References
- Agrafiotis, I., J. R. C. Nurse, M. Goldsmith, S. Creese, and D. Upton. 2018. “A Taxonomy of Cyber-Harms: Defining the Impacts of Cyber-Attacks and Understanding How They Propagate.” Journal of Cybersecurity 4 (1): 1–15. doi:10.1093/cybsec/tyy006.
- BBC. 2015. “Sony Cyber-Attack: North Korea Faces New US Sanctions.” BBC News, January 3. Accessed 21 December 2022. https://www.bbc.com/news/world-us-canada-30661973
- BBC. 2020a. “Coronavirus: Hackers Targeted Covid Vaccine Supply ‘Cold Chain’.” BBC News, December 3 2020. Accessed 21 December 2022. https://www.bbc.com/news/technology-55165552
- BBC. 2020b. “Norway Blames Russia for Cyber-Attack on Parliament.” BBC News, October 13 2020. Accessed 21December 2022. https://www.bbc.com/news/world-europe-54518106
- BBC. 2021. “Colonial Pipeline: US Recovers Most of Ransom, Justice Department Says.” BBC News, June 8. Accessed 21 December 2022.https://www.bbc.com/news/business-57394041
- BBC. 2022. “Ukraine Crisis: ‘Wiper’ Discovered in Latest Cyber-Attacks.” BBC News, February 24. Accessed 21 December 2022. https://www.bbc.com/news/technology-60500618
- Bellaby, R. 2016. “Justifying Cyber-Intelligence?” Journal of Military Ethics 15 (4): 299–319. doi:10.1080/15027570.2017.1284463.
- Brock, D. 2003. “Separate Spheres and Indirect Benefits.” Cost Effectiveness and Resource 1 (1): 4. Allocation: 1/4. doi:10.1186/1478-7547-1-4.
- Broome, J. 1990. “Fairness.” In Proceedings of the Aristotelian Society 91: 87–101. Aristotelian Society, Wiley.
- Brown, C. 2011. “Consequentialize This.” Ethics 121 (4): 760–763. doi:10.1086/660696.
- Caney, S. 2012. “Just Emissions.” Philosophy & Public Affairs 40 (4): 255–300.
- Cavelty, M. -D. 2015. “Cyber-Security and Private Actors.” In Routledge Handbook of Private Security Studies, edited by R. Abrahamsen and A. Leander, 89–99. London: Routledge.
- CCHS. 2016. “Into the Gray Zone: The Private Sector and Active Defense Against Cyber Threats.” Center for Cyber & Homeland Security , Project Report 2016. George Washington University. https://wayback.archive-it.org/5184/20190102164841/https://cchs.gwu.edu/new-report-gray-zone-private-sector-and-active-defense-against-cyber-threats ( accessed 21/11/22).
- CSO. 2021. “Feds Seize $2.3 Million in Cryptocurrency Wallet Reportedly Used in Colonial Pipeline Ransomware Attack.” CSO Online, June 8. Accessed 19 November 2021. https://www.csoonline.com/article/3621250/feds-seize-2-3-million-in-cryptocurrency-wallet-reportedly-used-in-colonial-pipeline-ransomware-att.html
- Department of Justice. 2021. “Department of Justice Seizes $2.3 Million in Cryptocurrency Paid to the Ransomware Extortionists Darkside.” Accessed 22 November2021. https://www.justice.gov/opa/pr/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside
- Dipert, R. 2014. “The Future Impact of a Long Period of Limited Cyberwarfare on the Ethics of Warfare.” In The Ethics of Information Warfare, edited by L. Floridi and M. Taddeo, 25–37. London: Springer.
- Dipert, R. 2016. “Distinctive Ethical Issues of Cyberwarfare.” In Binary Bullets: The Ethics of Cyberwarfare, edited by F. Allhoff, A. Henschke, and B. J. Strawser, 56–72. New York NY: Oxford University Press.
- Du Toit, J., and J. Millum. 2016. “Are Indirect Benefits Relevant to Health Care Allocation Decisions?” The Journal of Medicine and Philosophy 41 (5): 540–557. doi:10.1093/jmp/jhw018.
- Eberle, C. 2016. “Rights, Goods, and Proportionate War.” The Monist 99 (1): 70–86. doi:10.1093/monist/onv030.
- Eilstrup-Sangiovanni, M. 2018. “Why the World Needs an International Cyberwar Convention.” Philosophy & Technology 31 (3): 379–407. doi:10.1007/s13347-017-0271-5.
- Fabre, C. 2012. Cosmopolitan War. Oxford: Oxford University Press.
- Fidler, D. 2021. “America’s Place in Cyberspace: The Biden Administration’s Cyber Strategy Takes Shape.” Council on Foreign Relations, March 11. https://www.cfr.org/blog/americas-place-cyberspace-biden-administrations-cyber-strategy-takes-shape.
- Finlay, C. 2018. “Just War, Cyber War, and the Concept of Violence.” Philosophy & Technology 31 (3): 357–377. doi:10.1007/s13347-017-0299-6.
- Hoffman, W., and A. Levite. 2017. Private Sector Cyber Defense: Can Active Measures Help Stabilize Cyberspace?. Washington, DC.: Carnegie Endowment of International Peace.
- Hoffman, W., and S. Nyikos. 2019. Governing Private Sector Self-Help in Cyberspace: Analogies from the Physical World. Washington, DC.: Carnegie Endowment for International Peace.
- Home Office. 2018. “Understanding the Costs of Cybercrime: A Report of Key Findings from the Costs of Cyber Crime Working Group.” Home Office Science Advisory Council, Research Report 96, January 1–83.
- Horton, J. 2018. “Always Aggregate.” Philosophy & Public Affairs 46 (2): 160–174. doi:10.1111/papa.12116.
- Hurka, T. 2005. “Proportionality in the Morality of War.” Philosophy & Public Affairs 33 (1): 34–66. doi:10.1111/j.1088-4963.2005.00024.x.
- Hurka, T. 2008. “Proportionality and Necessity.” In War: Essays in Political Philosophy, edited by L. May, 127–144. Cambridge: Cambridge University Press.
- Hurka, T. 2010. “The Consequences of War.” In Ethics and Humanity: Themes from the Philosophy of Jonathan Glover, edited by N. Davis, R. Keshen, and J. McMahan, 23–43. Oxford: Oxford University Press.
- Hurka, T. 2014. “Kamm on Intention and Proportionality.” Journal of Moral Philosophy 11 (4): 411–427. doi:10.1163/17455243-01104004.
- Jervis, R. 1978. “Cooperation Under the Security Dilemma.” World Politics 30 (2): 167–214. doi:10.2307/2009958.
- Kamm, F. 2011. Ethics for Enemies. Oxford: Oxford University Press.
- Lazar, S. 2012. “Necessity in Self-Defense and War.” Philosophy & Public Affairs 40 (1): 3–44. doi:10.1111/j.1088-4963.2012.01214.x.
- Lazar, S. 2016. “War.” In The Stanford Encyclopedia of Philosophy, edited by E. ZaltaWinter 2016 Edition, Available from. https://plato.stanford.edu/archives/win2016/entries/ethics-deontological/. (accessed 21 December 2022
- Lin, P., F. Allhoff, and K. Abney. 2014. “Is Warfare the Right Frame for the Cyber Debate?” In The Ethics of Information Warfare, edited by L. Floridi and M. Taddeo, 39–59. London: Springer.
- Lippert-Rasmussen, K., and S. Lauridsen. 2010. “Justice and the Allocation of Healthcare Resources: Should Indirect, Non-Health Effects Count?” Medicine, Health Care, and Philosophy 13 (3): 237–246. doi:10.1007/s11019-010-9240-9.
- Macnish, K. 2015. “An Eye for an Eye: Proportionality and Surveillance.” Ethical Theory and Moral Practice 18 (3): 529–548. doi:10.1007/s10677-014-9537-5.
- Marmor, A. 2015. “What is the Right to Privacy?” Philosophy & Public Affairs 43 (1): 3–26. doi:10.1111/papa.12040.
- Maurer, T. 2018. Cyber Mercenaries: The State, Hackers, and Power. Cambridge: Cambridge University Press.
- McMahan, J. 2005. “Just Cause for War.” Ethics & International Affairs 19 (3): 1–21. doi:10.1111/j.1747-7093.2005.tb00551.x.
- McMahan, J. 2008. “The Morality of War and the Law of War.” In Just and Unjust Warriors: The Legal and Moral Status of Soldiers, edited by D. Rodin and H. Shue, 19–43. Oxford: Clarendon Press.
- McMahan, J. 2014. “Proportionality and Just Cause: A Comment on Kamm.” Journal of Moral Philosophy 11 (4): 428–453. doi:10.1163/17455243-01104005.
- McMahan, J. 2018a. “Proportionality and Necessity in Jus in Bello.” In The Oxford Handbook of the Ethics of War, edited by H. Frowe and S. Lazar, 418–439. Oxford: Oxford University Press.
- McMahan, J. 2018b. “Proportionate Defense.” Journal of Transnational Law and Policy 21 (2013–14): 1–36.
- McMahan, J., and R. McKim. 1993. “The Just War and the Gulf War.” Canadian Journal of Philosophy 23 (4): 501–541. doi:10.1080/00455091.1993.10717333.
- The New York Times. 2021. “’dangerous Stuff’: Hackers Tried to Poison Water Supply of Florida Town.” New York Times, February 8. Accessed 21 December 2022. https://www.nytimes.com/2021/02/08/us/oldsmar-florida-water-supply-hack.html
- Nickel, J. 2019. “Human Rights.” In The Stanford Encyclopedia of Philosophy, edited by E. ZaltaSummer 2019, Available from. https://plato.stanford.edu/archives/sum2019/entries/rights-human/. (accessed 21 December 2022
- Norheim, O., E. Emanuel, and J. Millum. 2020. Global Health Priority-Setting: Beyond Cost-Effectiveness. Oxford: Oxford University Press.
- Oberman, K. 2019. “War and Poverty.” Philosophical Studies 176 (1): 197–217. doi:10.1007/s11098-017-1012-4.
- Oberman, K. 2020. “Killing and Rescuing: Why Necessity Must Be Rethought.” The Philosophical Review 129 (3): 433–463. doi:10.1215/00318108-8311248.
- O’connell, M. 2008. “Defining Armed Conflict.” Journal of Conflict and Security Law 13 (3): 393–400. doi:10.1093/jcsl/krp007.
- Pattison, J. 2018. “The Case for the Nonideal Morality of War: Beyond Revisionism versus Traditionalism in Just War Theory.” Political Theory 46 (2): 242–268. doi:10.1177/0090591716669394.
- Pattison, J. 2019. “The Ethics of Foreign Policy: A Framework.” SAIS Review of International Affairs 39 (1): 21–35. doi:10.1353/sais.2019.0002.
- Pattison, J. 2020a. “From Defence to Offence: The Ethics of Private Cybersecurity.” European Journal of International Security 5 (2): 233–254. doi:10.1017/eis.2020.6.
- Pattison, J. 2020b. “Opportunity Costs Pacifism.” Law and Philosophy 39 (5): 545–576. doi:10.1007/s10982-020-09390-7.
- Persad, G., and J. du Toit. 2020. “The Case for Valuing Non-Health and Indirect Benefits.” In Global Health Priority-Setting: Beyond Cost-Effectiveness, edited by O. Norheim, E. Emanuel, and J. Millum, 207–222. Oxford: Oxford University Press.
- PST. 2020. “Datainnbruddet mot Stortinget er ferdig etterforsket.” December 8. Accessed 21 December 2022. https://pst.no/alle-artikler/pressemeldinger/datainnbruddet-mot-stortinget-er-ferdig-etterforsket
- Reglitz, M. 2020. “The Human Right to Free Internet Access.” Journal of Applied Philosophy 37 (2): 314–331. doi:10.1111/japp.12395.
- Rid, T. 2012. “Cyber War Will Not Take Place.” Journal of Strategic Studies 35 (1): 5–32. doi:10.1080/01402390.2011.608939.
- Risse, M. 2019. “Human Rights and Artificial Intelligence: An Urgently Needed Agenda.” Human Rights Quarterly 41 (1): 1–16. doi:10.1353/hrq.2019.0000.
- Rodin, D. 2011. “Justifying Harm.” Ethics 122 (1): 74–110. doi:10.1086/662295.
- Schmitt, M., edited by. 2017. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press.
- Sharp, D., and J. Millum. 2018. “Prioritarianism for Global Health Investments: Identifying the Worst off.” Journal of Applied Philosophy 35 (1): 112–132. doi:10.1111/japp.12142.
- Shiffrin, S. V. 2012. “Harm and Its Moral Significance.” Legal Theory 18 (3): 357–398. doi:10.1017/S1352325212000080.
- Shue, H. 1980. Basic Rights. Princeton, NJ: Princeton University Press.
- Simpson, T. 2014. “The Wrong in Cyberattacks.” In The Ethics of Information Warfare, edited by L. Floridi and M. Taddeo, 141–154. London: Springer.
- Smith, P. T. 2018. “Cyberattacks as Casus Belli: A Sovereignty-Based Account.” Journal of Applied Philosophy 35 (2): 229–233. doi:10.1111/japp.12169.
- Steiner, H. 1984. An Essay on Rights. Oxford: Blackwell.
- Stevens, T., K. O’brien, R. Overill, B. Wilkinson, T. Pildegovičs, and S. Hill. 2019. “UK Active Cyber Defence: A Public Good for the Private Sector.” Cyber Security Research Group, King’s College London: The Policy Institute. Available from. https://kclpure.kcl.ac.uk/portal/en/publications/uk-active-cyber-defencec123e65e-ea3c-4430-8587-901ae95dec8a.html. (accessed 21 December 2022
- Taddeo, M. 2014. “Information Warfare and Just War Theory.” In The Ethics of Information Warfare, edited by L. Floridi and M. Taddeo, 123–138. London: Springer.
- Taddeo, M. 2016. “Just Information Warfare.” Topoi 35 (1): 213–224. doi:10.1007/s11245-014-9245-8.
- Taillat, S. 2019. “Disrupt and Restraint: The Evolution of Cyber Conflict and the Implications for Collective Security.” Contemporary Security Policy 40 (3): 368–381. doi:10.1080/13523260.2019.1581458.
- Temple-Raston, D. 2019. “How the U.S. Hacked ISIS,” National Public Radio, September 26. Accessed 21 December 2022. https://www.npr.org/2019/09/26/763545811/how-the-u-s-hacked-isis?t=1626176603533
- Tomlin, P. 2021. “Distributive Justice for Aggressors.” Law and Philosophy 39 (4): 351–379. doi:10.1007/s10982-019-09373-3.
- Tomlin, P. 2021. “Proportionality in War: Revising Revisionism.” Ethics 131 (1): 34–61. doi:10.1086/709983.
- UK Gov. 2021. “Global Britain in a Competitive Age: The Integrated Review of Security, Defence, Development and Foreign Policy.” March. Accessed 21 December 2022. https://www.gov.uk/government/publications/global-britain-in-a-competitive-age-the-integrated-review-of-security-defence-development-and-foreign-policy,1-114
- Valeriano, B., and B. Jenson. 2019. The Myth of Cyber Offense: The Case for Restraint. Washington, DC.: Cato Institute Policy Analysis. 862.