Switch to: Citations

References in:

Binary Bullets: The Ethics of Cyberwarfare

New York, US: Oxford University Press USA (2016)

Add references

You must login to add references.
  1. Culpability and Ignorance.Gideon Rosen - 2003 - Proceedings of the Aristotelian Society 103 (1):61-84.
    When a person acts from ignorance, he is culpable for his action only if he is culpable for the ignorance from which he acts. The paper defends the view that this principle holds, not just for actions done from ordinary factual ignorance, but also for actions done from moral ignorance. The question is raised whether the principle extends to action done from ignorance about what one has most reason to do. It is tentatively proposed that the principle holds in full (...)
    Download  
     
    Export citation  
     
    Bookmark   158 citations  
  • Just War and Cyberwar.Christopher J. Eberle - 2013 - Journal of Military Ethics 12 (1):54-67.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Reconstructing the Right to Privacy.Mark Alfino & G. Randolph Mayes - 2003 - Social Theory & Practice 29 (1):1-18.
    The article undertakes to develop a theory of privacy considered as a fundamental moral right. The authors remind that the conception of the right to privacy is silent on the prospect of protecting informational privacy on consequentialist grounds. However, laws that prevent efficient marketing practices, speedy medical attention, equitable distribution of social resources, and criminal activity could all be justified by appeal to informational privacy as a fundamental right. Finally, the authors show that in the specter of terrorism, privacy can (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Terrorism and the uses of terror.Jeremy Waldron - 2004 - The Journal of Ethics 8 (1):5-35.
    “Terrorism”' is sometimes defined as a “form ofcoercion.” But there are important differences between ordinary coercion and terrorist intimidation. This paper explores some of those differences, particularly the relation between coercion, on the one hand, and terror and terrorization, on the other hand. The paper argues that while terrorism is not necessarily associated with terror in the literal sense, it does often seek to instill a mental state like terror in the populations that it targets. However, the point of instilling (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Privacy, intimacy, and personhood.Jeffrey Reiman - 1976 - Philosophy and Public Affairs 6 (1):26-44.
    Download  
     
    Export citation  
     
    Bookmark   78 citations  
  • Jus post bellum.Brian Orend - 2000 - Journal of Social Philosophy 31 (1):117–137.
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Trust, social capital, civil society, and democracy.Kenneth Newton - unknown
    The importance of trust has long been emphasised by social and political theorists from Locke and Tocqueville to Putnam and civil society theorists. However, individual survey data casts substantial doubt on this powerful tradition of thought. There is little evidence of an overlap between social and political trust, a syndrome of trust and membership of voluntary organizations, and the existence of trusting/distrusting dispositions among individuals. However, at the aggregate national level there is evidence to support the theory, and the author (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • Is Stuxnet Physical? Does It Matter?Ryan Jenkins - 2013 - Journal of Military Ethics 12 (1):68-79.
    Cyberweapons are software and software, at least intuitively, is nonphysical. Several authors have noted that this potentially renders problematic the application of normative frameworks like UN Charter Article 2(4) to cyberweapons. If Article 2(4) only proscribes the use of physical force, and if cyberweapons are nonphysical, then cyberweapons fall outside the purview of Article 2(4). This article explores the physicality of software, examining Stuxnet in particular. First, I show that with a few relatively uncontroversial metaphysical claims we can secure the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Moral Permissibility of Automated Responses during Cyberwarfare.David Danks & Joseph H. Danks - 2013 - Journal of Military Ethics 12 (1):18-33.
    Download  
     
    Export citation  
     
    Bookmark   2 citations