{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T06:47:36Z","timestamp":1773298056294,"version":"3.50.1"},"reference-count":137,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T00:00:00Z","timestamp":1666224000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T00:00:00Z","timestamp":1666224000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Law"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10506-022-09334-7","type":"journal-article","created":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T16:05:16Z","timestamp":1666281916000},"page":"653-702","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Knowledge mining and social dangerousness assessment in criminal justice: metaheuristic integration of machine learning and graph-based inference"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6342-3252","authenticated-orcid":false,"given":"Nicola","family":"Lettieri","sequence":"first","affiliation":[]},{"given":"Alfonso","family":"Guarino","sequence":"additional","affiliation":[]},{"given":"Delfina","family":"Malandrino","sequence":"additional","affiliation":[]},{"given":"Rocco","family":"Zaccagnino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,20]]},"reference":[{"key":"9334_CR2","unstructured":"Akers RL (1973) Deviant behavior: A social learning approach"},{"key":"9334_CR3","doi-asserted-by":"crossref","DOI":"10.7717\/peerj-cs.93","volume":"2","author":"N Aletras","year":"2016","unstructured":"Aletras N, Tsarapatsanis D, Preo\u0163iuc-Pietro D, Lampos V (2016) Predicting judicial decisions of the european court of human rights: A natural language processing perspective. PeerJ Computer Sci 2:e93","journal-title":"PeerJ Computer Sci"},{"key":"9334_CR4","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1016\/j.physa.2018.03.084","volume":"505","author":"LG Alves","year":"2018","unstructured":"Alves LG, Ribeiro HV, Rodrigues FA (2018) Crime prediction through urban metrics and statistical learning. Phys A: Stat Mech Appl 505:435\u2013443","journal-title":"Phys A: Stat Mech Appl"},{"key":"9334_CR5","unstructured":"Andr\u00e9 O, Peter F, Nellen S (2016) A Visual Approach to the History of Swiss Federal Law. In: DHd 2016: Modelling - Networking - Visualization"},{"key":"9334_CR6","unstructured":"Asaro C, Biasiotti MA, Guidotti P, Papini M, Sagri MT, Tiscornia D, et\u00a0al (2003) A domain ontology: Italian crime ontology. In: Proceedings of the ICAIL 2003 Workshop on Legal Ontologies & Web based legal information management, pp 1\u20137"},{"key":"9334_CR7","doi-asserted-by":"crossref","DOI":"10.1017\/9781316761380","volume-title":"Artificial intelligence and legal analytics: new tools for law practice in the digital age","author":"KD Ashley","year":"2017","unstructured":"Ashley KD (2017) Artificial intelligence and legal analytics: new tools for law practice in the digital age. Cambridge University Press, Cambridge"},{"issue":"4","key":"9334_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0154244","volume":"11","author":"G Berlusconi","year":"2016","unstructured":"Berlusconi G, Calderoni F, Parolini N, Verani M, Piccardi C (2016) Link prediction in criminal networks: a tool for criminal intelligence analysis. PLOS One 11(4):1\u201321. https:\/\/doi.org\/10.1371\/journal.pone.0154244","journal-title":"PLOS One"},{"key":"9334_CR9","unstructured":"Bhargava N, Sharma G, Bhargava R, Mathuria M (2013) Decision tree analysis on j48 algorithm for data mining. Proceedings of International Journal of Advanced Research in Computer Science and Software Engineering 3(6)"},{"key":"9334_CR10","volume-title":"AI: Its nature and future","author":"MA Boden","year":"2016","unstructured":"Boden MA (2016) AI: Its nature and future. Oxford University Press, Oxford"},{"key":"9334_CR11","doi-asserted-by":"crossref","unstructured":"Bogomolov A, Lepri B, Staiano J, Oliver N, Pianesi F, Pentland A (2014) Once upon a crime: towards crime prediction from demographics and mobile data. In: Proceedings of the 16th international conference on multimodal interaction, pp. 427\u2013434","DOI":"10.1145\/2663204.2663254"},{"key":"9334_CR12","volume-title":"Superintelligence","author":"N Bostrom","year":"2017","unstructured":"Bostrom N (2017) Superintelligence. Dunod"},{"key":"9334_CR13","unstructured":"Boulton G, Campbell P, Collins B, Elias P, Hall W, Laurie G, O\u2019Neill O, Rawlins M, Thornton J, Vallance P, et\u00a0al. (2012) Science as an open enterprise. The Royal Society"},{"key":"9334_CR14","doi-asserted-by":"crossref","unstructured":"Branting K, Petersen S, Shin D, Finegan J, Balhana C, Lyte A, Pfeifer C (2019) Adept: Automated directive extraction from policy texts. In: Proceedings of the Seventeenth International Conference on Artificial Intelligence and Law, pp 250\u2013251","DOI":"10.1145\/3322640.3326724"},{"issue":"1","key":"9334_CR15","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"issue":"2","key":"9334_CR16","doi-asserted-by":"crossref","first-page":"128","DOI":"10.2307\/798612","volume":"14","author":"RL Burgess","year":"1966","unstructured":"Burgess RL, Akers RL (1966) A differential association-reinforcement theory of criminal behavior. Soc Probl 14(2):128\u2013147","journal-title":"Soc Probl"},{"issue":"3","key":"9334_CR17","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1111\/j.0020-6598.2004.00292.x","volume":"45","author":"A Calv\u00f3-Armengol","year":"2004","unstructured":"Calv\u00f3-Armengol A, Zenou Y (2004) Social networks and crime decisions: the role of social structure in facilitating delinquent behavior. Int Econ Rev 45(3):939\u2013958","journal-title":"Int Econ Rev"},{"key":"9334_CR18","doi-asserted-by":"crossref","first-page":"676","DOI":"10.3389\/fphy.2020.625241","volume":"8","author":"K Carlson","year":"2021","unstructured":"Carlson K, Dadgostari F, Livermore MA, Rockmore DN (2021) A multinetwork and machine learning examination of structure and content in the united states code. Front Phys 8:676","journal-title":"Front Phys"},{"key":"9334_CR19","doi-asserted-by":"crossref","first-page":"12","DOI":"10.23915\/distill.00009","volume":"2","author":"S Carter","year":"2017","unstructured":"Carter S, Nielsen M (2017) Using artificial intelligence to augment human intelligence. Distill 2:12","journal-title":"Distill"},{"key":"9334_CR20","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.is.2021.101842","volume":"106","author":"S Castano","year":"2022","unstructured":"Castano S, Falduti M, Ferrara A, Montanelli S (2022) A knowledge-centered framework for exploration and retrieval of legal documents. Inf Syst 106:101\u2013842","journal-title":"Inf Syst"},{"key":"9334_CR21","doi-asserted-by":"crossref","unstructured":"Castelfranchi C (2020) For a science-oriented, socially responsible, and self-aware ai: beyond ethical issues. In: 2020 IEEE International Conference on Human-Machine Systems (ICHMS), pp 1\u20134. IEEE","DOI":"10.1109\/ICHMS49158.2020.9209369"},{"issue":"3","key":"9334_CR22","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/s10888-011-9188-x","volume":"10","author":"L Ceriani","year":"2012","unstructured":"Ceriani L, Verme P (2012) The origins of the gini index: extracts from variabilit\u00e0 e mutabilit\u00e0 (1912) by corrado gini. J Econ Inequal 10(3):421\u2013443","journal-title":"J Econ Inequal"},{"issue":"2","key":"9334_CR23","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1177\/1466802501001002001","volume":"1","author":"JB Chan","year":"2001","unstructured":"Chan JB (2001) The technological game: How information technology is transforming police practice. Crim Justice 1(2):139\u2013159","journal-title":"Crim Justice"},{"key":"9334_CR24","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-5661-1","volume-title":"Introduction to computational social science","author":"C Cioffi-Revilla","year":"2014","unstructured":"Cioffi-Revilla C (2014) Introduction to computational social science. Springer, London"},{"key":"9334_CR25","volume-title":"Situational crime prevention","author":"RVG Clarke","year":"1997","unstructured":"Clarke RVG (1997) Situational crime prevention. Criminal Justice Press Monsey, NY"},{"key":"9334_CR26","doi-asserted-by":"crossref","unstructured":"Cleary JG, Trigg LE (1995) K*: An instance-based learner using an entropic distance measure. In: Machine Learning Proceedings 1995, pp 108\u2013114. Elsevier","DOI":"10.1016\/B978-1-55860-377-6.50022-0"},{"issue":"2","key":"9334_CR27","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/BF00343977","volume":"6","author":"LE Cohen","year":"1979","unstructured":"Cohen LE, Felson M (1979) On estimating the social costs of national economic policy: a critical examination of the brenner study. Soc Indicators Res 6(2):251\u2013259","journal-title":"Soc Indicators Res"},{"key":"9334_CR28","doi-asserted-by":"crossref","first-page":"588","DOI":"10.2307\/2094589","volume":"87","author":"LE Cohen","year":"1979","unstructured":"Cohen LE, Felson M (1979) Social change and crime rate trends: a routine activity approach. Am Sociol Rev 87:588\u2013608","journal-title":"Am Sociol Rev"},{"key":"9334_CR29","doi-asserted-by":"crossref","first-page":"123,289","DOI":"10.1109\/ACCESS.2019.2937743","volume":"7","author":"A Cosimato","year":"2019","unstructured":"Cosimato A, Prisco RD, Guarino A, Malandrino D, Lettieri N, Sorrentino G, Zaccagnino R (2019) The conundrum of success in music: playing it or talking about it? IEEE Access 7:123,289-123,298","journal-title":"IEEE Access"},{"key":"9334_CR30","doi-asserted-by":"crossref","first-page":"269","DOI":"10.3389\/fphy.2021.658463","volume":"9","author":"C Coupette","year":"2021","unstructured":"Coupette C, Beckedorf J, Hartung D, Bommarito M, Katz DM (2021) Measuring law over time: a network analytical framework with an application to statutes and regulations in the united states and germany. Front Phys 9:269","journal-title":"Front Phys"},{"key":"9334_CR31","doi-asserted-by":"crossref","first-page":"106,993","DOI":"10.1016\/j.comnet.2019.106993","volume":"167","author":"F Cozza","year":"2020","unstructured":"Cozza F, Guarino A, Isernia F, Malandrino D, Rapuano A, Schiavone R, Zaccagnino R (2020) Hybrid and lightweight detection of third party tracking: design, implementation, and evaluation. Computer Netw 167:106,993","journal-title":"Computer Netw"},{"issue":"11","key":"9334_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0143638","volume":"10","author":"T Davies","year":"2015","unstructured":"Davies T, Marchione E (2015) Event networks and the identification of crime pattern motifs. PLOS ONE 10(11):1\u201319","journal-title":"PLOS ONE"},{"issue":"37","key":"9334_CR33","doi-asserted-by":"crossref","first-page":"99","DOI":"10.17081\/just.25.37.4215","volume":"25","author":"EJ Delahoz-Dominguez","year":"2020","unstructured":"Delahoz-Dominguez EJ, Fontalvo-Herrera TJ, Mendoza-Mendoza AA (2020) Definici\u00f3n de perfiles geogr\u00e1ficos de hurto de autom\u00f3viles. caso aplicado en cartagena. Justicia 25(37):99\u2013108","journal-title":"Justicia"},{"key":"9334_CR34","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511761942","volume-title":"Networks, crowds, and markets: reasoning about a highly connected world","author":"D Easley","year":"2010","unstructured":"Easley D, Kleinberg J (2010) Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press, Cambridge"},{"key":"9334_CR35","doi-asserted-by":"crossref","first-page":"209,101","DOI":"10.1109\/ACCESS.2020.3036715","volume":"8","author":"N Esquivel","year":"2020","unstructured":"Esquivel N, Nicolis O, Peralta B, Mateu J (2020) Spatio-temporal prediction of baltimore crime events using clstm neural networks. IEEE Access 8:209,101-209,112","journal-title":"IEEE Access"},{"issue":"13","key":"9334_CR36","doi-asserted-by":"crossref","first-page":"5733","DOI":"10.1016\/j.eswa.2014.03.024","volume":"41","author":"E Ferrara","year":"2014","unstructured":"Ferrara E, De Meo P, Catanese S, Fiumara G (2014) Detecting criminal organizations in mobile phone networks. Expert Syst Appl 41(13):5733\u20135750","journal-title":"Expert Syst Appl"},{"key":"9334_CR37","doi-asserted-by":"crossref","unstructured":"Filtz E, Navas-Loro M, Santos C, Polleres A, Kirrane S (2020) Events matter: Extraction of events from court decisions. In: Legal Knowledge and Information Systems: JURIX 2020: The Thirty-third Annual Conference, Brno, Czech Republic, December 9-11, 2020, vol. 334, pp 33\u201342. IOS Press","DOI":"10.3233\/FAIA200847"},{"issue":"3","key":"9334_CR38","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1093\/oxfordjournals.bjc.a047309","volume":"22","author":"J Floud","year":"1982","unstructured":"Floud J (1982) Dangerousness and criminal justice. British J Criminol 22(3):213\u2013228","journal-title":"British J Criminol"},{"issue":"1","key":"9334_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10506-007-9038-0","volume":"15","author":"E Francesconi","year":"2007","unstructured":"Francesconi E, Passerini A (2007) Automatic classification of provisions in legislative texts. Artif Intell Law 15(1):1\u201317","journal-title":"Artif Intell Law"},{"issue":"3","key":"9334_CR40","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1978","unstructured":"Freeman LC (1978) Centrality in social networks conceptual clarification. Soc Netw 1(3):215\u2013239","journal-title":"Soc Netw"},{"issue":"2\u20133","key":"9334_CR41","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1023\/A:1007601113994","volume":"39","author":"D Freitag","year":"2000","unstructured":"Freitag D (2000) Machine learning for information extraction in informal domains. Mach Learn 39(2\u20133):169\u2013202","journal-title":"Mach Learn"},{"key":"9334_CR42","doi-asserted-by":"crossref","unstructured":"Gordon TF (2007) Visualizing carneades argument graphs. Law, Probability and Risk","DOI":"10.1093\/lpr\/mgm026"},{"key":"9334_CR43","doi-asserted-by":"crossref","unstructured":"Grohe M (2020) word2vec, node2vec, graph2vec, x2vec: Towards a theory of vector embeddings of structured data. In: Proceedings of the 39th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, pp 1\u201316","DOI":"10.1145\/3375395.3387641"},{"key":"9334_CR44","doi-asserted-by":"crossref","unstructured":"Guarino A, Lettieri N, Malandrino D, Russo P, Zaccagnino R (2019) Visual analytics to make sense of large-scale administrative and normative data. In: 2019 23rd International Conference Information Visualisation (IV), pp 133\u2013138. IEEE","DOI":"10.1109\/IV.2019.00031"},{"key":"9334_CR45","doi-asserted-by":"crossref","unstructured":"Guarino A, Lettieri N, Malandrino D, Zaccagnino R (2021) A machine learning-based approach to identify unlawful practices in online terms of service: analysis, implementation and evaluation. Neural Computing and Applications pp 1\u201319","DOI":"10.1007\/s00521-021-06343-6"},{"key":"9334_CR46","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108614","volume":"202","author":"A Guarino","year":"2022","unstructured":"Guarino A, Malandrino D, Zaccagnino R (2022) An automatic mechanism to provide privacy awareness and control over unwittingly dissemination of online private information. Computer Netw 202:108,614","journal-title":"Computer Netw"},{"issue":"1","key":"9334_CR47","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The weka data mining software: an update. ACM SIGKDD Explor Newslett 11(1):10\u201318","journal-title":"ACM SIGKDD Explor Newslett"},{"key":"9334_CR48","doi-asserted-by":"crossref","DOI":"10.4159\/9780674915077","volume-title":"Exposed","author":"BE Harcourt","year":"2015","unstructured":"Harcourt BE (2015) Exposed. Harvard University Press, Cambridge"},{"issue":"2","key":"9334_CR138","doi-asserted-by":"publisher","first-page":"511","DOI":"10.2307\/1340801","volume":"96","author":"Note","year":"1982","unstructured":"Harvard Law Review Student Note (1982) Selective incapacitation: reducing crime through predictions of recidivism. Harvard Law Rev 96:511\u2013533.","journal-title":"Harvard Law Review"},{"key":"9334_CR49","first-page":"87","volume":"25","author":"AB Hepler","year":"2007","unstructured":"Hepler AB, Dawid AP, Leucari V (2007) Object-oriented graphical representations of complex patterns of evidence. Probabil Risk Law 25:87","journal-title":"Probabil Risk Law"},{"key":"9334_CR50","doi-asserted-by":"crossref","DOI":"10.1093\/0195158709.001.0001","volume-title":"Extending ourselves: computational science, empiricism, and scientific method","author":"P Humphreys","year":"2004","unstructured":"Humphreys P (2004) Extending ourselves: computational science, empiricism, and scientific method. Oxford University Press, UK"},{"key":"9334_CR51","doi-asserted-by":"publisher","unstructured":"Hvistendahl M (2016) Crime forecasters. Science 353(6307):1484\u20131487 https:\/\/doi.org\/10.1126\/science.353.6307.1484. https:\/\/science.sciencemag.org\/content\/353\/6307\/1484","DOI":"10.1126\/science.353.6307.1484"},{"key":"9334_CR52","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-7138-7","volume-title":"An introduction to statistical learning","author":"G James","year":"2013","unstructured":"James G, Witten D, Hastie T, Tibshirani R (2013) An introduction to statistical learning, vol 112. Springer, Cham"},{"key":"9334_CR53","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511921803","volume-title":"Evaluating learning algorithms: a classification perspective","author":"N Japkowicz","year":"2011","unstructured":"Japkowicz N, Shah M (2011) Evaluating learning algorithms: a classification perspective. Cambridge University Press, Cambridge"},{"key":"9334_CR54","doi-asserted-by":"crossref","unstructured":"Jeh G, Widom J (2002) Simrank: a measure of structural-context similarity. In: Proc. of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp 538\u2013543","DOI":"10.1145\/775047.775126"},{"key":"9334_CR55","unstructured":"Katz D, Bommarito M (2014) Legal analytics. introduction to the course. https:\/\/bit.ly\/3BXTlwX"},{"issue":"4","key":"9334_CR56","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s10506-014-9160-8","volume":"22","author":"DM Katz","year":"2014","unstructured":"Katz DM, Bommarito MJ (2014) Measuring the complexity of the law: the united states code. Artif Intell Law 22(4):337\u2013374","journal-title":"Artif Intell Law"},{"issue":"4","key":"9334_CR57","doi-asserted-by":"crossref","first-page":"e0174,698","DOI":"10.1371\/journal.pone.0174698","volume":"12","author":"DM Katz","year":"2017","unstructured":"Katz DM, Bommarito MJ, Blackman J (2017) A general approach for predicting the behavior of the supreme court of the united states. PloS One 12(4):e0174,698","journal-title":"PloS One"},{"key":"9334_CR58","first-page":"76","volume":"61","author":"DM Katz","year":"2011","unstructured":"Katz DM, Gubler JR, Zelner J, Bommarito MJ (2011) Reproduction of hierarchy-a social network analysis of the American law professoriate. J Legal Educ 61:76","journal-title":"J Legal Educ"},{"key":"9334_CR59","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/S0169-7161(04)24002-0","volume":"24","author":"KA Kaufman","year":"2005","unstructured":"Kaufman KA, Michalski RS (2005) From data mining to knowledge mining. Handbook Stat 24:47\u201375","journal-title":"Handbook Stat"},{"key":"9334_CR60","unstructured":"Kehl DL, Kessler SA (2017) Algorithms in the criminal justice system: Assessing the use of risk assessments in sentencing"},{"key":"9334_CR61","doi-asserted-by":"crossref","unstructured":"Keim D, Kohlhammer J, Ellis G, Mansmann F (2010) Mastering the information age: solving problems with visual analytics","DOI":"10.1016\/j.procs.2011.12.035"},{"key":"9334_CR62","doi-asserted-by":"crossref","unstructured":"Kim S, Joshi P, Kalsi PS, Taheri P (2018) Crime analysis through machine learning. In: 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp 415\u2013420. IEEE","DOI":"10.1109\/IEMCON.2018.8614828"},{"key":"9334_CR63","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4939-0983-4","volume-title":"Statistical analysis of network data with R","author":"ED Kolaczyk","year":"2014","unstructured":"Kolaczyk ED, Cs\u00e1rdi G (2014) Statistical analysis of network data with R, vol 65. Springer, Cham"},{"key":"9334_CR64","volume-title":"Centrality indices. network analysis","author":"D Kosch\u00fctzki","year":"2005","unstructured":"Kosch\u00fctzki D, Lehmann KA, Peeters L, Richter S, Tenfelde-Podehl D, Zlotowski O (2005) Centrality indices. network analysis. Springer, Cham"},{"key":"9334_CR65","unstructured":"Kuppevelt D, Dijck G (2017) Answering legal research questions about dutch case law with network analysis and visualization. In: Legal Knowledge and Information Systems: JURIX 2017: The Thirtieth Annual Conference, vol. 302, p 95. IOS Press"},{"issue":"1","key":"9334_CR66","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1111\/j.1551-6708.1987.tb00863.x","volume":"11","author":"JH Larkin","year":"1987","unstructured":"Larkin JH, Simon HA (1987) Why a diagram is (sometimes) worth ten thousand words. Cognit Sci 11(1):65\u2013100","journal-title":"Cognit Sci"},{"key":"9334_CR67","unstructured":"Laune FF (1936) Predicting criminality: Forecasting behavior on parole. 1. Northwestern university"},{"key":"9334_CR68","doi-asserted-by":"crossref","unstructured":"Leitner E, Rehm G, Moreno-Schneider J (2019) Fine-grained named entity recognition in legal documents. In: International Conference on Semantic Systems, pp 272\u2013287. Springer","DOI":"10.1007\/978-3-030-33220-4_20"},{"key":"9334_CR69","volume-title":"The cambridge handbook of the law of algorithms","author":"N Lettieri","year":"2020","unstructured":"Lettieri N (2020) Law in Turing\u2019s cathedral notes on the algorithmic turn of the legal universe. In: Barfield W (ed) The Cambridge handbook of the law of algorithms. Cambridge University Press, Cambridge"},{"issue":"2","key":"9334_CR70","first-page":"72","volume":"17","author":"N Lettieri","year":"2020","unstructured":"Lettieri N (2020) Law, rights, and the fallacy of computation. on the hidden pitfalls of predictive analytics. Jura Gentium 17(2):72\u201387","journal-title":"Jura Gentium"},{"issue":"1","key":"9334_CR71","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/s13278-016-0365-6","volume":"6","author":"N Lettieri","year":"2016","unstructured":"Lettieri N, Altamura A, Faggiano A, Malandrino D (2016) A computational approach for the experimental study of eu case law: analysis and implementation. Soc Netw Anal Min 6(1):56","journal-title":"Soc Netw Anal Min"},{"issue":"5","key":"9334_CR72","doi-asserted-by":"crossref","first-page":"37","DOI":"10.3390\/fi10050037","volume":"10","author":"N Lettieri","year":"2018","unstructured":"Lettieri N, Altamura A, Giugno R, Guarino A, Malandrino D, Pulvirenti A, Vicidomini F, Zaccagnino R (2018) Ex machina: analytical platforms, law and the challenges of computational legal science. Future Internet 10(5):37","journal-title":"Future Internet"},{"issue":"4","key":"9334_CR73","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1177\/1473871616681374","volume":"16","author":"N Lettieri","year":"2017","unstructured":"Lettieri N, Altamura A, Malandrino D (2017) The legal macroscope: experimenting with visual legal analytics. Inf Visual 16(4):332\u2013345","journal-title":"Inf Visual"},{"key":"9334_CR74","doi-asserted-by":"crossref","unstructured":"Lettieri N, Altamura A, Malandrino D, Punzo V (2017) Agents shaping networks shaping agents: Integrating social network analysis and agent-based modeling in computational crime research. In: EPIA Conference on Artificial Intelligence, pp 15\u201327. Springer","DOI":"10.1007\/978-3-319-65340-2_2"},{"key":"9334_CR75","doi-asserted-by":"crossref","unstructured":"Lettieri N, Faro S, Malandrino D, Faggiano A, Vestoso M (2018) Network, visualization, analytics. a tool allowing legal scholars to experimentally investigate eu case law. In: U.\u00a0Pagallo, M.\u00a0Palmirani, P.\u00a0Casanovas, G.\u00a0Sartor, S.\u00a0Villata (eds.) AI Approaches to the Complexity of Legal Systems, pp 543\u2013555. Springer International Publishing, Cham","DOI":"10.1007\/978-3-030-00178-0_37"},{"key":"9334_CR76","unstructured":"Lettieri N, Guarino A, Malandrino D (2018) E-science and the law. three experimental platforms for legal analytics. In: Legal Knowledge and Information Systems - JURIX 2018: The Thirty-first Annual Conference, Groningen, The Netherlands, 12-14 December 2018., pp 71\u201380"},{"key":"9334_CR77","doi-asserted-by":"crossref","unstructured":"Lettieri N, Guarino A, Malandrino D, Zaccagnino R (2020) The affordance of law. sliding treemaps browsing hierarchically structured data on touch devices. In: 2020 24th International Conference Information Visualisation (IV), pp 16\u201321. IEEE","DOI":"10.1109\/IV51561.2020.00013"},{"key":"9334_CR78","doi-asserted-by":"crossref","unstructured":"Lettieri N, Guarino A, Malandrino D, Zaccagnino R (2021) The sight of justice. visual knowledge mining, legal data and computational crime analysis. In: 2021 25th International Conference Information Visualisation (IV), pp 267\u2013272. IEEE","DOI":"10.1109\/IV53921.2021.00050"},{"key":"9334_CR79","unstructured":"Lettieri N, Malandrino D, Spinelli R, Rinaldi C (2013) Text and (social) network analysis as investigative tools: a case study. In: Law and Computational Social Science, pp 263\u2013280. ESI"},{"issue":"1\u20132","key":"9334_CR80","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s12117-016-9284-1","volume":"20","author":"N Lettieri","year":"2017","unstructured":"Lettieri N, Malandrino D, Vicidomini L (2017) By investigation, i mean computation. Trends Organized Crime 20(1\u20132):31\u201354","journal-title":"Trends Organized Crime"},{"key":"9334_CR81","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/THFE2.1960.4503259","volume":"1","author":"JC Licklider","year":"1960","unstructured":"Licklider JC (1960) Man-computer symbiosis. IRE Trans Human Factors Electron 1:4\u201311","journal-title":"IRE Trans Human Factors Electron"},{"key":"9334_CR82","doi-asserted-by":"crossref","unstructured":"Lin YL, Chen TY, Yu LC (2017) Using machine learning to assist crime prevention. In: 2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI), pp 1029\u20131030. IEEE","DOI":"10.1109\/IIAI-AAI.2017.46"},{"issue":"2","key":"9334_CR83","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s10506-019-09243-2","volume":"27","author":"M Lippi","year":"2019","unstructured":"Lippi M, Pa\u0142ka P, Contissa G, Lagioia F, Micklitz HW, Sartor G, Torroni P (2019) Claudette: an automated detector of potentially unfair clauses in online terms of service. Artif Intell Law 27(2):117\u2013139","journal-title":"Artif Intell Law"},{"key":"9334_CR84","doi-asserted-by":"crossref","unstructured":"Long JB, Ehrenfeld JM (2020) The role of augmented intelligence (ai) in detecting and preventing the spread of novel coronavirus","DOI":"10.1007\/s10916-020-1536-6"},{"issue":"3","key":"9334_CR85","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1080\/13600834.2018.1488659","volume":"27","author":"A Lui","year":"2018","unstructured":"Lui A, Lamb GW (2018) Artificial intelligence and augmented intelligence collaboration: regaining trust and confidence in the financial sector. Inf Commun Technol Law 27(3):267\u2013283","journal-title":"Inf Commun Technol Law"},{"key":"9334_CR86","doi-asserted-by":"crossref","first-page":"164","DOI":"10.3389\/fphy.2021.650943","volume":"9","author":"O Malcai","year":"2021","unstructured":"Malcai O, Shur-Ofry M (2021) Using complexity to calibrate legal response to covid-19. Front Phys 9:164","journal-title":"Front Phys"},{"issue":"3","key":"9334_CR87","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1145\/321075.321084","volume":"8","author":"ME Maron","year":"1961","unstructured":"Maron ME (1961) Automatic indexing: an experimental inquiry. J ACM (JACM) 8(3):404\u2013417","journal-title":"J ACM (JACM)"},{"key":"9334_CR88","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0147248","volume":"11","author":"VH Mas\u00edas","year":"2016","unstructured":"Mas\u00edas VH, Valle M, Morselli C, Crespo F, Vargas A, Laengle S (2016) Modeling verdict outcomes using social network measures: the watergate and caviar network cases. PloS one 11:1","journal-title":"PloS one"},{"issue":"3","key":"9334_CR89","doi-asserted-by":"crossref","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh ML (2012) Interrater reliability: the kappa statistic. Biochemia medica 22(3):276\u2013282","journal-title":"Biochemia medica"},{"issue":"2","key":"9334_CR90","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10506-019-09255-y","volume":"28","author":"M Medvedeva","year":"2020","unstructured":"Medvedeva M, Vols M, Wieling M (2020) Using machine learning to predict decisions of the European court of human rights. Artif Intell Law 28(2):237\u2013266","journal-title":"Artif Intell Law"},{"issue":"2","key":"9334_CR91","first-page":"167","volume":"11","author":"CA Meneses-Escobar","year":"2019","unstructured":"Meneses-Escobar CA, Castillo-Rodr\u00edguez CM, Rodas-V\u00e1squez A (2019) An\u00e1lisis espacial y temporal del hurto de celulares, pereira, risaralda, a\u00f1o 2018. Revista Logos Ciencia & Tecnolog\u00eda 11(2):167\u2013175","journal-title":"Revista Logos Ciencia & Tecnolog\u00eda"},{"key":"9334_CR92","first-page":"701","volume":"10","author":"TM Mitchell","year":"2005","unstructured":"Mitchell TM (2005) Logistic regression. Mach Learn 10:701","journal-title":"Mach Learn"},{"issue":"1","key":"9334_CR93","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10506-010-9104-x","volume":"19","author":"R Mochales","year":"2011","unstructured":"Mochales R, Moens MF (2011) Argumentation mining. Artif Intell Law 19(1):1\u201322","journal-title":"Artif Intell Law"},{"issue":"5","key":"9334_CR94","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1002\/sam.11389","volume":"11","author":"G Mohler","year":"2018","unstructured":"Mohler G, Porter MD (2018) Rotational grid, pai-maximizing crime forecasts. Stat Anal Data Min: ASA Data Sci J 11(5):227\u2013236","journal-title":"Stat Anal Data Min: ASA Data Sci J"},{"issue":"1\/2","key":"9334_CR95","doi-asserted-by":"crossref","first-page":"206","DOI":"10.2307\/2785266","volume":"1","author":"JL Moreno","year":"1937","unstructured":"Moreno JL (1937) Sociometry in relation to other social sciences. Sociometry 1(1\/2):206\u2013219","journal-title":"Sociometry"},{"key":"9334_CR96","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-09526-4","volume-title":"Inside criminal networks","author":"C Morselli","year":"2009","unstructured":"Morselli C (2009) Inside criminal networks, vol 8. Springer, Cham"},{"issue":"1","key":"9334_CR97","first-page":"1","volume":"17","author":"E Nissan","year":"2009","unstructured":"Nissan E (2009) Legal evidence, police intelligence, crime analysis or detection, forensic testing, and argumentation: an overview of computer tools or techniques. Int J Law Inf Technol 17(1):1\u201382","journal-title":"Int J Law Inf Technol"},{"key":"9334_CR98","doi-asserted-by":"crossref","DOI":"10.18574\/nyu\/9781479833641.001.0001","volume-title":"Algorithms of oppression","author":"SU Noble","year":"2018","unstructured":"Noble SU (2018) Algorithms of oppression. New York University Press, New York"},{"key":"9334_CR99","unstructured":"O\u2019Neil C (2016) Weapons of math destruction: How big data increases inequality and threatens democracy. Crown"},{"issue":"54","key":"9334_CR100","doi-asserted-by":"crossref","first-page":"e11,740","DOI":"10.19053\/01211129.v29.n54.2020.11740","volume":"29","author":"HA Ordo\u00f1ez-Eraso","year":"2020","unstructured":"Ordo\u00f1ez-Eraso HA, Pardo-Calvache CJ, Cobos-Lozada CA (2020) Detecci\u00f3n de tendencias de homicidios en colombia usando machine learning. Revista Facultad de Ingenier\u00eda 29(54):e11,740-e11,740","journal-title":"Revista Facultad de Ingenier\u00eda"},{"issue":"2","key":"9334_CR101","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s11299-009-0058-1","volume":"8","author":"P Ormerod","year":"2009","unstructured":"Ormerod P, Wiltshire G (2009) ?binge?drinking in the uk: a social network phenomenon. Mind & Soc 8(2):135","journal-title":"Mind & Soc"},{"key":"9334_CR102","doi-asserted-by":"crossref","first-page":"202","DOI":"10.3389\/fphy.2021.657607","volume":"9","author":"M Ov\u00e1dek","year":"2021","unstructured":"Ov\u00e1dek M, Dyevre A, Wigard K (2021) Analysing eu treaty-making and litigation with network analysis and natural language processing. Front Phys 9:202","journal-title":"Front Phys"},{"issue":"1","key":"9334_CR103","first-page":"63","volume":"87","author":"LG Pedraza-Fari\u00f1a","year":"2020","unstructured":"Pedraza-Fari\u00f1a LG, Whalen R (2020) A network theory of patentability. Univ Chicago Law Rev 87(1):63\u2013144","journal-title":"Univ Chicago Law Rev"},{"key":"9334_CR104","unstructured":"Powers DM (2011) Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation"},{"key":"9334_CR105","doi-asserted-by":"publisher","unstructured":"Prager J, Brown E, Coden A, Radev D (2000) Question-answering by predictive annotation. In: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR \u201900, pp 184\u2013191. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/345508.345574","DOI":"10.1145\/345508.345574"},{"key":"9334_CR106","volume-title":"C4. 5: programs for machine learning","author":"JR Quinlan","year":"2014","unstructured":"Quinlan JR (2014) C4. 5: programs for machine learning. Elsevier, Amsterdam"},{"key":"9334_CR107","first-page":"15","volume":"94","author":"R Richardson","year":"2019","unstructured":"Richardson R, Schultz JM, Crawford K (2019) Dirty data, bad predictions: How civil rights violations impact police data, predictive policing systems, and justice. NYUL Rev 94:15","journal-title":"NYUL Rev"},{"key":"9334_CR108","first-page":"676","volume":"8","author":"DN Rockmore","year":"2020","unstructured":"Rockmore DN, Carlson K, Dadgostari F, Livermore M (2020) A multinetwork and machine learning examination of structure and content in the united states code. Front Phys 8:676","journal-title":"Front Phys"},{"issue":"6332","key":"9334_CR109","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1126\/science.aag3013","volume":"355","author":"J Ruhl","year":"2017","unstructured":"Ruhl J, Katz DM, Bommarito MJ (2017) Harnessing legal complexity. Science 355(6332):1377\u20131378","journal-title":"Science"},{"issue":"3","key":"9334_CR110","first-page":"1","volume":"5","author":"DE Rumelhart","year":"1988","unstructured":"Rumelhart DE, Hinton GE, Williams RJ et al (1988) Learning representations by back-propagating errors. Cognit Model 5(3):1","journal-title":"Cognit Model"},{"key":"9334_CR111","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.apgeog.2017.06.011","volume":"86","author":"A Rummens","year":"2017","unstructured":"Rummens A, Hardyns W, Pauwels L (2017) The use of predictive analysis in spatiotemporal crime forecasting: building and testing a model in an urban context. Appl Geogr 86:255\u2013261","journal-title":"Appl Geogr"},{"key":"9334_CR112","unstructured":"Russell S (2019) Human compatible: Artificial intelligence and the problem of control. Penguin"},{"key":"9334_CR113","doi-asserted-by":"crossref","first-page":"329","DOI":"10.3389\/fnagi.2017.00329","volume":"9","author":"A Sarica","year":"2017","unstructured":"Sarica A, Cerasa A, Quattrone A (2017) Random forest algorithm for the classification of neuroimaging data in alzheimer\u2019s disease: a systematic review. Front Aging Neurosci 9:329","journal-title":"Front Aging Neurosci"},{"key":"9334_CR114","doi-asserted-by":"crossref","unstructured":"Schwartz MD (2021) Modern machine learning and particle physics. http:\/\/arxiv.org\/abs\/2103.12226","DOI":"10.1162\/99608f92.beeb1183"},{"key":"9334_CR115","unstructured":"Shaheen Z, Wohlgenannt G, Filtz E (2020) Large scale legal text classification using transformer models. http:\/\/arxiv.org\/abs\/2010.12871"},{"issue":"3\/4","key":"9334_CR116","doi-asserted-by":"crossref","first-page":"591","DOI":"10.2307\/2333709","volume":"52","author":"SS Shapiro","year":"1965","unstructured":"Shapiro SS, Wilk MB (1965) An analysis of variance test for normality (complete samples). Biometrika 52(3\/4):591\u2013611","journal-title":"Biometrika"},{"key":"9334_CR117","volume-title":"Augmented intelligence: a way for helping universities to make smarter decisions. emerging trends in expert applications and security","author":"M Sharma","year":"2019","unstructured":"Sharma M (2019) Augmented intelligence: a way for helping universities to make smarter decisions. emerging trends in expert applications and security. Springer, Cham"},{"key":"9334_CR118","volume-title":"Group process and gang delinquency","author":"JF Short","year":"1965","unstructured":"Short JF, Strodtbeck FL (1965) Group process and gang delinquency. University of Chicago Press, Chicago"},{"issue":"1","key":"9334_CR119","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s10506-017-9197-6","volume":"25","author":"O Shulayeva","year":"2017","unstructured":"Shulayeva O, Siddharthan A, Wyner A (2017) Recognizing cited facts and principles in legal judgements. Artif Intell Law 25(1):107\u2013126","journal-title":"Artif Intell Law"},{"key":"9334_CR120","first-page":"309","volume":"44","author":"TA Smith","year":"2007","unstructured":"Smith TA (2007) The web of law. San Diego L Rev 44:309","journal-title":"San Diego L Rev"},{"issue":"1","key":"9334_CR121","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/j.csda.2006.12.030","volume":"52","author":"C Strobl","year":"2007","unstructured":"Strobl C, Boulesteix AL, Augustin T (2007) Unbiased split selection for classification trees based on the gini index. Comput Stat Data Anal 52(1):483\u2013501","journal-title":"Comput Stat Data Anal"},{"key":"9334_CR122","volume-title":"Principles of criminology","author":"EH Sutherland","year":"1992","unstructured":"Sutherland EH, Cressey DR, Luckenbill DF (1992) Principles of criminology. Altamira Press, UK"},{"key":"9334_CR123","doi-asserted-by":"crossref","DOI":"10.1002\/9781118914762","volume-title":"Bayesian networks for probabilistic inference and decision analysis in forensic science","author":"F Taroni","year":"2014","unstructured":"Taroni F, Biedermann A, Bozza S, Garbolino P, Aitken C (2014) Bayesian networks for probabilistic inference and decision analysis in forensic science. Wiley, New Jersey"},{"key":"9334_CR124","first-page":"54","volume":"103","author":"J Tashea","year":"2017","unstructured":"Tashea J (2017) Calculating crime. ABAJ 103:54","journal-title":"ABAJ"},{"key":"9334_CR125","unstructured":"Tillers P (2005) Picturing factual inference in legal settings"},{"key":"9334_CR126","first-page":"1","volume":"7","author":"N du Toit","year":"2019","unstructured":"du Toit N (2019) Network visualisation as a citator user interface. J Open Access L 7:1","journal-title":"J Open Access L"},{"key":"9334_CR127","doi-asserted-by":"crossref","unstructured":"Verheij B (2007) Argumentation support software: boxes-and-arrows and beyond. Law, Probability and Risk","DOI":"10.1093\/lpr\/mgm017"},{"key":"9334_CR128","doi-asserted-by":"crossref","DOI":"10.1007\/b95439","volume-title":"Support vector machines: theory and applications","author":"L Wang","year":"2005","unstructured":"Wang L (2005) Support vector machines: theory and applications, vol 177. Springer Science & Business Media, Cham"},{"key":"9334_CR129","doi-asserted-by":"crossref","unstructured":"Wang T, Rudin C, Wagner D, Sevieri R (2013) Learning to detect patterns of crime. In: Joint European conference on machine learning and knowledge discovery in databases, pp 515\u2013530. Springer","DOI":"10.1007\/978-3-642-40994-3_33"},{"issue":"5","key":"9334_CR130","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1038\/s41893-018-0065-5","volume":"1","author":"Z Wang","year":"2018","unstructured":"Wang Z, Wei L, Peng S, Deng L, Niu B (2018) Child-trafficking networks of illegal adoption in china. Nature Sustain 1(5):254\u2013260","journal-title":"Nature Sustain"},{"key":"9334_CR131","unstructured":"Whalen R (2016) Legal networks: the promises and challenges of legal network analysis. Mich. St. L. Rev, p 539"},{"key":"9334_CR132","first-page":"1","volume":"45","author":"AP Wheeler","year":"2020","unstructured":"Wheeler AP, Steenbeek W (2020) Mapping the risk terrain for crime using machine learning. J Quant Criminol 45:1\u201336","journal-title":"J Quant Criminol"},{"key":"9334_CR133","first-page":"1","volume":"13","author":"POH Wikstr\u00f6m","year":"2004","unstructured":"Wikstr\u00f6m POH (2004) Crime as alternative: towards a cross-level situational action theory of crime causation. Beyond Empiricism: Instit Intentions Study Crime 13:1\u201337","journal-title":"Beyond Empiricism: Instit Intentions Study Crime"},{"key":"9334_CR134","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1017\/CBO9780511489341.004","volume":"45","author":"POH Wikstr\u00f6m","year":"2006","unstructured":"Wikstr\u00f6m POH (2006) Individuals, settings, and acts of crime: situational mechanisms and the explanation of crime. Explanation Crime: Context, Mech Develop 45:61\u2013107","journal-title":"Explanation Crime: Context, Mech Develop"},{"key":"9334_CR135","first-page":"71","volume":"25","author":"KLA Yau","year":"2021","unstructured":"Yau KLA, Lee HJ, Chong YW, Ling MH, Syed AR, Wu C, Goh HG (2021) Augmented intelligence: surveys of literature and expert opinion to understand relations between human intelligence and artificial intelligence. IEEE Access 25:71","journal-title":"IEEE Access"},{"key":"9334_CR136","doi-asserted-by":"crossref","unstructured":"Yuan L, Wang J, Fan S, Bian Y, Yang B, Wang Y, Wang X (2019) Automatic legal judgment prediction via large amounts of criminal cases. In: 2019 IEEE 5th International Conference on Computer and Communications (ICCC), pp 2087\u20132091. IEEE","DOI":"10.1109\/ICCC47050.2019.9064408"},{"issue":"2","key":"9334_CR137","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1631\/FITEE.1700053","volume":"18","author":"Nn Zheng","year":"2017","unstructured":"Zheng Nn, Liu Zy, Ren Pj, Ma Yq, Chen St, Yu Sy, Xue Jr, Chen Bd, Wang Fy (2017) Hybrid-augmented intelligence: collaboration and cognition. Front Inf Technol Electron Eng 18(2):153\u2013179","journal-title":"Front Inf Technol Electron Eng"}],"container-title":["Artificial Intelligence and Law"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-022-09334-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10506-022-09334-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-022-09334-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T07:05:06Z","timestamp":1697871906000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10506-022-09334-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,20]]},"references-count":137,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["9334"],"URL":"https:\/\/doi.org\/10.1007\/s10506-022-09334-7","relation":{},"ISSN":["0924-8463","1572-8382"],"issn-type":[{"value":"0924-8463","type":"print"},{"value":"1572-8382","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,20]]},"assertion":[{"value":"22 September 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}