Philosophy & Technology

, Volume 26, Issue 2, pp 221–225 | Cite as

Information Warfare: A Response to Taddeo

COMMENTARY

Abstract

Taddeo’s recent article, ‘Information Warfare: A Philosophical Perspective’ (Philos. Technol. 25:105–120, 2012) is a useful addition to the literature on information communications technologies (ICTs) and warfare. In this short response, I draw attention to two issues arising from the article. The first concerns the applicability of ‘information warfare’ terminology to current political and military discourse, on account of its relative lack of contemporary usage. The second engages with the political and ethical implications of treating ICT environments as a ‘domain’, with its ramifications for the pursuit of ‘dominion’, particularly through military action.

Keywords

Information technologies Information warfare Dominion War 

References

  1. Barlow, J. P. (2001). A declaration of the independence of cyberspace. In P. Ludlow (Ed.), Crypto anarchy, cyberstates, and pirate utopias (pp. 27–30). Cambridge, MA: MIT Press.Google Scholar
  2. Betz, D. J. (2006). The more you know, the less you understand: the problem with information warfare. Journal of Strategic Studies, 29(3), 505–533.CrossRefGoogle Scholar
  3. Betz, D. J., & Stevens, T. (2011). Cyberspace and the state: Toward a strategy for cyber-power. London: Routledge.Google Scholar
  4. Dalby, S. (2009). Geopolitics, the revolution in military affairs and the Bush doctrine. International Politics, 46(2/3), 234–252.CrossRefGoogle Scholar
  5. DeLanda, M. (2006). A new philosophy of society: Assemblage theory and social complexity. London: Continuum.Google Scholar
  6. Deibert, R. J., & Rohozinski, R. (2010). Beyond denial: introducing next-generation information access controls. In R. Deibert, J. Palfrey, R. Rohozinski, & J. Zittrain (Eds.), Access controlled: The shaping of power, rights, and rule in cyberspace (pp. 3–13). Cambridge, MA: The MIT Press.Google Scholar
  7. Der Derian, J. (2009). Virtuous war: Mapping the military–industrial–media–entertainment network. New York: Routledge.Google Scholar
  8. Gray, C. H. (1997). Postmodern war: The new politics of conflict. London: Routledge.Google Scholar
  9. Libicki, M. C. (1995). What is information warfare? Washington, DC: National Defense University.Google Scholar
  10. Libicki, M. C. (2007). Conquest in cyberspace: National security and information warfare. New York: Cambridge University Press.CrossRefGoogle Scholar
  11. MacKinnon, R. (2012). Consent of the networked: The worldwide struggle for Internet freedom. New York: Basic Books.Google Scholar
  12. Stevens, T. (2012). A cyberwar of ideas? Deterrence and norms in cyberspace. Contemporary Security Policy, 33(1), 148–170.CrossRefGoogle Scholar
  13. Taddeo, M. (2012). Information warfare: a philosophical perspective. Philosophy & Technology, 25(1), 105–120.CrossRefGoogle Scholar
  14. Virilio, P. (2008). Negative horizon. London: Continuum.Google Scholar
  15. Wertheim, M. (1997). The pearly gates of cyberspace: A history of cyberspace from Dante to the Internet. London: Virago.Google Scholar
  16. Yould, R. E. D. (2003). Beyond the American fortress: understanding homeland security in the information age. In R. Latham (Ed.), Bombs and bandwidth: The emerging relationship between information technology and security (pp. 74–98). New York: The New Press.Google Scholar

Copyright information

© Springer-Verlag 2012

Authors and Affiliations

  1. 1.Department of War StudiesKing’s College LondonLondonUK

Personalised recommendations