IEEE Computational Intelligence Magazine - February 2022 - 83
Accordingly, in such situations, a DPIA should be necessary:
the data controller should describe the data processing, assess
the necessity and proportionality of it, analyze risks for data
subjects (e.g., risks of discrimination, violation of the right to
health, to freedom of thought, of movement, attack to their
digital identity, etc.), and seek for the data subjects' opinion on
the data processing. This procedure will also imply the description
of the logic of the AI-based system, as well as the assessment
of its impact on the fundamental rights and freedoms
relevant for the application and the ways of mitigating it [70].
Making this report public (at least in some parts), would also
significantly help to reach a better level of transparency and justification
of AI applications [10].
The risks to rights and freedoms1 might concern, in the
credit scoring scenario, a) the discrimination of some social
groups (based on ethnic origins, gender, sexual origins, social
conditions) in the access to loans that might be embedded in AI
biases; b) the automatic exploitation of individuals in situations
of financial vulnerabilities or in situations of gambling addictions
through systems of unsustainable interest rates; c) the economic,
social and psychological disadvantages of families of
individuals in accessing loans at unfavorable conditions (resulting
in adverse effects to the fundamental right to health or even
to conduct business). Mitigating these risks might be done also
without requiring advanced explainability techniques: for example,
the data controller could check the presence of eventual
biases against social minorities or against gambling addicted
people in the training data sets of the credit scoring systems. In
addition, the data controller could check on a regular basis the
effects of credit scoring outcomes to see whether it led to unfair
economic, social or psychological damages to the consumers,
seek for the opinion of the representatives of the data subjects
(as Article 35(9) GDPR requires), or prepare periodical reports.
Regarding the medical imaging scenario, the risks to rights
and freedoms might include, a) the discrimination of some social
groups (based on ethnic origins, gender, sexual origins, social
conditions) in their access to COVID-19 medical treatments2;
b) false negatives that could lead to serious health damages to the
patient, and to the group of people that might be infected by
him/her; c) false positives that could lead to unnecessary medical
treatments (that might both damage the health conditions of the
patient and diminish the availability of drugs to people that
might need them in a pandemic), and to psychological suffering
of the patient and of his/her family; etc. Even in this case,
addressing and mitigating these risks might be done without
opening the 'black-box' of the AI application. For example, the
data controller could check the presence of eventual biases
against social minorities in the training data sets of the COVID19
detection tool. The data controller can also check the effects
of COVID-19 detection outcomes on a regular basis to see
1About the concept of " risk to a right " in the GDPR provisions about the DPIA see
[71]-[75].
2Although this might appear as a mere hypothetical case, many studies in the US
proved discrimination of health-related algorithms against black people. See for example
[76].
whether it led to false positives or false negatives and whether
these false diagnoses refer to people belonging to some particular
minorities (ethnicity, gender, etc.). In both cases, when these
problematic aspects are detected, the data controller could provide
some organizational mitigation measures, for example a second-step
human-mediated decision in 'crucial' cases where the
user belongs to a situation that has been observed (during the
algorithmic auditing) to be at high risk of unfairness, inaccuracies
and adverse effects in general3. In addition, the data controller
could organize some periodical questionnaires on people
who used this tool to check whether the system produced further
damages, or perform some simulations to see whether particular
people are discriminated or anyway adversely affected.
C. Proposal: Justification of AI-based Decision-making
Systems in the Context of Transparency Requirements
AI systems can be judged from different perspectives, considering
various aspects such as performance, robustness, transparency,
or explainability. So far, the discussion regarding algorithmic
explanations has focused on the latter, exploring the right to
explanation. However, a broader consideration of those aspects
becomes valuable in cases where no sufficient technical explanation
can be provided according to Article 22(3) of the
GDPR. Therefore, we argue that within the scope of a full AI
risk assessment, as outlined in Section IV-B, one should in general
not focus only on one particular risk. As an illustration,
high performance in a critical application-such as in the
medical imaging use case, where performance could save life-
might warrant the risk of losing human legibility of results.
Beyond the trade-off between performance and explainability
discussed in Section III-B, the robustness of AI systems is
also highly intertwined with explainability. It is reasonable to
assume that a robust model, systematically and properly
checked, will yield more robust and trustworthy explanations,
even if it might not be directly human-legible. This provides a
crucial link between explainability and the broader topics of AI
safety and cybersecurity. In the context of the latter, another
trade-off might even be introduced between transparency and
security, by increasing the attack surface against models [78] in
providing full technical transparency, including ways to compromise
the validity of explanatory methods [79]. It could also
be argued that for an AI model lacking in explainability, conducting
such proper technical system performance validations
and increasing the overall robustness could be enough to provide
information about the logics of the system, at least for a
technical expert or an auditing process.
Likewise, addressing fairness issues in automated decisionmaking
systems is obviously connected to addressing
infringements on individual rights, as are the issues surrounding
the legal requirements on explanations. Both
fields could be jointly considered, and many explanatory
methods are seen as instrumental to detect biases and unfair
3This approach might be criticized because it would imply to use a bigger amount of
sensitive data in order to avoid discrimination. However, see the reply in [77].
FEBRUARY 2022 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 83
IEEE Computational Intelligence Magazine - February 2022
Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - February 2022
Contens
IEEE Computational Intelligence Magazine - February 2022 - Cover1
IEEE Computational Intelligence Magazine - February 2022 - Cover2
IEEE Computational Intelligence Magazine - February 2022 - Contens
IEEE Computational Intelligence Magazine - February 2022 - 2
IEEE Computational Intelligence Magazine - February 2022 - 3
IEEE Computational Intelligence Magazine - February 2022 - 4
IEEE Computational Intelligence Magazine - February 2022 - 5
IEEE Computational Intelligence Magazine - February 2022 - 6
IEEE Computational Intelligence Magazine - February 2022 - 7
IEEE Computational Intelligence Magazine - February 2022 - 8
IEEE Computational Intelligence Magazine - February 2022 - 9
IEEE Computational Intelligence Magazine - February 2022 - 10
IEEE Computational Intelligence Magazine - February 2022 - 11
IEEE Computational Intelligence Magazine - February 2022 - 12
IEEE Computational Intelligence Magazine - February 2022 - 13
IEEE Computational Intelligence Magazine - February 2022 - 14
IEEE Computational Intelligence Magazine - February 2022 - 15
IEEE Computational Intelligence Magazine - February 2022 - 16
IEEE Computational Intelligence Magazine - February 2022 - 17
IEEE Computational Intelligence Magazine - February 2022 - 18
IEEE Computational Intelligence Magazine - February 2022 - 19
IEEE Computational Intelligence Magazine - February 2022 - 20
IEEE Computational Intelligence Magazine - February 2022 - 21
IEEE Computational Intelligence Magazine - February 2022 - 22
IEEE Computational Intelligence Magazine - February 2022 - 23
IEEE Computational Intelligence Magazine - February 2022 - 24
IEEE Computational Intelligence Magazine - February 2022 - 25
IEEE Computational Intelligence Magazine - February 2022 - 26
IEEE Computational Intelligence Magazine - February 2022 - 27
IEEE Computational Intelligence Magazine - February 2022 - 28
IEEE Computational Intelligence Magazine - February 2022 - 29
IEEE Computational Intelligence Magazine - February 2022 - 30
IEEE Computational Intelligence Magazine - February 2022 - 31
IEEE Computational Intelligence Magazine - February 2022 - 32
IEEE Computational Intelligence Magazine - February 2022 - 33
IEEE Computational Intelligence Magazine - February 2022 - 34
IEEE Computational Intelligence Magazine - February 2022 - 35
IEEE Computational Intelligence Magazine - February 2022 - 36
IEEE Computational Intelligence Magazine - February 2022 - 37
IEEE Computational Intelligence Magazine - February 2022 - 38
IEEE Computational Intelligence Magazine - February 2022 - 39
IEEE Computational Intelligence Magazine - February 2022 - 40
IEEE Computational Intelligence Magazine - February 2022 - 41
IEEE Computational Intelligence Magazine - February 2022 - 42
IEEE Computational Intelligence Magazine - February 2022 - 43
IEEE Computational Intelligence Magazine - February 2022 - 44
IEEE Computational Intelligence Magazine - February 2022 - 45
IEEE Computational Intelligence Magazine - February 2022 - 46
IEEE Computational Intelligence Magazine - February 2022 - 47
IEEE Computational Intelligence Magazine - February 2022 - 48
IEEE Computational Intelligence Magazine - February 2022 - 49
IEEE Computational Intelligence Magazine - February 2022 - 50
IEEE Computational Intelligence Magazine - February 2022 - 51
IEEE Computational Intelligence Magazine - February 2022 - 52
IEEE Computational Intelligence Magazine - February 2022 - 53
IEEE Computational Intelligence Magazine - February 2022 - 54
IEEE Computational Intelligence Magazine - February 2022 - 55
IEEE Computational Intelligence Magazine - February 2022 - 56
IEEE Computational Intelligence Magazine - February 2022 - 57
IEEE Computational Intelligence Magazine - February 2022 - 58
IEEE Computational Intelligence Magazine - February 2022 - 59
IEEE Computational Intelligence Magazine - February 2022 - 60
IEEE Computational Intelligence Magazine - February 2022 - 61
IEEE Computational Intelligence Magazine - February 2022 - 62
IEEE Computational Intelligence Magazine - February 2022 - 63
IEEE Computational Intelligence Magazine - February 2022 - 64
IEEE Computational Intelligence Magazine - February 2022 - 65
IEEE Computational Intelligence Magazine - February 2022 - 66
IEEE Computational Intelligence Magazine - February 2022 - 67
IEEE Computational Intelligence Magazine - February 2022 - 68
IEEE Computational Intelligence Magazine - February 2022 - 69
IEEE Computational Intelligence Magazine - February 2022 - 70
IEEE Computational Intelligence Magazine - February 2022 - 71
IEEE Computational Intelligence Magazine - February 2022 - 72
IEEE Computational Intelligence Magazine - February 2022 - 73
IEEE Computational Intelligence Magazine - February 2022 - 74
IEEE Computational Intelligence Magazine - February 2022 - 75
IEEE Computational Intelligence Magazine - February 2022 - 76
IEEE Computational Intelligence Magazine - February 2022 - 77
IEEE Computational Intelligence Magazine - February 2022 - 78
IEEE Computational Intelligence Magazine - February 2022 - 79
IEEE Computational Intelligence Magazine - February 2022 - 80
IEEE Computational Intelligence Magazine - February 2022 - 81
IEEE Computational Intelligence Magazine - February 2022 - 82
IEEE Computational Intelligence Magazine - February 2022 - 83
IEEE Computational Intelligence Magazine - February 2022 - 84
IEEE Computational Intelligence Magazine - February 2022 - 85
IEEE Computational Intelligence Magazine - February 2022 - 86
IEEE Computational Intelligence Magazine - February 2022 - 87
IEEE Computational Intelligence Magazine - February 2022 - 88
IEEE Computational Intelligence Magazine - February 2022 - 89
IEEE Computational Intelligence Magazine - February 2022 - 90
IEEE Computational Intelligence Magazine - February 2022 - 91
IEEE Computational Intelligence Magazine - February 2022 - 92
IEEE Computational Intelligence Magazine - February 2022 - 93
IEEE Computational Intelligence Magazine - February 2022 - 94
IEEE Computational Intelligence Magazine - February 2022 - 95
IEEE Computational Intelligence Magazine - February 2022 - 96
IEEE Computational Intelligence Magazine - February 2022 - 97
IEEE Computational Intelligence Magazine - February 2022 - 98
IEEE Computational Intelligence Magazine - February 2022 - 99
IEEE Computational Intelligence Magazine - February 2022 - 100
IEEE Computational Intelligence Magazine - February 2022 - 101
IEEE Computational Intelligence Magazine - February 2022 - 102
IEEE Computational Intelligence Magazine - February 2022 - 103
IEEE Computational Intelligence Magazine - February 2022 - 104
IEEE Computational Intelligence Magazine - February 2022 - 105
IEEE Computational Intelligence Magazine - February 2022 - 106
IEEE Computational Intelligence Magazine - February 2022 - 107
IEEE Computational Intelligence Magazine - February 2022 - 108
IEEE Computational Intelligence Magazine - February 2022 - 109
IEEE Computational Intelligence Magazine - February 2022 - 110
IEEE Computational Intelligence Magazine - February 2022 - 111
IEEE Computational Intelligence Magazine - February 2022 - 112
IEEE Computational Intelligence Magazine - February 2022 - 113
IEEE Computational Intelligence Magazine - February 2022 - 114
IEEE Computational Intelligence Magazine - February 2022 - 115
IEEE Computational Intelligence Magazine - February 2022 - 116
IEEE Computational Intelligence Magazine - February 2022 - Cover3
IEEE Computational Intelligence Magazine - February 2022 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com