Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Lawfully Using Autonomous Weapon Technologies (eBook)


ISBN13: 9789462656314
Published: August 2024
Publisher: T.M.C. Asser Press
Country of Publication: Netherlands
Format: eBook (ePub)
Price: £139.50
The amount of VAT charged may change depending on your location of use.


The sale of some eBooks are restricted to certain countries. To alert you to such restrictions, please select the country of the billing address of your credit or debit card you wish to use for payment.

Billing Country:


Sale prohibited in
Korea, [North] Democratic Peoples Republic Of

Due to publisher restrictions, international orders for ebooks may need to be confirmed by our staff during shop opening hours. Our trading hours are Monday to Friday, 8.30am to 5.00pm, London, UK time.


The device(s) you use to access the eBook content must be authorized with an Adobe ID before you download the product otherwise it will fail to register correctly.

For further information see https://www.wildy.com/ebook-formats


Once the order is confirmed an automated e-mail will be sent to you to allow you to download the eBook.

All eBooks are supplied firm sale and cannot be returned. If you believe there is a fault with your eBook then contact us on ebooks@wildy.com and we will help in resolving the issue. This does not affect your statutory rights.

This eBook is available in the following formats: ePub.

In stock.
Need help with ebook formats?




Also available as

This monograph provides a practical and operational perspective to the question of how to lawfully employ autonomous weapon systems (AWS) from the point-of-view of the technology's end-users: field commanders. While there is international consensus that targeting rules such as proportionality and precautions must be respected when using AWS, there is legal and practical ambiguity as to how to translate this normative commitment into practice. How are commanders in the field, when guns are already blazing, expected to exercise command-and-control when ordering AWS-attacks, and ensure that their targeting obligations remain fulfilled?

The book discusses how commanders can use existing targeting frameworks to ensure that their use of AWS remains in compliance with the rules governing the conduct of hostilities. It invites the reader to step into the shoes of the military commander with all the operational pressure and uncertainty inherent to this position, and explores amongst others:

  • How to maintain control of AWS throughout a targeting cycle
  • How to make informed and reasoned deployment decisions by analysing information related to the technical parameters of the AWS, the characteristics of the operational environment, and enemy countermeasures
  • Under which circumstances AWS may not be used under targeting rules, such as indiscriminate attack, proportionality and the duty to cancel/suspend
  • What extra precautionary measures unique to AWS technology can and should be employed
  • When it is militarily desirable to employ AWS over other alternatives; and
  • Under what circumstances criminal liability may be attributed for AWS-related harm

It offers both academic and practical outputs: new legal and doctrinal insights on the technology that is useful for future legal developments, and workable recommendations and efficient flowcharts that can be adopted by commanders, military organisations or policymakers to ensure IHL-compliant deployment of AWS.

Subjects:
Public International Law, eBooks
Contents:
Part I. FRAMING THE STUDY
Chapter 1. Introduction

Part II. CONTROLLING AWS
Chapter 2. Controlling AWS: A cyclical process

Part III. UNDERSTANDING AWS
Chapter 3. AI fundamentals and the military environment.- Chapter 4. Measures of performance.- Chapter 5. Causes of failure.- Chapter 6. Adversarials: Anti-AI countermeasures

Part IV. AWS IN THE LEGAL-OPERATIONAL CONTEXT
Chapter 7. Legal-operational analysis: Introduction.- Chapter 8. Legally-salient variables for AWS.- Chapter 9. AWS and targeting.- Chapter 10. Desirability of using AWS

Part V. CRIMINAL LIABILITY
Chapter 11. Criminal liability: Problem setting.- Chapter 12. Obstacles to criminal liability: a systemic analysis.- Chapter 13. Across the spectrum of intent

Part VI. CONCLUSIONS
Chapter 14. Integration and closing

Appendix
Index