語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Counter-Terrorism, Ethics and Techno...
~
Robbins, Scott.
Counter-Terrorism, Ethics and Technology = Emerging Challenges at the Frontiers of Counter-Terrorism /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Counter-Terrorism, Ethics and Technology/ edited by Adam Henschke, Alastair Reed, Scott Robbins, Seumas Miller.
其他題名:
Emerging Challenges at the Frontiers of Counter-Terrorism /
其他作者:
Miller, Seumas.
面頁冊數:
XVI, 221 p. 1 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Philosophy of Technology. -
電子資源:
https://doi.org/10.1007/978-3-030-90221-6
ISBN:
9783030902216
Counter-Terrorism, Ethics and Technology = Emerging Challenges at the Frontiers of Counter-Terrorism /
Counter-Terrorism, Ethics and Technology
Emerging Challenges at the Frontiers of Counter-Terrorism /[electronic resource] :edited by Adam Henschke, Alastair Reed, Scott Robbins, Seumas Miller. - 1st ed. 2021. - XVI, 221 p. 1 illus.online resource. - Advanced Sciences and Technologies for Security Applications,2363-9466. - Advanced Sciences and Technologies for Security Applications,.
1. Drones As A Tool In Counter-Terrorism -- 2. Deception Strategies In Autonomous Warfare -- 3. Rethinking Drones As Terrorist Weapons -- 4. Proportionality, Surveillance And Counter-Terrorism -- 5. Privacy, Encryption And Counter-Terrorism -- 6. The Rise Of The Modern Intelligence State -- 7. Acceptability Of Bulk Facial Recognition for Counter-Terrorism: The Case For A Total Ban -- 8. “No cracks, no blind spots, no gaps”: Technologically-enabled “Preventive” Counterterrorism and Mass Repression in Xinjiang, China -- 9. Media Ecologies, On-Line Radicalisation And Bottom-Up CVE Approaches -- 10. The Ethics of Regulating Extremist Content Online -- 11. Terrorism And The Internet Of Things: Cyberterrorism Will Happen -- 12. Violent Non State Actors And The Technology Adoption Curve.
Open Access
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
ISBN: 9783030902216
Standard No.: 10.1007/978-3-030-90221-6doiSubjects--Topical Terms:
671635
Philosophy of Technology.
LC Class. No.: JX5420
Dewey Class. No.: 303.625
Counter-Terrorism, Ethics and Technology = Emerging Challenges at the Frontiers of Counter-Terrorism /
LDR
:03986nam a22004335i 4500
001
1057739
003
DE-He213
005
20211214071905.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030902216
$9
978-3-030-90221-6
024
7
$a
10.1007/978-3-030-90221-6
$2
doi
035
$a
978-3-030-90221-6
050
4
$a
JX5420
072
7
$a
JPWL
$2
bicssc
072
7
$a
POL037000
$2
bisacsh
072
7
$a
JPWL
$2
thema
082
0 4
$a
303.625
$2
23
245
1 0
$a
Counter-Terrorism, Ethics and Technology
$h
[electronic resource] :
$b
Emerging Challenges at the Frontiers of Counter-Terrorism /
$c
edited by Adam Henschke, Alastair Reed, Scott Robbins, Seumas Miller.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XVI, 221 p. 1 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advanced Sciences and Technologies for Security Applications,
$x
2363-9466
505
0
$a
1. Drones As A Tool In Counter-Terrorism -- 2. Deception Strategies In Autonomous Warfare -- 3. Rethinking Drones As Terrorist Weapons -- 4. Proportionality, Surveillance And Counter-Terrorism -- 5. Privacy, Encryption And Counter-Terrorism -- 6. The Rise Of The Modern Intelligence State -- 7. Acceptability Of Bulk Facial Recognition for Counter-Terrorism: The Case For A Total Ban -- 8. “No cracks, no blind spots, no gaps”: Technologically-enabled “Preventive” Counterterrorism and Mass Repression in Xinjiang, China -- 9. Media Ecologies, On-Line Radicalisation And Bottom-Up CVE Approaches -- 10. The Ethics of Regulating Extremist Content Online -- 11. Terrorism And The Internet Of Things: Cyberterrorism Will Happen -- 12. Violent Non State Actors And The Technology Adoption Curve.
506
0
$a
Open Access
520
$a
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
650
2 4
$a
Philosophy of Technology.
$3
671635
650
2 4
$a
Science, Humanities and Social Sciences, multidisciplinary.
$3
1114153
650
2 4
$a
Digital/New Media.
$3
1116471
650
1 4
$a
Terrorism and Political Violence.
$3
1105326
650
0
$a
Philosophy.
$3
559771
650
0
$a
Digital media.
$3
555702
650
0
$a
Ethics.
$3
555769
650
0
$a
Political violence.
$3
567618
650
0
$a
Terrorism.
$3
557490
700
1
$a
Miller, Seumas.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
671598
700
1
$a
Robbins, Scott.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1363258
700
1
$a
Reed, Alastair.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1363257
700
1
$a
Henschke, Adam.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1363256
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030902209
776
0 8
$i
Printed edition:
$z
9783030902223
776
0 8
$i
Printed edition:
$z
9783030902230
830
0
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
$3
1266773
856
4 0
$u
https://doi.org/10.1007/978-3-030-90221-6
912
$a
ZDB-2-POS
912
$a
ZDB-2-SXPI
912
$a
ZDB-2-SOB
950
$a
Political Science and International Studies (SpringerNature-41174)
950
$a
Political Science and International Studies (R0) (SpringerNature-43724)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入