Switch to: References

Citations of:

Just Information Warfare

Topoi 35 (1):213-224 (2016)

Add citations

You must login to add citations.
  1. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity.Mariarosaria Taddeo - 2019 - Minds and Machines 29 (2):187-191.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Artificial intelligence and the ‘Good Society’: the US, EU, and UK approach.Corinne Cath, Sandra Wachter, Brent Mittelstadt, Mariarosaria Taddeo & Luciano Floridi - 2018 - Science and Engineering Ethics 24 (2):505-528.
    In October 2016, the White House, the European Parliament, and the UK House of Commons each issued a report outlining their visions on how to prepare society for the widespread use of artificial intelligence. In this article, we provide a comparative assessment of these three reports in order to facilitate the design of policies favourable to the development of a ‘good AI society’. To do so, we examine how each report addresses the following three topics: the development of a ‘good (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  • The Struggle Between Liberties and Authorities in the Information Age.Mariarosaria Taddeo - 2015 - Science and Engineering Ethics 21 (5):1125-1138.
    The “struggle between liberties and authorities”, as described by Mill, refers to the tension between individual rights and the rules restricting them that are imposed by public authorities exerting their power over civil society. In this paper I argue that contemporary information societies are experiencing a new form of such a struggle, which now involves liberties and authorities in the cyber-sphere and, more specifically, refers to the tension between cyber-security measures and individual liberties. Ethicists, political philosophers and political scientists have (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • Deterrence by Norms to Stop Interstate Cyber Attacks.Mariarosaria Taddeo - 2017 - Minds and Machines 27 (3):387-392.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Deterrence and Norms to Foster Stability in Cyberspace.Mariarosaria Taddeo - 2018 - Philosophy and Technology 31 (3):323-329.
    Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, conceptual, normative, and strategic framework. To be successful, cyber deterrence needs to shift from threatening to prevailing. I argue that by itself, deterrence is insufficient to ensure stability of cyberspace. An international regime of norms regulating state behaviour in cyberspace is necessary to complement cyber deterrence strategies and foster stability. Enforcing this regime requires an authority able to ensure States compliance with the norms at an (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Ethical Principles for Artificial Intelligence in National Defence.Mariarosaria Taddeo, David McNeish, Alexander Blanchard & Elizabeth Edgar - 2021 - Philosophy and Technology 34 (4):1707-1729.
    Defence agencies across the globe identify artificial intelligence as a key technology to maintain an edge over adversaries. As a result, efforts to develop or acquire AI capabilities for defence are growing on a global scale. Unfortunately, they remain unmatched by efforts to define ethical frameworks to guide the use of AI in the defence domain. This article provides one such framework. It identifies five principles—justified and overridable uses, just and transparent systems and processes, human moral responsibility, meaningful human control (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Information Societies, Ethical Enquiries.Mariarosaria Taddeo & Elizabeth Buchanan - 2015 - Philosophy and Technology 28 (1):5-10.
    The special issue collects a selection of papers presented during the Computer Ethics: Philosophical Enquiries 2013 conference. This is a series of conferences organized by the International Association for Ethics and Information Technology , a professional organization formed in 2001 and which gathers experts in information and computer ethics prompting interdisciplinary research and discussions on ethical problems related to design and deployment of information and communication technologies . During the past two decades, CEPE conferences have been a focal point for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Cyber Conflicts and Political Power in Information Societies.Mariarosaria Taddeo - 2017 - Minds and Machines 27 (2):265-268.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • On the Risks of Relying on Analogies to Understand Cyber Conflicts.Mariarosaria Taddeo - 2016 - Minds and Machines 26 (4):317-321.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Proportionality in cyberwar and just war theory.Fredrik D. Hjorthen & James Pattison - 2023 - Ethics and Global Politics 16 (1):1-24.
    Which harms and benefits should be viewed as relevant when considering whether to launch cyber-measures? In this article, we consider this question, which matters because it is central to determining whether cyber-measures should be launched. Several just war theorists hold a version of what we call the ‘Restrictive View’, according to which there are restrictions on the sorts of harms and benefits that should be included in proportionality assessments about the justifiability of going to war (whether cyber or kinetic). We (...)
    Download  
     
    Export citation  
     
    Bookmark