{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:29:03Z","timestamp":1763458143447,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031074745"},{"type":"electronic","value":"9783031074752"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-07475-2_15","type":"book-chapter","created":{"date-parts":[[2022,5,29]],"date-time":"2022-05-29T19:02:13Z","timestamp":1653850933000},"page":"221-236","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Eliciting Ethicality Requirements Using the\u00a0Ontology-Based Requirements Engineering Method"],"prefix":"10.1007","author":[{"given":"Renata","family":"Guizzardi","sequence":"first","affiliation":[]},{"given":"Glenda","family":"Amaral","sequence":"additional","affiliation":[]},{"given":"Giancarlo","family":"Guizzardi","sequence":"additional","affiliation":[]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"15_CR1","unstructured":"A framework for ethical decision making (2015). https:\/\/www.scu.edu\/ethics\/ethics-resources\/ethical-decision-making\/a-framework-for-ethical-decision-making\/"},{"key":"15_CR2","unstructured":"The 2-second rule. In: Learn the Road Code (2016). https:\/\/drive.govt.nz\/get-your-learners\/interactive-road-code\/"},{"key":"15_CR3","unstructured":"Ethics guidelines for trustworthy AI (2019). https:\/\/digital-strategy.ec.europa.eu\/en\/library\/ethics-guidelines-trustworthy-ai"},{"key":"15_CR4","unstructured":"The 7 Most Pressing Ethical Issues in Artificial Intelligence (2019). https:\/\/kambria.io\/blog\/the-7-most-pressing-ethical-issues-in-artificial-intelligence\/"},{"key":"15_CR5","doi-asserted-by":"publisher","unstructured":"IEEE standard model process for addressing ethical concerns during system design. IEEE STD 7000-2021, pp. 1\u201382 (2021). https:\/\/doi.org\/10.1109\/IEEESTD.2021.9536679","DOI":"10.1109\/IEEESTD.2021.9536679"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Al Balushi, T., Sampaio, P., Dabhi, D., Loucopoulos, P.: ElicitO: a quality ontology-guided NFR elicitation tool. In: 13th International Working Conference on Requirement Engineering: Foundation for Software Quality, pp. 306\u2013319 (2007)","DOI":"10.1007\/978-3-540-73031-6_23"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-030-62522-1_25","volume-title":"Conceptual Modeling","author":"G Amaral","year":"2020","unstructured":"Amaral, G., Guizzardi, R., Guizzardi, G., Mylopoulos, J.: Ontology-based modeling and analysis of trustworthiness requirements: preliminary results. In: Dobbie, G., Frank, U., Kappel, G., Liddle, S.W., Mayr, H.C. (eds.) ER 2020. LNCS, vol. 12400, pp. 342\u2013352. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62522-1_25"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Amaral, G., Guizzardi, R., Guizzardi, G., Mylopoulos, J.: Ontology-based requirements engineering: the case of trustworthiness requirements. In: 40th International Conference on Conceptual Modeling, pp. 257\u2013267 (2021)","DOI":"10.1007\/978-3-030-89022-3_21"},{"key":"15_CR9","unstructured":"European Commission High-Level Expert Group on Artificial Intelligence: Draft ethics guidelines for trustworthy AI, draft document (2018)"},{"key":"15_CR10","volume-title":"Ontology and Metaontology: A Contemporary Guide","author":"F Berto","year":"2015","unstructured":"Berto, F., Plebani, M.: Ontology and Metaontology: A Contemporary Guide. Bloomsbury Publishing, London (2015)"},{"key":"15_CR11","unstructured":"Castelfranchi, C.: Commitments: from individual intentions to groups and organizations. In: ICMAS, vol. 95, pp. 41\u201348 (1995)"},{"issue":"2","key":"15_CR12","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1111\/j.1365-2575.2012.00408.x","volume":"23","author":"M Charaf","year":"2013","unstructured":"Charaf, M., Rosenkranz, C., Holten, R.: The emergence of shared understanding: applying functional pragmatics to study the requirements development process. Inf. Syst. J. 23(2), 115\u2013135 (2013)","journal-title":"Inf. Syst. J."},{"key":"15_CR13","unstructured":"Dalpiaz, F., Franch, X., Horkoff, J.: iStar 2.0 language guide. arXiv:1605.07767 [cs.SE] (2016). http:\/\/dalp-fran-hork-16-istar.pdf\/"},{"key":"15_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30371-6","volume-title":"Responsible Artificial Intelligence: How to Develop and Use AI in a Responsible Way","author":"V Dignum","year":"2019","unstructured":"Dignum, V.: Responsible Artificial Intelligence: How to Develop and Use AI in a Responsible Way. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30371-6"},{"issue":"2","key":"15_CR15","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3233\/AO-180197","volume":"13","author":"BB Duarte","year":"2018","unstructured":"Duarte, B.B., et al.: Ontological foundations for software requirements with a focus on requirements at runtime. Appl. Ontol. 13(2), 73\u2013105 (2018)","journal-title":"Appl. Ontol."},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s10892-017-9252-2","volume":"12","author":"A Etzioni","year":"2017","unstructured":"Etzioni, A., Etzioni, O.: Incorporating ethics into artificial intelligence. J. Ethics 12, 403\u2013418 (2017)","journal-title":"J. Ethics"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1007\/s11023-018-9482-5","volume":"28","author":"L Floridi","year":"2018","unstructured":"Floridi, L., et al.: AI4People-an ethical framework for a good AI society: opportunities, risks, principles, and recommendations. Minds Mach. 28, 689\u2013707 (2018)","journal-title":"Minds Mach."},{"issue":"3\u20134","key":"15_CR18","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s00450-014-0256-x","volume":"30","author":"M Glinz","year":"2015","unstructured":"Glinz, M., Fricker, S.: On shared understanding in software engineering: an essay. Comput. Sci. Res. Dev. 30(3\u20134), 363\u2013376 (2015)","journal-title":"Comput. Sci. Res. Dev."},{"key":"15_CR19","unstructured":"Guizzardi, G.: Ontological foundations for structural conceptual models. Telematica Instituut\/CTIT (2005)"},{"issue":"3\u20134","key":"15_CR20","doi-asserted-by":"publisher","first-page":"259","DOI":"10.3233\/AO-150157","volume":"10","author":"G Guizzardi","year":"2015","unstructured":"Guizzardi, G., Wagner, G., Almeida, J.P.A., Guizzardi, R.S.S.: Towards ontological foundations for conceptual modeling: the Unified Foundational Ontology (UFO) story. Appl. Ontol. 10(3\u20134), 259\u2013271 (2015)","journal-title":"Appl. Ontol."},{"key":"15_CR21","unstructured":"Guizzardi, R.: Agent-oriented Constructivist Knowledge Management. Ph.D. thesis, University of Twente, Netherlands (2006)"},{"key":"15_CR22","unstructured":"Guizzardi, R., Carneiro, B.G., Porello, D., Guizzardi, G.: A core ontology on decision making. In: Proceedings of the 13th Seminar on Ontology Research in Brazil (2020)"},{"key":"15_CR23","unstructured":"Guizzardi, R. et al.: An ontological interpretation of non-functional requirements. In: Proceedings of FOIS, vol. 14, pp. 344\u2013357 (2014)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Guizzardi, R., et al.: Ethical requirements for AI systems. In: Proceedings of Canadian AI 2020, pp. 251\u2013256 (2020)","DOI":"10.1007\/978-3-030-47358-7_24"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1049\/iet-sen.2014.0153","volume":"9","author":"H Hu","year":"2015","unstructured":"Hu, H., et al.: Semantic modelling and automated reasoning of non-functional requirement conflicts in the context of softgoal interdependencies. IET Softw. 9, 145\u2013156 (2015)","journal-title":"IET Softw."},{"key":"15_CR26","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199259823.001.0001","volume-title":"Dispositions","author":"S Mumford","year":"2003","unstructured":"Mumford, S.: Dispositions. Clarendon Press, Oxford (2003)"},{"issue":"1","key":"15_CR27","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TTS.2020.2974991","volume":"1","author":"D Peters","year":"2020","unstructured":"Peters, D., Vold, K., Robinson, D., Calvo, R.: Responsible AI: two frameworks for ethical design practice. IEEE Trans. Technol. Soc. 1(1), 34\u201347 (2020)","journal-title":"IEEE Trans. Technol. Soc."},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Rashid, A., Moore, K., May-Chahal, C., Chitchyan, R.: Managing emergent ethical concerns for software engineering in society. In: 37th IEEE International Conference on Software Engineering, pp. 523\u2013526. IEEE (2015)","DOI":"10.1109\/ICSE.2015.187"},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-030-00847-5_11","volume-title":"Conceptual Modeling","author":"TP Sales","year":"2018","unstructured":"Sales, T.P., Bai\u00e3o, F., Guizzardi, G., Almeida, J.P.A., Guarino, N., Mylopoulos, J.: The common ontology of value and risk. In: Trujillo, J.C., et al. (eds.) ER 2018. LNCS, vol. 11157, pp. 121\u2013135. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00847-5_11"},{"key":"15_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-030-21290-2_10","volume-title":"Advanced Information Systems Engineering","author":"R Veleda","year":"2019","unstructured":"Veleda, R., Cysneiros, L.M.: Towards an ontology-based approach for eliciting possible solutions to non-functional requirements. In: Giorgini, P., Weber, B. (eds.) CAiSE 2019. LNCS, vol. 11483, pp. 145\u2013161. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21290-2_10"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Werner, C., Li, Z., Ernst, N., Damian, D.: The lack of shared understanding of non-functional requirements in continuous software engineering: accidental or essential? In: 28th IEEE International Requirements Engineering Conference, RE 2020, Zurich, Switzerland, 31 August\u20134 September 2020, pp. 90\u2013101. IEEE (2020)","DOI":"10.1109\/RE48521.2020.00021"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise, Business-Process and Information Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-07475-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,29]],"date-time":"2022-05-29T23:12:22Z","timestamp":1653865942000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-07475-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031074745","9783031074752"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-07475-2_15","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"30 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EMMSAD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Evaluation and Modeling Methods for Systems Analysis and Development","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leuven","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"emmsad2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.emmsad.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}