Results for 'cyber warfare'

188 found
Order:
  1.  29
    Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  45
    Electronic Warfare and Artificial Intelligence.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    Electronic warfare is a critical component of modern military operations and has undergone significant advances in recent years. This book provides an overview of electronic warfare, its historical development, key components, and its role in contemporary conflict scenarios. It also discusses emerging trends and challenges in electronic warfare and its contemporary relevance in an era of advanced technology and cyber threats, emphasizing the need for continued research and development in this area. The book explores the burgeoning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  4. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The Chinese approach to artificial intelligence: an analysis of policy, ethics, and regulation.Huw Roberts, Josh Cowls, Jessica Morley, Mariarosaria Taddeo, Vincent Wang & Luciano Floridi - 2021 - AI and Society 36 (1):59–⁠77.
    In July 2017, China’s State Council released the country’s strategy for developing artificial intelligence, entitled ‘New Generation Artificial Intelligence Development Plan’. This strategy outlined China’s aims to become the world leader in AI by 2030, to monetise AI into a trillion-yuan industry, and to emerge as the driving force in defining ethical norms and standards for AI. Several reports have analysed specific aspects of China’s AI policies or have assessed the country’s technical capabilities. Instead, in this article, we focus on (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  6. Information Matters: Informational Conflict and the New Materialism.Tim Stevens - manuscript
    This paper focuses upon the challenge posed by the concept of ‘information’ to the new materialisms, viewed with reference to the multifaceted worldly phenomenon of informational conflict. ‘Informational conflict’ is a broad term designed to encompass the hi-tech ‘cyber’ operations of inter-state warfare as well as the informational actions of non-state actors, and is contingent not upon information technologies, as commonly understood, but upon ‘information’. Informational conflicts can be viewed as sociotechnical assemblages of humans and non-humans although information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Ethiek voor Cyberkrijg en Cyberkrijgers.Peter Olsthoorn - 2019 - Algemeen Nederlands Tijdschrift voor Wijsbegeerte 111 (1):95-109.
    Although some claim that the term cyber war is merely metaphorical, there are good reasons to see cyber war as a form of warfare ‐ even if it is not war as we have hitherto known it. This poses the question whether the principles of the Just War Tradition, which claims to offer an alternative for pacifism and realism, apply to this specific kind of war too. This article argues that the jus in bello principles of discrimination (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. 弥生時代中期における戦争:人骨と人口動態の関係から(Prehistoric Warfare in the Middle Phase of the Yayoi Period in Japan : Human Skeletal Remains and Demography).Tomomi Nakagawa, Hisashi Nakao, Kohei Tamura, Yuji Yamaguchi, Naoko Matsumoto & Takehiko Matsugi - 2019 - Journal of Computer Archaeology 1 (24):10-29.
    It has been commonly claimed that prehistoric warfare in Japan began in the Yayoi period. Population increases due to the introduction of agriculture from the Korean Peninsula to Japan resulted in the lack of land for cultivation and resources for the population, eventually triggering competition over land. This hypothesis has been supported by the demographic data inferred from historical changes in Kamekan, a burial system used especially in the Kyushu area in the Yayoi period. The present study aims to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Information Warfare: A Response to Taddeo.Tim Stevens - 2013 - Philosophy and Technology 26 (2):221-225.
    Taddeo’s recent article, ‘Information Warfare: A Philosophical Perspective’ (Philos. Technol. 25:105–120, 2012) is a useful addition to the literature on information communications technologies (ICTs) and warfare. In this short response, I draw attention to two issues arising from the article. The first concerns the applicability of ‘information warfare’ terminology to current political and military discourse, on account of its relative lack of contemporary usage. The second engages with the political and ethical implications of treating ICT environments as (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Violence and warfare in prehistoric Japan.Tomomi Nakagawa, Hisashi Nakao, Kohei Tamura, Yui Arimatsu, Naoko Matsumoto & Takehiko Matsugi - 2017 - Letters on Evolutionary and Behavioral Science 8 (1):8-11.
    The origins and consequences of warfare or largescale intergroup violence have been subject of long debate. Based on exhaustive surveys of skeletal remains for prehistoric hunter-gatherers and agriculturists in Japan, the present study examines levels of inferred violence and their implications for two different evolutionary models, i.e., parochial altruism model and subsistence model. The former assumes that frequent warfare played an important role in the evolution of altruism and the latter sees warfare as promoted by social changes (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  12. Drone Warfare, Civilian Deaths, and the Narrative of Honest Mistakes.Matthew Talbert & Jessica Wolfendale - 2023 - In Nobuo Hayashi & Carola Lingaas (eds.), Honest Errors? Combat Decision-Making 75 Years After the Hostage Case. T.M.C. Asser Press. pp. 261-288.
    In this chapter, we consider the plausibility and consequences of the use of the term “honest errors” to describe the accidental killings of civilians resulting from the US military’s drone campaigns in Iraq, Syria, Afghanistan, and elsewhere. We argue that the narrative of “honest errors” unjustifiably excuses those involved in these killings from moral culpability, and reinforces long-standing, pernicious assumptions about the moral superiority of the US military and the inevitability of civilian deaths in combat. Furthermore, we maintain that, given (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  93
    Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Just War contra Drone Warfare.Joshua M. Hall - 2023 - Conatus 8 (2):217-239.
    In this article, I present a two-pronged argument for the immorality of contemporary, asymmetric drone warfare, based on my new interpretations of the just war principles of “proportionality” and “moral equivalence of combatants” (MEC). The justification for these new interpretations is that drone warfare continues to this day, having survived despite arguments against it that are based on traditional interpretations of just war theory (including one from Michael Walzer). On the basis of my argument, I echo Harry Van (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Against Offensive Warfare.Paul van Els - 2007 - Het Trage Vuur 40:8–19.
    van Els, Paul. "Tegen aanvalsoorlogen" (Against Offensive Warfare). Dutch translation of Mozi chapters 17, 18, and 19. Het Trage Vuur 40 (December 2007): 8–19.
    Download  
     
    Export citation  
     
    Bookmark  
  17. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. An Analysis of Guerilla Warfare: From Clausewitz to T.E. Lawrence.Dominic Cassella - manuscript
    This paper attempts to understand the nature of guerrilla warfare as taught by T.E. Lawrence in light of Clausewitz and Liddell Hart.
    Download  
     
    Export citation  
     
    Bookmark  
  19. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Autonomous Weapon Systems, Asymmetrical Warfare, and Myth.Michal Klincewicz - 2018 - Civitas. Studia Z Filozofii Polityki 23:179-195.
    Predictions about autonomous weapon systems are typically thought to channel fears that drove all the myths about intelligence embodied in matter. One of these is the idea that the technology can get out of control and ultimately lead to horrifi c consequences, as is the case in Mary Shelley’s classic Frankenstein. Given this, predictions about AWS are sometimes dismissed as science-fiction fear-mongering. This paper considers several analogies between AWS and other weapon systems and ultimately offers an argument that nuclear weapons (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  23. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  24. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Righteous, Furious, or Arrogant? On Classifications of Warfare in Early Chinese Texts.Paul van Els - 2013 - In Peter Allan Lorge (ed.), Debating War in Chinese History. Brill Academic Publishers. pp. 13–40.
    This chapter studies classifications of warfare in Master Wu, The Four Canons, and Master Wen. In sections one through three, I analyze the classifications in their original contexts. How do they relate to the texts in which they appear? In what way does each classification feed into the overall philosophy of the text? In section four, I compare the three classifications. What are their similarities and differences? In section five, I discuss the possibility of a relationship between the three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  27. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Singularity warfare: A bibliometric survey of militarized transhumanism.Woody Evans - 2007 - Journal of Evolution and Technology 16 (1):161-65.
    This paper examines the responses to advanced and transformative technologies in military literature, attenuates the conclusions of earlier work suggesting that there is an “ignorance of transhumanism” in the military, and updates the current layout of transhuman concerns in military thought. The military is not ignorant of transhuman issues and implications, though there was evidence for this in the past; militaries and non-state actors increasingly use disruptive technologies with what we may call transhuman provenance.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. Swarms Are Hell: Warfare as an Anti-Transhuman Choice.Woody Evans - 2013 - Journal of Evolution and Technology 23 (1):56-60.
    The use of advanced technologies, even of so-called transhuman technology, does not make militaries transhuman. Transhumanism includes dimensions of ethics that are themselves in direct conflict with many transhuman capabilities of soldiers in warfare. The use of advanced weapons of mass destruction represents an anti-humanism that undermines the modern, open, and high-tech nation state.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Conspiring with the Enemy: The Ethic of Cooperation in Warfare.Yvonne Chiu - 2019 - New York, NY, USA: Columbia University Press.
    *North American Society for Social Philosophy (NASSP) Book Award 2019.* -/- *International Studies Association (ISA) - International Ethics Section Book Award 2021.* -/- Although military mores have relied primarily on just war theory, the ethic of cooperation in warfare (ECW)—between enemies even as they are trying to kill each other—is as central to the practice of warfare and to conceptualization of its morality. Neither game theory nor unilateral moral duties (God-given or otherwise) can explain the explicit language of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Cosmopolitan “No-Harm” Duty in Warfare: Exposing the Utilitarian Pretence of Universalism.Ozlem Ulgen - 2022 - Athena 2 (1):116-151.
    This article demonstrates a priori cosmopolitan values of restraint and harm limitation exist to establish a cosmopolitan “no-harm” duty in warfare, predating utilitarianism and permeating modern international humanitarian law. In doing so, the author exposes the atemporal and ahistorical nature of utilitarianism which introduces chaos and brutality into the international legal system. Part 2 conceptualises the duty as derived from the “no-harm” principle under international environmental law. Part 3 frames the discussion within legal pluralism and cosmopolitan ethics, arguing that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The latent nature of global information warfare.Luciano Floridi - 2014 - Philosophy and Technology 27 (3):317–319.
    Information has always been at the core of conflicts. When Napoleon planned to invade Italy, he duly upgraded the first telegraph network in the world, the French “semaphore”. He famously remarked that “an army marches on its stomach,” but he also knew that the same army acted on information. As Von Clausewitz once stated “by the word ‘information’ we denote all the knowledge which we have of the enemy and his country; therefore, in fact, the foundation of all our ideas (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Future of AI: Stanisław Lem’s Philosophical Visions for AI and Cyber-Societies in Cyberiad.Roman Krzanowski & Pawel Polak - 2021 - Pro-Fil 22 (3):39-53.
    Looking into the future is always a risky endeavour, but one way to anticipate the possible future shape of AI-driven societies is to examine the visionary works of some sci-fi writers. Not all sci-fi works have such visionary quality, of course, but some of Stanisław Lem’s works certainly do. We refer here to Lem’s works that explore the frontiers of science and technology and those that describe imaginary societies of robots. We therefore examine Lem’s prose, with a focus on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Technology as Terrorism: Police Control Technologies and Drone Warfare.Jessica Wolfendale - 2021 - In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21.
    Debates about terrorism and technology often focus on the potential uses of technology by non-state terrorist actors and by states as forms of counterterrorism. Yet, little has been written about how technology shapes how we think about terrorism. In this chapter I argue that technology, and the language we use to talk about technology, constrains and shapes our understanding of the nature, scope, and impact of terrorism, particularly in relation to state terrorism. After exploring the ways in which technology shapes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Bridging the Responsibility Gap in Automated Warfare.Marc Champagne & Ryan Tonkens - 2015 - Philosophy and Technology 28 (1):125-137.
    Sparrow argues that military robots capable of making their own decisions would be independent enough to allow us denial for their actions, yet too unlike us to be the targets of meaningful blame or praise—thereby fostering what Matthias has dubbed “the responsibility gap.” We agree with Sparrow that someone must be held responsible for all actions taken in a military conflict. That said, we think Sparrow overlooks the possibility of what we term “blank check” responsibility: A person of sufficiently high (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  41. Two theoretical dimensions of the cyber hate crime.Cesar Rommel Salas - 2017 - Social Research: An International Quarterly 1 (01):1-4.
    The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the components (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Foreign Policy as Spiritual Warfare: A Conversation With Aleksandr Dugin.Edward Stawiarski - 2022 - Chronicle Magazine.
    This article for Chronicles Magazine deals with Aleksandr Dugin's religious, philosophical, and political outlook and how the Ukrainian war can be analysed in these terms.
    Download  
     
    Export citation  
     
    Bookmark  
  43. Yvonne Chiu: Conspiring with the Enemy: The Ethic of Cooperation in Warfare. (New York: Columbia University Press, 2019. Pp. xvi, 344.). [REVIEW]Peter Olsthoorn - 2020 - The Review of Politics 82 (4):658-660.
    Clausewitz made the intuitively appealing claim that wars tend to “absoluteness,” and that all limitations imposed by law and morality are in theory alien to it. Clausewitz of course knew that there are in practice many limitations to how wars are fought, but he saw them as contingent to what war is. Since then, however, historians such as John Lynn (Battle: A History of Combat and Culture [Westview Press, 2003]), John Keegan (A History of Warfare ([Random House,1993]) and Victor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  98
    We Have Met the Grey Zone and He is Us: How Grey Zone Warfare Exploits Our Undecidedness about What Matters to Us.Duncan MacIntosh - 2024 - In Mitt Regan & Aurel Sari (eds.), Hybrid Threats and Grey Zone Conflict: The Challenge to Liberal Democracies. New York, NY: Oxford University Press. pp. 61-85.
    Grey zone attacks tend to paralyze response for two reasons. First, they present us with choice scenarios of inherently dilemmatic structure, e.g., Prisoners’ Dilemmas and games of chicken, complicated by difficult conditions of choice, such as choice under risk or amid vagueness. Second, they exploit our uncertainty about how much we do or should care about the things under attack¬—each attack is small in effect, but their effects accumulate: how should we decide whether to treat a given attack as something (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Threat of Space Terrorism in the Context of Irregular Warfare Strategies.Pawel Bernat & Elżbieta Posłuszna - 2019 - In Leyla Aydemir (ed.), Evaluation of Social Changes and Historical Events Based on Health, Economy and Communication in a Globalizing World. pp. 25-37.
    Download  
     
    Export citation  
     
    Bookmark  
  46. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Gardner, L. C. Killing Machine: The American Presidency in the Age of Drone Warfare[REVIEW]Edmund Byrne - 2014 - Michigan War Studies Review 2014 (045).
    Download  
     
    Export citation  
     
    Bookmark  
  48. Cyberbullying: Effect on work place production.James Nambusi Makhulo - 2019 - Africa International Journal of Multidisciplinary Research 2 (1).
    Cyber bullying affects many adolescents and teens on a daily basis; it is a form of violence that can do lasting harm to people at different ages and social status in a society. Cyber bullying is real experience that has been in existence for a quite a long time; Bullying statistics show that cyber bullying is a serious problem among teens and gaining roots among adults. By being more aware of cyber bullying, teens and adults can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Modern Origins & Sources of China’s Techtransfer.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):18-25.
    The research identified the key element on P. R. China’s incentives in modern history on techtransfer practices. With reviewing on the state funding surrogacy in the natural sciences, the author identified the key militant coercive contracting clauses in the document of the National Natural Science Foundation of China. With its combined workings with the statutory & martial laws, the analysis takes a com- parative culture approach that partially counteracts the work of the “United Front Working Group of the CPC”, which (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  50. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, (...)‐fraud, revenge porn, and cyber‐stalking to demonstrate that who is victimised, why, and to what effect are the critical starting points for the analysis of the connections between gender and crimes. In turn, it uses the lens of intersectionality to acknowledge that, while conceptions of gender and crime interact, they intersect with other categories (e.g., sexuality) to provide additional layers of explanation. To nuance the utilitarian value of the synergy between the TCF and the feminist perspectives, the focus shifts to a recent case study (which compared socioeconomic and psychosocial cybercrimes). The article concludes that, while online and offline lives are inextricably intertwined, the victimisations in psychosocial cybercrimes may be more gendered than in socioeconomic cybercrimes. These contributions align the TCF to the feminist epistemology of crime in their attempt to move gender analysis of digital crimes “from margin to centre”. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 188