Counter-Terrorism, Ethics and Technology : : Emerging Challenges at the Frontiers of Counter-Terrorism.

This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time...

Full description

Saved in:
Bibliographic Details
Superior document:Advanced Sciences and Technologies for Security Applications
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2021.
©2021.
Year of Publication:2021
Language:English
Series:Advanced Sciences and Technologies for Security Applications
Physical Description:1 online resource (231 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 03571nam a22005773i 4500
001 993544630104498
005 20231110231436.0
006 m o d |
007 cr cnu||||||||
008 220207s2021 xx o ||||0 eng d
020 |a 3-030-90221-8 
035 |a (CKB)5600000000185464 
035 |a (MiAaPQ)EBC6827145 
035 |a (Au-PeEL)EBL6827145 
035 |a (OCoLC)1289369443 
035 |a (oapen)https://directory.doabooks.org/handle/20.500.12854/77340 
035 |a (PPN)259469645 
035 |a (EXLCZ)995600000000185464 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
041 0 |a eng 
050 4 |a JC328.6-.65 
100 1 |a Henschke, Adam. 
245 1 0 |a Counter-Terrorism, Ethics and Technology :  |b Emerging Challenges at the Frontiers of Counter-Terrorism. 
260 |b Springer Nature  |c 2021 
264 1 |a Cham :  |b Springer International Publishing AG,  |c 2021. 
264 4 |c ©2021. 
300 |a 1 online resource (231 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advanced Sciences and Technologies for Security Applications  
588 |a Description based on publisher supplied metadata and other sources. 
520 |a This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world. 
546 |a English 
650 7 |a Terrorism, armed struggle  |2 bicssc 
650 7 |a Ethics & moral philosophy  |2 bicssc 
650 7 |a Media studies  |2 bicssc 
650 7 |a Interdisciplinary studies  |2 bicssc 
650 7 |a Philosophy  |2 bicssc 
653 |a Terrorism and Technology 
653 |a Counter-terrorism Ethics 
653 |a Social Media and Terrorism 
653 |a Artificial Intelligence and Counter-terrorism 
653 |a Bulk Data Collection Terrorism 
653 |a Ethics of Technology 
653 |a Open Access 
776 |z 3-030-90220-X 
700 1 |a Reed, Alastair. 
700 1 |a Robbins, Scott. 
700 1 |a Miller, Seumas. 
830 0 |a Advanced Sciences and Technologies for Security Applications  
906 |a BOOK 
ADM |b 2023-11-11 07:07:00 Europe/Vienna  |f system  |c marc21  |a 2021-12-24 09:19:48 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337731550004498&Force_direct=true  |Z 5337731550004498  |b Available  |8 5337731550004498