共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
4.
Ryan Jenkins 《Journal of Military Ethics》2013,12(1):68-79
Cyber-weapons are software and software, at least intuitively, is non-physical. Several authors have noted that this potentially renders problematic the application of normative frameworks like UN Charter Article 2(4) to cyber-weapons. If Article 2(4) only proscribes the use of physical force, and if cyber-weapons are non-physical, then cyber-weapons fall outside the purview of Article 2(4). This article explores the physicality of software, examining Stuxnet in particular. First, I show that with a few relatively uncontroversial metaphysical claims we can secure the conclusion that Stuxnet is physical. In particular, there exist instances of Stuxnet that are both located in space and causally efficacious, and this is very strong evidence for their being physical. Second, I argue that the question of physicality is actually irrelevant for the moral evaluation of an attack like Stuxnet because of its undeniably physical effects. Finally, I argue that some features of Stuxnet should make us optimistic about the prospects for discrimination and proportionality in cyberwarfare. 相似文献
5.
6.
7.
8.
10.
KATHLEEN FITZGIBBON 《African Security Review》2013,22(1):81-89
Hundreds of thousands of African men, women and children are being forced into situations of labour and sexual exploitation both on the continent and abroad every year. Internationally, trafficking in persons has been identified as a serious threat to human security and development by governments, pressure groups and the UN. But for many African governments, the problem has only recently been acknowledged. This article, the first in a two part series on the issue, outlines the types and extent of trafficking in Africa, with a focus on West and Central Africa. Contributing factors, in particular the high profit margins and low risk of arrest and conviction, are reviewed as well as the impact on human rights, public health, community and family development and the growth of organised crime. The second article in the series will consider successful strategies and international programmes, with a focus on the lessons learned for Africa from West Africa. 相似文献
11.
12.
13.
近年来,西方分析家得到的有关苏联军事思想方面的文献日益增多。如果翻译出来的话,实际上可资利用的情报很可能比现已有效利用的情报还要多。鉴于苏联现已成为一个难以对付的海上强国,所以对所得到的大量情报都涉及苏联海军和苏联海上战略思想这样一个问题,就不会有警奇之感了。 相似文献
14.
15.
16.
稍加留意就会发现;美军的每一次行动,无论是演习还是实战,都被冠以行动代号或绰号,如20世纪90年代以来出现的诸如“沙漠盾牌行动”(海湾战争)、“联合部队行动”(科索沃战争)、“中亚维和营—2000联合军事演习”(美国与哈、乌、吉中亚3国演习)、“持久自由行动”(阿富汗战争)等。美军军事行动命名的规则经历了几十年的演变,才逐渐脱胎换骨,化蛹成蝶,趋于规范。那么,就让我们去探寻美军军事行动命名的发 相似文献
17.
18.
张建 《军队政工理论研究》1998,(5)
最近看了一部外国的片子,片名叫《我是谁》.片中的主角在战争中受到创伤失去了记忆,常常大声发问:“我是谁?”这使我想起了在现实生活中,有一些头脑很正常的人,也常常会被“我是谁”或者“谁的人”这样一些问题弄得五荤六素. 相似文献
19.