{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T20:05:24Z","timestamp":1770235524357,"version":"3.49.0"},"reference-count":50,"publisher":"Oxford University Press (OUP)","issue":"6","license":[{"start":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T00:00:00Z","timestamp":1522022400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"funder":[{"DOI":"10.13039\/501100005642","name":"University of Sassari","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005642","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001665","name":"ANR-Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-17-CE38-0003-01"],"award-info":[{"award-number":["ANR-17-CE38-0003-01"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9,5]]},"DOI":"10.1093\/logcom\/exy012","type":"journal-article","created":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T20:11:16Z","timestamp":1520280676000},"page":"1293-1322","source":"Crossref","is-referenced-by-count":7,"title":["The logic of identity and copy for computational artefacts"],"prefix":"10.1093","volume":"28","author":[{"given":"Nicola","family":"Angius","sequence":"first","affiliation":[{"name":"Department of History, Human Sciences, and Education, University of Sassari, Italy"}]},{"given":"Giuseppe","family":"Primiero","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Middlesex University, London, UK"}]}],"member":"286","published-online":{"date-parts":[[2018,3,26]]},"reference":[{"key":"key\n\t\t\t\t20180903132123_C1","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/0304-3975(91)90224-P","article-title":"The existence of refinement mappings","volume":"82","author":"Abadi","year":"1991","journal-title":"Theoretical Computer Science"},{"key":"key\n\t\t\t\t20180903132123_C2","volume-title":"Principles of Model Checking","author":"Baier","year":"2008"},{"key":"key\n\t\t\t\t20180903132123_C3","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1080\/05568648809506300","article-title":"Many-one identity","volume":"17","author":"Baxter","year":"1988","journal-title":"Philosophical Papers"},{"key":"key\n\t\t\t\t20180903132123_C4","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/978-3-319-00801-1_6","article-title":"Artifact kinds, identity criteria, and logical adequacy","volume-title":"Artefact Kinds: Ontology and The Human-made World","author":"Carrara","year":"2014"},{"key":"key\n\t\t\t\t20180903132123_C5","first-page":"234","article-title":"Identity criteria and sortal concepts","author":"Carrara","year":"2001","journal-title":"Proceedings of the International Conference on Formal Ontology in Information Systems-Volume 2001"},{"key":"key\n\t\t\t\t20180903132123_C6","doi-asserted-by":"crossref","first-page":"414","DOI":"10.5840\/monist201093324","article-title":"Copies, replicas, and counterfeits of artworks and artefacts","volume":"93","author":"Carrara","year":"2010","journal-title":"The Monist"},{"key":"key\n\t\t\t\t20180903132123_C7","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/S0065-2458(08)60176-X","article-title":"Functional representation and causal processes","volume":"38","author":"Chandrasekaran","year":"1994","journal-title":"Advances in Computers"},{"key":"key\n\t\t\t\t20180903132123_C8","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/s003660070003","article-title":"Function in device representation","volume":"16","author":"Chandrasekaran","year":"2000","journal-title":"Engineering with Computers (London)"},{"key":"key\n\t\t\t\t20180903132123_C9","volume-title":"Model Checking.","author":"Clarke Jr","year":"1999"},{"key":"key\n\t\t\t\t20180903132123_C10","first-page":"216","article-title":"The individuation of events. In Essays in Honor of Carl G. Hempel","author":"Davidson","year":"1969"},{"key":"key\n\t\t\t\t20180903132123_C11","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s11023-008-9113-7","article-title":"The method of levels of abstraction","volume":"18","author":"Floridi","year":"2008","journal-title":"Minds and Machines"},{"key":"key\n\t\t\t\t20180903132123_C12","doi-asserted-by":"crossref","first-page":"1199","DOI":"10.1007\/s11229-014-0610-3","article-title":"On malfunctioning software","volume":"192","author":"Floridi","year":"2015","journal-title":"Synthese"},{"key":"key\n\t\t\t\t20180903132123_C13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04293-9","volume-title":"Introduction to Process Algebra","author":"Fokkink","year":"2000"},{"key":"key\n\t\t\t\t20180903132123_C14","article-title":"Philosophy of Technology","volume-title":"The Stanford Encyclopedia of Philosophy,","author":"Franssen","year":"2015"},{"key":"key\n\t\t\t\t20180903132123_C15","article-title":"On concept and object","author":"Frege","year":"1997","journal-title":"The Frege Reader"},{"key":"key\n\t\t\t\t20180903132123_C16","volume-title":"The Foundations of Arithmetic a Logico-Mathematical Enquiry into The Concept of Number","author":"Frege","year":"1953"},{"key":"key\n\t\t\t\t20180903132123_C17","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s13347-013-0112-0","article-title":"Miscomputation","volume":"26","author":"Fresco","year":"2013","journal-title":"Philosophy & Technology"},{"key":"key\n\t\t\t\t20180903132123_C18","volume-title":"Languages of Art: An Approach to a Theory of Symbols","author":"Goodman","year":"1968"},{"key":"key\n\t\t\t\t20180903132123_C19","volume-title":"Problems and Projects","author":"Goodman","year":"1972"},{"key":"key\n\t\t\t\t20180903132123_C20","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s00165-006-0014-3","article-title":"Minimal refinements of specifications in model and termporal logics","volume":"19","author":"Gorogiannis","year":"2007","journal-title":"Formal Aspects of Computing"},{"key":"key\n\t\t\t\t20180903132123_C21","doi-asserted-by":"crossref","DOI":"10.5040\/9781474254540","volume-title":"The Aesthetics and Ethics of Copying","author":"Hick","year":"2016"},{"key":"key\n\t\t\t\t20180903132123_C22","volume-title":"Computer Ethics","author":"Johnson","year":"2008"},{"key":"key\n\t\t\t\t20180903132123_C23","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1093\/cje\/bep019","article-title":"Engineering and the dual nature of technical artefacts","volume":"34","author":"Kroes","year":"2009","journal-title":"Cambridge Journal of Economics"},{"key":"key\n\t\t\t\t20180903132123_C24","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-007-3940-6","volume-title":"Technical Artefacts: Creations of Mind and Matter: A Philosophy of Engineering Design,","author":"Kroes","year":"2012"},{"key":"key\n\t\t\t\t20180903132123_C25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.shpsa.2005.12.001","article-title":"The dual nature of technical artefacts","volume":"37","author":"Kroes","year":"2006","journal-title":"Studies in History and Philosophy of Science"},{"key":"key\n\t\t\t\t20180903132123_C26","volume-title":"Temporal Logic and State Systems","author":"Kr\u00f6ger","year":"2008"},{"key":"key\n\t\t\t\t20180903132123_C27","volume-title":"On the Plurality of Worlds","author":"Lewis","year":"1986"},{"key":"key\n\t\t\t\t20180903132123_C28","volume-title":"Parts of Classes","author":"Lewis","year":"1991"},{"key":"key\n\t\t\t\t20180903132123_C29","volume-title":"Events: A Metaphysical Study","author":"Lombard","year":"1986"},{"key":"key\n\t\t\t\t20180903132123_C30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/2220347","article-title":"What is a criterion of identity?","volume":"39","author":"Lowe","year":"1989","journal-title":"The Philosophical Quarterly (1950-)"},{"key":"key\n\t\t\t\t20180903132123_C31","first-page":"990","article-title":"Objects and criteria of identity","volume-title":"A Companion to the Philosophy of Language","author":"Lowe","year":"1997"},{"key":"key\n\t\t\t\t20180903132123_C32","volume-title":"The Possibility of Metaphysics: Substance, Identity, and Time","author":"Lowe","year":"1998"},{"key":"key\n\t\t\t\t20180903132123_C33","unstructured":"A. A. Meijers . The relational ontology of technical artifacts. In The Empirical Turn in the Philosophy of Technology, P. Kroes and A. Meijers, eds.Elsevier, Amsterdam, 2000."},{"key":"key\n\t\t\t\t20180903132123_C34","article-title":"A short introduction to process theory","author":"Middelburg","year":"2016"},{"key":"key\n\t\t\t\t20180903132123_C35","first-page":"481","article-title":"An algebraic definition of simulation between programs","volume-title":"Proceedings of the 2nd International Joint Conference on Artificial Intelligence, IJCAI \u201971, San Francisco, CA, USA,","author":"Milner","year":"1971"},{"key":"key\n\t\t\t\t20180903132123_C36","volume-title":"Identity","author":"Noonan","year":"2017"},{"key":"key\n\t\t\t\t20180903132123_C37","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511803161","volume-title":"Causality: Models, Reasoning and Inference","author":"Pearl","year":"2009"},{"key":"key\n\t\t\t\t20180903132123_C38","first-page":"90","article-title":"Information in the philosophy of computer science","author":"Primiero","year":"2016"},{"key":"key\n\t\t\t\t20180903132123_C39","first-page":"988","article-title":"Software theory change for resilient near-complete specifications","author":"Primiero","year":"2015"},{"key":"key\n\t\t\t\t20180903132123_C40","first-page":"21","article-title":"On what there is","volume":"2","author":"Quine","year":"1948","journal-title":"The Review of Metaphysics"},{"key":"key\n\t\t\t\t20180903132123_C41","volume-title":"Pursuit of Truth","author":"Quine","year":"1990"},{"key":"key\n\t\t\t\t20180903132123_C42","volume-title":"Philosophy of Computer Science","author":"Rapaport","year":"2017"},{"key":"key\n\t\t\t\t20180903132123_C43","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1115\/1.1289637","article-title":"Development of a functional basis for design","volume":"122","author":"Stone","year":"1999","journal-title":"ASME Journal of Mechanical Design"},{"key":"key\n\t\t\t\t20180903132123_C44","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/s13347-012-0098-z","article-title":"Programming languages as technical artifacts","volume":"27","author":"Turner","year":"2014","journal-title":"Philosophy & Technology"},{"key":"key\n\t\t\t\t20180903132123_C45","article-title":"The philosophy of computer science","volume-title":"The Stanford Encyclopedia of Philosophy,","author":"Turner","year":"2017"},{"key":"key\n\t\t\t\t20180903132123_C46","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1305\/ndjfl\/1093634732","article-title":"Significant parts and identity of artifacts","volume":"34","author":"Tzouvaras","year":"1993","journal-title":"Notre Dame Journal of Formal Logic"},{"key":"key\n\t\t\t\t20180903132123_C47","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1093\/bjps\/54.2.261","article-title":"Ascribing functions to technical artefacts: a challenge to etiological accounts of functions","volume":"54","author":"Vermaas","year":"2003","journal-title":"The British Journal for the Philosophy of Science"},{"key":"key\n\t\t\t\t20180903132123_C48","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511612756","volume-title":"Sameness and Substance Renewed","author":"Wiggins","year":"2001"},{"key":"key\n\t\t\t\t20180903132123_C49","volume-title":"Identity and Discrimination","author":"Williamson","year":"1990"},{"key":"key\n\t\t\t\t20180903132123_C50","volume-title":"Frege\u2019s Conception of Numbers as Objects","author":"Wright","year":"1983"}],"container-title":["Journal of Logic and Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/logcom\/article-pdf\/28\/6\/1293\/25677660\/exy012.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T07:46:16Z","timestamp":1660549576000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/logcom\/article\/28\/6\/1293\/4954042"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,26]]},"references-count":50,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2018,3,26]]},"published-print":{"date-parts":[[2018,9,5]]}},"URL":"https:\/\/doi.org\/10.1093\/logcom\/exy012","relation":{},"ISSN":["0955-792X","1465-363X"],"issn-type":[{"value":"0955-792X","type":"print"},{"value":"1465-363X","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,9]]},"published":{"date-parts":[[2018,3,26]]}}}