Searched for: subject%3A%22Weapons%22
(1 - 15 of 15)
document
Verdiesen, E.P. (author), Dignum, M.V. (author)
Ethical concerns on autonomous weapon systems (AWS) call for a process of human oversight to ensure accountability over targeting decisions and the use of force. To align the behavior of autonomous systems with human values and norms, the Design for Values approach can be used to consciously embody values in the deployment of AWS. One instrument...
journal article 2023
document
Verdiesen, E.P. (author)
conference paper 2022
document
Al-Korany, Mays (author)
Redesign of two building on Campus North in the Hembrug, Zaandam area. The design focusses on creating a low-tech and stimulating environment for children. Where parents can have workspaces and maintain a connection with their children (visual and physical).
master thesis 2021
document
Maathuis, E.C. (author)
Cyber Warfare is perceived as a radical shift in the nature of warfare. It can represent a real alternative next to other types of Military Operations to achieve military and/or political goals in front of adversaries. To this end, Cyber Operations use specific technologies i.e. cyber weapons/capabilities/means. With a short but intense history...
doctoral thesis 2020
document
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, Jan (author)
Cyber operations are relatively a new phenomenon of the last two decades. During that period, they have increased in number, complexity, and agility, while their design and development have been processes well kept under secrecy. As a consequence, limited data(sets) regarding these incidents are available. Although various academic and...
journal article 2020
document
Verdiesen, E.P. (author), Santoni De Sio, F. (author), Dignum, M.V. (author)
Accountability and responsibility are key concepts in the academic and societal debate on Autonomous Weapon Systems, but these notions are often used as high-level overarching constructs and are not operationalised to be useful in practice. “Meaningful Human Control” is often mentioned as a requirement for the deployment of Autonomous Weapon...
journal article 2020
document
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, Jan (author)
Cyber Operations stopped being utopia or Sci-Fi based scenarios: they became reality. When planning and conducting them, military actors encounter difficulties since they lack methodologies and models that support their actions and assess their effects. To address these issues by tackling the underlying scientific and practical gap, this...
conference paper 2019
document
Broekhuizen, Joost (author)
Current Ballistic Missile (BM) defence systems intercept an incoming threat in its terminal phase, and to some extend during its coast phase. During the boost phase of a BM, the initial velocity of the BM is low and the hot exhaust plume is easy to spot for infrared sensors, which provides a good opportunity for interception. To do so, the...
master thesis 2018
document
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, Jan (author)
Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors. To...
journal article 2018
document
Santoni De Sio, F. (author), van den Hoven, M.J. (author)
Debates on lethal autonomous weapon systems have proliferated in the past 5 years. Ethical concerns have been voiced about a possible raise in the number of wrongs and crimes in military operations and about the creation of a “responsibility gap” for harms caused by these systems. To address these concerns, the principle of “meaningful human...
journal article 2018
document
Verdiesen, E.P. (author)
As the reach and capabilities of Artificial Intelligence (AI) systems increases, there is also a growing awareness of the ethical, legal and societal impact of the potential actions and decisions of these systems. Many are calling for guidelines and regulations that can ensure the responsible design, development, implementation, and policy of...
conference paper 2018
document
Verdiesen, Ilse (author)
The purpose of this empirical study is to gain insight in how Autonomous Weapons are perceived by the general public and the military and which moral values they consider important when Autonomous Weapons are deployed in the near future. The Value-Sensitive Design method is used to structure the study. This thesis proposes a design for a Moral...
master thesis 2017
document
Carrer, L. (author)
In the last years, there has been a renewed interest in security applications designed to detect potentially dangerous concealed object carried by an individual. In particular automatic detection and classification of concealed weapons is a fundamental part of every surveillance system.Until now merely all the research in image processing for...
master thesis 2012
document
Pasqua, E. (author)
Current methods for concealed weapon detection are mainly used at stationary security check-points due to complexity and other serious limitations for real-time outdoor scenarios. A mobile imaging radar is considered as a proper solution for fast screening of people at mass events because of its ability to detect both metal and non-metal weapons...
master thesis 2012
document
Van der Bruggen, K. (author)
Due to the terrorist attacks of 9/11 and the anthrax letters of a few weeks later, the concept of dual use has spread widely in the life sciences during the past decade. This article is aimed at a clarification of the dual use concept and its scope of application for the life sciences. Such a clarification would greatly facilitate the work of...
journal article 2011
Searched for: subject%3A%22Weapons%22
(1 - 15 of 15)