Results for 'cyber'

562 found
Order:
See also
  1. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  2. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  3.  46
    The Cyber Combatant: a New Status for a New Warrior.Maurizio D’Urso - 2015 - Philosophy and Technology 28 (3):475-478.
    Cyber warfare differs from traditional forms of conflicts, both in the instruments used—computers—and in the environment in which it is conducted—the virtual world of the internet and other data communication networks.The purpose of the commentary is to discuss whether, even in cyber warfare, the concept of ‘direct participation in hostilities’ is still operative, with special reference to the laws related to it, and to assess its consequences with regard to the law of armed conflict. In particular, I will (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  58
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  46
    Cyber Trust.Amitai Etzioni - 2019 - Journal of Business Ethics 156 (1):1-13.
    From a sociological and anthropological viewpoint, the ability of complete strangers to carry out transactions that involve significant risk to one or both parties should be complicated by a lack of trust. Yet the rise of e-commerce and “sharing economy” platforms suggests that concerns that seemed prevalent only a few decades ago have been largely assuaged. What mechanisms have been used to facilitate trust between strangers online? Can we measure the extent to which users trust each other when interacting online? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  6.  64
    The Influence of Using Cyber Technologies in Armed Conflicts on International Humanitarian Law.Justinas Žilinskas - 2013 - Jurisprudencija: Mokslo darbu žurnalas 20 (3):1195-1212.
    Cyber warfare is becoming a new reality with new battles fought everyday on virtual battlefields. For a century and a half, International Humanitarian Law has been a sentry for victims of wars guaranteeing their legal protection from the calamities of war, trying hard to respond to Clausewitz’s “chameleon of war”. Cyber conflict marks new chameleon’s colour together with the unmanned aerial vehicles, autonomic battle systems and other technologies deployed on battlefields. However, it would be greatly erroneous to claim (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  7.  37
    Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.
    ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences. In order to better protect society, policymakers will have to re‐orient their approach toward cyber security so as to emphasize the genuine cybernetic threat, which is network disruption rather than physical destruction.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  99
    Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
    Cyber warfare has changed the scenario of war from an empirical and a theoretical viewpoint. Cyber war is no longer based on physical violence only, but on military, political, economic and ideological strategies meant to exploit a state’s informational resources. This means that a deeper understanding of what cyber war is requires us to adopt an informational approach. This approach may enable us to account for the two-dimensional nature of cyber war, to revise the notion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  9.  35
    Can Cyber‐Physical Systems Reliably Collaborate within a Blockchain?Ben van Lier - 2017 - Metaphilosophy 48 (5):698-711.
    A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber-physical systems: complex interconnections of cyber and physical components. When cyber-physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision-making procedures needed for this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
    Recent debate on the relationship between cyber threats, on the one hand, and both strategy and ethics on the other focus on the extent to which ‘cyber war’ is possible, both as a conceptual question and an empirical one. Whether it can is an important question for just war theorists. From this perspective, it is necessary to evaluate cyber measures both as a means of responding to threats and as a possible just cause for using armed kinetic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  11.  31
    Cyber Warfare Ethics.Michael Skerker & David Whetham (eds.) - 2021 - Howgate Publishing.
    Cyber technology gives states the ability to accomplish effects that once required kinetic action. These effects can now be achieved with cyber means in a manner that is covert, deniable, cheap, and technologically feasible for many governments. In some cases, cyber means are morally preferable to conventional military operations, but in other cases, cyber's unique qualities can lead to greater mischief than governments would have chanced using kinetic means. This volume addresses the applicability of traditional military (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  24
    Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities.Rhiannon Neilsen - 2023 - Ethics and International Affairs 37 (2):161-176.
    Intelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  36
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  22
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised as to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15. The cyber world of child pornography and the child pornography act of 1996: Thoughts on morphing, virtual imaging, and the first amendment.Sandy Karnold - 2000 - Journal of Information Ethics 9 (2):60-65.
     
    Export citation  
     
    Bookmark  
  16.  48
    Le cyber-terrorisme.Maura Conway - 2009 - Cités 39 (3):81.
    Après le 11 septembre 2001, un ressort essentiel des politiques américaines de renforcement de la « sécurité nationale » a pris la forme d’une insistance quasi paranoïaque sur les menaces potentiellement catastrophiques constituées par le cyber-terrorisme. Un grand nombre de commentateurs politiques, militaires ou économiques, ainsi que d’universitaires et de journalistes, ont envahi..
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17. Afro cyber resistance: South African Internet art.Tabita Rezaire - 2014 - Technoetic Arts 12 (2):185-196.
    Looking at the digital–cultural–political means of resistance and media activism on the Internet, this article explores Internet art practices in South Africa as a manifestation of cultural dissent towards western hegemony online. Confronting the unilateral flow of online information, Afro Cyber Resistance is a socially engaged gesture aiming to challenge the representation of the African body and culture through online project. Talking as examples the WikiAfrica project, Cuss Group’s intervention Video Party 4 (VP4) and VIRUS SS 16 by artiste (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18.  21
    Cyber-Aggression as an Example of Dysfunctional Behaviour of the Young Generation in the Globalized World.Tomasz Prymak & Tomasz Sosnowski - 2017 - Studies in Logic, Grammar and Rhetoric 52 (1):181-192.
    The objective of this paper is to try to identify the specificity and frequency of cyber-agression as a form of problem behaviour characteristic for the contemporary youth known as Generation Y. Analysis of the results of research conducted among schoolchildren aged 15–16 indicates that cyber-agression is a common phenomenon in the group. It raises the need for reconstruction and re-evaluation of practices and standards developed to date and implemented to address the problematic behaviour of young people through the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  57
    Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  64
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  21.  40
    Justifying Cyber-intelligence?Ross W. Bellaby - 2016 - Journal of Military Ethics 15 (4):299-319.
    The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  29
    Artificial intelligence in cyber physical systems.Petar Radanliev, David De Roure, Max Van Kleek, Omar Santos & Uchenna Ani - forthcoming - AI and Society:1-14.
    This article conducts a literature review of current and future challenges in the use of artificial intelligence in cyber physical systems. The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. The methodology applied resembled a literature review and taxonomic analysis of complex internet of things interconnected and coupled cyber physical systems. There is an increased attention on propositions on models, infrastructures and frameworks of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Hume – cyber-Hume – enactive Hume. Interview with Tom Froese.Tom Froese, Karolina Karmaza, Przemysław Nowakowski & Witold Wachowski - 2011 - Avant: Trends in Interdisciplinary Studies 2 (1):75-77.
    David Hume; Enactivism; Cognitive Science; Phenomenology; Philosophy of mind.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  24.  32
    Cyber-Green: idealism in the information age.Alistair S. Duff - 2015 - Journal of Information, Communication and Ethics in Society 13 (2):146-164.
    Purpose– This paper aims to retrieve relevant aspects of the work of idealist thinker T.H. Green to improve comprehension of, and policy responses to, various dilemmas facing contemporary “information societies”.Design/methodology/approach– The paper is an exercise in interdisciplinary conceptual research, seeking a new synthesis that draws upon a range of ethical, metaphysical, empirical and policy texts and ideas. It is an application of moral and political principles to post-industrial problems, part of an ongoing international effort to develop viable normative approaches to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  20
    (1 other version)Cyber criminalité et contrefaçon : pour une nouvelle analyse des risques et des frontières.Franck Guarnieri & Éric Przyswa - 2012 - Hermès: La Revue Cognition, communication, politique 63 (2):, [ p.].
    Le concept de frontières interagit avec le binôme « cybercriminalité/contrefaçon ». En particulier, ce binôme révèle une crise des frontières qui impacte à la fois le phénomène de criminalisation ou de contrefaçon. D’une manière plus générale, Internet révèle les lignes de fractures existantes entre le « réel » et le « virtuel », mais fait aussi émerger de nouvelles formes de frontières entre ces deux pôles. Se pose alors la question de l’analyse des risques liés à ces nouvelles frontières hybrides (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  26. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  62
    Reliable Old Wineskins: The Applicability of the Just War Tradition to Military Cyber Operations.Edward T. Barrett - 2015 - Philosophy and Technology 28 (3):387-405.
    This article argues that the traditional jus ad bellum and jus in bello criteria are fully capable of providing the ethical guidance needed to legitimately conduct military cyber operations. The first part examines the criteria’s foundations by focusing on the notion of liability to defensive harm worked out by revisionist just war thinkers. The second part critiques the necessity of alternative frameworks, which its proponents assert are required to at least supplement the traditional just war criteria. Using the latter, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  14
    #WeareUnited, cyber-nationalism during times of a national crisis: The case of a terrorist attack on a school in Pakistan.Fauzia Janjua & Salma Kalim - 2019 - Discourse and Communication 13 (1):68-94.
    Seeing language as a social practice and national identities as a product of discourse, the study intends to analyze discursive practices employed on social media to create the discourses of sameness and difference in times of national crisis. Following the discourse historical approach, I have illustrated how argumentative strategies and topos have been strategically employed to draw boundaries between Us and Them. In this exploration of exclusionary rhetoric, I have also underlined the use of images, memes and hashtags in the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  9
    L’émergence des cyber-risques.Thibault Douville - 2020 - Archives de Philosophie du Droit 62 (1):289-298.
    Les réseaux et systèmes d’information jouent un rôle essentiel dans la société. Un ensemble de dispositions visent à assurer leur sécurité a été adopté. L’objectif est de prévenir les cyber-risques. Pour cela, les opérateurs sont tenus de mettre en place des mesures techniques et organisationnelles adaptées aux risques posés par les réseaux et systèmes d’information, les produits, services et processus numériques. À partir de l’ensemble de ces dispositions, il est possible de découvrir un devoir général de sécurité numérique.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  16
    Cyber Inclusion vs Isolation.Zhanna Vavilova - 2023 - Dialogue and Universalism 33 (1):77-90.
    Recent restrictions of movement during the pandemic have forced people worldwide, even neo-luddites, to turn to communicating online. The virtualization of social processes that we are witnessing today, suggests constant rethinking of the role of the Internet for humanity so that we could optimize conditions of our existence that seem to be irreversibly transformed by technology, and integrate every individual with a unique set of features in the life of society. The author deals with the notions of cyberinclusion, virtual ghetto, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  33
    The Ethics of Cyber Attack: Pursuing Legitimate Security and the Common Good in Contemporary Conflict Scenarios.David J. Lonsdale - 2020 - Journal of Military Ethics 19 (1):20-39.
    Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds an...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32. Cyber-Negri: General intellect and immaterial labor.Nick Dyer-Witheford - 2005 - In Timothy S. Murphy & Abdul-Karim Mustapha (eds.), The philosophy of Antonio Negri. Ann Arbor, MI: Pluto Press. pp. 136--162.
     
    Export citation  
     
    Bookmark  
  33. Armchair Cyber Travelers: A Kansas City-Cairo Discussion Group.Safia El-Wakil & Daniel J. Martin - 2002 - Kairos (Université de Toulouse-Le Mirail. Faculté de philosophie) 7:24.
    No categories
     
    Export citation  
     
    Bookmark  
  34.  16
    Cyber-Physical Control.Péter Galambos, Imre J. Rudas, Lixian Zhang & Shun-Feng Su - 2018 - Complexity 2018:1-2.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  15
    Cyber-physical system.Francesco Garibaldo & Emilio Rebecchi - 2018 - AI and Society 33 (3):299-311.
  36.  9
    Cyber samsāra ou la métempsycose des machines.Emmanuel Grimaud - 2020 - Multitudes 77 (4):200-207.
    Une forme de transmigration électronique est en train de s’opérer sous nos yeux. Le Dalaï Lama l’a bien compris, apportant récemment sa bénédiction à un grand projet de « téléchargement de l’esprit » ( mind uploading ). Quel lien entretient ce modèle « numérique » de la transmigration (celui que nous promettent les transhumanistes) avec les formes plus anciennes (brahmanique, bouddhiste, spirite, etc.)? Aurions-nous déjà opéré notre propre transmigration? Basculé dans une autre matrice? Serions-nous tous en train de devenir des (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37.  26
    Cyber security threats: A never-ending challenge for e-commerce.Xiang Liu, Sayed Fayaz Ahmad, Muhammad Khalid Anser, Jingying Ke, Muhammad Irshad, Jabbar Ul-Haq & Shujaat Abbas - 2022 - Frontiers in Psychology 13.
    This study explores the challenge of cyber security threats that e-commerce technology and business are facing. Technology applications for e-commerce are attracting attention from both academia and industry. It has made what was not possible before for the business community and consumers. But it did not come all alone but has brought some challenges, and cyber security challenge is one of them. Cyber security concerns have many forms, but this study focuses on social engineering, denial of services, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  35
    Crossing the Rubicon: Understanding Cyber Terrorism in the European Context.Emerald M. Archer - 2014 - The European Legacy 19 (5):606-621.
    The first decade of the twenty-first century introduced a cultural shift where terrorism is concerned by making new technologies such as computers and networks available as both tools and targets for exploitation. The current rise in the number of attempts at launching a cyber attack may represent a new generation of “terrorists” and their discontent with governments, private companies, or with other non-governmental groups. Using cyber technologies has many benefits for the user and the potential of causing more (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  44
    Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare.George R. Lucas - 2016 - New York, US: Oxford University Press USA.
    From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence cyber warfare, developing a practical (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40. A philosophical and evolutionary approach to cyber-bullying: social networks and the disruption of sub-moralities.Tommaso Bertolotti & Lorenzo Magnani - 2013 - Ethics and Information Technology 15 (4):285-299.
    Cyber-bullying, and other issues related to violence being committed online in prosocial environments, are beginning to constitute an emergency worldwide. Institutions are particularly sensitive to the problem especially as far as teenagers are concerned inasmuch as, in cases of inter-teen episodes, the deterrent power of ordinary justice is not as effective as it is between adults. In order to develop the most suitable policies, institution should not be satisfied with statistics and sociological perspectives on the phenomenon, but rather seek (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  41.  18
    Cyber Victimization Is Associated With Eating Disorder Psychopathology in Adolescents.Jose H. Marco & M. Pilar Tormo-Irun - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  38
    Cyber-animism: the art of being alive in hybrid society.V. I. Arshinov, O. A. Grimov & V. V. Chekletsov - forthcoming - Philosophical Problems of IT and Cyberspace.
    The boundaries of social acceptance and models of convergence of human and non-human actors of digital reality are defined. The constructive creative possibilities of convergent processes in distributed neural networks are analyzed from the point of view of possible scenarios for building “friendly” human-dimensional symbioses of natural and artificial intelligence. A comprehensive analysis of new management challenges related to the development of cyber-physical and cybersocial systems is carried out. A model of social organizations and organizational behavior in the conditions (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  9
    From social to cyber justice: critical views on justice, law, and ethics.Nythamar Fernandes de Oliveira, Marek Hrubec & Emil Albert Sobottka (eds.) - 2018 - Porto Alegre: PUCRS.
    The book contains critical analyses of injustice in connection to law and ethics, and develops normative alternatives linked to justice. It covers the relevant issues from social justice to cyber justice. The chapters address issues and concepts which guideline on social innovations, transformations inherent in democratizing processes, global conflicts and other interactions, including the ultimate danger of escalation to war conflicts, be they conventional wars or new cyberwars.--From publisher's website.
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  38
    Cyber Conflicts: Addressing the Regulatory Gap.Ludovica Glorioso - 2015 - Philosophy and Technology 28 (3):333-338.
    This special issue gathers together a selection of papers presented by international experts during a workshop entitled ‘Ethics of Cyber-Conflicts’, which was devoted to fostering interdisciplinary debate on the ethical and legal problems and the regulatory gap concerning cyber conflicts. The workshop was held in 2013 at the Centro Alti Studi Difesa in Rome under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence . This NATO-accredited international military organisation that has always placed a high (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  57
    Cyber-Marx: Cycles and Circuits of Struggle in High-Technology Capitalism.Enda Brophy - 2001 - Acm Sigcas Computers and Society 31 (1):22-23.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  46.  22
    Cyber Security in Young Democracies.Jakub Harašta - 2013 - Jurisprudencija: Mokslo darbu žurnalas 20 (4):1457-1472.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47. \"Cyber-co\", czyli kilka uwag krytycznych do książki Jana Trąbki \"Cyberkultura\" (J. Trąbka, \"Cyberkultura\").Jarosław Strzelecki - 2005 - Humanistyka I Przyrodoznawstwo 11.
    No categories
     
    Export citation  
     
    Bookmark  
  48.  45
    Warfighting for Cyber Deterrence: a Strategic and Moral Imperative.David J. Lonsdale - 2018 - Philosophy and Technology 31 (3):409-429.
    Theories of cyber deterrence are developing rapidly. However, the literature is missing an important ingredient—warfighting for deterrence. This controversial idea, most commonly associated with nuclear strategy during the later stages of the Cold War, affords a number of advantages. It provides enhanced credibility for deterrence, offers means to deal with deterrence failure, improves compliance with the requirements of just war and ultimately ensures that strategy continues to function in the post-deterrence environment. This paper assesses whether a warfighting for deterrence (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49.  43
    The Dynamics of Cyber China: The Characteristics of Chinese ICT Use.Wai-chi Rodney Chu - 2008 - Knowledge, Technology & Policy 21 (1):29-35.
  50.  26
    Parenting Style and Cyber-Aggression in Chinese Youth: The Role of Moral Disengagement and Moral Identity.Yizhi Zhang, Cheng Chen, Zhaojun Teng & Cheng Guo - 2021 - Frontiers in Psychology 12.
    Previous research has shown that parenting style is intricately linked to cyber-aggression. However, the underlying mechanisms of this relationship remain unclear, especially among young adults. Guided by the social cognitive theory and the ecological system theory, this study aimed to examine the effect of parenting style on cyber-aggression, the potential mediating role of moral disengagement, and the moderating role of moral identity in this relationship. Participants comprised 1,796 Chinese college students who anonymously completed questionnaires on parenting style, moral (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 562