|
|
|
|
LEADER |
06753nam a22004573i 4500 |
001 |
EBC6827145 |
003 |
MiAaPQ |
005 |
20231204023220.0 |
006 |
m o d | |
007 |
cr cnu|||||||| |
008 |
231204s2021 xx o ||||0 eng d |
020 |
|
|
|a 9783030902216
|q (electronic bk.)
|
020 |
|
|
|z 9783030902209
|
035 |
|
|
|a (MiAaPQ)EBC6827145
|
035 |
|
|
|a (Au-PeEL)EBL6827145
|
035 |
|
|
|a (OCoLC)1289369443
|
040 |
|
|
|a MiAaPQ
|b eng
|e rda
|e pn
|c MiAaPQ
|d MiAaPQ
|
050 |
|
4 |
|a JC328.6-.65
|
100 |
1 |
|
|a Henschke, Adam.
|
245 |
1 |
0 |
|a Counter-Terrorism, Ethics and Technology :
|b Emerging Challenges at the Frontiers of Counter-Terrorism.
|
250 |
|
|
|a 1st ed.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing AG,
|c 2021.
|
264 |
|
4 |
|c ©2021.
|
300 |
|
|
|a 1 online resource (231 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Advanced Sciences and Technologies for Security Applications Series
|
505 |
0 |
|
|a Intro -- Acknowledgments -- Introduction -- Contents -- Technology as Terrorism: Police Control Technologies and Drone Warfare -- 1 The Concept of Technology -- 1.1 Technology and Moral Mediation -- 1.2 Technology and Bias -- 1.3 What Is Terrorism? -- 2 Police Control Technologies as Terrorist Display -- 2.1 Riot Control Technologies -- 2.2 Tasers and Stun Guns -- 2.3 Implications -- 3 Drone Warfare -- 3.1 The US Drone Program -- 3.2 Drone Warfare as Terrorism -- 4 Conclusion: Terrorism from the Victim's Point of View -- References -- On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations -- 1 Introduction -- 2 Irregular Warfare -- 3 Broad Counterterrorism Ethics Considerations -- 4 The Moral Significance of Narrative, Social Signalling, and Imagery -- 5 Application to Counterterrorism Drone Operations -- 6 Conclusion -- References -- Sunlight Glinting on Clouds: Deception and Autonomous Weapons Systems -- 1 Introduction -- 2 Autonomous Weapons Systems -- 3 Arguments Against the Use of Autonomous Weapons Systems -- 4 Deception in Armed Conflict -- 4.1 So, What Is Deception and Could a Weapon Be Deceived? -- 5 Deception and AWS -- 6 Conclusions -- References -- Weapons of Mass Destruction-Conceptual and Ethical Issues with Regard to terrorism -- 1 Introduction -- 2 The (Never-Ending) History of WMD and CBRN -- 3 Abandoning WMD Altogether? -- 4 WMD and Terrorism -- 5 Alternative Concepts for Terrorist Weapons of Mass Destruction -- 6 The Terrorist Weapon Rating System -- 7 Conclusion -- References -- Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat -- 1 Cyber Terrorism Has Not Taken Place -- 2 The IoT: Cyber-Physical Systems That Will Span The Globe -- 3 So What? An Inventory of Features -- 4 Will IoT Enabled Cyber-Attacks Be Acts of Terrorism?.
|
505 |
8 |
|
|a 5 Ethics and Responsibilities for IoT Enabled Cyber-Terrorism -- References -- Facial Recognition for Counter-Terrorism: Neither a Ban Nor a Free-for-All -- 1 Introduction -- 2 The Basics of Facial Recognition -- 3 Arguments for an FRT Ban -- 3.1 Disparate Impact -- 3.2 Chills Behavior -- 3.3 Scope Creep -- 3.4 An Outright Ban -- 4 Conditions for the Use of Facial Recognition -- 4.1 Reasonable Expectation of Privacy -- 4.2 Cause for the State's Use of FRTs -- 4.3 Reliance on Third-Party Technology -- 5 Conclusion -- References -- The Rise of the Modern Intelligence State -- 1 Introduction -- 2 The Normalisation of Surveillance -- 2.1 Surveillance as Control -- 2.2 Ethical Boundaries of the Surveillance State -- 3 Technological Evolution of the Surveillance State -- 3.1 The Security State -- 3.2 The Surveillance State -- 3.3 The Intelligence State -- 4 The Dividual and the Intelligence State -- 4.1 The Transparent Self -- 4.2 Emerging Technologies of Control -- 5 Conclusions -- References -- "No Cracks, no Blind Spots, no Gaps": Technologically-Enabled "Preventative" Counterterrorism and Mass Repression in Xinjiang, China -- 1 Introduction -- 2 Chinese Colonialism and Uyghur 'Terrorism' in Xinjiang -- 3 China's Counterterrorism Policy: Toward 'Enduring Peace' -- 4 Seeing Like the CCP: 'Social Management', Counterterrorism and 'Re-Education' -- 5 Conclusion -- References -- Privacy, Encryption and Counter-Terrorism -- 1 Privacy/Confidentiality, Autonomy and Security -- 2 Encryption -- 3 Ethical Analysis -- References -- An End to Encryption? Surveillance and Proportionality in the Crypto-Wars -- 1 Introduction -- 2 Terrorist Use of E2EE -- 3 Countering E2EE -- 4 Privacy and E2EE -- 5 Security Versus Security -- 6 Proportionality -- 7 Maintaining Perspective -- 8 Conclusion -- References -- Who Should Regulate Extremist Content Online?.
|
505 |
8 |
|
|a 1 Framing the Problem -- 2 The Status Quo: Regulation and Self-Regulation -- 3 Terrorism as a Driver for Deplatforming: From ISIS to Political Extremists -- 4 A Deeper Cut: De-Platforming the Platforms -- 5 Ethical Challenges -- 5.1 Moral Legitimacy of Private Actors -- 5.2 Concentration of Power -- 5.3 Lack of Separation of Power -- 6 Different Institutions, Different Ethical Responsibilities -- 7 Conclusion: Is Co-Regulation a Solution? -- References -- White Knights, Black Armour, Digital Worlds: Exploring the Efficacy of Analysing Online Manifestos of Terrorist Actors in the Counter Terrorism Landscape -- 1 Introduction -- 2 Background -- 3 Manifestos as the Script, Violence as the Final Act -- 4 Cues and Liner Notes: World-Building and Motivations of Terrorist Actors -- 5 Analysing BT's Manifesto -- 5.1 The Self as 'The Pseudocommando' -- 5.2 Intense Anger at Injustice and Seeking Revenge Against Others -- 5.3 Unbalanced Existential Concerns -- 6 The (Digital) World We Live in or the (Digital) Battleground We Fight in? -- 7 Conclusion -- References.
|
588 |
|
|
|a Description based on publisher supplied metadata and other sources.
|
590 |
|
|
|a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
|
655 |
|
4 |
|a Electronic books.
|
700 |
1 |
|
|a Reed, Alastair.
|
700 |
1 |
|
|a Robbins, Scott.
|
700 |
1 |
|
|a Miller, Seumas.
|
776 |
0 |
8 |
|i Print version:
|a Henschke, Adam
|t Counter-Terrorism, Ethics and Technology
|d Cham : Springer International Publishing AG,c2021
|z 9783030902209
|
797 |
2 |
|
|a ProQuest (Firm)
|
830 |
|
0 |
|a Advanced Sciences and Technologies for Security Applications Series
|
856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/matrademy/detail.action?docID=6827145
|z Click to View
|