Just Information Warfare
In this chapter I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold, filling the theoretical vacuum surrounding this phenomenon and providing the conceptual grounding for the definition of new ethical regulations for information warfare. I argue that Just War Theory is a necessary but not sufficient instrument for considering the ethical implications of information warfare and that a suitable ethical analysis of this kind of warfare is developed when Just War Theory is merged with Information Ethics. In the initial part of the chapter, I describe information warfare and its main features and highlight the problems that arise when Just War Theory is endorsed as a means of addressing ethical problems engendered by this kind of warfare. In the final part, I introduce the main aspects of Information Ethics and define three principles for a just information warfare resulting from the integration of Just War Theory and Information Ethics.
KeywordsCyber Conflicts Entropy Information Ethics Information War Just War Theory War
- Abiola, A., J. Munoz, and W. Buchanan. 2004. Analysis and detection of cruising computer viruses. In In: Proceedings of 3rd EIWC.Google Scholar
- Arquilla, J., and D.F. Ronfeldt (eds.). 1997. In Athena’s camp: Preparing for conflict in the information age. Santa Monica: Rand.Google Scholar
- Asaro, P. 2008. How just could a robot war be? In Current issues in computing and philosophy, ed. P. Brey, A. Briggle, and K. Waelbers, 50–64. Amsterdam: IOS Press.Google Scholar
- Benbow, T. 2004. The magic bullet?: Understanding the “Revolution in Military Affairs”. London: Brassey’s.Google Scholar
- Blackmore, T. 2011. War X. Toronto: University of Toronto Press.Google Scholar
- Bok, S. 1999. Lying: Moral choice in public and private life. 2nd Vintage Books ed. New York: Vintage Books.Google Scholar
- Bowden, M. 2011. Worm: The first digital world war. New York: Atlantic Monthly Press.Google Scholar
- Brenner, J. 2011. America the vulnerable: New technology and the next threat to national security. New York: Penguin Press.Google Scholar
- Clarke, R.A. 2012. Cyber war: The next threat to national security and what to do about it. 1st Ecco pbk. edn. New York: Ecco.Google Scholar
- Denning, D. 2007. The ethics of cyber conflict. In Information and computer ethics. Hoboken: Wiley.Google Scholar
- Dipert, R. 2013. The essential features of an ontology for cyberwarfare. In Conflict and cooperation in cyberspace, ed. Panayotis Yannakogeorgos and Adam Lowther, 35–48. Boca Raton: Taylor & Francis. http://www.crcnetbase.com/doi/abs/10.1201/b15253-7.
- Floridi, L. 2006. Information ethics, its nature and scope. SIGCAS Comput. Soc. 36(3): 21–36. doi: 10.1145/1195716.1195719.
- Floridi, L. 2007. Understanding information ethics. APA Newsletter on Philosophy and Computers 7(1): 3–12.Google Scholar
- Floridi, L. 2008. The method of levels of abstraction. Minds and Machines 18(3):303–329. doi: 10.1007/s11023-008-9113-7.
- Floridi, L. 2013. Ethics of information. [S.l.]: Oxford University Press.Google Scholar
- Floridi, L. 2014. The fourth revolution, how the infosphere is reshaping human reality. Oxford: Oxford University Press.Google Scholar
- Floridi, L., and J. Sanders. 2001. Artificial evil and the foundation of computer ethics. Ethics and Information Technology 3(1): 55–66.Google Scholar
- Gelven, M. 1994. War and existence: A philosophical inquiry. University Park: Pennsylvania State University Press.Google Scholar
- Hepburn, R.W. 1984. “Wonder” and other essays: Eight studies in aesthetics and neighbouring fields. Edinburgh: University Press.Google Scholar
- “ICRC Databases on International Humanitarian Law.” 00:00:00.0. http://www.icrc.org/ihl/INTRO/470.
- Libicki, M. 1996. What is information warfare? Washington, D.C.: National Defense University Press.Google Scholar
- Perry, D. 2006. ‘Repugnant Philosophy’: Ethics, espionage, and covert action. In Ethics of spying: A reader for the intelligence professional, ed. J Goldman. Lanham: Scarecrow Press.Google Scholar
- Schmitt, M.N. 1999. The principle of discrimination in 21st century warfare. SSRN Scholarly Paper ID 1600631. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=1600631.
- Schwartau, W. 1994. Information warfare: Chaos on the electronic superhighway. 1st ed. New York/Emeryville: Thunder’s Mouth Press /Distributed by Publishers Group West.Google Scholar
- Shulman, M. R. 1999. Discrimination in the laws of information warfare. SSRN Scholarly Paper ID 1287181. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=1287181
- Toffler, A., and A. Toffler. 1997. Foreword: The new intangibles. In In Athena’s camp preparing for conflict in the information age, ed. Arquilla John and David F. Ronfeld. Santa Monica: Rand.Google Scholar
- Waltz, E. 1998. Information warfare: Principles and operations. Boston: Artech House.Google Scholar
- Walzer, M. 2006. Just and unjust wars: A moral argument with historical illustrations, 4th ed. New York: Basic Books.Google Scholar
- Withman, J. 2013. Is just war theory obsolete?”. In Routledge handbook of ethics and war: Just war theory in the 21st century, ed. Allhoff Fritz, Nicholas G. Evans, and Henschke Adam, 23–34. New York: Routledge.Google Scholar