<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Operationalizing Ontologies in the Crime Domain</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rachel A. Mavrovich</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Center of Ontological Research</institution>
          ,
          <addr-line>Buffalo, NY</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University at Buffalo</institution>
          ,
          <addr-line>Buffalo, NY</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <fpage>10</fpage>
      <lpage>12</lpage>
      <abstract>
        <p>Crime databases, especially between different organizations, are disparate. Gaps in crime databases hinder the accurate comprehension and integration of information for solving crimes. This project proposes the development of a general, domain-level Crime Ontology, that is grounded in the Basic Formal Ontology (BFO) and Common Core Ontologies (CCO), to formalize and integrate crime related data. Unlike previous efforts that are either narrowly scoped or legally focused, this project highlights the distinct nature of criminal events. Requiring an independent ontological framework from that of legal ontologies. I discuss two important methodological approaches: top-down modelling and bottom-up analysis. I present two initial case studies, that of the kidnapping and murder of Italian Prime Minister Aldo Moro, which were used to test the use of design patterns in representing crime events and psychological assessments. The project now aims to develop a general structure akin to the Open Biomedical Ontologies (OBO) Foundry, but specifically for crime. A type of reference ontology that supports varied sub-domains like human trafficking and kidnapping.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Crime Ontology</kwd>
        <kwd>Domain Ontology</kwd>
        <kwd>Basic Formal Ontology</kwd>
        <kwd>Common Core Ontologies</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        1. Introduction and Motivations
Information in crime databases have gaps, especially between different crime solving organizations
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The problem with these gaps is that they prevent relevant users from getting the most accurate
data to answer their questions [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. One solution to this problem is a framework that provides
structure and integration to large amounts of data. Applied Ontology utilizes logical and
metaphysical principles along with a well-defined and controlled vocabulary of terms and relations
to better facilitate interoperability between information systems. My work aims to give an applied
ontological approach that will help formalize the information in these databases. I will be using a
top-down method to start, where I begin with the broader concepts and make our way to narrower
concepts. I will then supplement this with a bottom-up approach, meaning I then use instance data
to see how that matches (or conflicts) with the top-down results. This will result in a unified
approach that is flexible enough to serve different users and interests while still achieving semantic
interoperability between data sets.
      </p>
      <p>
        Various attempts have been made toward creating a crime ontology. On GitHub there are
projects dedicated to specific criminal acts [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], crime analysis with a legal slant [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], and
cybercrime [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5, 6, 7</xref>
        ]. All these projects aim at trying to organize data related to crime for one
purpose or the other, but none of them conforms to a known ISO standard, except for a list of
criminal acts terms on GitHub [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Moreover, these GitHub projects either focus on legal users or
have a very narrow scope. This leads to siloed information, where the projects serve only specific
use cases without being interoperable lessening the overall effectiveness of each project. Therefore,
it is important that I use a top-level ontology like BFO for two reasons. First, it is a recognized
standard which ensures consistency and transparency of open-source data for relevant users. This
matters because families and relevant users should be able to see how and where their data is being
used. Second, it allows for the explicit modelling of top-level categories, ensuring semantic
interoperability between systems [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Moreover, these GitHub projects either focus on legal users
or have a very specific scope.
      </p>
      <p>
        While law-focused users are important, these approaches lack a clear top-down framework. An
ontology with a wider scope allows for capturing different types of relations [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. This would allow
for more comprehensive and wide raging analysis to be made from the structured data within
criminal activities and databases. The Basic Formal Ontology (BFO) is a top-level ontology
architecture used in information sharing and system interoperability. It is currently being applied
in various fields and subjects, including but not limited to biomedical sciences [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and national
defense and security [
        <xref ref-type="bibr" rid="ref10 ref11">10,11</xref>
        ]. Additionally, the Common Core Ontologies, the most widely used
extension of BFO, is made up of 12 mid-level ontologies which are also being applied to these
domains [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Extensions from BFO and CCO include domain level ontologies, which are about a
specific subject but do not fall under the high-level or mid-level umbrella because their content is
not as encompassing or broad as the former. The goal of this project is to create and apply a
domain level ontology for crime that extends from BFO and CCO. There have been some successful
domain level ontologies that none-the-less are overarching enough to capture many different use
cases. Take the Open Biomedical Ontologies (OBO) Foundry, a unified open access collection of
ontologies that is meant to capture data integration in the biological sciences [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. It acts as an
overarching structure for medical and biological investigation which allows other more specific
ontologies to fit under it. Other examples include the Gene Ontology (GO) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and the Industrial
Ontologies Foundry (IOF) Core Ontology [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The goal for the Crime Ontology is to follow this
design to create a solid and general foundation where particular use cases can fit underneath.
      </p>
      <p>
        With all that being said a question that might pop up is why not just represent these matters
through a law ontology? Why a separate one for crime? Just like with the crime ontology, there
have been efforts and ideas for a robust law ontology [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. I will now briefly discuss why
developing a crime ontology separately is important and that both law and crime should not be
reduced into each other, no matter their close relationship. To start off, law deals with criminal
activity from an abstract view and describes it as a history, not a present/ongoing moment. Take
the term ‘perpetrator’ as an example. A law ontology would describe the role of perpetrator as
being a part of an individual’s past relative to a crime, while a crime ontology would treat the role
of perpetrator as active in relation to the crime. This is an important distinction as the use of one or
the other dictates how data is interpreted and applied. This means that a law ontology may not be
enough to capture pragmatic issues with crime data. It is also important to note that not all laws
include crime, such as a legislative directive. I would not want my research question about crime to
accidently include non-criminal violations. For these reasons a comprehensive, overarching
ontology dedicated to the domain of crime is much more useful to tackling criminal activity than
solely relying on a law ontology. This is not to exclude the law and crime ontologies from
informing each other or overlapping. That will necessarily happen; interoperability is one of the
main strengths of using ontologies. Additionally, the actual instances which generate the data will
likely overlap, such as with cold cases, cases that are re-opened and cases whose location is in legal
environments.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. The Project</title>
      <p>
        The initial stages of this project started with a dry run to test whether a BFO/CCO conformant
ontology could be implemented in a specific use case: the kidnapping and execution of ex-prime
minister of Italy, Aldo Moro. A psychological profile was created by a subject matter expert [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]
and this profile was then represented through an ontology. The first run mapped the profile as an
Information Content Entity, which is a type of entity that is about something [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. This way I could
represent documents (in this case, the psychological profile) without having to model behavior and
personality themselves. Modelling assessments will be an important method that I intend to
continually use in the future when it comes to the tagging of cases and their artefacts. I presented
the first run of this project at the Cognitive Science Emerging Scholars Symposium at SUNY at
Buffalo, 2025 in poster format.
      </p>
      <p>
        The next run of the project included modelling a timeline of Aldo Moro’s case. The timeline is
from the known hour of his kidnapping to the known date when his body was located. Unlike a
psychological profile the timeline is strictly data points about factual events, there was no
modelling of the psychological assessments of a person. For this run, the Aldo Moro kidnapping
Wikipedia [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] was used as a baseline. This run was to test a particular use case, not of an
assessment document like for the psychological profile, but to see if I could capture a chronological
arrangement of data points for a crime that spans more than one day. I presented the second run of
this project at SUNY at Buffalo’s Student Showcase for Academic Excellence, 2025.
      </p>
      <p>The crime ontology project has now moved to the wider scope than addressed in the
introduction. Instead of sticking to an instance, I am tackling the general domain level ontology I
originally planned for. Figure 1 shows a design pattern of general crime representation. I, in
collaboration with others, am developing and refining high level terms, processes, and relations
and then connecting this through design patterns. Design patterns are used to represent condensed
elements of an ontology. Their purpose is for subject matter experts and relevant audiences to
quickly grasp what the ontology and data is doing. In terms of collecting data, I am currently
working on doing data ingestion for gathering and applying sources. Lastly, a current subject
matter expert (SME) list includes ontologists, psychologists and data ingestion experts. An
expanded SME list will be provided in the Target State section of this paper.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Target State</title>
      <p>
        The goals of the crime ontology for the next 6 months are as follows: (1) conduct analysis on
compiled data with Subject Matter Experts (SME) and relevant researchers; (2) analyze information
provided by SMEs; (3) generate the rudimentary structure of general domain level crime ontology.
Future SME’S will include law enforcement officials, prisoners, survivors, data analysts, and
relevant researchers. It is to be noted that relevant researchers who are subject matter experts on
crime will be part of societies like the National Centre for Missing and Exploited Children
(NCMEC), and researchers at the Cold Case Analysis Center (CCAC) at University at Albany.
NCMEC is a non-profit 501(c)(3) corporation that helps find missing children and helps in
preventing child exploitation [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. CCAC is a part of the School of Criminal Justice at University at
Albany, they aid families and agencies in case investigation [19]. Relevant researchers who are
analyzing the information provided by the SMEs will be CITI and facilitator certified. This is to
ensure all narrative analyses and meta-analyses are not only done by qualified researchers but are
done respectfully and ethically. This is important because I am dealing with sensitive human
source topics, and I wish to take seriously the difficulties and weight of these topics. When tackling
the domain of crime, I think it is of importance to get various perspectives, from those who are
meant to enforce the law and those who are said to have violated it.
      </p>
      <p>The ontological methods that will be applied in the process of this project will be as follows. I
will first gather data from our sources using, but not limited to, interview and data ingestion
techniques. Meta-analysis and narrative analysis will be conducted on the data to synthesize and
identify any gaps. Design patterns and high-level terms will then be produced to test the data. The
crime ontology will extend from BFO and CCO frameworks, and I will work from a top-down
approach.</p>
      <p>Throughout this paper I have made clear this project’s intention is to develop a general
ontology of crime, one that can be reused and applied generally to different instances, the goal is to
eventually have something like the OBO Foundry albeit for crime. For example, a few ontologies
that could be developed are those for human trafficking and kidnapping. Where time is of the
essence, so large and fast changing amounts of data need to be accurately and swiftly organized.
Being able to pull information quickly from a reliable structured source ensures accurate
evaluation and good response to these types of criminal activity. This is important because, while
the structure of the ontology may be good, it is important to have a pragmatic goal of where this
ontological structure may be applied.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>In an increasingly interconnected world, there is a need for structured, reliable and interoperable
crime data systems. This paper has outlined the motivation, current progress, and future endeavors
for the development of a general domain-level crime ontology, which will be grounded in the Basic
Formal Ontology (BFO) and Common Core Ontologies (CCO). This project aims to address the gaps
in existing crime databases and support better data integration, transparency, and analysis for
different stakeholders. This paper addressed the important philosophical and practical distinctions
between that of abstract legal processes and the active concrete processes of criminal events, which
showed the need for a standalone crime ontology. Building a general and extensive ontology lays
the foundation for more specific ontologies, as seen in the example of the successful OBO Foundry.
Utilizing the insights and expertise from a wide range of subject matter experts—from law
enforcement officials to survivors to researchers—this project strives not just for thoroughness but
for ethical responsibility in representing complex human experiences. This is especially important
in sensitive and rapidly evolving cases such as kidnapping and human trafficking. The crime
ontology project aims, through better data management and interoperability, to become a shared
option for researchers, analysts, and users who are working to understand, prevent, and respond to
criminal activity.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>I would like to give thanks and acknowledgement to the following people: John Beverley for his
continued mentorship, support and discussions; Giacomo De Colle for his major support both
emotionally and in his insightful discussions and comments; Noor Al-Khaouli for providing
background and being my subject matter expert in the first run of this project; Jeremy Ravenel in
helping develop the draft list of I processes for the crime ontology and helping with data ingestion;
and Toby Friend, Matthew Jones and Sean Kindya for their helpful comments in the early drafting
of this paper.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The author has not employed any generative AI tools.
[19] University at Albany, School of Criminal Justice. (n.d.). Cold Case Analysis Center.
https://www.albany.edu/scj/cold-case-analysis-center</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] Centre for Public Data</article-title>
          . (n.d.).
          <article-title>Justice data gaps report. Centre for Public Data</article-title>
          . https://static1.squarespace.com/static/5ee7a7d964aeed7e5c507900/t/ 64230b79130cdc7e4b83930f/1680018298114/CFPD+justice
          <article-title>+data+gaps+report</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Sculley</surname>
            ,
            <given-names>A. (n.d.).</given-names>
          </string-name>
          <article-title>Crime ontology</article-title>
          .
          <source>GitHub</source>
          . https://github.com/avsculley/CrimeOntology
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>LiDaKrA. (n.d.</surname>
          </string-name>
          ). Ontology. GitHub. https://github.com/LiDaKrA/Ontology
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Tripathi</surname>
            ,
            <given-names>A.(n.d.).</given-names>
          </string-name>
          <article-title>Knowledge graph</article-title>
          .
          <source>GitHub</source>
          . https://github.com/AnjaneyaTripathi/knowledge_graph
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Naqvi</surname>
            ,
            <given-names>S.A.M.</given-names>
          </string-name>
          (n.d.). CyberCrimeAttackTypesOntology. GitHub. https://github.com/syedamoaddatnaqvi-141/CyberCrimeAttackTypesOntology
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Naqvi</surname>
            ,
            <given-names>S. A. M.</given-names>
          </string-name>
          (n.d.).
