Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism (Record no. 39103)

MARC details
000 -LEADER
fixed length control field 03497naaaa2200529uu 4500
001 - CONTROL NUMBER
control field https://directory.doabooks.org/handle/20.500.12854/77340
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220219193825.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 978-3-030-90221-6
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030902216
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-030-90221-6
Terms of availability doi
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title English
042 ## - AUTHENTICATION CODE
Authentication code dc
072 #7 - SUBJECT CATEGORY CODE
Subject category code JPWL
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code HPQ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code JFD
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code GT
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code HP
Source bicssc
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Henschke, Adam
Relationship edt
245 10 - TITLE STATEMENT
Title Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Springer Nature
Date of publication, distribution, etc. 2021
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic resource (221 p.)
506 0# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Open Access
Source of term star
Standardized terminology for access restriction Unrestricted online access
520 ## - SUMMARY, ETC.
Summary, etc. This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction Creative Commons
Use and reproduction rights by/4.0/
Source of term cc
-- http://creativecommons.org/licenses/by/4.0/
546 ## - LANGUAGE NOTE
Language note English
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Terrorism, armed struggle
Source of heading or term bicssc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ethics & moral philosophy
Source of heading or term bicssc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Media studies
Source of heading or term bicssc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Interdisciplinary studies
Source of heading or term bicssc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Philosophy
Source of heading or term bicssc
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Terrorism and Technology
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Counter-terrorism Ethics
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Social Media and Terrorism
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Artificial Intelligence and Counter-terrorism
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Bulk Data Collection Terrorism
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Ethics of Technology
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Open Access
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Reed, Alastair
Relationship edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Robbins, Scott
Relationship edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Miller, Seumas
Relationship edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Henschke, Adam
Relationship oth
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Reed, Alastair
Relationship oth
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Robbins, Scott
Relationship oth
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Miller, Seumas
Relationship oth
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://library.oapen.org/bitstream/20.500.12657/52393/1/978-3-030-90221-6.pdf">https://library.oapen.org/bitstream/20.500.12657/52393/1/978-3-030-90221-6.pdf</a>
Access status 0
Public note DOAB: download the publication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://directory.doabooks.org/handle/20.500.12854/77340">https://directory.doabooks.org/handle/20.500.12854/77340</a>
Access status 0
Public note DOAB: description of the publication

No items available.