LEADER 03947nam 22007213 450 001 9910513599803321 005 20250628110031.0 010 $a9783030902216 010 $a3030902218 035 $a(CKB)5600000000185464 035 $a(MiAaPQ)EBC6827145 035 $a(Au-PeEL)EBL6827145 035 $a(OCoLC)1289369443 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/77340 035 $a(PPN)259469645 035 $a(ODN)ODN0010067712 035 $a(oapen)doab77340 035 $a(EXLCZ)995600000000185464 100 $a20220207d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCounter-Terrorism, Ethics and Technology $eEmerging Challenges at the Frontiers of Counter-Terrorism 210 $cSpringer Nature$d2021 210 1$aCham :$cSpringer International Publishing AG,$d2021. 210 4$dİ2021. 215 $a1 online resource (231 pages) 225 1 $aAdvanced Sciences and Technologies for Security Applications 311 08$a9783030902209 311 08$a303090220X 330 $aThis open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the ?social credit system.? Counter-terrorism technologies can easily succumb to mission creep, where a technology?s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world. 410 0$aAdvanced Sciences and Technologies for Security Applications 606 $aTerrorism, armed struggle$2bicssc 606 $aEthics & moral philosophy$2bicssc 606 $aMedia studies$2bicssc 606 $aInterdisciplinary studies$2bicssc 606 $aPhilosophy$2bicssc 610 $aTerrorism and Technology 610 $aCounter-terrorism Ethics 610 $aSocial Media and Terrorism 610 $aArtificial Intelligence and Counter-terrorism 610 $aBulk Data Collection Terrorism 610 $aEthics of Technology 610 $aOpen Access 615 7$aTerrorism, armed struggle 615 7$aEthics & moral philosophy 615 7$aMedia studies 615 7$aInterdisciplinary studies 615 7$aPhilosophy 686 $aPHI005000$aPHI021000$aPOL037000$aSCI000000$aSOC052000$2bisacsh 700 $aHenschke$b Adam$01075838 701 $aReed$b Alastair$01075839 701 $aRobbins$b Scott$01075840 701 $aMiller$b Seumas$0895216 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910513599803321 996 $aCounter-Terrorism, Ethics and Technology$92585651 997 $aUNINA