001431147 000__ 04545cam\a2200577\i\4500 001431147 001__ 1431147 001431147 003__ OCoLC 001431147 005__ 20230308003222.0 001431147 006__ m\\\\\o\\d\\\\\\\\ 001431147 007__ cr\cn\nnnunnun 001431147 008__ 211218s2021\\\\sz\\\\\\ob\\\\000\0\eng\d 001431147 019__ $$a1290020371 001431147 020__ $$a9783030902216$$q(electronic bk.) 001431147 020__ $$a3030902218$$q(electronic bk.) 001431147 020__ $$z9783030902209 001431147 0247_ $$a10.1007/978-3-030-90221-6$$2doi 001431147 035__ $$aSP(OCoLC)1289369443 001431147 040__ $$aEBLCP$$beng$$erda$$epn$$cEBLCP$$dGW5XE$$dYDX$$dOCLCF$$dOCLCO$$dOCLCQ$$dOCLCO$$dOCLCQ$$dYWS 001431147 049__ $$aISEA 001431147 050_4 $$aHV6431$$b.C68 2021 001431147 08204 $$a363.325$$223 001431147 24500 $$aCounter-terrorism, ethics and technology :$$bemerging challenges at the frontiers of counter-terrorism /$$cAdam Henschke, Alastair Reed, Scott Robbins, Seumas Miller, editors. 001431147 264_1 $$aCham :$$bSpringer,$$c[2021] 001431147 264_4 $$c©2021 001431147 300__ $$a1 online resource (231 pages) 001431147 336__ $$atext$$btxt$$2rdacontent 001431147 337__ $$acomputer$$bc$$2rdamedia 001431147 338__ $$aonline resource$$bcr$$2rdacarrier 001431147 4901_ $$aAdvanced sciences and technologies for security applications 001431147 504__ $$aIncludes bibliographical references. 001431147 5050_ $$a1. Drones As A Tool In Counter-Terrorism -- 2. Deception Strategies In Autonomous Warfare -- 3. Rethinking Drones As Terrorist Weapons -- 4. Proportionality, Surveillance And Counter-Terrorism -- 5. Privacy, Encryption And Counter-Terrorism -- 6. The Rise Of The Modern Intelligence State -- 7. Acceptability Of Bulk Facial Recognition for Counter-Terrorism: The Case For A Total Ban -- 8. "No cracks, no blind spots, no gaps" : Technologically-enabled "Preventive" Counterterrorism and Mass Repression in Xinjiang, China -- 9. Media Ecologies, On-Line Radicalisation And Bottom-Up CVE Approaches -- 10. The Ethics of Regulating Extremist Content Online -- 11. Terrorism And The Internet Of Things: Cyberterrorism Will Happen -- 12. Violent Non State Actors And The Technology Adoption Curve. 001431147 5060_ $$aOpen access$$5GW5XE 001431147 520__ $$aThis open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the "social credit system." Counter-terrorism technologies can easily succumb to mission creep, where a technologys exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world 001431147 588__ $$aDescription based on print version record. 001431147 650_0 $$aTerrorism$$xPrevention$$xMoral and ethical aspects. 001431147 650_0 $$aTechnology$$xMoral and ethical aspects. 001431147 650_6 $$aTerrorisme$$xPrévention$$xAspect moral. 001431147 650_6 $$aTechnologie$$xAspect moral. 001431147 655_0 $$aElectronic books. 001431147 7001_ $$aHenschke, Adam,$$d1976-$$eeditor. 001431147 7001_ $$aReed, Alastair$$q(A.G.),$$eeditor. 001431147 7001_ $$aRobbins, Scott,$$eeditor. 001431147 7001_ $$aMiller, Seumas,$$eeditor. 001431147 77608 $$iPrint version:$$aHenschke, Adam.$$tCounter-Terrorism, Ethics and Technology.$$dCham : Springer International Publishing AG, ©2022$$z9783030902209 001431147 830_0 $$aAdvanced sciences and technologies for security applications. 001431147 852__ $$bebk 001431147 85640 $$3Springer Nature$$uhttps://link.springer.com/10.1007/978-3-030-90221-6$$zOnline Access$$91397441.2 001431147 909CO $$ooai:library.usi.edu:1431147$$pGLOBAL_SET 001431147 980__ $$aBIB 001431147 980__ $$aEBOOK 001431147 982__ $$aEbook 001431147 983__ $$aOnline 001431147 994__ $$a92$$bISE