<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Your (AI) Program ming Partner: A Design Fiction about Generative AI for Software Engineering</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Michael Muller</string-name>
          <email>michael_muller@us.ibm.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Steven Ross</string-name>
          <email>steven_ross@us.ibm.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stephanie Houde</string-name>
          <email>stephanie.houde@ibm.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mayank Agarwal</string-name>
          <email>Mayank.Agarwal@ibm.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fernando Martinez</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>John Richards</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kartik Talamadupula</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Justin D. Weisz</string-name>
          <email>jweisz@us.ibm.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Helsinki, Finland</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>IBM Research</institution>
          ,
          <addr-line>Cambridge MA</addr-line>
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>IBM Research</institution>
          ,
          <addr-line>Seattle WA</addr-line>
          <country country="US">USA</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>IBM Research</institution>
          ,
          <addr-line>Yorktown Heights NY</addr-line>
          <country country="US">USA</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>IBM</institution>
          ,
          <addr-line>Capital Federal</addr-line>
          ,
          <country country="AR">Argentina</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>We contribute</institution>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Workshop Proce dings</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>potential futures. instance. Using design fiction, we develop a series of possible generative AI features and applications that could be developed in the future of humans' roles in software engineering. We use the fiction to highlight choices and value-tensions among these Generative AI; Software engineering; Workplace; Design fictions; Code-as-instance; Activity-as-instance; Employee-asCEUR</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <sec id="sec-1-1">
        <title>Generative AI has the potential to improve practical</title>
        <p>work in software engineering [ 1, 2, 3, 4, 5, 6, 7, 8, 9].</p>
      </sec>
      <sec id="sec-1-2">
        <title>These technologies are powerful, but there are increas</title>
        <p>ing - and increasingly diverse - potential risks of
applying generative AI to human work and human
outcomes [10, 11, 12, 13, 14, 15]. In a paper at the 2020</p>
      </sec>
      <sec id="sec-1-3">
        <title>HAIGEN workshop, we explored potential future societal</title>
        <p>problems with generative AI through the use of
participatory design fictions [ 10]. In those three fictions, we
invited our colleagues to speculate on possible societal
harms from generative AI applications.</p>
        <p>Here, we shift our strategy toward workplaces, and we
try to take a more balanced view, considering both
potential benefits and potential risks of generative applications
in workplaces of the future. Workplace adaptations due
to the COVID pandemic have accelerated sociotechnical
trends of changed work-practices and changed
technolognEvelop-O
(J. D. Weisz)</p>
        <p>0000-0001-7860-163X (M. Muller); 0000-0002-2533-9946 (S. Ross);
0000-0002-0246-2183 (S. Houde); 0000-0002-8442-2651
(M. Agarwal); 0000-0001-7172-4805 (F. Martinez);
0000-0001-8489-2170 (J. Richards); 0000-0002-4628-3785
(K. Talamadupula); 0000-0003-2228-2398 (J. D. Weisz)
and
tional needs
• an interrelated set of speculations regarding
future generative AI applications in workplaces,
• a consideration of some value tensions that may
emerge between employee needs and
organiza</p>
      </sec>
      <sec id="sec-1-4">
        <title>We also critique our work as being half-done, and we</title>
        <p>describe possible ways to complete the work in the near
future.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>Engineering</title>
      </sec>
      <sec id="sec-2-2">
        <title>2.1. Generative AI for Software</title>
        <sec id="sec-2-2-1">
          <title>One of the strengths of generative algorithms and ap</title>
          <p>plications is their ability to create instances from a
”learned” class of examples, including projects that
involve images [18, 19, 20], videos [21], music [22, 23],
molecules [24, 25], texts of many types [26, 27, 28, 29, 30],
and diverse other media and categories (e.g., [31, 32, 33]).</p>
        </sec>
        <sec id="sec-2-2-2">
          <title>When analyzed as sequences of tokens, these ”learned”</title>
          <p>patterns can function as predictions of (e.g.) the next
word in a text or a software program; this
”next-insequence” aspect is a major focus of this paper, here futures for their human implications and impacts [64, 65].
extended to the ”next” user actions. We hope that design fictions can contribute to the
mixed</p>
          <p>While there is not space in this position paper to review initiative discussions mentioned earlier, focusing
attenthe rich history of generative algorithms, we note briefly tion the types of relationships that we envision between
that many reports describe generative AI applications humans and AIs [47, 66].
with both potential benefits [ 34, 35, 36] and potential Design fictions may take several forms, including text,
risks [37, 38, 39, 14, 12, 10] to individuals or societies. images, film, video, theatre, and physical objects [ 67,
Our team have been studying how generative application 68, 69, 70, 71, 17], and may be particularized into
recogscan provide significant value to software engineers [ 26, nizable genres such as fictional job adverts [ 72],
enact8, 28, 40], and our IUI 2022 paper reports measurable ments [73], technology probes [74, 75, 76], product
catasuccesses [27]. In this position paper, we ask what types logs [74], autobiographies [77], and even clearly-fictitious
of instances might be created in the future, and whether conference papers [78, 79]. More familiarly, design
ficorganizations or societies may wish to place limits on tions can take the form of stories [10, 66, 80, 81, 82, 83, 84,
the generation of certain types of instances. 85, 86, 71, 87, 88, 89]. We adopt the method of telling a</p>
          <p>In the history of theorizing mixed-initiative dynam- story, through which we explore trends and possibilities
ics between humans and AIs, most scholars have imag- at the intersection of technology, skilled human work,
ined batch-like processes in which one party (human and values.1
or AI) takes a first major step, and the second party (AI
or human) completes the work through a second major
step [41, 42, 43, 44, 45, 46, 47, 48]. While Conversational 3. Design Fiction
User Interfaces (CUIs) provide limited forms of on-going
interactions, the sheer computational requirements of 3.1. Crafting the Design Fiction
generative AI algorithms have made it dificult to de- Design fiction scholars emphasize that a fiction should
sign and build generative dialogic applications until re- provide a perceptual bridge [90] between the reader and
cently (e.g., [49, 50, 51]). An important problem in these novel concepts that may be challenging [64, 91] or even
dialogs will be how to control the generative AI execution upsetting [74, 66, 10]. The temporary suspension of
disfrom moment-to-moment - i.e., how to ”tune” [52, 53] or belief is considered important [92, 90], and this is
accom”steer” [22, 23] the algorithm toward outcomes of value plished through narrative integrity and consistency of
to their human partners. We speculate on how possible the imagined world [85, 93] and through empathy with
control-parameters might be provided to human users, its protagonists [94, 95]. Auger states that ”careful
manand how particular values of those parameters might agement of the speculation” is important, because ”if it
be recommended through content-based or social-based strays too far... the audience will not relate to the proposal
algorithms. resulting in a lack of engagement or connection” [90].
Design fictions use methods such as diegesis (the creation
2.2. Design Fictions of a story-world) to communicate new possibilities and
to discuss their consequences [96, 97, 16].</p>
          <p>For more than a decade, scholars have used design fic- We apply these principles by setting our story in a
rections as a core research method [16, 17]. Based on the- ognizable software engineering workplace - albeit with
orizing by Peirce [54] over a century ago, Dunne and futuristic tools and the gradual unveiling of an unsettling
Martin summarized the potential of design fictions as workplace culture. To avoid aspects of the ”uncanny
abductive methods, stating that valley” that can occur when AI agents behave in eerily
human ways [98, 15], we designed the conversational
style of the generative AI assistant - ”Your Programming
Partner (YPP)” - to be recognizably non-human - even
robotic in some ways.
“The designers who can solve the most
wicked problems do it through
collaborative integrative thinking, using
abductive logic, which means the logic of what
might be. Conversely, deductive and
inductive logic are the logic of what should
be or what is… [55] (italics added)</p>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>3.2. Strategic Ambiguity</title>
        <sec id="sec-2-3-1">
          <title>While design fictions are usually crafted for specific</title>
          <p>Abductive reasoning has also been claimed as a major intentions, it is also important that they act as
cultool for creatively building theory in approaches such
as grounded theory [56, 57, 58, 59] and thematic analy- 1Methodological treatments of how to approach or write design
sis [60, 61]. We apply future-oriented design fictions to if[c1ti7o]n,sHmuuasykobeetfoaul.nhduiunskMoa2r0k1u8ssstreuncatunrdinKgn,uBtlyzt[he1a6n],dSWturridgehet e[6t5a]l,.
extrapolate current phenomena and trends into possible and Cheon and Su [77]; see also Blythe and Encinas [68] and Baumer
futures [62, 63] and to begin to interrogate those possible et al. [78] for approaches to assessing or evaluating design fictions.
tural probes [99], actively engaging the reader to form
their own interpretations and to draw their own
conclusions [100, 101, 75, 16, 102]. Coulton et al. note that
”it seems that Design Fiction has ambiguity ‘baked in’
” [103], and researchers have tried to balance among
diegetic factors such as familiarity and consistency, vs.
the ambiguity that is needed to encourage new (e.g.,
abductive [55]) thinking among their readers [66, 68, 104].</p>
          <p>The strategy of ambiguity can be particularly
important if the fiction addresses value tensions [ 105, 84, 80].</p>
          <p>Ambe [83] and Huusko [64] argue that many technology
applications may have both utopian and dystopian
implications, and these implications may be diferent for
diferent stakeholders [106, 107]. Feminist technoscience
convergently urges us to consider each person’s perspective,
and to question power diferentials [ 108, 109, 110, 111].</p>
          <p>We noted above that design fictions may be designed
to raise challenging or upsetting questions. Using a
formulation from Haraway’s feminist theorizing [112],
Sondergaard et al. suggest that we need to ”stay with the
trouble” of value tensions in AI:
”Might we allow the [AI assistant] to be
not just good or bad, submissive or
dominant, but a complicated, contradictory
being?... The future world serves as a
projection of current issues and conflicts, and
thus the future becomes a way of looking
at ourselves and our culture.” [70]</p>
          <p>We tried to apply these rather open-ended concepts by
deliberately leaving certain details unspecified,
including the gender-identities of the actors, the nature of the
actors in certain workplace roles, and the reasons for the
loneliness that is experienced by the protagonist. We also
presented certain potential value tensions in a relatively
neutral way, to emphasize the questions rather than to
impose premature closure on complex ethical topics.</p>
          <p>For brevity, we now proceed directly to the design
ifction.
Drinking Chai with Your (AI) Programming Partner
&lt;1&gt; Tikaani had been postponing work to translate the UX of the
enormous BiggerFin application that their team was modernizing
from its legacy Cobol code. So much had changed in the decades
since BiggerFin was originally deployed. Everyone who had been on
the original BiggerFin team had retired or moved on to other jobs.</p>
          <p>Generative translation technologies had become increasing accurate
to convert the back-end code, but modernizing the UI was still a
challenge for AIs. The UI remained a challenge because web-based UI
technologies were now much better, and corporations’ expectations
for what was considered ”good design” had also changed. Today was
the day to do this! And it would distract Tikaani from the loneliness
of the ofice, with so many unoccupied desks. Fortunately, Tikaani
had a conversational generative AI (genAI) assistant that could help,
named ”Your Programming Partner” (YPP).
&lt;2&gt; Tikaani opened the spec from the design team, and called up YPP.</p>
          <p>YPP displayed ”Greetings follow. Good morning, Tikaani. Today we
will have a good day, a very good day,” and followed with
”Advertisement follows. Try BerryBytes in the ByteBar. They’re brainfood.</p>
          <p>They can reduce any unwanted aftertastes...”  
&lt;3&gt; During the previous modernization project, Tikaani had told YPP
that its nickname was going to be ”Y”. Tikaani pressed the
speech-totext key, and said ”Y, please review the spec,” and made a gesture to
tell YPP which document was the spec.
&lt;4&gt; “Drink chai,” said YPP. Tikaani took a sip of chai.
&lt;5&gt; After a brief pause, YPP displayed, “To perform a generative
translation from spec to architecture. a set of examples is required.
Recommendations follow: Finance/big-institution; Finance/small-institution;
Corporate; SMB; or say ‘other’ for non-recommended domains.” Each
recommendation was displayed as a selectable button, so that Tikaani’s
choice would immediately lead to action by YPP.</p>
        </sec>
        <sec id="sec-2-3-2">
          <title>Motivation and Setting.</title>
        </sec>
        <sec id="sec-2-3-3">
          <title>Problems with legacy applications [26, 27].</title>
        </sec>
        <sec id="sec-2-3-4">
          <title>Why is the ofice so empty?</title>
        </sec>
        <sec id="sec-2-3-5">
          <title>Introduce the AI Assistant.</title>
        </sec>
        <sec id="sec-2-3-6">
          <title>Establish YPP’s robotic voice, re</title>
          <p>ducing the likelihood of uncanny
valley efects [ 113, 114].</p>
          <p>Messages from multiple entities
may be delivered through the YPP
conversational interface.</p>
        </sec>
        <sec id="sec-2-3-7">
          <title>Personalization of the social presence of the AI.</title>
        </sec>
        <sec id="sec-2-3-8">
          <title>Speech-to-text. Gestural component of UI.</title>
        </sec>
        <sec id="sec-2-3-9">
          <title>Introduce a theme that will become complexified later.</title>
        </sec>
        <sec id="sec-2-3-10">
          <title>Combined nature of recommendations as both informational and actionable.</title>
          <p>
            &lt;6&gt; While it was true that BiggerFin was indeed a large financial
client and would have been a partial match to “Finance/big-institution,”
the clients of BiggerFin for this service would be people and small
businesses seeking micro-loans. Tikaani wanted to use a more social
search strategy to make their choice. There was no one nearby to
ask, so Tikaani typed, ”Display team members along with the number
of financial projects they have worked on.” YPP produced the list,
again making each row of the displayed table into a button-for-action.
Tikaani saw that Yu had worked on 20 similar projects. Yu had been
Tikaani’s mentor when they joined the company, and Tikaani missed
the days when they had traded ironic comments over tea. Tikaani
gestured to the “Yu – Finance projects” row, and YPP accepted this
gesture as a choice+command, and began to work.
&lt;7&gt; YPP displayed, “Further guidance is required. Recommendations
follow. (
            <xref ref-type="bibr" rid="ref102 ref123 ref126">1</xref>
            ) Granularity of microservices can be one of: micro, mini, or
macro. Macro is recommended. (
            <xref ref-type="bibr" rid="ref51">2</xref>
            ) Optimization can be a weighted
sum of: performance, maintainability, alignment-to-code,
alignmentto-usage/natural-seams, alignment-to-data. Balanced weights are
recommended.” Tikaani revised the granularity to micro, and accepted
YPP’s recommendations about optimization weights.
&lt;8&gt; YPP asked, ”You usually prefer a JupyterGen notebook rather
than VSEdit. Decision required: Should a JupyterGen notebook with
your usual defaults be used for this project?”
&lt;9&gt; YPP opened a JupyterGen notebook on Tikaani’s display, and
prepopulated the first cell with relevant Python libraries. Some of the
libraries were open source, and some were proprietary libraries used
to brand the modernized UXs as the company’s products. YPP wrote
major module names into the markdown cells that preceded each code
cell, and added draft documentation for the classes that each code cell
would contain. YPP wrote stub code into some cells, and proposed
full implementations into other cells.
          </p>
        </sec>
        <sec id="sec-2-3-11">
          <title>Human can override AI’s recommendation... ... and can specify a diferent, more social way of choosing data.</title>
        </sec>
        <sec id="sec-2-3-12">
          <title>Introduce Yu as a colleague, to be complexified below.</title>
        </sec>
        <sec id="sec-2-3-13">
          <title>Similarly to &lt;5&gt;, each row of the</title>
          <p>display functions as both
informational and actionable.</p>
        </sec>
        <sec id="sec-2-3-14">
          <title>Build YPP’s robotic nature through</title>
          <p>engineering-style passive voice.
Show multiple ”tunable
parameters” of the generative
algorithm [115, 116, 117].</p>
          <p>Human can revise
recommendation or accept as-is.</p>
        </sec>
        <sec id="sec-2-3-15">
          <title>YPP has ”learned” a generative</title>
          <p>model of Tikaani’s actions from
past projects, and has predicted
Tikaani’s most likely ”next action”
today, saving Tikaani’s time in the
notebook.</p>
        </sec>
        <sec id="sec-2-3-16">
          <title>Generative AI provides partial results for human to complete [26].</title>
          <p>&lt;10&gt; As YPP began to display the coding strategy into the shared Slack
channel, Tikaani finished their sip of chai and put their cup down.
Now that YPP was doing most of the work, Tikaani could relax and
watch it unfold. They knew that they would need to review YPP’s code,
but they hadn’t had to correct YPP’s architectural assumptions during
the past year. YPP called Tikaani’s attention to lower-confidence code,
and Tikaani made edits as needed. Tikaani was impressed that ”Y”
had learned so much of Tikaani’s individual coding practices during
their last year together. It was true that Tikaani missed the days when
people actually had to solve their own coding problems without genAI
support. But work with ”Y” was easier, and much faster, and actually
produced fewer bugs. This day of work with ”Y”, while maybe a little
bit boring, was going to be a highly productive and also pleasurable
perhaps, indeed, a very good day.
&lt;11&gt; YPP displayed, ”Recognition follows. You earned 5 BerryByte
points. Points were downloaded to your ID chip. Don’t forget to
redeem them at the ByteBar.” And after a moment, ”CyberHR hope
that this recognition will help you to have a good day, a very good
day.”
&lt;12&gt; “Drink chai,” YPP said. Tikaani took a sip of chai.
&lt;13&gt; Tikaani began to perform a detailed review of the code that YPP
had generated. As Tikaani opened a generic class, YPP displayed,
”There are alternative modules to consider. Actionable Explanation
follows. Class QuikClientPortfolio() from commercial package
QuikFinance would be 20% faster, but has license fees that are usually $5k to
$8k. Do you want to use QuikClientPortfolio() and submit a request
for approval?”
&lt;14&gt; Unsure of how to make the decision, Tikaani typed, ”Inquire
through YourPartnetNet for colleagues who have knowledge of
QuikClientPortfolio. Poll ’Which release of QuikClientPortfolio is stable?’
and indicate my status as Blocked. Use probable-knowldege feature.
Anonymous responses are acceptable.”
&lt;15&gt; A minute later, YPP displayed, ”6 colleagues responded. 5 said
Release 15.3 is stable. 1 said Release 15.1 is stable. Two non-anonymized
names are available.”
&lt;16&gt; Tikaani decided to accept the majority opinion. They typed,
”Estimate likelihood of approval for QuikClientPortfolio Release 15.3,
based on data from the current year only.”
&lt;17&gt; YPP displayed, ”Estimation follows. Package QuikFinance has
been approved on 82% of projects this year. Based on your personal
history with requests, likelihood of approval for you is 90%.” Then
YPP repeated, ”Do you want to use QuikClientPortfolio() and submit
a request for approval?”</p>
        </sec>
        <sec id="sec-2-3-17">
          <title>Reflection on how the human’s role has changed - mostly for the better.</title>
        </sec>
        <sec id="sec-2-3-18">
          <title>AI flags low-confidence outcomes for human action.</title>
        </sec>
        <sec id="sec-2-3-19">
          <title>User modeling.</title>
        </sec>
        <sec id="sec-2-3-20">
          <title>Benefits of human+genAI collaboration.</title>
        </sec>
        <sec id="sec-2-3-21">
          <title>Incentives delivered through the conversational UI.</title>
        </sec>
        <sec id="sec-2-3-22">
          <title>AI initiates consultation, but allows human to make the business decision.</title>
        </sec>
        <sec id="sec-2-3-23">
          <title>The network of ”Partner” AIs func</title>
          <p>tions as a Transactional Memory
System (TMS) [118]. It stores
records of ”who knows what” [119,
120], and it ”learns” each
employee’s knowledge trajectory, so
that it can generate probable
knowledge-states based on past
activities [121].</p>
        </sec>
        <sec id="sec-2-3-24">
          <title>AI can access the human’s personal history of this category of request.</title>
        </sec>
        <sec id="sec-2-3-25">
          <title>Reinforce the robotic-voice repetition of the question.</title>
          <p>&lt;18&gt; Tikaani pressed the speech-to-text key and said, ”Paste
QuikClientPortfolio, generate documentation of the decision rationale via
GPT-neo and display it.” YPP generated the rationale. Tikaani
reviewed, and made two corrections. Tikaani said “Send request for
approval, and add to my personal log.” YPP displayed each step as it
completed it.</p>
        </sec>
        <sec id="sec-2-3-26">
          <title>Generative production of request</title>
          <p>for-approval.</p>
          <p>
            Generative AI provides partial
results for the human to
complete [26].
&lt;19&gt; “Drink chai,” YPP said. Tikaani sipped.
&lt;20&gt; Tikaani found a serious domain-related problem in one of YPP’s
generated modules. Apparently YPP didn’t understand that
microifnancing often involved clients with little collateral and incomplete
credit histories. Tikaani knew that there would need to be additional
factors added to the model. They began to rewrite the generated class
from scratch. YPP issued a first warning: ”The recommended module
for this functionality is based on the MonthProjection() class from the
FinBlast library.” Tikaani continued to write code.
&lt;21&gt; YPP continued, “Explanation follows. The estimated cost in
work time for writing your own version is 3-5 hours for you, plus
2-4 hours for the QA team to test your new code, with a heightened
risk of bugs of 34%. Required action follows. (
            <xref ref-type="bibr" rid="ref102 ref123 ref126">1</xref>
            ) provide rationale for
writing your own version of this module; then (
            <xref ref-type="bibr" rid="ref51">2</xref>
            ) shift your work to a
diferent module while (
            <xref ref-type="bibr" rid="ref7">3</xref>
            ) your rationale is automatically sent to your
team-lead for approval. Full disclosure follows. There is a possibility
that your team-lead will need to (4) auto-escalate your rationale to
higher human management for further review. This may include a
review of your user profile, with possible modification to your profile.”
&lt;22&gt; Tikaani sighed. They wrote the rationale, and moved on to the
next one of YPP’s generated documentation markdown cells. This day
was looking less pleasurable.
&lt;23&gt; YPP played an audio clip and displayed, “CyberHR ofer follows.
You could be eligible for the BOGIE program. Buy Out Generative
Image of Employee can enroll you at 150% of your base pay to help
create a digital employee with your skills – a virtual you! Your work
records are applied automatically as training data, and you may be
asked to fine-tune the model. You receive 150% of your base pay
for the 12 months of development, which you receive as your buy
out bonus when your employment terminates at the end of those
12 months. You agree that the contents of the model become the
intellectual property of the company. Depending on how well your
BOGIE image performs, you may be asked to stay on to continue the
ifne-tuning as an external consultant. Contact CyberHR to find out
if you qualify for this exciting program.” The display was in a modal
dialogbox, so Tikaani had to reply “I’m interested” or “Ask me later”
to return to their work.
          </p>
        </sec>
        <sec id="sec-2-3-27">
          <title>Human contextual knowledge is uniquely informative [122, 123].</title>
        </sec>
        <sec id="sec-2-3-28">
          <title>However, the human is violating work norms.</title>
        </sec>
        <sec id="sec-2-3-29">
          <title>The human is stubborn.</title>
        </sec>
        <sec id="sec-2-3-30">
          <title>AI explains the costs of the human</title>
          <p>action...
... and the approvals process that
the human must follow...
... including a policy-based risk.</p>
        </sec>
        <sec id="sec-2-3-31">
          <title>AI has become a projection of executive policy and power [124].</title>
        </sec>
        <sec id="sec-2-3-32">
          <title>Did the CyberHR AI use emotion</title>
          <p>sensing algorithms [125] to
determine that the human may be
persuadable to take the buy-out that
will benefit the company? [ 126].</p>
        </sec>
        <sec id="sec-2-3-33">
          <title>The same generative technology</title>
          <p>that allowed YPP to predict the
human’s preferred JupyterGen
implementation environment &lt;8&gt;, can
be used to create v-Tikaani.
&lt;24&gt; After the frustration of having to justify a necessary rewrite,
Tikaani was almostly ready to take the buy-out ofer. But no. When
the work was good, it was still interesting – even though it was lonelier
now that Yu had taken the buy-out and had been replaced with v-Yu.
Tikaani declined the ofer, and went back to coding.
&lt;25&gt; “Drink chai,” YPP said. Tikaani glared at the screen.
&lt;26&gt; “Drink chai, YPP repeated, “You are at 46%. Explanation follows.
Having a good day is an employee responsibility. Chai helps. Below
40%, level-1 reporting to management is mandated. Required action
follows. Drink chai.” Was that a robot joke? Tikaani had heard rumors
of an experimental emotion module. Just before Yu had retired and
been replaced with v-Yu, Yu had suggested that –
&lt;27&gt; YPP interrupted Tikaani’s reverie. “Drink chai. You are at 42%.”
&lt;28&gt; Tikaani gulped down a full mouthful of chai, and braced against
its metallic aftertaste. Tikaani thought back to the days when chai
was just an optional beverage that they drank with Yu’s team during
tea-breaks. Now chai had become a mandatory delivery vehicle for the
Computer-Human Adaptive Intracellular. The the short-lived CHAI
virobots were linked to the cyberHR department through near-field
communications. The virobots monitored and corrected employees’
health and psychological engagement, based on a generated target
bio-labor profile from a ”learned” dataset of biosignals from employees
with demonstrated productivity and suficient job-tenure. Tikaani
prepared for the brief moment of dizziness as the virobots crossed
their blood-brain barrier to reach the emotion centers of the limbic
system. YPP’s warnings had left Tikaani is a very grim mood. But
now, Tikaani felt the Intracellular beginning to activate. Tikaani
experienced a familiar calm. Despite the loneliness of the
mostlyempty ofice, it was going to be a good day after all, a very good day.</p>
        </sec>
        <sec id="sec-2-3-34">
          <title>Yu had agreed to be replaced by a virtual employee that was generatively modeled based on Yu’s work records.</title>
        </sec>
        <sec id="sec-2-3-35">
          <title>Tikaani is experiencing negative affect.</title>
        </sec>
        <sec id="sec-2-3-36">
          <title>Drinking chai is required by policy,</title>
          <p>and is sensed by the AI.</p>
          <p>Similarly to policy-based
campaigns to improve employee
engagement[127, 128, 129], the
company helps employees to work
happily and productively through
biological interventions...
... which are highly efective,
perhaps benefiting company
productivity and perhaps employee
mental health?</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Discussion</title>
      <sec id="sec-3-1">
        <title>For brevity, we will link our Discussion points to the</title>
        <p>ifction by reference to numbered paragraphs - e.g., ” &lt;3&gt;.”</p>
        <sec id="sec-3-1-1">
          <title>4.1. Generative AI Applications and</title>
        </sec>
        <sec id="sec-3-1-2">
          <title>Features in Software Engineering</title>
        </sec>
        <sec id="sec-3-1-3">
          <title>Workplaces</title>
          <p>The ”Drinking Chai” story explored a series of
increasingly futuristic applications of generative AI. We briefly
review them here:
research will be required to specialize these
patterns to an individual human’s pattern through
a smaller set of personal data. We leave open
the question of whether this would be a desirable
outcome.
• Again controversially, we considered that
organizations might use generative technologies to
”learn” a ”best” set of employee attributes, and
might seek to impose those attributes on
lesscompliant employees &lt;28&gt;.</p>
          <p>In the preceding discussion, we listed an escalating
series of generative features, and we provided evidence
• We began with the well-understood domain of (where it exists) that current research may be trending
generative software translation in paragraphs toward those features. It may be useful to address the
&lt;1, 3, 5, 7, 8, 9, 10&gt;, and we emphasized the need plausibility of the concept of virobots to influence
emfor human-AI partnerships in translation &lt;10, ployees’ emotions &lt;26, 28&gt;. While the control aspects
13, 16, 20&gt; [28, 26, 27, 130], sometimes guided are futuristic, we note that in-dwelling digital devices
by the AI’s flagging of low-confidence transla- have been part human medical audiology, endocrinology,
tions &lt;10&gt; [26, 27] and by the AI’s recommen- and neurology for at least a decade [134], now as part
dation of alternate classes and libraries &lt;10, 13&gt;. of a medical approach to Internet of Things [135] with
Applied inflexibly, the principle of generative an- concomitant privacy and security risks [136, 137]. Some
ticipation of the ”best” coding usages will lead to of these devices are already being used to modify the
trouble in paragraphs &lt;20-22&gt;. patient’s brain state [138, 139]. In the commercial space,
• We also included currently-available capabilities Applied Digital company’s Verichip is marketed as a
subto generate documentation for the generated dural injection of an RFID tag for building access[140].
and modified code, as has been done in limited Further, we note that organizations have for years
ways for source code &lt;18&gt; [40, 8] and also for played white noise [141] or curated music [142, 143, 144,
certain sub-genres of journalism (e.g., [131]). 141] to afect employees’ mental status for specific
organi• We proposed capabilities for the human to con- zational purposes such as enhanced concentration [143],
trol, steer, and tune specific aspects of the gen- job-engagement [142], and even reduction in costly
emerative processes and outcomes &lt;5, 7&gt; [115, 22, ployee-controlled overtime hours [144]. Thus, employers’
132]. interests in afecting employee mental state are already
• We included GUI style transfer as a way of re- part of conventional ofice technologies, and implantable
ifning the generic translations &lt;6&gt; [133]. digital devices are already a medical and industrial reality,
• We proposed a more futuristic capability to parse as is the use of signals from these devices to modify a
a specification document into an architecture person’s internal milieu. The only questions that
sepplan, and then into a high-level class structure &lt;3&gt; arate the existing state-of-the-art technologies and our
with necessary human guidance &lt;5, 7&gt; . paragraphs &lt;26, 28&gt; are: What kinds of psychological
• Further into the future, we proposed that a gener- modifications might be implemented in the future? and</p>
          <p>How would they be ”delivered?” and Who controls those
ative assistant could learn the work-practices modifications? and of course Is this a desirable future?
of its human partner, and could save the
human’s efort by suggesting and then
implementing the anticipated ”next steps” &lt;8, 9, 17&gt;. 4.2. Value Tensions
• More controversially, we considered that organi- In keeping with theory and practice of design fictions [ 83,
zations could develop virtual versions of par- 64, 107, 91] and feminist technoscience [109, 110, 108,
ticular employees through ”learning” their in- 111], we hoped to raise questions of personal,
organizadividual work-practices and then implementing tional, and societal values through our fiction. Our use of
those patterns into a virtual replacement for the the principle of strategic ambiguity [103, 106, 70] helps
employee &lt;23, 24, 26&gt;. We acknowledge that this to highlight some of the tensions:
idea is futuristic. GANs and related algorithms
require large amounts of data. While organizations • What are the trade-ofs of panoptic [ 145, 146]
may be able to use existing generative algorithms surveillance on employees’ work-practices to
for the general case of human actions, further achieve organizational goals of productivity &lt;8,</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>We hope that these tensions will help us to ”stay with the trouble” [70, 112, 108] about how generative AI might afect employees and organizations, and under whose guidance.</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. Conclusion</title>
      <sec id="sec-4-1">
        <title>We have applied design fictions as a research method [ 16,</title>
        <p>17] to develop conjectures about possible futures of
generative AI features and applications, and to raise
valuesbased questions about those possible futures. It is fair to
ask, ”what did we learn from this research method?” In
the Discussion, we explored two topics.</p>
        <p>We considered current generative AI approaches,
and we projected them into possible futures.
Generative software translation and generative
documentation are current capabilities [28, 26, 27, 130, 40,
8, 131]. Further, we note that there is already
research under way to provide finer controls over
generative algorithms citelouie2020novice, louie2020cococo,
zhou2020generative - although there is much work yet
to be done. We used those concepts as ”starting points,”
to explore more futuristic ideas.</p>
        <p>
          If multiple generative AI applications predict the ”next
token” in a sequence of tokens, then we speculated about
the nature of possible future tokens, and what those
tokens might be used for. We considered what might be
possible - for good or ill - if human actions were treated
as be tokens. We were then able to imagine helpful
scenarios, in which an AI could beneficially anticipate the
ACM Conference on Supporting Groupwork, 2018, [103] P. Coulton, J. G. Lindley, M. Sturdee, M. Stead,
pp. 257–266. Design fiction as world building (
          <xref ref-type="bibr" rid="ref158">2017</xref>
          ).
[88] M. Wessel, A. Abdellatif, I. Wiese, T. Conte, E. Shi- [104] S. P. Wyche, P. M. Aoki, R. E. Grinter, Re-placing
hab, M. A. Gerosa, I. Steinmacher, Bots for pull faith: reconsidering the secular-religious use
direquests: The good, the bad, and the promising vide in the united states and kenya, in:
Proceed(2022). ings of the SIGCHI conference on human factors
[89] H. Candello, M. Pichiliani, M. Wessel, C. Pinhanez, in computing systems, 2008, pp. 11–20.
        </p>
        <p>
          M. Muller, Teaching robots to act and converse in [105] D. Simons, Design for fairness in ai: Cooking a
physical spaces: participatory design fictions with fair ai dish (
          <xref ref-type="bibr" rid="ref155 ref36 ref55 ref56 ref98">2019</xref>
          ).
museum guides, in: Proceedings of the Halfway [106] P. Hayes, I. Van De Poel, M. Steen, Algorithms
to the Future Symposium 2019, 2019, pp. 1–4. and values in justice and security, AI &amp; SOCIETY
[90] J. Auger, Speculative design: crafting the specula- (
          <xref ref-type="bibr" rid="ref23 ref63 ref70 ref95">2020</xref>
          ) 1–23.
        </p>
        <p>tion, Digital Creativity 24 (2013) 11–35. [107] A. Morrison, R. Tronstad, E. S. Martinussen,
De[91] M. L. J. Søndergaard, L. K. Hansen, Periodshare: A sign notes on a lonely drone, Digital Creativity 24
bloody design fiction, in: Proceedings of the 9th (2013) 46–59.</p>
        <p>
          Nordic Conference on Human-Computer Interac- [108] M. L. J. Søndergaard, Troubling design: A
detion, 2016, pp. 1–6. sign program for designing with women’s health,
[92] B. Sterling, Shaping things, MIT Press, 2005. ACM Transactions on Computer-Human
Interac[93] M. Blythe, Research fiction: storytelling, plot and tion (TOCHI) 27 (
          <xref ref-type="bibr" rid="ref23 ref63 ref70 ref95">2020</xref>
          ) 1–36.
design, in: Proceedings of the 2017 CHI Confer- [109] L. Jönsson, A. Light, K. Lindström, Å. Ståhl,
ence on Human Factors in Computing Systems, M. Tham, How can we come to care in and through
2017, pp. 5400–5411. design?, in: The 8th Bi-Annual Nordic Design
Re[94] M. Sturdee, P. Coulton, J. G. Lindley, M. Stead, search Society Conference-Who Cares? 2-4th of
H. Ali, A. Hudson-Smith, Design fiction: How to June 2019 Finland, Nordic Design Research, 2019,
build a voight-kampf machine, in: Proceedings pp. 1–8.
of the 2016 CHI Conference Extended Abstracts [110] L. Devendorf, D. K. Rosner, Beyond hybrids:
on Human Factors in Computing Systems, 2016, Metaphors and margins in design, in: Proceedings
pp. 375–386. of the 2017 Conference on Designing Interactive
[95] T. Jensen, P. Vistisen, Ethical design fiction: Be- Systems, 2017, pp. 995–1000.
tween storytelling and world building, The ORBIT [111] S. Bardzell, J. Bardzell, Towards a feminist hci
Journal 1 (
          <xref ref-type="bibr" rid="ref158">2017</xref>
          ) 1–14. methodology: social science, feminism, and hci, in:
[96] B. Sterling, Patently untrue: fleshy defibrillators Proceedings of the SIGCHI conference on human
and synchronised baseball are changing the future. factors in computing systems, 2011, pp. 675–684.
wired magazine, 2015. [112] D. J. Haraway, Staying with the Trouble, Duke
[97] J. Lindley, A pragmatics framework for design University Press, 2016.
        </p>
        <p>
          ifction (
          <xref ref-type="bibr" rid="ref116 ref18">2015</xref>
          ). [113] P. Thomas, M. Czerwinksi, D. McDuf, N. Craswell,
[98] F. Cafaro, L. Lyons, J. Roberts, J. Radinsky, The Theories of conversation for conversational ir,
uncanny valley of embodied interaction design, in: ACM Transactions on Information Systems (TOIS)
Proceedings of the 2014 conference on Designing 39 (
          <xref ref-type="bibr" rid="ref103 ref77 ref96">2021</xref>
          ) 1–23.
        </p>
        <p>
          interactive systems, 2014, pp. 1075–1078. [114] M. Chefitz, J. Austin-Breneman, N. Melville,
De[99] B. Gaver, T. Dunne, E. Pacenti, Design: Cul- signing conversational interfaces to reduce
dissotural probes, Interactions 6 (1999) 21–29. nance, in: Proceedings of the 2018 ACM
ConferURL: https://doi.org/10.1145/291224.291235. ence Companion Publication on Designing
Interdoi:10.1145/291224.291235. active Systems, 2018, pp. 219–223.
[100] K. Boehner, J. Vertesi, P. Sengers, P. Dourish, How [115] R. Louie, A. Coenen, C. Z. Huang, M. Terry, C. J.
hci interprets the probes, in: Proceedings of the Cai, Novice-ai music co-creation via ai-steering
SIGCHI conference on Human factors in comput- tools for deep generative models, in: Proceedings
ing systems, 2007, pp. 1077–1086. of the 2020 CHI Conference on Human Factors in
[101] W. Gaver, Cultural commentators: Non-native Computing Systems, 2020, pp. 1–13.
interpretations as resources for polyphonic assess- [116] D. Dablain, G. Siwo, N. Chawla, Generative ai
dement, International journal of human-computer sign and exploration of nucleoside analogs (
          <xref ref-type="bibr" rid="ref103 ref77 ref96">2021</xref>
          ).
studies 65 (
          <xref ref-type="bibr" rid="ref140">2007</xref>
          ) 292–305. [117] M. Farbood, H. Kaufman, K. Jennings,
Compos[102] C. DiSalvo, Fcj-142 spectacles and tropes: Specula- ing with hyperscore: An intuitive interface for
tive design and contemporary food cultures, The visualizing musical structure, in: ICMC, 2007.
Fibreculture Journal (2012). [118] A. Oeldorf-Hirsch, D. Gergle, ’who knows what’
audience targeting for question asking on face- [132] Y. Zhou, Y. Koyama, M. Goto, T. Igarashi,
Genbook, Proceedings of the ACM on Human- erative melody composition with
human-in-theComputer Interaction 4 (
          <xref ref-type="bibr" rid="ref23 ref63 ref70 ref95">2020</xref>
          ) 1–20. loop bayesian optimization, arXiv preprint
[119] N. S. Shami, Y. C. Yuan, D. Cosley, L. Xia, G. Gay, arXiv:2010.03190 (
          <xref ref-type="bibr" rid="ref23 ref63 ref70 ref95">2020</xref>
          ).
        </p>
        <p>That’s what friends are for: facilitating’who [133] T. Zhao, C. Chen, Y. Liu, X. Zhu, Guigan: Learning
knows what’across group boundaries, in: Proceed- to generate gui designs using generative
adversarings of the 2007 international ACM conference on ial networks, in: 2021 IEEE/ACM 43rd
InternaSupporting group work, 2007, pp. 379–382. tional Conference on Software Engineering (ICSE),
[120] B. Biancardi, L. Maisonnave-Couterou, P. Renault, IEEE, 2021, pp. 748–760.</p>
        <p>B. Ravenet, M. Mancini, G. Varni, The wonowa [134] J. Ahmad, F. Zafar, Review of body area network
dataset: Investigating the transactive memory sys- technology &amp; wireless medical monitoring,
Intertem in small group interactions, in: Proceedings of national Journal of Information and
Communicathe 2020 International Conference on Multimodal tion Technology 2 (2012).</p>
        <p>
          Interaction, 2020, pp. 528–537. [135] A. K. Teshome, B. Kibret, D. T. Lai, A review
[121] S. Liang, Y. Luo, Z. Meng, Profiling users for ques- of implant communication technology in wban:
tion answering communities via flow-based con- Progress and challenges, IEEE reviews in
biomedstrained co-embedding model, ACM Transactions ical engineering 12 (
          <xref ref-type="bibr" rid="ref131 ref132 ref161">2018</xref>
          ) 88–99.
        </p>
        <p>
          on Information Systems (TOIS) 40 (
          <xref ref-type="bibr" rid="ref103 ref77 ref96">2021</xref>
          ) 1–38. [136] V. Lockton, R. S. Rosenberg, Rfid: The next
se[122] C. Aragon, S. Guha, M. Kogan, M. Muller, G. Nef, rious threat to privacy, Ethics and Information
Human Centered Data Science: An Introduction, Technology 7 (2005) 221–231.
        </p>
        <p>MIT Press, 2022. [137] U. Ahmad, H. Song, A. Bilal, S. Saleem, A.
Ul[123] T. Ye, Improving Worker Performance with lah, Securing insulin pump system using deep</p>
        <p>Human-Centered Data Science, Ph.D. thesis, 2021. learning and gesture recognition, in: 2018 17th
[124] Y. Toyoda, G. Lucas, J. Gratch, The efects of au- IEEE International Conference On Trust,
Secutonomy and task meaning in algorithmic manage- rity And Privacy In Computing And
Communiment of crowdwork, in: Proceedings of the 19th cations/12th IEEE International Conference On
International Conference on Autonomous Agents Big Data Science And Engineering
(TrustCom/Bigand MultiAgent Systems, 2020, pp. 1404–1412. DataSE), IEEE, 2018, pp. 1716–1719.
[125] Z. Wang, C. S. Chong, L. Lan, Y. Yang, S. B. Ho, [138] H. Kassiri, N. Soltani, M. T. Salam, J. L. P. Velazquez,
J. C. Tong, Fine-grained sentiment analysis of R. Genov, Battery-less modular responsive
neusocial media with emotion sensing, in: 2016 Future rostimulator for prediction and abortion of
epilepTechnologies Conference (FTC), IEEE, 2016, pp. tic seizures, in: 2016 IEEE International
Sympo1361–1364. sium on Circuits and Systems (ISCAS), IEEE, 2016,
[126] M. Skirpan, C. Fiesler, Ad empathy: A design fic- pp. 1298–1301.</p>
        <p>
          tion, in: Proceedings of the 2018 ACM Conference [139] K. Abdelhalim, H. M. Jafari, L. Kokarovtseva,
on Supporting Groupwork, 2018, pp. 267–273. J. L. P. Velazquez, R. Genov, Neural
synchrony[127] J. Anitha, Determinants of employee engagement monitoring wireless brain implant for intractable
and their impact on employee performance, Inter- epilepsy neuromodulation, in: 2013 6th
Internanational journal of productivity and performance tional IEEE/EMBS Conference on Neural
Engineermanagement (
          <xref ref-type="bibr" rid="ref153 ref160">2014</xref>
          ). ing (NER), IEEE, 2013, pp. 65–68.
[128] S. Kular, M. Gatenby, C. Rees, E. Soane, K. Truss, [140] M. R. Rieback, B. Crispo, A. S. Tanenbaum, The
Employee engagement: A literature review, evolution of rfid security, IEEE Pervasive
Comput2008. URL: http://eprints.kingston.ac.uk/4192/1/ ing 5 (2006) 62–69.
        </p>
        <p>
          19wempen.pdf, accessed: 2021-12-22. [141] S. J. Schlittmeier, J. Hellbrück, Background music
[129] W. H. Macey, B. Schneider, The meaning of em- as noise abatement in open-plan ofices: A
laboraployee engagement, Industrial and organizational tory study on performance efects and subjective
Psychology 1 (2008) 3–30. preferences, Applied Cognitive Psychology: The
[130] M. Agarwal, K. Talamadupula, F. Martinez, Oficial Journal of the Society for Applied Research
S. Houde, M. Muller, J. Richards, S. I. Ross, J. D. in Memory and Cognition 23 (2009) 684–697.
Weisz, Using document similarity methods to cre- [142] A. B. Haake, Individual music listening in
workate parallel datasets for code translation, arXiv place settings: An exploratory survey of ofices in
preprint arXiv:2110.05423 (
          <xref ref-type="bibr" rid="ref103 ref77 ref96">2021</xref>
          ). the uk, Musicae Scientiae 15 (2011) 107–129.
[131] A. Veglis, T. A. Maniou, et al., Chatbots on the [143] R.-H. Huang, Y.-N. Shih, Efects of background
rise: A new narrative in journalism, Stud. Media music on concentration of workers, Work 38 (2011)
Commun 7 (
          <xref ref-type="bibr" rid="ref155 ref36 ref55 ref56 ref98">2019</xref>
          ) 1–6. 383–387.
[144] Y. Furuya, K. Fukai, H. Furuya, M. Tatemichi, A
pilot study on the efects of playing background
music in the workplace on overtime work,
Environmental and Occupational Health Practice (
          <xref ref-type="bibr" rid="ref103 ref77 ref96">2021</xref>
          ).
[145] I. L. Ebert, Ai at work–promises and pitfalls
of digital workplace monitoring, 2021. URL:
https://www.alexandria.unisg.ch/264999/1/
SKEMA%20presentation%209%20Nov%20AI%
20at%20work.pdf, accessed 2 January 2022.
[146] A. Aloisi, V. de Stefano, Essential jobs, remote
work and digital surveillance: addressing the
covid-19 pandemic panopticon, International
        </p>
        <p>
          Labour Review (
          <xref ref-type="bibr" rid="ref103 ref77 ref96">2021</xref>
          ).
[147] B. Friedman, D. G. Hendry, Value sensitive design:
        </p>
        <p>Shaping technology with moral imagination, Mit</p>
        <p>Press, 2019.
[148] L. V. Nägele, M. Ryöppy, D. Wilde, Pdfi:
participatory design fiction with vulnerable users, in:
Proceedings of the 10th Nordic Conference on</p>
        <p>Human-Computer Interaction, 2018, pp. 819–831.
[149] K. Baumann, B. Caldwell, F. Bar, B. Stokes,
Participatory design fiction: community storytelling
for speculative urban technologies, in: Extended
Abstracts of the 2018 CHI Conference on Human</p>
        <p>
          Factors in Computing Systems, 2018, pp. 1–1.
[150] L. Forlano, A. Mathew, From design fiction to
design friction: Speculative and participatory design
of values-embedded urban technology, Journal of
Urban Technology 21 (
          <xref ref-type="bibr" rid="ref153 ref160">2014</xref>
          ) 7–24.
        </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <volume>10</volume>
          ,
          <issue>13</issue>
          ,
          <issue>17</issue>
          ,
          <fpage>20</fpage>
          -
          <lpage>22</lpage>
          &gt;?
          <article-title>Can we distinguish between next human action, and could prepare for that action</article-title>
          .
          <source>We</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>organizationally-determined ”best” practices &lt;20- trained on that person's history of actions.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <volume>22</volume>
          &gt;?
          <article-title>How can we balance between ”norms” and Finally, based in feminist technoscience</article-title>
          [
          <volume>109</volume>
          ,
          <issue>110</issue>
          ,
          <fpage>108</fpage>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          individual and group innovations &lt;
          <volume>28</volume>
          &gt;? 111]
          <article-title>and value sensitive design [147], we explored im-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>• If AI agents serve as ”teammates” [47], then what plicit values, and the likelihood of value tensions among</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>namics [42</source>
          ,
          <issue>41</issue>
          ,
          <issue>43</issue>
          ,
          <issue>44</issue>
          , 45]?
          <article-title>Should they assist &lt;1, Despite the design fiction tradition of publishing a</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <issue>3</issue>
          ,
          <fpage>6</fpage>
          -
          <lpage>10</lpage>
          &gt;, advise &lt;
          <volume>13</volume>
          ,
          <issue>17</issue>
          &gt;, monitor &lt;
          <volume>21</volume>
          &gt;, and
          <article-title>/or ifction without empirical data</article-title>
          [
          <volume>65</volume>
          ,
          <issue>81</issue>
          ,
          <issue>86</issue>
          ,
          <issue>71</issue>
          ,
          <issue>126</issue>
          ,
          <issue>87</issue>
          , 66],
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <source>sanction employees &lt;21</source>
          ,
          <fpage>26</fpage>
          -
          <lpage>28</lpage>
          &gt;?
          <article-title>How do we ad- we want to broaden the conversation</article-title>
          .
          <source>Our next steps</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>judicate competing claims about replacing human will involve participatory design fiction methods'[ 148,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          employees by digital employees &lt;
          <fpage>23</fpage>
          -
          <lpage>24</lpage>
          &gt;?
          <volume>149</volume>
          ,
          <issue>150</issue>
          ,
          <issue>89</issue>
          , 80] to make
          <source>the work more polyvocal [101]</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>ployee &lt;23&gt;?</source>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <article-title>mic &lt;21&gt;? Managers often interpret, modify</article-title>
          , and
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <article-title>• Why is Tikaani so concerned with loneliness &lt;1,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <volume>6</volume>
          , 28&gt;? [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hindle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. T.</given-names>
            <surname>Barr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Su</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gabel</surname>
          </string-name>
          , P. Devanbu,
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <article-title>On the naturalness of software</article-title>
          ,
          <source>in: 2012 34th</source>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>(ICSE)</source>
          , IEEE,
          <year>2012</year>
          , pp.
          <fpage>837</fpage>
          -
          <lpage>847</lpage>
          . [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Raychev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vechev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Krause</surname>
          </string-name>
          , Predicting pro-
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <article-title>of the 42nd Annual ACM SIGPLAN-SIGACT Sym-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <year>2015</year>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>124</lpage>
          . [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bruch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Monperrus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mezini</surname>
          </string-name>
          , Learning
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          tems,
          <source>in: Proceedings of the 7th joint meeting</source>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <source>tions of software engineering</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>213</fpage>
          -
          <lpage>222</lpage>
          . [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Svyatkovskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Deng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Fu</surname>
          </string-name>
          , N. Sundaresan,
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>former</surname>
          </string-name>
          , arXiv preprint arXiv:
          <year>2005</year>
          .
          <volume>08025</volume>
          (
          <year>2020</year>
          ). [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Tufano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Drain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Svyatkovskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Deng</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <surname>transformers</surname>
          </string-name>
          , arXiv preprint arXiv:
          <year>2009</year>
          .05617
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          (
          <year>2020</year>
          ). [6]
          <string-name>
            <given-names>X.</given-names>
            <surname>Guo</surname>
          </string-name>
          , Towards automated software testing
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <article-title>with generative adversarial networks</article-title>
          ,
          <source>in: 2021</source>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <surname>51st Annual</surname>
            <given-names>IEEE</given-names>
          </string-name>
          /IFIP International Confer-
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <surname>Society</surname>
          </string-name>
          , Los Alamitos, CA, USA,
          <year>2021</year>
          , pp.
          <fpage>21</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          URL: https://doi.ieeecomputersociety.
          <source>org/10</source>
          .1109/
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <surname>DSN-S52858</surname>
          </string-name>
          .
          <year>2021</year>
          .
          <volume>00021</volume>
          . doi:
          <volume>10</volume>
          .1109/DSN-
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <surname>S52858.</surname>
          </string-name>
          <year>2021</year>
          .
          <volume>00021</volume>
          . [7]
          <string-name>
            <given-names>L.</given-names>
            <surname>Moreno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Aponte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Sridhara</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Marcus,
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>classes, in: 2013 21st International Conference on</mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <given-names>Program</given-names>
            <surname>Comprehension (ICPC),</surname>
          </string-name>
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          ,
          <year>2013</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          23-
          <fpage>32</fpage>
          . [8]
          <string-name>
            <given-names>A. Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Drozdal</surname>
          </string-name>
          , M. Muller,
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <source>preprint arXiv:2102.12592</source>
          (
          <year>2021</year>
          ). [9]
          <string-name>
            <given-names>B.</given-names>
            <surname>Roziere</surname>
          </string-name>
          , M.
          <article-title>-</article-title>
          <string-name>
            <surname>A. Lachaux</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Chanussot</surname>
          </string-name>
          , G. Lam-
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          languages., in: NeurIPS,
          <year>2020</year>
          . [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Houde</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Martino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Muller</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          Pi-
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          arXiv:
          <year>2003</year>
          .
          <volume>07679</volume>
          (
          <year>2020</year>
          ). [11]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Liikkanen</surname>
          </string-name>
          ,
          <article-title>It ain't nuttin'new-interaction</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <year>2019</year>
          , pp.
          <fpage>600</fpage>
          -
          <lpage>604</lpage>
          . [12]
          <string-name>
            <surname>N.-M. Aliman</surname>
          </string-name>
          , L. Kester,
          <article-title>Malicious design in aivr,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>defenses, in: 2020 IEEE International Confer-</mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <source>(AIVR)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>130</fpage>
          -
          <lpage>137</lpage>
          . [13]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bommasani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Hudson</surname>
          </string-name>
          , E. Adeli, R. Altman,
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          <source>preprint arXiv:2108.07258</source>
          (
          <year>2021</year>
          ). [14]
          <string-name>
            <given-names>K.</given-names>
            <surname>McGufie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Newhouse</surname>
          </string-name>
          , The radicalization
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          <article-title>risks of gpt-3 and advanced neural language mod-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <string-name>
            <surname>els</surname>
          </string-name>
          , arXiv preprint arXiv:
          <year>2009</year>
          .
          <volume>06807</volume>
          (
          <year>2020</year>
          ). [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Whittaker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. C.</given-names>
            <surname>Kietzmann</surname>
          </string-name>
          , J. Kietzmann,
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <source>sional 22</source>
          (
          <year>2020</year>
          )
          <fpage>90</fpage>
          -
          <lpage>99</lpage>
          . [16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Markussen</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Knutz,</surname>
          </string-name>
          <article-title>The poetics of design</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          ifction,
          <source>in: Proceedings of the 6th International</source>
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          <source>and Interfaces</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>231</fpage>
          -
          <lpage>240</lpage>
          . [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sturdee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lindley</surname>
          </string-name>
          , Sketching &amp; drawing as fu-
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          <source>to the Future Symposium</source>
          <year>2019</year>
          ,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . [18]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Qin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Luo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          , Auto-painter: Car-
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          <source>preprint arXiv:1705</source>
          .
          <year>01908</year>
          (
          <year>2017</year>
          ). [19]
          <string-name>
            <given-names>K.</given-names>
            <surname>Nazeri</surname>
          </string-name>
          , E. Ng,
          <string-name>
            <given-names>T.</given-names>
            <surname>Joseph</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. Z.</given-names>
            <surname>Qureshi</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          preprint arXiv:
          <year>1901</year>
          .
          <volume>00212</volume>
          (
          <year>2019</year>
          ). [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Karimi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rezwana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Maher</surname>
          </string-name>
          , N. Dehbozorgi,
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          <string-name>
            <surname>ai</surname>
          </string-name>
          co-creativity,
          <source>in: Proceedings of IUI</source>
          <year>2020</year>
          ,
          <year>2020</year>
          . [21]
          <string-name>
            <given-names>J.</given-names>
            <surname>Babcock</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bali</surname>
          </string-name>
          ,
          <article-title>Generative AI with Python and</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          <article-title>TensorFlow 2: Harness the power of generative</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          <string-name>
            <given-names>Publishing</given-names>
            <surname>Ltd</surname>
          </string-name>
          ,
          <year>2021</year>
          . [22]
          <string-name>
            <given-names>R.</given-names>
            <surname>Louie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.-Z. A.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Terry</surname>
          </string-name>
          , C. J.
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          <source>GEN+ user2agent@ IUI</source>
          ,
          <year>2020</year>
          . [23]
          <string-name>
            <given-names>R.</given-names>
            <surname>Louie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Engel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Huang</surname>
          </string-name>
          , Expressive commu-
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          <string-name>
            <surname>interfaces</surname>
          </string-name>
          ,
          <source>arXiv preprint arXiv:2111.14951</source>
          (
          <year>2021</year>
          ). [24]
          <string-name>
            <surname>P. Das</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Sercu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Wadhawan</surname>
          </string-name>
          , I. Padhi,
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          <article-title>mitted to Nature, under review</article-title>
          . (
          <year>2020</year>
          ). [25]
          <string-name>
            <given-names>H.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Engkvist</surname>
          </string-name>
          , Has Drug Design Aug-
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          ality?,
          <source>Trends in pharmacological sciences 40</source>
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          (
          <year>2019</year>
          )
          <fpage>806</fpage>
          -
          <lpage>809</lpage>
          . URL: http://dx.doi.org/10.1016/
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          j.tips.
          <year>2019</year>
          .
          <volume>09</volume>
          .004. [26]
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Weisz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Muller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Houde</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Richards</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. I.</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          <article-title>in code translation</article-title>
          , in: 26th International Con-
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          <source>ference on Intelligent User Interfaces</source>
          ,
          <year>2021</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          402-
          <fpage>412</fpage>
          . [27]
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Weisz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Muller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. I.</given-names>
            <surname>Ross</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Martinez</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          <article-title>code translation</article-title>
          ,
          <source>IUI 2022 Workshop Human AI</source>
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          <string-name>
            <surname>with Generative</surname>
            <given-names>AI</given-names>
          </string-name>
          (
          <year>2022</year>
          ). [28]
          <string-name>
            <given-names>K.</given-names>
            <surname>Talamadupula</surname>
          </string-name>
          , Applied ai matters ai4code: Ap-
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          <article-title>plying artificial intelligence to source code (</article-title>
          <year>2021</year>
          ). [29]
          <string-name>
            <given-names>A.</given-names>
            <surname>Calderwood</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Qiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. I.</given-names>
            <surname>Gero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. B.</given-names>
            <surname>Chilton</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          <source>GEN 2020 Workshop on Human-AI</source>
          Co-Creation
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          <string-name>
            <surname>with Generative</surname>
            <given-names>Models</given-names>
          </string-name>
          ,
          <year>2020</year>
          . [30]
          <string-name>
            <given-names>K. I.</given-names>
            <surname>Gero</surname>
          </string-name>
          , C. Kedzie, ,
          <string-name>
            <given-names>L. B.</given-names>
            <surname>Chilton</surname>
          </string-name>
          , Demo: Literary
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          <string-name>
            <surname>ceedings of</surname>
            <given-names>HAI</given-names>
          </string-name>
          -GEN 2020 Workshop on Human-
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          <string-name>
            <given-names>AI</given-names>
            <surname>Co-Creation with Generative Models</surname>
          </string-name>
          ,
          <year>2020</year>
          . [31]
          <string-name>
            <given-names>A.</given-names>
            <surname>Harsuvanakit</surname>
          </string-name>
          , Elbo chair,
          <year>2016</year>
          . URL:
        </mixed-citation>
      </ref>
      <ref id="ref67">
        <mixed-citation>https://gallery.autodesk.com/fusion360/projects/</mixed-citation>
      </ref>
      <ref id="ref68">
        <mixed-citation>
          <string-name>
            <surname>made-</surname>
          </string-name>
          with-fusion-
          <volume>360</volume>
          . [32]
          <string-name>
            <given-names>B.</given-names>
            <surname>Quanz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Deshpande</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Shah</surname>
          </string-name>
          , J.-e.
        </mixed-citation>
      </ref>
      <ref id="ref69">
        <mixed-citation>
          <article-title>sign framework</article-title>
          , arXiv preprint arXiv:
          <year>2001</year>
          .08791
        </mixed-citation>
      </ref>
      <ref id="ref70">
        <mixed-citation>
          (
          <year>2020</year>
          ). [33]
          <string-name>
            <surname>Autodesk</surname>
          </string-name>
          ,
          <article-title>Reimagining the future of air travel,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref71">
        <mixed-citation>2016. URL: https://www.autodesk.com/customer-</mixed-citation>
      </ref>
      <ref id="ref72">
        <mixed-citation>
          stories/airbus. [34]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Parikh</surname>
          </string-name>
          , Telling creative stories us-
        </mixed-citation>
      </ref>
      <ref id="ref73">
        <mixed-citation>
          <source>arXiv:2110.14810</source>
          (
          <year>2021</year>
          ). [35]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mirka</surname>
          </string-name>
          , M. France-Pillois, G. Sassatelli,
        </mixed-citation>
      </ref>
      <ref id="ref74">
        <mixed-citation>25th Design, Automation, and Test in Europe</mixed-citation>
      </ref>
      <ref id="ref75">
        <mixed-citation>
          <string-name>
            <surname>Conference</surname>
          </string-name>
          (DATE
          <year>2022</year>
          ),
          <year>2022</year>
          . [36]
          <string-name>
            <given-names>J.</given-names>
            <surname>Meyers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Fabian</surname>
          </string-name>
          , N. Brown, De novo molecular
        </mixed-citation>
      </ref>
      <ref id="ref76">
        <mixed-citation>
          <source>Today</source>
          <volume>26</volume>
          (
          <year>2021</year>
          )
          <fpage>2707</fpage>
          -
          <lpage>2715</lpage>
          . [37]
          <string-name>
            <given-names>E. M.</given-names>
            <surname>Bender</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Gebru</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>McMillan-Major</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref77">
        <mixed-citation>
          <source>of the 2021 ACM Conference on Fairness</source>
          , Account-
        </mixed-citation>
      </ref>
      <ref id="ref78">
        <mixed-citation>
          <string-name>
            <surname>ability</surname>
          </string-name>
          , and
          <string-name>
            <surname>Transparency</surname>
          </string-name>
          ,
          <year>2021</year>
          , pp.
          <fpage>610</fpage>
          -
          <lpage>623</lpage>
          . [38]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Mirsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Demontis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kotak</surname>
          </string-name>
          , R. Shankar,
        </mixed-citation>
      </ref>
      <ref id="ref79">
        <mixed-citation>
          <string-name>
            <surname>tions</surname>
          </string-name>
          ,
          <source>arXiv preprint arXiv:2106.15764</source>
          (
          <year>2021</year>
          ). [39]
          <string-name>
            <surname>M. K. Land</surname>
            ,
            <given-names>J. D.</given-names>
          </string-name>
          <string-name>
            <surname>Aronson</surname>
          </string-name>
          , Human rights and
        </mixed-citation>
      </ref>
      <ref id="ref80">
        <mixed-citation>
          <source>Science</source>
          <volume>16</volume>
          (
          <year>2020</year>
          )
          <fpage>223</fpage>
          -
          <lpage>240</lpage>
          . [40]
          <string-name>
            <given-names>M.</given-names>
            <surname>Muller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ross</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Weisz</surname>
          </string-name>
          , M. Agar-
        </mixed-citation>
      </ref>
      <ref id="ref81">
        <mixed-citation>
          <source>code documentation in jupyter notebooks</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref82">
        <mixed-citation>
          URL: https://hai-gen2021.github.io/program/. [41]
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Biles</surname>
          </string-name>
          , Genjam:
          <article-title>Evolution of a jazz improviser,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref83">
        <mixed-citation>
          <source>in: Creative evolutionary systems, Elsevier</source>
          ,
          <year>2002</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref84">
        <mixed-citation>
          pp.
          <fpage>165</fpage>
          -
          <lpage>187</lpage>
          . [42]
          <string-name>
            <surname>P. M. Fitts</surname>
          </string-name>
          ,
          <article-title>Human engineering for an efective</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref85">
        <mixed-citation>
          <article-title>air-navigation and trafic-control system</article-title>
          . (
          <year>1951</year>
          ). [43]
          <string-name>
            <surname>T. B. Sheridan</surname>
            ,
            <given-names>M. K.</given-names>
          </string-name>
          <string-name>
            <surname>Tulga</surname>
          </string-name>
          ,
          <article-title>A model for dynamic</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref86">
        <mixed-citation>
          tasks,
          <source>in: Proceedings of the 14th Annual</source>
          Confer-
        </mixed-citation>
      </ref>
      <ref id="ref87">
        <mixed-citation>
          <source>ence on Manual Control</source>
          ,
          <year>1978</year>
          , pp.
          <fpage>569</fpage>
          -
          <lpage>592</lpage>
          . [44]
          <string-name>
            <given-names>R.</given-names>
            <surname>Parasuraman</surname>
          </string-name>
          ,
          <article-title>Designing automation for human</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref88">
        <mixed-citation>
          <source>Ergonomics</source>
          <volume>43</volume>
          (
          <year>2000</year>
          )
          <fpage>931</fpage>
          -
          <lpage>951</lpage>
          . [45]
          <string-name>
            <given-names>B.</given-names>
            <surname>Shneiderman</surname>
          </string-name>
          ,
          <article-title>Human-centered artificial intel-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref89">
        <mixed-citation>
          arXiv:
          <year>2002</year>
          .
          <volume>04087</volume>
          (
          <year>2020</year>
          ). [46]
          <string-name>
            <given-names>E.</given-names>
            <surname>Horvitz</surname>
          </string-name>
          ,
          <article-title>Principles of mixed-initiative user</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref90">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          , CHI '99,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing
        </mixed-citation>
      </ref>
      <ref id="ref91">
        <mixed-citation>
          <string-name>
            <surname>Machinery</surname>
          </string-name>
          , New York, NY, USA,
          <year>1999</year>
          , p.
          <fpage>159</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref92">
        <mixed-citation>URL: https://doi.org/10.1145/302979.303030.</mixed-citation>
      </ref>
      <ref id="ref93">
        <mixed-citation>
          <source>doi:10.1145/302979</source>
          .303030. [47]
          <string-name>
            <given-names>I.</given-names>
            <surname>Seeber</surname>
          </string-name>
          , E. Bittner,
          <string-name>
            <given-names>R. O.</given-names>
            <surname>Briggs</surname>
          </string-name>
          , T. De Vreede, G.-J.
        </mixed-citation>
      </ref>
      <ref id="ref94">
        <mixed-citation>
          <source>Information &amp; management</source>
          <volume>57</volume>
          (
          <year>2020</year>
          )
          <fpage>103174</fpage>
          . [48]
          <string-name>
            <surname>T. O'Neill</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>McNeese</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Barron</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Schelble</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref95">
        <mixed-citation>
          (
          <year>2020</year>
          )
          <fpage>0018720820960865</fpage>
          . [49]
          <string-name>
            <given-names>P.</given-names>
            <surname>Pataranutaporn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Danry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Leong</surname>
          </string-name>
          , P. Pun-
        </mixed-citation>
      </ref>
      <ref id="ref96">
        <mixed-citation>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . [50]
          <string-name>
            <given-names>O. Nilay</given-names>
            <surname>Yalcin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Abukhodair</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. DiPaola</surname>
          </string-name>
          , Em-
        </mixed-citation>
      </ref>
      <ref id="ref97">
        <mixed-citation>
          <string-name>
            <surname>arXiv</surname>
          </string-name>
          e-prints (
          <year>2020</year>
          ) arXiv-
          <fpage>2005</fpage>
          . [51]
          <string-name>
            <given-names>Ö. N.</given-names>
            <surname>Yalçın</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Abukhodair</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. DiPaola</surname>
          </string-name>
          , Em-
        </mixed-citation>
      </ref>
      <ref id="ref98">
        <mixed-citation>
          <article-title>NeurIPS 2019 Competition</article-title>
          and Demonstration
        </mixed-citation>
      </ref>
      <ref id="ref99">
        <mixed-citation>
          <string-name>
            <surname>Track</surname>
            ,
            <given-names>PMLR</given-names>
          </string-name>
          ,
          <year>2020</year>
          , pp.
          <fpage>131</fpage>
          -
          <lpage>141</lpage>
          . [52]
          <string-name>
            <surname>M. van Doorn</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Duivestein</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Mamtani</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref100">
        <mixed-citation>https://labs.sogeti.com/wp-content/uploads/2020/</mixed-citation>
      </ref>
      <ref id="ref101">
        <mixed-citation>
          06/
          <string-name>
            <surname>SogetiLabs-Infinite-</surname>
          </string-name>
          Machine-Creativity.pdf,
        </mixed-citation>
      </ref>
      <ref id="ref102">
        <mixed-citation>
          <source>accessed 1 January</source>
          <year>2022</year>
          . [53]
          <string-name>
            <given-names>D.</given-names>
            <surname>Friedmana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pollaka</surname>
          </string-name>
          ,
          <article-title>Image co-creation by</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref103">
        <mixed-citation>
          <string-name>
            <surname>works</surname>
          </string-name>
          (
          <year>2021</year>
          ). URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2903</volume>
          /
        </mixed-citation>
      </ref>
      <ref id="ref104">
        <mixed-citation>
          <article-title>IUI21WS-HAIGEN-4</article-title>
          .pdf,
          <source>accessed 1 January</source>
          <year>2022</year>
          . [54]
          <string-name>
            <given-names>C. S.</given-names>
            <surname>Peirce</surname>
          </string-name>
          , The essential Peirce: Selected philo-
        </mixed-citation>
      </ref>
      <ref id="ref105">
        <mixed-citation>
          <source>sophical writings</source>
          , vol.
          <volume>2</volume>
          , Indiana University Press,
        </mixed-citation>
      </ref>
      <ref id="ref106">
        <mixed-citation>
          <year>1903</year>
          . [55]
          <string-name>
            <given-names>D.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Martin</surname>
          </string-name>
          ,
          <article-title>Design thinking</article-title>
          and how
        </mixed-citation>
      </ref>
      <ref id="ref107">
        <mixed-citation>
          <source>Learning &amp; Education</source>
          <volume>5</volume>
          (
          <year>2006</year>
          )
          <fpage>512</fpage>
          -
          <lpage>523</lpage>
          . [56]
          <string-name>
            <given-names>S.</given-names>
            <surname>Timmermans</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Tavory</surname>
          </string-name>
          , Theory construction
        </mixed-citation>
      </ref>
      <ref id="ref108">
        <mixed-citation>
          <article-title>abductive analysis</article-title>
          ,
          <source>Sociological theory 30</source>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref109">
        <mixed-citation>
          167-
          <fpage>186</fpage>
          . [57]
          <string-name>
            <given-names>I.</given-names>
            <surname>Tavory</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Timmermans</surname>
          </string-name>
          ,
          <article-title>Abductive analysis</article-title>
          and
        </mixed-citation>
      </ref>
      <ref id="ref110">
        <mixed-citation>
          <article-title>developments in grounded theory (</article-title>
          <year>2019</year>
          )
          <fpage>532</fpage>
          -
          <lpage>546</lpage>
          . [58]
          <string-name>
            <given-names>K.</given-names>
            <surname>Charmaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. I.-A.</given-names>
            <surname>Abductive</surname>
          </string-name>
          , Grounded theory
        </mixed-citation>
      </ref>
      <ref id="ref111">
        <mixed-citation>
          <string-name>
            <given-names>Generations</given-names>
            <surname>Project</surname>
          </string-name>
          . Dublin, Ireland,
          <year>2012</year>
          . [59]
          <string-name>
            <given-names>M.</given-names>
            <surname>Muller</surname>
          </string-name>
          , Curiosity, creativity, and surprise as
        </mixed-citation>
      </ref>
      <ref id="ref112">
        <mixed-citation>
          of Knowing in HCI, Springer,
          <year>2014</year>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>48</lpage>
          . [60]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lipscomb</surname>
          </string-name>
          ,
          <article-title>Abductive reasoning</article-title>
          and qualitative
        </mixed-citation>
      </ref>
      <ref id="ref113">
        <mixed-citation>
          <string-name>
            <surname>research</surname>
          </string-name>
          ,
          <source>Nursing Philosophy</source>
          <volume>13</volume>
          (
          <year>2012</year>
          )
          <fpage>244</fpage>
          -
          <lpage>256</lpage>
          . [61]
          <string-name>
            <given-names>K.</given-names>
            <surname>Rambaree</surname>
          </string-name>
          ,
          <article-title>Abductive thematic network analy-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref114">
        <mixed-citation>
          Methodologies in Management, Springer,
          <year>2018</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref115">
        <mixed-citation>
          61-
          <fpage>86</fpage>
          . [62]
          <string-name>
            <given-names>J.</given-names>
            <surname>Lindley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Coulton</surname>
          </string-name>
          , Back to the
          <source>future: 10</source>
        </mixed-citation>
      </ref>
      <ref id="ref116">
        <mixed-citation>
          <source>2015 British HCI Conference</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>210</fpage>
          -
          <lpage>211</lpage>
          . [63]
          <string-name>
            <given-names>M.</given-names>
            <surname>Smyth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. Helgason</given-names>
            ,
            <surname>Tangible</surname>
          </string-name>
          possibilities-en-
        </mixed-citation>
      </ref>
      <ref id="ref117">
        <mixed-citation>
          <source>ativity 24</source>
          (
          <year>2013</year>
          )
          <fpage>75</fpage>
          -
          <lpage>87</lpage>
          . [64]
          <string-name>
            <given-names>M.</given-names>
            <surname>Huusko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Roto</surname>
          </string-name>
          , Structuring and
        </mixed-citation>
      </ref>
      <ref id="ref118">
        <mixed-citation>
          design workshop,
          <source>in: Proceedings of the 30th</source>
        </mixed-citation>
      </ref>
      <ref id="ref119">
        <mixed-citation>
          <string-name>
            <surname>teraction</surname>
          </string-name>
          ,
          <year>2018</year>
          , pp.
