Results for 'cyberwarfare'

16 found
Order:
  1.  36
    By Disanalogy, Cyberwarfare Is Utterly New.Selmer Bringsjord & John Licato - 2015 - Philosophy and Technology 28 (3):339-358.
    We provide an underlying theory of argument by disanalogy, in order to employ it to show that cyberwarfare is fundamentally new. Once this general case is made, the battle is won: we are well on our way to establishing our main thesis: that Just War Theory itself must be modernized. Augustine and Aquinas had a stunningly long run, but today’s world, based as it is on digital information and increasingly intelligent information-processing, points the way to a beast so big (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  90
    The Ethics of Cyberwarfare.Randall R. Dipert - 2010 - Journal of Military Ethics 9 (4):384-410.
    The paper addresses several issues in the morality of cyberwar and cyberwarfare, defined as one nation's attacks on the governmental or civilian information systems of another nation. It sketches the diverse technical ways in which an attack may occur, including denial-of-service attacks and the insertion of various forms of malware. It argues that existing international law and widely discussed principles of Just War Theory do not straightforwardly apply to cyberwarfare, and many forms of cyberwarfare differ from previous (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  3. Not Just Cyberwarfare.Bruce Christianson - 2015 - Philosophy and Technology 28 (3):359-363.
    Bringsjord and Licato provide a general meta-argument that cyberwarfare is so different from traditional kinetic warfare that no argument from analogy can allow the just war theory of Augustine and Aquinas to be pulled over from traditional warfare to cyberwarfare. I believe that this meta-argument is sound and that it applies not just to cyberwarfare: in particular, on my reading of the meta-argument, argument from analogy has never been adequate to allow JWT to be applied to the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  28
    Other-than-Internet (OTI) Cyberwarfare: Challenges for Ethics, Law, and Policy.Randall R. Dipert - 2013 - Journal of Military Ethics 12 (1):34-53.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  5.  19
    Binary Bullets: The Ethics of Cyberwarfare.Fritz Allhoff, Adam Henschke & Bradley Jay Strawser (eds.) - 2016 - New York, US: Oxford University Press USA.
    Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  6.  42
    The Moral Permissibility of Automated Responses during Cyberwarfare.David Danks & Joseph H. Danks - 2013 - Journal of Military Ethics 12 (1):18-33.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  14
    Moral restrictions on the use of cyberwarfare.George R. Lucas Jr - 2013 - In Fritz Allhoff, Nicholas Evans & Adam Henschke (eds.), Routledge Handbook of Ethics and War: Just War Theory in the 21st Century. Routledge.
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  23
    Binary Bullets: The Ethics of Cyberwarfare, edited by Fitz Allhoff, Adam Henschke and Bradley Jay Strawser.Paul Lushenko - 2016 - Journal of Military Ethics 15 (1):69-73.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  47
    Democratizing cognitive technology: a proactive approach.Marcello Ienca - 2019 - Ethics and Information Technology 21 (4):267-280.
    Cognitive technology is an umbrella term sometimes used to designate the realm of technologies that assist, augment or simulate cognitive processes or that can be used for the achievement of cognitive aims. This technological macro-domain encompasses both devices that directly interface the human brain as well as external systems that use artificial intelligence to simulate or assist (aspects of) human cognition. As they hold the promise of assisting and augmenting human cognitive capabilities both individually and collectively, cognitive technologies could produce, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  70
    Cyberattacks as Casus Belli: A Sovereignty‐Based Account.Patrick Taylor Smith - 2015 - Journal of Applied Philosophy:222-241.
    Since cyberattacks are nonphysical, standard theories of casus belli — which typically rely on the violent and forceful nature of military means — appear inapplicable. Yet, some theorists have argued that cyberattacks nonetheless can constitute just causes for war — generating a unilateral right to defensive military action — when they cause significant physical damage through the disruption of the target's computer systems. I show that this view suffers from a serious drawback: it is too permissive concerning the types of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  26
    'Cyberation' and Just War Doctrine: A Response to Randall Dipert.Colonel James Cook - 2010 - Journal of Military Ethics 9 (4):411-423.
    In this essay, I reject the suggestion that the just war tradition (JWT) does not apply to cyberwarfare (CW). That is not to say CW will not include grey areas defying easy analysis in terms of the JWT. But analogously ambiguous cases have long existed in warfare without undercutting the JWT's broad relevance. That some aspects of CW are unique is likewise no threat to the JWT's applicability. The special character of CW remains similar enough to other kinds of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  12.  67
    Is Stuxnet Physical? Does It Matter?Ryan Jenkins - 2013 - Journal of Military Ethics 12 (1):68-79.
    Cyberweapons are software and software, at least intuitively, is nonphysical. Several authors have noted that this potentially renders problematic the application of normative frameworks like UN Charter Article 2(4) to cyberweapons. If Article 2(4) only proscribes the use of physical force, and if cyberweapons are nonphysical, then cyberweapons fall outside the purview of Article 2(4). This article explores the physicality of software, examining Stuxnet in particular. First, I show that with a few relatively uncontroversial metaphysical claims we can secure the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  43
    The Philosophy of War and Exile: From the Humanity of War to the Inhumanity of Peace.Nolen Gertz - 2014 - Palgrave-Macmillan.
    The Philosophy of War and Exile argues that our current paradigms for thinking about the ethics of war - just war theory - and the suffering of war - PTSD theory - judge war without a proper understanding of war. By continuing the investigations of J. Glenn Gray into the meaning of how war is experienced by combatants we can find an alternative understanding of not only war, but of peace, culminating in a new theory of responsibility centered around embodiment (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  14.  28
    Beyond Machines: Humans in Cyber Operations, Espionage, and Conflict.David Danks & Joseph H. Danks - unknown
    It is the height of banality to observe that people, not bullets, fight kinetic wars. The machinery of kinetic warfare is obviously relevant to the conduct of each particular act of warfare, but the reasons for, and meanings of, those acts depend critically on the fact that they are done by humans. Any attempt to understand warfare—its causes, strategies, legitimacy, dynamics, and resolutions—must incorporate humans as an intrinsic part, both descriptively and normatively. Humans from general staff to “boots on the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  11
    The 2020 Yearbook of the Digital Ethics Lab.Josh Cowls & Jessica Morley (eds.) - 2021 - Springer Verlag.
    This annual edited volume presents an overview of cutting-edge research areas within digital ethics as defined by the Digital Ethics Lab of the University of Oxford. It identifies new challenges and opportunities of influence in setting the research agenda in the field. The 2020 edition of the yearbook presents research on the following topics: governing digital health, visualising governance, the digital afterlife, the possibility of an AI winter, the limits of design theory in philosophy, cyberwarfare, ethics of online behaviour (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  18
    Review: Jussi Parikka, Digital Contagions: A Media Archaeology of Computer Viruses. [REVIEW]Roger Whitson - 2017 - Theory, Culture and Society 34 (7-8):293-298.
    The second edition of Jussi Parikka’s Digital Contagions: A Media Archaeology of Computer Viruses is both a welcome reissue of a canonical text in media archaeology and an important intervention into contemporary techno-political crises like cyberwarfare. Parikka’s book shows how viruses are central to the history of networked computing, while articulating their social connections to political, medical, and cultural discourses. For him, the notion of contagion in digital networks is inseparable from the rise of the computing security industry and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark