Linked e-resources
Details
Table of Contents
1. Drones As A Tool In Counter-Terrorism
2. Deception Strategies In Autonomous Warfare
3. Rethinking Drones As Terrorist Weapons
4. Proportionality, Surveillance And Counter-Terrorism
5. Privacy, Encryption And Counter-Terrorism
6. The Rise Of The Modern Intelligence State
7. Acceptability Of Bulk Facial Recognition for Counter-Terrorism: The Case For A Total Ban
8. "No cracks, no blind spots, no gaps" : Technologically-enabled "Preventive" Counterterrorism and Mass Repression in Xinjiang, China
9. Media Ecologies, On-Line Radicalisation And Bottom-Up CVE Approaches
10. The Ethics of Regulating Extremist Content Online
11. Terrorism And The Internet Of Things: Cyberterrorism Will Happen
12. Violent Non State Actors And The Technology Adoption Curve.
2. Deception Strategies In Autonomous Warfare
3. Rethinking Drones As Terrorist Weapons
4. Proportionality, Surveillance And Counter-Terrorism
5. Privacy, Encryption And Counter-Terrorism
6. The Rise Of The Modern Intelligence State
7. Acceptability Of Bulk Facial Recognition for Counter-Terrorism: The Case For A Total Ban
8. "No cracks, no blind spots, no gaps" : Technologically-enabled "Preventive" Counterterrorism and Mass Repression in Xinjiang, China
9. Media Ecologies, On-Line Radicalisation And Bottom-Up CVE Approaches
10. The Ethics of Regulating Extremist Content Online
11. Terrorism And The Internet Of Things: Cyberterrorism Will Happen
12. Violent Non State Actors And The Technology Adoption Curve.