Information Warfare and Ethics

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ethics and Information Warfare

War forms an integral part of the history of mankind, alternately driving civilization forward, then imperiling it. A natural ambivalence toward war has thus developed, with its acceptance as a necessary evil tempered by vigorous, sustained efforts to control its frequency and intensity. Thus, from the dawn of the recorded history of conflict, attempts have been made to craft an ethical approac...

متن کامل

Cyberspace Ethics and Information Warfare

INTRODUCTION We have seen a rise in computer misuse at a global level and also the development of new policies and strategies to describe organized computer security attacks against the information society–these strategies are described as being “information warfare.” This is very different from the traditional view of attack against computers by the individual, determined hacker, a cyber warri...

متن کامل

Information Warfare and Deception

This paper examines the history of the phenomenon of Information Warfare and the increasingly dominant role that deception is taking within its framework. The concept of information warfare began as a technology oriented tactic to gain information dominance by superior command and control. This soon developed into a realization of the power of information as both a ‘weapon’ as well as a ‘target...

متن کامل

The Ethics of Cyberweapons in Warfare

The author discusses the ethical issues of using cyberweapons, software that attacks data and other software during warfare. Many people assume these are relatively benign weapons, but we argue that they can create serious harms like any weapon. He defines cyberweapons and describes them in general terms, and survey their status as per the laws of war. He then discusses the unreliability of cyb...

متن کامل

Rethinking Defensive Information Warfare

Although the origins of information warfare lie in the defense of critical computer systems, defensive information warfare (DIW) per se has advanced little beyond an information assurance model. Information assurance is an integral part of any military organization’s operations, but it falls far short of meeting the needs for robust defense of critical command-and-control (C2) computer networks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Australasian Journal of Information Systems

سال: 2001

ISSN: 1449-8618,1449-8618

DOI: 10.3127/ajis.v8i2.242