<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Simulating the Law in a Multi-Agent System</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Matteo</forename><surname>Cristani</surname></persName>
							<email>matteo.cristani@univr.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dept. of Computer Science</orgName>
								<orgName type="institution">University of Verona</orgName>
								<address>
									<settlement>Verona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff3">
								<orgName type="department">Dept. of Computer Science</orgName>
								<orgName type="institution">University of Verona</orgName>
								<address>
									<settlement>Verona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francesco</forename><surname>Olivieri</surname></persName>
							<email>francesco.olivieri.phd@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Independent researcher</orgName>
								<address>
									<settlement>Brisbane</settlement>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Guido</forename><surname>Governatori</surname></persName>
							<email>ggovernatori@csu.edu.au</email>
							<affiliation key="aff2">
								<orgName type="department">Artificial Intelligence and Cyber Futures Institute</orgName>
								<orgName type="institution">Charles Sturt University</orgName>
								<address>
									<settlement>Bathurst</settlement>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Gabriele</forename><surname>Buriola</surname></persName>
							<email>gabriele.buriola@univr.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dept. of Computer Science</orgName>
								<orgName type="institution">University of Verona</orgName>
								<address>
									<settlement>Verona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff3">
								<orgName type="department">Dept. of Computer Science</orgName>
								<orgName type="institution">University of Verona</orgName>
								<address>
									<settlement>Verona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Simulating the Law in a Multi-Agent System</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">55CA683539E54B79B1986631ADEEDC6E</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T18:12+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Defeasible Deontic Logic, Multiple Agent Systems, Law Simulation (G. Buriola) 0000-0001-5680-0080 (M. Cristani)</term>
					<term>0000-0003-0838-9850 (F. Olivieri)</term>
					<term>0000-0002-9878-2762 (G. Governatori)</term>
					<term>0000-0002-1612-0985 (G. Buriola)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this paper we define a Multiple Agent System able to simulate an artificial society to be paired with a normative background. The purpose of this architecture shall be the simulation of a law to devise its impact. We analise some existent architecture (GAMA) that has already been used for simulating MAS, with BDI agents. In fact, GAMA technology is insufficient to guarantee certain validity properties and actual computational effectiveness that could instead be provided if we manage the rule system to interpret Defeasible Deontic Logic, a logic framework that satisfies the aforementioned properties. As a first step of an experimental endeavour aiming at law simulation by design, we provide here a theoretical model of the MAS which simulates the society.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Simulating collective behaviour is a challenging topic of the recent past. There is a rising demand that emerges from a variety of contexts, including the production of legislation at broad, for the simulation paradigm can be useful for determining the actual effects of introducing a new norm on a given society. Therefore, the drafters, namely those people who are in charge of producing a norm, either when designing a new norm for the general population, or when providing a norm background on the actual domain of a restricted society (a company, an association) or again to govern direct multiparty relationships (as in contracts) consider helpful to apply the norms into a simulated society for evaluating the impact the new norm has.</p><p>We then need a method to describe a society, in a way that generates a cycle of multiple agent system evolution steps able to support the impact evaluation we mentioned above.</p><p>This concept is part of a series of investigation that are conducted with the purpose of developing a complex system for law evaluation in diverse point of the production process: by design (as in the current investigation), after the enforcement, in the application phase. The schema of the application system is illustrated in Figure <ref type="figure" target="#fig_0">1</ref>. There are essentially three phases of the application:</p><p>1. MAS Simulation -construction: a society is generated, possibly based on real-world data such as sociological evidence.</p><p>2. Normative background -specification: the existing normative background of the society simulated in Phase 1 is defined within an engine for Legal Reasoning, in particular, for the implementation of the aforementioned projects, we use the DDL reasoner Houdini <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>3. MAS Simulation -execution: the MAS system defined in Phase 1 is run, and it generates, technically, bunches of facts for a Deontic Defeasible Theory, implemented to devise the normative background, as described in Phase 2.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4.</head><p>Consequence generation -state of affairs: the DDL system generates the simulated effects of the applications of the Normative Background towards the MAS system. This changes the current state of affairs of the MAS.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>5.</head><p>Consequence generation -MAS configuration: the MAS system employs a negative feedback á la Rosenblueth, Wiener, Bigelow to resettle the MAS while configuring again the parameters in two levels of feedback layers:</p><p>• As a consequence of the normative changes, by modifying the behavioural parameters of the agents (for instance when an action which is permitted becomes forbidden the probability of individuals willing to do that action may decrease);</p><p>• As a consequence of the application of the law because some agents could have been punished, and therefore they may have been limited in their permits, or superimposed obligations and prohibitions they did not have before.</p><p>The above mentioned sequence is repeated in cycles with occasional events of actions performed in the MAS and rules changed in the normative background. Also we leave the evaluation part for further investigation.</p><p>A key aspect in modeling human behavior with respect to law compliance is given by the nondeterministic component of actions. The stochastic nature of reality shows up in at least two moments: the actual violation of a norm by a person and the chance that this violation is discovered and prosecuted by the authorities. The former phenomenon is formalized in the model we discuss here through an equation ( <ref type="formula" target="#formula_6">1</ref>) pairing together the expected utility from the violation of a norm, compared with the one relative to the respect of that norm, and the tendency to be compliance with the law, encoded in the model discussed in this paper by a non-negative real number. The latter would call for a probabilistic application of DDL rules and, given its non trivial formalization, is postponed to a further and more specific paper.</p><p>The research plan is therefore as follows:</p><p>• Build the theoretical model that is documented in the current paper.</p><p>• Implement it within an actual simulation system. In this case we have chosen to employ GAMA <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref> that has also been showed to adapt to the context of simulating ethically relevant behaviours <ref type="bibr" target="#b2">[3]</ref>.</p><p>• Develop an extension to the markup language GAML++ that expresses the aspects we discuss in this paper, and correspondingly extend GAMA to etGAMA in order to allow simulation of the law.</p><p>• Extend Houdini technology to allow law change specific management, as well as the utility functions we shall discuss in this paper.</p><p>• Build the whole system, where the communication components are managed via json/jquery components in order to align the current java implementation of both Gama and Houdini.</p><p>With this research plan in agenda, we now deal with the theoretical model, in the rest of this paper.</p><p>For what concerns the structure: Sec. 2 exposes the population model, in particular how it changes during time; Sec. 3 presents the salient characteristics which we focus on, such as age, gender and job; Sec. 4 is dedicated to model law compliance in this in vitro society; finally, Sec. 5 summarizes the whole paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Population model</head><p>In this section we provide the population model. First of all, for what concerns time, we adopt a discrete time 𝑇 starting with 𝑡 = 0 and indexed by natural numbers which may be interpreted as years. Let P be the countably infinite set of all the people who may, at some point, be part of the population model. At any moment, which in our discrete time means a specific year, the population of the model is given by a finite subset of P; the function 𝒫 : 𝑇 → 𝒫(P)<ref type="foot" target="#foot_0">1</ref> associates to every year 𝑡 a finite subset of P, the current population 𝒫(𝑡) in that year denoted by 𝒫 𝑡 . The starting population 𝒫 0 , as well as its characteristics, see Sec. 3, is given; whereas the population in 𝑡 + 1, i.e. 𝒫 𝑡+1 , depends on four factors: births, deaths, immigration and emigration. Births are given by a birth function 𝐵 : 𝑇 ∖ {0} → 𝒫(P) which, for every year 𝑡 except the first one, selects the finite subset of the new born denoted by 𝒫 0 𝑡 ; the function 𝐵 satisfies reasonable constraints related to births, in particular the following two: Deaths are modeled simply by the process that every person lives exactly 80 years. Thus, if 𝒫 80 𝑡 denotes the subset of 𝒫 𝑡 of people in their eighties, then moving from 𝒫 𝑡 to 𝒫 𝑡+1 we simply remove 𝒫 80 𝑡 ; see later regarding how age is encoded in the model. Immigration and emigration are treated similarly, namely we have two functions 𝐼𝑚 : 𝑇 → 𝒫(P) and 𝐸𝑚 : 𝑇 → 𝒫(P) selecting for every year 𝑡 who is immigrating, 𝐼𝑚 𝑡 , and who is emigrating, 𝐸𝑚 𝑡 . As before we have some constraints for these functions, in particular:</p><formula xml:id="formula_0">• if 𝑡 ̸ = 𝑡 ′ , then 𝐵(𝑡) ∩ 𝐵(𝑡 ′ ) = ∅, i.e.</formula><p>• 𝐸𝑚 𝑡+1 ⊆ 𝒫 𝑡 , only people in the current population can emigrate the next year;</p><p>• 𝐼𝑚 𝑡 ∩ 𝐸𝑚 𝑡 = ∅, a person can not immigrate and emigrate the same year.</p><p>Moreover, the immigrate function 𝐼𝑚 establishes also the age and the gender of the immigrates; namely, there are two functions 𝐼𝑚𝐴𝑔𝑒 : 𝐼𝑚 𝑡 → {1, . . . , 80} and 𝐼𝑚𝐺𝑒𝑛 : 𝐼𝑚 𝑡 → {𝑚𝑎𝑙𝑒, 𝑓 𝑒𝑚𝑎𝑙𝑒} assigning to each person in 𝐼𝑚 𝑡 its age and its gender, see below for more details.</p><p>All in all, with respect to 𝑇 population satisfies the following equation:</p><formula xml:id="formula_1">𝒫 𝑡+1 = (︀ 𝒫 𝑡 ∖ 𝒫 80 𝑡 ∖ 𝐸𝑚 𝑡+1 )︀ ∪ 𝒫 0 𝑡+1 ∪ 𝐼𝑚 𝑡+1 .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Individual Characteristics</head><p>Every person 𝑝 ∈ P has some individual characteristics, such as age, gender and so on. In this paper the following are considered:</p><p>1. Age: this is a natural number between 1 and 80.</p><p>2. Age status: there are three age status, young, adult, elderly depending on the age.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3.</head><p>Gender: this preliminary model has two genders male and female which are fixed from birth.</p><p>4. Marital status: there are three marital status, bachelor, married and divorced. <ref type="foot" target="#foot_1">2</ref>5. Job status: there are four job status, unemployed, public job, private job and retired.</p><p>6. Ethical tendency (also called in places inclination): there are three tendencies, legalist, neutral and opportunist; related to tendency there is also a parameter 𝛼, see later for more detail.</p><p>We see these characteristics as sets, e.g. Age= {1, 2, . . . , 80} and Age status= {𝑦𝑜𝑢𝑛𝑔, 𝑎𝑑𝑢𝑙𝑡, 𝑒𝑙𝑑𝑒𝑟𝑙𝑦}, presenting them one by one after some general considerations.</p><p>Excluding the ethical tendency, devoted to modeling law compliance, the other status have been chosen since they represent three of the main social categories producing common and widespread rights and duties, e.g. age for penal responsibility, as well as three of the main characteristics used in demographic and social studies.</p><p>Except from gender, all the status may change during time, thus each status depend on both the person 𝑝 ∈ 𝒫 𝑡 and the current year 𝑡 ∈ 𝑇 . Let ℒ = 𝐴𝑔𝑒 × 𝐴𝑔𝑒 𝑠𝑡𝑎𝑡𝑢𝑠 × 𝐺𝑒𝑛𝑑𝑒𝑟 × 𝑀 𝑎𝑟𝑖𝑡𝑎𝑙 𝑠𝑡𝑎𝑡𝑢𝑠 × 𝐽𝑜𝑏 𝑠𝑡𝑎𝑡𝑢𝑠 × 𝐸𝑡ℎ𝑖𝑐𝑎𝑙 𝑡𝑒𝑛𝑑𝑒𝑛𝑐𝑦 be the set of all possible status array, then for every year 𝑡 ∈ 𝑇 there is a function ℓ 𝑡 : 𝒫 𝑡 → ℒ which associates to each person their status. Moreover, ℓ has, as function, different components one for each status and, for sake of readability, the function determining each status is denoted with an abbreviation of the status itself; thus for a person 𝑝 and a given year 𝑡, ℓ 𝑡 (𝑝) = (𝐴𝑔𝑒 𝑡 (𝑝), 𝐴𝑔𝑒𝑆𝑡𝑎𝑡 𝑡 (𝑝), 𝐺𝑒𝑛𝑑𝑒𝑟(𝑝), 𝑀 𝑎𝑟𝑆𝑡𝑎𝑡 𝑡 (𝑝), 𝐽𝑜𝑏 𝑡 (𝑝), 𝐿𝑒𝑔𝑎𝑙 𝑡 (𝑝)). We consider now each status to present it showing how it may change during time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Age</head><p>The age function 𝐴𝑔𝑒 𝑡 : 𝒫 𝑡 → {1, . . . , 80} assigns to every person 𝑝 in the current population 𝒫 𝑡 its age 𝐴𝑔𝑒 𝑡 (𝑝). Obviously there is a strict connection between 𝐴𝑔𝑒 𝑡 and 𝐴𝑔𝑒 𝑡+1 , more precisely the latter as the following definition:</p><formula xml:id="formula_2">𝐴𝑔𝑒 𝑡+1 (𝑝) := ⎧ ⎪ ⎨ ⎪ ⎩ 1 if 𝑝 ∈ 𝒫 0 𝑡+1 , 𝐴𝑔𝑒 𝑡 (𝑝) + 1 if 𝑝 ∈ 𝒫 𝑡 , 𝐼𝑚𝐴𝑔𝑒 𝑡+1 (𝑝) if 𝑝 ∈ 𝐼𝑚 𝑡+1 .</formula><p>The age function 𝐴𝑔𝑒 0 : 𝒫 0 → {1, . . . , 80} for the starting population 𝒫 0 is given. For what concerns notation, given 1 ⩽ 𝑛 ⩽ 80, we denote</p><formula xml:id="formula_3">𝒫 𝑛 𝑡 := {𝑝 ∈ 𝒫 𝑡 | 𝐴𝑔𝑒 𝑡 (𝑝) = 𝑛}.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Age status</head><p>The age status for a person 𝑝 ∈ 𝒫 𝑡 depends only on the current age of 𝑝, more precisely:</p><formula xml:id="formula_4">𝐴𝑔𝑒𝑆𝑡𝑎𝑡 𝑡 (𝑝) := ⎧ ⎪ ⎨ ⎪ ⎩ 𝑦𝑜𝑢𝑛𝑔 if 1 ⩽ 𝐴𝑔𝑒 𝑡 (𝑝) ⩽ 20, 𝑎𝑑𝑢𝑙𝑡 if 21 ⩽ 𝐴𝑔𝑒 𝑡 (𝑝) ⩽ 60, 𝑒𝑙𝑑𝑒𝑟𝑙𝑦 if 61 ⩽ 𝐴𝑔𝑒 𝑡 (𝑝) ⩽ 80.</formula><p>We </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Gender</head><p>Since gender is fixed, it depends only on the initial conditions for the people in 𝒫 0 , on the birth gender function 𝐵𝑔𝑒𝑛 𝑡 for new born and on the immigrate gender function 𝐼𝑚𝐺𝑒𝑛 𝑡 for who immigrates.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Marital status</head><p>There are three marital status: bachelor, married, divorced. Young people, i.e. people for which the current age is less than 21, have only one marital status available, namely bachelor; thus 𝑀 𝑎𝑟𝑆𝑡𝑎𝑡 𝑡 (𝑝) = 𝑏𝑎𝑐ℎ𝑒𝑙𝑜𝑟 for all 𝑝 ∈ 𝒫 𝑦𝑜𝑢𝑛𝑔 𝑡 . In order to model during years the marital status, as well as the job status, for adults and elderly people (who may have other status beside bachelor) we use Markov chains; more precisely different Markov chains depending on the age status. Excepted for people who have just became adult, i.e. 21 year old people, who are automatically bachelor and people who have just became elderly, i.e. 61 year old people, who preserve the previous status, <ref type="foot" target="#foot_2">3</ref> the transitions between these status are given by a stochastic process with different probabilities for adults and elderly people. Denoting with 𝐵, 𝑀, 𝐷 being respectively bachelor, married and divorced and setting to 99%, 95%, 5%, 1% the probabilities involved (which have been arbitrary chosen for this paper but, being editable parameters, could be instantiated with real values coming from statistical investigations), the transition schemes for adults and elderly people are the following:</p><p>This means that if at time 𝑡 a 35-year adult is bachelor there is 95% chance that he is still bachelor at 𝑡 + 1 and a 5% chance that he got married. If the current population is sufficiently large these probabilities can be seen as the fractions of the current population changing their status; namely every year the 95% of married adult remain married whereas the 5% divorced. Moreover, this setting allows for an easy introduction of further constraints. For example, if there is a waiting period of at least 𝑛 years between the declaration of divorce and a subsequent marriage, this can be encoded in the marital status in the following way: if 𝑀 𝑎𝑟𝑆𝑡𝑎𝑡 𝑡 (𝑝) = 𝑚𝑎𝑟𝑟𝑖𝑒𝑑 and 𝑀 𝑎𝑟𝑆𝑡𝑎𝑡 𝑡+1 = 𝑑𝑖𝑣𝑜𝑟𝑐𝑒𝑑, then 𝑀 𝑎𝑟𝑆𝑡𝑎𝑡 𝑡+1+𝑖 (𝑝) = 𝑑𝑖𝑣𝑜𝑟𝑐𝑒𝑑 for every 𝑖 ∈ {1, . . . , 𝑛}.</p><p>As before, the marital function 𝑀 𝑎𝑟𝑆𝑡𝑎𝑡 0 for the initial population 𝒫 0 as well as the marital status of immigrants are given.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Job status</head><p>There are four job status: unemployed, public job, private job and retired. Overall the treatment of the job status is similar to the marital status, for example young people and 21 year old people have only one status available, namely unemployed; the only difference, excepts for probabilities of the transition functions, is that adults and elderly people have two different sets of available status. More precisely adults can have one among: unemployed, public job and private job; whereas elderly people one among: retired, public job and private job. During the transition between adulthood and old age the status remains unchanged except for unemployed people who become retired; formally, if 𝐴𝑔𝑒 𝑡+1 (𝑝) = 61 then:</p><formula xml:id="formula_5">𝐽𝑜𝑏 𝑡+1 (𝑝) := ⎧ ⎪ ⎨ ⎪ ⎩ 𝑟𝑒𝑡𝑖𝑟𝑒𝑑 if 𝐽𝑜𝑏 𝑡 (𝑝) = 𝑢𝑛𝑒𝑚𝑝𝑙𝑜𝑦𝑒𝑑, 𝑝𝑢𝑏𝑙𝑖𝑐 if 𝐽𝑜𝑏 𝑡 (𝑝) = 𝑝𝑢𝑏𝑙𝑖𝑐, 𝑝𝑟𝑖𝑣𝑎𝑡𝑒 if 𝐽𝑜𝑏 𝑡 (𝑝) = 𝑝𝑟𝑖𝑣𝑎𝑡𝑒.</formula><p>Moreover, as it can be seen from the transition function for elderly people, retirement is irreversible; namely if a person retires than from that year their status will always be retired. Abbreviating with 𝑈 𝑛, 𝑅𝑒𝑡, 𝑃 𝑢𝑏, 𝑃 𝑟𝑣 respectively being unemployed, retired, public job and private job, the transition functions are as follows:</p><p>As before, the job function 𝐽𝑜𝑏 0 for the initial population 𝒫 0 as well as the job status of immigrants are given.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ethical tendency</head><p>Ethical tendency aims to formalize the behavior of people with respect to the violation of law. The main idea is that the violation of a norm by a person depends on the expected utility of that </p><formula xml:id="formula_6">𝑃 (𝑝, 𝜂) := {︃ 0 if 𝜇 𝑝 (𝜂 + ) ⩾ 𝜇 𝑝 (𝜂 − ), 1 − 𝑒 −𝛼𝑝𝑘 if 𝑘 = 𝜇 𝑝 (𝜂 − ) − 𝜇 𝑝 (𝜂 + ) &gt; 0. (<label>1</label></formula><formula xml:id="formula_7">)</formula><p>𝛼 𝑝 is a parameter representing the tendency of 𝑝 to violate the law, there are three cases corresponding to the three Ethical tendency status:</p><p>• 𝛼 𝑝 = 0, in this case 𝑝 does not violate the law, no matter how high is the expected utility in the violation; in this case 𝑝 is a legalist.</p><p>• 0 &lt; 𝛼 𝑝 &lt; +∞, in this case 𝑝 may violate 𝜂 if 𝜇 𝑝 (𝜂 − ) &gt; 𝜇 𝑝 (𝜂 + ) and the probability increases as 𝑘 = 𝜇 𝑝 (𝜂 − ) − 𝜇 𝑝 (𝜂 + ) increases; in this case 𝑝 is legally neutral.</p><p>• 𝛼 𝑝 = +∞, in this case 𝑝 violates 𝜂 as soon as 𝜇 𝑝 (𝜂 − ) &gt; 𝜇 𝑝 (𝜂 + ); in this case 𝑝 is an opportunist.</p><p>For a quantitative estimation of the role of 𝛼 𝑝 , if 𝛼 𝑝 = 1 and 𝑘 = 𝜇 𝑝 (𝜂 − ) − 𝜇 𝑝 (𝜂 + ) = 1 then there is a probability of 1 − 𝑒 −1 ≃ 63% that 𝑝 violate 𝜂.