Lawfully Using Autonomous Weapon Technologies
T.M.C. Asser Press (Verlag)
978-94-6265-630-7 (ISBN)
The book discusses how commanders can use existing targeting frameworks to ensure that their use of AWS remains in compliance with the rules governing the conduct of hostilities. It invites the reader to step into the shoes of the military commander with all the operational pressure and uncertainty inherent to this position, and explores amongst others:
- How to maintain control of AWS throughout a targeting cycle;
- How to make informed and reasoned deployment decisions by analysing information related to the technical parameters of the AWS, the characteristics of the operational environment, and enemy countermeasures;
- Under which circumstances AWS may not be used under targeting rules, such as indiscriminate attack, proportionality and the duty to cancel/suspend;
- What extra precautionary measures unique to AWS technology can and should be employed;
- When it is militarily desirable to employ AWS over other alternatives; and
- Under what circumstances criminal liability may be attributed for AWS-related harm.
It offers both academic and practical outputs: new legal and doctrinal insights on the technology that is useful for future legal developments, and workable recommendations and efficient flowcharts that can be adopted by commanders, military organisations or policymakers to ensure IHL-compliant deployment of AWS.
Dr. Jonathan Kwik is a researcher at the T.M.C. Asser Institute in The Hague specialised in artificial intelligence and targeting law, and is a member of the Board of Experts of the Asia-Pacific Journal of International Humanitarian Law.
Part I. FRAMING THE STUDY.- Chapter 1. Introduction.- Part II. CONTROLLING AWS.- Chapter 2. Controlling AWS: A cyclical process.- Part III. UNDERSTANDING AWS.- Chapter 3. AI fundamentals and the military environment.- Chapter 4. Measures of performance.- Chapter 5. Causes of failure.- Chapter 6. Adversarials: Anti-AI countermeasures.- Part IV. AWS IN THE LEGAL-OPERATIONAL CONTEXT.- Chapter 7. Legal-operational analysis: Introduction.- Chapter 8. Legally-salient variables for AWS.- Chapter 9. AWS and targeting.- Chapter 10. Desirability of using AWS. Part V. CRIMINAL LIABILITY.- Chapter 11. Criminal liability: Problem setting.- Chapter 12. Obstacles to criminal liability: a systemic analysis.- Chapter 13. Across the spectrum of intent.- Part VI. CONCLUSIONS.- Chapter 14. Integration and closing.- Appendix.- Index.
Erscheinungsdatum | 06.08.2024 |
---|---|
Zusatzinfo | 25 Illustrations, color; 18 Illustrations, black and white; XV, 413 p. 43 illus., 25 illus. in color. |
Verlagsort | The Hague |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik |
Recht / Steuern ► EU / Internationales Recht | |
Recht / Steuern ► Öffentliches Recht ► Völkerrecht | |
Recht / Steuern ► Privatrecht / Bürgerliches Recht ► Medienrecht | |
Recht / Steuern ► Strafrecht | |
Schlagworte | Autonomous weapon system • Black Box • countermeasure • Criminal Liability • Indiscriminate • machine learning • Obligations in attack • Proportionality • responsibility gap • Targeting |
ISBN-10 | 94-6265-630-4 / 9462656304 |
ISBN-13 | 978-94-6265-630-7 / 9789462656307 |
Zustand | Neuware |
Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich