On the Risks of Relying on Analogies to Understand Cyber Conflicts
暂无分享,去创建一个
[1] FloridiLuciano. The Method of Levels of Abstraction , 2008 .
[2] T. Stevens,et al. Analogical reasoning and cyber security , 2013, Security Dialogue.
[3] L. Floridi,et al. Data ethics , 2021, Effective Directors.
[4] M. Taddeo,et al. Ethics and Policies for Cyber Operations , 2017 .
[5] Mary Ellen O'Connell. Cyber Security Without Cyber War , 2012 .
[6] Michael N. Schmitt. Cyberspace and International Law: The Penumbral Mist of Uncertainty , 2013 .
[7] Randall R. Dipert,et al. THE ESSENTIAL FEATURES OF AN ONTOLOGY FOR CYBERWARFARE , 2016 .
[8] Luciano Floridi,et al. Toleration and the Design of Norms , 2015, Sci. Eng. Ethics.
[9] Herbert Lin,et al. Cyber conflict and international humanitarian law , 2012, International Review of the Red Cross.
[10] M. Engelmann. The Philosophical Investigations , 2013 .
[11] Edsger W. Dijkstra,et al. Structured programming , 1972, A.P.I.C. Studies in data processing.
[12] N. Falconer. Structured Programming , 1973, Nature.
[13] R. Powell,et al. Nuclear Deterrence Theory: The Search for Credibility , 1990 .
[14] M. Taddeo. Information Warfare: A Philosophical Perspective , 2011, Philosophy & Technology.
[15] Mario Blaser. POLITICAL ONTOLOGY , 2009 .
[16] L. Floridi,et al. The Ethics of Information Warfare , 2014 .
[17] P. Howard,et al. Routledge Handbook of Internet Politics , 2018 .
[18] Mariarosaria Taddeo,et al. Just Information Warfare , 2014, Topoi.
[19] Robert E. Goodin,et al. The Oxford Handbook of Political Science , 2011 .