Switch to: References

Add citations

You must login to add citations.
  1. Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • The Ethics of Online Military Information Activities.Justin S. Hempson-Jones - 2018 - Journal of Military Ethics 17 (4):211-223.
    ABSTRACTThis article argues that new forms of conducting military information activities using the Internet require renewed consideration of the ethical frameworks in which conduct of such activities can be grounded: frameworks that require these operations to be considered on their own terms rather than as a subset of wider categories. In this online context the article explores the interlinked areas of proportionality and privacy, delineations between combatant and non-combatant, and limits to acceptable deceptive practices. The article argues that the “soft” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Was Snowden virtuous?Clive Harfield - 2021 - Ethics and Information Technology 23 (3):373-383.
    Professor Shannon Vallor’s theoretical framework of technomoral virtue ethics identifies character traits that can be cultivated to foster a future worth wanting in an environment of emerging technologies. Such technologies and increased citizen participation in the new digital environment have reconfigured what is possible in policing and intelligence-gathering more quickly, perhaps, than sober and sensible policy reflection and formulation can keep pace with. Sensational and dramatic, seismic and devastating, the Snowden disclosures represent a particular expression of dissent against American intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Justifying Cyber-intelligence?Ross W. Bellaby - 2016 - Journal of Military Ethics 15 (4):299-319.
    The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations