772
Views
2
CrossRef citations to date
0
Altmetric
Articles

Ethics and Cyber Conflict: A Response to JME 12:1 (2013)

REFERENCES

  • Arquilla, John. (1999) Ethics and Information Warfare, in: Z. Khalilzad, J. White & A. Marshall (Eds), The Changing Role of Information in Warfare, pp. 379–401 (Santa Monica, CA: RAND Corporation).
  • Arquilla, John. (2010). Conflict, Security, and Computer Ethics, in: Luciano Floridi (Ed), Cambridge Handbook of Information and Computer Ethics, pp.133–149 (New York: Cambridge University Press).
  • Arquilla, John. (2012) Cyber War is Already upon Us, Foreign Policy, March–April; accessed 2 April 2014, available at: http://www.foreignpolicy.com/articles/2012/02/27/cyberwar_is_already_upon_us; Internet.
  • Arquilla, John & Ronfeldt, David. (1993) Cyberwar is Coming!, Comparative Strategy, 12(2), pp. 141–165. 10.1080/01495939308402915
  • Cook, James. (2010) ‘Cyberation’ and Just War Doctrine: A Response to Randall Dipert, Journal of Military Ethics, 9(4), pp. 411–423. 10.1080/15027570.2010.536406
  • Dipert, Randall R. (2010) The Ethics of Cyber Warfare, Journal of Military Ethics, 9(4), pp. 384–410. 10.1080/15027570.2010.536404
  • Dipert, Randall R. (2013) The Essential Features for an Ontology for Cyberwarfare, in: Panayotis A. Yannakogeorgos & Adam B. Lowther (Eds), Conflict and Cooperation in Cyberspace, pp. 35–48 (Boca Raton, FL: Taylor & Francis).
  • Dipert, Randall R. (2014) The Ethics of Information Warfare, in: Luciano Floridi & Mariarosaria Taddeo (Eds), Philosophy of Engineering and Technology: Proceedings of a UNESCO Conference on Ethics & Cyber Security, pp. 25–37 (Amsterdam: Springer).
  • DoD (Department of Defense). (2011) US Department of Defense Strategy for Operating in Cyber Space, accessed 2 April 2014, available at: http://www.defense.gov/news/d20110714cyber.pdf; Internet.
  • Dunlap, Charles J. (2011) Perspectives for Cyber Strategists on Law for Cyberwar, Strategic Studies Quarterly, 5 ( Spring), pp. 81–99.
  • Graham, David E. (2010) Cyber Threats and the Law of War, Journal of National Security Law, 4(1), pp. 87–102.
  • Lucas, George R. Jr. (2011) Permissible Preventive Cyberwar: Restricting Cyber Conflict to Justified Military Targets, opening address for a UNESCO-sponsored conference on Cyber War and Ethics at the University of Hertfordshire, 1 July, accessed 2 April 2014, available at: http://www.elac.ox.ac.uk/downloads/Permissible%20Preventive%20Cyberwar%20UNESCO%202011.pdf; Internet. (Also forthcoming in: Luciano Floridi & Mariarosaria Taddeo (Eds), Philosophy of Engineering and Technology: Proceedings of a UNESCO Conference on Ethics & Cyber Security (Amsterdam: Springer).)
  • Lucas, George R. Jr. (2013a) Can There Be an Ethical Cyberwar?, in: A. Panayotis Yannakogeorgos & Adam B. Lowther (Eds), Conflict and Cooperation in Cyberspace, pp. 195–210 (Boca Raton, FL: CRC Press / Taylor and Francis).
  • Lucas, George R. Jr. (2013b) Jus in Silico: Moral Restrictions on the Use of Cyber Warfare, in: Fritz Allhoff, Nicholas G. Evans & Adam Henschke (Eds), The Routledge Handbook of War and Ethics, pp. 367–380 (Oxford: Routledge).
  • Lucas, George R. Jr. (2013c) Emerging Norms for Cyber Warfare. Keynote Address, Conference on Ethics & Cyber Security, Center for Applied Philosophy & Practical Ethics, Australian National and Charles Stuart Universities, Canberra, 5–6 August, accessed 2 April 2014, available at: http://philevents.org/event/show/11114; Internet.
  • Lucas, George R. Jr. (2013d) Navigation, Aviation, ‘Cyberation’: Developing New Rules of the Road for the Cyber Domain. Inaugural Public Security Lecture, National Security College, Australian National University, Canberra, 7 August, accessed 2 April 2014, available at: http://www.youtube.com/watch?v = cs7RXAPzG84; Internet.
  • Lucas, George R. Jr. (2014) NSA Management Directive # 424: Secrecy and Privacy in the Aftermath of Snowden, Ethics and International Affairs (6 February), accessed 9 April 2014, available at: http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=9207954; Internet.
  • Rid, Thomas. (2011) Cyber War Will Not Take Place, The Journal of Strategic Studies, 35(1), pp. 5–32. 10.1080/01402390.2011.608939
  • Rid, Thomas C. (2012) Cyber War: Think Again, Foreign Policy Magazine, 26 February, pp. 58–61.
  • Rowe, Neil C. (2007) War Crimes from Cyberweapons, Journal of Information Warfare, 6(3), pp. 15–25.
  • Rowe, Neil C. (2008) Ethics of Cyber War Attacks, in: Lech J. Janczewski & Andrew M. Colarik (Eds), Cyber Warfare and Cyber Terrorism, pp. 105–111 (Hershey, PA: Information Science Reference).
  • Rowe, Neil C. (2010) The Ethics of Cyberweapons in Warfare, Journal of Techoethics, 1(1), pp. 20–31. 10.4018/jte.2010081002
  • Rowe, Neil C. (2011) Toward Reversible Cyber Attacks, in: Julie Ryan (Ed), Leading Issues in Information Warfare and Security Research, pp. 145–158 (Reading: Academic Publishing).
  • Schmitt, Michael N. (1999) Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework, Columbia Journal of Transnational Law, 37, pp. 885–937.
  • Schmitt, Michael N. (2002) Wired Warfare: Computer Network Attack and Jus in Bello, International Review of the Red Cross, 84(846), pp. 365–399. 10.1017/S1560775500097741
  • Schmitt, Michael N. (2011) Cyber Operations and the Jus in Bello: Key Issues, U.S. Naval War College International Law Studies, 87, pp. 89–110.
  • Sparrow, Robert. (2007) Killer Robots, Journal of Applied Philosophy, 24(1), pp. 62–67. 10.1111/j.1468-5930.2007.00346.x
  • Symantec. (2011) W32.Stuxnet Dossier, by Nicholas Falliere, Liam O. Murchu & Eric Chien (February), accessed 2 April 2014, available at: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf; Internet.
  • Tallinn. (2012) The Tallinn Manual on the International Law Applicable to Cyber Warfare, ed. Michael N. Schmitt (Tallinn: NATO Cooperative Cyber Defence Center of Excellence), accessed 2 April 2014, available at: https://www.ccdcoe.org/249.html; Internet.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.