By accessing or using this site you accept and agree to our Terms and Conditions | As an Amazon Associate, we earn from qualifying purchases
Inside this Book
If you make use of this material, you may credit the authors as follows:
Henschke Adam et al. (Editors), "Counter-Terrorism, Ethics and Technology", Springer Nature, 2021, DOI: 10.1007/978-3-030-90221-6, License: http://creativecommons.org/licenses/by/4.0/
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
Terrorism And Technology, Counter-terrorism Ethics, Social Media And Terrorism, Artificial Intelligence And Counter-terrorism, Bulk Data Collection Terrorism, Ethics Of Technology, Open Access
Rights | License
Except where otherwise noted, this item has been published under the following license:
If you believe that this publication infringes copyright, please contact us at firstname.lastname@example.org and provide relevant details so that we can investigate your claim.