<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>These authors contributed equally.
$ alfio.ferrara@unimi.it (A. Ferrara); sergio.picascia@unimi.it (S. Picascia); elisabetta.rocchetti@unimi.it
(E. Rocchetti)</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>A Discussion on Open Issues Regarding Human Value Detection in Arguments</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alfio Ferrara</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergio Picascia</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elisabetta Rocchetti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Università degli Studi di Milano, Department of Computer Science</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Human value detection consists in extracting human values from textual data. Being this a complex problem, the Semantic Evaluation 2023 workshop has dedicated one shared task, namely Task 4, to collect contributions and ideas on how to solve human value detection in arguments. This shared task has been organized as a challenge involving multiple teams, each of which have submitted an original solution. In this discussion paper, we present our team submission, reporting the system architecture employed and its performances1. By participating in SemEval 2023 Task 4, we noticed that none of the submitted solutions provide satisfying performances, hence we argue this task can still be considered an open issue. Therefore, we share the dificulties we experienced while trying to extract human values from arguments, and we provide a deep discussion on the types of error systems can make in this setting.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;natural language processing</kwd>
        <kwd>human value detection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        We should prohibit school prayer
against
it should be allowed if the student wants to pray as long as it is not interfering with his classes
[1, 1, 0, 0, . . . , 0, 1, 0, 0, . . . , 1, 0, 0, 0]
respective premise and stance. The target of classification is formulated as a vector  = [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ]20
indicating the presence/absence of a value in an argument.
      </p>
      <p>
        The main dataset is taken from the work by [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], which has 8865 instances; this data is divided
in: training set, main validation set and main test set. For validating the robustness of approaches,
there is an additional labeled collection including 100 arguments from the recommendation and
hotlist section of the Chinese question-answering website Zhihu. Lastly, 279 arguments from the
Nahj al-Balagha and 80 arguments from the New York Times articles related to the Coronavirus
are made available as extra test sets. Additionally to these datasets, a value taxonomy is available
in json format: this file contains all value categories and their respective values described
through sample sentences (see Listing 1 for an example).
{‘‘Self-direction: thought’’:{
‘‘Be creative’’:[‘‘allowing for more creativity or imagination’’,‘‘being more
creative’’, ...], ...}, ...}
      </p>
      <p>Listing 1: Value taxonomy example from json file.</p>
      <p>Our contribution to SemEval Task 4 is an explainable value classification approach called
SuperASKE: in this paper, we report the results achieved by our approach, discussing about its
performances and providing a detailed error analysis. Furthermore, we want to open a discussion
about complications and specificities characterizing human value detection. We argue that this
task’s complexity is highly related to the nature of the target of classification, namely values
categories, which can be considered as implicit information conveyed in arguments. Moreover,
it is important to point out that recognizing values in texts is not a trivial task also for human
beings.</p>
      <p>This work is structured as follows: Section 2 gathers the relevant literature about human
values and zero-shot learning classification systems; Section 3 gives details about the proposed
system, SuperASKE, and the experimental settings we implemented for SemEval 2023 Task 4
submission; error analysis and discussion can be found in Section 5.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>In this section we provide a brief background on human values definitions and schemes;
moreover, we show some works done in the context of zero-shot learning (ZLS), which is the
technique employed by our system SuperASKE to predict values from arguments.</p>
      <sec id="sec-2-1">
        <title>2.1. Human Values</title>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Zero-Shot Learning</title>
        <p>
          ZSL is a problem setup in the field of machine learning, where a classifier is required to predict
labels of examples extracted from classes that were never observed in the training phase. It was
ifrstly referred to as dataless classification in 2008 [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] and has quickly become a subject of interest,
particularly in the field of natural language processing. The great advantage of this approach
consists in the resulting classifier being able to operate eficiently in a partially or totally
unlabeled environment. According to [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], ZSL approaches can be classified according to three
diferent criteria: the learning setting, the semantic space and the method. Firstly, the learning
setting regards the nature of the analyzed dataset, which can be completely unlabeled, as in the
original paper [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], or partially labeled like in [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]; with this last approach, called generalized
ZSL, the classifier has to be capable of discriminating between observation of already seen
classes and examples of unseen ones. Secondly, the semantic space can be engineered or learned:
the former, designed by humans, can be constructed over a set of attributes [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] or a collection
of keywords [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], while the latter is built on top of the results of a machine learning model, as
in the case of a text-embedding space [13]. Finally, ZSL methods can be divided in
instancebased [14], whose focus is on obtaining examples for unseen classes, and classifier-based [ 15],
which instead aim at building a classifier for unlabeled instances.
        </p>
        <p>ASKE [16] (Automated System for Knowledge Extraction) is our framework exploiting ZSL
techniques and context-aware embeddings to extract semi-structured knowledge from textual
corpora and collecting it in a graph-based data structure, called ASKE Conceptual Graph (ACG),
whose nodes represent three kind of entities: document chunks  (portions of the original
documents), terms  (n-grams find in the document chunks), and concepts  (cluster of terms).</p>
        <p>One of the components in ASKE is the embedding model used for computing the vectorial
representations of the member of the ACG. In particular, we choose Sentence-BERT [17], a
modification of BERT [ 18], that is specifically aimed at representing sentence meaning in a
vector space. The model is capable of capturing the semantic aspect of the embedded tokens,
since it computes context-aware embeddings which, in contrast with global ones, take into
consideration the whole chunk of text in which they are used.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. System Overview</title>
      <p>The framework we propose for detecting human values, namely SuperASKE (Figure 2), is a
concatenation of ASKE and Random Forest [19] with the output of the former being employed
as input for the latter. Every instance of this framework is tailored on a single human value,
meaning that it solves a binary classification task. The main advantage of SuperASKE is the
presence of two explainable models: in ASKE, concepts are described by the terms that compose
them with the corresponding definitions; in the RF model, the same concepts are treated as
feature, and the importance of each of them in the trees can be computed. This allows to identify
which are the most influential concepts and how much they afect the final predictions.</p>
      <p>Despite ASKE being a completely unsupervised model, running in a zero-shot setting, its
lfexibility gives us the chance of proposing it in its supervised version tuned for classification.
First of all, we proceed fine-tuning the sentence embedding model employed for computing
the vector representation of the ACG entities (all-MiniLM-L6-v21). Being based on a siamese
architecture, the model is fine-tuned by providing a pair of sentences and their corresponding
semantic similarity. Therefore, we retrieve all the premises from the training set, and all the
descriptions of the human values provided by the task organizers: if a premise  is classified
with a certain human value , all the possible pairs of  and the descriptions of  are given to the
model with a similarity score of 1, otherwise the similarity is set to 0. The fine-tuned embedding
model is then employed to compute the vector representation of the initial ACG components.
Each human value  is associated with its SuperASKE instance; within each SuperASKE instance,
the ASKE component is initialized with only one concept, representing the respective human
1Model available at https://huggingface.co/sentence-transformers/all-MiniLM-L6-v2
value , associated with some dummy terms, having as definitions the ones provided in the
value taxonomy. As document chunks , we consider only the premise of each argument,
excluding stances and conclusions which appeared to not benefit to the final results. Afterwards,
to ‘train’ ASKE, we run only on the premises positively classified as : in such a way, we ensure
that the knowledge extracted by SuperASKE is relevant to the human value analyzed. Then, the
‘learned’ ACG is exploited to compute the similarities between the concepts occurring in it and
the whole set of premises, now also including the ones negatively classified. The RF model is
employed for the final binary classification. The matrix of similarities × , with  = ||
and  = ||, is provided as input for the model, together with the ground truth  , determining
if a premise is classified or not with a given human value. The trained RF model generates the
ifnal predictions ˆ .</p>
      <p>premises</p>
      <sec id="sec-3-1">
        <title>ASKE</title>
      </sec>
      <sec id="sec-3-2">
        <title>Random Forest predictions features</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Experiments</title>
      <p>For each human value , we retrieve only the set of premises classified as  and we run diferent
configurations of SuperASKE, changing the hyperparameters  ,  and , with  ∈ {− 1, ..., 0.5}
being the similarity threshold for the zero-shot classification phase,  ∈ {− 1, ..., 0.5} being
the similarity threshold for the terminology enrichment phase, and  ∈ {0, ..., 8} being the
number of generations, i.e. the number of ASKE cycles performed. Each configuration learns
a diferent version of the ACG, with its peculiar concepts and assigned terms. The diferent
ACGs are then employed for computing the similarities between each premise in the entire
dataset, considering also the one not classified as , and each concept occurring in the ACG.
These similarities are used as input for the RF model, trained in order to predict the correct
label for each premise w.r.t. the human value .</p>
      <p>Based on the performances of the RF model on the validation set, we pick the best
conifguration of hyperparameters for both the models of SuperASKE, ASKE and RF. We then
proceed repeating the same steps for each human value, training 20 diferent binary classifiers.
Evaluation is performed in two ways: using F1, precision and recall measures for each class
independently and computing macro-averages over all categories. Oficial evaluations have
been done on the TIRA platform [20].</p>
      <sec id="sec-4-1">
        <title>4.1. Results</title>
        <p>F1 is placed near the median for the majority of the value categories. Though, this behaviour
has some exceptions: “Self-direction: thought” and “Hedonism” F1 scores are in the first quartile,
whereas “Power: resources”, “Stimulation” and “Humility” F1 scores are in the fourth quartile.
Considering precision and recall it can be noticed that our model is, on average, less precise
than the median precision score; however, SuperASKE has a higher recall, on average, than the
median recall score.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>Frequency-performance correlation. There is a positive correlation between models
performance and value categories frequencies in datasets. Considering our model, the correlation
ranges from a Pearson statistic of 0.51 with a pvalue of 0.019 (measured on the test-nahjalbalagha
dataset), to a Pearson statistics of 0.72 with a pvalue of 0.00 (measured on the main test dataset).
In this perspective, it is curious to see such a high F1 score for “Universalism: nature”. It can be
hypothesized that this value category has a specific vocabulary, thus when nature-related words
appear it is easier to guess the right class, both for humans and for automated models. Examples
of words contained in “Universalism: nature” arguments are: “whaling”, “zoos”, “farming”,
“human cloning”, “nuclear weapons”.</p>
      <p>Confusion matrices. Our model’s recall is in the third quartile for most distributions (Figure
4): this information can be obtained also through the inspection of confusion matrices for
each value category (see Table 3). As a symptom of this behaviour, it can be noticed that false
positives frequencies tend to be higher than false negative frequencies. Furthermore, extracting
some instances evaluated either as false positives or false negatives in the training set, it is
possible to qualitatively categorize the type of error made by SuperASKE. Let’s consider the
following argument, followed by its true positive and false positive values:</p>
      <p>ID: E04080
Conclusion: We need an inclusive and pluralistic European society.</p>
      <p>Stance: in favor of
Premise: There need to be some rules for integration:Integration does not mean giving up
European values and culture.</p>
      <p>TP: Tradition</p>
      <p>FP: Security: personal, Security: societal, Conformity: rules, Universalism: concern
In this argument the main topic discussed is integration for immigrants. Some false positive
value categories cannot be associated with this instance, but there could be two exceptions:
actually, “Conformity: rules” could be associated with “rules for integration”, and “Universalism:
concern” is about equality, which is a prerogative for integration measures. “Security: personal”
and “Security: societal” are somewhat connected to immigration, but they are not directly
involved in this argument. There are many other examples for which false positive value
categories could make sense with the respective premises. This fact highlights how subjective
and dificult is to label arguments with human values, thus training NLP models on this type of
data leads to predictions for which it is hard to estimate a precise error measure. This problem
arises also for true positive values which could be interpreted as false positives depending on
the human annotator.</p>
      <p>Value categories correlations. Comparing values categories correlations found in the
ground truth and in the predicted labels, it is possible to study if and how SuperASKE learns
correspondences among values. SuperASKE finds a higher number of correlated value-pairs
than what is actually existing in the ground truth (7 pairs in predictions versus 3 pairs in true
labels); moreover, correlations found in SuperASKE predictions are stronger than what can be
seen in the ground truth (e.g. “Stimulation” and “Hedonism”).</p>
      <p>Confounded value categories pairs. Pointing out which value categories are confounded
the most with other classes can further explain why SuperASKE produces errors. With the term
“confounded” we mean that a value category  is false negative for an instance having another
value category  as false positive. However, as a matter of fact, there are not many instances for
which SuperASKE confounds between value categories. In particular, the most confounded value
categories for each dataset are: “Conformity interpersonal” and “Face” counting 9 confounded
arguments in the validation set; “Face” and “Power: resources” having 13 confounded arguments
in the training set. In the following we provide an example of confounding between “Power:
resources” and “Face”.</p>
      <p>ID: A07097
Conclusion: We should ban whaling
Stance: against
Premise: whaling is an important part of the diet, tradition and economies of many countries,
and it is not our place to dictate terms as outsiders to their culture.</p>
      <p>True label: Power: resources</p>
      <p>False label: Face
In this case, SuperASKE does not recognize the economical perspective of this argument; on the
other hand, “whaling” can also be considered as a threat to national public images, depending
on whether the opinion on this topic is positive or negative. This latter point of view could
ofer a valid explanation to why this (and many others) argument is predicted with “Face” value
category.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>In this paper we present our solution to human value detection task, focusing on discussing
issues about it. There are few points worth mentioning. First, we argue that a mechanism
detecting implicit knowledge is needed. Personal human values could lead us to express a
specific opinion about a discussed topic: however, arguments do not always embed the values or
beliefs causing the stated opinion. For succeeding in solving tasks like human value detection,
one must be able to extract causation paths linking implicit knowledge to expressed message.
Second, one potential pitfall resides in the annotation procedure. Datasets used to train models
are manually annotated. The problem arising here is that detecting human values in arguments is
challenging also for humans. This leads to subjective annotations, which make the ground truth
less reliable, and a lower-quality training procedure. We argue that a perspectivist approach in
ground truthing would help modeling the subjectivity: this could translate into describing, in
probability terms, if a certain value could be considered a ground truth label for an argument.</p>
      <p>In conclusion, many improvements can be done to get closer and closer to achieving a good
solution for human value detection. For instance, trying to map arguments to value categories
though value categories descriptions could improve performances. Indeed, aligning value
categories and argument terminology could help language models to produce better predictions.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>⋆⋆⋆⋆⋆⋆⋆⋆⋆⋆⋆⋆ This project has received funding from the EU Horizon 2020 research and innovation
programme under grant agreement No 101004949. This document reflects only the author’s
view and the European Commission is not responsible for any use that may be made of the
information it contains.
[13] Y. Xian, Z. Akata, G. Sharma, Q. Nguyen, M. Hein, B. Schiele, Latent embeddings for
zero-shot classification, in: Proceedings of the IEEE conference on computer vision and
pattern recognition, 2016, pp. 69–77.
[14] X. Xu, T. Hospedales, S. Gong, Transductive zero-shot action recognition by word-vector
embedding, International Journal of Computer Vision 123 (2017) 309–333.
[15] A. Frome, G. S. Corrado, J. Shlens, S. Bengio, J. Dean, M. Ranzato, T. Mikolov, Devise:
A deep visual-semantic embedding model, Advances in neural information processing
systems 26 (2013).
[16] A. Ferrara, S. Picascia, D. Riva, Context-aware knowledge extraction from legal documents
through zero-shot classification, in: Advances in Conceptual Modeling: ER 2022
Workshops, CMLS, EmpER, and JUSMOD, Hyderabad, India, October 17–20, 2022, Proceedings,
Springer, 2023, pp. 81–90.
[17] N. Reimers, I. Gurevych, Sentence-bert: Sentence embeddings using siamese bert-networks,
arXiv preprint arXiv:1908.10084 (2019).
[18] J. Devlin, M.-W. Chang, K. Lee, K. Toutanova, Bert: Pre-training of deep bidirectional
transformers for language understanding, arXiv preprint arXiv:1810.04805 (2018).
[19] L. Breiman, Machine Learning 45 (2001) 5–32. doi:10.1023/a:1010933404324.
[20] M. Fröbe, M. Wiegmann, N. Kolyada, B. Grahm, T. Elstner, F. Loebe, M. Hagen, B. Stein,
M. Potthast, Continuous Integration for Reproducible Shared Tasks with TIRA.io, in:
Advances in Information Retrieval. 45th European Conference on IR Research (ECIR 2023),
Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York, 2023.
A. Additional pictures and tables
t
h
g
u
o
h
t
:
n
o
i
t
c
e
r
i
d
f
l
e
S
n
:iiil-ttfrcceeSaoodn iilttSaounm iseodnHm itceeevnhAm :irceeaoodPnnwm :ssrrrceeeoouPw ceaF :iltsrrceeSaoypun :iilttsrcceeSaoyu
l
a
n
o
s
r
iitraodn :iltfsrreooyunm :iittfrreeooypnnm iiltyum :ilrcceeeeagvonnn
T C C H B
y
t
i
l
i
b
a
d
n
e
p
e
d
:
e
c
n
e
l
o
v
e
n
e
B</p>
      <p>y
:rcceonn :treaun :ltrceeaon :jiittcevbo
iilssreavnm iilssreavnm iilssreavnm iilssreavnm
U U U U
Test set / Approach All</p>
      <p>TP
1131
1204
1315
1255
1392
1392
1432
1517
1643
1614
1663
1712
1716
1726
1768
1764
1679
1755
1728
1771</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kiesel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Alshomary</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Handke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Cai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wachsmuth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <article-title>Identifying the Human Values behind Arguments</article-title>
          , in: S. Muresan,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nakov</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Villavicencio (Eds.),
          <article-title>60th Annual Meeting of the Association for Computational Linguistics (ACL</article-title>
          <year>2022</year>
          ), Association for Computational Linguistics,
          <year>2022</year>
          , pp.
          <fpage>4459</fpage>
          -
          <lpage>4471</lpage>
          . doi:
          <volume>10</volume>
          .18653/v1/
          <year>2022</year>
          .
          <article-title>acl-long</article-title>
          .
          <volume>306</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>N.</given-names>
            <surname>Mirzakhmedova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kiesel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Alshomary</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Heinrich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Handke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Cai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Valentin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Dastgheib</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ghahroodi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sadraei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Asgari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kawaletz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wachsmuth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <article-title>The Touché23-ValueEval Dataset for Identifying Human Values behind Arguments</article-title>
          ,
          <source>CoRR abs/2301</source>
          .13771 (
          <year>2023</year>
          ). URL: https://arxiv.org/abs/2301.13771. doi:
          <volume>10</volume>
          .48550/ARXIV. 2301.13771.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Schwartz</surname>
          </string-name>
          ,
          <article-title>Are there universal aspects in the structure and contents of human values?</article-title>
          ,
          <source>Journal of Social Issues</source>
          <volume>50</volume>
          (
          <year>1994</year>
          )
          <fpage>19</fpage>
          -
          <lpage>45</lpage>
          . doi:https://doi.org/10.1111/j. 1540-
          <fpage>4560</fpage>
          .
          <year>1994</year>
          .tb01196.x.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Schwartz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cieciuch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vecchione</surname>
          </string-name>
          , E. Davidov,
          <string-name>
            <given-names>R.</given-names>
            <surname>Fischer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Beierlein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ramos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Verkasalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-E.</given-names>
            <surname>Lönnqvist</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Demirutku</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
          <article-title>dirilen gumus, M. Konty, Refining the theory of basic individual values</article-title>
          ,
          <source>Journal of Personality and Social Psychology</source>
          <volume>103</volume>
          (
          <year>2012</year>
          )
          <fpage>663</fpage>
          -
          <lpage>88</lpage>
          . doi:
          <volume>10</volume>
          .1037/a0029393.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rokeach</surname>
          </string-name>
          ,
          <article-title>The nature of human values</article-title>
          ., New York, Free Press (
          <year>1973</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Brown</surname>
          </string-name>
          , R. K. Crace,
          <article-title>Life values inventory facilitator's guide (</article-title>
          <year>2002</year>
          ). URL: https://www.lifevaluesinventory.org/LifeValuesInventory.org%
          <fpage>20</fpage>
          -%
          <source>20Facilitators% 20Guide%20Sample.pdf.</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>H. C.</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. R.</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. A.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. C.</given-names>
            ,
            <surname>K. K.</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.-M. J.</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Lagos</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Norris</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Ponarin</surname>
            ,
            <given-names>B. P</given-names>
          </string-name>
          . (eds.), World Values Survey:
          <string-name>
            <surname>Round Seven - Country-Pooled Datafile</surname>
          </string-name>
          (
          <year>2020</year>
          ). URL: https://www. worldvaluessurvey.org/WVSDocumentationWV7.jsp.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.-W.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.-A.</given-names>
            <surname>Ratinov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Roth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Srikumar</surname>
          </string-name>
          ,
          <article-title>Importance of semantic representation: Dataless classification</article-title>
          ., in: Aaai, volume
          <volume>2</volume>
          ,
          <string-name>
            <surname>Citeseer</surname>
          </string-name>
          ,
          <year>2008</year>
          , pp.
          <fpage>830</fpage>
          -
          <lpage>835</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Miao</surname>
          </string-name>
          ,
          <article-title>A survey of zero-shot learning: Settings, methods, and applications</article-title>
          ,
          <source>ACM Transactions on Intelligent Systems and Technology (TIST) 10</source>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. H.</given-names>
            <surname>Lampert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Schiele</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Akata</surname>
          </string-name>
          ,
          <article-title>Zero-shot learning-a comprehensive evaluation of the good, the bad and the ugly</article-title>
          ,
          <source>IEEE transactions on pattern analysis and machine intelligence</source>
          <volume>41</volume>
          (
          <year>2018</year>
          )
          <fpage>2251</fpage>
          -
          <lpage>2265</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C. H.</given-names>
            <surname>Lampert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Nickisch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Harmeling</surname>
          </string-name>
          ,
          <article-title>Learning to detect unseen object classes by between-class attribute transfer</article-title>
          , in: 2009 IEEE conference
          <article-title>on computer vision and pattern recognition</article-title>
          , IEEE,
          <year>2009</year>
          , pp.
          <fpage>951</fpage>
          -
          <lpage>958</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Qiao</surname>
          </string-name>
          , L. Liu,
          <string-name>
            <given-names>C.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. Van Den Hengel</surname>
          </string-name>
          ,
          <article-title>Less is more: zero-shot learning from online textual documents with noise suppression</article-title>
          ,
          <source>in: Proceedings of the IEEE conference on computer vision and pattern recognition</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>2249</fpage>
          -
          <lpage>2257</lpage>
          . Value Security:
          <article-title>personal Universalism: concern Achievement Benevolence: caring Security: societal Self-direction: action Conformity: rules Universalism: objectivity Self-direction: thought Benevolence: dependability Universalism: tolerance Power: dominance Tradition Power: resources Universalism: nature Humility Face Stimulation Hedonism Conformity: interpersonal</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>