000 05722nam a22006375i 4500
001 978-3-031-50454-9
003 DE-He213
005 20240730170958.0
007 cr nn 008mamaa
008 240118s2024 sz | s |||| 0|eng d
020 _a9783031504549
_9978-3-031-50454-9
024 7 _a10.1007/978-3-031-50454-9
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aMontasari, Reza.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_996580
245 1 0 _aCyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution
_h[electronic resource] :
_bThreats, Assessment and Responses /
_cby Reza Montasari.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2024.
300 _aXVII, 270 p. 3 illus., 2 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
505 0 _a1. Unravelling State Crimes: A Critical Analysis of the Iraq War and Its Global Ramifications -- 2. Assessing the Effectiveness of UK Counter-Terrorism Strategies and Alternative Approaches -- 3. Understanding and Assessing the Role of Women in Terrorism -- 4. Exploring the Current Landscape of Cyberterrorism: Insights, Strategies, and the Impact of COVID-19 -- 5. Exploring the Imminence of Cyberterrorism Threat to National Security -- 6. The Impact of Technology on Radicalisation to Violent Extremism and Terrorism in Contemporary Security Landscape -- 7. Techniques in Countering Cyberterrorism Approaches with Those Adopted by State Adversaries -- 8. Analysing Ethical, Legal, Technical and Operational Challenges of the Application of Machine Learning in Countering Cyber Terrorism -- 9. Addressing Ethical, Legal, Technical, and Operational Challenges in Counterterrorism with Machine Learning: Recommendations and Strategies -- 10. The Dual Role of Artificial Intelligence in Online Disinformation: A Critical Analysis.
520 _aThis book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications. The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content. Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it. Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security. Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book's exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies. Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI's transformative role in shaping the future of national and international security.
650 0 _aData protection.
_97245
650 0 _aComputer crimes.
_910774
650 0 _aArtificial intelligence.
_93407
650 0 _aInternational criminal law.
_996583
650 0 _aCriminology.
_940339
650 0 _aSecurity systems.
_931879
650 1 4 _aData and Information Security.
_931990
650 2 4 _aCybercrime.
_933477
650 2 4 _aArtificial Intelligence.
_93407
650 2 4 _aInternational Criminal Law.
_996585
650 2 4 _aCrime Control and Security.
_940344
650 2 4 _aSecurity Science and Technology.
_931884
710 2 _aSpringerLink (Online service)
_996590
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031504532
776 0 8 _iPrinted edition:
_z9783031504556
776 0 8 _iPrinted edition:
_z9783031504563
830 0 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
_996591
856 4 0 _uhttps://doi.org/10.1007/978-3-031-50454-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c87331
_d87331