Ethics and cyber warfare : (Record no. 513)

MARC details
000 -LEADER
fixed length control field 05354cam a2200421 i 4500
001 - CONTROL NUMBER
control field 19013515
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220214090644.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160311s2017 nyua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2016009377
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780190276522
Qualifying information hardback
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency EG-CaTKH
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number U167.5.C92
Item number L83 2017
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 172.42 LU. E 2017
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Lucas, George R.,
Relator term author.
245 10 - TITLE STATEMENT
Title Ethics and cyber warfare :
Remainder of title the quest for responsible security in the age of digital warfare /
Statement of responsibility, etc. George Lucas.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York, NY :
Name of producer, publisher, distributor, manufacturer Oxford University Press,
Date of production, publication, distribution, manufacture, or copyright notice 2017.
300 ## - PHYSICAL DESCRIPTION
Extent xii, 187 pages :
Other physical details illustration ;
Dimensions 25 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 167-173) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction: Crime or Warfare?. Cyber (in)security : threat assessment in the cyber domain : What, when, and where? ; How? ; Why? ; Three ways of being a hacktivist ; Conventional warfare ; Unrestricted warfare ; State-sponsored hacktivism as a new form of warfare -- Is there a role for ethics or law in cyber conflict? : Irregular war and cyberwar ; Ethics and "folk morality" ; Ethics and the law ; Ethics and just war theory ; Strategic plan of the book ; Applying moral theories in the cyber domain -- The Tallinn Manual: international law in the aftermath of Estonia : International law applicable to Stuxnet ; International law and state-sponsored hacktivism ; The Tallinn Manual ; International law and the Estonian cyber attacks ; "There ought to be a law!" ; Why the Tallinn Manual failed -- Genuine ethics versus "folk morality" in cyberspace : The advantages of taking the "moral point of view" ; The challenge of folk morality for authentic ethics ; The origins of universal moral norms ; Thinking ethically about conflict in the cyber domain ; Just war theory as part of a "morality of exceptions" ; Jus in Bello and professional military ethics ; Jus in Silico: ethics and just war theory in the cyber domain -- If Aristotle waged cyberwar: how norms emerge from practice : Distinguishing between laws and norms ; The methodology of uncertainty: how do norms "emerge"? ; Do emergent moral norms provide effective governance? -- Privacy, anonymity, and the rise of state-sponsored hacktivism : Emergent norms and the rise of state-sponsored hacktivism ; The cunning of history ; Permissible preventive cyber self-defense ; Privacy, anonymity, and the sectors of vulnerability ; Cyber security measures for individuals ; Privacy versus anonymity ; A limited justification for anonymity ; Restricting anonymity while preserving privacy ; New "rules of the road" for cyber navigation -- NSA management directive #424: anticipatory national self-defense : Preventive war ; Initial public response ; The dilemma of Edward Snowden ; Government deception and public trust ; Defending national boundaries and personal liberties ; State norms for respecting sovereignty and attaining security -- Conclusion: Toward a "code of ethics" for cyber warriors.
520 ## - SUMMARY, ETC.
Summary, etc. "From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence of cyber warfare, developing a practical moral code for this new form of conflict is more important than ever. In Ethics and Cyber Warfare, internationally-respected ethicist George Lucas delves into the confounding realm of cyber conflict. Comparing "state-sponsored hacktivism" to the transformative impact of "irregular warfare" in conventional armed conflict, Lucas offers a critique of legal approaches to governance, and outlines a new approach to ethics and "just war" reasoning. Lucas draws upon the political philosophies of Alasdair MacIntyre, John Rawls, and Jürgen Habermas to provide a framework for understanding these newly-emerging standards for cyber conflict, and ultimately presents a professional code of ethics for a new generation of "cyber warriors." Lucas concludes with a discussion of whether preemptive self-defense efforts - such as the massive government surveillance programs revealed by Edward Snowden - can ever be justified, addressing controversial topics such as privacy, anonymity, and public trust. Well-reasoned and timely, Ethics and Cyber Warfare is a must-read for anyone with an interest in cybercrime or cyberwar"--Jacket.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace operations (Military science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element National security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacktivism.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element State crimes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information warfare
General subdivision Moral and ethical aspects.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology
General subdivision Moral and ethical aspects.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Just war doctrine.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process P
First Date, FD (RLIN) 20220214
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type Date last checked out
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 12/06/2020 641.28   172.42 GE.E 2017 190701 12/06/2020 641.28 12/06/2020 Books  
    Dewey Decimal Classification   Not For Loan Computing The Knowledge Hub Library The Knowledge Hub Library 12/24/2020 641.28 2 172.42 GE.E 2017 190979 07/28/2021 641.28 12/24/2020 Books 06/30/2021
    Dewey Decimal Classification   Not For Loan Computing The Knowledge Hub Library The Knowledge Hub Library 12/24/2020 641.28 1 172.42 GE.E 2017 190980 12/30/2020 641.28 12/24/2020 Books 12/24/2020
    Dewey Decimal Classification   Not For Loan Computing The Knowledge Hub Library The Knowledge Hub Library 12/27/2020 641.28   172.42 GE.E 2017 191031 12/27/2020 641.28 12/27/2020 Books  
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 12/27/2020 641.28   172.42 GE.E 2017 191032 12/27/2020 641.28 12/27/2020 Books  
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 12/27/2020 641.28   172.42 GE.E 2017 191033 12/27/2020 641.28 12/27/2020 Books  
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 12/27/2020 641.28   172.42 GE.E 2017 191034 12/27/2020 641.28 12/27/2020 Books  
    Dewey Decimal Classification   Not For Loan Computing The Knowledge Hub Library The Knowledge Hub Library 12/27/2020 641.28   172.42 GE.E 2017 191035 12/27/2020 641.28 12/27/2020 Books  
    Dewey Decimal Classification   Not For Loan Computing The Knowledge Hub Library The Knowledge Hub Library 12/27/2020 641.28   172.42 GE.E 2017 191036 12/27/2020 641.28 12/27/2020 Books  
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 12/27/2020 641.28   172.42 GE.E 2017 191037 12/27/2020 641.28 12/27/2020 Books  
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 12/27/2020 641.28   172.42 GE.E 2017 191038 12/27/2020 641.28 12/27/2020 Books