{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:59:49Z","timestamp":1778695189665,"version":"3.51.4"},"reference-count":111,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T00:00:00Z","timestamp":1550102400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N023013\/1"],"award-info":[{"award-number":["EP\/N023013\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N023013\/1"],"award-info":[{"award-number":["EP\/N023013\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N023013\/1"],"award-info":[{"award-number":["EP\/N023013\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11948-018-00081-0","type":"journal-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T06:18:54Z","timestamp":1550125134000},"page":"89-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":193,"title":["Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6610-8098","authenticated-orcid":false,"given":"Thomas C.","family":"King","sequence":"first","affiliation":[]},{"given":"Nikita","family":"Aggarwal","sequence":"additional","affiliation":[]},{"given":"Mariarosaria","family":"Taddeo","sequence":"additional","affiliation":[]},{"given":"Luciano","family":"Floridi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,14]]},"reference":[{"key":"81_CR1","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-319-47437-3_16","volume":"9979","author":"F Alaieri","year":"2016","unstructured":"Alaieri, F., & Vellino, A. (2016). Ethical decision making in robots: Autonomy, trust and responsibility. Lecture Notes in Computer Science (LNAI),9979, 159\u2013168. \nhttps:\/\/doi.org\/10.1007\/978-3-319-47437-3_16\n\n.","journal-title":"Lecture Notes in Computer Science (LNAI)"},{"key":"81_CR2","doi-asserted-by":"publisher","DOI":"10.1080\/016396290968326","author":"M Alazab","year":"2016","unstructured":"Alazab, M., & Broadhurst, R. (2016). Spam and criminal activity. Trends and Issues in Crime and Criminal Justice. \nhttps:\/\/doi.org\/10.1080\/016396290968326\n\n.","journal-title":"Trends and Issues in Crime and Criminal Justice"},{"key":"81_CR3","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1109\/SP.2013.33","volume":"2","author":"L Alvisi","year":"2013","unstructured":"Alvisi, L., Clement, A., Epasto, A., Lattanzi, S., & Panconesi, A. (2013). SoK: The evolution of sybil defense via social networks. Proceedings\u2014IEEE Symposium on Security and Privacy,2, 382\u2013396. \nhttps:\/\/doi.org\/10.1109\/SP.2013.33\n\n.","journal-title":"Proceedings\u2014IEEE Symposium on Security and Privacy"},{"key":"81_CR5","unstructured":"Andrighetto, G., Governatori, G., Noriega, P., & van der Torre, L. (2013). Normative multi-agent systems. In Dagstuhl follow-ups. Vol. 4. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"81_CR6","volume-title":"Criminal pleading, evidence and practice","author":"JF Archbold","year":"2018","unstructured":"Archbold, J. F. (2018). Criminal pleading, evidence and practice. London: Sweet & Maxwell Ltd."},{"key":"81_CR7","doi-asserted-by":"publisher","unstructured":"Arkin, R. C. (2008). Governing lethal behavior: Embedding ethics in a hybrid deliberative\/reactive robot architecture part I: Motivation and philosophy. In Proceedings of the 3rd international conference on human robot interaction\u2014HRI\u201908, \nhttps:\/\/doi.org\/10.1145\/1349822.1349839\n\n.","DOI":"10.1145\/1349822.1349839"},{"key":"81_CR8","unstructured":"Arkin, R. C., & Ulam, P. (2012). Overriding ethical constraints in lethal autonomous systems. Technical report GIT-MRL-12-01 (pp. 1\u20138). \nhttps:\/\/pdfs.semanticscholar.org\/d232\/4a80d870e01db4ac02ed32cd33a8edf2bbb7.pdf\n\n."},{"key":"81_CR9","first-page":"1","volume":"45","author":"A Ashworth","year":"2010","unstructured":"Ashworth, A. (2010). Should strict criminal liability be removed from all imprisonable offences? Irish Jurist,45, 1\u201321.","journal-title":"Irish Jurist"},{"key":"81_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-017-0748-x","author":"O Bendel","year":"2017","unstructured":"Bendel, O. (2017). The synthetization of human voices. AI and Society. \nhttps:\/\/doi.org\/10.1007\/s00146-017-0748-x\n\n.","journal-title":"AI and Society"},{"key":"81_CR11","doi-asserted-by":"crossref","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., Kirda, K., & Antipolis, S. (2009). All your contacts are belong to us: Automated identity theft attacks on social networks. In WWW\u201909 proceedings of the 18th international conference on the world wide web (pp. 551\u2013560). \nhttp:\/\/doi.acm.org\/10.1145\/1526709.1526784\n\n.","DOI":"10.1145\/1526709.1526784"},{"issue":"2","key":"81_CR12","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/j.comnet.2012.06.006","volume":"57","author":"Y Boshmaf","year":"2012","unstructured":"Boshmaf, Y., Muslukhov, I., Beznosov, K., & Ripeanu, M. (2012a). Design and analysis of a social botnet. Computer Networks,57(2), 556\u2013578. \nhttps:\/\/doi.org\/10.1016\/j.comnet.2012.06.006\n\n.","journal-title":"Computer Networks"},{"key":"81_CR13","unstructured":"Boshmaf, Y., Muslukhov, I., Beznosov, K., & Ripeanu, M. (2012b). Key challenges in defending against malicious socialbots. In Proceedings of the 5th USENIX workshop on large-scale exploits and emergent threats (pp. 1\u20135). \nhttp:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.382.8607\n\n."},{"key":"81_CR14","first-page":"375","volume":"13","author":"JM Bradshaw","year":"1997","unstructured":"Bradshaw, J. M., Dutfield, S., Benoit, P., & Woolley, J. D. (1997). KAoS: Toward an industrial-strength open agent architecture. Software Agents,13, 375\u2013418.","journal-title":"Software Agents"},{"key":"81_CR15","unstructured":"Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A., Scharre, P., Zeitzoff, T., Filar, B., Anderson, H., Roff, H., Allen, G. C., Steinhardt, J., Flynn, C., H\u00e9igeartaigh, S., Beard, S., Belfield, H., Farquhar, S., Lyle, C., Crootof, R., Evans, O., Page, M., Bryson, J., Yampolskiy, R., & Amodei, D. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. \nhttps:\/\/arxiv.org\/abs\/1802.07228\n\n."},{"issue":"2","key":"81_CR16","first-page":"505","volume":"24","author":"C Cath","year":"2017","unstructured":"Cath, C., Wachter, S., Mittelstadt, B., Taddeo, M., & Floridi, L. (2017). Artificial intelligence and the \u2018Good Society\u2019: The US, EU, and UK approach. Science and Engineering Ethics,24(2), 505\u2013528.","journal-title":"Science and Engineering Ethics"},{"key":"81_CR17","unstructured":"Chantler, A., & Broadhurst, R. (2006). Social engineering and crime prevention in cyberspace. Technical report, Justice, Queensland University of Technology. \nhttps:\/\/eprints.qut.edu.au\/7526\/\n\n."},{"issue":"3","key":"81_CR18","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1108\/10662240510602672","volume":"15","author":"YC Chen","year":"2005","unstructured":"Chen, Y. C., Chen, P. C., Hwang, J. J., Korba, L., Ronggong, S., & Yee, G. (2005). An analysis of online gaming crime characteristics. Internet Research,15(3), 246\u2013261.","journal-title":"Internet Research"},{"key":"81_CR19","unstructured":"Chen, Y. P., Chen, P., Song, R., & Korba, L. (2004). Online gaming crime and security issues\u2014cases and countermeasures from Taiwan. In Proceedings of the 2nd annual conference on privacy, security and trust. \nhttps:\/\/nrc-publications.canada.ca\/eng\/view\/object\/?id=a4a70b1a-332b-4161-bab5-e690de966a6b\n\n."},{"key":"81_CR20","unstructured":"Chesney, R., & Citron, D. (2018). Deep fakes: A looming crisis for national security, democracy and privacy? Lawfare, February 21, 2018. \nhttps:\/\/www.lawfareblog.com\/deep-fakes-looming-crisis-national-security-democracy-and-privacy\n\n."},{"key":"81_CR21","doi-asserted-by":"publisher","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., & Jajodia, S. (2010). Who is tweeting on Twitter: Human, bot, or cyborg? In ACSAC\u201910, proceedings of the 26th annual computer security applications conference (pp. 21\u201330). \nhttps:\/\/doi.org\/10.1145\/1920261.1920265\n\n.","DOI":"10.1145\/1920261.1920265"},{"key":"81_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-34059-8_2","volume-title":"Large-Scale Complex IT Systems. Development, Operation and Management","author":"Dave Cliff","year":"2012","unstructured":"Cliff, D., & Northrop, L. (2012). The global financial markets: An ultra-large-scale systems perspective. In Monterey workshop 2012: Large-scale complex IT systems. Development, operation and management (pp. 29\u201370). \nhttps:\/\/doi.org\/10.1007\/978-3-642-34059-8_2\n\n."},{"issue":"1","key":"81_CR23","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s11572-014-9362-x","volume":"11","author":"J Danaher","year":"2017","unstructured":"Danaher, J. (2017). Robotic rape and robotic\u00a0child sexual abuse: Should they be criminalised? Criminal Law and Philosophy,11(1), 71\u201395. \nhttps:\/\/doi.org\/10.1007\/s11572-014-9362-x\n\n.","journal-title":"Criminal Law and Philosophy"},{"key":"81_CR24","unstructured":"D\u2019Arcy, S., & Pugh, T. (2017). Surge in paedophiles arrested for importing lifelike child sex dolls. The Independent, July 31, 2017. \nhttp:\/\/www.independent.co.uk\/news\/uk\/crime\/paedophiles-uk-arrests-child-sex-dolls-lifelike-border-officers-aids-silicone-amazon-ebay-online-nca-a7868686.html\n\n."},{"key":"81_CR25","volume-title":"Robot ethics 2.0","author":"K Darling","year":"2017","unstructured":"Darling, K. (2017). Who\u2019s Johnny?\u2019 Anthropomorphic framing in human\u2013robot interaction, integration, and policy. In P. Lin, G. Bekey, K. Abney, & R. Jenkins (Eds.), Robot ethics 2.0. Oxford: Oxford University Press."},{"issue":"1","key":"81_CR26","first-page":"49","volume":"7","author":"A Angeli De","year":"2009","unstructured":"De Angeli, A. (2009). Ethical implications of verbal disinhibition with conversational agents. Psychology Journal,7(1), 49\u201357.","journal-title":"Psychology Journal"},{"issue":"3","key":"81_CR27","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.intcom.2008.02.004","volume":"20","author":"A Angeli De","year":"2008","unstructured":"De Angeli, A., & Brahnam, S. (2008). I hate you! Disinhibition with virtual partners. Interacting with Computers,20(3), 302\u2013310. \nhttps:\/\/doi.org\/10.1016\/j.intcom.2008.02.004\n\n.","journal-title":"Interacting with Computers"},{"issue":"9","key":"81_CR28","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/3126492","volume":"60","author":"CA Lima Salge De","year":"2017","unstructured":"De Lima Salge, C. A., & Berente, N. (2017). Is that social bot behaving unethically? Communications of the ACM,60(9), 29\u201331. \nhttps:\/\/doi.org\/10.1145\/3126492\n\n.","journal-title":"Communications of the ACM"},{"issue":"2","key":"81_CR29","first-page":"57","volume":"4","author":"L Delamaire","year":"2009","unstructured":"Delamaire, L., Abdou, H., & Pointon, J. (2009). Credit card fraud and detection techniques: A review. Banks and Bank Systems,4(2), 57\u201368.","journal-title":"Banks and Bank Systems"},{"key":"81_CR30","volume-title":"The intentional stance","author":"DC Dennett","year":"1987","unstructured":"Dennett, D. C. (1987). The intentional stance. Cambridge, MA: MIT Press."},{"key":"81_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.robot.2015.11.012","volume":"77","author":"L Dennis","year":"2016","unstructured":"Dennis, L., Fisher, M., Slavkovik, M., & Webster, M. (2016). Formal verification of ethical choices in autonomous systems. Robotics and Autonomous Systems,77, 1\u201314. \nhttps:\/\/doi.org\/10.1016\/j.robot.2015.11.012\n\n.","journal-title":"Robotics and Autonomous Systems"},{"key":"81_CR32","unstructured":"Devlin, K. (2015). In defence of sex machines: Why trying to ban sex Robots is wrong. The Conversation (UK), September 17, 2015, \nhttp:\/\/theconversation.com\/in-defence-of-sex-machines-why-trying-to-ban-sex-robots-is-wrong-47641\n\n."},{"key":"81_CR33","volume-title":"Handbook on complexity and public policy","author":"B Edmonds","year":"2013","unstructured":"Edmonds, B., & Gershenson, C. (2013). Modelling Complexity for Policy: Opportunities and Challenges. In R. Geyer & P. Cairney (Eds.), Handbook on complexity and public policy. Cheltenham: Edward Elgar Publishing."},{"key":"81_CR34","unstructured":"Europol. (2017). Serious and organised crime threat assessment. \nhttps:\/\/www.europol.europa.eu\/socta\/2017\/\n\n."},{"key":"81_CR35","doi-asserted-by":"crossref","unstructured":"Ezrachi, A., & Stucke, M. E. (2016). Two artificial neural networks meet in an online hub and change the future (of competition, market dynamics and society). Oxford Legal Studies Research Paper, No. 24\/2017, University of Tennessee Legal Studies Research Paper, No. 323, \nhttp:\/\/dx.doi.org\/10.2139\/ssrn.2949434\n\n.","DOI":"10.2139\/ssrn.2949434"},{"issue":"3","key":"81_CR36","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1080\/14697688.2012.757636","volume":"13","author":"JD Farmer","year":"2013","unstructured":"Farmer, J. D., & Skouras, S. (2013). An ecological perspective on the future of computer trading. Quantitative Finance,13(3), 325\u2013346. \nhttps:\/\/doi.org\/10.1080\/14697688.2012.757636\n\n.","journal-title":"Quantitative Finance"},{"issue":"5","key":"81_CR37","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.avb.2009.04.008","volume":"14","author":"CJ Ferguson","year":"2009","unstructured":"Ferguson, C. J., & Hartley, R. D. (2009). The pleasure is momentary\u2026 the expense damnable? The influence of pornography on rape and sexual assault. Aggression and Violent Behavior,14(5), 323\u2013329. \nhttps:\/\/doi.org\/10.1016\/j.avb.2009.04.008\n\n.","journal-title":"Aggression and Violent Behavior"},{"key":"81_CR38","doi-asserted-by":"publisher","unstructured":"Ferrara, E. (2015). Manipulation and abuse on social media, \nhttps:\/\/doi.org\/10.1145\/2749279.2749283\n\n.","DOI":"10.1145\/2749279.2749283"},{"issue":"7","key":"81_CR39","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2014","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2014). The rise of social bots. Communications of the ACM,59(7), 96\u2013104. \nhttps:\/\/doi.org\/10.1145\/2818717\n\n.","journal-title":"Communications of the ACM"},{"key":"81_CR40","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511845239","volume-title":"The Cambridge handbook of information and computer ethics","author":"L Floridi","year":"2010","unstructured":"Floridi, L. (2010). The Cambridge handbook of information and computer ethics. Cambridge: Cambridge University Press."},{"key":"81_CR41","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199641321.001.0001","volume-title":"The ethics of information","author":"L Floridi","year":"2013","unstructured":"Floridi, L. (2013). The ethics of information. Oxford: Oxford University Press."},{"issue":"2083","key":"81_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1098\/rsta.2016.0112","volume":"374","author":"L Floridi","year":"2016","unstructured":"Floridi, L. (2016). Faultless responsibility: On the nature and allocation of moral responsibility for distributed moral actions. Royal Society\u2019s Philosophical Transactions A: Mathematical, Physical and Engineering Sciences,374(2083), 1\u201322. \nhttps:\/\/doi.org\/10.1098\/rsta.2016.0112\n\n.","journal-title":"Royal Society\u2019s Philosophical Transactions A: Mathematical, Physical and Engineering Sciences"},{"issue":"2","key":"81_CR43","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s13347-017-0259-1","volume":"30","author":"L Floridi","year":"2017","unstructured":"Floridi, L. (2017a). Digital\u2019s cleaving power and its consequences. Philosophy and Technology,30(2), 123\u2013129.","journal-title":"Philosophy and Technology"},{"issue":"1","key":"81_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13347-017-0257-3","volume":"30","author":"L Floridi","year":"2017","unstructured":"Floridi, L. (2017b). Robots, jobs, taxes, and responsibilities. Philosophy and Technology,30(1), 1\u20134.","journal-title":"Philosophy and Technology"},{"issue":"3","key":"81_CR45","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1023\/B:MIND.0000035461.63578.9d","volume":"14","author":"L Floridi","year":"2004","unstructured":"Floridi, L., & Sanders, J. W. (2004). On the morality of artificial agents. Minds and Machines,14(3), 349\u2013379. \nhttps:\/\/doi.org\/10.1023\/B:MIND.0000035461.63578.9d\n\n.","journal-title":"Minds and Machines"},{"key":"81_CR46","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2016.0360","author":"L Floridi","year":"2016","unstructured":"Floridi, L., & Taddeo, M. (2016). What is data ethics? Philosophical Transactions of the Royal Society A: Mathematical Physical and Engineering Sciences. \nhttps:\/\/doi.org\/10.1098\/rsta.2016.0360\n\n.","journal-title":"Philosophical Transactions of the Royal Society A: Mathematical Physical and Engineering Sciences"},{"issue":"1","key":"81_CR47","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s11023-008-9130-6","volume":"19","author":"L Floridi","year":"2009","unstructured":"Floridi, L., Taddeo, M., & Turilli, M. (2009). Turing\u2019s imitation game: Still an impossible challenge for all machines and some judges\u2014An evaluation of the 2008 Loebner contest. Minds and Machines,19(1), 145\u2013150.","journal-title":"Minds and Machines"},{"key":"81_CR48","doi-asserted-by":"publisher","unstructured":"Freier, N. (2008). Children attribute moral standing to a personified agent. In Proceedings of the 26th annual SIGCHI conference on human factors in computing systems (CHI\u201908) (pp. 343\u2013352). \nhttps:\/\/doi.org\/10.1145\/1357054.1357113\n\n.","DOI":"10.1145\/1357054.1357113"},{"key":"81_CR49","unstructured":"Freitas, P. M., Andrade, F., & Novais, P. (2014). Criminal liability of autonomous agents: From the unthinkable to the plausible. In: P. Casanovas, U. Pagallo, M. Palmirani, G. Sartor (Eds.), AI approaches to the complexity of legal systems. AICOL 2013. Lecture notes in computer science (Vol. 8929). Berlin: Springer."},{"key":"81_CR50","unstructured":"Gauci, M., Chen, J., Li, W., Dodd, T. J., & Gross, R. (2014). Clustering objects with robots that do not compute. Proceedings of the 2014 international conference on autonomous agents and multi-agent systems (AAMAS 2014) (pp. 421\u2013428). \nhttps:\/\/dl.acm.org\/citation.cfm?id=2615800\n\n."},{"issue":"3","key":"81_CR52","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1525\/sp.2007.54.1.23","volume":"19","author":"S Gless","year":"2016","unstructured":"Gless, S., Silverman, E., & Weigend, T. (2016). If robots cause harm, who is to blame? Self-driving cars and criminal liability. New Criminal Law Review,19(3), 412\u2013436. \nhttps:\/\/doi.org\/10.1525\/sp.2007.54.1.23\n\n.","journal-title":"New Criminal Law Review"},{"key":"81_CR53","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1525\/sp.2007.54.1.23","volume":"19","author":"B Gogarty","year":"2008","unstructured":"Gogarty, B., & Hagger, M. (2008). The laws of man over vehicles unmanned: The legal response to robotic revolution on sea, land and air. Journal of Law, Information and Science,19, 73\u2013145. \nhttps:\/\/doi.org\/10.1525\/sp.2007.54.1.23\n\n.","journal-title":"Journal of Law, Information and Science"},{"issue":"6051","key":"81_CR54","doi-asserted-by":"publisher","first-page":"1878","DOI":"10.1126\/science.1202775","volume":"333","author":"SA Golder","year":"2011","unstructured":"Golder, S. A., & Macy, M. W. (2011). Diurnal and seasonal mood vary with work, sleep, and daylength across diverse cultures. Science,333(6051), 1878\u20131881. \nhttps:\/\/doi.org\/10.1126\/science.1202775\n\n.","journal-title":"Science"},{"key":"81_CR55","unstructured":"Graeff, E. C. (2014). What we should do before the social bots take over: Online privacy protection and the political economy of our near future. Presented at media in transition 8: Public Media, Private Media. Cambridge: MIT, May 5. \nhttp:\/\/web.media.mit.edu\/~erhardt\/papers\/Graeff-SocialBotsPrivacy-MIT8.pdf\n\n."