메뉴 건너뛰기




Volumn 1, Issue 1, 2010, Pages 20-31

The ethics of cyberweapons in warfare

Author keywords

Attribution; Collateral damage; Cyberattack; Cyberweapons; Damage assessment; Ethics; Perfidy; Secrecy; Vulnerability; Weapons

Indexed keywords


EID: 84864153350     PISSN: 19473451     EISSN: 1947346X     Source Type: Journal    
DOI: 10.4018/jte.2010081002     Document Type: Article
Times cited : (35)

References (40)
  • 1
    • 79960310997 scopus 로고    scopus 로고
    • Ethics and information warfare
    • Z. Khalilzad, J. White, & A. Marsall (Eds.),Rand Corporation, Santa Monica, CA, USA
    • Arquilla, J. (1999). Ethics and information warfare. In Z. Khalilzad, J. White, & A. Marsall (Eds.), Strategic appraisal: the changing role of information in warfare (pp. 379-401). Rand Corporation, Santa Monica, CA, USA.
    • (1999) Strategic Appraisal: The Changing Role of Information in Warfare , pp. 379-401
    • Arquilla, J.1
  • 3
    • 84898313133 scopus 로고    scopus 로고
    • Network attack
    • US Army War College Quarterly
    • Bayles, W. (2001). Network attack. Parameters . US Army War College Quarterly, 31, 44-58.
    • (2001) Parameters , vol.31 , pp. 44-58
    • Bayles, W.1
  • 4
    • 0037991411 scopus 로고    scopus 로고
    • The globalization of jurisdiction
    • Berman, P. (2002). The globalization of jurisdiction. University of Pennsylvania Law Review, 151(2), 311-545. doi:10.2307/3312952 (Pubitemid 36567560)
    • (2002) University of Pennsylvania Law Review , vol.151 , Issue.2 , pp. 311-545
    • Berman, P.S.1
  • 6
    • 84864127509 scopus 로고    scopus 로고
    • High technology war and 'surgical strikes [ACMSIGCAS]
    • Bissett, A. (2004). High technology war and 'surgical strikes'. [ACM SIGCAS]. Computers & Society, 32(7), 4.
    • (2004) Computers & Society , vol.32 , Issue.7 , pp. 4
    • Bissett, A.1
  • 7
    • 0343279272 scopus 로고
    • Oxford, UK: Oxford University Press
    • Bok, S. (1986). Secrets. Oxford, UK: Oxford University Press.
    • (1986) Secrets
    • Bok, S.1
  • 8
    • 30344477251 scopus 로고    scopus 로고
    • Economically complex cyberattacks
    • DOI 10.1109/MSP.2005.146
    • Borg, S. (2005, November-December). Economically complex cyberattacks. IEEE Security and Privacy, 3(6), 64-67. doi:10.1109/MSP.2005.146 (Pubitemid 43060397)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.6 , pp. 64-67
    • Borg, S.1
  • 11
    • 84857872961 scopus 로고    scopus 로고
    • The ethics of cyber conflict
    • K. Himma, & H. Tavani (Eds.), New York: Wiley
    • Denning, D. (2007). The ethics of cyber conflict. In K. Himma, & H. Tavani (Eds.), Information and computer ethics. New York: Wiley.
    • (2007) Information and Computer Ethics
    • Denning, D.1
  • 12
    • 84864137614 scopus 로고    scopus 로고
    • Restoration component of business continuity planning
    • H. Tipton, & M. Krause (Eds.), CRC Press
    • Dorf, J., & Johnson, M. (2007). Restoration component of business continuity planning. In H. Tipton, & M. Krause (Eds.), Information security management handbook (6th ed.) (pp. 645-1654). CRC Press.
    • (2007) Information Security Management Handbook (6th ed.) , pp. 645-1654
    • Dorf, J.1    Johnson, M.2
  • 13
  • 17
    • 70849115871 scopus 로고    scopus 로고
    • The ethics of tracing hacker attacks through the machines of innocent persons
    • Himma, K. (2004). The ethics of tracing hacker attacks through the machines of innocent persons. International Journal of Information Ethics, 2(11), 1-13.
    • (2004) International Journal of Information Ethics , vol.2 , Issue.11 , pp. 1-13
    • Himma, K.1
  • 18
    • 84864146691 scopus 로고    scopus 로고
    • New tools, new rules: International law and information operations
    • G. David, & T. McKeldin (Eds.), Temple University Legal Studies Research PaperNo. 2007-15, Philadelphia, PA, USA
    • Hollis, D. (2007). New tools, new rules: international law and information operations. In G. David, & T. McKeldin (Eds.), The message of war: information, influence, and perception in armed conflict. Temple University Legal Studies Research Paper No. 2007- 15, Philadelphia, PA, USA.
    • (2007) The Message of War: Information, Influence, and Perception in Armed Conflict
    • Hollis, D.1
  • 19
    • 84864126836 scopus 로고    scopus 로고
    • ICRC (International Committee of the Red Cross). Retrieved December 1, 2007 from
    • ICRC (International Committee of the Red Cross). (2007). International humanitarian law - treaties and documents. Retrieved December 1, 2007 from www.icrc.org/icl.nsf.
    • (2007) International Humanitarian Law - Treaties and Documents
  • 20
    • 84864153207 scopus 로고    scopus 로고
    • Unexpected consequences from knock-on effects: A different standard for computer network operations?
    • Jensen, E. (2003). Unexpected consequences from knock-on effects: a different standard for computer network operations? American University International Law Review, 18, 1145-1188.
    • (2003) American University International Law Review , vol.18 , pp. 1145-1188
    • Jensen, E.1
  • 23
    • 84864146696 scopus 로고    scopus 로고
    • Ten information warfare trends
    • L. Janczewski & A. Colarik (Eds.), Hershey, PA, USA: IGI Global
    • Knapp, K., & Boulton, W. (2007). Ten information warfare trends. In L. Janczewski & A. Colarik (Eds.), Cyber Warfare and Cyber Terrorism (pp. 17-25). Hershey, PA, USA: IGI Global.
    • (2007) Cyber Warfare and Cyber Terrorism , pp. 17-25
    • Knapp, K.1    Boulton, W.2
  • 24
    • 34248536523 scopus 로고    scopus 로고
    • Root Kits - An operating systems viewpoint
    • DOI 10.1145/974104.974105
    • Kuhnhauser, W. (2004, January). Root kits: an operating systems viewpoint. ACM SIGOPS Operating Systems Review, 38(1), 12-23. doi:10.1145/974104.974105 (Pubitemid 46746975)
    • (2004) Operating Systems Review (ACM) , vol.38 , Issue.1 , pp. 12-23
    • Kuhnhauser, W.E.1
  • 28
    • 0003468598 scopus 로고    scopus 로고
    • (5th ed.). Boston, MA: Addison-Wesley Professional
    • Mel, H., & Baker, D. (2000). Cryptography decrypted (5th ed.). Boston, MA: Addison-Wesley Professional.
    • (2000) Cryptography Decrypted
    • Mel, H.1    Baker, D.2
  • 29
    • 84875627527 scopus 로고    scopus 로고
    • The legitimization of strategic information warfare: Ethical considerations
    • Fall, Retrieved November 23, 2005 from
    • Molander, R., & Siang, S. (1998, Fall). The legitimization of strategic information warfare: ethical considerations. AAAS Professional Ethics Report, 11(4). Retrieved November 23, 2005 from www. aaas.org/spp/sfrl/sfrl.htm.
    • (1998) AAAS Professional Ethics Report , vol.11 , pp. 4
    • Molander, R.1    Siang, S.2
  • 30
    • 0006984935 scopus 로고    scopus 로고
    • Princeton, NJ: Princeton University Press
    • Nardin, T. (Ed.). (1998). The ethics of war and peace. Princeton, NJ: Princeton University Press.
    • (1998) The Ethics of War and Peace
    • Nardin, T.1
  • 33
    • 84875600002 scopus 로고    scopus 로고
    • Retrieved February 6, 2009 from globalguerrillas
    • Robb, J. (2007). The U.S. and cyberwarfare. Retrieved February 6, 2009 from globalguerrillas. typepad.com/globalguerrillas/2007/12/the-us-andcyber. html.
    • (2007) The U.S. and Cyberwarfare
    • Robb, J.1
  • 34
    • 70449654593 scopus 로고    scopus 로고
    • Wired warfare: Computer network attack and jus in bello
    • Schmitt, M. (2002). Wired warfare: computer network attack and jus in bello. International Review of the Red Cross, 84(846), 365-399.
    • (2002) International Review of the Red Cross , vol.84 , Issue.846 , pp. 365-399
    • Schmitt, M.1
  • 40
    • 84875586831 scopus 로고    scopus 로고
    • White Wolf Security. Retrieved February 6
    • White Wolf Security. Offensive operations in cyberspace. Retrieved February 6, 2009 from www. whitewolfsecurity.com/publications/offensive-ops. php.
    • (2009) Offensive operations in Cyberspace


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.