<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>SEBD</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>POLARIS: A framework to guide the development of Trustworthy AI systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maria Teresa Baldassarre</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Danilo Caivano</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Domenico Gigante</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Azzurra Ragone</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ser&amp;Practices Srl</institution>
          ,
          <addr-line>Bari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Bari "A. Moro"</institution>
          ,
          <addr-line>Bari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>32</volume>
      <fpage>23</fpage>
      <lpage>26</lpage>
      <abstract>
        <p>In the ever-expanding landscape of Artificial Intelligence (AI), where innovation thrives and new products and services are continuously being delivered, ensuring that AI systems are designed and developed responsibly throughout their entire lifecycle is crucial. To this end, several AI ethics principles and guidelines have been issued to which AI systems should conform. Nevertheless, relying solely on high-level AI ethics principles is far from suficient to ensure the responsible engineering of AI systems. In this field, AI professionals often navigate by sight. Indeed, while recommendations promoting Trustworthy AI (TAI) exist, they are often high-level statements dificult to translate into concrete implementation strategies. Currently, there is a significant gap between high-level AI ethics principles and low-level concrete practices for AI professionals. To address this challenge, in this discussion paper we describe the novel holistic framework for Trustworthy AI we developed - designed to bridge the gap between theory and practice. The framework builds up from the results of a systematic review of the state of the practice as well as a survey and think-aloud interviews with 34 AI practitioners. The framework, unlike most of the ones in the literature, is designed to provide actionable guidelines and tools to support diferent types of stakeholders throughout the entire Software Development Life Cycle (SDLC). Our goal is to empower AI professionals to confidently navigate the ethical dimensions of TAI through practical insights, ensuring that the vast potential of AI is exploited responsibly for the benefit of society as a whole.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Artificial Intelligence</kwd>
        <kwd>Software Engineering</kwd>
        <kwd>Trustworthy AI</kwd>
        <kwd>Knowledge Base</kwd>
        <kwd>Framework</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the dynamic realm of Artificial Intelligence (AI), marked by ceaseless innovation and
rapid advancements, the ethical, societal, and operational implications of AI technologies
have shifted to the forefront of discussions. As AI systems become deeply integrated into
our daily lives, from healthcare [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] to finance [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], and influence critical decision-making
processes, the responsible development and deployment of AI has transitioned from an
academic discourse to an imperative in real-world applications.
      </p>
      <p>
        In this complicated context, the concept of Trustworthy Artificial Intelligence (TAI)
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] has grown relevance. These risks are even more pronounced with the recent advent of
Generative AI — e.g. ChatGPT — and how this impacts on various societal aspects [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Several public and private organizations have tried to address TAI by developing
diferent kinds of resources, just to cite a few: ethical requirements [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], principles [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ],
guidelines [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], best practices [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], tools [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], and frameworks [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. However, navigating the
intricacies of TAI has become increasingly complex due to what we might refer to as
"principle proliferation" [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. This phenomenon encompasses the multitude of ethical
principles that have been devised, each one providing a specific definition, but also
contributing to a landscape that can overwhelm AI practitioners.
      </p>
      <p>
        In response to the challenges posed by principle proliferation, our research follows the
work of Jobin et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and focuses on four foundational pillars of TAI: Privacy, Security,
Fairness, and Explainability. These pillars have been condensed in a practical, focused,
and adaptable framework, called POLARIS [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Its aim is to guide AI practitioners and
stakeholders in their quest to ensure the efective trustworthy development of AI-enabled
systems across the entire software Development LifeCycle (SDLC).
      </p>
      <p>
        The main contributions of this work — detailed in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] — can be summarized as
follows:
• A review of the state of the practice and identification of practitioner needs to
understand existing practices, challenges, and what practitioners currently lack in
developing Trustworthy AI applications.
• The proposal of a novel framework (POLARIS) that systematizes and organizes the
knowledge found in diferent sources. The objective of POLARIS is to make this
knowledge easily accessible to AI practitioners and to provide them with actionable
guidelines that can be applied in every phase of the SDLC.
      </p>
      <p>The paper is organized as follows: Section 2 outlines the results of the systematic
review and the findings from the survey and interviews with AI professionals. Section 3
describes the POLARIS framework, its components and how to use it. Conclusions are
drawn in Section 4.</p>
    </sec>
    <sec id="sec-2">
      <title>2. State of the practice</title>
      <p>
        This discussion paper builds on previous research [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], in which we conducted a
comprehensive study of the state of the practice of existing TAI frameworks. More precisely, we
investigated (i) the extent to which the analyzed frameworks addressed the principles
mentioned in Section 1 and (ii) whether and to what extent these frameworks covered
the stages of the Software Development Life Cycle (SDLC). Next, we carried out a
comparative analysis among the identified frameworks with respect to characteristics
such as best practices, guidelines, and tools, in order to assess if and how big a gap there
is between the proposed high-level AI ethics principles and low-level operational practices
for practitioners.
      </p>
      <p>
        In our previous work [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] we analyzed 138 frameworks, both from white-literature and
grey-literature sources. The main findings are:
      </p>
      <p>1) Most of the frameworks are proposed by No-profit Organisations, Public Entities
or Human Communities (50.7%); followed by private Companies (31.9%) and then
Universities (17.4%).</p>
      <p>2) Most of the frameworks provide a set of TAI principles/values (46.1%); others
include actionable Guidelines (29.6%), but very few also provide Tools (9.2%).</p>
      <p>3) In the majority of cases, the frameworks address all four TAI principles (45.1%)
even if there are frameworks that cover only one (15.5%) or two (15.5%) principles;
4) More than half of the frameworks (55.2%), provide support only for the Requirements
Elicitation phase. While all the SDLC phases are covered only in 5.7% of the frameworks;
5) In more than 80% of the cases there is no tool included in the framework and when it
is present, it is directed to Non-technical stakeholders (i.e. stakeholders who work in the
ifrst two phases of the SDLC — e.g. commercial agents, functional analysts, architecture
designers, etc).</p>
      <p>
        In summary, our analysis confirmed that most of the existing frameworks include
high-level best practices, checklists, or self-assessment questions, most suitable for
nontechnical stakeholders, limitedly able to address technical stakeholder needs and close
the gap between high-level principles definition and practical recommendations for AI
practitioners covering all the SDLC phases. The findings from [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] have then guided our
subsequent research aimed at investigating the needs of AI practitioners, their current
practices and issues encountered in the design and implementation of trustworthy AI
systems.
      </p>
      <sec id="sec-2-1">
        <title>2.1. Identification of Practitioner needs</title>
        <p>
          As a premise for the design and proposal of our framework, we conducted an exploratory
survey [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] to collect practitioner insights and needs with respect to TAI principles. We
used convenience sampling and recruited practitioners from companies in our network
of collaborations. All participants were practitioners with experience in developing
AIenabled systems who had addressed, to some extent, TAI in their projects. We contacted a
total of 45 professionals, of which 34 completed the survey. These participants represented
a diverse spectrum, ranging from small-medium companies (55.9%), to large companies
with more than 1000 employees (44.1%).
        </p>
        <p>Apart from the demographics, the survey is organized into three main parts, each
focusing on the collection of specific data pertaining: a) existing practices, b) identification
of challenges, c) discovery of unmet needs. In the following, for each part, we provide a
brief explanation and highlight the main results.</p>
        <p>A) Exploration of Existing Practices. The first part of the survey investigated the
operational procedures and methodologies employed by practitioners in the context of
implementing TAI. This exploration aimed to provide a detailed insight into the real-world
practices and strategies adopted.</p>
        <p>Results. First, we observed that the TAI principle most frequently addressed by
participants is Privacy (58.8%), and most of the participants address at least one TAI principle
during Design (64.7%) and Development (47.1%) SDLC phases. On the contrary, very
few participants declared to address at least one TAI principle during the Test (29.4%)
and Deploy (20.6%) phases. This may highlight the need for more support, in terms of
tools and guidelines in the last phases of the SDLC. Moreover, when participants faced
issues related to TAI, in half of the cases they did not even try to address or solve them
(50%). Probably because they did not know how to or they simply considered them
not worth solving. This is a point that deserves more investigation. Only 35% of the
participants declared to have directly addressed TAI issues, while a small percentage
stated that the issue resolution was demanded to a third party (15%).</p>
        <p>B) Identification of Challenges . This section of the survey explored the challenges and
obstacles encountered by professionals while trying to integrate TAI into their systems.
