{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:31:10Z","timestamp":1740123070341,"version":"3.37.3"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100020471","name":"Trusted Autonomous Systems Defence CRC","doi-asserted-by":"publisher","award":["RG212550"],"award-info":[{"award-number":["RG212550"]}],"id":[{"id":"10.13039\/501100020471","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001773","name":"University of New South Wales","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001773","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2024,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Our research is a value sensitive based approach to designing autonomous systems in a military context. Value sensitive design is an iterative process of conceptual, empirical and technical considerations. We enhance value sensitive design with Participatory Value Evaluation. This allows us to mine values of a large unorganized stakeholder group relevant to our context of research, namely Australian citizens. We found that value prioritizations differ depending on the context of use and that no one value fits all autonomous systems. General ethical frameworks can serve as high level guiding principles, but when it comes to actual technologies, a more nuanced and granulated approach to selecting and incorporating values is needed. Our research contributes to a greater awareness of the importance of inclusion of values in autonomous systems design in the context of defence. We suggest relevant frameworks and methods for values-based autonomous military systems design in the context of Australia, which may serve as a blueprint for other countries. Finally, we provide suggestions on how to operationalise values in systems design, as this is underrepresented in the current literature.<\/jats:p>","DOI":"10.1007\/s10676-024-09789-z","type":"journal-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T16:02:16Z","timestamp":1723564936000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A values-based approach to designing military autonomous systems"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7368-5002","authenticated-orcid":false,"given":"Christine","family":"Boshuijzen-van Burken","sequence":"first","affiliation":[]},{"given":"Shannon","family":"Spruit","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Geijsen","sequence":"additional","affiliation":[]},{"given":"Lotte","family":"Fillerup","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"key":"9789_CR1","unstructured":"AI Ethics Impact Group. 2020. From principles to practice. An interdisciplinary framework to operationalise AI ethics. G\u00fctersloh: Bertelsmann Stiftung. https:\/\/www.bertelsmannstiftung. de\/fileadmin\/files\/BSt\/Publikationen\/GrauePublikationen\/WKIO_2020_final.pdf."},{"key":"9789_CR2","unstructured":"Australian Department of Defence. (2024). ADF Values and behaviours. Defence. https:\/\/www.defence.gov.au\/about\/who-we-are\/values-behaviours"},{"key":"9789_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-024-01866-7","author":"A Blanchard","year":"2024","unstructured":"Blanchard, A., Thomas, C., & Taddeo, M. (2024). Ethical governance of artificial intelligence for defence: Normative tradeoffs for principle to practice guidance. AI & Society. https:\/\/doi.org\/10.1007\/s00146-024-01866-7","journal-title":"AI & Society"},{"key":"9789_CR4","doi-asserted-by":"publisher","DOI":"10.1177\/13540661231163392","author":"I Bode","year":"2023","unstructured":"Bode, I. (2023). Practice-based and public-deliberative normativity: Retaining human control over the use of force. European Journal of International Relations. https:\/\/doi.org\/10.1177\/13540661231163392","journal-title":"European Journal of International Relations"},{"key":"9789_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-023-09687-w","author":"BC Boshuijzen-van","year":"2023","unstructured":"Boshuijzen-van, B. C. (2023a). Value sensitive design for autonomous systems in defence\u2014A primer. Journal for Ethics and Information Technology. https:\/\/doi.org\/10.1007\/s10676-023-09687-w","journal-title":"Journal for ethics and information technology"},{"key":"9789_CR8","doi-asserted-by":"publisher","unstructured":"Boshuijzen-van B. C., Shannon, S., Lotte, F., & Niek, M. (2023b). Value sensitive design meets participatory value evaluation for autonomous systems in defence. In 2023 IEEE international symposium on ethics in engineering, science, and technology (ETHICS), (pp. 1\u20135). IEEE. https:\/\/doi.org\/10.1109\/ETHICS57328.2023.10155025.","DOI":"10.1109\/ETHICS57328.2023.10155025"},{"key":"9789_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-024-02000-3","author":"BC Boshuijzen-van","year":"2024","unstructured":"Boshuijzen-van, B. C., Christine, M. D., Vries, J. A., Spruit, S., Mouter, N., & Munyasya, A. (2024). Autonomous military systems beyond human control: Putting an empirical perspective on value trade-offs for autonomous systems design in the military. AI & Society. https:\/\/doi.org\/10.1007\/s00146-024-02000-3","journal-title":"AI & Society"},{"key":"9789_CR7","doi-asserted-by":"publisher","unstructured":"Boshuijzen-van, B. C., Shreyansh. S., & Bianca. B. (2022). A Feasibility Study for Inclusion of Ethics and Social Issues in Engineering and Design Coursework in Australia. In Towards a New Future in Engineering Education, New Scenarios That European Alliances of Tech Universities Open Up, edited by Hannu-Matti J\u00e4rvinen, Santiago Silvestre, Ariadna Llorens, and Jos\u00e9 Miguel Qui\u00f1ones, 140\u201350. Universitat Polit\u00e8cnica de Catalunya\u2014BarcelonaTech (UPC). https:\/\/doi.org\/10.5821\/conference-9788412322262.1404.","DOI":"10.5821\/conference-9788412322262.1404"},{"issue":"5","key":"9789_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2778972","volume":"22","author":"P Briggs","year":"2015","unstructured":"Briggs, P., & Thomas, L. (2015). An inclusive, value sensitive design perspective on future identity technologies. ACM Transactions on Computer\u2013Human Interaction (TOCHI), 22(5), 1\u201328. https:\/\/doi.org\/10.1145\/2778972","journal-title":"ACM Transactions on Computer-Human Interaction (TOCHI)"},{"key":"9789_CR11","doi-asserted-by":"publisher","first-page":"103201","DOI":"10.1016\/j.artint.2019.103201","volume":"279","author":"S Burton","year":"2020","unstructured":"Burton, S., Habli, I., Lawton, T., McDermid, J., Morgan, P., & Porter, Z. (2020). Mind the gaps: Assuring the safety of autonomous systems from an engineering, ethical, and legal perspective. Artificial Intelligence, 279, 103201.","journal-title":"Artificial Intelligence"},{"issue":"2","key":"9789_CR12","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/s10676-023-09702-0","volume":"25","author":"S Casiraghi","year":"2023","unstructured":"Casiraghi, S. (2023). Anything New under the Sun? Insights from a History of Institutionalized AI Ethics. Ethics and Information Technology, 25(2), 28. https:\/\/doi.org\/10.1007\/s10676-023-09702-0","journal-title":"Ethics and Information Technology"},{"key":"9789_CR13","unstructured":"Cassel, D. (2023). \u201cDonald Knuth Asked ChatGPT 20 Questions. What Did We Learn?\u201d The New Stack (blog). Retrieved June 4, 2023, from https:\/\/thenewstack.io\/donald-knuth-asked-chatgpt-20-questions-what-did-we-learn\/."},{"key":"9789_CR14","first-page":"1","volume-title":"Applied ethics in a digital world","author":"D Danks","year":"2022","unstructured":"Danks, D. (2022). Digital ethics as translational ethics. In I. Vasiliu-Feltes & J. Thomason (Eds.), Applied ethics in a digital world (pp. 1\u201315). IGI Global."},{"key":"9789_CR15","unstructured":"Defense Innovation Board. 2019. \u201cAI principles: Recommendations on the ethical use of artificial intelligence by the Department of Defense.\u201d Defense Innovation Board. https:\/\/media.defense.gov\/2019\/Oct\/31\/2002204458\/-1\/-1\/0\/DIB_AI_PRINCIPLES_PRIMARY_DOCUMENT.PDF"},{"key":"9789_CR16","unstructured":"Devitt, K., Gan, M., Scholz, J., & Bolia, R. (2020). A method for ethical AI in defence. DSTG-TR-3786. Defence Science and Technology Group."},{"key":"9789_CR18","doi-asserted-by":"publisher","DOI":"10.5258\/SOTON\/PP0034","author":"C Enemark","year":"2023","unstructured":"Enemark, C. (2023). Towards an armed drone code of ethics: Eight model principles of responsible use. University of Southampton. https:\/\/doi.org\/10.5258\/SOTON\/PP0034","journal-title":"University of Southampton"},{"key":"9789_CR19","unstructured":"European Parliament. (2024). Artificial Intelligence Act. Retrieved March 13, 2024, from https:\/\/www.europarl.europa.eu\/news\/en\/press-room\/20240308IPR19015\/artificial-intelligence-act-meps-adopt-landmark-law"},{"issue":"6","key":"9789_CR20","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/242485.242493","volume":"3","author":"B Friedman","year":"1996","unstructured":"Friedman, B. (1996). Value-sensitive design. ACM Interactions, 3(6), 17\u201323.","journal-title":"ACM Interactions"},{"issue":"1","key":"9789_CR21","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/280571.280583","volume":"30","author":"B Friedman","year":"1998","unstructured":"Friedman, B. (1998). User autonomy: Who should control what and when? A CHI 96 workshop. ACM SIGCHI Bulletin, 30(1), 26\u201329.","journal-title":"ACM SIGCHI Bulletin"},{"key":"9789_CR22","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7585.001.0001","volume-title":"Value sensitive design: Shaping technology with moral imagination","author":"B Friedman","year":"2019","unstructured":"Friedman, B., & Hendry, D. G. (2019). Value sensitive design: Shaping technology with moral imagination. Mit Press."},{"key":"9789_CR24","unstructured":"Friedman, B., and Kahn, P. 2003. Human values, ethics and design. In The human-computer interaction handbook, pp. 1177\u20131201. https:\/\/brandorn.com\/img\/writing\/tech-ethics\/human-values-ethics-and-design.pdf."},{"key":"9789_CR23","first-page":"348","volume-title":"Human-computer interaction in management information systems: foundations","author":"B Friedman","year":"2006","unstructured":"Friedman, B., Kahn, P., & Borning, A. (2006). Value sensitive design and information systems. In P. Zhang & D. Galletta (Eds.), Human-computer interaction in management information systems: foundations (pp. 348\u2013372). M. E. Sharpe."},{"key":"9789_CR25","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-540-48713-5_19","volume-title":"Handbook on decision support systems 1","author":"P Gray","year":"2008","unstructured":"Gray, P. (2008). The nature of group decision support systems. In F. Burstein & C. Holsapple (Eds.), Handbook on decision support systems 1 (pp. 371\u2013389). Springer."},{"issue":"1","key":"9789_CR26","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s11023-020-09517-8","volume":"30","author":"T Hagendorff","year":"2020","unstructured":"Hagendorff, T. (2020). The ethics of AI ethics: An evaluation of guidelines. Minds and Machines, 30(1), 99\u2013120. https:\/\/doi.org\/10.1007\/s11023-020-09517-8","journal-title":"Minds and Machines"},{"issue":"12","key":"9789_CR28","doi-asserted-by":"publisher","first-page":"5158","DOI":"10.1109\/TSE.2022.3140230","volume":"48","author":"W Hussain","year":"2022","unstructured":"Hussain, W., Shahin, M., Hoda, R., Whittle, J., Perera, H., Nurwidyantoro, A., Shams, R. A., & Oliver, G. (2022). How can human values be addressed in agile methods? A case study on SAFe. IEEE Transactions on Software Engineering, 48(12), 5158\u20135175. https:\/\/doi.org\/10.1109\/TSE.2022.3140230","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9789_CR29","unstructured":"ICRC. (2021). ICRC Position Paper: Artificial intelligence and machine learning in armed conflict: A human-centred approach. International Review of the Red Cross 913. http:\/\/international-review.icrc.org\/articles\/ai-and-machine-learning-in-armed-conflict-a-human-centred-approach-913"},{"key":"9789_CR30","unstructured":"IEEE. (2021). IEEE 7000\u20132021\u2014IEEE standard model process for addressing ethical concerns during system design. IEEE standards ISBN 9781504476874, 9781504476881, 9781504479356. IEEE computer society. https:\/\/standards.ieee.org\/standard\/7000-2021.html"},{"issue":"8","key":"9789_CR32","doi-asserted-by":"publisher","first-page":"4656","DOI":"10.3390\/su14084656","volume":"14","author":"A Itten","year":"2022","unstructured":"Itten, A., & Mouter, N. (2022). When digital mass participation meets citizen deliberation: Combining mini- and maxi-publics in climate policy-making. Sustainability, 14(8), 4656. https:\/\/doi.org\/10.3390\/su14084656","journal-title":"Sustainability"},{"key":"9789_CR31","unstructured":"IVAI. (2022). A collaborative toolkit for organisations to plan, build, and manage AI responsibly.\u201d Waatu.Ai (blog). 2022. https:\/\/waatu.ai\/"},{"issue":"5","key":"9789_CR33","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/s10726-011-9234-x","volume":"20","author":"GL Kolfschoten","year":"2011","unstructured":"Kolfschoten, G. L., Gr\u00fcnbacher, P., & Briggs, R. O. (2011). Modifiers for quality assurance in group facilitation. Group Decision and Negotiation, 20(5), 685\u2013705.","journal-title":"Group Decision and Negotiation"},{"issue":"1","key":"9789_CR34","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10796-022-10300-6","volume":"25","author":"V Koniakou","year":"2023","unstructured":"Koniakou, V. (2023). From the \u2018rush to ethics\u2019 to the \u2018race for governance\u2019 in artificial intelligence. Information Systems Frontiers, 25(1), 71\u2013102. https:\/\/doi.org\/10.1007\/s10796-022-10300-6","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"9789_CR35","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s10676-010-9233-7","volume":"13","author":"F Kraemer","year":"2011","unstructured":"Kraemer, F., van Overveld, K., & Peterson, M. (2011). Is There an ethics of algorithms? Ethics and Information Technology, 13(3), 251\u2013260. https:\/\/doi.org\/10.1007\/s10676-010-9233-7","journal-title":"Ethics and Information Technology"},{"key":"9789_CR36","unstructured":"Liscio, E., van der Meer, M. T., Siebert, L., Jonker, C., Mouter, N., and Murukannaiah P. (2021). Axies: Identifying and evaluating context-specific values. In Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, (pp. 799\u2013808). International foundation for autonomous agents and multiagent systems."},{"key":"9789_CR37","unstructured":"MacIntyre, A. (1981). After virtue: A study in moral theory. Book, Whole. Duckworth."},{"issue":"11","key":"9789_CR38","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1038\/s42256-019-0114-4","volume":"1","author":"B Mittelstadt","year":"2019","unstructured":"Mittelstadt, B. (2019). Principles alone cannot guarantee ethical AI. Nature Machine Intelligence, 1(11), 501\u2013507. https:\/\/doi.org\/10.1038\/s42256-019-0114-4","journal-title":"Nature Machine Intelligence"},{"issue":"4","key":"9789_CR39","doi-asserted-by":"publisher","first-page":"2141","DOI":"10.1007\/s11948-019-00165-5","volume":"26","author":"J Morley","year":"2020","unstructured":"Morley, J., Floridi, L., Kinsey, L., & Elhalal, A. (2020). From what to how: An initial review of publicly available AI ethics tools, methods and research to translate principles into practices. Science and Engineering Ethics, 26(4), 2141\u20132168. https:\/\/doi.org\/10.1007\/s11948-019-00165-5","journal-title":"Science and Engineering Ethics"},{"issue":"5","key":"9789_CR40","doi-asserted-by":"publisher","first-page":"e0250614","DOI":"10.1371\/journal.pone.0250614","volume":"16","author":"N Mouter","year":"2021","unstructured":"Mouter, N., Hernandez, J. I., & Itten, A. V. (2021a). Public participation in crisis policymaking. How 30,000 dutch citizens advised their government on relaxing COVID-19 lockdown measures. PLoS ONE, 16(5), e0250614. https:\/\/doi.org\/10.1371\/journal.pone.0250614","journal-title":"PLoS ONE"},{"key":"9789_CR42","doi-asserted-by":"publisher","first-page":"100188","DOI":"10.1016\/j.wre.2021.100188","volume":"36","author":"N Mouter","year":"2021","unstructured":"Mouter, N., Koster, P., & Dekker, T. (2021b). Participatory value evaluation for the evaluation of flood protection schemes. Water Resources and Economics, 36, 100188. https:\/\/doi.org\/10.1016\/j.wre.2021.100188","journal-title":"Water Resources and Economics"},{"key":"9789_CR41","doi-asserted-by":"publisher","first-page":"115430","DOI":"10.1016\/j.socscimed.2022.115430","volume":"314","author":"N Mouter","year":"2022","unstructured":"Mouter, N., Jara, K. T., Hernandez, J. I., Kroesen, M., de Vries, M., Geijsen, T., Kroese, F., Uiters, E., & de Bruin, M. (2022). Stepping into the shoes of the policy maker: Results of a participatory value evaluation for the dutch long term COVID-19 strategy. Social Science & Medicine, 314, 115430. https:\/\/doi.org\/10.1016\/j.socscimed.2022.115430","journal-title":"Social Science & Medicine"},{"key":"9789_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-022-00209-w","author":"L Munn","year":"2022","unstructured":"Munn, L. (2022). The uselessness of AI ethics. AI and Ethics. https:\/\/doi.org\/10.1007\/s43681-022-00209-w","journal-title":"AI and Ethics"},{"key":"9789_CR44","unstructured":"NATO. (2021a). Summary of the NATO artificial intelligence strategy. NATO. 2021. https:\/\/www.nato.int\/cps\/en\/natohq\/official_texts_187617.htm"},{"key":"9789_CR45","unstructured":"NATO. (2021b). NATO review\u2014an artificial intelligence strategy for NATO. NATO Review. Retrieved October 25, 2021, from https:\/\/www.nato.int\/docu\/review\/articles\/2021\/10\/25\/an-artificial-intelligence-strategy-for-nato\/index.html"},{"key":"9789_CR46","doi-asserted-by":"crossref","unstructured":"NIST. (2023). Artificial intelligence risk management framework (AI RMF 1.0). US Department of Commerce. https:\/\/nvlpubs.nist.gov\/nistpubs\/ai\/NIST.AI.100-1.pdf.","DOI":"10.6028\/NIST.AI.100-1.jpn"},{"key":"9789_CR47","unstructured":"OECD. 2024. \u201cExplanatory Memorandum on the updated OECD definition of an AI system. OECD Publishing 8 Vol 8. OECD Artificial Intelligence Papers."},{"key":"9789_CR49","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-023-00258-9","author":"E Prem","year":"2023","unstructured":"Prem, E. (2023). From ethical AI frameworks to tools: A review of approaches. AI and Ethics. https:\/\/doi.org\/10.1007\/s43681-023-00258-9","journal-title":"AI and Ethics"},{"key":"9789_CR50","volume-title":"Practical reasoning about final ends","author":"HS Richardson","year":"1997","unstructured":"Richardson, H. S. (1997). Practical reasoning about final ends. Cambridge University Press."},{"issue":"4","key":"9789_CR52","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1017\/S174413312200010X","volume":"17","author":"AH Rotteveel","year":"2022","unstructured":"Rotteveel, A. H., Lambooij, M. S., Over, E. A. B., Hern\u00e1ndez, J. I., Suijkerbuijk, A. W. M., de Blaeij, A. T., de Wit, G. A., & Mouter, N. (2022). If you were a policymaker, which treatment would you disinvest? A participatory value evaluation on public preferences for active disinvestment of health care interventions in the Netherlands. Health Economics, Policy and Law, 17(4), 428\u2013443. https:\/\/doi.org\/10.1017\/S174413312200010X","journal-title":"Health Economics, Policy and Law"},{"key":"9789_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0065-2601(08)60281-6","volume":"25","author":"SH Schwartz","year":"1992","unstructured":"Schwartz, S. H. (1992). Universals in the content and structure of values: Theoretical advances and empirical tests in 20 countries. Advances in Experimental Social Psychology, 25, 1\u201365.","journal-title":"Advances in Experimental Social Psychology"},{"key":"9789_CR54","doi-asserted-by":"publisher","first-page":"75269","DOI":"10.1109\/ACCESS.2022.3190975","volume":"10","author":"M Shahin","year":"2022","unstructured":"Shahin, M., Hussain, W., Nurwidyantoro, A., Perera, H., Shams, R., Grundy, J., & Whittle, J. (2022). Operationalizing human values in software engineering: A survey. IEEE Access, 10, 75269\u201375295. https:\/\/doi.org\/10.1109\/ACCESS.2022.3190975","journal-title":"IEEE Access"},{"issue":"3","key":"9789_CR55","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1080\/1369118X.2016.1182197","volume":"20","author":"L-F Su","year":"2017","unstructured":"Su, L.-F., Cacciatore, M. A., Liang, X., Brossard, D., Scheufele, D. A., & Xenos, M. A. (2017). Analyzing public sentiments online: Combining human-and computer-based content analysis. Information, Communication & Society, 20(3), 406\u2013427. https:\/\/doi.org\/10.1080\/1369118X.2016.1182197","journal-title":"Information, Communication & Society"},{"issue":"10","key":"9789_CR58","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.1111\/risa.12734","volume":"37","author":"B Taebi","year":"2017","unstructured":"Taebi, B. (2017). Bridging the gap between social acceptance and ethical acceptability: Perspective. Risk Analysis, 37(10), 1817\u20131827. https:\/\/doi.org\/10.1111\/risa.12734","journal-title":"Risk Analysis"},{"key":"9789_CR57","unstructured":"TAS. (2023a). Responsible AI for defence. https:\/\/tasdcrc.com.au\/responsible-ai-for-defence-consultation."},{"key":"9789_CR56","unstructured":"TAS. (2023b). Responsible AI for defence (RAID) toolkit. https:\/\/tasdcrc.com.au\/responsible-ai-for-defence-consultation\/"},{"key":"9789_CR59","unstructured":"UK Ministry of Defence. (2022). Ambitious, safe, responsible. Our approach to the delivery of AI-enabled capability in defence. UK Ministry of Defence. https:\/\/www.gov.uk\/government\/publications\/ambitious-safe-responsible-our-approach-to-the-delivery-of-ai-enabled-capability-in-defence\/ambitious-safe-responsible-our-approach-to-the-delivery-of-ai-enabled-capability-in-defence."},{"key":"9789_CR61","unstructured":"Ulrich, W. (1996). A primer to critical systems heuristics for action researchers. Centre for systems studies Hull. https:\/\/wulrich.com\/downloads\/ulrich_1996a.pdf."},{"key":"9789_CR62","doi-asserted-by":"crossref","unstructured":"Ulrich, W., and Reynolds, M. 2010. Critical systems heuristics. In Systems approaches to managing change: A practical guide, (pp. 243\u201392). Springer.","DOI":"10.1007\/978-1-84882-809-4_6"},{"key":"9789_CR63","first-page":"107","volume":"65","author":"S Umbrello","year":"2020","unstructured":"Umbrello, S. (2020). Combinatory and complementary practices of values and virtues in design: A reply to Reijers and Gordijn. Filosofia, 65, 107\u2013121.","journal-title":"Filosofia"},{"key":"9789_CR60","unstructured":"US DOD. (2023). DOD directive 3000.09 autonomy in weapon systems. 3000.09. Department of Defence. https:\/\/www.esd.whs.mil\/Portals\/54\/Documents\/DD\/issuances\/dodd\/300009p.PDF?ver=e0YrG458bVDl3-oyAOJjOw%3d%3d."},{"issue":"2","key":"9789_CR10","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1163\/22116117-90000530","volume":"77","author":"CG van Burken","year":"2012","unstructured":"van Burken, C. G., & De Vries, M. J. (2012). Extending the theory of normative practices: An application to two cases of networked military operations. Philosophia Reformata, 77(2), 135\u2013154.","journal-title":"Philosophia Reformata"},{"key":"9789_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7762-0_20","volume-title":"Philosophy and Engineering: Reflections on Practice, Principles and Process, 253\u201366","author":"I van de Poel","year":"2013","unstructured":"van de Poel, I. (2013). Translating Values into Design Requirements. In D. P. Michelfelder, N. McCarthy, & D. E. Goldberg (Eds.), Philosophy and Engineering: Reflections on Practice, Principles and Process, 253\u201366. Dordrecht: Springer. https:\/\/doi.org\/10.1007\/978-94-007-7762-0_20"},{"key":"9789_CR27","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1002\/9781118551424.ch4","volume-title":"Responsible innovation","author":"J van den Hoven","year":"2013","unstructured":"van den Hoven, J. (2013). Value sensitive design and responsible innovation. In R. Owen, J. Bessant, & M. Heintz (Eds.), Responsible innovation (pp. 75\u201383). Wiley."},{"key":"9789_CR64","doi-asserted-by":"publisher","DOI":"10.4324\/9781315696362","volume-title":"Philosophy of technology: An introduction for technology and business students","author":"MJ Verkerk","year":"2015","unstructured":"Verkerk, M. J., Hoogland, J., Stoep, J., & Vries, M. J. (2015). Philosophy of technology: An introduction for technology and business students. Routledge."},{"key":"9789_CR65","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s10676-018-9476-2","volume":"23","author":"T Winkler","year":"2021","unstructured":"Winkler, T., & Spiekermann, S. (2021). Twenty years of value sensitive design: A review of methodological practices in VSD projects. Ethics and Information Technology, 23, 17\u201321. https:\/\/doi.org\/10.1007\/s10676-018-9476-2","journal-title":"Ethics and Information Technology"},{"key":"9789_CR66","volume-title":"Until justice and peace embrace: the Kuyper lectures for 1981 delivered at the Free University of Amsterdam","author":"N Wolterstorff","year":"1983","unstructured":"Wolterstorff, N. (1983). Until justice and peace embrace: the Kuyper lectures for 1981 delivered at the Free University of Amsterdam. Eerdmans Pub Co."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-024-09789-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-024-09789-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-024-09789-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T03:38:53Z","timestamp":1726889933000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-024-09789-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,13]]},"references-count":64,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["9789"],"URL":"https:\/\/doi.org\/10.1007\/s10676-024-09789-z","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2024,8,13]]},"assertion":[{"value":"27 July 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This research received human research ethics approval through UNSW (HC220732 and HC220305).","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"56"}}