<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Norm enforceability in Electronic Institutions?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Natalia Criado</string-name>
          <email>ncriado@dsic.upv.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Estefania Argente</string-name>
          <email>eargente@dsic.upv.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonio Garrido</string-name>
          <email>agarridot@dsic.upv.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Juan A. Gimeno</string-name>
          <email>jgimeno@dsic.upv.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesc Igual</string-name>
          <email>figual@dsic.upv.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vicente Botti</string-name>
          <email>vbotti@dsic.upv.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pablo Noriega</string-name>
          <email>pablo@iiia.csic.es</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Adriana Giret</string-name>
          <email>agiret@dsic.upv.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DSIC, Department of Information Systems and Computation, Universitat Polit`ecnica de Valencia</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>IIIA, Artificial Intelligence Research Institute, CSIC, Spanish Scientific Research Council</institution>
        </aff>
      </contrib-group>
      <fpage>49</fpage>
      <lpage>64</lpage>
      <abstract>
        <p>Nowadays Multi-Agent Systems require more and more regulation and normative mechanisms in order to assure the correct and secure execution of the interactions and transactions in the open virtual organization they are implementing. The Electronic Institution approach for developing Multi-Agent Systems implements some enforceability mechanisms in order to control norms execution and observance. In this paper we study a complex situation in a regulated environment in which the enforceability mechanisms provided by the current Electronic Institutions implementation cannot deal appropriately with norm observance. The analyzed situation is exemplified with a specific scenario of the mWater regulated environment, an electronic market for water-rights transfer. After this example is presented, we extrapolate it to a more generic domain while also addressing the main issues for its application in general scenarios.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        ”a MAS organized by means of mechanisms to represent, communicate,
distribute, detect, create, modify, and enforce norms and mechanisms to
deliberate about norms and detect norm violation and fulfilment.”
According to this definition, the norm enforcement problem, faced by this
paper, is one of the key factors in NMAS. In particular, this paper faces with the
enforcement of norms inside Electronic Institutions (EIs) that simulate real
scenarios. EIs [
        <xref ref-type="bibr" rid="ref19 ref22 ref8">19, 22, 8</xref>
        ] represent a way to implement interaction conventions for
agents who can establish commitments in open environments.
      </p>
      <p>
        When real life problems are modelled by means of EI some of the norms
are obtained by giving a computational interpretation to real legislation. In this
process we have encountered two main problems:
– Norm Inconsistency. Usually the set of laws created by human societies in
order to regulate a specific situation are contradictory and/or ambiguous.
In particular, there are situations in which there is a general law (regulative
norm [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]) which is controlled by a local law (procedural norm [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]). The
problem arises when this local law does not ensure compliance of the more general
law. This may be due to the existence of different levels of institutions which
are working in the same system [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Thus, an elaborated process is necessary
in order to determine which norms are active in a specific moment and how
they are applied. Traditional methods for implementing norms in EI, which
are based on the unambiguous interpretation of norms, are not suitable to
overcome this problem.
– Norm Controlling. Even in absence of a conflict among norms, there is still
the problem of norm controlling. Norm enforcement methods inside EI are
based on the observation of these activities controlled by norms. In
particular, there are norms whose violation cannot be observed since they regulate
situations that take place out of the institution boundaries. Thus, violations
are only detectable in presence of a conflict among agents.
      </p>
      <p>
        In this paper we focus on the enforcement of these norms, which cannot
be controlled by traditional techniques. Thus, we address the question of
enforceability of non-observable norms inside EIs. In order to make more clear
and understandable the problem addressed by this paper, it has been
exemplified in the mWater scenario [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In addition, a first solution for overcoming the
mWater concrete problem is shown. In particular, we propose the definition of a
grievance scene for allowing normative conflicts to be solved within the mWater
institution. However, this solution can be also extrapolated to generic domains.
      </p>
      <p>This paper is structured as follows: the next section provides background on
norm implementation, EIs and the implementation of norms inside EIs. Then a
concrete example of the problem addressed by this paper is described. Finally,
discussion and future works are described.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>This section firstly reviews the main methods for ensuring norm compliance in
MAS and the techniques that can be employed for implementing these methods.
Then, a brief description of the Electronic Institution framework is given, as well
as a discussion on how norms are implemented and enforced in this framework.
2.1</p>
      <p>
        Norm Implementation in Multiagent Systems
Norms allow legal issues to be modelled in electronic institutions and electronic
commerce, MAS organizations, etc. Most of the works on norms in MAS have
been proposed from a theoretical perspective. However, several works on norms
from an operational point of view have recently arisen, which are focused on
giving a computational interpretation of norms in order to employ them in the
design and execution of MAS applications. In this sense, norms must be
interpreted or translated into mechanisms and procedures which are meaningful for
the society [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Methods for ensuring norm compliance are classified into two
categories: (i) regimentation mechanisms, which consist in making the violation
of norms impossible, since these mechanisms prevent agents from performing
actions that are forbidden by a norm; and (ii) enforcement mechanisms, which
are applied after the detection of the violation of some norm, reacting upon it.
      </p>
      <p>
        In a recent work [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], a taxonomy of different techniques for implementing
effectively norms is proposed. On the one hand, the regimentation of norms can
be achieved by two processes: (i) mediation, in which both the resources and
communication channels are accessed through a reliable entity which controls
agent behaviours and prevents agents from deviating from ideal behaviour; and
(ii) hard-wiring, assuming that the agents’ mental states are accessible and can
be modified in accordance with norms. On the other hand, norm enforcement
techniques are classified according to both the observer and the enforcer entity.
Norms are self-enforced when agents observe their own behaviour and sanction
themselves. Thus, norm compliance is both observed and enforced without the
need of any additional party. In situations in which those agents involved by a
transaction are responsible for detecting norm compliance (i.e. second-party
observability) norms can be enforced by: (i) the second-party which applies
sanctions and rewards; and (ii) a third entity which is an authority and acts as
an arbiter or judge in the dispute resolution process. In the case of third-party
observability, two different mechanisms for ensuring norm compliance can be
defined according to the entity which is in charge of norm enforcing: (i) social
norms are defended by the society as a whole; (ii) in infrastructural enforcement
there are infrastructural entities which are authorities in charge of monitoring
and enforcing norms by applying sanctions and rewards.
2.2
      </p>
      <p>
        Electronic Institutions
Electronic Institutions (EI) are computational counterparts of conventional
institutions [
        <xref ref-type="bibr" rid="ref19 ref22 ref8">19, 22, 8</xref>
        ]. Institutions are, in an abstract way, a set of conventions
that articulate agent interactions [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. In practice they are identified with the
group of agents, standard practices, policies and guidelines, language,
documents and other resources —the organization— that make those conventions
work. Electronic Institutions are implementations of those conventions in such a
way that autonomous agents may participate, their interactions are supported
by the implementation and the conventions are enforced by the system on all
participants. Electronic institutions are engineered as regulated open MAS
environments. These MAS are open in the sense that the EI does not control the
agents’ decision-making processes and agents may enter and leave the EI at their
own will. EIs are regulated in four ways. First, agents are capable of
establishing and fulfilling commitments inside the institution, and those correspond to
commitments in the real world. Second, only interactions that comply with the
conventions have any consequence in the environment. Third, interactions are
organized as repetitive activities regulated by the institution and, last,
interactions, in EIs, are always speech acts.
      </p>
      <p>An EI is specified through: (i) a dialogical framework which fixes the context
of interaction by defining roles and their relationships, a domain ontology and a
communication language; (ii) scenes that establish interaction protocols of the
agents playing a given role in that scene, which illocutions are admissible and
under what conditions; (iii) performative structures that, like the script of a
play, express how scenes are interrelated and how agents playing a given role
move from one scene to another, and (iv) rules of behaviour that regulate how
commitments are established and satisfied.</p>
      <p>
        The IIIA model has a platform for implementation of EIs. It has a graphical
specification language, ISLANDER, in which the dialogical framework,
performative structures and those norms governing commitments and the pre- and
post- conditions of illocutions are specified [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. It produces an XML file that is
interpreted by AMELI [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], a middleware that handles agent messages to and
from a communication language, like JADE, according to the ISLANDER
specification [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. In addition, EIDE [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] includes a monitoring and debugging tool,
SIMDEI that keeps track of all interactions and displays them in different modes.
There is also a tool, aBuilder, that, from the XML specification, generates, for
each role, agent shells that comply with the communication conventions (the
decision-making code is left to the agent programmer).
2.3
      </p>
      <p>Norm Implementation in EI
Norm Regimentation. In AMELI, governors filter the actions of agents,
letting them only to perform those actions that are permitted by the rules of
society. Therefore, governors apply a regimentation mechanism, preventing the
execution of prohibited actions and, therefore, preventing agents to violate their
commitments.</p>
      <p>
        This regimentation mechanism employed by governors makes use of a
formalism based on rules for representing constraints on agent behaviours [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. This
formalism is conceived as a “machine language” for implementing other higher
level normative languages. More specifically, it has been employed to enforce
norms that govern EIs. The main features of the proposed “machine language”
are: (i) it allows for the explicit definition and management of agent norms (i.e.
prohibitions, obligations and permissions); (ii) it is a general purpose language
not aimed at supporting a specific normative language; (iii) it is declarative and
has an execution mechanism. For implementing this rule system, the Jess tool
has been employed as an inference engine. Jess allows the development of Java
applications with “reasoning” capabilities1.
      </p>
      <p>
        In open systems, not only the regimentation of all actions can be difficult,
but also sometimes it is inevitable and even preferable to allow agents to
violate norms [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Reasons behind desirability of norm violations are because it
is impossible to take a thorough control of all their actions, or agents could
      </p>
      <sec id="sec-2-1">
        <title>1 http://herzberg.ca.sandia.gov/jess/</title>
        <p>
          obtain higher personal benefits when violating norms, or norms may be
violated by functional or cooperative motivations, since agents intend to improve
the organization functionality through violating or ignoring norms. Therefore,
all these situations require norms to be controlled by enforcement mechanisms.
Next, works on the enforcement of norms inside EI are described.
Norm Enforcement. The enforcement of a norm by an institution requires
the institution to be capable of recognizing the occurrence of the violation of
the norm and respond to it [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Hence, checking activities may occur in several
ways: directly, at any time, randomly or with periodical checks, or by using
monitoring activities; or indirectly, allowing agents to denounce the occurrence
of a violation and then checking their grievances.
        </p>
        <p>
          Regarding direct norm enforcement, the institution itself is in charge of both
observing and enforcing norms. Thus, in this approach there are infrastructural
entities which act as norm observers and apply sanctions when a violation is
detected. In [
          <xref ref-type="bibr" rid="ref12 ref17">17, 12</xref>
          ], distributed mechanisms for an institutional enforcement of
norms are proposed. In particular, these works propose languages for expressing
norms and software architectures for the distributed enforcement of these norms.
More specifically, the work described in [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] presents an enforcement mechanism,
implemented by the Moses toolkit [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ], which is as general (i.e. it can implement
all norms that are controllable by a centralized enforcement) and more scalable
and efficient with respect to centralized approaches. However, one of the main
drawbacks of this proposal is the fact that each agent has an interface that sends
legal messages. Since norms are controlled by these local interfaces, norms can
be only expressed in terms of messages sent or received by an agent; i.e. this
framework does not support the definition of norms that affect an agent as a
consequence of an action carried out independently by another agent. This
problem is faced by Gaertner et al. in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. In this approach, Gaertner et al. propose
a distributed architecture for enforcing norms in EI. In particular, dialogical
actions performed by agents may cause the propagation of normative positions
(i.e. obligations, permissions and prohibitions). These normative propositions
are taken into account by the normative level; i.e. a higher level in which norm
reasoning and management processes are performed in a distributed manner. In
a more recent work, Modgil et al. [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] propose an architecture for monitoring
norm-governed systems. In particular, this architecture is formed by trusted
observers that report to monitors on states of interest relevant to the activation,
fulfilment, violation and expiration of norms. This monitoring system is
corrective in the sense that it allows norm violations to be detected and reacting to
them.
        </p>
        <p>
          Mixed Approaches. Finally, there are works which employ a mixed approach
for controlling norms. In this sense, they propose the usage of regimentation
mechanisms for ensuring compliance with norms that preserve the integrity of
the application. Unlike this, enforcement is proposed to control norms that
cannot be regimented due to the fact that they are not verifiable or their violation
may be desirable. In [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] an example on the mixed approach is shown. In
particular, this work shows how norms that define the access to the organization
infrastructure are controlled, whereas norms controlling other issues such as
work domain norms are ignored. In particular, those norms that define
permissions and prohibitions related to the access to the organization are regimented
through mediation, whereas obligation norms are enforced following the
institutional sanction mechanism.
        </p>
        <p>
          The ORA4MAS [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] is another well known proposal that makes use of a
mixed approach for implementing norms. The ORA4MAS proposal defines
artifacts as first class entities to instrument the organisation for supporting agents
activities within it. Artifacts are resources and tools that agents can create and
use to perform their individual and social activities [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. Regarding the
implementation of norms in the ORA4MAS framework, regimentation mechanisms are
implemented in artifacts that agents use for accessing the organization according
to the mediation mechanism. Enforcement of norms has been implemented using
third party observability, since the detection of norm violations is a
functionality provided by artifacts. In addition, norms are enforced by third parties, since
there are agents in charge of being informed about norm violations and carrying
out the evaluation and judgement of these situations.
        </p>
        <p>However, none of the above mentioned proposals allows norms which regulate
activities taking place out of the institution scope to be controlled. In this case,
norm compliance is non-observable by the institution and can only be detected
when a conflict arises. Thus, in this paper we propose that both a second-party
and third-party can observe non-compliant behaviour and start a grievance
process which takes place inside the EI. Therefore, in this paper we face the problem
of institutional enforcement of norms based on second-party and third-party
observability. Next section provides a concrete instantiation of this problem inside
a more specific case-study.
3</p>
        <p>A concrete sample scenario in the mWater regulated
environment
In this section we exemplify the problem of non-regimented norm enforcement
in EI with mWater, a regulated MAS application for trading water-rights within
a virtual market. In order to get a good understanding of the overall mWater
functioning, we first describe the motivation of mWater and present a brief
overview of its structure. Afterwards, the sample complex situation for norm
enforcement in the current mWater EI implementation is analyzed.
3.1</p>
        <p>mWater overall description
In countries like Spain, and particularly in its Mediterranean coast, there is a
high degree of public awareness of the main consequences of the scarcity of water
and the need of fostering efficient use of water resources. Two new mechanisms
Initial m
m Accreditation
b,s</p>
        <p>Trading
Tables m,b,s X</p>
        <p>m AVgarleideamtieonnt mb,,bsa, X m ECnoancttmraecntt mb,,bsa,
g
m
m</p>
        <p>Entitlement
w
w
w
w
Trading
Hall</p>
        <p>X
ba
m
m, g, ba
p, a
m</p>
        <p>w
m
Notation
m, g, ba</p>
        <p>m, w
m, b, s</p>
        <p>m, ba, b, s
Grievances
for water management already under way are: a heated debate on the need and
feasibility of transferring water from one basin to another, and, directly related
to this proposal, the regulation of water banks2. mWater is an agent-based
electronic market of water-rights. Our focus is on demand and, in particular, on
the type of regulatory and market mechanisms that foster an efficient use of
water while preventing conflicts. The framework is a somewhat idealized version
of current water-use regulations that articulate the interactions of those
individual and collective entities that are involved in the use of water in a closed
basin. The main focus of the work presented in this paper is on the regulated
environment, which includes the expression and use of regulations of different
sorts: from actual laws and regulations issued by governments, to policies and
local regulations issued by basin managers, and to social norms that prevail in
a given community of users.</p>
        <p>
          For the construction of mWater we follow the IIIA Electronic Institution
(EI) conceptual model [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. For the actual specification and implementation of
mWater we use the EIDE platform.
2 The 2001 Water Law of the National Hidrological Plan (NHP) —’Real Decreto
Legislativo 1/2001, BOE 176’ (see
www.boe.es/boe/dias/2001/07/24/pdfs/A2679126817.pdf, in Spanish)— and its amendment in 2005 regulates the power of
rightholders to engage in voluntary water transfers, and of basin authorities to setup
water markets, banks, and trading centers for the exchange of water-rights in cases
of drought or other severe scarcity problems.
        </p>
        <p>Procedural conventions in the mWater institution are specified through a
nested performative structure (Fig. 1) with multiple processes. The top
structure, mWaterPS, describes the overall market environment and includes other
performative structures; TradingHall provides updated information about the
market and, at the same time, users and trading staff can initiate most trading
and ancillary operations here; finally, TradingTables establishes the trading
procedures. This performative structure includes a scene schema for each trading
mechanism. Once an agreement on transferring a water-right has been reached
it is ”managed” according to the market conventions captured in
AgreementValidation and ContractEnactment scenes. When an agreement is reached,
mWater staff check whether the agreement satisfies some formal conditions and if
so, a transfer contract is signed. When a contract becomes active, other
rightholders and external stakeholders may initiate a Grievance procedure that may
have an impact on the transfer agreement. This procedure is activated whenever
any market participant believes there is an incorrect execution of a given norm
and/or policy. Grievance performative structure includes different scenes to
address such grievances or for the disputes that may arise among co-signers. On
the other hand, if things proceed smoothly, the right subsists until maturity.
3.2</p>
        <p>Complex scenario: The registration of water-right transfer
agreements
In mWater we have three different types of regulations: (i) government norms,
issued by the Spanish Ministry of Environment (stated in the National
Hydrological Plan); (ii) basin or local norms, defined and regimented by the basin
authorities; and (iii) social norms, stated by the members of a given user
assembly and/or organization. The interplay among different norms from these
three groups brings about complex situations in which there are non-regimented
norms and, moreover, the non-compliance of the norm is not observable until a
conflict appears. A very critical situation for the reliable execution of mWater
appears when the following norms apply:
Government norm - (N0): A water-user can use a given volume of water from
a given extraction point, if and only if he/she owns the specific water-right
or has a transfer agreement that endows him/her.</p>
        <p>Government norm - (N1): Every water-right transfer agreement must be
registered within the fifteen days after its signing and wait for the Basin
Authorities’ approval in order to be executed.</p>
        <p>Local norm - (N2): The registration process of a water-right transfer agreement
is started voluntarily by the agreement signing parties.</p>
        <p>Social norm - (N3): Whenever a conflict appears, a water user can start a
grievance procedure in order to solve it.</p>
      </sec>
      <sec id="sec-2-2">
        <title>Sample situation:</title>
        <p>Let’s suppose there is a water user A who has a water-right w1 and wants
to sell it. A starts a Trading Table inside the TradingTables process (see Fig. 1)
in order to sell w1. The water user B enters the Trading Table and, as a result,
there is an agreement Agr1 between A and B, by which B buys w1 from A for
the period [t1, t2], and pays the quantity p1 for such a transfer. A and B belong
to Basinx, in which norms N1, N2 and N3 apply. A and B do not register Agr1
due to norm N 2 (in other words, A and B do not go to the Agreement Validation
scene of Fig. 1). Since there is no mechanism in Basinx by which water-right w1
is blocked from A after its selling (due to Agr1 is not registered and w1 is still
owned by A in time periods not overlapped with [t1, t2]), A continues to operate
in the market. Afterwards A starts a new Trading Table to sell w1 for period
[t3, t4], with t1 &lt; t3 &lt; t2 and t4 &gt; t2 (the new period [t3, t4] is overlapped with
[t1, t2]). In this second Trading Table A and C sign Agr2, by which A sells w1
to C for the period [t3, t4] and C pays p2 to A. A and C belong to Basinx. In
this case C registers Agr2 in the Agreement Validation scene, due to N1 and
N2, and obtains the basin approval for executing Agr2. At time t3 (the transfer
starting time) C attempts to execute Agr2, but there is no water in the water
transportation node, since B is also executing Agr1. At this moment C has a
conflict with B, and in order to solve it he/she has to start a grievance procedure
due to N3 (Grievances performative structure of Fig. 1).</p>
        <p>This situation3 is an instantiated example of the one described above, in
which there are non-regimented norms whose non-compliance is not observable
and cannot be asserted until the conflict appears. The critical situation comes out
due to the compliance procedure for agreement registration and second selling
of the same water-right is not coercive.</p>
        <p>The current development environment of EI we are using does not provide
build-in support for non-coercive processes that are defined by non-regimented
norms. Moreover, those situations in which it is not possible to observe the
non-compliance of a norm until the resulting conflict appears are not supported
either. Nevertheless, there are sample scenarios, like mWater, in which this
behaviour is required. In the following section we analyze the EI implementation
we have devised for this complex scenario.
3.3</p>
        <p>Implementation
In this section our approach to solve the previously described complex scenario
in mWater is described.</p>
        <p>In order to include norm N1 in the current EI implementation of mWater we
have designed the Agreement Validation scene (see Fig. 1) as a successor scene
for any Trading Table. When any water user enters this scene, the Market
Facilitator verifies the constraint of fifteen days from the agreement statement process
related to norm N1. If this constraint is satisfied the water-right transfer
agreement is forwarded to the Basin Authority who activates a Normative Reasoning
3 The scenario presented in this section happens in practice in Spain, due to the
impossibility to monitor all the water transfer negotiations that may take place
among the different water users. It can be considered as a loophole in the Spanish
regulations. Nevertheless we are interested in modeling it due to its complexity and
in order to simulate the ”real” behaviour of the basin users.
process in order to approve, or not, the agreement based on the basin normative
regulation. If the agreement gets approved it is published in the Trading Hall in
order for every water user of the basin to be informed of the transfer agreement.</p>
        <p>On the other hand, norm N2 is automatically included in the mWater
institution due to the EIDE implementation feature by which no participating
agent in the electronic institution can be forced to go to a given scene. For the
particular mWater example, neither the buyer nor the seller can be forced to
go through the transition between the Trading Table scene and the Agreement
Validation scene (see Fig. 1). This way, whenever the buyer and/or the seller
goes to the Agreement Validation scene he/she starts the scene voluntarily, so
norm N2 is satisfied.</p>
        <p>The implementation of norm N3 requires a specific performative structure,
named Grievances (Fig. 2), in order to deal with conflict resolution processes.</p>
        <p>Finally, the observance of norm compliance is delegated to every water user.
Hence, the enforceability of norm N0 is delegated to every water user.</p>
        <p>
          Fig. 2 shows the different scenes of the complex Grievances performative
structure. In this structure any conflict can be solved by means of two
alternative processes (these processes are similar to those used in Alternative Dispute
Resolutions and Online Dispute Resolutions [
          <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
          ]). On the one hand, conflict
resolution can be solved by means of negotiation tables (Conflict Resolution
Negotiation Table performative structure). In this mechanism a negotiation table
is created on demand whenever any water user wants to solve a conflict with
other/s water user/s, negotiating with them with or without mediator. Such a
negotiation table can use a different negotiation protocol, such as face to face,
standard double auction, etc. On the other hand, arbitration mechanisms for
conflict resolution can also be employed (Arbitration performative structure). In
this last mechanism, a jury solves the conflict sanctioning the offenses.
        </p>
        <p>There are three steps in the arbitration process (see Fig. 3). In the first
one, the grievance is stated by the plaintive water user. In the second step, the
different conflicting parties present their allegations to the jury. Finally, in the
last step, the jury, after hearing the dispute, passes a sentence on the conflict.
The difference among the two mechanisms for conflict resolution is that the
arbitration process is binding, meanwhile the negotiation is not. In this way if</p>
        <p>Grievance</p>
        <p>pm,a, X
m
p, a
m
p, a</p>
        <p>Dispute pm,a, X
Hearing
m Sanctioning</p>
        <p>Offenses</p>
        <p>Final
a
any of the conflicting parties is not satisfied with the negotiation results he/she
can activate an arbitration process in order to solve the conflict.</p>
        <p>In the previously described complex scenario, when C cannot execute Agr2
(because there is no water in the water transportation node), C believes that B
is not complying norm N0. C believes there is a conflict because Agr2 endows
him/her to use the water, and moreover, there is no transfer agreement published
in the Trading Hall that endows B to do the same. In order to enforce norm N0
and to execute Agr2, C starts a grievance procedure. In this procedure, water
users C and B are recruited as conflicting parties and A as third party because
he/she is the seller of w1 as stated in Agr2 (Recruiting Conflicting Parties scene
of Fig. 2). Let’s assume C chooses as conflict resolution mechanism arbitration,
because he/she does not want to negotiate with B. After stating the grievance,
C and B present their allegations to the jury. In this process B presents Agr1 by
which he/she believes there is fulfillment of norm N0. Nevertheless, in the last
arbitration step, by means of a Normative Reasoning function, the jury analyzes
the presented allegations and the normative regulations of the basin and deduces
that there is an offense. Norm N1 was not complied by B and A, and moreover,
A has sold the same water-right twice for an overlapped time period. In this last
step, the jury imposes the corresponding sanctions to A and B.</p>
        <p>Fig. 4 shows a snapshot of the mWater ’s complex scenario implementation
running on the AMELI execution environment of EIDE. The implementation
we have devised for this complex situation in mWater allows us to solve the
described scenario. Moreover, when dealing with this scenario it is possible
to observe the limitations of the current EIDE platform for supporting
nonobservability and enforceability of non-regimented norms. The implementation
of mWater we are discussing in this paper is developed with EIDE 2.114, and
includes all the components described in previous sections. Moreover, the
information model that supports the execution of the EI is developed in MySQL
and includes the different conceptual data required for the market execution.
Fig. 5 shows a fragment of the relational model in which some elements are
depicted such as: basin structure, water-right definition, agreement, and conflict
resolution table configuration, among others.</p>
        <p>mWater is devised as a simulation tool for helping the basin policy makers
to evaluate the behaviour of the market when new or modified norms are
ap</p>
      </sec>
      <sec id="sec-2-3">
        <title>4 Available at http://e-institutions.iiia.csic.es/eide/pub/</title>
        <p>plied. To this end, we are working on defining evaluation functions to measure
the performance of the market. These measures include the amount of water
transfer agreements signed in the market, volume of water transferred, number
of conflicts generated, etc. Apart from these straightforward functions we are
also working on defining ”social” functions in order to asses values such as the
trust and reputation levels of the market, or degree of water user satisfaction,
among others.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Discussion and closing remarks</title>
      <p>
        In real life problems, in many occasions it is difficult or even impossible to check
norm compliance, specially when the violation of the norm cannot be directly
observable. In other occasions, it is not only difficult to regiment all actions,
but it might be preferable to allow agents to violate norms, since they may
obtain a higher personal benefit or they may intend to improve the organization
functionality, despite violating or ignoring norms. It is clear that from a general
thought and design perspective of an Electronic Institution, it is preferable to
define a safe and trustful environment where norms cannot be violated (i.e. norms
are considered as hard constraints), thus providing a highly regimented scenario
that inspires confidence to their users. However, from a more flexible and realistic
perspective, it is appealing to have the possibility for agents to violate norms for
personal gain. Although this is a very realistic attribute that humans can have, it
eventually leads to corruption and, consequently, the designer may think to rule
it out. But again, from a norm enforceability standpoint it is always a good idea
to allow this: it does not only make the environment more open and dynamic,
but it also provides a useful tool for decision support. In such a thread, we are
able to range the set of norms, from a very relaxed scenario to a very tight one,
simulate the institution and the agents’ behaviour, and finally analyze when
the global performance —in terms of number of conflicts that appear, degree
of global satisfaction or corruption, etc.— shows better, which makes it very
interesting as a testbed itself [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In all these cases, norm enforcement methods
are needed, such as second-party and third-party enforcements.
      </p>
      <p>This paper has highlighted the necessity for norm enforceability in Electronic
Institutions. Clearly, when the agents and their execution occur outside the
boundaries of the institution it is inviable to count on a simple and efficient way
to guarantee a norm-abiding behaviour, as the full observability of the whole
execution and environment is rarely possible. In other words, norm violations
are perfectly plausible (and unfortunately common) and are only detectable in
presence of a conflict among agents.</p>
      <p>In our mWater scenario, we have proposed an open mechanism that
comprises two main principles: (i) the generation of a grievance when one agent
detects a conflict, i.e. when an agent denounces the occurrence of a violation;
and (ii) an authority entity with the role of arbiter/judge to mediate in the
dispute resolution process and being able to apply sanctions. The advantage of this
mechanism is twofold. First, it allows different types of grievance, either when
it corresponds to the execution of a previous signed (or unsigned) agreement or,
simply, when it happens as an occasional event during the habitual execution of
the water scenario and its infrastructure use. Second, it provides different ways
to deal with grievances, as shown in Fig. 2: (i) in a very formal and strict way by
means of an arbitration procedure that relies on a traditional jury, thus applying
a third-party enforceability mechanism (with an infrastructure enforcement); or
(ii) in a more flexible way that relies on the creation of a conflict resolution
negotiation table, which ranges from informal protocols (e.g., face to face) to more
formal ones that may need one or more mediators. In this last case, a second-party
enforceability mechanism has been adopted. We have shown that this grievance
procedure shows to be effective in the mWater scenario. But despite its origin in
the water environment, it can be easily extrapolated to any other real problem
modelled by using EIs, which represent the main contributions of this paper.</p>
      <p>The underlying idea to deal with norm enforcement in generic domains
follows a simple flow, but it needs some issues to be clearly defined. First of all,
we require a procedure to activate or initiate a new grievance. This can be done
from any type of performative structure similar to the TradingHall of Fig. 1.
This operation requires the identification of the agents that will be involved in
the grievance itself, so it is essential for all agents to be uniquely identified; that
is, we cannot deal with anonymous agents, which is an important issue. Once
the grievance has been initiated, we also require a mechanism for recruiting the
conflicting parties. Again, this is related to the agents’ identification and the
necessity of (perhaps formal) communication protocols to summon all the parties.
Note that this step is necessary for any type of dispute resolution, both by
negotiation tables and arbitration. And, at this point we have a high flexibility for
solving the conflicts, as they can be solved in many ways depending on the type
of problem we are addressing at each moment. Analogously to the trading tables
that we have in the mWater scenario, we can use general or particular tables to
reach an agreement and, thus, solving the conflict, no matter the real problem
we have. Finally, it is also important to note that reaching an agreement when
solving the conflict does not prevent from having new conflicts that appear from
such an agreement, being necessary the initiation of a new grievance procedure
and repeating all the operations. Although such new grievances are possible
from both the negotiation table and arbitration alternatives, it is common to
have situations where the decisions/verdict taken by the arbitration judges are
unappealable.</p>
      <p>Our current work of research is focused on providing a more thorough
specification of this mechanism to enforce norms in EIs, how the conflict resolution
tables can be defined and to come up with specialized protocols for these tables.
Our final goal is to be able to integrate this behaviour in a decision support
system to simulate different agents’ behaviour and norm reasoning to be applied
to the mWater and other scenarios of execution.</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgements</title>
      <p>This paper was partially funded by the Consolider programme of the Spanish
Ministry of Science and Innovation through project AT (CSD2007-0022,
INGENIO 2010), MICINN project TIN2008-06701-C03-03 and by the FPU grant
AP2007-01256 awarded to N. Criado. This research has also been partially funded
by the Generalitat de Catalunya under the grant 2009-SGR-1434 and Valencian
Prometeo project 2008/051.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Josep</given-names>
            <surname>Arcos</surname>
          </string-name>
          , Marc Esteva, Pablo Noriega, Juan Rodriguez-Aguilar, and
          <string-name>
            <given-names>Carles</given-names>
            <surname>Sierra</surname>
          </string-name>
          .
          <article-title>Engineering open environments with electronic institutions</article-title>
          .
          <source>Engineering Applications of Artificial Intelligence</source>
          , (
          <volume>18</volume>
          ):
          <fpage>191</fpage>
          -
          <lpage>204</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Tina</given-names>
            <surname>Balke</surname>
          </string-name>
          .
          <article-title>A taxonomy for ensuring institutional compliance in utility computing</article-title>
          . In Guido Boella, Pablo Noriega, Gabriella Pigozzi, and Harko Verhagen, editors,
          <source>Normative Multi-Agent Systems, number 09121 in Dagstuhl Seminar Proceedings</source>
          , Dagstuhl, Germany,
          <year>2009</year>
          . Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>G.</given-names>
            <surname>Boella</surname>
          </string-name>
          , L. van der Torre, and
          <string-name>
            <given-names>H.</given-names>
            <surname>Verhagen</surname>
          </string-name>
          .
          <article-title>Introduction to the special issue on normative multiagent systems</article-title>
          . Autonomous Agents and
          <string-name>
            <surname>Multi-Agent</surname>
            <given-names>Systems</given-names>
          </string-name>
          ,
          <volume>17</volume>
          (
          <issue>1</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Guido</given-names>
            <surname>Boella</surname>
          </string-name>
          and Leendert van der Torre.
          <article-title>Substantive and procedural norms in normative multiagent systems</article-title>
          .
          <source>Journal of Applied Logic</source>
          ,
          <volume>6</volume>
          (
          <issue>2</issue>
          ):
          <fpage>152</fpage>
          -
          <lpage>171</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>V.</given-names>
            <surname>Botti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Garrido</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Giret</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Igual</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Noriega</surname>
          </string-name>
          .
          <article-title>On the design of mWater: a case study for Agreement Technologies</article-title>
          .
          <source>In 7th European Workshop on MultiAgent Systems - EUMAS</source>
          <year>2009</year>
          , pages
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Castelfranchi</surname>
            <given-names>C</given-names>
          </string-name>
          .
          <article-title>Formalising the informal</article-title>
          ?
          <source>Journal of Applied Logic, N 1</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>N.</given-names>
            <surname>Criado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Julian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Botti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Argente</surname>
          </string-name>
          .
          <article-title>A Norm-based Organization Management System</article-title>
          .
          <source>In AAMAS Workshop on Coordination, Organization, Institutions and Norms in Agent Systems (COIN)</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>M.</given-names>
            <surname>Esteva</surname>
          </string-name>
          .
          <article-title>Electronic Institutions: from specification to development</article-title>
          . IIIA
          <source>PhD Monography</source>
          ,
          <volume>19</volume>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>M.</given-names>
            <surname>Esteva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.A.</given-names>
            <surname>Rodriguez-Aguilar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Sierra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Garcia</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Arcos</surname>
          </string-name>
          .
          <article-title>On the formal specification of electronic institutions</article-title>
          .
          <source>Agent mediated electronic commerce</source>
          , pages
          <fpage>126</fpage>
          -
          <lpage>147</lpage>
          ,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>M. Esteva</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Rosell</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          <string-name>
            <surname>Rodriguez-Aguilar</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>J.L.</given-names>
            <surname>Arcos</surname>
          </string-name>
          . Ameli:
          <article-title>An agentbased middleware for electronic institutions</article-title>
          .
          <source>In Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems-Volume 1, page 243. IEEE Computer Society</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>N.</given-names>
            <surname>Fornara</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Colombetti</surname>
          </string-name>
          .
          <article-title>Specifying and enforcing norms in artificial institutions (short paper)</article-title>
          .
          <source>In Proc. 7th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS</source>
          <year>2008</year>
          ), pages
          <fpage>1481</fpage>
          -
          <lpage>1484</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>D.</given-names>
            <surname>Gaertner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Garcia-Camino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Noriega</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.A.</given-names>
            <surname>Rodriguez-Aguilar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>W.</given-names>
            <surname>Vasconcelos</surname>
          </string-name>
          .
          <article-title>Distributed norm management in regulated multiagent systems</article-title>
          .
          <source>In Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, page 90. ACM</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Andr</surname>
          </string-name>
          <article-title>´es Garc´ıa-</article-title>
          <string-name>
            <surname>Camino</surname>
          </string-name>
          ,
          <article-title>Juan A. Rodr´ıguez-</article-title>
          <string-name>
            <surname>Aguilar</surname>
          </string-name>
          ,
          <article-title>Carles Sierra, and Wamberto Weber Vasconcelos</article-title>
          .
          <article-title>Norm-oriented programming of electronic institutions</article-title>
          .
          <source>In Proc. International Conference on Autonomous Agents and Multiagent Systems (AAMAS)</source>
          , pages
          <fpage>670</fpage>
          -
          <lpage>672</lpage>
          . ACM,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>D.</given-names>
            <surname>Grossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Aldewereld</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Dignum</surname>
          </string-name>
          .
          <article-title>Ubi lex, ibi poena: Designing norm enforcement in e-institutions</article-title>
          . In Coordination, Organizations, Institutions, and
          <article-title>Norms in Multi-Agent Systems II</article-title>
          , volume
          <volume>4386</volume>
          , pages
          <fpage>101</fpage>
          -
          <lpage>114</lpage>
          . Springer,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>J.F. Hu</surname>
          </string-name>
          <article-title>¨bner,</article-title>
          <string-name>
            <surname>O. Boissier</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Kitio</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Ricci</surname>
          </string-name>
          .
          <article-title>Instrumenting multi-agent organisations with organisational artifacts and agents</article-title>
          .
          <source>Autonomous Agents and MultiAgent Systems</source>
          ,
          <volume>20</volume>
          (
          <issue>3</issue>
          ):
          <fpage>369</fpage>
          -
          <lpage>400</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>N.H.</given-names>
            <surname>Minsky</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Ungureanu</surname>
          </string-name>
          .
          <article-title>A mechanism for establishing policies for electronic commerce</article-title>
          .
          <source>In International Conference on Distributed Computing Systems</source>
          , volume
          <volume>18</volume>
          , pages
          <fpage>322</fpage>
          -
          <lpage>331</lpage>
          . Citeseer,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>N.H.</given-names>
            <surname>Minsky</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Ungureanu</surname>
          </string-name>
          .
          <article-title>Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems</article-title>
          .
          <source>ACM Transactions on Software Engineering and Methodology (TOSEM)</source>
          ,
          <volume>9</volume>
          (
          <issue>3</issue>
          ):
          <fpage>273</fpage>
          -
          <lpage>305</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Sanjay</surname>
            <given-names>Modgil</given-names>
          </string-name>
          , Noura Faci, Felipe Rech Meneguzzi, Nir Oren,
          <string-name>
            <given-names>Simon</given-names>
            <surname>Miles</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Michael</given-names>
            <surname>Luck</surname>
          </string-name>
          .
          <article-title>A framework for monitoring agent-based normative systems</article-title>
          . In Carles Sierra, Cristiano Castelfranchi, Keith S. Decker, and Jaime Sim˜ao Sichman, editors,
          <source>AAMAS</source>
          , pages
          <fpage>153</fpage>
          -
          <lpage>160</lpage>
          . IFAAMAS,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>P.</given-names>
            <surname>Noriega</surname>
          </string-name>
          .
          <article-title>Agent-mediated auctions: The fishmarket metaphor</article-title>
          .
          <source>IIIA Phd Monography</source>
          ,
          <volume>8</volume>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>D.C.</surname>
          </string-name>
          <article-title>North. Institutions, institutional change, and economic performance</article-title>
          . Cambridge Univ Pr,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>A.</given-names>
            <surname>Omicini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ricci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Viroli</surname>
          </string-name>
          .
          <article-title>Artifacts in the A&amp;A meta-model for multiagent systems</article-title>
          . Autonomous Agents and
          <string-name>
            <surname>Multi-Agent</surname>
            <given-names>Systems</given-names>
          </string-name>
          ,
          <volume>17</volume>
          (
          <issue>3</issue>
          ):
          <fpage>432</fpage>
          -
          <lpage>456</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>J.A.</given-names>
            <surname>Rodrıguez-Aguilar</surname>
          </string-name>
          .
          <article-title>On the design and construction of agent-mediated electronic institutions</article-title>
          .
          <source>IIIA Phd Monography</source>
          ,
          <volume>14</volume>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23. T. Schultz, G. Kaufmann-Kohler,
          <string-name>
            <given-names>D.</given-names>
            <surname>Langer</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Bonnet</surname>
          </string-name>
          .
          <article-title>Online dispute resolution: The state of the art and the issues</article-title>
          . In Available at SSRN: http://ssrn.com/abstarct=899079.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>WK</given-names>
            <surname>Slate</surname>
          </string-name>
          .
          <article-title>Online dispute resolution: Click here to settle your dispute</article-title>
          .
          <source>Dispute Resolution Journal</source>
          ,
          <volume>56</volume>
          (
          <issue>4</issue>
          ):
          <fpage>8</fpage>
          -
          <lpage>14</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>