Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 9 of 9 matches in All Departments
This insightful book provides an analysis of the central ethical issues that have arisen in combatting global terrorism and, in particular, jihadist terrorist groups, notably Al Qaeda, Islamic State and their affiliates. Chapters explore the theoretical problems that arise in relation to terrorism, such as the definition of terrorism and the concept of collective responsibility, and consider specific ethical issues in counter-terrorism. The book discusses a range of key topics including targeted killing, enhanced interrogation of terrorists, preventive detention, freedom of expression and terrorist content on social media, bulk metadata collection and responding to terrorist attacks that use weapons of mass destruction. It also explores ethical issues that have often been neglected, such as psychological warfare and stings. Taking a practical approach, the book offers recommendations for resolving these ethical problems in counter-terrorism. Integrating philosophical and legal analysis with empirical evidence, this book will be critical reading for scholars and students of human rights, international relations and terrorism and security law. Its use of specific examples of terrorist organisations, tactics and outcomes will also be valuable for policy-makers in the field.
People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.
This new Handbook offers a comprehensive overview of contemporary extensions and alternatives to the just war tradition in the field of the ethics of war. The modern history of just war has typically assumed the primacy of four particular elements: jus ad bellum, jus in bello, the state actor, and the solider. This book will put these four elements under close scrutiny, and will explore how they fare given the following challenges: * What role do the traditional elements of jus ad bellum and jus in bello-and the constituent principles that follow from this distinction-play in modern warfare? Do they adequately account for a normative theory of war? * What is the role of the state in warfare? Is it or should it be the primary actor in just war theory? * Can a just war be understood simply as a response to territorial aggression between state actors, or should other actions be accommodated under legitimate recourse to armed conflict? * Is the idea of combatant qua state-employed soldier a valid ethical characterization of actors in modern warfare? * What role does the technological backdrop of modern warfare play in understanding and realizing just war theories? Over the course of three key sections, the contributors examine these challenges to the just war tradition in a way that invigorates existing discussions and generates new debate on topical and prospective issues in just war theory. This book will be of great interest to students of just war theory, war and ethics, peace and conflict studies, philosophy and security studies.
This new Handbook offers a comprehensive overview of contemporary extensions and alternatives to the just war tradition in the field of the ethics of war. The modern history of just war has typically assumed the primacy of four particular elements: jus ad bellum, jus in bello, the state actor, and the solider. This book will put these four elements under close scrutiny, and will explore how they fare given the following challenges: * What role do the traditional elements of jus ad bellum and jus in bello-and the constituent principles that follow from this distinction-play in modern warfare? Do they adequately account for a normative theory of war? * What is the role of the state in warfare? Is it or should it be the primary actor in just war theory? * Can a just war be understood simply as a response to territorial aggression between state actors, or should other actions be accommodated under legitimate recourse to armed conflict? * Is the idea of combatant qua state-employed soldier a valid ethical characterization of actors in modern warfare? * What role does the technological backdrop of modern warfare play in understanding and realizing just war theories? Over the course of three key sections, the contributors examine these challenges to the just war tradition in a way that invigorates existing discussions and generates new debate on topical and prospective issues in just war theory. This book will be of great interest to students of just war theory, war and ethics, peace and conflict studies, philosophy and security studies.
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the "social credit system." Counter-terrorism technologies can easily succumb to mission creep, where a technology's exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the "social credit system." Counter-terrorism technologies can easily succumb to mission creep, where a technology's exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.
This handbook provides a comprehensive analysis of the contemporary theory, practice and themes in the study of national security. Part 1: Theories examines how national security has been conceptualised and formulated within the disciplines international relations, security studies and public policy. Part 2: Actors shifts the focus of the volume from these disciplinary concerns to consideration of how core actors in international affairs have conceptualised and practiced national security over time. Part 3: Issues then provides in-depth analysis of how individual security issues have been incorporated into prevailing scholarly and policy paradigms on national security. While security now seems an all-encompassing phenomenon, one general proposition still holds: national interests and the nation-state remain central to unlocking security puzzles. As normative values intersect with raw power; as new threats meet old ones; and as new actors challenge established elites, making sense out of the complex milieu of security theories, actors, and issues is a crucial task - and is the main accomplishment of this book.
This handbook provides a comprehensive analysis of the contemporary theory, practice and themes in the study of national security. Part 1: Theories examines how national security has been conceptualised and formulated within the disciplines international relations, security studies and public policy. Part 2: Actors shifts the focus of the volume from these disciplinary concerns to consideration of how core actors in international affairs have conceptualised and practiced national security over time. Part 3: Issues then provides in-depth analysis of how individual security issues have been incorporated into prevailing scholarly and policy paradigms on national security. While security now seems an all-encompassing phenomenon, one general proposition still holds: national interests and the nation-state remain central to unlocking security puzzles. As normative values intersect with raw power; as new threats meet old ones; and as new actors challenge established elites, making sense out of the complex milieu of security theories, actors, and issues is a crucial task - and is the main accomplishment of this book.
|
You may like...
Batman v Superman - Dawn Of Justice…
Ben Affleck, Henry Cavill, …
Blu-ray disc
(3)
R549 Discovery Miles 5 490
Fast & Furious: 8-Film Collection
Vin Diesel, Paul Walker, …
Blu-ray disc
Maze Runner: Chapter II - The Scorch…
Thomas Brodie-Sangster, Nathalie Emmanuel, …
Blu-ray disc
R44
Discovery Miles 440
|