Results for 'cyber weapons'

1000+ found
Order:
  1.  32
    Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare.George R. Lucas - 2016 - New York, US: Oxford University Press USA.
    From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence cyber warfare, developing a practical (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  53
    The Influence of Using Cyber Technologies in Armed Conflicts on International Humanitarian Law.Justinas Žilinskas - 2013 - Jurisprudencija: Mokslo darbu žurnalas 20 (3):1195-1212.
    Cyber warfare is becoming a new reality with new battles fought everyday on virtual battlefields. For a century and a half, International Humanitarian Law has been a sentry for victims of wars guaranteeing their legal protection from the calamities of war, trying hard to respond to Clausewitz’s “chameleon of war”. Cyber conflict marks new chameleon’s colour together with the unmanned aerial vehicles, autonomic battle systems and other technologies deployed on battlefields. However, it would be greatly erroneous to claim (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  3.  31
    Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.
    ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences. In order to better protect society, policymakers will have to re‐orient their approach toward cyber security so as to emphasize the genuine cybernetic threat, which is network disruption rather than physical destruction.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm, Sweden: pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  35
    Dual Use Science and Technology, Ethics and Weapons of Mass Destruction.Seumas Miller - 2018 - Cham: Springer Verlag.
    This book deals with the problem of dual-use science research and technology. It first explains the concept of dual use and then offers analyses of collective knowledge and collective ignorance. It goes on to present a theory of collective responsibility, followed by four chapters focusing on a particular scientific field or industry of dual use concern: the chemical industry, the nuclear industry, cyber-technology and the biological sciences. The problem of dual-use science research and technology arises because such research and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  7.  38
    The right to life.Nuclear Weapons & Shingo Shibata - 1977 - Journal of Social Philosophy 8 (3):9-14.
  8. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  9.  24
    Why the World Needs an International Cyberwar Convention.Mette Eilstrup-Sangiovanni - 2018 - Philosophy and Technology 31 (3):379-407.
    States’ capacity for using modern information and communication technology to inflict grave harm on enemies has been amply demonstrated in recent years, with many countries reporting large-scale cyberattacks against their military defense systems, water supply, and other critical infrastructure. Currently, no agreed-upon international rules or norms exist to govern international conflict in cyberspace. Many governments prefer to keep it that way. They argue that difficulties of verifiability and challenges posed by rapid technological change rule out agreement on an international (...) convention. Instead, they prefer to rely on informal cooperation and strategic deterrence to limit direct conflict. In this article, I seek to rebut some of the main objections to seeking an international convention on the use of cyber weapons. While there are significant obstacles to achieving effective arms control in the cyber domain, historical experience from other areas of international arms control suggests that none of these obstacles are insurmountable. Furthermore, while most critics of cyberarms control assume that cyberspace favors offensive strategies, closer inspection reveals the dominance of cyber-defensive strategies. This in turn improves prospects for striking an effective international agreement on cyberarms control. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  10.  18
    The 2022 Yearbook of the Digital Governance Research Group.Francesca Mazzi (ed.) - 2023 - Springer Nature Switzerland.
    This annual edited volume presents an overview of cutting-edge research areas within digital ethics as defined by the Digital Governance Research Group of the University of Oxford. It identifies new challenges and opportunities of influence in setting the research agenda in the field. The 2022 edition of the Yearbook presents research on the following topics: autonomous weapons, cyber weapons, digital sovereignty, smart cities, artificial intelligence for the Sustainable Development Goals, vaccine passports, and sociotechnical pragmatism as an approach (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Make Them Rare or Make Them Care: Artificial Intelligence and Moral Cost-Sharing.Blake Hereth & Nicholas Evans - 2023 - In Daniel Schoeni, Tobias Vestner & Kevin Govern (eds.), Ethical Dilemmas in the Global Defense Industry. Oxford University Press.
    The use of autonomous weaponry in warfare has increased substantially over the last twenty years and shows no sign of slowing. Our chapter raises a novel objection to the implementation of autonomous weapons, namely, that they eliminate moral cost-sharing. To grasp the basics of our argument, consider the case of uninhabited aerial vehicles that act autonomously (i.e., LAWS). Imagine that a LAWS terminates a military target and that five civilians die as a side effect of the LAWS bombing. Because (...)
     
    Export citation  
     
    Bookmark  
  12. Information Warfare: A Philosophical Perspective. [REVIEW]Mariarosaria Taddeo - 2012 - Philosophy and Technology 25 (1):105-120.
    This paper focuses on Information Warfare—the warfare characterised by the use of information and communication technologies. This is a fast growing phenomenon, which poses a number of issues ranging from the military use of such technologies to its political and ethical implications. The paper presents a conceptual analysis of this phenomenon with the goal of investigating its nature. Such an analysis is deemed to be necessary in order to lay the groundwork for future investigations into this topic, addressing the ethical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  13.  42
    Adopting AI: how familiarity breeds both trust and contempt.Michael C. Horowitz, Lauren Kahn, Julia Macdonald & Jacquelyn Schneider - forthcoming - AI and Society:1-15.
    Despite pronouncements about the inevitable diffusion of artificial intelligence and autonomous technologies, in practice, it is human behavior, not technology in a vacuum, that dictates how technology seeps into—and changes—societies. To better understand how human preferences shape technological adoption and the spread of AI-enabled autonomous technologies, we look at representative adult samples of US public opinion in 2018 and 2020 on the use of four types of autonomous technologies: vehicles, surgery, weapons, and cyber defense. By focusing on these (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  35
    Postmodern War.George R. Lucas - 2010 - Journal of Military Ethics 9 (4):289-298.
    This article, an introduction to a special issue of the Journal of Military Ethics devoted to emerging military technologies, elaborates the present status of certain predictions about the future of warfare and combat made by postmodern essayist, Umberto Eco, during the First Gulf War in 1991. The development of military robotics, innovations in nanotechnology, prospects for the biological, psychological, and neurological ?enhancement? of combatants themselves, combined with the increasing use of nonlethal weapons and the advent of cyber warfare, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  15.  3
    Key concepts in military ethics.Deane-Peter Baker (ed.) - 2015 - Sydney, New South Wales, Australia: NewSouth Publishing.
    Can war be morally justified? What is the philosophy behind armed conflict? How do you conduct an ethical war? And what guides military action as the nature of conflict changes over time? Based on a MOOC (Massive Open Online Course) designed for both military personnel and non-specialists across the globe, Key Concepts in Military Ethics is structured as a series of 'mini-chapters' that cover a huge range of topics and issues: moral dilemmas, military and civilian interactions, freedom of the press, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16. Surviving american culture: On Chuck palahniuk.Eduardo Mendieta - 2005 - Philosophy and Literature 29 (2):394-408.
    In lieu of an abstract, here is a brief excerpt of the content:Surviving American Culture:On Chuck PalahniukEduardo MendietaIn an age in which American culture has become the United States' number one export, along with its weapons, low intensity conflict, carcinogenic cigarettes, its "freedom," and pornography, it is delightful and even a sign of hope that there are writers who have taken on the delicate and perilous task of offering a prognosis of what ails this culture. In the following essay (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  17. Weaponization of Climate and Environment Crises: Risks, Realities, and Consequences.Quan-Hoang Vuong, Viet-Phuong La & Minh-Hoang Nguyen - manuscript
    The importance of addressing the existential threat to humanity, climate change, has grown remarkedly in recent years while conflicting views and interests in societies exist. Therefore, climate change agendas have been weaponized to varying degrees, ranging from the international level between countries to the domestic level among political parties. In such contexts, climate change agendas are predominantly driven by political or economic ambitions, sometimes unconnected to concerns for environmental sustainability. Consequently, it can result in an environment that fosters antagonism and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  18. Autonomous Weapons and Distributed Responsibility.Marcus Schulzke - 2013 - Philosophy and Technology 26 (2):203-219.
    The possibility that autonomous weapons will be deployed on the battlefields of the future raises the challenge of determining who can be held responsible for how these weapons act. Robert Sparrow has argued that it would be impossible to attribute responsibility for autonomous robots' actions to their creators, their commanders, or the robots themselves. This essay reaches a much different conclusion. It argues that the problem of determining responsibility for autonomous robots can be solved by addressing it within (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  19. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  20.  35
    Cyber Trust.Amitai Etzioni - 2019 - Journal of Business Ethics 156 (1):1-13.
