Open Access. Powered by Scholars. Published by Universities.®
- Publication
Articles 1 - 2 of 2
Full-Text Articles in Law
Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman
Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman
Faculty Scholarship
An international public debate over the law and ethics of autonomous weapon systems (AWS) has been underway since 2012, with those urging legal regulation of AWS under existing principles and requirements of the international law of armed conflict, on the one side, in argument with opponents who favor, instead, a preemptive international treaty ban on all such weapons, on the other. This Chapter provides an introduction to this international debate, offering the main arguments on each side. These include disputes over defining an AWS, the morality and law of automated targeting and target selection by machine, and the interaction of …
Cybersecurity Stovepiping, David Thaw
Cybersecurity Stovepiping, David Thaw
Articles
Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.
This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …