Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Air and Space Law (1)
- American Politics (1)
- Artificial Intelligence and Robotics (1)
- Arts and Humanities (1)
- Collection Development and Management (1)
-
- Comparative and Foreign Law (1)
- Computer Sciences (1)
- Constitutional Law (1)
- Defense and Security Studies (1)
- History (1)
- Human Rights Law (1)
- Information Literacy (1)
- International Relations (1)
- Internet Law (1)
- Legal Studies (1)
- Legislation (1)
- Library and Information Science (1)
- Military History (1)
- Military and Veterans Studies (1)
- Peace and Conflict Studies (1)
- Physical Sciences and Mathematics (1)
- Political History (1)
- Political Science (1)
- President/Executive Department (1)
- Public Administration (1)
- Institution
Articles 1 - 2 of 2
Full-Text Articles in Computer Law
Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman
Libraries Faculty and Staff Scholarship and Research
This article emphasizes the increasing importance of artificial intelligence (AI) in military and national security policy making. It seeks to inform interested individuals about the proliferation of publicly accessible U.S. government and military literature on this multifaceted topic. An additional objective of this endeavor is encouraging greater public awareness of and participation in emerging public policy debate on AI's moral and national security implications..
Cyberattacks And The Constitution, Matthew C. Waxman
Cyberattacks And The Constitution, Matthew C. Waxman
Faculty Scholarship
Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.