{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:39:58Z","timestamp":1771065598192,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T00:00:00Z","timestamp":1689033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Engineering and Physical Sciences Research Council","award":["EP\/V026747\/1, EP\/R013144\/1"],"award-info":[{"award-number":["EP\/V026747\/1, EP\/R013144\/1"]}]},{"name":"Science Foundation Ireland","award":["13\/RC\/2094_P2"],"award-info":[{"award-number":["13\/RC\/2094_P2"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,11]]},"DOI":"10.1145\/3597512.3600206","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T22:21:30Z","timestamp":1688595690000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Meet your Maker: A Social Identity Analysis of Robotics Software Engineering"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6136-0566","authenticated-orcid":false,"given":"Carlos","family":"Gavidia-Calderon","sequence":"first","affiliation":[{"name":"The Alan Turing Institute, United Kingdom and The Open University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6124-9622","authenticated-orcid":false,"given":"Amel","family":"Bennaceur","sequence":"additional","affiliation":[{"name":"The Open University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8766-1896","authenticated-orcid":false,"given":"Tamara","family":"Lopez","sequence":"additional","affiliation":[{"name":"The Open University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9823-2341","authenticated-orcid":false,"given":"Anastasia","family":"Kordoni","sequence":"additional","affiliation":[{"name":"Lancaster University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5696-6021","authenticated-orcid":false,"given":"Mark","family":"Levine","sequence":"additional","affiliation":[{"name":"Lancaster University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3476-053X","authenticated-orcid":false,"given":"Bashar","family":"Nuseibeh","sequence":"additional","affiliation":[{"name":"The Open University, United Kingdom and Lero - University of Limerick, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2023,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1162\/003355300554881"},{"key":"e_1_3_2_1_2_1","volume-title":"Motivation in Software Engineering: A systematic literature review. Information and software technology 50, 9-10","author":"Beecham Sarah","year":"2008","unstructured":"Sarah Beecham, Nathan Baddoo, Tracy Hall, Hugh Robinson, and Helen Sharp. 2008. Motivation in Software Engineering: A systematic literature review. Information and software technology 50, 9-10 (2008), 860\u2013878."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Amel Bennaceur Diane Hassett Bashar Nuseibeh and Andrea Zisman. 2023. Values@ Runtime: An Adaptive Framework for Operationalising Values. (2023).","DOI":"10.1109\/ICSE-SEIS58686.2023.00024"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.06.009"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2016.7451775"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377343"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"G Cockton. 2004. Value-centric HCI. In NordHCI.","DOI":"10.1145\/1028014.1028038"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation\u2014TAMC (theory and applications of models of computation\u2014tamc ed.)(Lecture Notes in Computer Science Vol.\u00a04978). Springer Verlag 1\u201319. https:\/\/www.microsoft.com\/en-us\/research\/publication\/differential-privacy-a-survey-of-results\/","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2842201"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409743"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER55298.2022.9793539"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528522"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110424"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2944608"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2000.10027"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.55"},{"key":"e_1_3_2_1_17_1","volume-title":"Feel It","author":"Hassett Diane","year":"2023","unstructured":"Diane Hassett, Amel Bennaceur, and Bashar Nuseibeh. 2023. Feel It, Code It: Emotional Goal Modelling for Gender-Inclusive Design. (2023)."},{"key":"e_1_3_2_1_18_1","volume-title":"CHI Conf. on Human Factors in Computing Systems. ACM.","author":"Heath C.","unstructured":"C. Heath, C. Crivellaro, and L. Coles-Kemp. 2019. Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things. In CHI Conf. on Human Factors in Computing Systems. ACM."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194770.3194777"},{"key":"e_1_3_2_1_20_1","unstructured":"Brian Kennedy Richard Fry and Cary Funk. 2021. 6 facts about America\u2019s STEM workforce and those training for it. (2021)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/581571.581601"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2022.3213467"},{"key":"e_1_3_2_1_23_1","volume-title":"Game theory - Analysis of Conflict","author":"Myerson B.","unstructured":"Roger\u00a0B. Myerson. 