Results for 'cyberwar'

23 found
Order:
  1.  9
    Proportionality in cyberwar and just war theory.Fredrik D. Hjorthen & James Pattison - 2023 - Ethics and Global Politics 16 (1):1-24.
    Which harms and benefits should be viewed as relevant when considering whether to launch cyber-measures? In this article, we consider this question, which matters because it is central to determining whether cyber-measures should be launched. Several just war theorists hold a version of what we call the ‘Restrictive View’, according to which there are restrictions on the sorts of harms and benefits that should be included in proportionality assessments about the justifiability of going to war (whether cyber or kinetic). We (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  63
    Just cyberwar theory.Luciano Floridi - 2011 - The Philosophers' Magazine 55 (55):17-18.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  47
    Twenty years of cyberwar.John Arquilla - 2013 - Journal of Military Ethics 12 (1):80-87.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  37
    Just War and Cyberwar.Christopher J. Eberle - 2013 - Journal of Military Ethics 12 (1):54-67.
  5.  9
    International Law as We Know It: Cyberwar Discourse and the Construction of Knowledge in International Legal Scholarship.Lianne J. M. Boer - 2021 - Cambridge University Press.
    International legal scholars tend to think of their work as the interpretation of rules: the application of a law 'out there' to concrete situations. This book takes a different approach to that scholarship: it views doctrine as a socio-linguistic practice. In other words, this book views legal scholars not as law-appliers, but as constructing knowledge within a particular academic discipline. By means of three close-ups of the discourse on cyberwar and international law, this book shows how international legal knowledge (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  33
    Get ready for cyberwar.Luciano Floridi - 2009 - The Philosophers' Magazine 46:12-13.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  5
    Deconstruction machines: writing in the age of cyberwar.Justin Joque - 2018 - Minneapolis: University of Minnesota Press.
    Root kit -- Buffer overflow: the space and time of cyberwar -- Injection attack: writing and the information catastrophe -- Distributed denial of service: cybernetic sovereignty -- Spear phishing: nodal subjects -- Firmware vulnerabilities.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  24
    Why the World Needs an International Cyberwar Convention.Mette Eilstrup-Sangiovanni - 2018 - Philosophy and Technology 31 (3):379-407.
    States’ capacity for using modern information and communication technology to inflict grave harm on enemies has been amply demonstrated in recent years, with many countries reporting large-scale cyberattacks against their military defense systems, water supply, and other critical infrastructure. Currently, no agreed-upon international rules or norms exist to govern international conflict in cyberspace. Many governments prefer to keep it that way. They argue that difficulties of verifiability and challenges posed by rapid technological change rule out agreement on an international cyber (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  21
    Guest editor's introduction the ethical debate over cyberwar.Bradley J. Strawser - 2013 - Journal of Military Ethics 12 (1):1-3.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  67
    Is Stuxnet Physical? Does It Matter?Ryan Jenkins - 2013 - Journal of Military Ethics 12 (1):68-79.
    Cyberweapons are software and software, at least intuitively, is nonphysical. Several authors have noted that this potentially renders problematic the application of normative frameworks like UN Charter Article 2(4) to cyberweapons. If Article 2(4) only proscribes the use of physical force, and if cyberweapons are nonphysical, then cyberweapons fall outside the purview of Article 2(4). This article explores the physicality of software, examining Stuxnet in particular. First, I show that with a few relatively uncontroversial metaphysical claims we can secure the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  32
    Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
    Recent debate on the relationship between cyber threats, on the one hand, and both strategy and ethics on the other focus on the extent to which ‘cyber war’ is possible, both as a conceptual question and an empirical one. Whether it can is an important question for just war theorists. From this perspective, it is necessary to evaluate cyber measures both as a means of responding to threats and as a possible just cause for using armed kinetic force. In this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  12.  89
    The Ethics of Cyberwarfare.Randall R. Dipert - 2010 - Journal of Military Ethics 9 (4):384-410.
    The paper addresses several issues in the morality of cyberwar and cyberwarfare, defined as one nation's attacks on the governmental or civilian information systems of another nation. It sketches the diverse technical ways in which an attack may occur, including denial-of-service attacks and the insertion of various forms of malware. It argues that existing international law and widely discussed principles of Just War Theory do not straightforwardly apply to cyberwarfare, and many forms of cyberwarfare differ from previous forms of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  13. A Two Level Account of Executive Authority.Michael Skerker - 2019 - In Claire Oakes Finkelstein & Michael Skerker (eds.), Sovereignty and the New Executive Authority. Oxford University Press.
    The suite of secretive national security programs initiated in the US since 9/11 has created debate not only about the merits of targeted killing, torture, secret detention, cyberwar, global signals intercepts, and data-mining, but about the very secrecy in which these programs were conceived, debated by government officials, and implemented. Law must be revealed to those who are expected to comply with its demands. Law is a mere pretext for coercion if the laws permitting the government to coerce people (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  25
    Philosophy of Accelerationism: A New Way of Comprehending the Present Social Reality (in Nick Land’s Context).Denis I. Chistyakov - 2022 - RUDN Journal of Philosophy 26 (3):687-696.
    Modern types of social reality require updated ways of comprehending them. The research is devoted to a new analytical form of understanding modernity that has recently emerged - accelerationism, still rarely discussed in Russian philosophy. The representatives of accelerationism call for a radical and rapid acceleration of socio-economic and technological processes in capitalist societies. The article reflects some ideas of the Manifesto for an Accelerationist Politics by Alex Williams and Nick Srnicek, after which the accelerationist trend in philosophy and social (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  17
    Beyond Just War: Military Strategy for the Common Good.David Lonsdale - 2016 - Journal of Military Ethics 15 (2):100-121.
    ABSTRACTThe objective of this article is to move ethical discourse on military strategy beyond the confines of the established War Convention. This is achieved by utilising the common good, a concept found in political philosophy and theology. The common good acts as a positive organising concept for socio-political activity. With its focus on peace, development and the flourishing of the individual and community, the common good poses a significant challenge to strategy. This article constructs an approach to strategy that is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  7
    Spazi hobbesiani?Pierpaolo Marrone - 2022 - Scienza E Filosofia 27:137-159.
    Hobbesian spaces? In this article I explore some issues related to cyberwar and its implications for the extension of the Hobbesian paradigm of the state of nature to international relations with particular reference to cyberspace. My conclusion is that there are many reasons to believe that this explanatory paradigm should also apply in this area.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  3
    Proportionality in international law.Michael A. Newton - 2014 - New York, NY: Oxford University Press. Edited by Larry May.
    Introduction -- What is proportionality? -- Proportionality : a multiplicity of meanings -- Proportionality in the just war tradition -- Proportionality in international humanitarian law -- Proportionality in human rights law and morality -- The uniqueness of jus in bello proportionality -- Countermeasures and counterinsurgency -- Human shields and risk -- Targeted killings and proportionality in law : two models -- The nature of war and the idea of "cyberwar" -- Thresholds of jus in bello proportionality.
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  19
    "Центр спеціальних заходів" - еліта сил спецпризначення сша: Завдання, структура, бойове застосування.Andrii Slyusarenko - 2018 - Схід 1 (153):84-89.
    The research aims to analyze the tasks and structure as well as identify the specifics of training and learn tactical employment of Special Activities Center units of the US CIA - the elite of the American Special Operations Forces. The interest in the study stems from the necessity to learn approaches to tasks, forms of and techniques for employment of Special Operations Forces of ground troops in different countries of the world. The Center history is traced from the Operations and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  7
    From social to cyber justice: critical views on justice, law, and ethics.Nythamar Fernandes de Oliveira, Marek Hrubec & Emil Albert Sobottka (eds.) - 2018 - Porto Alegre: PUCRS.
    The book contains critical analyses of injustice in connection to law and ethics, and develops normative alternatives linked to justice. It covers the relevant issues from social justice to cyber justice. The chapters address issues and concepts which guideline on social innovations, transformations inherent in democratizing processes, global conflicts and other interactions, including the ultimate danger of escalation to war conflicts, be they conventional wars or new cyberwars.--From publisher's website.
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  92
    Critical practices in international theory: selected essays.James Der Derian - 2009 - New York: Routledge.
    Introduction -- "Mediating estrangement: a theory for diplomacy," review of International Studies (April, l987), 13, pp. 91-110 -- "Arms, hostages and the importance of shredding in earnest: reading the national security culture," Social Text (Spring, 1989), 22, pp. 79-91 -- "The (s)pace of international relations: simulation, surveillance and speed," International Studies Quarterly (September 1990), pp. 295-310 -- "Narco-terrorism at home and abroad," Radical America (December 1991), vol. 23, nos. 2-3, pp. 21-26 -- "The terrorist discourse: signs, states, and systems of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  15
    Here be monsters: technoscience, capitalism and human nature.Richard King - 2023 - Clayton, VIC: Monash University Publishing.
    Technology is developing fast - so fast that it threatens to overwhelm the very species whose genius lies in its technological cunning: us. From the metaverse to genetic engineering and mood-altering pharmaceuticals, to cybersex and cyberwar and the widespread automation of work, new technologies are rewriting the terms of our existence, not in a neutral spirit of 'progress' but in line with the priorities of power and profit, and in ways that often work against the grain of our fundamental (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22. Defining War.Jessica Wolfendale - 2017 - In Michael L. Gross & Tamar Meisels (eds.), Soft War: The Ethics of Unarmed Conflict. Cambridge University Press. pp. 16-32.
    In international law and just war theory, war is treated as normatively and legally unique. In the context of international law, war’s special status gives rise to a specific set of belligerent rights and duties, as well as a complex set of laws related to, among other things, the status of civilians, prisoners of war, trade and economic relationships, and humanitarian aid. In particular, belligerents are permitted to derogate from certain human rights obligations and to use lethal force in a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  8
    Історичний досвід діяльності держав-учасниць одкб щодо проведення спільних операцій в інформаційному просторі.Gapeyeva Olga - 2017 - Схід 4 (150):48-52.
    Information security is a component of the state national security. In this regard, the urgent issue today is to ensure the security of state information resources, protection of vital interests of society in the information sphere. The aim of the study is to analyze the main measures CSTO member states to organize and conduct joint operations in the informational area. The activities of the CSTO is to conduct joint operations in cyberspace, aimed at identifying and blocking the sources of destructive (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark