<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Explaining Legal Decisions Using IRAC</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Explaining Legal Decisions Using IRAC</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Deoartment of Computer Science, University of Liverpool</institution>
          ,
          <addr-line>Liverpool</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <fpage>74</fpage>
      <lpage>83</lpage>
      <abstract>
        <p>We suggest that the Issue, Rule, Application, Conclusion (IRAC) method can be used to produce a natural explanation of legal case outcomes. We show how a current methodology for representing knowledge of legal cases can be used to provide such explanations. Explanations given by AI and Law systems are often rather stilted and formulaic. In order to try to produce more natural explanations of legal cases we turn for inspiration to how lawyers are taught to discuss cases. IRAC stands for Issue, Rule, Application and Conclusion and is a methodology for legal analysis widely taught in US law schools1 as a way of answering hypothetical questions posed during teaching by the Socratic method and in exams.</p>
      </abstract>
      <kwd-group>
        <kwd>Reasoning with cases</kwd>
        <kwd>Explanation</kwd>
        <kwd>Legal Reasoning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        1 For example, City University of New York
(https://www.law.cuny.edu/legalwriting/students/irac-crracc/irac-crracc-1/) and Elazabeth Haub School of Law at
Pace University
(https://academicsupport.blogs.pace.edu/2012/10/26/the-case-ofthe-missing-a-in-law-school-you-cant-get-an-a-without-an-a/).
2 My examples are from the US Trade Secrets domain widely used in AI and Law [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
3 Legal information such as this is for illustration only, and may not be an accurate
re ection of the law.
      </p>
      <p>
        Sometimes additional elements are included, such as Rule Proof. Rule Proof
is a justi cation of the rule, citing the statute or case on which it is based.
Thus in our example, one could cite MBL (USA) Corp. v. Diekman which was
found for the plainti on the grounds that although a general employer-employee
con dentiality agreement had been signed, \the court found that defendant and
other employees were not told what, if anything, plainti considered con dential"
(President Justice Downing). AI systems addressing the question of reasoning
with legal cases have always attempted to explain their reasoning. Indeed the
ability to provide explanations is considered (e.g. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]) to be a major advantage
of such systems over systems based on machine learning algorithms such as [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>The key point about IRAC is that it is speci cally tailored to the case at
hand: it indicates what is important and di erent about the particular case under
discussion, and uses the speci c facts of the case to apply the general rule. This
is di erent from the standard forms of explanation of case outcomes found in AI
and Law, which go through every potential issue in the domain, obscuring the
key point, and bottom out in generally applicable factors rather than speci c
facts. We suggest that IRAC is a more natural form of explanatory argument,
just as arguments are more natural than watertight logical proofs since they can
use enthymemes to suppress trivial and generally known premises and focus on
the real point. In this paper we will consider how current representations can be
adapted to provide IRAC style explanations.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background: the US Trade Secrets Domain</title>
      <p>
        US Trade Secrets has been widely used as a domain in AI and Law since its
introduction in the HYPO system [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. We will use as our primary example
the US Trade Secrets case of The Boeing Company v. Sierracin Corporation, as
modelled for the CATO system [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and used in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        The top level of the US Trade Secrets domain is shown in Figure 1, taken
from [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. These are called issues in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Below the issues are a number of
factors, stereotypical patterns of fact that are legally signi cant and favour one
or other side of the argument. In CATO [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and many subsequent approaches,
including IBP [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and ANGELIC [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], issues and factors are organised in a
hierarchy, descending through abstract factors recognising what Aleven terms
\intermediate concerns" until the base level factors, the legal facts of the case,
are reached. Figure 2 shows the branch of the hierarchy relating to whether the
information is a Trade Secret, the left hand branch of Figure 1. CATO's issues
are a way of structuring the case, but are rather more generic than the issues
which form the `I' of IRAC, which are supposed to indicate what is particular to
the case under consideration. Below we will refer to IRAC issues as case-issues.
      </p>
      <p>We will use a slightly simpli ed version of Boeing 4, with six factors, ve
pro-plainti and one pro-defendant. Boeing was found for the plainti .</p>
      <p>The factors, the side favoured and their associated CATO issues are:
{ F4 NonDisclosureAgreement (plainti ); Maintain-Secrecy, Con
dentialRelationship. This also appears in the branch not shown in Fig 2.
{ F6 SecurityMeasures (plainti ): Maintain-Secrecy
{ F10 SecretsDisclosedOutsiders (defendant): Maintain-Secrecy
{ F12 OutsiderDisclosuresRestricted (plainti ): Maintain-Secrecy
{ F14 RestrictedMaterialsUsed (plainti ): Improper-Means (not in Fig 2)
{ F21 KnewInfoCon dential (plainti ): Con dential-Relationship
4 The simpli cation is that we do not use F1, Disclosure-in Negotiations, since we
consider it subsumed by F10, since the defendant is an outsider.</p>
      <p>
        The F numbers are the identi ers given in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], shown in Figure 2, and used
in subsequent discussions such as [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and the Tables below.
      </p>
      <p>Here it should be noted that since improper (although not criminal) means
were used to obtain the information, by improperly exploiting restricted
materials, there is no question but that the information should be regarded as
misappropriated. So even though there is some support for the other arm,
CondentialRelationship, it is not needed: ImproperMeans alone is enough for
misappropriation So the issue is whether information disclosed to outsiders can be
considered a trade secret. Here the answer is that it can be, since the disclosures
were subject to restrictions, showing that the information was considered secret
by the plainti , and adequate e orts had been taken to maintain the secrecy.
The value of the information is not disputed, and so can be assumed by default.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Standard explanation in AI and Law</title>
      <p>
        One approach to building an AI and Law system is to formalise the relevant legal
knowledge and to elicit the facts of the particular case by querying the user. This
is the approach of the classic [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], which formalised the British Nationality Act.
The explanation was the standard how? typical of expert systems of the time.
This approach remains relevant today, as shown by the ANGELIC methodology
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], which has recently been used to build a elded system [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] the Boeing
case was used as an example. The proof trace of the Prolog program was
postprocessed to give the following explanation (note that the ANGELIC program
uses defaults to resolve issues for which there are no base level factors):
We nd for plainti . The information was a trade secret: e orts were
taken to maintain secrecy, since disclosures to outsiders were restricted
and the defendant entered into a non-disclosure agreement and other
security measures were applied. The information was unique. It is accepted
that the information was valuable and it is accepted that the
information was neither known nor available. A trade secret was
misappropriated: there was a con dential relationship since the defendant entered
into a non-disclosure agreement and it is accepted that the information
was used. Moreover improper means were used since the defendant used
restricted materials.
      </p>
      <p>
        This follows the usual pattern of a rule based how? explanation: each
component of the and/or tree of Figure 1 is considered, and the result justi ed by
citing lower level rules until the base level factors (given or accepted by default)
are reached. The explanation has a conclusion and a rule (here implicit, although
older programs such as [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] cite the rule explicitly). What is missing here is the
focus provided by the case-issue: the explanation covers all the elements without
any e ort to identify the important point, or to say why the factors are present.
      </p>
      <p>
        Case based reasoning in AI and Law also typically considers the case as a
whole. What would happen in HYPO is that the case base would be searched
until the closest match in terms of shared factors was found. A possible match,
taken from the limited set of publicly available cases listed in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], is Trandes
Corp. v. Guy F. Atkinson Co. Trandes had just three factors, all shared with
Boeing : AgreedNotToDisclose, SecurityMeasures and SecretsDisclosedOutsiders
(again we diregard F1 as subsumed by F10). It was found for the plainti . A case
based explanation (based on the explanation of a di erent case in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]) would
cite the factors in common:
      </p>
      <p>Where the plainti had taken security measures, the defendant had
agreed not to disclose the information and information had been
disclosed to outsiders, Plainti should win claim. Cite Trandes.</p>
      <p>
        The defendant might now reply: In Trades the disclosures were of a lesser extent
than Boeing. This distinction cannot be made with Boolean factors as used in
CATO, IBP and [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], but is available in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], where factors can have magnitudes.
      </p>
      <p>
        For rebuttal the plainti can say that in Boeing the disclosures to outsiders
were restricted: this is not so in Trandes, which makes Boeing signi cantly
stronger than Trandes. This style of factor based explanation remains relevant,
and is currently advocated as a means of explaining systems based on Machine
Learning techniques [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]
      </p>
      <p>It might now be asked why Trandes was found in favour of the plainti
when the information had been disclosed to outsiders without restriction. From
a reading of the decision it can be seen that these disclosures were held to be
too limited to be of signi cance: \Although Trandes did give WMATA a single
demonstration disk in contemplation of a licensing agreement, it did so only in
con dence. Such limited disclosure does not destroy secrecy" (opinion delivered
by Williams, Circuit Judge). This may cast doubt on whether this factor should
have been ascribed to Trandes at all. The issue in Trandes was really whether
the disclosures had been su cient to compromise the secret, whereas in Boeing
they clearly were. Because the case based explanation uses the whole case it may
rely on similarities which were not relevant to the crucial issue. Again, what is
missing is the focus the case-issue provides.</p>
      <p>A key point about these explanations is that they consider the case as a whole.
Thus the rule based explanation goes through all the CATO issues without
distinguishing on which of them the case turns. The case based explanation
considers all factors in common with the precedent. Neither focus on a speci c
issue, particular to the case, which is what we want for our IRAC case-issue.</p>
      <p>A second point is that we can see two types of case-issue. In Boeing we
have two factors favouring di erent sides in the same branch of the tree:
SecretsDisclosedOutsiders and OutsiderDisclosuresRestricted, bringing into
question whether or not their parent factor, E
ortsMadeToMaintainSecrecyVis-aVisOutsiders, is present. If it is not, then, as can be seen in Figure 2, we can
decide that the e orts to maintain secrecy were not adequate and so the
information cannot be regarded as a trade secret. We term this a con ict-issue. In
Trandes, in contrast, the issue is whether or not we consider that information
was disclosed to outsiders to a su cient extent: that is whether we should
consider this factor to be meaningfully present in the case. We will term this an
ascription-issue.</p>
    </sec>
    <sec id="sec-4">
      <title>Issues in AI and Law</title>
      <p>
        As mentioned above, CATO [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] used issue to describe the top levels of its abstract
factor hierarchy. This practice was also used in Issue Based Prediction (IBP) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ],
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and the ANGELIC methodology [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. CATO was concerned with helping
law students to distinguish a case, and so does not give an explanation of the
outcome. It does, however, use issues to organise its advice. IBP, however, was
directed towards predicting an outcome. It rst identi ed the relevant issues,
those with at least one factor present in the case in its sub-tree, and where there
were opposing factors relevant to an issue, used matching precedents to choose
a resolution. The explanation provided, like that from ANGELIC given above,
proceeds on an issue by issue basis, rather than identifying and focussing on the
crucial case-issue, but at least uncontested issues are ignored.
      </p>
      <p>In the remainder of the paper I will discuss how an IRAC explanation can
be produced from a system constructed using the ANGELIC methodology.
5</p>
    </sec>
    <sec id="sec-5">
      <title>CATO in ANGELIC</title>
      <p>
        The ANGELIC methodology produces an ADF corresponding to the factor
hierarchy of [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], part of which is shown in Fig 2. Each node of the ADF can have
positive or negative children. The ADF for the issues are shown in Table 1. The
ADF for the abstract factors are shown in Table 2. Factors present or inferred
in Boeing are in bold, those in Trandes in italics. Base Level factors are given
using CATO F numbers [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and Fig 2. The value and use of in the information
was not contested, and so no related factors were mentioned in either case.
