models of legal argumentation trevor bench-capon department of computer science the university of...

Post on 01-Apr-2015

220 Views

Category:

Documents

4 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Models of Legal Argumentation

Trevor Bench-CaponDepartment of Computer Science

The University of LiverpoolLiverpool

UK

Overview

• Argument and Proof• Arguments Based on Cases

– HYPO– CATO

• Arguments Based on Rules• Bodies of Arguments – Dung • Argument Schemes – Toulmin• Persuasion Using Purpose and Value

Argument and Proof

• Argument– John is old because he

is aged 82

– Arguments persuade, not compel

– Arguments leave things implicit. The hearer fills in the gaps and may be convinced

• Proof– John is aged 82– John is a man– All men aged

greater than 70 are old

– 82 > 70– Therefore, John is

old

Argument and Proof

– Arguments may contain open textured concepts

– The proof requires a threshold for old

– The hearer needs only to accept that 82 is above the threshold

• Proof– John is aged 82– John is a man– All men aged

greater than 70 are old

– 82 > 70– Therefore, John is

old

•Argument–John is old becausehe is aged 82

Argument and Proof

– Arguments may introduce new information

– Speaker may assume John is man, but hearer knows he is a tortoise

• Proof– John is aged 82– John is a man– All men aged

greater than 70 are old

– 82 > 70– Therefore, John is

old

•Argument–John is old becausehe is aged 82

Legal Argument

• Legal Argument displays these typical characteristics of argument:– Unstated background and

uncontested facts– Open texture and context dependent

interpretation– New information and considerations

Arguments are Defeasible

• A sound proof has to be accepted• But arguments are inherently and

inescapably defeasible– They may be accepted, or challenged

• Different audiences may respond differently, accepting for different reasons, or offering different challenges

– The challenge can be accepted and the argument withdrawn, or it can be rebutted

– Thus arguments are embedded in a dialectic context – and the audience is important

M cC artyE isener vs M cC om ber

P ro to typesand D efo rm ations

U ntit ledR iss land and F riedm an

B ank rupcyE xp lo res C oncep t D rift

B ankX XR iss land , S ka lak , F riedm an

B ank rupcyG enera tion o f A rgum ent

S P IR ER iss land and D an ie ls

H om e O ffice /B ank rupcyIn fo rm ation R e trieva l

C A B A R E TR iss land and S ka lak

H om e O ffice D educ tionA rgum ent M oves

U ntit ledA sh ley and B run inghaus

T rade S ec re ts LawA utom atic iden tif ica tion o f F ac to rs

C A T OA sh ley and A levenT rade S ec re ts Law

F ac to r H ie ra rchy

H Y P OR iss land and A sh leyT rade S ec re ts Law

D im ens ions / 3 -P ly A rgum ent

SMILE

Arguments Based on Cases

Amherst

Pittsburgh

Rutgers

IBPAshley and Bruninghaus

Trade Secrets LawOutcome Prediction

GREBEBranting

Industrial InjuriesSemantic Net Based

Wyoming

Arguments Based on Cases• This was a focus of AI and Law

from the beginning• I will focus on

– HYPO (Rissland and Ashley)– CATO (Ashley and Aleven)

• Both systems operate inUS Trade Secrets Law

HYPO

• Main Features– Three-Ply Argument Structure– Use of Dimensions to Represent and

Compare Cases

Three Ply Argument

• First Ply:– A case is cited by proponent

• Second Ply:– The citation is attacked by opponent

• By distinguishing the case• With a counter example

• Third Ply:– The attack is rebutted by proponent

• Distinguishing the counter examples

Three Ply Argument

• Provides a simple but effective way of organising the argument

• Is clearly adversarial in nature• Allows for both distinguishing and

counter examples• Can be considered as an argument

scheme

Dimensions

• A dimension is a feature of the case which may need to be considered– In Trade Secret Law e.g.

• Security Measures Adopted• Disclosures Subject to Restrictions• Competitive Advantage Gained

Dimensions

• Are associated with– Preconditions– A range– Facts which determine the position

within the range– A direction

Security Measures Adopted• Precondition

– The plaintiff adopted some security measures

• Range– From Minimal measures through some

physical measures to nondisclosure agreements

• Facts– List of security measures adopted

• Direction– Stronger measures favour the plaintiff

Disclosures Subject to Restriction• Precondition

– Some disclosures were restricted

• Range– 0-100% of disclosures restricted

• Facts– Percentage of disclosures restricted

• Direction– Plaintiff favoured by more restricted

disclosures

Competitive Advantage Gained• Precondition

– Defendant saved development cost

• Range– $10,000 - $10,000,000

• Facts– Plaintiff development time and cost– Defendant development time and cost

• Direction– Greater savings favour plaintiff

HYPO Trade Secret Example

π = plaintiff∆ = defendant

CASE16 Yokana (∆)

F7 Brought-Tools (π)

F10 Secrets-Disclosed-Outsiders (∆)

F16 Info-Reverse-Engineerable (∆)

CASE30 American Precision (π)

F7 Brought-Tools (π)

F16 Info-Reverse-Engineerable (∆)

F21 Knew-Info-Confidential (π)

CASE Mason (?)

F1 Disclosure-in-Negotiations (∆)

F6 Security-Measures (π)

F15 Unique-Product (π)

F16 Info-Reverse-Engineerable (∆)

F21 Knew-Info-Confidential (π)

Mason (?) AmericanPrecision (π)

F21 (π)

F6 (π)

F15 (π)

Yokana (∆)

F16 (∆)

CFS

F9 (π)F10 (∆)

F7 (π)

F18 (π)F19 (∆)

F1 (∆)

Comparing Cases

• On the basis of similarities between past cases and the current fact situation, HYPO forms a case lattice

Case Lattice

Typically

• The first level will contain both plaintiff and defendant cases

• These are available to be cited– KFC, American Precision or Digital

Development for plaintiff– Speciner, Carver or Speedry for defendant

• If no case is available at the first level, we would need to descend a level until we found a case supporting our side– If F1 absent, Midland Ross or Yokana for

defendant

First Ply (for Plaintiff)

• Where disclosure in negotiations, security measures, knew information confidential and unique product, plaintiff should win. Digital Development

• Note that pro-defendant factors are included here

Distinguishing

• Either additional pro-defendant factor in current case

• Or additional pro-plaintiff factor in cited case

• Thus we may distinguish Mason from Digital Development since the product was reverse engineerable in Mason but not Digital Development.

• Note that Unique Product does not distinguish Mason from KFC – it makes Mason better

Counter Example

• A case at the same level of the case lattice held for the other side

• E.g. Carver is CE to Digital Development

• Better a case with all the shared factors and more (“trumping CE”)

• E.g. American Precision if Midland Ross cited for the defendant

Third Ply - Rebuttal

• Distinguishes the counter examples

• E.g. Carver is distinguishable because security measures, knew information confidential and unique product in Mason, but not Carver

Argument, not a Decision

• Except for the trumping, more on point, counter example, we may choose which side should win

• We may reject the distinctions as unimportant

• We may follow the cited case or the counter example

CATO

• Also in US Trade Secrets Law• Also uses 3 ply argument• But• Uses factors not dimensions• Organises factors into a hierarchy,

allowing additional argument moves• Some additional rebutting moves

Factors

• No degree – factors either apply or do not apply

• The presence of a factor always favours either the plaintiff or the defendant– Security measures – plaintiff– No security measures – defendant– Outsider disclosures restricted – plaintiff– Competitive advantage - plaintiff

Factor Hierarchy

Info Trade Secret -p

Efforts to maintain Secrecy -p

Info valuable -p

SecurityMeasures p

No SecurityMeasures - d

Waiver ofConfidentiality - d

CompetitiveAdvantage -p

Emphasising and Downplaying Distinctions• Precedent: No security measures• Case 1: Waiver of Confidentiality• Case 2: Security Measures• Case 1 and Case 2 can both be distinguished

because no security measures is absent• Case 1 can downplay the distinction because there

is an alternative argument against efforts to maintain secrecy

• Case 2 can emphasise the distinction, because there is now no argument against efforts to maintain secrecy

