spelling |
oapen-20.500.12657-523932022-01-15T02:47:39Z Counter-Terrorism, Ethics and Technology Henschke, Adam Reed, Alastair Robbins, Scott Miller, Seumas Terrorism and Technology Counter-terrorism Ethics Social Media and Terrorism Artificial Intelligence and Counter-terrorism Bulk Data Collection Terrorism Ethics of Technology Open Access bic Book Industry Communication::J Society & social sciences::JP Politics & government::JPW Political activism::JPWL Terrorism, armed struggle bic Book Industry Communication::H Humanities::HP Philosophy::HPQ Ethics & moral philosophy bic Book Industry Communication::J Society & social sciences::JF Society & culture: general::JFD Media studies bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GT Interdisciplinary studies bic Book Industry Communication::H Humanities::HP Philosophy This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world. 2022-01-14T13:40:46Z 2022-01-14T13:40:46Z 2021 book ONIX_20220114_9783030902216_2 9783030902216 https://library.oapen.org/handle/20.500.12657/52393 eng Advanced Sciences and Technologies for Security Applications application/pdf n/a 978-3-030-90221-6.pdf https://link.springer.com/978-3-030-90221-6 Springer Nature Springer International Publishing 10.1007/978-3-030-90221-6 10.1007/978-3-030-90221-6 6c6992af-b843-4f46-859c-f6e9998e40d5 9783030902216 Springer International Publishing 221 open access
|
description |
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
|