{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T08:56:56Z","timestamp":1773392216434,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":110,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,18]]},"DOI":"10.1145\/3744169.3744172","type":"proceedings-article","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T09:22:12Z","timestamp":1753262532000},"page":"153-165","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Designing for War? Ethical and Practical Challenges to a Military HCI"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9710-6607","authenticated-orcid":false,"given":"Barry","family":"Brown","sequence":"first","affiliation":[{"name":"Human Centred Computing, University of Copenhagen, Copenhagen, Denmark and DSV, Stockholm University, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2025,8,17]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"Nick Adde. 2019. New Wave of Night Vision Tech to Boost Soldier Lethality. National Defense 103 782 (2019) 32\u201333. https:\/\/www.jstor.org\/stable\/27022442 Publisher: JSTOR."},{"key":"e_1_3_3_1_3_2","unstructured":"Anonymous. 2022. How crowdfunding is shaping the war in Ukraine. The Economist (2022). https:\/\/www.economist.com\/the-economist-explains\/2022\/07\/27\/how-crowdfunding-is-shaping-the-war-in-ukraine"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Peter Asaro. 2012. On banning autonomous weapon systems: human rights automation and the dehumanization of lethal decision-making. International review of the Red Cross 94 886 (2012) 687\u2013709. https:\/\/www.cambridge.org\/core\/journals\/international-review-of-the-red-cross\/article\/on-banning-autonomous-weapon-systems-human-rights-automation-and-the-dehumanization-of-lethal-decisionmaking\/992565190BF2912AFC5AC0657AFECF07 Publisher: Cambridge University Press.","DOI":"10.1017\/S1816383112000768"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753521"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Oliver Bates Vanessa Thomas and Christian Remy. 2017. Doing good in hci: Can we broaden our agenda? interactions 24 5 (2017) 80\u201382. Publisher: ACM New York NY USA.","DOI":"10.1145\/3121386"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Jasper Baur. 2024. Ukraine is Riddled with Land Mines: Drones and AI Can Help. IEEE Spectrum 61 5 (May 2024) 42\u201349. 10.1109\/MSPEC.2024.10522930Conference Name: IEEE Spectrum.","DOI":"10.1109\/MSPEC.2024.10522930"},{"key":"e_1_3_3_1_8_2","volume-title":"Drone Warfare: Killing by Remote Control","author":"Benjamin Medea","year":"2013","unstructured":"Medea Benjamin. 2013. Drone Warfare: Killing by Remote Control. Verso Books. Google-Books-ID: BpgOezulpoMC."},{"key":"e_1_3_3_1_9_2","volume-title":"The man from the future: The visionary life of John von Neumann","author":"Bhattacharya Ananyo","year":"2021","unstructured":"Ananyo Bhattacharya. 2021. The man from the future: The visionary life of John von Neumann. Penguin UK."},{"key":"e_1_3_3_1_10_2","unstructured":"Leo Blanken Romulo\u00a0G. Dimayuga\u00a0II and Kristen Tsolis. 2021. Making Friends in Maker-Spaces: From Grassroots Innovation to Great-Power Competition. (2021). https:\/\/digital.lib.ueh.edu.vn\/bitstream\/UEH\/69582\/1\/3.pdf"},{"key":"e_1_3_3_1_11_2","unstructured":"Defense\u00a0Innovation Board. 2019. AI principles: recommendations on the ethical use of artificial intelligence by the department of defense: supporting document. United States Department of Defense (2019). https:\/\/media.defense.gov\/2019\/Oct\/31\/2002204459\/-1\/-1\/0\/DIB_AI_principles%20Supporting%20Document.pdf"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3381068"},{"key":"e_1_3_3_1_13_2","volume-title":"American grand strategy in the age of Trump","author":"Brands Hal","year":"2018","unstructured":"Hal Brands. 2018. American grand strategy in the age of Trump. Brookings Institution Press."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858313"},{"key":"e_1_3_3_1_15_2","volume-title":"People, states & fear: an agenda for international security studies in the post-cold war era","author":"Buzan Barry","year":"2008","unstructured":"Barry Buzan. 2008. People, states & fear: an agenda for international security studies in the post-cold war era. ECPR press. https:\/\/scholar.google.com\/scholar?cluster=6510506540419010786&hl=en&oi=scholarr"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Laurie Calhoun. 2017. Death from above: The perils of lethal drone strikes. Bulletin of the Atomic Scientists 73 2 (March 2017) 138\u2013142. 10.1080\/00963402.2017.1288459Publisher: Routledge _eprint: https:\/\/doi.org\/10.1080\/00963402.2017.1288459.","DOI":"10.1080\/00963402.2017.1288459"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805823"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"Jessica\u00a0R. Cauchard Mohamed Khamis J\u00e9r\u00e9mie Garcia Matja\u017e Kljun and Anke\u00a0M. Brock. 2021. Toward a roadmap for human-drone interaction. Interactions 28 2 (March 2021) 76\u201381. 10.1145\/3447889","DOI":"10.1145\/3447889"},{"key":"e_1_3_3_1_19_2","volume-title":"Imperial life in the emerald city: Inside Iraq\u2019s green zone","author":"Chandrasekaran Rajiv","year":"2010","unstructured":"Rajiv Chandrasekaran. 2010. Imperial life in the emerald city: Inside Iraq\u2019s green zone. Vintage."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/14436.001.0001"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1515\/9781400845293"},{"key":"e_1_3_3_1_22_2","first-page":"166","volume-title":"Human Performance, Situation Awareness, and Automation","author":"Cook Malcolm\u00a0James","year":"2005","unstructured":"Malcolm\u00a0James Cook, Helen\u00a0SE Thompson, Corinne\u00a0SG Adams, Carol\u00a0S. Angus, Gwen Hughes, and Derek Carson. 2005. Human Factors and Situational Awareness Issues in Fratricidal Air-to-Ground Attacks. In Human Performance, Situation Awareness, and Automation. Psychology Press, 166\u2013171. https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9781410610997-29\/interpolation-method-rating-severity-runway-incursions-thomas-sheridan-dot-volpe-national-transportation-systems-center-cambridge-ma"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Shawn Davies Garoun Engstr\u00f6m Ther\u00e9se Pettersson and Magnus \u00d6berg. 2024. Organized violence 1989\u20132023 and the prevalence of organized crime groups. Journal of Peace Research 61 4 (July 2024) 673\u2013693. 10.1177\/00223433241262912","DOI":"10.1177\/00223433241262912"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300810"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","unstructured":"Marc\u00a0R. DeVore. 2023. \u201cNo end of a lesson:\u201d observations from the first high-intensity drone war. Defense & Security Analysis 39 2 (April 2023) 263\u2013266. 10.1080\/14751798.2023.2178571Publisher: Routledge _eprint: https:\/\/doi.org\/10.1080\/14751798.2023.2178571.","DOI":"10.1080\/14751798.2023.2178571"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581347"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","unstructured":"Bryan Dosono Yasmeen Rashidi Taslima Akter Bryan Semaan and Apu Kapadia. 2017. Challenges in Transitioning from Civil to Military Culture: Hyper-Selective Disclosure through ICTs. Proceedings of the ACM on Human-Computer Interaction 1 CSCW (Dec. 2017) 1\u201323. 10.1145\/3134676","DOI":"10.1145\/3134676"},{"key":"e_1_3_3_1_28_2","volume-title":"The Closed World: Computers and the Politics of Discourse in Cold War America","author":"Edwards Paul\u00a0N.","year":"1997","unstructured":"Paul\u00a0N. Edwards. 1997. The Closed World: Computers and the Politics of Discourse in Cold War America. MIT Press, Boston, MA."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376678"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781315620183"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","unstructured":"Nicholas\u00a0G Evans. 2013. Dual-use governance in an age of innovation. BioSocieties 8 1 (March 2013) 96\u2013100. 10.1057\/biosoc.2012.37","DOI":"10.1057\/biosoc.2012.37"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","unstructured":"Steven Feiner Blair Macintyre and Dor\u00e9e Seligmann. 1993. Knowledge-based augmented reality. Commun. ACM 36 7 (July 1993) 53\u201362. 10.1145\/159544.159587","DOI":"10.1145\/159544.159587"},{"key":"e_1_3_3_1_33_2","first-page":"155","volume-title":"Display Technologies and Applications for Defense, Security, and Avionics IX; and Head-and Helmet-Mounted Displays XX","author":"Foote Bob","year":"2015","unstructured":"Bob Foote and James Melzer. 2015. A history of helmet mounted displays. In Display Technologies and Applications for Defense, Security, and Avionics IX; and Head-and Helmet-Mounted Displays XX, Vol.\u00a09470. SPIE, 155\u2013165. https:\/\/www.spiedigitallibrary.org\/conference-proceedings-of-spie\/9470\/94700T\/A-history-of-helmet-mounted-displays\/10.1117\/12.2181337.short"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","unstructured":"Christopher Frauenberger. 2019. Entanglement HCI The Next Wave? ACM Trans. Comput.-Hum. Interact. 27 1 (Nov. 2019) 2:1\u20132:27. 10.1145\/3364998","DOI":"10.1145\/3364998"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1753870"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2014.6948400"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780195122558.001.0001"},{"key":"e_1_3_3_1_38_2","volume-title":"Cities under siege: The new military urbanism","author":"Graham Stephen","year":"2011","unstructured":"Stephen Graham. 2011. Cities under siege: The new military urbanism. Verso Books. https:\/\/books.google.com\/books?hl=en&lr=&id=E1Hp_dpHBAAC&oi=fnd&pg=PP2&dq=info:y4gwubN-fowJ:scholar.google.com&ots=2OwTYKdSfd&sig=eDJwTcbGQVsgZ3MSBsgzlmYMjM8"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","unstructured":"Hugh Gusterson and Catherine Besteman. 2019. Cultures of Militarism: An Introduction to Supplement 19. Current Anthropology 60 S19 (Feb. 2019) S3\u2013S14. 10.1086\/700648","DOI":"10.1086\/700648"},{"key":"e_1_3_3_1_41_2","unstructured":"Brad Halsey. 2023. What America Can Learn From The Defenders Of Ukraine. https:\/\/makezine.com\/article\/maker-news\/what-america-can-learn-from-the-defenders-of-ukraine\/"},{"key":"e_1_3_3_1_42_2","volume-title":"Building access: Universal design and the politics of disability","author":"Hamraie Aimi","year":"2017","unstructured":"Aimi Hamraie. 2017. Building access: Universal design and the politics of disability. U of Minnesota Press."},{"key":"e_1_3_3_1_43_2","volume-title":"Ham radio\u2019s technical culture","author":"Haring Kristen","year":"2007","unstructured":"Kristen Haring. 2007. Ham radio\u2019s technical culture. Mit Press."},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","unstructured":"Daniel Harley. 2024. \u201cThis would be sweet in VR\u201d: On the discursive newness of virtual reality. New Media & Society 26 4 (April 2024) 2151\u20132167. 10.1177\/14614448221084655","DOI":"10.1177\/14614448221084655"},{"key":"e_1_3_3_1_45_2","unstructured":"JAMES\u00a0B. HECKER. 2024. AIR SUPERIORITY: A Renewed Vision. \u00c6ther: A Journal of Strategic Airpower & Spacepower 3 2 (2024). https:\/\/search.ebscohost.com\/login.aspx?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=27716120&AN=178576629&h=yysl03BNnHfoyMB%2FbzNS6mpyP350cZBTO%2BDcsm4Origeqa8YkTX00YIojAFl6Mtk5NtkGazz2PF4EIAP6V7Fww%3D%3D&crl=c"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470281819"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"crossref","unstructured":"Shane\u00a0D. Hirschi Dawn\u00a0A. Morrison Megan\u00a0A. Kreiger Mariangelica Carrasquillo-Mangual Brandy\u00a0N. Diggs-McGee Jonathan\u00a0M. Goebel and Bjorn\u00a0K. Oberg. 