245
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      If you have found this article useful and you think it is important that researchers across the world have access, please consider donating, to ensure that this valuable collection remains Open Access.

      Prometheus is published by Pluto Journals, an Open Access publisher. This means that everyone has free and unlimited access to the full-text of all articles from our international collection of social science journalsFurthermore Pluto Journals authors don’t pay article processing charges (APCs).

      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Book review

      Published
      book-review
      Prometheus
      Pluto Journals
      Bookmark

            Content

            Author and article information

            Journal
            10.2307/j50022063
            prometheus
            Prometheus
            Pluto Journals
            0810-9028
            1470-1030
            1 December 2020
            : 36
            : 4 ( doiID: 10.13169/prometheus.36.issue-4 )
            : 403-405
            Affiliations
            Robertson School of Government, Regent University, mmanjikian@ 123456regent.edu
            Article
            prometheus.36.4.0403
            10.13169/prometheus.36.4.0403
            9cb64f29-c42e-459f-8fdc-7dce94071401
            © 2020 Pluto Journals

            All content is freely available without charge to users or their institutions. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles in this journal without asking prior permission of the publisher or the author. Articles published in the journal are distributed under a http://creativecommons.org/licenses/by/4.0/.

            History
            Product

            The Ethics of Cybersecurity , edited by , and (2020) 384pp., $US115 (hardback) Springer Open, Cham, Switzerland, ISBN: 978-030-29052-8

            Custom metadata
            eng

            Computer science,Arts,Social & Behavioral Sciences,Law,History,Economics

            References

            1. Gjesvik, L. (2018) ‘China's notion of cybersecurity: the importance of strategic cultures for cyber deterrence’, Proceedings of the European Conference on Cyberwarfare and Security, June 2018, pp.174–80, available at http://www.academic-bookshop.com/ourshop/prod_6457309-ECCWS-2018-PDF-Proceedings-of-the-17th-European-Conference-on-Cyber-Warfare-and-Security.html (accessed May 2020).

            2. Knight, W., 2020 ‘The value and ethics of using phone data to monitor COVID-19‘, Wired, 18 March, available at https://www.wired.com/story/value-ethics-using-phone-data-monitor-covid-19/ (accessed May 2020).

            3. Kosseff, J. (2018) ‘Defining cybersecurity law’, Iowa Law Review, 103, 985, pp.985–1032.

            4. Libicki, M. (2016) Cyberspace in Peace and War, Naval Institute Press, Annapolis MD.

            5. Perkovich, G. and Levite, A. (eds) (2017) Understanding Cyber Conflict: Fourteen Analogies, Georgetown University Press, Washington DC.

            6. Segal, A. (2017) ‘Bridging the cyberspace gap: Washington and Silicon Valley’, Prism, 7, 2, pp.66–77.

            7. Taddeo, M. and Floridi, L. (2015) ‘The debate on the moral responsibilities of online service providers’, Science and Engineering Ethics, 22, 6, pp.1575–1603.

            8. Taddeo, M., McCutcheon, T. and Floridi, L. (2019) ‘Trusting artificial intelligence in cybersecurity is a double-edged sword’, Nature Machine Intelligence, 1, pp.557–66.

            9. Vallor, S. (2017) ‘Robots with guns’ in Pitt, J. and Shew, A. (eds) Spaces for the Future: A Companion to the Philosophy of Technology, Routledge, New York, pp.73–81.

            Comments

            Comment on this article