{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:21:50Z","timestamp":1740122510300,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:00:00Z","timestamp":1590451200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:00:00Z","timestamp":1590451200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Law"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s10506-020-09267-z","type":"journal-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T06:03:32Z","timestamp":1590473012000},"page":"267-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ICAIL Doctoral Consortium, Montreal 2019"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2524-3976","authenticated-orcid":false,"given":"Micha\u0142","family":"Araszkiewicz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ilaria Angela","family":"Amantea","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saurabh","family":"Chakravarty","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert","family":"van Doesburg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maria","family":"Dymitruk","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marie","family":"Garin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leilani","family":"Gilpin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daphne","family":"Odekerken","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seyedeh Sajedeh","family":"Salehi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,5,26]]},"reference":[{"key":"9267_CR1","doi-asserted-by":"crossref","unstructured":"Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 308\u2013318","DOI":"10.1145\/2976749.2978318"},{"key":"9267_CR2","doi-asserted-by":"publisher","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi A, Berrada M (2018) Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access 6:52138\u201352160","journal-title":"IEEE Access"},{"key":"9267_CR3","unstructured":"Aimonino Ricauda N, Isaia G, Tibaldi V, Bestente G, Frisiello A, Sciarappa A, Cavallo S, Ghezzi M, Larini G (2011) Telecare and telemedicine in home care practice: field trial results. In: Distributed diagnosis and home healthcare, vol 2. American Scientific Publishers (ASP), Los Angeles, pp 281\u2013303"},{"key":"9267_CR4","doi-asserted-by":"publisher","first-page":"e93","DOI":"10.7717\/peerj-cs.93","volume":"2","author":"N Aletras","year":"2016","unstructured":"Aletras N, Tsarapatsanis D, Preo\u0163iuc-Pietro D, Lampos V (2016) Predicting judicial decisions of the European Court of Human Rights: a natural language processing perspective. PeerJ Comput Sci 2:e93","journal-title":"PeerJ Comput Sci"},{"key":"9267_CR5","doi-asserted-by":"crossref","unstructured":"Amantea IA, Di\u00a0Leva A, Sulis E (2018) A simulation-driven approach in risk-aware business process management: a case study in healthcare. In: Proceedings of 8th international conference on simulation and modeling methodologies, technologies and applications\u2014volume 1 (SIMULTECH), pp 98\u2013105","DOI":"10.5220\/0006842100980105"},{"key":"9267_CR6","first-page":"157","volume-title":"The future of risk management","author":"IA Amantea","year":"2019","unstructured":"Amantea IA, Di Leva A, Sulis E (2019) Risk-aware business process management: a case study in healthcare. In: Kunreuther H, Meyer RJ, Michel-Kerjan EO (eds) The future of risk management, vol I. Springer, Berlin, pp 157\u2013174"},{"key":"9267_CR7","unstructured":"Bellet A, Guerraoui R, Hendrikx H (2019) Who started this rumor? Quantifying the natural differential privacy guarantees of gossip protocols. arXiv preprint arXiv:1902.07138"},{"key":"9267_CR8","unstructured":"Bench-Capon T (2018) Legal cases: argumentation versus ML. In: ArgSoc workshop at comma 2018"},{"key":"9267_CR9","unstructured":"Bex F, Peters J, Testerink B (2016) AI for online criminal complaints: from natural dialogues to structured scenarios. In: Artificial intelligence for justice workshop (ECAI 2016), pp 22\u201329"},{"key":"9267_CR10","unstructured":"Bilgic M, Mooney RJ (2005) Explaining recommendations: satisfaction vs. promotion. In: Beyond personalization workshop, IUI, vol 5, pp 153\u2013160"},{"key":"9267_CR11","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.24963\/ijcai.2017\/202","volume":"2017","author":"O Biran","year":"2017","unstructured":"Biran O, McKeown KR (2017) Human-centric justification of machine learning predictions. IJCAI 2017:1461\u20131467","journal-title":"IJCAI"},{"issue":"2","key":"9267_CR12","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s10458-008-9074-5","volume":"19","author":"E Black","year":"2009","unstructured":"Black E, Hunter A (2009) An inquiry dialogue system. Auton Agents Multi Agent Syste 19(2):173\u2013209","journal-title":"Auton Agents Multi Agent Syste"},{"key":"9267_CR13","unstructured":"Chakravarty S, Phanindra RVS, Fox EA (2019) Dialog acts classification for question-answer corpora. In: Third workshop on automated semantic analysis of information in legal text (ASAIL 2019)"},{"key":"9267_CR14","volume-title":"Safe management of wastes from health-care activities","author":"Y Chartier","year":"2014","unstructured":"Chartier Y (2014) Safe management of wastes from health-care activities. World Health Organization, Geneva"},{"issue":"Mar","key":"9267_CR15","first-page":"1069","volume":"12","author":"K Chaudhuri","year":"2011","unstructured":"Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. J Mach Learn Res 12(Mar):1069\u20131109","journal-title":"J Mach Learn Res"},{"key":"9267_CR16","unstructured":"De\u00a0Graaf MM, Malle BF (2017) How people explain action (and autonomous intelligent systems should too). In: 2017 AAAI fall symposium on artificial intelligence for human-robot interaction"},{"key":"9267_CR17","doi-asserted-by":"crossref","unstructured":"Dhingra B, Li L, Li X, Gao J, Chen Y-N, Ahmed F, Deng L (2016) Towards end-to-end reinforcement learning of dialogue agents for information access. arXiv preprint arXiv:1609.00777","DOI":"10.18653\/v1\/P17-1045"},{"key":"9267_CR18","doi-asserted-by":"crossref","unstructured":"Duchi JC, Jordan MI, Wainwright MJ (2013) Local privacy and statistical minimax rates. In: 2013 IEEE 54th annual symposium on foundations of computer science. IEEE, pp 429\u2013438","DOI":"10.1109\/FOCS.2013.53"},{"key":"9267_CR19","doi-asserted-by":"crossref","unstructured":"Dwork C (2008) Differential privacy: a survey of results. In: International conference on theory and applications of models of computation. Springer, pp 1\u201319","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"9267_CR20","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Theory of cryptography conference. Springer, pp 265\u2013284","DOI":"10.1007\/11681878_14"},{"key":"9267_CR21","first-page":"324","volume":"2012","author":"X Fan","year":"2012","unstructured":"Fan X, Toni F (2012) Agent strategies for ABA-based information-seeking and inquiry dialogues. Proc ECAI 2012:324\u2013329","journal-title":"Proc ECAI"},{"key":"9267_CR22","volume-title":"Discrete-event simulation: modeling, programming, and analysis","author":"GS Fishman","year":"2013","unstructured":"Fishman GS (2013) Discrete-event simulation: modeling, programming, and analysis. Springer, Berlin"},{"issue":"2\u20133","key":"9267_CR23","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1561\/1500000074","volume":"13","author":"J Gao","year":"2019","unstructured":"Gao J, Galley M, Li L et al (2019) Neural approaches to conversational AI. Found Trends Inf Retr 13(2\u20133):127\u2013298","journal-title":"Found Trends Inf Retr"},{"key":"9267_CR24","doi-asserted-by":"crossref","unstructured":"Gkatzia D, Lemon O, Rieser V (2016) Natural language generation enhances human decision-making with uncertain information. arXiv preprint arXiv:1606.03254","DOI":"10.18653\/v1\/P16-2043"},{"key":"9267_CR25","volume-title":"The concept of law","author":"HLA Hart","year":"1961","unstructured":"Hart HLA (1961) The concept of law. Oxford Clarendon Press, Oxford"},{"key":"9267_CR26","doi-asserted-by":"crossref","unstructured":"Herlocker JL, Konstan JA, Riedl J (2000) Explaining collaborative filtering recommendations. In: Proceedings of the 2000 ACM conference on Computer supported cooperative work, pp 241\u2013250","DOI":"10.1145\/358916.358995"},{"key":"9267_CR27","doi-asserted-by":"publisher","first-page":"16","DOI":"10.2307\/785533","volume":"23","author":"WN Hohfeld","year":"1913","unstructured":"Hohfeld WN (1913) Some fundamental legal conceptions as applied in judicial reasoning. Yale Law J 23:16","journal-title":"Yale Law J"},{"key":"9267_CR28","volume-title":"Speech and language processing: an introduction to natural language processing. Computational linguistics and speech recognition","author":"D Jurasky","year":"2000","unstructured":"Jurasky D, Martin JH (2000) Speech and language processing: an introduction to natural language processing. Computational linguistics and speech recognition. Prentice Hall, New Jersey"},{"key":"9267_CR29","unstructured":"Kim B, Khanna R, Koyejo OO (2016) Examples are not enough, learn to criticize! criticism for interpretability. In: Advances in neural information processing systems, pp 2280\u20132288"},{"key":"9267_CR30","volume-title":"An introduction to the science of law","author":"A Kocourek","year":"1930","unstructured":"Kocourek A (1930) An introduction to the science of law. Little, Brown and Company, Boston"},{"key":"9267_CR31","unstructured":"Lin C-Y, Och F (2004) Looking for a few good metrics: rouge and its evaluation. In: Ntcir workshop"},{"key":"9267_CR32","unstructured":"McMahan B, Ramage D (2017) Federated learning: collaborative machine learning without centralized training data. Google Research Blog, 3"},{"key":"9267_CR33","doi-asserted-by":"crossref","unstructured":"Parsons S, Wooldridge M, Amgoud L (2002) An analysis of formal inter-agent dialogues. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems, pp 394\u2013401","DOI":"10.1145\/544741.544835"},{"issue":"2","key":"9267_CR34","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/19462160903564592","volume":"1","author":"H Prakken","year":"2010","unstructured":"Prakken H (2010) An abstract framework for argumentation with structured arguments. Argum Comput 1(2):93\u2013124","journal-title":"Argum Comput"},{"key":"9267_CR35","unstructured":"Racz N, Weippl E, Seufert A (2010) A process model for integrated it governance, risk, and compliance management. In: Proceedings of the ninth baltic conference on databases and information systems (DB&IS 2010). Citeseer, pp 155\u2013170"},{"key":"9267_CR36","unstructured":"Rainero C, Secinaro S, Nave E, Bignamini E (2017) Home tele-monitoring: economic and social impact of the service for patients with chronic respiratory deseas. In: 7th global innovation and knowledge accademy (Gika). Editorial ARANZADI, pp 441\u2013442"},{"key":"9267_CR37","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780192630971.001.0001","volume-title":"Rose\u2019s strategy of preventive medicine: the complete original text","author":"GA Rose","year":"2008","unstructured":"Rose GA, Khaw K-T, Marmot M (2008) Rose\u2019s strategy of preventive medicine: the complete original text. Oxford University Press, Oxford"},{"key":"9267_CR38","volume-title":"Jurisprudence: or the theory of the law","author":"JW Salmond","year":"1907","unstructured":"Salmond JW (1907) Jurisprudence: or the theory of the law. Stevens and Haynes, London"},{"key":"9267_CR39","doi-asserted-by":"crossref","unstructured":"Schraagen M, Bex F (2019) Extraction of semantic relations in noisy user-generated law enforcement data. In: 2019 IEEE 13th international conference on semantic computing (ICSC). IEEE, pp 79\u201386","DOI":"10.1109\/ICOSC.2019.8665497"},{"key":"9267_CR40","unstructured":"Schraagen M, Testerink B, Odekerken D, Bex F (2018) Argumentation-driven information extraction for online crime reports. In: International workshop on legal data analysis and mining (LeDAM 2018): CEUR workshop proceedings"},{"key":"9267_CR41","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:osobl\/9780195396171.001.0001","volume-title":"Making the social world: the structure of human civilization","author":"J Searle","year":"2010","unstructured":"Searle J (2010) Making the social world: the structure of human civilization. Oxford University Press, Oxford"},{"key":"9267_CR42","doi-asserted-by":"crossref","unstructured":"Sinha R, Swearingen K (2002) The role of transparency in recommender systems. In: CHI\u201902 extended abstracts on human factors in computing systems, pp 830\u2013831","DOI":"10.1145\/506443.506619"},{"key":"9267_CR43","doi-asserted-by":"crossref","unstructured":"Smith A (2011) Privacy-preserving statistical estimation with optimal convergence rates. In: Proceedings of the forty-third annual ACM symposium on theory of computing, pp 813\u2013822","DOI":"10.1145\/1993636.1993743"},{"key":"9267_CR44","doi-asserted-by":"crossref","unstructured":"Symeonidis P, Nanopoulos A, Manolopoulos Y (2009) Moviexplain: a recommender system with explanations. In: Proceedings of the third ACM conference on recommender systems, pp 317\u2013320","DOI":"10.1145\/1639714.1639777"},{"key":"9267_CR45","unstructured":"Testerink B, Odekerken D, Bex F (2019a) AI-assisted message processing for the Netherlands national police. In: ICAIL 2019 workshop on AI and the administrative state (AIAS 2019). CEUR"},{"key":"9267_CR46","doi-asserted-by":"crossref","unstructured":"Testerink B, Odekerken D, Bex F (2019b) A method for efficient argument-based inquiry. In: International conference on flexible query answering systems. Springer, pp 114\u2013125","DOI":"10.1007\/978-3-030-27629-4_13"},{"key":"9267_CR47","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.ijar.2016.09.002","volume":"80","author":"ST Timmer","year":"2017","unstructured":"Timmer ST, Meyer J-JC, Prakken H, Renooij S, Verheij B (2017) A two-phase method for extracting explanatory arguments from Bayesian networks. Int J Approx Reason 80:475\u2013494","journal-title":"Int J Approx Reason"},{"key":"9267_CR48","doi-asserted-by":"crossref","unstructured":"van Doesburg R, van Engers T (2015) Arguments on the interpretation of sources of law. In: AI approaches to the complexity of legal systems. Springer, pp 478\u2013492","DOI":"10.1007\/978-3-030-00178-0_33"},{"key":"9267_CR49","unstructured":"van Doesburg R, Van\u00a0Engers T (2018) Using formal interpretations of legal sources for comparing the application of exclusion clauses of the un refugee convention. Jusletter IT, pp 175\u201384"},{"key":"9267_CR50","unstructured":"van Doesburg R, van Engers T (2019a) Explicit interpretation of the dutch aliens act. In: Proceedings of the workshop on artificial intelligence and the administrative state"},{"key":"9267_CR51","doi-asserted-by":"crossref","unstructured":"van Doesburg R, van Engers T (2019b) The false, the former, and the parish priest. In: Proceedings of the seventeenth international conference on artificial intelligence and law, pp 194\u2013198","DOI":"10.1145\/3322640.3326718"},{"issue":"1","key":"9267_CR52","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1093\/lpr\/mgv013","volume":"15","author":"B Verheij","year":"2016","unstructured":"Verheij B, Bex F, Timmer ST, Vlek CS, Meyer J-JC, Renooij S, Prakken H (2016) Arguments, scenarios and probabilities: connections between three normative frameworks for evidential reasoning. Law Probab Risk 15(1):35\u201370","journal-title":"Law Probab Risk"},{"key":"9267_CR53","volume-title":"Patient safety","author":"C Vincent","year":"2011","unstructured":"Vincent C (2011) Patient safety. Wiley, New York"},{"issue":"7237","key":"9267_CR54","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1136\/bmj.320.7237.777","volume":"320","author":"C Vincent","year":"2000","unstructured":"Vincent C, Taylor-Adams S, Chapman EJ, Hewett D, Prior S, Strange P, Tizzard A (2000) How to investigate and analyse clinical incidents: clinical risk unit and association of litigation and risk management protocol. BMJ 320(7237):777\u2013781","journal-title":"BMJ"},{"issue":"3","key":"9267_CR55","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10506-016-9183-4","volume":"24","author":"CS Vlek","year":"2016","unstructured":"Vlek CS, Prakken H, Renooij S, Verheij B (2016) A method for explaining bayesian networks for legal evidence with scenarios. Artif Intell Law 24(3):285\u2013324","journal-title":"Artif Intell Law"},{"issue":"5","key":"9267_CR56","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1109\/JPROC.2012.2225812","volume":"101","author":"S Young","year":"2013","unstructured":"Young S, Ga\u0161i\u0107 M, Thomson B, Williams JD (2013) Pomdp-based statistical spoken dialog systems: a review. Proc IEEE 101(5):1160\u20131179","journal-title":"Proc IEEE"}],"container-title":["Artificial Intelligence and Law"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-020-09267-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10506-020-09267-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-020-09267-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T23:25:08Z","timestamp":1621985108000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10506-020-09267-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,26]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["9267"],"URL":"https:\/\/doi.org\/10.1007\/s10506-020-09267-z","relation":{},"ISSN":["0924-8463","1572-8382"],"issn-type":[{"type":"print","value":"0924-8463"},{"type":"electronic","value":"1572-8382"}],"subject":[],"published":{"date-parts":[[2020,5,26]]},"assertion":[{"value":"26 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}