Confidentiality

Argument Moves in CATO

·Analogising a case to a past case with a favourable outcome·Distinguishing a case with an unfavourable outcome;.·Downplaying the significance of a decision; ·Emphasising the significance of a distinction; ·Citing a favourable case to emphasise strengths; ·Citing a favourable case to argue that weaknesses are not fatal; ·Citing a more on point counterexample to a case cited by an opponent; ·Citing an as on point counter example to a case cited by an opponent.

Arguments Based on Cases• Cases are compared according to

common features– Features tend to be at a level of

abstraction above facts (issues)• Arguments mainly based of

differences between cases• And the significance of these

differences

Arguments Based on Rules

• In Law, rules often conflict– The person named in a will should inherit– A murderer should not inherit

• Conflicting rules provide an argument for and an argument against

• How do we resolve such arguments?

Types of Conflict

• Rules may conflict in several ways:– Contradictory conclusions

• If P then Q, If R then not Q

– Denial of premises• If P then Q, if R then not P

– Rule inapplicable• If P then Q, if R then not (if P then Q)

Resolution Through General Principles• Prefer most specific rule

– Statutes are often written as general rule and exceptions

• Prefer most recent rule– A recent case is preferred to an old one

• Prefer most authoritative rule– Supreme court better than lower courts

• These principles can conflict• No general ordering seems possible

Weighing Reasons

• We can see the antecedents as reasons for the conclusion

• Some reasons may be stronger than others

• We should prefer the stronger reasons to the weaker reasons

Explicit Rule Priorities

• We can simply state which of a pair of conflicting rules has priority over the other

• Note: such priorities may themselves be the subject of debate

Dialogical Justification

P Q

R ¬ Q

S ¬ R

T ¬ (S ¬ R)

U ¬ T

Proponent wins

Proponent wins

Proponent wins

Opponent wins

Opponent wins

Reconstruction of HYPOPrakken and Sartor • Cases are represented as 3

implications: (i) if pro-plaintiff factors then plaintiff (ii) if pro-defendant factors then defendant (iii) (i) < (ii) if defendant won, else (ii) < (i)– May be broadened by omitting factors– May be distinguished– Are deployed in a dialogue game

HYPO Trade Secret Example

π = plaintiff∆ = defendant

CASE16 Yokana (∆)

F7 Brought-Tools (π)

F10 Secrets-Disclosed-Outsiders (∆)

F16 Info-Reverse-Engineerable (∆)

CASE30 American Precision (π)

F7 Brought-Tools (π)

F16 Info-Reverse-Engineerable (∆)

F21 Knew-Info-Confidential (π)

CASE Mason (?)

F1 Disclosure-in-Negotiations (∆)

F6 Security-Measures (π)

F15 Unique-Product (π)

F16 Info-Reverse-Engineerable (∆)

F21 Knew-Info-Confidential (π)

Mason (?) AmericanPrecision (π)

F21 (π)

F6 (π)

F15 (π)

Yokana (∆)

F16 (∆)

CFS

F9 (π)F10 (∆)

F7 (π)

F18 (π)F19 (∆)

F1 (∆)

Example

• Yokana gives 3 rules– R1: F7 P– R2: F16 & F10 D– R3: R2 > R1

• American Precision gives 3 rules– R4: F7 & F21 P– R5: F16 D– R6: R4 > R5

Rationales – Loui and Norman• This records the progress of the dispute

which may be important.– Consider a precedent which has F1 and F2

favouring plaintiff and F3 favouring the defendant and was won by plaintiff

– Given a new case with only F1 it is unclear that the plaintiff should win

– But suppose F2 was used to defeat F3: Now it can be seen that F1 can stand alone

Compare

R4: F1 P

R2: F3 D

R5: F2 not (F3 D)

R6: R5 > R2

Now we can confidently apply R4

R1: F1 & F2 PR2: F3 DR3: R1 > R2

Not clear that

R4: F1 P

We need a record of the dispute to decide which description is the right one

Argumentation Frameworks• We can often view a legal dispute

as a set of conflicting arguments• P.M. Dung has developed an

elegant way of looking at and reasoning about sets of conflicting arguments

Dung’s Argument Framework• Introduced in AIJ 1995• Arguments at their most abstract

– Only: which other arguments does an argument attack?

• Attacks always succeed– We cannot accept an argument and

its attacker

Definitions

An argumentation framework is a pair AF = <AR, attacks>

– Where AR is a set of arguments and attacks is a binary relation on AR, i.e. attacks AR AR.

An argument A AR is acceptable with respect to set of arguments S if:

(x)((xAR) &(attacks(x,A)) (y)(y S) & attacks(y,x).

A set S of arguments is conflict-free if (x) (y)( xS) & (y S) & attacks(x,y).

A conflict-free set of arguments S is admissible if (x)((xS) acceptable(x,S).

Preferred Extension

• A set of arguments S in an argumentation framework AF is a preferred extension if it is a maximal (with respect to set inclusion) admissible set of AR.

• Preferred Extensions are interesting because they represent maximal coherent positions, able to defend themselves against all attackers

• BUT: there may be multiple preferred extensions, and no way to choose between them

Odd Cycle

a

bc

We can’t acceptAnything here

Akin to Paradoxes

Preferred Extensionis the empty set

Even Cycle

a

b

c

d

We can acceptEither a and cOr b and d

Akin toDilemmas

TwoPreferred Extensions{a,c} and {b,d}

In general

• Every AF has a preferred extension– Which may be the empty set

• AFs do not have a unique preferred extension– Even cycles give rise to choices

• An argument may be in every preferred extension (sceptically acceptable)

• An argument may be in some preferred extensions (credulously acceptable)

• An argument may be in no preferred extension (indefensible)

Decision Problems and Complexity

ADM(H,S) Is S admissible P

PREF-EXT(H,S) Is S preferred Co-NP comp.

STAB-EXT(H,S) Is S stable P

HAS-STAB(H) Does H have a stable ext.

NP complete

CA(H,x) Is x accepted credulously

NP complete

SA(H,x) Is x accepted sceptically

2 complete

COHERENT(H) Is H coherent 2 complete

Proofs of these results can be found in a series ofpapers by Paul Dunne and myself.

Example Set of Cases

• Pierson: Plaintiff is hunting a fox on open land. Defendant kills the fox.

• Keeble: Plaintiff is a professional hunter. Lures ducks to his pond. Defendant scares the ducks away

• Young: Plaintiff is a professional fisherman. Spreads his nets. Defendant gets inside the nets and catches the fish.

Ghen vs Rich:

• Ghen harpooned a whale, lost it. Ellis found it, sold it to Rich, who processed it.

• Found for Ghen.– “the iron holds the whale”

• Whaling is governed by conventions which the court respects

Conti vs ASPCA

• Chester, a talking parrot used by ASPCA for educational purposes, escaped. Conti found it and kept it as a pet. ASPCA reclaimed it.

• Found for ASPCA• Chester was domesticated, and so

ferae nauturae did not apply

Burros Cases

• New Mexico vs Morton• Kleepe vs New Mexico

– Unbranded burros straying from state lands

– Showed that:• Branding established possession• Presence on land had to be more than

accidental straying

Representing Keeble

• A: Pursuer had a right to the animal• B: Pursuer not in possession• C: Owns the land (so owns the

animals)• D: Wild animals not confined• E: Efforts made to secure animals• F: Pursuer has right to pursue

livelihood unmolested

Keeble as AF

BF

A

C

D

E

Preferred extension is {A,C,E,F}

Two waysto win

Pierson as AF

• {A, B,E} as in Keeble• I, M: Pursuit is not enough• J: Hypothetical: the animal was taken• K: Hypothetical: animal was wounded• L: Hypothetical Certain control is enough• O: Reasonable prospect of capture• P : Reasonable prospect too uncertain• R: Reasonable prospect encourages desirable

activity• G: Not relevant: Interferer was trespassing• H: Not relevant: Pursuer was trespassing• Q: The land was open

Situationswhich would establish right

values

Excludessome pastcases

Pierson as AF

B

A

E

Preferred extensions are {B,I,M,P,Q} and {A,E,O,Q,R}

M (P)

L

KJ

IQ

H

G

O (R)

Two cycle

Young as AF

• Arguments in Pierson are all relevant– but now L is applicable and P is not

• F from Keeble is present• S: Defendant was in competition

with the plaintiff• T: The competition was unfair• U: Not for the court to rule on what

is unfair competition.

Young as AF(Trespass omitted)

B

A

E

Preferred extension is {B,L,S,U} Argument U breaks the 4 cycles

M (P)

L

KJ

I

O (R)F

TS

U

Ghen Versus Rich

• New Argument V: – The iron holds the whale is a

convention throughout the whaling industry

• Attacks U: establishes what is unfair competition is whaling

• Attacks B: Establishes what counts as possession in whaling

Ghen as AF(Trespass omitted)

B

A

E

Preferred extension is {A,E,F,K,T,V}

M (P)

L

KJ

I

O (R)F

TS

U

V

Conti and Burros Cases• Add some special cases

– W: Domestication sufficient– X: Unbranded animals go to the

owner of the land– Y: Branding sufficient– Z: Animals must live on the land:

straying on to someone’s land does not affect title

Effect on AF

BF

A

C

D

E

W

X

Y

Z

Argumentation Framework for Animals Cases

A

S

F CB

G H D

E I

J K L

M[P]

O[R]

Q

TU V

W

X

Y

Z

N

Analysis takenfromBench-Capon 2002Jurix 2002

Some cycles hereA

S

F CB

G H D

E I

J K L

M[P]

O[R]

Q

TU V

W

X

Y

Z

N

Argument Schemes

• In Dung’s framework anything can count as an argument, and anything can count as an attack

• Argument schemes suggest a form that arguments should have

• Argument schemes prescribe what will count as an attack

Modus Ponens as Argument Scheme• Form:

– If Antecedent then Consequent and– Antecedent: therefore– Consequent

• Attacks:– Consequent is not the case– Antecedent is not true– Consequent does not follow from

Antecedent

Compare: The three kinds of conflict for rule systems

Witness Testimony

• Form:– Witness 1 says that A and– Witness 1 is an a position to have observed

A; therefore– A

• Attacks:– Witness 2 says A is not the case– Witness 1 not in position to have observed A– Witness 1 is mistaken– Witness 1 is lying

Toulmin Argument Schema• One general Argument Schema

that has been much used in AI and Law derives from Stephen Toulmin.

• Introduces– Modal Qualification– Backing– Rebuttal

Toulmin’s Argument Scheme

Data Claim

Warrant

Backing

Rebuttal

Modal

Toulmin Example

John is82

John isold

Over 80Is old

DemographicData

John is aTortoise

Normally

Useful

• To identify different roles for premises:– Basic data– General Rules– Justification– Degree of support– Exceptions

• Used – in explanation, – to organise the presentation of an argument– as the basis of dialogue games

Systems Using Toulmin

• Toulmin’s schema (sometimes adapted) has been used by– Marshall (1989) – organisation of legal

argument– Lutomski (1989) – presentation of expert

testimony– Stoors (1991) – organisation of policy argument– Bench-Capon (1985) – explanation– Bench-Capon (1998) – dialogue game– Zeleznikow and Stranieri - explanation

Argument Schemes

• Potentially a very fruitful area of study– Especially particular schema (such as

witness testimony)

• As yet rather under researched

Disagreement and Persuasion• In the remainder of the talk I will look at

some of my current work• The starting point is why do people

disagree? And when they do, how do they persuade one another?

• I will look at – an extension to Dung’s framework, – an argument scheme for persuasive

argument

Perelman says:

• If men oppose each other concerning a decision to be taken, it is not because they commit some error of logic or calculation. They discuss apropos the applicable rule, the ends to be considered, the meaning to be given to values, the interpretation and characterisation of facts.

Taxation Debate

Raise taxes topromote equality

Lower taxes topromote enterprise

Brown sees force in both arguments – but what Brown does depends on (reveals?) whether Brown prefers equality or enterprise at a given time

To allow for rationaldisagreement• We must distinguish attack from

defeat• We can accept arguments which

are attacked, AND their attackers, provided the attacks fail

• Dung’s framework is too abstract to allow such talk – we need to be able to discuss value as well as conflict

Value-based Argumentation FrameworkA value-based argumentation framework (VAF) is a 5-tuple:VAF = <AR, attacks,V,val, P>

As for Standard AF Set of

values FunctionMapping

Elements of ARTo Elements of V

Set of PossibleAudiences

Audiences

• Following Perelman we want to use the notion of an audience

• Audiences will have different preferences between values

• We individuate audiences by their ordering on values

• There are as many audiences as there are value orderings

Audience Specific VAF

An audience specific VAF (AVAF) is a 5-tuple:AVAF = <AR, attacks,V,val, Valprefa>

As for Standard AF Set of

valuesFunctionMapping

Elements of ARTo Elements of V

Valprefa is the value preferences of audience a

Defeat in AVAF

An argument A AF defeatsa an argument B AF for audience a if and only if both

attacks(A,B) and not valprefa(val(B),val(A)).

Note: An argument is defeated by an attacker with the same value

Defeat is always relative to an audience If there is only one value in V we have a

standard argumentation framework

Definitions for AVAF

• An argument A AR is acceptable to audience a with respect to set of arguments S, if:

(x)((xAR & defeatsa(x,A)) (y)((y S) & defeatsa(y,x))).

• A set S of arguments is conflict-free for audience a if

(x) (y)(( xS & y S)

(attacks(x,y) valpref(val(y),val(x) valprefa))).

• A conflict-free set of arguments S is admissible for audience a if

(x)(xS acceptablea(x,S)).

Preferred Extension of an AVAF• A set of arguments S in an value-

based argumentation framework is a preferred extension for audience a if it is a maximal (with respect to set inclusion) admissible for audience a set of AR.

Objective Acceptance

• An argument is objectively acceptable if it is in the preferred extension for every audience

• An argument if subjectively acceptable if it is in the preferred extension for some audience

• An argument is indefensible if it is no preferred extension of any audience

Two Valued Three Cycle

a

bc

If blue > red, preferredextension is {a,b}

If red > blue, preferred extension is {b,c}

Note: b is in the preferred extension whateverthe value order

Two Valued Four CycleConnected Colours

a

b

c

d

If blue > red, preferred

extension is {a,c}

If red > blue, preferred

extension is {a,c}

Preferred extension is unique, AND independent

of value order

Some Technical Results on VAFS• If there are no cycles with a single value,

then there is a unique preferred extension– Efficient algorithm to find the preferred

extension

• Cycles can give rise to objective acceptance– Odd cycles with more than one value– Some configurations of even cycles

• Possibilities to prune lines of argument with repeating values

• Heuristics to select attacks

Note: what causes difficulties withoutvalues is a source ofObjective Acceptancewith them

Recall that there were Cycles in our Animals Cases

A

S

F CB

G H D

E I

J K L

M[P]

O[R]

Q

TU V

W

X

Y

Z

N

How does

considering

values help?

PiersonA

S

F CB

G H D

E I

J K L

M[P]

O[R]

Q

TU V

W

X

Y

Z

N

A: Pierson Had A RightTo the Animal

B: Pierson hadNo possession

E: Pierson was infull pursuit

I: Pursuit not Enough

O: Seizure notnecessary (wewant to encourage sociallyuseful activity)

M: we must insist onpossession for clear law

M and Oform a2-cycle:resolvedby Value

So A isSubjectivelyacceptable

Blue: Need clear law

Orange: Encourage useful activity

Keeble IA

S

F CB

G H D

E I

J K L

M[P]

O[R]

Q

TU V

W

X

Y

Z

N

Green: Protect property rights C: owns the land sopossesses the animals

D: Animals not confined

X: Unbrandedanimals belongto landowner.Not needed:Useless if bluegreater than greenUnnecessary else

Keeble IIA

S

F CB

G H D

E I

J K L

M[P]

O[R]

Q

TU V

W

X

Y

Z

N

Red: Promote economic activity F: Keeble was pursuinghis livelihood

YoungA

S

F CB

G H D

E I

J K L

M[P]

O[R]

Q

TU V

W

X

Y

Z

N

Purple: Restrictive view of role of courtsS: Defendant in CompetitionT: Competition wasUnfair

U: Not for theCourt to ruleon what is unfaircompetition

U breaksthe evencycleBTSEB

Without UB is defeatedby itsposition in the evencycle

Note: 4 cycleBTSEBTE objectivelyacceptable

Schema For Persuasive Argument• To consider individual arguments we

need to look inside the nodes to see what an argument looks like and how it can be attacked

• We have developed a general schema for persuasive argument in practical reasoning

• This schema can be applied to reasoning with legal cases

Form of Justification of An Action• It was right to do action A• In those circumstances R• To bring about these new

circumstances S• Which realised this goal G• Which promoted this value V

Schematically

R S G V A

Effect of anaction dependson the situation

The goal is the subsetof S that we wanted tobring about, the reason wedid A

The value is the purposefor which we wanted torealise the goal

We refer to a justification of this form as a position

Attacking A Position

• A position can be attacked in a variety of ways:– Denial of an element

• E.g. A will not produce S from R

– Contradiction of an element• E.g. G promotes W not V

– Alternatives• E.g. B will also produce S from R

– Side Effects• E.g. G demotes W as well as promoting V

We have identified 15 possible attacks – some with variants

Law As Practical Reasoning• We need to choose one of two actions

– Decide for the plaintiff– Decide for the defendant

• Circumstances are the case facts + a record of the decision

• Goals are subsets of the facts + a record of the decisions

• Values are behaviours to encourage and discourage

Note: we see the judgement as a choice of actionNot the identification of a property of the case

To Illustrate

F1 F2 F3 … Fn Pwins Dwins

F1 F2 F3 … Fn Pwins Dwins

1 0 0 1 0 0

1 0 0 1 1 0

Undecided Case

Deciding for P produces

Decided Case

F1 F2 F3 … Fn Pwins Dwins

0 1 1 0

Goal

Encourages potential plaintiffs to realise Fn and not F2

selection fromdecided case

In this Representation

• 7 of the 15 attacks are not possible• 2 pairs of attacks are identical

– Only two actions– Actions always achieve the same result– Goals straightforward consequences of

decided case– Distinct actions realise distinct goals

• One attack has two distinct variants• Thus we can look for seven distinct

forms of attack

Attacks and Argument Moves

• Two challenge the representation– Factors used to represent a case– Values associated with factors

• Four are variants of distinguishing a case

• One seems to be in neither HYPO nor CATO: disagreement as to which value is promoted in this context

Four Types of Distinction

• Precedent stronger: can be downplayed

• Current case weaker: can be downplayed

• Precedent stronger: can be emphasised

• Current case weaker: can be emphasised

A single movein HYPO

Two moves inCATO

Counter Examples

• A different position based on another precedent justifying the other action– Can be attacked in the same ways as the

original position

• A rebuttal of the choice of goal– Same factors as G, but different outcome– Can only be met by reformulating the goal– Like a trumping counter example in HYPO

Summary

• We have seen– How arguments differ from proof– Two systems for case based argument in AI

and Law– Arguments based on conflicting rules– Reasoning about sets of arguments– Argument schemes– How notions of value and purpose can be

used

top related