Switch to: References

Add citations

You must login to add citations.
  1. The Ethics of Cyber Attack: Pursuing Legitimate Security and the Common Good in Contemporary Conflict Scenarios.David J. Lonsdale - 2020 - Journal of Military Ethics 19 (1):20-39.
    Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds an...
    Download  
     
    Export citation  
     
    Bookmark  
  • Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Ethiek voor Cyberkrijg en Cyberkrijgers.Peter Olsthoorn - 2019 - Algemeen Nederlands Tijdschrift voor Wijsbegeerte 111 (1):95-109.
    Although some claim that the term cyber war is merely metaphorical, there are good reasons to see cyber war as a form of warfare ‐ even if it is not war as we have hitherto known it. This poses the question whether the principles of the Just War Tradition, which claims to offer an alternative for pacifism and realism, apply to this specific kind of war too. This article argues that the jus in bello principles of discrimination and proportionality are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Ethics of Online Military Information Activities.Justin S. Hempson-Jones - 2018 - Journal of Military Ethics 17 (4):211-223.
    ABSTRACTThis article argues that new forms of conducting military information activities using the Internet require renewed consideration of the ethical frameworks in which conduct of such activities can be grounded: frameworks that require these operations to be considered on their own terms rather than as a subset of wider categories. In this online context the article explores the interlinked areas of proportionality and privacy, delineations between combatant and non-combatant, and limits to acceptable deceptive practices. The article argues that the “soft” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
    Recent debate on the relationship between cyber threats, on the one hand, and both strategy and ethics on the other focus on the extent to which ‘cyber war’ is possible, both as a conceptual question and an empirical one. Whether it can is an important question for just war theorists. From this perspective, it is necessary to evaluate cyber measures both as a means of responding to threats and as a possible just cause for using armed kinetic force. In this (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Security Institutions, Use of Force and the State: A Moral Framework.Shannon Ford - 2016 - Dissertation, Australian National University
    This thesis examines the key moral principles that should govern decision-making by police and military when using lethal force. To this end, it provides an ethical analysis of the following question: Under what circumstances, if any, is it morally justified for the agents of state-sanctioned security institutions to use lethal force, in particular the police and the military? Recent literature in this area suggests that modern conflicts involve new and unique features that render conventional ways of thinking about the ethics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The ethics of information warfare.Luciano Floridi & Mariarosaria Taddeo (eds.) - 2014 - Springer International Publishing.
    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare. -/- The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Warfighting for Cyber Deterrence: a Strategic and Moral Imperative.David J. Lonsdale - 2018 - Philosophy and Technology 31 (3):409-429.
    Theories of cyber deterrence are developing rapidly. However, the literature is missing an important ingredient—warfighting for deterrence. This controversial idea, most commonly associated with nuclear strategy during the later stages of the Cold War, affords a number of advantages. It provides enhanced credibility for deterrence, offers means to deal with deterrence failure, improves compliance with the requirements of just war and ultimately ensures that strategy continues to function in the post-deterrence environment. This paper assesses whether a warfighting for deterrence approach (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Is Stuxnet Physical? Does It Matter?Ryan Jenkins - 2013 - Journal of Military Ethics 12 (1):68-79.
    Cyberweapons are software and software, at least intuitively, is nonphysical. Several authors have noted that this potentially renders problematic the application of normative frameworks like UN Charter Article 2(4) to cyberweapons. If Article 2(4) only proscribes the use of physical force, and if cyberweapons are nonphysical, then cyberweapons fall outside the purview of Article 2(4). This article explores the physicality of software, examining Stuxnet in particular. First, I show that with a few relatively uncontroversial metaphysical claims we can secure the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Warfare in a new domain: The ethics of military cyber-operations.Edward T. Barrett - 2013 - Journal of Military Ethics 12 (1):4-17.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Cognitive warfare: an ethical analysis.Seumas Miller - 2023 - Ethics and Information Technology 25 (3):1-10.
    This article characterises the nature of cognitive warfare and its use of disinformation and computational propaganda and its political and military purposes in war and in conflict short of war. It discusses both defensive and offensive measures to counter cognitive warfare and, in particular, measures that comply with relevant moral principles.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Ethics and Cyber Conflict: A Response to JME 12:1 (2013).George R. Lucas Jr - 2014 - Journal of Military Ethics 13 (1):20-31.
    (2014). Ethics and Cyber Conflict: A Response to JME 12:1 (2013) Journal of Military Ethics: Vol. 13, No. 1, pp. 20-31. doi: 10.1080/15027570.2014.908012.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Cyber Conflicts and Political Power in Information Societies.Mariarosaria Taddeo - 2017 - Minds and Machines 27 (2):265-268.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • 'Cyberation' and Just War Doctrine: A Response to Randall Dipert.Colonel James Cook - 2010 - Journal of Military Ethics 9 (4):411-423.
    In this essay, I reject the suggestion that the just war tradition (JWT) does not apply to cyberwarfare (CW). That is not to say CW will not include grey areas defying easy analysis in terms of the JWT. But analogously ambiguous cases have long existed in warfare without undercutting the JWT's broad relevance. That some aspects of CW are unique is likewise no threat to the JWT's applicability. The special character of CW remains similar enough to other kinds of warfare; (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Struggle Between Liberties and Authorities in the Information Age.Mariarosaria Taddeo - 2015 - Science and Engineering Ethics 21 (5):1125-1138.
    The “struggle between liberties and authorities”, as described by Mill, refers to the tension between individual rights and the rules restricting them that are imposed by public authorities exerting their power over civil society. In this paper I argue that contemporary information societies are experiencing a new form of such a struggle, which now involves liberties and authorities in the cyber-sphere and, more specifically, refers to the tension between cyber-security measures and individual liberties. Ethicists, political philosophers and political scientists have (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • (1 other version)Just Information Warfare.Mariarosaria Taddeo - 2016 - Topoi 35 (1):213-224.
    In this article I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold: filling the theoretical vacuum surrounding this phenomenon and providing the conceptual grounding for the definition of new ethical regulations for information warfare. I argue that Just War Theory is a necessary but not sufficient instrument for considering the ethical implications of information warfare and that a suitable ethical analysis of this kind of warfare is developed when Just War (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Other-than-Internet (OTI) Cyberwarfare: Challenges for Ethics, Law, and Policy.Randall R. Dipert - 2013 - Journal of Military Ethics 12 (1):34-53.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Just War and Cyberwar.Christopher J. Eberle - 2013 - Journal of Military Ethics 12 (1):54-67.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Moral Permissibility of Automated Responses during Cyberwarfare.David Danks & Joseph H. Danks - 2013 - Journal of Military Ethics 12 (1):18-33.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Reliable Old Wineskins: The Applicability of the Just War Tradition to Military Cyber Operations.Edward T. Barrett - 2015 - Philosophy and Technology 28 (3):387-405.
    This article argues that the traditional jus ad bellum and jus in bello criteria are fully capable of providing the ethical guidance needed to legitimately conduct military cyber operations. The first part examines the criteria’s foundations by focusing on the notion of liability to defensive harm worked out by revisionist just war thinkers. The second part critiques the necessity of alternative frameworks, which its proponents assert are required to at least supplement the traditional just war criteria. Using the latter, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Beyond Just War: Military Strategy for the Common Good.David Lonsdale - 2016 - Journal of Military Ethics 15 (2):100-121.
    ABSTRACTThe objective of this article is to move ethical discourse on military strategy beyond the confines of the established War Convention. This is achieved by utilising the common good, a concept found in political philosophy and theology. The common good acts as a positive organising concept for socio-political activity. With its focus on peace, development and the flourishing of the individual and community, the common good poses a significant challenge to strategy. This article constructs an approach to strategy that is (...)
    Download  
     
    Export citation  
     
    Bookmark