共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
4.
5.
6.
7.
Ross W. Bellaby 《Journal of Military Ethics》2016,15(4):299-319
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified. 相似文献
8.
10.
KATHLEEN FITZGIBBON 《African Security Review》2013,22(1):81-89
Hundreds of thousands of African men, women and children are being forced into situations of labour and sexual exploitation both on the continent and abroad every year. Internationally, trafficking in persons has been identified as a serious threat to human security and development by governments, pressure groups and the UN. But for many African governments, the problem has only recently been acknowledged. This article, the first in a two part series on the issue, outlines the types and extent of trafficking in Africa, with a focus on West and Central Africa. Contributing factors, in particular the high profit margins and low risk of arrest and conviction, are reviewed as well as the impact on human rights, public health, community and family development and the growth of organised crime. The second article in the series will consider successful strategies and international programmes, with a focus on the lessons learned for Africa from West Africa. 相似文献
11.
12.
13.
近年来,西方分析家得到的有关苏联军事思想方面的文献日益增多。如果翻译出来的话,实际上可资利用的情报很可能比现已有效利用的情报还要多。鉴于苏联现已成为一个难以对付的海上强国,所以对所得到的大量情报都涉及苏联海军和苏联海上战略思想这样一个问题,就不会有警奇之感了。 相似文献
14.
15.
16.
张建 《军队政工理论研究》1998,(5)
最近看了一部外国的片子,片名叫《我是谁》.片中的主角在战争中受到创伤失去了记忆,常常大声发问:“我是谁?”这使我想起了在现实生活中,有一些头脑很正常的人,也常常会被“我是谁”或者“谁的人”这样一些问题弄得五荤六素. 相似文献
17.
19.
John C. Baker ? 《The Nonproliferation Review》2013,20(1):119-123
Missile Contagion: Cruise Missile Proliferation and the Threat to International Security, by Dennis M. Gormley. Praeger Security International, 2008. 272 pages, $54.95. 相似文献