Counter-terrorism, ethics and technology : emerging challenges at the frontiers of counter-terrorism /
Saved in:
Imprint: | Cham : Springer, [2021] ©2021 |
---|---|
Description: | 1 online resource (231 pages) |
Language: | English |
Series: | Advanced sciences and technologies for security applications Advanced sciences and technologies for security applications. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/13397839 |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | 13397839 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 211218s2021 sz ob 000 0 eng d | ||
005 | 20220624111547.0 | ||
019 | |a 1290020371 | ||
020 | |a 9783030902216 |q (electronic bk.) | ||
020 | |a 3030902218 |q (electronic bk.) | ||
020 | |z 9783030902209 | ||
024 | 7 | |a 10.1007/978-3-030-90221-6 |2 doi | |
035 | |a (OCoLC)1289369443 |z (OCoLC)1290020371 | ||
035 | 9 | |a (OCLCCM-CC)1289369443 | |
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d GW5XE |d YDX |d OCLCF |d OCLCO |d OCLCQ |d OCLCO | ||
049 | |a MAIN | ||
050 | 4 | |a HV6431 |b .C68 2021 | |
072 | 7 | |a POL037000 |2 bisacsh | |
245 | 0 | 0 | |a Counter-terrorism, ethics and technology : |b emerging challenges at the frontiers of counter-terrorism / |c Adam Henschke, Alastair Reed, Scott Robbins, Seumas Miller, editors. |
264 | 1 | |a Cham : |b Springer, |c [2021] | |
264 | 4 | |c ©2021 | |
300 | |a 1 online resource (231 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Advanced sciences and technologies for security applications | |
506 | 0 | |a Open access |5 GW5XE | |
504 | |a Includes bibliographical references. | ||
520 | |a This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the "social credit system." Counter-terrorism technologies can easily succumb to mission creep, where a technologys exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world | ||
505 | 0 | |a 1. Drones As A Tool In Counter-Terrorism -- 2. Deception Strategies In Autonomous Warfare -- 3. Rethinking Drones As Terrorist Weapons -- 4. Proportionality, Surveillance And Counter-Terrorism -- 5. Privacy, Encryption And Counter-Terrorism -- 6. The Rise Of The Modern Intelligence State -- 7. Acceptability Of Bulk Facial Recognition for Counter-Terrorism: The Case For A Total Ban -- 8. "No cracks, no blind spots, no gaps" : Technologically-enabled "Preventive" Counterterrorism and Mass Repression in Xinjiang, China -- 9. Media Ecologies, On-Line Radicalisation And Bottom-Up CVE Approaches -- 10. The Ethics of Regulating Extremist Content Online -- 11. Terrorism And The Internet Of Things: Cyberterrorism Will Happen -- 12. Violent Non State Actors And The Technology Adoption Curve. | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Terrorism |x Prevention |x Moral and ethical aspects. | |
650 | 0 | |a Technology |x Moral and ethical aspects. |0 http://id.loc.gov/authorities/subjects/sh85133162 | |
650 | 6 | |a Terrorisme |x Prévention |x Aspect moral. | |
650 | 6 | |a Technologie |x Aspect moral. | |
650 | 7 | |a Technology |x Moral and ethical aspects. |2 fast |0 (OCoLC)fst01145164 | |
650 | 7 | |a Terrorism |x Prevention |x Moral and ethical aspects. |2 fast |0 (OCoLC)fst01148130 | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Henschke, Adam, |d 1976- |e editor. |0 http://id.loc.gov/authorities/names/n2012077190 | |
700 | 1 | |a Reed, Alastair |q (A.G.), |e editor. |0 http://id.loc.gov/authorities/names/no2016064636 | |
700 | 1 | |a Robbins, Scott, |e editor. | |
700 | 1 | |a Miller, Seumas, |e editor. |0 http://id.loc.gov/authorities/names/n91058294 | |
776 | 0 | 8 | |i Print version: |a Henschke, Adam. |t Counter-Terrorism, Ethics and Technology. |d Cham : Springer International Publishing AG, ©2022 |z 9783030902209 |
830 | 0 | |a Advanced sciences and technologies for security applications. |0 http://id.loc.gov/authorities/names/n2005059809 | |
856 | 4 | 0 | |u https://link.springer.com/book/10.1007/978-3-030-90221-6 |y Springer Nature |
856 | 4 | 0 | |u https://directory.doabooks.org/handle/20.500.12854/77340 |y Open Access Publishing in European Networks |
929 | |a oclccm | ||
999 | f | f | |s b59803c2-35a3-4530-8833-a45fd93c873d |i 84ebe11a-2822-484c-abce-d48c089c5abb |
928 | |t Library of Congress classification |a HV6431.C68 2021 |l Online |c UC-FullText |u https://link.springer.com/book/10.1007/978-3-030-90221-6 |z Springer Nature |u https://directory.doabooks.org/handle/20.500.12854/77340 |z Open Access Publishing in European Networks |g ebooks |i 13539043 |