MARC details
000 -LEADER |
fixed length control field |
05354cam a2200421 i 4500 |
001 - CONTROL NUMBER |
control field |
19013515 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220214090644.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
160311s2017 nyua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2016009377 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780190276522 |
Qualifying information |
hardback |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
EG-CaTKH |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
U167.5.C92 |
Item number |
L83 2017 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
172.42 LU. E 2017 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Lucas, George R., |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Ethics and cyber warfare : |
Remainder of title |
the quest for responsible security in the age of digital warfare / |
Statement of responsibility, etc. |
George Lucas. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
New York, NY : |
Name of producer, publisher, distributor, manufacturer |
Oxford University Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
2017. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xii, 187 pages : |
Other physical details |
illustration ; |
Dimensions |
25 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (pages 167-173) and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction: Crime or Warfare?. Cyber (in)security : threat assessment in the cyber domain : What, when, and where? ; How? ; Why? ; Three ways of being a hacktivist ; Conventional warfare ; Unrestricted warfare ; State-sponsored hacktivism as a new form of warfare -- Is there a role for ethics or law in cyber conflict? : Irregular war and cyberwar ; Ethics and "folk morality" ; Ethics and the law ; Ethics and just war theory ; Strategic plan of the book ; Applying moral theories in the cyber domain -- The Tallinn Manual: international law in the aftermath of Estonia : International law applicable to Stuxnet ; International law and state-sponsored hacktivism ; The Tallinn Manual ; International law and the Estonian cyber attacks ; "There ought to be a law!" ; Why the Tallinn Manual failed -- Genuine ethics versus "folk morality" in cyberspace : The advantages of taking the "moral point of view" ; The challenge of folk morality for authentic ethics ; The origins of universal moral norms ; Thinking ethically about conflict in the cyber domain ; Just war theory as part of a "morality of exceptions" ; Jus in Bello and professional military ethics ; Jus in Silico: ethics and just war theory in the cyber domain -- If Aristotle waged cyberwar: how norms emerge from practice : Distinguishing between laws and norms ; The methodology of uncertainty: how do norms "emerge"? ; Do emergent moral norms provide effective governance? -- Privacy, anonymity, and the rise of state-sponsored hacktivism : Emergent norms and the rise of state-sponsored hacktivism ; The cunning of history ; Permissible preventive cyber self-defense ; Privacy, anonymity, and the sectors of vulnerability ; Cyber security measures for individuals ; Privacy versus anonymity ; A limited justification for anonymity ; Restricting anonymity while preserving privacy ; New "rules of the road" for cyber navigation -- NSA management directive #424: anticipatory national self-defense : Preventive war ; Initial public response ; The dilemma of Edward Snowden ; Government deception and public trust ; Defending national boundaries and personal liberties ; State norms for respecting sovereignty and attaining security -- Conclusion: Toward a "code of ethics" for cyber warriors. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence of cyber warfare, developing a practical moral code for this new form of conflict is more important than ever. In Ethics and Cyber Warfare, internationally-respected ethicist George Lucas delves into the confounding realm of cyber conflict. Comparing "state-sponsored hacktivism" to the transformative impact of "irregular warfare" in conventional armed conflict, Lucas offers a critique of legal approaches to governance, and outlines a new approach to ethics and "just war" reasoning. Lucas draws upon the political philosophies of Alasdair MacIntyre, John Rawls, and Jürgen Habermas to provide a framework for understanding these newly-emerging standards for cyber conflict, and ultimately presents a professional code of ethics for a new generation of "cyber warriors." Lucas concludes with a discussion of whether preemptive self-defense efforts - such as the massive government surveillance programs revealed by Edward Snowden - can ever be justified, addressing controversial topics such as privacy, anonymity, and public trust. Well-reasoned and timely, Ethics and Cyber Warfare is a must-read for anyone with an interest in cybercrime or cyberwar"--Jacket. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cyberspace operations (Military science) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
National security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Hacktivism. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
State crimes. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information warfare |
General subdivision |
Moral and ethical aspects. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information technology |
General subdivision |
Moral and ethical aspects. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Just war doctrine. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
P |
First Date, FD (RLIN) |
20220214 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |