Countering cyberterrorism: the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity
This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which...
Main Author: | |
---|---|
Format: | Electronic Book |
Language: | English |
Published: |
Cham
Springer
[2023]
|
In: |
Advances in information security (volume 101)
Year: 2023 |
Online Access: |
Volltext (lizenzpflichtig) |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: | |
Related Items: | Erscheint auch als:
1830600486 |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 1830235044 | ||
003 | DE-627 | ||
005 | 20240514190516.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230103s2023 sz |||||o 00| ||eng c | ||
020 | |a 9783031219207 |9 978-3-031-21920-7 | ||
024 | 7 | |a 10.1007/978-3-031-21920-7 |2 doi | |
035 | |a (DE-627)1830235044 | ||
035 | |a (DE-599)KEP083534792 | ||
035 | |a (DE-He213)978-3-031-21920-7 | ||
035 | |a (EBP)083534792 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XA-CH | ||
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM043050 |2 bisacsh | |
100 | 1 | |a Montasari, Reza |e VerfasserIn |0 (DE-588)1273752279 |0 (DE-627)1823595820 |4 aut | |
109 | |a Montasari, Reza | ||
245 | 1 | 0 | |a Countering cyberterrorism |b the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity |c Reza Montasari |
264 | 1 | |a Cham |b Springer |c [2023] | |
300 | |a 1 Online-Ressource (xv, 164 Seiten) |b Diagramme | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v volume 101 | |
520 | |a This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which the adoption of AI algorithms (such as Machine Learning, Deep Learning, Natural Language Processing, and Big Data Predictive Analytics (BDPAs) transforms law enforcement agencies (LEAs) and intelligence service practices. It explores the roles that these technologies play in the manufacture of security, the threats to freedom and the levels of social control in the surveillance state. This book also examines the malevolent use of AI and associated technologies by state and non-state actors. Along with this analysis, it investigates the key legal, political, ethical, privacy and human rights implications of the national security uses of AI in the stated democracies. This book provides a set of policy recommendations to help to mitigate these challenges. Researchers working in the security field as well advanced level students in computer science focused on security will find this book useful as a reference. Cyber security professionals, network security analysts, police and law enforcement agencies will also want to purchase this book. . | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f SSG |x XA-DE-BW |2 pdager |5 DE-21 | |
650 | 0 | |a Computer networks—Security measures. | |
650 | 0 | |a Artificial intelligence. | |
650 | 0 | |a Computer crimes. | |
650 | 0 | |a Computer networks | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a COMPUTERS / Artificial Intelligence | |
650 | 4 | |a COMPUTERS / Networking / Security | |
650 | 4 | |a Computer- und Internetkriminalität | |
650 | 4 | |a Crime & criminology | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Network security | |
650 | 4 | |a Netzwerksicherheit | |
650 | 4 | |a Social Science / Criminology | |
776 | 1 | |z 9783031219191 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Montasari, Reza |t Countering cyberterrorism |d Cham : Springer, 2023 |h xv, 164 Seiten |w (DE-627)1830600486 |z 9783031219191 |
830 | 0 | |a Advances in information security |v volume 101 |9 101 |w (DE-627)543989720 |w (DE-576)450503771 |w (DE-600)2387113-1 |x 2512-2193 |7 ns | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-21920-7 |m X:SPRINGER |x Resolving-System |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-2-SEB |b 2023 | ||
912 | |a ZDB-2-SCS |b 2023 | ||
912 | |a ZDB-2-SXCS |b 2023 | ||
935 | |a mkri | ||
951 | |a BO | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4247840029 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1830235044 | ||
LOK | |0 005 20230113132200 | ||
LOK | |0 008 230113||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 092 |o k |p p | ||
LOK | |0 689 |a s |a eBook-Springer-Computer-Science-2023 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 85640 |u https://doi.org/10.1007/978-3-031-21920-7 |z Zugang für die Universität Tübingen | ||
LOK | |0 912 |a ZDB-2-SCS | ||
LOK | |0 935 |a ebok | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4287050509 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1830235044 | ||
LOK | |0 005 20230310114532 | ||
LOK | |0 008 230310||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a SA-MARC-krimdoka001.raw |