Countering cyberterrorism: the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity

This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which...

Full description

Saved in:  
Bibliographic Details
Main Author: Montasari, Reza (Author)
Format: Electronic Book
Language:English
Published: Cham Springer [2023]
In: Advances in information security (volume 101)
Year: 2023
Online Access: Volltext (lizenzpflichtig)
Check availability: HBZ Gateway
Subito Delivery Service: Order now.
Keywords:
Related Items:Erscheint auch als: 1830600486

MARC

LEADER 00000cam a2200000 4500
001 1830235044
003 DE-627
005 20240514190516.0
007 cr uuu---uuuuu
008 230103s2023 sz |||||o 00| ||eng c
020 |a 9783031219207  |9 978-3-031-21920-7 
024 7 |a 10.1007/978-3-031-21920-7  |2 doi 
035 |a (DE-627)1830235044 
035 |a (DE-599)KEP083534792 
035 |a (DE-He213)978-3-031-21920-7 
035 |a (EBP)083534792 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
044 |c XA-CH 
072 7 |a UTN  |2 bicssc 
072 7 |a COM043050  |2 bisacsh 
100 1 |a Montasari, Reza  |e VerfasserIn  |0 (DE-588)1273752279  |0 (DE-627)1823595820  |4 aut 
109 |a Montasari, Reza 
245 1 0 |a Countering cyberterrorism  |b the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity  |c Reza Montasari 
264 1 |a Cham  |b Springer  |c [2023] 
300 |a 1 Online-Ressource (xv, 164 Seiten)  |b Diagramme 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Advances in information security  |v volume 101 
520 |a This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which the adoption of AI algorithms (such as Machine Learning, Deep Learning, Natural Language Processing, and Big Data Predictive Analytics (BDPAs) transforms law enforcement agencies (LEAs) and intelligence service practices. It explores the roles that these technologies play in the manufacture of security, the threats to freedom and the levels of social control in the surveillance state. This book also examines the malevolent use of AI and associated technologies by state and non-state actors. Along with this analysis, it investigates the key legal, political, ethical, privacy and human rights implications of the national security uses of AI in the stated democracies. This book provides a set of policy recommendations to help to mitigate these challenges. Researchers working in the security field as well advanced level students in computer science focused on security will find this book useful as a reference. Cyber security professionals, network security analysts, police and law enforcement agencies will also want to purchase this book. . 
583 1 |a Archivierung/Langzeitarchivierung gewährleistet  |f SSG  |x XA-DE-BW  |2 pdager  |5 DE-21 
650 0 |a Computer networks—Security measures. 
650 0 |a Artificial intelligence. 
650 0 |a Computer crimes. 
650 0 |a Computer networks 
650 4 |a Artificial Intelligence 
650 4 |a COMPUTERS / Artificial Intelligence 
650 4 |a COMPUTERS / Networking / Security 
650 4 |a Computer- und Internetkriminalität 
650 4 |a Crime & criminology 
650 4 |a Künstliche Intelligenz 
650 4 |a Network security 
650 4 |a Netzwerksicherheit 
650 4 |a Social Science / Criminology 
776 1 |z 9783031219191 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |a Montasari, Reza  |t Countering cyberterrorism  |d Cham : Springer, 2023  |h xv, 164 Seiten  |w (DE-627)1830600486  |z 9783031219191 
830 0 |a Advances in information security  |v volume 101  |9 101  |w (DE-627)543989720  |w (DE-576)450503771  |w (DE-600)2387113-1  |x 2512-2193  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-031-21920-7  |m X:SPRINGER  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-2-SEB  |b 2023 
912 |a ZDB-2-SCS  |b 2023 
912 |a ZDB-2-SXCS  |b 2023 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4247840029 
LOK |0 003 DE-627 
LOK |0 004 1830235044 
LOK |0 005 20230113132200 
LOK |0 008 230113||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21  |c DE-627  |d DE-21 
LOK |0 092   |o k  |p p 
LOK |0 689   |a s  |a eBook-Springer-Computer-Science-2023 
LOK |0 852   |a DE-21 
LOK |0 852 1  |9 00 
LOK |0 85640  |u https://doi.org/10.1007/978-3-031-21920-7  |z Zugang für die Universität Tübingen 
LOK |0 912   |a ZDB-2-SCS 
LOK |0 935   |a ebok 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4287050509 
LOK |0 003 DE-627 
LOK |0 004 1830235044 
LOK |0 005 20230310114532 
LOK |0 008 230310||||||||||||||||ger||||||| 
LOK |0 040   |a DE-Frei85  |c DE-627  |d DE-Frei85 
LOK |0 852   |a DE-Frei85 
LOK |0 852 1  |m p  |9 00 
LOK |0 938   |k p 
ORI |a SA-MARC-krimdoka001.raw