Results for 'Cyber conflicts '

996 found
Order:
  1.  26
    Cyber Conflicts: Addressing the Regulatory Gap.Ludovica Glorioso - 2015 - Philosophy and Technology 28 (3):333-338.
    This special issue gathers together a selection of papers presented by international experts during a workshop entitled ‘Ethics of Cyber-Conflicts’, which was devoted to fostering interdisciplinary debate on the ethical and legal problems and the regulatory gap concerning cyber conflicts. The workshop was held in 2013 at the Centro Alti Studi Difesa in Rome under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence . This NATO-accredited international military organisation that has always placed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  19
    Cyber Conflicts and Political Power in Information Societies.Mariarosaria Taddeo - 2017 - Minds and Machines 27 (2):265-268.
  3.  4
    Solving Cyber Conflicts.Mariarosaria Taddeo - 2017 - The Philosophers' Magazine 79:79-82.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  52
    How to Think About Cyber Conflicts Involving Non-state Actors.Phillip McReynolds - 2015 - Philosophy and Technology 28 (3):427-448.
    A great deal of attention has been paid in recent years to the legality of the actions of states and state agents in international and non-international cyber conflicts. Less attention has been paid to ethical considerations in these situations, and very little has been written regarding the ethics of the participation of non-state actors in such conflicts. In this article, I analyze different categories of non-state participation in cyber operations and undertake to show under what conditions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  29
    Ethics and Cyber Conflict: A Response to JME 12:1 (2013).George R. Lucas Jr - 2014 - Journal of Military Ethics 13 (1):20-31.
    (2014). Ethics and Cyber Conflict: A Response to JME 12:1 (2013) Journal of Military Ethics: Vol. 13, No. 1, pp. 20-31. doi: 10.1080/15027570.2014.908012.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  11
    The Ethics of Cyber Conflicts: An Introduction.Mariarosaria Taddeo - 2016 - Routledge.
    During the past decade, ethicists as well as policy-makers, political and social scientists, and experts in military studies have been concerned with the topic of cyber-conflicts and in particular the political and social ramifications for contemporary society. This book offers a clear and accessible introduction to the ethical analysis of cyber-conflicts, covering such topics as cyber-crime, cyber-terrorism, and cyber-warfare and cyber-activism. A useful introduction for students The Ethics of Cyber-Conflicts allows (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  25
    On the Risks of Relying on Analogies to Understand Cyber Conflicts.Mariarosaria Taddeo - 2016 - Minds and Machines 26 (4):317-321.
  8. Warfare. Fourth International Conference of Cyber Conflict.Mariarosaria Taddeo - forthcoming - NATO CCD COE and IEEE Publication.
     
    Export citation  
     
    Bookmark  
  9.  27
    Beyond Machines: Humans in Cyber Operations, Espionage, and Conflict.David Danks & Joseph H. Danks - unknown
    It is the height of banality to observe that people, not bullets, fight kinetic wars. The machinery of kinetic warfare is obviously relevant to the conduct of each particular act of warfare, but the reasons for, and meanings of, those acts depend critically on the fact that they are done by humans. Any attempt to understand warfare—its causes, strategies, legitimacy, dynamics, and resolutions—must incorporate humans as an intrinsic part, both descriptively and normatively. Humans from general staff to “boots on the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  51
    The Influence of Using Cyber Technologies in Armed Conflicts on International Humanitarian Law.Justinas Žilinskas - 2013 - Jurisprudencija: Mokslo darbu žurnalas 20 (3):1195-1212.
    Cyber warfare is becoming a new reality with new battles fought everyday on virtual battlefields. For a century and a half, International Humanitarian Law has been a sentry for victims of wars guaranteeing their legal protection from the calamities of war, trying hard to respond to Clausewitz’s “chameleon of war”. Cyber conflict marks new chameleon’s colour together with the unmanned aerial vehicles, autonomic battle systems and other technologies deployed on battlefields. However, it would be greatly erroneous to claim (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  11.  21
    The Ethics of Cyber Attack: Pursuing Legitimate Security and the Common Good in Contemporary Conflict Scenarios.David J. Lonsdale - 2020 - Journal of Military Ethics 19 (1):20-39.
    Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds an...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  12
    Responding To Cyber Risk With Restorative Practices: Perceptions And Experiences Of Canadian Educators.Michael Adorjan, Rosemary Ricciardelli & Mohana Mukherjee - 2024 - British Journal of Educational Studies 72 (2):155-175.
    Restorative practices are gaining traction as alternative approaches to student conflict and harm in schools, potentially surpassing disciplinary methods in effectiveness. In the current article, we contribute to the evolving understanding of restorative practices in schools by examining qualitative responses from educators regarding restorative interventions for online-mediated conflict and harm, including cyberbullying and sexting. Participants include pre-service educators, as well as junior and senior teachers with varying levels of familiarity with restorative practices. Our findings highlight how educators who have implemented (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  42
    The Cyber Combatant: a New Status for a New Warrior.Maurizio D’Urso - 2015 - Philosophy and Technology 28 (3):475-478.
    Cyber warfare differs from traditional forms of conflicts, both in the instruments used—computers—and in the environment in which it is conducted—the virtual world of the internet and other data communication networks.The purpose of the commentary is to discuss whether, even in cyber warfare, the concept of ‘direct participation in hostilities’ is still operative, with special reference to the laws related to it, and to assess its consequences with regard to the law of armed conflict. In particular, I (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  32
    Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare.George R. Lucas - 2016 - New York, US: Oxford University Press USA.
    From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence cyber warfare, developing a practical (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  16.  23
    Ethics and Policies for Cyber Operations: A Nato Cooperative Cyber Defence Centre of Excellence Initiative.Ludovica Glorioso & Mariarosaria Taddeo (eds.) - 2016 - Cham: Springer Verlag.
    This book presents 12 essays that focus on the analysis of the problems prompted by cyber operations. It clarifies and discusses the ethical and regulatory problems raised by the deployment of cyber capabilities by a state’s army to inflict disruption or damage to an adversary’s targets in or through cyberspace. Written by world-leading philosophers, ethicists, policy-makers, and law and military experts, the essays cover such topics as the conceptual novelty of COs and the ethical problems that this engenders; (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  7
    From social to cyber justice: critical views on justice, law, and ethics.Nythamar Fernandes de Oliveira, Marek Hrubec & Emil Albert Sobottka (eds.) - 2018 - Porto Alegre: PUCRS.
    The book contains critical analyses of injustice in connection to law and ethics, and develops normative alternatives linked to justice. It covers the relevant issues from social justice to cyber justice. The chapters address issues and concepts which guideline on social innovations, transformations inherent in democratizing processes, global conflicts and other interactions, including the ultimate danger of escalation to war conflicts, be they conventional wars or new cyberwars.--From publisher's website.
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  13
    Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security.John D. Bustard - 2018 - Science and Engineering Ethics 24 (2):683-698.
    In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: aligning teaching content with student interests; taking a pragmatic rather than a philosophical approach to issue resolution; addressing the full complexity of real-world case studies; and covering content in a way that students find entertaining. The use of these principles is then discussed with respect (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  5
    Virtual Religious Conflict: From Cyberspace to Reality.Awaludin Pimay & Agus Riyadi - 2023 - HTS Theological Studies 79 (1):6.
    Freedom of expression on social media is sometimes carried out unethically and often undermines religious symbols, resulting in friction and destructive actions. This research was conducted with the aim of knowing the polarisation of religious conflict in cyberspace and the process of diffusion of religious conflict from the virtual world to the real world. This type of research is descriptive qualitative. This research was conducted in Central Java, namely, in the cities of Solo and Semarang. The results of the study (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20. An Analysis For A Just Cyber Warfare.Mariarosaria Taddeo - forthcoming - In Warfare. Fourth International Conference of Cyber Conflict. NATO CCD COE and IEEE Publication.
     
    Export citation  
     
    Bookmark   7 citations  
  21.  20
    Planning the Emergency Collision Avoidance Strategy Based on Personal Zones for Safe Human-Machine Interaction in Smart Cyber-Physical System.Thanh Phuong Nguyen, Hung Nguyen & Ha Quang Thinh Ngo - 2022 - Complexity 2022:1-21.
    Human contact is a key issue in social interactions for autonomous systems since robots are increasingly appearing everywhere, which has led to a higher risk of conflict. Particularly in the real world, collisions between humans and machines may result in catastrophic accidents or damaged goods. In this paper, a novel stop strategy related to autonomous systems is proposed. This control method can eliminate the vibrations produced by a system’s movement by analysing the poles and zeros in the model of autonomous (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  8
    The Nature of Peace and the Morality of Armed Conflict.Florian Demont-Biaggi (ed.) - 2017 - Cham: Imprint: Palgrave Macmillan.
    This book explores topical issues in military ethics by according peace a central role within an interdisciplinary framework. Whilst war and peace have traditionally been viewed through the lens of philosophical enquiry, political issues and theological ideas - as well as common sense - have also influenced people's understanding of armed conflicts with regards to both the moral issues they raise and the policies and actions they require. Comprised of fourteen essays on the role and application of peace, the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  20
    Limited Force and the Return of Reprisals in the Law of Armed Conflict.Eric A. Heinze & Rhiannon Neilsen - 2020 - Ethics and International Affairs 34 (2):175-188.
    Armed reprisals are the limited use of military force in response to unlawful actions perpetrated against states. Historically, reprisals provided a military remedy for states that had been wronged by another state without having to resort to all-out war in order to counter or deter such wrongful actions. While reprisals are broadly believed to have been outlawed by the UN Charter, states continue to routinely undertake such self-help measures. As part of the roundtable, “The Ethics of Limited Strikes,” this essay (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  25
    Soft War: The Ethics of Unarmed Conflict.Michael L. Gross & Tamar Meisels - 2017 - Cambridge University Press.
    Just war theory focuses primarily on bodily harm, such as killing, maiming, and torture, while other harms are often largely overlooked. At the same time, contemporary international conflicts increasingly involve the use of unarmed tactics, employing 'softer' alternatives or supplements to kinetic power that have not been sufficiently addressed by the ethics of war or international law. Soft war tactics include cyber-warfare and economic sanctions, media warfare, and propaganda, as well as non-violent resistance as it plays out in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  26.  14
    Basil R. gehrman & Madigan, T.Conflict Prometheus Books, Existentialism Unwin Hyman, Philosophers Series & D. Wood - forthcoming - Cogito.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. Just Information Warfare.Mariarosaria Taddeo - 2016 - Topoi 35 (1):213-224.
    In this article I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold: filling the theoretical vacuum surrounding this phenomenon and providing the conceptual grounding for the definition of new ethical regulations for information warfare. I argue that Just War Theory is a necessary but not sufficient instrument for considering the ethical implications of information warfare and that a suitable ethical analysis of this kind of warfare is developed when Just (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  28. The fortieth annual lecture series 1999-2000.Brain Computations & an Inevitable Conflict - 2000 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 31:199-200.
  29.  38
    The Limits of Deterrence Theory in Cyberspace.Mariarosaria Taddeo - 2018 - Philosophy and Technology 31 (3):339-355.
    In this article, I analyse deterrence theory and argue that its applicability to cyberspace is limited and that these limits are not trivial. They are the consequence of fundamental differences between deterrence theory and the nature of cyber conflicts and cyberspace. The goals of this analysis are to identify the limits of deterrence theory in cyberspace, clear the ground of inadequate approaches to cyber deterrence, and define the conceptual space for a domain-specific theory of cyber deterrence, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  30.  20
    Military Ethics: What Everyone Needs to Know.George R. Lucas - 2016 - New York, NY: Oxford University Press USA.
    What significance does "ethics" have for the men and women serving in the military forces of nations around the world? What core values and moral principles collectively guide the members of this "military profession?" This book explains these essential moral foundations, along with "just war theory," international relations, and international law. The ethical foundations that define the "Profession of Arms" have developed over millennia from the shared moral values, unique role responsibilities, and occasional reflection by individual members the profession on (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  31. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm, Sweden: pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  7
    Специфические черты и перспективы развития электронного правительства в кнр в начале XXI столетия.К. В Каспарян & М. В Рутковская - 2022 - Философские Проблемы Информационных Технологий И Киберпространства 2:61-83.
    The article is devoted to the analysis of features of functioning of the digital government in the Chinese State in the first decades of the 21-st century and the perspectives of its further development. In this work the authors give a brief description of the essence of phenomenon of digital government in general. The article explores the specific features of this process in the People’s Republic of China in the third millennium. This research examines the influence of functioning of e-government (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  16
    Binary Bullets: The Ethics of Cyberwarfare.Fritz Allhoff, Adam Henschke & Bradley Jay Strawser (eds.) - 2016 - New York, US: Oxford University Press USA.
    Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  18
    Just War Doctrine – Relic or Relevant?John Thomas - 2021 - Russian Journal of Philosophical Sciences 63 (11):7-38.
    In the article, I examine the relevance of Just War Doctrine to contemporary conflicts. Just War Doctrine, which grew out of Western Christian thinking, presupposes that evil might be confronted with force, if there is no alternative way to restore a just order. But modern trends call into question the certainty and universality of this doctrine. On the one hand, ideas of moral relativism and comparative justice have become more widespread, potentially undermining the use of the notions “just” and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35. The Transhuman Security Dilemma.Daniel McIntosh - 2010 - Journal of Evolution and Technology 21 (2):32-48.
    Developments in genetics, cyber-technology, nanotechnology, biotechnology, artificial intelligence, and other areas hold the promise – and the peril – of redefining what it means to be human. In addition to hedonism or a desire for self-improvement, the possibilities of these technologies plus the rational concern of falling behind a potential adversary produce a classic security dilemma. These competitive pressures among states, firms, and emerging “super-empowered individuals” encourage the development and dissemination of these technologies, and already the possibilities are being (...)
     
    Export citation  
     
    Bookmark   4 citations  
  36. The Cambridge handbook of information and computer ethics.Luciano Floridi (ed.) - 2010 - Cambridge University Press.
    Information and Communication Technologies have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary ethical debates. The Cambridge Handbook of Information and Computer Ethics, first published in 2010, provides an ambitious and authoritative introduction to the field, with discussions of a range of topics including privacy, ownership, freedom of speech, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   25 citations  
  37.  72
    A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon.Oludayo Tade - 2013 - Human Affairs 23 (4):689-705.
    Cybercrime in Nigeria is largely perpetrated by young people and students in tertiary institutions, and are socially tagged yahoo yahoo or yahoo boys. Yahoo boys rely on their computer dexterity to victimise unsuspecting persons in cyberspace. A new phenomenon in cybercrime is mixing spiritual elements with internet surfing to boost cybercrime success rates. This paper examines the factors underlying this spiritual dimension (cyber spiritualism) to cybercrime, and discusses some of the strategies employed in perpetuating cyber crime. Using Space (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  38.  3
    Key concepts in military ethics.Deane-Peter Baker (ed.) - 2015 - Sydney, New South Wales, Australia: NewSouth Publishing.
    Can war be morally justified? What is the philosophy behind armed conflict? How do you conduct an ethical war? And what guides military action as the nature of conflict changes over time? Based on a MOOC (Massive Open Online Course) designed for both military personnel and non-specialists across the globe, Key Concepts in Military Ethics is structured as a series of 'mini-chapters' that cover a huge range of topics and issues: moral dilemmas, military and civilian interactions, freedom of the press, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  6
    An Alternative War: The Development, Impact, and Legality of Hybrid Warfare Conducted by the Nation State.Jack Brown - 2018 - Journal of Global Faultlines 5 (1-2):58-82.
    The alleged use of “Hybrid Warfare” by the Russian Federation in the annexation of the Ukrainian territory, Crimea, in 2014, thrust the term into the media spotlight and raised concerns over the lack of effective measures available to counter its use. This article investigates the use, development, impact, and legality of state-directed “Hybrid Warfare” campaigns. The first section of which examines the use and relevance of military force and strategy in the conduct of such a campaign, with further sections focusing (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  24
    Why the World Needs an International Cyberwar Convention.Mette Eilstrup-Sangiovanni - 2018 - Philosophy and Technology 31 (3):379-407.
    States’ capacity for using modern information and communication technology to inflict grave harm on enemies has been amply demonstrated in recent years, with many countries reporting large-scale cyberattacks against their military defense systems, water supply, and other critical infrastructure. Currently, no agreed-upon international rules or norms exist to govern international conflict in cyberspace. Many governments prefer to keep it that way. They argue that difficulties of verifiability and challenges posed by rapid technological change rule out agreement on an international (...) convention. Instead, they prefer to rely on informal cooperation and strategic deterrence to limit direct conflict. In this article, I seek to rebut some of the main objections to seeking an international convention on the use of cyber weapons. While there are significant obstacles to achieving effective arms control in the cyber domain, historical experience from other areas of international arms control suggests that none of these obstacles are insurmountable. Furthermore, while most critics of cyberarms control assume that cyberspace favors offensive strategies, closer inspection reveals the dominance of cyber-defensive strategies. This in turn improves prospects for striking an effective international agreement on cyberarms control. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  34
    Postmodern War.George R. Lucas - 2010 - Journal of Military Ethics 9 (4):289-298.
    This article, an introduction to a special issue of the Journal of Military Ethics devoted to emerging military technologies, elaborates the present status of certain predictions about the future of warfare and combat made by postmodern essayist, Umberto Eco, during the First Gulf War in 1991. The development of military robotics, innovations in nanotechnology, prospects for the biological, psychological, and neurological ?enhancement? of combatants themselves, combined with the increasing use of nonlethal weapons and the advent of cyber warfare, have (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  42. So who am I really? Personal identity in the age of the Internet.Albert Borgmann - 2013 - AI and Society 28 (1):15-20.
    The Internet has become a field of dragon teeth for a person’s identity. It has made it possible for your identity to be mistaken by a credit agency, spied on by the government, foolishly exposed by yourself, pilloried by an enemy, pounded by a bully, or stolen by a criminal. These harms to one’s integrity could be inflicted in the past, but information technology has multiplied and aggravated such injuries. They have not gone unnoticed and are widely bemoaned and discussed. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  4
    Specific features and procpects for development of electronic government in the PRC at the beginning of the XXI century.K. V. Kasparyan & M. V. Rutkovskaya - forthcoming - Philosophical Problems of IT and Cyberspace.
    The article is devoted to the analysis of features of functioning of the digital government in the Chinese State in the first decades of the 21-st century and the perspectives of its further development. In this work the authors give a brief description of the essence of phenomenon of digital government in general. The article explores the specific features of this process in the People’s Republic of China in the third millennium. This research examines the influence of functioning of e-government (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  26
    The Ethics of Insurgency: A Brief Overview.Michael L. Gross - 2015 - Journal of Military Ethics 14 (3-4):248-250.
    ABSTRACTAre all forms of guerilla warfare apprehensible? Or can there be such a thing as just guerilla warfare? If so, what would be the reasonable requirements we would make of guerillas in order to consider them just? The remarks below, based on my new book The Ethics of Insurgency; A Critical Guide to Just Guerilla Warfare, summarize my attempts to answer those questions, discussing such issues as legitimate authority, just cause, and compliance with the laws of armed conflict, including the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  11
    What if Cyberspace Were for Fighting?Duncan B. Hollis & Jens David Ohlin - 2018 - Ethics and International Affairs 32 (4):441-456.
    This essay explores the ethical and legal implications of prioritizing the militarization of cyberspace as part of a roundtable on “Competing Visions for Cyberspace.” Our essay uses an ideal type—a world that accepts warfighting as the prime directive for the construction and use of cyberspace—and examines the ethical and legal consequences that follow for who will have authority to regulate cyberspace; what vehicles they will most likely use to do so; and what the rules of behavior for states and stakeholders (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46. Surviving american culture: On Chuck palahniuk.Eduardo Mendieta - 2005 - Philosophy and Literature 29 (2):394-408.
    In lieu of an abstract, here is a brief excerpt of the content:Surviving American Culture:On Chuck PalahniukEduardo MendietaIn an age in which American culture has become the United States' number one export, along with its weapons, low intensity conflict, carcinogenic cigarettes, its "freedom," and pornography, it is delightful and even a sign of hope that there are writers who have taken on the delicate and perilous task of offering a prognosis of what ails this culture. In the following essay I (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  47.  9
    Examining the Prevalence and Risk Factors of School Bullying Perpetration Among Chinese Children and Adolescents.Jia Xue, Ran Hu, Lei Chai, Ziqiang Han & Ivan Y. Sun - 2022 - Frontiers in Psychology 13.
    Background and ObjectivesSchool bullying threatens the health of children and adolescents, such as mental health disorders, social deviant behaviors, suicidal behaviors, and coping difficulties. The present study aims to address prevalence rates of both traditional and cyber school bullying perpetration, and the associations between self-control, parental involvement, experiencing conflicts with parents, experiencing interparental conflict, and risk behaviors, and school bullying perpetration among Chinese children and adolescents.MethodThis study used data from a national representative school bullying survey among children and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  3
    The Teachers Got Me Into This.Cam Cobb - 2013-08-26 - In Kevin S. Decker (ed.), Ender's Game and Philosophy. Wiley. pp. 7–20.
    This chapter considers what Ender's experiences tell us about the differences between liberal education, vocational training, critical inquiry, and that elusive matter of freedom in, and as a result of education. Specifically, the chapter addresses the following questions: Does everyone need a liberal education? Are schools training grounds for the workplace? And finally, is critical inquiry essential to being an educated person? Ender does get a kind of liberal education with three core aspects. First, in terms of comprehension and performance, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  15
    A war in the head. The new model of Russian propaganda as a Hobbesian time of the disposition of war.Monika Mazur-Bubak - 2020 - Argument: Biannual Philosophical Journal 10 (1):115-132.
    A major part of research into cyber‐propaganda discusses the following components it uses: disinformation, creating fake news and employing so‐called farm trolls. Actions of this kind do not correspond with the classic division of soft and hard power, since neither can their goals nor the means they utilise be unambiguously defined as coercion, payment, or attraction. In my article, I describe the hidden means of propaganda employed by the Russian Federation that are additionally supported by a process of armament (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  92
    The Morality of War, Second Edition.Brian Orend - 2013 - Peterborough, CA: Broadview Press.
    The first edition of The Morality of War was one of the most widely-read and successful books ever written on the topic. In this second edition, Brian Orend builds on the substantial strengths of the first, adding important new material on: cyber-warfare; drone attacks; the wrap-up of Iraq and Afghanistan; conflicts in Libya and Syria; and protracted struggles . Updated and streamlined throughout, the book offers new research tools and case studies, while keeping the winning blend of theory (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 996