Results for 'information warfare'

1000+ found
Order:
  1. Information Warfare: A Response to Taddeo.Tim Stevens - 2013 - Philosophy and Technology 26 (2):221-225.
    Taddeo’s recent article, ‘Information Warfare: A Philosophical Perspective’ (Philos. Technol. 25:105–120, 2012) is a useful addition to the literature on information communications technologies (ICTs) and warfare. In this short response, I draw attention to two issues arising from the article. The first concerns the applicability of ‘information warfare’ terminology to current political and military discourse, on account of its relative lack of contemporary usage. The second engages with the political and ethical implications of treating (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. The latent nature of global information warfare.Luciano Floridi - 2014 - Philosophy and Technology 27 (3):317–319.
    Information has always been at the core of conflicts. When Napoleon planned to invade Italy, he duly upgraded the first telegraph network in the world, the French “semaphore”. He famously remarked that “an army marches on its stomach,” but he also knew that the same army acted on information. As Von Clausewitz once stated “by the word ‘information’ we denote all the knowledge which we have of the enemy and his country; therefore, in fact, the foundation of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Information Matters: Informational Conflict and the New Materialism.Tim Stevens - manuscript
    This paper focuses upon the challenge posed by the concept of ‘information’ to the new materialisms, viewed with reference to the multifaceted worldly phenomenon of informational conflict. ‘Informational conflict’ is a broad term designed to encompass the hi-tech ‘cyber’ operations of inter-state warfare as well as the informational actions of non-state actors, and is contingent not upon information technologies, as commonly understood, but upon ‘information’. Informational conflicts can be viewed as sociotechnical assemblages of humans and non-humans (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Conspiring with the Enemy: The Ethic of Cooperation in Warfare.Yvonne Chiu - 2019 - New York, NY, USA: Columbia University Press.
    *North American Society for Social Philosophy (NASSP) Book Award 2019.* -/- *International Studies Association (ISA) - International Ethics Section Book Award 2021.* -/- Although military mores have relied primarily on just war theory, the ethic of cooperation in warfare (ECW)—between enemies even as they are trying to kill each other—is as central to the practice of warfare and to conceptualization of its morality. Neither game theory nor unilateral moral duties (God-given or otherwise) can explain the explicit language of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. Joint Doctrine Ontology: A Benchmark for Military Information Systems Interoperability.Peter Morosoff, Ron Rudnicki, Jason Bryant, Robert Farrell & Barry Smith - 2015 - In Semantic Technology for Intelligence, Defense and Security (STIDS). CEUR vol. 1325. pp. 2-9.
    When the U.S. conducts warfare, elements of a force are drawn from different services and work together as a single team to accomplish an assigned mission. To achieve such unified action, it is necessary that the doctrines governing the actions of members of specific services be both consistent with and subservient to joint Doctrine. Because warfighting today increasingly involves not only live forces but also automated systems, unified action requires that information technology that is used in joint (...) must be aligned with joint doctrine. It requires also that the separate information systems used by the different elements of a joint force must be interoperable, in the sense that data and information that is generated by each element must be usable (understandable, processable) by all the other elements that need them. Currently, such interoperability is impeded by multiple inconsistencies among the different data and software standards used by warfighters. We describe here the on-going project of creating a Joint Doctrine Ontology (JDO), which uses joint doctrine to provide shared computer-accessible content valid for any field of military endeavor, organization, and information system. JDO addresses the two previously mentioned requirements of unified action by providing a widely applicable benchmark for use by developers of information systems that will both guarantee alignment with joint doctrine and support interoperability. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. 47 Vietnamese people are among the world's most influential scientists in 2023.Authority of Foreign Information Service - 2023 - Vietnam Information Service.
    Vietnamese scientists on the list of "100.000 influential scientists" this year increased sharply in number and rank. -/- The ranking was selected by a group of scientists led by Professor John PA Ioannidis and colleagues from Stanford University (USA) on the Scopus database and published by Elsevier Publishing House.
    Download  
     
    Export citation  
     
    Bookmark  
  7. The Ethics of Military Influence Operations.Michael Skerker - 2023 - Conatus 8 (2):589-612.
    This article articulates a framework for normatively assessing influence operations, undertaken by national security institutions. Section I categorizes the vast field of possible types of influence operations according to the communication’s content, its attribution, the rights of the target audience, the communication’s purpose, and its secondary effects. Section II populates these categories with historical examples and section III evaluates these cases with a moral framework. I argue that deceptive or manipulative communications directed at non-liable audiences are presumptively immoral and illegitimate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. The Problem with Killer Robots.Nathan Gabriel Wood - 2020 - Journal of Military Ethics 19 (3):220-240.
    Warfare is becoming increasingly automated, from automatic missile defense systems to micro-UAVs (WASPs) that can maneuver through urban environments with ease, and each advance brings with it ethical questions in need of resolving. Proponents of lethal autonomous weapons systems (LAWS) provide varied arguments in their favor; robots are capable of better identifying combatants and civilians, thus reducing "collateral damage"; robots need not protect themselves and so can incur more risks to protect innocents or gather more information before using (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  9. Population pressure and prehistoric violence in the Yayoi period of Japan.Tomomi Nakagawa, Kohei Tamura, Yuji Yamaguchi, Naoko Matsumoto, Takehiko Matsugi & Hisashi Nakao - 2021 - Journal of Archaeological Science 132:105420.
    The causes of prehistoric inter-group violence have been a subject of long-standing debate in archaeology, an- thropology, and other disciplines. Although population pressure has been considered as a major factor, due to the lack of available prehistoric data, few studies have directly examined its effect so far. In the present study, we used data on skeletal remains from the middle Yayoi period of the Japanese archipelago, where archaeologists argued that an increase of inter-group violence in this period could be explained (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  10. The Performativity of Terror-Tagging and the Prospects for a Marcos Presidency.Regletto Aldrich Imbong - 2023 - In Authoritarian Disaster: The Duterte Regime and the Prospects for a Marcos Presidency. New York: Nova Science Publishers. pp. 43-64.
    The Philippine government has been relentless in its counterinsurgency campaigns. From the colonial wars that vilified as insurgents and bandits the honored heroes of today, up to the anti-communist and anti-secessionist civil and military efforts of the postcolonial regimes, these campaigns have not only rolled out large state resources but also cost lives of innocent civilians. Patterned after the United States (US) of America’s principle of low-intensity conflict aimed at countering Marxist and anti-imperialist movements (Reed 1986), counterinsurgency campaigns have unleashed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Medicine, Logic, or Metaphysics? Aristotelianism and Scholasticism in the Fight Book Corpus.Karin Verelst - 2023 - Acta Periodica Duellatorum 11 (1):91-127.
    Because we tend to study fight books in isolation, we often forget how difficult it is to understand the precise place they occupy in the sociocultural and historical fabric of their time, and spill the many clues they inevitably contain on their owner, their local society, their precise purpose. In order to unlock that information, we need to study them in their broader sociocultural and historical context. This requires a background and research skills that are not always easily accessible (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Putting the War Back in Just War Theory: A Critique of Examples.Rigstad Mark - 2017 - Ethical Perspectives 24 (1):123-144.
    Analytic just war theorists often attempt to construct ideal theories of military justice on the basis of intuitions about imaginary and sometimes outlandish examples, often taken from non-military contexts. This article argues for a sharp curtailment of this method and defends, instead, an empirically and historically informed approach to the ethical scrutiny of armed conflicts. After critically reviewing general philosophical reasons for being sceptical of the moral-theoretic value of imaginary hypotheticals, the article turns to some of the special problems that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. The Third Man: comparative analysis of a science autobiography and a cinema classic as windows into post-war life sciences research.Hub Zwart - 2015 - History and Philosophy of the Life Sciences 37 (4):382-412.
    In 2003, biophysicist and Nobel Laureate Maurice Wilkins published his autobiography entitled The Third Man. In the preface, he diffidently points out that the title was chosen by his publisher, as a reference to the famous 1949 movie no doubt, featuring Orson Welles in his classical role as penicillin racketeer Harry Lime. In this paper I intend to show that there is much more to this title than merely its familiar ring. If subjected to a comparative analysis, multiple correspondences between (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  14. A Challenge to the Reigning Theory of the Just War.Christian Barry - 2011 - International Affairs 87 (2):457-466.
    Troubled times often gives rise to great art that reflects those troubles. So too with political theory. The greatest work of twentieth century political theory, John Rawls's A theory of justice, was inspired in various respects by extreme social and economic inequality, racialized slavery and racial segregation in the United States. Arguably the most influential work of political theory since Rawls—Michael Walzer's Just and unjust wars—a sustained and historically informed reflection on the morality of interstate armed conflict—was written in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Terror.Tomis Kapitan - unknown
    Any intelligent discussion of terrorism must demarcate its subject matter, for the term ‘terrorism’ is differently understood and where there is no accord on its meaning there is little chance for agreement on its application or normative status. The best course is to sketch a morally neutral definition that classifies as ‘terrorist’ as many widely-agreed upon cases as possible. Definitions that explicitly render terrorism illegitimate make classification contentious, and it is more informative to base moral assessment on an examination of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The ethical significance of evolution.Andrzej Elzanowski - 2010 - In Soniewicka Stelmach (ed.), Stelmach, J., Soniewicka M., Załuski W. (red.) Legal Philosophy and the Challenges of Biosciences (Studies in the Philosophy of Law 4). Wydawnictwo Uniwersytetu Jagiellońskiego. pp. 65-76.
    DARWIN’s (1859, 1871) discoveries have profound ethical implications that continue to be misrepresented and/or ignored. In contrast to socialdarwinistic misuses of his theory, Darwin was a great humanitarian who paved the way for an integrated scientific and ethical world view. As an ethical doctrine, socialdarwinism is long dead ever since its defeat by E. G. Moore although the socialdarwinistic thought is a hard-die in the biological community. The accusations of sociobiology for being socialdarwinistic are unfounded and stem from the moralistic (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  95
    FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  70
    Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. A handbook for social change: Cristina Bicchieri: Norms in the wild: how to diagnose, measure, and change social norms. Oxford: Oxford University Press, 2016, 264 pp, $ 29.95 PB. [REVIEW]Ulf Hlobil - 2017 - Metascience 26 (3):459-462.
    “Philosophy isn’t useful for changing the world,” parents of philosophy students and Karl Marx tell us (at least about non-Marxist philosophy). Cristina Bicchieri’s new book Norms in the Wild provides an impressive antidote against this worry. It stands to change of social practices as Che Guevara’s Guerrilla Warfare stands to political revolutions. Bicchieri combines hands-on advice on how to change social practices with compelling theoretical analyses of social norms. She draws heavily on her influential earlier work on norms, but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Drone Warfare, Civilian Deaths, and the Narrative of Honest Mistakes.Matthew Talbert & Jessica Wolfendale - 2023 - In Nobuo Hayashi & Carola Lingaas (eds.), Honest Errors? Combat Decision-Making 75 Years After the Hostage Case. T.M.C. Asser Press. pp. 261-288.
    In this chapter, we consider the plausibility and consequences of the use of the term “honest errors” to describe the accidental killings of civilians resulting from the US military’s drone campaigns in Iraq, Syria, Afghanistan, and elsewhere. We argue that the narrative of “honest errors” unjustifiably excuses those involved in these killings from moral culpability, and reinforces long-standing, pernicious assumptions about the moral superiority of the US military and the inevitability of civilian deaths in combat. Furthermore, we maintain that, given (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. AWS compliance with the ethical principle of proportionality: three possible solutions.Maciek Zając - 2023 - Ethics and Information Technology 25 (1):1-13.
    The ethical Principle of Proportionality requires combatants not to cause collateral harm excessive in comparison to the anticipated military advantage of an attack. This principle is considered a major (and perhaps insurmountable) obstacle to ethical use of autonomous weapon systems (AWS). This article reviews three possible solutions to the problem of achieving Proportionality compliance in AWS. In doing so, I describe and discuss the three components Proportionality judgments, namely collateral damage estimation, assessment of anticipated military advantage, and judgment of “excessiveness”. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. 弥生時代中期における戦争:人骨と人口動態の関係から(Prehistoric Warfare in the Middle Phase of the Yayoi Period in Japan : Human Skeletal Remains and Demography).Tomomi Nakagawa, Hisashi Nakao, Kohei Tamura, Yuji Yamaguchi, Naoko Matsumoto & Takehiko Matsugi - 2019 - Journal of Computer Archaeology 1 (24):10-29.
    It has been commonly claimed that prehistoric warfare in Japan began in the Yayoi period. Population increases due to the introduction of agriculture from the Korean Peninsula to Japan resulted in the lack of land for cultivation and resources for the population, eventually triggering competition over land. This hypothesis has been supported by the demographic data inferred from historical changes in Kamekan, a burial system used especially in the Kyushu area in the Yayoi period. The present study aims to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. Semantic information and the correctness theory of truth.Luciano Floridi - 2011 - Erkenntnis 74 (2):147-175.
    Semantic information is usually supposed to satisfy the veridicality thesis: p qualifies as semantic information only if p is true. However, what it means for semantic information to be true is often left implicit, with correspondentist interpretations representing the most popular, default option. The article develops an alternative approach, namely a correctness theory of truth (CTT) for semantic information. This is meant as a contribution not only to the philosophy of information but also to the (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  24. Logical information and epistemic space.Mark Jago - 2009 - Synthese 167 (2):327 - 341.
    Gaining information can be modelled as a narrowing of epistemic space . Intuitively, becoming informed that such-and-such is the case rules out certain scenarios or would-be possibilities. Chalmers’s account of epistemic space treats it as a space of a priori possibility and so has trouble in dealing with the information which we intuitively feel can be gained from logical inference. I propose a more inclusive notion of epistemic space, based on Priest’s notion of open worlds yet which contains (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  25. Just War contra Drone Warfare.Joshua M. Hall - 2023 - Conatus 8 (2):217-239.
    In this article, I present a two-pronged argument for the immorality of contemporary, asymmetric drone warfare, based on my new interpretations of the just war principles of “proportionality” and “moral equivalence of combatants” (MEC). The justification for these new interpretations is that drone warfare continues to this day, having survived despite arguments against it that are based on traditional interpretations of just war theory (including one from Michael Walzer). On the basis of my argument, I echo Harry Van (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Violence and warfare in prehistoric Japan.Tomomi Nakagawa, Hisashi Nakao, Kohei Tamura, Yui Arimatsu, Naoko Matsumoto & Takehiko Matsugi - 2017 - Letters on Evolutionary and Behavioral Science 8 (1):8-11.
    The origins and consequences of warfare or largescale intergroup violence have been subject of long debate. Based on exhaustive surveys of skeletal remains for prehistoric hunter-gatherers and agriculturists in Japan, the present study examines levels of inferred violence and their implications for two different evolutionary models, i.e., parochial altruism model and subsistence model. The former assumes that frequent warfare played an important role in the evolution of altruism and the latter sees warfare as promoted by social changes (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  27. Information, Computation, Cognition. Agency-Based Hierarchies of Levels.Gordana Dodig-Crnkovic - 2016 - In Vincent C. Müller (ed.), Fundamental Issues of Artificial Intelligence. Cham: Springer. pp. 139-159.
    This paper connects information with computation and cognition via concept of agents that appear at variety of levels of organization of physical/chemical/cognitive systems – from elementary particles to atoms, molecules, life-like chemical systems, to cognitive systems starting with living cells, up to organisms and ecologies. In order to obtain this generalized framework, concepts of information, computation and cognition are generalized. In this framework, nature can be seen as informational structure with computational dynamics, where an (info-computational) agent is needed (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. An Analysis of Guerilla Warfare: From Clausewitz to T.E. Lawrence.Dominic Cassella - manuscript
    This paper attempts to understand the nature of guerrilla warfare as taught by T.E. Lawrence in light of Clausewitz and Liddell Hart.
    Download  
     
    Export citation  
     
    Bookmark  
  29. Singularity warfare: A bibliometric survey of militarized transhumanism.Woody Evans - 2007 - Journal of Evolution and Technology 16 (1):161-65.
    This paper examines the responses to advanced and transformative technologies in military literature, attenuates the conclusions of earlier work suggesting that there is an “ignorance of transhumanism” in the military, and updates the current layout of transhuman concerns in military thought. The military is not ignorant of transhuman issues and implications, though there was evidence for this in the past; militaries and non-state actors increasingly use disruptive technologies with what we may call transhuman provenance.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. Autonomous Weapon Systems, Asymmetrical Warfare, and Myth.Michal Klincewicz - 2018 - Civitas. Studia Z Filozofii Polityki 23:179-195.
    Predictions about autonomous weapon systems are typically thought to channel fears that drove all the myths about intelligence embodied in matter. One of these is the idea that the technology can get out of control and ultimately lead to horrifi c consequences, as is the case in Mary Shelley’s classic Frankenstein. Given this, predictions about AWS are sometimes dismissed as science-fiction fear-mongering. This paper considers several analogies between AWS and other weapon systems and ultimately offers an argument that nuclear weapons (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Against Offensive Warfare.Paul van Els - 2007 - Het Trage Vuur 40:8–19.
    van Els, Paul. "Tegen aanvalsoorlogen" (Against Offensive Warfare). Dutch translation of Mozi chapters 17, 18, and 19. Het Trage Vuur 40 (December 2007): 8–19.
    Download  
     
    Export citation  
     
    Bookmark  
  32. Fragmentation and information access.Adam Elga & Agustin Rayo - 2021 - In Cristina Borgoni, Dirk Kindermann & Andrea Onofri (eds.), The Fragmented Mind. Oxford: Oxford University Press.
    In order to predict and explain behavior, one cannot specify the mental state of an agent merely by saying what information she possesses. Instead one must specify what information is available to an agent relative to various purposes. Specifying mental states in this way allows us to accommodate cases of imperfect recall, cognitive accomplishments involved in logical deduction, the mental states of confused or fragmented subjects, and the difference between propositional knowledge and know-how .
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  33. Informed Consent: What Must Be Disclosed and What Must Be Understood?Joseph Millum & Danielle Bromwich - 2021 - American Journal of Bioethics 21 (5):46-58.
    Over the last few decades, multiple studies have examined the understanding of participants in clinical research. They show variable and often poor understanding of key elements of disclosure, such as expected risks and the experimental nature of treatments. Did the participants in these studies give valid consent? According to the standard view of informed consent they did not. The standard view holds that the recipient of consent has a duty to disclose certain information to the profferer of consent because (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  34. Informational Theories of Content and Mental Representation.Marc Artiga & Miguel Ángel Sebastián - 2020 - Review of Philosophy and Psychology 11 (3):613-627.
    Informational theories of semantic content have been recently gaining prominence in the debate on the notion of mental representation. In this paper we examine new-wave informational theories which have a special focus on cognitive science. In particular, we argue that these theories face four important difficulties: they do not fully solve the problem of error, fall prey to the wrong distality attribution problem, have serious difficulties accounting for ambiguous and redundant representations and fail to deliver a metasemantic theory of representation. (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  35. Information, physics, quantum: the search for links.John Archibald Wheeler - 1989 - In Proceedings III International Symposium on Foundations of Quantum Mechanics. Tokyo: pp. 354-358.
    This report reviews what quantum physics and information theory have to tell us about the age-old question, How come existence? No escape is evident from four conclusions: (1) The world cannot be a giant machine, ruled by any preestablished continuum physical law. (2) There is no such thing at the microscopic level as space or time or spacetime continuum. (3) The familiar probability function or functional, and wave equation or functional wave equation, of standard quantum theory provide mere continuum (...)
