LEADER 00600oas 2200253z- 450 001 9910301793803321 011 $a2400-5800 035 $a(CKB)3840000000203303 035 $a(EXLCZ)993840000000203303 100 $a20230214cuuuuuuuu -u- - 101 0 $aeng 200 00$a|Crédit (Paris) 210 $c[s.n.] 311 $a2428-548X 517 $a|Crédit 517 $a|Crédit 517 $aCrédit 517 $aLe Crédit 517 $aLe Crédit 517 $aCrédit 906 $aJOURNAL 912 $a9910301793803321 996 $aCrédit (Paris)$92797448 997 $aUNINA LEADER 05924nam 22007335 450 001 9910805581903321 005 20240119034026.0 010 $a9783031504549 010 $a3031504542 024 7 $a10.1007/978-3-031-50454-9 035 $a(MiAaPQ)EBC31073820 035 $a(Au-PeEL)EBL31073820 035 $a(DE-He213)978-3-031-50454-9 035 $a(CKB)29978044400041 035 $a(OCoLC)1418840108 035 $a(EXLCZ)9929978044400041 100 $a20240118d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution $eThreats, Assessment and Responses /$fby Reza Montasari 205 $a1st ed. 2024. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2024. 215 $a1 online resource (276 pages) 225 1 $aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 311 08$aPrint version: Montasari, Reza Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Cham : Springer International Publishing AG,c2024 9783031504532 327 $a1. Unravelling State Crimes: A Critical Analysis of the Iraq War and Its Global Ramifications -- 2. Assessing the Effectiveness of UK Counter-Terrorism Strategies and Alternative Approaches -- 3. Understanding and Assessing the Role of Women in Terrorism -- 4. Exploring the Current Landscape of Cyberterrorism: Insights, Strategies, and the Impact of COVID-19 -- 5. Exploring the Imminence of Cyberterrorism Threat to National Security -- 6. The Impact of Technology on Radicalisation to Violent Extremism and Terrorism in Contemporary Security Landscape -- 7. Techniques in Countering Cyberterrorism Approaches with Those Adopted by State Adversaries -- 8. Analysing Ethical, Legal, Technical and Operational Challenges of the Application of Machine Learning in Countering Cyber Terrorism -- 9. Addressing Ethical, Legal, Technical, and Operational Challenges in Counterterrorism with Machine Learning: Recommendations and Strategies -- 10. The Dual Role of Artificial Intelligence in Online Disinformation: A Critical Analysis. 330 $aThis book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications. The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content. Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it. Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security. Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book?s exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies. Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI?s transformative role in shaping the future of national and international security. 410 0$aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 606 $aData protection 606 $aComputer crimes 606 $aArtificial intelligence 606 $aInternational criminal law 606 $aCriminology 606 $aSecurity systems 606 $aData and Information Security 606 $aCybercrime 606 $aArtificial Intelligence 606 $aInternational Criminal Law 606 $aCrime Control and Security 606 $aSecurity Science and Technology 615 0$aData protection. 615 0$aComputer crimes. 615 0$aArtificial intelligence. 615 0$aInternational criminal law. 615 0$aCriminology. 615 0$aSecurity systems. 615 14$aData and Information Security. 615 24$aCybercrime. 615 24$aArtificial Intelligence. 615 24$aInternational Criminal Law. 615 24$aCrime Control and Security. 615 24$aSecurity Science and Technology. 676 $a005.8 700 $aMontasari$b Reza$01068733 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910805581903321 996 $aCyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution$93882687 997 $aUNINA