Results for 'information warfare'

970 found
Order:
  1. Information Warfare: A Response to Taddeo.Tim Stevens - 2013 - Philosophy and Technology 26 (2):221-225.
    Taddeo’s recent article, ‘Information Warfare: A Philosophical Perspective’ (Philos. Technol. 25:105–120, 2012) is a useful addition to the literature on information communications technologies (ICTs) and warfare. In this short response, I draw attention to two issues arising from the article. The first concerns the applicability of ‘information warfare’ terminology to current political and military discourse, on account of its relative lack of contemporary usage. The second engages with the political and ethical implications of treating (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. (1 other version)The latent nature of global information warfare.Luciano Floridi - 2014 - Philosophy and Technology 27 (3):317–319.
    Information has always been at the core of conflicts. When Napoleon planned to invade Italy, he duly upgraded the first telegraph network in the world, the French “semaphore”. He famously remarked that “an army marches on its stomach,” but he also knew that the same army acted on information. As Von Clausewitz once stated “by the word ‘information’ we denote all the knowledge which we have of the enemy and his country; therefore, in fact, the foundation of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Information Matters: Informational Conflict and the New Materialism.Tim Stevens - manuscript
    This paper focuses upon the challenge posed by the concept of ‘information’ to the new materialisms, viewed with reference to the multifaceted worldly phenomenon of informational conflict. ‘Informational conflict’ is a broad term designed to encompass the hi-tech ‘cyber’ operations of inter-state warfare as well as the informational actions of non-state actors, and is contingent not upon information technologies, as commonly understood, but upon ‘information’. Informational conflicts can be viewed as sociotechnical assemblages of humans and non-humans (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Conspiring with the Enemy: The Ethic of Cooperation in Warfare.Yvonne Chiu - 2019 - New York, NY, USA: Columbia University Press.
    *North American Society for Social Philosophy (NASSP) Book Award 2019.* -/- *International Studies Association (ISA) - International Ethics Section Book Award 2021.* -/- Although military mores have relied primarily on just war theory, the ethic of cooperation in warfare (ECW)—between enemies even as they are trying to kill each other—is as central to the practice of warfare and to conceptualization of its morality. Neither game theory nor unilateral moral duties (God-given or otherwise) can explain the explicit language of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Joint Doctrine Ontology: A Benchmark for Military Information Systems Interoperability.Peter Morosoff, Ron Rudnicki, Jason Bryant, Robert Farrell & Barry Smith - 2015 - In Peter Morosoff, Ron Rudnicki, Jason Bryant, Robert Farrell & Barry Smith (eds.), Joint Doctrine Ontology: A Benchmark for Military Information Systems Interoperability. CEUR vol. 1325. pp. 2-9.
    When the U.S. conducts warfare, elements of a force are drawn from different services and work together as a single team to accomplish an assigned mission. To achieve such unified action, it is necessary that the doctrines governing the actions of members of specific services be both consistent with and subservient to joint Doctrine. Because warfighting today increasingly involves not only live forces but also automated systems, unified action requires that information technology that is used in joint (...) must be aligned with joint doctrine. It requires also that the separate information systems used by the different elements of a joint force must be interoperable, in the sense that data and information that is generated by each element must be usable (understandable, processable) by all the other elements that need them. Currently, such interoperability is impeded by multiple inconsistencies among the different data and software standards used by warfighters. We describe here the on-going project of creating a Joint Doctrine Ontology (JDO), which uses joint doctrine to provide shared computer-accessible content valid for any field of military endeavor, organization, and information system. JDO addresses the two previously mentioned requirements of unified action by providing a widely applicable benchmark for use by developers of information systems that will both guarantee alignment with joint doctrine and support interoperability. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. The Problem with Killer Robots.Nathan Gabriel Wood - 2020 - Journal of Military Ethics 19 (3):220-240.
