Introduction

In the Netherlands, a judge has considerable freedom in making sentencing decisions. There is a universal minimum of 1 day in prison. The maxima differ per offence, with a generic maximum of 30 years imprisonment and a life sentence for a handful of offences. There are guidelines (LOVS, 2020), but they are not binding. The judge should impose the sentence, taking into account the personal circumstances of the offender and the interests of society. Sentencing decisions are, therefore, mainly tailor-made. Hence, sentencing is a complex issue that is not necessarily addressed in the same way by all judges.

Through the ages, technology has changed our lives and, therefore, crime (Felson & Eckert, 2019). ICT has become an intrinsic part of most crimes hence we ask ourselves: how do judges sentence high-tech crime? Do judges rely on experts to fill their knowledge gap? Are there sentencing guidelines they can follow and how do they deal with complex cases under the pressure of time?

In theory, the variance in sentencing can be explained by the bounded rationality model (Simon, 1955). After all, the judge has to make a rational decision in a limited time, with limited information and no technical — e.g. ICT — expertise. The judge is not a machine, and even experienced judges make quick, instinctive, and emotional decisions (Kahneman, 2011). The focal concerns theory (Hartley, 2014) tries to explain the variance in sentencing. The theory states that sentencing is based on three aspects: blameworthiness, dangerousness, and practical considerations. The type of crime and the impact on the victims mainly determine blameworthiness. In ICT cases, we would argue, that the skill of the offender relates to blameworthiness too. That is, an offender may be misusing ICT skills to commit crimes. The dangerousness is determined by the degree to which the judge believes that the offender will pose a threat to society after his release. Here, we argue again that a skilled offender can be seen as potentially dangerous by a judge.

Here, we apply the focal concerns theory to the Dutch penal system. For example, a maximum sentence has been set for each offence, which is an important part of blameworthiness. The legislator has also determined that the personal circumstances of the offender may influence the decision. For example, an offender who has a job, a home, and a partner is less likely to re-offend. This aspect of sentencing is related to dangerousness. The legislator has also determined that certain aspects may not be taken into account — e.g. sex, country of birth, and race. Related work listed in Table 1 has researched the extent to which such aspects have nevertheless been included in sentencing decisions.

Table 1 Related work

We have not been able to find related work on focal concerns theory where ICT has been highlighted. In modern society computers and networks cannot be ignored. ICT also plays a role in crime (Raets and Janssens, 2021) and, therefore, in court cases (Bijlenga & Kleemans, 2018). Victims are threatened via social media (Montoya et al., 2013), phishing is the modern modus operandi of fraud (Leukfeldt, 2014), drug trafficking leverages the TOR network (Christin, 2013), and Bitcoins are used for extortion and ransomware (Connolly & Wall, 2019). It seems plausible that an offender who has used a certain technology also has to have some level of knowledge or skills to handle that technology. For example, an offender who launders money with Bitcoins probably knows how to acquire Bitcoins, how to store them, and how one can launder them. The offender does not need to have in-depth knowledge of the mathematical basis of Bitcoins, but he must have at least a Bitcoin wallet and be able to deal with it.

We assume that not all judges know enough about ICT to make a rational decision on technically complex cases. That is why we are specifically interested in the use of ICT by the offender and the response of the judicial system. This makes it opportune to apply the focal concerns theory to the ICT knowledge or skills of both the offender and the prosecution. A possible technical lack of knowledge on the part of the judge will probably have the most influence on the second focal concern, the dangerousness. Could the offender be a technical expert who can be considered capable of realizing new threats? Can an offender with better technical knowledge hide from the police for longer? An expert can assist the court, but experts are scarce, and therefore practical considerations (third focal concern) are also relevant here. As far as we know, the role of ICT in focal concerns theory has not been investigated before. This is a gap in criminological research that we will address in a case study on sentencing high-tech crime in the Dutch criminal justice system (See Sections “Case Study: Background”, “Case Study: Method”, “Case Study: Results”, “Case Study: Discussion”. In the remainder of this section we establish a quality criterion for sentence severity research to be able to contrast the case study to related work.

Related Work

Most earlier work that studied sentencing severity is based on the Anglo-Saxon legal system — predominantly, the USA and the UK. This has specific aspects, such as plea-bargaining, presumptive sentences, and mandatory minima that do not exist in the Dutch legal system. As a result, American sentencing investigations cannot simply be compared with Dutch investigations. Therefore we have included several Dutch studies in the related work to be able to interpret our findings in the light of the national state-of-the-art.

It is common in sentencing research to predict the length of the custodial sentence with a linear regression on independent variables such as the age and sex of the offender, offence type, and prior record. The best regression models explain the largest percentage of the variance in sentence length. That is why we look at the R2 to identify a baseline and contrast earlier work with ours.

To gain insight into the state-of-the-art in sentence severity research, Table 1 provides an overview of articles published in the last 10 years, in which a linear regression model predicts the length of detention. The articles included mainly differ in the choice of independent variables for the regression model and the population.

We first searched for journal articles with “sentence length” and R2 in the full text using Google Scholar. This resulted in 167 articles, of which those with at least 10 citations were analysed further. We exclude articles that only mention the R2 of a logistic regression, keeping only articles with a linear regression. Finally, we identified 28 articles that report the explained variance in sentence length. Of those 28 articles, we have coded the independent variables into 31 categories such as age, education, guideline departure, judge characteristics, and mandatory minimum. The columns of Table 1 show the reference, the number of citations on January 2021, the country from which the data originated, the N of the OLS model, the R2 reported, a checkmark when the R2 was adjusted, the average number of months of incarceration, the number of categories of independent variables in the OLS model, and the offence types included in the study. The table is sorted by the R2, from lowest to highest, where 16 papers with an R2 ≤ 0.35 have been omitted to save space.

Wermink et al. (2015) provide an overview of the Dutch criminal justice system and the extent to which the theory of focal concerns applies to it. Both van Wingerden et al. (2016) and Wermink et al. (2017) study the influence of the personal circumstances of the offender on the sentencing. In a recent article, Light and Wermink (2021) investigate the influence of nationality on sentencing. The standard for Dutch sentencing research is set by van Wingerden et al. (2016), with an R2 of 0.60. None of the 28 articles focus on ICT knowledge or skills of offenders and judges.

Hadzhidimova and Payne (2019) have analysed press releases from the U.S. Department of Justice about N = 225 cybercrime offenders who were not born in the US. Their main conclusion was that sentencing severity depends on the type of cybercrime. The influence of the application of advanced ICT on sentencing has therefore been studied to a limited extent, probably because this is a relatively new topic and because perhaps not all criminology researchers have sufficient affinity with ICT.

Open Data

Making court decisions available as open data promotes trust and confidence in the judiciary (Bargh et al., 2017). Lawyers and journalists can do their job better if they have a complete overview of case law. Offenders and victims have more insight into the cases in which they are involved or cases that are comparable. Policymakers can see the effect of their policies on court judgements.

We give three examples of judicial open datasets:

  • In the Netherlands, approximately 5% of court decisions are available as anonymized open data via https://www.rechtspraak.nl/Uitspraken. The selection criteria are also available on https://www.rechtspraak.nl/Uitspraken/Paginas/Selectiecriteria.aspx. The most relevant criteria for our work are that court judgements are published in case of (a) a crime against someone’s life, or (b) the maximum sentence is 4 years or more. Unfortunately, the reason for publishing a court judgement is not published.

  • In England, non-anonymized essential information from some of the court judgements can be found in the commercial database of https://www.thelawpages.com. It is unknown which fraction of court judgements are available on https://www.thelawpages.com and which sampling method is used (Pina-Sánchez et al., 2019).

  • In the interest of transparency and fairness of justice, the Supreme Court of the USA has ruled that everyone has the right to access criminal records. The open data of https://www.courtlistener.com consists of millions of rulings and verdicts (Cao et al., 2020).

Judicial open data is interesting for researchers because the data is immediately available, and lengthy application procedures are avoided. However, judicial open data is anonymized so that it cannot be linked to other data, like a trade register (van den Berg et al., 2017), or a population register (de Jong & Dennison, 2017).

In the remainder of this article, we apply the methods and techniques of classic sentencing severity research to open data. The first research question we will answer is:

RQ1: To what extent are the limitations of open data a barrier to obtaining good results?

As a definition of quality, we use the R2 of the linear regression between the independent variables and the length of the custodial sentence. To compare the results of the case study with the parameters of related research, we have already included the results of the case study in Table 1, entry High-tech crime case study.

Based on the focal concerns theory, we pose a second research question:

RQ2: To what extent do offenders in high-tech crime cases receive a more severe sentence than offenders in low-tech cases?

After the Background, Method, Results, and Discussion of the case study, we conclude the article with Conclusions and Policy Recommendations.

Case Study: Background

We define high-tech crime as a type of crime in which the offender has used advanced ICT, such as malware, BitCoins, or a PGP phone. Crime where standard applications of ICT, such as email, online banking, and online shopping are used, is low-tech crime.

High-tech crime is a phenomenon that has developed over the past 10 years. Offenders have increasingly made use of advanced techniques. In 2012, for example, the first high-tech criminal case in the Netherlands was published on https://www.rechtspraak.nl/Uitspraken, but in 2020 there were 243 published high-tech cases.

In the Netherlands, there are several articles in the Penal code that are indicative of cybercrime, such as 138ab (Hacking), 139d (Eavesdropping), and 350d (Misuse of passwords). Unfortunately, these articles of law do not distinguish between standard ICT and advanced ICT. That is why we have chosen to search the court judgements for words and concepts that are characteristic of high-tech crime. For example, is the word Bitcoin used in the court judgement? Or has the judiciary engaged a technical expert from the Netherlands Forensic Institute (https://www.forensischinstituut.nl/), the Maastricht Forensic Institute (https://www.tmfi.nl), or the Netherlands Organisation for Applied Scientific Research (https://www.tno.nl)?

To understand and appreciate the technical aspects of high-tech criminal cases, the police and judicial authorities have also had to study ICT in recent years. Where initially little knowledge of high-tech crime was available, specialist teams have now emerged, such as the Team High-Tech Crime (THTC) of the national police, and the cyber chamber of the court in The Hague.

When committing a high-tech offence, at least one of the offenders is assumed to have relevant ICT skills. Police and judicial authorities will therefore also need relevant knowledge when dealing with such a high-tech case. For example, the judge may rule that the offender in a high-tech case poses a greater danger to society than an offender without advanced ICT skills. Or a judge who is not sufficiently familiar with the technical aspects of the case could be more cautious than usual. The judge’s considerations about the dangerousness of the offender may therefore be related to the technology.

One of the main uses of ICT is in automating manual processes. Since crime is a process, it can be automated as well. For example, with little effort, an offender may be able to reach millions of victims with a large-scale phishing campaign. ICT can increase the scale of crime, and thereby increase the blameworthiness of the offender. This further motivates the second research question.

The court judgements that are available as open data on https://www.rechtspraak.nl/Uitspraken were anonymized to guarantee the privacy of the offender. Names, residential, IP and web addresses are replaced by pseudonyms that indicate roles, such as [offender], [co-offender 2], or [web address 3]. Some courts even omit the offender’s year of birth. A court judgement is usually accompanied by a summary and the indictment. Police case files, reports from the probation service, and other judicial documentation are not part of the open data.

Case Study: Method

Table 2 shows the total number of criminal court judgements in the years 2015 to 2020 (Meijer et al., 2021, Table 6.1). The total number of criminal court judgements in the period 2015 to 2020 is 503,955. In the same period, 49,790 criminal court judgements were published as open data by the Dutch district courts (courts of first instance). Of these court judgements, 23,186 contained only metadata, and 1,238 concern minors. Metadata is data about data. The metadata of judgements basically consist of the name of the court, the date of sentencing, the case number, and a brief summary of the judgement. Metadata does not contain sufficient information for sentencing research hence we omit incomplete court judgements. We also omit all court judgements where the offender is minor because they are sentenced under a different regime than adults. The total number of complete court judgements with an adult offender is 25,366, or about 5% of the national total.

Table 2 Total number of criminal cases processed by Dutch district courts

We analyse the obtained criminal court judgements in two ways:

  1. 1.

    A linear regression is used to find the relationship between the sentence length and relevant information about the offender, the offence, and the judiciary.

  2. 2.

    Cohen’s kappa is calculated to investigate the reliability of the coding.

The Coding

A court judgement is a standardized document according to the PROMIS model (van den Hoven, 2011), in which not only the decision but also the relevant details of the offender, the offence, and the police investigation are presented.

Coding thousands of court judgements is time-consuming. But because a court judgement has a standard structure, it is in principle possible to code a court judgement with an appropriate computer program. During the development of the program, we discovered 40 problems in the public data of https://www.rechtspraak.nl/Uitspraken, such as:

  • We have found court judgements that are not completely anonymized.

  • The legal basis is unclear in some court judgements. For example, the court judgement ECLI:NL:RBROT:2018:3004 mentions a non-existent article (10310): Having regard to articles 14a, 14b, ,, 36f, 57, 285, 10310, 311 312 and 417bis of the Penal code and Article 11 of the Opium Act.

  • The amount of fines, and the length of time periods are sometimes noted inconsistently. For example, sentences the offender to a term of imprisonment of 35 (thirty) months (ECLI:NL:RBROT:2018:1383).

These errors have been reported to the authorities.

The Data

Our program coded the sentencing decision of 24,994 (98.6%) court judgements. The distribution of the type of sentence is measure (e.g., compulsory treatment): 2.8%, custodial sentence: 54.8%, community service: 10.2%, fine: 5.8%, acquittal: 10.2%, procedural court judgements (such as a ruling on extradition): 14.7%. In 1.4% the sentencing decision could not be automatically coded. Manual analysis of a random sample of these judgements has shown that these are mainly procedural court judgements.

For 20,227 (79.7%) court judgements, the program was able to code the offences for which the offender was convicted. Of the remaining 20.3% court judgements, the coding program did not find the legal basis (Wettelijke voorschriften), mainly because these are usually not mentioned if the offender is acquitted, or in procedural cases.

The top half of Table 3 shows the national statistics of court judgements for adults (Meijer et al., 2021, Table 6.2 minus Table 6.12). The bottom half of Table 3 shows the statistics of the court judgements for adults from the open dataset. All offences are classified using the standard crime classification of Statistics Netherlands https://www.cbs.nl/nl-nl/onze-diensten/methoden/classifficaties/misdrijven/standaardclassificatie-misdrijven-2010, where the offence with the maximum sentence determines the classification of a judgement. The open dataset contains considerably more violent crime (31.6%) than the national data (19.4%), which is consistent with the publication criteria of the open data (see “Open Data”).

Table 3 A comparison of the main type of offence per year

Hierarchical Linear Modelling (HLM)

We ran a hierarchical linear regression to predict the length of the incarceration. The hierarchy consists of three levels:

  1. 1.

    The first model contains the maximum sentence for the offence, and the dummy-coded set of offences for which the offender is convicted. This level corresponds to the first focal concern, blameworthiness.

  2. 2.

    The second model also contains the variables that relate to trial, such as whether sentencing guidelines were consulted, and whether the judiciary has enlisted the services of technical experts. This level corresponds to the third focal concern, the practical matters (Crow & Bales, 2006).

  3. 3.

    The third model contains the variables related to the offender, such as sex, country of birth, age, prior record, and technical skills. This level corresponds to the second focal concern, the dangerousness.

We use factor analysis to determine whether there are latent variables that better explain the variance in sentencing than the manifest variables. We also look for interaction effects, to rule out that certain independent variables influence the effect of other independent variables on sentencing (Maddan et al., 2012; Ulmer & Johnson, 2004).

Variables

The program automatically coded the variables listed below for the 25,366 court judgements. We first describe three categories of independent variables, followed by the dependent variable. We use ECLI:NL:RBROT:2018:6152 to illustrate how we coded the judgements. As far as we know, this is the first published ransom ware case in the Netherlands.

Offence-Related Independent Variables

To determine the offence, we search the legal basis section (in the example case “11 Toepasselijke wettelijke voorschriften”) and encode all listed laws and articles (here “9, 14a, 14b, 14c, 22c, 22d, 33, 33a, 36f, 45, 47, 57, 138a/b, 317 en 350a van het Wetboek van Strafrecht”). We then look up the articles of law in the relevant code to find out for which crimes the accused is convicted (here “Property offence”, “Public order offence”). Hence the number of offences for which the offender is convicted in this case is 2.

  • Property offence, Violent offence, Public order offence, Other Penal code offence, Road traffic offence, Drugs-related offence, Weapons-related offence, and Other criminal offence: 0 = no, 1 = yes. These variables represent the offence type, according to the standard crime categories of Statistics Netherlands https://www.cbs.nl/nl-nl/onze-diensten/methoden/classificaties/misdrijven/standaardclassificatie-misdrijven-2010. Since an offender can be convicted of more than one offence, we have dummy-coded the offence with the longest maximum sentence.

  • Number of offences: 0 to 8

  • Maximum prison months We have calculated the maximum length of imprisonment by looking up the relevant articles in the Penal Code as mentioned in the legal basis in the court judgement. With one exception, we have omitted the articles from Book One of the Penal Code because these articles typically indicate the framework within which the sentences in Book Two must be interpreted. The exception is that in some cases no other articles are mentioned than from Book One, for example, money-laundering convictions based on article 36f Book One. In that case, we took the maximum from Book One. We have not differentiated between different custodial sentences, such as involuntary commitment, imprisonment, and military detention. For life sentences, we have taken the legal maximum of 360 months (Crow & Bales, 2006; Patrick & Marsh, 2011). This variable is not normally distributed. Therefore, we dummy-coded the maximum — in months — as follows: 71 and shorter, 72–95, 96–107, 108–119 (reference), 120–143, 144–179, 180–215, and 216 and longer. These categories were chosen to achieve an optimal balance in the number of cases in each category. The smallest category 216 and longer holds 9.2% of the cases, and the largest category 144–179 has 16.6% of the cases.

