{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T20:27:56Z","timestamp":1710361676244},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Law"],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1007\/s10506-004-6250-z","type":"journal-article","created":{"date-parts":[[2005,3,15]],"date-time":"2005-03-15T14:28:22Z","timestamp":1110896902000},"page":"5-37","source":"Crossref","is-referenced-by-count":3,"title":["Law-abiding and integrity on the Internet: A case for agents"],"prefix":"10.1007","volume":"12","author":[{"given":"Frances","family":"Brazier","sequence":"first","affiliation":[]},{"given":"Anja","family":"Oskamp","sequence":"additional","affiliation":[]},{"given":"Corien","family":"Prins","sequence":"additional","affiliation":[]},{"given":"Maurice","family":"Schellekens","sequence":"additional","affiliation":[]},{"given":"Niek","family":"Wijngaards","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","unstructured":"AgentCities (2003). http:\/\/www.agentcities.org\/."},{"key":"CR2","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R. Anderson","year":"2001"},{"key":"CR3","unstructured":"Apistola, M., Brazier, F. M. T., Kubbe, O., Oskamp, A., Schellekens, M. H. M., and Voulon, M. B. (2002). Legal aspects of agent technology. In Proceedings of 17th Bileta conference, Amsterdam, March 2002, 11 pp. Bileta: Edinburgh, Scotland. http:\/\/www.bileta.ac.uk\/."},{"key":"CR4","first-page":"951","volume":"5","author":"K. S. Barber","year":"2000","journal-title":"IEICE Transactions on Communications"},{"issue":"2","key":"CR5","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1002\/1097-024X(200102)31:2<103::AID-SPE358>3.0.CO;2-O","volume":"31","author":"F. Bellifemine","year":"2001","journal-title":"Software - Practice And Experience"},{"issue":"5","key":"CR6","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1038\/scientificamerican0501-34","volume":"184","author":"T. Berners-Lee","year":"2001","journal-title":"Scientific American"},{"key":"CR7","unstructured":"Biasiotti, M. A., Romano, F., and Sagri, M. -T. (2003). The Software Agent?s Liability for Harm Suffered by Third Parties, In Oskamp A. and Weitzenb\u00f6ck E. (eds.), In Proceedings of the Law and Electronic Agents workshop (LEA ?03), 47?56. Norwegian Research Center for Computers and Law: Oslo, Norway."},{"key":"CR8","first-page":"185","volume-title":"The Law of Electronic Agents 2003","author":"J. Bing","year":"2003"},{"key":"CR9","volume-title":"Software Agents","year":"1997"},{"key":"CR10","unstructured":"Brazier, F. M. T., Kubbe, O., Oskamp, A., and Wijngaards, N. J. E. (2002a). Are Law-Abiding Agents Realistic? In Sartor, G. and Cevenini, C. (eds.), In Proceedings of the workshop on the Law of Electronic Agents (LEA ?02), 151?155. CIRSFID, University of Bologna. Bologna, Italy."},{"key":"CR11","first-page":"69","volume-title":"The Law and Electronic Agents","author":"F. M. T. Brazier","year":"2003a"},{"key":"CR12","first-page":"127","volume-title":"The Law and Electronic Agents","author":"F. M. T. Brazier","year":"2003b"},{"key":"CR13","first-page":"9","volume-title":"The Law and Electronic Agents","author":"F. M. T. Brazier","year":"2003c"},{"key":"CR14","first-page":"101","volume-title":"Agent Factory: Generative Migration of Mobile Agents in Heterogeneous Environments.","author":"F.M. T. Brazier","year":"2002b"},{"key":"CR15","unstructured":"Brazier, F. M. T., van Steen, M., and Wijngaards, N. J. E. (2001). On MAS scalability. In Wagner T. and Rana, O. (eds.), Proceedings of Second International Workshop on Infrastructure for Agents, MAS, and Scalable MAS, 121?126, Montreal, Canada."},{"key":"CR16","first-page":"339","volume-title":"Intelligent Agents VII, Lecture Notes in Artificial Intelligence 1986","author":"C. Castelfranchi","year":"2001"},{"key":"CR17","volume-title":"Proceedings of the Law and Electronic Agents workshop (LEA ?03), 21?32","author":"C. Cevenini","year":"2003"},{"issue":"2","key":"CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/swf.18","volume":"1","author":"J. Dale","year":"2001","journal-title":"Software Focus"},{"issue":"2","key":"CR19","first-page":"84","volume":"3","author":"P. De Wilde","year":"1999","journal-title":"International Journal of Knowledge-Based Intelligent Engineering Systems,"},{"issue":"(2?3)","key":"CR20","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/S0169-023X(02)00041-1","volume":"41","author":"Y. Ding","year":"2002","journal-title":"Data and Knowledge Engineering"},{"key":"CR21","volume-title":"Software Agents 291?316","author":"T. Finin","year":"1997"},{"key":"CR22","unstructured":"FIPA (2001), FIPA Agent Platform, http:\/\/www.fipa.org."},{"issue":"5","key":"CR23","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1109\/32.685258","volume":"24","author":"A. Fuggetta","year":"1998","journal-title":"IEEE Transactions on Software Engineering."},{"key":"CR24","volume-title":"Proceedings of the Law and Electronic Agents workshop (LEA?03), 57?68","author":"J. Gelati","year":"2003"},{"key":"CR25","volume-title":"Trust in Electronic Commerce","author":"R. Geurts","year":"2002"},{"issue":"6","key":"CR26","first-page":"543","volume":"32","author":"R. S. Gray","year":"2001","journal-title":"Software: Practice and Experience"},{"key":"CR27","doi-asserted-by":"crossref","unstructured":"Grijpink J. and Prins J. E. J. (2003). New Rules for Anonymous Electronic Transactions? An Exploration of the Private Law Implications of Digital Anonymity. In Nicoll, C. Prins, J. E. J. and van Dellen, M. J. M. (eds.), Digital Anonymity and the Law. Tensions and Dimensions 249?270. T.M.C. Asser Press, The Hague.","DOI":"10.1007\/978-90-6704-579-7_11"},{"key":"CR28","volume-title":"A Privilege Management Scheme for Mobile Agent Systems.","author":"W. Jansen","year":"2001"},{"issue":"2","key":"CR29","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/S0004-3702(99)00107-1","volume":"117","author":"N. R. Jennings","year":"2000","journal-title":"Artificial Intelligence"},{"key":"CR30","volume-title":"Agent Technology: Foundations, Application, and Markets.","year":"1998"},{"issue":"4","key":"CR31","first-page":"301","volume":"31","author":"N. Karnik","year":"2001","journal-title":"Software: Practice and Experience"},{"key":"CR32","first-page":"161","volume":"11","author":"C. E. A. Karnow","year":"1996","journal-title":"Berkeley Technology Law Journal"},{"key":"CR33","volume-title":"Aglets: Programming mobile agents in Java.","author":"D. B. Lange","year":"1997"},{"key":"CR34","unstructured":"Luck, M., McBurney, P., and Preist, C. (2003). Agent Technology: Enabling Next Generation Computing. AgentLink, ISBN 0854 327886, available from http:\/\/www.agentlink.org\/roadmap\/."},{"key":"CR35","doi-asserted-by":"crossref","unstructured":"Marin, O., Bertier, M., and Sens, P. (2003). DARX - A Framework for the Fault-Tolerant Support of Agent Software. In: Proceedings of the 14th IEEE International Symposium on Software Reliability Engineering (ISSRE 2003), 406?417. IEEE Computer Society: Denver, Colorado, USA.","DOI":"10.1109\/ISSRE.2003.1251062"},{"issue":"(1\/2)","key":"CR36","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1080\/088395199117504","volume":"13","author":"D. Martin","year":"1999","journal-title":"Applied Artificial Intelligence"},{"key":"CR37","volume-title":"Trust in Cyber-Societies: Integrating the Human and Artificial Perspectives, Lecture Notes in Computer Science 2246, 27?54","author":"D. H. McKnight","year":"2001"},{"key":"CR38","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0057648","volume-title":"MASIF: The OMG Mobile Agent System Interoperability Facility.","author":"D. Milojicic","year":"1998"},{"key":"CR39","first-page":"61","volume-title":"Managing Agent Life Cycles in Open Distributed Systems, In Proceedings of the 18th ACM Symposium on Applied Computing","author":"D. G. A. Mobach","year":"2003"},{"key":"CR40","unstructured":"Noordende, G. van ?t, Brazier, F. M. T. and Tanenbaum, A. S. (2002). A Security Framework for?a Mobile Agent System, In Fischer, K. and Hutter D. (eds.), Proceedings of the 2nd International Workshop on Security in Mobile Multi-agent Systems (SEMAS 2002), associated with AAMAS-2002, Bologna, Italy, DFKI Research Report RR-02-03, Deutsches Forschungszentrum fur K\u00fcnstliche Intelligenz, 43?50."},{"issue":"3","key":"CR41","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1017\/S026988890000789X","volume":"11","author":"H. S. Nwana","year":"1996","journal-title":"The Knowledge Engineering Review"},{"issue":"1-2","key":"CR42","first-page":"129","volume":"13","author":"H. S. Nwana","year":"1998","journal-title":"Applied AI"},{"key":"CR43","unstructured":"Oskamp, A. and Brazier, F. M. T. (2001). Intelligent Agents for Lawyers, In Proceedings of the Workshop Legal Knowledge Systems in Action: Practical AI in Today?s Law Offices, 5 pp. Saint Louis, Missouri."},{"key":"CR44","doi-asserted-by":"crossref","unstructured":"Peine, H. and Stolpmann, T. (1997). The Architecture of the Ara Platform for Mobile Agents. In Proceedings of the First International Workshop on Mobile Agents (MA ?97), Lecture Notes in Computer Science 1219, 50?61, Springer-Verlag: Berlin, Germany.","DOI":"10.1007\/3-540-62803-7_23"},{"key":"CR45","first-page":"87","volume-title":"Towards Improved Trust and Security in FIPA Agent Platforms, In Proceedings of the Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies","author":"S. Poslad","year":"2000"},{"key":"CR46","doi-asserted-by":"crossref","unstructured":"Sander, T. and Tschudin, C. F. (1998). Protecting Mobile Agents Against Malicious Hosts, In G. Vigna (ed.), Mobile Agents and Security, Lecture Notes in Computer Science 1419, 44?60. Springer-Verlag.","DOI":"10.1007\/3-540-68671-1_4"},{"key":"CR47","unstructured":"Schafer, B. (2003). It?s Just not Cricket - RoboCup and Fair Dealing in Contract, In Oskamp, A. and Weitzenb\u00f6ck E. (eds.), Proceedings of the Law and Electronic Agents workshop (LEA ?03), 33?46. Norwegian Research Center for Computers and Law: Oslo, Norway."},{"issue":"1","key":"CR48","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/0004-3702(93)90034-9","volume":"60","author":"Y. Shoham","year":"1993","journal-title":"Artificial Intelligence"},{"issue":"2","key":"CR49","first-page":"92","volume":"17","author":"K. Stuurman","year":"2001","journal-title":"A Survey of the Legal Aspects of the Application of Intelligent Software Agents. Computer Law and Security Report"},{"key":"CR50","volume-title":"Nomads: Toward a Strong and Safe Mobile Agent System.","author":"N. Suri","year":"2000"},{"issue":"(1?2)","key":"CR51","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1023\/A:1024172719965","volume":"7","author":"K. Sycara","year":"2003","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"CR52","volume-title":"Distributed Systems: Principles and Paradigms","author":"A.S. Tanenbaum","year":"2002"},{"key":"CR53","doi-asserted-by":"crossref","unstructured":"Tripathi, A., Karnik, N., Vora, M., Ahmed, T., and Singh, R. (1999). Mobile agent programming in Ajanta. In Proceedings of the 19th International Conference on Distributed Computing Systems (ICDCS ?99), 190?197. IEEE Computer Society: Austin, Texas, USA.","DOI":"10.1109\/ICDCS.1999.776520"},{"key":"CR54","unstructured":"Turner, P. J. and Jennings, N. R. (2000). Improving the scalability of multi-agent systems. In Wagner, T. and Rana, O. (eds.), Proceedings of the First International Workshop on Infrastructure for Scalable Multi-Agent Systems, 246?262. Barcelone, Spain."},{"key":"CR55","volume-title":"Law and Regulation: Scenarios for the Information Age","author":"B. M. J. van Klink","year":"2002"},{"issue":"3","key":"CR56","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1093\/ijlit\/9.3.204","volume":"9","author":"E. M. Weitzenboeck","year":"2001","journal-title":"International Journal of Law and Information Technology"},{"key":"CR57","unstructured":"Wettig, S. and Zehendner, E. (2003). The Electronic Agent: A Legal Personality under German Law? In Oskamp, A. and Weitzenb\u00f6ck, E. (eds.), Proceedings of the Law and Electronic Agents workshop (LEA ?03), 97?112. Norwegian Research Center for Computers and Law: Oslo, Norway. See also their contribution in this special issue of AI and Law."},{"issue":"2-3","key":"CR58","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0169-023X(02)00042-3","volume":"41","author":"N.J. E. Wijngaards","year":"2002","journal-title":"Data and Knowledge Engineering"},{"issue":"6","key":"CR59","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"M. Winslett","year":"2002","journal-title":"IEEE Internet Computing"},{"key":"CR60","first-page":"149","volume-title":"Adding Security and Trust to Multi-Agent Systems, In Proceedings of Autonomous Agents ?99 Workshop on Deception, Fraud, and Trust in Agent Societies","author":"H. C. Wong","year":"1999"},{"issue":"2","key":"CR61","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1017\/S0269888900008122","volume":"10","author":"M. J. Wooldridge","year":"1995","journal-title":"The Knowledge Engineering Review"},{"key":"CR62","unstructured":"Yip, A. and Cunningham, J. (2003). Ontological Issues in Agent Ownership (Reasoning about Agent Ownership), In Oskamp, A. and Weitzenb\u00f6ck, E. (eds.), Proceedings of the Law and Electronic Agents workshop (LEA ?03), 113 ? 126. Norwegian Research Center for Computers and Law: Oslo, Norway. See also their contribution in this special issue of AI and Law."}],"container-title":["Artificial Intelligence and Law"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-004-6250-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10506-004-6250-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-004-6250-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T18:57:14Z","timestamp":1559156234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10506-004-6250-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":62,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["6250"],"URL":"https:\/\/doi.org\/10.1007\/s10506-004-6250-z","relation":{},"ISSN":["0924-8463","1572-8382"],"issn-type":[{"value":"0924-8463","type":"print"},{"value":"1572-8382","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}