    Warfare is becoming increasingly automated, from automatic missile defense systems to micro-UAVs (WASPs) that can maneuver through urban environments with ease, and each advance brings with it ethical questions in need of resolving. Proponents of lethal autonomous weapons systems (LAWS) provide varied arguments in their favor; robots are capable of better identifying combatants and civilians, thus reducing "collateral damage"; robots need not protect themselves and so can incur more risks to protect innocents or gather more information before using (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  7. The Ethics of Military Influence Operations.Michael Skerker - 2023 - Conatus 8 (2):589-612.
    This article articulates a framework for normatively assessing influence operations, undertaken by national security institutions. Section I categorizes the vast field of possible types of influence operations according to the communication’s content, its attribution, the rights of the target audience, the communication’s purpose, and its secondary effects. Section II populates these categories with historical examples and section III evaluates these cases with a moral framework. I argue that deceptive or manipulative communications directed at non-liable audiences are presumptively immoral and illegitimate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method combining (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Third Man: comparative analysis of a science autobiography and a cinema classic as windows into post-war life sciences research.Hub Zwart - 2015 - History and Philosophy of the Life Sciences 37 (4):382-412.
    In 2003, biophysicist and Nobel Laureate Maurice Wilkins published his autobiography entitled The Third Man. In the preface, he diffidently points out that the title was chosen by his publisher, as a reference to the famous 1949 movie no doubt, featuring Orson Welles in his classical role as penicillin racketeer Harry Lime. In this paper I intend to show that there is much more to this title than merely its familiar ring. If subjected to a comparative analysis, multiple correspondences between (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  10. Population pressure and prehistoric violence in the Yayoi period of Japan.Tomomi Nakagawa, Kohei Tamura, Yuji Yamaguchi, Naoko Matsumoto, Takehiko Matsugi & Hisashi Nakao - 2021 - Journal of Archaeological Science 132:105420.
    The causes of prehistoric inter-group violence have been a subject of long-standing debate in archaeology, an- thropology, and other disciplines. Although population pressure has been considered as a major factor, due to the lack of available prehistoric data, few studies have directly examined its effect so far. In the present study, we used data on skeletal remains from the middle Yayoi period of the Japanese archipelago, where archaeologists argued that an increase of inter-group violence in this period could be explained (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  11. The Performativity of Terror-Tagging and the Prospects for a Marcos Presidency.Regletto Aldrich Imbong - 2023 - In Authoritarian Disaster: The Duterte Regime and the Prospects for a Marcos Presidency. New York: Nova Science Publishers. pp. 43-64.
    The Philippine government has been relentless in its counterinsurgency campaigns. From the colonial wars that vilified as insurgents and bandits the honored heroes of today, up to the anti-communist and anti-secessionist civil and military efforts of the postcolonial regimes, these campaigns have not only rolled out large state resources but also cost lives of innocent civilians. Patterned after the United States (US) of America’s principle of low-intensity conflict aimed at countering Marxist and anti-imperialist movements (Reed 1986), counterinsurgency campaigns have unleashed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  68
    Intelligence Info, Volumul 3, Numărul 3, Septembrie 2024.Nicolae Sfetcu - 2024 - Intelligence Info 3 (3).
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Nicolae SFETCU The Role of Polanyi’s Tacit Knowledge in Intelligence Analysis Rolul cunoașterii tacite a lui Polanyi în analiza informațiilor -/- INTELLIGENCE / INTELLIGENCE -/- Tănase TIBERIU Principles, methods and means of intelligence activity in the Russian Federation and Israel Principii, metode și mijloace ale activității informative în Federația Rusă și Israel -/- Tănase (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. A Challenge to the Reigning Theory of the Just War.Christian Barry - 2011 - International Affairs 87 (2):457-466.
    Troubled times often gives rise to great art that reflects those troubles. So too with political theory. The greatest work of twentieth century political theory, John Rawls's A theory of justice, was inspired in various respects by extreme social and economic inequality, racialized slavery and racial segregation in the United States. Arguably the most influential work of political theory since Rawls—Michael Walzer's Just and unjust wars—a sustained and historically informed reflection on the morality of interstate armed conflict—was written in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  52
    IT & C, Volumul 3, Numărul 2, Iunie 2024.Nicolae Sfetcu - 2024 - It and C 3 (2).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Levering Data Science in the Detection of Advanced Persistent Threats Utilizarea științei datelor în detectarea amenințărilor persistente avansate -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Detecting Advanced Persistent Threats in Cyber Warfare – Academic Studies Detectarea amenințărilor persistente avansate în războiul cibernetic – Studii academice -/- TELECOMUNICAȚII / TELECOMMUNICATIONS -/- Artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  75
    IT & C, Volumul 3, Numărul 1, Martie 2024.Nicolae Sfetcu - 2024 - It and C 3 (1).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Challenges and Limitations in the Use of Artificial Intelligence Provocări și limitări în utilizarea inteligenței artificiale -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Impact of Big Data Technology on Contemporary Society Impactul tehnologiei Big Data asupra societății contemporane -/- Methods, Techniques and Patterns of Advanced Persistent Threats – APT Lifecycle Metode, tehnici (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Putting the War Back in Just War Theory: A Critique of Examples.Rigstad Mark - 2017 - Ethical Perspectives 24 (1):123-144.
    Analytic just war theorists often attempt to construct ideal theories of military justice on the basis of intuitions about imaginary and sometimes outlandish examples, often taken from non-military contexts. This article argues for a sharp curtailment of this method and defends, instead, an empirically and historically informed approach to the ethical scrutiny of armed conflicts. After critically reviewing general philosophical reasons for being sceptical of the moral-theoretic value of imaginary hypotheticals, the article turns to some of the special problems that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Terror.Tomis Kapitan - unknown
    Any intelligent discussion of terrorism must demarcate its subject matter, for the term ‘terrorism’ is differently understood and where there is no accord on its meaning there is little chance for agreement on its application or normative status. The best course is to sketch a morally neutral definition that classifies as ‘terrorist’ as many widely-agreed upon cases as possible. Definitions that explicitly render terrorism illegitimate make classification contentious, and it is more informative to base moral assessment on an examination of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. The ethical significance of evolution.Andrzej Elzanowski - 2010 - In Soniewicka Stelmach (ed.), Stelmach, J., Soniewicka M., Załuski W. (red.) Legal Philosophy and the Challenges of Biosciences (Studies in the Philosophy of Law 4). Wydawnictwo Uniwersytetu Jagiellońskiego. pp. 65-76.
    DARWIN’s (1859, 1871) discoveries have profound ethical implications that continue to be misrepresented and/or ignored. In contrast to socialdarwinistic misuses of his theory, Darwin was a great humanitarian who paved the way for an integrated scientific and ethical world view. As an ethical doctrine, socialdarwinism is long dead ever since its defeat by E. G. Moore although the socialdarwinistic thought is a hard-die in the biological community. The accusations of sociobiology for being socialdarwinistic are unfounded and stem from the moralistic (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  22
    Bring Them Home: Creating Humane & Enforceable POW Parole System.Maciek Zając - manuscript
    Allowing prisoners of war (POW) to be released on parole ceased to be practiced in early XX century, although for centuries it was quite common in European warfare. In this article I argue there are several powerful moral reasons to reinstate POW parole: the well- being of POW and their families, but also a chance to address the previously intractable problem of surrender to aircraft and autonomous weapons. I also argue that there are no good moral reasons not to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Thinking for the bound and dead: beyond MAN3 towards a new (truly) universal theory of human victory.Miron J. Clay-Gilmore - 2023 - Dissertation, University of Edinburgh
    This project is a blend of Africana intellectual history and philosophical anti-humanism. The opening chapter seeks to contextualize the thought of Huey P. Newton in the Black nationalist tradition outline his conceptualization of US empire – ‘Reactionary Intercommunalism’. I use the second chapter to explore counterinsurgency as a historical phenomenon that laid the basis for European colonization and the civilizing mission during the 17th, 18th and 19th centuries and the modern phenomena understand as racial violence. The third chapter analyzes how (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. A handbook for social change: Cristina Bicchieri: Norms in the wild: how to diagnose, measure, and change social norms. Oxford: Oxford University Press, 2016, 264 pp, $ 29.95 PB. [REVIEW]Ulf Hlobil - 2017 - Metascience 26 (3):459-462.
    “Philosophy isn’t useful for changing the world,” parents of philosophy students and Karl Marx tell us (at least about non-Marxist philosophy). Cristina Bicchieri’s new book Norms in the Wild provides an impressive antidote against this worry. It stands to change of social practices as Che Guevara’s Guerrilla Warfare stands to political revolutions. Bicchieri combines hands-on advice on how to change social practices with compelling theoretical analyses of social norms. She draws heavily on her influential earlier work on norms, but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Medicine, Logic, or Metaphysics? Aristotelianism and Scholasticism in the Fight Book Corpus.Karin Verelst - 2023 - Acta Periodica Duellatorum 11 (1):91-127.
    Because we tend to study fight books in isolation, we often forget how difficult it is to understand the precise place they occupy in the sociocultural and historical fabric of their time, and spill the many clues they inevitably contain on their owner, their local society, their precise purpose. In order to unlock that information, we need to study them in their broader sociocultural and historical context. This requires a background and research skills that are not always easily accessible (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. AWS compliance with the ethical principle of proportionality: three possible solutions.Maciek Zając - 2023 - Ethics and Information Technology 25 (1):1-13.
    The ethical Principle of Proportionality requires combatants not to cause collateral harm excessive in comparison to the anticipated military advantage of an attack. This principle is considered a major (and perhaps insurmountable) obstacle to ethical use of autonomous weapon systems (AWS). This article reviews three possible solutions to the problem of achieving Proportionality compliance in AWS. In doing so, I describe and discuss the three components Proportionality judgments, namely collateral damage estimation, assessment of anticipated military advantage, and judgment of “excessiveness”. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. 47 Vietnamese people are among the world's most influential scientists in 2023.Authority of Foreign Information Service - 2023 - Vietnam Information Service.
    Vietnamese scientists on the list of "100.000 influential scientists" this year increased sharply in number and rank. -/- The ranking was selected by a group of scientists led by Professor John PA Ioannidis and colleagues from Stanford University (USA) on the Scopus database and published by Elsevier Publishing House.
    Download  
     
    Export citation  
     
    Bookmark  
  27. 弥生時代中期における戦争:人骨と人口動態の関係から(Prehistoric Warfare in the Middle Phase of the Yayoi Period in Japan : Human Skeletal Remains and Demography).Tomomi Nakagawa, Hisashi Nakao, Kohei Tamura, Yuji Yamaguchi, Naoko Matsumoto & Takehiko Matsugi - 2019 - Journal of Computer Archaeology 1 (24):10-29.
    It has been commonly claimed that prehistoric warfare in Japan began in the Yayoi period. Population increases due to the introduction of agriculture from the Korean Peninsula to Japan resulted in the lack of land for cultivation and resources for the population, eventually triggering competition over land. This hypothesis has been supported by the demographic data inferred from historical changes in Kamekan, a burial system used especially in the Kyushu area in the Yayoi period. The present study aims to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Drone Warfare, Civilian Deaths, and the Narrative of Honest Mistakes.Matthew Talbert & Jessica Wolfendale - 2023 - In Nobuo Hayashi & Carola Lingaas (eds.), Honest Errors? Combat Decision-Making 75 Years After the Hostage Case. T.M.C. Asser Press. pp. 261-288.
    In this chapter, we consider the plausibility and consequences of the use of the term “honest errors” to describe the accidental killings of civilians resulting from the US military’s drone campaigns in Iraq, Syria, Afghanistan, and elsewhere. We argue that the narrative of “honest errors” unjustifiably excuses those involved in these killings from moral culpability, and reinforces long-standing, pernicious assumptions about the moral superiority of the US military and the inevitability of civilian deaths in combat. Furthermore, we maintain that, given (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Electronic Warfare and Artificial Intelligence.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    Electronic warfare is a critical component of modern military operations and has undergone significant advances in recent years. This book provides an overview of electronic warfare, its historical development, key components, and its role in contemporary conflict scenarios. It also discusses emerging trends and challenges in electronic warfare and its contemporary relevance in an era of advanced technology and cyber threats, emphasizing the need for continued research and development in this area. The book explores the burgeoning intersection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Just War contra Drone Warfare.Joshua M. Hall - 2023 - Conatus 8 (2):217-239.
    In this article, I present a two-pronged argument for the immorality of contemporary, asymmetric drone warfare, based on my new interpretations of the just war principles of “proportionality” and “moral equivalence of combatants” (MEC). The justification for these new interpretations is that drone warfare continues to this day, having survived despite arguments against it that are based on traditional interpretations of just war theory (including one from Michael Walzer). On the basis of my argument, I echo Harry Van (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Violence and warfare in prehistoric Japan.Tomomi Nakagawa, Hisashi Nakao, Kohei Tamura, Yui Arimatsu, Naoko Matsumoto & Takehiko Matsugi - 2017 - Letters on Evolutionary and Behavioral Science 8 (1):8-11.
    The origins and consequences of warfare or largescale intergroup violence have been subject of long debate. Based on exhaustive surveys of skeletal remains for prehistoric hunter-gatherers and agriculturists in Japan, the present study examines levels of inferred violence and their implications for two different evolutionary models, i.e., parochial altruism model and subsistence model. The former assumes that frequent warfare played an important role in the evolution of altruism and the latter sees warfare as promoted by social changes (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  32. An Analysis of Guerilla Warfare: From Clausewitz to T.E. Lawrence.Dominic Cassella - manuscript
    This paper attempts to understand the nature of guerrilla warfare as taught by T.E. Lawrence in light of Clausewitz and Liddell Hart.
    Download  
     
    Export citation  
     
    Bookmark  
  33.  70
    Robot warfare: the (im)permissibility of autonomous weapons systems.Jack Madock - 2024 - AI and Ethics 1.
    This paper argues against prominent views of the impermissibility of autonomous weapons systems (AWS). It does so by assuming each theory is true and arguing towards contradiction. To arrive at a contradiction two assumptions are necessary. First, the theory of impermissibility in question is assumed. Second, a thought experiment called the ideal warfare scenario is assumed. The paper aims to demonstrate that in theory AWS could be deployed such that they bring about the best of possible warfare. However, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Autonomous Weapon Systems, Asymmetrical Warfare, and Myth.Michal Klincewicz - 2018 - Civitas. Studia Z Filozofii Polityki 23:179-195.
    Predictions about autonomous weapon systems are typically thought to channel fears that drove all the myths about intelligence embodied in matter. One of these is the idea that the technology can get out of control and ultimately lead to horrifi c consequences, as is the case in Mary Shelley’s classic Frankenstein. Given this, predictions about AWS are sometimes dismissed as science-fiction fear-mongering. This paper considers several analogies between AWS and other weapon systems and ultimately offers an argument that nuclear weapons (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Further on informational quanta, interactions, and entropy under the granular view of value formation.Quan-Hoang Vuong & Minh-Hoang Nguyen - 2024 - SSRN.
    A recent study suggests that value and quantum states seem to be governed by the same underlying mechanisms. In our recent book titled "Better economics for the Earth: A lesson from quantum and information theories," specifically Chapter 5, we have proposed an informational entropy-based notion of value, drawing on the granular worldview and primary features of quantum mechanics, Shannon’s information theory, and the mindsponge theory. Specifically, the notion suggests that values are created through the interactions of information. (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  36. Against Offensive Warfare.Paul van Els - 2007 - Het Trage Vuur 40:8–19.
    van Els, Paul. "Tegen aanvalsoorlogen" (Against Offensive Warfare). Dutch translation of Mozi chapters 17, 18, and 19. Het Trage Vuur 40 (December 2007): 8–19.
    Download  
     
    Export citation  
     
    Bookmark  
  37. Informational Theories of Content and Mental Representation.Marc Artiga & Miguel Ángel Sebastián - 2020 - Review of Philosophy and Psychology 11 (3):613-627.
    Informational theories of semantic content have been recently gaining prominence in the debate on the notion of mental representation. In this paper we examine new-wave informational theories which have a special focus on cognitive science. In particular, we argue that these theories face four important difficulties: they do not fully solve the problem of error, fall prey to the wrong distality attribution problem, have serious difficulties accounting for ambiguous and redundant representations and fail to deliver a metasemantic theory of representation. (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  38. Informed Consent: What Must Be Disclosed and What Must Be Understood?Joseph Millum & Danielle Bromwich - 2021 - American Journal of Bioethics 21 (5):46-58.
    Over the last few decades, multiple studies have examined the understanding of participants in clinical research. They show variable and often poor understanding of key elements of disclosure, such as expected risks and the experimental nature of treatments. Did the participants in these studies give valid consent? According to the standard view of informed consent they did not. The standard view holds that the recipient of consent has a duty to disclose certain information to the profferer of consent because (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  39. Information Priorities for investment decision-making and fear during market crashes: Analyzing East Asian Countries with Bayesian Mindsponge Framework Analytics.Minh-Hoang Nguyen, Dan Li, Thien-Vu Tran, Phuong-Tri Nguyen, Thi Mai Anh Tran & Quan-Hoang Vuong - manuscript
    Market crises amplify fear, disrupting rational decision-making of stock investment. This study examines the relationship between investors’ information priorities—such as intuition, company performance, technical analysis, and other factors—and their fear responses (freeze, flight, and hiding) during market crashes. Using the Bayesian Mindsponge Framework (BMF) to analyze data from 1,526 investors in China and Vietnam, the findings reveal complex dynamics. We found positive associations between investors’ prioritization of social influence and intuition for investment decision-making with being freeze (i.e., not knowing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Logical information and epistemic space.Mark Jago - 2009 - Synthese 167 (2):327 - 341.
    Gaining information can be modelled as a narrowing of epistemic space . Intuitively, becoming informed that such-and-such is the case rules out certain scenarios or would-be possibilities. Chalmers’s account of epistemic space treats it as a space of a priori possibility and so has trouble in dealing with the information which we intuitively feel can be gained from logical inference. I propose a more inclusive notion of epistemic space, based on Priest’s notion of open worlds yet which contains (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  41. INFORMATION-THEORETIC LOGIC.John Corcoran - 1998 - In C. Martínez U. Rivas & L. Villegas-Forero (eds.), Truth in Perspective edited by C. Martínez, U. Rivas, L. Villegas-Forero, Ashgate Publishing Limited, Aldershot, England (1998) 113-135. ASHGATE. pp. 113-135.
    Information-theoretic approaches to formal logic analyse the "common intuitive" concept of propositional implication (or argumental validity) in terms of information content of propositions and sets of propositions: one given proposition implies a second if the former contains all of the information contained by the latter; an argument is valid if the conclusion contains no information beyond that of the premise-set. This paper locates information-theoretic approaches historically, philosophically and pragmatically. Advantages and disadvantages are identified by examining (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  42. Environmental information self-reported in listed firms’ annual reports: Risks of environmental commitment cliché, and a call for innovations.Minh-Hoang Nguyen, Phuong-Tri Nguyen & Quan-Hoang Vuong - manuscript
    Periodical reports are important information sources for investors and society to monitor, contribute to, and allocate resources to listed companies contributing to environmental sustainability. This article provides a preliminary investigation into environment-related information disclosure in annual reports of 61 representative companies in Vietnam, a country that has a rapidly developing stock market and is highly vulnerable to the impacts of climate change. It was found that although most of the companies’ reports disclosed the goals to pursue sustainability and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Patterns, Information, and Causation.Holly Andersen - 2017 - Journal of Philosophy 114 (11):592-622.
    This paper articulates an account of causation as a collection of information-theoretic relationships between patterns instantiated in the causal nexus. I draw on Dennett’s account of real patterns to characterize potential causal relata as patterns with specific identification criteria and noise tolerance levels, and actual causal relata as those patterns instantiated at some spatiotemporal location in the rich causal nexus as originally developed by Salmon. I develop a representation framework using phase space to precisely characterize causal relata, including their (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  44. Information: From Philosophic to Physics Concepts for Informational Modeling of Consciousness.Florin Gaiseanu - 2018 - Philosophy Study 8 (8).
    Information was a frequently used concept in many fields of investigation. However, this concept is still not really understood, when it is referred for instance to consciousness and its informational structure. In this paper it is followed the concept of information from philosophical to physics perspective, showing especially how this concept could be extended to matter in general and to the living in particular, as a result of the intimate interaction between matter and information, the human body (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  45. The informational nature of personal identity.Luciano Floridi - 2011 - Minds and Machines 21 (4):549-566.
    In this paper, I present an informational approach to the nature of personal identity. In “Plato and the problem of the chariot”, I use Plato’s famous metaphor of the chariot to introduce a specific problem regarding the nature of the self as an informational multiagent system: what keeps the self together as a whole and coherent unity? In “Egology and its two branches” and “Egology as synchronic individualisation”, I outline two branches of the theory of the self: one concerning the (...)
    Download  
     
    Export citation  
     
    Bookmark   37 citations  
  46.  60
    Modern Warfare and Kshatriya Duty Through the Lens of the Mahabharata.Nikolai Karpitsky - 2023 - Journal of Vaishnava Studies 31 (2):57–71.
    The article raises the question of the contemporary Gaudiya-vaishnava adherent’s attitude towards the war and kshatriya duty. It analyses the ways Vaishnavas from Ukraine, Russia and India perceive Russia’s war against Ukraine and kshatriya duty in the context of understanding the holy war in the Mahabharata and Krishna’s instructions about duty of kshatriya in Bhagavad-gita. There are four types of symbolic correlation of modern war with the events of the Mahabharata: religious, mythological, ideological, and ethical. The differences between them have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. (1 other version)Integrated Information Theory, Intrinsicality, and Overlapping Conscious Systems.James C. Blackmon - 2021 - Journal of Consciousness Studies 28 (11-12):31-53.
    Integrated Information Theory (IIT) identifies consciousness with having a maximum amount of integrated information. But a thing’s having the maximum amount of anything cannot be intrinsic to it, for that depends on how that thing compares to certain other things. IIT’s consciousness, then, is not intrinsic. A mereological argument elaborates this consequence: IIT implies that one physical system can be conscious while a physical duplicate of it is not conscious. Thus, by a common and reasonable conception of intrinsicality, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  48. Information, physics, quantum: the search for links.John Archibald Wheeler - 1989 - In Wheeler John Archibald (ed.), Proceedings III International Symposium on Foundations of Quantum Mechanics. pp. 354-358.
    This report reviews what quantum physics and information theory have to tell us about the age-old question, How come existence? No escape is evident from four conclusions: (1) The world cannot be a giant machine, ruled by any preestablished continuum physical law. (2) There is no such thing at the microscopic level as space or time or spacetime continuum. (3) The familiar probability function or functional, and wave equation or functional wave equation, of standard quantum theory provide mere continuum (...)
    Download  
     
    Export citation  
     
    Bookmark   127 citations  
  49. Singularity warfare: A bibliometric survey of militarized transhumanism.Woody Evans - 2007 - Journal of Evolution and Technology 16 (1):161-65.
    This paper examines the responses to advanced and transformative technologies in military literature, attenuates the conclusions of earlier work suggesting that there is an “ignorance of transhumanism” in the military, and updates the current layout of transhuman concerns in military thought. The military is not ignorant of transhuman issues and implications, though there was evidence for this in the past; militaries and non-state actors increasingly use disruptive technologies with what we may call transhuman provenance.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 970