<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>April</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1109/REW56159.2022.00031</article-id>
      <title-group>
        <article-title>Open-source Intelligence Architecture for Cold Case Investigations</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Swikar Bhandari</string-name>
          <email>s.b.bhandari@utwente.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Doctoral Symposium, Posters &amp; Tools Track, and Education and Training Track.</institution>
          <addr-line>Co-located with REFSQ 2025. Barcelona</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>E. Paja, A. Perini, A. Rachmann, K. Schneider, L. Semini</institution>
          ,
          <addr-line>P. Spoletini</addr-line>
          ,
          <institution>A. Vogelsang. Joint Proceedings of REFSQ-2025 Workshops</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>In: M. Abbas</institution>
          ,
          <addr-line>F. B. Aydemir, M. Daneva, R. Guizzardi, J. Gulden, A. Herrmann, J. Horkof, M. Oriol Hilari, S. Kopczyńska, P. Mennig</addr-line>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>University of Twente</institution>
          ,
          <addr-line>Drienerlolaan 5, 7522 NB Enschede</addr-line>
          ,
          <country country="NL">Netherlands</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <volume>17</volume>
      <issue>2025</issue>
      <fpage>130</fpage>
      <lpage>135</lpage>
      <abstract>
        <p>The number of unsolved homicides in the Netherlands has gradually stacked up over the past few decades resulting in more than 1700 “cold cases” as of 2024. To tackle this problem, this paper presents a socio-technical system that facilitates the semi-automated collection and derivation of actionable intelligence from publicly available information for cold case investigations. The proposed system is designed using a multi-disciplinary approach by integrating solutions from the domains of homicide, ethics and philosophy, intelligence studies and computer science. Additionally, existing requirement engineering literature was used to identify the necessary requirements needed to design the proposed system. Thereby ensuring the safety, security and responsible use of OSINT for cold case investigations. We hope that the proposed socio-technical system can help mitigate cold cases and thus contribute towards the social good.</p>
      </abstract>
      <kwd-group>
        <kwd>OSINT</kwd>
        <kwd>cold case</kwd>
        <kwd>actionable intelligence</kwd>
        <kwd>socio-technical system</kwd>
        <kwd>requirements engineering</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Homicide can fundamentally be understood as the act of killing a human being either intentionally
(murder) or non-intentionally (manslaughter). In context to the Netherlands, around 160 homicides
occur every year on average [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Despite police investigation, not all homicides are solved mainly due
to lack of intelligence, evidence or tunnel vision [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The unsolved homicides that are no longer under
active police investigation are commonly referred to as “cold cases” [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. As a result, the number of
unsolved homicides in the Netherlands has gradually stacked up over the past few decades resulting in
more than 1700 unsolved “cold cases” as of 2024.
      </p>
      <p>
        Fortunately, there are diferent non-law enforcement stakeholders that aid law enforcement by
participating in cold case investigations through activities such as citizen science or crowdsourcing.
Both the police and non-law enforcement stakeholders conduct cold case investigations by relying on
the information that is openly available to the public that is referred to as publicly available information
(PAI) or open-source information (OSINF). The intelligence derived from PAI or OSINF is known as
open-source intelligence (OSINT). Over the years, OSINT has shown its potential in the domain of
policing and law enforcement, from identifying criminal behaviour to providing supporting evidence in
court [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. However, the existing literature lacks adequate research on potential of OSINT for homicide
investigations.
      </p>
      <p>
        In context to OSINT, there are several issues that must be addressed to ensure its suitability for
cold case investigations. First, OSINF about homicides is not primarily disseminated for investigation
purposes. Therefore, relevant information must be identified and extracted from the big heap of available
OSINF about homicides that can be considered suitable for conducting investigations. Second, relying
on OSINT also raises a number of epistemic issues such as unreliability, inconsistency and fuzziness [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
Third, there are various legal and ethical issues associated with OSINT. For example, automated data
collection at a large scale may even slow down and crash the website due to huge amount of web trafic.
