Results for 'information warfare'

964 found
Order:
  1. Information Warfare: A Response to Taddeo.Tim Stevens - 2013 - Philosophy and Technology 26 (2):221-225.
    Taddeo’s recent article, ‘Information Warfare: A Philosophical Perspective’ (Philos. Technol. 25:105–120, 2012) is a useful addition to the literature on information communications technologies (ICTs) and warfare. In this short response, I draw attention to two issues arising from the article. The first concerns the applicability of ‘information warfare’ terminology to current political and military discourse, on account of its relative lack of contemporary usage. The second engages with the political and ethical implications of treating (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. (1 other version)The latent nature of global information warfare.Luciano Floridi - 2014 - Philosophy and Technology 27 (3):317–319.
    Information has always been at the core of conflicts. When Napoleon planned to invade Italy, he duly upgraded the first telegraph network in the world, the French “semaphore”. He famously remarked that “an army marches on its stomach,” but he also knew that the same army acted on information. As Von Clausewitz once stated “by the word ‘information’ we denote all the knowledge which we have of the enemy and his country; therefore, in fact, the foundation of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Information Matters: Informational Conflict and the New Materialism.Tim Stevens - manuscript
    This paper focuses upon the challenge posed by the concept of ‘information’ to the new materialisms, viewed with reference to the multifaceted worldly phenomenon of informational conflict. ‘Informational conflict’ is a broad term designed to encompass the hi-tech ‘cyber’ operations of inter-state warfare as well as the informational actions of non-state actors, and is contingent not upon information technologies, as commonly understood, but upon ‘information’. Informational conflicts can be viewed as sociotechnical assemblages of humans and non-humans (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Conspiring with the Enemy: The Ethic of Cooperation in Warfare.Yvonne Chiu - 2019 - New York, NY, USA: Columbia University Press.
    *North American Society for Social Philosophy (NASSP) Book Award 2019.* -/- *International Studies Association (ISA) - International Ethics Section Book Award 2021.* -/- Although military mores have relied primarily on just war theory, the ethic of cooperation in warfare (ECW)—between enemies even as they are trying to kill each other—is as central to the practice of warfare and to conceptualization of its morality. Neither game theory nor unilateral moral duties (God-given or otherwise) can explain the explicit language of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Joint Doctrine Ontology: A Benchmark for Military Information Systems Interoperability.Peter Morosoff, Ron Rudnicki, Jason Bryant, Robert Farrell & Barry Smith - 2015 - In Peter Morosoff, Ron Rudnicki, Jason Bryant, Robert Farrell & Barry Smith (eds.), Joint Doctrine Ontology: A Benchmark for Military Information Systems Interoperability. CEUR vol. 1325. pp. 2-9.
    When the U.S. conducts warfare, elements of a force are drawn from different services and work together as a single team to accomplish an assigned mission. To achieve such unified action, it is necessary that the doctrines governing the actions of members of specific services be both consistent with and subservient to joint Doctrine. Because warfighting today increasingly involves not only live forces but also automated systems, unified action requires that information technology that is used in joint (...) must be aligned with joint doctrine. It requires also that the separate information systems used by the different elements of a joint force must be interoperable, in the sense that data and information that is generated by each element must be usable (understandable, processable) by all the other elements that need them. Currently, such interoperability is impeded by multiple inconsistencies among the different data and software standards used by warfighters. We describe here the on-going project of creating a Joint Doctrine Ontology (JDO), which uses joint doctrine to provide shared computer-accessible content valid for any field of military endeavor, organization, and information system. JDO addresses the two previously mentioned requirements of unified action by providing a widely applicable benchmark for use by developers of information systems that will both guarantee alignment with joint doctrine and support interoperability. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. The Ethics of Military Influence Operations.Michael Skerker - 2023 - Conatus 8 (2):589-612.
    This article articulates a framework for normatively assessing influence operations, undertaken by national security institutions. Section I categorizes the vast field of possible types of influence operations according to the communication’s content, its attribution, the rights of the target audience, the communication’s purpose, and its secondary effects. Section II populates these categories with historical examples and section III evaluates these cases with a moral framework. I argue that deceptive or manipulative communications directed at non-liable audiences are presumptively immoral and illegitimate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. The Problem with Killer Robots.Nathan Gabriel Wood - 2020 - Journal of Military Ethics 19 (3):220-240.
    Warfare is becoming increasingly automated, from automatic missile defense systems to micro-UAVs (WASPs) that can maneuver through urban environments with ease, and each advance brings with it ethical questions in need of resolving. Proponents of lethal autonomous weapons systems (LAWS) provide varied arguments in their favor; robots are capable of better identifying combatants and civilians, thus reducing "collateral damage"; robots need not protect themselves and so can incur more risks to protect innocents or gather more information before using (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  8.  46
    IT & C, Volumul 3, Numărul 2, Iunie 2024.Nicolae Sfetcu - 2024 - It and C 3 (2).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Levering Data Science in the Detection of Advanced Persistent Threats Utilizarea științei datelor în detectarea amenințărilor persistente avansate -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Detecting Advanced Persistent Threats in Cyber Warfare – Academic Studies Detectarea amenințărilor persistente avansate în războiul cibernetic – Studii academice -/- TELECOMUNICAȚII / TELECOMMUNICATIONS -/- Artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  59
    IT & C, Volumul 3, Numărul 1, Martie 2024.Nicolae Sfetcu - 2024 - It and C 3 (1).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Challenges and Limitations in the Use of Artificial Intelligence Provocări și limitări în utilizarea inteligenței artificiale -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Impact of Big Data Technology on Contemporary Society Impactul tehnologiei Big Data asupra societății contemporane -/- Methods, Techniques and Patterns of Advanced Persistent Threats – APT Lifecycle Metode, tehnici (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  49
    Intelligence Info, Volumul 3, Numărul 3, Septembrie 2024.Nicolae Sfetcu - 2024 - Intelligence Info 3 (3).
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Nicolae SFETCU The Role of Polanyi’s Tacit Knowledge in Intelligence Analysis Rolul cunoașterii tacite a lui Polanyi în analiza informațiilor -/- INTELLIGENCE / INTELLIGENCE -/- Tănase TIBERIU Principles, methods and means of intelligence activity in the Russian Federation and Israel Principii, metode și mijloace ale activității informative în Federația Rusă și Israel -/- Tănase (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method combining (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Population pressure and prehistoric violence in the Yayoi period of Japan.Tomomi Nakagawa, Kohei Tamura, Yuji Yamaguchi, Naoko Matsumoto, Takehiko Matsugi & Hisashi Nakao - 2021 - Journal of Archaeological Science 132:105420.
    The causes of prehistoric inter-group violence have been a subject of long-standing debate in archaeology, an- thropology, and other disciplines. Although population pressure has been considered as a major factor, due to the lack of available prehistoric data, few studies have directly examined its effect so far. In the present study, we used data on skeletal remains from the middle Yayoi period of the Japanese archipelago, where archaeologists argued that an increase of inter-group violence in this period could be explained (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. The Performativity of Terror-Tagging and the Prospects for a Marcos Presidency.Regletto Aldrich Imbong - 2023 - In Authoritarian Disaster: The Duterte Regime and the Prospects for a Marcos Presidency. New York: Nova Science Publishers. pp. 43-64.
    The Philippine government has been relentless in its counterinsurgency campaigns. From the colonial wars that vilified as insurgents and bandits the honored heroes of today, up to the anti-communist and anti-secessionist civil and military efforts of the postcolonial regimes, these campaigns have not only rolled out large state resources but also cost lives of innocent civilians. Patterned after the United States (US) of America’s principle of low-intensity conflict aimed at countering Marxist and anti-imperialist movements (Reed 1986), counterinsurgency campaigns have unleashed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. A Challenge to the Reigning Theory of the Just War.Christian Barry - 2011 - International Affairs 87 (2):457-466.
    Troubled times often gives rise to great art that reflects those troubles. So too with political theory. The greatest work of twentieth century political theory, John Rawls's A theory of justice, was inspired in various respects by extreme social and economic inequality, racialized slavery and racial segregation in the United States. Arguably the most influential work of political theory since Rawls—Michael Walzer's Just and unjust wars—a sustained and historically informed reflection on the morality of interstate armed conflict—was written in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The Third Man: comparative analysis of a science autobiography and a cinema classic as windows into post-war life sciences research.Hub Zwart - 2015 - History and Philosophy of the Life Sciences 37 (4):382-412.
    In 2003, biophysicist and Nobel Laureate Maurice Wilkins published his autobiography entitled The Third Man. In the preface, he diffidently points out that the title was chosen by his publisher, as a reference to the famous 1949 movie no doubt, featuring Orson Welles in his classical role as penicillin racketeer Harry Lime. In this paper I intend to show that there is much more to this title than merely its familiar ring. If subjected to a comparative analysis, multiple correspondences between (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  16. Terror.Tomis Kapitan - unknown
    Any intelligent discussion of terrorism must demarcate its subject matter, for the term ‘terrorism’ is differently understood and where there is no accord on its meaning there is little chance for agreement on its application or normative status. The best course is to sketch a morally neutral definition that classifies as ‘terrorist’ as many widely-agreed upon cases as possible. Definitions that explicitly render terrorism illegitimate make classification contentious, and it is more informative to base moral assessment on an examination of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Putting the War Back in Just War Theory: A Critique of Examples.Rigstad Mark - 2017 - Ethical Perspectives 24 (1):123-144.
    Analytic just war theorists often attempt to construct ideal theories of military justice on the basis of intuitions about imaginary and sometimes outlandish examples, often taken from non-military contexts. This article argues for a sharp curtailment of this method and defends, instead, an empirically and historically informed approach to the ethical scrutiny of armed conflicts. After critically reviewing general philosophical reasons for being sceptical of the moral-theoretic value of imaginary hypotheticals, the article turns to some of the special problems that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The ethical significance of evolution.Andrzej Elzanowski - 2010 - In Soniewicka Stelmach (ed.), Stelmach, J., Soniewicka M., Załuski W. (red.) Legal Philosophy and the Challenges of Biosciences (Studies in the Philosophy of Law 4). Wydawnictwo Uniwersytetu Jagiellońskiego. pp. 65-76.
    DARWIN’s (1859, 1871) discoveries have profound ethical implications that continue to be misrepresented and/or ignored. In contrast to socialdarwinistic misuses of his theory, Darwin was a great humanitarian who paved the way for an integrated scientific and ethical world view. As an ethical doctrine, socialdarwinism is long dead ever since its defeat by E. G. Moore although the socialdarwinistic thought is a hard-die in the biological community. The accusations of sociobiology for being socialdarwinistic are unfounded and stem from the moralistic (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  51
    Thinking for the bound and dead: beyond MAN3 towards a new (truly) universal theory of human victory.Miron J. Clay-Gilmore - 2023 - Dissertation, University of Edinburgh
    This project is a blend of Africana intellectual history and philosophical anti-humanism. The opening chapter seeks to contextualize the thought of Huey P. Newton in the Black nationalist tradition outline his conceptualization of US empire – ‘Reactionary Intercommunalism’. I use the second chapter to explore counterinsurgency as a historical phenomenon that laid the basis for European colonization and the civilizing mission during the 17th, 18th and 19th centuries and the modern phenomena understand as racial violence. The third chapter analyzes how (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. A handbook for social change: Cristina Bicchieri: Norms in the wild: how to diagnose, measure, and change social norms. Oxford: Oxford University Press, 2016, 264 pp, $ 29.95 PB. [REVIEW]Ulf Hlobil - 2017 - Metascience 26 (3):459-462.
    “Philosophy isn’t useful for changing the world,” parents of philosophy students and Karl Marx tell us (at least about non-Marxist philosophy). Cristina Bicchieri’s new book Norms in the Wild provides an impressive antidote against this worry. It stands to change of social practices as Che Guevara’s Guerrilla Warfare stands to political revolutions. Bicchieri combines hands-on advice on how to change social practices with compelling theoretical analyses of social norms. She draws heavily on her influential earlier work on norms, but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Medicine, Logic, or Metaphysics? Aristotelianism and Scholasticism in the Fight Book Corpus.Karin Verelst - 2023 - Acta Periodica Duellatorum 11 (1):91-127.
    Because we tend to study fight books in isolation, we often forget how difficult it is to understand the precise place they occupy in the sociocultural and historical fabric of their time, and spill the many clues they inevitably contain on their owner, their local society, their precise purpose. In order to unlock that information, we need to study them in their broader sociocultural and historical context. This requires a background and research skills that are not always easily accessible (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. AWS compliance with the ethical principle of proportionality: three possible solutions.Maciek Zając - 2023 - Ethics and Information Technology 25 (1):1-13.
    The ethical Principle of Proportionality requires combatants not to cause collateral harm excessive in comparison to the anticipated military advantage of an attack. This principle is considered a major (and perhaps insurmountable) obstacle to ethical use of autonomous weapon systems (AWS). This article reviews three possible solutions to the problem of achieving Proportionality compliance in AWS. In doing so, I describe and discuss the three components Proportionality judgments, namely collateral damage estimation, assessment of anticipated military advantage, and judgment of “excessiveness”. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. 47 Vietnamese people are among the world's most influential scientists in 2023.Authority of Foreign Information Service - 2023 - Vietnam Information Service.
    Vietnamese scientists on the list of "100.000 influential scientists" this year increased sharply in number and rank. -/- The ranking was selected by a group of scientists led by Professor John PA Ioannidis and colleagues from Stanford University (USA) on the Scopus database and published by Elsevier Publishing House.
    Download  
     
    Export citation  
     
    Bookmark  
  26. 弥生時代中期における戦争:人骨と人口動態の関係から(Prehistoric Warfare in the Middle Phase of the Yayoi Period in Japan : Human Skeletal Remains and Demography).Tomomi Nakagawa, Hisashi Nakao, Kohei Tamura, Yuji Yamaguchi, Naoko Matsumoto & Takehiko Matsugi - 2019 - Journal of Computer Archaeology 1 (24):10-29.
    It has been commonly claimed that prehistoric warfare in Japan began in the Yayoi period. Population increases due to the introduction of agriculture from the Korean Peninsula to Japan resulted in the lack of land for cultivation and resources for the population, eventually triggering competition over land. This hypothesis has been supported by the demographic data inferred from historical changes in Kamekan, a burial system used especially in the Kyushu area in the Yayoi period. The present study aims to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Drone Warfare, Civilian Deaths, and the Narrative of Honest Mistakes.Matthew Talbert & Jessica Wolfendale - 2023 - In Nobuo Hayashi & Carola Lingaas (eds.), Honest Errors? Combat Decision-Making 75 Years After the Hostage Case. T.M.C. Asser Press. pp. 261-288.
    In this chapter, we consider the plausibility and consequences of the use of the term “honest errors” to describe the accidental killings of civilians resulting from the US military’s drone campaigns in Iraq, Syria, Afghanistan, and elsewhere. We argue that the narrative of “honest errors” unjustifiably excuses those involved in these killings from moral culpability, and reinforces long-standing, pernicious assumptions about the moral superiority of the US military and the inevitability of civilian deaths in combat. Furthermore, we maintain that, given (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  88
    Environmental information self-reported in listed firms’ annual reports: Risks of environmental commitment cliché, and a call for innovations.Minh-Hoang Nguyen, Phuong-Tri Nguyen & Quan-Hoang Vuong - manuscript
    Periodical reports are important information sources for investors and society to monitor, contribute to, and allocate resources to listed companies contributing to environmental sustainability. This article provides a preliminary investigation into environment-related information disclosure in annual reports of 61 representative companies in Vietnam, a country that has a rapidly developing stock market and is highly vulnerable to the impacts of climate change. It was found that although most of the companies’ reports disclosed the goals to pursue sustainability and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  49
    Robot warfare: the (im)permissibility of autonomous weapons systems.Jack Madock - 2024 - AI and Ethics 1.
    This paper argues against prominent views of the impermissibility of autonomous weapons systems (AWS). It does so by assuming each theory is true and arguing towards contradiction. To arrive at a contradiction two assumptions are necessary. First, the theory of impermissibility in question is assumed. Second, a thought experiment called the ideal warfare scenario is assumed. The paper aims to demonstrate that in theory AWS could be deployed such that they bring about the best of possible warfare. However, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Violence and warfare in prehistoric Japan.Tomomi Nakagawa, Hisashi Nakao, Kohei Tamura, Yui Arimatsu, Naoko Matsumoto & Takehiko Matsugi - 2017 - Letters on Evolutionary and Behavioral Science 8 (1):8-11.
    The origins and consequences of warfare or largescale intergroup violence have been subject of long debate. Based on exhaustive surveys of skeletal remains for prehistoric hunter-gatherers and agriculturists in Japan, the present study examines levels of inferred violence and their implications for two different evolutionary models, i.e., parochial altruism model and subsistence model. The former assumes that frequent warfare played an important role in the evolution of altruism and the latter sees warfare as promoted by social changes (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  31. Just War contra Drone Warfare.Joshua M. Hall - 2023 - Conatus 8 (2):217-239.
    In this article, I present a two-pronged argument for the immorality of contemporary, asymmetric drone warfare, based on my new interpretations of the just war principles of “proportionality” and “moral equivalence of combatants” (MEC). The justification for these new interpretations is that drone warfare continues to this day, having survived despite arguments against it that are based on traditional interpretations of just war theory (including one from Michael Walzer). On the basis of my argument, I echo Harry Van (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Electronic Warfare and Artificial Intelligence.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    Electronic warfare is a critical component of modern military operations and has undergone significant advances in recent years. This book provides an overview of electronic warfare, its historical development, key components, and its role in contemporary conflict scenarios. It also discusses emerging trends and challenges in electronic warfare and its contemporary relevance in an era of advanced technology and cyber threats, emphasizing the need for continued research and development in this area. The book explores the burgeoning intersection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Against Offensive Warfare.Paul van Els - 2007 - Het Trage Vuur 40:8–19.
    van Els, Paul. "Tegen aanvalsoorlogen" (Against Offensive Warfare). Dutch translation of Mozi chapters 17, 18, and 19. Het Trage Vuur 40 (December 2007): 8–19.
    Download  
     
    Export citation  
     
    Bookmark  
  34. An Analysis of Guerilla Warfare: From Clausewitz to T.E. Lawrence.Dominic Cassella - manuscript
    This paper attempts to understand the nature of guerrilla warfare as taught by T.E. Lawrence in light of Clausewitz and Liddell Hart.
    Download  
     
    Export citation  
     
    Bookmark  
  35.  64
    Quantifying information in structural representations.Stephen Francis Mann - 2024 - Theoria. An International Journal for Theory, History and Foundations of Science:1-27.
    The goal of this paper is to show that the information carried by a structural representation can be decomposed into the information carried by its component parts. In particular, the relations between the components of a structural representation carry quantifiable information about the relations between components of their signifieds. It follows that the information carried by cognitive structural representations, including cognitive maps, can in principle be quantified and decomposed. This is perhaps surprising given that the formal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Informal and revolutionary feminist placemaking.Asma Mehan - 2024 - Frontiers in Sociology 9 (Sec. Gender, Sex and Sexualities):01-09.
    Urban spaces, often emerging outside formal, recognized boundaries, underscore the pivotal role women play in shaping these environments. Despite the enduring influence of patriarchal and hierarchical structures that render these spaces overtly gendered, it is within these contexts that women’s actions become particularly transformative. Drawing from feminist urban theories of the global south, this paper investigates informal placemaking, feminist urban activism, revolutionary placemaking, online protest movements, and the networks that support women’s solidarity groups. Employing a mixed-methods approach that includes case (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Autonomous Weapon Systems, Asymmetrical Warfare, and Myth.Michal Klincewicz - 2018 - Civitas. Studia Z Filozofii Polityki 23:179-195.
    Predictions about autonomous weapon systems are typically thought to channel fears that drove all the myths about intelligence embodied in matter. One of these is the idea that the technology can get out of control and ultimately lead to horrifi c consequences, as is the case in Mary Shelley’s classic Frankenstein. Given this, predictions about AWS are sometimes dismissed as science-fiction fear-mongering. This paper considers several analogies between AWS and other weapon systems and ultimately offers an argument that nuclear weapons (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. INFORMATION-THEORETIC LOGIC.John Corcoran - 1998 - In C. Martínez U. Rivas & L. Villegas-Forero (eds.), Truth in Perspective edited by C. Martínez, U. Rivas, L. Villegas-Forero, Ashgate Publishing Limited, Aldershot, England (1998) 113-135. ASHGATE. pp. 113-135.
    Information-theoretic approaches to formal logic analyse the "common intuitive" concept of propositional implication (or argumental validity) in terms of information content of propositions and sets of propositions: one given proposition implies a second if the former contains all of the information contained by the latter; an argument is valid if the conclusion contains no information beyond that of the premise-set. This paper locates information-theoretic approaches historically, philosophically and pragmatically. Advantages and disadvantages are identified by examining (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  39. Inexplicit information.Robert C. Cummins - 1986 - In Myles Brand (ed.), The Representation Of Knowledge And Belief. Tucson: University Of Arizona Press.
    A discussion of a number of ways that information can be present in a computer program without being explicitly represented.
    Download  
     
    Export citation  
     
    Bookmark   54 citations  
  40.  38
    Modern Warfare and Kshatriya Duty Through the Lens of the Mahabharata.Nikolai Karpitsky - 2023 - Journal of Vaishnava Studies 31 (2):57–71.
    The article raises the question of the contemporary Gaudiya-vaishnava adherent’s attitude towards the war and kshatriya duty. It analyses the ways Vaishnavas from Ukraine, Russia and India perceive Russia’s war against Ukraine and kshatriya duty in the context of understanding the holy war in the Mahabharata and Krishna’s instructions about duty of kshatriya in Bhagavad-gita. There are four types of symbolic correlation of modern war with the events of the Mahabharata: religious, mythological, ideological, and ethical. The differences between them have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Logical information and epistemic space.Mark Jago - 2009 - Synthese 167 (2):327 - 341.
    Gaining information can be modelled as a narrowing of epistemic space . Intuitively, becoming informed that such-and-such is the case rules out certain scenarios or would-be possibilities. Chalmers’s account of epistemic space treats it as a space of a priori possibility and so has trouble in dealing with the information which we intuitively feel can be gained from logical inference. I propose a more inclusive notion of epistemic space, based on Priest’s notion of open worlds yet which contains (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  42. Informed Consent: What Must Be Disclosed and What Must Be Understood?Joseph Millum & Danielle Bromwich - 2021 - American Journal of Bioethics 21 (5):46-58.
    Over the last few decades, multiple studies have examined the understanding of participants in clinical research. They show variable and often poor understanding of key elements of disclosure, such as expected risks and the experimental nature of treatments. Did the participants in these studies give valid consent? According to the standard view of informed consent they did not. The standard view holds that the recipient of consent has a duty to disclose certain information to the profferer of consent because (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  43. Information, physics, quantum: the search for links.John Archibald Wheeler - 1989 - In Wheeler John Archibald (ed.), Proceedings III International Symposium on Foundations of Quantum Mechanics. pp. 354-358.
    This report reviews what quantum physics and information theory have to tell us about the age-old question, How come existence? No escape is evident from four conclusions: (1) The world cannot be a giant machine, ruled by any preestablished continuum physical law. (2) There is no such thing at the microscopic level as space or time or spacetime continuum. (3) The familiar probability function or functional, and wave equation or functional wave equation, of standard quantum theory provide mere continuum (...)
    Download  
     
    Export citation  
     
    Bookmark   126 citations  
  44. Informational Theories of Content and Mental Representation.Marc Artiga & Miguel Ángel Sebastián - 2020 - Review of Philosophy and Psychology 11 (3):613-627.
    Informational theories of semantic content have been recently gaining prominence in the debate on the notion of mental representation. In this paper we examine new-wave informational theories which have a special focus on cognitive science. In particular, we argue that these theories face four important difficulties: they do not fully solve the problem of error, fall prey to the wrong distality attribution problem, have serious difficulties accounting for ambiguous and redundant representations and fail to deliver a metasemantic theory of representation. (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  45. Singularity warfare: A bibliometric survey of militarized transhumanism.Woody Evans - 2007 - Journal of Evolution and Technology 16 (1):161-65.
    This paper examines the responses to advanced and transformative technologies in military literature, attenuates the conclusions of earlier work suggesting that there is an “ignorance of transhumanism” in the military, and updates the current layout of transhuman concerns in military thought. The military is not ignorant of transhuman issues and implications, though there was evidence for this in the past; militaries and non-state actors increasingly use disruptive technologies with what we may call transhuman provenance.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  46. (1 other version)Integrated Information Theory, Intrinsicality, and Overlapping Conscious Systems.James C. Blackmon - 2021 - Journal of Consciousness Studies 28 (11-12):31-53.
    Integrated Information Theory (IIT) identifies consciousness with having a maximum amount of integrated information. But a thing’s having the maximum amount of anything cannot be intrinsic to it, for that depends on how that thing compares to certain other things. IIT’s consciousness, then, is not intrinsic. A mereological argument elaborates this consequence: IIT implies that one physical system can be conscious while a physical duplicate of it is not conscious. Thus, by a common and reasonable conception of intrinsicality, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  47. Information: From Philosophic to Physics Concepts for Informational Modeling of Consciousness.Florin Gaiseanu - 2018 - Philosophy Study 8 (8).
    Information was a frequently used concept in many fields of investigation. However, this concept is still not really understood, when it is referred for instance to consciousness and its informational structure. In this paper it is followed the concept of information from philosophical to physics perspective, showing especially how this concept could be extended to matter in general and to the living in particular, as a result of the intimate interaction between matter and information, the human body (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  48. Swarms Are Hell: Warfare as an Anti-Transhuman Choice.Woody Evans - 2013 - Journal of Evolution and Technology 23 (1):56-60.
    The use of advanced technologies, even of so-called transhuman technology, does not make militaries transhuman. Transhumanism includes dimensions of ethics that are themselves in direct conflict with many transhuman capabilities of soldiers in warfare. The use of advanced weapons of mass destruction represents an anti-humanism that undermines the modern, open, and high-tech nation state.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Knowability Relative to Information.Peter Hawke & Franz Berto - 2021 - Mind 130 (517):1-33.
    We present a formal semantics for epistemic logic, capturing the notion of knowability relative to information (KRI). Like Dretske, we move from the platitude that what an agent can know depends on her (empirical) information. We treat operators of the form K_AB (‘B is knowable on the basis of information A’) as variably strict quantifiers over worlds with a topic- or aboutness- preservation constraint. Variable strictness models the non-monotonicity of knowledge acquisition while allowing knowledge to be intrinsically (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  50. Semantic information and the correctness theory of truth.Luciano Floridi - 2011 - Erkenntnis 74 (2):147–175.
    Semantic information is usually supposed to satisfy the veridicality thesis: p qualifies as semantic information only if p is true. However, what it means for semantic information to be true is often left implicit, with correspondentist interpretations representing the most popular, default option. The article develops an alternative approach, namely a correctness theory of truth (CTT) for semantic information. This is meant as a contribution not only to the philosophy of information but also to the (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
1 — 50 / 964