<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Ethical User stories: Industrial study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Erika Halme</string-name>
          <email>erika.a.halme@jyu.fi</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mamia Agbese</string-name>
          <email>mamia.o.agbese@jyu.fi</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jani Antikainen</string-name>
          <email>jani.p.antikainen@student.jyu.fi</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hanna-Kaisa Alanen</string-name>
          <email>Hanna-kaisa.h-k.alanen@student.jyu.fi</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marianna Jantunen</string-name>
          <email>marianna.s.p.jantunen@jyu.fi</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Arif Ali Khan</string-name>
          <email>arif.khan@oulu.fi</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kai-Kristian Kemell</string-name>
          <email>kai-kristian.kemell@helsinki.fi</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ville Vakkuri</string-name>
          <email>ville.vakkuri@jyu.fi</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pekka Abrahamsson</string-name>
          <email>pekka.abrahamsson@jyu.fi</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>M3S Empirical Software Engineering Research Unit, University of Oulu</institution>
          ,
          <addr-line>90570 Oulu</addr-line>
          ,
          <country country="FI">Finland</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Helsinki, Department of Computer Science, 00014 University of Helsinki</institution>
          ,
          <country country="FI">Finland</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Jyväskylä</institution>
          ,
          <addr-line>PO Box 35</addr-line>
          ,
          <institution>FI-40014 University of Jyväskylä</institution>
          ,
          <country country="FI">Finland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In Port terminals a progressive change is underway in digitalizing traditional systems to SMART systems with the aid of AI. This study follows one of such progressions, the SMARTER project. SMARTER is a sub research and development project of the Sea for Value program of DIMECC company, Finland to create replicable models for digitalization for future terminals which involves the use of AI enabled tools. AI and Autonomous Systems (AS) are the direction that software systems are taking today. But due to ethical challenges involved in the use of AI systems and increased emphasis on ethical practices in the use and design of AI systems, our study provides an ethical angle, Ethical User Stories (EUS). We use an ethically aligned design tool the ECCOLA method to transfer ethical requirements into EUS for non-functional requirements for an aspect of the logistics system, passenger flow. Over the span of six months, 125 EUS using the ECCOLA method were collected through a series of workshops for the passenger flow use case and the findings are revealed in this paper. This project is in the field of maritime industry and concentrates on digitalization of port terminals and this particular paper focuses on the passenger flow. Results are positive towards the practice of Ethical User Stories.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Digitalization</kwd>
        <kwd>Artificial Intelligence</kwd>
        <kwd>SMART systems</kwd>
        <kwd>Ethics</kwd>
        <kwd>User Stories</kwd>
        <kwd>Passenger Flow</kwd>
        <kwd>Port terminal</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The benefits of AI enabled digitalization in reaching desired goals in development projects
across industries, the environment, and society in general is increasingly influencing many
development projects. One area of interest for digitalization and SMART systems is in logistics,
especially logistics in port terminals. Digitalization of traditional port terminal to a future
SMART terminal has now been under development in Finland and witnessed in this particular
study, where the research empirical data is explored in a research and design (R&amp;D) influenced
industrial project called the SMARTER [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].The project aims for digitalization and an increased
level of autonomy [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], where the target is to create replicable models for the digitalization of
future terminals.
      </p>
      <p>
        State of the art technology like Smart or/and AI/AS Systems’ impact assessment, within AI
ethics, has recently been under the interest of various institutes, organizations and governing
bodies producing diferent sets of guidelines, principles and even some regulations.[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] AI ethics
can be approached from several points of view and when designing these artifacts the Dignum
paradigm [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] presents one way of consideration. There, ethics and AI are related in three levels
as in Ethics by Design, Ethics in Design, and Ethics for Design. In this context, Ethically Aligned
Design (EAD), is one of the approaches that has slowly gained a foothold in modern technology
design. EAD aims to align the ethical principles and values in the design process to receive the
full benefit of AI/AS technology. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] Our research is located in the middle ground of Ethics in
and for Design, as we develop tools to transform ethical principles to practical and concrete
means in EAD in AI.
      </p>
      <p>
        One of the tools that has risen from our studies is Ethical User stories [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Ethical User Stories
relates to Agile requirements engineering, where requirements for Software Engineering (SE)
are processed through a User story process using a framework of ethical principles that are
connected to technology design or development. At the moment, a few similar kind of idea
building of ethical user stories exist in research, but without an empirical evidence supporting
the idea. [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ] On the other hand values, that relate to ethics, have recently been studied in the
context of software development and requirements engineering by Perera et al (2021). [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] In a
scenario based survey for practitioners the results indicate that the impact of implementing
human values to the early stages of requirements engineering help the practitioners build
connections between software features and human values. Now, the preceding study [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
describe that: “[..] ethical user stories could be one way of making (AI) ethics a part of the
workflow of developers.” So, in order to study more the ethical user stories in practise, we
conducted an exploration in an industrial setting in the previously mentioned study project to
give more understanding of the phenomena. Regarding the framework of ethical principles, our
research has, for several reasons, used scientifically proven method ECCOLA method[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], in
this study to filter ethical requirements in the development work flow. Reasons for ECCOLA
alternative are elaborated more in section 3.
      </p>
      <p>This article is motivated by the program objectives and the growing trend of AI-enhanced
smart systems, where the impact of utilization of these systems is requiring concrete actions
from research towards EAD and trustworthy smart system environment. Inspired by the field’s
will for EAD towards AI/AS systems development and by the practitioners’ need for tools to
conduct their work towards EAD, the main research questions were unfolded to How to make
ethical user stories? and What are the ethical requirements in the Maritime industry, especially
in port terminals when switching over to SMART terminals? This is the first article published
in the series of three similarly structured and content-wise articles and based on the project’s
division of development work. This article reports and shares the outcome of a passenger flow
use case study in terms of ethical requirements towards the project research. The project and
the division of work are described more in detail in section 3.</p>
      <p>The article is organized as follows: section one introduces the research motivation and
main goal for the study. Section two provides the theoretical background for the research,
while section three goes through the research framework and study setting. Section four then
elaborates the results and section five concludes the article with a discussion on the research
outcome.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Theoretical Background</title>
      <sec id="sec-2-1">
        <title>2.1. Passenger Flow</title>
        <p>
          As the number of people using transport systems increases, the flow of passengers is critical to
the success of an efective transport system as it afects movement through diferent service
points. Passenger flow (PF) involves navigating passengers (people, vehicles, cargo, ships,
machinery, and all the associated operations); and consists of the experience at each touchpoint
in the process. PF is becoming vital for resource scheduling, planning, public safety, and
risk management in transport systems [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. Some of its critical application areas include
prediction and forecasting to enable transport systems to significantly manage their operations
and resources [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. One of the main applications of PF is as a prediction tool in urban transport,
where it forms part of an essential technological resource for enabling sustainable and steady
development in transportation [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. As a prediction tool, PF tends to study patterns of crowd
travel behavior and form real-time trafic operation state evaluation, which can contribute to
schedule resources in trafic management [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>
          Passenger flow can be afected by various dynamic and complex factors, including dynamic
trafic routes, upgrade of transportation facilities, multifaceted transfer flows, rush hour, and
external influences such as bad weather [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. However, dynamic changes in global transport
infrastructure alongside the widespread adoption of digital technologies are increasingly
influencing how passenger flow is designed [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. The continuous growth of Industry 4.0 coupled with
unprecedented challenges such as COVID-19 means that the traditional methods of designing
passenger flow systems can no longer sufice and need to be replaced or complemented with
digital options in new technological spaces [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Part of this innovative way of designing PF
systems involves implementing intelligent technologies to help manage operations and maintain
facilities safely, securely, and environmentally friendly [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>
          This change in design approach from statistics to technologies such as Artificial Intelligence
(AI) has resulted in most studies in the review of the literature to focus on Machine Learning
(ML) and Deep Learning (DL) techniques to enhance PF [
          <xref ref-type="bibr" rid="ref12 ref16 ref17 ref18">16, 12, 17, 18</xref>
          ]. While some studies
have explored simulation approaches [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], most have embraced AI and associated technologies
in designing PF systems. As a result, PF systems are becoming an interconnected smart
environment involving big data, the Internet of Things (IoT), and AI that facilitates autonomous
practices [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
        </p>
        <p>
          However, designing AI-enabled passenger flow systems can be challenging due to the ethical
concerns connected with AI and associated technologies, such as ML. ML practices operate
mindlessly with no conscious understanding of the broader context of their processes and
cannot contemplate their actions’ ethics [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. In addition, the opaque nature of ML-powered
AI systems may create a challenge in apportioning responsibilities or explanations to relevant
actors in a case of redress or failure in sensitive situations resulting in diminished customer
confidence. Privacy and bias represent critical ethical challenges that developers tasked with
designing AI-enabled PF systems may encounter [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. Privacy and trust issues may emanate
from unethical customer data collection, violating users’ privacy [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. Users of the system may
question the various surveillance systems such as videos and cameras engaged in collecting
passenger flow data as invasive and their application. In addition, AI reportedly has a history
of unfairness regarding ethnicity, gender, and race [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], which may spark ethical concerns
about the quality of data and the bias that may ensue from its application. The EU analyses
that sustained use of AI systems could lead to breaches of fundamental human rights if ethical
issues remain unrestricted [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Ethically Aligned Design</title>
        <p>
          With the increasing calls for EAD, several organizations, governments, and research bodies
have attempted to tackle ethical AI concerns. One of the results is the principles approach,
where principles serve as guidelines in developing and deploying AI systems [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]. However,
developers still struggle to transition principles to practice due to a lack of actionable tools and
methods [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Furthermore, there is also a risk for unethical AI behavior at the design stage,
raising the issue of which ethical principle should be considered pertinent in designing and
managing AI-based systems[
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]. As a possible solution to address these concerns, the ECCOLA
method has been developed to action principles to practice as a tool that aids the EAD of AI
systems [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. ECCOLA was created by distilling fundamental AI ethics principles to guidelines
for AI developers at the design and development stages [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. In addition, ECCOLA can be