    From a sociological and anthropological viewpoint, the ability of complete strangers to carry out transactions that involve significant risk to one or both parties should be complicated by a lack of trust. Yet the rise of e-commerce and “sharing economy” platforms suggests that concerns that seemed prevalent only a few decades ago have been largely assuaged. What mechanisms have been used to facilitate trust between strangers online? Can we measure the extent to which users trust each other when interacting online? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  21. Autonomous weapons systems, killer robots and human dignity.Amanda Sharkey - 2019 - Ethics and Information Technology 21 (2):75-87.
    One of the several reasons given in calls for the prohibition of autonomous weapons systems (AWS) is that they are against human dignity (Asaro, 2012; Docherty, 2014; Heyns, 2017; Ulgen, 2016). However there have been criticisms of the reliance on human dignity in arguments against AWS (Birnbacher, 2016; Pop, 2018; Saxton, 2016). This paper critically examines the relationship between human dignity and autonomous weapons systems. Three main types of objection to AWS are identified; (i) arguments based on technology (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  22.  29
    Can Cyber‐Physical Systems Reliably Collaborate within a Blockchain?Ben van Lier - 2017 - Metaphilosophy 48 (5):698-711.
    A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber-physical systems: complex interconnections of cyber and physical components. When cyber-physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision-making procedures needed for this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  23
    Autonomous Weapon Systems: A Clarification.Nathan Gabriel Wood - 2023 - Journal of Military Ethics 22 (1):18-32.
    Due to advances in military technology, there has been an outpouring of research on what are known as autonomous weapon systems (AWS). However, it is common in this literature for arguments to be made without first making clear exactly what definitions one is employing, with the detrimental effect that authors may speak past one another or even miss the targets of their arguments. In this article I examine the U.S. Department of Defense and International Committee of the Red Cross definitions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Autonomous Weapons and the Nature of Law and Morality: How Rule-of-Law-Values Require Automation of the Rule of Law.Duncan MacIntosh - 2016 - Temple International and Comparative Law Journal 30 (1):99-117.
    While Autonomous Weapons Systems have obvious military advantages, there are prima facie moral objections to using them. By way of general reply to these objections, I point out similarities between the structure of law and morality on the one hand and of automata on the other. I argue that these, plus the fact that automata can be designed to lack the biases and other failings of humans, require us to automate the formulation, administration, and enforcement of law as much (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  31
    Autonomous weapon systems and jus ad bellum.Alexander Blanchard & Mariarosaria Taddeo - forthcoming - AI and Society:1-7.
    In this article, we focus on the scholarly and policy debate on autonomous weapon systems and particularly on the objections to the use of these weapons which rest on jus ad bellum principles of proportionality and last resort. Both objections rest on the idea that AWS may increase the incidence of war by reducing the costs for going to war or by providing a propagandistic value. We argue that whilst these objections offer pressing concerns in their own right, they (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  26. Autonomous Weapons Systems and the Contextual Nature of Hors de Combat Status.Steven Umbrello & Nathan Gabriel Wood - 2021 - Information 12 (5):216.
    Autonomous weapons systems (AWS), sometimes referred to as “killer robots”, are receiving evermore attention, both in public discourse as well as by scholars and policymakers. Much of this interest is connected with emerging ethical and legal problems linked to increasing autonomy in weapons systems, but there is a general underappreciation for the ways in which existing law might impact on these new technologies. In this paper, we argue that as AWS become more sophisticated and increasingly more capable than (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  27.  27
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  16
    Cyber-Aggression as an Example of Dysfunctional Behaviour of the Young Generation in the Globalized World.Tomasz Prymak & Tomasz Sosnowski - 2017 - Studies in Logic, Grammar and Rhetoric 52 (1):181-192.
    The objective of this paper is to try to identify the specificity and frequency of cyber-agression as a form of problem behaviour characteristic for the contemporary youth known as Generation Y. Analysis of the results of research conducted among schoolchildren aged 15–16 indicates that cyber-agression is a common phenomenon in the group. It raises the need for reconstruction and re-evaluation of practices and standards developed to date and implemented to address the problematic behaviour of young people through the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29. The Weaponization of Artificial Intelligence: What The Public Needs to be Aware of.Birgitta Dresp-Langley - 2023 - Frontiers in Artificial Intelligence 6 (1154184):1-6..
    Technological progress has brought about the emergence of machines that have the capacity to take human lives without human control. These represent an unprecedented threat to humankind. This paper starts from the example of chemical weapons, now banned worldwide by the Geneva protocol, to illustrate how technological development initially aimed at the benefit of humankind has, ultimately, produced what is now called the “Weaponization of Artificial Intelligence (AI)”. Autonomous Weapon Systems (AWS) fail the so-called discrimination principle, yet, the wider (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  62
    Autonomous weapon systems and responsibility gaps: a taxonomy.Nathan Gabriel Wood - 2023 - Ethics and Information Technology 25 (1):1-14.
    A classic objection to autonomous weapon systems (AWS) is that these could create so-called responsibility gaps, where it is unclear who should be held responsible in the event that an AWS were to violate some portion of the law of armed conflict (LOAC). However, those who raise this objection generally do so presenting it as a problem for AWS as a whole class of weapons. Yet there exists a rather wide range of systems that can be counted as “autonomous (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  31.  53
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  13
    Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities.Rhiannon Neilsen - 2023 - Ethics and International Affairs 37 (2):161-176.
    Intelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  7
    Cyber law and ethics: regulation of the connected world.Mark Grabowski - 2021 - New York: Taylor & Francis. Edited by Eric P. Robinson.
    A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology. With a focus on the most significant issues impacting internet users and businesses in the United States of America, the book provides coverage of key topics such as social media, online privacy, artificial intelligence, and cybercrime as well as emerging themes such as doxing, ransomware, revenge porn, data-mining, e-sports and fake news. The authors, experienced in journalism, technology (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Autonomous Weapons Systems and the Moral Equality of Combatants.Michael Skerker, Duncan Purves & Ryan Jenkins - 2020 - Ethics and Information Technology 3 (6).
    To many, the idea of autonomous weapons systems (AWS) killing human beings is grotesque. Yet critics have had difficulty explaining why it should make a significant moral difference if a human combatant is killed by an AWS as opposed to being killed by a human combatant. The purpose of this paper is to explore the roots of various deontological concerns with AWS and to consider whether these concerns are distinct from any concerns that also apply to long- distance, human-guided (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  44
    The Cyber Combatant: a New Status for a New Warrior.Maurizio D’Urso - 2015 - Philosophy and Technology 28 (3):475-478.
    Cyber warfare differs from traditional forms of conflicts, both in the instruments used—computers—and in the environment in which it is conducted—the virtual world of the internet and other data communication networks.The purpose of the commentary is to discuss whether, even in cyber warfare, the concept of ‘direct participation in hostilities’ is still operative, with special reference to the laws related to it, and to assess its consequences with regard to the law of armed conflict. In particular, I will (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  26
    Cyber Warfare Ethics.Michael Skerker & David Whetham (eds.) - 2021 - Howgate Publishing.
    Cyber technology gives states the ability to accomplish effects that once required kinetic action. These effects can now be achieved with cyber means in a manner that is covert, deniable, cheap, and technologically feasible for many governments. In some cases, cyber means are morally preferable to conventional military operations, but in other cases, cyber's unique qualities can lead to greater mischief than governments would have chanced using kinetic means. This volume addresses the applicability of traditional military (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  39
    Autonomous weapons systems and the necessity of interpretation: what Heidegger can tell us about automated warfare.Kieran M. Brayford - forthcoming - AI and Society:1-9.
    Despite resistance from various societal actors, the development and deployment of lethal autonomous weaponry to warzones is perhaps likely, considering the perceived operational and ethical advantage such weapons are purported to bring. In this paper, it is argued that the deployment of truly autonomous weaponry presents an ethical danger by calling into question the ability of such weapons to abide by the Laws of War. This is done by noting the resonances between battlefield target identification and the process (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  52
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  39.  13
    Responding To Cyber Risk With Restorative Practices: Perceptions And Experiences Of Canadian Educators.Michael Adorjan, Rosemary Ricciardelli & Mohana Mukherjee - 2024 - British Journal of Educational Studies 72 (2):155-175.