</p><p>The Ethical tendency of a person 𝑝 may change during time according a transition function, in this case we assign the same transition process to the three age status. Denoting with 𝐿, 𝑁, 𝑂 being respectively legalist, neutral and opportunist we adopt the following status transitions (again the probabilities are editable parameters):</p><p>When the ethical tendency of a person 𝑝 becomes neutral, the transition function also assigns to 𝛼 𝑝 a strictly positive real value. As before the legal function 𝐿𝑒𝑔𝑎𝑙 0 of the starting population 𝒫 0 , as well as the ones for new born and immigrants, are given. <ref type="foot" target="#foot_3">4</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>𝐿</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Law Compliance</head><p>The conceptualisation of law compliance is taken from the current literature on DDL and derived models. In particular we presuppose that an agent enforces freely literals that are taken as feasible actions. On the other hand, when an agent performs a particular action, for which, as we specified before, she has a specific tendency (a probability of doing that action), the legal system takes care of that. In particular, we assume that the normative background is actually constructed as a DDT, and feasible actions are literals of that theory. Defeasible Logic <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref> is a simple, flexible, and efficient rule-based non-monotonic formalism. Its strength lies in its constructive proof theory, allowing it to draw meaningful conclusions from (potentially) conflicting and incomplete knowledge base. In non-monotonic systems, more accurate conclusions can be obtained when more pieces of information become available.</p><p>Many variants of Defeasible Logic have been proposed for the logical modelling of different application areas, specifically agents <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b9">10]</ref>, legal reasoning <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12]</ref> and workflows from a business process compliance perspective <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref>.</p><p>In this research we focus on the Defeasible Deontic Logic (henceforth DDL) framework <ref type="bibr" target="#b14">[15]</ref> that allows us to determine what prescriptive behaviours are in force in a given situation. For detailed descriptions of how to adopt DDL for legal reasoning we refer the reader to <ref type="bibr" target="#b15">[16]</ref>.</p><p>We start by defining the language of a Defeasible Deontic Theory (henceforth a DDT) Let PROP be a set of propositional atoms, and Lab be a set of arbitrary labels (the names of the rules). We use lower-case Roman letters to denote literals and lower-case Greek letters to denote rules.</p><p>Accordingly, PLit = PROP ∪ {¬𝑙 | 𝑙 ∈ PROP} is the set of plain literals; the set of deontic literals is ModLit = {□𝑙, ¬□𝑙 | 𝑙 ∈ PLit ∧ □ ∈ {O, P}} and, finally, the set of literals is Lit = PLit ∪ ModLit. The complement of a literal 𝑙 is denoted by ∼𝑙: if 𝑙 is a positive literal 𝑝 then ∼𝑙 is ¬𝑝, and if 𝑙 is a negative literal ¬𝑝 then ∼𝑙 is 𝑝. We will not have specific rules nor modality for prohibitions, as we will treat them according to the standard duality that something is forbidden iff the opposite is obligatory (i.e., O¬𝑝).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 1 (Defeasible Deontic Theory).</head><p>A DDT 𝐷 is a triple (𝐹, 𝑅, &gt;), where 𝐹 is the set of facts, 𝑅 is the set of rules, and &gt; is a binary relation over 𝑅 (called superiority relation).</p><p>Specifically, the set of facts 𝐹 ⊆ PLit denotes simple pieces of information that are always considered to be true, like "Sylvester is a cat", formally 𝑐𝑎𝑡(𝑆𝑦𝑙𝑣𝑒𝑠𝑡𝑒𝑟). In this paper, we subscribe to the distinction between the notions of obligations and permissions, and that of norms, where the norms in the system determine the obligations and permissions in force in a normative system. A DDT is meant to represent a normative system, where the rules encode the norms of the system, and the set of facts corresponds to a case. As we will see below, the rules are used to conclude the institutional facts, obligations and permissions that hold in a case. Accordingly, we do not admit obligations and permissions as facts of the theory.</p><p>The set of rules 𝑅 contains three types of rules: strict rules, defeasible rules, and defeaters. Rules are also of two kinds:</p><p>• Constitutive rules (non-deontic rules) 𝑅 C model constitutive statements (count-as rules);</p><p>• Deontic rules to model prescriptive behaviours, which are either obligation rules 𝑅 O that determine when and which obligations are in force, or permission rules which represent strong (or explicit) permissions 𝑅 P .</p><p>Lastly, &gt; ⊆ 𝑅 × 𝑅 is the superiority (or preference) relation, which is used to solve conflicts in case of potentially conflicting information.</p><p>A theory is finite if the set of facts and rules are so. We only focus on finite theories. A strict (constitutive) rule is a rule in the classical sense: whenever the premises are indisputable, so is the conclusion.</p><p>On the other hand, defeasible rules are to conclude statements that can be defeated by contrary evidence. In contrast, defeaters are special rules whose only purpose is to prevent the derivation of the opposite conclusion.</p><p>A prescriptive behaviour like "Passing on zebra crossing is not permitted when the traffic light for pedestrian is red" can be formalised via the general permissive rule Following the ideas of <ref type="bibr" target="#b16">[17]</ref>, obligation rules gain more expressiveness with the compensation operator ⊗ for obligation rules, which is to model reparative chains of obligations. Intuitively, 𝑎 ⊗ 𝑏 means that 𝑎 is the primary obligation, but if for some reason we fail to obtain, to comply with, 𝑎 (by either not being able to prove 𝑎, or by proving ∼𝑎) then 𝑏 becomes the new obligation in force. This operator is used to build chains of preferences, called ⊗-expressions.</p><p>The formation rules for ⊗-expressions are as follows (i) every plain literal is an ⊗-expression and (ii) if 𝐴 is an ⊗-expression and 𝑏 is a plain literal then 𝐴 ⊗ 𝑏 is an ⊗-expression <ref type="bibr" target="#b14">[15]</ref>.</p><p>In general an ⊗-expression has the form '𝑐 1 ⊗ 𝑐 2 ⊗ • • • ⊗ 𝑐 𝑚 ', and it appears as consequent of a rule '𝐴(𝛼) ˓→ O 𝐶(𝛼)' where 𝐶(𝛼) = 𝑐 1 ⊗ 𝑐 2 ⊗ • • • ⊗ 𝑐 𝑚 ; the meaning of the ⊗-expression is: if the rule is allowed to draw its conclusion, then 𝑐 1 is the obligation in force, and only when 𝑐 1 is violated then 𝑐 2 becomes the new in force obligation, and so on for the rest of the elements in the chain. In this setting, 𝑐 𝑚 stands for the last chance to comply with the prescriptive behaviour enforced by 𝛼, and in case 𝑐 𝑚 is violated as well, then we will result in a non-compliant situation.</p><p>For instance, the previous prohibition to pass on pedestrian cross in case of red can foresee a compensatory fine, like Pedestrian_traffic_light_red ⇒ O ¬Pass ⊗ PayFine that has to be paid in case someone passes the pedestrian cross when the light is red.</p><p>It is worth noticing that we admit ⊗-expressions with only one element. The intuition, in this case, is that the obligatory condition does not admit compensatory measures or, in other words, that it is impossible to recover from its violation.</p><p>In this paper, we focus exclusively on the defeasible part of the logic ignoring the monotonic component given by the strict rules; consequently, we limit the language to the cases where the rules are either defeasible or defeaters. From a practical point of view, the restriction does not effectively limit the expressive power of the logic: a defeasible rule where there are no rules for the opposite conclusion, or where all rules for the opposite conclusion are weaker than the given defeasible rules, effectively behaves like a strict rule. Formally a rule is defined as below. If □ = C then the rule is used to derive non-deontic literals (constitutive statements), whilst if □ is O or P then the rule is used to derive deontic conclusions (prescriptive statements). The conclusion 𝐶(𝛼) is, as before, a single literal in case □ = {C, P}; in case □ = O, then the conclusion is an ⊗-expression. ⊗-expressions can only occur in prescriptive rules though we do not admit them on defeaters (Condition 5.(a).i), see <ref type="bibr" target="#b14">[15]</ref> for a detailed explanation.</p><p>We use some abbreviations on sets of rules. The set of defeasible rules in 𝑅 is 𝑅 ⇒ , the set of defeaters is 𝑅 dft . 𝑅 □ [𝑙] is the rule set appearing in 𝑅 with head 𝑙 and modality □, while 𝑅 O [𝑙, 𝑖] denotes the set of obligation rules where 𝑙 is the 𝑖-th element in the ⊗-expression. Given that the consequent of a rule is either a single literal or an ⊗-expression (that can be understood as a sequence of elements, and then as an ordered set), in what follows we are going to abuse the notation and use 𝑙 ∈ 𝐶(𝛼). 𝑅 □ is the set of rules 𝛼 : 𝐴(𝛼) ˓→ □ 𝐶(𝛼) such that 𝛼 appears in 𝑅. For a theory as determined by Definitions 1 and 2, 𝛼 appears in 𝑅 means that 𝛼 ∈ 𝑅; thus 𝑅 P is the set of permissive rules appearing in 𝑅. We use 𝑅 ◇ and 𝑅 ◇ [𝑙] as shorthands for 𝑅 O ∪ 𝑅 P and 𝑅 O [𝑙] ∪ 𝑅 P [𝑙], respectively. The abbreviations can be combined. Finally, a literal 𝑙 appears in a theory 𝐷, if there is a rule 𝛼 ∈ 𝑅 such that 𝑙 ∈ 𝐴(𝛼) ∪ 𝐶(𝛼).</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: A general schema of the architecture we devise for the long-term aim investigation on law simulation.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>adopt the following notation 𝒫 𝑎𝑑𝑢𝑙𝑡 𝑡 := {𝑝 ∈ 𝒫 𝑡 | 𝐴𝑔𝑒𝑆𝑡𝑎𝑡 𝑡 (𝑝) = 𝑎𝑑𝑢𝑙𝑡} and similarly for 𝒫 𝑦𝑜𝑢𝑛𝑔 𝑡 and 𝒫 𝑒𝑙𝑑𝑒𝑟𝑙𝑦 𝑡 . Other characteristics or properties may depend on the age status, in particular: • the transition functions (see below) from one year to the next one for Marital status and Job status; • the number of new born in the next year, |𝒫 0 𝑡+1 |, depends on the current number of adult people, |𝒫 𝑎𝑑𝑢𝑙𝑡 𝑡 |.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Young, adults and elderly people ethical tendencies transition diagram.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>AtZebraCross ⇒ P</head><label>P</label><figDesc>Pass and the exception through the obligation rulePedestrian_traffic_light_red ⇒ O ¬Pass.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Definition 2 (</head><label>2</label><figDesc>Rule). A rule is an expression of the form 𝛼 : 𝐴(𝛼) ˓→ □ 𝐶(𝛼), where 1. 𝛼 ∈ Lab is the unique name of the rule; 2. 𝐴(𝛼) ⊆ Lit is the set of antecedents; 3. An arrow ˓→ ∈ {⇒, ↝} denoting, respectively, defeasible rules, and defeaters; 4. □ ∈ {C, O, P}; 5. its consequent 𝐶(𝛼), which is either a) a single plain literal 𝑙 ∈ PLit, if either (i) ˓→ ≡ ↝ or (ii) □ ∈ {C, P}, or b) an ⊗-expression, if □ ≡ O.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>every person can born at most one time; 𝐵𝑟 𝑡 is the birth rate in the year 𝑡; namely, the number of new born depends on that one of adults via a coefficient.Moreover, the birth function establishes the gender of the new born; namely there is a function 𝐵𝑔𝑒𝑛 : 𝒫 0</figDesc><table><row><cell>• |𝒫 0 𝑡+1 | = 𝐵𝑟 𝑡 • |𝒫 𝑎𝑑𝑢𝑙𝑡 𝑡</cell><cell>|, where 𝒫 𝑎𝑑𝑢𝑙𝑡 𝑡</cell><cell>is the adult population at time 𝑡 (see Sec. 3) and</cell></row></table><note>𝑡 → {𝑚𝑎𝑙𝑒, 𝑓 𝑒𝑚𝑎𝑙𝑒} assigning to each new born in 𝒫 0 𝑡 its gender, see below for more details.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>Adults and elderly people job transition diagram.person violating the norm compared with the expected utility respecting the norm together with the Ethical tendency of that person, i.e. the general propensity to respect the law. Let 𝜂 be a norm and 𝑝 a person; if we denote with 𝜇 𝑝 (𝜂 + ) the expected utility of 𝑝 in complying with 𝜂 and with 𝜇 𝑝 (𝜂 − ) the expected utility of 𝑝 in violating 𝜂, than the probability of 𝑝 of violating 𝜂 is given by:</figDesc><table><row><cell></cell><cell></cell><cell>ADULTS</cell><cell></cell><cell></cell><cell></cell><cell cols="2">ELDERLY PEOPLE</cell><cell></cell></row><row><cell></cell><cell></cell><cell>30%</cell><cell></cell><cell></cell><cell></cell><cell>50%</cell><cell></cell><cell></cell></row><row><cell>40%</cell><cell>𝑈 𝑛</cell><cell>5%</cell><cell>𝑃 𝑏</cell><cell>70%</cell><cell>100%</cell><cell>𝑈 𝑛</cell><cell>𝑃 𝑏</cell><cell>40%</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>10%</cell><cell></cell><cell></cell></row><row><cell></cell><cell>30%</cell><cell>30%</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">10%</cell><cell></cell><cell>25%</cell><cell></cell><cell></cell><cell>40%</cell><cell>10%</cell><cell></cell></row><row><cell></cell><cell></cell><cell>𝑃 𝑟</cell><cell></cell><cell></cell><cell></cell><cell>𝑃 𝑟</cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>60%</cell><cell></cell><cell></cell><cell></cell><cell>50%</cell><cell></cell><cell></cell></row><row><cell>Figure 3:</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">𝒫(P) denotes the powerset of P.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">For sake of simplicity we join together divorced and widowhood and use bachelor for both males and females.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">Formally, this means that if 𝐴𝑔𝑒𝑡(𝑝) = 21 than 𝑀 𝑎𝑟𝑆𝑡𝑎𝑡𝑡(𝑝) = 𝑏𝑎𝑐ℎ𝑒𝑙𝑜𝑟 and if 𝐴𝑔𝑒𝑡+1(𝑝) = 61, then 𝑀 𝑎𝑟𝑆𝑡𝑎𝑡𝑡+1(𝑝) = 𝑀 𝑎𝑟𝑆𝑡𝑎𝑡𝑡(𝑝).</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">Another possibility would be to assign to new born legal tendencies that reflect the proportion of legal tendencies in the adult population or in the whole population.</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3 (Tagged modal formula). A tagged modal formula is an expression of the form ±𝜕 □ 𝑙, with the following meanings</head><p>• +𝜕 □ 𝑙: 𝑙 is defeasibly provable (or simply provable) with mode □;</p><p>• −𝜕 □ 𝑙: 𝑙 is defeasibly refuted (or simply refuted) with mode □.</p><p>Accordingly, the meaning of +𝜕 O 𝑝 is that 𝑝 is provable as an obligation, and −𝜕 P ¬𝑝 is that we have a refutation for the permission of ¬𝑝. Similarly, for the other combinations.