{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:07:48Z","timestamp":1758845268437,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T00:00:00Z","timestamp":1533772800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012620","name":"Royal Holloway University of London","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012620","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s12525-018-0307-4","type":"journal-article","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T22:13:59Z","timestamp":1533766439000},"page":"239-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Pirasa: strategic protocol selection for e-commerce agents"],"prefix":"10.1007","volume":"29","author":[{"given":"Jack","family":"Hopkins","sequence":"first","affiliation":[]},{"given":"\u00d6zg\u00fcr","family":"Kafali","sequence":"additional","affiliation":[]},{"given":"Bedour","family":"Alrayes","sequence":"additional","affiliation":[]},{"given":"Kostas","family":"Stathis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,9]]},"reference":[{"key":"307_CR1","doi-asserted-by":"crossref","unstructured":"Akula, V., & Menasc\u00e9, D.A. (2004). An analysis of bidding activity in online auctions. In Proceedings of the international conference on electronic commerce and web technologies (pp. 206\u2013217).","DOI":"10.1007\/978-3-540-30077-9_21"},{"key":"307_CR2","doi-asserted-by":"crossref","unstructured":"Alrayes, B., Kafali, \u00d6., Stathis, K. (2016). Recon: a robust multi-agent environment for simulating concurrent negotiations. In Recent advances in agent-based complex automated negotiation (pp. 157\u2013174). Springer International Publishing.","DOI":"10.1007\/978-3-319-30307-9_10"},{"key":"307_CR3","doi-asserted-by":"publisher","unstructured":"Alrayes, B., Kafali, \u00d6., Stathis, K. (2017). Concurrent bilateral negotiation for open e-markets: the conan strategy. Knowledge and Information Systems. Retrieved from \n                    https:\/\/doi.org\/10.1007\/s10115-017-1125-2\n                    \n                  .","DOI":"10.1007\/s10115-017-1125-2"},{"issue":"4","key":"307_CR4","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s12525-016-0237-y","volume":"26","author":"R Alt","year":"2016","unstructured":"Alt, R., & Zimmermann, H.D. (2016). Electronic markets on electronic markets in education. Electronic Markets, 26(4), 311\u2013314. \n                    https:\/\/doi.org\/10.1007\/s12525-016-0237-y\n                    \n                  .","journal-title":"Electronic Markets"},{"key":"307_CR5","unstructured":"Baarslag, T., Alan, A.T., Gomer, R., Alam, M., Perera, C., Gerding, E.H., Schraefel, M. (2017). An automated negotiation agent for permission management. In Proceedings of the 16th conference on autonomous agents and multiagentsystems (aamas) (pp. 380\u2013390)."},{"key":"307_CR6","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.eswa.2016.12.031","volume":"74","author":"AS Bataineh","year":"2017","unstructured":"Bataineh, A.S., Bentahar, J., Menshawy, M.E., Dssouli, R. (2017). Specifying and verifying contract-driven service compositions using commitments and model checking. Expert Systems with Applications, 74, 151\u2013184.","journal-title":"Expert Systems with Applications"},{"key":"307_CR7","unstructured":"Baumer, C., Breugst, M., Choy, S., Magedanz, T. (1999). Grasshopper: a universal agent platform based on OMG MASIF and FIPA standards. In First international workshop on mobile agents for telecommunication applications (pp. 1\u201318)."},{"key":"307_CR8","unstructured":"Bellifemine, F., Poggi, A., Rimassa, G., Turci, P. (2000). An object-oriented framework to realize agent systems. In Woa workshop: from objects to agents (pp. 52\u201357)."},{"issue":"5","key":"307_CR9","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/S0950-5849(01)00216-6","volume":"44","author":"H Benameur","year":"2002","unstructured":"Benameur, H., Chaib-Draa, B., Kropf, P. (2002). Multi-item auctions for automatic negotiation. Information and Software Technology, 44(5), 291\u2013301.","journal-title":"Information and Software Technology"},{"issue":"1","key":"307_CR10","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10506-007-9059-8","volume":"16","author":"G Boella","year":"2008","unstructured":"Boella, G., & van der Torre, L. (2008). Institutions with a hierarchy of authorities in distributed dynamic environments. Artificial Intelligence and Law, 16(1), 53\u201371.","journal-title":"Artificial Intelligence and Law"},{"key":"307_CR11","unstructured":"Bromuri, S., & Stathis, K. (2008). Situating cognitive agents in GOLEM. In D. Weyns, S. Brueckner, Y. Demazeau (Eds.) Engineering environment-mediated multi-agent systems (Vol. 5049 pp. 115\u2013134). Berlin: Springer."},{"issue":"1","key":"307_CR12","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1504\/IJEB.2005.006387","volume":"3","author":"E Chen","year":"2005","unstructured":"Chen, E., Vahidov, R., Kersten, G.E. (2005). Agent-supported negotiations in the e-marketplace. International Journal of Electronic Business, 3(1), 28\u201349.","journal-title":"International Journal of Electronic Business"},{"issue":"1","key":"307_CR13","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s10458-012-9202-0","volume":"27","author":"F Chesani","year":"2013","unstructured":"Chesani, F., Mello, P., Montali, M., Torroni, P. (2013). Representing and monitoring social commitments using the Event Calculus. Autonomous Agents and Multi-Agent Systems, 27(1), 85\u2013130.","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"issue":"1","key":"307_CR14","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s10506-012-9128-5","volume":"21","author":"F Dechesne","year":"2013","unstructured":"Dechesne, F., di Tosto, G., Dignum, V., Dignum, F. (2013). No smoking here: values, norms and culture in multi-agent systems. Artificial Intelligence and Law, 21(1), 79\u2013107.","journal-title":"Artificial Intelligence and Law"},{"issue":"2","key":"307_CR15","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.dss.2007.06.003","volume":"44","author":"M Fasli","year":"2008","unstructured":"Fasli, M., & Michalakopoulos, M. (2008). e-game: a platform for developing auction-based market simulations. Decision Support Systems, 44(2), 469\u2013481.","journal-title":"Decision Support Systems"},{"key":"307_CR16","unstructured":"Fujita, K., Ito, T., Baarslag, T., Hindriks, K., Jonker, C., Kraus, S., Lin, R. (2013). The second automated negotiating agents competition (anac2011). In T. Ito, M. Zhang, V. Robu, T. Matsuo (Eds.) Complex automated negotiations: Theories, models, and software competitions (Vol. 435 pp. 183\u2013197). Berlin: Springer."},{"key":"307_CR17","unstructured":"Gao, Y., Toni, F., Wang, H., Xu, F. (2016). Argumentation-based multi-agent decision making with privacy preserved. In Proceedings of the 15th conference on autonomous agents and multiagent systems (aamas), pp. 1153\u20131161."},{"issue":"6","key":"307_CR18","first-page":"231","volume":"55","author":"G Governatori","year":"2013","unstructured":"Governatori, G. (2013). Business process compliance: an abstract normative framework. Information Technology, 55(6), 231\u2013238.","journal-title":"Information Technology"},{"issue":"6","key":"307_CR19","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.2307\/1911413","volume":"49","author":"M Harris","year":"1981","unstructured":"Harris, M., & Raviv, A. (1981). Allocation mechanisms and the design of auctions. Econometrica, 49(6), 1477\u20131499.","journal-title":"Econometrica"},{"key":"307_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/9780470642603","volume-title":"Modeling online auctions (Vol. 91)","author":"W Jank","year":"2010","unstructured":"Jank, W., & Shmueli, G. (2010). Modeling online auctions (Vol. 91). New York: Wiley."},{"key":"307_CR21","unstructured":"Jank, W., & Shmueli, G. (2017). Modeling online auctions datasets (Snapshot taken on October 2017). \n                    http:\/\/www.modelingonlineauctions.com\/datasets\n                    \n                  ."},{"key":"307_CR22","unstructured":"Kafali, \u00d6. (2012). Automated reasoning on exceptions in commitment-based multiagent systems School (Unpublished doctoral dissertation). Bogazi\u00e7i University."},{"issue":"1","key":"307_CR23","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s10472-012-9282-1","volume":"64","author":"\u00d6 Kafali","year":"2012","unstructured":"Kafali, \u00d6., & Torroni, P. (2012). Exception diagnosis in multiagent contract executions. Annals of Mathematics and Artificial Intelligence, 64(1), 73\u2013107.","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"issue":"1","key":"307_CR24","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s10115-015-0848-1","volume":"47","author":"\u00d6 Kafali","year":"2016","unstructured":"Kafali, \u00d6., & Yolum, P. (2016). Pisagor: a proactive software agent for monitoring interactions. Knowledge and Information Systems, 47(1), 215\u2013239.","journal-title":"Knowledge and Information Systems"},{"issue":"5","key":"307_CR25","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MIS.2016.89","volume":"31","author":"\u00d6 Kafali","year":"2016","unstructured":"Kafali, \u00d6., Ajmeri, N., Singh, M.P. (2016a). Revani: revising and verifying normative specifications for privacy. IEEE Intelligent Systems, 31(5), 8\u201315.","journal-title":"IEEE Intelligent Systems"},{"key":"307_CR26","doi-asserted-by":"crossref","unstructured":"Kafali, \u00d6., Singh, M.P., Williams, L. (2016b). Nane: identifying misuse cases using temporal norm enactments. In Proceedings of the 20th IEEE international requirements engineering conference (re) (pp. 136\u2013145). Beijing: IEEE Computer Society.","DOI":"10.1109\/RE.2016.34"},{"issue":"3","key":"307_CR27","doi-asserted-by":"publisher","first-page":"27:1","DOI":"10.1145\/3003434","volume":"17","author":"N K\u00f6kciyan","year":"2017","unstructured":"K\u00f6kciyan, N., Yaglikci, N., Yolum, P. (2017). An argumentation approach for resolving privacy disputes in online social networks. ACM Transactions on Internet Technology (TOIT), 17(3), 27:1\u201327:22.","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"issue":"1","key":"307_CR28","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF03037383","volume":"4","author":"R Kowalski","year":"1986","unstructured":"Kowalski, R., & Sergot, M. (1986). A logic-based calculus of events. New Generation Computing, 4(1), 67\u201395.","journal-title":"New Generation Computing"},{"issue":"1","key":"307_CR29","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1111\/j.1467-8640.2012.00463.x","volume":"30","author":"R Lin","year":"2014","unstructured":"Lin, R., Kraus, S., Baarslag, T., Tykhonov, D., Hindriks, K.V., Jonker, C.M. (2014). GENIUS: an integrated environment for supporting the design of generic automated negotiators. Computational Intelligence, 30 (1), 48\u201370.","journal-title":"Computational Intelligence"},{"key":"307_CR30","unstructured":"Lukasiewycz, M., Gla\u00df, M., Reimann, F., Teich, J. (2011). Opt4J\u2014a modular framework for meta-heuristic optimization. In Proceedings of the genetic and evolutionary computing conference (gecco 2011) (pp. 1723\u20131730). Dublin."},{"key":"307_CR31","unstructured":"Luke, S., Cioffi-Revilla, C., Panait, L., Sullivan, K. (2004). Mason: a new multi-agent simulation toolkit. In Proceedings of the 2004 swarmfest workshop (Vol. 8)."},{"key":"307_CR32","unstructured":"Montali, M., Calvanese, D., De Giacomo, G. (2014). Verification of data-aware commitment-based multiagent system. In Proceedings of the international conference on autonomousagents and multi-agent systems (aamas) (pp. 157\u2013164). Richland: International Foundation for Autonomous Agents and Multiagent Systems."},{"issue":"2","key":"307_CR33","doi-asserted-by":"publisher","first-page":"10:1","DOI":"10.1145\/1883612.1883617","volume":"43","author":"S Parsons","year":"2011","unstructured":"Parsons, S., Rodriguez-Aguilar, J.A., Klein, M. (2011). Auctions and bidding: a guide for computer scientists. ACM Computing Surveys, 43(2), 10:1\u201310:59. \n                    https:\/\/doi.org\/10.1145\/1883612.1883617\n                    \n                  .","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"307_CR34","doi-asserted-by":"publisher","first-page":"37","DOI":"10.2307\/23043488","volume":"35","author":"MK Sein","year":"2011","unstructured":"Sein, M.K., Henfridsson, O., Purao, S., Rossi, M., Lindgren, R. (2011). Action design research. MIS Quarterly, 35(1), 37\u201356.","journal-title":"MIS Quarterly"},{"issue":"4","key":"307_CR35","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1111\/1467-8640.t01-1-00207","volume":"18","author":"KM Sim","year":"2002","unstructured":"Sim, K.M. (2002). A market-driven model for designing negotiation agents. Computational Intelligence, 18 (4), 618\u2013637.","journal-title":"Computational Intelligence"},{"issue":"1","key":"307_CR36","doi-asserted-by":"publisher","first-page":"21:1","DOI":"10.1145\/2542182.2542203","volume":"5","author":"MP Singh","year":"2013","unstructured":"Singh, M.P. (2013). Norms as a basis for governing sociotechnical systems. ACM Transactions on Intelligent Systems and Technology, 5(1), 21:1\u201321:23.","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"issue":"2","key":"307_CR37","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s12525-015-0190-1","volume":"25","author":"S Spiekermann","year":"2015","unstructured":"Spiekermann, S., B\u00f6hme, R., Acquisti, A., Hui, K. L. (2015). Personal data markets. Electronic Markets, 25(2), 91\u201393. \n                    https:\/\/doi.org\/10.1007\/s12525-015-0190-1\n                    \n                  .","journal-title":"Electronic Markets"},{"issue":"1","key":"307_CR38","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1111\/1467-9337.00106","volume":"12","author":"GH Von Wright","year":"1999","unstructured":"Von Wright, G.H. (1999). Deontic logic: a personal view. Ratio Juris, 12(1), 26\u201338.","journal-title":"Ratio Juris"},{"key":"307_CR39","unstructured":"Williams, C.R., Robu, V., Gerding, E.H., Jennings, N.R. (2012). Negotiating concurrently with unknown opponents in complex, real-time domains. In 20th European conference on artificial intelligence (Vol. 242 pp. 834\u2013839)."},{"key":"307_CR40","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-39878-0_4","volume":"152","author":"D Wood","year":"2013","unstructured":"Wood, D., Kafali, \u00d6., Stathis, K. (2013). Diesect: a distributed environment for simulating e-commerce contracts. E-commerce and Web Technologies, 152, 39\u201350.","journal-title":"E-commerce and Web Technologies"},{"key":"307_CR41","volume-title":"An introduction to multiagent systems (2nd edn)","author":"M Wooldridge","year":"2009","unstructured":"Wooldridge, M. (2009). An introduction to multiagent systems (2nd edn). New York: Wiley."},{"issue":"4","key":"307_CR42","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1023\/A:1025859021913","volume":"10","author":"H Xu","year":"2003","unstructured":"Xu, H., & Shatz, S.M. (2003). Adk: an agent development kit based on a formal design model formulti-agent systems. Automated Software Engineering, 10(4), 337\u2013365.","journal-title":"Automated Software Engineering"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12525-018-0307-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-018-0307-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-018-0307-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T09:04:03Z","timestamp":1567847043000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12525-018-0307-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,9]]},"references-count":42,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["307"],"URL":"https:\/\/doi.org\/10.1007\/s12525-018-0307-4","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"type":"print","value":"1019-6781"},{"type":"electronic","value":"1422-8890"}],"subject":[],"published":{"date-parts":[[2018,8,9]]},"assertion":[{"value":"1 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}