://www.wikidata.org/wiki/Q959298","display_name":"Intervention (counseling)","level":2,"score":0.33480000495910645},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3125},{"id":"https://openalex.org/C2988343187","wikidata":"https://www.wikidata.org/wiki/Q1130645","display_name":"Open source software","level":3,"score":0.3124000132083893},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2930999994277954},{"id":"https://openalex.org/C75630572","wikidata":"https://www.wikidata.org/wiki/Q538904","display_name":"Applied psychology","level":1,"score":0.289000004529953},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C100001284","wikidata":"https://www.wikidata.org/wiki/Q2248246","display_name":"Public economics","level":1,"score":0.2718999981880188},{"id":"https://openalex.org/C148220186","wikidata":"https://www.wikidata.org/wiki/Q7111912","display_name":"Outcome (game theory)","level":2,"score":0.25760000944137573}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/saner-c66551.2025.00010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saner-c66551.2025.00010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2087307736","https://openalex.org/W2138916466","https://openalex.org/W2905029197","https://openalex.org/W2913771223","https://openalex.org/W2957285709","https://openalex.org/W3005810006","https://openalex.org/W3006389498","https://openalex.org/W3032152562","https://openalex.org/W3034256900","https://openalex.org/W3092541244","https://openalex.org/W3156188980","https://openalex.org/W3158419983","https://openalex.org/W3162866579","https://openalex.org/W3179226218","https://openalex.org/W3181414820","https://openalex.org/W3194588521","https://openalex.org/W4210736086","https://openalex.org/W4214835294","https://openalex.org/W4288758404","https://openalex.org/W4292259516","https://openalex.org/W4312884168","https://openalex.org/W4316038168","https://openalex.org/W4388447786","https://openalex.org/W4391677706","https://openalex.org/W4400422326","https://openalex.org/W4400484330"],"related_works":[],"abstract_inverted_index":{"The":[0],"deployment":[1],"of":[2,29,45,53,67,81,96,127,140],"biased":[3],"machine":[4,30],"learning":[5,31],"(ML)":[6],"models":[7],"has":[8],"resulted":[9],"in":[10,13,58,117],"adverse":[11],"effects":[12],"crucial":[14],"sectors":[15],"such":[16],"as":[17],"criminal":[18],"justice,":[19],"and":[20,41,77,87,99,109,138,146],"healthcare.":[21],"To":[22,70],"address":[23,71],"these":[24,54,128],"challenges,":[25],"a":[26,79],"diverse":[27],"range":[28],"fairness":[32,85],"interventions":[33,86,114,129],"have":[34,130],"been":[35,131],"developed,":[36],"aiming":[37],"to":[38,101,110],"mitigate":[39],"bias":[40,144],"promote":[42],"the":[43,50,112,118,135],"creation":[44],"more":[46],"equitable":[47],"models.":[48],"Despite":[49],"growing":[51],"availability":[52],"interventions,":[55],"their":[56,68,97],"adoption":[57],"real-world":[59],"applications":[60],"remains":[61],"limited,":[62],"with":[63],"many":[64],"practitioners":[65],"unaware":[66],"existence.":[69],"this":[72],"gap,":[73],"we":[74],"systematically":[75],"identified":[76,88],"compiled":[78],"dataset":[80],"62":[82],"open":[83,119],"source":[84,120],"active":[89],"ones.":[90],"We":[91],"conducted":[92],"an":[93],"in-depth":[94],"analysis":[95],"specifications":[98],"features":[100],"uncover":[102],"considerations":[103],"that":[104,125],"may":[105],"drive":[106],"practitioner":[107],"preference":[108],"identify":[111],"software":[113],"actively":[115,132],"maintained":[116,133],"ecosystem.":[121],"Our":[122],"findings":[123],"indicate":[124],"32%":[126],"within":[134],"past":[136],"year,":[137],"50%":[139],"them":[141],"offer":[142],"both":[143],"detection":[145],"mitigation":[147],"capabilities":[148],"mostly":[149],"during":[150],"inprocessing.":[151]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-08T00:00:00"}
