Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 12 of 12 matches in All Departments
This insightful book provides an analysis of the central ethical issues that have arisen in combatting global terrorism and, in particular, jihadist terrorist groups, notably Al Qaeda, Islamic State and their affiliates. Chapters explore the theoretical problems that arise in relation to terrorism, such as the definition of terrorism and the concept of collective responsibility, and consider specific ethical issues in counter-terrorism. The book discusses a range of key topics including targeted killing, enhanced interrogation of terrorists, preventive detention, freedom of expression and terrorist content on social media, bulk metadata collection and responding to terrorist attacks that use weapons of mass destruction. It also explores ethical issues that have often been neglected, such as psychological warfare and stings. Taking a practical approach, the book offers recommendations for resolving these ethical problems in counter-terrorism. Integrating philosophical and legal analysis with empirical evidence, this book will be critical reading for scholars and students of human rights, international relations and terrorism and security law. Its use of specific examples of terrorist organisations, tactics and outcomes will also be valuable for policy-makers in the field.
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the "social credit system." Counter-terrorism technologies can easily succumb to mission creep, where a technology's exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
This handbook provides a comprehensive analysis of the contemporary theory, practice and themes in the study of national security. Part 1: Theories examines how national security has been conceptualised and formulated within the disciplines international relations, security studies and public policy. Part 2: Actors shifts the focus of the volume from these disciplinary concerns to consideration of how core actors in international affairs have conceptualised and practiced national security over time. Part 3: Issues then provides in-depth analysis of how individual security issues have been incorporated into prevailing scholarly and policy paradigms on national security. While security now seems an all-encompassing phenomenon, one general proposition still holds: national interests and the nation-state remain central to unlocking security puzzles. As normative values intersect with raw power; as new threats meet old ones; and as new actors challenge established elites, making sense out of the complex milieu of security theories, actors, and issues is a crucial task - and is the main accomplishment of this book.
This new Handbook offers a comprehensive overview of contemporary extensions and alternatives to the just war tradition in the field of the ethics of war. The modern history of just war has typically assumed the primacy of four particular elements: jus ad bellum, jus in bello, the state actor, and the solider. This book will put these four elements under close scrutiny, and will explore how they fare given the following challenges: * What role do the traditional elements of jus ad bellum and jus in bello-and the constituent principles that follow from this distinction-play in modern warfare? Do they adequately account for a normative theory of war? * What is the role of the state in warfare? Is it or should it be the primary actor in just war theory? * Can a just war be understood simply as a response to territorial aggression between state actors, or should other actions be accommodated under legitimate recourse to armed conflict? * Is the idea of combatant qua state-employed soldier a valid ethical characterization of actors in modern warfare? * What role does the technological backdrop of modern warfare play in understanding and realizing just war theories? Over the course of three key sections, the contributors examine these challenges to the just war tradition in a way that invigorates existing discussions and generates new debate on topical and prospective issues in just war theory. This book will be of great interest to students of just war theory, war and ethics, peace and conflict studies, philosophy and security studies.
This new Handbook offers a comprehensive overview of contemporary extensions and alternatives to the just war tradition in the field of the ethics of war. The modern history of just war has typically assumed the primacy of four particular elements: jus ad bellum, jus in bello, the state actor, and the solider. This book will put these four elements under close scrutiny, and will explore how they fare given the following challenges: * What role do the traditional elements of jus ad bellum and jus in bello-and the constituent principles that follow from this distinction-play in modern warfare? Do they adequately account for a normative theory of war? * What is the role of the state in warfare? Is it or should it be the primary actor in just war theory? * Can a just war be understood simply as a response to territorial aggression between state actors, or should other actions be accommodated under legitimate recourse to armed conflict? * Is the idea of combatant qua state-employed soldier a valid ethical characterization of actors in modern warfare? * What role does the technological backdrop of modern warfare play in understanding and realizing just war theories? Over the course of three key sections, the contributors examine these challenges to the just war tradition in a way that invigorates existing discussions and generates new debate on topical and prospective issues in just war theory. This book will be of great interest to students of just war theory, war and ethics, peace and conflict studies, philosophy and security studies.
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the "social credit system." Counter-terrorism technologies can easily succumb to mission creep, where a technology's exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.
People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.
Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called "fifth domain " of warfare. Does an aggressive act in the cyber-realm constitute an act of war? If so, what rules should govern such warfare? Are the standard theories of just war capable of analyzing and assessing this mode of conflict? These changing circumstances present us with a series of questions demanding serious attention. Is there such a thing as cyberwarfare? How do the existing rules of engagement and theories from the just war tradition apply to cyberwarfare? How should we assess a cyber-attack conducted by a state agency against private enterprise and vice versa? Furthermore, how should actors behave in the cyber-realm? Are there ethical norms that can be applied to the cyber-realm? Are the classic just war constraints of non-combatant immunity and proportionality possible in this realm? Especially given the idea that events that are constrained within the cyber-realm do not directly physically harm anyone, what do traditional ethics of war conventions say about this new space? These questions strike at the very center of contemporary intellectual discussion over the ethics of war. In twelve original essays, plus a foreword from John Arquilla and an introduction, Binary Bullets: The Ethics of Cyberwarfare, engages these questions head on with contributions from the top scholars working in this field today.
This handbook provides a comprehensive analysis of the contemporary theory, practice and themes in the study of national security. Part 1: Theories examines how national security has been conceptualised and formulated within the disciplines international relations, security studies and public policy. Part 2: Actors shifts the focus of the volume from these disciplinary concerns to consideration of how core actors in international affairs have conceptualised and practiced national security over time. Part 3: Issues then provides in-depth analysis of how individual security issues have been incorporated into prevailing scholarly and policy paradigms on national security. While security now seems an all-encompassing phenomenon, one general proposition still holds: national interests and the nation-state remain central to unlocking security puzzles. As normative values intersect with raw power; as new threats meet old ones; and as new actors challenge established elites, making sense out of the complex milieu of security theories, actors, and issues is a crucial task - and is the main accomplishment of this book.
Chapter 10 is published open access and free to read or download from Oxford Academic. The Ethics of Surveillance in Times of Emergency draws from the use of modern surveillance technologies during the COVID-19 pandemic to explore a set of issues and challenges facing decision-makers and designers in times of emergency: how do we respond to emergencies in ways that are both consistent with democratic and community principles, and that are ethically justifiable? Emergencies, like public health pandemics, not only place stress on existing infrastructure and communities, but put significant pressure on our decision-making. The use of surveillance technologies during public health crises is a vital frame to explore the challenge of acting in times of emergency. Moreover, as an exercise in reflective applied ethics, this book does not just seek to apply a given theory or principle to the problem of surveillance in times of emergency, but to use the challenges facing us to critically engage with, reflect upon, and develop those theories and principles. The book's authors recognize this challenge—is it possible to respond to exceptional conditions in ways that either preserve our core values, or must these core values be subsumed under the need to respond to the particular emergency? The book offers responses to this challenge by looking at three interrelated ways in which can manifest: first, the democratic challenges; second, the ethical challenges; and third the design challenges faced in developing ethical solutions.
Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called "fifth domain " of warfare. Does an aggressive act in the cyber-realm constitute an act of war? If so, what rules should govern such warfare? Are the standard theories of just war capable of analyzing and assessing this mode of conflict? These changing circumstances present us with a series of questions demanding serious attention. Is there such a thing as cyberwarfare? How do the existing rules of engagement and theories from the just war tradition apply to cyberwarfare? How should we assess a cyber-attack conducted by a state agency against private enterprise and vice versa? Furthermore, how should actors behave in the cyber-realm? Are there ethical norms that can be applied to the cyber-realm? Are the classic just war constraints of non-combatant immunity and proportionality possible in this realm? Especially given the idea that events that are constrained within the cyber-realm do not directly physically harm anyone, what do traditional ethics of war conventions say about this new space? These questions strike at the very center of contemporary intellectual discussion over the ethics of war. In twelve original essays, plus a foreword from John Arquilla and an introduction, Binary Bullets: The Ethics of Cyberwarfare, engages these questions head on with contributions from the top scholars working in this field today.
|
You may like...
|