top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Counter-terrorism : the ethical issues / / edited by Seumas Miller (Professor of Philosophy, Charles Sturt University, Australia, Delft University of Technology, the Netherlands and the Oxford Uehiro Centre for Practical Ethics, University of Oxford, UK), Adam Henschke (Senior Lecturer, Crawford School of Public Policy, Australian National University, Australia) and Jonas Feltes (PhD candidate, Department of Values, Technology & Innovation, Delft University of Technology, the Netherlands)
Counter-terrorism : the ethical issues / / edited by Seumas Miller (Professor of Philosophy, Charles Sturt University, Australia, Delft University of Technology, the Netherlands and the Oxford Uehiro Centre for Practical Ethics, University of Oxford, UK), Adam Henschke (Senior Lecturer, Crawford School of Public Policy, Australian National University, Australia) and Jonas Feltes (PhD candidate, Department of Values, Technology & Innovation, Delft University of Technology, the Netherlands)
Autore Miller Seumas
Pubbl/distr/stampa Northampton : , : Edward Elgar Publishing, , 2021
Descrizione fisica 1 online resource (224 pages)
Disciplina 363.32517
Soggetto topico Terrorism - Prevention - Moral and ethical aspects
Soggetto non controllato counter-terrorism ethics
targeted killing
preventive detention of terrorists
enhanced interrogation
social media and terrorism
terrorism and chemical weapons
ISBN 1-80037-307-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents: Introduction to counter-terrorism: The ethical issues 1 -- 1 preventive criminal law: Terrorist crimes and liberal democratic values / Mitt Regan and Alexandra L. White -- 2. The definition of terrorism / Seumas Miller and Jonas Feltes -- 3. Collective responsibility and counter-terrorism / Seumas Miller and Jonas Feltes -- 4. Kill, wound or capture: Ethics considerations for counter-terrorism operations / Michael Robillard -- 5. Accountability for targeted killing / Mary B. DeRosa and Mitt Regan -- 6. Interrogation ethics in counter-terror operations / Michael Skerker -- 7. Preventive detention of terrorists / Seumas Miller -- 8. Use of stings in counter-terrorism: Entrapment and ethics / Seumas Miller -- 9. Counter-terrorism, social media and the regulation of extremist content / Levi J. West -- 10. On free public communication and terrorism online / Adam Henschke -- 11. Counter-terrorism and psyop / Michael Robillard -- 12. From 'need to share' to 'need to care': Information aggregation and the need to care about how surveillance technologies are used for counter-terrorism / Adam Henschke -- 13. Bulk data collection, national security and ethics / Scott Robbins -- 14. Collective moral responsibility and chemical, biological, radiological and nuclear terrorism: The case of phosphine / Jonas Feltes -- Index.
Altri titoli varianti Counter-Terrorism
Record Nr. UNINA-9910557278703321
Miller Seumas  
Northampton : , : Edward Elgar Publishing, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Palgrave Handbook of National Security
The Palgrave Handbook of National Security
Autore Clarke Michael
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (421 pages)
Disciplina 355.03
Altri autori (Persone) HenschkeAdam
SussexMatthew
LegrandTim
Soggetto genere / forma Electronic books.
ISBN 3-030-53494-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Notes on Contributors -- List of Figures -- 1 National Security: Theories, Actors, Issues -- Part I Theories -- 2 Understanding National Security: The Promises and Pitfalls of International Relations Theory -- The National Security Landscape: Changing Definitions, Themes and Processes -- Statehood, Securitisation and National Security -- National Interests -- Sovereignty and International Law -- Power, Influence and International Order -- Making National Security Policy in an Age of Globalisation and Shifting Power: Balancing Risk and Resilience -- Theories of International Relations and National Security Choices -- Realist Approaches -- Liberal Approaches -- Constructivist Approaches -- From Theory to Practice: Case Studies on Major National Security Issues -- The Global War on Terror -- Climate Change -- Shifts in Global Order: The Rise of China and the Relative Decline of the United States -- Conclusions -- 3 National Security and Public Policy: Exceptionalism Versus Accountability -- What Is Public Policy? -- A Brief History of Public Policy -- Public Policy in Liberal Democracies -- National Security and Public Policy in Liberal Democracy -- Methodological Challenges of National Security Evaluation -- Exceptionalized Policy-Making in Liberal Democracies -- Scrutiny, Accountability and Exceptionalism -- Exempting National Security from Public Policy Imperatives -- The Expanding Remit of National Security Policy -- National Security and the Shadow of Illiberalism -- Conclusions -- 4 Ethics and National Security: A Case for Reasons in Decision-Making -- Introduction -- The Problem: Ethics and National Security -- On Ethics, National Security and Liberal Democracies -- Ethics -- Nations and States16 -- Security -- An Open Question: Pluralism Versus Anything Goes33 -- A Dynamic Space.
Where To? A Guide for Ethical Decision Making in National Security -- Part II Actors -- 5 Nothing to Fear but Fear Itself: The National Security Policy of the United States -- Free Security -- What Are We Afraid Of? Issues and Debates in Twenty-First-Century U.S. National Security -- Traditional Threats: Peer Competitors -- Nontraditional Threats: Terrorism, Rogue, and Failed States -- Technological Threats: Nuclear, Cyber!, Killer Robots -- Nuclear Weapons States, 1988 and 2018 -- Imagined Threats: Unknown Unknowns -- Structure and Insecurity -- Conclusions -- 6 Chinese National Security: New Agendas and Emerging Challenges -- The End of the Cold War and Emerging Security Challenges -- National Security: Emerging Challenges -- Reconceptualizing Security: New Structures -- Conclusion -- 7 Russia's National Security Posture -- The Roots of Russian Conduct -- Understanding Russian National Security Policy -- Constructivist Approaches -- Neoliberal Approaches -- Realist Approaches -- Power and Weakness: Enablers and Constraints -- Military Power -- Information Operations and Hybrid Warfare Capabilities -- Energy: Encouraging Vulnerable Over-Dependencies -- Institutional Underdevelopment, Sub-regional Weakness, and Political Vulnerability -- Conclusions -- 8 Between Aspiration and Reality: Evolution of Japanese National Security Policy -- Background: Basic Elements of Japan's National Security Policy -- A Framework Challenged: Japan's Security Policy in Post-Cold War and Post-9/11 Years -- Japan Transformed? Changes Made Under the Second Abe Cabinet (December 2012-Present) -- Conclusion: A Glass Ceiling for Japan's National Security Policy -- 9 India's National Security Challenges and the State Response -- A Gradual Evolution in Indian National Security Policy -- India's Relationship with Pakistan -- Sino-Indian Tensions -- Left Wing Extremism.
State Responses to LWE -- Insurgency in the Northeast -- Indian Responses to Insurgencies in the Northeast -- Terrorism in Punjab -- Terrorism in Jammu and Kashmir -- Conclusion -- 10 Turkey: The Security Policy of a 'Lonely' State -- Introduction: With a Neighbourhood like Turkey's, Who Needs Enemies? -- Turkey, Existentially: Who Are Turks and What Is Turkey?1 -- The Inter-War Years: Security Policy Foundations16 -- The Security Policy of the Pre-AKP Republic: The Cold War Years -- Turkish Security Policy, the End of the Cold War and the Rise of the AKP -- The Kurdish Issue, Again -- The KRG -- Conclusion: Turkey's Loneliness -- 11 Securing Iran in the Internet age -- Security in the Founding Moments of the Islamic Republic -- Key Events and Issues -- Iranian Regime Security and the Internet: A Double-Edged Sword -- Conclusions -- 12 Brazil: In Search of a Security Space -- Introduction -- From Independence to Globalization: The Pathway Toward Autonomy -- Re-democratization: From Great Power to Middle Power -- An Exhausted Democracy: Back to Pre-autonomy Days? -- Conclusion -- Part III Issues -- 13 Nuclear Weapons and National Security: From the Cold War to the "Second Nuclear Age" and Beyond -- The Evolution of Nuclear Politics: Between MAD and "Nuclear Abstinence" -- Nuclear Weapons and the Cold War: Toward MAD -- Nuclear Non-Proliferation Treaty: An Imperfect Nuclear Abstinence? -- The Post-Cold War Nuclear Interregnum and the "Second Nuclear Age" -- Nuclear Postures of Major Powers -- United States -- Russia -- China -- Nuclear Flashpoints -- Nuclear Instability on the Korean Peninsula -- The South Asian Nuclear Triangle -- Testing Transatlantic Cohesion: Russian Adventurism in Ukraine and the Baltics -- Conclusions -- 14 Maritime Security: Problems and Prospects for National Security Policymakers -- Introduction.
Situating 'Maritime Security' -- Protecting National (Maritime) Security-The Navies -- Contemporary National Security Threats: The Maritime Sphere -- National Security and Non-Traditional Maritime Security Threats -- Safeguarding National Security: Addressing Non-Traditional Maritime Security Threats -- Defending National Security? the Rise of Non-State Actors -- Conclusion -- 15 Intelligence and National Security: The National Security Problematique -- Approaches to the Intelligence Cycle -- Direction -- Planning -- Collection and Collation -- Analysis and Processing -- Evaluation -- Dissemination -- Intelligence Gaps and Failures -- Politicisation of Intelligence -- Conclusion -- 16 Machine Learning, Mass Surveillance, and National Security: Data, Efficacy, and Meaningful Human Control -- Introduction -- Machine Learning for Mass Surveillance -- Facial Recognition / Smart Surveillance Cameras -- Voice Recognition -- Attack Prediction -- Financial Fraud -- Propaganda on Social Media -- Societal Implications of the Training Data -- The Source -- Dual Use -- Legitimacy -- Security -- Labeling -- Biases of the Past -- Disparate Impact -- The Effectiveness of ML for Mass Surveillance -- Not Enough Data -- Precision vs Recall -- Past vs. Future -- Meaningful Human Control over ML for Mass Surveillance -- Veto Power -- Explainability -- Moral Machines -- Conclusion -- 17 Information as an Evolving National Security Concern -- Introduction -- Terrorist Exploitation of Social Media -- Foreign Influence Operations -- Oligopologisation of Epistemic Power -- National Security and State Responsibility: What is at Stake? -- Index.
Record Nr. UNINA-9910502999403321
Clarke Michael  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui