<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Evaluation of Semantic Web Ontologies for Privacy Modelling in Smart Home Environments</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Suzana Iacob</string-name>
          <email>suzana.iacob.12@ucl.ac.uk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonis Bikakis</string-name>
          <email>a.bikakis@ucl.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Information Studies, University College London</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>School of Management, University College London</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>The proliferation of smart devices gives rise to a new world of Ambient Intelligence, a world of technologies embedded in the surrounding environments, such as the home environment. As the success of such systems often depends on the collection on personal data, privacy concerns threaten to hinder this new world from reaching its full potential. At the same time, accurately modelling the different types of contextual information proves to be of paramount importance in paving the way towards the maturity of Ambient Intelligence systems, with Semantic Web ontologies becoming a popular solution. This paper aims to explore the application of Semantic Web ontologies in modelling privacy-related information in the context of smart home environments. To this purpose, we have conducted a practical evaluation of three ontologies, in an attempt to determine their suitability within the stated domain. The paper concludes that the representation of privacy features within smart home environments is attainable through the use of ontologies; however, current models do not achieve sufficient coverage of the domain. Lastly, the paper provides insights into practical ways of enhancing future ontologies in order to reach the required capabilities.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Recent technological advances have enabled various devices with different capabilities
to become embedded in our surrounding environments [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The ability of computer
systems to seamlessly integrate into the lives of everyday users has been referred to by
the term Ambient Intelligence (AmI) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>Given the sheer variety of connected devices that constitute an AmI system, privacy
has become of paramount importance. This paper will explore the topic of privacy in
smart home environments, from an information management perspective. In the context
of this paper, information management broadly refers to the control, processing and
exchange of information within a system.</p>
      <p>
        A promising approach to information management for representing AmI domains is
the use of Semantic Web ontologies [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. These are tools that offer a shared
understanding of a domain, enabling users to semantically represent relevant concepts
from the domain.
      </p>
      <p>The main objective of this study is to evaluate relevant Semantic Web ontologies in
order to determine their degree of suitability for modelling privacy-related information
in smart home environments. In order to meet the stated objective, the following
research questions will be used to guide this study:</p>
    </sec>
    <sec id="sec-2">
      <title>Q1.  To what extent can current Semantic Web ontologies be used to model privacy aspects in smart home environments?</title>
      <p>To address this question we have performed a task-based evaluation of three selected
ontologies. The performance of the ontologies is assessed based on their ability to
model real-life scenarios. The results of the evaluation are derived in two steps; first by
determining the number of privacy features modelled; thereafter by validating against
pre-determined evaluation criteria.</p>
    </sec>
    <sec id="sec-3">
      <title>Q2.  Are current approaches satisfactory? If not, what are their limitations and opportunities for future enhancements?</title>
      <p>To answer this question, we identify the gaps and limitations of current solutions and
point towards the requirements that future ontologies should meet and how current
models can be extended to achieve these capabilities.</p>
      <p>The rest of the paper is structured as follows: We first review the relevant literature
to identify the main privacy challenges and privacy protection techniques in the context
of smart home environments. The purpose of this exercise is to establish the key aspects
of information that should be semantically represented in a system for smart home
environments. In Section 3, we review current Semantic Web ontologies for Ambient
Intelligence. In Section 4, we present the setup and the results of a task-based evaluation
of such ontologies. Finally, in section 5, we discuss the main findings of the evaluation,
identifying the main gaps and limitations of current approaches, and proposing
guidelines and directions for addressing such limitations.
2.</p>
      <sec id="sec-3-1">
        <title>Privacy in Smart Home Environments</title>
        <p>
          Ambient Intelligence (AmI) refers to systems that are adaptive, sensitive, and
responsive to the presence of people [
          <xref ref-type="bibr" rid="ref4 ref5">4,5</xref>
          ]. Internet of Things is a new type of network
through which everyday objects can communicate and exchange information. It can be
viewed as an enabling technology for Ambient Intelligence. Within the AmI domain, a
smart home is a residence containing “ambient intelligence and automatic control,
which allow it to respond to the behaviour of residents and provide them with various
facilities” [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Privacy, on the other hand, can be defined as the right of an individual
to “control the ways in which personal information is obtained, processed, distributed,
shared, and used by any other entity” [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. The notion of privacy can be divided into
hard and soft privacy. Hard privacy refers to practices which limit the amount of data
shared, whereas soft privacy recognises the need to share data with other entities and
instead employs techniques which control the conditions under which the data is being
used [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. Privacy concerns in AmI arose as early as the first AmI applications.
Numerous studies in the literature mention various privacy challenges encountered in
a smart home environment. By undertaking an analysis of the relevant literature, we
summarize the primary privacy challenges in Table 1.
        </p>
        <sec id="sec-3-1-1">
          <title>Revealing information that can be used to uniquely identify a person; failing to ensure anonymity [9,10]</title>
        </sec>
        <sec id="sec-3-1-2">
          <title>Revealing data of sensitive nature such as biometric, health-related or financial data [4]</title>
        </sec>
        <sec id="sec-3-1-3">
          <title>Collecting data of a personal nature, in different ways and over a period of time [4,11]</title>
        </sec>
        <sec id="sec-3-1-4">
          <title>Storing and querying data from a central location [4]</title>
        </sec>
        <sec id="sec-3-1-5">
          <title>Detecting and tracking human activity, typically using sensor technology [6]</title>
        </sec>
        <sec id="sec-3-1-6">
          <title>Constructing individual profiles based on data collected over time [2,4]</title>
        </sec>
        <sec id="sec-3-1-7">
          <title>System performing actions to meet users’ individual requirements [4]</title>
        </sec>
        <sec id="sec-3-1-8">
          <title>Revealing data about an individual’s geographic location [10]</title>
        </sec>
        <sec id="sec-3-1-9">
          <title>Observing a person’s activities over a period of time [2,6]</title>
        </sec>
        <sec id="sec-3-1-10">
          <title>System performing automated actions without the explicit consent of users [10]</title>
        </sec>
        <sec id="sec-3-1-11">
          <title>Adapting to users’ needs, typically by learning and improving over time [5,12]</title>
        </sec>
        <sec id="sec-3-1-12">
          <title>Predicting the needs of users and acting accordingly [12]</title>
        </sec>
        <sec id="sec-3-1-13">
          <title>Conflicts of interest arising between the privacy needs of distinct users [9]</title>
        </sec>
        <sec id="sec-3-1-14">
          <title>Matching personal data from different sources in order to</title>
          <p>
            uniquely identify a person [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]
Multiple privacy protection techniques have been proposed in order to tackle the
aforementioned challenges, as summarised in table 2. The majority of these are soft
privacy measures such as purpose control and policies, while adequate security is a hard
privacy measure.
          </p>
        </sec>
        <sec id="sec-3-1-15">
          <title>Specifying rules regarding data collection and sharing [3]</title>
          <p>Definition</p>
        </sec>
        <sec id="sec-3-1-16">
          <title>Verifying the identity of a user or system [9,11]</title>
        </sec>
        <sec id="sec-3-1-17">
          <title>Controlling who has access to what resources [10,11]</title>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Adequate security</title>
      <sec id="sec-4-1">
        <title>Preventing the potential misuse of information [2,13]</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Purpose control</title>
      <sec id="sec-5-1">
        <title>Ensuring that data is only used for its intended purpose [2,10]</title>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Anonymizing</title>
    </sec>
    <sec id="sec-7">
      <title>Personal Data</title>
      <sec id="sec-7-1">
        <title>Ensuring that data is not intelligible to other users other than the intended recipients [10,13]</title>
        <sec id="sec-7-1-1">
          <title>3 Semantic Web Ontologies for AmI</title>
          <p>
            Semantic Web ontologies meet the representation requirements of AmI set by many
studies in terms of type and level of formality, knowledge sharing, expressiveness,
flexibility and extensibility, generality, granularity, reasoning support and valid context
constraining [
            <xref ref-type="bibr" rid="ref14 ref15 ref16">14-16</xref>
            ]. Context in this domain can be defined as “any information that
can be used to characterize the situation of entities [...] relevant to the interaction
between a user and an application” [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ].
          </p>
          <p>
            Several ontologies have been specifically developed for AmI systems [
            <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21 ref22 ref23">18-23</xref>
            ]. After
examining the range of available options, we decided to focus on SOUPA, COSE, and
PROACT, as they originate from different domains, they therefore implement different
modelling approaches and focus on different aspects of AmI systems, and they were all
freely available to download.
          </p>
          <p>
            SOUPA (Standard Ontology for Ubiquitous and Pervasive Applications) is a widely
cited ontology, created specifically for AmI environments [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ]. It is modular, and
models the primary AmI features including intelligent agents, space, time, events and
policies.
          </p>
          <p>
            COSE (Casas Ontology for Smart Environments) is a relatively recent ontology,
which achieves an in-depth representation of context features in smart environments,
being highly domain-specific [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ]. The main concepts represented in COSE are sensor,
building, occupant and human activity.
          </p>
          <p>
            PROACT (PRivacy Ontology for ACTivity spheres) has been specifically designed
to reconcile privacy and AmI environments, being built upon concepts from general
ontologies from the two fields, including SOUPA and Rei [
            <xref ref-type="bibr" rid="ref23">23</xref>
            ]. The key privacy
features modelled are resource, policy, policy mechanism, user and data processing.
          </p>
        </sec>
        <sec id="sec-7-1-2">
          <title>4. Evaluation of SW Ontologies for Privacy Modelling in AmI</title>
          <p>
            The purpose of the evaluation is to draw conclusions regarding the suitability of the
ontologies for modelling privacy in smart home environments The evaluation was
conducted in three steps: We first analysed real-life scenarios, based on the privacy
themes previously revealed by the literature review. We then attempted to model the
scenarios using the selected ontologies. And finally, we assessed the capabilities of the
ontologies to model the scenarios using appropriate evaluation criteria.
4.1 Scenario Analysis
Scenarios were created since the very first publications on AmI, starting with Weiser’s
portrayal of “Sal’s World” [
            <xref ref-type="bibr" rid="ref24">24</xref>
            ]. The narrative depicts Sal and her daily activities, while
devices anticipate her needs. Subsequently, other researchers developed scenarios to
represent their vision of the future. Some researchers believed that AmI was portrayed
as too “sunny”, and developed a set of “dark scenarios” intended to raise awareness of
the potentially harmful consequences, especially privacy threats [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ]. The scenario “A
Typical Family in Different Environments – Scene 1 (at home and at work)” shows a
family, the Sebastianis, as they encounter challenges in their AmI home. Contemporary
scenarios include modern elements in their view of AmI, such as social media and
gamification. Denti [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ] describes the “Butlers” as intelligent agents who aid the users
while also having the ability to “entertain and make things nice”. His scenario “Paolo
&amp; Archie” is an example of such functionalities.
          </p>
          <p>
            Following the analysis of multiple scenarios, three were selected, as they contained
most privacy elements: “Sal’s World” [
            <xref ref-type="bibr" rid="ref24">24</xref>
            ], “Paolo &amp; Archie” [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ] and “A Typical
Family in Different Environments – Scene 1” [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ]; these will be referred to as Scenario
A, B, and C, respectively, for convenience. The aim of scenario analysis was to explore
the scenario text and identify the presence of privacy-related topics, along with the
context in which they are found. By undertaking the literature review a set of
privacyrelated topics were revealed which were then mapped to the real-life scenarios. An
example of the mapping is depicted in Table 3.
4.2 Evaluation of Privacy Elements
The next step was to attempt to model the features revealed in the analysis of the
scenarios using the three ontologies. The experiment was carried out using Protégé, a
widespread ontology development tool. Specifically, we created appropriate
individuals and statements using the properties provided by the ontologies; an example
statement from Scenario C is “Paul owns PaulComputer”.
          </p>
          <p>Through this exercise, the ontologies were examined from three different angles:
1.   The extent to which they are capable of modelling the privacy features
2.   Their ability to accurately portray a smart home environment
3.   Their performance against the pre-determined evaluation criteria</p>
          <p>In general, only small changes were made to the ontologies, such as adding
appropriate subclasses to existing classes. If the required classes or properties did not
exist, we concluded that the ontology failed to model that respective element. A sample
of the findings along with the scenario mapping is presented in Table 3.</p>
          <p>Some important findings of this experiment regarding the capabilities of the
ontologies to model privacy-related concepts are the following:</p>
          <p>
            SOUPA supports the representation of user privacy, being influenced by the Rei
policy language [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ], as can be noted from the class Policy. Privacy is protected by
reasoning about the credibility of statements (e.g. FalseStatement, reliabilityRating)
and about conflicting information (e.g. conflicts). SOUPA can model Authorisation
through the use of PermittedAction and ForbiddenAction. However, we noticed that
SOUPA cannot model authentication or the sensitive nature of data. In Scenario C,
Paul’s credit card information is sensitive, yet SOUPA has no means of expressing it.
          </p>
          <p>
            COSE does not capture any privacy protection mechanisms, since no classes,
properties or individuals are explicitly related to privacy. Wemlinger and Holder [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ]
do not mention whether privacy was considered as part of the development or whether
it was planned as a future enhancement of the ontology. In the practical implementation
of COSE, the only way to model privacy policies is through the Plan class, although
this is arguably not the intended meaning of the class.
          </p>
          <p>
            Privacy concerns are at the core of the PROACT ontology, as it was developed
specifically to address this gap in modelling AmI systems [
            <xref ref-type="bibr" rid="ref23">23</xref>
            ]. PROACT has a Policy
class, which can be used to specify user preferences and requirements.
PolicyMechanism is the class used to propagate privacy protection throughout the
system, having subclasses such as Authentication and Authorisation. A policy
mechanism is added for a particular data-related action (class Mechanism) that a user
or system can perform (e.g. Authorisation for DataAccess). PROACT displays the
highest degree of privacy enforcing mechanisms. However, PROACT cannot model
the prohibition of an action, such as the situation in Scenario C when incoming
messages were blocked while the user was in a meeting.
          </p>
          <p>The overall results of this evaluation are depicted in Table 4.
1 Key to Tables 3 and 4:
✓/Í = the ontology can/cannot model this feature
~ = the ontology can model this feature with minimum additions
4.3 Evaluation of Ambient Intelligence Features
Previous studies on ontology evaluation suggest various possible evaluation criteria. In
order to fully assess ontologies by their ability to represent facets of privacy, we carried
out an analysis of general AmI features, since privacy is not a standalone concept within
the smart home domain. Based on this analysis, we selected the evaluation criteria
presented in Table 5.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Context</title>
    </sec>
    <sec id="sec-9">
      <title>Uncertainty</title>
    </sec>
    <sec id="sec-10">
      <title>Human-Computer</title>
    </sec>
    <sec id="sec-11">
      <title>Interaction (HCI)</title>
      <p>Description</p>
      <sec id="sec-11-1">
        <title>Ability to capture, process, and explore the context in</title>
        <p>
          which the system-user interaction takes place [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Key
features are location, person, time and activity.
        </p>
      </sec>
      <sec id="sec-11-2">
        <title>Ability to deal with data that is incorrect, imprecise, conflicting or incomplete [3]</title>
      </sec>
      <sec id="sec-11-3">
        <title>Ability to model the interactions between users and the</title>
        <p>
          AmI system [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]
Thereafter, we evaluated each ontology and assigned performance scores ranging from
1 to 5. A score of 1 signifies a low performance in the respective area, meaning the
ontology lacks the ability to model the required elements. On the other hand, a score of
5 represents a very high performance, suggesting the ontology accurately models the
relevant AmI features.
4.3.1 SOUPA
        </p>
        <p>Context Score: 3/5
The Location class is part of SOUPA, yet location data does not seem to be integrated
well with smart devices. There were cases presented in the scenarios where a device
collects location data, and this situation could not be modelled. There is only one
Person class, and users are not differentiated from each other. The Time ontology
contains numerous useful concepts such as instant events, events of longer duration
and measurements of time.</p>
        <p>Yet, the Activity ontology offers specific properties such as actor, target,
instrument and time, enabling the formation of links between user activities and
virtually any other part of the system.</p>
        <p>Uncertainty Score: 5/5
SOUPA is the only of the three ontologies that is capable of modelling incomplete
or uncertain information, with one of the core SOUPA ontologies being Belief
Desire - Intention. Using this ontology, we could create statements such as
“SmartHome believes IntruderStatement”, capturing a situation in Scenario C,
where the system has information regarding an intruder in the home.</p>
        <p>Knowledge is another key class for modelling uncertainty, having a
reliabilityRating property, which can express the level of confidence regarding the
validity of a particular piece of knowledge. Similarly, a piece of knowledge can
conflict with, or be inconsistentWith another piece of knowledge.</p>
        <p>HCI Score: 4/5
In SOUPA, HCI can be modelled through the use of the Action ontology, along with
its specific properties (e.g. actor, target, recipient). HCI-specific means of
communication are also captured, in particular, tools for messaging such as ChatID
and IMProvider. These were employed for representing Scenario B, where Paolo
and the intelligent system Archie were exchanging text messages. Yet the limited
Device vocabulary restricts the richness with which HCI can be modelled.
4.3.2 COSE</p>
        <p>Context Score: 5/5
COSE can model elements of surrounding space to a very high degree of accuracy.
Location is captured through the Point class, having properties for representing
coordinates (e.g. xCoordinateOfPoint). Space within a house is represented by the
classes Bedroom, LivingRoom, and FurniturePiece. Moreover, COSE offers a
Person class with the subclasses Resident and Occupant. Time is captured by the
classes TemporalThing and UnitOfTime and through data properties such as
timestamp. Activities are classified into IntelligentAgentActivity and HumanActivity,
a separation that we found extremely useful. Likewise, human activities are further
broken down, achieving a higher degree of accuracy.</p>
        <p>In addition, COSE distinguishes between the notions of SmartEnvironment,
ElectronicDevice and HouseholdAppliance. This approach facilitated the modelling
of Scenario B, in which the intelligent agent Archie communicated with Paolo via
an electronic device (i.e. phone) and scheduled the activities of household appliances
(e.g. washing machine). Finally, COSE uses a highly precise hierarchy for
representing sensors and actuators, an essential component of smart homes. The
Sensor hierarchy is comprised of 14 subclasses including PressureSensor,</p>
      </sec>
    </sec>
    <sec id="sec-12">
      <title>TemperatureSensor, MotionDetector and ContactSensor.</title>
      <p>Uncertainty Score: 2/5
COSE cannot explicitly model uncertainty. The only element that points towards
uncertainty is the data property activityHasError, which can represent the uncertain
nature of human activities; however its precise use is unclear.</p>
      <p>
        HCI Score: 3/5
HCI modelling can be achieved only to a certain extent. COSE can model human
activities and people’s interactions with devices via the InteractWithInformation and
InteractWithPhysicalObject classes. Nevertheless, the aspects modelled are
incomplete; primarily due to the missing properties connecting the classes Person
and ElectronicDevice.
4.3.3 PROACT
We should note that PROACT was not available in its entirety and therefore it was
reconstructed by following the information available in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Hence, due to lack of
access to the original ontology, some aspects could not be fully evaluated.
      </p>
      <p>Context Score: 2/5
Due to its focus on privacy and security, PROACT cannot model context
sufficiently. The most noticeable omission is the lack of a representation for location.
On the other hand, humans are well modelled by classes such as User, Client and
ResourceOwner. In addition, PROACT allows the representation of groups of people
as well as individuals, enabling the description of companies or other entities.</p>
      <p>There is one class for Time and a property, hasDuration, but these only partially
meet the time representation requirements of smart environments. In Scenario A, Sal
was verifying the time markers of events in the surveillance system, elements which
we could not model with PROACT. Finally, this ontology has no way of accounting
for user activities, meaning all related aspects such as activity monitoring or
surveillance, cannot be modelled.</p>
      <p>Uncertainty Score: 2/5
PROACT does not have the ability to capture uncertain information. However, some
level of uncertainty can be modelled as it relates to privacy and security. For
example, user groups can collectively be assigned a “trust level”, therefore, the
ontology enables reasoning about the trustworthiness of users.</p>
      <p>HCI Score: 3/5
HCI is generally well accounted for in PROACT. There are properties that enable
stating that a user owns a device, and also that a device recognises the user. Through
the class Service, intelligent agents can provide services that are received by users.
This can be thought of as a class synonymous to “Action”, yet only devices can
execute these actions. Nonetheless, PROACT’s capabilities to represent more
complex HCI features, such as the exchange of instant messages mentioned in
Scenario B, are rather limited, as it can only capture the type of a service, but not
how this service is actually used.
4.4 Evaluation of General Quality Aspects
Aside from the specific AmI features, we also evaluated the ontologies using general
ontology quality criteria selected from the literature, as outlined in Table 6. This
evaluation was performed during the practical experiment by using the ontologies and
deciding how well each ontology performed against the specified criteria.</p>
      <sec id="sec-12-1">
        <title>The descriptions and definitions of terms are correct within the specified domain, capture the intended meaning, from the viewpoint of the users of the system [25]</title>
      </sec>
      <sec id="sec-12-2">
        <title>A term can be uniquely identified and distinguished from other terms, implying sufficient documentation and labelling [3,25]</title>
      </sec>
      <sec id="sec-12-3">
        <title>A concept should be defined in a coherent way without allowing for conflicts or contradictions and the ontology as a whole must be logically correct.[3,25]</title>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>Conciseness</title>
      <sec id="sec-13-1">
        <title>The ontology does not contain irrelevant or redundant terms [25]</title>
      </sec>
    </sec>
    <sec id="sec-14">
      <title>Completeness</title>
      <sec id="sec-14-1">
        <title>The degree to which the domain is covered [25]</title>
      </sec>
    </sec>
    <sec id="sec-15">
      <title>Operability</title>
      <sec id="sec-15-1">
        <title>The degree of learnability, ease of use and memorability with</title>
        <p>
          respect to the ontology user [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]
        </p>
        <p>The level of accuracy was given by the ability of an ontology to accurately model
the concepts from the scenarios with appropriate classes and properties that associate
those classes. An example of inaccurate class naming in PROACT is in the classes
Mechanism and PolicyMechanism, which are not similar in function yet have similar
names (Mechanism refers to an action such as transferring data, whereas
PolicyMechanism could be authentication or authorisation).</p>
        <p>Clarity was mainly derived from the presence or absence of clear naming, class
hierarchies and labelling. For instance, COSE was evaluated as a generally unclear
ontology, having unintuitive class names (e.g. SupposedToBeMicrotheory) and
hierarchies (e.g. Person as a subclass of ThreeDimantionalGeometricThing).</p>
        <p>Consistency was determined mainly based on whether there are any unsatisfiable
classes or restrictions in the ontology.</p>
        <p>The level of conciseness was given by the number of relevant and redundant classes.
For example, COSE contains 145 classes, the majority of which have one subclass only;
thus, they can be considered redundant.</p>
        <p>An ontology was considered complete if during the scenario mapping, all needed
elements could be found. For instance, SOUPA is more general-purpose and thus had
no means of representing sensors, while PROACT lacked elements to represent
contextual concepts such as location, time, space, and user activities.</p>
        <p>Finally, operability was determined based on general conclusions about the ease of
use of each ontology. The results of this evaluation are summarised in Table 7:</p>
        <sec id="sec-15-1-1">
          <title>5. Discussion and Recommendations</title>
          <p>5.1 Results of Ontology Evaluation
The initial evaluation of the three ontologies determined their suitability in semantically
representing privacy-related features in smart home environments. This exercise
concludes that both SOUPA and PROACT could model 62.5% of the features, while,
COSE is significantly behind, being able to model only 27.5%. Some features, such as
surveillance, location disclosure and unauthorised actions, were representable in all
ontologies, while personal data matching could not be modelled by any of the three
ontologies.</p>
          <p>The distribution of modelled features was homogenous; there were few features that
could not be represented by any of the ontologies. It can, therefore, be concluded that
it is possible to semantically represent all of the evaluated features, and the lower scores
account for the missing capabilities of each ontology.</p>
          <p>Nevertheless, it can be argued that an ontology which accurately represents privacy
protection mechanisms is superior to one that can only represent privacy challenges.
