{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T03:43:58Z","timestamp":1777434238797,"version":"3.51.4"},"reference-count":40,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Argument &amp; Computation"],"published-print":{"date-parts":[[2022,2,21]]},"abstract":"<jats:p>In this paper, we propose an argumentation formalism that allows for both deductive and abductive argumentation, where \u2018deduction\u2019 is used as an umbrella term for both defeasible and strict \u2018forward\u2019 inference. Our formalism is based on an extended version of our previously proposed information graph (IG) formalism, which provides a precise account of the interplay between deductive and abductive inference and causal and evidential information. In the current version, we consider additional types of information such as abstractions which allow domain experts to be more expressive in stating their knowledge, where we identify and impose constraints on the types of inferences that may be performed with the different types of information. A\u00a0new notion of attack is defined that captures a crucial aspect of abductive reasoning, namely that of competition between abductively inferred alternative explanations. Our argumentation formalism generates an abstract argumentation framework and thus allows arguments to be formally evaluated. We prove that instantiations of our argumentation formalism satisfy key rationality postulates.<\/jats:p>","DOI":"10.3233\/aac-200539","type":"journal-article","created":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T11:18:55Z","timestamp":1611314335000},"page":"49-91","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Deductive and abductive argumentation based on information graphs"],"prefix":"10.1177","volume":"13","author":[{"given":"Remi","family":"Wieten","sequence":"first","affiliation":[{"name":"Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC, Utrecht, The Netherlands"}]},{"given":"Floris","family":"Bex","sequence":"additional","affiliation":[{"name":"Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC, Utrecht, The Netherlands"},{"name":"Institute for Law, Technology and Society, Tilburg University, Warandelaan 2, 5037 AB, Tilburg, The\u00a0Netherlands"}]},{"given":"Henry","family":"Prakken","sequence":"additional","affiliation":[{"name":"Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC, Utrecht, The Netherlands"},{"name":"Faculty of Law, University of Groningen, Oude Kijk in \u2019t Jatstraat 26, 9712 EK, Groningen, The\u00a0Netherlands"}]},{"given":"Silja","family":"Renooij","sequence":"additional","affiliation":[{"name":"Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC, Utrecht, The Netherlands"}]}],"member":"179","published-online":{"date-parts":[[2021,1,22]]},"reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014490210693"},{"key":"ref002","doi-asserted-by":"crossref","unstructured":"T.J.\u00a0Anderson, D.A.\u00a0Schum and W.L.\u00a0Twining, Analysis of Evidence, 2nd edn, Cambridge University Press, 2005.","DOI":"10.1017\/CBO9780511610585"},{"key":"ref003","unstructured":"T.J.M.\u00a0Bench-Capon and H.\u00a0Prakken, Justifying actions by accruing arguments, in: Computational Models of Arguments: Proceedings of COMMA 2006, P.E.\u00a0Dunne and T.J.M.\u00a0Bench-Capon, eds, Vol.\u00a0144, IOS Press, 2006, pp.\u00a0247\u2013258."},{"key":"ref004","doi-asserted-by":"crossref","unstructured":"F.\u00a0Bex, Arguments, Stories and Criminal Evidence: A\u00a0Formal Hybrid Theory, Springer, 2011.","DOI":"10.1007\/978-94-007-0140-3"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1145\/2746090.2746094"},{"key":"ref006","doi-asserted-by":"publisher","DOI":"10.1023\/B:ARTI.0000046007.11806.9a"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00015-5"},{"key":"ref008","unstructured":"R.\u00a0Booth, D.\u00a0Gabbay, S.\u00a0Kaci, T.\u00a0Rienstra and L.\u00a0van der Torre, Abduction and dialogical proof in argumentation and logic programming, in: Proceedings of the Twenty-First European Conference on Artificial Intelligence, T.\u00a0Schaub, G.\u00a0Friedrich and B.\u00a0O\u2019Sullivan, eds, Vol.\u00a0263, IOS Press, 2014, pp.\u00a0117\u2013122."},{"key":"ref009","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2007.02.003"},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1007\/11518655_33"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0277(91)90047-8"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58107-3_6"},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(94)00041-X"},{"key":"ref014","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2010.09.005"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1613\/jair.5393"},{"key":"ref016","doi-asserted-by":"crossref","unstructured":"F.V.\u00a0Jensen and T.D.\u00a0Nielsen, Bayesian Networks and Decision Graphs, 2nd edn, Springer, 2007.","DOI":"10.1007\/978-0-387-68282-2"},{"key":"ref017","doi-asserted-by":"crossref","unstructured":"J.R.\u00a0Josephson and S.G.\u00a0Josephson, Abductive Inference: Computation, Philosophy, Technology, Cambridge University Press, 1994.","DOI":"10.1017\/CBO9780511530128"},{"key":"ref018","doi-asserted-by":"crossref","unstructured":"J.B.\u00a0Kadane and D.A.\u00a0Schum, A\u00a0Probabilistic Analysis of the Sacco and Vanzetti Evidence, John Wiley & Sons Inc., 1996.","DOI":"10.1002\/9781118150580"},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/2.6.719"},{"key":"ref020","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.10.008"},{"key":"ref021","doi-asserted-by":"publisher","DOI":"10.1080\/19462166.2013.869766"},{"key":"ref022","unstructured":"S.\u00a0Modgil and H.\u00a0Prakken, Abstract rule-based argumentation, in: Handbook of Formal Argumentation, P.\u00a0Baroni, D.\u00a0Gabbay, M.\u00a0Giacomin and L.\u00a0van der Torre, eds, College Publications, 2018, pp.\u00a0286\u2013361."},{"key":"ref023","doi-asserted-by":"crossref","unstructured":"A.\u00a0Okada, S.J.\u00a0Buckingham Shum and T.\u00a0Sherborne\u00a0(eds), Knowledge Cartography: Software Tools and Mapping Techniques, 2nd edn, Springer, 2014.","DOI":"10.1007\/978-1-4471-6470-8"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00041-7"},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(88)90015-X"},{"key":"ref026","doi-asserted-by":"crossref","unstructured":"J.\u00a0Pearl, Causality: Models, Reasoning, and Inference, 2nd edn, Cambridge University Press, 2009.","DOI":"10.1017\/CBO9780511803161"},{"key":"ref027","doi-asserted-by":"crossref","unstructured":"J.\u00a0Pollock, Cognitive Carpentry. A\u00a0Blueprint for How to Build a Person, MIT Press, 1995.","DOI":"10.7551\/mitpress\/1887.001.0001"},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.1007\/BF01530736"},{"key":"ref029","unstructured":"H.\u00a0Prakken, On support relations in abstract argumentation as abstractions of inferential relations, in: Proceedings of the Twenty-First European Conference on Artificial Intelligence, T.\u00a0Schaub, G.\u00a0Friedrich and B.\u00a0O\u2019Sullivan, eds, Vol.\u00a0263, IOS Press, 2014, pp.\u00a0735\u2013740."},{"key":"ref030","unstructured":"H.\u00a0Prakken, Historical overview of formal argumentation, in: Handbook of Formal Argumentation, P.\u00a0Baroni, D.\u00a0Gabbay, M.\u00a0Giacomin and L.\u00a0van der Torre, eds, College Publications, 2018, pp.\u00a073\u2013141."},{"key":"ref031","doi-asserted-by":"crossref","unstructured":"H.\u00a0Prakken and G.\u00a0Vreeswijk, Logics for defeasible argumentation, in: Handbook of Philosophical Logic, R.\u00a0Goebel and F.\u00a0Guenthner, eds, Vol.\u00a04, Springer, 2002, pp.\u00a0219\u2013318.","DOI":"10.1007\/978-94-017-0456-4_3"},{"key":"ref032","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(80)90014-4"},{"key":"ref033","unstructured":"M.\u00a0Shanahan, Prediction is deduction but explanation is abduction, in: Proceedings of International Joint Conference on Artificial Intelligence 89, N.S.\u00a0Sridharan, ed. Morgan Kaufmann, 1989, pp.\u00a01055\u20131060."},{"key":"ref034","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Shoham, Reasoning About Change: Time and Causation from the Standpoint of Artificial Intelligence, MIT Press, 1988.","DOI":"10.1016\/B978-0-934613-67-5.50015-0"},{"key":"ref035","unstructured":"N.\u00a0Timmers, The hybrid theory in practice: A\u00a0case study at the Dutch police force, Master\u2019s thesis, Utrecht University, The Netherlands, 2017."},{"key":"ref036","unstructured":"S.W.\u00a0van den Braak, H.\u00a0van Oostendorp, H.\u00a0Prakken and G.A.W.\u00a0Vreeswijk, Representing narrative and testimonial knowledge in sense-making software for crime analysis, in: Legal Knowledge and Information Systems: JURIX 2008: The Twenty-First Annual Conference, E.\u00a0Francesconi, G.\u00a0Sartor and D.\u00a0Tiscornia, eds, Vol.\u00a0189, IOS Press, 2008, pp.\u00a0160\u2013169."},{"key":"ref037","unstructured":"R.\u00a0Wieten, F.\u00a0Bex, H.\u00a0Prakken and S.\u00a0Renooij, Exploiting causality in constructing Bayesian networks from legal arguments, in: Legal Knowledge and Information Systems. JURIX 2018: The Thirty-First Annual Conference, M.\u00a0Palmirani, ed., Vol.\u00a0313, IOS Press, 2018, pp.\u00a0151\u2013160."},{"key":"ref038","unstructured":"R.\u00a0Wieten, F.\u00a0Bex, H.\u00a0Prakken and S.\u00a0Renooij, Deductive and abductive reasoning with causal and evidential information, in: Computational Models of Argument, H.\u00a0Prakken, S.\u00a0Bistarelli, F.\u00a0Santini and C.\u00a0Taticchi, eds, Proceedings of COMMA 2020, Vol.\u00a0326, IOS Press, 2020, pp.\u00a0383\u2013394."},{"key":"ref039","doi-asserted-by":"crossref","unstructured":"R.\u00a0Wieten, F.\u00a0Bex, H.\u00a0Prakken and S.\u00a0Renooij, Information graphs and their use for Bayesian network construction,\n                      International Journal of Approximate Reasoning\n                      (2020). Manuscript submitted.","DOI":"10.1016\/j.ijar.2021.06.007"},{"key":"ref040","unstructured":"J.H.\u00a0Wigmore, The Principles of Judicial Proof, Little, Brown and Company, 1913."}],"container-title":["Argument &amp; Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/AAC-200539","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/AAC-200539","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/AAC-200539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T11:53:19Z","timestamp":1777377199000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/AAC-200539"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,22]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2,21]]}},"alternative-id":["10.3233\/AAC-200539"],"URL":"https:\/\/doi.org\/10.3233\/aac-200539","relation":{},"ISSN":["1946-2166","1946-2174"],"issn-type":[{"value":"1946-2166","type":"print"},{"value":"1946-2174","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,22]]}}}