Versandkostenfrei innerhalb Deutschlands
124,99 €
inkl. MwSt.
Versandkostenfrei*
Erscheint vorauss. 1. September 2027
Melden Sie sich
hier
hier
für den Produktalarm an, um über die Verfügbarkeit des Produkts informiert zu werden.
62 °P sammeln
- Gebundenes Buch
This book offers a clear and accessible introduction to the ethical analysis of cyber-conflicts, covering such topics as cyber-crime, cyber-terrorism, and cyber-warfare and cyber-activism.
Andere Kunden interessierten sich auch für
Kevin MacnishThe Ethics of Surveillance167,99 €
Eric R. BootThe Ethics of Whistleblowing74,99 €
A. J. CoatesThe ethics of war106,99 €
A. J. CoatesThe ethics of war23,99 €
Fidèle IngiyimbereVirtues from Hell: Survivors of Conflicts and the Reconstruction-Reconciliation Processes83,99 €
The 2019 Yearbook of the Digital Ethics Lab38,99 €
The 2019 Yearbook of the Digital Ethics Lab38,99 €-
-
-
This book offers a clear and accessible introduction to the ethical analysis of cyber-conflicts, covering such topics as cyber-crime, cyber-terrorism, and cyber-warfare and cyber-activism.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 224
- Erscheinungstermin: 1. September 2027
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781138827202
- ISBN-10: 1138827207
- Artikelnr.: 42739885
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 224
- Erscheinungstermin: 1. September 2027
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781138827202
- ISBN-10: 1138827207
- Artikelnr.: 42739885
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Content list and chapters overview Introduction Part I Chapter I Information revolution, information societies, and the role of cyber conflicts
Introduction
Information revolution
Information societies
Cyber power
"Those who live by the digit, die by the digit"
Conclusion Chapter II Mapping cyber conflicts and the ethical problems that they pose
Introduction
Cyber conflicts: their nature
Dual use, Vulnerabilities, and cyber weapons
Conclusion Chapter III Ethical problems of cybercrime and cyber terrorism
Introduction
Main actors and responsibilities
Ethical risks and proportionality of responses
Conclusion Chapter IV Ethics of cyber activism and hacktivism
Introduction
Activism, cyber activism, and hacktivism
Ethical impact of ICTs on civil and political participation
Conclusion Chapter V Automation and moral responsibility
Introduction
Automation in cyber conflicts
Moral responsibility and artificial agents 2 o Attributing moral responsibility in automated cyber conflicts
Conclusion Part II Chapter VI Ethical theories of warfare
Introduction
War and Warfare
Pacifism
Realism
Just War Theory
Conclusion Chapter VII Cyber warfare and cyber operations
Introduction
Cyber warfare and cyber operations: what count as a harmed attack?
The risks of cyber warfare
Conclusion Chapter VIII Cyber warfare and Just War Theory
Introduction
Cyber warfare and jus ad bellum o Just cause o More good than harm o Pre-emptive and preventive cyber warfare
Cyber warfare and jus in bello o Discrimination o Proportionality
Conclusion Chapter IX Cyber deterrence and the ethics of international relations in cyberspace
Introduction
Deterrence
Cyber deterrence: actors and responsibilities
Conclusions
Introduction
Information revolution
Information societies
Cyber power
"Those who live by the digit, die by the digit"
Conclusion Chapter II Mapping cyber conflicts and the ethical problems that they pose
Introduction
Cyber conflicts: their nature
Dual use, Vulnerabilities, and cyber weapons
Conclusion Chapter III Ethical problems of cybercrime and cyber terrorism
Introduction
Main actors and responsibilities
Ethical risks and proportionality of responses
Conclusion Chapter IV Ethics of cyber activism and hacktivism
Introduction
Activism, cyber activism, and hacktivism
Ethical impact of ICTs on civil and political participation
Conclusion Chapter V Automation and moral responsibility
Introduction
Automation in cyber conflicts
Moral responsibility and artificial agents 2 o Attributing moral responsibility in automated cyber conflicts
Conclusion Part II Chapter VI Ethical theories of warfare
Introduction
War and Warfare
Pacifism
Realism
Just War Theory
Conclusion Chapter VII Cyber warfare and cyber operations
Introduction
Cyber warfare and cyber operations: what count as a harmed attack?
The risks of cyber warfare
Conclusion Chapter VIII Cyber warfare and Just War Theory
Introduction
Cyber warfare and jus ad bellum o Just cause o More good than harm o Pre-emptive and preventive cyber warfare
Cyber warfare and jus in bello o Discrimination o Proportionality
Conclusion Chapter IX Cyber deterrence and the ethics of international relations in cyberspace
Introduction
Deterrence
Cyber deterrence: actors and responsibilities
Conclusions
Content list and chapters overview Introduction Part I Chapter I Information revolution, information societies, and the role of cyber conflicts
Introduction
Information revolution
Information societies
Cyber power
"Those who live by the digit, die by the digit"
Conclusion Chapter II Mapping cyber conflicts and the ethical problems that they pose
Introduction
Cyber conflicts: their nature
Dual use, Vulnerabilities, and cyber weapons
Conclusion Chapter III Ethical problems of cybercrime and cyber terrorism
Introduction
Main actors and responsibilities
Ethical risks and proportionality of responses
Conclusion Chapter IV Ethics of cyber activism and hacktivism
Introduction
Activism, cyber activism, and hacktivism
Ethical impact of ICTs on civil and political participation
Conclusion Chapter V Automation and moral responsibility
Introduction
Automation in cyber conflicts
Moral responsibility and artificial agents 2 o Attributing moral responsibility in automated cyber conflicts
Conclusion Part II Chapter VI Ethical theories of warfare
Introduction
War and Warfare
Pacifism
Realism
Just War Theory
Conclusion Chapter VII Cyber warfare and cyber operations
Introduction
Cyber warfare and cyber operations: what count as a harmed attack?
The risks of cyber warfare
Conclusion Chapter VIII Cyber warfare and Just War Theory
Introduction
Cyber warfare and jus ad bellum o Just cause o More good than harm o Pre-emptive and preventive cyber warfare
Cyber warfare and jus in bello o Discrimination o Proportionality
Conclusion Chapter IX Cyber deterrence and the ethics of international relations in cyberspace
Introduction
Deterrence
Cyber deterrence: actors and responsibilities
Conclusions
Introduction
Information revolution
Information societies
Cyber power
"Those who live by the digit, die by the digit"
Conclusion Chapter II Mapping cyber conflicts and the ethical problems that they pose
Introduction
Cyber conflicts: their nature
Dual use, Vulnerabilities, and cyber weapons
Conclusion Chapter III Ethical problems of cybercrime and cyber terrorism
Introduction
Main actors and responsibilities
Ethical risks and proportionality of responses
Conclusion Chapter IV Ethics of cyber activism and hacktivism
Introduction
Activism, cyber activism, and hacktivism
Ethical impact of ICTs on civil and political participation
Conclusion Chapter V Automation and moral responsibility
Introduction
Automation in cyber conflicts
Moral responsibility and artificial agents 2 o Attributing moral responsibility in automated cyber conflicts
Conclusion Part II Chapter VI Ethical theories of warfare
Introduction
War and Warfare
Pacifism
Realism
Just War Theory
Conclusion Chapter VII Cyber warfare and cyber operations
Introduction
Cyber warfare and cyber operations: what count as a harmed attack?
The risks of cyber warfare
Conclusion Chapter VIII Cyber warfare and Just War Theory
Introduction
Cyber warfare and jus ad bellum o Just cause o More good than harm o Pre-emptive and preventive cyber warfare
Cyber warfare and jus in bello o Discrimination o Proportionality
Conclusion Chapter IX Cyber deterrence and the ethics of international relations in cyberspace
Introduction
Deterrence
Cyber deterrence: actors and responsibilities
Conclusions







