000 03497naaaa2200529uu 4500
001 https://directory.doabooks.org/handle/20.500.12854/77340
005 20220219193825.0
020 _a978-3-030-90221-6
020 _a9783030902216
024 7 _a10.1007/978-3-030-90221-6
_cdoi
041 0 _aEnglish
042 _adc
072 7 _aJPWL
_2bicssc
072 7 _aHPQ
_2bicssc
072 7 _aJFD
_2bicssc
072 7 _aGT
_2bicssc
072 7 _aHP
_2bicssc
100 1 _aHenschke, Adam
_4edt
700 1 _aReed, Alastair
_4edt
700 1 _aRobbins, Scott
_4edt
700 1 _aMiller, Seumas
_4edt
700 1 _aHenschke, Adam
_4oth
700 1 _aReed, Alastair
_4oth
700 1 _aRobbins, Scott
_4oth
700 1 _aMiller, Seumas
_4oth
245 1 0 _aCounter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism
260 _bSpringer Nature
_c2021
300 _a1 electronic resource (221 p.)
506 0 _aOpen Access
_2star
_fUnrestricted online access
520 _aThis open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
540 _aCreative Commons
_fby/4.0/
_2cc
_4http://creativecommons.org/licenses/by/4.0/
546 _aEnglish
650 7 _aTerrorism, armed struggle
_2bicssc
650 7 _aEthics & moral philosophy
_2bicssc
650 7 _aMedia studies
_2bicssc
650 7 _aInterdisciplinary studies
_2bicssc
650 7 _aPhilosophy
_2bicssc
653 _aTerrorism and Technology
653 _aCounter-terrorism Ethics
653 _aSocial Media and Terrorism
653 _aArtificial Intelligence and Counter-terrorism
653 _aBulk Data Collection Terrorism
653 _aEthics of Technology
653 _aOpen Access
856 4 0 _awww.oapen.org
_uhttps://library.oapen.org/bitstream/20.500.12657/52393/1/978-3-030-90221-6.pdf
_70
_zDOAB: download the publication
856 4 0 _awww.oapen.org
_uhttps://directory.doabooks.org/handle/20.500.12854/77340
_70
_zDOAB: description of the publication
999 _c39103
_d39103