Switch to: References

Citations of:

The ethics of information warfare

Springer International Publishing (2014)

Add citations

You must login to add citations.
  1. Hyperhistory, the emergence of the MASs, and the design of infraethics.Luciano Floridi - 2016 - In Mireille Hildebrandt & Bibi van den Berg (eds.), Information, Freedom and Property: The Philosophy of Law Meets the Philosophy of Technology. Routledge.
    The Copernican revolution displaced us from the center of the universe. The Darwinian revolution displaced us from the center of the biological kingdom. And the Freudian revolution displaced us from the center of our mental lives. Today, Computer Science and digital ICTs are causing a fourth revolution, radically changing once again our conception of who we are and our “exceptional centrality.” We are not at the center of the infosphere. We are not standalone entities, but rather interconnected informational agents, sharing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral responsibilities (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • The Limits of Deterrence Theory in Cyberspace.Mariarosaria Taddeo - 2018 - Philosophy and Technology 31 (3):339-355.
    In this article, I analyse deterrence theory and argue that its applicability to cyberspace is limited and that these limits are not trivial. They are the consequence of fundamental differences between deterrence theory and the nature of cyber conflicts and cyberspace. The goals of this analysis are to identify the limits of deterrence theory in cyberspace, clear the ground of inadequate approaches to cyber deterrence, and define the conceptual space for a domain-specific theory of cyber deterrence, still to be developed.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The Struggle Between Liberties and Authorities in the Information Age.Mariarosaria Taddeo - 2015 - Science and Engineering Ethics 21 (5):1125-1138.
    The “struggle between liberties and authorities”, as described by Mill, refers to the tension between individual rights and the rules restricting them that are imposed by public authorities exerting their power over civil society. In this paper I argue that contemporary information societies are experiencing a new form of such a struggle, which now involves liberties and authorities in the cyber-sphere and, more specifically, refers to the tension between cyber-security measures and individual liberties. Ethicists, political philosophers and political scientists have (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • On the Risks of Relying on Analogies to Understand Cyber Conflicts.Mariarosaria Taddeo - 2016 - Minds and Machines 26 (4):317-321.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Information Societies, Ethical Enquiries.Mariarosaria Taddeo & Elizabeth Buchanan - 2015 - Philosophy and Technology 28 (1):5-10.
    The special issue collects a selection of papers presented during the Computer Ethics: Philosophical Enquiries 2013 conference. This is a series of conferences organized by the International Association for Ethics and Information Technology , a professional organization formed in 2001 and which gathers experts in information and computer ethics prompting interdisciplinary research and discussions on ethical problems related to design and deployment of information and communication technologies . During the past two decades, CEPE conferences have been a focal point for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Deterrence by Norms to Stop Interstate Cyber Attacks.Mariarosaria Taddeo - 2017 - Minds and Machines 27 (3):387-392.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Cyber Conflicts and Political Power in Information Societies.Mariarosaria Taddeo - 2017 - Minds and Machines 27 (2):265-268.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Realignment of the Sources of the Law and their Meaning in an Information Society.Ugo Pagallo - 2015 - Philosophy and Technology 28 (1):57-73.
    The paper examines the realignment of the legal sources in an information society, by considering first of all the differences with the previous system of sources, dubbed as the “Westphalian model”. The current system is tripartite, rather than bipartite, for the sources of transnational law should be added to the traditional dichotomy between national and international law. In addition, the system is dualistic, rather than monistic, because the tools of legal constructivism, such as codes or statutes, have to be complemented (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The latent nature of global information warfare.Luciano Floridi - 2014 - Philosophy and Technology 27 (3):317–319.
    Information has always been at the core of conflicts. When Napoleon planned to invade Italy, he duly upgraded the first telegraph network in the world, the French “semaphore”. He famously remarked that “an army marches on its stomach,” but he also knew that the same army acted on information. As Von Clausewitz once stated “by the word ‘information’ we denote all the knowledge which we have of the enemy and his country; therefore, in fact, the foundation of all our ideas (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Toleration and the design of norms.Luciano Floridi - 2015 - Science and Engineering Ethics 21 (5):1095-1123.
    One of the pressing challenges we face today—in a post-Westphalian order and post-Bretton Woods world —is how to design the right kind of MAS that can take full advantage of the socio-economic and political progress made so far, while dealing successfully with the new global challenges that are undermining the best legacy of that very progress. This is the topic of the article. In it, I argue that in order to design the right kind of MAS, we need to design (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations