Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Lawfully using autonomous weapon tec...
~
Kwik, Jonathan.
Linked to FindBook
Google Book
Amazon
博客來
Lawfully using autonomous weapon technologies
Record Type:
Electronic resources : Monograph/item
Title/Author:
Lawfully using autonomous weapon technologies/ by Jonathan Kwik.
Author:
Kwik, Jonathan.
Published:
The Hague :T.M.C. Asser Press : : 2024.,
Description:
xv, 413 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Part I. FRAMING THE STUDY -- Chapter 1. Introduction -- Part II. CONTROLLING AWS -- Chapter 2. Controlling AWS: A cyclical process -- Part III. UNDERSTANDING AWS -- Chapter 3. AI fundamentals and the military environment -- Chapter 4. Measures of performance -- Chapter 5. Causes of failure -- Chapter 6. Adversarials: Anti-AI countermeasures -- Part IV. AWS IN THE LEGAL-OPERATIONAL CONTEXT -- Chapter 7. Legal-operational analysis: Introduction -- Chapter 8. Legally-salient variables for AWS -- Chapter 9. AWS and targeting -- Chapter 10. Desirability of using AWS. Part V. CRIMINAL LIABILITY -- Chapter 11. Criminal liability: Problem setting -- Chapter 12. Obstacles to criminal liability: a systemic analysis -- Chapter 13. Across the spectrum of intent -- Part VI. CONCLUSIONS -- Chapter 14. Integration and closing -- Appendix -- Index.
Contained By:
Springer Nature eBook
Subject:
Autonomous weapons systems (International law) -
Online resource:
https://doi.org/10.1007/978-94-6265-631-4
ISBN:
9789462656314
Lawfully using autonomous weapon technologies
Kwik, Jonathan.
Lawfully using autonomous weapon technologies
[electronic resource] /by Jonathan Kwik. - The Hague :T.M.C. Asser Press :2024. - xv, 413 p. :ill. (some col.), digital ;24 cm.
Part I. FRAMING THE STUDY -- Chapter 1. Introduction -- Part II. CONTROLLING AWS -- Chapter 2. Controlling AWS: A cyclical process -- Part III. UNDERSTANDING AWS -- Chapter 3. AI fundamentals and the military environment -- Chapter 4. Measures of performance -- Chapter 5. Causes of failure -- Chapter 6. Adversarials: Anti-AI countermeasures -- Part IV. AWS IN THE LEGAL-OPERATIONAL CONTEXT -- Chapter 7. Legal-operational analysis: Introduction -- Chapter 8. Legally-salient variables for AWS -- Chapter 9. AWS and targeting -- Chapter 10. Desirability of using AWS. Part V. CRIMINAL LIABILITY -- Chapter 11. Criminal liability: Problem setting -- Chapter 12. Obstacles to criminal liability: a systemic analysis -- Chapter 13. Across the spectrum of intent -- Part VI. CONCLUSIONS -- Chapter 14. Integration and closing -- Appendix -- Index.
This monograph provides a practical and operational perspective to the question of how to lawfully employ autonomous weapon systems (AWS) from the point-of-view of the technology's end-users: field commanders. While there is international consensus that targeting rules such as proportionality and precautions must be respected when using AWS, there is legal and practical ambiguity as to how to translate this normative commitment into practice. How are commanders in the field, when guns are already blazing, expected to exercise command-and-control when ordering AWS-attacks, and ensure that their targeting obligations remain fulfilled? The book discusses how commanders can use existing targeting frameworks to ensure that their use of AWS remains in compliance with the rules governing the conduct of hostilities. It invites the reader to step into the shoes of the military commander with all the operational pressure and uncertainty inherent to this position, and explores amongst others: - How to maintain control of AWS throughout a targeting cycle; - How to make informed and reasoned deployment decisions by analysing information related to the technical parameters of the AWS, the characteristics of the operational environment, and enemy countermeasures; - Under which circumstances AWS may not be used under targeting rules, such as indiscriminate attack, proportionality and the duty to cancel/suspend; - What extra precautionary measures unique to AWS technology can and should be employed; - When it is militarily desirable to employ AWS over other alternatives; and - Under what circumstances criminal liability may be attributed for AWS-related harm. It offers both academic and practical outputs: new legal and doctrinal insights on the technology that is useful for future legal developments, and workable recommendations and efficient flowcharts that can be adopted by commanders, military organisations or policymakers to ensure IHL-compliant deployment of AWS. Dr. Jonathan Kwik is a researcher at the T.M.C. Asser Institute in The Hague specialised in artificial intelligence and targeting law, and is a member of the Board of Experts of the Asia-Pacific Journal of International Humanitarian Law.
ISBN: 9789462656314
Standard No.: 10.1007/978-94-6265-631-4doiSubjects--Topical Terms:
3723173
Autonomous weapons systems (International law)
LC Class. No.: KZ5645.5.A98
Dewey Class. No.: 341.73
Lawfully using autonomous weapon technologies
LDR
:04046nmm a2200325 a 4500
001
2374365
003
DE-He213
005
20240803130508.0
006
m d
007
cr nn 008maaau
008
241231s2024 ne s 0 eng d
020
$a
9789462656314
$q
(electronic bk.)
020
$a
9789462656307
$q
(paper)
024
7
$a
10.1007/978-94-6265-631-4
$2
doi
035
$a
978-94-6265-631-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
KZ5645.5.A98
072
7
$a
LNJ
$2
bicssc
072
7
$a
LAW000000
$2
bisacsh
072
7
$a
LNJ
$2
thema
082
0 4
$a
341.73
$2
23
090
$a
KZ5645.5.A98
$b
K98 2024
100
1
$a
Kwik, Jonathan.
$3
3723172
245
1 0
$a
Lawfully using autonomous weapon technologies
$h
[electronic resource] /
$c
by Jonathan Kwik.
260
$a
The Hague :
$b
T.M.C. Asser Press :
$b
Imprint: T.M.C. Asser Press,
$c
2024.
300
$a
xv, 413 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Part I. FRAMING THE STUDY -- Chapter 1. Introduction -- Part II. CONTROLLING AWS -- Chapter 2. Controlling AWS: A cyclical process -- Part III. UNDERSTANDING AWS -- Chapter 3. AI fundamentals and the military environment -- Chapter 4. Measures of performance -- Chapter 5. Causes of failure -- Chapter 6. Adversarials: Anti-AI countermeasures -- Part IV. AWS IN THE LEGAL-OPERATIONAL CONTEXT -- Chapter 7. Legal-operational analysis: Introduction -- Chapter 8. Legally-salient variables for AWS -- Chapter 9. AWS and targeting -- Chapter 10. Desirability of using AWS. Part V. CRIMINAL LIABILITY -- Chapter 11. Criminal liability: Problem setting -- Chapter 12. Obstacles to criminal liability: a systemic analysis -- Chapter 13. Across the spectrum of intent -- Part VI. CONCLUSIONS -- Chapter 14. Integration and closing -- Appendix -- Index.
520
$a
This monograph provides a practical and operational perspective to the question of how to lawfully employ autonomous weapon systems (AWS) from the point-of-view of the technology's end-users: field commanders. While there is international consensus that targeting rules such as proportionality and precautions must be respected when using AWS, there is legal and practical ambiguity as to how to translate this normative commitment into practice. How are commanders in the field, when guns are already blazing, expected to exercise command-and-control when ordering AWS-attacks, and ensure that their targeting obligations remain fulfilled? The book discusses how commanders can use existing targeting frameworks to ensure that their use of AWS remains in compliance with the rules governing the conduct of hostilities. It invites the reader to step into the shoes of the military commander with all the operational pressure and uncertainty inherent to this position, and explores amongst others: - How to maintain control of AWS throughout a targeting cycle; - How to make informed and reasoned deployment decisions by analysing information related to the technical parameters of the AWS, the characteristics of the operational environment, and enemy countermeasures; - Under which circumstances AWS may not be used under targeting rules, such as indiscriminate attack, proportionality and the duty to cancel/suspend; - What extra precautionary measures unique to AWS technology can and should be employed; - When it is militarily desirable to employ AWS over other alternatives; and - Under what circumstances criminal liability may be attributed for AWS-related harm. It offers both academic and practical outputs: new legal and doctrinal insights on the technology that is useful for future legal developments, and workable recommendations and efficient flowcharts that can be adopted by commanders, military organisations or policymakers to ensure IHL-compliant deployment of AWS. Dr. Jonathan Kwik is a researcher at the T.M.C. Asser Institute in The Hague specialised in artificial intelligence and targeting law, and is a member of the Board of Experts of the Asia-Pacific Journal of International Humanitarian Law.
650
0
$a
Autonomous weapons systems (International law)
$3
3723173
650
1 4
$a
IT Law, Media Law, Intellectual Property.
$3
3384747
650
2 4
$a
International Humanitarian Law, Law of Armed Conflict.
$3
1566603
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Public International Law.
$3
1566061
650
2 4
$a
International Criminal Law.
$3
1566602
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-94-6265-631-4
950
$a
Law and Criminology (SpringerNature-41177)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9494814
電子資源
11.線上閱覽_V
電子書
EB KZ5645.5.A98
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login