Information Warfare: A Philosophical Perspective

@article{Taddeo2012InformationWA,
  title={Information Warfare: A Philosophical Perspective},
  author={Mariarosaria Taddeo},
  journal={Philosophy \& Technology},
  year={2012},
  volume={25},
  pages={105-120}
}
  • M. Taddeo
  • Published 1 March 2012
  • Political Science
  • Philosophy & Technology
This paper focuses on Information Warfare—the warfare characterised by the use of information and communication technologies. This is a fast growing phenomenon, which poses a number of issues ranging from the military use of such technologies to its political and ethical implications. The paper presents a conceptual analysis of this phenomenon with the goal of investigating its nature. Such an analysis is deemed to be necessary in order to lay the groundwork for future investigations into this… 

The evolution of the concept of information warfare in the modern information society of the post-truth era

The research method used is a systematic review of Western political science literature, as well as military literature, publications on international relations, international politics, security and cyber security from the perspective of information warfare, finding the Western conception of WI differs from that of the Russian Federation.

JUSTIÇA NA GUERRA CIBERNÉTICA

The text aims at providing an ethical framework for cyber warfare. The latter is changing our understanding of war (and peace) as well as the relationship between the human being and the machine.

Information Warfare: A Response to Taddeo

Taddeo’s recent article, ‘Information Warfare: A Philosophical Perspective’ (Philos. Technol. 25:105–120, 2012) is a useful addition to the literature on information communications technologies

Information weapons within the interstate struggle in the XXI Century

In particular, information weapons and social media weapons have become a weighty and decisive factor in warfare. Moreover, military conflict models increasingly use information as a weapon in

Offensive Information Warfare Revisited: Social Media Use in Man-Made Crises

The authors find that some of the key predictions advanced by Valeri and Knights have proven accurate and Offensive information warfare attacks have and will continue to influence policies, budgets and civic voluntary participation to counter such attacks.

Offensive Information Warfare Revisited

The authors find that some of the key predictions advanced by Valeri and Knights have proven accurate and Offensive information warfare attacks have and will continue to influence policies, budgets and civic voluntary participation to counter such attacks.

Reliable Old Wineskins: The Applicability of the Just War Tradition to Military Cyber Operations

This article argues that the traditional jus ad bellum and jus in bello criteria are fully capable of providing the ethical guidance needed to legitimately conduct military cyber operations. The

The Wrong in Cyberattacks

Property rights provide an ethical framework within which cyberattacks should be assessed, and a result is that a cyberattack could be a legitimate casus belli, given sufficient harm to property that was sufficiently (morally) valuable.

Information Warfare and Slow Media: Loyalism and the Lesson of Revolutionary Failure

The wager of this essay is that consideration of an antiquarian media environment—the American colonies in the era of Revolutionary ferment—can help identify tactics for slowing the communications

DEFENCE SCIENCE REVIEW

  • 2022

References

SHOWING 1-10 OF 55 REFERENCES

Ethics and information warfare

Abstract : War forms an integral part of the history of mankind, alternately driving civilization forward, then imperiling it. A natural ambivalence toward war has thus developed, with its acceptance

Conflict and the Computer: Information Warfare and Related Ethical Issues

This paper discusses information warfare and ethical issues by providing an overview to the subject of information warfare, and a brief discussion of warfare and historical notions of just war.

What Is Information Warfare

Abstract : This essay examines that line of thinking and indicates several fundamental flaws while arguing the following points: Information warfare, as a separate technique of waging war, does not

Can information warfare ever be just?

  • John Arquilla
  • Political Science
    Ethics and Information Technology
  • 2004
The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. This

Information Warfare: Chaos on the Electronic Superhighway

From the Publisher: As the National Information Infrastructure grows and evolves into everyman's electronic superhighway, are we opening the doors to an electronic cold war? Or are we on the edge of

Information strategy and warfare : a guide to theory and practice

Introduction: The Rise of Information Strategy Part 1: Confronting Terror and Insurgency 1. The War of Ideas and the Idea of War 2. Thinking about Al Qaeda as a Global Tribe 3. Influence Strategies

In Athena's Camp: Preparing for Conflict in the Information Age

Abstract : We have been posing our ideas about conflict in the information age for some years now, beginning in 1991 with our original ruminations about cyberwar, then about netwar, and lately about

Discrimination in the Laws of Information Warfare

As societies and economies increasingly rely on electronic telecommunications, they grow more vulnerable to threats from other computer systems. At the same time, states' military and intelligence

JUST AND UNJUST WARS: A MORAL ARGUMENT WITH HISTORICAL ILLUSTRATIONS; THE GREAT WAR AND MODERN MEMORY

This classic work examines the issues surrounding military theory, war crimes, and the spoils of war from the Athenian attack on Melos to the My Lai massacre.. A revised and updated classic treatment

Information Warfare Principles and Operations

This comprehensive book provides engineers, system operators, and information technology users with an understandable overview of rapidly emerging threats to commercial, civil, and military information systems — and shows how these threats can be identified and systems protected.
...