1 Introduction
2 HYPO
2.1 Dimensions
The automobile exception permits search of an automobile without a warrant provided that there is probable cause, and that the search is sufficiently exigent. Exigency arises from the possibility that the delay in seeking a warrant might compromise the collection of evidence or public safety. If we consider the dimension of exigency, a completely immovable item would represent one end of the dimension and an automobile in transit on a highway the other. If we arrange our precedents along this dimension we will observe that at one extreme, where there is little exigency, all the cases will require a warrant, and at the other, where the matter is pressing, none of the cases will require a warrant. In between, some cases will need a warrant and some will not, suggesting that other relevant dimensions are in play. The situation is represented pictorially by the vertical grey lines in Fig. 1.3 Similarly for privacy, at one end (e.g. intimate body search) reasonable expectations of privacy will be such that a warrant will always be required, whereas at the other (in plain view in a public space) there may be little or no expectation of privacy so that a warrant may never be required. This situation is shown by the horizontal lines of Fig. 1. Putting the two dimensions together, the lines divide the space into 9 two-dimensional areas. In A, D and G, there is insufficient exigency to merit warrantless search, whereas in C and F the exigency is such (perhaps an immediate threat to the life of the President) that no expectations of privacy are sufficient to require a warrant. In A, B and C there are insufficient expectations of privacy to require a warrant given any degree of exigency, while in G and H the expectations of privacy are sufficiently high that no degree of exigency will permit the search. The interesting areas are E and I. In E there is a trade off between the two dimensions, so that some kind of balance must be struck (Lauritsen 2015). In area I, unless there is another dimension to consider, a preference needs to expressed, perhaps based on a preference between values (Bench-Capon and Sartor 2003). The dark line in Fig. 1 thus divides the space into areas where a warrant is required (to the left of the line) and those where it is not (to the right of the line).4 The line shown in Fig. 1 indicates an even trade off between privacy and exigency (giving the \(45^0\) line): other trade-offs are possible, which would require a curve rather than a line. It also includes area I in the no-warrant space, indicating a preference for exigency: a different preference would send the line horizontal, excluding I. Note also that trade-off could be possible throughout the range of the dimensions, so that areas A and I are squeezed. The right hand grey line effectively represents the point at which the dimension becomes decisive (subject to preference for a second dimension which is the decisive range for the other side), what (Bruninghaus and Ashley 2003a) call a knock-out factor. If both dimensions are such that the area E expands to consume the whole space, we have a situation where the dimensions are never decisive, but require to be balanced across their whole range.[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, ...
2.2 Three-ply arguments
2.2.1 Citing a case
2.2.2 Response
2.2.3 Rebuttal
-
Distinguish the counter examples This can be done in the same ways as the defendant distinguished the plaintiff’s precedent in the response.
-
Emphasise strengths If the current case is more favourable to the plaintiff on some dimensions than a precedent which already favours the plaintiff, that is a strength worth emphasising.
-
Show weaknesses not fatal If the defendant has distinguished a case by showing that the plaintiff is weaker on some shared dimension than a precedent found for the defendant, this can be shown to be not a fatal weakness by finding another precedent which as weak or weaker on that dimension but which was found for the plaintiff. This shows that we are in an area of that dimension which has mixed outcomes, suggesting that it is some other dimension that is decisive.
2.3 Dimensions in HYPO
3 Beyond HYPO
3.1 CABARET
3.2 BankXX
3.3 SPIRE
-
Second, within those retrieved documents, passages that contain information relevant to specific case features are highlighted. Here the “case base” (more like an examples base) was a collection of excerpts; one set for each term of interest (such as the sincerity of the debtor). Differences with other systems in the HYPO family are that: they are not structured objects like cases, (but only snippets of text; the same set of excerpts is used for all attempts to locate passages and thus, there is no attempt to make the selection of “see” excerpts“relevant” to the case at hand. The idea was then to do something analogous for case retrieval, but this time on an individual document and to locate relevant passages within it.
4 Doing things with factors
4.1 CATO
-
which differences between a case and a precedent can be used as distinctions,
-
which distinctions can be downplayed,
-
how to downplay distinctions.
