Counter-Terrorism, Ethics and Technology : : Emerging Challenges at the Frontiers of Counter-Terrorism.
Saved in:
Superior document: | Advanced Sciences and Technologies for Security Applications Series |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Cham : : Springer International Publishing AG,, 2021. ©2021. |
Year of Publication: | 2021 |
Edition: | 1st ed. |
Language: | English |
Series: | Advanced Sciences and Technologies for Security Applications Series
|
Online Access: | |
Physical Description: | 1 online resource (231 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 07241nam a22004573i 4500 | ||
---|---|---|---|
001 | 5006827145 | ||
003 | MiAaPQ | ||
005 | 20240229073845.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 240229s2021 xx o ||||0 eng d | ||
020 | |a 9783030902216 |q (electronic bk.) | ||
020 | |z 9783030902209 | ||
035 | |a (MiAaPQ)5006827145 | ||
035 | |a (Au-PeEL)EBL6827145 | ||
035 | |a (OCoLC)1289369443 | ||
040 | |a MiAaPQ |b eng |e rda |e pn |c MiAaPQ |d MiAaPQ | ||
050 | 4 | |a JC328.6-.65 | |
100 | 1 | |a Henschke, Adam. | |
245 | 1 | 0 | |a Counter-Terrorism, Ethics and Technology : |b Emerging Challenges at the Frontiers of Counter-Terrorism. |
250 | |a 1st ed. | ||
264 | 1 | |a Cham : |b Springer International Publishing AG, |c 2021. | |
264 | 4 | |c ©2021. | |
300 | |a 1 online resource (231 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Advanced Sciences and Technologies for Security Applications Series | |
505 | 0 | |a Intro -- Acknowledgments -- Introduction -- Contents -- Technology as Terrorism: Police Control Technologies and Drone Warfare -- 1 The Concept of Technology -- 1.1 Technology and Moral Mediation -- 1.2 Technology and Bias -- 1.3 What Is Terrorism? -- 2 Police Control Technologies as Terrorist Display -- 2.1 Riot Control Technologies -- 2.2 Tasers and Stun Guns -- 2.3 Implications -- 3 Drone Warfare -- 3.1 The US Drone Program -- 3.2 Drone Warfare as Terrorism -- 4 Conclusion: Terrorism from the Victim's Point of View -- References -- On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations -- 1 Introduction -- 2 Irregular Warfare -- 3 Broad Counterterrorism Ethics Considerations -- 4 The Moral Significance of Narrative, Social Signalling, and Imagery -- 5 Application to Counterterrorism Drone Operations -- 6 Conclusion -- References -- Sunlight Glinting on Clouds: Deception and Autonomous Weapons Systems -- 1 Introduction -- 2 Autonomous Weapons Systems -- 3 Arguments Against the Use of Autonomous Weapons Systems -- 4 Deception in Armed Conflict -- 4.1 So, What Is Deception and Could a Weapon Be Deceived? -- 5 Deception and AWS -- 6 Conclusions -- References -- Weapons of Mass Destruction-Conceptual and Ethical Issues with Regard to terrorism -- 1 Introduction -- 2 The (Never-Ending) History of WMD and CBRN -- 3 Abandoning WMD Altogether? -- 4 WMD and Terrorism -- 5 Alternative Concepts for Terrorist Weapons of Mass Destruction -- 6 The Terrorist Weapon Rating System -- 7 Conclusion -- References -- Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat -- 1 Cyber Terrorism Has Not Taken Place -- 2 The IoT: Cyber-Physical Systems That Will Span The Globe -- 3 So What? An Inventory of Features -- 4 Will IoT Enabled Cyber-Attacks Be Acts of Terrorism?. | |
