03893nam 22005295 450 991025520950332120230713131749.094-024-1150-X10.1007/978-94-024-1150-8(CKB)3710000001632893(MiAaPQ)EBC4938538(DE-He213)978-94-024-1150-8(EXLCZ)99371000000163289320170803d2017 u| 0engurcnu||||||||rdacontentrdamediardacarrierEthics, Law and the Politics of Information A Guide to the Philosophy of Luciano Floridi /by Massimo Durante1st ed. 2017.Dordrecht :Springer Netherlands :Imprint: Springer,2017.1 online resource (224 pages)The International Library of Ethics, Law and Technology,1875-0036 ;1894-024-1148-8 Includes bibliographical references and index.Introduction -- Part 1: 1. Methodological Issues -- 2. The Informational Environment -- 3. The Centre of the Universe -- 4. Agency and Autonomy -- 5. World and Society -- Part 2: 1. Ontological Pluralism -- 2. Informational Privacy -- 3. Information Ethics and Law -- 4. The Ontic Trust -- 5. An Informational Approach to Law -- Conclusions.This book provides a detailed discussion of the theoretical and practical implications of the change driven by ICTs. Such a change is often much more profound than an emphasis on information technology and society can capture, for not only does it bring about ethical and policy vacuums that call for a new understanding of ethics, politics and law, but it also “re-ontologizes reality”, as propounded by Luciano Floridi’s philosophy and ethics of information. The informational turn is transforming our understanding of reality by challenging the conventional ways we have of thinking about our world and our identities in terms of stable and enduring structures and beliefs. The information age we inhabit brings to completion our self-understanding as informational systems that produce, process, and exchange information with other informational systems, in an environment that is itself made up of information. The present volume provides us with a better understanding of the normative nature and role of information, helping us to grasp the sense and extent to which informational resources serve as “constraining affordances” guiding our behaviours. It does so by delineating the background against which we build our beliefs about reality, make decisions, and behave, through our interactions with a multi-agent system that is increasingly dependent on ICTs. The book will be of interest to a vast audience, ranging from information technologists, ethicists, policy makers, social and legal scholars, and all those willing to embrace the following three tenets: we construct our world and ourselves informationally; by constructing our world and ourselves we thereby become aware of our limits; it is precisely these limits that make us become human beings.The International Library of Ethics, Law and Technology,1875-0036 ;18EthicsComputers and civilizationAnthropologyMoral Philosophy and Applied EthicsComputers and SocietyAnthropologyEthics.Computers and civilization.Anthropology.Moral Philosophy and Applied Ethics.Computers and Society.Anthropology.003.54Durante Massimoauthttp://id.loc.gov/vocabulary/relators/aut285432BOOK9910255209503321Ethics, Law and the Politics of Information2066401UNINA03408nam 22008535 450 991096003980332120240718195127.0978661136580697813495359031349535907978128136580412813658079781403983602140398360710.1057/9781403983602(CKB)1000000000342491(SSID)ssj0000200254(PQKBManifestationID)11168755(PQKBTitleCode)TC0000200254(PQKBWorkID)10196630(PQKB)10134745(DE-He213)978-1-4039-8360-2(MiAaPQ)EBC307967(Au-PeEL)EBL307967(CaPaEBR)ebr10150389(CaONFJC)MIL136580(OCoLC)567964976(Perlego)3496872(EXLCZ)99100000000034249120151207d2006 u| 0engurnn|008mamaatxtccrMedia and the Politics of Failure Great Powers, Communication Strategies, and Military Defeats /by L. Roselle1st ed. 2006.New York :Palgrave Macmillan US :Imprint: Palgrave Macmillan,2006.1 online resource (VII, 191 p.) The Palgrave Macmillan Series in International Political Communication,2945-6126Bibliographic Level Mode of Issuance: Monograph9780230116771 0230116779 9781403975256 1403975256 Includes bibliographical references (p. [173]-181) and index.Cover -- Media and the Politics of Failure -- Contents -- Acknowledgments -- Chapter 1 Political Communication and Policy Legitimacy: Explaining Failure -- Chapter 2 War Waging and Reassessment: Vietnam -- Chapter 3 Withdrawal and Aftermath: Vietnam -- Chapter 4 War Waging and Reassessment: Afghanistan -- Chapter 5 Withdrawal and Aftermath: Afghanistan -- Chapter 6 Conclusions and a Post-Cold War Assessment -- Appendix -- Notes -- Sources Consulted and Selected Bibliography -- Index.Roselle analyzes how political leaders of powerful states use media to explain military defeats. The cases of the United States in Vietnam and the Soviet Union in Afghanistan highlight the role of great power identity, domestic politics, and media structure.The Palgrave Macmillan Series in International Political Communication,2945-6126Communication in politicsPolitical scienceInternational relationsPeacePolitical CommunicationPolitical ScienceInternational RelationsPeace and Conflict StudiesCommunication in politics.Political science.International relations.Peace.Political Communication.Political Science.International Relations.Peace and Conflict Studies.070.4/333Roselle Laura1791742MiAaPQMiAaPQMiAaPQBOOK9910960039803321Media and the Politics of Failure4329510UNINA03996nam 2200757Ia 450 991096370140332120240417004802.097866124372369781282437234128243723297803091385120309138515(CKB)2670000000015885(OCoLC)649901504(CaPaEBR)ebrary10355550(SSID)ssj0000343558(PQKBManifestationID)11280707(PQKBTitleCode)TC0000343558(PQKBWorkID)10306934(PQKB)11016066(MiAaPQ)EBC3378552(Au-PeEL)EBL3378552(CaPaEBR)ebr10355550(CaONFJC)MIL243723(OCoLC)923280651(Perlego)4738772(EXLCZ)99267000000001588520090610d2009 uy 0engurcn|||||||||txtccrTechnology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities /William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies1st ed.Washington, DC National Academies Pressc20091 online resource (390 p.)Bibliographic Level Mode of Issuance: Monograph9780309138505 0309138507 Includes bibliographical references.FrontMatter -- Preface -- Acknowledgment of Reviewers -- Contents -- Synopsis -- 1 Overview, Findings, and Recommendations -- Part I: Framing and Basic Technology -- 2 Technical and Operational Considerations in Cyberattack and Cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3 A Military Perspective on Cyberattack -- 4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation -- 5 Perspectives on Cyberattack Outside National Security -- 6 Decision Making and Oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7 Legal and Ethical Perspectives on Cyberattack -- 8 Insights from Related Areas -- 9 Speculations on the Dynamics of Cyberconflict -- 10 Alternative Futures -- Appendixes -- Appendix A: Biographies of Committee Members and Staff -- Appendix B: Meeting Participants and Other Contributors -- Appendix C: Illustrative Criminal Cyberattacks -- Appendix D: Views on the Use of Force in Cyberspace -- Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions.Computer networksSecurity measuresGovernment policyUnited StatesComputer networksSecurity measuresUnited StatesCyberspaceSecurity measuresUnited StatesCyberterrorismUnited StatesPreventionInformation warfareUnited StatesComputer networksSecurity measuresGovernment policyComputer networksSecurity measuresCyberspaceSecurity measuresCyberterrorismPrevention.Information warfare355.3/43Dam Kenneth W141275Lin Herbert1093194Owens William A.1940-1808673National Research Council (U.S.).Committee on Offensive Information Warfare.National Research Council (U.S.).Computer Science and Telecommunications Board.National Research Council (U.S.).Division on Engineering and Physical Sciences.MiAaPQMiAaPQMiAaPQBOOK9910963701403321Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities4359052UNINA