Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Military, War, and Peace
Autonomy Of Military Robots: Assessing The Technical And Legal (“Jus In Bello”) Thresholds, 32 J. Marshall J. Info. Tech. & Privacy L. 57 (2016), Remus Titiriga
Autonomy Of Military Robots: Assessing The Technical And Legal (“Jus In Bello”) Thresholds, 32 J. Marshall J. Info. Tech. & Privacy L. 57 (2016), Remus Titiriga
UIC John Marshall Journal of Information Technology & Privacy Law
While robots are still absent from our homes, they have started to spread over battlefields. However, the military robots of today are mostly remotely controlled platforms, with no real autonomy. This paper will disclose the obstacles in implementing autonomy for such systems by answering a technical question: What level of autonomy is needed in military robots and how and when might it be achieved, followed by a techno-legal one: How to implement the rules of humanitarian law within autonomous fighting robots, in order to allow their legal deployment? The first chapter scrutinizes the significance of autonomy in robots and the …
Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson
Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
University Research Under Siege: How The War On Terror Has Placed Academic Freedom Under Fire, 26 J. Marshall J. Computer & Info. L. 547 (2009), James Templin
UIC John Marshall Journal of Information Technology & Privacy Law
The Comment analyzes the proposed revisions to United States export regulations contained in the Deemed Export Advisory Committee’s 2007 report. While the Advisory Committee’s work was much needed and its recommendations laudable, this comment discusses why its recommendations must be narrowly tailored in order to preserve the competitiveness of U.S. businesses and universities in the globalizing world and to advance national security. Part II explains the regulations that govern U.S. exports, including the deemed export regulatory regime and how those rules implement a range of national obligations and interests. This Part also discusses the events that threatened to significantly burden …
Safety Vs. Security: How Broad But Selective Public Access To Environmental Data Properly Balances Communities' Safety And Homeland Security, 25 J. Marshall J. Computer & Info. L. 273 (2008), Brad Schweiger
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Rights-In-Data Policies Affecting Department Of Defense Acquisition Of Computer Software And Related Products, 9 Computer L.J. 447 (1989), I. Michael Greenberger, Michael S. Kane
Rights-In-Data Policies Affecting Department Of Defense Acquisition Of Computer Software And Related Products, 9 Computer L.J. 447 (1989), I. Michael Greenberger, Michael S. Kane
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.