<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Spurious preferences in structured argumentation: a preliminary analysis</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Pietro</forename><surname>Baroni</surname></persName>
							<email>pietro.baroni@unibs.it</email>
							<affiliation key="aff0">
								<orgName type="institution">DII -University of Brescia</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Federico</forename><surname>Cerutti</surname></persName>
							<email>federico.cerutti@unibs.it</email>
							<affiliation key="aff0">
								<orgName type="institution">DII -University of Brescia</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Massimiliano</forename><surname>Giacomin</surname></persName>
							<email>massimiliano.giacomin@unibs.it</email>
							<affiliation key="aff0">
								<orgName type="institution">DII -University of Brescia</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Spurious preferences in structured argumentation: a preliminary analysis</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">3E76DAFE2BE55329539E135652E78005</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T20:15+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Structured argumentation</term>
					<term>Preferences</term>
					<term>Justification status</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The phenomenon of spurious preferences in argumentation can be described as an unjustified unequal treatment of some arguments emerging in a context where equal treatment would be expected. Using the ASPIC + formalism as a basis, we provide an emblematic example of spurious preference and introduce a basic requirement of spurious preference avoidance for a suitable family of argumentation theories. We then show that a variant of ASPIC + , introduced to deal with problems concerning multiple contradictories, satisfies this requirement.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The phenomenon of spurious preferences in argumentation can be intuitively described as an unjustified unequal treatment of some arguments, with respect to justification status evaluation, which emerges as a byproduct of the formal representation adopted in a reasoning context where an equal treatment would be expected. This paper is devoted to a preliminary analysis of this phenomenon. We first exemplify how it may occur in the context of the well-known ASPIC + formalism and then show that, for a given family of argumentation theories, it is avoided by a variant of ASPIC + , called ASPIC R , introduced in <ref type="bibr" target="#b0">[1]</ref>. The paper is organised as follows. After recalling the necessary background in Section 2, we illustrate the phenomenon of spurious preferences in Section 3. We then introduce a basic requirement of spurious preference avoidance in Section 4, and show in Section 5 that ASPIC R satisfies it. Section 6 concludes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background</head><p>We briefly review Dung's theory of argumentation frameworks. Definition 1. An argumentation framework (AF) is a pair F = ⟨A, ↠⟩, where A is a set of arguments and ↠⊆ (A × A) is a binary relation on A.</p><p>When (α, β) ∈↠ (also denoted as α ↠ β) we say that α attacks β. For a set X ⊆ A and an argument α ∈ A we write α ↠ X if ∃β ∈ X : α ↠ β and X ↠ α if ∃β ∈ X : β ↠ α, and we denote the arguments attacking X as X − ≜ {α ∈ A | α ↠ X} and the arguments attacked by X as X + ≜ {α ∈ A | X ↠ α}. An extension-based argumentation semantics σ specifies the criteria for identifying, for a generic AF, a set of extensions, where each extension is a set of arguments considered to be acceptable together. Given a generic argumentation semantics σ, the set of extensions prescribed by σ for a given AF F is denoted as E σ (F). Several argumentation semantics are recalled in Definition 2, along with some basic underlying notions. For more details, the reader is referred to <ref type="bibr" target="#b1">[2]</ref>.</p><p>Definition 2. Let F = ⟨A, ↠⟩ be an AF, α ∈ A and X ⊆ A. X is conflict-free, denoted as X ∈ E CF (F), iff X ∩ X − = ∅. α is acceptable with respect to X (or α is defended by X) iff {α} − ⊆ X + . The function F F : 2 A → 2 A which, given a set X ⊆ A, returns the set of the acceptable arguments with respect to X, is called the characteristic function of F. X is admissible (denoted as X ∈ E AD (F)) iff X ∈ E CF (F) and X ⊆ F F (X). X is a complete extension (denoted as X ∈ E CO (F)) iff X ∈ E CF (F) and X = F F (X). X is the grounded extension (denoted as X = GR(F) or X ∈ E GR (F)) iff X is the least fixed point of F F (equivalently, the least complete extension). X is a preferred extension (denoted as X ∈ E PR (F)) iff X is a maximal (with respect to set inclusion) admissible set. X is a stable extension (denoted as X ∈ E ST (F)) iff X + = A \ X. X is a semi-stable extension (denoted as X ∈ E SST (F)) iff it is a complete extension such that X ∪ X + is maximal (wrt ⊆) among all complete extensions.</p><p>Argument justification status is defined on the basis of extension membership. Definition 3. Given a set S a justification labeling of S is a function J : S → Σ J , where Σ J = {Sk, Cr, N o}. Given an AF F = ⟨A, ↠⟩ and a semantics σ, the justification labeling of A according to σ is defined as follows <ref type="foot" target="#foot_0">1</ref> :</p><formula xml:id="formula_0">J(α) = Sk iff α ∈ E∈Eσ(F ) E; J(α) = Cr iff α ∈ E∈Eσ(F ) E and α / ∈ E∈Eσ(F ) E; J(α) = N o iff α / ∈ E∈Eσ(F ) E.</formula><p>In words, we will say respectively that α is skeptically justified, credulously justified, and not justified. We now recall the essential notions of the ASPIC + formalism. Definition 4. An argumentation system is a tuple AS = (L,¯, R, n) where: In the following, given a set S ⊆ L with a little abuse of notation we will denote the set of its contraries and contradictories as S = φ∈S {ψ | ψ ∈ φ}. Given a rule r = φ 1 , . . . , φ n → (⇒)φ, we will say that φ is the consequent of the rule, denoted as cons(r) and that {φ 1 , . . . , φ n } is the set of the antecedents of the rule denoted as ant(r).</p><formula xml:id="formula_1">1. L is a logical language 2. ¯is a contrariness function from L to 2 L such that: (i) φ is a contrary of ψ if φ ∈ ψ, ψ / ∈ φ; (ii) φ is a contradictory of ψ (denoted by φ = −ψ) if φ ∈ ψ, ψ ∈ φ; (iii) each φ ∈ L has at least one contradictory 3. R = (R S , R D ) is</formula><p>Closure under transposition of strict rules is a desirable property as it ensures (together with other conditions) that an argumentation system satisfies some rationality postulates <ref type="bibr" target="#b2">[3]</ref> (we do not recall the relevant details as not necessary for this paper).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 5. Given an argumentation system AS</head><formula xml:id="formula_2">= (L,¯, R, n), the set of strict rules R S is closed under transposition iff if φ 1 , . . . , φ n → ψ ∈ R S then, for i = 1 . . . n, φ 1 , . . . , φ i−1 , −ψ, φ i+1 , . . . , φ n → −φ i ∈ R S . Given a set of strict rules R S , its closure under transposition is defined as Cl tr (R S ) ≜ R S ∪ r∈R S tr(r), where for any r = φ 1 , . . . , φ n → ψ, tr(r) = i=1...n {φ 1 , . . . , φ i−1 , −ψ, φ i+1 , . . . , φ n → −φ i }.</formula><p>A knowledge base is a subset of L including certain (called axioms) and defeasible (called ordinary) premises. It gives rise to the notion of argumentation theory. Arguments are built from a knowledge base using rules. Definition 6. A knowledge base in an argumentation system AS = (L,¯, R, n) is a set K ⊆ L consisting of two disjoint subsets K n (the axioms) and K p (the ordinary premises). The tuple AT = (AS, K) is called an argumentation theory. Definition 7. An argument α on the basis of a knowledge base K in an argumentation system (L,¯, R, n) is:</p><formula xml:id="formula_3">1. φ if φ ∈ K with: Prem(α) = {φ}; Conc(α) = φ; Sub(α) = {φ}; Rules(α) = ∅; Top(α) = undefined. 2. α 1 , . . . , α n → (⇒) ψ if α 1 , .</formula><p>. . , α n are arguments such that there exists a strict (defeasible) rule Conc(α 1 ), . . . ,</p><formula xml:id="formula_4">Conc(α n ) → (⇒) ψ in R S (R D ) with: Prem(α) = Prem(α 1 )∪. . .∪Prem(α n ); Conc(α) = ψ; Sub(α) = Sub(α 1 ) ∪ . . . ∪ Sub(α n ) ∪ {α}; Rules(α) = Rules(α 1 ) ∪ . . . ∪ Rules(α n ) ∪ {Conc(α 1 ), . . . , Conc(α n ) → (⇒) ψ}; Top(α) = Conc(α 1 ), . . . , Conc(α n ) → (⇒) ψ; DefRules(α) = {r | r ∈ Rules(α) ∩ R D }; StRules(α) = {r | r ∈ Rules(α) ∩ R S }.</formula><p>For any argument α,</p><formula xml:id="formula_5">Prem n (α) = Prem(α) ∩ K n ; Prem p (α) = Prem(α) ∩ K p . α is: strict if DefRules(α) = ∅, defeasible if DefRules(α) ̸ = ∅; firm if Prem(α) ⊆ K n ; plausible if Prem(α) ⊈ K n ; finite if Rules(α) is finite.</formula><p>Notation 1. Some further notations are useful. Given S ⊆ L, S ⊢ φ denotes that there exists a strict argument α such that Conc(α) = φ, with Prem(α) ⊆ S. S ⊢ min φ denotes that S ⊢ φ and ∄T ⊊ S : T ⊢ φ. Given a set of arguments X, Prem(X) ≜ α∈X Prem(α), and similarly for Conc(X), Sub(X), Rules(X), Top(X), DefRules(X), StRules(X).</p><p>Three kinds of attack between arguments are considered. Definition 8. An argument α attacks an argument β iff α undercuts, rebuts, or undermines β where:</p><formula xml:id="formula_6">α undercuts β (on β ′ ) iff Conc(α) ∈ n(r) for some β ′ ∈ Sub(β) such that r = Top(β ′ ) is defeasible. α rebuts β (on β ′ ) iff Conc(α) ∈ φ for some β ′ ∈ Sub(β) of the form β ′′ 1 , . . . , β ′′ n ⇒ φ.</formula><p>In such a case α contrary-rebuts β iff Conc(α) is a contrary of φ. α undermines β (on β ′ ) iff Conc(α) ∈ φ for some β ′ = φ, φ ∈ Prem p (β). In such a case α contrary-undermines β iff Conc(α) is a contrary of φ.</p><p>In some cases, attack effectiveness depends on a preference ordering ⪯ over arguments (assumed to be a preorder as in <ref type="bibr" target="#b3">[4]</ref>). As usual α ≺ β iff α ⪯ β and β ⪯̸ α; α ≃ β iff α ⪯ β and β ⪯ α. Effective attacks give rise to defeat. Definition 9. Let α attack β on β ′ . If α undercuts, contrary-rebuts, or contrary-undermines β on β ′ , then α preference-independent attacks β on β ′ , otherwise α preference-dependent attacks β on β ′ . Then, α defeats β iff for some β ′ either α preference-independent attacks β on β ′ or α preference-dependent attacks β on β ′ and α ⊀ β ′ .</p><p>Then a structured argumentation framework (SAF ) can be defined from an argumentation theory,<ref type="foot" target="#foot_1">2</ref> using the attack relation. Using the defeat relation, an argumentation framework is then derived from a SAF . Definition 10. Let AT = (AS, K) be an argumentation theory. A structured argumentation framework (SAF ), defined by AT is a triple (S, C, ⪯) where S is the set of all finite arguments constructed from K in AS (called the set of arguments on the basis of AT ), C ⊆ S × S is such that (α, β) ∈ C iff α attacks β, and ⪯ is an ordering on S. Definition 11. Let Δ = (S, C, ⪯) be a SAF , and D ⊆ S × S be the defeat relation according to Definition 9. The AF corresponding to Δ is defined as F Δ = (S, D).</p><p>Given an argumentation semantics σ, the justification status of arguments in S according to σ is determined by the set of extensions E σ (F Δ ) according to Definition 3. </p><formula xml:id="formula_7">A 10 A 11 A 12 A 6 A 1 A 2 A 3 A 4 A 5 A 7 A 8 A 9</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Uncovering spurious preferences</head><p>To illustrate the phenomenon of spurious preferences, let us consider the following example (where we assume a simple language consisting just of a set of symbols and their negation). You have some uncertain evidence about the birthdate (b), birthplace (p) and domicile (d) of a person. From the known birthdate, it can be derived with certainty that the person is over 18 (m), and from the known birthplace it can be derived with certainty that the person is a citizen of a given country (c) (because ius soli holds in the country where the birthplace is located). Finally, from the domicile, age majority, and citizenship, it can be derived that the person must be included in the taxpayers' list (ω). However, it turns out with certainty that the person is not included in the list (¬ω). Thus, some of the uncertain evidence has to be rejected. In the absence of any preference among them, the three pieces of evidence are equal candidates to be retracted, and this is, in fact, what happens with the formalization of the example that we describe below.</p><p>The three evidences are represented by ordinary premises K p = {d, b, p} while the certain fact is represented by an axiom K n = {¬ω} and the domain knowledge is represented through strict rules</p><formula xml:id="formula_8">R Sb = {b → m; p → c; d, c, m → ω}.</formula><p>Closure under transposition (which is required to ensure the satisfaction of rationality postulates) leads to consider the following additional set of strict rules:</p><formula xml:id="formula_9">R St = {¬m → ¬b; ¬c → ¬p; d, c, ¬ω → ¬m; d, m, ¬ω → ¬c; c, m, ¬ω → ¬d}, thus R S = R Sb ∪ R St .</formula><p>The following arguments are then built:</p><formula xml:id="formula_10">A 1 = d; A 2 = b; A 3 = p; A 4 = A 3 → c; A 5 = A 2 → m; A 6 = A 1 , A 4 , A 5 → ω; A 7 = ¬ω; A 8 = A 1 , A 4 , A 7 → ¬m; A 9 = A 1 , A 5 , A 7 → ¬c; A 10 = A 4 , A 5 , A 7 → ¬d; A 11 = A 8 → ¬b; A 12 = A 9 → ¬p.</formula><p>Since no defeasible rules are involved, all attacks have the form of undermining. Focusing on ordinary premises first, we have that: A 1 is undermined by A 10 , A 2 is undermined by A 11 and A 3 is undermined by A 12 . Then, considering the use of ordinary premises in the construction of other arguments, the following attacks also occur:</p><formula xml:id="formula_11">A 10 undermines A 6 , A 8 , A 9 , A 11 , A 12 ; A 11 undermines A 5 , A 6 , A 9 , A 10 , A 12 ; A 12 undermines A 4 , A 6 , A 8 , A 10 , A 11 .</formula><p>The relevant argumentation framework is shown in Figure <ref type="figure" target="#fig_1">1</ref>.</p><p>It can be then observed that the core of the framework consists of the three arguments A 10 , A 11 , A 12 , which are the only sources of attacks and mutually attack each other. As a consequence, it can be seen that in the case of stable, preferred, or semi-stable semantics, we get the same three extensions:</p><formula xml:id="formula_12">E 1 = A 10 A 11 A 12 A 13 A 6 A 8 A 9 A 4 A 5 A 1 A 3 A 2 A 7 Figure 2:</formula><p>The argumentation framework corresponding to the second version of the taxpayers' list example.</p><formula xml:id="formula_13">{A 2 , A 3 , A 4 , A 5 , A 7 , A 10 }; E 2 = {A 1 , A 3 , A 4 , A 7 , A 8 , A 11 }; and E 3 = {A 1 , A 2 , A 5 , A 7 , A 9 , A 12 }.</formula><p>Each of these extensions corresponds to the rejection of one of the three ordinary premises (A 1 , A 2 , and A 3 , respectively) corresponding to the three uncertain pieces of evidence, which reflects the absence of any preference among them: according to Definition 3 any of them is credulously justified, while none of them is skeptically justified.</p><p>Consider now a slight variation of the above example, namely a country where ius soli has been introduced at a certain date (which we assume to be before the known birthdate of the person). In this case, the rule that derives citizenship will use both the birthplace and the birthdate as premises. Intuitively, this small variation in the structure of the strict rules should not affect the result: the three uncertain pieces of evidence should still be regarded to be equal candidates for rejection, given that, together, they give rise to a contradiction with a certain fact and that there is no preference among them. Somehow surprisingly, this is not the case, as illustrated below.</p><p>With respect to the representation of the original example, everything remains the same with the exception of the strict rule p → c, which becomes b, p → c. This gives rise to</p><formula xml:id="formula_14">R ′ Sb = {b → m; b, p → c; d, c, m → ω}.</formula><p>Closure under transposition of R ′ Sb gives rise to R ′ St = {¬m → ¬b; p, ¬c → ¬b; b, ¬c → ¬p; d, c, ¬ω → ¬m; d, m, ¬ω → ¬c; c, m, ¬ω → ¬d}, and the overall set of strict rules is given by R</p><formula xml:id="formula_15">′ S = R ′ Sb ∪ R ′ St .</formula><p>The following arguments are then built (for simplicity of notation, we use the same names as above since the distinction is clear from the context):</p><formula xml:id="formula_16">A 1 = d; A 2 = b; A 3 = p; A 4 = A 2 , A 3 → c; A 5 = A 2 → m; A 6 = A 1 , A 4 , A 5 → ω; A 7 = ¬ω; A 8 = A 1 , A 4 , A 7 → ¬m; A 9 = A 1 , A 5 , A 7 → ¬c; A 10 = A 4 , A 5 , A 7 → ¬d; A 11 = A 8 → ¬b; A 12 = A 2 , A 9 → ¬p; A 13 = A 3 , A 9 → ¬b.</formula><p>The attacks occurring directly on ordinary premises are the following: A 1 is undermined by A 10 ; A 2 is undermined by A 11 and A 13 ; A 3 is undermined by A 12 . Then, according to the use of the premises, the following attacks also occur: A 10 undermines A 6 , A </p><formula xml:id="formula_17">E 1 = {A 2 , A 3 , A 4 , A 5 , A 7 , A 10 } and E 2 = {A 1 , A 2 , A 5 , A 7 , A 9 , A 12 }.</formula><p>It turns out that, focusing on the ordinary premises, A 1 and A 3 are alternatively rejected, while A 2 is always accepted, which corresponds to a sort of implicit preference for argument A 2 , which turns out to be skeptically justified, with respect to arguments A 1 and A 3 , which are credulously justified. This implicit preference can be regarded as an accidental side effect of the structure of the set of strict rules, and has therefore a rather dubious conceptual status. For this reason, we call this implicit preference spurious.</p><p>Indeed, the fact that the information on birthdate is involved in two intermediate reasoning steps turns out to give it a privileged status that appears to be accidental and unjustified. We regard spurious preferences as an interesting but undesired behavior, and we develop a relevant preliminary investigation in the next sections.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">A basic requirement of spurious preference avoidance</head><p>A broad analysis of spurious preferences and the cases where they may arise appears to be a challenging task that is beyond the limits of this paper. As a preliminary contribution in this direction, in this section we define a simple reference context, which includes the motivating example as an instance, where it is possible to provide a formal notion of spurious preference. Accordingly, we will formulate a requirement of spurious preference avoidance, which is meant to support the comparison of different formalisms in situations like the one described in Section 3.</p><p>To this purpose, we resort to a notion of core argumentation theory, namely an argumentation theory which contains the essential elements for the representation of a reasoning case but may need to be completed with other elements, derivable from the core, before being used for the construction of arguments and their assessment. The idea is that different completions of the same core may behave differently with respect to spurious preference avoidance. In particular, we refer to a family of core argumentation theories called SSDOP (Simple Strict Derivation from Ordinary Premises), defined as follows.</p><p>Definition 12. Let AS = (L,¯, R, n) be an argumentation system and K a knowledge base in AS. An argumentation theory AT = (AS, K) is said to be an instance of the SSDOP family if the following conditions hold:</p><p>• the language L consists of the closure of a given set Σ of symbols and their negation, namely L = Σ ∪ {¬s | s ∈ Σ}; • the contrariness function coincides with the classical notion of negation: for every s ∈ Σ, s = {¬s} and ¬s = {s}; • R = (R Sb , ∅), namely the set of defeasible rules is empty; • ∄r, r ′ ∈ R Sb : cons(r) ∈ cons(r ′ ), namely no contradiction can be derived using the strict rules only; • K n = {¬ω} for some ω ∈ Σ that will be called contradiction focus; • ∀r ∈ R Sb , ant(r) ∩ {ω, ¬ω} = ∅;</p><p>• the set of ordinary premises K p satisfies the following conditions</p><formula xml:id="formula_18">-|K p | ≥ 2; -K p ∩ {ω, ¬ω} = ∅; -∄p, p ′ ∈ K p : p ∈ p ′ ; -∄r ∈ R Sb : cons(r) ∈ K p ∪ K p</formula><p>there is an argument α such that Prem(α) = K p , Conc(α) = ω, and there is no argument</p><formula xml:id="formula_19">α ′ such that Prem(α ′ ) ⊊ K p , Conc(α ′ ) = ω; -for every p 1 , p 2 ∈ K p , p 1 ≃ p 2 .</formula><p>It is easy to see that the examples presented in Section 3 are SSDOP instances. The idea is to encompass cases where a set K p of ordinary premises gives rise, through strict rules, to a contradiction with a certain fact, and all ordinary premises are equal candidates to be rejected to avoid this contradiction. The assumptions on K p are meant to ensure multiple choices (|K p | ≥ 2) and that there are no other possible reasons to discard some elements of K p .</p><p>In a SSDOP instance, the main focus of the evaluation is represented by the ordinary premises, as they are the only defeasible elements. To capture this central aspect and to abstract away formal aspects which are specific of different variants of ASPIC + to be compared, we introduce a generic notion of evaluation mechanism, incorporating all steps leading from a SSDOP instance to the evaluation of the justification status of the premises. Definition 13. An SSDOP evaluation mechanism E is a function which, given a SSDOP instance AT with ordinary premises K p , returns a justification labeling of K p , denoted as E AT .</p><p>The evaluation mechanism is semantics-dependent in ASPIC + . It consists of applying closure under transposition to the set of strict rules<ref type="foot" target="#foot_2">3</ref> , then carrying out the reasoning steps corresponding to Definitions 7-11, and finally applying a chosen semantics σ to derive the justification labeling of ordinary premises from E σ (F Δ ).</p><p>We can now introduce a basic requirement concerning spurious preference avoidance. First, we need to formalize the notion of modifying an argumentation theory by adding a premise to the antecedents of a strict rule. Definition 14. Given an argumentation system AS = (L,¯, R, n), where R = (R Sb , ∅) and a knowledge base K such that AT = (AS, K) belongs to the SSDOP family, we say that R ′ Sb is a P -addition of R Sb iff ∃r ∈ R Sb such that R ′ Sb = (R Sb \ {r}) ∪ {r ′ } where cons(r ′ ) = cons(r) and ant(r ′ ) = ant(r) ∪ {p} for some p ∈ K p .</p><p>With a little abuse of language, we will also say that AS ′ is a P -addition of AS when AS ′ is obtained from AS by replacing R Sb with a P -addition R ′ Sb , and we will say that AT ′ is a P -addition of AT with the same meaning. It is easy to see that for any SSDOP instance AT , every P -addition of AT also belongs to the SSDOP family since the addition of a premise to any strict rule does not affect any of the conditions in Definition 12.</p><p>It is also easy to see that in Section 3, the first example corresponds to an instance of the SSDOP family, and the second example is a P -addition of the first one.</p><p>We can now specify a basic spurious preference avoidance requirement with reference to an evaluation mechanism. This requirement refers to the adoption of a multiple-status semantics and adheres to a credulous perspective: in a SSDOP instance each premise should be accepted in some scenario, but rejected in some other. Under a single-status semantics, like the grounded semantics, a skeptical treatment, where all the premises are rejected altogether, would be appropriate and a complementary analysis would need to be developed, which is left to future work. Definition 15. An argumentation theory AT = (AS, K) which belongs to the SSDOP family is Crpremise-fair with respect to an evaluation mechanism E iff for every ordinary premise p ∈ K p , E AT (p) = Cr.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 16. An evaluation mechanism E satisfies the requirement of basic spurious preference avoidance if given any argumentation theory AT which is Cr-premise-fair with respect to E, it holds that every P -addition of AT is Cr-premise-fair too.</head><p>In plain words, if the premises of a SSDOP instance AT are treated equally (with a credulous outcome), the equal treatment should be preserved in every P -addition of AT .</p><p>From the example in Section 3, it emerges then that the evaluation mechanism corresponding to ASPIC + does not guarantee basic spurious preference avoidance with preferred, stable, and semi-stable semantics. In Section 5, we show that a variant of ASPIC + , introduced in <ref type="bibr" target="#b0">[1]</ref> for different purposes, provides better guarantees.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">ASPIC + revisited satisfies basic spurious preference avoidance</head><p>ASPIC + revisited (in the following ASPIC R ) was introduced in <ref type="bibr" target="#b0">[1]</ref> with the main goal of addressing a technical problem affecting ASPIC + in presence of multiple contradictories, first evidenced in <ref type="bibr" target="#b5">[6]</ref>. A thorough presentation of ASPIC R is beyond the limits of the present paper. In this section, we recall the main differences with respect to ASPIC + , which are relevant to the subsequent results, while omitting some unnecessary details.