Prosecution-Related Independent Variables

To determine whether a guideline has been consulted, we scan the entire judgement for words such as “LOVS”, “orientatiepunten” and numbers of guidelines from the Public Prosecution Service such as “2018R001”.

  • Have guidelines been mentioned (0 = no, 1 = yes) If the judgement mentions the LOVS guidelines (LOVS, 2020), or specific guidelines of the Public Prosecution Service, we assume that the court has taken these into account. Otherwise, we assume that no guidelines were consulted.

  • Has prosecution special expertise (0 = no, 1 = yes) To determine whether the police and the judiciary had deployed special expertise, we checked whether organizations such as NFI, TMFI, or TNO were mentioned in the court judgement or whether an expert witness was mentioned in the court judgement. We have not taken into account the area of expertise of the specialists, which might include ICT, but also firearms, DNA, and drugs analysis. In the absence of such a mention, we assume that no special expertise has been deployed.

Offender-Related Independent Variables

To determine that we are dealing with a high-tech case, we search the entire judgement for relevant terms (in the example case “malware” (27x), “bitcoin” (14x), “ransom ware” (5x), and “hacked server” (1x). In principle, it is possible that the offender himself has no knowledge of technology, but his co-offenders do. We checked several judgements manually but found no evidence of this.

  • Age at sentencing The age is the difference between the year of birth and the year the sentence was pronounced. In some cases, this is a few years later than the age at the time of the offence because the judicial process sometimes takes years. Unfortunately, the year of birth is often omitted in open data. We dummy-coded the age into the same five categories as van Wingerden et al. (2016): 18–20, 21–30 (reference), 31–40, 41–50, and 51 and older.

  • Is born abroad (0 = no, 1 = yes) If the offender was born abroad this is usually mentioned in the judgement. We, therefore, assume that the offender was born in the Netherlands unless it is explicitly stated that he/she was born elsewhere.

  • Is female offender (0 = no, 1 = yes) The sex of the offender is not explicitly stated in the court judgement, but sometimes it is stated in the accompanying summary. If the court judgement or summary contains text fragments such as her co-offender, then the offender is deemed to be female, otherwise, we assume it is a man. This is consistent with the observation that most offenders are male.

  • Is repeat offender (0 = no, 1 = yes) Some court judgements state explicitly whether the offender has been in contact with the police and the judicial authorities before.

  • Has multiple victims (0 = no, 1 = yes) As with the offenders, the victims are represented by pseudonyms, e.g. [victim 3]. From this, it can be deduced how many victims there were.

  • Has offender basic skills (0 = no, 1 = yes) The coding program searches the court judgements for ICT-related standard terms such as Internet, WWW, and online. When we find one or more of those words, we assume that the offender has basic cyber skills. If we do not find any of those words, we assume that the offender has no demonstrable cyber skills.

  • Has offender special skills (0 = no, 1 = yes) We also look for specialist concepts such as Bitcoin, TOR network, and Ransomware as evidence that the offender has more than just basic skills. If we cannot find any of these words, we assume that the offender has no demonstrable special skills. To avoid correlation between independent variables, we set Has offender basic skills to 0 if there are special skills.

Dependent Variable

To determine the length of the prison sentence, we look for textual passages in the court judgement in which the decision is described (in the example case “13 Beslissing”). In that section we look for the text fragment where the accused is sentenced (“veroordeelt de verdachte tot”) and then locate the sentence (in the example randomware case “een gevangenisstraf voor de duur van 2 (twee) jaren”). The coding takes only the sentence length and ignores any measures that have been imposed in addition to a prison sentence.

  • Prison months (logged) We did not take into account deductions for pre-trial custody or suspended sentences, and in the same way, as for the maximum we converted everything into months (= 30 days). This variable is also not normally distributed, but after a log transformation, a visual inspection of the Normal Q-Q plots showed that the transformed variable is distributed more or less normally.

Reliability

To check the reliability of the automatic coding, we manually checked the coding in a stratified random sample of 275 court judgements. That is about 1% of all complete court judgements. Because courts do not necessarily record judgements in the same way — for example, the Rotterdam District Court started an experiment in 2019 to make some court judgements more accessible — the 11 district courts form the first stratum. We also expect the wording of the judgements to change over time, and therefore take the years 2015–2020 as the second stratum. The stratification ensures that the distribution of the courts and the year of pronouncing the sentence in the random sample is the same as in the total collection of published court judgements. We calculate both the accuracy of the coding, as usual in the technical sciences, as well as Cohen’s kappa, which is more common in the social sciences. We then manually checked coded information of all the court judgements in the sample: the age of the offender, the decision, and the legal basis of the decision.

  • A true positive is when the coding program found the correct coding.

  • A false positive arises if the coding by the program is wrong.

  • If the program does not find any coding, while the relevant information is present, a false negative occurs.

  • If the information is missing, and the coding program noted this, we have a true negative.

Case Study: Results

We have found indications that, on average, high-tech crime leads to longer sentences. The automatic coding is reliable.

Descriptive Statistics

Tables 4 and 5 give the descriptive statistics of all variables. All dependent variables except one are more or less constant over time. The exception is the percentage of offenders with special ICT skills which, as can be expected, is steadily growing, from 2015: 1.6%, 2016: 2.4%, 2017: 2.9%, 2018: 3.9%, to 2019: 4.6%, 2020: 5.2%.

Table 4 Descriptive statistics of ratio-scale variables
Table 5 Descriptive statistics dichotomous variables (N = 25,366)

Regression: High-tech Crime Leads to a Significantly Longer Sentence

We have verified that the assumptions of the linear regression analysis on the independence of residuals, linear relationships, homoscedasticity, and multicollinearity were met. There were 59 outliers with a sentence of, on average, 3.6 days whose residuals differed more from the predicted value than three standard deviations. In 47 cases, a short prison sentence was imposed in addition to community service to comply with article 22b of the Penal code. In 2 cases, the offender was partially excused by insanity defence and sentenced to a short prison sentence and a treatment. In the remaining 10 cases the judge imposed a mild sentence. The outliers represent correctly coded judgements and were therefore kept in the dataset.

Table 6 shows that the Model 3 predicts the length of the custodial sentence in a statistically significant manner, F(27,4646) = 111.85, p< 0.0005, adjusted R2 = 0.39. Most independent variables contribute significantly to the result.

Table 6 shows that most of the variance in sentencing is explained by Model 1. Models 2 and 3 each explain a small proportion of the variance. This means that the sentencing decision depends mostly on the offence, as required by law.

Table 6 Unstandardized coefficients of the three models for LN (sentence length )

Model 3 mainly confirms what we expect about the relationship between the length of the custodial sentence and the independent variables. Since the independent variable is logged the coefficient B must be exponentiated before the value can be interpreted. We give a few examples:

  • The most serious category of offences leads on average to a 3 times longer custodial sentence than an offence with the maximum sentence in the reference category (108–119 months), because for model 3 we have the following: exp(B) = exp(1.10) = 3.00.

  • All offences lead to shorter sentences than an offence in the reference category (violent offences).

  • For each additional offence being committed, the sentence length is increased, on average, by 10%.

  • If the judgement mentions guidelines the sentence is, on average, 11% longer than in case guidelines have not been mentioned.

  • If the prosecution has engaged the services of experts, the sentence is, on average, 78% longer than sentences where specialists have not been involved.

  • The oldest offenders, on average, receive a 48% longer sentence than offenders in the reference age group (21–30).

  • Repeat offenders receive, on average, a 12% longer sentence than first-time offenders.

  • Offenders with special ICT skills receive, on average, a 95% longer custodial sentence than offenders without special skills.

We analysed a fourth model with the year of sentencing as an extra independent variable but found no significant changes to the model parameters.

Factor analysis showed that the correlation between the manifest variables was always smaller than 0.25. This makes it unlikely that there are latent factors that provide a better explanation for the variance in sentencing than the manifest variables.

We also investigated possible interaction effects. There is a possible interaction between Maximum prison months and Has prosecution special expertise because for the most serious offences the court may more often call in the expertise of specialists. There is also a possible interaction between Type of offence and Has offender special skills because special skills may be more useful for some offences (e.g. fraud) than for others (e.g. robbery). The change in R2 due to these two interactions was found to be significant but small (< 0.004).

Finally, there is also possible interaction between Age at sentencing and Is repeat offender because repeat offenders are usually older than first offenders. The change in R2 due to this last interaction was not significant.

Cohen’s Kappa: High Reliability of the Automatic Encoding

It is common for multiple coders to compare their results and adjust them to an agreed coding scheme. In that case, the reliability of the coding before and after the agreement is also stated. We have followed a similar process, with the agreement leading to some improvements to the coding software.

Table 7 shows the reliability of the coding of the year of birth, the decision of the court, and the legal basis, both before and after making the improvements. The manual coding corresponds well with the coding of all variables by the program.

Table 7 Reliability of the coding (N = 275)

In the technical literature, it is common to state the accuracy of the coding. In the social science literature, Cohen’s kappa is preferred, because in this metric the accuracy is corrected for chance hits. We give both metrics, as well as the number of true/false positives/negatives. (In case the number of true negatives is 0, kappa cannot be calculated.)

The main issues with the coding software found as a result of the reliability study are:

  • The age of the offenders was sometimes stated in words instead of numbers.

  • Several laws were missing, and there were some problems with article numbers so that the legal basis was sometimes incompletely coded.

  • A rarely used type of court decision was missing and the decision was sometimes incomplete.

The coding software has been improved so that these three issues are resolved.

Case Study: Discussion

Interpretation of the Results

In related work, voluntary sentencing guidelines (Ulmer and Johnson, 2004) and mandatory presumptive sentences (Engen & Gainey, 2000) play an important role in harmonizing the sentence length. However, guidelines have a relatively small impact on sentence length in the models. One explanation could be that the guidelines are not mandatory; another could be that there are no guidelines for all crimes.

The average custodial sentence of the case study is about twice as long (24.8 months) as in the related work based on the Dutch data (see Table 1). There are two possible explanations. Firstly, we have included suspended sentences where others usually focus on the unsuspended part of the sentence (van Wingerden et al., 2016; Wermink et al., 2017). Secondly the offences present in the open dataset are more serious cases than those studied by, for example, van Wingerden et al. (2016).

Like van Wingerden et al. (2016), we found that the oldest offenders receive longer sentences. This can be explained by observing that an older offender is more likely to be a repeat offender and that a younger offender is usually treated more leniently.

There is a big gap between the maximum sentence and the actual sentence length, because the maximum punishment is reserved for the most heinous forms of crime in that category. To illustrate this, we give a few examples:

  • Human trafficking (273f Penal code) has a maximum of 30 years, but an employee of a swingers club was sentenced to a prison sentence of 1 day for neglecting to verify the age of a minor visitor (ECLI:NL:RBOVE:2015:5781).

  • Assault (302 Penal code) carries a maximum of 10 years, but a student was sentenced to 31 days in prison for assault during hazing (ECLI:NL:RBNNE:2017:4461).

  • Possession of certain illegal narcotics (articles 2 and 10 Opium Act) carries a maximum sentence of 6 years imprisonment, but an offender who threw 4.2 g of MDMA over the walls of a prison was sentenced to 1 week detention (ECLI:NL:RBROT:2017:6082).

A large gap between maximum sentence and actual sentence creates outliers in the regression, which reduces the power of the analysis.

In contrast to the results of van Wingerden et al. (2016), the sex of the offender is not significant. The percentage of women in the case study (8%) is even lower than in van Wingerden et al. (2016) (10%). Women are underrepresented in serious crimes (Daly and Tonry, 1997), and there may be too few women in our dataset to achieve a statistically significant result.

Contribution to the Theory

The results show that offenders in a high-tech case receive a more severe sentence than offenders in a low-tech case. An explanation could be that offenders with special skills are more likely to commit large-scale offences; i.e. the offender uses ICT as a “crime multiplier”. A large-scale offence is probably more serious than a small-scale offence, and as a result, the court imposes a longer sentence. We searched the dataset for court judgements with the word large-scale (N = 1517). The word occurs in 30.8% of the court judgements against an offender with special skills, and in 5.8% of the court judgements against an offender without special skills. This difference in frequencies is statistically significant (χ2(1) = 1039.0,p < 0.0005). We give three examples of offences where ICT is used as a crime multiplier.

Drugs:

The street dealer must devote considerable time and effort to maintaining a relationship with his customers without attracting the attention of the police. By contrast, the vendor on a darknet marketplace does not have to spend time and effort to avoid raising suspicion because the technology (the TOR network and Bitcoin) does that for him. The technology not only makes it difficult for police to get a grip on the vendor, but it also makes a large-scale and global approach to drug trade easy (Christin, 2013).

CSA:

Not long ago, offenders of child sexual abuse had to rely on physical media. With the advent of the Internet, it became possible to collect and share media on a large scale, whereby the technology ensures anonymity and scalability (van der Bruggen & Blokland, 2021).

Fraud:

Online banking is not only cost-effective for banks but also for fraudsters. With a large-scale and inexpensive phishing campaign, an offender can reach millions of potential victims. In this scenario, the offender only uses technology to achieve scalability. To avoid detection, he uses money mules (Leukfeldt, 2014).

In each of these examples, offenders use ICT as a crime multiplier to increase the scale of the offence. This not only makes offenders with special skills more blameworthy (because they make more victims), it also makes offenders with special skills more dangerous (because if they re-offend, they have the skills to do so on a large scale). The explanation, therefore, of the main result of the case study is that special ICT skills is a factor for two out of three focal concerns. Future research is needed to validate this refinement of focal concerns theory.

Limitations

The published court judgements from the Open data of https://www.rechtspraak.nl/Uitsprakenrelate to serious crimes. Therefore, our results are not representative of the total population of criminal court judgements.

The automatic coding of court judgements can lead to incorrect or missing coding. We manually checked a stratified random sample to estimate the error margins, which are small but not zero.

Most researchers have full control over the selection of cases they want to analyse. Because only a fraction of the court judgements are available as open data, we had less control over the selection.

Conclusions and Policy Recommendations

Transparency promotes confidence in the judiciary. Because open data promotes transparency, many countries make judicial documentation publicly available as open data. Since open data and sentencing research are both aimed at transparency, it is interesting to investigate sentencing severity using open data.

Research Questions

We answer the first question “To what extent are the limitations of open data a barrier to obtaining good results?” by performing a case study. The open data comes from the Dutch criminal justice system https://www.rechtspraak.nl/Uitspraken. We analysed 25,366 court judgements from the period 2015–2020 and in particular, examined the relationship between the severity of the sentence and a range of predictors. The main result is that the quality of sentencing research with open data is comparable to the quality of sentencing research on richer data.

The answer to the research question is thus a qualified yes, in the sense that the variance explained by the linear regression model of the case study is 39%, whereas comparable related work reports 60% (van Wingerden et al., 2016). We consider this a good result because we had no control over the selection of the court judgements, and because we have coded strictly less information per case. By way of future work we suggest to code whether a sentence has been suspended, and to code more information about the person of the offender (employment, accommodation, education, relationships, alcohol and drugs abuse, etc.).

The second research question “To what extent do offenders in high-tech cases receive a more severe sentence than offenders in low-tech cases?” has been investigated in the case study. We found that offenders who use advanced ICT are sentenced to significantly longer custodial sentences compared to other offenders. A possible explanation could be that ICT can be used as a crime multiplier, thus making an offender in high-tech cases both more blameworthy and more dangerous given the misuse of their technical skills. Future research is needed to investigate this hypothesis. We propose to include technical skills as one of the factors that determine blameworthiness and dangerousness in focal concerns theory.

As a practical application of our work, the encoding that our software calculates from a judgement could be added to a published judgement as extra metadata. By searching in this extra metadata, users of published judgements will be able to find the information they are looking for more quickly.

Court judgements are closely tied to a specific legal system and language so in principle the method that we have followed can be applied to other countries, but the coding software will probably have to be completely redeveloped.

European Policy Implications

We make seven policy recommendations for improving judicial open data, which we hope will eventually be implemented in a European context (van Opijnen et al., 2017).

  1. 1.

    Judicial decisions are structured, but this structure is not strictly enforced (Trompper & Winkels, 2016). Natural language offers possibilities to vary even standard structures. Annex I of the most recent European Council conclusions (Council of the EU, 2019) recommends a minimal structure for judgements that already represents a significant improvement over the status quo, but the recommendations can still be refined. For example, the facts about the suspect and the victims could be better separated so as not to confuse facts about the two in an analysis.

  2. 2.

    Published judgements are written for the human reader and not for statistical analysis. We recommend to add a minimal set of metadata that is representative of current research.

  3. 3.

    As long as only a subset of judgements issued by a court are published, the published judgements may give a distorted picture of crime. To prevent this, either a random selection of the judgements should be published, or the specific reasons for publication could be added as metadata to the publication.

  4. 4.

    Often, only the judgement is published and not the rest of the case file. Some European countries have started to publish more than just the judgement. We recommend this to become common practice, like in countries such as the USA.

  5. 5.

    To guarantee the integrity and authenticity of published judgements, we recommend that the responsible authority signs every judgement digitally.

  6. 6.

    We found 40 errors in the published court decisions and reported them to the appropriate authorities. We recommend keeping a list of errata per published judgement. This makes it possible to revise earlier analyses based on incorrect information later.

  7. 7.

    The transparency of the judiciary is promoted by the publication of judgements, but it is also the information obtained from scientific analyses that promotes transparency. We recommend creating and curating a collection of scientific articles that analyse the published judgements.