},{"key":"81_CR57","first-page":"200","volume":"21","author":"G Hallevy","year":"2012","unstructured":"Hallevy, G. (2012). Unmanned vehicles\u2014Subordination to criminal law under the modern concept of criminal liability. Journal of Law, Information and Science,21, 200\u2013211.","journal-title":"Journal of Law, Information and Science"},{"key":"81_CR58","unstructured":"Haugen, G. M. S. (2017). Manipulation and deception with social bots: Strategies and indicators for minimizing impact.\n\nhttp:\/\/hdl.handle.net\/11250\/2448952\n\n. Accessed 5 Jan 2018."},{"issue":"1","key":"81_CR59","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1086\/466782","volume":"17","author":"GA Hay","year":"1974","unstructured":"Hay, G. A., & Kelley, D. (1974). An empirical survey of price fixing conspiracies. The Journal of Law and Economics,17(1), 13\u201338.","journal-title":"The Journal of Law and Economics"},{"issue":"2","key":"81_CR60","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s11572-007-9042-1","volume":"2","author":"M Hildebrandt","year":"2008","unstructured":"Hildebrandt, M. (2008). Ambient intelligence, criminal liability and democracy. Criminal Law and Philosophy,2(2), 163\u2013180. \nhttps:\/\/doi.org\/10.1007\/s11572-007-9042-1\n\n.","journal-title":"Criminal Law and Philosophy"},{"key":"81_CR61","doi-asserted-by":"crossref","unstructured":"IBM. (2018). Cognitive security\u2014Watson for cyber security. \nhttps:\/\/www.ibm.com\/security\/cognitive\n\n. Accessed 5 Jan 2018.","DOI":"10.1016\/S1353-4858(18)30053-9"},{"issue":"10","key":"81_CR62","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM,50(10), 94\u2013100. \nhttps:\/\/doi.org\/10.1145\/1290958.1290968\n\n.","journal-title":"Communications of the ACM"},{"issue":"4","key":"81_CR63","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1080\/10781910701665766","volume":"13","author":"R Janoff-Bulman","year":"2007","unstructured":"Janoff-Bulman, R. (2007). Erroneous assumptions: Popular belief in the effectiveness of torture interrogation. Peace and Conflict: Journal of Peace Psychology,13(4), 429.","journal-title":"Peace and Conflict: Journal of Peace Psychology"},{"key":"81_CR64","first-page":"516","volume":"64","author":"EE Joh","year":"2016","unstructured":"Joh, E. E. (2016). Policing police robots. UCLA Law Review Discourse,64, 516.","journal-title":"UCLA Law Review Discourse"},{"key":"81_CR65","first-page":"284","volume":"1","author":"IR Kerr","year":"2004","unstructured":"Kerr, I. R. (2004). Bots, babes and the californication of commerce. University of Ottawa Law and Technology Journal,1, 284\u2013324.","journal-title":"University of Ottawa Law and Technology Journal"},{"issue":"6","key":"81_CR66","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1162\/105474605775196544","volume":"14","author":"IR Kerr","year":"2005","unstructured":"Kerr, I. R., & Bornfreund, M. (2005). Buddy bots: How Turing\u2019s fast friends are under-mining consumer privacy. Presence: Teleoperators and Virtual Environments,14(6), 647\u2013655.","journal-title":"Presence: Teleoperators and Virtual Environments"},{"key":"81_CR67","doi-asserted-by":"crossref","unstructured":"Kolosnjaji, B., Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., & Roli, F. (2018). Adversarial malware binaries: Evading deep learning for malware detection in executables. \nhttp:\/\/arxiv.org\/abs\/1803.04173\n\n.","DOI":"10.23919\/EUSIPCO.2018.8553214"},{"key":"81_CR68","volume-title":"Code and other laws of cyberspace","author":"L Lessig","year":"1999","unstructured":"Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books."},{"key":"81_CR69","first-page":"1253","volume":"66","author":"TCW Lin","year":"2017","unstructured":"Lin, T. C. W. (2017). The new market manipulation. Emory Law Journal,66, 1253.","journal-title":"Emory Law Journal"},{"key":"81_CR70","volume-title":"Social systems","author":"N Luhmann","year":"1995","unstructured":"Luhmann, N. (1995). Social systems. Stanford: Stanford University Press."},{"issue":"12","key":"81_CR71","doi-asserted-by":"publisher","first-page":"e1","DOI":"10.2105\/AJPH.2017.303994","volume":"107","author":"TK Mackey","year":"2017","unstructured":"Mackey, T. K., Kalyanam, J., Katsuki, T., & Lanckriet, G. (2017). Machine learning to detect prescription opioid abuse promotion and access via Twitter. American Journal of Public Health,107(12), e1\u2013e6. \nhttps:\/\/doi.org\/10.2105\/AJPH.2017.303994\n\n.","journal-title":"American Journal of Public Health"},{"key":"81_CR72","unstructured":"Marrero, T. (2016). Record pacific cocaine haul brings hundreds of cases to Tampa court. Tampa Bay Times, September 10, 2016, \nhttps:\/\/www.tampabay.com\/news\/military\/record-pacific-cocaine-haul-brings-hundreds-of-cases-to-tampa-court\/2293091\n\n."