</p><p>One of the main standpoints of ASPIC R is avoiding the requirement that strict rules are closed under transposition. Rather, the satisfaction of the rationality postulates is ensured (as shown in <ref type="bibr" target="#b0">[1]</ref>) by an extended contrariness relation at the level of sets of language elements whose definition is based on a general notion of strict derivability.</p><p>Definition 17. Given an argumentation system AS = (L,¯, R, n) the strict knowledge base K * AS for AS is given by K n = L, K p = ∅ and the corresponding argumentation theory is defined as AT * AS = (AS, K * AS ). S ⊢ * φ and S ⊢ * min φ denote respectively that S ⊢ φ and S ⊢ min φ in AT * AS . </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 18. Given an argumentation theory</head><formula xml:id="formula_20">AT = (AS, K) with AS = (L,¯, R, n), let EC 1 (AS), EC 2 (AS), EC 3 (AS) be the following subsets of 2 L × 2 L • EC 1 (AS) = {({φ}, {ψ}) | φ ∈ ψ}; • EC 2 (AS) = {(S,</formula><formula xml:id="formula_21">′ = T } ⊆ 2 L × 2 L . U is a contrary of V if (U, V ) ∈ EC(AS) and (V, U ) / ∈ EC(AS); U is a contradictory of V if (U, V ) ∈ EC(AS) and (V, U ) ∈ EC(AS).</formula><p>The various forms of attack are then revised, replacing Definition 8 with the following definition concerning attacks between a set of arguments and an argument.</p><p>Definition 19. Given an argumentation theory AT = (AS, K), a set of arguments X attacks an argument β iff X undercuts, rebuts, or undermines β where:</p><formula xml:id="formula_22">• X undercuts β (on β ′ ) iff for some β ′ ∈ Sub(β) such that r = Top(β ′ ) ∈ R D , the following condition holds: ∃T, U such that T ∪ U = Conc(X) ∪ {n(r)}, (T, U ) ∈ EC(AS) and n(r) ∈ U . • X rebuts β (on β ′ ) iff for some β ′ ∈ Sub(β) of the form β ′′ 1 , . . . , β ′′ n ⇒ φ the following condition holds: ∃T, U such that T ∪ U = Conc(X) ∪ {φ}, (T, U ) ∈ EC(AS) and φ ∈ U . In this case X contrary-rebuts β if (U, T ) / ∈ EC(AS). • X undermines β (on β ′ ) iff for some β ′ = φ, φ ∈ Prem p (β) the following condition holds: ∃T, U such that T ∪ U = Conc(X) ∪ {φ}, (T, U ) ∈ EC(AS) and φ ∈ U . In this case X contrary- undermines β if (U, T ) / ∈ EC(AS).</formula><p>As the effectiveness of some attacks depends on the preference relation, the notion of preference ordering needs to be generalized to sets of arguments.</p><p>Definition 20. Given a preorder ⪯ on a set of arguments X, we extend ⪯ to 2 X × X as follows. An argument α is at least as preferred as a set of arguments Y , denoted</p><formula xml:id="formula_23">Y ⪯ α, iff ∃β ∈ Y such that β ⪯ α. α is strictly preferred to Y , denoted Y ≺ α, iff ∃β ∈ Y such that β ≺ α, not strictly preferred to Y , denoted Y ⊀ α iff ∄β ∈ Y such that β ≺ α.</formula><p>On this basis, an extended notion of defeat is introduced, replacing Definition 9. An AF based on the notion of defeat provided in Definition 21 is then defined to evaluate the justification status of arguments. The idea is that the framework nodes represent relevant sets of arguments. In particular, we need a node for each singleton corresponding to a produced argument, and a node for each set of ultimately fallible arguments (as per Definition 22) that minimally defeats some produced argument.</p><p>Definition 22. Given an argumentation theory AT = (AS, K) let S be the set of the arguments produced in AS on the basis of K. The set of ultimately fallible arguments of AT is defined as</p><formula xml:id="formula_24">UF(S) ≜ K p ∪ {α ∈ S | Top(α) ∈ R D }.</formula><p>Definition 23. Given an argumentation theory AT = (AS, K) with ordering ⪯, let S be the set of the arguments produced in AS on the basis of K. The set of relevant sets of arguments of AT , denoted as RS(AT ), is defined as</p><formula xml:id="formula_25">RS(AT ) = {{α} | α ∈ S} ∪ {X | X ⊆ UF(S) and ∃β ∈ S : X ⇝ β}.</formula><p>Then, a relevant set of ultimately fallible arguments attacks another one simply if it minimally defeats one of its members.</p><p>Definition 24. Let X, Y ∈ RS(AT ) for an argumentation theory AT = (AS, K) and S be the set of the arguments produced in AS on the basis of K. X D-attacks Y , denoted as ∥X∥ ↠ ∥Y ∥, iff X ⊆ UF(S) and ∃α ∈ Y : X ⇝ α.</p><p>The relevant set based AF is defined accordingly. Definition 25. Given an argumentation theory AT = (AS, K), the RS-based argumentation framework induced by AT is defined as</p><formula xml:id="formula_26">RS−F(AT ) = ({∥X∥ | X ∈ RS(AT )}, ↠).</formula><p>Finally, given an argumentation semantics σ, the justification status of an argument α corresponds to the one of ∥{α}∥ in RS−F(AT ) according to Definition 3.</p><p>ASPIC R provides a different evaluation mechanism for SSDOP argumentation theories, consisting in deriving the extended contrariness relation and then carrying out the reasoning steps established by Definitions 17-25 till the assignment of a justification status, as described above. As in the case of ASPIC + , the evaluation mechanism is parametric with respect to the choice of an argumentation semantics σ. We now prove that ASPIC R satisfies the requirement of basic spurious preference avoidance for preferred, stable and semi-stable semantics. Proposition 1. Any argumentation theory AT = (AS, K) which belongs to the SSDOP family is Crpremise-fair with respect to the evaluation mechanism provided by ASPIC R under the choice of preferred semantics.</p><p>Proof: Let AS = (L,¯, R, n) be an argumentation system and K a knowledge base in AS, such that the argumentation theory AT = (AS, K) belongs to the SSDOP family. Assume K p = P and for every x ∈ P , let us denote P x = P \ {x}. From the conditions in Definition 12, we have that P ⊢ * min ω, from which, with reference to Definition 18, it follows that (P, {¬ω}) ∈ EC 2 (AS) and ({¬ω}, P ) ∈ EC 3 (AS). Since ¬ω ∈ K n , we get {(P, ∅), (∅, P )} ∈ EC(AS). From (∅, P ) ∈ EC(AS), it follows that for every x ∈ P , P x undermines x according to Definition 19 (with T = ∅ and U = P ). By the conditions in Definition 12, P x ⊀ x and to conclude that P x defeats x according to Definition 21 we have to show that ∄P ′ ⊊ P x such that P ′ defeats x. To this purpose, let us refer to the elements of the extended contrariness relation of the form (S, T ) such that x ∈ T , taking into account the conditions specified in Definition 12. First, ({¬x}, {x}) is the only such pair in EC 1 (AS) and we note ¬x is not a premise nor an axiom and that there is no rule r such that ¬x = cons(r). Therefore there cannot be any argument with conclusion ¬x. For the same reason, there is no pair (S, {x}) with S ̸ = {¬x} in EC 2 (AS). Turning to EC 3 (AS), it contains any pair (S, T ) with x ∈ T satisfying the third bullet of Definition 18. This means that S ⊢ * min φ and T ⊢ * min ψ with φ ∈ ψ. However, Definition 12 prevents that a contradiction is derived through strict rules only, which means that S or T must be a singleton, i.e. S = {φ} or T = {ψ}, and that, to have an attack according to Definition 19, φ or ψ must be an ordinary premise or an axiom. The fact that φ or ψ is an ordinary premise is prevented by the conditions in Definition 12 (no ordinary premise is a contrary of another premise, no rule can conclude an ordinary premise or a contrary of an ordinary premise). Since by Definition 19 arguments cannot be undermined on axioms, the remaining case is where φ is an axiom, i.e. φ = ¬ω. We have already shown above that it cannot be the case that the pair ({¬ω}, {x}) belongs to EC 1 (AS) ∪ EC 2 (AS). The only possible case is ({¬ω}, T ) ∈ EC 3 (AS), for some T such that T ⊢ min ω and x ∈ T . From the conditions in Definition 12 the only set T satisfying these constraints is P , from which it follows, as desired, that ∄P ′ ⊊ P x such that P ′ defeats x. It follows that P x defeats x according to Definition 21 (recall that all premises are equally preferred, hence P x ⊀ x). Note now that, by the conditions in Definition 12, UF(AT ) = K p = P . It follows that, for every x ∈ P , P x ∈ RS(AT ) according to Definition 23. Then, according to Definition 24, ∥P x ∥ ↠ ∥X∥ for every X such that X ∈ RS(AT ) and x ∈ X. This means in particular that for every x, y ∈ P with x ̸ = y, there is a mutual attack between ∥P x ∥ and ∥P y ∥ in the argumentation framework RS−F(AT ).</p><p>We want now to show that a generic ∥P x ∥ has no other attackers in RS−F(AT ). Suppose there is X ∈ RS(AT ) such that ∥X∥ ↠ ∥P x ∥. By Definition 24, this means that ∃y ∈ P x such that X ⇝ y. Now, since y ∈ P , by the same reasoning carried out above, the only possibility is that X = P y .</p><p>It follows that for every x ∈ P , ∥P x ∥ is admissible and hence there is a preferred extension E including ∥P x ∥. By Lemma 3 of <ref type="bibr" target="#b0">[1]</ref>, for every y ∈ P x it follows then that ∥{y}∥ ∈ E, while of course ∥{x}∥ / ∈ E since it is attacked by ∥P x ∥. Since |P | ≥ 2 it follows that, for every x ∈ P , there is at least one preferred extension including ∥{x}∥ and one not including it, hence x is credulously justified and AT is Cr-premise-fair as desired. □ Proposition 2. Any argumentation theory AT = (AS, K) which belongs to the SSDOP family is Crpremise-fair with respect to the evaluation mechanism provided by ASPIC R under the choice of stable and semi-stable semantics.</p><p>Proof: We use the same notation introduced in the proof of Proposition 1 and we show that preferred extensions coincide with stable extensions (and hence with semi-stable extensions) in the argumentation framework RS−F(AT ). The conclusion then follows from Proposition 1. From the proof of Proposition 1 we know that for every x ∈ P it holds that ∥P x ∥ is attacked by all and only the elements ∥P y ∥ with y ∈ P and attacks these elements in turn. It follows that every preferred extension E must include exactly one element ∥P x ∥ for some x ∈ P . We want now to show that given a generic preferred extension E, for every argument α, ∥α∥ is either defended by (and hence included in) E or attacked by E. By the properties of RS−F(AT ) proved in <ref type="bibr" target="#b0">[1]</ref>, it then follows that for every X ∈ RS(AT ) ∥X∥ is either defended by (and hence included in) E or attacked by E, thus showing that E is also stable. Given the conditions in Definition 12, any argument α is either strict and firm, with Prem(α) ⊆ {¬ω} or plausible, with Prem(α) ∩ P ̸ = ∅. If α is strict and firm, then clearly ∥α∥ is unattacked in RS−F(AT ) and belongs to every preferred extension. If α is plausible, we observe that it can only be attacked on its ordinary premises, and, from the proof of Proposition 1, we already know that, for each ordinary premise y ∈ Prem(α), ∥y∥ can only be attacked by ∥P y ∥, and hence the set of attackers of ∥α∥ in RS−F(AT ) is ∥α∥ − = {∥P y ∥ | y ∈ Prem(α)}. Given a preferred extension E, let x be the one and only premise such that ∥P x ∥ ∈ E. We have then two cases: (i) if x ∈ Prem(α), then ∥P x ∥ attacks ∥α∥ in RS−F(AT ); (ii) if x / ∈ Prem(α), then for every y ∈ Prem(α) it holds that x ∈ P y and thus ∥P x ∥ attacks ∥P y ∥ in RS−F(AT ), hence ∥P x ∥ defends ∥α∥ as desired.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>□</head><p>The property of basic spurious preference avoidance follows from Propositions 1 and 2.</p><p>Theorem 1. The evaluation mechanism provided by ASPIC R under the choice of preferred, stable, and semi-stable semantics satisfies the basic spurious preference avoidance requirement.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proof:</head><p>The conclusion follows from the fact that given an argumentation theory AT which belongs to the SSDOP family every P -addition of AT belongs to the SSDOP family too. From Propositions 1 and 2 it follows then that both AT and any P -addition of are Cr-premise-fair, thus complying with the requirement of basic spurious preference avoidance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>□</head><p>As an illustration of the above result, we describe the behavior of ASPIC R in the second version of the taxpayers' list example without closure under transposition, giving rise to arguments:</p><formula xml:id="formula_27">A 1 = d; A 2 = b; A 3 = p; A 4 = A 2 , A 3 → c; A 5 = A 2 → m; A 6 = A 1 , A 4 , A 5 → ω; A 7 = ¬ω.</formula><p>Concerning  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Discussion and conclusions</head><p>Preferences have been considered in various ways both in structured and abstract argumentation <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8]</ref>. However, to our knowledge, the issue of implicit undesired preferences emerging from the behavior of an argumentation system has not been considered before in the literature. After illustrating it in the context of ASPIC + , we provided a requirement of basic spurious preference avoidance and showed that ASPIC R satisfies it. This provides a language-independent approach to the problem of spurious preferences. It has to be noted that language-dependent solutions can also be considered. For instance, if one assumes a language equipped with the notion of logical conjunction, the second version of the example might use a rule like b ∧ p → c instead of b, p → c. It can be seen that a spurious preference would not arise in this case. Pursuing a language-dependent solution would, however, be in contrast with the spirit of ASPIC + as a general framework not bound to a specific logical language nor to a specific interpretation thereof (see, for instance, the relevant remarks in <ref type="bibr" target="#b8">[9]</ref>). Moreover, we suggest that it can be considered peculiar to get different results, in a relatively simple reasoning case, depending on the representation choice between b, p → c and b ∧ p → c. We focused the analysis in this paper on the ASPIC + formalism, as a well-known and general approach to structured argumentation. As shown, the problem is not inherent to the ASPIC + formalism but can be regarded as a side effect of the use of closure under transposition of strict rules and can be avoided by using a different approach to ensure the satisfaction of rationality postulates. The present work represents an initial step in analysing the issue of spurious preferences. Among the many directions of future work, we mention the investigation about the occurrence of this problem in other structured argumentation formalisms like DeLP <ref type="bibr" target="#b9">[10]</ref> or ABA <ref type="bibr" target="#b10">[11]</ref> and the study of more general contexts with respect to SSDOP where spurious preferences should be avoided.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>a pair of sets of strict (R S ) and defeasible (R D ) inference rules of the form φ 1 , . . . , φ n → φ and φ 1 , . . . , φ n ⇒ φ respectively (where φ i , φ are meta-variables ranging over wff in L), and R S ∩ R D = ∅ 4. n : R D → L is a naming convention for R D .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The argumentation framework corresponding to the first version of the taxpayers' list example.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>{ψ}) | S ⊢ * min φ and φ ∈ ψ}; • EC 3 (AS) = {(S, T ) | T ⊢ * min ψ and (S, {ψ}) ∈ EC 1 (AS) ∪ EC 2 (AS)}. Letting EC * m (AS) = EC 1 (AS) ∪ EC 2 (AS) ∪ EC 3 (AS), and, for S ⊆ L, S = S \ K n , the extended contrariness relation is defined as EC(AS) = {( S, T ) | (S, T ) ∈ EC * m (AS) and ∀(S ′ , T ′ ) ∈ EC * m (AS) s.t. S ′ ⊆ S and T ′ ⊆ T , S ′ = S and T</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Definition 21 .</head><label>21</label><figDesc>Let the set of arguments Y attack an argument β on β ′ according to Definition 19. If Y undercuts, contrary-rebuts, or contrary-undermines β on β ′ , then Y preference-independent attacks β on β ′ , otherwise Y preference-dependent attacks β on β ′ . Then, Y defeats β iff either Y preferenceindependent attacks β on β ′ or Y preference-dependent attacks β on β ′ and Y ⊀ β ′ . Y minimally defeats β, denoted as Y ⇝ β, if Y defeats β and ∄Y ′ ⊊ Y such that Y ′ defeats β.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: The argumentation framework generated by ASPIC R for the second version of the taxpayers' list example.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>8 , A 9 , A 11 , A 12 , A 13 ; A 11 and A 13 undermine A 4 , A 5 , A 6 , A 8 , A 9 , A 10 , A 11 , A 12 , A 13 ; finally A 12 undermines A 4 , A 6 , A 8 ,A 10 , A 11 , A 13 . The relevant argumentation framework is shown in Figure 2. The core of the resulting argumentation framework consists of the four arguments A 10 , A 11 , A 12 , and A 13 which are the only sources of attacks. The four arguments are all mutually attacking each other, moreover A 11 and A 13 are self defeating. It turns out that according to the preferred, stable and semi-stable semantics, there are two extensions: one where A 10 is accepted while A 11 , A 12 , and A 13 are rejected, and one where A 12 is accepted while A 10 , A 11 , and A 13 are rejected. Taking into account the attack relations involving other arguments it turns out that the two extensions are as follows:</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>• EC 3 (AS)\(EC 1 (AS)∪EC 2 (AS)) = {({¬m}, {b}), ({¬c}, {b, p}), ({¬ω}, {d, c, m}), ({¬ω}, {d, c, b}), ({ω}, ∅), ({b}, {¬m}), ({b, p}, {¬c}), ({¬m}, {b}), ({¬c}, {b, p}), ({d, c, m}, ∅), ({d, c, b}, ∅), ({d, p, b}, ∅), (∅, {d, c, m}), (∅, {d, c, b}), (∅, {d, p, b})}.According to Definition 19, from (∅, {d, p, b}) ∈ EC(AS) we get that {A 1 , A 2 } undermines A 3 , {A 1 , A 3 } undermines A 2 , and {A 2 , A 3 } undermines A 1 . Taking into account the subargument relations, {A 1 , A 2 } undermines also A 4 and A 6 , {A 1 , A 3 } undermines also A 4 , A 5 and A 6 , {A 2 , A 3 } undermines also A 6 . Definition 19 encompasses also the following attacks: {A 4 , A 5 } undermines A 1 and A 6 ; {A 1 , A 4 } undermines A 2 , A 4 , A 5 and A 6 ; {A 2 , A 4 } undermines A 1 and A 6 . They however are "filtered out" by Definition 23 since they involve arguments which are not ultimately fallible. All the attack relations listed above are also minimal defeats.It follows that RS(AT) = {{A 1 }, {A 2 }, {A 3 }, {A 4 }, {A 5 }, {A 6 }, {A 7 }, {A 1 , A 2 }, {A 1 , A 3 }, {A 2 , A 3 }}.Then, according to Definition 24, ∥{A 1 , A 2 }∥ D-attacks the singletons ∥{A 3 }∥, ∥{A 4 }∥, ∥{A 6 }∥, and the relevant sets including them, namely ∥{A 1 , A 3 }∥ and ∥{A 2 , A 3 }∥. Similarly ∥{A 1 , A 3 }∥ D-attacks ∥{A 2 }∥, ∥{A 4 }∥, ∥{A 5 }∥, ∥{A 6 }∥, and ∥{A 2 , A 3 }∥ and ∥{A 1 , A 2 }∥, while ∥{A 2 , A 3 }∥ D-attacks∥{A 1 }∥, ∥{A 6 }∥, ∥{A 1 , A 2 }∥ and ∥{A 1 , A 3 }∥.The resulting argumentation framework is shown in Figure3. It has three preferred, stable and semi-stable extensions, namely E 1 = {∥{A 1 , A 2 }∥, ∥{A 1 }∥, ∥{A 2 }∥, ∥{A 5 }∥, ∥{A 7 }∥}, E 2 = {∥{A 2 , A 3 }∥, ∥{A 2 }∥, ∥{A 3 }∥, ∥{A 4 }∥, ∥{A 5 }∥, ∥{A 7 }∥}, E 3 = {∥{A 1 , A 3 }∥, ∥{A 1 }∥, ∥{A 3 }∥, ∥{A 7 }∥}. As expected, each of the three defeasible premises is credulously justified.</figDesc><table><row><cell cols="2">({¬ω}, {d, p, b})};</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>• EC(AS)</cell><cell>=</cell><cell>{({φ}, {¬φ}), ({¬φ}, {φ})</cell><cell>|</cell><cell>φ</cell><cell>∈</cell><cell>L \ {ω}} ∪</cell></row><row><cell>{(∅, {ω}),</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table><note>the ⊢ min relation we have that {φ} ⊢ * min φ for every φ ∈ L; {b} ⊢ * min m; {b, p} ⊢ * min c; {d, c, m} ⊢ * min ω; {d, c, b} ⊢ * min ω; {d, p, b} ⊢ * min ω. As to EC(AS) we get: • EC 1 (AS) = {({φ}, {¬φ}), ({¬φ}, {φ}) | φ ∈ L}; • EC 2 (AS) \ EC 1 (AS) = {({b}, {¬m}), ({b, p}, {¬c}), ({d, c, m}, {¬ω}), ({d, c, b}, {¬ω}), ({d, p, b}, {¬ω})};</note></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">We avoid reference to F and σ in J for ease of notation. Moreover, with respect to the traditional notion of justification we keep skeptical and credulous justification disjoint for reasons which will be clear later.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">We do not consider here the alternative notion of c-structured argumentation framework in<ref type="bibr" target="#b4">[5]</ref>.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">In<ref type="bibr" target="#b4">[5]</ref>, the property of closure under contraposition is also considered to satisfy rationality postulates. We do not consider it here, as it is not constructive, leaving further analyses to future work.</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work was supported by MUR project PRIN 2022 EPICA 'Enhancing Public Interest Communication with Argumentation' (CUP D53D23008860006) funded by the European Union -Next Generation EU, mission 4, component 2, investment 1.1.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A general semi-structured formalism for computational argumentation: Definition, properties, and examples of application</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Giacomin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Liao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">257</biblScope>
			<biblScope unit="page" from="158" to="207" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">An introduction to argumentation semantics</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Giacomin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge Engineering Review</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="page" from="365" to="410" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">On the evaluation of argumentation formalisms</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Amgoud</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">171</biblScope>
			<biblScope unit="page" from="286" to="310" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">An abstract framework for argumentation with structured arguments</title>
		<author>
			<persName><forename type="first">H</forename><surname>Prakken</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Argument &amp; Computation</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="93" to="124" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A general account of argumentation with preferences</title>
		<author>
			<persName><forename type="first">S</forename><surname>Modgil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Prakken</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">195</biblScope>
			<biblScope unit="page" from="361" to="397" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Dealing with generic contrariness in structured argumentation</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Giacomin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Liao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc, of the 24th Int. Joint Conference on Artificial Intelligence (IJCAI 2015)</title>
				<meeting>of the 24th Int. Joint Conference on Artificial Intelligence (IJCAI 2015)</meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="2727" to="2733" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Rich preference-based argumentation frameworks</title>
		<author>
			<persName><forename type="first">L</forename><surname>Amgoud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vesic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Approximate Reasoning</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="page" from="585" to="606" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Preference in Abstract Argumentation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kaci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Van Der Torre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vesic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Villata</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Formal Argumentation</title>
				<imprint>
			<publisher>College Publications</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">2</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Clarifying some misconceptions on the aspic + framework</title>
		<author>
			<persName><forename type="first">H</forename><surname>Prakken</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Modgil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 4th Int. Conf. on Computational Models of Argument (COMMA 2012)</title>
				<meeting>of the 4th Int. Conf. on Computational Models of Argument (COMMA 2012)</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="442" to="453" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Defeasible logic programming: An argumentative approach</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>García</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">R</forename><surname>Simari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory and Practice of Logic Programming</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="95" to="138" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A tutorial on assumption-based argumentation</title>
		<author>
			<persName><forename type="first">F</forename><surname>Toni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Argument &amp; Computation</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="89" to="117" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