          <fpage>234</fpage>
          -
          <lpage>241</lpage>
          . [65]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Blythe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. C.</given-names>
            <surname>Wright</surname>
          </string-name>
          , Pastiche scenarios:
        </mixed-citation>
      </ref>
      <ref id="ref120">
        <mixed-citation>
          <source>teracting with computers 18</source>
          (
          <year>2006</year>
          )
          <fpage>1139</fpage>
          -
          <lpage>1164</lpage>
          . [66]
          <string-name>
            <given-names>M.</given-names>
            <surname>Muller</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          <article-title>Erickson, In the data kitchen: A</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref121">
        <mixed-citation>
          <source>tended Abstracts of the 2018 CHI Conference on</source>
        </mixed-citation>
      </ref>
      <ref id="ref122">
        <mixed-citation>
          <source>Human Factors in Computing Systems</source>
          ,
          <year>2018</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref123">
        <mixed-citation>
          1-
          <fpage>10</fpage>
          . [67]
          <string-name>
            <given-names>R.</given-names>
            <surname>Noortman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. F.</given-names>
            <surname>Schulte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Marshall</surname>
          </string-name>
          , S. Bakker,
        </mixed-citation>
      </ref>
      <ref id="ref124">
        <mixed-citation>
          probe,
          <source>in: Proceedings of the 2019 CHI Conference</source>
        </mixed-citation>
      </ref>
      <ref id="ref125">
        <mixed-citation>
          <source>on Human Factors in Computing Systems</source>
          ,
          <year>2019</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref126">
        <mixed-citation>
          pp.
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          . [68]
          <string-name>
            <given-names>M.</given-names>
            <surname>Blythe</surname>
          </string-name>
          , E. Encinas, The co-ordinates of de-
        </mixed-citation>
      </ref>
      <ref id="ref127">
        <mixed-citation>magic, in: Proceedings of the 19th international</mixed-citation>
      </ref>
      <ref id="ref128">
        <mixed-citation>
          conference on supporting group work,
          <year>2016</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref129">
        <mixed-citation>
          345-
          <fpage>354</fpage>
          . [69]
          <string-name>
            <given-names>A.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Raby</surname>
          </string-name>
          , Speculative everything: design,
        </mixed-citation>
      </ref>
      <ref id="ref130">
        <mixed-citation>
          <string-name>
            <surname>ifction</surname>
          </string-name>
          , and social dreaming, MIT press,
          <year>2013</year>
          . [70]
          <string-name>
            <surname>M. L. J. Søndergaard</surname>
            ,
            <given-names>L. K.</given-names>
          </string-name>
          <string-name>
            <surname>Hansen</surname>
          </string-name>
          , Intimate fu-
        </mixed-citation>
      </ref>
      <ref id="ref131">
        <mixed-citation>
          <source>of the 2018 Designing Interactive Systems</source>
          Confer-
        </mixed-citation>
      </ref>
      <ref id="ref132">
        <mixed-citation>
          <string-name>
            <surname>ence</surname>
          </string-name>
          ,
          <year>2018</year>
          , pp.
          <fpage>869</fpage>
          -
          <lpage>880</lpage>
          . [71]
          <string-name>
            <given-names>E.</given-names>
            <surname>Encinas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Blythe</surname>
          </string-name>
          ,
          <article-title>The solution printer: magic</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref133">
        <mixed-citation>
          <article-title>realist design fiction</article-title>
          ,
          <source>in: Proceedings of the 2016</source>
        </mixed-citation>
      </ref>
      <ref id="ref134">
        <mixed-citation>
          <source>Factors in Computing Systems</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>387</fpage>
          -
          <lpage>396</lpage>
          . [72]
          <string-name>
            <given-names>V.</given-names>
            <surname>Fuchsberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Meneweger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wurhofer</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref135">
        <mixed-citation>
          work,
          <source>in: Proceedings of the 2017 Conference on</source>
        </mixed-citation>
      </ref>
      <ref id="ref136">
        <mixed-citation>
          <string-name>
            <surname>Designing Interactive Systems</surname>
          </string-name>
          ,
          <year>2017</year>
          , pp.
          <fpage>581</fpage>
          -
          <lpage>586</lpage>
          . [73]
          <string-name>
            <given-names>C.</given-names>
            <surname>Elsden</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Chatting</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. C.</given-names>
            <surname>Durrant</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Garbett,
        </mixed-citation>
      </ref>
      <ref id="ref137">
        <mixed-citation>
          ments,
          <source>in: Proceedings of the 2017 CHI conference</source>
        </mixed-citation>
      </ref>
      <ref id="ref138">
        <mixed-citation>
          <article-title>on human factors in computing systems</article-title>
          ,
          <year>2017</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref139">
        <mixed-citation>
          5386-
          <fpage>5399</fpage>
          . [74]
          <string-name>
            <given-names>B.</given-names>
            <surname>Brown</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Taylor</surname>
          </string-name>
          , S. Izadi,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Sellen,
        </mixed-citation>
      </ref>
      <ref id="ref140">
        <mixed-citation>
          <string-name>
            <surname>Springer</surname>
          </string-name>
          ,
          <year>2007</year>
          , pp.
          <fpage>354</fpage>
          -
          <lpage>371</lpage>
          . [75]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hutchinson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Mackay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Westerlund</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. B.</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref141">
        <mixed-citation>
          <source>on Human factors in computing systems</source>
          ,
          <year>2003</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref142">
        <mixed-citation>
          17-
          <fpage>24</fpage>
          . [76]
          <string-name>
            <given-names>B. F.</given-names>
            <surname>Schulte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Marshall</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Cox</surname>
          </string-name>
          , Homes for
        </mixed-citation>
      </ref>
      <ref id="ref143">
        <mixed-citation>
          <article-title>the 9th nordic conference on human-computer</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref144">
        <mixed-citation>
          <string-name>
            <surname>interaction</surname>
          </string-name>
          ,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . [77]
          <string-name>
            <given-names>E.</given-names>
            <surname>Cheon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. M.</given-names>
            <surname>Su</surname>
          </string-name>
          , Futuristic autobiographies:
        </mixed-citation>
      </ref>
      <ref id="ref145">
        <mixed-citation>
          <article-title>around robots</article-title>
          ,
          <source>in: Proceedings of the 2018</source>
        </mixed-citation>
      </ref>
      <ref id="ref146">
        <mixed-citation>
          <string-name>
            <given-names>Robot</given-names>
            <surname>Interaction</surname>
          </string-name>
          ,
          <year>2018</year>
          , pp.
          <fpage>388</fpage>
          -
          <lpage>397</lpage>
          . [78]
          <string-name>
            <given-names>E. P.</given-names>
            <surname>Baumer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Blythe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. J.</given-names>
            <surname>Tanenbaum</surname>
          </string-name>
          , Evalu-
        </mixed-citation>
      </ref>
      <ref id="ref147">
        <mixed-citation>
          <source>Proceedings of the 2020 ACM Designing</source>
          Interac-
        </mixed-citation>
      </ref>
      <ref id="ref148">
        <mixed-citation>
          <source>tive Systems Conference</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1901</fpage>
          -
          <lpage>1913</lpage>
          . [79]
          <string-name>
            <given-names>J.</given-names>
            <surname>Lindley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Coulton</surname>
          </string-name>
          ,
          <article-title>Pushing the limits of design</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref149">
        <mixed-citation>
          <source>proceedings of the 2016 CHI conference on human</source>
        </mixed-citation>
      </ref>
      <ref id="ref150">
        <mixed-citation>
          <source>factors in computing systems</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>4032</fpage>
          -
          <lpage>4043</lpage>
          . [80]
          <string-name>
            <given-names>M.</given-names>
            <surname>Muller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q. V.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <article-title>Exploring ai ethics and val-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref151">
        <mixed-citation>
          <string-name>
            <given-names>Computer</given-names>
            <surname>Interaction Consortium</surname>
          </string-name>
          (
          <year>2017</year>
          ). [81]
          <string-name>
            <given-names>M.</given-names>
            <surname>Blythe</surname>
          </string-name>
          , E. Buie,
          <article-title>Chatbots of the gods: imag-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref152">
        <mixed-citation>
          <source>in: Proceedings of the 8th Nordic Conference on</source>
        </mixed-citation>
      </ref>
      <ref id="ref153">
        <mixed-citation>
          <string-name>
            <surname>tional</surname>
          </string-name>
          ,
          <year>2014</year>
          , pp.
          <fpage>227</fpage>
          -
          <lpage>236</lpage>
          . [82]
          <string-name>
            <given-names>M.</given-names>
            <surname>Blythe</surname>
          </string-name>
          , Research through design fiction: narra-
        </mixed-citation>
      </ref>
      <ref id="ref154">
        <mixed-citation>
          <source>in computing systems</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>703</fpage>
          -
          <lpage>712</lpage>
          . [83]
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Ambe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Brereton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Soro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Buys</surname>
          </string-name>
          , P. Roe,
        </mixed-citation>
      </ref>
      <ref id="ref155">
        <mixed-citation>
          <article-title>the 2019 CHI Conference on Human Factors in</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref156">
        <mixed-citation>
          <string-name>
            <given-names>Computing</given-names>
            <surname>Systems</surname>
          </string-name>
          ,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          . [84]
          <string-name>
            <given-names>H.</given-names>
            <surname>Draper</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Sorell</surname>
          </string-name>
          ,
          <article-title>Ethical values and social care</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref157">
        <mixed-citation>
          tive study,
          <source>Ethics and Information Technology 19</source>
        </mixed-citation>
      </ref>
      <ref id="ref158">
        <mixed-citation>
          (
          <year>2017</year>
          )
          <fpage>49</fpage>
          . [85]
          <string-name>
            <given-names>T. J.</given-names>
            <surname>Tanenbaum</surname>
          </string-name>
          , Design fictional interactions:
        </mixed-citation>
      </ref>
      <ref id="ref159">
        <mixed-citation>
          <article-title>why hci should care about stories</article-title>
          ,
          <source>interactions 21</source>
        </mixed-citation>
      </ref>
      <ref id="ref160">
        <mixed-citation>
          (
          <year>2014</year>
          )
          <fpage>22</fpage>
          -
          <lpage>23</lpage>
          . [86]
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Buie</surname>
          </string-name>
          ,
          <string-name>
            <surname>Exploring</surname>
          </string-name>
          techno-spirituality: Design
        </mixed-citation>
      </ref>
      <ref id="ref161">
        <mixed-citation>
          <source>dom)</source>
          ,
          <year>2018</year>
          . [87]
          <string-name>
            <given-names>W. A.</given-names>
            <surname>Hamilton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lupfer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kerne</surname>
          </string-name>
          , Livedissent:
        </mixed-citation>
      </ref>
      <ref id="ref162">
        <mixed-citation>
          <article-title>tivist demonstrations</article-title>
          ,
          <source>in: Proceedings of the 2018</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>