CATO ID Name Positive Children Negative Children
F200 TradeSecretMisappropriation F201 , F203 F124
F203 InfoTradeSecret F102 , F104
F104 InfoValuable F8, F15 F105
F102 E ortstoMaintainSecrecy F6 , F122, F123 F19, F23, F27
F201 InfoMisappropriated F110, F112, F114
F112 InfoUsed F7, F8, F18 F17
F114 Con dentialRelationship F115, F121
F110 ImproperMeans F111 F120
Table 1. IBP Logical Model as an ADF taken from [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Factors present in
Boeing are in bold. Factors in Trandes are in italics
6
      </p>
    </sec>
    <sec id="sec-6">
      <title>Modelling IRAC with ANGELIC</title>
      <p>
        As we saw above, issues can be of two types: con ict based and ascription based.
We will consider each in turn.
CATO ID Name Positive Children Negative Children
F105 InfoKnownOrAvailable F106, F108
F106 InfoKnown F20, F27 F15, F123
F108 InfoAvailableElsewhere F16, F24
F111 QuestionableMeans F2, F14, F22, F26 F1, F17, F25
F115 NoticeOfCon dentiality F4, F13, F14, F21 F23
F120 LegitimatelyObtainable F105 F111
F121 Con dentialityAgreement F4 F5, F23
F122 MaintainSecrecyDefendant F4 F1
F123 MaintainSecrecyOutsiders F12 F10
F124 DefendantOwnershipRights F3
Table 2. CATO factors as ADF taken from [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Factors present in Boeing
are in bold. Factors in Trandes are in italics
6.1
      </p>
      <sec id="sec-6-1">
        <title>Con ict Issues</title>
        <p>Examination of Table 1 shows that there are no case-issues at the CATO issue
level, because there are no negative children. Two leaf issues in Fig 1 are relevant,
E ortstoMaintainSecrecy and InfoMisappropriated (Con dentialRelationship is
only relevant when InfoUsed is also relevant and InfoValuabe is uncontested),
but since both have only positive factors, the case is clearly decidable for the
plainti at this level. So, to nd the case-issue we must delve deeper down the
tree, and examine Table 2.</p>
        <p>In Table 2 we see that there are is one factor with con icting base level factors,
MaintainSecrecyOutsiders. This con ict will thus be our case-issue.
MaintainSecrecyOutsiders, if resolved di erently, could have destroyed the plainti 's claim
by removing E ortstoMaintainSecrecy, and hence showing the information not
to be regarded as a Trade Secret. This then is the case-issue on which the case
turns. Since any case-issue requires a factor with a positive child and a negative
child, we can now state a case-issue using a template of the form Can the plainti
be considered to Parent when Negative Child given that Positive Child? :
{ Can the plainti be considered to MaintainSecrecyOutsiders when
SecretsDisclosedOutsiders given that OutsiderDisclosuresRestricted?</p>
        <p>
          We now examine the acceptance conditions for the node F123 at which the
con ict occurs. We take the acceptance conditions from [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]:
ACCEPT IF OutsiderDisclosuresRestricted
REJECT IF SecretsDisclosedOutsiders
ACCEPT
        </p>
        <p>The default ACCEPT indicates that the burden of proof for this factor is on
the defendant, and the order of the conditions indicate the priority of the two
rules. The acceptance conditions can be annotated with the case or cases which
led to their inclusion. These can then be used as the Rule Proof, if that element
is required. The rule of the case is thus
{ MaintainSecrecyOutsiders if OutsiderDisclosuresRestricted</p>
        <p>The application is that OutsiderDisclosuresRestricted is present in the case,
and so the antecedent is satis ed. This could be elaborated using speci c facts
taken from the decision \Boeing did not lose its secrets through con dential
disclosure of drawings to Libbey. The secrets were preserved by rst Libbey's and
then Sierracin's promise to keep the information con dential." (opinion delivered
by Justice Dore). We suggest an extension of the ANGELIC methodology so that
that when a case is analysed into factors, the extract from the opinion on which
the ascription was based is recorded, so that it can be used in the explanation.</p>
        <p>The conclusion is that Boeing did MaintainSecrecyOutsiders, and hence made
adequate e orts to maintain secrecy, and that they had a Trade Secret which
was misappropriated through the use of restricted materials. We now have all
the elements of IRAC, which can be used as a natural explanation, focussing on
what is important in the particular case.</p>
        <p>In Boeing the issue is whether the plainti can be considered to have
maintained secrecy with respect to outsiders when the plainti disclosed
the information to outsiders when these outsider disclosures were
restricted? We apply the rule: if outsider disclosures are restricted then
secrecy with respect to outsiders is maintained. In Boeing, the secrets
were preserved by rst Libbey's and then Sierracin's promise to keep
the information con dential. Thus secrecy with respect to outsiders was
maintained, and the information can be regarded as a trade secret.
6.2</p>
      </sec>
      <sec id="sec-6-2">
        <title>Ascription Based Issues</title>
        <p>
          We now consider Trandes. In Trandes there were no con dentially restrictions
on the disclosures to outsiders, and so it would seem a straightforward case in
which the information is not a trade secret because it was in the Public Domain.
This, however, is only the case if we insist that factors are Boolean. This is
true of CATO, but not of HYPO, which used dimensions indicating the extent
to which a particular feature favoured a party. Recently, the recognition that
factors are present to di ering extents is increasingly recognised (e.g. [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]). The
ANGELIC methodology has been extended to accommodate factors present to
di ering extents as reported in [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. In [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] this was applied to CATO, and one of
the factors treated as non-Boolean was SecretsDisclosedOutsiders. In Williams'
decision in Trandes we can nd the form of the alleged disclosure:
The advertisement described in general terms the capabilities of the
Tunnel System and o ered a demonstration disk for $100. The demonstration
disk did in fact contain an object-code version of the Tunnel System, but
was con gured to operate in demonstration mode only.
        </p>
        <p>Note that the users did not have open access to the source code constituting
the Trade Secret. So the disclosure would seem to be minimal: moreover the
advertisement attracted very few enquiries. Thus for Trandes, we may include
SecretsDisclosedOutsiders (as argued by the defendant), but the extent will be
small and so may fail to meet the threshold needed to defeat
MaintainSecrecyOutsiders. Thus the information can continue to be seen as a trade secret.</p>
        <p>The issue here is thus whether distribution of a demonstration disk containing
object level code con gured to operate in demonstration mode only means that
inadequate security measures were taken. The rule that was applied by Williams
was \limited disclosure does not destroy secrecy", with Space Aero v Darling
cited as the precedent. We now apply the rule by stating that the disclosure in
Trades was su ciently limited.</p>
        <p>Thus the ascription issue can be identi ed by looking for a non boolean
factor, in particular one below or close to the threshold at which it will in uence
the acceptability of its parent. In Trandes the factor SecurityMeasures also has
magnitude, but these were quite extensive, and so the presence of this factor is
not in dispute. The conclusion is that Trandes did MaintainSecrecyOutsiders,
and hence made adequate e orts to maintain secrecy, and that they had a Trade
Secret which was misappropriated through the use of information disclosed to
the defendant in a relation of con dence.</p>
        <p>
          In Trandes the application of the rule that can be extracted from the
representation is simply the claim that the disclosures were too limited to destroy
secrecy, backed up the quotation showing the nature of the disclosure. We may,
however, encounter rather more extensive discussion of whether the factor should
be applied or not. This may require true analogical reasoning, as discussed in
[
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Her example was a hypothetical based on Dillon v. Legg in which the issue
is whether a kindergarten teacher who witnessed an accident involving one of her
pupils can be considered su ciently analogous to a mother (the relationship in
Dillon) to receive damages for emotional distress. On the one hand both are in a
close caring relationship with the child, but on the other there is no blood
relationship: the precedent in question simply states that \how closely the plainti
was related to the victim" is what needs to be considered. Here we have a HYPO
style dimension and need to decide where to x the point at which it switches
from pro-plainti to pro-defendant [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. In [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] it was suggested that such
reasoning requires too much common sense knowledge of the world to be achievable in
current AI and Law systems. A rich ontology might be produced for past cases
and so used for teaching, but not one broad enough to cover arbitrary future
cases, as would be required for prediction.
        </p>
        <p>Thus, for ascription issues, we must be content with the limited notion of
application provided by thresholds. If a good discussion of application is, as the
second url in footnote 1 suggests, required for an A grade, we must perhaps be
content with a B minus.
7</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>
        In this paper we have proposed the IRAC method as a natural way of explaining
legal cases, which focusses on the central point on which the case turns. We
showed how this might be produced from a factor based representation such is
produced by the ANGELIC methodology [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. We further identi ed two types
of issue: con ict issues, which turn on opposing factors relating to a common
parent, and ascription issues, turning on whether a factor is present to a su cient
extent. The representation allows us to deal satisfactorily with con ict issues,
but even if we can represent the extent to which factors are present in a case
our explanation of the application of rules relating to ascription issues will be
limited in cases where true analogical reasoning is needed.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. L.
          <string-name>
            <surname>Al-Abdulkarim</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Atkinson</surname>
            , and
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Bench-Capon</surname>
          </string-name>
          .
          <article-title>A methodology for designing systems to reason with legal cases using Abstract Dialectical Frameworks</article-title>
          .
          <source>Arti cial Intelligence and Law</source>
          ,
          <volume>24</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>49</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. L.
          <string-name>
            <surname>Al-Abdulkarim</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Atkinson</surname>
          </string-name>
          , and
          <string-name>
            <surname>T.</surname>
          </string-name>
          Bench-Capon.
          <article-title>Statement types in legal argument</article-title>
          .
          <source>In Proceedings of JURIX 2016</source>
          , pages
          <fpage>3</fpage>
          {
          <fpage>12</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. L.
          <string-name>
            <surname>Al-Abdulkarim</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Atkinson</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Bench-Capon</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Whittle</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Williams</surname>
            , and
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Wolfenden</surname>
          </string-name>
          .
          <article-title>Noise induced hearing loss: Building an application using the ANGELIC methodology</article-title>
          .
          <source>Argument and Computation</source>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          ):5{
          <fpage>22</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>V.</given-names>
            <surname>Aleven</surname>
          </string-name>
          .
          <article-title>Teaching case-based argumentation through a model and examples</article-title>
          .
          <source>PhD thesis</source>
          , University of Pittsburgh,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>K. D. Ashley</surname>
            and
            <given-names>S.</given-names>
          </string-name>
          <article-title>Bruninghaus. Automatically classifying case texts and predicting outcomes</article-title>
          .
          <source>Arti cial Intelligence and Law</source>
          ,
          <volume>17</volume>
          (
          <issue>2</issue>
          ):
          <volume>125</volume>
          {
          <fpage>165</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>K.</given-names>
            <surname>Atkinson</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Bench-Capon</surname>
          </string-name>
          .
          <article-title>Reasoning with legal cases: Analogy or rule application</article-title>
          ?
          <source>In Proceedings of the Seventeenth ICAIL</source>
          , pages
          <volume>12</volume>
          {
          <fpage>21</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>T.</surname>
          </string-name>
          Bench-Capon.
          <article-title>HYPO's legacy: Introduction to the virtual special issue</article-title>
          .
          <source>Articial Intelligence and Law</source>
          ,
          <volume>25</volume>
          (
          <issue>2</issue>
          ):1{
          <fpage>46</fpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>T.</surname>
          </string-name>
          Bench-Capon.
          <article-title>The need for good old fashioned AI and Law</article-title>
          . In W. Hotzendorfer, C. Tschohl, and F. Kummer, editors,
          <source>International trends in legal informatics: a Festschrift for Erich Schweighofer</source>
          , pages
          <volume>23</volume>
          {
          <fpage>36</fpage>
          .
          <string-name>
            <surname>Weblaw</surname>
          </string-name>
          , Bern,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>T.</given-names>
            <surname>Bench-Capon</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Atkinson</surname>
          </string-name>
          .
          <article-title>Lessons from implementing factors with magnitude</article-title>
          .
          <source>In Proceedings of JURIX 2018</source>
          , pages
          <fpage>11</fpage>
          {
          <fpage>20</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>L. K.</given-names>
            <surname>Branting</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Pfeifer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Brown</surname>
          </string-name>
          , L. Ferro,
          <string-name>
            <given-names>J.</given-names>
            <surname>Aberdeen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Weiss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pfa</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Liao</surname>
          </string-name>
          .
          <article-title>Scalable and explainable legal prediction</article-title>
          .
          <source>AI</source>
          and Law, Online
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. S.
          <article-title>Bruninghaus and</article-title>
          <string-name>
            <surname>K. D. Ashley</surname>
          </string-name>
          .
          <article-title>Predicting outcomes of case based legal arguments</article-title>
          .
          <source>In Proceedings of the 9th ICAIL</source>
          , pages
          <volume>233</volume>
          {
          <fpage>242</fpage>
          . ACM,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>A.</given-names>
            <surname>Chorley</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Bench-Capon</surname>
          </string-name>
          .
          <article-title>An empirical investigation of reasoning with legal cases through theory construction and application</article-title>
          .
          <source>Arti cial Intelligence and Law</source>
          ,
          <volume>13</volume>
          (
          <issue>3-4</issue>
          ):
          <volume>323</volume>
          {
          <fpage>371</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>M. Medvedeva</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Vols</surname>
            , and
            <given-names>M. Wieling.</given-names>
          </string-name>
          <article-title>Using machine learning to predict decisions of the European Court of Human Rights</article-title>
          .
          <source>AI and Law</source>
          ,
          <volume>28</volume>
          :
          <fpage>237</fpage>
          {
          <fpage>266</fpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>A.</given-names>
            <surname>Rigoni</surname>
          </string-name>
          .
          <article-title>Representing dimensions within the reason model of precedent</article-title>
          .
          <source>Arti cial Intelligence and Law</source>
          ,
          <volume>26</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>22</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>E. L.</given-names>
            <surname>Rissland</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. D.</given-names>
            <surname>Ashley</surname>
          </string-name>
          .
          <article-title>A case-based system for Trade Secrets law</article-title>
          .
          <source>In Proceedings of the 1st ICAIL</source>
          , pages
          <volume>60</volume>
          {
          <fpage>66</fpage>
          . ACM,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>E. L.</given-names>
            <surname>Rissland</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. D.</given-names>
            <surname>Ashley</surname>
          </string-name>
          .
          <article-title>A note on dimensions and factors</article-title>
          .
          <source>Arti cial Intelligence and law</source>
          ,
          <volume>10</volume>
          (
          <issue>1-3</issue>
          ):
          <volume>65</volume>
          {
          <fpage>77</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>M. Sergot</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Sadri</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Kowalski</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Kriwaczek</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Hammond</surname>
            , and
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Cory</surname>
          </string-name>
          .
          <article-title>The British Nationality Act as a logic program</article-title>
          .
          <source>Comm. ACM</source>
          ,
          <volume>29</volume>
          (
          <issue>5</issue>
          ):
          <volume>370</volume>
          {
          <fpage>386</fpage>
          ,
          <year>1986</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>K.</given-names>
            <surname>Stevens</surname>
          </string-name>
          .
          <article-title>Reasoning by precedent|between rules and analogies</article-title>
          .
          <source>Legal Theory</source>
          , pages
          <volume>1</volume>
          {
          <fpage>39</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>