語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Lawfully using autonomous weapon technologies
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Lawfully using autonomous weapon technologies/ by Jonathan Kwik.
作者:
Kwik, Jonathan.
出版者:
The Hague :T.M.C. Asser Press : : 2024.,
面頁冊數:
xv, 413 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
International Criminal Law. -
電子資源:
https://doi.org/10.1007/978-94-6265-631-4
ISBN:
9789462656314
Lawfully using autonomous weapon technologies
Kwik, Jonathan.
Lawfully using autonomous weapon technologies
[electronic resource] /by Jonathan Kwik. - The Hague :T.M.C. Asser Press :2024. - xv, 413 p. :ill. (some col.), digital ;24 cm.
Part I. FRAMING THE STUDY -- Chapter 1. Introduction -- Part II. CONTROLLING AWS -- Chapter 2. Controlling AWS: A cyclical process -- Part III. UNDERSTANDING AWS -- Chapter 3. AI fundamentals and the military environment -- Chapter 4. Measures of performance -- Chapter 5. Causes of failure -- Chapter 6. Adversarials: Anti-AI countermeasures -- Part IV. AWS IN THE LEGAL-OPERATIONAL CONTEXT -- Chapter 7. Legal-operational analysis: Introduction -- Chapter 8. Legally-salient variables for AWS -- Chapter 9. AWS and targeting -- Chapter 10. Desirability of using AWS. Part V. CRIMINAL LIABILITY -- Chapter 11. Criminal liability: Problem setting -- Chapter 12. Obstacles to criminal liability: a systemic analysis -- Chapter 13. Across the spectrum of intent -- Part VI. CONCLUSIONS -- Chapter 14. Integration and closing -- Appendix -- Index.
This monograph provides a practical and operational perspective to the question of how to lawfully employ autonomous weapon systems (AWS) from the point-of-view of the technology's end-users: field commanders. While there is international consensus that targeting rules such as proportionality and precautions must be respected when using AWS, there is legal and practical ambiguity as to how to translate this normative commitment into practice. How are commanders in the field, when guns are already blazing, expected to exercise command-and-control when ordering AWS-attacks, and ensure that their targeting obligations remain fulfilled? The book discusses how commanders can use existing targeting frameworks to ensure that their use of AWS remains in compliance with the rules governing the conduct of hostilities. It invites the reader to step into the shoes of the military commander with all the operational pressure and uncertainty inherent to this position, and explores amongst others: - How to maintain control of AWS throughout a targeting cycle; - How to make informed and reasoned deployment decisions by analysing information related to the technical parameters of the AWS, the characteristics of the operational environment, and enemy countermeasures; - Under which circumstances AWS may not be used under targeting rules, such as indiscriminate attack, proportionality and the duty to cancel/suspend; - What extra precautionary measures unique to AWS technology can and should be employed; - When it is militarily desirable to employ AWS over other alternatives; and - Under what circumstances criminal liability may be attributed for AWS-related harm. It offers both academic and practical outputs: new legal and doctrinal insights on the technology that is useful for future legal developments, and workable recommendations and efficient flowcharts that can be adopted by commanders, military organisations or policymakers to ensure IHL-compliant deployment of AWS. Dr. Jonathan Kwik is a researcher at the T.M.C. Asser Institute in The Hague specialised in artificial intelligence and targeting law, and is a member of the Board of Experts of the Asia-Pacific Journal of International Humanitarian Law.
ISBN: 9789462656314
Standard No.: 10.1007/978-94-6265-631-4doiSubjects--Topical Terms:
883253
International Criminal Law.
LC Class. No.: KZ5645.5.A98
Dewey Class. No.: 341.73
Lawfully using autonomous weapon technologies
LDR
:04046nam a2200325 a 4500
001
1134197
003
DE-He213
005
20240803130508.0
006
m d
007
cr nn 008maaau
008
241213s2024 ne s 0 eng d
020
$a
9789462656314
$q
(electronic bk.)
020
$a
9789462656307
$q
(paper)
024
7
$a
10.1007/978-94-6265-631-4
$2
doi
035
$a
978-94-6265-631-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
KZ5645.5.A98
072
7
$a
LNJ
$2
bicssc
072
7
$a
LAW000000
$2
bisacsh
072
7
$a
LNJ
$2
thema
082
0 4
$a
341.73
$2
23
090
$a
KZ5645.5.A98
$b
K98 2024
100
1
$a
Kwik, Jonathan.
$3
1455528
245
1 0
$a
Lawfully using autonomous weapon technologies
$h
[electronic resource] /
$c
by Jonathan Kwik.
260
$a
The Hague :
$c
2024.
$b
T.M.C. Asser Press :
$b
Imprint: T.M.C. Asser Press,
300
$a
xv, 413 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Part I. FRAMING THE STUDY -- Chapter 1. Introduction -- Part II. CONTROLLING AWS -- Chapter 2. Controlling AWS: A cyclical process -- Part III. UNDERSTANDING AWS -- Chapter 3. AI fundamentals and the military environment -- Chapter 4. Measures of performance -- Chapter 5. Causes of failure -- Chapter 6. Adversarials: Anti-AI countermeasures -- Part IV. AWS IN THE LEGAL-OPERATIONAL CONTEXT -- Chapter 7. Legal-operational analysis: Introduction -- Chapter 8. Legally-salient variables for AWS -- Chapter 9. AWS and targeting -- Chapter 10. Desirability of using AWS. Part V. CRIMINAL LIABILITY -- Chapter 11. Criminal liability: Problem setting -- Chapter 12. Obstacles to criminal liability: a systemic analysis -- Chapter 13. Across the spectrum of intent -- Part VI. CONCLUSIONS -- Chapter 14. Integration and closing -- Appendix -- Index.
520
$a
This monograph provides a practical and operational perspective to the question of how to lawfully employ autonomous weapon systems (AWS) from the point-of-view of the technology's end-users: field commanders. While there is international consensus that targeting rules such as proportionality and precautions must be respected when using AWS, there is legal and practical ambiguity as to how to translate this normative commitment into practice. How are commanders in the field, when guns are already blazing, expected to exercise command-and-control when ordering AWS-attacks, and ensure that their targeting obligations remain fulfilled? The book discusses how commanders can use existing targeting frameworks to ensure that their use of AWS remains in compliance with the rules governing the conduct of hostilities. It invites the reader to step into the shoes of the military commander with all the operational pressure and uncertainty inherent to this position, and explores amongst others: - How to maintain control of AWS throughout a targeting cycle; - How to make informed and reasoned deployment decisions by analysing information related to the technical parameters of the AWS, the characteristics of the operational environment, and enemy countermeasures; - Under which circumstances AWS may not be used under targeting rules, such as indiscriminate attack, proportionality and the duty to cancel/suspend; - What extra precautionary measures unique to AWS technology can and should be employed; - When it is militarily desirable to employ AWS over other alternatives; and - Under what circumstances criminal liability may be attributed for AWS-related harm. It offers both academic and practical outputs: new legal and doctrinal insights on the technology that is useful for future legal developments, and workable recommendations and efficient flowcharts that can be adopted by commanders, military organisations or policymakers to ensure IHL-compliant deployment of AWS. Dr. Jonathan Kwik is a researcher at the T.M.C. Asser Institute in The Hague specialised in artificial intelligence and targeting law, and is a member of the Board of Experts of the Asia-Pacific Journal of International Humanitarian Law.
650
2 4
$a
International Criminal Law.
$3
883253
650
2 4
$a
Public International Law.
$3
816062
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
International Humanitarian Law, Law of Armed Conflict.
$3
883666
650
1 4
$a
IT Law, Media Law, Intellectual Property.
$3
1209939
650
0
$a
Autonomous weapons systems (International law)
$3
1455529
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-94-6265-631-4
950
$a
Law and Criminology (SpringerNature-41177)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入