Legal Data In The Courtroom

Big Data’s Place in the Legal System

Big Data has found its niche in the legal system as well. Some 20 states have implemented data-driven evaluation of future crime risk in sentencing individuals, and many are considering to do so. Using algorithms that take measurable risk factors into account can lead to fairer decisions and benefits for the public, but problems with this approach are looming on the horizon, not least because, data-driven or not, some of the algorithms reinforce the bias on sentencing minorities and the poor.

Why should we do it?

Because it works. Studies have been conducted that show that, in the case of sex offenders, the predictive opinions of experts such as psychiatrists and parole-board members are shockingly inaccurate, whilst using data-driven risk assessment is much more useful as it focuses on the factors that were, by number crunching, discovered to be important. Furthermore, using Big Data in parole decisions can help depopulate the prisons, which cost billions in tax money, especially in states where the chances of being awarded parole are close to those of winning the lottery.

It’s also fairly simple. For example, Anne Milgram’s proposed risk analysis is very straightforward and, above all, universal. There is, admittedly, the tension that judges will use the system to give harsher sentences for fear of being put under scrutiny–if a person with a high risk of relapse is released and commits a crime, it might cost the judge more than their public persona. On the whole, though, it’s a useful tool, as Milgram herself says, for using something substantial to supplement the judge’s expertise. On the other hand, some states have proprietary risk assessment systems in place that take into account many more factors than Milgram’s nine, and furthermore are less than transparent. This is where things become scary and potentially dangerous.

Why shouldn’t we?

Although these systems are meant to aid the judge’s decisions directly, some of them determine whether a person is likely to pose a threat to society based on data that are outside the person’s control. The system that works in Pennsylvania, for example, takes living in a metropolitan area such as Pittsburgh or Philadelphia to be a risk factor. As more minorities reside in these areas than in the rest of the state, they are bound to get the worst of it. What’s more, family incarceration is also considered a risk factor, but it leads to unfair assessments, be they accurate or not, because black children are seven times as likely to have a parent incarcerated than whites.

Not to mention that such profiling may be illegal, it also shows the dangers of using Big Data without thorough scrutiny, no matter how good the original intention. Furthermore, while Milgram’s risk assessment tool doesn’t appear to include variables that are outside the individual’s control, judges can still be tempted to impose harsher sentences because of threats to their reputations. Be that as it may, it’s still evident that Big Data is very useful in the courtroom as well, but for now it appears that it calls for careful, deliberate consideration as well as a tiny step in the opposite direction.

By Lauris Veips

Byod.png
The Manuscript.png
Recovery Experts.png
Viral Infection Wearabletech
Gilad David Maayan
Cloud Security Posture Management Cloud Security Posture Management (CSPM) enables you to secure cloud data and resources. You can integrate CSPM into your development process, to ensure continuous visibility. CSPM is particularly beneficial for DevOps ...
Jen Klostermann
The Fintech Landscape The Nitty Gritty Although the COVID-19 pandemic has highlighted its existence, most of us have been using fintech in some form or another for quite some time. It’s a big part of ...
Cloud Image Migration
Effective Cloud Migration Monitoring The global pandemic witnessed the digital transformation of businesses in the cloud.  Today, even as the world resumes to normal, the end-to-end innovation in business strategies has kept the momentum going ...
Gilad David Maayan
Azure Storage Pricing Introduction to Azure Storage Services Azure Storage is a set of cloud storage services provided by Microsoft as part of the Azure public cloud. It offers highly scalable object storage, file systems ...
Gilad David Maayan
What Is Application Dependency Mapping? Modern software development teams use fast-paced DevOps work processes. However, the complexity of modern software applications often gets in the way. A typical enterprise software project has thousands of components, ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.