<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Using Complementary Risk Acceptance Criteria to Structure Assurance Cases for Safety-Critical AI Components</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Michael</forename><surname>Kläs</surname></persName>
							<email>michael.klaes@iese.fraunhofer.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Fraunhofer IESE</orgName>
								<address>
									<settlement>Kaiserslautern</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rasmus</forename><surname>Adler</surname></persName>
							<email>rasmus.adler@iese.fraunhofer.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Fraunhofer IESE</orgName>
								<address>
									<settlement>Kaiserslautern</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Lisa</forename><surname>Jöckel</surname></persName>
							<email>lisa.joeckel@iese.fraunhofer.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Fraunhofer IESE</orgName>
								<address>
									<settlement>Kaiserslautern</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Janek</forename><surname>Groß</surname></persName>
							<email>janek.gross@iese.fraunhofer.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Fraunhofer IESE</orgName>
								<address>
									<settlement>Kaiserslautern</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jan</forename><surname>Reich</surname></persName>
							<email>jan.reich@iese.fraunhofer.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Fraunhofer IESE</orgName>
								<address>
									<settlement>Kaiserslautern</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Using Complementary Risk Acceptance Criteria to Structure Assurance Cases for Safety-Critical AI Components</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">5342AE98814CC40727A9D57FA29C72A6</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T23:16+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Artificial Intelligence (AI), particularly current Machine Learning approaches, promises new and innovative solutions also for realizing safety-critical functions. Assurance cases can support the potential certification of such AI applications by providing an assessable, structured argument explaining why safety is achieved. Existing proposals and patterns for structuring the safety argument help to structure safety measures, but guidance for explaining in a concrete use case why the safety measures are actually sufficient is limited. In this paper, we investigate this and other challenges and propose solutions.</p><p>In particular, we propose considering two complementary types of risk acceptance criteria as assurance objectives and provide, for each objective, a structure for the supporting argument. We illustrate our proposal on an excerpt of an automated guided vehicle use case and close with questions triggering further discussions on how to best use assurance cases in the context of AI certification.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>AI, which in this paper we understand as complex data-driven models provided by Machine Learning (ML), promises improved or additional functionalities that are essential for autonomous systems, e.g., perception for self-driving vehicles. In many cases, such functionalities are safety-critical, so it is highly likely that AI becomes safety-critical as well, meaning that its failure can contribute to accidents. There are already various reports on fatal accidents due to AI-related failures in autonomous vehicles <ref type="bibr" target="#b12">[Pietsch, 2021;</ref><ref type="bibr" target="#b16">Wakabayashi, 2018]</ref>.</p><p>In consequence, regulation [European Commission, 2021] and certification for AI in safety-critical components is being proposed. Regulation and certification are powerful means to prevent the market introduction of unsafe products. This contributes not only to safety but also to the economy as a few unsafe products could affect user acceptance of all similar products. The predictability of legal decisions can thus contribute to economic success as long as liability risk and costs for complying with regulations and standards are not unreasonably high and hinder meaningful innovations.</p><p>Unfortunately, existing safety standards are difficult to apply in the context of <ref type="bibr">AI [Salay and Czarnecki, 2018]</ref> and revisions are still ongoing <ref type="bibr" target="#b7">[ISO/IEC, 2021]</ref>. Therefore, we currently do not have any standards that we can easily apply for certifying AI.</p><p>Argument safety claims with assurance cases (ACs) as an established approach in safety engineering may provide an alternative basis for audits and certification in the context of AI <ref type="bibr" target="#b2">[BSI, 2021]</ref>. They could structure the arguments for those parts of a solution that are individual and highly innovative. Moreover, they could establish the basis for upcoming evidence-based standards for AI certification.</p><p>Initial proposals on how to apply the concept of ACs to AI can be found in the literature. A prominent strategy is to argue the safety objectives and safety requirements <ref type="bibr" target="#b4">[Gauerhof et al., 2020]</ref>. As the proposed strategy and patterns abstract from specific safety objectives and derived safety requirements, such approaches also largely abstract from AI-specific safety concerns and required safety measures. Guidance for achieving and arguing safety is thus inherently limited.</p><p>One approach for overcoming this limitation is to argue using known AI-related safety concerns and how they are addressed by AI-specific safety measures <ref type="bibr">[Schwalbe et al., 2020]</ref>. A disadvantage is that it is hard to argue completeness for the identified and addressed safety concerns. Furthermore, such approaches can not explain yet what safety measures and metrics with the respective thresholds need to be applied to achieve a defined level of safety. To give just one example, neither practical experience nor empirical evidence exists on defining a specific neuron coverage level that would be considered as sufficient when testing a deep neural network for a concrete application.</p><p>We think that the concepts and ideas introduced in existing AC proposals can be aligned in a more comprehensible and convincing argumentation if the risk acceptance criteria on which the question of 'How safe is safe enough?' is founded, is made explicit in the AC structure itself. We will show that this allows, on the one hand, becoming explicit with respect to AI-specific safety measures and, on the other hand, soundly arguing higher-level safety-objectives.</p><p>Contribution. Specifically, we propose using an AC structure that splits at an early stage into two main claims and related arguments. The first claim refers to the achievement of a probabilistic target value with a certain level of confidence derived from applying a quantitative risk acceptance criteria. The second claim is that the risk due to "failures" caused by the AI is as low as reasonably practicable due to safety measures applied during the AI lifecycle. In the absence of evidence-based target values for specific safety measures, we propose to monitor quality assurance activities on a cost-benefit base and define respective stop criteria.</p><p>This ensures, on the one hand, that quantitative objectives are explicitly argued and underpinned with evidences. On the other hand, the argumentation over the proposed lifecycle stages contributes to a more comprehensive and justifiable derivation of reasonable safety measures but without the need for predefine targets for specific safety measures. The aim of this paper is to stimulate the discussion about how to argue safety for AI-based functions by rethinking traditional AC patterns and strategies.</p><p>Structure. The remainder of this paper is structured as follows: First, we give some background on quality assurance in the context of AI and introduce the concept of ACs as applied in safety engineering (Sec. 2). Next, we discuss existing proposals on how ACs could be used in the context of AI (Sec.</p><p>3). Then we introduce an example use case and illustrate our proposal for structuring ACs (Sec. 4). Finally, we discuss a selection of open question (Sec. 5) and conclude the paper with an outlook on possible implications (Sec. 6).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Background</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Quality Assurance for AI</head><p>AI-based software components raise new challenges for quality assurance due to their functionality being derived from data. Commonly, challenges and safety concerns like lack of specification or interpretability are described <ref type="bibr" target="#b0">[Adler et al., 2019;</ref><ref type="bibr" target="#b1">Ashmore et al., 2019;</ref><ref type="bibr" target="#b4">Felderer and Ramler, 2021;</ref><ref type="bibr" target="#b13">Sämann et al., 2020;</ref><ref type="bibr" target="#b16">Willers et al., 2020]</ref>. Several papers collect existing methods and map them to mentioned challenges <ref type="bibr" target="#b0">[Adler et al., 2019;</ref><ref type="bibr" target="#b13">Sämann et al., 2020;</ref><ref type="bibr" target="#b15">Schwalbe and Schels 2019;</ref><ref type="bibr" target="#b16">Willers et al., 2020]</ref>. This raises two questions: whether the list of safety concerns is complete, and to which extent the available methods sufficiently address the safety concerns <ref type="bibr" target="#b0">[Adler et al., 2019]</ref>. We are currently not aware of any work that could provide a sufficient answer on these questions.</p><p>Another approach is to structure possible quality assurance activities and measures according to the phases of the AI lifecycle in which they are applied. <ref type="bibr">Studer et al. [2021]</ref> propose, for example, a process model based on CRISP-DM, which is often used in data analysis projects, introducing a quality assurance methodology for each project phase. <ref type="bibr" target="#b1">Ashmore et al. [2019]</ref> provide a survey of quality assurance methods generating evidences for key assurance requirements being met in each phase of the AI lifecycle. Here, there is a need to show that the quality assurance methods applied during a phase address all assurance requirements related to this phase, and that the list of assurance requirements is complete.</p><p>However, it is difficult to obtain a complete list of quantitative quality assurance requirements. These strongly depend on the task of the AI-based component and its application context. Quality modeling approaches can contribute to a more comprehensive list of quality requirements <ref type="bibr" target="#b10">[Mayr et al., 2012]</ref>. <ref type="bibr" target="#b15">Siebert et al. [2021]</ref> propose a systematic approach for building such a quality model for a concrete AI-based system that defines the required aspects for each entity of the AIbased system and how they can be measured. Still, further research is needed to better understand (1) to which extent an evidence generated by a certain method contributes to arguing safety, (2) what suitable performance indicators for the evidences are, and (3) when a certain method should be preferred over another for a given context.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Assurance Cases</head><p>ACs are heavily used in practice to assure safety. In particular, if it is very challenging to argue safety, as in the case of autonomous systems. In recent years, standards like UL 4600 <ref type="bibr" target="#b16">[UL, 2021]</ref> or reports <ref type="bibr" target="#b18">[Zenzic, 2020]</ref> have addressed the development of such AC. The application rule VDE-AR-E 2842-61 <ref type="bibr">[VDE, 2020]</ref> already proposes using ACs also for other critical aspects of trustworthiness, such as fairness, as illustrated by <ref type="bibr" target="#b5">Hauer et al. [2021]</ref>.</p><p>An AC is defined as a reasoned, auditable created artifact that supports the contention that its top-level claim (or set of claims) is satisfied, including systematic argumentation and the underlying evidence and explicit assumptions that support the claim(s) [ISO/IEC/IEEE, 2019].</p><p>The left part of Fig. <ref type="figure" target="#fig_0">1</ref> illustrates the three main building blocks of an AC: (1) its top-level claims typically referring to achieved objectives or fulfilled constraints, (2) an argumentation supporting the top-level claims, and (3) evidences on which the argument is based. The right part illustrates the argumentation in a tree structure and its assumptions. The tree is built from reasoning steps that connect lower-level claims with a higher claim that can be concluded from these lowerlevel claims. If the conclusion is only valid under some assumptions, these assumptions shall be made explicit.</p><p>There are different languages for modeling ACs, like the Goals Structuring Notation (GSN) <ref type="bibr">[SCSC, 2018]</ref> or Claim Argument Evidence Notation <ref type="bibr" target="#b0">[Adelard LLP, 2021]</ref>. The common meta-model of these languages is defined in the Structured Assurance Case Metamodel (SACM) <ref type="bibr">[OMG, 2020]</ref>. This paper do not refer to a specific language but focus on the fundamental idea of structuring the argument. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Related Work</head><p>From a safety perspective, ACs are considered a promising approach for arguing safety for AI-based systems, and various authors have already proposed strategies and patterns. <ref type="bibr" target="#b10">Picardi et al. [2019]</ref> presented an AC pattern for ML models in clinical diagnosis systems, which they later refined and supplemented by a process for generating evidences during the ML lifecycle <ref type="bibr" target="#b11">[Picardi et al., 2020]</ref>. The activities and desiderata during the ML lifecycle are referred from <ref type="bibr" target="#b1">Ashmore et al. [2019]</ref>. The ML assurance claim is argued based on ML safety requirements, operating environment, ML model, development, and test data. In this context, the link between system safety requirements and ML safety requirements is addressed <ref type="bibr" target="#b4">[Gauerhof et al., 2020]</ref>. In the recently published AMLAS report, <ref type="bibr" target="#b4">Hawkins et al. [2021]</ref> also provide generic argument patterns and a process for ML safety assurance scoping, ML safety requirements, ML data, model learning, model verification, and model deployment. <ref type="bibr" target="#b17">Wozniak et al. [2020]</ref> propose an argument pattern for safety assurance that is aligned with the reasoning for software and hardware in ISO 26262. They argue satisfaction of an ML safety requirement over correctly decomposing the safety requirements into sub-requirements and their satisfaction, appropriate data acquisition, model design, as well as implementation and training of the ML model.</p><p>A strategy that does not argue the of ML safety requirements is provided by <ref type="bibr" target="#b5">Gauerhof et al. [2018]</ref>. They argue that the intended functionality is met by a sufficient reduction of the root causes of functional insufficiencies, which encompass underspecification, semantic and deductive gap.</p><p>Based on previous works <ref type="bibr" target="#b15">[Schwalbe and Schels, 2019;</ref><ref type="bibr">2020]</ref>, <ref type="bibr">Schwalbe et al. [2020]</ref> propose arguing the sufficient absence of risk for deep neural networks (DNN) arising from the insufficiencies they see in their black-box nature, simple performance issues, incorrect internal logic, and instability. They propose a collection of measures to address these insufficiencies, which include V&amp;V as well as best practices during the creation of DNNs and on the system level.</p><p>In summary, our review indicates that existing work is driven by the safety community, which adapts established safety patterns and concepts to AI. However, the presented patterns are still on a rather abstract level, and the applicability on a concrete use case comprehensively illustrated from the top-level claim down toward the evidences has not been described yet so far. This might indicate that transferring traditional patterns to AI-based systems proves to be difficult.</p><p>We observed two major challenges in argumentation for which existing strategies and patterns still provide insufficient support. (1) Completeness in the refinement of claims in sub-claims appears difficult to show, especially, when approaches argue over the refinement of safety requirements to AI/ML requirements or about addressing ML insufficiencies. For example, if we have a (most likely) incomplete list of insufficiencies, we cannot argue about addressing each insufficiency. (2) Considering the current state of AI quality assurance, the proposed patterns commonly struggle with bridging the gap between a low-level quantitative evidence, e.g., achieving a specific neuron coverage during AI testing, and the claim of sufficient safety for the given application in a convincing manner.</p><p>We pinpointed as potential cause of these problems the fact that the risk acceptance criterion underlying the top-level claim on which the argumentation is based is either implicit or different criteria are mixed and are thus not easy to distinguish during refinement. We therefore claim that a clear differentiation will allow more specific argumentation patterns and better attribution of evidences to sub-claims.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Building Safety Assurance Cases for AI</head><p>In this section, we will first introduce the example we will use to illustrate our concepts. Then we will motivate the consideration of a combination of two risk acceptance criteria to structure ACs for AI. Finally, we will introduce a lifecycle model and use it to argue completeness of the provided refinement.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Background of the Selected Example</head><p>Automated guided vehicles (AGV) are driverless vehicles that transport material. They are used in industrial applications for realizing the flow of material and their safety concepts do not rely on AI <ref type="bibr" target="#b3">[DIN, 2017]</ref>. However, their application is limited due to limited understanding of the environment and their safety concept. Autonomous mobile robots (AMR) overcome these disadvantages compared to operatorcontrolled vehicle by using more sensors and AI. However, the goal of achieving similar performance and flexibility as an operator-controlled vehicle is hard to realize without using AI in safety-critical functions like collision avoidance. Operators of forklifts adapt their speed and safety distance according to various aspects of the persons at risk, including speed, motion path, eye contact, hand gestures signaling right of way, etc. To implement a conservative version of such a human-like collision avoidance system, the AMR needs an AIbased component that understands whether a person at risk has recognized the AMR and gives way to it. A critical failure in this context is that the AMR falsely detects the signaling of right of way. Such safety-critical false detections have to be avoided sufficiently to assure that the AMR drives as least as safe as an operator.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">What does sufficient mean?</head><p>The answer to the question of what sufficient means to prevent a safety-critical failure like 'false detections of a human gesture' depends on the related risks and the risk acceptance criteria, as safety is defined as acceptable risk <ref type="bibr">[IEC, 2010]</ref>.</p><p>We should keep two important aspects in mind when discussing criteria for risk acceptance in settings where AI is part of a safety-critical function: (a) AI is an emerging technology that is still heavily in flux, with unforeseeable developments and improvements in the upcoming years. Thus, coming up with a fixed set of safety measures does not appear to be reasonable. The argument that these safety measures minimize risks as far as reasonably practicable easily becomes invalid. Besides, it would be hard to argue that these measures are as effective as existing ones in safety standards for traditional software. (b) AI is also mainly applied to realize functions that cannot be provided yet by traditional technological solutions.</p><p>A risk acceptance criterion that seems reasonable to apply in the context of AIconsidering (a)states that the residual risk after the application of safety measures should be As Low As Reasonably Practicable (ALARP). The meaning of 'reasonably practicable' is not static but depends on the state of the technology and the intended application, including the underlying business case and related practical restrictions. Considering ALARP as part of the argumentation assures that when progress in technology allows for safer solutions, we will see progress in safety.</p><p>However, doing one's best to avoid and mitigate risks is obviously not enough to argue that the best was sufficient. Accordingly, ALARP is only used in an ALARP region, which is the region between an upper tolerance limit marking unacceptable risk and a lower tolerability limit. Having this in mind is of crucial importance when applying ALARP to AI since the current state of AI technology might not be advanced enough to realize a given application in a sufficiently safe manner. For example, a state-of-the-art traffic sign recognition algorithm might get one of 200 stop signs wrong <ref type="bibr">[INI, 2019]</ref>. If used as part of an autonomous vehicle, it may, as a result, regularly ignore someone's right of way. The algorithm might be as good as reasonably practicable but is still not sufficiently safe to be applied in this specific application.</p><p>Thus, we need at least a second risk acceptance criterion that gives us a fixed limit.</p><p>Most existing products have been developed according to functional safety standards that follow the risk acceptance criterion Minimum Endogenous Mortality (MEM). The idea of MEM is that a technical system must not create a significant risk compared to globally existing risks. For example, a product should cause a minimal increase in overall death rates compared to the existing population death rates. This idea leads to very challenging safety requirements and low target failure rates. Depending on the specific task, such low failure rates might be hard to achieve in practice if AI is involved.</p><p>An alternative criterion given a fixed target is Globalement au moins aussi bon (GAMAB), which says that new technical systems shall be at least as safe as comparable existing ones. However, due to (b) it is hardly applicable in case of many AI-based functions because no technical systems exist yet that provide similar functions.</p><p>An approach related to GAMAB is the idea of having a 'positive risk balance' (PRB). PRB is defined in ISO/TR 4804 as the 'benefit of sufficiently mitigating residual risk of traffic participation due to automated vehicles' together with Note 1 'This includes the expectation that automated vehicles cause less crashes (3.7) on average compared to those made by drivers' [ISO/TR, 2020]. The idea of comparing the new AI-based solution with the existing sociotechnical system can lead to less challenging target failure rates compared to MEM. This opens up new opportunities for arguing safety.</p><p>In this paper, we do not discuss how to use this opportunity to derive a target failure rate for an AI-based safety-critical function, as this is very specific for the function and its usage context, but not specific for AI. We do also not discuss how to get from the target failure rate to a target upper boundary on the uncertainty for AI outcomes. Instead, we assume in our example that we would end up with a PRB-derived upper boundary on safety-related uncertainty (u) that we could accept for the AI outcomes: 'The AI must not falsely detect a signal for the right of way that was not actually given in more than one of N cases'.</p><p>Fig. <ref type="figure" target="#fig_1">2</ref> illustrates the relationship between ALARP and a target-based criterion such as MEM, GAMAB, or PRB when providing arguments that an AI-based solution is safe.</p><p>ALARP can be considered as requesting a certain alpha given by the ratio between the reduction of safety-related uncertainty in the AI outcomes and the required effort/cost. Given the business case for the planned solution and the state of technology, this alpha might vary and is achieved in Fig. <ref type="figure" target="#fig_1">2</ref> at point B. Simply speaking, we request that as long as safety measures exist that would increase safety with reasonable investment, they are carried out. How this rather abstract constraint can be further refined will be discussed in the context of the AI lifecycle presented in Sec. 4.3.</p><p>The upper boundary on acceptable safety-related uncertainty u that is derived from the target-based criterion is illustrated in Fig. <ref type="figure" target="#fig_1">2</ref> as a horizontal line. We consequently need to argue that we are confident that the actual safety-related uncertainty is below u. Please note that this is not achieved at point A, but first at C, which we will discuss further, including its implications when talking about testing in Sec. 4.3.</p><p>Finally, we will always end up in one of two kinds of situations: a situation where the target-based criterion dominates, i.e., it defines the required investment (cf. Fig. <ref type="figure" target="#fig_1">2</ref>), or a situation where ALARP dominates the required investment. An interesting question, which is, however, not directly related to safety, is whether a solution requiring more investment than reasonably practicable should actually be targeted. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Arguing considering the AI lifecycle</head><p>As illustrated above, it seems reasonable to argue two separate risk acceptance criteria. It is also advisable to argue each criterion independently. Important for the argumentation, especially for the argumentation of ALARP, are strategies that assure that the refinement of the claims into sub-claims is complete. An accepted way, which we also consider as most promising, is to use a lifecycle model to argue completeness and localize safety measures.</p><p>The lifecycle model for AI components presented in Fig. <ref type="figure" target="#fig_2">3</ref> builds on existing work, in particular on the work of <ref type="bibr" target="#b1">Ashmore et al. [2019]</ref> and <ref type="bibr" target="#b4">Gauerhof et al. [2020]</ref>. We adapted their proposals. The objective was to achieve an even clearer separation and better assignability of datasets, objectives and corresponding safety measures to the individual phases. In addition, we tried to keep the phases sufficiently generic to be applicable for the various development processes in data science projects that we are aware of.</p><p>We distinguish between specification, construction, analysis, testing, and operation. The proposed lifecycle model explicitly does not include a 'data' phase. Subsuming data-related activities in single phase neither matches reality nor gives weight to the topic of data, which is at the core of any AI lifecycle. Especially since different data with different qualities are consumed in different phases, we modeled individual data lifecycles as parallel streams that provide the foundation for the evidences created in the AI lifecycle. The proposed separation also results in the fact that certain phases exclusively contribute either to argue ALARP or the target-based risk acceptance criterion, as we will show. Specification considers, among other things, the definition of the AI task, the application scope <ref type="bibr" target="#b10">[Kläs and Vollmer, 2018]</ref>, which is comparable to the operation design domain in automotive, and safety-relevant as well as other quality requirements including system constraints like computational resources. Although the AI specification has some specialties, activities are largely AI-independent. Nevertheless, it is a key phase for both types of risk acceptance criteria. A sufficiently complete and correct specification is a prerequisite to assuring that the safety risk will be as low as reasonable practicable by proving guardrails for the subsequent phases, but it also constitutes the AI-specific safety target and the scope in which this target has to be achieved. For example, the AI must not falsely detect a signal for the right of way that was not actually given in more than one of N cases in its previously defined target application scope.</p><p>Construction is an AI-specific phase. Its objective is to build a model from a training dataset that is able to fulfill the AI task in the target application scope considering the requirements and constraints defined in the specification.</p><p>During construction, many design decisions have to be made, e.g., on the kind of model and its hyperparameters including topology, learning algorithm, stop criteria, etc.</p><p>Many of these decisions are based on trial and error, taking into account experience, so construction is a highly iterative process in a close feedback loop with the analysis phase.</p><p>We will not be able to show during construction that we achieved a certain quantitative target, since we focus on fitting but not soundly testing the model. Thus, this phase plays no role in arguing regarding the target-based risk acceptance criteria. However, considering quality assurance measures during construction is important to argue ALARP. The applied quality assurance measures should be guided by the safety target, but also by other quality requirements and constraints identified during the specification. Commonly, it is not possible to define fixed success criteria for the different quality measures. For example, in most cases, it would not be reasonable to enforce a specific type of model or topology, or request a maximum batch size m and run at least e epochs. Instead, we propose analyzing and monitoring the efficiency of the measures carried out and stopping in accordance with ALARP if a reasonable saturation is achieved. For example, if performing a random search on appropriate hyperparameter values, the search shall continue as long as the model shows reasonable improvements.</p><p>Analysis is also an AI-specific phase that is performed in a close feedback loop with construction to provide guardrails for improving construction and indicating the achievement of saturation for constructive quality assurance measures. Analysis comprises besides means for explainability also "testing" the model on validation data to estimate and monitor the model performance with respect to the safety target. However, although techniques are applied that are similar to the techniques applied in the testing phase, the analysis phase differs from the testing phase in that objective is to gather insides to further improve the AI model rather than provide evidence for the achievement of the specified safety target. Therefore, the quality assurance measures in the analysis phase help to argue ALARP but do not contribute to arguing regarding the target-based risk acceptance criteria. In analogy to the construction phase, it is difficult to define a priori targets for most quality measures in the analysis phase. Rather, their effect and thus their potential contribution to the safety </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Data Flow</head><p>Existing Data target must be monitored and continuously evaluated.</p><p>Testing is also commonly considered to be AI-specific. Unlike analysis, the objective of the testing phase is to generate evidences on the achievement of the quantitative safety target. In providing these evidences, testing depends on the specification, including the definition of the AI task and the target application scope. Moreover, it relies on specific qualities of the test data that are not so relevant, for example, for training data, such as that the data fulfills some representativeness criteria and that it was not used previously during construction or analysis. Since a test dataset can always provide only a sample of all possible cases in the target application scope, we need to underpin the evidence on satisfying the safety target with some statistical confidence (cf. Fig. <ref type="figure" target="#fig_1">2</ref>) <ref type="bibr" target="#b9">[Kläs and Sembach, 2019]</ref>. The confidence level cl, which is independent of the target, may be set based on criticality or requested integrity. For example, we might request that the probability that we falsely confirm our target 'The AI must not falsely detect a signal for the right of way that was not actually given in more than one of N cases in its previously defined target application scope.' is less than 1-cl = 0.0001.</p><p>Moreover, it is important to understand that quality assurance measures in the testing phase are not applied to further improve the AI solution and thus does not provide evidences to argue ALARP. Instead, they help argue that we are confident that we have met the quantitative safety target.</p><p>Operation in the sense considered here comprises deployment, usage, maintenance, and retirement. Although most aspects are not AI-specific, some are and need to be addressed with appropriate safety measures. On the one hand, measures for assuring ALARP include the collection of relevant information during operation to further improve the AI solution as part of maintenance. Moreover, situations have to be detected in which the AI solution can only provide outcomes with high uncertainty, in order to allow for appropriate countermeasures to be taken on the system level to improve the overall safety. Such situations may include settings where lighting conditions make falsely detecting a signal for the right of way much more likely. On the other hand, evidence on satisfying the safety target obtained from testing strongly relies on assumptions regarding the target application scope; if the AI solution is applied in a different setting or relevant characteristics of the application change, this evidence is no longer valid. Therefore, safety measures have to be taken during operation to detect such deviation between the target application scope and the actual application scope.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Discussion</head><p>We proposed a strategy for arguing the safety of an AI-based safety function combining two risk acceptance criteria. The structure can help to come up with a sound argument but there are ways of how one could attack this argument. A possible attack on the ALARP argument is that the body of knowledge concerning the effectiveness and the best combinations of measures is not mature enough. A possible attack on the quantitative claim based on PRB or MEM is that there is not enough practical experience and empirical evidence. A possible response to this is to collect data during operation and to use market monitoring to strengthen the argument. This approach is described already by the Safety Performance Indicator <ref type="bibr" target="#b10">[Koopman and Wagner, 2019]</ref> or GQM + Strategies  [Basili et al., 2010] but it needs to be tailored to the focused argument for AI. By evaluating the reasoning with data, a mature body of knowledge can be developed over time and reflected in safety standards for AI.</p><p>Considering standardization, we see three options for using ACs. The first is to demand in a safety standard the development of an AC for the considered product. The second is to describe in product-or domain-specific safety standards a generic AC that shall be instantiated. The third is to develop a product-or domain-specific AC and use this AC to develop a checklist-based safety standard where safety measures are chosen depending on the specific criticality/integrity level.</p><p>Considering certification, we see two main aspects. The first is that the AC needs to comply with the standard describing what the AC should look like. The second and more important aspect is that the AC itself needs to be sound, so that it can be accepted by the certification body. The challenge here is that the review of the AC becomes easily more elaborative than a checklist-based approach, meaning the certification body needs much greater expertise. Furthermore, the certification body can no longer give up responsibility for the safety of the system by saying that it is only responsible for compliance with standards but not for system safety. However, this aspect is not specific for AI and is generally true for the certification of complex systems by means of ACs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>We conclude that ACs have the potential to justify the usage of AI in safety-critical systems. A prerequisite is, however, that they argue that risks are as low as reasonably practicable (ALARP) and that a reasonable target based on a quantitative risk acceptance criterion has been chosen and is fulfilled. We presented the first approach for explicitly augmenting the achievement of these complementary objectives for AI.</p><p>We also see the potential of the proposed structure for traditional software as it would enforce claims about the effectiveness of safety measures. It would put into question whether one is really following the ALARP principle when choosing safety measures according to recommendations given by safety standards. It would also raise the question of how effective software safety measures are and call for empirical evidences about their effectiveness.</p><p>Last but not least, we advocate that the concept of ACs from the safety community should be carried over to the AI community. In particular, researchers with a background in empirical studies and data quality need to be involved in the development and review of AI-related ACs.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Building blocks and general structure of an AC</figDesc><graphic coords="2,313.60,542.15,243.00,123.