“…Similar stances have been taken in cognate domains such as business processes and web services (Pesic & van der Aalst, 2006; van der Aalst & Pesic, 2006; Montali, Pesic, et al ., 2010). Moreover, the definition of interaction protocols or norms by way logical formulas enables exploiting a number of verification tools (El-Menshawy et al ., 2015). Formalisms used to define protocols and norms include temporal logics (Bulling et al ., 2013), the EC (Kowalski & Sergot, 1985) the reactive EC (REC) (Chesani et al ., 2010), the lightweight coordination calculus (LCC) (Robertson, 2004), frameworks supporting social semantics for agent communication such as the SCIFF language of social expectations (Alberti et al ., 2008), commitment manipulation languages (Singh, 1998) such as the EC-based one proposed by Yolum and Singh (2002) and REC-based commitment manipulation language (Torroni, Chesani, et al ., 2009), contract specification languages such as defeasible logic-based business contract language (Governatori & Pham, 2009) and, especially in the context of norms, deontic logic (von Wright, 1951).…”