Results for 'Information warfare'

957 found
Order:
  1. Information Warfare: A Response to Taddeo.Tim Stevens - 2013 - Philosophy and Technology 26 (2):221-225.
    Taddeo’s recent article, ‘Information Warfare: A Philosophical Perspective’ (Philos. Technol. 25:105–120, 2012) is a useful addition to the literature on information communications technologies (ICTs) and warfare. In this short response, I draw attention to two issues arising from the article. The first concerns the applicability of ‘information warfare’ terminology to current political and military discourse, on account of its relative lack of contemporary usage. The second engages with the political and ethical implications of treating (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. (1 other version)The latent nature of global information warfare.Luciano Floridi - 2014 - Philosophy and Technology 27 (3):317–319.
    Information has always been at the core of conflicts. When Napoleon planned to invade Italy, he duly upgraded the first telegraph network in the world, the French “semaphore”. He famously remarked that “an army marches on its stomach,” but he also knew that the same army acted on information. As Von Clausewitz once stated “by the word ‘information’ we denote all the knowledge which we have of the enemy and his country; therefore, in fact, the foundation of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Information Matters: Informational Conflict and the New Materialism.Tim Stevens - manuscript
    This paper focuses upon the challenge posed by the concept of ‘information’ to the new materialisms, viewed with reference to the multifaceted worldly phenomenon of informational conflict. ‘Informational conflict’ is a broad term designed to encompass the hi-tech ‘cyber’ operations of inter-state warfare as well as the informational actions of non-state actors, and is contingent not upon information technologies, as commonly understood, but upon ‘information’. Informational conflicts can be viewed as sociotechnical assemblages of humans and non-humans (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Conspiring with the Enemy: The Ethic of Cooperation in Warfare.Yvonne Chiu - 2019 - New York, NY, USA: Columbia University Press.
    *North American Society for Social Philosophy (NASSP) Book Award 2019.* -/- *International Studies Association (ISA) - International Ethics Section Book Award 2021.* -/- Although military mores have relied primarily on just war theory, the ethic of cooperation in warfare (ECW)—between enemies even as they are trying to kill each other—is as central to the practice of warfare and to conceptualization of its morality. Neither game theory nor unilateral moral duties (God-given or otherwise) can explain the explicit language of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Joint Doctrine Ontology: A Benchmark for Military Information Systems Interoperability.Peter Morosoff, Ron Rudnicki, Jason Bryant, Robert Farrell & Barry Smith - 2015 - In Peter Morosoff, Ron Rudnicki, Jason Bryant, Robert Farrell & Barry Smith (eds.), Joint Doctrine Ontology: A Benchmark for Military Information Systems Interoperability. CEUR vol. 1325. pp. 2-9.
    When the U.S. conducts warfare, elements of a force are drawn from different services and work together as a single team to accomplish an assigned mission. To achieve such unified action, it is necessary that the doctrines governing the actions of members of specific services be both consistent with and subservient to joint Doctrine. Because warfighting today increasingly involves not only live forces but also automated systems, unified action requires that information technology that is used in joint (...) must be aligned with joint doctrine. It requires also that the separate information systems used by the different elements of a joint force must be interoperable, in the sense that data and information that is generated by each element must be usable (understandable, processable) by all the other elements that need them. Currently, such interoperability is impeded by multiple inconsistencies among the different data and software standards used by warfighters. We describe here the on-going project of creating a Joint Doctrine Ontology (JDO), which uses joint doctrine to provide shared computer-accessible content valid for any field of military endeavor, organization, and information system. JDO addresses the two previously mentioned requirements of unified action by providing a widely applicable benchmark for use by developers of information systems that will both guarantee alignment with joint doctrine and support interoperability. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. The Ethics of Military Influence Operations.Michael Skerker - 2023 - Conatus 8 (2):589-612.
    This article articulates a framework for normatively assessing influence operations, undertaken by national security institutions. Section I categorizes the vast field of possible types of influence operations according to the communication’s content, its attribution, the rights of the target audience, the communication’s purpose, and its secondary effects. Section II populates these categories with historical examples and section III evaluates these cases with a moral framework. I argue that deceptive or manipulative communications directed at non-liable audiences are presumptively immoral and illegitimate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. The Problem with Killer Robots.Nathan Gabriel Wood - 2020 - Journal of Military Ethics 19 (3):220-240.
    Warfare is becoming increasingly automated, from automatic missile defense systems to micro-UAVs (WASPs) that can maneuver through urban environments with ease, and each advance brings with it ethical questions in need of resolving. Proponents of lethal autonomous weapons systems (LAWS) provide varied arguments in their favor; robots are capable of better identifying combatants and civilians, thus reducing "collateral damage"; robots need not protect themselves and so can incur more risks to protect innocents or gather more information before using (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  8.  77
    Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method combining (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  24
    IT & C, Volumul 3, Numărul 2, Iunie 2024.Nicolae Sfetcu - 2024 - It and C 3 (2).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Levering Data Science in the Detection of Advanced Persistent Threats Utilizarea științei datelor în detectarea amenințărilor persistente avansate -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Detecting Advanced Persistent Threats in Cyber Warfare – Academic Studies Detectarea amenințărilor persistente avansate în războiul cibernetic – Studii academice -/- TELECOMUNICAȚII / TELECOMMUNICATIONS -/- Artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Terror.Tomis Kapitan - unknown
    Any intelligent discussion of terrorism must demarcate its subject matter, for the term ‘terrorism’ is differently understood and where there is no accord on its meaning there is little chance for agreement on its application or normative status. The best course is to sketch a morally neutral definition that classifies as ‘terrorist’ as many widely-agreed upon cases as possible. Definitions that explicitly render terrorism illegitimate make classification contentious, and it is more informative to base moral assessment on an examination of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. The Third Man: comparative analysis of a science autobiography and a cinema classic as windows into post-war life sciences research.Hub Zwart - 2015 - History and Philosophy of the Life Sciences 37 (4):382-412.
    In 2003, biophysicist and Nobel Laureate Maurice Wilkins published his autobiography entitled The Third Man. In the preface, he diffidently points out that the title was chosen by his publisher, as a reference to the famous 1949 movie no doubt, featuring Orson Welles in his classical role as penicillin racketeer Harry Lime. In this paper I intend to show that there is much more to this title than merely its familiar ring. If subjected to a comparative analysis, multiple correspondences between (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  12. Population pressure and prehistoric violence in the Yayoi period of Japan.Tomomi Nakagawa, Kohei Tamura, Yuji Yamaguchi, Naoko Matsumoto, Takehiko Matsugi & Hisashi Nakao - 2021 - Journal of Archaeological Science 132:105420.
    The causes of prehistoric inter-group violence have been a subject of long-standing debate in archaeology, an- thropology, and other disciplines. Although population pressure has been considered as a major factor, due to the lack of available prehistoric data, few studies have directly examined its effect so far. In the present study, we used data on skeletal remains from the middle Yayoi period of the Japanese archipelago, where archaeologists argued that an increase of inter-group violence in this period could be explained (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. The Performativity of Terror-Tagging and the Prospects for a Marcos Presidency.Regletto Aldrich Imbong - 2023 - In Authoritarian Disaster: The Duterte Regime and the Prospects for a Marcos Presidency. New York: Nova Science Publishers. pp. 43-64.
    The Philippine government has been relentless in its counterinsurgency campaigns. From the colonial wars that vilified as insurgents and bandits the honored heroes of today, up to the anti-communist and anti-secessionist civil and military efforts of the postcolonial regimes, these campaigns have not only rolled out large state resources but also cost lives of innocent civilians. Patterned after the United States (US) of America’s principle of low-intensity conflict aimed at countering Marxist and anti-imperialist movements (Reed 1986), counterinsurgency campaigns have unleashed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  29
    Intelligence Info, Volumul 3, Numărul 2, Iunie 2024.Nicolae Sfetcu - 2024 - Intelligence Info 3 (2).
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Nicolae SFETCU The Global Electronic Warfare Challenge in 2024: The Major Players Provocarea globală de război electronic în 2024: Principalii jucători -/- INTELLIGENCE / INTELLIGENCE -/- Nicolae SFETCU The relationship of electronic warfare to other combat capabilities Relația războiului electronic cu alte capacități de luptă -/- Tănase TIBERIU Russian Intelligence Community Comunitatea (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  36
    IT & C, Volumul 3, Numărul 1, Martie 2024.Nicolae Sfetcu - 2024 - It and C 3 (1).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Challenges and Limitations in the Use of Artificial Intelligence Provocări și limitări în utilizarea inteligenței artificiale -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Impact of Big Data Technology on Contemporary Society Impactul tehnologiei Big Data asupra societății contemporane -/- Methods, Techniques and Patterns of Advanced Persistent Threats – APT Lifecycle Metode, tehnici (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. A Challenge to the Reigning Theory of the Just War.Christian Barry - 2011 - International Affairs 87 (2):457-466.
    Troubled times often gives rise to great art that reflects those troubles. So too with political theory. The greatest work of twentieth century political theory, John Rawls's A theory of justice, was inspired in various respects by extreme social and economic inequality, racialized slavery and racial segregation in the United States. Arguably the most influential work of political theory since Rawls—Michael Walzer's Just and unjust wars—a sustained and historically informed reflection on the morality of interstate armed conflict—was written in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The ethical significance of evolution.Andrzej Elzanowski - 2010 - In Soniewicka Stelmach (ed.), Stelmach, J., Soniewicka M., Załuski W. (red.) Legal Philosophy and the Challenges of Biosciences (Studies in the Philosophy of Law 4). Wydawnictwo Uniwersytetu Jagiellońskiego. pp. 65-76.
    DARWIN’s (1859, 1871) discoveries have profound ethical implications that continue to be misrepresented and/or ignored. In contrast to socialdarwinistic misuses of his theory, Darwin was a great humanitarian who paved the way for an integrated scientific and ethical world view. As an ethical doctrine, socialdarwinism is long dead ever since its defeat by E. G. Moore although the socialdarwinistic thought is a hard-die in the biological community. The accusations of sociobiology for being socialdarwinistic are unfounded and stem from the moralistic (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Putting the War Back in Just War Theory: A Critique of Examples.Rigstad Mark - 2017 - Ethical Perspectives 24 (1):123-144.
    Analytic just war theorists often attempt to construct ideal theories of military justice on the basis of intuitions about imaginary and sometimes outlandish examples, often taken from non-military contexts. This article argues for a sharp curtailment of this method and defends, instead, an empirically and historically informed approach to the ethical scrutiny of armed conflicts. After critically reviewing general philosophical reasons for being sceptical of the moral-theoretic value of imaginary hypotheticals, the article turns to some of the special problems that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. A handbook for social change: Cristina Bicchieri: Norms in the wild: how to diagnose, measure, and change social norms. Oxford: Oxford University Press, 2016, 264 pp, $ 29.95 PB. [REVIEW]Ulf Hlobil - 2017 - Metascience 26 (3):459-462.
    “Philosophy isn’t useful for changing the world,” parents of philosophy students and Karl Marx tell us (at least about non-Marxist philosophy). Cristina Bicchieri’s new book Norms in the Wild provides an impressive antidote against this worry. It stands to change of social practices as Che Guevara’s Guerrilla Warfare stands to political revolutions. Bicchieri combines hands-on advice on how to change social practices with compelling theoretical analyses of social norms. She draws heavily on her influential earlier work on norms, but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Medicine, Logic, or Metaphysics? Aristotelianism and Scholasticism in the Fight Book Corpus.Karin Verelst - 2023 - Acta Periodica Duellatorum 11 (1):91-127.
    Because we tend to study fight books in isolation, we often forget how difficult it is to understand the precise place they occupy in the sociocultural and historical fabric of their time, and spill the many clues they inevitably contain on their owner, their local society, their precise purpose. In order to unlock that information, we need to study them in their broader sociocultural and historical context. This requires a background and research skills that are not always easily accessible (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. AWS compliance with the ethical principle of proportionality: three possible solutions.Maciek Zając - 2023 - Ethics and Information Technology 25 (1):1-13.
    The ethical Principle of Proportionality requires combatants not to cause collateral harm excessive in comparison to the anticipated military advantage of an attack. This principle is considered a major (and perhaps insurmountable) obstacle to ethical use of autonomous weapon systems (AWS). This article reviews three possible solutions to the problem of achieving Proportionality compliance in AWS. In doing so, I describe and discuss the three components Proportionality judgments, namely collateral damage estimation, assessment of anticipated military advantage, and judgment of “excessiveness”. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. 47 Vietnamese people are among the world's most influential scientists in 2023.Authority of Foreign Information Service - 2023 - Vietnam Information Service.
    Vietnamese scientists on the list of "100.000 influential scientists" this year increased sharply in number and rank. -/- The ranking was selected by a group of scientists led by Professor John PA Ioannidis and colleagues from Stanford University (USA) on the Scopus database and published by Elsevier Publishing House.
    Download  
     
    Export citation  
     
    Bookmark  
  25. 弥生時代中期における戦争:人骨と人口動態の関係から(Prehistoric Warfare in the Middle Phase of the Yayoi Period in Japan : Human Skeletal Remains and Demography).Tomomi Nakagawa, Hisashi Nakao, Kohei Tamura, Yuji Yamaguchi, Naoko Matsumoto & Takehiko Matsugi - 2019 - Journal of Computer Archaeology 1 (24):10-29.
    It has been commonly claimed that prehistoric warfare in Japan began in the Yayoi period. Population increases due to the introduction of agriculture from the Korean Peninsula to Japan resulted in the lack of land for cultivation and resources for the population, eventually triggering competition over land. This hypothesis has been supported by the demographic data inferred from historical changes in Kamekan, a burial system used especially in the Kyushu area in the Yayoi period. The present study aims to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Violence and warfare in prehistoric Japan.Tomomi Nakagawa, Hisashi Nakao, Kohei Tamura, Yui Arimatsu, Naoko Matsumoto & Takehiko Matsugi - 2017 - Letters on Evolutionary and Behavioral Science 8 (1):8-11.
    The origins and consequences of warfare or largescale intergroup violence have been subject of long debate. Based on exhaustive surveys of skeletal remains for prehistoric hunter-gatherers and agriculturists in Japan, the present study examines levels of inferred violence and their implications for two different evolutionary models, i.e., parochial altruism model and subsistence model. The former assumes that frequent warfare played an important role in the evolution of altruism and the latter sees warfare as promoted by social changes (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  27. Drone Warfare, Civilian Deaths, and the Narrative of Honest Mistakes.Matthew Talbert & Jessica Wolfendale - 2023 - In Nobuo Hayashi & Carola Lingaas (eds.), Honest Errors? Combat Decision-Making 75 Years After the Hostage Case. T.M.C. Asser Press. pp. 261-288.
    In this chapter, we consider the plausibility and consequences of the use of the term “honest errors” to describe the accidental killings of civilians resulting from the US military’s drone campaigns in Iraq, Syria, Afghanistan, and elsewhere. We argue that the narrative of “honest errors” unjustifiably excuses those involved in these killings from moral culpability, and reinforces long-standing, pernicious assumptions about the moral superiority of the US military and the inevitability of civilian deaths in combat. Furthermore, we maintain that, given (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Just War contra Drone Warfare.Joshua M. Hall - 2023 - Conatus 8 (2):217-239.
    In this article, I present a two-pronged argument for the immorality of contemporary, asymmetric drone warfare, based on my new interpretations of the just war principles of “proportionality” and “moral equivalence of combatants” (MEC). The justification for these new interpretations is that drone warfare continues to this day, having survived despite arguments against it that are based on traditional interpretations of just war theory (including one from Michael Walzer). On the basis of my argument, I echo Harry Van (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Electronic Warfare and Artificial Intelligence.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    Electronic warfare is a critical component of modern military operations and has undergone significant advances in recent years. This book provides an overview of electronic warfare, its historical development, key components, and its role in contemporary conflict scenarios. It also discusses emerging trends and challenges in electronic warfare and its contemporary relevance in an era of advanced technology and cyber threats, emphasizing the need for continued research and development in this area. The book explores the burgeoning intersection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. An Analysis of Guerilla Warfare: From Clausewitz to T.E. Lawrence.Dominic Cassella - manuscript
    This paper attempts to understand the nature of guerrilla warfare as taught by T.E. Lawrence in light of Clausewitz and Liddell Hart.
    Download  
     
    Export citation  
     
    Bookmark  
  31. Against Offensive Warfare.Paul van Els - 2007 - Het Trage Vuur 40:8–19.
    van Els, Paul. "Tegen aanvalsoorlogen" (Against Offensive Warfare). Dutch translation of Mozi chapters 17, 18, and 19. Het Trage Vuur 40 (December 2007): 8–19.
    Download  
     
    Export citation  
     
    Bookmark  
  32. Information Dynamics across Linked Sub-Networks: Germs, Genes, and Memes.Patrick Grim, Daniel J. Singer, Christopher Reade & Stephen Fisher - 2011 - In Patrick Grim, Daniel J. Singer, Christopher Reade & Stephen Fisher (eds.), Proceedings, AAAI Fall Symposium on Complex Adaptive Systems: Energy, Information and Intelligence. AAAI Press.
    Beyond belief change and meme adoption, both genetics and infection have been spoken of in terms of information transfer. What we examine here, concentrating on the specific case of transfer between sub-networks, are the differences in network dynamics in these cases: the different network dynamics of germs, genes, and memes. Germs and memes, it turns out, exhibit a very different dynamics across networks. For infection, measured in terms of time to total infection, it is network type rather than degree (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Autonomous Weapon Systems, Asymmetrical Warfare, and Myth.Michal Klincewicz - 2018 - Civitas. Studia Z Filozofii Polityki 23:179-195.
    Predictions about autonomous weapon systems are typically thought to channel fears that drove all the myths about intelligence embodied in matter. One of these is the idea that the technology can get out of control and ultimately lead to horrifi c consequences, as is the case in Mary Shelley’s classic Frankenstein. Given this, predictions about AWS are sometimes dismissed as science-fiction fear-mongering. This paper considers several analogies between AWS and other weapon systems and ultimately offers an argument that nuclear weapons (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Singularity warfare: A bibliometric survey of militarized transhumanism.Woody Evans - 2007 - Journal of Evolution and Technology 16 (1):161-65.
    This paper examines the responses to advanced and transformative technologies in military literature, attenuates the conclusions of earlier work suggesting that there is an “ignorance of transhumanism” in the military, and updates the current layout of transhuman concerns in military thought. The military is not ignorant of transhuman issues and implications, though there was evidence for this in the past; militaries and non-state actors increasingly use disruptive technologies with what we may call transhuman provenance.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Logical information and epistemic space.Mark Jago - 2009 - Synthese 167 (2):327 - 341.
    Gaining information can be modelled as a narrowing of epistemic space . Intuitively, becoming informed that such-and-such is the case rules out certain scenarios or would-be possibilities. Chalmers’s account of epistemic space treats it as a space of a priori possibility and so has trouble in dealing with the information which we intuitively feel can be gained from logical inference. I propose a more inclusive notion of epistemic space, based on Priest’s notion of open worlds yet which contains (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  36. Righteous, Furious, or Arrogant? On Classifications of Warfare in Early Chinese Texts.Paul van Els - 2013 - In Peter Allan Lorge (ed.), Debating War in Chinese History. Brill Academic Publishers. pp. 13–40.
    This chapter studies classifications of warfare in Master Wu, The Four Canons, and Master Wen. In sections one through three, I analyze the classifications in their original contexts. How do they relate to the texts in which they appear? In what way does each classification feed into the overall philosophy of the text? In section four, I compare the three classifications. What are their similarities and differences? In section five, I discuss the possibility of a relationship between the three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. (1 other version)Information recovery problems.John Corcoran - 1995 - Theoria 10 (3):55-78.
    An information recovery problem is the problem of constructing a proposition containing the information dropped in going from a given premise to a given conclusion that folIows. The proposition(s) to beconstructed can be required to satisfy other conditions as well, e.g. being independent of the conclusion, or being “informationally unconnected” with the conclusion, or some other condition dictated by the context. This paper discusses various types of such problems, it presents techniques and principles useful in solving them, and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. In search of common, information-processing, agency-based framework for anthropogenic, biogenic, and abiotic cognition and intelligence.Gordana Dodig-Crnkovic - 2022 - Zagadnienia Filozoficzne W Nauce 73:17-46.
    Learning from contemporary natural, formal, and social sciences, especially from current biology, as well as from humanities, particularly contemporary philosophy of nature, requires updates of our old definitions of cognition and intelligence. The result of current insights into basal cognition of single cells and evolution of multicellular cognitive systems within the framework of extended evolutionary synthesis (EES) helps us better to understand mechanisms of cognition and intelligence as they appear in nature. New understanding of information and processes of physical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Mature information societies—a matter of expectations.Luciano Floridi - 2016 - Philosophy and Technology 29 (1):1-4.
    Scholars and policy makers often refer to the “information society”. And yet, it is more accurate to speak of societies, each different, some of which may qualify as information ones at different levels of maturity. Through exploration of the concepts of expectations, education and innovation, this paper explores what it means for an information society to be more or less mature than others, and the impact of this on the ongoing digital revolution.
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  40. Informational Theories of Content and Mental Representation.Marc Artiga & Miguel Ángel Sebastián - 2020 - Review of Philosophy and Psychology 11 (3):613-627.
    Informational theories of semantic content have been recently gaining prominence in the debate on the notion of mental representation. In this paper we examine new-wave informational theories which have a special focus on cognitive science. In particular, we argue that these theories face four important difficulties: they do not fully solve the problem of error, fall prey to the wrong distality attribution problem, have serious difficulties accounting for ambiguous and redundant representations and fail to deliver a metasemantic theory of representation. (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  41. Robot warfare: the (im)permissibility of autonomous weapons systems.Jack Madock - 2024 - AI and Ethics 1.
    This paper argues against prominent views of the impermissibility of autonomous weapons systems (AWS). It does so by assuming each theory is true and arguing towards contradiction. To arrive at a contradiction two assumptions are necessary. First, the theory of impermissibility in question is assumed. Second, a thought experiment called the ideal warfare scenario is assumed. The paper aims to demonstrate that in theory AWS could be deployed such that they bring about the best of possible warfare. However, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Informed Consent: What Must Be Disclosed and What Must Be Understood?Joseph Millum & Danielle Bromwich - 2021 - American Journal of Bioethics 21 (5):46-58.
    Over the last few decades, multiple studies have examined the understanding of participants in clinical research. They show variable and often poor understanding of key elements of disclosure, such as expected risks and the experimental nature of treatments. Did the participants in these studies give valid consent? According to the standard view of informed consent they did not. The standard view holds that the recipient of consent has a duty to disclose certain information to the profferer of consent because (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  43. Information, physics, quantum: the search for links.John Archibald Wheeler - 1989 - In Wheeler John Archibald (ed.), Proceedings III International Symposium on Foundations of Quantum Mechanics. pp. 354-358.
    This report reviews what quantum physics and information theory have to tell us about the age-old question, How come existence? No escape is evident from four conclusions: (1) The world cannot be a giant machine, ruled by any preestablished continuum physical law. (2) There is no such thing at the microscopic level as space or time or spacetime continuum. (3) The familiar probability function or functional, and wave equation or functional wave equation, of standard quantum theory provide mere continuum (...)
    Download  
     
    Export citation  
     
    Bookmark   126 citations  
  44. Information: From Philosophic to Physics Concepts for Informational Modeling of Consciousness.Florin Gaiseanu - 2018 - Philosophy Study 8 (8).
    Information was a frequently used concept in many fields of investigation. However, this concept is still not really understood, when it is referred for instance to consciousness and its informational structure. In this paper it is followed the concept of information from philosophical to physics perspective, showing especially how this concept could be extended to matter in general and to the living in particular, as a result of the intimate interaction between matter and information, the human body (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  45. Further on informational quanta, interactions, and entropy under the granular view of value formation.Quan-Hoang Vuong & Minh-Hoang Nguyen - 2024 - SSRN.
    A recent study suggests that value and quantum states seem to be governed by the same underlying mechanisms. In our recent book titled "Better economics for the Earth: A lesson from quantum and information theories," specifically Chapter 5, we have proposed an informational entropy-based notion of value, drawing on the granular worldview and primary features of quantum mechanics, Shannon’s information theory, and the mindsponge theory. Specifically, the notion suggests that values are created through the interactions of information. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Information quality.Luciano Floridi - 2013 - Philosophy and Technology 26 (1):1-6.
    Information, and information and communication technologies (ICTs) are critical for most developed post-industrial societies. It follows, therefore, that the better the quality of the information exchanged, the more likely such societies and their members may prosper. But what is information quality (IQ) exactly? This paper discusses current definitions, problems and approaches to IQ and the question of how we should, and could, evaluate IQ in the future.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Swarms Are Hell: Warfare as an Anti-Transhuman Choice.Woody Evans - 2013 - Journal of Evolution and Technology 23 (1):56-60.
    The use of advanced technologies, even of so-called transhuman technology, does not make militaries transhuman. Transhumanism includes dimensions of ethics that are themselves in direct conflict with many transhuman capabilities of soldiers in warfare. The use of advanced weapons of mass destruction represents an anti-humanism that undermines the modern, open, and high-tech nation state.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Information and meaning in life, humans and robots (FIS 2005).Christophe Menant - manuscript
    Information and meaning exist around us and within ourselves, and the same information can correspond to different meanings. This is true for humans and animals, and is becoming true for robots. We propose here an overview of this subject by using a systemic tool related to meaning generation that has already been published (C. Menant, Entropy 2003). The Meaning Generator System (MGS) is a system submitted to a constraint that generates a meaningful information when it receives an (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. INFORMATION-THEORETIC LOGIC.John Corcoran - 1998 - In C. Martínez U. Rivas & L. Villegas-Forero (eds.), Truth in Perspective edited by C. Martínez, U. Rivas, L. Villegas-Forero, Ashgate Publishing Limited, Aldershot, England (1998) 113-135. ASHGATE. pp. 113-135.
    Information-theoretic approaches to formal logic analyse the "common intuitive" concept of propositional implication (or argumental validity) in terms of information content of propositions and sets of propositions: one given proposition implies a second if the former contains all of the information contained by the latter; an argument is valid if the conclusion contains no information beyond that of the premise-set. This paper locates information-theoretic approaches historically, philosophically and pragmatically. Advantages and disadvantages are identified by examining (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  50. Semantic information and the network theory of account.Luciano Floridi - 2012 - Synthese 184 (3):431-454.
    The article addresses the problem of how semantic information can be upgraded to knowledge. The introductory section explains the technical terminology and the relevant background. Section 2 argues that, for semantic information to be upgraded to knowledge, it is necessary and sufficient to be embedded in a network of questions and answers that correctly accounts for it. Section 3 shows that an information flow network of type A fulfils such a requirement, by warranting that the erotetic deficit, (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
1 — 50 / 957