Topoi

, Volume 35, Issue 1, pp 213–224 | Cite as

Just Information Warfare

Article

Abstract

In this article I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold: filling the theoretical vacuum surrounding this phenomenon and providing the conceptual grounding for the definition of new ethical regulations for information warfare. I argue that Just War Theory is a necessary but not sufficient instrument for considering the ethical implications of information warfare and that a suitable ethical analysis of this kind of warfare is developed when Just War Theory is merged with Information Ethics. In the initial part of the article, I describe information warfare and its main features and highlight the problems that arise when Just War Theory is endorsed as a means of addressing ethical problems engendered by this kind of warfare. In the final part, I introduce the main aspects of Information Ethics and define three principles for a just information warfare resulting from the integration of Just War Theory and Information Ethics.

Keywords

Cyber conflicts Entropy Information Ethics Information war Just War Theory War 

References

  1. Abiola A, Munoz J, Buchanan W (2004) Analysis and detection of cruising computer viruses. In: EIWC Google Scholar
  2. Arquilla J (1998) Can information warfare ever be just? Ethics Inf Technol 1(3):203–212CrossRefGoogle Scholar
  3. Arquilla J (2013) Twenty years of cyberwar. J Mil Ethics 12(1):80–87. doi:10.1080/15027570.2013.782632 CrossRefGoogle Scholar
  4. Arquilla J, Ronfeldt David F (eds) (1997) In Athena’s camp: preparing for conflict in the information age. Rand, Santa MonicaGoogle Scholar
  5. Asaro P (2008) How just could a robot war be? In: Brey P, Briggle A, Waelbers K (eds) Current issues in computing and philosophy. IOS Press, Amsterdam, pp 50–64Google Scholar
  6. Barrett ET (2013) Warfare in a new domain: the ethics of military cyber-operations. J Mil Ethics 12(1):4–17. doi:10.1080/15027570.2013.782633 CrossRefGoogle Scholar
  7. Benbow T (2004) The magic bullet?: understanding the “revolution in military affairs”. Brassey’s, LondonGoogle Scholar
  8. Blackmore T (2011) War X. Univ of Toronto PrGoogle Scholar
  9. Bok S (1999) Lying: moral choice in public and private Life, 2nd edn. Vintage Books, New YorkGoogle Scholar
  10. Bowden M (2011) Worm: the first digital world war. Atlantic Monthly Press, New YorkGoogle Scholar
  11. Brenner J (2011) America the vulnerable: new technology and the next threat to national security. Penguin Press, New YorkGoogle Scholar
  12. Clarke RA (2012) Cyber war: the next threat to national security and what to do about it. 1st Ecco pbk. ed. New York: EccoGoogle Scholar
  13. Denning D (2007) The ethics of cyber conflict. In: Himma KE, Tavani HT (eds) Information and computer ethics. Wiley, Hoboken, USAGoogle Scholar
  14. Dipert R (2010) The ethics of cyberwarfare. J Mil Ethics 9(4):384–410CrossRefGoogle Scholar
  15. Dipert R (2013) The essential features of an ontology for cyberwarfare. In: Panayotis Yannakogeorgos, Adam Lowther (eds) Conflict and cooperation in cyberspace. Taylor & Francis, pp 35–48. http://www.crcnetbase.com/doi/abs/10.1201/b15253-7
  16. Floridi L (2002) On the intrinsic value of information objects and the infosphere. Ethics Inf Technol 4(4):287–304CrossRefGoogle Scholar
  17. Floridi L (2006) Information ethics, its nature and scope. SIGCAS Comput Soc 36(3):21–36Google Scholar
  18. Floridi L (2007) Understanding information ethics. APA Newsl Philos Comput 7(1):3–12Google Scholar
  19. Floridi L (2008) The method of levels of abstraction. Mind Mach 18(3):303–329CrossRefGoogle Scholar
  20. Floridi L (2013) Ethics of information. Oxford University Press, OxfordCrossRefGoogle Scholar
  21. Floridi L (2014) The fourth revolution, how the infosphere is reshaping human reality. Oxford University Press, OxfordGoogle Scholar
  22. Floridi L, Sanders J (2001) Artificial evil and the foundation of computer ethics. Ethics Inf Technol 3(1):55–66CrossRefGoogle Scholar
  23. Floridi L, Sanders JW (2004) On the morality of artificial agents. Mind Mach 14(3):349–379. doi:10.1023/B:MIND.0000035461.63578.9d CrossRefGoogle Scholar
  24. Gelven M (1994) War and existence: a philosophical inquiry. Pennsylvania State University Press, University ParkGoogle Scholar
  25. Hepburn RW (1984) “Wonder” and other essays: eight studies in aesthetics and neighbouring fields. University Press, EdinburghGoogle Scholar
  26. ICRC Databases on International Humanitarian Law. 00:00:00.0. http://www.icrc.org/ihl/INTRO/470
  27. Libicki M (1996) What is information warfare?. National Defense University Press, WashingtonGoogle Scholar
  28. Lucas GR (2013) Jus in silico: military restrictions on the use of Cyber Warfare. In: Allhoff F, Evans NG, Henschke A (eds) Routledge handbook of war and ethics. Routledge, OxfordGoogle Scholar
  29. NATO Cooperative Cyber Defence Centre of Excellence (2013) Tallinn manual on the international law applicable to cyber warfare: prepared by the international group of experts at the invitation of the NATO cooperative cyber defence centre of excellence. Cambridge University Press, Cambridge; New YorkGoogle Scholar
  30. Perry D (2006) Repugnant philosophy’: ethics, espionage, and covert action. In: Goldman J (ed) Ethics of spying: a reader for the intelligence professionalGoogle Scholar
  31. Schmitt MN (1999) The principle of discrimination in 21st century warfare. SSRN scholarly paper ID 1600631. Rochester, NY: Social science research network. http://papers.ssrn.com/abstract=1600631
  32. Schmitt MN (2013) Cyberspace and international law: the penumbral mist of uncertainty. Harvard 126(176):176–180Google Scholar
  33. Schwartau W (1994) Information warfare: Chaos on the electronic superhighway. 1st edn. Thunder’s Mouth Press, New York: Emeryville, CA; Distributed by Publishers Group WestGoogle Scholar
  34. Shulman MR (1999) Discrimination in the laws of information warfare. SSRN scholarly paper ID 1287181. Rochester, NY: Social science research network. http://papers.ssrn.com/abstract=1287181
  35. Taddeo M (2012) Information warfare: a philosophical perspective. Philos Technol 25(1):105–120Google Scholar
  36. Taddeo M (2013) Cyber Security and Individual Rights, Striking the Right Balance. Philos Technol 26(4):353–356Google Scholar
  37. Taddeo M, Vaccaro A (2011) Analyzing peer-to-peer technology using information ethics. Inf Soc 27(2):105–112. doi:10.1080/01972243.2011.548698 CrossRefGoogle Scholar
  38. Toffler A, Toffler A (1997) Foreword: the new intangibles. In: Arquilla John, Ronfeldt David F (eds) In Athena’s camp preparing for conflict in the information age. Santa Monica, RandGoogle Scholar
  39. Turilli M, Floridi L (2009) The ethics of information transparency. Ethics Inf Technol 11(2):105–112. doi:10.1007/s10676-009-9187-9 CrossRefGoogle Scholar
  40. Turilli M, Vaccaro A, Taddeo M (2010) The case of on-line trust. Knowledge, technology and policy 23.3–4 (3–4, Special issue on Trust in Technology): 333–345Google Scholar
  41. Turilli M, Vaccaro A, Taddeo M (2011) Internet neutrality: ethical issues in the internet environment. Philos Technol 25(2):133–151. doi:10.1007/s13347-011-0039-2 CrossRefGoogle Scholar
  42. Waltz E (1998) Information warfare: principles and operations. Artech House, BostonGoogle Scholar
  43. Walzer M (2006) Just and unjust wars: a moral argument with historical illustrations, 4th edn. Basic Books, New YorkGoogle Scholar
  44. Withman J (2013) Is just war theory obsolete? In: Fritz Allhoff, Nicholas G. Evans, Adam Henschke (eds) Routledge handbook of ethics and war: just war theory in the 21st century, Routledge, p 23–34Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.Department of Political and International StudiesUniversity of WarwickCoventryUK
  2. 2.Uehiro Centre for Practical EthicsUniversity of OxfordOxfordUK

Personalised recommendations