},{"key":"81_CR73","doi-asserted-by":"publisher","unstructured":"Mart\u00ednez-Miranda, E., McBurney, P., & Howard, M. J. (2016). Learning unfair trading: A market manipulation analysis from the reinforcement learning perspective. In Proceedings of the 2016 IEEE conference on evolving and adaptive intelligent systems, EAIS 2016 (pp. 103\u2013109). \nhttps:\/\/doi.org\/10.1109\/EAIS.2016.7502499\n\n.","DOI":"10.1109\/EAIS.2016.7502499"},{"key":"81_CR74","doi-asserted-by":"publisher","first-page":"2527","DOI":"10.3366\/ajicl.2011.0005","volume":"101","author":"A McAllister","year":"2017","unstructured":"McAllister, A. (2017). Stranger than science fiction: The rise of AI interrogation in the dawn of autonomous robots and the need for an additional protocol to the UN convention against torture. Minnesota Law Review,101, 2527\u20132573. \nhttps:\/\/doi.org\/10.3366\/ajicl.2011.0005\n\n.","journal-title":"Minnesota Law Review"},{"key":"81_CR75","doi-asserted-by":"publisher","unstructured":"McCarthy, J., Minsky, M. L., Rochester, N., & Shannon, C. E. (1955). A proposal for the Dartmouth summer research project on artificial intelligence.\n\nhttps:\/\/doi.org\/10.1609\/aimag.v27i4.1904\n\n.","DOI":"10.1609\/aimag.v27i4.1904"},{"key":"81_CR76","unstructured":"McKelvey, F., & Dubois, E. (2017). Computational propaganda in Canada: The use of political bots. Computational propaganda research project, Working paper no. 2017.6."},{"key":"81_CR77","unstructured":"Meneguzzi, F., & Luck, M. (2009). Norm-based behaviour modification in BDI agents. In Proceedings of the 8th international joint conference on autonomous agents and multi-agent systems (AAMAS 2009) (pp. 177\u2013184)."},{"issue":"4","key":"81_CR78","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1111\/j.1467-9973.1985.tb00173.x","volume":"16","author":"JH Moor","year":"1985","unstructured":"Moor, J. H. (1985). What is computer ethics? Metaphilosophy,16(4), 266\u2013275.","journal-title":"Metaphilosophy"},{"key":"81_CR79","first-page":"4915","volume":"10","author":"G Neff","year":"2016","unstructured":"Neff, G., & Nagy, P. (2016). Talking to bots: Symbiotic agency and the case of tay. International Journal of Communication,10, 4915\u20134931.","journal-title":"International Journal of Communication"},{"issue":"1","key":"81_CR80","doi-asserted-by":"publisher","first-page":"17","DOI":"10.2753\/MIS0742-1222280102","volume":"28","author":"JF Nunamaker Jr","year":"2011","unstructured":"Nunamaker, J. F., Jr., Derrick, D. C., Elkins, A. C., Burgo, J. K., & Patto, M. W. (2011). Embodied conversational agent-based kiosk for automated interviewing. Journal of Management Information Systems,28(1), 17\u201348.","journal-title":"Journal of Management Information Systems"},{"key":"81_CR81","unstructured":"Office for National Statistics. (2016). Crime in England and Wales, year ending June 2016. Appendix Tables no. June 2017: 1\u201360. \nhttps:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/crimeandjustice\/datasets\/crimeinenglandandwalesappendixtables\n\n."},{"issue":"4","key":"81_CR82","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s00146-010-0316-0","volume":"26","author":"U Pagallo","year":"2011","unstructured":"Pagallo, U. (2011). Killers, fridges, and slaves: A legal journey in robotics. AI & Society,26(4), 347\u2013354. \nhttps:\/\/doi.org\/10.1007\/s00146-010-0316-0\n\n.","journal-title":"AI & Society"},{"key":"81_CR83","doi-asserted-by":"crossref","unstructured":"Pagallo, U. (2017a). From automation to autonomous systems: A legal phenomenology with problems of accountability. In Proceedings of the 26th international joint conference on artificial intelligence (IJCAI-17) (pp. 17\u201323).","DOI":"10.24963\/ijcai.2017\/3"},{"key":"81_CR84","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-017-9418-5","author":"U Pagallo","year":"2017","unstructured":"Pagallo, U. (2017b). When morals ain\u2019t enough: Robots, ethics, and the rules of the law. Minds and Machines. \nhttps:\/\/doi.org\/10.1007\/s11023-017-9418-5\n\n.","journal-title":"Minds and Machines"},{"key":"81_CR85","doi-asserted-by":"publisher","unstructured":"Ratkiewicz, J., Conover, M., Meiss, M., Gon\u00e7alves, B., Patil, S., Flammini, A., & Menczer, F. (2011). Truthy: Mapping the spread of astroturf in Microblog streams. In Proceedings of the 20th international conference companion on world wide web (WWW\u201911) (pp. 249\u2013252). \nhttps:\/\/doi.org\/10.1145\/1963192.1963301\n\n.","DOI":"10.1145\/1963192.1963301"},{"issue":"3","key":"81_CR86","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.intcom.2008.02.005","volume":"20","author":"M Rehm","year":"2008","unstructured":"Rehm, M. (2008). \u2018She is just stupid\u2019\u2014Analyzing user\u2013agent interactions in emotional game situations. Interacting with Computers,20(3), 311\u2013325. \nhttps:\/\/doi.org\/10.1016\/j.intcom.2008.02.005\n\n.","journal-title":"Interacting with Computers"},{"key":"81_CR87","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139173452","volume-title":"Intentionality: An essay in the philosophy of mind","author":"JR Searle","year":"1983","unstructured":"Searle, J. R. (1983). Intentionality: An essay in the philosophy of mind. Cambridge: Cambridge University Press."},{"key":"81_CR88","unstructured":"Seymour, J., & Tully, P. (2016). Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter. \nhttps:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter-wp.pdf\n\n."},{"issue":"8","key":"81_CR89","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MC.2010.242","volume":"43","author":"N Sharkey","year":"2010","unstructured":"Sharkey, N., Goodman, M., & Ross, N. (2010). The coming robot crime wave. IEEE Computer Magazine,43(8), 6\u20138.","journal-title":"IEEE Computer Magazine"},{"key":"81_CR90","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316471760","volume-title":"The law of armed conflict: International humanitarian law in war","author":"GD Solis","year":"2016","unstructured":"Solis, G. D. (2016). The law of armed conflict: International humanitarian law in war (2nd ed.). Cambridge: Cambridge University Press.","edition":"2"},{"issue":"1","key":"81_CR91","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1146\/annurev-financial-110613-034232","volume":"6","author":"C Spatt","year":"2014","unstructured":"Spatt, C. (2014). Security market manipulation. Annual Review of Financial Economics,6(1), 405\u2013418. \nhttps:\/\/doi.org\/10.1146\/annurev-financial-110613-034232\n\n.","journal-title":"Annual Review of Financial Economics"},{"issue":"3","key":"81_CR92","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s11023-017-9446-1","volume":"27","author":"M Taddeo","year":"2017","unstructured":"Taddeo, M. (2017). Deterrence by norms to stop interstate cyber attacks. Minds and Machines,27(3), 387\u2013392. \nhttps:\/\/doi.org\/10.1007\/s11023-017-9446-1\n\n.","journal-title":"Minds and Machines"},{"issue":"4","key":"81_CR93","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1080\/09528130500284053","volume":"17","author":"M Taddeo","year":"2005","unstructured":"Taddeo, M., & Floridi, L. (2005). Solving the symbol grounding problem: A critical review of fifteen years of research. Journal of Experimental and Theoretical Artificial Intelligence,17(4), 419\u2013445.","journal-title":"Journal of Experimental and Theoretical Artificial Intelligence"},{"key":"81_CR94","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1038\/d41586-018-04602-6","volume":"556","author":"M Taddeo","year":"2018","unstructured":"Taddeo, M., & Floridi, L. (2018a). Regulate artificial intelligence to avert cyber arms race. Nature,556, 296\u2013298. \nhttps:\/\/doi.org\/10.1038\/d41586-018-04602-6\n\n.","journal-title":"Nature"},{"issue":"6404","key":"81_CR95","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1126\/science.aat5991","volume":"361","author":"M Taddeo","year":"2018","unstructured":"Taddeo, M., & Floridi, L. (2018b). How AI can be a force for good. Science,361(6404), 751\u2013752. \nhttps:\/\/doi.org\/10.1126\/science.aat5991\n\n.","journal-title":"Science"},{"key":"81_CR96","doi-asserted-by":"crossref","unstructured":"Tonti, G., Bradshaw, J. M., & Jeffers, R. (2003). Semantic web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder. In Proceedings of international semantic web conference (pp. 419\u2013437).","DOI":"10.1007\/978-3-540-39718-2_27"},{"issue":"236","key":"81_CR97","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1093\/mind\/LIX.236.433","volume":"59","author":"AM Turing","year":"1950","unstructured":"Turing, A. M. (1950). Computing machinery and intelligence. Mind,59(236), 433\u2013460.","journal-title":"Mind"},{"key":"81_CR98","unstructured":"Twitter. (2018). Twitter\u2014impersonation policy. \nhttps:\/\/help.twitter.com\/en\/rules-and-policies\/twitter-impersonation-policy\n\n. Accessed 5 Jan 2018."},{"key":"81_CR99","unstructured":"Uszok, A. J., Bradshaw, R. J., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., & Lott, J. (2003). KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In Proceedings of IEEE policy 2003 (pp. 93\u201398). Los Amitos, CA: IEEE Computer Society."},{"key":"81_CR100","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11948-011-9276-0","volume":"18","author":"I Poel Van de","year":"2012","unstructured":"Van de Poel, I., Fahlquist, J. N., Doorn, N., Zwart, S., & Royakkers, L. (2012). The problem of many hands: Climate change as an example. Science and Engineering Ethics,18, 49\u201367.","journal-title":"Science and Engineering Ethics"},{"issue":"1","key":"81_CR101","doi-asserted-by":"publisher","first-page":"34","DOI":"10.4018\/IJT.2016010103","volume":"7","author":"B Lier Van","year":"2016","unstructured":"Van Lier, B. (2016). From high frequency trading to self-organizing moral machines. International Journal of Technoethics,7(1), 34\u201350. \nhttps:\/\/doi.org\/10.4018\/IJT.2016010103\n\n.","journal-title":"International Journal of Technoethics"},{"key":"81_CR102","unstructured":"Van Riemsdijk, M. B., Dennis, L., & Fisher, M. (2015). A semantic framework for socially adaptive agents towards strong norm compliance. In Proceedings of the 14th international conference on autonomous agents and multiagent systems (AAMAS 2015) (pp. 423\u2013432). \nhttps:\/\/dl.acm.org\/citation.cfm?id=2772935\n\n."