{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T02:57:58Z","timestamp":1774407478861,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T00:00:00Z","timestamp":1723420800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T00:00:00Z","timestamp":1723420800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100009473","name":"Universidad de M\u00e1laga","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100009473","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2025,10]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The classification of police reports according to the typification of the criminal act described in them is not an easy task. The reports are written in natural language and often present missing, imprecise, or even inconsistent information, or lack sufficient details to make a clear decision. Focusing on property crimes, the aim of this work is to assist judges in this classification process by automatically extracting information from police reports and producing a list of possible classifications of crimes accompanied by a degree of confidence in each of them. The work follows the design science research methodology, developing a tool as an artifact. The proposal uses information extraction techniques to obtain the data from the reports, guided by an ontology developed for the Spanish legal system on property crimes. Probabilistic inference mechanisms are used to select the set of articles of the law that could apply to a given case, even when the evidence does not allow an unambiguous identification. The proposal has been empirically validated in a real environment with judges and prosecutors. The results show that the proposal is feasible and usable, and could be effective in assisting judges to classify property crime reports.<\/jats:p>","DOI":"10.1007\/s12599-024-00886-3","type":"journal-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T10:03:36Z","timestamp":1723457016000},"page":"687-710","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Ontology-Driven Automated Reasoning About Property Crimes"],"prefix":"10.1007","volume":"67","author":[{"given":"Francisco","family":"Navarrete","sequence":"first","affiliation":[]},{"given":"\u00c1ngel L.","family":"Garrido","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Bobed","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Atencia","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Vallecillo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,12]]},"reference":[{"key":"886_CR1","doi-asserted-by":"crossref","unstructured":"Alroobaea R, Mayhew PJ (2014) How many participants are really enough for usability studies? In: Proceedings of SAI\u201914, IEEE, pp 48\u201356","DOI":"10.1109\/SAI.2014.6918171"},{"key":"886_CR2","unstructured":"Asaro C, Biasiotti MA, Guidotti P, Papini M, Sagri MT, Tiscornia D (2003) A domain ontology: Italian crime ontology. In: Proceedings of MWAIL@ICAIL 2003"},{"key":"886_CR3","volume-title":"The Description Logic Handbook: Theory, Implementation, and Applications","author":"F Baader","year":"2003","unstructured":"Baader F, Calvanese D, McGuinness D, Nardi D, Patel-Schneider PF (2003) The description logic handbook: theory, implementation, and applications. Cambridge University Press, Cambridge"},{"key":"886_CR4","doi-asserted-by":"crossref","unstructured":"Bak J, Jedrzejek C (2009) Application of an ontology-based model to a selected fraudulent disbursement economic crime. In: Proceedings of AICOL-I\/IVR-XXIV and AICOL-II\/JURIX, Springer, Heidelberg, LNCS, vol 6237, pp 113\u2013132","DOI":"10.1007\/978-3-642-16524-5_8"},{"key":"886_CR5","doi-asserted-by":"crossref","unstructured":"Bansal N, Sharma A, Singh R (2019) A review on the application of deep learning in legal domain. In: Proceedings of AIAI\u201919, Springer, pp 374\u2013381","DOI":"10.1007\/978-3-030-19823-7_31"},{"key":"886_CR6","doi-asserted-by":"crossref","unstructured":"Bezzazi EH (2007) Building an ontology that helps identify criminal law articles that apply to a