{"id":"https://openalex.org/W4407953580","doi":"https://doi.org/10.1145/3701551.3705707","title":"Proposal for Workshop on Trust and Responsibility in Recommendation Systems at WSDM 2025","display_name":"Proposal for Workshop on Trust and Responsibility in Recommendation Systems at WSDM 2025","publication_year":2025,"publication_date":"2025-02-26","ids":{"openalex":"https://openalex.org/W4407953580","doi":"https://doi.org/10.1145/3701551.3705707"},"language":"en","primary_location":{"id":"doi:10.1145/3701551.3705707","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3701551.3705707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighteenth ACM International Conference on Web Search and Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116425602","display_name":"Xinghai Hu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xinghai Hu","raw_affiliation_strings":["TikTok Inc., San Jose, USA"],"affiliations":[{"raw_affiliation_string":"TikTok Inc., San Jose, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043134791","display_name":"Robin Burke","orcid":"https://orcid.org/0000-0001-5766-6434"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Robin Burke","raw_affiliation_strings":["University of Colroado Boulder, Boulder, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colroado Boulder, Boulder, CO, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091042660","display_name":"X.Q. Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xu Liu","raw_affiliation_strings":["TikTok Inc., San Jose, USA"],"affiliations":[{"raw_affiliation_string":"TikTok Inc., San Jose, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5116425602"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01491361,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1118","last_page":"1119"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.7608000040054321,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.7608000040054321,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.7175999879837036,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6822771430015564},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3417869210243225},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17302903532981873}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6822771430015564},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3417869210243225},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17302903532981873}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3701551.3705707","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3701551.3705707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighteenth ACM International Conference on Web Search and Data Mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W4288096872","https://openalex.org/W4394785778"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"This":[0],"workshop":[1,43],"aims":[2],"to":[3,6,73],"empower":[4],"participants":[5],"design":[7],"and":[8,16,24,34,48,60,71,81,92,103],"audit":[9],"recommendation":[10,40],"systems":[11,76],"that":[12],"prioritize":[13],"user":[14],"trust":[15],"safety.":[17],"Atten-":[18],"dees":[19],"will":[20,44,64],"explore":[21],"best":[22],"practices":[23],"innovations":[25],"in":[26],"fairness,":[27,101],"explain-":[28],"ability,":[29],"content":[30],"safety,":[31],"algorithm":[32],"transparency,":[33,99],"the":[35,109],"societal":[36,79],"im-":[37],"pacts":[38],"of":[39,108],"systems.":[41],"The":[42,106],"address":[45],"tech-":[46],"nical":[47],"ethical":[49],"challenges,":[50],"offering":[51],"practical":[52],"insights":[53],"into":[54],"risk":[55],"mit-":[56],"igation,":[57],"social":[58,82],"concerns,":[59],"technical":[61],"innovations.":[62],"Participants":[63],"leave":[65],"equipped":[66],"with":[67,78],"actionable":[68],"frameworks,":[69],"methodologies,":[70],"tools":[72],"build":[74],"responsible":[75],"aligned":[77],"values":[80],"good.":[83],"Key":[84],"activities":[85],"include":[86],"keynotes,":[87],"paper":[88],"presentations,":[89],"panel":[90],"discussions,":[91],"interactive":[93],"sessions,":[94],"covering":[95],"topics":[96],"such":[97],"as":[98],"security,":[100],"robustness,":[102],"participatory":[104],"AI.":[105],"website":[107],"conference":[110],"is":[111],"https://sites.google.com/view/t-rrs.":[112]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
