{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T11:03:58Z","timestamp":1773745438964,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,5]]},"DOI":"10.1145\/3789037.3789045","type":"proceedings-article","created":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T10:18:04Z","timestamp":1773742684000},"page":"57-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Practitioner-oriented Conceptualization of the three VSD Investigation Types"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-3843-1859","authenticated-orcid":false,"given":"Jeroen","family":"Van Grondelle","sequence":"first","affiliation":[{"name":"Digital Ethics Research Group, HU University of Applied Sciences Utrecht, Utrecht, Netherlands"},{"name":"Faculty of Science, Open Universiteit, Heerlen, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1161-7941","authenticated-orcid":false,"given":"Koen","family":"Smit","sequence":"additional","affiliation":[{"name":"Digital Ethics Research Group, HU University of Applied Sciences Utrecht, Utrecht, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2919-5193","authenticated-orcid":false,"given":"Erik","family":"Slingerland","sequence":"additional","affiliation":[{"name":"Process Innovation and Information Systems Research Group, HU University of Applied Sciences Utrecht, Utrecht, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2776-9541","authenticated-orcid":false,"given":"Johan","family":"Versendaal","sequence":"additional","affiliation":[{"name":"Faculty of Science, Open Universiteit, Heerlen, Netherlands"},{"name":"Digital Ethics Research Group, HU University of Applied Sciences Utrecht, Utrecht, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2026,3,17]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7914-3_7"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-020-00401-y"},{"key":"e_1_3_3_1_3_2","first-page":"372","volume-title":"Human-Computer Interaction in Management Information Systems: Foundations","author":"Friedman B.","year":"2006","unstructured":"B. Friedman, P. H. Kahn, and A. Borning, \u201cValue Sensitive Design and Information Systems,\u201d in Human-Computer Interaction in Management Information Systems: Foundations, P. Zhang and D. Galletta, Eds., Armonk, NY: M. E. Sharpe, 2006, pp. 348\u2013372."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7585.001.0001"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-023-09700-2"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642810"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72381-5_8"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-021-00038-3"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-018-9476-2"},{"issue":"2","key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","first-page":"133","DOI":"10.17705\/1thci.00030","article-title":"Bringing Discourse Ethics to Value Sensitive Design: Pathways toward a Deliberative Future","volume":"3","author":"Yetim F.","year":"2011","unstructured":"F. Yetim, \u201cBringing Discourse Ethics to Value Sensitive Design: Pathways toward a Deliberative Future,\u201d AIS Trans. Hum.-Comput. Interact., vol. 3, no. 2, pp. 133\u2013155, Jun. 2011.","journal-title":"AIS Trans. Hum.-Comput. Interact."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.4018\/IJT.2021070101"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1111\/jpim.12466"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2011.07.006"},{"key":"e_1_3_3_1_14_2","volume-title":"The \u2018Double Diamond\u2019 design process model","author":"Design Council","year":"2005","unstructured":"Design Council, \u201cThe \u2018Double Diamond\u2019 design process model.\u201d 2005."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/230538.230561"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7585.001.0001"},{"key":"e_1_3_3_1_17_2","volume-title":"Artificial Intelligence Safety and Security","author":"Umbrello S.","year":"2018","unstructured":"S. Umbrello and A. F. D. Bellis, \u201cA Value-Sensitive Design Approach to Intelligent Agents,\u201d in Artificial Intelligence Safety and Security, Chapman and Hall\/CRC, 2018."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/1316624.1316668"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-018-9461-9"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-021-09586-y"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-301-9_1"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2005.11.003"},{"issue":"6","key":"e_1_3_3_1_23_2","first-page":"84","article-title":"Design thinking","volume":"86","author":"Brown T.","year":"2008","unstructured":"T. Brown, \u201cDesign thinking,\u201d Harv. Bus. Rev., vol. 86, no. 6, pp. 84\u201392, 141, 2008.","journal-title":"Harv. Bus. Rev."},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"issue":"2","key":"e_1_3_3_1_25_2","article-title":"A Three Cycle View of Design Science Research","volume":"19","author":"Hevner A.","year":"2007","unstructured":"A. Hevner, \u201cA Three Cycle View of Design Science Research,\u201d Scand. J. Inf. Syst., vol. 19, no. 2, Jan. 2007, [Online]. Available: https:\/\/aisel.aisnet.org\/sjis\/vol19\/iss2\/4","journal-title":"Scand. J. Inf. Syst."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.2307\/25148742"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.2.01"},{"key":"e_1_3_3_1_28_2","volume-title":"Case study research and applications: design and methods","author":"Yin R. K.","year":"2018","unstructured":"R. K. Yin, Case study research and applications: design and methods, Sixth edition. Los Angeles: SAGE, 2018."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-021-00329-2"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01405730"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1111\/jpim.12163"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1111\/caim.12023"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79879-6_2"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2477899"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2023301118"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.14763\/2021.3.1580"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2010.07.003"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.erss.2020.101727"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1080\/15710880701875068"},{"key":"e_1_3_3_1_40_2","volume-title":"The age of surveillance capitalism: the fight for a human future at the new frontier of power","author":"Zuboff S.","year":"2019","unstructured":"S. Zuboff, The age of surveillance capitalism: the fight for a human future at the new frontier of power. London: Profile books, 2019."},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1177\/0950017018785616"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-020-09537-4"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.18690\/um.fov.4.2024.12"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.18690\/um.fov.6.2023.31"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678988"},{"key":"e_1_3_3_1_46_2","volume-title":"Computer Communication and Information Systems 2025","author":"Versendaal J.","year":"2025","unstructured":"J. Versendaal et al., \u201cSelecting Suitable Value Sensitive Design Routines,\u201d in Computer Communication and Information Systems 2025, Hong Kong, 2025."}],"event":{"name":"ICSeB 2025: 2025 9th International Conference on Software and e-Business","location":"Kyoto Japan","acronym":"ICSeB 2025"},"container-title":["Proceedings of the 2025 9th International Conference on Software and e-Business"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3789037.3789045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T10:19:02Z","timestamp":1773742742000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3789037.3789045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,5]]},"references-count":46,"alternative-id":["10.1145\/3789037.3789045","10.1145\/3789037"],"URL":"https:\/\/doi.org\/10.1145\/3789037.3789045","relation":{},"subject":[],"published":{"date-parts":[[2025,12,5]]},"assertion":[{"value":"2026-03-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}