Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Law and technology (2)
- National security (2)
- Privacy (2)
- AI (1)
- Armed conflict (1)
-
- Artificial intelligence (1)
- Clapper (1)
- Cyberattacks (1)
- Cyberlaw (1)
- Data privacy (1)
- Data privacy protection (1)
- Data-breach (1)
- Domestic law (1)
- Heightened risk of injury (1)
- Heightened-risk-of-identity-theft (1)
- Identity theft (1)
- Law and science (1)
- National security law (1)
- Personal data (1)
- Remijas (1)
- Social media (1)
- Substantial risk (1)
- Technology (1)
- The Article III standing (1)
- Use of force (1)
Articles 1 - 7 of 7
Full-Text Articles in Law
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
American University National Security Law Brief
Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
American University National Security Law Brief
Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …
Leveraging Domestic Law Against Cyberattacks, Justin Malzac
Leveraging Domestic Law Against Cyberattacks, Justin Malzac
American University National Security Law Brief
No abstract provided.
Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou
Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou
American University National Security Law Brief
No abstract provided.
The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard
The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard
American University National Security Law Brief
No abstract provided.
The Law Of Armed Conflict, Unconventional Warfare, And Cyber Attacks, Thomas P. Jordan
The Law Of Armed Conflict, Unconventional Warfare, And Cyber Attacks, Thomas P. Jordan
American University National Security Law Brief
No abstract provided.
Applying The Law Of Neutrality While Transitioning The Seas Of Cyberspace, Danielle Higson
Applying The Law Of Neutrality While Transitioning The Seas Of Cyberspace, Danielle Higson
American University National Security Law Brief
No abstract provided.