{"id":"https://openalex.org/W6887938734","doi":"https://doi.org/10.18420/inf2022_26","title":"Towards the Operationalization of Trustworthy AI: Integrating the EU Assessment List into a Procedure Model for the Development and Operation of AI-Systems","display_name":"Towards the Operationalization of Trustworthy AI: Integrating the EU Assessment List into a Procedure Model for the Development and Operation of AI-Systems","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W6887938734","doi":"https://doi.org/10.18420/inf2022_26"},"language":"en","primary_location":{"id":"doi:10.18420/inf2022_26","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_26","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/inf2022_26","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Kortum, Henrik","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kortum, Henrik","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Rebstadt, Jonas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rebstadt, Jonas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"B\u00f6schen, Tula","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B\u00f6schen, Tula","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Meier, Pascal","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Meier, Pascal","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Thomas, Oliver","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thomas, Oliver","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7977,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.77028636,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.7979000210762024,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.7979000210762024,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.04919999837875366,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.029600000008940697,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/operationalization","display_name":"Operationalization","score":0.8496999740600586},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.7597000002861023},{"id":"https://openalex.org/keywords/closing","display_name":"Closing (real estate)","score":0.6520000100135803},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.539900004863739},{"id":"https://openalex.org/keywords/development","display_name":"Development (topology)","score":0.4855000078678131},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3779999911785126}],"concepts":[{"id":"https://openalex.org/C9354725","wikidata":"https://www.wikidata.org/wiki/Q286017","display_name":"Operationalization","level":2,"score":0.8496999740600586},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.7597000002861023},{"id":"https://openalex.org/C2778775528","wikidata":"https://www.wikidata.org/wiki/Q5135432","display_name":"Closing (real estate)","level":2,"score":0.6520000100135803},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.539900004863739},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5023000240325928},{"id":"https://openalex.org/C2776542497","wikidata":"https://www.wikidata.org/wiki/Q5266672","display_name":"Development (topology)","level":2,"score":0.4855000078678131},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4399000108242035},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3779999911785126},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.37709999084472656},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3736000061035156},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.36970001459121704},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.34150001406669617},{"id":"https://openalex.org/C2781118332","wikidata":"https://www.wikidata.org/wiki/Q430460","display_name":"Capability approach","level":2,"score":0.3000999987125397},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.2937999963760376},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.26829999685287476},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26809999346733093},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.26190000772476196},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.2615000009536743},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.25459998846054077}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/inf2022_26","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_26","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/inf2022_26","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_26","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6916769742965698,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Artificial":[0],"intelligence":[1],"(AI)":[2],"is":[3,22],"increasingly":[4],"permeating":[5],"all":[6],"areas":[7],"of":[8,26,87,119,134],"life":[9],"and":[10,57,66,85,106,132,137],"not":[11,77],"only":[12],"changing":[13],"coexistence":[14],"in":[15,79,112],"society":[16],"for":[17,82,129,142],"the":[18,83,113,117,130],"better.":[19],"Unfortunately,":[20],"there":[21],"an":[23,49],"increasing":[24],"number":[25],"examples":[27],"where":[28],"AI":[29,61,88,135],"systems":[30,136],"show":[31],"problematic":[32],"behavior,":[33],"such":[34],"as":[35],"discrimination":[36],"or":[37,43],"insufficient":[38],"accuracy,":[39],"missing":[40],"data":[41],"privacy":[42],"transparency.":[44],"To":[45],"counteract":[46],"this":[47,95],"trend,":[48],"EU":[50],"initiative":[51],"has":[52],"drafted":[53],"a":[54,120,126],"legal":[55],"framework":[56,118],"recommendations":[58,141],"on":[59],"how":[60],"can":[62],"be":[63],"more":[64],"trustworthy":[65],"comply":[67],"with":[68,102],"people's":[69],"fundamental":[70,73],"rights.":[71],"However,":[72],"rights":[74],"are":[75,110],"currently":[76],"reflected":[78],"procedure":[80,127],"models":[81],"development":[84,114,131],"operation":[86,133],"systems.":[89],"Our":[90],"work":[91],"contributes":[92],"to":[93],"closing":[94],"gap":[96],"so":[97],"that":[98],"companies,":[99],"especially":[100],"SMEs":[101],"small":[103],"IT":[104],"departments":[105],"limited":[107],"financial":[108],"resources,":[109],"supported":[111],"process.":[115],"Within":[116],"structured":[121],"literature":[122],"review,":[123],"we":[124],"derive":[125],"model":[128],"subsequently":[138],"integrate":[139],"concrete":[140],"achieving":[143],"trustworthiness.":[144]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