1997. Game theory - Analysis of Conflict. Harvard University Press. http:\/\/www.hup.harvard.edu\/catalog\/MYEGAM.html"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12160-016-9830-8"},{"key":"e_1_3_2_1_25_1","volume-title":"Responsible research and innovation: From science in society to science for society, with society. Science and public policy 39, 6","author":"Owen Richard","year":"2012","unstructured":"Richard Owen, Phil Macnaghten, and Jack Stilgoe. 2012. Responsible research and innovation: From science in society to science for society, with society. Science and public policy 39, 6 (2012), 751\u2013760."},{"key":"e_1_3_2_1_26_1","volume-title":"The impact of considering human values during requirements engineering activities","author":"Perera H","year":"2021","unstructured":"H Perera, R Hoda, R Shams, A Nurwidyantoro, M Shahin, W Hussain, and J Whittle. 2021. The impact of considering human values during requirements engineering activities. IEEE Transactions on Software Engineering (2021)."},{"key":"e_1_3_2_1_27_1","volume-title":"Software engineering ethics in a digital world","author":"Rashid A","year":"2019","unstructured":"A Rashid, J Weckert, and R Lucas. 2019. Software engineering ethics in a digital world. IEEE Computer (2019)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471930"},{"key":"e_1_3_2_1_29_1","volume-title":"Operationalizing Human Values in Software Engineering: A Survey. ArXiv abs\/2108.05624","author":"Shahin Mojtaba","year":"2021","unstructured":"Mojtaba Shahin, Waqar Hussain, Arif Nurwidyantoro, Harsha Perera, Rifat\u00a0Ara Shams, John\u00a0C. Grundy, and Jon Whittle. 2021. Operationalizing Human Values in Software Engineering: A Survey. ArXiv abs\/2108.05624 (2021)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/EURMIC.1999.794778"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113199"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.17351\/ests2017.142"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09858-z"},{"key":"e_1_3_2_1_34_1","volume-title":"William\u00a0G Austin, and Stephen Worchel","author":"Tajfel Henri","year":"1979","unstructured":"Henri Tajfel, John\u00a0C Turner, William\u00a0G Austin, and Stephen Worchel. 1979. An integrative theory of intergroup conflict. Organizational identity: A reader 56, 65 (1979), 9780203505984\u201316."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510458.3513018"},{"key":"e_1_3_2_1_36_1","volume-title":"Pots of Gold at the End of the Rainbow: What is Success for Open Source Contributors?IEEE Transactions on Software Engineering 48, 10","author":"Trinkenreich Bianca","year":"2021","unstructured":"Bianca Trinkenreich, Mariam Guizani, Igor Wiese, Tayana Conte, Marco Gerosa, Anita Sarma, and Igor Steinmacher. 2021. Pots of Gold at the End of the Rainbow: What is Success for Open Source Contributors?IEEE Transactions on Software Engineering 48, 10 (2021), 3940\u20133953."},{"key":"e_1_3_2_1_37_1","volume-title":"Modeling Sense of Virtual Community Among Linux Kernel Contributors. International Conference of Software Engineering","author":"Trinkenreich Bianca","year":"2023","unstructured":"Bianca Trinkenreich, Klaas-Jan Stol, Anita Sarma, Daniel\u00a0M German, Marco\u00a0A Gerosa, and Igor Steinmacher. 2023. Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel Contributors. International Conference of Software Engineering (2023)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2014.2314034"},{"key":"e_1_3_2_1_39_1","volume-title":"A learning agent that acquires social norms from public sanctions in decentralized multi-agent settings. CoRR abs\/2106.09012","author":"Vinitsky Eugene","year":"2021","unstructured":"Eugene Vinitsky, Raphael K\u00f6ster, John\u00a0P. Agapiou, Edgar\u00a0A. Du\u00e9\u00f1ez-Guzm\u00e1n, Alexander\u00a0Sasha Vezhnevets, and Joel\u00a0Z. Leibo. 2021. A learning agent that acquires social norms from public sanctions in decentralized multi-agent settings. CoRR abs\/2106.09012 (2021). arXiv:2106.09012https:\/\/arxiv.org\/abs\/2106.09012"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIS.2019.00009"},{"key":"e_1_3_2_1_41_1","volume-title":"Is Your Software Valueless?IEEE Software","author":"Whittle Jon","year":"2019","unstructured":"Jon Whittle. 2019. Is Your Software Valueless?IEEE Software (2019)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2019.00012"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-020-01000-3"}],"event":{"name":"TAS '23: First International Symposium on Trustworthy Autonomous Systems","location":"Edinburgh United Kingdom","acronym":"TAS '23"},"container-title":["Proceedings of the First International Symposium on Trustworthy Autonomous Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597512.3600206","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597512.3600206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:13Z","timestamp":1750287013000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597512.3600206"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,11]]},"references-count":43,"alternative-id":["10.1145\/3597512.3600206","10.1145\/3597512"],"URL":"https:\/\/doi.org\/10.1145\/3597512.3600206","relation":{},"subject":[],"published":{"date-parts":[[2023,7,11]]},"assertion":[{"value":"2023-07-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}