},{"key":"81_CR103","unstructured":"Van Riemsdijk, M. B., Dennis, L. A., Fisher, M., & Hindriks, K. V. (2013). Agent reasoning for norm compliance: A semantic approach. In Proceedings of the 12th international conference on autonomous agents and multiagent systems (AAMAS 2013) (pp. 499\u2013506). \nhttps:\/\/dl.acm.org\/citation.cfm?id=2485000\n\n."},{"key":"81_CR104","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2017.04.002","author":"D Vanderelst","year":"2016","unstructured":"Vanderelst, D., & Winfield, A. (2016a). An architecture for ethical robots inspired by the simulation theory of cognition. Cognitive Systems Research. \nhttps:\/\/doi.org\/10.1016\/j.cogsys.2017.04.002\n\n.","journal-title":"Cognitive Systems Research"},{"key":"81_CR105","unstructured":"Vanderelst, D., & Winfield, A. (2016b). The dark side of ethical robots.\n\nhttps:\/\/arxiv.org\/abs\/1606.02583\n\n."},{"issue":"3","key":"81_CR106","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.intcom.2008.02.007","volume":"20","author":"G Veletsianos","year":"2008","unstructured":"Veletsianos, G., Scharber, C., & Doering, A. (2008). When sex, drugs, and violence enter the classroom: Conversations between adolescents and a female pedagogical agent. Interacting with Computers,20(3), 292\u2013301. \nhttps:\/\/doi.org\/10.1016\/j.intcom.2008.02.007\n\n.","journal-title":"Interacting with Computers"},{"issue":"2","key":"81_CR107","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1037\/pspa0000098","volume":"114","author":"Y Wang","year":"2017","unstructured":"Wang, Y., & Kosinski, M. (2017). Deep neural networks can detect sexual orientation from faces. Journal of Personality and Social Psychology,114(2), 246\u2013257. \nhttps:\/\/doi.org\/10.1037\/pspa0000098\n\n.","journal-title":"Journal of Personality and Social Psychology"},{"key":"81_CR108","unstructured":"Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., & Zhao, B. Y. (2012). Social turing tests: Crowdsourcing sybil detection. \nhttp:\/\/arxiv.org\/abs\/1205.3856\n\n."},{"key":"81_CR109","volume-title":"Computer power and human reason: From judgment to calculation","author":"J Weizenbaum","year":"1976","unstructured":"Weizenbaum, J. (1976). Computer power and human reason: From judgment to calculation. Oxford: W. H. Freeman & Co."},{"issue":"4","key":"81_CR110","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/s11023-017-9419-4","volume":"27","author":"MP Wellman","year":"2017","unstructured":"Wellman, M. P., & Rajan, U. (2017). Ethical issues for autonomous trading agents. Minds and Machines,27(4), 609\u2013624.","journal-title":"Minds and Machines"},{"issue":"3","key":"81_CR111","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.intcom.2008.02.002","volume":"20","author":"B Whitby","year":"2008","unstructured":"Whitby, B. (2008). Sometimes it\u2019s hard to be a robot: A call for action on the ethics of abusing artificial agents. Interacting with Computers,20(3), 326\u2013333.","journal-title":"Interacting with Computers"},{"key":"81_CR112","unstructured":"Williams, R. (2017). Lords select committee, artificial intelligence committee, written evidence (AIC0206).\n\nhttp:\/\/data.parliament.uk\/writtenevidence\/committeeevidence.svc\/evidencedocument\/artificial-intelligence-committee\/artificial-intelligence\/written\/70496.html#_ftn13\n\n. Accessed 5 Jan 2018."},{"issue":"14","key":"81_CR113","doi-asserted-by":"publisher","first-page":"eaar7650","DOI":"10.1126\/scirobotics.aar7650","volume":"3","author":"GZ Yang","year":"2018","unstructured":"Yang, G. Z., Bellingham, J., Dupont, P. E., Fischer, P., Floridi, L., Full, R., et al. (2018). The grand challenges of science robotics. Science Robotics,3(14), eaar7650. \nhttps:\/\/doi.org\/10.1126\/scirobotics.aar7650\n\n.","journal-title":"Science Robotics"},{"issue":"3","key":"81_CR114","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1016\/j.dss.2010.08.007","volume":"50","author":"W Zhou","year":"2011","unstructured":"Zhou, W., & Kapoor, G. (2011). Detecting evolutionary financial statement fraud. Decision Support Systems,50(3), 570\u2013575. \nhttps:\/\/doi.org\/10.1016\/j.dss.2010.08.007\n\n.","journal-title":"Decision Support Systems"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-018-00081-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-018-00081-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-018-00081-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T19:27:08Z","timestamp":1581622028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-018-00081-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,14]]},"references-count":111,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["81"],"URL":"https:\/\/doi.org\/10.1007\/s11948-018-00081-0","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,14]]},"assertion":[{"value":"10 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}