The Ethics of Cognitive Security

Abstract

This dissertation concerns ethical and epistemic assessment of the use of state power to defend against information threats and hostile activities, especially in digital information environments, an activity which has been described as the pursuit of cognitive security. I have three main aims. Firstly, to motivate scholarly interest in what I call the ethics of cognitive security - an interdisciplinary effort to provide coordinated empirical, theoretical, and ethical input into this exercise of power, specifically by democratic states. To the extent that these are decide to develop offensive and defensive strategies for the conduct of information warfare, we can ask if there are empirical and ethical considerations that should inform this. I consider at length the literature on epistemic paternalism and the extent to which such efforts might be paternalist and thus objectionable or in need of special justification. Secondly, to articulate an ecological conception of our epistemic interdependence on the information environment that can help to describe the public interest in its responsible stewardship. This helps to generate less-securitized formulations of the aims and constraints of defensive operations that interface better with our ethical interests in the practice of cognitive security. I draw on the social epistemology literature, especially where it concerns testimony and epistemic dependence, and develop a conception of epistemic environmental dependence and trust. I connect this to environmental policy and philosophy scholarship that concerns the ethical relations that arise as a result of interdependencies, and the sorts of policy instruments that can be appropriate for protecting this kind of shared interest. Finally, I apply this conceptual framework to the specific cognitive security problem of hostile disinformation. Drawing on a conceptual analysis of epistemic pollution I argue that we should favour root cause analysis and remediation, even where it might seem to involve more substantial interference, rather than reactive efforts to filter and remove these, for reasons that include both empirical adequacy and respect for relevant ethical interests.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,323

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

  • Only published works are available at libraries.

Similar books and articles

Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
Computer Ethics.Philip Brey - 2009 - In Jan Kyrre Berg Olsen Friis, Stig Andur Pedersen & Vincent F. Hendricks (eds.), A Companion to the Philosophy of Technology. Oxford, UK: Wiley-Blackwell. pp. 406–411.
Vulnerabilities and responsibilities: dealing with monsters in computer security.W. Pieters & L. Consoli - 2009 - Journal of Information, Communication and Ethics in Society 7 (4):243-257.
Information warfare and security by Dorothy E. denning.Jean-François Blanchette - 1999 - Ethics and Information Technology 1 (3):237-238.
A pragmatic evaluation of the theory of information ethics.Mikko Siponen - 2004 - Ethics and Information Technology 6 (4):279-290.
Cognitive warfare: an ethical analysis.Seumas Miller - 2023 - Ethics and Information Technology 25 (3):1-10.

Analytics

Added to PP
2024-04-02

Downloads
4 (#1,628,730)

6 months
4 (#798,384)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

A. Buzzell
York University

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references