By identifying these issues, we aimed to shed light on critical areas where AI professionals
may need more support.</p>
        <p>Results. In cases where the respondents tried to address/fix TAI issues, we found that
the most voted impediments are: (i) "the issue solution required too much time to be
implemented" (58.3%) and (ii) "the issue solution was likely to decrease the performance of
the system (e.g., decreasing accuracy)" (50%). On the other hand, none of the participants
answered: "no one had idea on how to solve the issue", which is a positive result since it
indicates that practitioners are conscious of untrustworthiness problems and are able to
hypothesize solutions. Among the comments, one participant mentioned "[scarce] data
availability" as an impediment.</p>
        <p>C) Discovery of Unmet Needs. The third part of the survey reveals the presence of
unaddressed needs within the practical landscape of TAI. Specifically, we uncovered a
range of requirements that have so far received limited attention within the existing
literature.</p>
        <p>Results. Regarding the prevention of trustworthiness issues in AI, the participants rated
as the most valuable tool able to "[...] generate an explanation of a model after its
creation [...]" (with 82% of positive answers) while they rated as least useful (i) a tool to
help "deciding how much data you need for particular subgroups/subpopulations" and (ii)
a tool to "generate possible adversarial/malicious data points to test to use in testing the
system" (both with 19% of negative answers).</p>
        <p>On the other side, to address untrustworthiness in AI, the participants rated as the most
valuable (i) "best practices that can actively guide your team through the model’s SDLC "
(92% positive answers), (ii) a tool able to "[...] help [...] monitoring the AI model after its
release to the public" (91% positive answers), and "a knowledge book in which are mapped
trustworthiness problems and [...] solutions" (70% positive answers). On the other hand,
they rated as least useful (i) a tool "[...] to help your team doing an ex-post TAI audit"
(18% of negative answers) and (ii) a tool able to [...] help your team deciding which AI
model best respects the TAI principles [...] (17% of negative answers).</p>
        <p>
          Overall, these results confirmed the findings of our previous work [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]: a significant
majority of the respondents expressed the need for comprehensive knowledge bases and
pragmatic guidelines ofering insights and recommendations for the seamless
implementation of trustworthy AI system throughout the entire SDLC. Furthermore, they also
highlighted the lack of tools supporting them in the last stages of SDLC.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. The POLARIS Framework</title>
      <p>
        In response to the challenges and issues highlighted by the research results, with the
intent to fill the gap between theory and practice and to address stakeholder needs and
shortcomings (Section 2), we have developed a framework: POLARIS [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]POLARIS.
      </p>
      <p>Indeed, POLARIS has been designed to provide actionable guidelines and tools in
order to support stakeholders in addressing TAI principles throughout the entire Software
Development Life Cycle (SDLC). POLARIS provides a significant amount of
information, organized and linked into a comprehensive knowledge base that is designed to be
expandable, with the possibility to easily add new knowledge.</p>
      <p>In Section 3.1 we explain how we built the POLARIS knowledge base while in Section
3.2 we describe how to navigate it.</p>
      <sec id="sec-3-1">
        <title>3.1. Defining POLARIS Knowledge Base</title>
        <p>In this section, we describe how we assembled the POLARIS Knowledge Base and
the selection process used to choose the diferent knowledge sources representing the
foundation of POLARIS.</p>
        <p>
          We started from the frameworks analyzed in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], we complemented our analysis with
the results obtained from the survey, and then we identified among the existing knowledge
sources (i.e. frameworks) those that met both of the following criteria:
1. Have actionable guidelines (and not only a simple high-level principles list)
2. Address all SDLC phases.
        </p>
        <p>
          Regarding the last criterion, since SDLC phases do not always map with the activities
required to develop an AI-enabled system, we have integrated each SDLC phase with
AI-enabled activities established by Zhengxin et al. [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
        <p>
          After this first selection phase, we identified only three knowledge sources that meet
both criteria (1) and (2). Then, we mapped each identified knowledge source to the
corresponding TAI principle. For Explainability we selected Jin et al. - EUCA: the
Explainable AI Framework [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], for Fairness we chose Amsterdam Intelligence - The
Fairness Handbook [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. For both Privacy and Security we selected ENISA - Securing
Machine Learning Algorithms [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
        </p>
        <p>Then, we refined this first selection by adding more knowledge sources that could
complement the information provided by the primary ones initially selected. We started
by selecting the frameworks that met at least one of the following criteria:
1. Have actionable guidelines (and not only a simple high-level principles list)
2. Address all SDLC phases.</p>
        <p>
          We retrieved 10 additional knowledge sources that met at least one of the previous
criteria. The table with all the 10 knowledge sources identified can be found in the
online appendix [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Then, we performed a comparative analysis between each primary
knowledge source already selected ([
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ], [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]) and the new ones retrieved in this
second iteration.
        </p>
        <p>The results of the comparative analysis brought us to select four additional knowledge
sources that could complement and expand the information provided by the first ones
selected.</p>
        <p>
          The additional frameworks selected were ICO’s "Guidance on AI and data protection"
[
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], Tensorflow’s " Responsible AI in your ML workflow " [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ], the guidelines in Microsoft’s
"Threat Modeling AI/ML Systems and Dependencies" [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] and CSIRO’s "Responsible
AI Pattern Catalogue" [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. Therefore, we used these additional knowledge sources to
further extend the information provided by the primary ones. We ended up selecting 7
knowledge sources. In the online appendix [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] there is the mapping between each TAI
principle and the corresponding knowledge sources covering that principle.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Navigating POLARIS Knowledge Base</title>
        <p>Having defined the POLARIS knowledge base, in this section we focus on how to navigate
it. The goal of the proposed framework is to support stakeholders throughout the SDLC
by suggesting concrete implementation strategies able to support and guide them in the
development of TAI applications.</p>
        <p>When applying the framework, the users will ultimately receive an Action to implement,
that is, an actionable guideline that a stakeholder should consider and, if possible,
implement while developing the AI-enabled software system to ensure compliance with
the four TAI principles. The user can also choose to filter and apply only a subset of the
suggested guidelines.</p>
        <p>As of now, the first version of POLARIS has been structured as a filterable Excel
array of sheets. There are four main knowledge components, one per each principle: (i)
Privacy; (ii) Security; (iii) Fairness and (iv) Explainability.</p>
        <p>
          In proposing the structure of each Excel sheet, we were inspired by the ENISA
framework [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] and then customized it according to our needs.
        </p>
        <p>The two sheets that contain the knowledge for "Privacy" and "Security" are composed
of the following six columns (Fig. 1 shows an excerpt of the security component).
(1) SDLC Phase. The SDLC phase that the Action column applies to.
(2) Threat. Contains the list of threats, i.e. possible attacks that can be conducted
against an AI-enabled system. Examples are Evasion and Poisoning attacks.</p>
        <p>(3) Sub-Threat. In some specific cases, a threat can have a specific declination in a
sub-characteristic. For example, the Poisoning attack can be declined in Targeted Data
Poisoning and Indiscriminate Data Poisoning.</p>
        <p>(4) Description. A textual description of the (Sub)Threat, which helps the stakeholder
obtain coarse-grained details about the threat and understand the attacker’s objective.</p>
        <p>(5) Vulnerability (consequence). This is the immediate consequence of having a model
vulnerable to a specific threat.</p>
        <p>(6) Action. The corresponding action, or decision, that should be adopted to address
a specific threat, based on the SDLC phase and threat selected, keeping in mind the
vulnerability.</p>
        <p>For example, a developer in the Design SDLC phase who is trying to address the
vulnerabilities associated with Poisoning threat, may consult POLARIS and access the
Security Excel sheet, select the Poisoning threat — and corresponding sub-threat, i.e.
Label modification —, and obtain a description of the vulnerability associated to the
(sub)threat and the action to take in order to mitigate the vulnerability, i.e. ensure that
reliable sources are used (Fig. 1).</p>
        <p>The sheet that contains the knowledge for "Fairness" is composed of 5 columns, all of
the above, except for Vulnerability (consequence) column which has been removed as the
concept of vulnerability in the context of fairness does not apply.</p>
        <p>
          The sheet containing the knowledge for "Explainability" has a diferent set of columns
(see Fig. 2), because there are no real threats associated with the lack of explainability.
However, having a system that is not explainable, will lead users to use it with some
reluctance because of its opacity in making decisions, as it is not possible to derive any
clear logical relationship between the internal configuration and their external behaviour,
except for a few specific cases (e.g. decision trees) [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. For Explainability, the columns
are the following:
(1) SDLC Phase. The SDLC phase the Action column relates to.
        </p>
        <p>(2) Data Type. The type of data used by the AI algorithm for which the action/guideline
applies. Examples are Tabular data or Image. When the action applies to all algorithms,
regardless of the type of data, the tag General is used.</p>
        <p>
          (3) Local/Global Explanation. This column describes the type of explanation that can
be obtained by implementing the action. At the moment, the possible values are Global
and Local [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ].
        </p>
        <p>(4) Explanation Goal. This is the goal that can be achieved if the action/guideline
gets implemented. Examples are: to validate the algorithm outcome and to reveal bias.</p>
        <p>(5) Action. The corresponding action, or decision, that should be taken to reach the
selected explanation goal. We point out that for each &lt;data, explanation type&gt; pair
there is at least a corresponding row in the framework.</p>
        <p>For example, a user who is in the Requirement Elicitation SDLC phase and needs to
enquire on all the possible explanation approaches to explain the output of an algorithm,
could access the Explainability Excel sheet and select the General data type and retrieve a
set of actions that pertain explainability requirements i.e. elicit explainability requirements
(Fig. 2).</p>
        <p>When navigating POLARIS, each stakeholder can use diferent filters and subfilters,
based on specific needs, as for instance: Knowledge Component (i.e. TAI principle) to
address, Threat (or Sub-Threat), Vulnerability, SDLC Phase, Data type, and Local/Global
Explanation. One of the most significant filters is SDLC phase, which makes POLARIS
lfexible and allows stakeholders to use it either on ongoing/closed projects — where it is
possible to address, for example, only the deployment or monitoring phase — or at the
early stage of a project, since in the latter case it can cover all SDLC phases.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>In this work, we described POLARIS, the framework we designed to fill the gaps
highlighted in the review of the state of the practice and to provide AI practitioners with
actionable guidelines specific to each phase of the SDLC.</p>
      <p>
        POLARIS has four pillars (or components), which are Explainability, Fairness, Security,
and Privacy. These principles have been chosen as they are the most recurrent TAI
principles found in the current literature [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Each component provides practical
guidelines and tools to support diferent kinds of stakeholders across the entire SDLC.
      </p>
      <p>Its added value is that it provides knowledge already freely accessible online but in an
organized and systematized way.</p>
      <p>
        As detailed in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], we identified several improvements. From a usability point of view,
we are planning to (i) provide a more usable UI, like the one of the VIS-Prise tool [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
Then, we plan to (ii) validate POLARIS on a growing number of case studies.
      </p>
      <p>Moreover, if further validations confirm us the stakeholders are interested and plan to
use POLARIS, in the next versions we plan to integrate more TAI principles.</p>
      <p>POLARIS is a preliminary attempt to organize and make knowledge on TAI principles
easily accessible and available to diferent kinds of stakeholders. It is a pioneering
prototype whose goal is to make AI professionals, policymakers, and stakeholders able to
navigate the ethical dimensions of TAI with confidence, ensuring that the vast potential
of AI is harnessed responsibly for the benefit of society.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Esteva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kuprel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Novoa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Ko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Swetter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Blau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Thrun</surname>
          </string-name>
          ,
          <article-title>Dermatologist-level classification of skin cancer with deep neural networks</article-title>
          ,
          <source>Nature</source>
          <volume>542</volume>
          (
          <year>2017</year>
          )
          <fpage>115</fpage>
          -
          <lpage>118</lpage>
          . URL: https://api.semanticscholar.org/CorpusID:3767412.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>G.</given-names>
            <surname>Cornacchia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Narducci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ragone</surname>
          </string-name>
          ,
          <article-title>Improving the user experience and the trustworthiness of financial services</article-title>
          ,
          <source>in: Human-Computer Interaction - INTERACT 2021 - 18th IFIP TC 13 International Conference</source>
          , volume
          <volume>12936</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2021</year>
          , pp.
