Jump to ContentJump to Main Navigation
Binary BulletsThe Ethics of Cyberwarfare$
Users without a subscription are not able to see the full content.

Fritz Allhoff, Adam Henschke, and Bradley Jay Strawser

Print publication date: 2016

Print ISBN-13: 9780190221072

Published to Oxford Scholarship Online: December 2015

DOI: 10.1093/acprof:oso/9780190221072.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see www.oxfordscholarship.com/page/privacy-policy).date: 18 December 2018

Beyond Machines

Beyond Machines

Humans in Cyberoperations, Espionage, and Conflict

(p.177) 9 Beyond Machines
Binary Bullets

David Danks

Joseph H. Danks

Oxford University Press

Kinetic warfare involves tanks, bullets, and other hardware, but everyone recognizes that understandings of it must involve warfighters from general staff to boots on the ground. In contrast, most discussions of cyberwarfare—its strategy, impacts, ethics—focus on the machines, systems, and data, while largely ignoring the human element. This chapter explores a range of conceptual and ethical issues that arise when we focus on the cognitive constraints, biases, and heuristics of human agents in four different roles: developers of a cyberaction; target of that cyberaction; defender against some cyberaction; and third-party observers, whether neutral nations, or even the public within a nation engaged in cyberactions. Cyberwarfare is conducted with machines, but humans are the developers, targets, and defenders of cyberactions. Thus, a full understanding of the ethical dimensions of cyberwarfare must incorporate the human actors with all of their cognitive, conceptual, and cultural biases, tendencies, and foibles.

Keywords:   cyberwarriors, cyberaction, cognitive biases, human factors in war, cyberconflict

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .