{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:44Z","timestamp":1740099224362,"version":"3.37.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030001773"},{"type":"electronic","value":"9783030001780"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00178-0_8","type":"book-chapter","created":{"date-parts":[[2018,10,22]],"date-time":"2018-10-22T07:13:35Z","timestamp":1540192415000},"page":"124-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Architecture for Establishing Legal Semantic Workflows in the Context of Integrated Law Enforcement"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7125-3289","authenticated-orcid":false,"given":"Markus","family":"Stumptner","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2154-2269","authenticated-orcid":false,"given":"Wolfgang","family":"Mayer","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Grossmann","sequence":"additional","affiliation":[]},{"given":"Jixue","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenhao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Pompeu","family":"Casanovas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0120-6150","authenticated-orcid":false,"given":"Louis","family":"De Koker","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8955-0954","authenticated-orcid":false,"given":"Danuta","family":"Mendelson","sequence":"additional","affiliation":[]},{"given":"David","family":"Watts","sequence":"additional","affiliation":[]},{"given":"Bridget","family":"Bainbridge","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,23]]},"reference":[{"issue":"1","key":"8_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2811403","volume":"48","author":"M Edwards","year":"2015","unstructured":"Edwards, M., Rashid, A., Rayson, P.: A systematic survey of online data mining technology intended for law enforcement. ACM Comput. Surv. (CSUR) 48(1), 15 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-04093-6_18","volume-title":"The Onlife Manifesto. Being Human in a Hyperconnected Era","author":"U Pagallo","year":"2015","unstructured":"Pagallo, U.: Good onlife governance: on law, spontaneous orders, and design. In: Floridi, L. (ed.) The Onlife Manifesto. Being Human in a Hyperconnected Era, pp. 161\u2013177. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-04093-6_18"},{"key":"8_CR3","series-title":"Philosophical Studies Series","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-319-45300-2_9","volume-title":"Ethics and Policies for Cyber Operations","author":"P Casanovas","year":"2017","unstructured":"Casanovas, P.: Cyber warfare and organised crime. A regulatory model and meta-model for open source intelligence (OSINT). In: Taddeo, M., Glorioso, L. (eds.) Ethics and Policies for Cyber Operations. PSS, vol. 124, pp. 139\u2013167. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-45300-2_9"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Alexe, B., ten Cate, B., Kolaitis, P.G., Tan, W.C.: Designing and refining schema mappings via data examples. In: Proceedings ACM SIGMOD International Conference on Management of Data, pp. 133\u2013144 (2011)","DOI":"10.1145\/1989323.1989338"},{"key":"8_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2016.07.005","author":"V Rodr\u00edguez-Doncel","year":"2016","unstructured":"Rodr\u00edguez-Doncel, V., Santos, C., Casanovas, P., et al.: Legal aspects of linked data \u2013 The European framework. Comput. Law Secur. Rev. (2016). \nhttps:\/\/doi.org\/10.1016\/j.clsr.2016.07.005","journal-title":"Comput. Law Secur. Rev."},{"key":"8_CR6","series-title":"Data-Centric Systems and Applications","isbn-type":"print","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16518-4","volume-title":"Schema Matching and Mapping","author":"Z Bellahsene","year":"2011","unstructured":"Bellahsene, Z., Bonifati, A., Rahm, E.: Schema Matching and Mapping. Data-Centric Systems and Applications. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-16518-4\n\n. ISBN 978-3-642-16517-7","ISBN":"https:\/\/id.crossref.org\/isbn\/9783642165177"},{"key":"8_CR7","unstructured":"Rodriguez-Doncel, V., G\u00f3mez-P\u00e9rez, A., Mihindukulasooriya, N.: Rights declaration in linked data. In: Hartig, O., et al. (eds.) COLD. CEUR, vol. 1034 (2013). \nhttp:\/\/ceur-ws.org\/Vol-1034\/RodriguezDoncelEtAl_COLD2013.pdf"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-41335-3_10","volume-title":"The Semantic Web \u2013 ISWC 2013","author":"G Governatori","year":"2013","unstructured":"Governatori, G., Rotolo, A., Villata, S., Gandon, F.: One license to compose them all. In: Alani, H., et al. (eds.) ISWC 2013. LNCS, vol. 8218, pp. 151\u2013166. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-41335-3_10"},{"key":"8_CR9","unstructured":"Cardellino, C., et al.: Licentia: a tool for supporting users in data licensing on the web of data. In: Proceedings of the 2014 International Conference on Posters & Demonstrations Track, vol. 1272. CEUR-WS.org (2014)"},{"key":"8_CR10","first-page":"91","volume-title":"Legal Knowledge and Information Systems","author":"V Rodr\u00edguez-Doncel","year":"2015","unstructured":"Rodr\u00edguez-Doncel, V., Santos, C., Casanovas, P., et al.: A linked term bank of copyright-related terms. In: Rotolo, A. (ed.) Legal Knowledge and Information Systems, pp. 91\u201399. IOS Press, Amsterdam (2015)"},{"issue":"1","key":"8_CR11","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1609\/aimag.v36i1.2565","volume":"36","author":"CA Knoblock","year":"2015","unstructured":"Knoblock, C.A., Szekely, P.A.: Exploiting semantics for big data integration. AI Mag. 36(1), 25\u201338 (2015)","journal-title":"AI Mag."},{"issue":"7","key":"8_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2015.182","volume":"48","author":"X Xiaofei","year":"2015","unstructured":"Xiaofei, X., Sheng, Q.Z., Zhang, L.-J., Fan, Y., Dustdar, S.: From big data to big service. IEEE Comput. 48(7), 80\u201383 (2015)","journal-title":"IEEE Comput."},{"issue":"2","key":"8_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijwest.2016.7201","volume":"7","author":"P Casanovas","year":"2016","unstructured":"Casanovas, P., Palmirani, M., Peroni, S., van Engers, T., Vitali, F.: Special issue on the semantic web for the legal domain, guest editors editorial: the next step. Semant. Web J. 7(2), 1\u201313 (2016)","journal-title":"Semant. Web J."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Boella, G., Humphreys, L., Muthuri, R., van der Torre, L., Rossi, P.: A critical analysis of legal requirements engineering from the perspective of legal practice. In: Seventh IEEE Workshop on Requirements Engineering and Law, pp. 14\u201321. IEEE RELAW (2014)","DOI":"10.1109\/RELAW.2014.6893476"},{"issue":"2","key":"8_CR15","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1080\/13600869.2013.801589","volume":"28","author":"BJ Koops","year":"2014","unstructured":"Koops, B.J., Leenes, R.: Privacy regulation cannot be hardcoded. A critical comment on the \u2018privacy by design\u2019 provision in data-protection law. Int. Rev. Law Comput. Technol. 28(2), 159\u2013171 (2014)","journal-title":"Int. Rev. Law Comput. Technol."},{"key":"8_CR16","unstructured":"Casanovas, P., Arraiza, J., Melero, F., Gonz\u00e1lez-Conejero, J., Molcho, G., Cuadros, M.: Fighting organized crime through open source intelligence: regulatory strategies of the CAPER Project. In: Proceedings of the 27th Annual Conference on Legal Knowledge and Information Systems, JURIX-2014, pp. 189\u2013199. IOS Press, Amsterdam (2014)"},{"key":"8_CR17","doi-asserted-by":"publisher","unstructured":"Colesky, M., Hoepman, J.H., Hillen, C.: A critical analysis of privacy design strategies. In: IEEE Symposium on Security and Privacy Workshops, pp. 33\u201340 (2016). \nhttps:\/\/doi.org\/10.1109\/spw.2016.23","DOI":"10.1109\/spw.2016.23"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Maurushat, A., Bennet-Moses, L., Vaile, D.: Using \u2018big\u2019 metadata for criminal intelligence: understanding limitations and appropriate safeguards. In: Proceedings of the 15th International Conference on Artificial Intelligence and Law, pp. 196\u2013200. ACM (2015)","DOI":"10.1145\/2746090.2746110"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.is.2015.04.003","volume":"54","author":"M Selway","year":"2015","unstructured":"Selway, M., Grossmann, G., Mayer, W., Stumptner, M.: Formalising natural language specifications using a cognitive linguistic\/configuration based approach. Inf. Syst. 54, 191\u2013208 (2015)","journal-title":"Inf. Syst."},{"key":"8_CR20","unstructured":"Bennet Moses, L., Chan, J., De Koker, L., et al.: Big Data Technology and National Security - Comparative International Perspectives on Strategy, Policy and Law Australia. Data to Decisions CRC (2016)"},{"key":"8_CR21","unstructured":"Parliamentary Joint Committee on Law Enforcement. In: Inquiry into the Gathering and Use of Criminal Intelligence (2013). \nhttp:\/\/www.aph.gov.au\/~\/media\/wopapub\/senate\/committee\/le_ctte\/completed_inquiries\/2010-13\/criminal_intelligence\/report\/report.ashx"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s13347-013-0119-6","volume":"26","author":"U Pagallo","year":"2013","unstructured":"Pagallo, U.: Online security and the protection of civil rights: a legal overview. Philos. Technol. 26, 381\u2013395 (2013)","journal-title":"Philos. Technol."},{"key":"8_CR23","unstructured":"Grossmann, G., et al.: Integrated Law Enforcement Platform Federated Data Model. Technical report, Data to Decisions CRC (2017)"},{"key":"8_CR24","unstructured":"Lebo, T., et al.: Prov-o: The PROV Ontology. W3C Recommendation (2013)"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-540-69927-9_4","volume-title":"Theory and Practice of Model Transformations","author":"DS Kolovos","year":"2008","unstructured":"Kolovos, D.S., Paige, R.F., Polack, F.A.C.: The epsilon transformation language. In: Vallecillo, A., Gray, J., Pierantonio, A. (eds.) ICMT 2008. LNCS, vol. 5063, pp. 46\u201360. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-69927-9_4"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Del Corro, L., Gemulla, R.: Clausie: clause-based open information extraction. In: Proceedings of the 22nd International Conference on World Wide Web. ACM (2013)","DOI":"10.1145\/2488388.2488420"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-44421-5_11","volume-title":"Electronic Government","author":"A Mondorf","year":"2016","unstructured":"Mondorf, A., Wimmer, M.A.: Requirements for an architecture framework for pan-european e-government services. In: Scholl, H.J., et al. (eds.) EGOVIS 2016. LNCS, vol. 9820, pp. 135\u2013150. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-44421-5_11"},{"key":"8_CR28","unstructured":"Open Group Standard TOGAF Version 9.1 Document Number: G116. ISBN 9789087536794"},{"key":"8_CR29","unstructured":"Watts, D., Bainbridge, B., de Koker, L., Casanovas, P., Smythe, S.: Project B.3. In: A Governance Framework for the National Criminal Intelligence System (NCIS), Data to Decisions Cooperative Research Centre, La Trobe University, 30 June 2017"},{"key":"8_CR30","unstructured":"Bennet-Moses, L., de Koker, L.: Open secrets: balancing operational secrecy and transparency in the collection and use of data for national security and law enforcement agencies. Melb. Univ. Law Rev. 41(2) (2017)"},{"key":"8_CR31","unstructured":"Bainbridge, B., de Koker, L., Watts, D., Mendelson, D., Casanovas, P.: Identity Assurance, \u2018Pattern of Life\u2019 and Big Data Analytics Report. Project B.1: Identity Assurance, Law and Policy Program. Data to Decisions Cooperative Research Centre, La Trobe University, May 2017"},{"key":"8_CR32","unstructured":"Mayer, W., Stumpfner, M., Casanovas, P., de Koker, L.: Towards a linked information architecture for integrated law enforcement. In: Poblet, M., Plaza, E., Casanovas, P. (eds.), Linked Democracy: Artificial Intelligence for Democratic Innovation, IJCAI-2017 Workshop, August, Melbourne, CEUR, pp. 15\u201337 (2017). \nhttp:\/\/ceur-ws.org\/Vol-1897\/"},{"key":"8_CR33","volume-title":"Master Data Management and Data Governance","author":"A Berson","year":"2010","unstructured":"Berson, A., Dubov, L.: Master Data Management and Data Governance, 2nd edn. McGraw-Hill Education, New York (2010)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","AI Approaches to the Complexity of Legal Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00178-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,22]],"date-time":"2018-10-22T07:18:25Z","timestamp":1540192705000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00178-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030001773","9783030001780"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00178-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"AICOL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on AI Approaches to the Complexity of Legal Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bologna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aicol2016a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.aicol.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}