Authors |
|
Abstract |
Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
|
Keywords | cognitive security online influence computational propaganda information ethics ethics of war AI ethics ethics of artificial intelligence content moderation |
Categories | (categorize this paper) |
Options |
![]() ![]() ![]() ![]() |
Download options
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Power and Servility. An Experiment in the Ethics of Security and Counter-Security.Dadusc Deanna & Carney Phil - unknown
Online Security: What’s in a Name? [REVIEW]Anat Biletzki - 2013 - Philosophy and Technology 26 (4):397-410.
The Ethics of Care: A Feminist Approach to Human Security.Fiona Robinson - 2011 - Temple University Press.
Critical Theory as an Approach to the Ethics of Information Security.Bernd Carsten Stahl, Neil F. Doherty, Mark Shaw & Helge Janicke - 2014 - Science and Engineering Ethics 20 (3):675-699.
Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
A Bibliometric Analysis of Privacy and Ethics in IEEE Security and Privacy.Jonathan Tse, Dawn E. Schrader, Dipayan Ghosh, Tony Liao & David Lundie - 2015 - Ethics and Information Technology 17 (2):153-163.
Ethical Security Studies: A New Research Agenda.Jonna Nyman & Anthony Burke (eds.) - 2016 - Routledge.
Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures.John D’Arcy & Anat Hovav - 2008 - Journal of Business Ethics 89 (S1):59-71.
Explanation and Trust: What to Tell the User in Security and AI? [REVIEW]Wolter Pieters - 2011 - Ethics and Information Technology 13 (1):53-64.
Defining Information Security.Lundgren Björn & Möller Niklas - 2019 - Science and Engineering Ethics 25 (2):419-441.
Hybrid Information Technology Using Computational Intelligence-Security Intelligence: Web Contents Security System for Semantic Web.Nam-Deok Cho, Eun-ser Lee & Hyun-gun Park - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4252--819.
Security Thought in Africa in the Context of Global Ethics.Jacob Mabe - 2007 - International Review of Information Ethics 7:209-215.
Manufacturing Morality A General Theory of Moral Agency Grounding Computational Implementations: The ACTWith Model.Jeffrey White - 2013 - In Floares (ed.), Computational Intelligence. Nova Publications. pp. 1-65.
Analytics
Added to PP index
2020-03-04
Total views
235 ( #36,531 of 2,401,867 )
Recent downloads (6 months)
121 ( #4,746 of 2,401,867 )
2020-03-04
Total views
235 ( #36,531 of 2,401,867 )
Recent downloads (6 months)
121 ( #4,746 of 2,401,867 )
How can I increase my downloads?
Downloads