cybercrime case. In: Proceedings of ICSOFT\u201907, INSTICC Press, pp 179\u2013185","DOI":"10.5220\/0001327801790185"},{"key":"886_CR7","doi-asserted-by":"crossref","unstructured":"Biagioli C, Francesconi E, Passerini A, Montemagni S, Soria C (2005) Automatic semantics extraction in law documents. In: Proceedings of ICAIL\u201905, pp 133\u2013140","DOI":"10.1145\/1165485.1165506"},{"key":"886_CR8","doi-asserted-by":"crossref","unstructured":"Bommarito M, Katz DM, Detterman E (2018) Lexnlp: natural language processing and information extraction for legal and regulatory texts. Research Handbook on Big Data Law","DOI":"10.2139\/ssrn.3192101"},{"issue":"4","key":"886_CR9","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s10506-006-0002-1","volume":"12","author":"J Breuker","year":"2004","unstructured":"Breuker J, Valente A, Winkels R (2004) Legal ontologies in knowledge engineering and information management. Artif Intell Law 12(4):241\u2013277","journal-title":"Artif Intell Law"},{"key":"886_CR10","doi-asserted-by":"crossref","unstructured":"Brighi R, Palmirani M (2009) Legal text analysis of the modification provisions: a pattern oriented approach. In: Proceedings of ICAIL\u201909, pp 238\u2013239","DOI":"10.1145\/1568234.1568272"},{"key":"886_CR11","doi-asserted-by":"crossref","unstructured":"Buey MG, Garrido \u00c1L, Bobed C, Ilarri S (2016) The AIS project: boosting information extraction from legal documents by using ontologies. In: Proceedings of ICAART\u201916, SciTePress, pp 438\u2013445","DOI":"10.5220\/0005757204380445"},{"key":"886_CR12","first-page":"333","volume":"40","author":"MG Buey","year":"2019","unstructured":"Buey MG, Rom\u00e1n C, Garrido \u00c1L, Bobed C, Mena E (2019) Automatic legal document analysis: improving the results of information extraction processes using an ontology. Intell Methods Big Data Indus Appl 40:333\u2013351","journal-title":"Intell Methods Big Data Indus Appl"},{"key":"886_CR13","unstructured":"Carnaz G, Nogueira VB, Antunes M (2019) Knowledge representation of crime-related events: a preliminary approach. In: Proceedings of SLATE\u201919, Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik"},{"key":"886_CR14","unstructured":"CGPJ (2023) Reports by territory on the activity of judicial bodies (in Spanish). https:\/\/bit.ly\/499nRFp, accessed 03 July 2024"},{"issue":"2","key":"886_CR15","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10506-018-9238-9","volume":"27","author":"I Chalkidis","year":"2019","unstructured":"Chalkidis I, Kampas D (2019) Deep learning in law: early adaptation and legal word embeddings trained on large corpora. Artif Intell Law 27(2):171\u2013198","journal-title":"Artif Intell Law"},{"key":"886_CR16","doi-asserted-by":"crossref","unstructured":"Chalkidis I, Androutsopoulos I, Aletras N (2019) Neural legal judgment prediction in English. In: Proceedings of ACL\u201919, pp 4317\u20134323","DOI":"10.18653\/v1\/P19-1424"},{"key":"886_CR17","doi-asserted-by":"crossref","unstructured":"Chalkidis I, Fergadiotis M, Malakasiotis P, Aletras N, Androutsopoulos I (2020) Legal-bert: the muppets straight out of law school. arXiv:2010.02559","DOI":"10.18653\/v1\/2020.findings-emnlp.261"},{"issue":"1","key":"886_CR18","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/5254.747902","volume":"14","author":"B Chandrasekaran","year":"1999","unstructured":"Chandrasekaran B, Josephson JR, Benjamins VR (1999) What are ontologies, and why do we need them? IEEE Intell Syst Appl 14(1):20\u201326","journal-title":"IEEE Intell Syst Appl"},{"issue":"1","key":"886_CR19","first-page":"17","volume":"43","author":"VK Chaudhri","year":"2022","unstructured":"Chaudhri VK, Baru CK, Chittar N, Dong XL, Genesereth MR, Hendler JA, Kalyanpur A, Lenat DB, Sequeda J, Vrandecic D, Wang K (2022) Knowledge graphs: introduction, history and perspectives. AI Mag 43(1):17\u201329","journal-title":"AI Mag"},{"key":"886_CR20","doi-asserted-by":"crossref","unstructured":"Corcho O, Fern\u00e1ndez-L\u00f3pez M, G\u00f3mez-P\u00e9rez A, L\u00f3pez-Cima A (2005) Building legal ontologies with methontology and webode. Law and the semantic web: legal ontologies, methodologies, legal information retrieval, and applications. Springer, Heidelberg, pp 142\u2013157","DOI":"10.1007\/978-3-540-32253-5_9"},{"key":"886_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07374-3","volume-title":"Design Science Research: A Method for Science and Technology Advancement","author":"A Dresch","year":"2015","unstructured":"Dresch A, Lacerda D, Valle Antunes Jr JA (2015) Design science research: a method for science and technology advancement. Springer, Heidelberg"},{"key":"886_CR22","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-L\u00f3pez M, Poveda-Villal\u00f3n M, Su\u00e1rez-Figueroa MC, G\u00f3mez-P\u00e9rez A (2019) Why are ontologies not reused across the same domain? J Web Semant 57","DOI":"10.1016\/j.websem.2018.12.010"},{"key":"886_CR23","doi-asserted-by":"crossref","unstructured":"Filtz E (2017) Building and processing a knowledge-graph for legal data. In: Proceedings of ESWC\u201917, LNCS, pp 184\u2013194","DOI":"10.1007\/978-3-319-58451-5_13"},{"issue":"5","key":"886_CR24","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1037\/h0031619","volume":"75","author":"JL Fleiss","year":"1971","unstructured":"Fleiss JL (1971) Measuring nominal scale agreement among many raters. Psychol Bullet 75(5):378\u2013382","journal-title":"Psychol Bullet"},{"key":"886_CR25","doi-asserted-by":"crossref","unstructured":"Garrido \u00c1L, Peir\u00f3 A, Rom\u00e1n C, Bobed C, Mena E (2021) ICIX: a semantic information extraction architecture. In: Proceedings of IDEAS\u201921, ACM, pp 75\u201383","DOI":"10.1145\/3472163.3472174"},{"issue":"3","key":"886_CR26","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s10506-014-9159-1","volume":"22","author":"AP Getman","year":"2014","unstructured":"Getman AP, Karasiuk VV (2014) A crowdsourcing approach to building a legal ontology from text. Artif Intell Law 22(3):313\u2013335","journal-title":"Artif Intell Law"},{"key":"886_CR27","doi-asserted-by":"crossref","unstructured":"Gordon TF (2008) Constructing legal arguments with rules in the legal knowledge interchange format (LKIF). Computable models of the law, languages, dialogues, games, ontologies, LNCS, vol 4884. Springer, Heidelberg, pp 162\u2013184","DOI":"10.1007\/978-3-540-85569-9_11"},{"issue":"10\u201315","key":"886_CR28","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1016\/j.artint.2007.04.010","volume":"171","author":"TF Gordon","year":"2007","unstructured":"Gordon TF, Prakken H, Walton Walton D (2007) The carneades model of argument and burden of proof. Artif Intell 171(10\u201315):875\u2013896","journal-title":"Artif Intell"},{"key":"886_CR29","unstructured":"Griffo C, Almeida JPA, Guizzardi G (2015) Towards a legal core ontology based on alexy\u2019s theory of fundamental rights. In: Proceedings of MWAIL@ICAIL 2015"},{"issue":"1","key":"886_CR30","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/AO-210256","volume":"17","author":"G Guizzardi","year":"2022","unstructured":"Guizzardi G, Benevides AB, Fonseca CM, Porello D, Almeida JPA, Sales TP (2022) UFO: Unified foundational ontology. Appl Ontol 17(1):167\u2013210","journal-title":"Appl Ontol"},{"issue":"3","key":"886_CR31","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/3418294","volume":"64","author":"C Guti\u00e9rrez","year":"2021","unstructured":"Guti\u00e9rrez C, Sequeda JF (2021) Knowledge graphs. Commun ACM 64(3):96\u2013104","journal-title":"Commun ACM"},{"issue":"6","key":"886_CR32","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1177\/0165551515610989","volume":"42","author":"F Gutierrez","year":"2016","unstructured":"Gutierrez F, Dou D, Fickas S, Wimalasuriya D, Zong H (2016) A hybrid ontology-based information extraction system. J Inf Sci 42(6):798\u2013820","journal-title":"J Inf Sci"},{"key":"886_CR33","doi-asserted-by":"publisher","unstructured":"Hoekstra R, Breuker J, Bello MD, Boer A (2009) LKIF core: principled ontology development for the legal domain. In: IOS Press, Frontiers in Artificial Intelligence and Applications, pp 21\u201352. https:\/\/doi.org\/10.3233\/978-1-58603-942-4-21","DOI":"10.3233\/978-1-58603-942-4-21"},{"key":"886_CR34","doi-asserted-by":"crossref","unstructured":"Hogan A, Blomqvist E, Cochez M, d\u2019Amato C, de\u00a0Melo G, Gutierrez C, Kirrane S, Gayo JEL, Navigli R, Neumaier S, Ngomo AN, Polleres A, Rashid SM, Rula A, Schmelzeisen L, Sequeda JF, Staab S, Zimmermann A (2022) Knowledge graphs. ACM Comput Surv 54 (4) :71:1\u201371:37","DOI":"10.1145\/3447772"},{"key":"886_CR35","unstructured":"Honnibal M, Montani I, Van\u00a0Landeghem S, Boyd A (2020) spaCy: Industrial-strength natural language processing in Python"},{"key":"886_CR36","unstructured":"Horrocks I, Patel-Schneider PF, Boley H, Tabet S, Grosof B, Dean M (2004) SWRL: a semantic web rule language. Combining OWL and RuleML. W3C member submission. http:\/\/www.w3.org\/submissions\/SWRL\/, accessed 03 July 2024"},{"key":"886_CR37","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10506-020-09271-3","volume":"29","author":"L Humphreys","year":"2021","unstructured":"Humphreys L, Boella G, van der Torre L, Robaldo L, Di Caro L, Ghanavati S, Muthuri R (2021) Populating legal ontologies using semantic role labeling. Artif Intell Law 29:171\u2013211","journal-title":"Artif Intell Law"},{"key":"886_CR38","unstructured":"ISO\/IEC 25010 (2011) Systems and software engineering\u2013systems and software quality requirements and evaluation (SQuaRE)\u2013system and software quality models. ISO\/IEC"},{"key":"886_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10632-8","volume-title":"An introduction to design science","author":"P Johannesson","year":"2014","unstructured":"Johannesson P, Perjons E (2014) An introduction to design science. Springer, Heidelberg"},{"key":"886_CR40","unstructured":"Liquid Legal Institute (2021) Legal Ontologies. https:\/\/github.com\/Liquid-Legal-Institute\/Legal-Ontologies, Accessed 03 July 2024"},{"key":"886_CR41","doi-asserted-by":"crossref","unstructured":"Love N, Genesereth MR (2005) Computational law. In: Proceedings of AIL\u201905, ACM, pp 205\u2013209","DOI":"10.1145\/1165485.1165517"},{"key":"886_CR42","unstructured":"de\u00a0Maat E, Winkels R (2010) Suggesting model fragments for sentences in dutch laws. In: Proceedings of LOAIT\u201910) pp 19\u201328"},{"key":"886_CR43","unstructured":"Mikolov T, Chen K, Corrado G, Dean J (2013) Efficient estimation of word representations in vector space. arXiv:1301.3781"},{"key":"886_CR44","doi-asserted-by":"crossref","unstructured":"Mok WY, Mok JR (2019) Legal machine-learning analysis: first steps towards ai assisted legal research. In: Proceedings of ICAIL\u201919, pp 266\u2013267","DOI":"10.1145\/3322640.3326737"},{"key":"886_CR45","doi-asserted-by":"crossref","unstructured":"Mokanov I, Shane D, Cerat B (2019) Facts2law: using deep learning to provide a legal qualification to a set of facts. In: Proceedings of the seventeenth international conference on artificial intelligence and law, pp 268\u2013269","DOI":"10.1145\/3322640.3326694"},{"key":"886_CR46","unstructured":"Nakashole N, Weikum G, Suchanek FM (2012) PATTY: a taxonomy of relational patterns with semantic types. In: Proceedings of EMNLP-CoNLL\u201912, ACL, pp 1135\u20131145"},{"key":"886_CR47","doi-asserted-by":"crossref","unstructured":"Navarrete F, Garrido \u00c1L, Bobed C, Atencia M, Vallecillo A (2023) Ontology-based automated reasoning about property crimes: companion website. https:\/\/github.com\/atenearesearchgroup\/property-crime-classification, Accessed 03 July 2024","DOI":"10.1007\/s12599-024-00886-3"},{"key":"886_CR48","unstructured":"Nguyen HT, Vuong HYT, Nguyen PM, Dang BT, Bui QM, Vu ST, Nguyen CM, Tran V, Satoh K, Nguyen ML (2020) Jnlp team: deep learning for legal processing in coliee 2020. arXiv:2011.08071"},{"key":"886_CR49","unstructured":"Nielsen J (2020) How many test users in a usability study? https:\/\/www.nngroup.com\/articles\/how-many-test-users\/, Accessed 03 July 2024"},{"key":"886_CR50","doi-asserted-by":"crossref","unstructured":"de\u00a0Oliveira\u00a0Rodrigues CM, de\u00a0Freitas FLG, de\u00a0Azevedo RR (2016) An ontology for property crime based on events from UFO-B foundational ontology. In: Proceedings of BRACIS\u2019, IEEE Computer Society, pp 331\u2013336","DOI":"10.1109\/BRACIS.2016.067"},{"key":"886_CR51","unstructured":"Opasjumruskit K, Peters D, Schindler S (2020) DSAT: ontology-based information extraction on technical data sheets. In: Proceedings of ISWC\u201920, CEUR-WS, pp 251\u2013256"},{"key":"886_CR52","doi-asserted-by":"crossref","unstructured":"Opasjumruskit K, B\u00f6ning S, Schindler S, Peters D (2022) OntoHuman: Ontology-based information extraction tools with human-in-the-loop interaction. In: Proceedings of CVDE\u201922, Springer, LNCS, pp 68\u201374","DOI":"10.1007\/978-3-031-16538-2_7"},{"key":"886_CR53","first-page":"91","volume":"313","author":"M Palmirani","year":"2018","unstructured":"Palmirani M, Martoni M, Rossi A, Cesare B, Livio R et al (2018) Legal ontology for modeling GDPR concepts and norms. Front Artif Intell Appl 313:91\u2013100","journal-title":"Front Artif Intell Appl"},{"key":"886_CR54","doi-asserted-by":"crossref","unstructured":"Park H, Cho S, Kwon H (2009) Cyber forensics ontology for cyber criminal investigation. In: Proceedings of e-Forensics\u201909, Springer, Heidelberg, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp 160\u2013165","DOI":"10.1007\/978-3-642-02312-5_18"},{"key":"886_CR55","unstructured":"Ralph P, Baltes S, Bianculli D, Dittrich Y, Felderer M, Feldt R, Filieri A, Furia CA, Graziotin D, He P, Hoda R, Juristo N, Kitchenham BA, Robbes R, M\u00e9ndez D, Molleri J, Spinellis D, Staron M, Stol K, Tamburri DA, Torchiano M, Treude C, Turhan B, Vegas S (2020) ACM SIGSOFT empirical standards. CoRR ArXiv: abs\/2010.03525"},{"key":"886_CR56","volume-title":"Graph databases: new opportunities for connected data","author":"I Robinson","year":"2015","unstructured":"Robinson I, Webber J, Eifrem E (2015) Graph databases: new opportunities for connected data, 2nd edn. O\u2019Reilly, Sebastopol","edition":"2"},{"key":"886_CR57","unstructured":"Rubin J, Chisnell D (2008) Handbook of usability testing. Second edition: how to plan, design, and conduct effective tests. Wiley, Hoboken"},{"issue":"101","key":"886_CR58","first-page":"967","volume":"106","author":"C Sansone","year":"2022","unstructured":"Sansone C, Sperl\u00ed G (2022) Legal information retrieval systems: state-of-the-art and open issues. Inf Syst 106(101):967","journal-title":"Inf Syst"},{"issue":"2","key":"886_CR59","first-page":"1","volume":"15","author":"N Sivaranjani","year":"2022","unstructured":"Sivaranjani N, Jayabharathy J (2022) Neural network towards uncertain legal case retrieval. J Uncertain Syst 15(2):1\u201314 (2241,001)","journal-title":"J Uncertain Syst"},{"key":"886_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-020-09933-5","volume":"26","author":"A Sleimi","year":"2021","unstructured":"Sleimi A, Sannier N, Sabetzadeh M, Briand L, Ceci M, Dann J (2021) An automated framework for the extraction of semantic legal metadata from legal texts. Empir Softw Eng 26:1\u201350","journal-title":"Empir Softw Eng"},{"key":"886_CR61","doi-asserted-by":"crossref","unstructured":"Soh C, Lim S, Hong K, Rhim Y (2017) Ontology modeling for criminal law. In: Proceedings of AICOL workshops 2015\u20132017, Springer, Heidelberg, LNCS, pp 365\u2013379","DOI":"10.1007\/978-3-030-00178-0_25"},{"key":"886_CR62","doi-asserted-by":"crossref","unstructured":"Sovrano F, Palmirani M, Vitali F (2020) Legal knowledge extraction for knowledge graph based question-answering. In: Proceedings of JURIX\u201920, IOS Press, Frontiers in Artificial Intelligence and Applications 334:143\u2013153","DOI":"10.3233\/FAIA200858"},{"issue":"1\u20132","key":"886_CR63","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/S0169-023X(97)00056-6","volume":"25","author":"R Studer","year":"1998","unstructured":"Studer R, Benjamins VR, Fensel D (1998) Knowledge engineering: principles and methods. Data Knowl Eng 25(1\u20132):161\u2013197","journal-title":"Data Knowl Eng"},{"key":"886_CR64","unstructured":"Su\u00e1rez-Figueroa MC (2012) Neon methodology for building ontology networks: specification, scheduling and reuse. PhD thesis, Technical University of Madrid, Spain, https:\/\/d-nb.info\/1029370028, Accessed 03 July 2024"},{"key":"886_CR65","volume-title":"Natural language processing with transformers","author":"L Tunstall","year":"2022","unstructured":"Tunstall L, Von Werra L, Wolf T (2022) Natural language processing with transformers. O\u2019Reilly, Sebastopol"},{"key":"886_CR66","unstructured":"Turner CW, Lewis JR, Nielsen J (2006) Determining usability test sample size, vol 3, 2nd edn. CRC, Boca Raton, pp 3084\u20133088"},{"key":"886_CR67","unstructured":"van\u00a0de Ven S, Hoekstra R, Breuker J, Wortel L, Ali AE (2008) Judging amy: automated legal assessment using OWL 2. In: Proceedings of the OWLED workshop@ISWC\u201908), CEUR-WS.org, CEUR Workshop Proceedings, vol 432, http:\/\/ceur-ws.org\/Vol-432\/owled2008eu_submission_28.pdf, accessed 03 July 2024"},{"issue":"3","key":"886_CR68","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s10506-022-09319-6","volume":"31","author":"YTH Vuong","year":"2023","unstructured":"Vuong YTH, Bui QM, Nguyen HT, Nguyen TTT, Tran V, Phan XH, Satoh K, Nguyen LM (2023) SM-BERT-CR: a deep learning approach for case law retrieval with supporting model. Artif Intell and Law 31(3):601\u2013628","journal-title":"Artif Intell and Law"},{"key":"886_CR69","unstructured":"W3C OWL Working Group (2012) OWL 2 Web Ontology Language Document Overview (2nd Edition). http:\/\/www.w3.org\/TR\/owl2-overview\/, Accessed 03 July 2024"},{"key":"886_CR70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8","volume-title":"Design Science Methodology for Information Systems and Software Engineering","author":"RJ Wieringa","year":"2014","unstructured":"Wieringa RJ (2014) Design science methodology for information systems and software engineering. Springer, Heidelberg"},{"issue":"3","key":"886_CR71","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1177\/0165551509360123","volume":"36","author":"DC Wimalasuriya","year":"2010","unstructured":"Wimalasuriya DC, Dou D (2010) Ontology-based information extraction: an introduction and a survey of current approaches. J Inf Sci 36(3):306\u2013323","journal-title":"J Inf Sci"},{"key":"886_CR72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in software engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson MC, Regnell B, Wessl\u00e9n A (2012) Experimentation in software engineering. Springer, Heidelberg"},{"issue":"2","key":"886_CR73","doi-asserted-by":"publisher","first-page":"33:1","DOI":"10.1145\/3469887","volume":"40","author":"J Yang","year":"2022","unstructured":"Yang J, Ma W, Zhang M, Zhou X, Liu Y, Ma S (2022) LegalGNN: legal information enhanced graph neural network for recommendation. ACM Trans Inf Syst 40(2):33:1-33:29","journal-title":"ACM Trans Inf Syst"},{"key":"886_CR74","doi-asserted-by":"crossref","unstructured":"Zhong H, Xiao C, Tu C, Zhang T, Liu Z, Sun M (2020) How does nlp benefit legal system: a summary of legal artificial intelligence. arXiv:2004.12158","DOI":"10.18653\/v1\/2020.acl-main.466"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-024-00886-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-024-00886-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-024-00886-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:26:55Z","timestamp":1760596015000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-024-00886-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,12]]},"references-count":74,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["886"],"URL":"https:\/\/doi.org\/10.1007\/s12599-024-00886-3","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,12]]},"assertion":[{"value":"4 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}