    Download  
     
    Export citation  
     
    Bookmark   122 citations  
  36. Integrated Information Theory, Intrinsicality, and Overlapping Conscious Systems.James C. Blackmon - 2021 - Journal of Consciousness Studies 28 (11-12):31-53.
    Integrated Information Theory (IIT) identifies consciousness with having a maximum amount of integrated information. But a thing’s having the maximum amount of anything cannot be intrinsic to it, for that depends on how that thing compares to certain other things. IIT’s consciousness, then, is not intrinsic. A mereological argument elaborates this consequence: IIT implies that one physical system can be conscious while a physical duplicate of it is not conscious. Thus, by a common and reasonable conception of intrinsicality, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  37. Informal and revolutionary feminist placemaking.Asma Mehan - 2024 - Frontiers in Sociology 9 (Sec. Gender, Sex and Sexualities):01-09.
    Urban spaces, often emerging outside formal, recognized boundaries, underscore the pivotal role women play in shaping these environments. Despite the enduring influence of patriarchal and hierarchical structures that render these spaces overtly gendered, it is within these contexts that women’s actions become particularly transformative. Drawing from feminist urban theories of the global south, this paper investigates informal placemaking, feminist urban activism, revolutionary placemaking, online protest movements, and the networks that support women’s solidarity groups. Employing a mixed-methods approach that includes case (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Information Asymmetries and the Paradox of Sustainable Business Models: Toward an integrated theory of sustainable entrepreneurship.V. Blok - unknown
    In this conceptual paper, the traditional conceptualization of sustainable entrepreneurship is challenged because of a fundamental tension between processes involved in sustainable development and processes involved in entrepreneurship: the concept of sustainable business models contains a paradox, because sustainability involves the reduction of information asymmetries, whereas entrepreneurship involves enhanced and secured levels of information asymmetries. We therefore propose a new and integrated theory of sustainable entrepreneurship that overcomes this paradox. The basic argument is that environmental problems have to (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  39. Information: From Philosophic to Physics Concepts for Informational Modeling of Consciousness.Florin Gaiseanu - 2018 - Philosophy Study 8 (8).
    Information was a frequently used concept in many fields of investigation. However, this concept is still not really understood, when it is referred for instance to consciousness and its informational structure. In this paper it is followed the concept of information from philosophical to physics perspective, showing especially how this concept could be extended to matter in general and to the living in particular, as a result of the intimate interaction between matter and information, the human body (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  40. A Contingency Interpretation of Information Theory as a Bridge between God’s Immanence and Transcendence.Philippe Gagnon - 2020 - In Michael Fuller, Dirk Evers, Anne L. C. Runehov, Knut-Willy Sæther & Bernard Michollet (eds.), Issues in Science and Theology: Nature – and Beyond. Springer. pp. 169-185.
    This paper investigates the degree to which information theory, and the derived uses that make it work as a metaphor of our age, can be helpful in thinking about God’s immanence and transcendance. We ask when it is possible to say that a consciousness has to be behind the information we encounter. If God is to be thought about as a communicator of information, we need to ask whether a communication system has to pre-exist to the divine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Swarms Are Hell: Warfare as an Anti-Transhuman Choice.Woody Evans - 2013 - Journal of Evolution and Technology 23 (1):56-60.
    The use of advanced technologies, even of so-called transhuman technology, does not make militaries transhuman. Transhumanism includes dimensions of ethics that are themselves in direct conflict with many transhuman capabilities of soldiers in warfare. The use of advanced weapons of mass destruction represents an anti-humanism that undermines the modern, open, and high-tech nation state.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is (...)
    Download  
     
    Export citation  
     
    Bookmark   113 citations  
  43. Informed consent to HIV cure research.Danielle Bromwich & Joseph R. Millum - 2017 - Journal of Medical Ethics 43 (2):108-113.
    Trials with highly unfavourable risk–benefit ratios for participants, like HIV cure trials, raise questions about the quality of the consent of research participants. Why, it may be asked, would a person with HIV who is doing well on antiretroviral therapy be willing to jeopardise his health by enrolling in such a trial? We distinguish three concerns: first, how information is communicated to potential participants; second, participants’ motivations for enrolling in potentially high risk research with no prospect of direct benefit; (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  44. Mature information societies—a matter of expectations.Luciano Floridi - 2016 - Philosophy and Technology 29 (1):1-4.
    Scholars and policy makers often refer to the “information society”. And yet, it is more accurate to speak of societies, each different, some of which may qualify as information ones at different levels of maturity. Through exploration of the concepts of expectations, education and innovation, this paper explores what it means for an information society to be more or less mature than others, and the impact of this on the ongoing digital revolution.
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  45. Some discussions on critical information security issues in the artificial intelligence era.Vuong Quan Hoang, Viet-Phuong La, Hong-Son Nguyen & Minh-Hoang Nguyen - manuscript
    The rapid advancement of Information Technology (IT) platforms and programming languages has transformed the dynamics and development of human society. The cyberspace and associated utilities are expanding, leading to a gradual shift from real-world living to virtual life (also known as cyberspace or digital space). The expansion and development of Natural Language Processing (NLP) models and Large Language Models (LLMs) demonstrate human-like characteristics in reasoning, perception, attention, and creativity, helping humans overcome operational barriers. Alongside the immense potential of artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. INFORMATION-THEORETIC LOGIC.John Corcoran - 1998 - In C. Martínez U. Rivas & L. Villegas-Forero (eds.), Truth in Perspective edited by C. Martínez, U. Rivas, L. Villegas-Forero, Ashgate Publishing Limited, Aldershot, England (1998) 113-135. ASHGATE. pp. 113-135.
    Information-theoretic approaches to formal logic analyse the "common intuitive" concept of propositional implication (or argumental validity) in terms of information content of propositions and sets of propositions: one given proposition implies a second if the former contains all of the information contained by the latter; an argument is valid if the conclusion contains no information beyond that of the premise-set. This paper locates information-theoretic approaches historically, philosophically and pragmatically. Advantages and disadvantages are identified by examining (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  47. The informational nature of personal identity.Luciano Floridi - 2011 - Minds and Machines 21 (4):549-566.
    In this paper, I present an informational approach to the nature of personal identity. In “Plato and the problem of the chariot”, I use Plato’s famous metaphor of the chariot to introduce a specific problem regarding the nature of the self as an informational multiagent system: what keeps the self together as a whole and coherent unity? In “Egology and its two branches” and “Egology as synchronic individualisation”, I outline two branches of the theory of the self: one concerning the (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  48. Patterns, Information, and Causation.Holly Andersen - 2017 - Journal of Philosophy 114 (11):592-622.
    This paper articulates an account of causation as a collection of information-theoretic relationships between patterns instantiated in the causal nexus. I draw on Dennett’s account of real patterns to characterize potential causal relata as patterns with specific identification criteria and noise tolerance levels, and actual causal relata as those patterns instantiated at some spatiotemporal location in the rich causal nexus as originally developed by Salmon. I develop a representation framework using phase space to precisely characterize causal relata, including their (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  49. Information and Inaccuracy.William Roche & Tomoji Shogenji - 2018 - British Journal for the Philosophy of Science 69 (2):577-604.
    This article proposes a new interpretation of mutual information. We examine three extant interpretations of MI by reduction in doubt, by reduction in uncertainty, and by divergence. We argue that the first two are inconsistent with the epistemic value of information assumed in many applications of MI: the greater is the amount of information we acquire, the better is our epistemic position, other things being equal. The third interpretation is consistent with EVI, but it is faced with (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  50. Rational Aversion to Information.Sven Neth - forthcoming - British Journal for the Philosophy of Science.
    Is more information always better? Or are there some situations in which more information can make us worse off? Good (1967) argues that expected utility maximizers should always accept more information if the information is cost-free and relevant. But Good's argument presupposes that you are certain you will update by conditionalization. If we relax this assumption and allow agents to be uncertain about updating, these agents can be rationally required to reject free and relevant information. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000