小心电脑

IF 0.3 Q3 LAW
S. McKenzie, Eve Massingham
{"title":"小心电脑","authors":"S. McKenzie, Eve Massingham","doi":"10.1163/18781527-bja10036","DOIUrl":null,"url":null,"abstract":"\nThe obligations of international humanitarian law are not limited to the attacker; the defender is also required to take steps to protect civilians from harm. The requirement to take precautions against the effects of attack requires the defender to minimize the risk that civilians and civilian objects will be harmed by enemy military operations. At its most basic, it obliges defenders to locate military installations away from civilians. Furthermore, where appropriate, the status of objects should be clearly marked. It is – somewhat counterintuitively – about making it easier for the attacker to select lawful targets by making visible the distinction between civilian objects and military objectives.\nThe increasing importance of digital infrastructure to modern life may make complying with these precautionary obligations more complicated. Maintaining separation between military and civilian networks is challenging as both operate using at least some of the same infrastructure, relying on the same cables, systems, and electromagnetic spectrum. In addition, the speed at which operations against digital infrastructure can occur increases the difficulty of complying with the obligation – particularly if such operations involve a degree of automation or the use of artificial intelligence (ai).\nThis paper sets out the source and extent of the obligation to take precautions against hostile military operations and considers how they might apply to digital infrastructure. As well as clarifying the extent of the obligation, it applies the obligation to take precautions against hostile military operations to digital infrastructure, giving examples of where systems designers are taking these obligations into account, and other examples of where they must.","PeriodicalId":41905,"journal":{"name":"Journal of International Humanitarian Legal Studies","volume":" ","pages":""},"PeriodicalIF":0.3000,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Taking Care Against the Computer\",\"authors\":\"S. McKenzie, Eve Massingham\",\"doi\":\"10.1163/18781527-bja10036\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\nThe obligations of international humanitarian law are not limited to the attacker; the defender is also required to take steps to protect civilians from harm. The requirement to take precautions against the effects of attack requires the defender to minimize the risk that civilians and civilian objects will be harmed by enemy military operations. At its most basic, it obliges defenders to locate military installations away from civilians. Furthermore, where appropriate, the status of objects should be clearly marked. It is – somewhat counterintuitively – about making it easier for the attacker to select lawful targets by making visible the distinction between civilian objects and military objectives.\\nThe increasing importance of digital infrastructure to modern life may make complying with these precautionary obligations more complicated. Maintaining separation between military and civilian networks is challenging as both operate using at least some of the same infrastructure, relying on the same cables, systems, and electromagnetic spectrum. In addition, the speed at which operations against digital infrastructure can occur increases the difficulty of complying with the obligation – particularly if such operations involve a degree of automation or the use of artificial intelligence (ai).\\nThis paper sets out the source and extent of the obligation to take precautions against hostile military operations and considers how they might apply to digital infrastructure. As well as clarifying the extent of the obligation, it applies the obligation to take precautions against hostile military operations to digital infrastructure, giving examples of where systems designers are taking these obligations into account, and other examples of where they must.\",\"PeriodicalId\":41905,\"journal\":{\"name\":\"Journal of International Humanitarian Legal Studies\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.3000,\"publicationDate\":\"2021-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of International Humanitarian Legal Studies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1163/18781527-bja10036\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"LAW\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of International Humanitarian Legal Studies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1163/18781527-bja10036","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"LAW","Score":null,"Total":0}
引用次数: 0

摘要

国际人道主义法的义务不仅限于袭击者;辩护人还必须采取措施保护平民免受伤害。防范攻击影响的要求要求防御者将平民和民用物体受到敌方军事行动伤害的风险降至最低。最基本的是,它要求捍卫者将军事设施安置在远离平民的地方。此外,在适当情况下,应清楚地标明物体的状态。这有点违反直觉,是为了让攻击者更容易通过区分民用物体和军事目标来选择合法目标。数字基础设施对现代生活越来越重要,这可能会使遵守这些预防义务变得更加复杂。保持军事和民用网络之间的分离是一项挑战,因为两者都使用至少一些相同的基础设施,依赖于相同的电缆、系统和电磁频谱。此外针对数字基础设施的行动发生的速度增加了履行义务的难度,尤其是在此类行动涉及一定程度的自动化或人工智能的情况下。本文阐述了对敌对军事行动采取预防措施的义务的来源和范围,并考虑了这些义务如何适用于数字基础设施。除了澄清该义务的范围外,它还将对敌对军事行动采取预防措施的义务适用于数字基础设施,并举例说明系统设计者在哪些方面考虑了这些义务,以及在哪些方面必须考虑这些义务。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Taking Care Against the Computer
The obligations of international humanitarian law are not limited to the attacker; the defender is also required to take steps to protect civilians from harm. The requirement to take precautions against the effects of attack requires the defender to minimize the risk that civilians and civilian objects will be harmed by enemy military operations. At its most basic, it obliges defenders to locate military installations away from civilians. Furthermore, where appropriate, the status of objects should be clearly marked. It is – somewhat counterintuitively – about making it easier for the attacker to select lawful targets by making visible the distinction between civilian objects and military objectives. The increasing importance of digital infrastructure to modern life may make complying with these precautionary obligations more complicated. Maintaining separation between military and civilian networks is challenging as both operate using at least some of the same infrastructure, relying on the same cables, systems, and electromagnetic spectrum. In addition, the speed at which operations against digital infrastructure can occur increases the difficulty of complying with the obligation – particularly if such operations involve a degree of automation or the use of artificial intelligence (ai). This paper sets out the source and extent of the obligation to take precautions against hostile military operations and considers how they might apply to digital infrastructure. As well as clarifying the extent of the obligation, it applies the obligation to take precautions against hostile military operations to digital infrastructure, giving examples of where systems designers are taking these obligations into account, and other examples of where they must.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
1.50
自引率
11.10%
发文量
16
期刊介绍: The Journal of International Humanitarian Legal Studies is a peer reviewed journal aimed at promoting the rule of law in humanitarian emergency situations and, in particular, the protection and assistance afforded to persons in the event of armed conflicts and natural disasters in all phases and facets under international law. The Journal welcomes submissions in the areas of international humanitarian law, international human rights law, international refugee law and international law relating to disaster response. In addition, other areas of law can be identified including, but not limited to the norms regulating the prevention of humanitarian emergency situations, the law concerning internally displaced persons, arms control and disarmament law, legal issues relating to human security, and the implementation and enforcement of humanitarian norms. The Journal´s objective is to further the understanding of these legal areas in their own right as well as in their interplay. The Journal encourages writing beyond the theoretical level taking into account the practical implications from the perspective of those who are or may be affected by humanitarian emergency situations. The Journal aims at and seeks the perspective of academics, government and organisation officials, military lawyers, practitioners working in the humanitarian (legal) field, as well as students and other individuals interested therein.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信