Counter-Terrorism, Ethics and Technology : : Emerging Challenges at the Frontiers of Counter-Terrorism.

This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time...

Full description

Saved in:
Bibliographic Details
Superior document:Advanced Sciences and Technologies for Security Applications
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2021.
©2021.
Year of Publication:2021
Language:English
Series:Advanced Sciences and Technologies for Security Applications
Physical Description:1 online resource (231 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993544630104498
ctrlnum (CKB)5600000000185464
(MiAaPQ)EBC6827145
(Au-PeEL)EBL6827145
(OCoLC)1289369443
(oapen)https://directory.doabooks.org/handle/20.500.12854/77340
(PPN)259469645
(EXLCZ)995600000000185464
collection bib_alma
record_format marc
spelling Henschke, Adam.
Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
Springer Nature 2021
Cham : Springer International Publishing AG, 2021.
©2021.
1 online resource (231 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Advanced Sciences and Technologies for Security Applications
Description based on publisher supplied metadata and other sources.
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
English
Terrorism, armed struggle bicssc
Ethics & moral philosophy bicssc
Media studies bicssc
Interdisciplinary studies bicssc
Philosophy bicssc
Terrorism and Technology
Counter-terrorism Ethics
Social Media and Terrorism
Artificial Intelligence and Counter-terrorism
Bulk Data Collection Terrorism
Ethics of Technology
Open Access
3-030-90220-X
Reed, Alastair.
Robbins, Scott.
Miller, Seumas.
language English
format eBook
author Henschke, Adam.
spellingShingle Henschke, Adam.
Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
Advanced Sciences and Technologies for Security Applications
author_facet Henschke, Adam.
Reed, Alastair.
Robbins, Scott.
Miller, Seumas.
author_variant a h ah
author2 Reed, Alastair.
Robbins, Scott.
Miller, Seumas.
author2_variant a r ar
s r sr
s m sm
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Henschke, Adam.
title Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
title_sub Emerging Challenges at the Frontiers of Counter-Terrorism.
title_full Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
title_fullStr Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
title_full_unstemmed Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
title_auth Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
title_new Counter-Terrorism, Ethics and Technology :
title_sort counter-terrorism, ethics and technology : emerging challenges at the frontiers of counter-terrorism.
series Advanced Sciences and Technologies for Security Applications
series2 Advanced Sciences and Technologies for Security Applications
publisher Springer Nature
Springer International Publishing AG,
publishDate 2021
physical 1 online resource (231 pages)
isbn 3-030-90221-8
3-030-90220-X
callnumber-first J - Political Science
callnumber-subject JC - Political Theory
callnumber-label JC328
callnumber-sort JC 3328.6 265
illustrated Not Illustrated
oclc_num 1289369443
work_keys_str_mv AT henschkeadam counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism
AT reedalastair counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism
AT robbinsscott counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism
AT millerseumas counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism
status_str n
ids_txt_mv (CKB)5600000000185464
(MiAaPQ)EBC6827145
(Au-PeEL)EBL6827145
(OCoLC)1289369443
(oapen)https://directory.doabooks.org/handle/20.500.12854/77340
(PPN)259469645
(EXLCZ)995600000000185464
carrierType_str_mv cr
hierarchy_parent_title Advanced Sciences and Technologies for Security Applications
is_hierarchy_title Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
container_title Advanced Sciences and Technologies for Security Applications
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
_version_ 1787548761245876224
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03571nam a22005773i 4500</leader><controlfield tag="001">993544630104498</controlfield><controlfield tag="005">20231110231436.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">220207s2021 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-030-90221-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5600000000185464</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6827145</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6827145</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1289369443</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/77340</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)259469645</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995600000000185464</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JC328.6-.65</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Henschke, Adam.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Counter-Terrorism, Ethics and Technology :</subfield><subfield code="b">Emerging Challenges at the Frontiers of Counter-Terrorism.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Springer Nature</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (231 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advanced Sciences and Technologies for Security Applications </subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism, armed struggle</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ethics &amp; moral philosophy</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Media studies</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Interdisciplinary studies</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Philosophy</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Terrorism and Technology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Counter-terrorism Ethics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Social Media and Terrorism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Artificial Intelligence and Counter-terrorism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bulk Data Collection Terrorism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ethics of Technology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Open Access</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-030-90220-X</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reed, Alastair.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Robbins, Scott.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miller, Seumas.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advanced Sciences and Technologies for Security Applications </subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-11-11 07:07:00 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2021-12-24 09:19:48 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337731550004498&amp;Force_direct=true</subfield><subfield code="Z">5337731550004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337731550004498</subfield></datafield></record></collection>