Preface |
|
vii | |
|
1 Fairness, Technology, and the Real World |
|
|
1 | (32) |
|
Fairness in Engineering Is an Old Problem |
|
|
3 | (2) |
|
Our Fairness Problems Now |
|
|
5 | (15) |
|
Legal Responses to Fairness in Technology |
|
|
20 | (2) |
|
The Assumptions and Approaches in This Book |
|
|
22 | (2) |
|
What If I'm Skeptical of All This Fairness Talk? |
|
|
24 | (3) |
|
|
27 | (3) |
|
|
30 | (3) |
|
2 Understanding Fairness and the Data Science Pipeline |
|
|
33 | (34) |
|
|
36 | (21) |
|
|
57 | (4) |
|
|
61 | (1) |
|
Checklist of Points of Entry for Fairness in the Data Science Pipeline |
|
|
61 | (4) |
|
|
65 | (2) |
|
|
67 | (32) |
|
|
69 | (6) |
|
Choosing Appropriate Data |
|
|
75 | (12) |
|
Case Study: Choosing the Right Question for a Data Set and the Right Data Set for a Question |
|
|
87 | (2) |
|
Quality Assurance for a Data Set: Identifying Potential Discrimination |
|
|
89 | (6) |
|
A Timeline for Fairness Interventions |
|
|
95 | (2) |
|
Comprehensive Data-Acquisition Checklist |
|
|
97 | (1) |
|
|
98 | (1) |
|
4 Fairness Pre-Processing |
|
|
99 | (34) |
|
Simple Pre-Processing Methods |
|
|
100 | (1) |
|
Suppression: The Baseline |
|
|
100 | (2) |
|
Massaging the Data Set: Relabeling |
|
|
102 | (2) |
|
|
104 | (6) |
|
|
110 | (3) |
|
|
113 | (2) |
|
|
115 | (6) |
|
Learning Fair Representations |
|
|
121 | (4) |
|
Optimized Data Transformations |
|
|
125 | (5) |
|
Fairness Pre-Processing Checklist |
|
|
130 | (2) |
|
|
132 | (1) |
|
|
133 | (22) |
|
|
134 | (1) |
|
|
135 | (3) |
|
|
138 | (5) |
|
|
143 | (7) |
|
In-Processing Beyond Antidiscrimination |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (3) |
|
6 Fairness Post-Processing |
|
|
155 | (18) |
|
Post-Processing Versus Black-Box Auditing |
|
|
156 | (2) |
|
|
158 | (3) |
|
|
161 | (5) |
|
Calibration-Preserving Equalized Odds |
|
|
166 | (6) |
|
|
172 | (1) |
|
7 Model Auditing for Fairness and Discrimination |
|
|
173 | (28) |
|
The Parameters of an Audit |
|
|
174 | (8) |
|
Scoping: What Should We Audit? |
|
|
182 | (1) |
|
|
182 | (17) |
|
|
199 | (2) |
|
8 Interpretable Models and Explainability Algorithms |
|
|
201 | (38) |
|
Interpretation Versus Explanation |
|
|
202 | (2) |
|
|
204 | (11) |
|
|
215 | (18) |
|
What Interpretation and Explainability Miss |
|
|
233 | (4) |
|
Interpretation and Explanation Checklist |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (24) |
|
|
241 | (18) |
|
Other Privacy Problems and Attacks |
|
|
259 | (1) |
|
Important Privacy Techniques |
|
|
260 | (1) |
|
|
261 | (2) |
|
10 ML Models and Security |
|
|
263 | (22) |
|
|
264 | (15) |
|
|
279 | (5) |
|
|
284 | (1) |
|
11 Fair Product Design and Deployment |
|
|
285 | (18) |
|
|
286 | (2) |
|
|
288 | (1) |
|
Respecting Traditional Spheres of Privacy and Private Life |
|
|
289 | (1) |
|
|
290 | (2) |
|
|
292 | (2) |
|
Clear Security Promises and Delineated Limitations |
|
|
294 | (1) |
|
Possibility of Downstream Control and Verification |
|
|
294 | (1) |
|
Products That Work Better for Privileged People |
|
|
295 | (3) |
|
|
298 | (2) |
|
|
300 | (1) |
|
|
301 | (2) |
|
12 Laws for Machine Learning |
|
|
303 | (20) |
|
|
309 | (3) |
|
Algorithmic Decision Making |
|
|
312 | (2) |
|
|
314 | (2) |
|
|
316 | (2) |
|
Some Application-Specific Laws |
|
|
318 | (3) |
|
|
321 | (2) |
Index |
|
323 | |