Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Counter-terrorism, ethics and techno...
~
Henschke, Adam.
Counter-terrorism, ethics and technologyemerging challenges at the frontiers of counter-terrorism /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Counter-terrorism, ethics and technologyedited by Adam Henschke ... [et al.].
Reminder of title:
emerging challenges at the frontiers of counter-terrorism /
other author:
Henschke, Adam.
Published:
Cham :Springer International Publishing :2021.
Description:
xvi, 221 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
TerrorismPrevention
Online resource:
https://doi.org/10.1007/978-3-030-90221-6
ISBN:
9783030902216$q(electronic bk.)
Counter-terrorism, ethics and technologyemerging challenges at the frontiers of counter-terrorism /
Counter-terrorism, ethics and technology
emerging challenges at the frontiers of counter-terrorism /[electronic resource] :edited by Adam Henschke ... [et al.]. - Cham :Springer International Publishing :2021. - xvi, 221 p. :ill., digital ;24 cm. - Advanced sciences and technologies for security applications,2363-9466. - Advanced sciences and technologies for security applications..
1. Drones As A Tool In Counter-Terrorism -- 2. Deception Strategies In Autonomous Warfare -- 3. Rethinking Drones As Terrorist Weapons -- 4. Proportionality, Surveillance And Counter-Terrorism -- 5. Privacy, Encryption And Counter-Terrorism -- 6. The Rise Of The Modern Intelligence State -- 7. Acceptability Of Bulk Facial Recognition for Counter-Terrorism: The Case For A Total Ban -- 8. "No cracks, no blind spots, no gaps": Technologically-enabled "Preventive" Counterterrorism and Mass Repression in Xinjiang, China -- 9. Media Ecologies, On-Line Radicalisation And Bottom-Up CVE Approaches -- 10. The Ethics of Regulating Extremist Content Online -- 11. Terrorism And The Internet Of Things: Cyberterrorism Will Happen -- 12. Violent Non State Actors And The Technology Adoption Curve.
Open access.
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the "social credit system." Counter-terrorism technologies can easily succumb to mission creep, where a technology's exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
ISBN: 9783030902216$q(electronic bk.)
Standard No.: 10.1007/978-3-030-90221-6doiSubjects--Topical Terms:
611181
Terrorism
--Prevention
LC Class. No.: HV6431 / .C68 2021
Dewey Class. No.: 363.325
Counter-terrorism, ethics and technologyemerging challenges at the frontiers of counter-terrorism /
LDR
:03541nmm a2200349 a 4500
001
612474
003
DE-He213
005
20211214071905.0
006
m d
007
cr nn 008maaau
008
220526s2021 sz s 0 eng d
020
$a
9783030902216$q(electronic bk.)
020
$a
9783030902209$q(paper)
024
7
$a
10.1007/978-3-030-90221-6
$2
doi
035
$a
978-3-030-90221-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV6431
$b
.C68 2021
072
7
$a
JPWL
$2
bicssc
072
7
$a
POL037000
$2
bisacsh
072
7
$a
JPWL
$2
thema
082
0 4
$a
363.325
$2
23
090
$a
HV6431
$b
.C855 2021
245
0 0
$a
Counter-terrorism, ethics and technology
$h
[electronic resource] :
$b
emerging challenges at the frontiers of counter-terrorism /
$c
edited by Adam Henschke ... [et al.].
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xvi, 221 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advanced sciences and technologies for security applications,
$x
2363-9466
505
0
$a
1. Drones As A Tool In Counter-Terrorism -- 2. Deception Strategies In Autonomous Warfare -- 3. Rethinking Drones As Terrorist Weapons -- 4. Proportionality, Surveillance And Counter-Terrorism -- 5. Privacy, Encryption And Counter-Terrorism -- 6. The Rise Of The Modern Intelligence State -- 7. Acceptability Of Bulk Facial Recognition for Counter-Terrorism: The Case For A Total Ban -- 8. "No cracks, no blind spots, no gaps": Technologically-enabled "Preventive" Counterterrorism and Mass Repression in Xinjiang, China -- 9. Media Ecologies, On-Line Radicalisation And Bottom-Up CVE Approaches -- 10. The Ethics of Regulating Extremist Content Online -- 11. Terrorism And The Internet Of Things: Cyberterrorism Will Happen -- 12. Violent Non State Actors And The Technology Adoption Curve.
506
$a
Open access.
520
$a
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the "social credit system." Counter-terrorism technologies can easily succumb to mission creep, where a technology's exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
650
0
$a
Terrorism
$x
Prevention
$x
Moral and ethical aspects.
$3
611181
650
0
$a
Technology
$x
Moral and ethical aspects.
$3
189960
650
1 4
$a
Terrorism and Political Violence.
$3
740222
650
2 4
$a
Ethics.
$3
174971
650
2 4
$a
Digital/New Media.
$3
764448
650
2 4
$a
Science, Humanities and Social Sciences, multidisciplinary.
$3
760550
650
2 4
$a
Philosophy of Technology.
$3
274756
700
1
$a
Henschke, Adam.
$3
910974
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Advanced sciences and technologies for security applications.
$3
738348
856
4 0
$u
https://doi.org/10.1007/978-3-030-90221-6
950
$a
Political Science and International Studies (SpringerNature-41174)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000207948
電子館藏
1圖書
電子書
EB HV6431 .C855 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-90221-6
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login