Results for 'Cyberattacks'

22 found
Order:
  1.  70
    Cyberattacks as Casus Belli: A Sovereignty‐Based Account.Patrick Taylor Smith - 2015 - Journal of Applied Philosophy:222-241.
    Since cyberattacks are nonphysical, standard theories of casus belli — which typically rely on the violent and forceful nature of military means — appear inapplicable. Yet, some theorists have argued that cyberattacks nonetheless can constitute just causes for war — generating a unilateral right to defensive military action — when they cause significant physical damage through the disruption of the target's computer systems. I show that this view suffers from a serious drawback: it is too permissive concerning the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  12
    Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating.Sebastian Knebel, Mario D. Schultz & Peter Seele - 2022 - Journal of Information, Communication and Ethics in Society 20 (1):91-109.
    Purpose This paper aims to outline how destructive communication exemplified by ransomware cyberattacks destroys the process of organization, causes a “state of exception,” and thus constitutes organization. The authors build on Agamben's state of exception and translate it into communicative constitution of organization theory. Design/methodology/approach A significant increase of cyberattacks have impacted organizations in recent times and laid organizations under siege. This conceptual research builds on illustrative cases chosen by positive deviance case selection of ransomware attacks. Findings CCO (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  58
    Do Ambiguities in International Humanitarian Law make Cyberattacks more Advantageous?Damian Williams - forthcoming - Forthcoming.
    Does it seem that with each reported state cyberattack, there comes an announcement of discovery, an attribution to one of a handful of usual suspects, some threatening language suggesting imminent retribution, and then nothing more? Increased incidence of cyberattack makes its occurrence seem simultaneously rampant in terms of publicity and minimal in terms of threat of war. If rampant, how can repeated deployment by the same actors carry no punitive consequences? How is such audaciousness tolerated? For some, a cyberattack by (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  16
    Hacktivism: On the Use of Botnets in Cyberattacks.Marco Deseriis - 2017 - Theory, Culture and Society 34 (4):131-152.
    This article offers a reading of internet-based activism or ‘hacktivism’ as a phenomenon that cannot be confined to the instrumental use of information technologies. It focuses on a subset of hacktivism – the distributed-denial-of-service attack for political ends – that aims at making an internet host unavailable to its intended users. Since the early 2000s these attacks have been increasingly conducted by means of botnets – networks of infected computers that send bogus requests to a target website without the consent (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  10
    Human Cognition Through the Lens of Social Engineering Cyberattacks.Rosana Montañez, Edward Golob & Shouhuai Xu - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  62
    Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection.Rafał Kozik, Marek Pawlicki, Michał Choraś & Witold Pedrycz - 2019 - Complexity 2019:1-9.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  10
    The Crime of Aggression: The Quest for Justice in an Age of Drones, Cyberattacks, Insurgents, and Autocrats. [REVIEW]John M. Bublic - 2022 - The European Legacy 27 (7-8):839-840.
    Building a framework of laws around acts of war or aggression is not easy, especially in the world of international relations, where anarchy characterizes the fundamental nature of world affairs. W...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  9.  2
    A comparative study of neural network architectures for software vulnerability forecasting.Ovidiu Cosma, Petrică C. Pop & Laura Cosma - forthcoming - Logic Journal of the IGPL.
    The frequency of cyberattacks has been rapidly increasing in recent times, which is a significant concern. These attacks exploit vulnerabilities present in the software components that constitute the targeted system. Consequently, the number of vulnerabilities within these software components serves as an indicator of the system’s level of security and trustworthiness. This paper compares the accuracy, trainability and stability to configuration parameters of several neural network architectures, namely Long Short-Term Memory, Multilayer Perceptron and Convolutional Neural Network. These architectures are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Recent work in the theory of conceptual engineering.Steffen Koch, Guido Löhr & Mark Pinder - 2023 - Analysis 83 (3):589-603.
    A philosopher argues that state-sponsored cyberattacks against central military or civilian targets are always acts of war. What is this philosopher doing? According to conceptual analysts, the philosopher is making a claim about our concept of war. According to philosophical realists, the philosopher is making a claim about war per se. In a quickly developing literature, a third option is being explored: the philosopher is engineering the concept of war. On this view, the philosopher is making a proposal about (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  11.  18
    Credibility and trust of information privacy at the workplace in Slovakia. The use of intuition.Frithiof Svenson, Eva Ballová Mikušková & Markus A. Launer - 2023 - Journal of Information, Communication and Ethics in Society 21 (3):302-321.
    Purpose Employees may feel overwhelmed with information privacy choices and have difficulties understanding what they are committing to in the digital workplace. This paper aims to analyze the role of different thinking styles for effort reduction, such as the use of intuition, when employees make decisions about the credibility and trustworthiness of workplace information privacy issues in Slovakia. While the General Data Protection Regulation sets precise requirements for valid consent, organizations are classified as data controllers and are subject to credibility (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  78
    Artificial intelligence in medicine and the disclosure of risks.Maximilian Kiener - 2021 - AI and Society 36 (3):705-713.
    This paper focuses on the use of ‘black box’ AI in medicine and asks whether the physician needs to disclose to patients that even the best AI comes with the risks of cyberattacks, systematic bias, and a particular type of mismatch between AI’s implicit assumptions and an individual patient’s background situation.Pacecurrent clinical practice, I argue that, under certain circumstances, these risks do need to be disclosed. Otherwise, the physician either vitiates a patient’s informed consent or violates a more general (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  13.  41
    Just and Unjust Nuclear Deterrence.Scott D. Sagan - 2023 - Ethics and International Affairs 37 (1):19-28.
    In this essay, I propose five principles to make U.S. nuclear deterrence policy more just and effective in the future: sever the link between the mass killing of innocent civilians and nuclear deterrence by focusing targeting on adversaries’ military power and senior political leadership, not their population; never use or plan to use a nuclear weapon against any target that could be destroyed or neutralized by conventional weapons; reject “belligerent reprisal” threats against civilians even in response to enemy attacks on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  24
    Why the World Needs an International Cyberwar Convention.Mette Eilstrup-Sangiovanni - 2018 - Philosophy and Technology 31 (3):379-407.
    States’ capacity for using modern information and communication technology to inflict grave harm on enemies has been amply demonstrated in recent years, with many countries reporting large-scale cyberattacks against their military defense systems, water supply, and other critical infrastructure. Currently, no agreed-upon international rules or norms exist to govern international conflict in cyberspace. Many governments prefer to keep it that way. They argue that difficulties of verifiability and challenges posed by rapid technological change rule out agreement on an international (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  15.  10
    Hybrid Warfare in the Western Balkans: How Structural Vulnerability Attracts Maligned Powers and Hostile Influence.Chris J. Dolan - 2022 - Seeu Review 17 (1):3-25.
    This study analyzes the domestic political, economic, and social conditions in the Western Balkans that provide fertile ground for hostile and maligned actors to manipulate and exploit governments and societies with hybrid war measures, namely cyberattacks and cyber intrusions and disinformation and fake news. It begins with a review and assessment of the prevailing empirical and theoretical literature on hybrid warfare. It then describes two leading empirical indices that measure degrees of permeability and structural vulnerability that elevate or reduce (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  15
    Lengthening the Shadow of International Law.Tanisha M. Fazal - 2020 - Ethics and International Affairs 34 (2):229-240.
    What will be the consequences of the criminalization of aggression? In 2010, the International Criminal Court made aggression a crime for which individuals can be prosecuted. But questions around what constitutes aggression, who decides, and, most important, how effective this legal change will be in reducing the incidence of war remain. This essay considers these questions in light of two recent books on the criminalization of aggression: Noah Weisbord'sThe Crime of Aggression: The Quest for Justice in an Age of Drones, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  89
    Just War Theory and Cyber-Attacks.Leonard Kahn - 2013 - In Not Just Wars.
    In this chapter, I take up the question of whether one of the central principles of jus ad bellum – just cause – is relevant in a world in which cyberattacks occur. I argue that this principle is just as relevant as ever, though it needs modification in light of recent developments. In particular, I argue, contrary to many traditional just war theorists, that just cause should not be limited to physical attacks. In the process, I offer an improved (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18. Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper argues (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  6
    An Optimal DoS Attack Strategy Disturbing the Distributed Economic Dispatch of Microgrid.Yihe Wang, Mingli Zhang, Kun Song, Tie Li & Na Zhang - 2021 - Complexity 2021:1-16.
    As a promising method with excellent characteristics in terms of resilience and dependability, distributed methods are gradually used in the field of energy management of microgrid. However, these methods have more stringent requirements on the working conditions, which will make the system more sensitive to communication failures and cyberattacks. As a result, it is both theoretical merits and practical values to investigate the malicious effect of cyber attacks on microgrid. This paper studies the distributed economic dispatch problem under denial-of-service (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm, Sweden: pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command and control, avoiding (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  19
    Binary Bullets: The Ethics of Cyberwarfare.Fritz Allhoff, Adam Henschke & Bradley Jay Strawser (eds.) - 2016 - New York, US: Oxford University Press USA.
    Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  9
    Proportionality in cyberwar and just war theory.Fredrik D. Hjorthen & James Pattison - 2023 - Ethics and Global Politics 16 (1):1-24.
    Which harms and benefits should be viewed as relevant when considering whether to launch cyber-measures? In this article, we consider this question, which matters because it is central to determining whether cyber-measures should be launched. Several just war theorists hold a version of what we call the ‘Restrictive View’, according to which there are restrictions on the sorts of harms and benefits that should be included in proportionality assessments about the justifiability of going to war (whether cyber or kinetic). We (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark