Counter-Terrorism, Ethics and Technology : : Emerging Challenges at the Frontiers of Counter-Terrorism.
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time...
Saved in:
Superior document: | Advanced Sciences and Technologies for Security Applications |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Cham : : Springer International Publishing AG,, 2021. ©2021. |
Year of Publication: | 2021 |
Language: | English |
Series: | Advanced Sciences and Technologies for Security Applications
|
Physical Description: | 1 online resource (231 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993544630104498 |
---|---|
ctrlnum |
(CKB)5600000000185464 (MiAaPQ)EBC6827145 (Au-PeEL)EBL6827145 (OCoLC)1289369443 (oapen)https://directory.doabooks.org/handle/20.500.12854/77340 (PPN)259469645 (EXLCZ)995600000000185464 |
collection |
bib_alma |
record_format |
marc |
spelling |
Henschke, Adam. Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism. Springer Nature 2021 Cham : Springer International Publishing AG, 2021. ©2021. 1 online resource (231 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Advanced Sciences and Technologies for Security Applications Description based on publisher supplied metadata and other sources. This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world. English Terrorism, armed struggle bicssc Ethics & moral philosophy bicssc Media studies bicssc Interdisciplinary studies bicssc Philosophy bicssc Terrorism and Technology Counter-terrorism Ethics Social Media and Terrorism Artificial Intelligence and Counter-terrorism Bulk Data Collection Terrorism Ethics of Technology Open Access 3-030-90220-X Reed, Alastair. Robbins, Scott. Miller, Seumas. |
language |
English |
format |
eBook |
author |
Henschke, Adam. |
spellingShingle |
Henschke, Adam. Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism. Advanced Sciences and Technologies for Security Applications |
author_facet |
Henschke, Adam. Reed, Alastair. Robbins, Scott. Miller, Seumas. |
author_variant |
a h ah |
author2 |
Reed, Alastair. Robbins, Scott. Miller, Seumas. |
author2_variant |
a r ar s r sr s m sm |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR |
author_sort |
Henschke, Adam. |
title |
Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism. |
title_sub |
Emerging Challenges at the Frontiers of Counter-Terrorism. |
title_full |
Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism. |
title_fullStr |
Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism. |
title_full_unstemmed |
Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism. |
title_auth |
Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism. |
title_new |
Counter-Terrorism, Ethics and Technology : |
title_sort |
counter-terrorism, ethics and technology : emerging challenges at the frontiers of counter-terrorism. |
series |
Advanced Sciences and Technologies for Security Applications |
series2 |
Advanced Sciences and Technologies for Security Applications |
publisher |
Springer Nature Springer International Publishing AG, |
publishDate |
2021 |
physical |
1 online resource (231 pages) |
isbn |
3-030-90221-8 3-030-90220-X |
callnumber-first |
J - Political Science |
callnumber-subject |
JC - Political Theory |
callnumber-label |
JC328 |
callnumber-sort |
JC 3328.6 265 |
illustrated |
Not Illustrated |
oclc_num |
1289369443 |
work_keys_str_mv |
AT henschkeadam counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism AT reedalastair counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism AT robbinsscott counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism AT millerseumas counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism |
status_str |
n |
ids_txt_mv |
(CKB)5600000000185464 (MiAaPQ)EBC6827145 (Au-PeEL)EBL6827145 (OCoLC)1289369443 (oapen)https://directory.doabooks.org/handle/20.500.12854/77340 (PPN)259469645 (EXLCZ)995600000000185464 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Advanced Sciences and Technologies for Security Applications |
is_hierarchy_title |
Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism. |
container_title |
Advanced Sciences and Technologies for Security Applications |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField |
_version_ |
1787548761245876224 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03571nam a22005773i 4500</leader><controlfield tag="001">993544630104498</controlfield><controlfield tag="005">20231110231436.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">220207s2021 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-030-90221-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5600000000185464</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6827145</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6827145</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1289369443</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/77340</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)259469645</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995600000000185464</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JC328.6-.65</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Henschke, Adam.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Counter-Terrorism, Ethics and Technology :</subfield><subfield code="b">Emerging Challenges at the Frontiers of Counter-Terrorism.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Springer Nature</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (231 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advanced Sciences and Technologies for Security Applications </subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism, armed struggle</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ethics & moral philosophy</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Media studies</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Interdisciplinary studies</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Philosophy</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Terrorism and Technology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Counter-terrorism Ethics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Social Media and Terrorism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Artificial Intelligence and Counter-terrorism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bulk Data Collection Terrorism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ethics of Technology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Open Access</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-030-90220-X</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reed, Alastair.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Robbins, Scott.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miller, Seumas.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advanced Sciences and Technologies for Security Applications </subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-11-11 07:07:00 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2021-12-24 09:19:48 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337731550004498&Force_direct=true</subfield><subfield code="Z">5337731550004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337731550004498</subfield></datafield></record></collection> |