505 | 8 | |a 5 Ethics and Responsibilities for IoT Enabled Cyber-Terrorism -- References -- Facial Recognition for Counter-Terrorism: Neither a Ban Nor a Free-for-All -- 1 Introduction -- 2 The Basics of Facial Recognition -- 3 Arguments for an FRT Ban -- 3.1 Disparate Impact -- 3.2 Chills Behavior -- 3.3 Scope Creep -- 3.4 An Outright Ban -- 4 Conditions for the Use of Facial Recognition -- 4.1 Reasonable Expectation of Privacy -- 4.2 Cause for the State's Use of FRTs -- 4.3 Reliance on Third-Party Technology -- 5 Conclusion -- References -- The Rise of the Modern Intelligence State -- 1 Introduction -- 2 The Normalisation of Surveillance -- 2.1 Surveillance as Control -- 2.2 Ethical Boundaries of the Surveillance State -- 3 Technological Evolution of the Surveillance State -- 3.1 The Security State -- 3.2 The Surveillance State -- 3.3 The Intelligence State -- 4 The Dividual and the Intelligence State -- 4.1 The Transparent Self -- 4.2 Emerging Technologies of Control -- 5 Conclusions -- References -- "No Cracks, no Blind Spots, no Gaps": Technologically-Enabled "Preventative" Counterterrorism and Mass Repression in Xinjiang, China -- 1 Introduction -- 2 Chinese Colonialism and Uyghur 'Terrorism' in Xinjiang -- 3 China's Counterterrorism Policy: Toward 'Enduring Peace' -- 4 Seeing Like the CCP: 'Social Management', Counterterrorism and 'Re-Education' -- 5 Conclusion -- References -- Privacy, Encryption and Counter-Terrorism -- 1 Privacy/Confidentiality, Autonomy and Security -- 2 Encryption -- 3 Ethical Analysis -- References -- An End to Encryption? Surveillance and Proportionality in the Crypto-Wars -- 1 Introduction -- 2 Terrorist Use of E2EE -- 3 Countering E2EE -- 4 Privacy and E2EE -- 5 Security Versus Security -- 6 Proportionality -- 7 Maintaining Perspective -- 8 Conclusion -- References -- Who Should Regulate Extremist Content Online?. | |
505 | 8 | |a 1 Framing the Problem -- 2 The Status Quo: Regulation and Self-Regulation -- 3 Terrorism as a Driver for Deplatforming: From ISIS to Political Extremists -- 4 A Deeper Cut: De-Platforming the Platforms -- 5 Ethical Challenges -- 5.1 Moral Legitimacy of Private Actors -- 5.2 Concentration of Power -- 5.3 Lack of Separation of Power -- 6 Different Institutions, Different Ethical Responsibilities -- 7 Conclusion: Is Co-Regulation a Solution? -- References -- White Knights, Black Armour, Digital Worlds: Exploring the Efficacy of Analysing Online Manifestos of Terrorist Actors in the Counter Terrorism Landscape -- 1 Introduction -- 2 Background -- 3 Manifestos as the Script, Violence as the Final Act -- 4 Cues and Liner Notes: World-Building and Motivations of Terrorist Actors -- 5 Analysing BT's Manifesto -- 5.1 The Self as 'The Pseudocommando' -- 5.2 Intense Anger at Injustice and Seeking Revenge Against Others -- 5.3 Unbalanced Existential Concerns -- 6 The (Digital) World We Live in or the (Digital) Battleground We Fight in? -- 7 Conclusion -- References. | |
588 | |a Description based on publisher supplied metadata and other sources. | ||
590 | |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
655 | 4 | |a Electronic books. | |
700 | 1 | |a Reed, Alastair. | |
700 | 1 | |a Robbins, Scott. | |
700 | 1 | |a Miller, Seumas. | |
776 | 0 | 8 | |i Print version: |a Henschke, Adam |t Counter-Terrorism, Ethics and Technology |d Cham : Springer International Publishing AG,c2021 |z 9783030902209 |
797 | 2 | |a ProQuest (Firm) | |
830 | 0 | |a Advanced Sciences and Technologies for Security Applications Series | |
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6827145 |z Click to View |