Open Access. Powered by Scholars. Published by Universities.®

Military, War, and Peace Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

UIC John Marshall Journal of Information Technology & Privacy Law

Articles 1 - 6 of 6

Full-Text Articles in Military, War, and Peace

Autonomy Of Military Robots: Assessing The Technical And Legal (“Jus In Bello”) Thresholds, 32 J. Marshall J. Info. Tech. & Privacy L. 57 (2016), Remus Titiriga Jan 2016

Autonomy Of Military Robots: Assessing The Technical And Legal (“Jus In Bello”) Thresholds, 32 J. Marshall J. Info. Tech. & Privacy L. 57 (2016), Remus Titiriga

UIC John Marshall Journal of Information Technology & Privacy Law

While robots are still absent from our homes, they have started to spread over battlefields. However, the military robots of today are mostly remotely controlled platforms, with no real autonomy. This paper will disclose the obstacles in implementing autonomy for such systems by answering a technical question: What level of autonomy is needed in military robots and how and when might it be achieved, followed by a techno-legal one: How to implement the rules of humanitarian law within autonomous fighting robots, in order to allow their legal deployment? The first chapter scrutinizes the significance of autonomy in robots and the …


Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen Jan 2011

Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson Jan 2011

Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


University Research Under Siege: How The War On Terror Has Placed Academic Freedom Under Fire, 26 J. Marshall J. Computer & Info. L. 547 (2009), James Templin Jan 2009

University Research Under Siege: How The War On Terror Has Placed Academic Freedom Under Fire, 26 J. Marshall J. Computer & Info. L. 547 (2009), James Templin

UIC John Marshall Journal of Information Technology & Privacy Law

The Comment analyzes the proposed revisions to United States export regulations contained in the Deemed Export Advisory Committee’s 2007 report. While the Advisory Committee’s work was much needed and its recommendations laudable, this comment discusses why its recommendations must be narrowly tailored in order to preserve the competitiveness of U.S. businesses and universities in the globalizing world and to advance national security. Part II explains the regulations that govern U.S. exports, including the deemed export regulatory regime and how those rules implement a range of national obligations and interests. This Part also discusses the events that threatened to significantly burden …


Safety Vs. Security: How Broad But Selective Public Access To Environmental Data Properly Balances Communities' Safety And Homeland Security, 25 J. Marshall J. Computer & Info. L. 273 (2008), Brad Schweiger Jan 2008

Safety Vs. Security: How Broad But Selective Public Access To Environmental Data Properly Balances Communities' Safety And Homeland Security, 25 J. Marshall J. Computer & Info. L. 273 (2008), Brad Schweiger

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Rights-In-Data Policies Affecting Department Of Defense Acquisition Of Computer Software And Related Products, 9 Computer L.J. 447 (1989), I. Michael Greenberger, Michael S. Kane Jan 1989

Rights-In-Data Policies Affecting Department Of Defense Acquisition Of Computer Software And Related Products, 9 Computer L.J. 447 (1989), I. Michael Greenberger, Michael S. Kane

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.