          <source>CyberCrime Ontology</source>
          . GitHub. https://github.com/syedamoaddatnaqvi-141/CyberCrimeOntology
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Razia.(n.d.).</given-names>
            <surname>Cybercrime-</surname>
          </string-name>
          Attacks-Ontology. GitHub. https://github.com/anam236razaq/CyberCrime-Attacks-Ontology
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>International</given-names>
            <surname>Organization</surname>
          </string-name>
          for Standardization. (
          <year>2021</year>
          ).
          <article-title>Information technology - Top-level ontologies (TLO) - Part 1: Requirements (ISO</article-title>
          /IEC 21838-1:
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ashburner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosse</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bard</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bug</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ceusters</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goldberg</surname>
            ,
            <given-names>L. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eilbeck</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ireland</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mungall</surname>
            ,
            <given-names>C. J.</given-names>
          </string-name>
          ,
          <source>OBI Consortium</source>
          , Leontis,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Rocca-Serra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Ruttenberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Sansone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.A.</given-names>
            ,
            <surname>Scheuermann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. H.</given-names>
            ,
            <surname>Shah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Whetzel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. L.</given-names>
            , &amp;
            <surname>Lewis</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>The OBO Foundry: Coordinated evolution of ontologies to support biomedical data integration</article-title>
          .
          <source>Nature Biotechnology</source>
          ,
          <volume>25</volume>
          (
          <issue>11</issue>
          ),
          <fpage>1251</fpage>
          -
          <lpage>1255</lpage>
          . https://doi.org/10.1038/nbt1346
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Jensen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliveira</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Guizzardi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2024</year>
          ). The Common Core Ontologies [Conference paper].
          <source>FOIS</source>
          <year>2024</year>
          . https://www.utwente.nl/en/eemcs/fois2024/resources/papers/jensen
          <article-title>-et-althe-common-core-ontologies</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Mandrick</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>Philosophical foundations of intelligence collection and analysis: A defense of ontological realism</article-title>
          .
          <source>Intelligence and National Security</source>
          . https://doi.org/10.1080/02684527.
          <year>2022</year>
          .2076330
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Ashburner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ball</surname>
            ,
            <given-names>C. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Blake</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Botstein</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Butler</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cherry</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davis</surname>
            ,
            <given-names>A. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dolinski</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dwight</surname>
            ,
            <given-names>S. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eppig</surname>
            ,
            <given-names>J. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harris</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hill</surname>
            ,
            <given-names>D. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Issel-Tarver</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kasarskis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matese</surname>
            ,
            <given-names>J. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Richardson</surname>
            ,
            <given-names>J. E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ringwald</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rubin</surname>
            ,
            <given-names>G. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Sherlock</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2000</year>
          ).
          <article-title>Gene ontology: Tool for the unification of biology</article-title>
          .
          <source>Nature Genetics</source>
          ,
          <volume>25</volume>
          (
          <issue>1</issue>
          ),
          <fpage>25</fpage>
          -
          <lpage>29</lpage>
          . https://doi.org/10.1038/75556
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Industrial</given-names>
            <surname>Ontology</surname>
          </string-name>
          <article-title>Foundry (IOF)</article-title>
          .
          <source>(n.d.)</source>
          .
          <source>Publication. National Institute of Standards and Technology</source>
          . https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=
          <fpage>935068</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Oliveira</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Almeida</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Guizzardi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2024</year>
          ).
          <article-title>LEGION-IDS: Legal Interoperability Ontology for International Data Spaces</article-title>
          [Conference paper].
          <source>FOIS2024</source>
          . https://www.utwente.nl/en/eemcs/fois2024/resources/papers/oliveira-et-al
          <article-title>-legionids-legal-interoperability-ontology-for-international-data-spaces</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Al-Khaouli</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2024</year>
          , December 15).
          <article-title>Psychological profile of Aldo Moro (PHI 489 course paper</article-title>
          ).
          <source>[Unpublished manuscript].</source>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Arp</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Spear</surname>
            ,
            <given-names>A. D.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Building ontologies with Basic Formal Ontology</article-title>
          . MIT Press.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Wikipedia</surname>
            <given-names>contributors.</given-names>
          </string-name>
          (n.d.).
          <source>Kidnapping and murder of Aldo Moro. Wikipedia. Retrieved April 27</source>
          ,
          <year>2025</year>
          , from https://en.wikipedia.org/wiki/Kidnapping_and_murder_of_Aldo_Moro
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <article-title>National Center for Missing &amp; Exploited Children</article-title>
          . (n.d.). Home. https://www.missingkids.org/home
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>