    Restorative practices are gaining traction as alternative approaches to student conflict and harm in schools, potentially surpassing disciplinary methods in effectiveness. In the current article, we contribute to the evolving understanding of restorative practices in schools by examining qualitative responses from educators regarding restorative interventions for online-mediated conflict and harm, including cyberbullying and sexting. Participants include pre-service educators, as well as junior and senior teachers with varying levels of familiarity with restorative practices. Our findings highlight how educators who have implemented (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40. Weapon and Shield.Barrett Emerick, Katie Stockdale & Audrey Yap - 2023 - Feminist Philosophy Quarterly 9 (3).
    Apologies are an important part of moral life and a method by which someone can satisfy their reparative obligations. At the same time, apologies can be used both as a shield to protect the person apologizing and as a weapon against the person to whom the apology is owed. In this paper we unpack both claims. We defend two principles one should employ to try to avoid such bad outcomes: (1) Apologies must be one-sided and nontransactional, and (2) the wrongdoer (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  17
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised as to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  34
    Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
    Recent debate on the relationship between cyber threats, on the one hand, and both strategy and ethics on the other focus on the extent to which ‘cyber war’ is possible, both as a conceptual question and an empirical one. Whether it can is an important question for just war theorists. From this perspective, it is necessary to evaluate cyber measures both as a means of responding to threats and as a possible just cause for using armed kinetic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  43. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  45.  26
    Justifying Cyber-intelligence?Ross W. Bellaby - 2016 - Journal of Military Ethics 15 (4):299-319.
    The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46. Weaponized skepticism: An analysis of social media deception as applied political epistemology.Regina Rini - 2021 - In Elizabeth Edenburg & Michael Hannon (eds.), Political Epistemology. Oxford: Oxford University Press. pp. 31-48.
    Since at least 2016, many have worried that social media enables authoritarians to meddle in democratic politics. The concern is that trolls and bots amplify deceptive content. In this chapter I argue that these tactics have a more insidious anti-democratic purpose. Lies implanted in democratic discourse by authoritarians are often intended to be caught. Their primary goal is not to successfully deceive, but rather to undermine the democratic value of testimony. In well-functioning democracies, our mutual reliance on testimony also generates (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  47.  10
    Cyber Terrorism And Cyber Law - Duties Of Service Providers.Pavan Duggal - 2016 - International Review of Information Ethics 25.
    The year 2017 has dawned in a new era. This is an era where cyber terrorism and cyber extremism are increasingly going to be significant factors in our day-to-day lives. Whether we like it or not, today social media platforms are infiltrated with cyber terrorists and cyber extremists. In addition, Cyber radicalization as a phenomenon is constantly on the rise.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  65
    Medicalized WEAPONS & Modern WAR.Michael L. Gross - 2010 - Hastings Center Report 40 (1):34-43.
    “Medicalized” weapons—those that rely on advances in neuroscience, physiology, and pharmacology—offer the prospect of reducing casualties and protecting civilians. They could be especially useful in modern asymmetric wars in which conventional states are pitted against guerrilla or insurgent forces. But may physicians and other medical workers participate in their development?
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  49.  89
    Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
    Cyber warfare has changed the scenario of war from an empirical and a theoretical viewpoint. Cyber war is no longer based on physical violence only, but on military, political, economic and ideological strategies meant to exploit a state’s informational resources. This means that a deeper understanding of what cyber war is requires us to adopt an informational approach. This approach may enable us to account for the two-dimensional nature of cyber war, to revise the notion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  48
    Autonomous weapons systems and the moral equality of combatants.Michael Skerker, Duncan Purves & Ryan Jenkins - 2020 - Ethics and Information Technology 22 (3):197-209.
    To many, the idea of autonomous weapons systems (AWS) killing human beings is grotesque. Yet critics have had difficulty explaining why it should make a significant moral difference if a human combatant is killed by an AWS as opposed to being killed by a human combatant. The purpose of this paper is to explore the roots of various deontological concerns with AWS and to consider whether these concerns are distinct from any concerns that also apply to long-distance, human-guided weaponry. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 1000