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Implications of considering two risk acceptance criteria</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: AI lifecycle phases with mapping to risk criteria</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>lifecycle with measures to assure appropriate data with quality assurance measures (founded on appropriate datasets) Strategy to argue completeness of refinement</head><label></label><figDesc></figDesc><table><row><cell>Top level AI-related claim</cell><cell>Sufficiently safe</cell><cell></cell></row><row><cell>Top level</cell><cell>Argue about a</cell><cell></cell></row><row><cell>AI-related strategy</cell><cell>combination of risk</cell><cell></cell></row><row><cell></cell><cell>acceptance criteria</cell><cell></cell></row><row><cell cols="3">Specification AI lifecycle phases Claims making risk acceptance criteria explicit Data Target is Construction Analysis Testing Operation Safety risk is as low as reasonable practicable Quantitative safety target is satisfied Argue about relevant lifecycle phases Argue about relevant lifecycle phases Training Data Analysis Data Test Data derived from PRB or MEM</cell></row><row><cell>Training Data</cell><cell>Analysis Data</cell><cell>Test Data</cell></row><row><cell>Lifecycle</cell><cell>Lifecycle</cell><cell>Lifecycle</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>Parts of this work have been funded by the Observatory for Artificial Intelligence in Work and Society (KIO) of the Denkfabrik Digitale Arbeitsgesellschaft in the project "KI Testing &amp; Auditing". We would also like to thank Sonnhild Namingha for an initial review of this paper.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">Llp</forename><surname>Adelard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Adler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">N</forename><surname>Akram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Feth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gerber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Jedlitschka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jöckel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kläs</surname></persName>
		</author>
		<author>
			<persName><surname>Schneider</surname></persName>
		</author>
		<ptr target="https://arxiv.org/abs/1909.03036" />
		<title level="m">Hardening of Artificial Neural Networks for Use in Safety-Critical Applications -A Mapping Study</title>
				<imprint>
			<date type="published" when="2019">2021. 2021. 10 May 2021. 2019. 2019</date>
		</imprint>
	</monogr>
	<note>Adelard LLP. CAE FRAMEWORK</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Assuring the Machine Learning Lifecycle: Desiderata, Methods, and Challenges</title>
		<author>
			<persName><surname>Ashmore</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ACM Computing Surveys</title>
				<imprint>
			<date type="published" when="2010">2019. 2019. 2010. 2010</date>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="57" to="65" />
		</imprint>
	</monogr>
	<note>Linking Software Development and Business Strategy Through Measurement</note>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title/>
		<author>
			<persName><surname>Bsi</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<publisher>Towards Auditable AI Systems</publisher>
		</imprint>
		<respStmt>
			<orgName>BSI</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><surname>Din</surname></persName>
		</author>
		<title level="m">DIN EN ISO 3691-1:2017 -Industrial trucks -Safety requirements and verification</title>
				<imprint>
			<date type="published" when="2017">2017. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Assuring the Safety of Machine Learning for Pedestrian Detection at Crossings</title>
		<author>
			<persName><forename type="first">M</forename><surname>Felderer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ramler</surname></persName>
		</author>
		<author>
			<persName><surname>Gauerhof</surname></persName>
		</author>
		<ptr target="https://ec.eu-ropa.eu/newsroom/dae/redirection/item/709090" />
	</analytic>
	<monogr>
		<title level="m">Software Quality: Future Perspectives on Software Engineering Quality</title>
				<editor>
			<persName><forename type="first">Ramler</forename><surname>Felderer</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2021. 2021. 2021. 2021. 2020. 2020</date>
			<biblScope unit="page" from="197" to="212" />
		</imprint>
	</monogr>
	<note>Proc. of SAFECOMP 2020</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Structuring Validation Targets of a Machine Learning Function Applied to Automated Driving</title>
		<author>
			<persName><surname>Gauerhof</surname></persName>
		</author>
		<idno>IEC 61508-5:2010 -</idno>
	</analytic>
	<monogr>
		<title level="m">Functional Safety of Electrical/Electronic/Programmable Electronic Safety-related Systems</title>
				<editor>
			<persName><forename type="first">R</forename><surname>Hawkins</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Paterson</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Picardi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Jia</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Calinescu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>Habli</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2010">2018. 2018. 2021. 2021. 2021. 2021. 2021. 2010</date>
			<biblScope unit="page" from="45" to="58" />
		</imprint>
	</monogr>
	<note>Guidance on the Assurance of Machine Learning in Autonomous Systems (AMLAS)</note>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<idno>ISO/TR 4804:2020</idno>
		<title level="m">-Road vehicles -Safety and cybersecurity for automated driving systems -Design, verification and validation</title>
				<imprint>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><surname>Iso/Iec</surname></persName>
		</author>
		<title level="m">ISO/IEC AWI TR 5469 -Artificial intelligence -Functional safety and AI systems</title>
				<imprint>
			<date type="published" when="2021">2021. 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<idno>ISO/IEC/IEEE 15026-1:2019 -</idno>
		<title level="m">Systems and software engineering -Systems and software assurance -Part 1: Concepts and vocabulary</title>
				<imprint>
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
	<note>ISO/IEC</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Uncertainty Wrappers for Data-Driven Models</title>
		<author>
			<persName><forename type="first">Sembach</forename><surname>Kläs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kläs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sembach</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of SAFECOMP 2019</title>
				<meeting>of SAFECOMP 2019</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="358" to="364" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A Comprehensive Code-Based Quality Model for Embedded Systems: Systematic Development and Validation by Industrial Projects</title>
		<author>
			<persName><surname>Kläs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">;</forename><forename type="middle">M</forename><surname>Vollmer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Kläs</surname></persName>
		</author>
		<author>
			<persName><surname>Vollmer</surname></persName>
		</author>
		<author>
			<persName><surname>Mayr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of SAFECOMP 2020 Workshops</title>
				<meeting>of SAFECOMP 2020 Workshops<address><addrLine>OMG</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012">2018. 2019. 2012. 2012. 2020. 2019. 2019. 2019. 2019</date>
			<biblScope unit="page" from="165" to="179" />
		</imprint>
	</monogr>
	<note>Proc. of SAFECOMP 2019</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Assurance Argument Patterns and Processes for Machine Learning in Safety-Related Systems</title>
		<author>
			<persName><surname>Picardi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of SafeAI 2020</title>
				<meeting>of SafeAI 2020</meeting>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="23" to="30" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">2 Killed in Driverless Tesla Car Crash, Officials Say</title>
		<author>
			<persName><forename type="first">;</forename><forename type="middle">B</forename><surname>Pietsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">;</forename><forename type="middle">R</forename><surname>Pietsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Salay</surname></persName>
		</author>
		<author>
			<persName><surname>Czarnecki</surname></persName>
		</author>
		<ptr target="https://arxiv.org/abs/1808.01614" />
	</analytic>
	<monogr>
		<title level="m">Using Machine Learning Safely in Automotive Software: An Assessment and Adaption of Software Process Requirements in ISO 26262</title>
				<editor>
			<persName><forename type="first">Czarnecki</forename><surname>Salay</surname></persName>
		</editor>
		<meeting><address><addrLine>The New York Times</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2021. 2021. 2018. 2018. 2018. 2018</date>
		</imprint>
		<respStmt>
			<orgName>SCSC</orgName>
		</respStmt>
	</monogr>
	<note>Safety-Critical Systems Club. GSN Community Standard Version 2 Draft 1</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Structuring the Safety Argumentation for Deep Neural Network Based Perception in Automotive Applications</title>
		<author>
			<persName><surname>Sämann</surname></persName>
		</author>
		<ptr target="https://arxiv.org/abs/2002.08935" />
	</analytic>
	<monogr>
		<title level="m">Proc. of SAFECOMP 2020</title>
				<meeting>of SAFECOMP 2020</meeting>
		<imprint>
			<date type="published" when="2020">2020. 2020. 2020. 2020</date>
			<biblScope unit="page" from="383" to="394" />
		</imprint>
	</monogr>
	<note>Strategy to Increase the Safety of a DNN-based Perception for HAD Systems</note>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A Survey on Methods for the Safety Assurance of Machine Learning Based Systems</title>
		<author>
			<persName><forename type="first">Schels</forename><surname>Schwalbe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Schwalbe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Schels</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of European Congress on Embedded Real Time Software and Systems</title>
				<meeting>of European Congress on Embedded Real Time Software and Systems</meeting>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Strategies for Safety Goal Decomposition for Neural Networks</title>
		<author>
			<persName><forename type="first">Schels</forename><surname>Schwalbe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Schwalbe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Schels</surname></persName>
		</author>
		<author>
			<persName><surname>Siebert</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Construction of a Quality Model for Machine Learning Systems, Software Quality Journal</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Heidrich</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Trendowicz</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Nakamichi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>Ohashi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Namba</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Yamamoto</surname></persName>
		</editor>
		<editor>
			<persName><surname>Aoyama</surname></persName>
		</editor>
		<imprint>
			<publisher>Special Issue Information Systems Quality</publisher>
			<date type="published" when="2019">2019. 2020. 2021. 2021</date>
		</imprint>
	</monogr>
	<note>Proc. of ACM Computer Science in Cars Symposium</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Safety Concerns and Mitigation Approaches Regarding the Use of Deep Learning in Safety-Critical Perception Tasks</title>
		<author>
			<persName><surname>Ul ; Wakabayashi ; Willers</surname></persName>
		</author>
		<idno>VDE-AR-E 2842-61-1:2020-07 -</idno>
		<ptr target="https://ul.org/UL4600" />
	</analytic>
	<monogr>
		<title level="m">Underwriters Laboratories. Presenting the Standard for Safety for the Evaluation of Autonomous Vehicles and Other Products</title>
				<meeting><address><addrLine>The New York Times</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2021. 10 May 2021. 2020. 2020. 2018. 2018. 2020. 2020</date>
			<biblScope unit="page" from="336" to="350" />
		</imprint>
	</monogr>
	<note>Proc. of SAFECOMP 2020</note>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A Safety Case Pattern for Systems with Machine Learning Components</title>
		<author>
			<persName><surname>Wozniak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of SAFECOMP</title>
				<meeting>of SAFECOMP</meeting>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><surname>Zenzic</surname></persName>
		</author>
		<idno>- 2.0-final</idno>
		<ptr target="https://zenzic.io/reports-and-resources/safety-case-framework/" />
		<title level="m">Zenzic-UK Ltd. Zenzic</title>
				<imprint>
			<date type="published" when="2020-05-10">2020. 2020. 10 May 2021</date>
		</imprint>
	</monogr>
	<note type="report_type">Safety-Framework-Report</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
