Just Information Warfare

In this article I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold: filling the theoretical vacuum surrounding this phenomenon and providing the conceptual grounding for the definition of new ethical regulations for information warfare. I argue that Just War Theory is a necessary but not sufficient instrument for considering the ethical implications of information warfare and that a suitable ethical analysis of this kind of warfare is developed when Just War Theory is merged with Information Ethics. In the initial part of the article, I describe information warfare and its main features and highlight the problems that arise when Just War Theory is endorsed as a means of addressing ethical problems engendered by this kind of warfare. In the final part, I introduce the main aspects of Information Ethics and define three principles for a just information warfare resulting from the integration of Just War Theory and Information Ethics.

[1]  J. Whitman Is Just War Theory Obsolete , 2013 .

[2]  Luciano Floridi,et al.  Information ethics, its nature and scope , 2006, CSOC.

[3]  Michael N. Schmitt Cyberspace and International Law: The Penumbral Mist of Uncertainty , 2013 .

[4]  Peter Asaro,et al.  How Just Could a Robot War Be , 2008 .

[5]  Mariarosaria Taddeo,et al.  Analyzing Peer-to-Peer Technology Using Information Ethics , 2011, Inf. Soc..

[6]  John Arquilla TWENTY YEARS OF CYBERWAR , 2013 .

[7]  M. Taddeo Cyber Security and Individual Rights, Striking the Right Balance , 2013, Philosophy & Technology.

[8]  Edward L. Waltz,et al.  Information Warfare Principles and Operations , 1998 .

[9]  M. Lakomy Richard A. Clarke, Robert K. Knake: Cyber War The Next Threat to National Security and What to Do About It New York: Ecco, 2010, ss. 290. , 2013 .

[10]  Mark Bowden Worm: The First Digital World War , 2011 .

[11]  D. Denning The Ethics of Cyber Conflict , 2009 .

[12]  Luciano Floridi,et al.  The Method of Levels of Abstraction , 2008, Minds and Machines.

[13]  George R. Lucas Jus in Silico , 2013 .

[14]  Luciano Floridi,et al.  On the intrinsic value of information objects and the infosphere , 2002, Ethics and Information Technology.

[15]  Fritz Allhoff,et al.  Routledge Handbook of Ethics and War: Just War Theory in the 21st Century , 2013 .

[16]  Alvin,et al.  FOREWORD : THE NEW INTANGIBLES , 1997 .

[17]  H. Besser,et al.  : In Athena's Camp: Preparing for Conflict in the Information Age , 2000 .

[18]  M. Walzer,et al.  JUST AND UNJUST WARS: A MORAL ARGUMENT WITH HISTORICAL ILLUSTRATIONS; THE GREAT WAR AND MODERN MEMORY , 1978 .

[19]  M. Taddeo Information Warfare: A Philosophical Perspective , 2011, Philosophy & Technology.

[20]  J. Goldman Ethics of spying : a reader for the intelligence professional , 2006 .

[21]  William J Buchanan,et al.  Analysis and detection of cruising computer viruses. , 2004 .

[22]  Mark R. Shulman Discrimination in the Laws of Information Warfare , 1999 .

[23]  M. Schmitt The Principle of Discrimination in 21st Century Warfare , 1999 .

[24]  Gerald L. Kovacich,et al.  Information Warfare , 2009, Encyclopedia of Information Assurance.

[25]  L. Floridi,et al.  Artificial evil and the foundation of computer ethics , 2001, Ethics and Information Technology.

[26]  Luciano Floridi,et al.  The Fourth Revolution: How the infosphere is reshaping human reality , 2014 .

[27]  R. Hepburn "Wonder" and other essays : eight studies in aesthetics and neighbouring fields , 1984 .

[28]  John Arquilla,et al.  In Athena's Camp: Preparing for Conflict in the Information Age , 1997 .

[29]  Randall R. Dipert,et al.  THE ESSENTIAL FEATURES OF AN ONTOLOGY FOR CYBERWARFARE , 2016 .

[30]  Winn Schwartau,et al.  Information Warfare: Chaos on the Electronic Superhighway , 1994 .

[31]  Tim Benbow,et al.  The Magic Bullet? Understanding the 'Revolution in Military Affairs' , 2004 .

[32]  A. Briggle,et al.  Current issues in computing and philosophy , 2008 .

[33]  M. Taddeo,et al.  The Case of Online Trust , 2010 .

[34]  D. Perry "Repugnant Philosophy": Ethics, Espionage, and Covert Action1 , 1995 .

[35]  Luciano Floridi,et al.  On the Morality of Artificial Agents , 2004, Minds and Machines.

[36]  R. Dipert The Ethics of Cyberwarfare , 2010 .

[37]  É. Durand Revolution in Military Affairs , 2003 .

[38]  John Arquilla Can information warfare ever be just? , 1998, Ethics and Information Technology.

[39]  J. Britz Understanding Information Ethics , 2013 .

[40]  Matteo Turilli,et al.  The ethics of information transparency , 2009, Ethics and Information Technology.

[41]  Richard Lindley Lying: Moral Choice in Public and Private Life , 1980 .

[42]  Edward T. Barrett WARFARE IN A NEW DOMAIN: THE ETHICS OF MILITARY CYBER-OPERATIONS , 2013 .

[43]  M. Turilli The case of on-line trust , 2010 .

[44]  Michael N. Schmitt,et al.  Tallinn Manual on the International Law applicable to Cyber Warfare: prepared by the International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence , 2017 .

[45]  Richard A. Clarke,et al.  Cyber War: The Next Threat to National Security and What to Do About It , 2010 .

[46]  M Curran,et al.  The Ethics of Information , 1991, The Journal of nursing administration.

[47]  M. Taddeo,et al.  Internet Neutrality: Ethical Issues in the Internet Environment , 2012 .

[48]  S. Bok,et al.  Lying: Moral Choice in Public and Private Life , 1979 .

[49]  Michael Gelven War and Existence: A Philosophical Inquiry , 1993 .