4.1.1 Factors in CATO
ID | Factor | HYPO dimension |
---|---|---|
F1 | DisclosureInNegotiations (d) | Defendant end of D12 |
F2 | BribeEmployee (p) | D6 |
F3 | EmployeeSoleDeveloper (d) | D10 |
F4 | AgreedNotToDisclose (p) | Plaintiff end of D9 |
F5 | AgreementNotSpecific (d) | Defendant end of D11 |
F6 | SecurityMeasures (p) | Any point of D13 except extreme defendant end |
F7 | BroughtTools (p) | D8 |
F8 | CompetitiveAdvantage (p) | Plaintiff end of D1 |
F10 | SecretsDisclosedOutsiders (d) | Any point of D3 except extreme plaintiff end |
F11 | VerticalKnowledge (d) | Defendant end of D2 |
F12 | OutsiderDisclosuresRestricted (p) | Plaintiff end of D4 |
F13 | NoncompetitionAgreement (p) | Plaintiff end of D7 |
F14 | RestrictedMaterialsUsed (p) | Not in HYPO |
F15 | UniqueProduct (p) | Not in HYPO |
F16 | InfoReverseEngineerable (d) | Not in HYPO |
F17 | InfoIndependentlyGenerated (d) | Not in HYPO |
F18 | IdenticalProducts (p) | Not in HYPO |
F19 | NoSecurityMeasures (d) | Defendant end of D13 |
F20 | InfoKnownToCompetitors (d) | Not in HYPO |
F21 | KnewInfoConfidential (p) | Not in HYPO |
F22 | InvasiveTechniques (p) | Not in HYPO |
F23 | WaiverOfConfidentiality (d) | Not in HYPO |
F24 | InfoObtainableElsewhere (d) | Not in HYPO |
F25 | InfoReverseEngineered (d) | Not in HYPO |
F26 | Deception (p) | Not in HYPO |
F27 | DisclosureInPublicForum (d) | Point on D3 towards defendant end |
4.1.2 Downplaying and emphasising distinctions
4.1.3 Argument moves
-
Analogising a case to a past case with a favourable outcome;
-
Distinguishing a case with an unfavourable outcome;
-
Downplaying the significance of a decision;
-
Emphasising the significance of a distinction;
-
Citing a favourable case to emphasise strengths;
-
Citing a favourable case to argue that weaknesses are not fatal;
-
Citing a more on point counterexample to a case cited by an opponent;
-
Citing an as on point counter example to a case cited by an opponent.
4.1.4 CATO summary
-
CATO style factors, and the representation of cases as bundles of binary factors have been the predominant form of representation of cases in work such as dialogue (Prakken and Sartor 1998), theory construction (Bench-Capon and Sartor 2003) and argumentation (Wyner and Bench-Capon 2007) and are the starting point for formalisations (Horty and Bench-Capon 2012).
-
The factor hierarchy and its introduction of intermediate predicates have been found useful in works such as Bruninghaus and Ashley (2003b), Atkinson and Bench-Capon (2005), Lindahl and Odelstad (2008) and Grabmair and Ashley (2011). The idea has also been used in work on methodologies for representing cases such as Al-Abdulkarim et al. (2016c).
-
Argument moves, in particular the set identified by CATO, have also influenced AI and Law work on dialogues for reasoning about cases (Wardeh et al. 2009).
4.2 IBP
4.2.1 Logical model
ID | Factor | CATO issues |
---|---|---|
F1 | DisclosureInNegotiations (d) | Confidential relationship |
F2 | BribeEmployee (p) | Improper means |
F3 | EmployeeSoleDeveloper (d) | |
F4 | AgreedNotToDisclose (p) | Maintain secrecy, confidential relationship |
F5 | AgreementNotSpecific (d) | Defendant end of D11 |
F6 | SecurityMeasures (p) | Maintain secrecy |
F7 | BroughtTools (p) | Information used, improper means |
F8 | CompetitiveAdvantage (p) | Information valuable, information used |
F10 | SecretsDisclosedOutsiders (d) | Maintain secrecy |
F11 | VerticalKnowledge (d) | Defendant end of D2 |
F12 | OutsiderDisclosuresRestricted (p) | Maintain secrecy |
F13 | NoncompetitionAgreement (p) | Confidential relationship |
F14 | RestrictedMaterialsUsed (p) | Information used, improper means |
F15 | UniqueProduct (p) | Information valuable |
F16 | InfoReverseEngineerable (d) | Information valuable |
F17 | InfoIndependentlyGenerated (d) | Information used, improper means |
F18 | IdenticalProducts (p) | Information used |
F19 | NoSecurityMeasures (d) | Maintain secrecy |
F20 | InfoKnownToCompetitors (d) | Information valuable |
F21 | KnewInfoConfidential (p) | Confidential relationship |
F22 | InvasiveTechniques (p) | Improper means |
F23 | WaiverOfConfidentiality (d) | Confidential relationship |
F24 | InfoObtainableElsewhere (d) | Information valuable |
F25 | InfoReverseEngineered (d) | Information used, improper means |
F26 | Deception (p) | Improper means |
F27 | DisclosureInPublicForum (d) | Information valuable |
4.3 Empirical results for IBP
Correct | Error | Abstain | Accuracy | No-abst | |
---|---|---|---|---|---|
ANGELIC secrets II | 31 | 1 | 0 | 96.8 | 96.8 |
ANGELIC refined | 31 | 1 | 0 | 96.8 | 96.8 |
AGATHA brute force | 30 | 2 | 0 | 93.7 | 93.7 |
IBP | 170 | 15 | 1 | 91.4 | 91.9 |
AGATHA A* | 29 | 3 | 0 | 90.6 | 90.6 |
ANGELIC secrets | 29 | 3 | 0 | 90.6 | 90.6 |
CATO-coin | 163 | 30 | 0 | 89.0 | 89.0 |
Naive Bayes | 161 | 25 | 0 | 86.5 | 86.5 |
HYPO-coin | 152 | 34 | 0 | 81.7 | 81.7 |
ANGELIC CATO | 25 | 7 | 0 | 78.1 | 78.1 |
CATO | 152 | 19 | 22 | 77.8 | 88.8 |
HYPO | 127 | 9 | 50 | 68.3 | 93.4 |
IBP-model | 99 | 15 | 38 | 72.6 | 86.8 |
5 Integration with rule based reasoning
5.1 Central idea of Prakken and Sartor (1998)
-
r1: \(F_p \rightarrow p\)
-
r2: \(F_d \rightarrow d\)
-
r3: \(r1 \succ r2\)
5.2 Formalisation of precedential reasoning
-
the natural model by which “a precedent decision might figure into the reasoning of a court in its attempt to reach the correct decision in a current case; but on the natural model, this is the extent of precedential constraint” (p. 19);
-
the rule model by which precedents include a “rule that carries the precedential constraint. Constraint by precedent is just constraint by rules; a constrained court must apply the rules of precedent cases in reaching current decisions ... There is no room for narrowing the rule, or distinguishing the current case from the precedent;” (p. 20);
-
the result model by which “a precedent controls all and only a fortiori cases - that is, all and only those cases that are as least as strong for the winning side of the precedent as the precedent case itself.” (p. 20).
In that case the US Supreme Court addressed the question of whether Pennsylvania’s and Rhode Island’s statutes that provided money to religious primary schools subject to state oversight violated the Establishment Clause of the First Amendment. The court introduced a three-pronged test and ultimately ruled that both programs did violate the Establishment Clause.
5.3 Argumentation schemes
6 Purposes and values
6.1 Value based theory construction
AGATHA produces better theories that the hand constructed theories reported in Chorley and Bench-Capon (2005b), and theories comparable in explanatory power to the best performing reported technique, IBP (Ashley and Brüninghaus 2009). Note also that AGATHA can be used even when there is no accepted structural model of the domain, whereas IBP relies on using the structure provided by the Restatement of Torts.
6.2 Other uses of values
7 Back to dimensions
7.1 Factors and dimensions
Some factors to be considered in determining whether given information is one’s trade secret are: 1. the extent to which the information is known outside of his business; 2. the extent to which it is known by employees and others involved in his business; 3. the extent of measures taken by him to guard the secrecy of the information; 4. the value of the information to him and to his competitors; 5. the amount of effort or money expended by him in developing the information; 6. the ease or difficulty with which the information could be properly acquired or duplicated by others.
7.2 Current use of dimension for computation
-
Agreement This relates to the existence of explicit confidentiality and non-disclosure agreements.
-
Dubious This considers whether the means used by the defendant were illegal or otherwise dubious or questionable
-
Legitimate This covers the independent discovery of the information.
-
Measures This relates to the security measures used by the plaintiff.
-
Worth This relates to the value of the information, in terms of the time and effort that it might save, and the value it would add to the defendant’s product.
-
Disclosure This relates to the number of people to whom the information and been disclosed and the circumstances of such disclosures.
-
Availability This considers how readily available the information was to the defendant.
Agreement | Dubious | Legitimate | Measures | Worth | Disclosure | Availability | |
---|---|---|---|---|---|---|---|
CA | QM | LM | RE | MW | RE | LM | |
10 | F4 | F22 | F6 | F8 | |||
9 | F2 | ||||||
8 | F13 | F26 | F7 | F7 | F12 | ||
7 | F21 | F14 | |||||
6 | F14 | F18 | F15 | ||||
5 | |||||||
4 | F1 | ||||||
3 | F5 | F25 | F16 | F20 | |||
2 | |||||||
1 | F23 | F17 | F10 | ||||
0 | F3 | F19 | F11 | F27 | F24 |
7.2.1 Comparison with HYPO dimensions
Confidentiality agreement | Dubious means | OK means | Security measures | Material worth | Disclosure | |
---|---|---|---|---|---|---|
CA | QM | LM | RE | MW | RE | |
10 | Agreed Not To Disclose | Security Measures (P) | Competitive Advantage (P) | Secrets Disclosed Outsiders (P) | ||
9 | Bribe Employee | Vertical Knowledge (P) | ||||
8 | Non competition Agreement | Brought Tools | Outsider Disclosures Restricted (P) | |||
7 | ||||||
6 | ||||||
5 | ||||||
4 | Disclosure In Negotiations | |||||
3 | Agreement Not Specific | |||||
2 | ||||||
1 | Vertical Knowledge (D) | Outsider Disclosures Restricted (D) | ||||
0 | No Consideration | Employee Sole Developer | Security Measures (D) | Competitive Advantage (D) | Secrets Disclosed Outsiders (D) |
7.3 Dimensions as a bridge to facts
Statement type | “Truth” value | Justification | |
---|---|---|---|
Verdict | V | 0, 1 | Entailed by II/LI |
Intermediate issue | II | 0, 1 | Entailed by LI |
Leaf issue | LI | 0, 1 |
\(af \in AF\) Sufficiently favours plaintiff |
Abstract factor | AF | −1 .... 1 | Deduced from BF |
Base level factor | BF | −1 .... 1 | Mapped from LI |
Legal fact | LF | 0, 1 |
\(if \in FC\) meets proof standard |
Factual conclusion | FC | 0 ...1 | Entailed by IF |
Intermediate fact | IF | 0 ... 1 | Derived from E |
Evidence | E | 1 | Given |
8 Conclusion
-
Can we modify formalisations of the sort found in Horty and Bench-Capon (2012) to accommodate factors associated with magnitudes, rather than just binary true and false?
-
Horty and Bench-Capon (2012) is concerned with comparing sets of factors. What about cases where factors need to be balanced?
-
Can we use dimensions to be more precise about the transition from world facts to legal facts?
-
Can we exploit the structure of cases into dimensions and points/ranges on these dimensions when reasoning about evidence?
-
What roles can precedents have? We have seen that there are precedents indicating preferences, precedents providing a framework of issues as in Rigoni (2015), and tentatively identified precedents which introduced additional factors. Are there others?
-
What is the role of purposes and values? If values can play several roles, as suggested in Sect. 6, how can these be distinguished, and how do they relate?