
required
privacy
fairness
performance
required
privacy
fairness performance
(a) (b) (c)
required
privacy fairness
performance
required
privacy fairness
performance
(d) (e)
Figure 2: Structures of constraint hierarchies.
(1) and (8). Constraint (8) uniquely determines u
as recommendation, which further determines d as
data1 because of constraint (1) and the domain of d.
There are still eight potential solutions that can assign
different combinations of values to variables n, m, and
p. Their values need to be determined by further con-
sidering the norm constraints.
To show the effects of our framework, we con-
sider different structures of constraint hierarchies.
First, we suppose the simplest case where all the
six norms belong to one norm level as shown in
Figure 2(a). In this case, all the norms are aggre-
gated to compare the potential solutions that satisfy
the required constraints, which determines the solu-
tions to the constraint hierarchy. Table 1 shows this
process. Initially, each potential solution is associ-
ated with the six ranks that are indicated as norm-
wise ranks in this table. For example, potential
solution hd, u, n, m, pi = hdata1, recommendation,
node1, node1, process1i has the first rank for norm
transfer safety since assigning node1 to both n and m
is specified as the best by the norm constraint (4) as-
sociated with transfer safety. Next, for each potential
solution, its Copeland score is computed from their
norm-wise ranks. Finally, hd, u, n, m, pi = hdata1,
recommendation, node1, node1, process1i is deter-
mined as only the solution to the constraint hierar-
chy since it was given the highest Copeland score
of 7.0. Intuitively, this solution means that data1
should be used for recommendation, should be trans-
ferred to the processing node via node1, should be
processed by process1, and should be returned to the
user node via node1. Note that this solution is given
the first norm-wise ranks by the five norms other than
transfer efficiency.
Next, we consider a case where there are three
norm levels, privacy, fairness, and performance.
In this case, level privacy consists of four norms
Table 1: Case where all the six norms belong to one
norm level. Norms data minimality, data sensitivity,
transfer safety, node safety, algo unbiasedness,
and transfer efficiency and variable values data1,
recommendation, node1, node2, process1, and process2
are abbreviated as dm, ds, ts, ns, au, te, d1, rec, n1, n2,
p1, and p2 respectively.
Potential solution Norm-wise ranks Cope- Level-
land wise
hd, u, n, m, pi dm ds ts ns au te score rank
hd1, rec, n1, n1, p1i 1 1 1 1 1 3 7.0 1
hd1, rec, n1, n2, p1i 1 1 2 2 1 2 5.0 2
hd1, rec, n2, n1, p1i 1 1 2 2 1 2 5.0 2
hd1, rec, n2, n2, p1i 1 1 3 3 1 1 2.5 4
hd1, rec, n1, n1, p2i 1 1 1 1 2 3 4.5 3
hd1, rec, n1, n2, p2i 1 1 2 2 2 2 2.0 5
hd1, rec, n2, n1, p2i 1 1 2 2 2 2 2.0 5
hd1, rec, n2, n2, p2i 1 1 3 3 2 1 0.0 6
Table 2: Case where four out of the six norms belong to
norm level privacy. The norms and the variable values are
abbreviated in the same way as in Table 1.
Potential solution Norm-wise ranks Cope- Level-
land wise
hd, u, n, m, pi dm ds ts ns score rank
hd1, rec, n1, n1, p1i 1 1 1 1 6.5 1
hd1, rec, n1, n2, p1i 1 1 2 2 3.5 2
hd1, rec, n2, n1, p1i 1 1 2 2 3.5 2
hd1, rec, n2, n2, p1i 1 1 3 3 0.5 3
hd1, rec, n1, n1, p2i 1 1 1 1 6.5 1
hd1, rec, n1, n2, p2i 1 1 2 2 3.5 2
hd1, rec, n2, n1, p2i 1 1 2 2 3.5 2
hd1, rec, n2, n2, p2i 1 1 3 3 0.5 3
data minimality, data sensitivity, transfer safety,
and node safety, level fairness consists of one norm
algo unbiasedness, and level performance consists of
the other one norm transfer efficiency. Since lev-
els privacy and fairness consist of only one norm,
their level-wise rankings of the potential solutions are
the same as the underlying norm-wise rankings due
to the nature of Copeland’s rule. For level privacy,
we need to compute its level-wise ranking, which is
shown in Table 2. In the same way as the previ-
ous case, the four norm-wise ranks are aggregated to
calculate their Copeland scores, which separates the
potential solutions into three ranks. Especially, note
that two potential solutions hd, u, n, m, pi = hdata1,
recommendation, node1, node1, process1i, hdata1,
recommendation, node1, node1, process2i are given
the first level-wise rank in this case.
To handle the three norm levels, we further con-
sider their partial orders. It should be noted that,
in the typical use of a constraint hierarchy, such
a partial order is determined at its modeling stage.
However, in the following, we show all the possi-
ble partial orders to illustrate our framework. Since
there are three norm levels, we can consider the
A Soft Constraint-Based Framework for Ethical Reasoning
1359