      </p>
      <p>CEUR</p>
      <p>ceur-ws.org</p>
      <p>Extracting information without the permission of the source may lead to legal consequences such as
breach of contract and copyright infringement.</p>
      <p>
        Similarly, facilitating a collaboration between the police and non-law enforcement stakeholders for
criminal investigations have demonstrated to have significant risks [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. For example, citizens who lack
necessary training and expertise have shown to cross the boundary between boundary between police
and citizen territory by performing tasks such as arresting or interrogating people based on their own
suspicions, breaking chain of custody [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        The goal of investigation is to derive actionable intelligence that serve as evidence to reopen existing
cold cases. Thus, it is important to understand that while evidence can always provide some degree
of intelligence the reverse is not the case [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. If proper standards or guidelines are neglected then
despite having actionable intelligence, the decision maker cannot use the intelligence as evidence,
thereby compromising the investigation [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].Therefore, it is necessary to address these challenges before
introducing a socio-technical solution, especially for a high-risk domain such as cold case investigations.
      </p>
      <p>
        Past experiences have already demonstrated the consequences of introducing socio-technical solutions
in the domain of policing and law enforcement without critically reflecting their impact towards society.
For example, the fraud tackling tool called SyRI that was used by the Dutch government, violated many
ethical guidelines including the right to privacy according to article 8 of the European Convention on
Human Rights [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ]. Existing requirements engineering (RE) approaches have helped stakeholders to
efectively to develop solutions in domain of policing and law enforcement. However, the current RE
literature lacks adequate research on addressing AI-driven and ethical requirements [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>In light of the above research gaps and challenges, this PhD project aims to design a socio-technical
system that facilitates a collaboration between various non-law enforcement stakeholders and the police
to semi-automatically collect PAI and derive actionable intelligence to aid in the forensic investigation of
cold cases. Similarly, the proposed system will be designed to ensure the safety, security and responsible
use of OSINT for cold case investigations.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        There are several studies that have demonstrated the implementation of requirement engineering (RE)
to develop solutions in the domain of policing and law enforcement. The existing RE literature depicts
a heavy emphasis on crimes associated with the cyber security domain including fraud, identity theft,
spam [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15 ref16 ref17 ref18">12, 13, 14, 15, 16, 17, 18</xref>
        ]. Most studies have also focused on identifying requirements associated
with digital investigations [19, 20, 21, 22, 23, 24]. Similarly, few studies have explored the challenges
associated with crowdsourcing [
        <xref ref-type="bibr" rid="ref18">24, 18</xref>
        ]. However, to the best of author’s knowledge, there have been
no RE studies focused on homicide investigations.
      </p>
      <p>
        In context to RE methods or approaches, goal-oriented requirements engineering (GORE) method
has been used in two studies associated with digital investigations [19, 20]. Similarly, agile method was
implemented by [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] and [25] to combat crimes associated with cyber-attacks and illegal timber trades
respectively. [26] combined the principles of RE and criminology to develop profile of attackers for
software-intensive systems. [ 27] used a design science approach to develop an ethics and privacy-based
system dedicated for maritime surveillance. Scenario-based approach was used by to conduct
requirement elicitation for tackling fraud. However, several studies have implemented unique approaches
to identify requirements without solely relying on a single RE method [
        <xref ref-type="bibr" rid="ref13">21, 28, 29, 26, 23, 13, 30</xref>
        ]. For
instance, a multi-faced approach was implemented to develop crime records management system for
the Uganda police force [30].
      </p>
      <p>
        Most of the requirements addressed in the current literature in the domain of policing and law
enforcement consists of crime, security requirements. However, the rise of artificial intelligence (AI)
has brought forth novel hurdles including ethical challenges that must be addressed to when developing
AI-driven solutions [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Although there are few studies that have already attempted to address the
AI-driven and ethical requirements [
        <xref ref-type="bibr" rid="ref11">27, 11</xref>
        ], there is still a lack of suficient research in this topic.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Methodology</title>
      <p>This PhD project tackles the underlying problem of cold cases through a multi-disciplinary approach
by integrating solutions from the domains of homicide, ethics and philosophy, intelligence studies as
well as computer science. Similarly, this project relies on the existing RE literature to identify various
requirements required to design the proposed system. This PhD project therefore focuses on finding
answers to the following research questions:
RQ1. How can relevant information required for cold case investigations be extracted from
OSINF?