          <fpage>264</fpage>
          -
          <lpage>269</lpage>
          . URL: https://doi.org/10.1007/ 978-3-
          <fpage>030</fpage>
          -85607-6_
          <fpage>19</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -85607-6\_
          <fpage>19</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] High-Level Expert Group on AI (AIHLEG), Ethics guidelines for trustworthy AI | Shaping Europe's digital future</article-title>
          ,
          <year>2018</year>
          . URL: https://digital-strategy.ec.europa.eu/ en/library/ethics
          <article-title>-guidelines-trustworthy-ai.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. Fernandez</given-names>
            <surname>Nieto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gigante</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ragone</surname>
          </string-name>
          ,
          <article-title>The social impact of generative ai: An analysis on chatgpt</article-title>
          ,
          <source>in: Proceedings of the 2023 ACM Conference on Information Technology for Social Good</source>
          , GoodIT '23,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2023</year>
          , p.
          <fpage>363</fpage>
          -
          <lpage>373</lpage>
          . URL: https://doi.org/10.1145/3582515.3609555. doi:
          <volume>10</volume>
          .1145/3582515.3609555.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>European</given-names>
            <surname>Union</surname>
          </string-name>
          ,
          <source>AI Act</source>
          ,
          <year>2023</year>
          . URL: https://www. europarl.europa.eu/news/en/headlines/society/20230601STO93804/ eu
          <article-title>-ai-act-first-regulation-on-artificial-intelligence.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>UNI</given-names>
            <surname>Global Union</surname>
          </string-name>
          ,
          <source>Top 10 Principles for Ethical AI</source>
          ,
          <year>2019</year>
          . URL: https://www. thefutureworldofwork.org/opinions/10-principles
          <article-title>-for-ethical-ai/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>The</given-names>
            <surname>Public</surname>
          </string-name>
          <string-name>
            <surname>Voice</surname>
          </string-name>
          ,
          <source>Universal Guidelines for Artificial Intelligence</source>
          ,
          <year>2019</year>
          . URL: https: //thepublicvoice.org/ai-universal-guidelines/.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Google</surname>
            ,
            <given-names>Tools</given-names>
          </string-name>
          &amp; Platforms,
          <year>2019</year>
          . URL: https://pair.withgoogle.com/tools/.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>NIST</given-names>
            ,
            <surname>AI Risk Management</surname>
          </string-name>
          <string-name>
            <surname>Framework</surname>
          </string-name>
          ,
          <year>2019</year>
          . URL: https://www.nist.gov/itl/ ai
          <article-title>-risk-management-framework.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jobin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ienca</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Vayena,</surname>
          </string-name>
          <article-title>The global landscape of ai ethics guidelines</article-title>
          ,
          <source>Nature Machine Intelligence</source>
          <volume>1</volume>
          (
          <year>2019</year>
          )
          <fpage>389</fpage>
          -
          <lpage>399</lpage>
          . doi:
          <volume>10</volume>
          .1038/s42256-019-0088-2.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gigante</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kalinowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ragone</surname>
          </string-name>
          ,
          <article-title>Polaris: A framework to guide the development of trustworthy ai systems</article-title>
          ,
          <year>2024</year>
          . arXiv:
          <volume>2402</volume>
          .
          <fpage>05340</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gigante</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ragone</surname>
          </string-name>
          ,
          <article-title>A rapid review of responsible ai frameworks: How to guide the development of ethical ai</article-title>
          ,
          <source>in: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering</source>
          , EASE '23,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2023</year>
          , p.
          <fpage>358</fpage>
          -
          <lpage>367</lpage>
          . URL: https://doi.org/10.1145/3593434.3593478. doi:
          <volume>10</volume>
          .1145/3593434. 3593478.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gigante</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kalinowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ragone</surname>
          </string-name>
          , Survey link,
          <year>2023</year>
          . Https://forms.ofice.com/e/GVeeWf1Pqz.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>F.</given-names>
            <surname>Zhengxin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Jingyu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yuechen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Qinghua</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xiwei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Jef</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Shuai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Shiping</surname>
          </string-name>
          ,
          <article-title>Mlops spanning whole machine learning life cycle: A survey</article-title>
          ,
          <source>ArXiv abs/2304</source>
          .07296 (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>W.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gromala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pasquier</surname>
          </string-name>
          , G. Hamarneh,
          <article-title>Euca: the end-user-centered explainable ai framework (</article-title>
          <year>2021</year>
          ). arXiv:
          <volume>2102</volume>
          .
          <fpage>02437</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Muhammad</surname>
          </string-name>
          , The fairness handbook,
          <year>2022</year>
          . URL: https://amsterdamintelligence. com/resources/the-fairness-handbook.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>ENISA,</surname>
          </string-name>
          <article-title>Securing machine learning algorithms</article-title>
          ,
          <year>2021</year>
          . URL: https://www.enisa.europa. eu/publications/securing-machine
          <article-title>-learning-algorithms.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gigante</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kalinowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ragone</surname>
          </string-name>
          , Polaris appendix,
          <year>2023</year>
          . Https://figshare.com/s/1a104ceab72c73137916.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>[19] ICO, Guidance on AI and data protection</source>
          ,
          <year>2021</year>
          . URL: https://ico.org.
          <article-title>uk/for-organisations/uk-gdpr-guidance-and-resources/artificial-intelligence/ guidance-on-ai-and-data-protection/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Tensorflow</surname>
          </string-name>
          ,
          <article-title>Responsible ai in your ml workflow (</article-title>
          <year>2021</year>
          ). URL: https://www.tensorflow. org/responsible_ai?hl=en.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Microsoft</surname>
          </string-name>
          ,
          <article-title>Threat modeling AI/ML systems</article-title>
          and dependencies,
          <year>2021</year>
          . URL: https: //learn.microsoft.com/en-us/security/engineering/threat-modeling-aiml.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>D. CSIRO</surname>
          </string-name>
          ,
          <article-title>Responsible ai pattern catalogue (</article-title>
          <year>2022</year>
          ). URL: https://research.csiro.au/ ss/science/projects/responsible-ai
          <string-name>
            <surname>-</surname>
          </string-name>
          pattern-catalogue/.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.</given-names>
            <surname>Wildberger</surname>
          </string-name>
          ,
          <article-title>Alleviating the opacity of neural networks</article-title>
          ,
          <source>in: Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94)</source>
          , volume
          <volume>4</volume>
          ,
          <year>1994</year>
          , pp.
          <fpage>2373</fpage>
          -
          <lpage>2376</lpage>
          vol.
          <volume>4</volume>
          . doi:
          <volume>10</volume>
          .1109/ICNN.
          <year>1994</year>
          .
          <volume>374590</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Lundberg</surname>
          </string-name>
          , G. Erion,
          <string-name>
            <given-names>H.</given-names>
            <surname>Chen</surname>
          </string-name>
          , A. DeGrave,
          <string-name>
            <surname>J. M. Prutkin</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Nair</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Katz</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Himmelfarb</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Bansal</surname>
            ,
            <given-names>S.-I. Lee</given-names>
          </string-name>
          ,
          <article-title>From local explanations to global understanding with explainable ai for trees</article-title>
          ,
          <source>Nature Machine Intelligence</source>
          <volume>2</volume>
          (
          <year>2020</year>
          )
          <fpage>56</fpage>
          -
          <lpage>67</lpage>
          . URL: https://doi.org/10.1038/s42256-019-0138-9. doi:
          <volume>10</volume>
          .1038/s42256-019-0138-9.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Dimauro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gigante</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pagano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <article-title>Supporting secure agile development: The vis-prise tool</article-title>
          , in
          <source>: Proceedings of the 2022 International Conference on Advanced Visual Interfaces</source>
          ,
          <source>AVI</source>
          <year>2022</year>
          ,
          <article-title>Association for Computing Machinery</article-title>
          , New York, NY, USA,
          <year>2022</year>
          . URL: https://doi.org/10.1145/ 3531073.3534494. doi:
          <volume>10</volume>
          .1145/3531073.3534494.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>