•  3411
    How to design AI for social good: seven essential factors
    with Luciano Floridi, Josh Cowls, and Thomas C. King
    Science and Engineering Ethics 26 (3). 2020.
    The idea of artificial intelligence for social good is gaining traction within information societies in general and the AI community in particular. It has the potential to tackle social problems through the development of AI-based solutions. Yet, to date, there is only limited understanding of what makes AI socially good in theory, what counts as AI4SG in practice, and how to reproduce its initial successes in terms of policies. This article addresses this gap by identifying seven ethical factor…Read more
  •  23
    This book presents 12 essays that focus on the analysis of the problems prompted by cyber operations. It clarifies and discusses the ethical and regulatory problems raised by the deployment of cyber capabilities by a state’s army to inflict disruption or damage to an adversary’s targets in or through cyberspace. Written by world-leading philosophers, ethicists, policy-makers, and law and military experts, the essays cover such topics as the conceptual novelty of COs and the ethical problems that…Read more
  •  27
    Deterrence and Norms to Foster Stability in Cyberspace
    Philosophy and Technology 31 (3): 323-329. 2018.
    Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, conceptual, normative, and strategic framework. To be successful, cyber deterrence needs to shift from threatening to prevailing. I argue that by itself, deterrence is insufficient to ensure stability of cyberspace. An international regime of norms regulating state behaviour in cyberspace is necessary to complement cyber deterrence strategies and foster stability. Enforcing this regime requires an a…Read more
  •  4
    Solving Cyber Conflicts
    The Philosophers' Magazine 79 79-82. 2017.
  •  36
  •  38
    The Limits of Deterrence Theory in Cyberspace
    Philosophy and Technology 31 (3): 339-355. 2018.
    In this article, I analyse deterrence theory and argue that its applicability to cyberspace is limited and that these limits are not trivial. They are the consequence of fundamental differences between deterrence theory and the nature of cyber conflicts and cyberspace. The goals of this analysis are to identify the limits of deterrence theory in cyberspace, clear the ground of inadequate approaches to cyber deterrence, and define the conceptual space for a domain-specific theory of cyber deterre…Read more
  •  128
    Just Information Warfare
    Topoi 35 (1): 213-224. 2016.
    In this article I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold: filling the theoretical vacuum surrounding this phenomenon and providing the conceptual grounding for the definition of new ethical regulations for information warfare. I argue that Just War Theory is a necessary but not sufficient instrument for considering the ethical implications of information warfare and that a suitable ethical analysis of this kind of warfare is…Read more
  •  107
    The Case of Online Trust
    with Matteo Turilli and Antonino Vaccaro
    Knowledge, Technology & Policy 23 (3-4): 333-345. 2010.
    This paper contributes to the debate on online trust addressing the problem of whether an online environment satisfies the necessary conditions for the emergence of trust. The paper defends the thesis that online environments can foster trust, and it does so in three steps. Firstly, the arguments proposed by the detractors of online trust are presented and analysed. Secondly, it is argued that trust can emerge in uncertain and risky environments and that it is possible to trust online identities…Read more
  •  11
    During the past decade, ethicists as well as policy-makers, political and social scientists, and experts in military studies have been concerned with the topic of cyber-conflicts and in particular the political and social ramifications for contemporary society. This book offers a clear and accessible introduction to the ethical analysis of cyber-conflicts, covering such topics as cyber-crime, cyber-terrorism, and cyber-warfare and cyber-activism. A useful introduction for students The Ethics of …Read more
  •  59
    Defining Trust and E-trust: Old Theories and New Problems
    International Journal of Technology and Human Interaction (IJTHI) Official Publication of the Information Resources Management Association 5 (2): 23-35. 2009.
    The paper provides a selective analysis of the main theories of trust and e-trust (that is, trust in digital environments) provided in the last twenty years, with the goal of preparing the ground for a new philosophical approach to solve the problems facing them. It is divided into two parts. The first part is functional toward the analysis of e-trust: it focuses on trust and its definition and foundation and describes the general background on which the …Read more
  • Warfare. Fourth International Conference of Cyber Conflict
    NATO CCD COE and IEEE Publication. forthcoming.