The first step involved understanding the domain of homicide investigations and OSINT. The project
partners involved in this PhD such as the Technology for Criminal Investigations (TCI) research group
at the Saxion University of Applied Science (UAS) and the Police Academy of the Netherlands enabled
the opportunity to collaborate with experts in the domains of homicide and cold case investigations.
Additionally, this collaboration also provided the opportunity to undertake OSINT training at the
International Anti Crime Academy (IACA).</p>
      <p>
        To enable investigators, tackle the problem of tunnel vision caused due to the lack of intelligence
during criminal investigations, a new method known as scenario-based methods has been developed
over the past decades [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. A scenario is a story that describes foreseeable interactions between characters
and the system. This approach involves analysing a criminal incident by finding the answer to the
question of “what happened during the incident?” by using various scenario components. One of the
well-known scenario-based approach is known as the narrative approach developed by Prof. Peter
de Kock. It involves developing a scenario using twelve dynamically connected building called the
Elementary Scenario Components (ESCs) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. This approach was used to develop a system called
Pandora to conduct terrorist investigations and has already shown promising results.
      </p>
      <p>In 2020, the “Cold Case: Solved Unsolved” project adapted de Kock’s model with some modifications
to make it suitable for homicide investigations [31]. However, the empirical validity of the narrative
approach for cold case investigations has not been established yet.</p>
      <p>In this project, the adaptation of narrative approach developed during the cold and unsolved project
was evaluated to determine its empirical validity based on the existing literature on homicide studies.
The findings of the evaluation are used to improve the current model through the addition of
essential components and removal of unsuitable or problematic components for homicide investigations,
respectively.</p>
      <p>After this step, the adjusted version of the narrative approach was used to semi-automatically collect,
analyse and derive OSINT about cold cases through a human-machine collaboration. First, an academic
law enforcement collaboration was facilitated to conduct OSINT driven-cold case investigations through
the students enrolled at the “Cold Case Minor” course. This course is delivered by the TCI research
group which is a collaboration between Saxion UAS and Police Academy of the Netherlands.</p>
      <p>Similarly, the potential of the latest technological advancements in automated (AI-based)
information extraction was evaluated through unstructured text using Large Language Models (LLMs). The
information collected in this step was further used to develop and evaluate scenarios.
RQ2. What are the normative requirements that justifies OSINT as actionable or
nonactionable for cold case investigations?
To become familiar with the domain of ethics and philosophy, the course “Machines, minds, and
society: the ethics and epistemology of AI” was undertaken at the University of Twente. After that,
the evaluation of OSINT was conducted to determine the normative criteria for actionability using the
“ethics through epistemology” approach. This process was helped understand the epistemic, ethical and
legal challenges associated with OSINT in context to cold case investigations [32].
RQ3. How can we address the epistemic challenges associated with OSINT for cold case
investigations?
To address the epistemic challenges associated with OSINT, the academic law enforcement collaboration
was further implemented by operating student analysts to conduct the reliability assessment of OSINT
for cold case investigations. The assessments were conducted using information quality metrics such
as source credibility and information reliability based on the NATO STANAG 2511 scales [33].</p>
      <p>The next step involves the representation and analysis of scenarios using 2 approaches. The first
approach involves representing the complex scenarios using knowledge graphs (KG). A KG is a visual
representation of knowledge in a graph-based structure through entities and relationships. KGs enable
investigators to visually analyse the uncertainty associated with scenarios developed from OSINT.
Similarly, the second approach involves using a probabilistic database system called Dubio that enables
the storage, querying and manipulation of uncertain information [34].</p>
      <p>RQ4. How can the challenges associated with the involvement of non-law enforcement
stakeholders in cold case investigations be addressed?
In context to cold case investigation, unidentified perpetrators may voluntarily participate in these
initiatives to gather the information that police possess and finds ways to mislead or disrupt the
investigation. Thus, several strategies were implemented to prevent this while facilitating an academic
law enforcement collaboration. First, the background information of all participants was evaluated
alongside any conflict of interest regarding any case they investigated. Similarly, the participants were
provided with necessary theoretical knowledge and practical skills from experts. For example, IACA
provided OSINT training to participants through with they learned how to use state of art tools to
conduct OSINT investigation and document their findings. Lastly, information collected by participants
were validated to ensure data integrity.</p>
      <p>The theoretical and practical findings generated from the research questions will be further evaluated to
ifnd the answer to the broader research question: To what extent can the proposed socio-technical
system harness the power of OSINT to aid in the forensic investigation of cold cases?</p>
    </sec>
    <sec id="sec-4">
      <title>4. Proposed solution</title>
      <p>Using a multi-disciplinary approach described in the previous section, the proposed actionable OSINT
architecture for cold case investigations was developed. Figure 1 shows a system context diagram of the
proposed architecture to demonstrate the interaction of stakeholders with the diferent components of
OSINT system to derive actionable intelligence. The system begins with the extraction of OSINF using
the narrative approach through both human and machine-based approaches. The next step consists of
evaluating the reliability of OSINF collected in the previous step using information analysts.</p>
      <p>In the third step, the system will derive and represent plausible scenarios using the information
collected and evaluated in the previous steps. The selected scenarios will be then analysed by both
non-law enforcement and law enforcement decision makers. If the intelligence seems promising, it
will further be verified and validated using closed source intelligence to determine whether the derived
OSINT can be considered actionable or non-actionable. The cold case will only be recommended to be
re-opened if the derived intelligence proves to be actionable.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Research Progress and Future Work</title>
      <p>The first year of the PhD focused on understanding the multi-disciplinary domains. In the second
year, the empirical evaluation and improvement of the narrative approach for homicide investigations
was conducted. The initial findings of this study were presented on the Homicide Research Working
Group 2023 annual conference. Similarly, the normative evaluation of OSINT was conducted to using
the “ethics through epistemology” approach to determine the actionability of OSINT for cold case
investigations [32]. These steps served as the foundation that helped identify the diferent requirements
necessary to develop the proposed system. The findings of the first step were further used to develop
the data collection plan to facilitate a human-machine collaboration. Lastly, the reliability assessment
of OSINT for cold case investigations has been completed.</p>
      <p>Currently, the research is focused on exploring diferent approaches to represent the collected
information using knowledge graph and probabilistic data integration approaches. This will help find
an answer to RQ3. After the completion of this step, both the theoretical and findings will be evaluated
to answer the main research question: “To what extent can the proposed socio-technical system aid in
the forensic investigation of cold cases?”</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>In this paper, we propose a socio-technical solution to conduct OSINT-driven cold case investigations.
The proposed system facilitates a collaboration between various non-law enforcement stakeholders
and the police to semi-automatically collect PAI and derive actionable intelligence to aid in the forensic
investigation of cold cases. The proposed solution is designed using a novel multi-disciplinary approach
by integrating solutions from the domains of homicide, ethics and philosophy, intelligence studies
and computer science. Similarly, this project draws upon the existing RE literature to identify various
requirements needed to design the proposed system. Additionally, this project contributes to the
existing RE literature by addressing the research gap concerning AI-driven and ethical requirements.
We hope that this project can contribute towards the reduction of cold cases and help deliver justice to
the victims alongside their close ones. Thereby, contributing towards the social good and paving a path
towards the development of a safe society.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>This research project is supported by the research grant from the Dutch Centrum voor Veiligheid en
Digitalisering. The author is thankful for all the support provided by the supervisors involved in this
project from the University of Twente, Saxion University of Applied Sciences and the Police Academy
of the Netherlands.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>CBS</surname>
          </string-name>
          ,
          <article-title>Male homicide rate up in 2021, 2022</article-title>
          . URL: https://www.cbs.nl/en-gb/news/2022/39/ male-homicide
          <article-title>-rate-up-in-2021.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Epskamp-Dudink</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Winter</surname>
          </string-name>
          ,
          <article-title>Benefits of scenario reconstruction in cold case investigations</article-title>
          ,
          <source>Journal of Criminal Psychology</source>
          <volume>10</volume>
          (
          <year>2020</year>
          )
          <fpage>65</fpage>
          -
          <lpage>78</lpage>
          . doi:
          <volume>10</volume>
          .1108/JCP-09-2019-0035.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Adcock</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. L.</given-names>
            <surname>Stein</surname>
          </string-name>
          , Cold Cases:
          <article-title>Evaluation Models with Follow-up Strategies for Investigators</article-title>
          ,
          <source>Second Edition</source>
          , 2 ed.,
          <string-name>
            <surname>Routledge</surname>
          </string-name>
          , New York,
          <year>2014</year>
          . doi:
          <volume>10</volume>
          .1201/b17698.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Sampson</surname>
          </string-name>
          ,
          <article-title>Intelligent evidence: Using open source intelligence (OSINT) in criminal proceedings</article-title>
          ,
          <source>The Police Journal</source>
          <volume>90</volume>
          (
          <year>2017</year>
          )
          <fpage>55</fpage>
          -
          <lpage>69</lpage>
          . doi:
          <volume>10</volume>
          .1177/0032258X16671031.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>P. de Kock</surname>
          </string-name>
          ,
          <article-title>Anticipating criminal behaviour: Using the narrative in crime-related data</article-title>
          ,
          <source>Doctoral Thesis</source>
          ,
          <article-title>Tilburg center for Cognition and Communication (TiCC)</article-title>
          , Tilburg,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Granja</surname>
          </string-name>
          ,
          <article-title>Citizen science at the roots and as the future of forensic genetic genealogy</article-title>
          ,
          <source>International Journal of Police Science &amp; Management</source>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1177/14613557231164901.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Mols</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pridmore</surname>
          </string-name>
          , When Citizens Are “
          <article-title>Actually Doing Police Work”: The Blurring of Boundaries in WhatsApp Neighbourhood Crime Prevention Groups in The Netherlands</article-title>
          ,
          <source>Surveillance &amp; Society</source>
          <volume>17</volume>
          (
          <year>2019</year>
          )
          <fpage>272</fpage>
          -
          <lpage>287</lpage>
          . doi:
          <volume>10</volume>
          .24908/ss.v17i3/4.8664.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ramwell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Day</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Gibson</surname>
          </string-name>
          ,
          <article-title>Use Cases and Best Practices for LEAs</article-title>
          , in: B.
          <string-name>
            <surname>Akhgar</surname>
            ,
            <given-names>P. S.</given-names>
          </string-name>
          <string-name>
            <surname>Bayerl</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Sampson</surname>
          </string-name>
          (Eds.),
          <source>Open Source Intelligence Investigation</source>
          , Springer International Publishing, Cham,
          <year>2016</year>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>211</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -47671-1_
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>L.</given-names>
            <surname>Strikwerda</surname>
          </string-name>
          ,
          <article-title>Predictive policing: The risks associated with risk assessment</article-title>
          ,
          <source>The Police Journal</source>
          <volume>94</volume>
          (
          <year>2021</year>
          )
          <fpage>422</fpage>
          -
          <lpage>436</lpage>
          . doi:
          <volume>10</volume>
          .1177/0032258X20947749.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>X. van Bruxvoort</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. van Keulen</surname>
          </string-name>
          ,
          <article-title>Framework for Assessing Ethical Aspects of Algorithms</article-title>
          and Their Encompassing
          <string-name>
            <surname>Socio-Technical</surname>
            <given-names>System</given-names>
          </string-name>
          ,
          <source>Applied Sciences</source>
          <volume>11</volume>
          (
          <year>2021</year>
          )
          <article-title>11187</article-title>
          . doi:
          <volume>10</volume>
          .3390/ app112311187.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>K.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Abdelrazek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Arora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Grundy</surname>
          </string-name>
          ,
          <article-title>What's up with Requirements Engineering for Artificial Intelligence Systems?</article-title>
          , in: 2021 IEEE 29th International Requirements Engineering Conference (RE),
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          . doi:
          <volume>10</volume>
          .1109/RE51729.
          <year>2021</year>
          .
          <volume>00008</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>B.</given-names>
            <surname>Whitworth</surname>
          </string-name>
          , E. Whitworth,
          <article-title>Spam and the social-technical gap</article-title>
          ,
          <source>Computer</source>
          <volume>37</volume>
          (
          <year>2004</year>
          )
          <fpage>38</fpage>
          -
          <lpage>45</lpage>
          . doi:
          <volume>10</volume>
          .1109/
          <string-name>
            <surname>MC</surname>
          </string-name>
          .
          <year>2004</year>
          .
          <volume>177</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>H.</given-names>
            <surname>Dehghanniri</surname>
          </string-name>
          , E. Letier,
          <string-name>
            <given-names>H.</given-names>
            <surname>Borrion</surname>
          </string-name>
          ,
          <article-title>Improving security decision under uncertainty: A multidisciplinary approach</article-title>
          , in: 2015
          <source>International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . doi:
          <volume>10</volume>
          .1109/CyberSA.
          <year>2015</year>
          .
          <volume>7166134</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>T.</given-names>
            <surname>Grant</surname>
          </string-name>
          ,
          <article-title>Specifying functional requirements for simulating professional ofensive cyber operations</article-title>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Yesuf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wolos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Rannenberg</surname>
          </string-name>
          , Fraud Risk Modelling:
          <article-title>Requirements Elicitation in the Case of Telecom Services</article-title>
          , in: S. Za,
          <string-name>
            <given-names>M.</given-names>
            <surname>Drăgoicea</surname>
          </string-name>
          , M. Cavallari (Eds.),
          <source>Exploring Services Science</source>
          , volume
          <volume>279</volume>
          , Springer International Publishing, Cham,
          <year>2017</year>
          , pp.
          <fpage>323</fpage>
          -
          <lpage>336</lpage>
          . doi:
          <volume>10</volume>
          .1007/ 978-3-
          <fpage>319</fpage>
          -56925-3_
          <fpage>26</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>E.</given-names>
            <surname>Hadar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hassanzadeh</surname>
          </string-name>
          ,
          <article-title>Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements</article-title>
          , in: 2019 IEEE 27th International Requirements Engineering Conference (RE),
          <year>2019</year>
          , pp.
          <fpage>330</fpage>
          -
          <lpage>339</lpage>
          . doi:
          <volume>10</volume>
          .1109/RE.
          <year>2019</year>
          .
          <volume>00042</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>D.</given-names>
            <surname>Cirqueira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Nedbal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Helfert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bezbradica</surname>
          </string-name>
          ,
          <article-title>Scenario-Based Requirements Elicitation for User-Centric Explainable AI: A Case in Fraud Detection</article-title>
          , in: A.
          <string-name>
            <surname>Holzinger</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Kieseberg</surname>
            ,
            <given-names>A. M.</given-names>
          </string-name>
          <string-name>
            <surname>Tjoa</surname>
          </string-name>
          , E. Weippl (Eds.),
          <source>Machine Learning and Knowledge Extraction</source>
          , volume
          <volume>12279</volume>
          , Springer International Publishing, Cham,
          <year>2020</year>
          , pp.
          <fpage>321</fpage>
          -
          <lpage>341</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -57321-8_
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>H.</given-names>
            <surname>Rosser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mayor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Stemmler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ahuja</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Grover</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hale</surname>
          </string-name>
          , Phish Finders:
          <article-title>Crowd-powered</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>