instrumental in producing (ethical) user stories to help define high-level requirements and, in
the process, translate ethical principles to tangible design requirements for developers of AI
systems [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          In addressing the ethical challenges associated with designing AI-enabled PF systems, the
ECCOLA method can serve as a solution for translating high-level requirements to system
requirements for developers in the form of user stories [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. ECCOLA as a user story tool can
prove instrumental in facilitating communication in defining high-level requirements for AI
systems developers. This practice can also serve as an ethical guide to help determine which
principles are applicable in a particular context and ensure that these guidelines translate into
action in the development of the AI-enabled system [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. As explained earlier, most research
on AI-enabled PF design focuses on improving the functionality as a prediction tool or metric
to measure passenger flow volume. A study by [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] outlines the need for a value-centered
approach in the ethical design of autonomous systems; however, it is not specific to AI ethics
[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Therefore, there is currently no research on using ethical development tools like ECCOLA
to generate user stories that can aid the EAD of an AI-enabled PF system.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. From User Stories to Ethical User stories</title>
        <p>In software engineering practice, user stories are industry-driven research (Agile Development)
and share some academic research of the area. Practically, user stories are a few sentence lines
of high-level customer requirements formed by the customer or by the developer team. They
are written on index cards, post-it notes, or predefined template that follows the same structure,
which is elaborated below in more detail. Sometimes a product owner is named by the developer
team to form user stories. These software requirements define the functions that are needed
for the software to work. Non-functional requirements define the needs that are vital for the
software to work e.g. reliable, and that it is experienced usable, consistent, and safe to use, and
among others, it is ethically aligned.</p>
        <p>
          The developer team creates many user stories, where ready user stories are prioritized and
the most valuable user stories towards the customer, are used in the first sprint of software
development, where they are picked from the product bag log. [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ] When the non-functional
requirements define the need that is vital for the software to work e.g. reliable and safe, themes
shared with the ECCOLA method, we can exploit the non-functional requirements categorization
towards Ethical User story practice and describe that ethical user stories relate to non-functional
requirements. In detail, the user stories are divided into two main sections. The first section
describes the particular requirement which is formulated: ”as a [user], I want to [capability],
so that [receive benefit]”.[
          <xref ref-type="bibr" rid="ref29">29</xref>
          ] The second part will ofer the resolution for the requirement:
“What needs to be done”. [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ] As an example of Smart terminal Ethical User stories: “As a data
analyst (or the appropriate role) using the bought data for the system, I would like to know
that the data are of good quality and not biased so that I can provide an efective and unbiased
service for users of the system.” What needs to be done”, part is a customer-driven (acceptance)
tests that give the customer requirement a practical mean to form a real-world software feature.
Sometimes the agile requirements team uses a ready formula for the acceptance phase that
follows a pattern of,[Given][When][Then], which gives the acceptance test a context, action
to be carried out, and consequences to be obtained. [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ] For the given example above, the
acceptance criteria could be: “Documentation and logs of data sources for traceability are kept.”
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Research Framework</title>
      <p>This section will go through the research in a more concrete grip by explaining the research
framework and methods used, the research context within the study project in question, and the
concepts of passenger flow and EAD in more practical terms. This article studied the phenomena
of ethical user story development and reports the content of one a use case (the Passenger Flow).</p>
      <sec id="sec-3-1">
        <title>3.1. Study Background</title>
        <p>
          The research philosophical background is positioned into interpretative qualitative research
as the research aims to understand the context or/and process of the Information System (IS).
[
          <xref ref-type="bibr" rid="ref31">31</xref>
          ] IS in this sense comprise the concepts of AI/AS and Smart systems. The research itself was
conducted as an experiment, where the steps in the experiment process [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ] is approximately
followed in the line of this research. The research scope was determined by the project (this is
explained more in the following chapters), but the rest for the research execution was planned
for this experiment according to [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ]. The empirical material was collected according to study
design in Figure 1. in a six (6) month timeline in 2021. Several activities and group sessions were
arranged in that period to collect the empirical material. Raw data, consisting of 300+ notes,
were documented in three (3) workshops during summer 2021, held by the research group.
Participants invited to the workshop were mainly from industrial and institutional partners
that were assigned for the first phase of the project.
        </p>
        <p>The project in question produces and shares information between ten (10) industrial partners
and five (5) research institutes with the lead of an R&amp;D company. University of Jyväskylä
(JYU) was responsible for the EAD, where the main target of the study was to introduce the
requirements for EAD in Smart terminals. The leading company had divided the development
work into three (3) use cases: Ship Turnaround, Truck Trafic, and Passenger Flow (PF). PF is
further polarized into two sub-use cases: PF with and without a vehicle. As mentioned earlier,
this article concentrates on the passenger flow with and without a vehicle.</p>
        <p>
          In practical terms, the use case passenger flow in the study project is targeting the optimization
of passenger oflw in their end-to-end journey by improving diferent sub-systems by providing
concrete research-based recommendations on business, data usage &amp; sharing utilizing e.g.
situational awareness. [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] This research group has approached this mission and concrete
recommendations through software development methods, more precisely Agile software
development. Through the practice of Ethical User Stories (EUS), the study project will receive
a tangible outcome of the EAD study, the research-based recommendations.
        </p>
        <p>
          Section EAD described the ECCOLA method applicability. In practice, ECCOLA is a method
that uses gamification technique that empowers ethical thinking in the product development
process, especially AI/AS systems. It has 21 cards to choose from with content of AI ethics
principles, 8 themes with each theme holding 1-6 card topics, also AI ethics principles. According
to ECCOLA Game Sheet, the method is intended to be used during the entire design and
development process in three steps: 1. prepare, as choosing the relevant cards, 2. review,
as keeping the chosen cards in hand during a single task, and 3. evaluate, as reviewing to
check if all planned actions are taken.[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] Ethical user story practice can use any ethics-related
design/development framework from the field of engineering or technology design, but as
ECCOLA is developed particularly to AI software development, traditional SW is deterministic
and AI is probalistic [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] and in the perspective of agile software development, for us, it was
natural to use this method that fits to the study context.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Data Collection and Study Design</title>
        <p>The process of making user stories based on EAD, using the ECCOLA method was multi-staged,
evolving ad hoc. The study design is witnessed in detail in figure 1, where the data collection
took place. The three (3) use cases were managed in three (3) virtual workshops and were
individually processed.</p>
        <sec id="sec-3-2-1">
          <title>3.2.1. First phase</title>
          <p>In the first phase, the use case owners were asked to choose themes to suit best in their context
use case. In Passenger Flow the themes of the chosen ECCOLA cards are listed in Table 1. Cards
were placed on an online whiteboard for reference. Each workshop took 1,5h to 2h, where
the themes and topics of the cards were processed separately in 5 sprints, every sprint taking
around 10 minutes. To enhance discussion participants were divided into break-out rooms
with a facilitator from the AI Ethics lab. Participants were trained with EAD and ECCOLA
methods and also instructions were given to make notes on the whiteboard. The idea of the
workshop was to process any ethics-related concerns or issues that weren’t addressed earlier in
the project.</p>
          <p>Participants made notes based on the discussion or based on their previous experience in the
project and the notes were then later on transferred to a matrix in a spreadsheet for thematical
classification. Card topics were placed in the horizontal column and the following categories in
vertical column. As the notes were previewed by one researcher, the overall experience of the
review concluded into three (3) main categories for all the use cases:
• Human-centric;
• Technology or Practicality-centric;
• Data &amp; Information-centric;</p>
          <p>The purpose of the categorization refers to the following phase, the second study phase.</p>
        </sec>
        <sec id="sec-3-2-2">
          <title>3.2.2. Second phase</title>
          <p>Due to developers’ diferent backgrounds, the idea of the categorization was to ease the
development of ethical user stories. Developers could choose the most convenient note for their
expertise. So, in the second phase, researchers from the AI Ethics Lab, altogether twelve (12),
were invited to the activity. Eight (8) developers accepted the virtual activity to create ethical
user stories from the workshop notes. With diferent professional and academic backgrounds,
the development team proceeded in several sprints and met several times online to proceed
with the flowing assignment, meaning that the recurring meeting was taken as many times
as the applicable notes were left on the spreadsheet. Demographic details are listed in table 2.
To study more about the phenomena from the developers’ perspective the Ethical User Story
development team was interviewed at the end of the process about their experience on the
activity and the study content/design. Questions are listed below:
• How did you experience this Ethical User Story activity?
• How did you experience the process of creating this Ethical User Story activity?
• Feedback on the activity.</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Data Analysis</title>
        <p>
          Qualitative data analysis was used to interpret the empirical material. The grounded theory
method (GTM) was chosen as a coding method for analyzes of the data collected. The ethical
User story is a novel research area so the GTM was the most suitable method to use in the
research as there are no previous studies of the subject so far [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ]. GTM method is also
suitable when conclusions are inductively drawn from the data instead of in traditional research,
deductively.[
          <xref ref-type="bibr" rid="ref34">34</xref>
          ] GTM coding technique Memoing was used to note ideas or insights of the
empirical study [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ]. Notes from the first phase were categorized using thematical classification.
As mentioned in the second phase of data collection, the developers were chosen from the same
research group as it was convenient for the study to continue in a reasonable time frame. The
method used, convenient purposeful sampling [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ], is described to be implemented studies
where participants are chosen for their ease access to the study[
          <xref ref-type="bibr" rid="ref35">35</xref>
          ]. Developers used the same
strategy (convenient purposeful sampling) in note processing to the point where saturation
was achieved. Primary Empirical Conclusions (PEC) illustrate the discoveries made during the
study to report the research findings.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Reporting the Results</title>
      <p>
        Ethical user story development progressed according to the theory[
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] and is witnessed in the
walkthrough of Ethical User stories found from appendix 1. and in examples in table 4. The
study revealed several focus areas that were relevant to the assigned research questions and
mostly, the study concentrated in how to make ethical user stories and the study proved that in
practice a model approach was the main discovery during the study.
      </p>
      <p>This results section reports the ethical user story development outcome with numerical data,
following PEC’s that are introduced in table 3 and reviewed below. 65% of the the passenger
lfow use case workshop notes were applicable and altogether 125 ethical user stories were made.
As discussed earlier in the data analysis section, the second phase, user story development,
continued as long as the data was reaching the saturation point, where nothing new was
discovered from the material.</p>
      <p>
        According to the reported discoveries, altogether five (5) PEC’s from the study were
documented. First, PEC1 ECCOLA, which was utilized here as an ethical framework is a thinking
tool, which succesfully lead to operationalizing the ethical principles through the user story
development. Developers experienced that when the process was ready to set up, it took the
pressure out of making ethical user stories and was considering doing ”plain” user stories,
which eventually helped the development work. In previous AI ethics related studies developers
experience that considering ethical aspects in the developers workflow is not in their zone of
expertise. According to [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ] developers consider ethics as important in principle, but impractical
and distant from the issues they face in their work and address in [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ] that "A product owner’s
responsibility is to make sure that sprint backlog items have ethical user stories included."[
        <xref ref-type="bibr" rid="ref37">37</xref>
        ]
      </p>
      <p>PEC2 In this study, the developers described their experience in the activity in a very
comprehensive manner. First, developers reported that it was a great avenue to learn as the process was
an easy hands-on session, even though a little bit ad-hoc in character. Also, it was much more
understandable to see it in practice as one of the developers expressed: “Being a participant of
developing ethical user stories, it was much easy to understand how exactly someone could put it
into practice.” Second, conversations taken after each sprint was experienced good, as some of
the ethical user stories were revised to follow the theory base of user story practise and to clarify
the ethical user story content. Third, overall feeling about the development of user stories was
experienced as a very efective way of doing ethical user stories. Only the downside was that it
was challenging to write user stories when the context was unknown. On the other hand, it
gave freedom to be more creative when the mind wasn’t set into any particular environment or
Example
Example 1
Example 2</p>
      <p>Authentic Note
Before a person with a
vehicle enters the port,
they are given
explanation of what
information will be handled, for
example at the stage
of making a reservation
when they agree to give
the necessary
information of their vehicle.</p>
      <p>Why are you asking my
data and for what?</p>
      <p>Examples of ethical user stories</p>
      <p>Ethical User Story
As a passenger, I want
to know exactly what
information about my
vehicle and implicitly, me,
is being processed by the
port, so I can feel safe
and informed.</p>
      <p>As a passenger using the
terminal services, I want
to know what data is
collected of me and why, so
that I can feel secure that
my information is safe.</p>
      <p>Acceptance criteria
Before a person with a
vehicle enters the port,
they are given
explanation of what
information will be handled, for
example at the stage
of making a reservation
when they agree to give
the necessary
information of their vehicle.</p>
      <p>A detailed document
explaining the extent of the
system’s data use should
be prepared and
available to customers upon
request.
scenario. Also, sometimes it was not that easy to produce user stories out of the workshop raw
data due to notes’ open-ended character and were regarded as unusable as they had unclear
content or vagueness in context. Lastly, participants noted that it was interesting to see the
further steps in the process.</p>
      <p>
        PEC3 The study design in Figure 1. was one of the main focus areas in the research question
execution and central factor for reporting study results. The documented Ethical user story
development model was unfolding to a two-phased process model that was experienced as a
pleasant approach to ethical user story development. What became the essence of the Ethical
User story model was the instrument used in the process first phase, meaning the ethical
framework that functioned as a filtering thinking tool in the process. [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ] introduces a framework
for method adoption in software development, where the preceding tools in operational tools
are the thinking tools, ECCOLA being the thinking tool and ethical user story practise the
operational tool.
      </p>
      <p>
        PEC4 As there are no corresponding empirical research of ethical user stories, we could not
make any scientific conclusion about the numerical data. Instead, the documented work that
we were engaged with the study project, did get a large amount of research data, the ethical
requirements, as we managed to develop 125 ethical user stories, for this particular use case.
This large amount of ethical user stories gave rise to further development needs with the ethical
user story development model as it didn’t take into account the ethical user story validation
phase. Validation process is a task that the customer team is responsible for [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>
        PEC5 Development of the model roles and task is one area of concentration in the future.
In the current study, e.g. the study project (use case owner) provided the ethical themes via
ECCOLA method, for ethical requirement elicitation and the developer team made the ethical
user stories. In the long run, as the project follows, the use case owner then validates the user
stories. In theory the validating usually is efective during the user story development that the
customer team makes [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. In the current study, the roles and tasks are diferent. Also, some
minor lessons-learned discoveries were made after the study of the afore mentioned roles and
tasks refinement. E.g. as the recurring development meetings took place, any logs of attendance
wasn’t kept and developers’ participation to the ethical user story development was carried
out alongside other work. Project context and the use case environment were glanced at the
beginning of the user story sprints to give a picture of the environment, but if the developer
missed the opening meeting the developer might have experienced dificulties relating the
development context. Like, developers expressed, this was not only negative observation, it
also gave positive reaction to ethical user story development.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions and Discussion</title>
      <p>In this section, we will elaborate on the meaning, relevance, and importance of the results. The
results indicate that findings from the study are promising towards ethical user story practice.
The following research questions were addressed: “How to make ethical user stories?” and
What are the ethical requirements in the Maritime industry, especially in port terminals when
switching over to SMART terminals? The formation of these research questions was influenced
by the research framework, where the qualitative research methodology and qualitative data
gave a direction for researching the study design to data analysis and further on findings
discovery.</p>
      <p>The Ethical User Story practice, meaning the process, where the EAD tool ECCOLA was
used in the research framework, empowered and released the developers from the heavy
burden of ethical consideration. Through the Ethical User story process, the project received
research-based recommendations on business, data usage sharing, and much more with ethical
consideration. This ethical user story process can be considered ad-hoc and developed as the
project evolves but follows the utilized AI ethics principles powered design tool, ECCOLA.</p>
      <p>
        The research was motivated by the industry, where EAD is challenged. The challenge referred
to the missing tools for operationalizing the principles in EAD to the workflow of software
engineers[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. A novel idea of ethical user stories has been introduced by research groups
globally [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">7, 8, 6</xref>
        ] and this research in question took, in the forefront, the novel idea into practice
in the current study project.
      </p>
      <p>
        The first question was unfolding to study the process of how the make ethical user stories.
The study proved that the model in figure 1 is a starting point for the process of making ethical
requirements. It was discovered that when the experts of the context field develop the ethical
user stories, the second phase validates the user stories. The third phase is required when the
experts of the context field are not present validating them. This implies that there is room for
ethical user story model development, but the tool, for implementing ethical principles into
practice exists with this novel approach. This is not a surprise as the phenomena of ethical user
stories are first time explored in the current study. Implications from the [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ] study state that
large-scale implementation of ethical AI standards and certification, is yet to happen and points
out that the field of AI ethics is in a formative stage.
      </p>
      <p>
        AI research has laid their concerns of AI-enabled SW systems [
        <xref ref-type="bibr" rid="ref21 ref23 ref24">24, 21, 23</xref>
        ] and in this study
context particularly, in the PF [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. The second question of ethical requirements in the current
study untangled the call for ethical requirements with an outcome presented in appendix 1.
This proves that the call for AI ethical concerns has been heard and this state-of-the-practice
tool, especially for AI SW practitioners, manages to turn ethical principles into industrial
requirements for further development. The experiment provides new insight into the major
trending technological projects that are concerned with the implications when transferring
from traditional to modern, digitalized systems. With AI ethical tools, findings are significant
for industry and research as:
a. Manageable, usable, and eficient tool for implementing ethical principles to the workflow
of SW engineers exist with the ethical user story model
b. The field of AI ethics is forming towards practical research especially with SW engineering
      </p>
      <p>This was a pilot study project towards ethical user story development. More similar kinds of
studies are needed to find out the right model to make validated ethical user stories applicable in
modern SW system development. It would be interesting to see the model in diferent domains
of AI systems development. We are suggesting that several SW companies take the initiative
to test the model in practice to get more scientific data for the ethical user story development
model.</p>
      <sec id="sec-5-1">
        <title>5.0.1. Acknowledgments</title>
        <p>The authors would like to thank the Smarter project parties involved in the workshops and the
developers of ethical user stories for their active participation in the experiment. The authors
also gratefully acknowledge being funded by the Business Finland research project Sea4Value
Smarter.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Oy</surname>
          </string-name>
          ,
          <source>Sea for value (s4v)</source>
          ,
          <year>2021</year>
          . URL: https://www.dimecc.com/dimecc-services/s4v/.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D.</given-names>
            <surname>Oy</surname>
          </string-name>
          , Smart terminals - smarter,
          <year>2021</year>
          . URL: https://www.dimecc.com/dimecc-services/ smart-terminals-smarter/.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jobin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ienca</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Vayena,</surname>
          </string-name>
          <article-title>The global landscape of ai ethics guidelines</article-title>
          ,
          <source>Nature Machine Intelligence</source>
          <volume>1</volume>
          (
          <year>2019</year>
          )
          <fpage>389</fpage>
          -
          <lpage>399</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
            <surname>Dignum</surname>
          </string-name>
          ,
          <article-title>Ethics in artificial intelligence: introduction to the special issue</article-title>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J. P.</given-names>
            <surname>How</surname>
          </string-name>
          ,
          <article-title>Ethically aligned design [from the editor]</article-title>
          ,
          <source>IEEE Control Systems Magazine</source>
          <volume>38</volume>
          (
          <year>2018</year>
          )
          <fpage>3</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.</given-names>
            <surname>Halme</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vakkuri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kultanen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jantunen</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-K. Kemell</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Rousi</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Abrahamsson</surname>
          </string-name>
          ,
          <article-title>How to write ethical user stories? impacts of the eccola method</article-title>
          ,
          <source>in: International Conference on Agile Software Development</source>
          , Springer, Cham,
          <year>2021</year>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kamthan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shahmir</surname>
          </string-name>
          ,
          <article-title>On ethically-sensitive user story engineering</article-title>
          ,
          <source>in: 2021 4th International Conference on Computer Science and Software Engineering (CSSE</source>
          <year>2021</year>
          ),
          <year>2021</year>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>79</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Leijnen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Aldewereld</surname>
          </string-name>
          ,
          <string-name>
            <surname>R. van Belkom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bijvank</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ossewaarde</surname>
          </string-name>
          ,
          <article-title>An agile framework for trustworthy ai</article-title>
          .,
          <source>in: NeHuAI@ ECAI</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>H.</given-names>
            <surname>Perera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hoda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Shams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nurwidyantoro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Shahin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Whittle,</surname>
          </string-name>
          <article-title>The impact of considering human values during requirements engineering activities</article-title>
          ,
          <source>arXiv preprint arXiv:2111.15293</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vakkuri</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-K. Kemell</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Jantunen</surname>
            , E. Halme,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Abrahamsson</surname>
          </string-name>
          ,
          <article-title>Eccola-a method for implementing ethically aligned ai systems</article-title>
          ,
          <source>Journal of Systems and Software</source>
          <volume>182</volume>
          (
          <year>2021</year>
          )
          <fpage>111067</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Peng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Z. A.</given-names>
            <surname>Bhuiyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Gong</surname>
          </string-name>
          , L. Liu,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Deep irregular convolutional residual lstm for urban trafic passenger flows prediction</article-title>
          ,
          <source>IEEE Transactions on Intelligent Transportation Systems</source>
          <volume>21</volume>
          (
          <year>2019</year>
          )
          <fpage>972</fpage>
          -
          <lpage>985</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Peng</surname>
          </string-name>
          , L. Liu,
          <string-name>
            <given-names>G.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ma</surname>
          </string-name>
          , L.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>M. Z. A.</given-names>
          </string-name>
          <string-name>
            <surname>Bhuiyan</surname>
          </string-name>
          ,
          <article-title>Graph cnns for urban trafic passenger flows prediction</article-title>
          ,
          <source>in: 2018 IEEE SmartWorld, Ubiquitous Intelligence &amp; Computing</source>
          ,
          <string-name>
            <given-names>Advanced &amp; Trusted</given-names>
            <surname>Computing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Scalable</given-names>
            <surname>Computing</surname>
          </string-name>
          &amp;
          <article-title>Communications, Cloud &amp; Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM</article-title>
          /UIC/ATC/CBDCom/IOP/SCI), IEEE,
          <year>2018</year>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>C.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Gong</surname>
          </string-name>
          ,
          <article-title>Passenger flow prediction based on land use around metro stations: a case study</article-title>
          ,
          <source>Sustainability</source>
          <volume>12</volume>
          (
          <year>2020</year>
          )
          <fpage>6844</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Krile</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Maiorov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Fetisov</surname>
          </string-name>
          ,
          <article-title>Modernization of the infrastructure of marine passenger port based on synthesis of the structure and forecasting development</article-title>
          ,
          <source>Sustainability</source>
          <volume>13</volume>
          (
          <year>2021</year>
          )
          <fpage>3869</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Molavi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. J.</given-names>
            <surname>Lim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Race</surname>
          </string-name>
          ,
          <article-title>A framework for building a smart port and smart port index</article-title>
          ,
          <source>International Journal of Sustainable Transportation</source>
          <volume>14</volume>
          (
          <year>2020</year>
          )
          <fpage>686</fpage>
          -
          <lpage>700</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jia</surname>
          </string-name>
          ,
          <article-title>Deeppf: A deep learning based architecture for metro passenger flow prediction</article-title>
          ,
          <source>Transportation Research Part C: Emerging Technologies</source>
          <volume>101</volume>
          (
          <year>2019</year>
          )
          <fpage>18</fpage>
          -
          <lpage>34</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cheng</surname>
          </string-name>
          , M. Trépanier, L. Sun,
          <article-title>Incorporating travel behavior regularity into passenger lfow forecasting</article-title>
          ,
          <source>Transportation Research Part C: Emerging Technologies</source>
          <volume>128</volume>
          (
          <year>2021</year>
          )
          <fpage>103200</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>B.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yu</surname>
          </string-name>
          , G. Xu,
          <article-title>Travel characteristics analysis and passenger flow prediction of intercity shuttles in the pearl river delta on holidays</article-title>
          ,
          <source>Sustainability</source>
          <volume>12</volume>
          (
          <year>2020</year>
          )
          <fpage>7249</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>O.</given-names>
            <surname>Rexfelt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Schelenz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Karlsson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Suescun</surname>
          </string-name>
          ,
          <article-title>Evaluating the efects of bus design on passenger flow: Is agent-based simulation a feasible approach?</article-title>
          , Transportation Research Part C:
          <article-title>Emerging Technologies 38 (</article-title>
          <year>2014</year>
          )
          <fpage>16</fpage>
          -
          <lpage>27</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>A. de Barcelona</surname>
          </string-name>
          ,
          <article-title>The evolution of sea transport: 4th generation ports, Barcelona Treb</article-title>
          .,
          <string-name>
            <surname>Barcelona</surname>
          </string-name>
          , Spain,
          <source>Tech. Rep</source>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Asatiani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Malo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. R.</given-names>
            <surname>Nagbøl</surname>
          </string-name>
          , E. Penttinen,
          <string-name>
            <given-names>T.</given-names>
            <surname>Rinta-Kahila</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Salovaara</surname>
          </string-name>
          ,
          <article-title>Sociotechnical envelopment of artificial intelligence: An approach to organizational deployment of inscrutable artificial intelligence systems</article-title>
          ,
          <source>Journal of the Association for Information Systems</source>
          <volume>22</volume>
          (
          <year>2021</year>
          )
          <article-title>8</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Clever</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Crago</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Al-Jaroodi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Mohamed</surname>
          </string-name>
          ,
          <article-title>Ethical analyses of smart city applications</article-title>
          ,
          <source>Urban science 2</source>
          (
          <year>2018</year>
          )
          <fpage>96</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>M. J. Culnan</surname>
          </string-name>
          ,
          <article-title>Policy to avoid a privacy disaster</article-title>
          ,
          <source>Journal of the Association for Information Systems</source>
          <volume>20</volume>
          (
          <year>2019</year>
          )
          <article-title>1</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Dasgupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. D.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <article-title>An empirical study on algorithmic bias</article-title>
          ,
          <source>in: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>1189</fpage>
          -
          <lpage>1194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>E.</given-names>
            <surname>Commission</surname>
          </string-name>
          ,
          <article-title>White paper on artificial intelligence-a european approach to excellence and trust</article-title>
          ,
          <source>Com</source>
          (
          <year>2020</year>
          ) 65 Final (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vakkuri</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-K. Kemell</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Abrahamsson</surname>
          </string-name>
          ,
          <article-title>Eccola-a method for implementing ethically aligned ai systems</article-title>
          ,
          <source>in: 2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>195</fpage>
          -
          <lpage>204</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>A.</given-names>
            <surname>Brendel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mirbabaie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Lembcke</surname>
          </string-name>
          , L. Hofeditz,
          <source>Ethical management of artificial intelligence. sustainability</source>
          <year>2021</year>
          ,
          <volume>13</volume>
          ,
          <year>1974</year>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>J.</given-names>
            <surname>Leikas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Koivisto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Gotcheva</surname>
          </string-name>
          ,
          <article-title>Ethical framework for designing autonomous intelligent systems</article-title>
          ,
          <source>Journal of Open Innovation: Technology, Market, and Complexity</source>
          <volume>5</volume>
          (
          <year>2019</year>
          )
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>M.</given-names>
            <surname>Cohn</surname>
          </string-name>
          ,
          <article-title>User stories applied: For agile software development</article-title>
          ,
          <string-name>
            <surname>Addison-Wesley Professional</surname>
          </string-name>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Alliance</surname>
          </string-name>
          , Given - when - then.,
          <year>2021</year>
          . URL: https://www.agilealliance.org/glossary/gwt/.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>H. K.</given-names>
            <surname>Klein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. D.</given-names>
            <surname>Myers</surname>
          </string-name>
          ,
          <article-title>A set of principles for conducting and evaluating interpretive ifeld studies in information systems</article-title>
          , MIS quarterly (
          <year>1999</year>
          )
          <fpage>67</fpage>
          -
          <lpage>93</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>C.</given-names>
            <surname>Wohlin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Runeson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Höst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Ohlsson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Regnell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wesslén</surname>
          </string-name>
          , Experimentation in software engineering, Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vakkuri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jantunen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Halme</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-K. Kemell</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Nguyen-Duc</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Mikkonen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Abrahamsson</surname>
          </string-name>
          ,
          <article-title>Time for ai (ethics) maturity model is now</article-title>
          ,
          <source>arXiv preprint arXiv:2101.12701</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wiesche</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Jurisch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. W.</given-names>
            <surname>Yetton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Krcmar</surname>
          </string-name>
          ,
          <article-title>Grounded theory methodology in information systems research</article-title>
          ,
          <source>MIS quarterly 41</source>
          (
          <year>2017</year>
          )
          <fpage>685</fpage>
          -
          <lpage>701</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Palinkas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Horwitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Green</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Wisdom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Duan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Hoagwood</surname>
          </string-name>
          ,
          <article-title>Purposeful sampling for qualitative data collection and analysis in mixed method implementation research, Administration and policy in mental health</article-title>
          and
          <source>mental health services research</source>
          <volume>42</volume>
          (
          <year>2015</year>
          )
          <fpage>533</fpage>
          -
          <lpage>544</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vakkuri</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-K. Kemell</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Kultanen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Siponen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Abrahamsson</surname>
          </string-name>
          ,
          <article-title>Ethically aligned design of autonomous systems: Industry viewpoint and an empirical study</article-title>
          , arXiv preprint arXiv:
          <year>1906</year>
          .
          <volume>07946</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vakkuri</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-K. Kemell</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Kultanen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Abrahamsson</surname>
          </string-name>
          ,
          <article-title>The current state of industrial practice in artificial intelligence ethics</article-title>
          ,
          <source>IEEE Software 37</source>
          (
          <year>2020</year>
          )
          <fpage>50</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>C.</given-names>
            <surname>Ebert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Abrahamsson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Oza</surname>
          </string-name>
          ,
          <article-title>Lean software development</article-title>
          ,
          <source>IEEE Computer Architecture Letters</source>
          <volume>29</volume>
          (
          <year>2012</year>
          )
          <fpage>22</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>A.</given-names>
            <surname>Seppälä</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Birkstedt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mäntymäki</surname>
          </string-name>
          , From ethical ai principles to governed
          <source>ai</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>