Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Criminal procedure

Civil Procedure

Articles in Law Reviews & Other Academic Journals

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Law

[Marked Confidential]: Negative Externalities Of Discovery Secrecy, Gustavo Ribeiro Jan 2022

[Marked Confidential]: Negative Externalities Of Discovery Secrecy, Gustavo Ribeiro

Articles in Law Reviews & Other Academic Journals

Current unprecedented levels of secrecy in civil discovery create significant negative externalities by preventing our adversary system from measuring up to the broad public goals that justify it. First, excessive discovery secrecy undermines the courts and the public’s ability to correct distortions of the truth-seeking function of the adversary system caused by excessive partisanship and confirmation bias. Second, it weakens the adversary system’s promotion of liberal democratic values, such as transparency and self-government. Third, it threatens the adversary system’s role in upholding human dignity, understood either as respect or status. To correct the negative externalities caused by excessive discovery secrecy, …


Big Data And Predictive Reasonable Suspicion, Andrew Ferguson Jan 2015

Big Data And Predictive Reasonable Suspicion, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

The Fourth Amendment requires “reasonable suspicion” to seize a suspect. As a general matter, the suspicion derives from information a police officer observes or knows. It is individualized to a particular person at a particular place. Most reasonable suspicion cases involve police confronting unknown suspects engaged in observable suspicious activities. Essentially, the reasonable suspicion doctrine is based on “small data” – discrete facts involving limited information and little knowledge about the suspect.But what if this small data is replaced by “big data”? What if police can “know” about the suspect through new networked information sources? Or, what if predictive analytics …