{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T16:41:41Z","timestamp":1767890501954,"version":"3.49.0"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T00:00:00Z","timestamp":1676073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T00:00:00Z","timestamp":1676073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100020471","name":"Trusted Autonomous Systems Defence CRC","doi-asserted-by":"publisher","award":["Trusted Autonomous Systems Defence CRC"],"award-info":[{"award-number":["Trusted Autonomous Systems Defence CRC"]}],"id":[{"id":"10.13039\/501100020471","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2023,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Value Sensitive Design (VSD) is a design methodology developed by Batya Friedman and Peter Kahn (2003) that brings in moral deliberations in an early stage of a design process. It assumes that neither technology itself is value neutral, nor shifts the value-ladennes to the sole usage of technology. This paper adds to emerging literature onVSD for autonomous weapons systems development and discusses extant literature on values in autonomous systems development in general and in autonomous weapons development in particular. I identify opportunities, such as public debates, and threats, such as the classified nature of the design process, for VSD in autonomous weapons development. This paper contributes to academic debates about the non-neutrality of technology by pointing out that values have been and can be explicitly designed into autonomous systems. It is informative for policy makers and designers who are tasked with developing actual autonomous weapons or policies around such systems, as they learn about an established design methodology that is sensitive to societal concerns and industry needs and that can be applied to autonomous weapons systems.<\/jats:p>","DOI":"10.1007\/s10676-023-09687-w","type":"journal-article","created":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T11:53:50Z","timestamp":1676116430000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Value Sensitive Design for autonomous weapon systems \u2013 a primer"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7368-5002","authenticated-orcid":false,"given":"Christine","family":"Boshuijzen-van Burken","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,11]]},"reference":[{"key":"9687_CR1","unstructured":"Advisory council on International Affairs (2015). Autonomous Weapon Systems: The Need for Meaningful Human Control (No. 97 AIV \/ No. 26 CAVV, October 2015)."},{"issue":"4","key":"9687_CR2","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1080\/15027570.2010.536402","volume":"9","author":"RC Arkin","year":"2010","unstructured":"Arkin, R. C. (2010). The case for ethical autonomy in Unmanned Systems. Journal of Military Ethics, 9(4), 332\u2013341. https:\/\/doi.org\/10.1080\/15027570.2010.536402","journal-title":"Journal of Military Ethics"},{"key":"9687_CR3","unstructured":"Assuring Body of Knowledge. (n.d.). Assuring Body of Knowledge Definitions. Assuring Autonomy International Programme. Retrieved July 7 (2020). from https:\/\/www.york.ac.uk\/assuring-autonomy\/body-of-knowledge\/definitions\/"},{"key":"9687_CR4","unstructured":"Australian Government. Department of Industry, Science, Energy and Resources (2019). AI Ethical Principles. https:\/\/www.industry.gov.au\/data-and-publications\/building-australias-artificial-intelligence-capability\/ai-ethics-framework\/ai-ethics-principles"},{"issue":"1","key":"9687_CR5","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s00146-017-0760-1","volume":"35","author":"SD Baum","year":"2020","unstructured":"Baum, S. D. (2020). Social choice ethics in artificial intelligence. AI & SOCIETY, 35(1), 165\u2013176. https:\/\/doi.org\/10.1007\/s00146-017-0760-1","journal-title":"AI & SOCIETY"},{"issue":"3","key":"9687_CR6","doi-asserted-by":"publisher","first-page":"177","DOI":"10.5840\/techne201671949","volume":"20","author":"C Boshuijzen-van Burken","year":"2016","unstructured":"Boshuijzen-van Burken, C. (2016). Beyond technological mediation: a normative practice approach. Techn\u00e9, 20(3), 177\u2013197. https:\/\/doi.org\/10.5840\/techne201671949","journal-title":"Techn\u00e9"},{"key":"9687_CR7","doi-asserted-by":"publisher","unstructured":"Boshuijzen-van Burken, C., & Bezooijen, B. (2015). Morally Responsible Decision Making in Networked Military Operations. In B.-J. Koops, I. Oosterlaken, H. Romijn, T. Swierstra, & J. van den Hoven (Eds.), Responsible Innovation 2: Concepts, Approaches, and Applications (pp.\u00a0265\u2013282). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-319-17308-5_14","DOI":"10.1007\/978-3-319-17308-5_14"},{"key":"9687_CR75","doi-asserted-by":"publisher","unstructured":"Boshuijzen-van Burken, C. (2021). Modern Military Operations: A Normative Practice Approach to Moral Decision Making. In I. Management Association (Ed.), Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics (pp. 522\u2013535). IGI Global. https:\/\/doi.org\/10.4018\/978-1-7998-9029-4.ch028","DOI":"10.4018\/978-1-7998-9029-4.ch028"},{"key":"9687_CR8","unstructured":"Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies (First edition). Oxford University Press."},{"issue":"4","key":"9687_CR9","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1086\/505233","volume":"116","author":"N Bostrom","year":"2006","unstructured":"Bostrom, N., & Ord, T. (2006). The reversal test: eliminating status quo bias in applied ethics. Ethics, 116(4), 656\u2013679. https:\/\/doi.org\/10.1086\/505233","journal-title":"Ethics"},{"key":"9687_CR10","doi-asserted-by":"publisher","unstructured":"Boyd, K. (2022). Designing Up with Value-Sensitive Design: Building a Field Guide for Ethical ML Development. 2022 ACM Conference on Fairness, Accountability, and Transparency, 2069\u20132082. https:\/\/doi.org\/10.1145\/3531146.3534626","DOI":"10.1145\/3531146.3534626"},{"issue":"5","key":"9687_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2778972","volume":"22","author":"P Briggs","year":"2015","unstructured":"Briggs, P., & Thomas, L. (2015). An Inclusive, Value Sensitive Design Perspective on Future Identity Technologies. ACM Transactions on Computer-Human Interaction, 22(5), 23:1\u20132328. https:\/\/doi.org\/10.1145\/2778972","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"9687_CR12","unstructured":"Costley, D. (2020, October 27). Zoom\u2019s Virtual Background Feature Isn\u2019t Built for Black Faces. https:\/\/onezero.medium.com\/zooms-virtual-background-feature-isn-t-built-for-black-faces-e0a97b591955"},{"key":"9687_CR13","doi-asserted-by":"publisher","unstructured":"De Vries, M. J., & Jochemsen, H. (Eds.). (2019). The Normative Nature of Social Practices and Ethics in Professional Environments. IGI Global. https:\/\/doi.org\/10.4018\/978-1-5225-8006-5","DOI":"10.4018\/978-1-5225-8006-5"},{"key":"9687_CR14","unstructured":"Defense Innovation Board (2019). AI principles: Recommendations on the ethical use of Artificial Intelligence by the Department of Defense. Defense Innovation Board. https:\/\/media.defense.gov\/2019\/Oct\/31\/2002204458\/-1\/-1\/0\/DIB_AI_PRINCIPLES_PRIMARY_DOCUMENT.PDF"},{"key":"9687_CR15","unstructured":"Docherty, B. (2020). The Need for and Elements of a New Treaty on Fully Autonomous Weapons. Proceedings of Rio Seminar on Autonomous Weapons Systems, 20 February 2020. Rio Seminar on Autonomous Weapons Systems, Rio de Janeiro. https:\/\/www.hrw.org\/sites\/default\/files\/media_2020\/06\/202006arms_rio_autonomous_weapons_systems_2.pdf"},{"key":"9687_CR16","unstructured":"DoD DSC (2012). The Role of Autonomy in DoD Systems. Department of Defence Defense Science Board. https:\/\/fas.org\/irp\/agency\/dod\/dsb\/autonomy.pdf"},{"key":"9687_CR17","unstructured":"Dooyeweerd, H. (1953). A new critique of theoretical thought: vol. I\u2013V. The Presbyterian and Reformed Publishing Company."},{"issue":"3","key":"9687_CR18","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1111\/1758-5899.12665","volume":"10","author":"M Ekelhof","year":"2019","unstructured":"Ekelhof, M. (2019). Moving Beyond Semantics on Autonomous Weapons: Meaningful Human Control in Operation. Global Policy, 10(3), 343\u2013348. https:\/\/doi.org\/10.1111\/1758-5899.12665","journal-title":"Global Policy"},{"issue":"6","key":"9687_CR19","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1177\/0162243917731523","volume":"42","author":"MC Elish","year":"2017","unstructured":"Elish, M. C. (2017). Remote split: a history of US drone operations and the distributed labor of war. Science Technology & Human Values, 42(6), 1100\u20131131.","journal-title":"Science Technology & Human Values"},{"key":"9687_CR20","doi-asserted-by":"publisher","first-page":"103425","DOI":"10.1016\/j.apergo.2021.103425","volume":"94","author":"SM Faas","year":"2021","unstructured":"Faas, S. M., & Baumann, M. (2021). Pedestrian assessment: is displaying automated driving mode in self-driving vehicles as relevant as emitting an engine sound in electric vehicles? Applied Ergonomics, 94, 103425. https:\/\/doi.org\/10.1016\/j.apergo.2021.103425","journal-title":"Applied Ergonomics"},{"issue":"3","key":"9687_CR21","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1023\/B:MIND.0000035461.63578.9d","volume":"14","author":"L Floridi","year":"2004","unstructured":"Floridi, L., & Sanders, J. W. (2004). On the morality of Artificial Agents. Minds and Machines, 14(3), 349\u2013379. https:\/\/doi.org\/10.1023\/B:MIND.0000035461.63578.9d","journal-title":"Minds and Machines"},{"issue":"6","key":"9687_CR22","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/242485.242493","volume":"3","author":"B Friedman","year":"1996","unstructured":"Friedman, B. (1996). Value-sensitive design. ACM Interactions, 3(6), 17\u201323.","journal-title":"ACM Interactions"},{"key":"9687_CR23","doi-asserted-by":"crossref","unstructured":"Friedman, B., & Hendry, D. G. (2019). Value sensitive design: shaping technology with moral imagination. Mit Press.","DOI":"10.7551\/mitpress\/7585.001.0001"},{"issue":"2","key":"9687_CR24","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1561\/1100000015","volume":"11","author":"B Friedman","year":"2017","unstructured":"Friedman, B., Hendry, D. G., & Borning, A. (2017). A Survey of Value Sensitive Design Methods. Foundations and Trends\u00ae in Human\u2013Computer Interaction, 11(2), 63\u2013125. https:\/\/doi.org\/10.1561\/1100000015","journal-title":"Foundations and Trends\u00ae in Human\u2013Computer Interaction"},{"key":"9687_CR25","unstructured":"Friedman, B., & Kahn, P. (2003). Human Values, ehics and design. In The human-computer interaction handbook (pp.\u00a01177\u20131201). https:\/\/brandorn.com\/img\/writing\/tech-ethics\/human-values-ethics-and-design.pdf"},{"key":"9687_CR26","unstructured":"Friedman, B., Kahn, P., & Borning, A. (2002). Value sensitive design: Theory and methods. University of Washington Technical Report, 02\u201312."},{"key":"9687_CR27","unstructured":"Friedman, B., Kahn, P., & Borning, A. (2006). Value sensitive design and information systems. In P. Zhang, & D. Galletta (Eds.), Human-Computer Interaction in Management Information Systems: foundations (pp. 348\u2013372). M.E. Sharpe."},{"key":"9687_CR28","unstructured":"GGE LAW (2019). Report of the 2019 session of the Group of Governmental Experts on Emerging Technologies in the Area of Lethal Autonomous Weapons Systems (CCW\/GGE.1\/2019\/3). https:\/\/undocs.org\/en\/CCW\/GGE.1\/2019\/3"},{"key":"9687_CR29","first-page":"85","volume":"30","author":"MC Horowitz","year":"2016","unstructured":"Horowitz, M. C. (2016). Why words Matter: the Real World Consequences of defining Autonomous Weapons Systmes. Temple International & Comparative Law Journal, 30, 85.","journal-title":"Temple International & Comparative Law Journal"},{"key":"9687_CR30","unstructured":"ICRC (2019). Artificial intelligence and machine learning in armed conflict: A human-centred approach. https:\/\/www.icrc.org\/en\/document\/artificial-intelligence-and-machine-learning-armed-conflict-human-centred-approach"},{"key":"9687_CR31","unstructured":"IEEE (2017a). Classical Ethics in A\/IS. IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems. https:\/\/standards.ieee.org\/content\/dam\/ieee-standards\/standards\/web\/documents\/other\/ead_classical_ethics_ais_v2.pdf"},{"key":"9687_CR32","unstructured":"IEEE (2017b). The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems. Ethically Aligned Design: A Vision for Prioritizing Human Well-being with Autonomous and Intelligent Systems, Version 2. http:\/\/standards.ieee.org\/develop\/indconn\/ec\/autonomous_systems.html"},{"key":"9687_CR33","first-page":"9781504479356","volume":"9781504476874","author":"IEEE","year":"2021","unstructured":"IEEE. (2021). IEEE 7000 \u2013 2021\u2014IEEE standard model process for addressing ethical concerns during System Design. (IEEE Standards ISBN, 9781504476874, 9781504476881, 9781504479356.  IEEE Computer Society.https:\/\/standards.ieee.org\/standard\/7000-2021.html","journal-title":"(IEEE Standards ISBN"},{"key":"9687_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-018-9467-3","author":"N Jacobs","year":"2018","unstructured":"Jacobs, N., & Huldtgren, A. (2018). Why value sensitive design needs ethical commitments. Ethics and Information Technology. https:\/\/doi.org\/10.1007\/s10676-018-9467-3","journal-title":"Ethics and Information Technology"},{"key":"9687_CR35","doi-asserted-by":"publisher","first-page":"101727","DOI":"10.1016\/j.erss.2020.101727","volume":"69","author":"KEH Jenkins","year":"2020","unstructured":"Jenkins, K. E. H., Spruit, S., Milchram, C., H\u00f6ffken, J., & Taebi, B. (2020). Synthesizing value sensitive design, responsible research and innovation, and energy justice: a conceptual review. Energy Research & Social Science, 69, 101727. https:\/\/doi.org\/10.1016\/j.erss.2020.101727","journal-title":"Energy Research & Social Science"},{"key":"9687_CR36","unstructured":"Kate Devitt, M., Gan, J., Scholz (2021). A method for ethical AI in Defence (DSTG-TR-3786). Australian Government Department of Defence. https:\/\/apo.org.au\/node\/311150"},{"issue":"3","key":"9687_CR37","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s10676-010-9233-7","volume":"13","author":"F Kraemer","year":"2011","unstructured":"Kraemer, F., van Overveld, K., & Peterson, M. (2011). Is there an ethics of algorithms? Ethics and Information Technology, 13(3), 251\u2013260. https:\/\/doi.org\/10.1007\/s10676-010-9233-7","journal-title":"Ethics and Information Technology"},{"key":"9687_CR38","unstructured":"Lin, P. (2015). The right to life and the Martens Clause. Convention on Certain Conventional Weapons (CCW) meeting of experts on lethal autonomous weapons systems (LAWS), at United Nations in Geneva, Switzerland on 13\u201317 April 2015. http:\/\/cyberlaw.stanford.edu\/files\/publication\/files\/ccw_testimony.pdf"},{"key":"9687_CR39","doi-asserted-by":"publisher","unstructured":"Lokhorst, G. J. C. (2018). Martin Peterson: The Ethics of Technology: A Geometric Analysis of Five Moral Principles: Oxford University Press, 2017, 252 pp, USD 74.00 (hbk), ISBN: 9780190652265. Science and Engineering Ethics, 24(5), 1641\u20131643. https:\/\/doi.org\/10.1007\/s11948-017-0014-0","DOI":"10.1007\/s11948-017-0014-0"},{"key":"9687_CR40","doi-asserted-by":"publisher","unstructured":"Miller, B. (2020). Is Technology Value-Neutral? Science, Technology, & Human Values, 016224391990096. https:\/\/doi.org\/10.1177\/0162243919900965","DOI":"10.1177\/0162243919900965"},{"key":"9687_CR41","unstructured":"NATO. NATO Review\u2014An Artificial Intelligence Strategy for NATO. NATO Review (2021, October 25). https:\/\/www.nato.int\/docu\/review\/articles\/2021\/10\/25\/an-artificial-intelligence-strategy-for-nato\/index.html"},{"key":"9687_CR42","doi-asserted-by":"publisher","unstructured":"Nickel, P. J. (2015). Design for the Value of Trust. In J. van den Hoven, P. E. Vermaas, & I. van de Poel (Eds.), Handbook of Ethics, Values, and Technological Design (pp.\u00a0551\u2013567). Springer Netherlands. https:\/\/doi.org\/10.1007\/978-94-007-6970-0_21","DOI":"10.1007\/978-94-007-6970-0_21"},{"key":"9687_CR43","doi-asserted-by":"publisher","unstructured":"O\u2019Neill, E., & Machery, E. (2018). The Normative Sense. In A. Zimmerman, K. Jones, & M. Timmons (Eds.), The Routledge Handbook of Moral Epistemology (1st ed., pp.\u00a038\u201356). Routledge. https:\/\/doi.org\/10.4324\/9781315719696-3","DOI":"10.4324\/9781315719696-3"},{"issue":"1","key":"9687_CR44","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10676-018-9486-0","volume":"21","author":"M Peterson","year":"2019","unstructured":"Peterson, M. (2019). The value alignment problem: a geometric approach. Ethics and Information Technology, 21(1), 19\u201328.","journal-title":"Ethics and Information Technology"},{"key":"9687_CR45","doi-asserted-by":"crossref","unstructured":"Roeser, S. (Ed.). (2010). Emotions and risky technologies. Springer.","DOI":"10.1007\/978-90-481-8647-1"},{"issue":"6","key":"9687_CR46","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1038\/scientificamerican0616-58","volume":"314","author":"S Russell","year":"2016","unstructured":"Russell, S. (2016). Should we fear Supersmart Robots? Scientific American, 314(6), 58\u201359. https:\/\/doi.org\/10.1038\/scientificamerican0616-58","journal-title":"Scientific American"},{"key":"9687_CR47","unstructured":"Russell, S., Dewey, D., & Tegmark, M. (2016). Research Priorities for Robust and Beneficial Artificial Intelligence. ArXiv:1602.03506 [Cs, Stat]. http:\/\/arxiv.org\/abs\/1602.03506"},{"key":"9687_CR48","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3389\/frobt.2018.00015","volume":"5","author":"F de Santoni","year":"2018","unstructured":"de Santoni, F., & van den Hoven, J. (2018). Meaningful human control over Autonomous Systems: a philosophical account. Frontiers in Robotics and AI, 5, 15. https:\/\/doi.org\/10.3389\/frobt.2018.00015","journal-title":"Frontiers in Robotics and AI"},{"issue":"1","key":"9687_CR49","doi-asserted-by":"publisher","first-page":"11","DOI":"10.9707\/2307-0919.1116","volume":"2","author":"SH Schwartz","year":"2012","unstructured":"Schwartz, S. H. (2012). An overview of the Schwartz theory of basic values. Online Readings in Psychology and Culture, 2(1), 11. https:\/\/doi.org\/10.9707\/2307-0919.1116","journal-title":"Online Readings in Psychology and Culture"},{"issue":"4","key":"9687_CR50","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1080\/15027570.2010.536403","volume":"9","author":"BJ Strawser","year":"2010","unstructured":"Strawser, B. J. (2010). Moral predators: the duty to employ uninhabited aerial vehicles. Journal of Military Ethics, 9(4), 342\u2013368.","journal-title":"Journal of Military Ethics"},{"issue":"5","key":"9687_CR51","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s11948-022-00392-3","volume":"28","author":"M Taddeo","year":"2022","unstructured":"Taddeo, M., & Blanchard, A. (2022). A comparative analysis of the definitions of Autonomous Weapons Systems. Science and Engineering Ethics, 28(5), 37. https:\/\/doi.org\/10.1007\/s11948-022-00392-3","journal-title":"Science and Engineering Ethics"},{"issue":"1","key":"9687_CR52","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1080\/23299460.2014.882072","volume":"1","author":"B Taebi","year":"2014","unstructured":"Taebi, B., Correlj\u00e9, A., Cuppen, E., Dignum, M., & Pesch, U. (2014). Responsible innovation as an endorsement of public values: the need for interdisciplinary research. Journal of Responsible Innovation, 1(1), 118\u2013124. https:\/\/doi.org\/10.1080\/23299460.2014.882072","journal-title":"Journal of Responsible Innovation"},{"key":"9687_CR53","unstructured":"UK Ministry of Defence. (2022). Ambitious, safe, responsible. Our approach to the delivery of AI-enabled capability in Defence. UK Ministry of Defence."},{"key":"9687_CR54","doi-asserted-by":"crossref","unstructured":"Ulrich, W., & Reynolds, M. (2010). Critical systems heuristics. Systems approaches to managing change: a practical guide (pp. 243\u2013292). Springer.","DOI":"10.1007\/978-1-84882-809-4_6"},{"issue":"2","key":"9687_CR55","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1080\/23299460.2018.1457401","volume":"5","author":"S Umbrello","year":"2018","unstructured":"Umbrello, S. (2018). The moral psychology of value sensitive design: the methodological issues of moral intuitions for responsible innovation. Journal of Responsible Innovation, 5(2), 186\u2013200.","journal-title":"Journal of Responsible Innovation"},{"issue":"2","key":"9687_CR56","first-page":"30","volume":"1","author":"S Umbrello","year":"2019","unstructured":"Umbrello, S. (2019). Lethal Autonomous Weapons: Designing War Machines with values. Delphi: Interdisciplinary Review of Emerging Technologies, 1(2), 30\u201334.","journal-title":"Delphi: Interdisciplinary Review of Emerging Technologies"},{"issue":"3","key":"9687_CR57","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s10676-021-09588-w","volume":"23","author":"S Umbrello","year":"2021","unstructured":"Umbrello, S. (2021). Coupling levels of abstraction in understanding meaningful human control of autonomous weapons: a two-tiered approach. Ethics and Information Technology, 23(3), 455\u2013464. https:\/\/doi.org\/10.1007\/s10676-021-09588-w","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9687_CR58","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s00146-019-00879-x","volume":"35","author":"S Umbrello","year":"2020","unstructured":"Umbrello, S., Torres, P., & De Bellis, A. F. (2020). The future of war: could lethal autonomous weapons make conflict more ethical? AI & SOCIETY, 35(1), 273\u2013282. https:\/\/doi.org\/10.1007\/s00146-019-00879-x","journal-title":"AI & SOCIETY"},{"key":"9687_CR59","doi-asserted-by":"crossref","unstructured":"Umbrello, S., & van de Poel, I. (2020). Mapping Value Sensitive Design onto AI for Social Good Principles. Preprint.","DOI":"10.1007\/s43681-021-00038-3"},{"issue":"1","key":"9687_CR60","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s11948-019-00105-3","volume":"26","author":"G van de Kaa","year":"2020","unstructured":"van de Kaa, G., Rezaei, J., Taebi, B., van de Poel, I., & Kizhakenath, A. (2020). How to weigh values in Value Sensitive Design: a best worst Method Approach for the case of Smart Metering. Science and Engineering Ethics, 26(1), 475\u2013494. https:\/\/doi.org\/10.1007\/s11948-019-00105-3","journal-title":"Science and Engineering Ethics"},{"issue":"1","key":"9687_CR61","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10676-018-9461-9","volume":"23","author":"I van de Poel","year":"2021","unstructured":"van de Poel, I. (2021). Design for value change. Ethics and Information Technology, 23(1), 27\u201331. https:\/\/doi.org\/10.1007\/s10676-018-9461-9","journal-title":"Ethics and Information Technology"},{"key":"9687_CR62","unstructured":"van de Poel, I., & Royakkers, L. M. M. (2011). Ethics, technology, and engineering: an introduction (paperback) (67 vol.). Wiley -Blackwell."},{"issue":"1","key":"9687_CR63","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s11948-011-9277-z","volume":"18","author":"J Van den Hoven","year":"2012","unstructured":"Van den Hoven, J., Lokhorst, G. J., & Van de Poel, I. (2012). Engineering and the Problem of Moral overload. Science and Engineering Ethics, 18(1), 143\u2013155. https:\/\/doi.org\/10.1007\/s11948-011-9277-z","journal-title":"Science and Engineering Ethics"},{"key":"9687_CR64","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-6970-0","volume-title":"Handbook of ethics, values, and technological design","author":"J van den Hoven","year":"2015","unstructured":"van den Hoven, J., Vermaas, P. E., & van de Poel, I. (2015). Handbook of ethics, values, and technological design. Springer Netherlands: Imprint: Springer."},{"issue":"2","key":"9687_CR65","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11948-011-9343-6","volume":"19","author":"A Van Wynsberghe","year":"2013","unstructured":"Van Wynsberghe, A. (2013). Designing robots for care: care centered value-sensitive design. Science and Engineering Ethics, 19(2), 407\u2013433.","journal-title":"Science and Engineering Ethics"},{"issue":"3","key":"9687_CR66","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/3137574.3137585","volume":"3","author":"I Verdiesen","year":"2017","unstructured":"Verdiesen, I. (2017). How do we ensure that we remain in control of our autonomous weapons? AI Matters, 3(3), 47\u201355. https:\/\/doi.org\/10.1145\/3137574.3137585","journal-title":"AI Matters"},{"key":"9687_CR67","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-022-00211-2","author":"I Verdiesen","year":"2022","unstructured":"Verdiesen, I., & Dignum, V. (2022). Value elicitation on a scenario of autonomous weapon system deployment: a qualitative study based on the value deliberation process. AI and Ethics. https:\/\/doi.org\/10.1007\/s43681-022-00211-2","journal-title":"AI and Ethics"},{"key":"9687_CR68","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MTS.2019.2948439","volume":"38","author":"I Verdiesen","year":"2019","unstructured":"Verdiesen, I., de Sio, F. S., & Dignum, V. (2019). Moral values related to Autonomous Weapon Systems: an empirical survey that reveals Common Ground for the ethical debate. IEEE Technology and Society Magazine, 38, 34\u201344.","journal-title":"IEEE Technology and Society Magazine"},{"key":"9687_CR69","doi-asserted-by":"publisher","unstructured":"Vermaas, P. E., Hekkert, P., Manders-Huits, N., & Tromp, N. (2015). Design Methods in Design for Values. In J. van den Hoven, P. E. Vermaas, & I. van de Poel (Eds.), Handbook of Ethics, Values, and Technological Design: Sources, Theory, Values and Application Domains (pp.\u00a0179\u2013201). Springer Netherlands. https:\/\/doi.org\/10.1007\/978-94-007-6970-0_10","DOI":"10.1007\/978-94-007-6970-0_10"},{"issue":"4","key":"9687_CR70","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s00146-007-0099-0","volume":"22","author":"W Wallach","year":"2008","unstructured":"Wallach, W., Allen, C., & Smit, I. (2008). Machine morality: bottom-up and top-down approaches for modelling human moral faculties. AI & SOCIETY, 22(4), 565\u2013582. https:\/\/doi.org\/10.1007\/s00146-007-0099-0","journal-title":"AI & SOCIETY"},{"key":"9687_CR71","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s10676-018-9476-2","volume":"23","author":"T Winkler","year":"2021","unstructured":"Winkler, T., & Spiekermann, S. (2021). Twenty years of value sensitive design: a review of methodological practices in VSD projects. Ethics and Information Technology, 23, 17\u201321. https:\/\/doi.org\/10.1007\/s10676-018-9476-2","journal-title":"Ethics and Information Technology"},{"key":"9687_CR72","unstructured":"Wolterstorff, N. (1983). Until justice and peace embrace: the Kuyper lectures for 1981 delivered at the Free University of Amsterdam. Eerdmans Pub Co."},{"key":"9687_CR73","unstructured":"Yudkowsky, E. (2004). Coherent extrapolated volition. Singularity Institute for Artificial Intelligence. https:\/\/intelligence.org\/files\/CEV.pdf"},{"key":"9687_CR74","doi-asserted-by":"publisher","unstructured":"Zolyomi, A. (2018). Where the stakeholders are: tapping into social media during value-sensitive design research. Ethics and Information Technology, 1\u20134. https:\/\/doi.org\/10.1007\/s10676-018-9475-3","DOI":"10.1007\/s10676-018-9475-3"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-023-09687-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-023-09687-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-023-09687-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,28]],"date-time":"2023-03-28T06:25:22Z","timestamp":1679984722000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-023-09687-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,11]]},"references-count":75,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["9687"],"URL":"https:\/\/doi.org\/10.1007\/s10676-023-09687-w","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,11]]},"assertion":[{"value":"11 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The author(s) declared no potential conflicts of interest with respect to the research, authorship, and\/or publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"11"}}