Computer-Aided Legislation Based on Immune-Like Processing of Legal Texts
The article analyses the possibility of applying immune-like processing of legal texts in the legislative process. It also discusses the required format for recording legal information and the relationships between the formats for recording legal information and the methods used to analyse it. On this ground we argue that the formal analysis of a legal text must extend beyond its logical consistency. This is so due to the fact that the quality of legislation depends not only on the lack of internal contradictions within a legal text but also on the number of requirements a legal text has to meet. Legislation should not only be consistent but also coherent, uniform and comprehensible. This requires, inter alia, consistent terminology, a lack of redundancy, appropriate references and compliance with the requirements set forth in the principles of legislation . In order to achieve the above-mentioned aims legislators are beginning to apply new tools to complement traditional approaches. As a consequence, legal drafting is nowadays aided by various information and communication technologies usually based on classic editing tools and algorithms for text processing. However, due to deficiencies in already existing solutions it is important to consider using novel, adaptive and specially dedicated algorithms, which would allow for similarity analyses of legal texts and in particular would detect patterns, relationships or coincidences in their content and structure. Such algorithms can be based on computational intelligence, and more specifically on artificial immune systems . As a consequence, the article will discuss both the scope of application and the capacity of tools based upon the idea of natural immune systems as means of increasing the quality of legislation .
KeywordsLegal text processing Legislation Artificial immune systems Artificial intelligence
- Ademokun, Alexander A., and Deborah Dunn-Walters. 2010. Immune responses: Primary and secondary. In eLS, Wiley Oline Library. http://onlinelibrary.wiley.com/doi/10.1002/9780470015902.a0000947.pub2/full.
- Charikar, Moses S. 2002. Similarity estimation techniques from rounding algorithms. In Proceedings of the thiry-fourth annual ACM symposium on theory of computing, ed. John Reif, 380–388. New York: ACM.Google Scholar
- Cyrul, Wojciech, Jerzy Duda, Janusz Opiła, and Tomasz Pełech-Pilichowski. 2014. Informatyzacja tekstu prawa. Perspektywy zastosowania jȩzyków znacznikowych. Warsaw: Wolters Kluwer SA.Google Scholar
- de Castro, Leonardo N., and Jonathan Timmis. 2002. Artificial immune systems: A new computational approach. London: Springer.Google Scholar
- Forrest, Stephanie, Alan S. Perelson, Lawrence Allen, and Rajesh Cherukuri. 1994. Self-nonself discrimination in a computer. In Proceedings of the 1994 IEEE symposium on security and privacy, 202. Washington, DC: IEEE.Google Scholar
- Gonzalez, Fabio, Dipankar Dasgupta, and Robert Kozma. 2002. Combining negative selection and classification techniques for anomaly detection. In Proceedings of the congress on evolutionary computation, (1), 705–710. Honolulu: IEEE.Google Scholar
- Hand, David, Heikki Mannila, and Padhraic Smyth. 2001. Principles of data mining. Cambridge: MIT Press.Google Scholar
- Jolliffe, Ian T. 2002. Principal component analysis. New York, Berlin, Heidelberg: Springer-Verlag.Google Scholar
- Karakose, Mahmet. 2013. Reinforcement learning based artificial immune classifier. The Scientific World Journal. Hindawi. http://downloads.hindawi.com/journals/tswj/2013/581846.pdf. Accessed 15 Jan 2014.
- Kumar, Akshat, and Shivashankar Nair. 2007. An artificial immune system based approach for English grammar checking. In Artificial immune systems, ed. de Castro and Leonardo N., et al. LNCS, vol. 4628, 348–357. Berlin/Heidelberg: Springer.Google Scholar
- Mahmoud, Tarek M., and Ahmed M. Mahfouz. 2012. SMS spam filtering technique based on artificial immune system. IJCSI International Journal of Computer Science Issues 9(2):589–597.Google Scholar
- Pełech, Tomasz, Jan T. Duda. 2005. Immune algorithm of stock rates parallel monitoring. In Information systems and computational methods in management, ed. Jan T. Duda J.T, 183–193. Krakow: AGH-UST Publishing.Google Scholar
- Romero, Andres, Fernando Nino. 2007. Keyword extraction using an artificial immune system. In: Proceedings of the 9th annual conference on Genetic and evolutionary computation, 181. London: ACM.Google Scholar
- Samsudin, Norlela, Mazidah Puteh, Abdul R. Hamdan, and Mohd Z.A. Nazri. 2012. Is artificial immune system suitable for opinion mining? In: 4th conference on data mining and optimization, Langkawi, 131–136.Google Scholar
- Sartor, Giovanni, Palmirani Monica, Francesconi Enrico, and Maria Angela Biasiotti. eds. 2011. Legislative XML for the semantic Web. Dordrecht: Springer.Google Scholar
- Schadwinkel, Stefan, and Werner Dilger. 2006. A dynamic approach to artificial immune systems utilizing neural networks. In Proceedings of the 8th annual conference on genetic and evolutionary computation, 131–132. New York: ACM.Google Scholar
- Somayaji, Anil, Steven Hofmeyr, and Stephanie Forrest. 1998. Principles of a computer immune system. In Proceedings of the 1997 workshop on new security paradigms, 75–82. New York: ACM.Google Scholar
- Timmis, Jonathan, Thomas Knight, Leonardo N. de Castro, and Emma Hart. 2004. An overview of artificial immune systems. In Computation in cells and tissues: Perspectives and tools for thought, ed. Ray Paton, Hamid Bolouri, Mike Holcombe, J. Howard Parish, and Richard Tateson, 51–86. Berlin, Heidelberg, New York: Springer Verlag.CrossRefGoogle Scholar
- Wierzchoń, Sławomir T. 2001. Artificial immune systems. Theory and applications. Warsaw, Poland: Akademicka Oficyna Wydawnicza EXIT.Google Scholar
- Wolfram, Stephen. 1986. Approaches to complexity engineering. Physica D (22):385–399.Google Scholar