Switch to: References

Add citations

You must login to add citations.
  1. Vulnerabilities and responsibilities: dealing with monsters in computer security.W. Pieters & L. Consoli - 2009 - Journal of Information, Communication and Ethics in Society 7 (4):243-257.
    PurposeThe purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.Design/methodology/approachVulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  • Drones and the Martial Virtue Courage.Jesse Kirkpatrick - 2015 - Journal of Military Ethics 14 (3-4):202-219.
    ABSTRACTThis article explores the relationship between the operation of combat drones and the martial virtue courage. The article proceeds in three parts. Part one develops a brief account of virtue generally, and the martial virtue courage in particular. Part two discusses why critics suggest that drone operation does not fit the orthodox conceptualization of courage and, in some instances, even erodes the virtue. Part three explores how these criticisms are flawed. This section of the paper goes on to argue that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations