Artificial intelligence and national security
1. Artificial Intelligence and the Spread of Mis- and Disinformation -- 2. How States’ Recourse to Artificial Intelligence for National Security Purposes Threatens Our Most Fundamental Rights -- 3. The Use of AI in Managing Big Data Analysis Demands - Status and Future Directions -- 4. The Use of Ar...
Otros Autores: | |
---|---|
Tipo de documento: | Electrónico Libro |
Lenguaje: | Inglés |
Publicado: |
Cham
Springer
[2022]
|
En: | Año: 2022 |
Acceso en línea: |
Portada Volltext (lizenzpflichtig) |
Verificar disponibilidad: | HBZ Gateway |
Servicio de pedido Subito: | Pedir ahora. |
Palabras clave: | |
Parallel Edition: | No electrónico
|
MARC
LEADER | 00000cam a2200000 c 4500 | ||
---|---|---|---|
001 | 1817966723 | ||
003 | DE-627 | ||
005 | 20250204181911.0 | ||
007 | cr uuu---uuuuu | ||
008 | 221004s2022 sz |||||o 00| ||eng c | ||
020 | |a 9783031067099 |9 978-3-031-06709-9 | ||
024 | 7 | |a 10.1007/978-3-031-06709-9 |2 doi | |
035 | |a (DE-627)1817966723 | ||
035 | |a (DE-599)KEP082099197 | ||
035 | |a (DE-He213)978-3-031-06709-9 | ||
035 | |a (DE-627-1)082099197 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XA-CH | ||
072 | 7 | |a UYQ |2 bicssc | |
072 | 7 | |a COM004000 |2 bisacsh | |
082 | 0 | |a 006.3 |2 23 | |
245 | 0 | 0 | |a Artificial intelligence and national security |c Reza Montasari, editor |
264 | 1 | |a Cham |b Springer |c [2022] | |
264 | 4 | |c © 2022 | |
300 | |a 1 Online-Ressource (viii, 230 Seiten) |b Illustrationen | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Springer eBook Collection | |
520 | |a 1. Artificial Intelligence and the Spread of Mis- and Disinformation -- 2. How States’ Recourse to Artificial Intelligence for National Security Purposes Threatens Our Most Fundamental Rights -- 3. The Use of AI in Managing Big Data Analysis Demands - Status and Future Directions -- 4. The Use of Artificial Intelligence in Content Moderation in Countering Violent Extremism on Social Media Platforms -- 5. A Critical Analysis into the Beneficial and Malicious Utilisations of Artificial Intelligence -- 6. Countering Terrorism: Digital Policing of Open Source Intelligence and Social Media Using Artificial Intelligence -- 7. Cyber Threat Prediction and Modelling -- 8. A Critical Analysis of the Dark Web Challenges to Digital Policing -- 9. Insights into the next generation of Policing: Understanding the impact of technology on the police force in the digital age -- 10. The Dark Web and Digital Policing -- 11. Pre-emptive policing: Can technology be the answer to solving London’s knife crime epidemic?. | ||
520 | |a This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government’s mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security uses for Artificial Intelligence (AI) in Western Democracies and its malicious use. This book also investigates the legal, political, ethical, moral, privacy and human rights implications of the national security uses of AI in the aforementioned democracies. It illustrates how AI for national security purposes could threaten most individual fundamental rights, and how the use of AI in digital policing could undermine user human rights and privacy. In relation to its examination of the adversarial uses of AI, this book discusses how certain countries utilize AI to launch disinformation attacks by automating the creation of false or misleading information to subvert public discourse. With regards to the potential of AI for national security purposes, this book investigates how AI could be utilized in content moderation to counter violent extremism on social media platforms. It also discusses the current practices in using AI in managing Big Data Analytics demands. This book provides a reference point for researchers and advanced-level students studying or working in the fields of Cyber Security, Artificial Intelligence, Social Sciences, Network Security as well as Law and Criminology. Professionals working within these related fields and law enforcement employees will also find this book valuable as a reference. | ||
650 | 0 | |a Artificial intelligence. | |
650 | 0 | |a Computer networks—Security measures. | |
650 | 0 | |a Computer crimes. | |
650 | 0 | |a Machine learning. | |
655 | 7 | |a Aufsatzsammlung |0 (DE-588)4143413-4 |0 (DE-627)105605727 |0 (DE-576)209726091 |2 gnd-content | |
689 | 0 | 0 | |d s |0 (DE-588)4011413-2 |0 (DE-627)106352873 |0 (DE-576)208893415 |a Demokratie |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4059276-5 |0 (DE-627)104665335 |0 (DE-576)209130180 |a Technologie |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)4033447-8 |0 (DE-627)106257188 |0 (DE-576)209002050 |a Künstliche Intelligenz |2 gnd |
689 | 0 | 3 | |d s |0 (DE-588)4802620-7 |0 (DE-627)472310364 |0 (DE-576)216543657 |a Big Data |2 gnd |
689 | 0 | 4 | |d s |0 (DE-588)4274324-2 |0 (DE-627)104467525 |0 (DE-576)21070585X |a Computersicherheit |2 gnd |
689 | 0 | 5 | |d s |0 (DE-588)4127888-4 |0 (DE-627)105721344 |0 (DE-576)209597410 |a Innere Sicherheit |2 gnd |
689 | 0 | 6 | |d s |0 (DE-588)4639271-3 |0 (DE-627)330421344 |0 (DE-576)214542661 |a Social Media |2 gnd |
689 | 0 | 7 | |d s |0 (DE-588)1138303283 |0 (DE-627)895684276 |0 (DE-576)492480818 |a Radikalisierung |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Montasari, Reza |e HerausgeberIn |0 (DE-588)1273752279 |0 (DE-627)1823595820 |4 edt | |
776 | 1 | |z 9783031067082 | |
776 | 1 | |z 9783031067105 | |
776 | 1 | |z 9783031067112 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Artificial intelligence and national security |d Cham : Springer, 2022 |h viii, 230 Seiten |w (DE-627)1820062287 |z 9783031067082 |k Non-Electronic |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-06709-9 |m X:SPRINGER |x Resolving-System |z lizenzpflichtig |3 Volltext |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz1817966723cov.jpg |m V:DE-576 |m X:SPRINGER |q image/jpeg |v 20221006171822 |3 Cover |
912 | |a ZDB-2-SEB |b 2022 | ||
912 | |a ZDB-2-SCS |b 2022 | ||
912 | |a ZDB-2-SXCS |b 2022 | ||
912 | |a BSZ-2-SN-Auswahl |b 2023 | ||
935 | |a mkri | ||
951 | |a BO | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4194207203 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1817966723 | ||
LOK | |0 005 20221004112614 | ||
LOK | |0 008 221004||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 092 |o k |p p | ||
LOK | |0 689 |a s |a eBook-Springer-Computer-Science-2022 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 85640 |u https://doi.org/10.1007/978-3-031-06709-9 |z Zugang für die Universität Tübingen | ||
LOK | |0 912 |a ZDB-2-SCS | ||
LOK | |0 935 |a ebok | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4660848035 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1817966723 | ||
LOK | |0 005 20250204181911 | ||
LOK | |0 008 250204||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a SA-MARC-krimdoka001.raw |