Sign In
Not register? Register Now!
Pages:
8 pages/≈2200 words
Sources:
Check Instructions
Style:
Chicago
Subject:
Social Sciences
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 34.56
Topic:

Philosophy of information. Social Sciences Assignment

Essay Instructions:

question:Part A: Compare virtue ethics with consequentialism as protocols for
ethical decision making in military cyber conflict.
Part B: Expound and evaluate Vallor’s arguments for the ethical considerations concerning armed military robots being better served by a virtue
ethics as opposed to an ethical rules-based approach.
essay writing advice;
1) There is no room for gurus in philosophy. So, if you find yourself hesitating to criticise someone's ideas, you should ask yourself why this might be. You will find that your reasons are bad ones. Always.
2) No one has ever complained that an idea or argument was expressed too clearly. Not even once.
3) English does not like long sentences. Every time you add a clause to a sentence in English, the meaning of the sentence becomes less clear. English likes short sentences. Use short sentences.
4) Use metanarrative. That is, tell people what you are going to say before you say it in detail. Then summarise what you have said after you have said it.
5) Write a good draft and then go over it and rewrite it. Do it again. And again.
6) Read your draft to yourself OUT LOUD. This is dark magic but trust me on this one. Read. Your. Essay. To. Yourself. Out. Loud.
7) The goal of your essay is to convince the reader that you are correct. The goal of your essay is not to convince the reader that you are clever.
8) Answer the essay question. ANSWER THE ESSAY QUESTION. Essay questions are questions. Your essay must pose an answer to them.
9) Philosophy is the business of distinguishing the true from the false. Aim for the true.
10) Points 1-9 above are compatible with a great many styles of writing. Compare Dretske to Fodor for example.
Reference at least 7 resources. 2000 words do not include footages and references.
reading is in the file.

Essay Sample Content Preview:

PHILOSOPHY OF INFORMATION
Name:
Course:
Date:
Introduction
The current age of information technology has opened up new possibilities that would initially be unimaginable. Increased connectivity through the use of computers and the internet has meant that people can easily meddle into the affairs of others without permission. This can be termed as espionage or even breach of personal privacy. When it comes to international matters, cyber technology has made it possible for countries to spy on each other, especially on issues to do with the military. Spying on the security matters of a foreign nation can even be considered as an act of war. This brings to the forth the issue of military cyber conflict concerning the ethical protocols.
Cyber Conflict
Cyber conflict can be defined as the utilization of the available technological resources at a country’s disposal to cause some significant degree of harm to another country; in a manner comparable to what is done in war. It always manifests itself in various ways that can sometimes start as simple spams in mails, to system jams, and even large scale disruption of communication networks. It is often correlated to cyber terrorism, as the impacts on a target country can sometimes border on catastrophic. It would be unimaginable to assess the threat posed by such intrusion, on nuclear power installations.[, Valeriano, Brandon, and Ryan C. Maness. 2015. Cyberwar versus cyber realities: cyber conflict in the international system.]
Cyber conflict presents the biggest weakness of the computer system; its ability to be hacked or infiltrated with or without knowledge of the owner. As a new frontier in the battle for internal security and even regional domination, militaries around the world have embarked on their own set of programs geared towards defense against or attack using cyber technology. While foreign armies might pose threats, there is also the underlying reality that some of these attacks can be from isolated individuals trying out their stuff. With the complex nature of network technologies across the globe, it becomes clear how complicated cyber conflict can get.[. David Weissbrodt, Cyber-Conflict, Cyber-Crime, and Cyber-Espionage, 22 Minn. J. Int'l L. 347 (2013), available at https://scholarship.law.umn.edu/faculty_articles/223.]
It brings to the fore the determination of state and non-state actors. Hackers are always scouring the internet, trying to find any loopholes in the security systems around critical installations. A field day for them can entail shutting down of entire government websites, or even hijacking the operations of the said systems or also coming up with clones of the same. As for fraudsters, this can be a chance for them to siphon funds and other relevant information from the systems secretly. All in all, cyber conflict provides an entirely new frontier for the military and security systems across the world.[Ventre, Daniel. 2012. Cyber conflict: competing for national perspectives. London: ISTE. http://site.ebrary.com/id/10660597.]
PART A: Virtue ethics and consequentialism as protocols for Ethical decision making in military cyber conflict.
* Ethical Responsibility of Technological Systems
When it comes to ethics concerni...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to scientific essays:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!