{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T18:10:33Z","timestamp":1685988633489},"reference-count":34,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Applied Non-Classical Logics"],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.3166\/jancl.20.457-477","type":"journal-article","created":{"date-parts":[[2011,3,10]],"date-time":"2011-03-10T08:49:26Z","timestamp":1299746966000},"page":"457-477","source":"Crossref","is-referenced-by-count":1,"title":["Violation games: a new foundation for deontic logic \u2605"],"prefix":"10.1080","volume":"20","author":[{"given":"Leendert","family":"van der Torre","sequence":"first","affiliation":[{"name":"a Computer Science and Communication , University of Luxembourg , Luxembourg"}]}],"member":"301","published-online":{"date-parts":[[2012,4,13]]},"reference":[{"key":"CIT0001","volume-title":"On the logic of normative systems","author":"\u00c5gotnes T.","year":"2007"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.2307\/2274239"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1093\/mind\/LXVII.265.100"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2004.10087"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.871793"},{"key":"CIT0006","volume-title":"A game-theoretic approach to normative multiagent systems","author":"Boella G.","year":"2007"},{"key":"CIT0007","volume-title":"Normative Multi-agent Systems, 18.03. - 23.03.2007, volume 07122 of Dagstuhl Seminar Proceedings","author":"Boella G."},{"key":"CIT0008","first-page":"594","volume-title":"A A A I 90: Proceedings of the Eighth National Conference on Artificial Intelligence","author":"Boutilier C."},{"issue":"3","key":"CIT0009","first-page":"428","volume":"2","author":"Broersen J.","year":"2002","journal-title":"Cognitive Science Quarterly"},{"key":"CIT0010","first-page":"211","volume-title":"Automated Analysis of Legal Texts","author":"Bulygin E.","year":"1986"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.2307\/2214075"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.2307\/3327064"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(88)90079-3"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70525-3_13"},{"issue":"2","key":"CIT0015","first-page":"205","volume":"48","author":"Hansen J.","year":"2001","journal-title":"Fundam. Inform."},{"key":"CIT0016","doi-asserted-by":"crossref","unstructured":"Hansson , B. 1969.An analysis of some deontic logics121\u2013147. N\u00f4us, 3, 373\u2013398. Reprinted in (Hilpinen, 1971)","DOI":"10.2307\/2214372"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-3146-2"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1007\/BF01417957"},{"key":"CIT0019","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/BF00666538","volume":"7","author":"J\u00f8rgensen J.","year":"1938","journal-title":"Erkenntnis"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(91)90069-V"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-9860-5_11"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1023\/B:ARTI.0000046005.10529.47"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/BF01057652"},{"key":"CIT0024","first-page":"29","volume-title":"Norms, Logics and Information Systems. New Studies on Deontic Logic and Computer Science","author":"Makinson D.","year":"1999"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1023\/A:1004748624537"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017599526096"},{"key":"CIT0027","volume-title":"Deontic Logic in Computer Science: Normative System Specification","author":"Meyer J.","year":"1993"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1305\/ndjfl\/1093637776"},{"key":"CIT0029","volume-title":"Nonmonotonic reasoning and conditionals","author":"Nute D.","year":"1984"},{"key":"CIT0030","volume-title":"Reasoning About Obligations: Defeasibility in Preference-Based Deontic Logics","author":"van der Torre L. W.","year":"1997"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008359312576"},{"key":"CIT0032","first-page":"15","volume-title":"Norms, Logics and Information Systems. New Studies on Deontic Logic and Computer Science","author":"von Wright G.","year":"1999"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1093\/mind\/LX.237.1"},{"key":"CIT0034","volume-title":"Norm and Action","author":"von Wright G. H.","year":"1963"}],"container-title":["Journal of Applied Non-Classical Logics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.3166\/jancl.20.457-477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T17:47:45Z","timestamp":1685987265000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.3166\/jancl.20.457-477"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1]]},"references-count":34,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2012,4,13]]},"published-print":{"date-parts":[[2010,1]]}},"alternative-id":["10.3166\/jancl.20.457-477"],"URL":"https:\/\/doi.org\/10.3166\/jancl.20.457-477","relation":{},"ISSN":["1166-3081","1958-5780"],"issn-type":[{"value":"1166-3081","type":"print"},{"value":"1958-5780","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1]]}}}