Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Adjudication (1)
- Artificial intelligence (1)
- Automation (1)
- Computer science (1)
- Criminal justice (1)
-
- Critical Infrastructure Assurance (1)
- Cyber Security (1)
- Cyber security (1)
- Defense (1)
- EMI/EMC Protection (1)
- EMP Commission (1)
- Education (1)
- Information Warfare (1)
- Information security (1)
- Information systems (1)
- Infrastructure Assurance (1)
- Infrastructure Modeling (1)
- Infrastructure Protection (1)
- Intentional EMI (1)
- Law & Robotics (1)
- Law, Science & Technology (1)
- Liability (1)
- Networked Robotics (1)
- Prosecution (1)
- Robot Safety (1)
- System Effects and Hardening (1)
- System Vulnerabilities (1)
- Terrorism (1)
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Should Robots Prosecute And Defend?, Stephen E. Henderson
Should Robots Prosecute And Defend?, Stephen E. Henderson
Stephen E Henderson
The Digital Dionysus: Nietzsche & The Network-Centric Condition
The Digital Dionysus: Nietzsche & The Network-Centric Condition
Dan Mellamphy
No abstract provided.
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
Maurice Dawson
Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
Yueh-Hsuan Weng
Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves
Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves
Carol A. Watson
Discusses the role of librarians in law school technology management and analyzes technology staffing survey results for 2002, 2006, and 2010. While survey results indicate a trend toward establishing separate information technology departments within law schools, librarians are and will continue to be actively involved in law school technology.
Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham
Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham
George H Baker
The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …