| 000 | 03497naaaa2200529uu 4500 | ||
|---|---|---|---|
| 001 | https://directory.doabooks.org/handle/20.500.12854/77340 | ||
| 005 | 20220219193825.0 | ||
| 020 | _a978-3-030-90221-6 | ||
| 020 | _a9783030902216 | ||
| 024 | 7 |
_a10.1007/978-3-030-90221-6 _cdoi |
|
| 041 | 0 | _aEnglish | |
| 042 | _adc | ||
| 072 | 7 |
_aJPWL _2bicssc |
|
| 072 | 7 |
_aHPQ _2bicssc |
|
| 072 | 7 |
_aJFD _2bicssc |
|
| 072 | 7 |
_aGT _2bicssc |
|
| 072 | 7 |
_aHP _2bicssc |
|
| 100 | 1 |
_aHenschke, Adam _4edt |
|
| 700 | 1 |
_aReed, Alastair _4edt |
|
| 700 | 1 |
_aRobbins, Scott _4edt |
|
| 700 | 1 |
_aMiller, Seumas _4edt |
|
| 700 | 1 |
_aHenschke, Adam _4oth |
|
| 700 | 1 |
_aReed, Alastair _4oth |
|
| 700 | 1 |
_aRobbins, Scott _4oth |
|
| 700 | 1 |
_aMiller, Seumas _4oth |
|
| 245 | 1 | 0 | _aCounter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism |
| 260 |
_bSpringer Nature _c2021 |
||
| 300 | _a1 electronic resource (221 p.) | ||
| 506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
| 520 | _aThis open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world. | ||
| 540 |
_aCreative Commons _fby/4.0/ _2cc _4http://creativecommons.org/licenses/by/4.0/ |
||
| 546 | _aEnglish | ||
| 650 | 7 |
_aTerrorism, armed struggle _2bicssc |
|
| 650 | 7 |
_aEthics & moral philosophy _2bicssc |
|
| 650 | 7 |
_aMedia studies _2bicssc |
|
| 650 | 7 |
_aInterdisciplinary studies _2bicssc |
|
| 650 | 7 |
_aPhilosophy _2bicssc |
|
| 653 | _aTerrorism and Technology | ||
| 653 | _aCounter-terrorism Ethics | ||
| 653 | _aSocial Media and Terrorism | ||
| 653 | _aArtificial Intelligence and Counter-terrorism | ||
| 653 | _aBulk Data Collection Terrorism | ||
| 653 | _aEthics of Technology | ||
| 653 | _aOpen Access | ||
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/20.500.12657/52393/1/978-3-030-90221-6.pdf _70 _zDOAB: download the publication |
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://directory.doabooks.org/handle/20.500.12854/77340 _70 _zDOAB: description of the publication |
| 999 |
_c39103 _d39103 |
||