منابع مشابه
Ethics and Information Warfare
War forms an integral part of the history of mankind, alternately driving civilization forward, then imperiling it. A natural ambivalence toward war has thus developed, with its acceptance as a necessary evil tempered by vigorous, sustained efforts to control its frequency and intensity. Thus, from the dawn of the recorded history of conflict, attempts have been made to craft an ethical approac...
متن کاملCyberspace Ethics and Information Warfare
INTRODUCTION We have seen a rise in computer misuse at a global level and also the development of new policies and strategies to describe organized computer security attacks against the information societythese strategies are described as being information warfare. This is very different from the traditional view of attack against computers by the individual, determined hacker, a cyber warri...
متن کاملInformation Warfare and Deception
This paper examines the history of the phenomenon of Information Warfare and the increasingly dominant role that deception is taking within its framework. The concept of information warfare began as a technology oriented tactic to gain information dominance by superior command and control. This soon developed into a realization of the power of information as both a ‘weapon’ as well as a ‘target...
متن کاملThe Ethics of Cyberweapons in Warfare
The author discusses the ethical issues of using cyberweapons, software that attacks data and other software during warfare. Many people assume these are relatively benign weapons, but we argue that they can create serious harms like any weapon. He defines cyberweapons and describes them in general terms, and survey their status as per the laws of war. He then discusses the unreliability of cyb...
متن کاملRethinking Defensive Information Warfare
Although the origins of information warfare lie in the defense of critical computer systems, defensive information warfare (DIW) per se has advanced little beyond an information assurance model. Information assurance is an integral part of any military organization’s operations, but it falls far short of meeting the needs for robust defense of critical command-and-control (C2) computer networks...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Australasian Journal of Information Systems
سال: 2001
ISSN: 1449-8618,1449-8618
DOI: 10.3127/ajis.v8i2.242