000 | 05358nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-09691-4 | ||
003 | DE-He213 | ||
005 | 20240423125138.0 | ||
007 | cr nn 008mamaa | ||
008 | 230102s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031096914 _9978-3-031-09691-4 |
||
024 | 7 |
_a10.1007/978-3-031-09691-4 _2doi |
|
050 | 4 | _aQ334-342 | |
050 | 4 | _aTA347.A78 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aDigital Transformation in Policing: The Promise, Perils and Solutions _h[electronic resource] / _cedited by Reza Montasari, Victoria Carpenter, Anthony J. Masys. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aV, 168 p. 21 illus., 17 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvanced Sciences and Technologies for Security Applications, _x2363-9466 |
|
505 | 0 | _aDigitizing Policing: from disruption to innovation through futures thinking and anticipatory innovation -- The Use of Counter Narratives to Combat Violent Extremism Online -- Ethical Challenges in the Use of Digital Technologies: AI and Big Data -- Law Enforcement and the Policing of Cyberspace -- Contemporary Issues in Child Protection: Police Use of Artificial Intelligence for Online Child Protection in the UK -- Beyond the Surface Web: How Criminals Are Utilising the Internet to Commit Crimes -- The Role of the Internet in Radicalisation to Violent Extremism -- Exploring the Extent to Which Extremism and Terrorism Have Changed since the Advent of the Internet -- Zero Trust Security Strategies and Guideline. . | |
520 | _aThis book shares essential insights into how the social sciences and technology could foster new advances in managing the complexity inherent to the criminal and digital policing landscape. Said landscape is both dynamic and intricate, emanating as it does from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have significant impacts on societies around the world. This necessitates a reassessment of what crime, national security and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats and terrorist activities underscore the vulnerabilities of our current security and digital policing posture. This book presents concepts, theories and digital policing applications, offering a comprehensive analysis of current and emerging trends in digital policing. Pursuing an evidence-based approach, it offers an extraordinarily perceptive and detailed view of issues and solutions regarding the crime and digital policing landscape. To this end, it highlights current technological and methodological solutions as well as advances concerning integrated computational and analytical solutions deployed in digital policing. It also provides a comprehensive analysis of the technical, ethical, legal, privacy and civil liberty challenges stemming from the aforementioned advances in the field of digital policing; and accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical and legal approaches when conducting digital policing. The research gathered here fits well into the larger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime and law. It provides a valuable reference for law enforcement, policymakers, cybersecurity experts, digital forensic practitioners, researchers, graduates and advanced undergraduates, and other stakeholders with an interest in counter-terrorism. In addition to this target audience, it offers a valuable tool for lawyers, criminologist and technology enthusiasts. | ||
650 | 0 | _aArtificial intelligence. | |
650 | 0 |
_aArtificial intelligence _xData processing. |
|
650 | 0 | _aSecurity systems. | |
650 | 0 |
_aTechnology _xMoral and ethical aspects. |
|
650 | 0 | _aCriminology. | |
650 | 1 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aData Science. |
650 | 2 | 4 | _aSecurity Science and Technology. |
650 | 2 | 4 | _aEthics of Technology. |
650 | 2 | 4 | _aCrime Control and Security. |
700 | 1 |
_aMontasari, Reza. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aCarpenter, Victoria. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMasys, Anthony J. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031096907 |
776 | 0 | 8 |
_iPrinted edition: _z9783031096921 |
776 | 0 | 8 |
_iPrinted edition: _z9783031096938 |
830 | 0 |
_aAdvanced Sciences and Technologies for Security Applications, _x2363-9466 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-09691-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c174740 _d174740 |