Switch to: References

Add citations

You must login to add citations.
  1. The ethics of information warfare.Luciano Floridi & Mariarosaria Taddeo (eds.) - 2014 - Springer International Publishing.
    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare. -/- The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • The Syrian Electronic Army – a hacktivist group.Matthew Warren & Shona Leitch - 2016 - Journal of Information, Communication and Ethics in Society 14 (2):200-212.
    Purpose The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations. Design/methodology/approach This paper looks at chronological examples of Syrian Electronic Army activities and assess them using a developed hacktivist criteria to try and gain a greater understanding of the motivations of the Syrian Electronic Army. The paper uses a netnography research approach. Findings This paper determines that the Syrian Electronic Army is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Civic Role of Online Service Providers.Mariarosaria Taddeo - 2019 - Minds and Machines 29 (1):1-7.
  • The Limits of Deterrence Theory in Cyberspace.Mariarosaria Taddeo - 2018 - Philosophy and Technology 31 (3):339-355.
    In this article, I analyse deterrence theory and argue that its applicability to cyberspace is limited and that these limits are not trivial. They are the consequence of fundamental differences between deterrence theory and the nature of cyber conflicts and cyberspace. The goals of this analysis are to identify the limits of deterrence theory in cyberspace, clear the ground of inadequate approaches to cyber deterrence, and define the conceptual space for a domain-specific theory of cyber deterrence, still to be developed.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • The Struggle Between Liberties and Authorities in the Information Age.Mariarosaria Taddeo - 2015 - Science and Engineering Ethics 21 (5):1125-1138.
    The “struggle between liberties and authorities”, as described by Mill, refers to the tension between individual rights and the rules restricting them that are imposed by public authorities exerting their power over civil society. In this paper I argue that contemporary information societies are experiencing a new form of such a struggle, which now involves liberties and authorities in the cyber-sphere and, more specifically, refers to the tension between cyber-security measures and individual liberties. Ethicists, political philosophers and political scientists have (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  • On the Risks of Relying on Analogies to Understand Cyber Conflicts.Mariarosaria Taddeo - 2016 - Minds and Machines 26 (4):317-321.
  • Just Information Warfare.Mariarosaria Taddeo - 2016 - Topoi 35 (1):213-224.
    In this article I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold: filling the theoretical vacuum surrounding this phenomenon and providing the conceptual grounding for the definition of new ethical regulations for information warfare. I argue that Just War Theory is a necessary but not sufficient instrument for considering the ethical implications of information warfare and that a suitable ethical analysis of this kind of warfare is developed when Just War (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Deterrence by Norms to Stop Interstate Cyber Attacks.Mariarosaria Taddeo - 2017 - Minds and Machines 27 (3):387-392.
  • Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and state power (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Deterrence and Norms to Foster Stability in Cyberspace.Mariarosaria Taddeo - 2018 - Philosophy and Technology 31 (3):323-329.
    Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, conceptual, normative, and strategic framework. To be successful, cyber deterrence needs to shift from threatening to prevailing. I argue that by itself, deterrence is insufficient to ensure stability of cyberspace. An international regime of norms regulating state behaviour in cyberspace is necessary to complement cyber deterrence strategies and foster stability. Enforcing this regime requires an authority able to ensure States compliance with the norms at an (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Ethical Principles for Artificial Intelligence in National Defence.Mariarosaria Taddeo, David McNeish, Alexander Blanchard & Elizabeth Edgar - 2021 - Philosophy and Technology 34 (4):1707-1729.
    Defence agencies across the globe identify artificial intelligence as a key technology to maintain an edge over adversaries. As a result, efforts to develop or acquire AI capabilities for defence are growing on a global scale. Unfortunately, they remain unmatched by efforts to define ethical frameworks to guide the use of AI in the defence domain. This article provides one such framework. It identifies five principles—justified and overridable uses, just and transparent systems and processes, human moral responsibility, meaningful human control (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  • Cyber Conflicts and Political Power in Information Societies.Mariarosaria Taddeo - 2017 - Minds and Machines 27 (2):265-268.
  • Information Warfare: A Response to Taddeo.Tim Stevens - 2013 - Philosophy and Technology 26 (2):221-225.
    Taddeo’s recent article, ‘Information Warfare: A Philosophical Perspective’ (Philos. Technol. 25:105–120, 2012) is a useful addition to the literature on information communications technologies (ICTs) and warfare. In this short response, I draw attention to two issues arising from the article. The first concerns the applicability of ‘information warfare’ terminology to current political and military discourse, on account of its relative lack of contemporary usage. The second engages with the political and ethical implications of treating ICT environments as a ‘domain’, with (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Chinese approach to artificial intelligence: an analysis of policy, ethics, and regulation.Huw Roberts, Josh Cowls, Jessica Morley, Mariarosaria Taddeo, Vincent Wang & Luciano Floridi - 2021 - AI and Society 36 (1):59–⁠77.
    In July 2017, China’s State Council released the country’s strategy for developing artificial intelligence, entitled ‘New Generation Artificial Intelligence Development Plan’. This strategy outlined China’s aims to become the world leader in AI by 2030, to monetise AI into a trillion-yuan industry, and to emerge as the driving force in defining ethical norms and standards for AI. Several reports have analysed specific aspects of China’s AI policies or have assessed the country’s technical capabilities. Instead, in this article, we focus on (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  • Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS critically (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • Cyber Conflicts: Addressing the Regulatory Gap.Ludovica Glorioso - 2015 - Philosophy and Technology 28 (3):333-338.
    This special issue gathers together a selection of papers presented by international experts during a workshop entitled ‘Ethics of Cyber-Conflicts’, which was devoted to fostering interdisciplinary debate on the ethical and legal problems and the regulatory gap concerning cyber conflicts. The workshop was held in 2013 at the Centro Alti Studi Difesa in Rome under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence . This NATO-accredited international military organisation that has always placed a high value on an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • By Disanalogy, Cyberwarfare Is Utterly New.Selmer Bringsjord & John Licato - 2015 - Philosophy and Technology 28 (3):339-358.
    We provide an underlying theory of argument by disanalogy, in order to employ it to show that cyberwarfare is fundamentally new. Once this general case is made, the battle is won: we are well on our way to establishing our main thesis: that Just War Theory itself must be modernized. Augustine and Aquinas had a stunningly long run, but today’s world, based as it is on digital information and increasingly intelligent information-processing, points the way to a beast so big and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Reliable Old Wineskins: The Applicability of the Just War Tradition to Military Cyber Operations.Edward T. Barrett - 2015 - Philosophy and Technology 28 (3):387-405.
    This article argues that the traditional jus ad bellum and jus in bello criteria are fully capable of providing the ethical guidance needed to legitimately conduct military cyber operations. The first part examines the criteria’s foundations by focusing on the notion of liability to defensive harm worked out by revisionist just war thinkers. The second part critiques the necessity of alternative frameworks, which its proponents assert are required to at least supplement the traditional just war criteria. Using the latter, the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark