File #2815: "2020_Book_AviationInTheDigitalAge.pdf"

2020_Book_AviationInTheDigitalAge.pdf

Testo

1|Preface|5
1|Contents|9
1|Chapter 1: Aerospace and Its Limits|12
2|1.1 Introduction|12
2|1.2 Jurisdictional Issues|14
2|1.3 Aerospace and Cyberspace|19
2|References|23
1|Chapter 2: International Aviation and Megatrends|24
2|2.1 Introduction|24
2|2.2 The Global Economy|26
2|2.3 Scope of Air Transport|29
2|2.4 Innovative Technology|31
2|2.5 Rapid Urbanization|38
2|2.6 Demographic Change|40
2|2.7 Environmental Protection/Climate Change|42
2|2.8 Global Connectivity|49
2|2.9 Conclusion|52
2|References|53
1|Chapter 3: The Digital Age|54
2|3.1 Introduction|54
2|3.2 Augmented Reality|55
2|3.3 Artificial Intelligence|58
3|3.3.1 Technical Issues|60
3|3.3.2 Ethical Issues|62
2|References|65
1|Chapter 4: International Law in the Digital Age|66
2|4.1 Introduction|66
2|4.2 The Digital World and International Law|68
3|4.2.1 The Inflexion Point|68
3|4.2.2 ICAO at the Inflexion Point|69
4|4.2.2.1 Recognizing the Problem|71
4|4.2.2.2 The Resolutions|72
5|Air Navigation|72
5|Air Transport|74
5|Aviation Security|76
5|Safety|79
5|Aviation and Climate Change|79
5|Resource Mobilization|80
5|What ICAO Must Do|81
5|Methodology Suggested|82
5|Concluding Suggestions|83
2|References|84
1|Chapter 5: Digital Crisis and the Boeing 737 MAX 8 Aircraft|85
2|5.1 Introduction|85
2|5.2 Ramifications of the Grounding of the MAX 8|87
2|5.3 Regulatory Aspects of Airworthiness|89
2|5.4 Liability Issues|93
3|5.4.1 General Principles|93
3|5.4.2 Manufacturing Defects|95
3|5.4.3 Breach of Contract|96
3|5.4.4 Design Defects|98
3|5.4.5 Failure to Warn|102
3|5.4.6 Air Carrier Liability|108
2|5.5 Responsibilities of the State as Regulator|110
2|5.6 Liability of Boeing|114
2|5.7 Conclusion|117
1|Chapter 6: Blockchain and Aviation|118
2|6.1 Introduction|118
2|6.2 Blockchain and Airlines|121
2|6.3 Blockchain and Airports|122
2|6.4 Traveller Identity and Cyber Security|123
2|6.5 United Nations Initiatives and State Responsibility|124
2|6.6 Conclusion|128
2|References|129
1|Chapter 7: Drones|130
2|7.1 Introduction|130
2|7.2 ICAO Guidelines|132
3|7.2.1 The Manual|132
3|7.2.2 Application of Annex 2 to The Chicago Convention|136
3|7.2.3 Human v. Digital|140
2|Reference|141
1|Chapter 8: The Chicago Convention in the Digital World|142
2|8.1 State Sovereignty|142
2|8.2 Article 3 bis|146
2|8.3 Article 4|148
2|8.4 Article 8|151
2|8.5 Article 13|151
2|8.6 Article 29|154
2|References|158
1|Chapter 9: Aviation and Telecommunications in the Digital World|159
2|9.1 Introduction|159
2|9.2 Annex 10 (Aeronautical Communications)|162
3|9.2.1 Authorized and Unauthorized Access|162
3|9.2.2 Acceptance and Transmission and Delivery of Messages|167
2|9.3 Annex 11: Air Traffic Services|169
2|9.4 Annex 15: Aeronautical Information Services|174
2|9.5 Some Concluding Remarks|176
2|References|179
1|Chapter 10: Aviation and Cybersecurity in the Digital World|180
2|10.1 Introduction|180
3|10.1.1 ICAO´S Work|180
3|10.1.2 Work of the United Nations|183
4|10.1.2.1 Resolution 2309|183
4|10.1.2.2 Resolution 2395|185
4|10.1.2.3 Resolution 2396|187
4|10.1.2.4 General United Nations Resolutions|190
4|10.1.2.5 The Budapest Convention on Cybercrime of 2001|199
4|10.1.2.6 Legal Aspects of Cybersecurity|200
2|10.2 United States Law|204
2|10.3 European Law|210
2|10.4 Canada|213
2|10.5 Cyberwarfare and Aviation|213
1|Chapter 11: Digital Identification of the Passenger and Issues of Privacy|219
2|11.1 Regulatory Provisions|219
3|11.1.1 Annex 9|219
3|11.1.2 Moral and Ethical Questions|224
2|11.2 Privacy Issues|227
3|11.2.1 Introduction|227
3|11.2.2 The Legal and Regulatory Regime|230
4|11.2.2.1 United Nations Resolutions|230
4|11.2.2.2 ICAO´s Work|235
5|Resolution A40-16 Consolidated Statement of Continuing ICAO Policies Related to Facilitation|235
5|Guidelines for the Protection of Privacy|236
4|11.2.2.3 Laws and Judicial Decisions|238
1|Chapter 12: Aviation and the Internet|243
2|12.1 Introduction|243
3|12.1.1 5G and IoT|243
3|12.1.2 Impact on the Airline Industry|247
2|12.2 Legal and Regulatory Issues|250
2|References|257
1|Chapter 13: Conclusion|258
2|References|262
1|Appendix A: Cyber Security Information Sharing Act|263
1|Appendix B: Convention on Cybercrime|310
1|Appendix C: Computer Fraud and Abuse Act, 18 U.S.C. § 1030|333
1|Appendix D: Directive 2013/40/EU of the European Parliament and of the Council|340
1|Appendix E: Directive (EU) 2016/1148 of the European Parliament and of the Council|353