</p><p>As we will shortly see (Definitions 5 and 6), one of the key ideas of DDL is that we use tagged modal formulas to determine which formulas are (defeasibly) provable or rejected given a theory and a set of facts (used as input for the theory). Therefore, when we have asserted the tagged modal formula +𝜕 O 𝑙 in a derivation (see Definition 4 below), we can conclude that the obligation of 𝑙 (O𝑙) follows from the rules and the facts and that we used a prescriptive rule to derive 𝑙; similarly for permission (using a permissive rule). However, the C modality is silent, meaning that we do not put the literal in the scope of the C modal operator, thus for +𝜕 C 𝑙, the derivation simply asserts that 𝑙 holds (and not that C𝑙 holds, even if the two have the same meaning). For the negative cases (i.e., −𝜕 □ 𝑙), the interpretation is that it is not possible to derive 𝑙 with a given mode. Accordingly, we read −𝜕 O 𝑙 as it is impossible to derive 𝑙 as an obligation. For □ ∈ {O, P} we are allowed to infer ¬□𝑙, giving a constructive interpretation of the deontic modal operators. Notice that this is not the case for C, where we cannot assert that ∼𝑙 holds (this would require +𝜕 C ∼𝑙); in the logic, failing to prove 𝑙 does not equate to proving ¬𝑙. We will use the term conclusions and tagged modal formulas interchangeably.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 4 (Proof).</head><p>Given a DDT 𝐷, a proof 𝑃 of length 𝑚 in 𝐷 is a finite sequence 𝑃 (1), 𝑃 (2), . . . , 𝑃 (𝑚) of tagged modal formulas, where the proof conditions hold.</p><p>𝑃 (1..𝑛) denotes the first 𝑛 steps of 𝑃 , and we also use the notational convention 𝐷 ⊢ ±𝜕 □ 𝑙, meaning that there is a proof 𝑃 for ±𝜕 □ 𝑙 in 𝐷.</p><p>Core notions in DL are that of applicability/discardability. As knowledge in a defeasible theory is circumstantial, given a defeasible rule like '𝛼 : 𝑎, 𝑏 ⇒ □ 𝑐', there are four possible scenarios: the theory defeasibly proves both 𝑎 and 𝑏, the theory proves neither, the theory proves one but not the other. Naturally, only in the first case, where both 𝑎 and 𝑏 are proved, we can use 𝛼 to support/try to conclude □𝑐. Briefly, we say that a rule is applicable when every antecedent's literal has been proved at a previous derivation step. Symmetrically, a rule is discarded when one of such literals has been previously refuted. Formally: Definition 5 (Applicability). Assume a deontic defeasible theory 𝐷 = (𝐹, 𝑅, &gt;). We say that rule 𝛼 ∈ 𝑅 C ∪ 𝑅 P is applicable at 𝑃 (𝑛 + 1), iff for all 𝑎 ∈ 𝐴(𝛼)</p><p>We say that rule 𝛼 ∈ 𝑅 O is applicable at index 𝑖 and 𝑃 (𝑛 + 1) iff Conditions 1-3 above hold and 4. ∀𝑐 𝑗 ∈ 𝐶(𝛼), 𝑗 &lt; 𝑖, then +𝜕 O 𝑐 𝑗 ∈ 𝑃 (1..𝑛) and +𝜕 C ∼𝑐 𝑗 ∈ 𝑃 (1..𝑛). 5 Definition 6 (Discardability). Assume a deontic defeasible theory 𝐷, with 𝐷 = (𝐹, 𝑅, &gt;). We say that rule 𝛼 ∈ 𝑅 C ∪ 𝑅 P is discarded at 𝑃 (𝑛 + 1), iff there exists 𝑎 ∈ 𝐴(𝛼) such that</p><p>We say that rule 𝛼 ∈ 𝑅 O is discarded at index 𝑖 and 𝑃 (𝑛 + 1) iff either at least one of the Conditions 1-3 above hold, or</p><p>Discardability is obtained by applying the principle of strong negation to the definition of applicability. The strong negation principle applies the function that simplifies a formula by moving all negations to an innermost position in the resulting formula, replacing the positive tags with the respective negative tags, and the other way around; see <ref type="bibr" target="#b18">[19]</ref>. Positive proof tags ensure that there are effective decidable procedures to build proofs; the strong negation principle guarantees that the negative conditions provide a constructive and exhaustive method to verify that a derivation of the given conclusion is not possible. Accordingly, Condition 3 of Definition 5 allows us to state that ¬□𝑝 holds when we have a (constructive) failure to prove 𝑝 with mode □ (for obligation or permission), thus it corresponds to a constructive version of negation as failure.</p><p>We are ready to formalise the proof conditions, as in <ref type="bibr" target="#b14">[15]</ref>. We start with positive proof conditions for constitutive statements. In the following, we shall omit the explanations for negative proof conditions, when trivial, reminding the reader that they are obtained through the application of the strong negation principle to the positive counterparts. (2) 𝜁 ̸ &gt; 𝛾. 5 As discussed above, we are allowed to move to the next element of an ⊗-expression when the current element is violated. To have a violation, we need (i) the obligation to be in force, and (ii) that its content does not hold.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 7 (Constitutive Proof Conditions</head><p>+𝜕 O 𝑐𝑖 indicates that the obligation is in force. For the second part we have two options. The former, +𝜕 C ∼𝑐𝑖 means that we have "evidence" that the opposite of the content of the obligation holds. The latter would be to have −𝜕 C 𝑐𝑖 ∈ 𝑃 (1..𝑛) corresponding to the intuition that we failed to provide evidence that the obligation has been satisfied. The former option implies the latter one. For a deeper discussion on the issue, see <ref type="bibr" target="#b17">[18]</ref>.</p><p>A literal is defeasibly proved if: it is a fact, or there exists an applicable, defeasible rule supporting it (such a rule cannot be a defeater) and all opposite rules are either discarded or defeated. To prove a conclusion, not all the work has to be done by a stand-alone (applicable) rule (the rule witnessing Condition (2.2)): all the applicable rules for the same conclusion (may) contribute to defeating applicable rules for the opposite conclusion. Both 𝛾 as well as 𝜁 may be defeaters. Below we present the proof conditions for obligations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 8 (Obligation Proof Conditions).</head><p>+𝜕 O 𝑙:</p><p>(1) 𝜁 is applicable at index 𝑘 and ( <ref type="formula">2</ref>) 𝜁 &gt; 𝛾.</p><p>(1) 𝛾 is applicable (at index 𝑗), and ( <ref type="formula">2</ref>)</p><p>(i) in Condition (2) 𝛾 can be a permission rule as explicit, opposite permissions represent exceptions to obligations, whereas 𝜁 (Condition 2.2) must be an obligation rule as a permission rule cannot reinstate an obligation, and that (ii) 𝑙 may appear at different positions (indices 𝑖, 𝑗, and 𝑘) within the three ⊗-chains. Below, we introduce the proof conditions for permissions. We refer the readers interested in a deeper discussion on how to model permissions and obligations in DDL to <ref type="bibr" target="#b14">[15]</ref>. The set of positive and negative conclusions of a theory is called extension. The extension of a theory is computed based on the literals that appear in it; more precisely, the literals in the Herbrand Base of the theory HB (𝐷) = {𝑙, ∼𝑙 ∈ PLit| 𝑙 appears in 𝐷}. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 9 (Permission Proof Conditions</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 10 (Extension).</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions and further extensions</head><p>While expressing some concerns and the plan to correct macroscopic limits of current simulation platforms, in particular, GAMA, we value the idea that it is a relevant step to enterprise the definition of a credible system to actually simulate the effects on a society of the introduction of a new norm. The discussion we provided upon the notion of class to which a particular individual of the MAS belongs (while classes do not constitute a partition) is devised as a support to the usage of the rules in the Deontic counterpart of the simulator. However, when the system will be completely built, we shall have three specific strengths that differentiate our approach to any other ones already discussed in the simulation literature for agents' modelling that are inspired by the approach followed for the GAMA framework:</p><p>• We consider the class hierarchy described in terms of transitions, the results of the computation of the extension of the constituent rules as devised above. There is no such a thing as a priori class, but only classes built as result of a set of rules;</p><p>• Probabilistic and utility-driven models attain at agents' definition, not the normative background that is solely prescriptive;</p><p>• There exists a system of negative feedback, able to re-devise the properties of the class hierarchy, the probabilities and the consequential behaviors of the agents.</p><p>We followed here the concepts expressed in the researches by Riveret et al. <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref> and also discussed further on by Governatori et al. <ref type="bibr" target="#b8">[9]</ref>.</p><p>Finally, the ductility of defeasible deontic logic would allow, in a further extension, to include in the model not only law compliance, but also ethical and personal behaviors.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The architecture of a reasoning system for defeasible deontic logic</title>
		<author>
			<persName><forename type="first">M</forename><surname>Cristani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Olivieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pasetto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Tubini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Veronese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Villa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Zorzi</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.procs.2023.10.418</idno>
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="page" from="4214" to="4224" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Houdini (unchained): an effective reasoner for defeasible logic</title>
		<author>
			<persName><forename type="first">M</forename><surname>Cristani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Olivieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pasetto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Tubini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Veronese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Villa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Zorzi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="1" to="16" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Gama: A simulation platform that integrates geographical information data, agent-based modeling and multi-scale control</title>
		<author>
			<persName><forename type="first">P</forename><surname>Taillandier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D.-A</forename><surname>Vo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Amouroux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Drogoul</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-25920-3_17</idno>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="page" from="242" to="258" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Gama: Multi-level and complex environment for agent-based models and simulations</title>
		<author>
			<persName><forename type="first">A</forename><surname>Drogoul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Amouroux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Caillou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Gaudou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Grignard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Marilleau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Taillandier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vavasseur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D.-A</forename><surname>Vo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-D</forename><surname>Zupker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">AAMAS</title>
		<imprint>
			<biblScope unit="volume">2013</biblScope>
			<biblScope unit="page" from="1361" to="1362" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Gama: An environment for implementing and running spatially explicit multi-agent simulations</title>
		<author>
			<persName><forename type="first">E</forename><surname>Amouroux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T.-Q</forename><surname>Chu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Boucher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Drogoul</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-01639-4_32</idno>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="page" from="359" to="371" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Defeasible logic</title>
		<author>
			<persName><forename type="first">D</forename><surname>Nute</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Logic in Artificial Intelligence and Logic Programming</title>
				<imprint>
			<publisher>Oxford University Press</publisher>
			<date type="published" when="1987">1987</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Representation results for defeasible logic</title>
		<author>
			<persName><forename type="first">G</forename><surname>Antoniou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Billington</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Maher</surname></persName>
		</author>
		<idno type="DOI">10.1145/371316.371517</idno>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Comput. Log</title>
		<imprint>
			<biblScope unit="page" from="255" to="287" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A survey of agent platforms</title>
		<author>
			<persName><forename type="first">K</forename><surname>Kravari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Bassiliades</surname></persName>
		</author>
		<idno type="DOI">10.18564/jasss.2661</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Artificial Societies and Social Simulation</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The rationale behind the concept of goal</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Olivieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Scannapieco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rotolo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Cristani</surname></persName>
		</author>
		<idno type="DOI">10.1017/S1471068416000053</idno>
		<ptr target="https://doi.org/10.1017/S1471068416000053.doi:10.1017/S1471068416000053" />
	</analytic>
	<monogr>
		<title level="j">Theory Pract. Log. Program</title>
		<imprint>
			<biblScope unit="page" from="296" to="324" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Programming cognitive agents in defeasible logic</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dastani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rotolo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Van Der Torre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">LPAR 2005 Conference</title>
				<meeting><address><addrLine>Montego Bay, Jamaica</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="621" to="636" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Changing legal systems: Legal abrogations and annulments in defeasible logic</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rotolo</surname></persName>
		</author>
		<idno type="DOI">10.1093/jigpal/jzp075</idno>
	</analytic>
	<monogr>
		<title level="j">Logic Journal of the IGPL</title>
		<imprint>
			<biblScope unit="page" from="157" to="194" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Changes to temporary norms</title>
		<author>
			<persName><forename type="first">M</forename><surname>Cristani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Olivieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rotolo</surname></persName>
		</author>
		<idno type="DOI">10.1145/3086512.3086517</idno>
	</analytic>
	<monogr>
		<title level="j">ICAIL</title>
		<imprint>
			<biblScope unit="page" from="39" to="48" />
			<date type="published" when="2017">2017. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Designing for compliance: Norms and goals</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Olivieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Scannapieco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Cristani</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-24908-2_29</idno>
	</analytic>
	<monogr>
		<title level="m">RuleML 2011</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="282" to="297" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Compliant business processes with exclusive choices from agent specification</title>
		<author>
			<persName><forename type="first">F</forename><surname>Olivieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Cristani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="page" from="603" to="612" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Computing strong and weak permissions in defeasible logic</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Olivieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rotolo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Scannapieco</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10992-013-9295-1</idno>
		<ptr target="https://doi.org/10.1007/s10992-013-9295-1.doi:10.1007/s10992-013-9295-1" />
	</analytic>
	<monogr>
		<title level="j">J. Philos. Log</title>
		<imprint>
			<biblScope unit="page" from="799" to="829" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Logic and the law: Philosophical foundations, deontics, and defeasible reasoning</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rotolo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Sartor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Deontic Logic and Normative Systems</title>
				<editor>
			<persName><forename type="first">D</forename><surname>Gabbay</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Horty</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><surname>Parent</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Van Der Meyden</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Van Der Torre</surname></persName>
		</editor>
		<meeting><address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<publisher>College Publications</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="657" to="764" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Logic of violations: A gentzen system for reasoning with contrary-to-duty obligations</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rotolo</surname></persName>
		</author>
		<ptr target="http://ojs.victoria.ac.nz/ajl/article/view/1780" />
	</analytic>
	<monogr>
		<title level="j">Australasian Journal of Logic</title>
		<imprint>
			<biblScope unit="page" from="193" to="215" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Burden of compliance and burden of violations</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">28th Annual Conference on Legal Knowledge and Information Systems, Frontiers in AI and Applications</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Rotolo</surname></persName>
		</editor>
		<meeting><address><addrLine>Amsterdam</addrLine></address></meeting>
		<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="31" to="40" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A defeasible logic for modelling policy-based intentions and motivational attitudes, Log</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Padmanabhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rotolo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sattar</surname></persName>
		</author>
		<idno type="DOI">10.1093/jigpal/jzp006</idno>
	</analytic>
	<monogr>
		<title level="j">J. IGPL</title>
		<imprint>
			<biblScope unit="page" from="227" to="265" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Probabilistic rule-based argumentation for normgoverned learning agents</title>
		<author>
			<persName><forename type="first">R</forename><surname>Riveret</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rotolo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Sartor</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10506-012-9134-7</idno>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence and Law</title>
		<imprint>
			<biblScope unit="page" from="383" to="420" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Law enforcement in norm-governed learning agents</title>
		<author>
			<persName><forename type="first">R</forename><surname>Riveret</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Contissa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rotolo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pitt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AAMAS 2013</title>
				<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="1151" to="1152" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
