Information Warfare: A Philosophical Perspective

@article{Taddeo2012InformationWA,
  title={Information Warfare: A Philosophical Perspective},
  author={Mariarosaria Taddeo},
  journal={Philosophy \& Technology},
  year={2012},
  volume={25},
  pages={105-120}
}
This paper focuses on Information Warfare—the warfare characterised by the use of information and communication technologies. This is a fast growing phenomenon, which poses a number of issues ranging from the military use of such technologies to its political and ethical implications. The paper presents a conceptual analysis of this phenomenon with the goal of investigating its nature. Such an analysis is deemed to be necessary in order to lay the groundwork for future investigations into this… Expand
The Ethics of Information Warfare
This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better graspExpand
Just Information Warfare
In this article I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold: filling the theoretical vacuum surrounding this phenomenon andExpand
Information Warfare and Just War Theory
This article is devoted to developing an ethical analysis of information warfare, the warfare waged in the cyber domain. It has the twofold goal of filling the theoretical vacuum surrounding thisExpand
ON INFORMATION WARFARE: A RESPONSE TO TADDEO
Mariarosario Taddeo's recent article, 'Information Warfare: A Philosophical Perspective' (2012) is a welcome addition to the literature on information communications technologies (ICTs) and warfare,Expand
An analysis for a just cyber warfare
  • Mariarosaria Taddeo
  • Computer Science, Political Science
  • 2012 4th International Conference on Cyber Conflict (CYCON 2012)
  • 2012
TLDR
Information Ethics is introduced as a suitable ethical framework for the analysis of cyber warfare and it is argued that the vacuum of ethical principles for this kind warfare is overcome when Just War Theory and Information Ethics are merged together. Expand
An Ethical Framework for Information Warfare
In this Chapter I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold, filling the theoretical vacuum surrounding this phenomenon andExpand
JUSTIÇA NA GUERRA CIBERNÉTICA
The text aims at providing an ethical framework for cyber warfare. The latter is changing our understanding of war (and peace) as well as the relationship between the human being and the machine.Expand
Information Warfare: A Response to Taddeo
Taddeo’s recent article, ‘Information Warfare: A Philosophical Perspective’ (Philos. Technol. 25:105–120, 2012) is a useful addition to the literature on information communications technologiesExpand
Offensive Information Warfare Revisited: Social Media Use in Man-Made Crises
TLDR
The authors find that some of the key predictions advanced by Valeri and Knights have proven accurate and Offensive information warfare attacks have and will continue to influence policies, budgets and civic voluntary participation to counter such attacks. Expand
The Struggle Between Liberties and Authorities in the Information Age
TLDR
It is argued that contemporary information societies are experiencing a new form of such a struggle, which now involves liberties and authorities in the cyber-sphere and, more specifically, refers to the tension between cyber-security measures and individual liberties. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 52 REFERENCES
Ethics and information warfare
Abstract : War forms an integral part of the history of mankind, alternately driving civilization forward, then imperiling it. A natural ambivalence toward war has thus developed, with its acceptanceExpand
Conflict and the Computer: Information Warfare and Related Ethical Issues
This paper discusses information warfare and ethical issues by providing an overview to the subject of information warfare, and a brief discussion of warfare and historical notions of just war.Expand
What Is Information Warfare
Abstract : This essay examines that line of thinking and indicates several fundamental flaws while arguing the following points: Information warfare, as a separate technique of waging war, does notExpand
Can information warfare ever be just?
The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. ThisExpand
Information Warfare: Chaos on the Electronic Superhighway
From the Publisher: As the National Information Infrastructure grows and evolves into everyman's electronic superhighway, are we opening the doors to an electronic cold war? Or are we on the edge ofExpand
Information strategy and warfare : a guide to theory and practice
Introduction: The Rise of Information Strategy Part 1: Confronting Terror and Insurgency 1. The War of Ideas and the Idea of War 2. Thinking about Al Qaeda as a Global Tribe 3. Influence StrategiesExpand
In Athena's Camp: Preparing for Conflict in the Information Age
Abstract : We have been posing our ideas about conflict in the information age for some years now, beginning in 1991 with our original ruminations about cyberwar, then about netwar, and lately aboutExpand
Discrimination in the Laws of Information Warfare
As societies and economies increasingly rely on electronic telecommunications, they grow more vulnerable to threats from other computer systems. At the same time, states' military and intelligenceExpand
Just and Unjust Wars: A Moral Argument with Historical Illustrations.
This classic work examines the issues surrounding military theory, war crimes, and the spoils of war from the Athenian attack on Melos to the My Lai massacre.. A revised and updated classic treatmentExpand
Information Warfare Principles and Operations
TLDR
This comprehensive book provides engineers, system operators, and information technology users with an understandable overview of rapidly emerging threats to commercial, civil, and military information systems — and shows how these threats can be identified and systems protected. Expand
...
1
2
3
4
5
...