  •  223
    This paper provides a new analysis of e - trust , trust occurring in digital contexts, among the artificial agents of a distributed artificial system. The analysis endorses a non-psychological approach and rests on a Kantian regulative ideal of a rational agent, able to choose the best option for itself, given a specific scenario and a goal to achieve. The paper first introduces e-trust describing its relevance for the contemporary society and then presents a new theoretical analysis of this phe…Read more
  •  82
    An Information-based Solution for the Puzzle of Testimony and Trust
    Social Epistemology 24 (4): 285-299. 2010.
    In this paper, I offer a contribution to the debate on testimony that rests on three elements: the definition of semantic information, the analysis of trust as a second?order property of first?order relations, and Floridi?s Network Theory of Account (NTA). I argue that testimony transmits semantic information and it is neither grounded on trust nor justified by it. Instead, I show that testimony is an occurrence of a first?order relation of communication affected by the second?order property of …Read more
  •  68
    Trust in Technology: A Distinctive and a Problematic Relation (review)
    Knowledge, Technology & Policy 23 (3): 283-286. 2010.
    The use of tools and artefacts is a distinctive and problematic phenomenon in the history of humanity, and as such it has been a topic of discussion since the beginning of Western culture, from the myths of the Ancient Greek through Humanism and Romanticism to Heidegger. Several questionable aspects have been brought to the fore: the relation between technology and arts, the effects of the use of technology both on the world and on the user and the nature of the trust that users place in technol…Read more
  •  25
    Information Societies, Ethical Enquiries
    Philosophy and Technology 28 (1): 5-10. 2015.
    The special issue collects a selection of papers presented during the Computer Ethics: Philosophical Enquiries 2013 conference. This is a series of conferences organized by the International Association for Ethics and Information Technology , a professional organization formed in 2001 and which gathers experts in information and computer ethics prompting interdisciplinary research and discussions on ethical problems related to design and deployment of information and communication technologies .…Read more
  •  89
    Internet Neutrality: Ethical Issues in the Internet Environment
    with Matteo Turilli and Antonino Vaccaro
    Philosophy and Technology 25 (2): 133-151. 2012.
    This paper investigates the ethical issues surrounding the concept of Internet neutrality focusing specifically on the correlation between neutrality and fairness. Moving from an analysis of the many available definitions of Internet neutrality and the heterogeneity of the Internet infrastructure, the common assumption that a neutral Internet is also a fair Internet is challenged. It is argued that a properly neutral Internet supports undesirable situations in which few users can exhaust the maj…Read more
  •  127
    Cyber Security and Individual Rights, Striking the Right Balance
    Philosophy and Technology 26 (4): 353-356. 2013.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and state power can pu…Read more
  •  260
    Information Warfare: A Philosophical Perspective (review)
    Philosophy and Technology 25 (1): 105-120. 2012.
    This paper focuses on Information Warfare—the warfare characterised by the use of information and communication technologies. This is a fast growing phenomenon, which poses a number of issues ranging from the military use of such technologies to its political and ethical implications. The paper presents a conceptual analysis of this phenomenon with the goal of investigating its nature. Such an analysis is deemed to be necessary in order to lay the groundwork for future investigations into this t…Read more
  •  30
    The Case of Online Trust
    with Matteo Turilli and Antonino Vaccaro
    Knowledge, Technology & Policy 23 (3): 333-345. 2010.
    This paper contributes to the debate on online trust addressing the problem of whether an online environment satisfies the necessary conditions for the emergence of trust. The paper defends the thesis that online environments can foster trust, and it does so in three steps. Firstly, the arguments proposed by the detractors of online trust are presented and analysed. Secondly, it is argued that trust can emerge in uncertain and risky environments and that it is possible to trust online identities…Read more
  •  45
    The Struggle Between Liberties and Authorities in the Information Age
    Science and Engineering Ethics 21 (5): 1125-1138. 2015.
    The “struggle between liberties and authorities”, as described by Mill, refers to the tension between individual rights and the rules restricting them that are imposed by public authorities exerting their power over civil society. In this paper I argue that contemporary information societies are experiencing a new form of such a struggle, which now involves liberties and authorities in the cyber-sphere and, more specifically, refers to the tension between cyber-security measures and individual l…Read more