无法破译 发表于 2025-3-25 04:01:41

https://doi.org/10.1007/978-1-4939-2178-2re us to question the basic tenets of twentieth-century criminal law and are triggered by the interplay of intense data acquisition and management and the intense merging of law enforcement and national security fields. Traditional criminal law models rest on the tenets of personal responsibility an

FUME 发表于 2025-3-25 09:29:50

http://reply.papertrans.cn/17/1665/166468/166468_22.png

真繁荣 发表于 2025-3-25 13:40:34

Supply Chain Risk Management and Resilienceticular, the term . draws attention to how borders become porous, legal mechanisms ineffective, and, accountability and responsibility obfuscated. Three proto-case studies are presented that highlight different aspects on how diffuse disciplining can be observed. These case studies (USA, China, Irel

Certainty 发表于 2025-3-25 17:22:44

https://doi.org/10.1007/978-3-030-72331-6979 revolution and the threat of automating such controlling measures. The research defines the forceful implementation of compulsory hijab as a case of spatial injustice, since it regulates, bars, and controls women’s access to public spaces. It applies the theory of abnormal justice to analyze the

俗艳 发表于 2025-3-25 22:55:57

http://reply.papertrans.cn/17/1665/166468/166468_25.png

Soliloquy 发表于 2025-3-26 03:58:29

Factory Planning and Process Design, the US military, the chapter aims to show that, despite the introduction of artificial intelligence for object recognition and metadata analysis into the target selection process, the overbroad target selection criteria used by the US military prevent the establishment of a target selection process

善于骗人 发表于 2025-3-26 06:24:27

Book 2021d military operations at the national and international level. The book examines the ways in which automated systems are beneficial to society, while addressing the risks they represent for human rights...This book starts with a historical overview of how different types of knowledge have transforme

矛盾 发表于 2025-3-26 11:43:42

https://doi.org/10.1007/978-3-322-81407-4ent, and illustrate the life cycle of data in the case of predictive policing. We show how data come into being, how they are selected and cleaned, how they multiply in distinct database systems and according to different logics of speed and urgency and how they inform the workings of algorithms.

种类 发表于 2025-3-26 12:54:02

Operations and Supply Chain Strategyring the detention procedure. Judges should therefore not be scared of being replaced by a computer program. They would remain the . of the detention procedure while the computer program would only be considered as a tool to provide objectified risk assessment results.

conjunctiva 发表于 2025-3-26 18:29:34

Information In-Formation: Algorithmic Policing and the Life of Dataent, and illustrate the life cycle of data in the case of predictive policing. We show how data come into being, how they are selected and cleaned, how they multiply in distinct database systems and according to different logics of speed and urgency and how they inform the workings of algorithms.
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Automating Crime Prevention, Surveillance, and Military Operations; Aleš Završnik,Vasja Badalič Book 2021 The Editor(s) (if applicable) an