{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:33:27Z","timestamp":1742913207719,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030898106"},{"type":"electronic","value":"9783030898113"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-89811-3_17","type":"book-chapter","created":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T06:24:53Z","timestamp":1637907893000},"page":"247-259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SPIRIT: Semantic and Systemic Interoperability for Identity Resolution in Intelligence Analysis"],"prefix":"10.1007","author":[{"given":"Costas","family":"Davarakis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0036-6662","authenticated-orcid":false,"given":"Eva","family":"Blomqvist","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0782-0274","authenticated-orcid":false,"given":"Marco","family":"Tiemann","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0980-2371","authenticated-orcid":false,"given":"Pompeu","family":"Casanovas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,27]]},"reference":[{"key":"17_CR1","unstructured":"Blomqvist, E., Davarakis, C.: Intelligence analysis and semantic interoperability for identity resolution (abstract). TWSDetection, Toulouse, 27\u201328 February 2020. http:\/\/ceur-ws.org\/Vol-2606\/12invited.pdf"},{"key":"17_CR2","unstructured":"Casanovas, P., Morris, N., Gonz\u00e1lez-Conejero, J., Teodoro, E., Adderley, R.: Minimisation of incidental findings, and residual risks for security compliance: the SPIRIT Project. In: TERECOM@JURIX 2018, pp. 85\u201396. CEUR 2309 (2018). https:\/\/ceur-ws.org\/Vol-2309\/09.pdf"},{"key":"17_CR3","unstructured":"Adderley, R., Adderley, S., Rovatsou, R., Kazemian, H., Raffaelli, M., Ferrara, F.: Blomqvist: SPIRIT. Deliverable n\u00b0 D6.2. Resource Flow Pattern Recognition Algorithms (WP6), 30 November 2019"},{"key":"17_CR4","doi-asserted-by":"publisher","unstructured":"Casanovas, P., Morris, N., Teodoro, E., Gonz\u00e1lez-Conejero, J., Adderley, R.: SPIRIT. Deliverable n. D9.2. Incidental Findings Policy (WP9), 31 October 2018. https:\/\/doi.org\/10.5281\/zenodo.3815050","DOI":"10.5281\/zenodo.3815050"},{"key":"17_CR5","unstructured":"Hartig, O., Blomqvist, E., Capshaw, R., Raffaelli, M., Adderley, R., Kazemian, H.: SPIRIT. Deliverable n. \u00b0 D5.1. Graph Infrastructure and Analysis (Report and software) (WP5), 30 November 2019"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Botoeva, E., Calvanese, D., Cogrel, B., Corman, J., Xiao, G.: Ontology-based data access \u2013 beyond relational sources. Intelligenza Artificiale  13(1),  21\u201336  (2019). IOS Press","DOI":"10.3233\/IA-190023"},{"key":"17_CR7","unstructured":"Tiemann, M., Badii, L., Faulkner, R.: SPIRIT. Deliverable n. 9.7 Privacy Controller for Modelling and Filtering Software and Report (a). (WP2), 30 October 2019"},{"key":"17_CR8","unstructured":"Bartolini, C., Muthuri, R.: Reconciling data protection rights and obligations: an ontology of the forthcoming EU regulation. In: Workshop on Language and Semantic Technology for Legal Domain, p. 8 (2015). https:\/\/orbilu.uni.lu\/bitstream\/10993\/21969\/1\/main.pdf"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-319-98349-3_11","volume-title":"Electronic Government and the Information Systems Perspective","author":"M Palmirani","year":"2018","unstructured":"Palmirani, M., Martoni, M., Rossi, A., Bartolini, C., Robaldo, L.: PrOnto: privacy ontology for legal reasoning. In: K\u0151, A., Francesconi, E. (eds.) EGOVIS 2018. LNCS, vol. 11032, pp. 139\u2013152. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98349-3_11"},{"key":"17_CR10","unstructured":"Pandit, H.J., Lewis, D.: Modelling provenance for GDPR compliance using linked open data vocabularies. In Proceedings of the 5th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2017) (PrivOn) (2017). http:\/\/ceur-ws.org\/Vol-1951\/PrivOn2017_paper_6.pdf"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Jonas, J.: Identity resolution: 23 years of practical experience and observations at scale. In: 2006 ACM SIGMOD International Conference on Management of Data, p. 718 (2006)","DOI":"10.1145\/1142473.1142556"},{"key":"17_CR12","unstructured":"Bartunov, S., Korshunov, A., Park, S.T., Ryu, W., Lee, H.: Joint link-attribute user identity resolution in online social networks. In: The 6th SNA-KDD Workshop 2012 (SNA-KDD 2012), 12 August. ACM (2012)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Fu, X., Boongoen, T., Shen, Q.: Evidence directed generation of plausible crime scenarios with identity resolution. Appl. Artif. Intell. 24(4), pp. 253\u2013276 (2010)","DOI":"10.1080\/08839511003715154"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"9390","DOI":"10.1109\/ACCESS.2018.2799522","volume":"6","author":"A Papageorgiou","year":"2018","unstructured":"Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E., Solanas, A., Patsakis, C.: Security and privacy analysis of mobile health applications: the alarming state of practice. IEEE Access 6, 9390\u20139403 (2018)","journal-title":"IEEE Access"},{"key":"17_CR15","first-page":"66","volume":"3","author":"S Zimmeck","year":"2019","unstructured":"Zimmeck, S., et al.: Maps: scaling privacy compliance analysis to a million apps. Proc. Priv. Enhanc. Technol. 3, 66\u201386 (2019)","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"17_CR16","doi-asserted-by":"publisher","unstructured":"Torra, V.: Data privacy: Foundations, New Developments and the Big Data Challenge. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57358-8","DOI":"10.1007\/978-3-319-57358-8"},{"key":"17_CR17","unstructured":"EU 2016: Directive (EU) 2016\/680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008\/977\/JHA. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32016L0680"},{"key":"17_CR18","unstructured":"EU 2016: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"issue":"4","key":"17_CR19","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s12553-017-0191-5","volume":"7","author":"P Casanovas","year":"2017","unstructured":"Casanovas, P., Mendelson, D., Poblet, M.: A linked democracy approach for regulating public health data. Heal. Technol. 7(4), 519\u2013537 (2017)","journal-title":"Heal. Technol."},{"key":"17_CR20","doi-asserted-by":"publisher","unstructured":"EU 2017: New European interoperability framework promoting seamless services and data flows for European public administrations. Publications Office of the European Union, Luxembourg (2017). https:\/\/doi.org\/10.2799\/78681","DOI":"10.2799\/78681"},{"key":"17_CR21","unstructured":"EU 2007: DIRECTIVE 2007\/2\/EC of the European Parliament and of the Council of 14 March 2007 establishing an Infrastructure for Spatial Information in the European Community (INSPIRE). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32007L0002&from=EN"},{"key":"17_CR22","unstructured":"EU 2017: Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of The Regions. European Interoperability Framework \u2013 Implementation Strategy. Brussels, 23.3.2017 COM(2017) 134 final. https:\/\/eur-lex.europa.eu\/resource.html?uri=cellar:2c2f2554-0faf-11e7-8a35-01aa75ed71a1.0017.02\/DOC_1&format=PDF"},{"key":"17_CR23","unstructured":"EU 2005: Communication from the Commission to the Council and the European Parliament on improved effectiveness, enhanced interoperability and synergies among European databases in the area of Justice and Home Affairs, Brussels, 24.11.2005 COM(2005) 597 final"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"De Hert, P., Gutwirth, S.: Interoperability of police databases within the EU: an accountable political choice? Int. Rev. Law Comput. Technol. 20(1\u20132), 21\u201335 (2006)","DOI":"10.1080\/13600860600818227"},{"key":"17_CR25","unstructured":"EU 2017: Proposal for a Regulation of the European Parliament and of the Council on establishing a framework for interoperability between EU information systems (police and judicial cooperation, asylum and migration). Brussels, 12.12.2017 COM(2017) 794 final 2017\/0352 (COD)"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Quintel, T.: Interoperability of EU Databases and Access to Personal Data by National Police Authorities under Article 20 of the Commission Proposals. Eur. Data Prot. L. Rev. 4, 470\u2013482 (2018)","DOI":"10.21552\/edpl\/2018\/4\/9"},{"key":"17_CR27","doi-asserted-by":"publisher","unstructured":"Kubicek, H., Cimander, R., Scholl, H.J.: Layers of Interoperability. In: Kubicek, H., Cimander, R., Scholl, H.J. (eds.) Organizational Interoperability in E-Government, pp. 85\u201396. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22502-4_7","DOI":"10.1007\/978-3-642-22502-4_7"},{"key":"17_CR28","doi-asserted-by":"publisher","unstructured":"Dignum, V.: Responsible Artificial Intelligence: How to Develop and use AI in a Responsible Way. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30371-6","DOI":"10.1007\/978-3-030-30371-6"},{"key":"17_CR29","unstructured":"Pagallo, U., Casanovas, P., Madelin, R., Dignum, V., et al.: AI4People. 2019. On Good AI Governance. 14 Priority Actions as SMART Model of Governance, and a Regulatory Toolbox (2019). https:\/\/www.eismd.eu\/wp-content\/uploads\/2019\/11\/AI4Peoples-Report-on-Good-AI-Governance_compressed.pdf"},{"key":"17_CR30","unstructured":"Whittlestone, J., Nyrup, R., Alexandrova, A.,Dihal, K., Cave, S.: Ethical and Societal Implications of Algorithms, Data, and Artificial Intelligence: A Roadmap for Research. Nuffield Foundation, London (2019)"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A., Kirrane, S., Petrova, I.M., Sauro, L.: Machine Understandable Policies and GDPR Compliance Checking. arXiv preprint arXiv:2001.08930 (2020)","DOI":"10.1007\/s13218-020-00677-4"},{"key":"17_CR32","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1007\/978-3-319-49004-5_48","volume-title":"Knowledge Engineering and Knowledge Management","author":"G Governatori","year":"2016","unstructured":"Governatori, G., Hashmi, M., Lam, H.-P., Villata, S., Palmirani, M.: Semantic business process regulatory compliance checking using LegalRuleML. In: Blomqvist, E., Ciancarini, P., Poggi, F., Vitali, F. (eds.) EKAW 2016. LNCS (LNAI), vol. 10024, pp. 746\u2013761. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49004-5_48"}],"container-title":["Lecture Notes in Computer Science","AI Approaches to the Complexity of Legal Systems XI-XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-89811-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T06:27:26Z","timestamp":1637908046000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-89811-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030898106","9783030898113"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-89811-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AICOL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on AI Approaches to the Complexity of Legal Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"XII","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aicol2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/aicol.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}