|
Showing 1 - 12 of
12 matches in All Departments
Philosophical and ethical discussions of warfare are often tied to
emerging technologies and techniques. Today we are presented with
what many believe is a radical shift in the nature of war-the
realization of conflict in the cyber-realm, the so-called "fifth
domain " of warfare. Does an aggressive act in the cyber-realm
constitute an act of war? If so, what rules should govern such
warfare? Are the standard theories of just war capable of analyzing
and assessing this mode of conflict? These changing circumstances
present us with a series of questions demanding serious attention.
Is there such a thing as cyberwarfare? How do the existing rules of
engagement and theories from the just war tradition apply to
cyberwarfare? How should we assess a cyber-attack conducted by a
state agency against private enterprise and vice versa?
Furthermore, how should actors behave in the cyber-realm? Are there
ethical norms that can be applied to the cyber-realm? Are the
classic just war constraints of non-combatant immunity and
proportionality possible in this realm? Especially given the idea
that events that are constrained within the cyber-realm do not
directly physically harm anyone, what do traditional ethics of war
conventions say about this new space? These questions strike at the
very center of contemporary intellectual discussion over the ethics
of war. In twelve original essays, plus a foreword from John
Arquilla and an introduction, Binary Bullets: The Ethics of
Cyberwarfare, engages these questions head on with contributions
from the top scholars working in this field today.
This insightful book provides an analysis of the central ethical
issues that have arisen in combatting global terrorism and, in
particular, jihadist terrorist groups, notably Al Qaeda, Islamic
State and their affiliates. Chapters explore the theoretical
problems that arise in relation to terrorism, such as the
definition of terrorism and the concept of collective
responsibility, and consider specific ethical issues in
counter-terrorism. The book discusses a range of key topics
including targeted killing, enhanced interrogation of terrorists,
preventive detention, freedom of expression and terrorist content
on social media, bulk metadata collection and responding to
terrorist attacks that use weapons of mass destruction. It also
explores ethical issues that have often been neglected, such as
psychological warfare and stings. Taking a practical approach, the
book offers recommendations for resolving these ethical problems in
counter-terrorism. Integrating philosophical and legal analysis
with empirical evidence, this book will be critical reading for
scholars and students of human rights, international relations and
terrorism and security law. Its use of specific examples of
terrorist organisations, tactics and outcomes will also be valuable
for policy-makers in the field.
This open access book brings together a range of contributions that
seek to explore the ethical issues arising from the overlap between
counter-terrorism, ethics, and technologies. Terrorism and our
responses pose some of the most significant ethical challenges to
states and people. At the same time, we are becoming increasingly
aware of the ethical implications of new and emerging technologies.
Whether it is the use of remote weapons like drones as part of
counter-terrorism strategies, the application of surveillance
technologies to monitor and respond to terrorist activities, or
counterintelligence agencies use of machine learning to detect
suspicious behavior and hacking computers to gain access to
encrypted data, technologies play a significant role in modern
counter-terrorism. However, each of these technologies carries with
them a range of ethical issues and challenges. How we use these
technologies and the policies that govern them have broader impact
beyond just the identification and response to terrorist
activities. As we are seeing with China, the need to respond to
domestic terrorism is one of the justifications for their rollout
of the "social credit system." Counter-terrorism technologies can
easily succumb to mission creep, where a technology's exceptional
application becomes normalized and rolled out to society more
generally. This collection is not just timely but an important
contribution to understand the ethics of counter-terrorism and
technology and has far wider implications for societies and nations
around the world.
This handbook provides a comprehensive analysis of the contemporary
theory, practice and themes in the study of national security. Part
1: Theories examines how national security has been conceptualised
and formulated within the disciplines international relations,
security studies and public policy. Part 2: Actors shifts the focus
of the volume from these disciplinary concerns to consideration of
how core actors in international affairs have conceptualised and
practiced national security over time. Part 3: Issues then provides
in-depth analysis of how individual security issues have been
incorporated into prevailing scholarly and policy paradigms on
national security. While security now seems an all-encompassing
phenomenon, one general proposition still holds: national interests
and the nation-state remain central to unlocking security puzzles.
As normative values intersect with raw power; as new threats meet
old ones; and as new actors challenge established elites, making
sense out of the complex milieu of security theories, actors, and
issues is a crucial task - and is the main accomplishment of this
book.
This new Handbook offers a comprehensive overview of contemporary
extensions and alternatives to the just war tradition in the field
of the ethics of war. The modern history of just war has typically
assumed the primacy of four particular elements: jus ad bellum, jus
in bello, the state actor, and the solider. This book will put
these four elements under close scrutiny, and will explore how they
fare given the following challenges: * What role do the traditional
elements of jus ad bellum and jus in bello-and the constituent
principles that follow from this distinction-play in modern
warfare? Do they adequately account for a normative theory of war?
* What is the role of the state in warfare? Is it or should it be
the primary actor in just war theory? * Can a just war be
understood simply as a response to territorial aggression between
state actors, or should other actions be accommodated under
legitimate recourse to armed conflict? * Is the idea of combatant
qua state-employed soldier a valid ethical characterization of
actors in modern warfare? * What role does the technological
backdrop of modern warfare play in understanding and realizing just
war theories? Over the course of three key sections, the
contributors examine these challenges to the just war tradition in
a way that invigorates existing discussions and generates new
debate on topical and prospective issues in just war theory. This
book will be of great interest to students of just war theory, war
and ethics, peace and conflict studies, philosophy and security
studies.
This new Handbook offers a comprehensive overview of contemporary
extensions and alternatives to the just war tradition in the field
of the ethics of war. The modern history of just war has typically
assumed the primacy of four particular elements: jus ad bellum, jus
in bello, the state actor, and the solider. This book will put
these four elements under close scrutiny, and will explore how they
fare given the following challenges: * What role do the traditional
elements of jus ad bellum and jus in bello-and the constituent
principles that follow from this distinction-play in modern
warfare? Do they adequately account for a normative theory of war?
* What is the role of the state in warfare? Is it or should it be
the primary actor in just war theory? * Can a just war be
understood simply as a response to territorial aggression between
state actors, or should other actions be accommodated under
legitimate recourse to armed conflict? * Is the idea of combatant
qua state-employed soldier a valid ethical characterization of
actors in modern warfare? * What role does the technological
backdrop of modern warfare play in understanding and realizing just
war theories? Over the course of three key sections, the
contributors examine these challenges to the just war tradition in
a way that invigorates existing discussions and generates new
debate on topical and prospective issues in just war theory. This
book will be of great interest to students of just war theory, war
and ethics, peace and conflict studies, philosophy and security
studies.
This open access book brings together a range of contributions that
seek to explore the ethical issues arising from the overlap between
counter-terrorism, ethics, and technologies. Terrorism and our
responses pose some of the most significant ethical challenges to
states and people. At the same time, we are becoming increasingly
aware of the ethical implications of new and emerging technologies.
Whether it is the use of remote weapons like drones as part of
counter-terrorism strategies, the application of surveillance
technologies to monitor and respond to terrorist activities, or
counterintelligence agencies use of machine learning to detect
suspicious behavior and hacking computers to gain access to
encrypted data, technologies play a significant role in modern
counter-terrorism. However, each of these technologies carries with
them a range of ethical issues and challenges. How we use these
technologies and the policies that govern them have broader impact
beyond just the identification and response to terrorist
activities. As we are seeing with China, the need to respond to
domestic terrorism is one of the justifications for their rollout
of the "social credit system." Counter-terrorism technologies can
easily succumb to mission creep, where a technology's exceptional
application becomes normalized and rolled out to society more
generally. This collection is not just timely but an important
contribution to understand the ethics of counter-terrorism and
technology and has far wider implications for societies and nations
around the world.
This handbook provides a comprehensive analysis of the contemporary
theory, practice and themes in the study of national security. Part
1: Theories examines how national security has been conceptualised
and formulated within the disciplines international relations,
security studies and public policy. Part 2: Actors shifts the focus
of the volume from these disciplinary concerns to consideration of
how core actors in international affairs have conceptualised and
practiced national security over time. Part 3: Issues then provides
in-depth analysis of how individual security issues have been
incorporated into prevailing scholarly and policy paradigms on
national security. While security now seems an all-encompassing
phenomenon, one general proposition still holds: national interests
and the nation-state remain central to unlocking security puzzles.
As normative values intersect with raw power; as new threats meet
old ones; and as new actors challenge established elites, making
sense out of the complex milieu of security theories, actors, and
issues is a crucial task - and is the main accomplishment of this
book.
People increasingly live online, sharing publicly what might have
once seemed private, but at the same time are enraged by extremes
of government surveillance and the corresponding invasion into our
private lives. In this enlightening work, Adam Henschke re-examines
privacy and property in the age of surveillance in order to
understand not only the importance of these social conventions, but
also their moral relevance. By analyzing identity and information,
and presenting a case for a relation between the two, he explains
the moral importance of virtual identities and offers an ethically
robust solution to designing surveillance technologies. This book
should be read by anyone interested in surveillance technology, new
information technology more generally, and social concepts like
privacy and property.
People increasingly live online, sharing publicly what might have
once seemed private, but at the same time are enraged by extremes
of government surveillance and the corresponding invasion into our
private lives. In this enlightening work, Adam Henschke re-examines
privacy and property in the age of surveillance in order to
understand not only the importance of these social conventions, but
also their moral relevance. By analyzing identity and information,
and presenting a case for a relation between the two, he explains
the moral importance of virtual identities and offers an ethically
robust solution to designing surveillance technologies. This book
should be read by anyone interested in surveillance technology, new
information technology more generally, and social concepts like
privacy and property.
Chapter 10 is published open access and free to read or download
from Oxford Academic. The Ethics of Surveillance in Times of
Emergency draws from the use of modern surveillance technologies
during the COVID-19 pandemic to explore a set of issues and
challenges facing decision-makers and designers in times of
emergency: how do we respond to emergencies in ways that are both
consistent with democratic and community principles, and that are
ethically justifiable? Emergencies, like public health pandemics,
not only place stress on existing infrastructure and communities,
but put significant pressure on our decision-making. The use of
surveillance technologies during public health crises is a vital
frame to explore the challenge of acting in times of emergency.
Moreover, as an exercise in reflective applied ethics, this book
does not just seek to apply a given theory or principle to the
problem of surveillance in times of emergency, but to use the
challenges facing us to critically engage with, reflect upon, and
develop those theories and principles. The book's authors recognize
this challenge—is it possible to respond to exceptional
conditions in ways that either preserve our core values, or must
these core values be subsumed under the need to respond to the
particular emergency? The book offers responses to this challenge
by looking at three interrelated ways in which can manifest: first,
the democratic challenges; second, the ethical challenges; and
third the design challenges faced in developing ethical solutions.
Philosophical and ethical discussions of warfare are often tied to
emerging technologies and techniques. Today we are presented with
what many believe is a radical shift in the nature of war-the
realization of conflict in the cyber-realm, the so-called "fifth
domain " of warfare. Does an aggressive act in the cyber-realm
constitute an act of war? If so, what rules should govern such
warfare? Are the standard theories of just war capable of analyzing
and assessing this mode of conflict? These changing circumstances
present us with a series of questions demanding serious attention.
Is there such a thing as cyberwarfare? How do the existing rules of
engagement and theories from the just war tradition apply to
cyberwarfare? How should we assess a cyber-attack conducted by a
state agency against private enterprise and vice versa?
Furthermore, how should actors behave in the cyber-realm? Are there
ethical norms that can be applied to the cyber-realm? Are the
classic just war constraints of non-combatant immunity and
proportionality possible in this realm? Especially given the idea
that events that are constrained within the cyber-realm do not
directly physically harm anyone, what do traditional ethics of war
conventions say about this new space? These questions strike at the
very center of contemporary intellectual discussion over the ethics
of war. In twelve original essays, plus a foreword from John
Arquilla and an introduction, Binary Bullets: The Ethics of
Cyberwarfare, engages these questions head on with contributions
from the top scholars working in this field today.
|
You may like...
Fast X
Vin Diesel, Jason Momoa, …
DVD
R132
Discovery Miles 1 320
Wonka
Timothee Chalamet
Blu-ray disc
R250
R190
Discovery Miles 1 900
|