Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Robotics (2)
- AI (1)
- Adjudication (1)
- Artificial intelligence (1)
- Automation (1)
-
- Computer law (1)
- Computer science (1)
- Criminal justice (1)
- Critical Infrastructure Assurance (1)
- Cyber Security (1)
- Cyber security (1)
- Defense (1)
- Drone (1)
- EMI/EMC Protection (1)
- EMP Commission (1)
- Education (1)
- IT Law (1)
- Information Warfare (1)
- Information security (1)
- Information systems (1)
- Infrastructure Assurance (1)
- Infrastructure Modeling (1)
- Infrastructure Protection (1)
- Innovation (1)
- Intentional EMI (1)
- Internet Governance (1)
- Inventive Problem Solving (1)
- Law & Robotics (1)
- Law, Science & Technology (1)
- Liability (1)
- Publication Year
Articles 1 - 10 of 10
Full-Text Articles in Computer Engineering
Should Robots Prosecute And Defend?, Stephen E. Henderson
Should Robots Prosecute And Defend?, Stephen E. Henderson
Stephen E Henderson
The Digital Dionysus: Nietzsche & The Network-Centric Condition
The Digital Dionysus: Nietzsche & The Network-Centric Condition
Dan Mellamphy
No abstract provided.
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
Maurice Dawson
Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …
The Application Of Traditional Tort Theory To Embodied Machine Intelligence, Curtis E.A. Karnow
The Application Of Traditional Tort Theory To Embodied Machine Intelligence, Curtis E.A. Karnow
Curtis E.A. Karnow
This note discusses the traditional tort theories of liability such as negligence and strict liability and suggests these are likely insufficient to impose liability on legal entities (people and companies) selling or employing autonomous robots. I provide the essential working definitions of ‘autonomous’ as well as the legal notion of ‘foreseeability’ which lies at the heart of tort liability. The note is not concerned with the policy, ethics, or other issues arising from the use of robots including armed and unarmed drones, because those, as I define them, are not currently autonomous, and do not implicate the legal issues I …
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
Yueh-Hsuan Weng
Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves
Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves
Carol A. Watson
Discusses the role of librarians in law school technology management and analyzes technology staffing survey results for 2002, 2006, and 2010. While survey results indicate a trend toward establishing separate information technology departments within law schools, librarians are and will continue to be actively involved in law school technology.
Public Consultations On Net Neutrality 2010: Usa, Eu And France, Sulan Wong, Julio Rojas Mora, Eitan Altman
Public Consultations On Net Neutrality 2010: Usa, Eu And France, Sulan Wong, Julio Rojas Mora, Eitan Altman
Julio Rojas-Mora
The evolution of the Internet has come to a point where almost at the same time, governments all around the world feel the need for legislation to regulate the use of the Internet. In preparing the legislation, consultations were called by various governments or by the corresponding regulation bodies. We describe in this paper the various consultations as well as the background related to the Net Neutrality question in each case. Rather than describing the answers to each consultation, which are available and which have already been analyzed, we focus on comparing the consultations and the statistical figures related to …
Safety Intelligence And Legal Machine Language: Do We Need Three Laws Of Robotics?, Chien Hsun Chen, Y. H. Weng, C. T. Sun
Safety Intelligence And Legal Machine Language: Do We Need Three Laws Of Robotics?, Chien Hsun Chen, Y. H. Weng, C. T. Sun
Chien Hsun Chen
In this chapter we will describe a legal framework for Next Generation Robots (NGRs) that has safety as its central focus. The framework is offered in response to the current lack of clarity regarding robot safety guidelines, despite the development and impending release of tens of thousands of robots into workplaces and homes around the world. We also describe our proposal for a safety intelligence (SI) concept that addresses issues associated with open texture risk for robots that will have a relatively high level of autonomy in their interactions with humans. Whereas Isaac Asimov’s Three Laws of Robotics are frequently …
Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham
Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham
George H Baker
The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …
Patentability Of Software Inventions, Umakant Mishra
Patentability Of Software Inventions, Umakant Mishra
Umakant Mishra
Software is very expensive to develop but very inexpensive to copy. Just by copying a software you create an exact duplicate of the original software and all with the same functionality. There is no difference between the original (which is bought) and the copy (pirated). The worse is when the source code is copied. The copier can even claim to have developed the software where the credit of the developer might go. The software developers use various methods to protect their source code such as copyright, trade secrets etc. but each having limitations. The developers are keen on finding legal …