Artificial intelligence and national security

1. Artificial Intelligence and the Spread of Mis- and Disinformation -- 2. How States’ Recourse to Artificial Intelligence for National Security Purposes Threatens Our Most Fundamental Rights -- 3. The Use of AI in Managing Big Data Analysis Demands - Status and Future Directions -- 4. The Use of Ar...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Otros Autores: Montasari, Reza (Editor)
Tipo de documento: Electrónico Libro
Lenguaje:Inglés
Publicado: Cham Springer [2022]
En:Año: 2022
Acceso en línea: Portada
Volltext (lizenzpflichtig)
Verificar disponibilidad: HBZ Gateway
Servicio de pedido Subito: Pedir ahora.
Palabras clave:
Parallel Edition:No electrónico

MARC

LEADER 00000cam a2200000 c 4500
001 1817966723
003 DE-627
005 20250204181911.0
007 cr uuu---uuuuu
008 221004s2022 sz |||||o 00| ||eng c
020 |a 9783031067099  |9 978-3-031-06709-9 
024 7 |a 10.1007/978-3-031-06709-9  |2 doi 
035 |a (DE-627)1817966723 
035 |a (DE-599)KEP082099197 
035 |a (DE-He213)978-3-031-06709-9 
035 |a (DE-627-1)082099197 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
044 |c XA-CH 
072 7 |a UYQ  |2 bicssc 
072 7 |a COM004000  |2 bisacsh 
082 0 |a 006.3  |2 23 
245 0 0 |a Artificial intelligence and national security  |c Reza Montasari, editor 
264 1 |a Cham  |b Springer  |c [2022] 
264 4 |c © 2022 
300 |a 1 Online-Ressource (viii, 230 Seiten)  |b Illustrationen 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a Springer eBook Collection 
520 |a 1. Artificial Intelligence and the Spread of Mis- and Disinformation -- 2. How States’ Recourse to Artificial Intelligence for National Security Purposes Threatens Our Most Fundamental Rights -- 3. The Use of AI in Managing Big Data Analysis Demands - Status and Future Directions -- 4. The Use of Artificial Intelligence in Content Moderation in Countering Violent Extremism on Social Media Platforms -- 5. A Critical Analysis into the Beneficial and Malicious Utilisations of Artificial Intelligence -- 6. Countering Terrorism: Digital Policing of Open Source Intelligence and Social Media Using Artificial Intelligence -- 7. Cyber Threat Prediction and Modelling -- 8. A Critical Analysis of the Dark Web Challenges to Digital Policing -- 9. Insights into the next generation of Policing: Understanding the impact of technology on the police force in the digital age -- 10. The Dark Web and Digital Policing -- 11. Pre-emptive policing: Can technology be the answer to solving London’s knife crime epidemic?. 
520 |a This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government’s mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security uses for Artificial Intelligence (AI) in Western Democracies and its malicious use. This book also investigates the legal, political, ethical, moral, privacy and human rights implications of the national security uses of AI in the aforementioned democracies. It illustrates how AI for national security purposes could threaten most individual fundamental rights, and how the use of AI in digital policing could undermine user human rights and privacy. In relation to its examination of the adversarial uses of AI, this book discusses how certain countries utilize AI to launch disinformation attacks by automating the creation of false or misleading information to subvert public discourse. With regards to the potential of AI for national security purposes, this book investigates how AI could be utilized in content moderation to counter violent extremism on social media platforms. It also discusses the current practices in using AI in managing Big Data Analytics demands. This book provides a reference point for researchers and advanced-level students studying or working in the fields of Cyber Security, Artificial Intelligence, Social Sciences, Network Security as well as Law and Criminology. Professionals working within these related fields and law enforcement employees will also find this book valuable as a reference. 
650 0 |a Artificial intelligence. 
650 0 |a Computer networks—Security measures. 
650 0 |a Computer crimes. 
650 0 |a Machine learning. 
655 7 |a Aufsatzsammlung  |0 (DE-588)4143413-4  |0 (DE-627)105605727  |0 (DE-576)209726091  |2 gnd-content 
689 0 0 |d s  |0 (DE-588)4011413-2  |0 (DE-627)106352873  |0 (DE-576)208893415  |a Demokratie  |2 gnd 
689 0 1 |d s  |0 (DE-588)4059276-5  |0 (DE-627)104665335  |0 (DE-576)209130180  |a Technologie  |2 gnd 
689 0 2 |d s  |0 (DE-588)4033447-8  |0 (DE-627)106257188  |0 (DE-576)209002050  |a Künstliche Intelligenz  |2 gnd 
689 0 3 |d s  |0 (DE-588)4802620-7  |0 (DE-627)472310364  |0 (DE-576)216543657  |a Big Data  |2 gnd 
689 0 4 |d s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 0 5 |d s  |0 (DE-588)4127888-4  |0 (DE-627)105721344  |0 (DE-576)209597410  |a Innere Sicherheit  |2 gnd 
689 0 6 |d s  |0 (DE-588)4639271-3  |0 (DE-627)330421344  |0 (DE-576)214542661  |a Social Media  |2 gnd 
689 0 7 |d s  |0 (DE-588)1138303283  |0 (DE-627)895684276  |0 (DE-576)492480818  |a Radikalisierung  |2 gnd 
689 0 |5 (DE-627) 
700 1 |a Montasari, Reza  |e HerausgeberIn  |0 (DE-588)1273752279  |0 (DE-627)1823595820  |4 edt 
776 1 |z 9783031067082 
776 1 |z 9783031067105 
776 1 |z 9783031067112 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |t Artificial intelligence and national security  |d Cham : Springer, 2022  |h viii, 230 Seiten  |w (DE-627)1820062287  |z 9783031067082  |k Non-Electronic 
856 4 0 |u https://doi.org/10.1007/978-3-031-06709-9  |m X:SPRINGER  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz1817966723cov.jpg  |m V:DE-576  |m X:SPRINGER  |q image/jpeg  |v 20221006171822  |3 Cover 
912 |a ZDB-2-SEB  |b 2022 
912 |a ZDB-2-SCS  |b 2022 
912 |a ZDB-2-SXCS  |b 2022 
912 |a BSZ-2-SN-Auswahl  |b 2023 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4194207203 
LOK |0 003 DE-627 
LOK |0 004 1817966723 
LOK |0 005 20221004112614 
LOK |0 008 221004||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21  |c DE-627  |d DE-21 
LOK |0 092   |o k  |p p 
LOK |0 689   |a s  |a eBook-Springer-Computer-Science-2022 
LOK |0 852   |a DE-21 
LOK |0 852 1  |9 00 
LOK |0 85640  |u https://doi.org/10.1007/978-3-031-06709-9  |z Zugang für die Universität Tübingen 
LOK |0 912   |a ZDB-2-SCS 
LOK |0 935   |a ebok 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4660848035 
LOK |0 003 DE-627 
LOK |0 004 1817966723 
LOK |0 005 20250204181911 
LOK |0 008 250204||||||||||||||||ger||||||| 
LOK |0 040   |a DE-Frei85  |c DE-627  |d DE-Frei85 
LOK |0 852   |a DE-Frei85 
LOK |0 852 1  |m p  |9 00 
LOK |0 938   |k p 
ORI |a SA-MARC-krimdoka001.raw