Switch to: References

Add citations

You must login to add citations.
  1. How Do Science and Technology Affect International Affairs?Charles Weiss - 2015 - Minerva 53 (4):411-430.
    Science and technology influence international affairs by many different mechanisms. Both create new issues, risks and uncertainties. Advances in science alert the international community to new issues and risks. New technological capabilities transform war, diplomacy, commerce, intelligence, and investment. This paper identifies six basic patterns by which advances in science and technology influence international relations: as a juggernaut or escaped genie with rapid and wide-ranging ramifications for the international system; as a game-changer and a conveyer of advantage and disadvantage to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Just Information Warfare.Mariarosaria Taddeo - 2016 - Topoi 35 (1):213-224.
    In this article I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold: filling the theoretical vacuum surrounding this phenomenon and providing the conceptual grounding for the definition of new ethical regulations for information warfare. I argue that Just War Theory is a necessary but not sufficient instrument for considering the ethical implications of information warfare and that a suitable ethical analysis of this kind of warfare is developed when Just War (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Warfighting for Cyber Deterrence: a Strategic and Moral Imperative.David J. Lonsdale - 2018 - Philosophy and Technology 31 (3):409-429.
    Theories of cyber deterrence are developing rapidly. However, the literature is missing an important ingredient—warfighting for deterrence. This controversial idea, most commonly associated with nuclear strategy during the later stages of the Cold War, affords a number of advantages. It provides enhanced credibility for deterrence, offers means to deal with deterrence failure, improves compliance with the requirements of just war and ultimately ensures that strategy continues to function in the post-deterrence environment. This paper assesses whether a warfighting for deterrence approach (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Ethics of Online Military Information Activities.Justin S. Hempson-Jones - 2018 - Journal of Military Ethics 17 (4):211-223.
    ABSTRACTThis article argues that new forms of conducting military information activities using the Internet require renewed consideration of the ethical frameworks in which conduct of such activities can be grounded: frameworks that require these operations to be considered on their own terms rather than as a subset of wider categories. In this online context the article explores the interlinked areas of proportionality and privacy, delineations between combatant and non-combatant, and limits to acceptable deceptive practices. The article argues that the “soft” (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  • Cyber Conflicts: Addressing the Regulatory Gap.Ludovica Glorioso - 2015 - Philosophy and Technology 28 (3):333-338.
    This special issue gathers together a selection of papers presented by international experts during a workshop entitled ‘Ethics of Cyber-Conflicts’, which was devoted to fostering interdisciplinary debate on the ethical and legal problems and the regulatory gap concerning cyber conflicts. The workshop was held in 2013 at the Centro Alti Studi Difesa in Rome under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence . This NATO-accredited international military organisation that has always placed a high value on an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations