Normal view MARC view ISBD view

The Ethics of Information Warfare.

By: Floridi, Luciano.
Contributor(s): Taddeo, Mariarosaria.
Material type: TextTextSeries: eBooks on Demand.Law, Governance and Technology Series: Publisher: Dordrecht : Springer, 2014Description: 1 online resource (217 p.).ISBN: 9783319041353.Subject(s): Computers and civilization | Information society | Information technology -- Social aspects | Information warfare -- Moral and ethical aspectsGenre/Form: Electronic books.Additional physical formats: Print version:: The Ethics of Information WarfareDDC classification: 174.9004 Online resources: Click here to view this ebook.
Contents:
The Ethics of Information Warfare-An Overview; References; Contents; Contributors; Part I; Analysing Information Warfare; Chapter-1; Fog in the Fifth Dimension: The Ethics of Cyber-War; 1.1 Quick Definitions; 1.2 The First Distinction: "Cyber-War-Skeptic" Vs. "Cyber-War-Salesman"; 1.2.1 Middle Ground Judgment; 1.3 The Second Distinction: Realism Vs. Just-War Theory; 1.3.1 No Law; 1.3.2 Thus, Ethics; 1.3.3 Pacifism; 1.3.3.1 In General; 1.3.3.2 On War and Cyber-War; 1.3.4 Realism; 1.3.4.1 In General; 1.3.4.2 On War and Cyber-War; 1.3.5 Just War Theory; 1.3.5.1 Jus ad Bellum
1.3.5.2 Application of Jus ad Bellum Rules to Cyber-War1.3.6 Traditional Rules of Jus in Bello; 1.3.6.1 Application of Jus in Bello to Cyber-War; 1.3.7 Jus Post Bellum: The Aftermath of War; 1.3.7.1 Application of Jus post bellum to Cyber-War; 1.3.8 Middle Ground Judgment; 1.4 Optimism Vs. Pessimism; 1.5 Conclusion; References; Chapter-2; The Future Impact of a Long Period of Limited Cyberwarfare on the Ethics of Warfare; 2.1 Introduction; 2.2 Recent Claims; 2.3 Comments on these Points; 2.3.1 Future Cyberwar Defense; Bibliography; Chapter-3
Is Warfare the Right Frame for the Cyber Debate?3.1 Cyberpolicy and Just-War Theory (Lin et al. 2012); 3.1.1 Aggression; 3.1.2 Discrimination; 3.1.3 Proportionality; 3.1.4 Attribution; 3.1.5 Treacherous Deceit; 3.1.6 What Now?; 3.2 Stand Your (Cyber)Ground: An Interim Solution?; 3.2.1 Why it is Reasonable; 3.2.2 Controversy in "Stand Your Ground" Laws; 3.2.3 How it Could Work; 3.3 Possible Objections and Replies; 3.3.1 Only the State has a Monopoly on Violence.; 3.3.2 Only the State has the Resources to Counterattack; 3.3.3 There's Still the Problem of Attribution
3.3.4 Counterattacks will Escalate Conflict3.3.5 Malicious and Ideological Hackers will not be Deterred; 3.3.7 A Judicial Process Implies State-Sponsorship of "Stand Your Cyberground"; 3.3.6 Even if IHL is not Violated, other International Laws may be; 3.3.9 Cyberwarfare Doesn't Raise New Issues; 3.3.8 Industry Counterattacks may Destroy Evidence Needed for Prosecution; 3.4 Conclusion; References; Chapter-4; Technology, Information, and Modern Warfare: Challenges and Prospects in the 21st Century; 4.1 Introduction; 4.2 Normative Challenges to Cyber Warfare; References; Part II
Just Information WarfareChapter-5; Permissible Preventive Cyberwar: Restricting Cyber Conflict to Justified Military Targets; 5.1 "Cyber Anxiety" and Threat Inflation; 5.2 Discerning Acceptable and Unacceptable Practices in Cyber Conflict; 5.3 Cyber War and Just War; 5.4 Establishing Norms for Ethical Cyber Conflict; References; Chapter-6; Moral Cyber Weapons; 6.1 Introduction; 6.2 Cyber Weapons as Ethically Obligatory; 6.3 Objections to Cyber Warfare; 6.3.1 Objection 1: Cyberspace Should Not be Militarized; 6.3.2 Objection 2: The Deployment of Cyber Weapons will Lead to Their Spread and Use
6.3.3 Objection 3: Cyber-attacks are too Difficult to Control and Use Effectively
Summary: This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
T58.5 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=1697732 Available EBL1697732

The Ethics of Information Warfare-An Overview; References; Contents; Contributors; Part I; Analysing Information Warfare; Chapter-1; Fog in the Fifth Dimension: The Ethics of Cyber-War; 1.1 Quick Definitions; 1.2 The First Distinction: "Cyber-War-Skeptic" Vs. "Cyber-War-Salesman"; 1.2.1 Middle Ground Judgment; 1.3 The Second Distinction: Realism Vs. Just-War Theory; 1.3.1 No Law; 1.3.2 Thus, Ethics; 1.3.3 Pacifism; 1.3.3.1 In General; 1.3.3.2 On War and Cyber-War; 1.3.4 Realism; 1.3.4.1 In General; 1.3.4.2 On War and Cyber-War; 1.3.5 Just War Theory; 1.3.5.1 Jus ad Bellum

1.3.5.2 Application of Jus ad Bellum Rules to Cyber-War1.3.6 Traditional Rules of Jus in Bello; 1.3.6.1 Application of Jus in Bello to Cyber-War; 1.3.7 Jus Post Bellum: The Aftermath of War; 1.3.7.1 Application of Jus post bellum to Cyber-War; 1.3.8 Middle Ground Judgment; 1.4 Optimism Vs. Pessimism; 1.5 Conclusion; References; Chapter-2; The Future Impact of a Long Period of Limited Cyberwarfare on the Ethics of Warfare; 2.1 Introduction; 2.2 Recent Claims; 2.3 Comments on these Points; 2.3.1 Future Cyberwar Defense; Bibliography; Chapter-3

Is Warfare the Right Frame for the Cyber Debate?3.1 Cyberpolicy and Just-War Theory (Lin et al. 2012); 3.1.1 Aggression; 3.1.2 Discrimination; 3.1.3 Proportionality; 3.1.4 Attribution; 3.1.5 Treacherous Deceit; 3.1.6 What Now?; 3.2 Stand Your (Cyber)Ground: An Interim Solution?; 3.2.1 Why it is Reasonable; 3.2.2 Controversy in "Stand Your Ground" Laws; 3.2.3 How it Could Work; 3.3 Possible Objections and Replies; 3.3.1 Only the State has a Monopoly on Violence.; 3.3.2 Only the State has the Resources to Counterattack; 3.3.3 There's Still the Problem of Attribution

3.3.4 Counterattacks will Escalate Conflict3.3.5 Malicious and Ideological Hackers will not be Deterred; 3.3.7 A Judicial Process Implies State-Sponsorship of "Stand Your Cyberground"; 3.3.6 Even if IHL is not Violated, other International Laws may be; 3.3.9 Cyberwarfare Doesn't Raise New Issues; 3.3.8 Industry Counterattacks may Destroy Evidence Needed for Prosecution; 3.4 Conclusion; References; Chapter-4; Technology, Information, and Modern Warfare: Challenges and Prospects in the 21st Century; 4.1 Introduction; 4.2 Normative Challenges to Cyber Warfare; References; Part II

Just Information WarfareChapter-5; Permissible Preventive Cyberwar: Restricting Cyber Conflict to Justified Military Targets; 5.1 "Cyber Anxiety" and Threat Inflation; 5.2 Discerning Acceptable and Unacceptable Practices in Cyber Conflict; 5.3 Cyber War and Just War; 5.4 Establishing Norms for Ethical Cyber Conflict; References; Chapter-6; Moral Cyber Weapons; 6.1 Introduction; 6.2 Cyber Weapons as Ethically Obligatory; 6.3 Objections to Cyber Warfare; 6.3.1 Objection 1: Cyberspace Should Not be Militarized; 6.3.2 Objection 2: The Deployment of Cyber Weapons will Lead to Their Spread and Use

6.3.3 Objection 3: Cyber-attacks are too Difficult to Control and Use Effectively

This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case

Description based upon print version of record.

There are no comments for this item.

Log in to your account to post a comment.