找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Automating Crime Prevention, Surveillance, and Military Operations; Aleš Završnik,Vasja Badalič Book 2021 The Editor(s) (if applicable) an

[复制链接]
楼主: 无缘无故
发表于 2025-3-25 04:01:41 | 显示全部楼层
https://doi.org/10.1007/978-1-4939-2178-2re us to question the basic tenets of twentieth-century criminal law and are triggered by the interplay of intense data acquisition and management and the intense merging of law enforcement and national security fields. Traditional criminal law models rest on the tenets of personal responsibility an
发表于 2025-3-25 09:29:50 | 显示全部楼层
发表于 2025-3-25 13:40:34 | 显示全部楼层
Supply Chain Risk Management and Resilienceticular, the term . draws attention to how borders become porous, legal mechanisms ineffective, and, accountability and responsibility obfuscated. Three proto-case studies are presented that highlight different aspects on how diffuse disciplining can be observed. These case studies (USA, China, Irel
发表于 2025-3-25 17:22:44 | 显示全部楼层
https://doi.org/10.1007/978-3-030-72331-6979 revolution and the threat of automating such controlling measures. The research defines the forceful implementation of compulsory hijab as a case of spatial injustice, since it regulates, bars, and controls women’s access to public spaces. It applies the theory of abnormal justice to analyze the
发表于 2025-3-25 22:55:57 | 显示全部楼层
发表于 2025-3-26 03:58:29 | 显示全部楼层
Factory Planning and Process Design, the US military, the chapter aims to show that, despite the introduction of artificial intelligence for object recognition and metadata analysis into the target selection process, the overbroad target selection criteria used by the US military prevent the establishment of a target selection process
发表于 2025-3-26 06:24:27 | 显示全部楼层
Book 2021d military operations at the national and international level. The book examines the ways in which automated systems are beneficial to society, while addressing the risks they represent for human rights...This book starts with a historical overview of how different types of knowledge have transforme
发表于 2025-3-26 11:43:42 | 显示全部楼层
https://doi.org/10.1007/978-3-322-81407-4ent, and illustrate the life cycle of data in the case of predictive policing. We show how data come into being, how they are selected and cleaned, how they multiply in distinct database systems and according to different logics of speed and urgency and how they inform the workings of algorithms.
发表于 2025-3-26 12:54:02 | 显示全部楼层
Operations and Supply Chain Strategyring the detention procedure. Judges should therefore not be scared of being replaced by a computer program. They would remain the . of the detention procedure while the computer program would only be considered as a tool to provide objectified risk assessment results.
发表于 2025-3-26 18:29:34 | 显示全部楼层
Information In-Formation: Algorithmic Policing and the Life of Dataent, and illustrate the life cycle of data in the case of predictive policing. We show how data come into being, how they are selected and cleaned, how they multiply in distinct database systems and according to different logics of speed and urgency and how they inform the workings of algorithms.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-13 12:09
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表