{"id":"https://openalex.org/W4416706202","doi":"https://doi.org/10.48550/arxiv.2508.14954","title":"Bridging Research Gaps Between Academic Research and Legal Investigations of Algorithmic Discrimination","display_name":"Bridging Research Gaps Between Academic Research and Legal Investigations of Algorithmic Discrimination","publication_year":2025,"publication_date":"2025-08-20","ids":{"openalex":"https://openalex.org/W4416706202","doi":"https://doi.org/10.48550/arxiv.2508.14954"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2508.14954","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.14954","pdf_url":"https://arxiv.org/pdf/2508.14954","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2508.14954","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073763343","display_name":"Charles Chien","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chien, Colleen V.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Zink, Anna","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zink, Anna","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5102780589","display_name":"Irene Y. Chen","orcid":"https://orcid.org/0000-0003-0173-9133"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Irene Y.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073763343"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.8457000255584717,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.8457000255584717,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12501","display_name":"Digital Economy and Work Transformation","score":0.028599999845027924,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.017799999564886093,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.5989000201225281},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.590399980545044},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4894999861717224},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.462799996137619},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.41510000824928284},{"id":"https://openalex.org/keywords/class-action","display_name":"Class action","score":0.40290001034736633},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.38839998841285706}],"concepts":[{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.5989000201225281},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.590399980545044},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5156999826431274},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4894999861717224},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.462799996137619},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.41510000824928284},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4113999903202057},{"id":"https://openalex.org/C2776687834","wikidata":"https://www.wikidata.org/wiki/Q2783852","display_name":"Class action","level":3,"score":0.40290001034736633},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.392300009727478},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.38839998841285706},{"id":"https://openalex.org/C2993819037","wikidata":"https://www.wikidata.org/wiki/Q836925","display_name":"Legal action","level":2,"score":0.37790000438690186},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.36579999327659607},{"id":"https://openalex.org/C522695570","wikidata":"https://www.wikidata.org/wiki/Q6517578","display_name":"Legal research","level":2,"score":0.2921000123023987},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.29019999504089355},{"id":"https://openalex.org/C2776889015","wikidata":"https://www.wikidata.org/wiki/Q5282532","display_name":"Disparate impact","level":3,"score":0.2883000075817108},{"id":"https://openalex.org/C2780858371","wikidata":"https://www.wikidata.org/wiki/Q5440427","display_name":"Federal Rules of Civil Procedure","level":3,"score":0.27869999408721924},{"id":"https://openalex.org/C67497173","wikidata":"https://www.wikidata.org/wiki/Q977345","display_name":"Legal aspects of computing","level":3,"score":0.2775999903678894},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.2770000100135803},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2754000127315521},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.27410000562667847},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2728999853134155},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.26600000262260437}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2508.14954","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.14954","pdf_url":"https://arxiv.org/pdf/2508.14954","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2508.14954","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.14954","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2508.14954","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.14954","pdf_url":"https://arxiv.org/pdf/2508.14954","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"algorithms":[1],"increasingly":[2,33],"take":[3],"on":[4,35],"critical":[5],"roles":[6],"in":[7,77,94],"high-stakes":[8],"areas":[9],"such":[10,42],"as":[11,22,43],"credit":[12],"scoring,":[13],"housing,":[14],"and":[15,47,71,87,129,145,159],"employment,":[16],"civil":[17,74],"enforcement":[18,75],"actions":[19,32,76],"have":[20],"emerged":[21],"a":[23],"powerful":[24],"tool":[25],"for":[26,120,156],"countering":[27],"potential":[28],"discrimination.":[29,50],"These":[30],"legal":[31,67,164],"draw":[34],"algorithmic":[36,49,53,95,114,135],"fairness":[37,54],"research":[38,101,110],"to":[39,45,61,90],"inform":[40],"questions":[41],"how":[44],"define":[46],"detect":[48],"However,":[51],"current":[52],"research,":[55,116],"while":[56],"theoretically":[57],"rigorous,":[58],"often":[59],"fails":[60],"address":[62],"the":[63,78],"practical":[64,92,118],"needs":[65],"of":[66],"investigations.":[68],"We":[69,152],"identify":[70,91],"analyze":[72],"15":[73],"United":[79],"States":[80],"including":[81],"regulatory":[82],"enforcement,":[83],"class":[84],"action":[85,165],"litigation,":[86],"individual":[88],"lawsuits":[89],"challenges":[93],"discrimination":[96],"cases":[97],"that":[98,161],"machine":[99],"learning":[100],"can":[102,162],"help":[103],"address.":[104],"Our":[105],"analysis":[106],"reveals":[107],"five":[108],"key":[109],"gaps":[111],"within":[112],"existing":[113],"bias":[115],"presenting":[117],"opportunities":[119],"more":[121],"aligned":[122],"research:":[123],"1)":[124],"finding":[125],"an":[126],"equally":[127],"accurate":[128],"less":[130],"discriminatory":[131],"algorithm,":[132],"2)":[133],"cascading":[134],"bias,":[136],"3)":[137],"quantifying":[138],"disparate":[139],"impact,":[140],"4)":[141],"navigating":[142],"information":[143],"barriers,":[144],"5)":[146],"handling":[147],"missing":[148],"protected":[149],"group":[150],"information.":[151],"provide":[153],"specific":[154],"recommendations":[155],"developing":[157],"tools":[158],"methodologies":[160],"strengthen":[163],"against":[166],"unfair":[167],"algorithms.":[168]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
