Navigation überspringen
Universitätsbibliothek Heidelberg
Standort: ---
Exemplare: ---

+ Andere Auflagen/Ausgaben
 Online-Ressource
Titel:Counter-terrorism, ethics and technology
Titelzusatz:emerging challenges at the frontiers of counter-terrorism
Mitwirkende:Henschke, Adam [HerausgeberIn]   i
 Reed, Alastair [HerausgeberIn]   i
 Robbins, Scott [HerausgeberIn]   i
 Miller, Seumas [HerausgeberIn]   i
Verf.angabe:edited by Adam Henschke, Alastair Reed, Scott Robbins, Seumas Miller
Ausgabe:1st ed. 2021
Verlagsort:Cham
 Cham
Verlag:Springer International Publishing
 Imprint: Springer
Jahr:2021
 2021
Umfang:1 Online-Ressource (xvi, 221 Seiten)
Gesamttitel/Reihe:Advanced sciences and technologies for security applications
 Springer eBook Collection
Fussnoten:Open Access ; Literaturverzeichnisse, Literaturhinweise
Ang. zum Inhalt:Drones as a tool In counter-terrorism
 Deception strategies In autonomous warfare
 Rethinking drones as terrorist weapons
 Proportionality, surveillance and counter-terrorism
 Privacy, encryption and counter-terrorism
 The rise of the modern intelligence state
 Acceptability of bulk facial recognition for counter-terrorism : the case for a total ban
 “No cracks, no blind spots, no gaps” : technologically-enabled “preventive” counterterrorism and mass repression in Xinjiang, China
 Media ecologies, on-line radicalisation and bottom-up CVE approaches
 The ethics of regulating extremist content online
 Terrorism and the Internet of things : cyberterrorism will happen
 Violent non state actors and the technology adoption curve
ISBN:978-3-030-90221-6
Abstract:This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
DOI:doi:10.1007/978-3-030-90221-6
URL:kostenfrei: Resolving-System: https://doi.org/10.1007/978-3-030-90221-6
 DOI: https://doi.org/10.1007/978-3-030-90221-6
Schlagwörter:(s)Internationaler Terrorismus   i / (s)Kollektive Sicherheit   i / (s)Mensch-Maschine-Kommunikation   i / (s)Waffe   i / (s)Waffensystem   i / (s)Social Media   i
Datenträger:Online-Ressource
Sprache:eng
Bibliogr. Hinweis:Erscheint auch als : Druck-Ausgabe
 Erscheint auch als : Druck-Ausgabe
 Erscheint auch als : Druck-Ausgabe
K10plus-PPN:1782665471
 
 
Lokale URL UB: Zum Volltext

Permanenter Link auf diesen Titel (bookmarkfähig):  https://katalog.ub.uni-heidelberg.de/titel/68849277   QR-Code

zum Seitenanfang