2020. Army installation makerspaces in the Morale Welfare and Recreation (MWR) operational environment: a business case analysis. (2020). https:\/\/apps.dtic.mil\/sti\/citations\/AD1104637 Publisher: Construction Engineering Research Laboratory (US).","DOI":"10.21079\/11681\/37553"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979005"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-8806-4_77"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226772905.001.0001"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3610602.3610608"},{"key":"e_1_3_3_1_52_2","unstructured":"Sheila Jasanoff J\u00a0Benjamin Hurlbut and Krishanu Saha. 2015. CRISPR democracy: Gene editing and the need for inclusive deliberation. Issues in Science and Technology 32 1 (2015) 25\u201332. Publisher: University of Texas at Dallas."},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","unstructured":"James Johnson. 2022. The AI Commander Problem: Ethical Political and Psychological Dilemmas of Human-Machine Interactions in AI-enabled Warfare. Journal of Military Ethics 21 3-4 (Oct. 2022) 246\u2013271. 10.1080\/15027570.2023.2175887","DOI":"10.1080\/15027570.2023.2175887"},{"key":"e_1_3_3_1_54_2","unstructured":"Zachary Kallenborn. 2022. Seven (initial) drone warfare lessons from Ukraine. Modern War Institute at West Point le 5 (2022). https:\/\/cove.army.gov.au\/sites\/default\/files\/2024-03\/2205_Drone%20warfare_A%20collection%20of%20articles_May-Jun2022.pdf"},{"key":"e_1_3_3_1_55_2","volume-title":"The face of battle: A study of Agincourt, Waterloo, and the Somme","author":"Keegan John","year":"1983","unstructured":"John Keegan. 1983. The face of battle: A study of Agincourt, Waterloo, and the Somme. Penguin."},{"key":"e_1_3_3_1_56_2","unstructured":"Jack\u00a0L. Kimberly\u00a0Jr. 1990. We owned the night. Journal of Electronic Defense 13 10 (1990) 33\u201337. https:\/\/go.gale.com\/ps\/i.do?id=GALE%7CA9020718&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=0192429X&p=AONE&sw=w Publisher: Horizon House Publications Inc.."},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","unstructured":"Benjamin\u00a0A Knott Vincent\u00a0F Mancuso Kevin Bennett Victor Finomore Michael McNeese Jennifer\u00a0A. McKneely and Maria Beecher. 2013. Human Factors in Cyber Warfare: Alternative Perspectives. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 57 1 (Sept. 2013) 399\u2013403. 10.1177\/1541931213571086Publisher: SAGE Publications Inc.","DOI":"10.1177\/1541931213571086"},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"publisher","unstructured":"Frida Kuhlau Anna\u00a0T H\u00f6glund Stefan Eriksson and Kathinka Evers. 2013. The ethics of disseminating dual-use knowledge. Research Ethics 9 1 (March 2013) 6\u201319. 10.1177\/1747016113478517","DOI":"10.1177\/1747016113478517"},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"publisher","unstructured":"Dominika Kunertova. 2023. Drones have boots: Learning from Russia\u2019s war in Ukraine. Contemporary Security Policy 44 4 (Oct. 2023) 576\u2013591. 10.1080\/13523260.2023.2262792Publisher: Routledge _eprint: https:\/\/doi.org\/10.1080\/13523260.2023.2262792.","DOI":"10.1080\/13523260.2023.2262792"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","unstructured":"Dominika Kunertova. 2023. The war in Ukraine shows the game-changing effect of drones depends on the game. Bulletin of the Atomic Scientists 79 2 (March 2023) 95\u2013102. 10.1080\/00963402.2023.2178180","DOI":"10.1080\/00963402.2023.2178180"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557111"},{"key":"e_1_3_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376786"},{"key":"e_1_3_3_1_63_2","unstructured":"Bruno Latour. 2005. From realpolitik to dingpolitik. Atmospheres of democracy1444 (2005)."},{"key":"e_1_3_3_1_64_2","volume-title":"Robot Ethics: The Ethical and Social Implications of Robotics","author":"Lin Patrick","year":"2014","unstructured":"Patrick Lin, Keith Abney, and George\u00a0A. Bekey. 2014. Robot Ethics: The Ethical and Social Implications of Robotics. MIT Press. Google-Books-ID: mL34DwAAQBAJ."},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557132"},{"key":"e_1_3_3_1_66_2","unstructured":"James Haoge-Ma Lu Canela Corrales and Bryan Semaan. 2019. Designing for separation: Participatory design with military veterans. iConference 2019 Proceedings (2019). https:\/\/www.ideals.illinois.edu\/items\/110374 Publisher: iSchools."},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"crossref","unstructured":"Irja Malmio. 2023. Ethics as an enabler and a constraint\u2013Narratives on technology development and artificial intelligence in military affairs through the case of Project Maven. Technology in Society 72 (2023) 102193. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0160791X22003347 Publisher: Elsevier.","DOI":"10.1016\/j.techsoc.2022.102193"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","unstructured":"Christoforos Mavrogiannis Francesca Baldini Allan Wang Dapeng Zhao Pete Trautman Aaron Steinfeld and Jean Oh. 2023. Core Challenges of Social Robot Navigation: A Survey. ACM Transactions on Human-Robot Interaction 12 3 (Sept. 2023) 1\u201339. 10.1145\/3583741","DOI":"10.1145\/3583741"},{"key":"e_1_3_3_1_69_2","unstructured":"Bethan McKernan and Harry Davies. 2024. \u2018The machine did it coldly\u2019: Israel used AI to identify 37 000 Hamas targets. The Guardian (April 2024). https:\/\/www.theguardian.com\/world\/2024\/apr\/03\/israel-gaza-ai-database-hamas-airstrikes"},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3363384.3363393"},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"publisher","unstructured":"Seumas Miller and Michael\u00a0J. Selgelid. 2007. Ethical and Philosophical Consideration of the Dual-use Dilemma in the Biological Sciences. Science and Engineering Ethics 13 4 (Dec. 2007) 523\u2013580. 10.1007\/s11948-007-9043-4","DOI":"10.1007\/s11948-007-9043-4"},{"key":"e_1_3_3_1_72_2","unstructured":"Jeff Nesbit. 2017. Google\u2019s true origin partly lies in CIA and NSA research grants for mass surveillance. Quartz (blog) December 8 (2017). https:\/\/topinfo.us\/albums\/userpics\/10001\/33\/Google___s_true_origin_partly_lies_in_CIA_and_NSA_research_grants_for_mass_surveillance.pdf"},{"key":"e_1_3_3_1_73_2","volume-title":"War and international justice: a Kantian perspective","author":"Orend Brian","year":"2000","unstructured":"Brian Orend. 2000. War and international justice: a Kantian perspective. Wilfrid Laurier Univ. Press."},{"key":"e_1_3_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858283"},{"key":"e_1_3_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118551424.ch2"},{"key":"e_1_3_3_1_76_2","volume-title":"Life in the Age of Drone Warfare","author":"Parks Lisa","year":"2017","unstructured":"Lisa Parks and Caren Kaplan (Eds.). 2017. Life in the Age of Drone Warfare. Duke University Press Books, Durham (N.C.)."},{"key":"e_1_3_3_1_77_2","doi-asserted-by":"publisher","unstructured":"Franziska Poszler Maximilian Geisslinger Johannes Betz and Christoph L\u00fctge. 2023. Applying ethical theories to the decision-making of self-driving vehicles: A systematic review and integration of the literature. Technology in Society 75 (Nov. 2023) 102350. 10.1016\/j.techsoc.2023.102350","DOI":"10.1016\/j.techsoc.2023.102350"},{"key":"e_1_3_3_1_78_2","volume-title":"Just War","author":"Regan Richard\u00a0J.","year":"2013","unstructured":"Richard\u00a0J. Regan. 2013. Just War. CUA Press."},{"key":"e_1_3_3_1_79_2","unstructured":"LtCol\u00a0Marcus Reynolds. 2021. The Future Warrior Has Arrived. Marine Corps Gazette (2021). https:\/\/www.mca-marines.org\/wp-content\/uploads\/The-Future-Warrior-Has-Arrived.pdf"},{"key":"e_1_3_3_1_80_2","volume-title":"Managing technology in society: the approach of constructive technology assessment (1. publ ed.)","author":"Rip Arie","year":"1995","unstructured":"Arie Rip, Thomas\u00a0J. Misa, and J.\u00a0W. Schot (Eds.). 1995. Managing technology in society: the approach of constructive technology assessment (1. publ ed.). Pinter Publishers, London New York."},{"key":"e_1_3_3_1_81_2","doi-asserted-by":"publisher","unstructured":"Tara Roberson Stephen Bornstein Rain Liivoja Simon Ng Jason Scholz and Kate Devitt. 2022. A method for ethical AI in defence: A case study on developing trustworthy autonomous systems. Journal of Responsible Technology 11 (Oct. 2022) 100036. 10.1016\/j.jrt.2022.100036","DOI":"10.1016\/j.jrt.2022.100036"},{"key":"e_1_3_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/1709886.1709911"},{"key":"e_1_3_3_1_83_2","doi-asserted-by":"publisher","unstructured":"Heather\u00a0M. Roff. 2014. The Strategic Robot Problem: Lethal Autonomous Weapons in War. Journal of Military Ethics 13 3 (July 2014) 211\u2013227. 10.1080\/15027570.2014.975010","DOI":"10.1080\/15027570.2014.975010"},{"key":"e_1_3_3_1_84_2","volume-title":"Briefing Paper Prepared for the Informal Meeting of Experts on Lethal Au-Tonomous Weapons Systems, UN Convention on Certain Conventional Weapons","author":"Roff Heather\u00a0M.","year":"2016","unstructured":"Heather\u00a0M. Roff and Richard Moyes. 2016. Meaningful human control, artificial intelligence and autonomous weapons. In Briefing Paper Prepared for the Informal Meeting of Experts on Lethal Au-Tonomous Weapons Systems, UN Convention on Certain Conventional Weapons. https:\/\/www.academia.edu\/download\/93364637\/MHC-AI-and-AWS-FINAL.pdf"},{"key":"e_1_3_3_1_85_2","unstructured":"Phillip Rogaway. 2015. The moral character of cryptographic work. Cryptology ePrint Archive (2015)."},{"key":"e_1_3_3_1_86_2","unstructured":"Stefka Schmid. 2023. Safe and Secure? Visions of Military Human-Computer Interaction. (2023). https:\/\/dl.gi.de\/items\/841cc5bd-8e25-40de-804f-8fb4fedddf11 Publisher: GI."},{"key":"e_1_3_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502112"},{"key":"e_1_3_3_1_88_2","doi-asserted-by":"publisher","unstructured":"Bryan Semaan and Gloria Mark. 2011. Technology-mediated social arrangements to resolve breakdowns in infrastructure during ongoing disruption. ACM Transactions on Computer-Human Interaction 18 4 (Dec. 2011) 1\u201321. 10.1145\/2063231.2063235","DOI":"10.1145\/2063231.2063235"},{"key":"e_1_3_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173960"},{"key":"e_1_3_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199396412.001.0001"},{"key":"e_1_3_3_1_91_2","doi-asserted-by":"crossref","unstructured":"Peter\u00a0W. Singer. 2010. The ethics of killer applications: Why is it so hard to talk about morality when it comes to new military technology? Journal of military ethics 9 4 (2010) 299\u2013312. Publisher: Taylor & Francis.","DOI":"10.1080\/15027570.2010.536400"},{"key":"e_1_3_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1093\/wentk\/9780199918096.001.0001"},{"key":"e_1_3_3_1_93_2","volume-title":"Tools and weapons: The promise and the peril of the digital age","author":"Smith Brad","year":"2021","unstructured":"Brad Smith and Carol\u00a0Ann Browne. 2021. Tools and weapons: The promise and the peril of the digital age. Penguin."},{"key":"e_1_3_3_1_94_2","unstructured":"Noah Smith. 2024. The Israel Defense Forces\u2019 Use of AI in Gaza: A Case of Misplaced Purpose. https:\/\/rusi.orghttps:\/\/rusi.org"},{"key":"e_1_3_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3170604"},{"key":"e_1_3_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753484"},{"key":"e_1_3_3_1_97_2","doi-asserted-by":"publisher","unstructured":"Robert Soden and Leysia Palen. 2018. Informating Crisis: Expanding Critical Perspectives in Crisis Informatics. Proc. ACM Hum.-Comput. Interact. 2 CSCW (Nov. 2018) 162:1\u2013162:22. 10.1145\/3274431","DOI":"10.1145\/3274431"},{"key":"e_1_3_3_1_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3299033"},{"key":"e_1_3_3_1_99_2","doi-asserted-by":"publisher","unstructured":"Lucy Suchman. 2020. Algorithmic warfare and the reinvention of accuracy. Critical Studies on Security 8 2 (May 2020) 175\u2013187. 10.1080\/21624887.2020.1760587","DOI":"10.1080\/21624887.2020.1760587"},{"key":"e_1_3_3_1_100_2","doi-asserted-by":"publisher","unstructured":"Lucy Suchman. 2023. Imaginaries of omniscience: Automating intelligence in the US Department of Defense. Social Studies of Science 53 5 (Oct. 2023) 761\u2013786. 10.1177\/03063127221104938","DOI":"10.1177\/03063127221104938"},{"key":"e_1_3_3_1_101_2","doi-asserted-by":"publisher","unstructured":"Lucy Suchman Karolina Follis and Jutta Weber. 2017. Tracking and Targeting: Sociotechnologies of (In)security. Science Technology & Human Values 42 6 (Nov. 2017) 983\u20131002. 10.1177\/0162243917731524","DOI":"10.1177\/0162243917731524"},{"key":"e_1_3_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858073"},{"key":"e_1_3_3_1_103_2","doi-asserted-by":"crossref","unstructured":"Dante Tezza and Marvin Andujar. 2019. The state-of-the-art of human\u2013drone interaction: A survey. IEEE Access 7 (2019) 167438\u2013167454. Publisher: IEEE.","DOI":"10.1109\/ACCESS.2019.2953900"},{"key":"e_1_3_3_1_104_2","doi-asserted-by":"publisher","unstructured":"Suzanne Tolmeijer Markus Kneer Cristina Sarasua Markus Christen and Abraham Bernstein. 2021. Implementations in Machine Ethics: A Survey. Comput. Surveys 53 6 (Nov. 2021) 1\u201338. 10.1145\/3419633","DOI":"10.1145\/3419633"},{"key":"e_1_3_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3381812"},{"key":"e_1_3_3_1_106_2","volume-title":"From counterculture to cyberculture: Stewart Brand, the Whole Earth Network, and the rise of digital utopianism","author":"Turner Fred","year":"2010","unstructured":"Fred Turner. 2010. From counterculture to cyberculture: Stewart Brand, the Whole Earth Network, and the rise of digital utopianism. University of Chicago Press."},{"key":"e_1_3_3_1_107_2","unstructured":"Yuri Vlasyuk. 2023. Makers in Defense of Ukraine: A Year Of Fighting Back With Innovation. https:\/\/makezine.com\/article\/maker-news\/makers-in-defense-of-ukraine\/"},{"key":"e_1_3_3_1_108_2","volume-title":"Can we survive technology?","author":"Von\u00a0Neumann John","year":"1955","unstructured":"John Von\u00a0Neumann. 1955. Can we survive technology?Time, Incorporated."},{"key":"e_1_3_3_1_109_2","volume-title":"Just and unjust wars: A moral argument with historical illustrations","author":"Walzer Michael","year":"2015","unstructured":"Michael Walzer. 2015. Just and unjust wars: A moral argument with historical illustrations. Hachette UK. https:\/\/www.google.com\/books?hl=en&lr=&id=A-03DgAAQBAJ&oi=fnd&pg=PT23&dq=Just+and+Unjust+wars&ots=kTgiiCxEKy&sig=o1mMgPvBxqtiKemWJsOWXAlU06U"},{"key":"e_1_3_3_1_110_2","volume-title":"American science in an age of anxiety: Scientists, anticommunism, and the Cold War","author":"Wang Jessica","year":"1999","unstructured":"Jessica Wang. 1999. American science in an age of anxiety: Scientists, anticommunism, and the Cold War. Univ of North Carolina Press."},{"key":"e_1_3_3_1_111_2","doi-asserted-by":"publisher","unstructured":"Cara Wrigley Genevieve Mosely and Michael Mosely. 2021. Defining Military Design Thinking: An Extensive Critical Literature Review. She Ji: The Journal of Design Economics and Innovation 7 1 (March 2021) 104\u2013143. 10.1016\/j.sheji.2020.12.002","DOI":"10.1016\/j.sheji.2020.12.002"}],"event":{"name":"AAR 2025: The sixth decennial Aarhus conference: Computing X Crisis","location":"Aarhus N Denmark","acronym":"AAR 2025"},"container-title":["Proceedings of the sixth decennial Aarhus conference: Computing X Crisis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3744169.3744172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T10:52:57Z","timestamp":1753267977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3744169.3744172"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,17]]},"references-count":110,"alternative-id":["10.1145\/3744169.3744172","10.1145\/3744169"],"URL":"https:\/\/doi.org\/10.1145\/3744169.3744172","relation":{},"subject":[],"published":{"date-parts":[[2025,8,17]]},"assertion":[{"value":"2025-08-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}