Consequently, the results were further analysed by considering the two facets of privacy
independently, as shown in Table 8. This analysis differs from the previous one in the
sense that privacy challenges and protection techniques are given equal weights.
Previously, the challenges weighted more due to being more numerous (14) compared
to the protection techniques (6).
3
4
4
4
2
4
Therefore, PROACT is superior in modelling privacy protection techniques.</p>
          <p>After the implementation of the ontologies in Protégé, conclusions could be drawn
regarding their ability to model the principal AmI features. The results of the second
evaluation are summarised in Table 9.</p>
          <p>Consequently, SOUPA performed exceedingly well in this evaluation with an
average score of 4 out of 5, followed by COSE and lastly, PROACT. COSE was better
in modelling context elements, yet SOUPA was the only one that could accurately
represent uncertain and incomplete information.</p>
          <p>Lastly, we assessed the general quality aspects of ontologies. In this assessment,
PROACT scored the highest, followed by SOUPA and COSE. It is worth noting that
these quality criteria are not fully independent to each other; for instance, an ontology
that scored low in clarity, is unlikely to perform very well in operability.</p>
          <p>For some criteria, accuracy and completeness in particular, neither of the ontologies
scored more than 3 out of 5, meaning that their ability to describe context accurately is
limited.</p>
          <p>To conclude, based on the results of the three evaluation exercises, SOUPA and
PROACT seem equally well equipped to model privacy in smart home environments,
both having strengths and weaknesses alike. COSE has been deemed not fully suitable
for this domain, requiring considerable enhancements.</p>
          <p>Nevertheless, by observing the performance of the selected ontologies, broader
themes emerge for the field of semantic web ontologies for privacy in smart home
environments. The final section discusses these themes and offers an insight into what
the future improvements in the field might be.</p>
          <p>
            3
5
4
4
5.2 Conclusion on Ontology Evaluation
It is important to situate the findings within the wider context of how the ontologies
themselves were developed. COSE is an ontology for smart environments, as
Wemlinger and Holder argue in favour of developing domain ontologies [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ]. Due to
its narrow focus, COSE did not succeed in modelling privacy aspects. Thus, COSE has
been perceived as an incomplete ontology, which should be enhanced with key themes
in smart home environments, such as uncertainty and privacy.
          </p>
          <p>
            PROACT is targeted at privacy and security, introducing highly valuable techniques
for representing privacy protection. Yet, it disregards other context elements which, in
turn, contribute to modelling privacy. The lesson learned from evaluating PROACT is
that privacy must be considered holistically, accounting not just for privacy protection,
but also acknowledging the privacy issues that arise from the very nature of smart
environments. The most surprising finding is the failure of PROACT to outperform
SOUPA. Not only is PROACT more recent than SOUPA, but also PROACT was built
on top of SOUPA [
            <xref ref-type="bibr" rid="ref23">23</xref>
            ].
          </p>
          <p>In spite of small shortcomings, SOUPA performed best overall, having no
considerable gaps in modelling the domain. The justification could be that it is by
design a general-purpose ontology, implying a careful consideration of the domain at
large. The conclusion from this evaluation is that the most promising approach takes a
holistic stance and regards privacy as an integral part of smart home environments.</p>
          <p>
            Lastly, an interesting observation arises from the study of the relevant literature from
different periods. The most recently developed ontology, COSE, as well as Denti’s
scenario [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ] (Scenario B), paint a different picture compared to the visions in the early
literature. Modern features, including precise representations of sensor technology,
found in COSE, suggest that the visions of AmI are closer to being realised today, as
the technological capability exists. Interestingly, Denti’s scenario enhances the vision
of smart homes with social media elements and gamification, suggesting that future
ontologies should potentially be extended to capture the additional privacy challenges
brought by these domains.
5.3 Recommendations
To begin with, the overarching theme that emerges from the evaluation is the fact that
a suitable ontology must account for privacy protection as well as elements of the
surrounding context. Consequently, future research could consider building on top of
the context elements from COSE and the privacy protection mechanisms from
PROACT. As a baseline overall structure, SOUPA stands out as being a promising
starting point. In particular, the future ontology could benefit from a modular structure,
similarly to the way SOUPA is organised, since the resulting ontology is likely to have
a considerable size, which would reduce clarity and operability.
          </p>
          <p>Thereafter, the ontology could be developed progressively starting from the core
context elements: Location, Person, Time, and Activity. Building on top of these, the
future ontology could integrate the COSE hierarchies for sensors and buildings, devices
and household appliances.</p>
          <p>Privacy protection measures should be added following the example from PROACT,
by constructing classes for policy mechanisms such as authentication and authorisation,
and the data-related actions that the policies will be applied upon (e.g. data access, data
disclosure). In addition, we would recommend an extension that enables the permission
as well as the prohibition of actions, so that the users can grant permissions both
explicitly and implicitly.</p>
          <p>Finally, the Belief-Desire-Intention construct from SOUPA has been deemed highly
appropriate for modelling uncertainty. With regard to the properties, they should be
structured in a hierarchical manner, grouped by common domain and range restrictions,
as SOUPA proved this practice to be useful.</p>
          <p>
            Nevertheless, future research should also bear in mind the limitations of ontology
engineering, since automatically integrating ontologies is still an open research
question [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ]. Therefore, manual integration, or simply building a new ontology based
on previous ones, could represent a viable option.
          </p>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.   Augusto,
          <string-name>
            <given-names>J.C.</given-names>
            ,
            <surname>Nakashima</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>Aghajan</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Ambient Intelligence and Smart Environments: A State of the Art</article-title>
          . In: Nakashima,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Aghajan</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>Augusto</surname>
            , J.C. (eds.) Handbook of Ambient Intelligence and
            <given-names>Smart</given-names>
          </string-name>
          <string-name>
            <surname>Environments</surname>
          </string-name>
          . New York, Springer US, pp.
          <fpage>3</fpage>
          -
          <lpage>31</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.   Ahonen,
          <string-name>
            <surname>P.</surname>
          </string-name>
          et al (
          <year>2010</year>
          ).
          <article-title>Dark scenarios</article-title>
          .
          <source>In: Safeguards in a World of Ambient Intelligence</source>
          . Wright,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Friedewald</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Punie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Gutwirth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            and
            <surname>Vildjiounaite</surname>
          </string-name>
          , E. (eds.) Dordrecht: Springer Netherlands, pp.
          <fpage>33</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.   Ye,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Coyle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Dobson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            and
            <surname>Nixon</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>Ontology-based models in pervasive computing systems</article-title>
          .
          <source>The Knowledge Engineering Review</source>
          ,
          <volume>22</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>315</fpage>
          -
          <lpage>347</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.   Friedewald,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Vildjiounaite</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Punie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            and
            <surname>Wright</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>The brave new world of ambient intelligence: An analysis of scenarios regarding privacy, identity and security issues</article-title>
          .
          <source>Security In Pervasive Computing. 3934</source>
          , pp.
          <fpage>119</fpage>
          -
          <lpage>133</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.   Cook,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Augusto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. C.</given-names>
            and
            <surname>Jakkula</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>Ambient intelligence: Technologies, applications, and opportunities</article-title>
          .
          <source>Pervasive and Mobile Computing</source>
          ,
          <volume>5</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>277</fpage>
          -
          <lpage>298</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.   De Silva,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Morikawa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            and
            <surname>Petra</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>State of the art of smart homes</article-title>
          .
          <source>Engineering Applications of Artificial Intelligence</source>
          ,
          <volume>25</volume>
          (
          <issue>7</issue>
          ), pp.
          <fpage>1313</fpage>
          -
          <lpage>1321</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.   Gritzalis,
          <string-name>
            <surname>S.</surname>
          </string-name>
          (
          <year>2004</year>
          ).
          <article-title>Enhancing Web privacy and anonymity in the digital era</article-title>
          .
          <source>Information Management &amp; Computer Security</source>
          ,
          <volume>12</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>255</fpage>
          -
          <lpage>287</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.   Deng,
          <string-name>
            <surname>M.</surname>
          </string-name>
          et al. (
          <year>2011</year>
          ).
          <article-title>A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements</article-title>
          .
          <source>Requirements Engineering</source>
          <volume>16</volume>
          (
          <issue>1</issue>
          ).
          <fpage>pp3</fpage>
          -
          <lpage>32</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.   Wright,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Gutwirth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            and
            <surname>Friedewald</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>Shining light on the dark side of ambient intelligence</article-title>
          .
          <source>Foresight</source>
          ,
          <volume>9</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>46</fpage>
          -
          <lpage>59</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.   Caire,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Moawad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Efthymiou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Bikakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            and
            <surname>Le Traon</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Privacy Challenges in Ambient Intelligence Systems</article-title>
          . Lessons Learned,
          <article-title>Gaps and Perspectives from the AAL Domain and Applications</article-title>
          .
          <source>Journal of Ambient Intelligence and Smart Environments</source>
          . In press.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.   Theoharidou,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Tsalis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            , and
            <surname>Gritzalis</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Smart home solutions for healthcare: privacy in ubiquitous computing infrastructures. Handbook of smart homes, health care and well-being.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.   Denti,
          <string-name>
            <surname>E.</surname>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Novel pervasive scenarios for home management: the Butlers architecture</article-title>
          .
          <source>SpringerPlus</source>
          ,
          <volume>3</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>30</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.   Langheinrich,
          <string-name>
            <surname>M.</surname>
          </string-name>
          (
          <year>2001</year>
          ).
          <article-title>Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems</article-title>
          .
          <source>Ubicomp 2001: Ubiquitous Computing</source>
          , pp.
          <fpage>273</fpage>
          -
          <lpage>291</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.   Bettini,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Brdiczka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            ,
            <surname>Henricksen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Indulska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Nicklas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Ranganathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Riboni</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>A survey of context modelling and reasoning techniques</article-title>
          .
          <source>Pervasive and Mobile Computing</source>
          <volume>6</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>161</fpage>
          -
          <lpage>180</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.   Bolchini,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Curino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.A.</given-names>
            ,
            <surname>Quintarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Schreiber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.A.</given-names>
            ,
            <surname>Tanca</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>A data-oriented survey of context models</article-title>
          .
          <source>SIGMOD Rec</source>
          .
          <volume>36</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>19</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.   Li,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Krishnaswamy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Hauswirth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            and
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>The Ubiquitous Semantic Web: Promises, Progress and Challenges</article-title>
          .
          <source>International Journal on Semantic Web and Information Systems</source>
          ,
          <volume>10</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.   Dey,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Abowd</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            and
            <surname>Salber</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          (
          <year>2001</year>
          ).
          <article-title>A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications</article-title>
          . Human-Computer Interaction,
          <volume>16</volume>
          (
          <issue>2-4</issue>
          ), pp.
          <fpage>97</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.   Chen,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Perich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Finin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            and
            <surname>Joshi</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          (
          <year>2004</year>
          ).
          <article-title>SOUPA: Standard ontology for ubiquitous and pervasive applications</article-title>
          .
          <source>The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services</source>
          , pp.
          <fpage>258</fpage>
          -
          <lpage>267</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.  
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Pung</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2004</year>
          ).
          <article-title>Ontology based context modeling and reasoning using OWL</article-title>
          .
          <source>IEEE Annual Conference on Pervasive Computing and Communications Workshops</source>
          ,
          <year>2004</year>
          . Proceedings of the Second, pp.
          <fpage>18</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.   Wemlinger,
          <string-name>
            <given-names>Z.</given-names>
            and
            <surname>Holder</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>The COSE Ontology: Bringing the Semantic Web to Smart Environments</article-title>
          .
          <source>Toward Useful Services for Elderly and People with Disabilities</source>
          ,
          <volume>6719</volume>
          , pp.
          <fpage>205</fpage>
          -
          <lpage>209</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.   Wongpatikaseree,
          <string-name>
            <surname>K.</surname>
          </string-name>
          , et al. (
          <year>2012</year>
          ).
          <article-title>Activity Recognition Using Context-Aware Infrastructure Ontology in Smart Home Domain</article-title>
          .
          <source>2012 Seventh International Conference on Knowledge, Information and Creativity Support Systems</source>
          , pp.
          <fpage>50</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.   Coutaz,
          <string-name>
            <surname>J.</surname>
          </string-name>
          , et al. (
          <year>2003</year>
          ).
          <article-title>Working document on gloss ontology</article-title>
          .
          <source>Technical Report D9</source>
          .2,
          <string-name>
            <given-names>Global</given-names>
            <surname>Smart</surname>
          </string-name>
          Spaces.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.   Panagiotopoulos,
          <string-name>
            <surname>I.</surname>
          </string-name>
          , et al. (
          <year>2010</year>
          ).
          <source>PROACT: An Ontology-Based Model of Privacy Policies in Ambient Intelligence Environments</source>
          .
          <year>2010</year>
          14th Panhellenic Conference on Informatics, pp.
          <fpage>124</fpage>
          -
          <lpage>129</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.   Weiser,
          <string-name>
            <surname>M.</surname>
          </string-name>
          (
          <year>1991</year>
          ).
          <article-title>The Computer for the 21st Century</article-title>
          .
          <source>Scientific American</source>
          ,
          <volume>265</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>94</fpage>
          -
          <lpage>104</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.   Vrandečić,
          <string-name>
            <surname>D.</surname>
          </string-name>
          , (
          <year>2009</year>
          ).
          <article-title>Ontology evaluation</article-title>
          . Springer Berlin Heidelberg. pp.
          <fpage>293</fpage>
          -
          <lpage>313</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.  
          <string-name>
            <surname>Duque-Ramos</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al. (
          <year>2011</year>
          ).
          <article-title>OQuaRE: A SQuaRE-based Approach for Evaluating the Quality of Ontologies</article-title>
          .
          <source>Journal Of Research And Practice In Information Technology</source>
          ,
          <volume>43</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>159</fpage>
          -
          <lpage>176</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.   Antoniou,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Groth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Van Harmelen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            and
            <surname>Hoekstra</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.</surname>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>A Semantic Web primer</article-title>
          . 3rd ed. London: MIT Press.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>