Abstract
Taddeo’s recent article, ‘Information Warfare: A Philosophical Perspective’ (Philos. Technol. 25:105–120, 2012) is a useful addition to the literature on information communications technologies (ICTs) and warfare. In this short response, I draw attention to two issues arising from the article. The first concerns the applicability of ‘information warfare’ terminology to current political and military discourse, on account of its relative lack of contemporary usage. The second engages with the political and ethical implications of treating ICT environments as a ‘domain’, with its ramifications for the pursuit of ‘dominion’, particularly through military action.
References
Barlow, J. P. (2001). A declaration of the independence of cyberspace. In P. Ludlow (Ed.), Crypto anarchy, cyberstates, and pirate utopias (pp. 27–30). Cambridge, MA: MIT Press.
Betz, D. J. (2006). The more you know, the less you understand: the problem with information warfare. Journal of Strategic Studies, 29(3), 505–533.
Betz, D. J., & Stevens, T. (2011). Cyberspace and the state: Toward a strategy for cyber-power. London: Routledge.
Dalby, S. (2009). Geopolitics, the revolution in military affairs and the Bush doctrine. International Politics, 46(2/3), 234–252.
DeLanda, M. (2006). A new philosophy of society: Assemblage theory and social complexity. London: Continuum.
Deibert, R. J., & Rohozinski, R. (2010). Beyond denial: introducing next-generation information access controls. In R. Deibert, J. Palfrey, R. Rohozinski, & J. Zittrain (Eds.), Access controlled: The shaping of power, rights, and rule in cyberspace (pp. 3–13). Cambridge, MA: The MIT Press.
Der Derian, J. (2009). Virtuous war: Mapping the military–industrial–media–entertainment network. New York: Routledge.
Gray, C. H. (1997). Postmodern war: The new politics of conflict. London: Routledge.
Libicki, M. C. (1995). What is information warfare? Washington, DC: National Defense University.
Libicki, M. C. (2007). Conquest in cyberspace: National security and information warfare. New York: Cambridge University Press.
MacKinnon, R. (2012). Consent of the networked: The worldwide struggle for Internet freedom. New York: Basic Books.
Stevens, T. (2012). A cyberwar of ideas? Deterrence and norms in cyberspace. Contemporary Security Policy, 33(1), 148–170.
Taddeo, M. (2012). Information warfare: a philosophical perspective. Philosophy & Technology, 25(1), 105–120.
Virilio, P. (2008). Negative horizon. London: Continuum.
Wertheim, M. (1997). The pearly gates of cyberspace: A history of cyberspace from Dante to the Internet. London: Virago.
Yould, R. E. D. (2003). Beyond the American fortress: understanding homeland security in the information age. In R. Latham (Ed.), Bombs and bandwidth: The emerging relationship between information technology and security (pp. 74–98). New York: The New Press.
Acknowledgments
The author acknowledges the support of an Economic & Social Research Council scholarship (ES/H022678/1), funded under the Research Councils UK ‘Global Uncertainties’ programme. Thanks also to Mariarosaria Taddeo.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Stevens, T. Information Warfare: A Response to Taddeo. Philos. Technol. 26, 221–225 (2013). https://doi.org/10.1007/s13347-012-0070-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13347-012-0070-y