{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T01:07:47Z","timestamp":1776128867722,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T00:00:00Z","timestamp":1693785600000},"content-version":"vor","delay-in-days":3,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001769","name":"Charles Sturt University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001769","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2023,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This article characterises the nature of cognitive warfare and its use of disinformation and computational propaganda and its political and military purposes in war and in conflict short of war. It discusses both defensive and offensive measures to counter cognitive warfare and, in particular, measures that comply with relevant moral principles.<\/jats:p>","DOI":"10.1007\/s10676-023-09717-7","type":"journal-article","created":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T08:07:33Z","timestamp":1693814853000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Cognitive warfare: an ethical analysis"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4851-3177","authenticated-orcid":false,"given":"Seumas","family":"Miller","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,4]]},"reference":[{"key":"9717_CR1","unstructured":"Alazab, M. (2022). Russia is using an onslaught of cyber attacks to undermine Ukraine\u2019s defence capabilities. The Conversation. Retrieved February 24, 2022, from https:\/\/theconversation.com\/russia-is-using-an-onslaught-of-cyber-attacks-to-undermine-ukraines-defence-capabilities-177638"},{"key":"9717_CR2","volume-title":"Cognitive warfare: The Russian threat to election integrity in the Baltic states","author":"A Backes","year":"2019","unstructured":"Backes, A., & Swab, A. (2019). Cognitive warfare: The Russian threat to election integrity in the Baltic states. Belfer Center for Science and International Affairs, Harvard Kennedy School."},{"key":"9717_CR3","unstructured":"Bernal, A., Carter, C., Singh, I., Cao, K., & Madreperla, O. (2020). Cognitive warfare. NATO Report, 10."},{"key":"9717_CR4","unstructured":"Cao, K., Cao, K, Glaister, S., Pena, A., Rhee, D., Rong, W., Rovalino, A. (2021). Countering cognitive warfare. NATO Review. https:\/\/www.nato.int\/docu\/review\/articles\/2021\/05\/20\/countering-cognitive-warfare-awareness-and-resilience\/index.html"},{"key":"9717_CR5","volume-title":"Evil on-line","author":"D Cocking","year":"2018","unstructured":"Cocking, D., & van den Hoven, J. (2018). Evil on-line. Wiley Blackwell."},{"key":"9717_CR6","doi-asserted-by":"publisher","DOI":"10.20935\/AL3468","author":"FA D\u2019Alessio","year":"2021","unstructured":"D\u2019Alessio, F. A. (2021). Computational propaganda: Challenges and responses. Academia Letters. https:\/\/doi.org\/10.20935\/AL3468","journal-title":"Academia Letters"},{"issue":"3","key":"9717_CR7","first-page":"49","volume":"8","author":"J DeFranco","year":"2020","unstructured":"DeFranco, J., DiEuliis, D., & Giordano, J. (2020). Redefining neuroweapons. Prism, 8(3), 49\u201363.","journal-title":"Prism"},{"key":"9717_CR8","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1080\/15027570.2010.536404","volume":"9","author":"RR Dipert","year":"2010","unstructured":"Dipert, R. R. (2010). Ethics of cyberwarfare. Journal of Military Ethics, 9, 384\u2013410.","journal-title":"Journal of Military Ethics"},{"key":"9717_CR9","volume-title":"Force short of war in modern conflict: Jus ad Vim","year":"2019","unstructured":"Galliott, J. (Ed.). (2019). Force short of war in modern conflict: Jus ad Vim. Edinburgh University Press."},{"key":"9717_CR10","unstructured":"Greenwald, G. (2014). How covert agents infiltrate the internet to manipulate, deceive and destroy reputations. The Intercept. Retrieved February 24, 2014, from https:\/\/theintercept.com\/2014\/02\/24\/jtrig-manipulation\/"},{"key":"9717_CR11","volume-title":"Soft war: The ethics of unarmed conflict","year":"2017","unstructured":"Gross, M., & Meisels, T. (Eds.). (2017). Soft war: The ethics of unarmed conflict. Cambridge University Press."},{"key":"9717_CR12","first-page":"4","volume":"7","author":"TC Hung","year":"2020","unstructured":"Hung, T. C., & Hung, T. W. (2020). How China\u2019s cognitive warfare works. Journal of Global Security Studies, 7, 4.","journal-title":"Journal of Global Security Studies"},{"key":"9717_CR13","volume-title":"National security intelligence and ethics","author":"L Johnson","year":"2021","unstructured":"Johnson, L. (2021). The \u201cthird option\u201d in American foreign policy. In S. Miller, M. Regan, & P. F. Walsh (Eds.), National security intelligence and ethics. Routledge."},{"key":"9717_CR14","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190276522.001.0001","volume-title":"Ethics and cyber war","author":"G Lucas","year":"2017","unstructured":"Lucas, G. (2017). Ethics and cyber war. Oxford University Press."},{"key":"9717_CR15","volume-title":"Routledge handbook of ethics and war: Just war in the 21st century","author":"G Lucas","year":"2013","unstructured":"Lucas, G., (2013). Just in silico: Moral restrictions on the use of cyberwarfare. In F. Allhoff (Ed.), Routledge handbook of ethics and war: Just war in the 21st century. Routledge."},{"key":"9717_CR16","unstructured":"MacDonald, A., & Ratcliffe, I. (2023). Cognitive warfare: Manoeuvring in the human dimension. US Naval Institute. https:\/\/www.usni.org\/magazines\/proceedings\/2023\/april\/cognitive-warfare-maneuvering-human-dimension"},{"key":"9717_CR17","volume-title":"Soft war: The ethics of unarmed conflict","author":"L May","year":"2017","unstructured":"May, L. (2017). The nature of war and the idea of \u201ccyber war.\u201d In M. Gross & T. Meisels (Eds.), Soft war: The ethics of unarmed conflict. Cambridge University Press."},{"issue":"1","key":"9717_CR18","first-page":"9","volume":"13","author":"S Miller","year":"1994","unstructured":"Miller, S. (1994). Social action. South African Journal of Philosophy, 13(1), 9\u201317.","journal-title":"South African Journal of Philosophy"},{"key":"9717_CR19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511612954","volume-title":"Social action: A teleological account","author":"S Miller","year":"2001","unstructured":"Miller, S. (2001). Social action: A teleological account. Cambridge University Press."},{"key":"9717_CR20","doi-asserted-by":"crossref","unstructured":"Miller, S., (2006). Collective moral responsibility: An individualist account. In P. A. French (Ed.), Midwest studies in philosophy (Vol. XXX, pp. 176\u2013193).","DOI":"10.1111\/j.1475-4975.2006.00134.x"},{"key":"9717_CR21","volume-title":"The moral foundations of social institutions","author":"S Miller","year":"2010","unstructured":"Miller, S. (2010). The moral foundations of social institutions. Cambridge University Press."},{"key":"9717_CR22","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1093\/acprof:oso\/9780190221072.003.0012","volume-title":"Binary bullets: The ethics of cyberwarfare","author":"S Miller","year":"2016","unstructured":"Miller, S. (2016a). Cyber-attacks and \u2018dirty hands\u2019: Cyberwar, cyber-crimes or covert political action? In F. Allfhoff, A. Henschke, & B. J. Strawser (Eds.), Binary bullets: The ethics of cyberwarfare (pp. 228\u2013250). Oxford University Press."},{"key":"9717_CR23","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190626136.001.0001","volume-title":"Shooting to kill: The ethics of police and military use of lethal force","author":"S Miller","year":"2016","unstructured":"Miller, S. (2016b). Shooting to kill: The ethics of police and military use of lethal force. Oxford University Press."},{"key":"9717_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46991-1","volume-title":"Corruption and anti-corruption in policing: Philosophical and ethical issues","author":"S Miller","year":"2016","unstructured":"Miller, S. (2016c). Corruption and anti-corruption in policing: Philosophical and ethical issues. Springer."},{"key":"9717_CR25","volume-title":"Force short of war in modern conflict: Jus ad Vim","author":"S Miller","year":"2019","unstructured":"Miller, S. (2019). Jus ad Vim: The morality of military and police use of force in armed conflicts short of war. In J. Galliott (Ed.), Force short of war in modern conflict: Jus ad Vim. Edinburgh University Press."},{"key":"9717_CR26","volume-title":"The ethics of cybersecurity","author":"S Miller","year":"2020","unstructured":"Miller, S. (2020). Freedom of political communication, propaganda and the role of epistemic institutions in cyberspace. In M. Christen, B. Gordjin, & M. Loi (Eds.), The ethics of cybersecurity. Springer."},{"key":"9717_CR70","doi-asserted-by":"crossref","unstructured":"Miller, S. (2023). War, reciprocity and the moral equality of combatants. Philosophia. https:\/\/link.springer.com\/article\/10.1007\/s11406-023-00678-1","DOI":"10.1007\/s11406-023-00678-1"},{"key":"9717_CR27","volume-title":"Cybersecurity, ethics and collective responsibility","author":"S Miller","year":"2023","unstructured":"Miller, S., & Bossomaier, T. (2023). Cybersecurity, ethics and collective responsibility. Oxford University Press."},{"key":"9717_CR28","volume-title":"National security intelligence and ethics","year":"2021","unstructured":"Miller, S., Regan, M., & Walsh, P. F. (Eds.). (2021). National security intelligence and ethics. Routledge."},{"key":"9717_CR29","unstructured":"Office of the Director of National Intelligence. (2018). A guide to cyber attribution. https:\/\/www.dni.gov\/files\/CTIIC\/documents\/ODNI_A_Guide_to_Cyber_Attribution.pdf"},{"key":"9717_CR30","volume-title":"Partly cloudy: Ethics in war, espionage, covert action and interrogation","author":"DL Perry","year":"2009","unstructured":"Perry, D. L. (2009). Partly cloudy: Ethics in war, espionage, covert action and interrogation. Scarecrow Press."},{"key":"9717_CR31","volume-title":"National security intelligence and ethics","author":"M Regan","year":"2021","unstructured":"Regan, M., & Poole, M. (2021). Accountability of covert action in the United States and the United Kingdom. In S. Miller, M. Regan, & P. F. Walsh (Eds.), National security intelligence and ethics. Routledge."},{"key":"9717_CR32","volume-title":"Routledge handbook of ethics and war: Just war in the 21st century","author":"NC Rowe","year":"2013","unstructured":"Rowe, N. C., et al. (2013). Perfidy in cyberwarfare. In F. Allhoff (Ed.), Routledge handbook of ethics and war: Just war in the 21st century. Routledge."},{"key":"9717_CR33","volume-title":"Tallinn manual on the international law applicable to cyberwar","year":"2013","unstructured":"Schmitt, M. M. (Ed.). (2013). Tallinn manual on the international law applicable to cyberwar. Cambridge University Press."},{"key":"9717_CR34","doi-asserted-by":"publisher","DOI":"10.1515\/9781503631151","volume-title":"Tyrants on twitter","author":"D Sloss","year":"2022","unstructured":"Sloss, D. (2022). Tyrants on twitter. Stanford University Press."},{"key":"9717_CR35","volume-title":"Mutual knowledge","year":"1982","unstructured":"Smith, N. V. (Ed.). (1982). Mutual knowledge. Academic Press."},{"key":"9717_CR36","first-page":"160","volume":"2","author":"M Walzer","year":"1973","unstructured":"Walzer, M. (1973). Political action: The problem of dirty hands. Philosophy and Public Affairs, 2, 160\u2013180.","journal-title":"Philosophy and Public Affairs"},{"key":"9717_CR37","volume-title":"Computational propaganda","year":"2019","unstructured":"Woolley, S., & Howard, P. (Eds.). (2019). Computational propaganda. Oxford University Press."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-023-09717-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-023-09717-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-023-09717-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T03:38:27Z","timestamp":1695181107000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-023-09717-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["9717"],"URL":"https:\/\/doi.org\/10.1007\/s10676-023-09717-7","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"7 August 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"46"}}