Security Technologies and Social Implications (eBook)
352 Seiten
John Wiley & Sons (Verlag)
978-1-119-83415-1 (ISBN)
Explains how the latest technologies can advance policing and security, identify threats, and defend citizens from crime and terrorism
Security Technologies and Social Implications focuses on the development and application of new technologies that police and homeland security officers can leverage as a tool for both predictive and intelligence-led investigations. The book recommends the best practices for incorporation of these technologies into day-to-day activities by law enforcement agencies and counter-terrorism units. Practically, it addresses legal, technological, and organizational challenges (e.g. resource limitation and privacy concerns) combined with challenges related to the adoption of innovative technologies.
In contrast to classic tools, modern policing and security requires the development and implementation of new technologies using AI, machine learning, social media tracking, drones, robots, GIS, computer vision, and more. As crime (and cybercrime in particular) becomes more and more sophisticated, security requires a complex mix of social measures, including prevention, detection, investigation, and prosecution. Key topics related to these developments and their implementations covered in Security Technologies and Social Implications include:
* New security technologies and how these technologies can be implemented in practice, plus associated social, ethical or policy issues
* Expertise and commentary from individuals developing and testing new technologies and individuals using the technologies within their everyday roles
* The latest advancements in commercial and professional law enforcement technologies and platforms
* Commentary on how technologies can advance humanity by making policing and security more efficient and keeping citizens safe
Security Technologies and Social Implications serves as a comprehensive resource for defense personnel and law enforcement staff, practical security engineers, and trainee staff in security and police colleges to understand the latest security technologies, with a critical look at their uses and limitations regarding potential ethical, regulatory, or legal issues.
Garik Markarian is an Emeritus Professor of Lancaster University and CEO of Rinicom Ltd (UK). Ruza Karlovic´ is Vice Dean for Research at the Police College in Zagreb, Croatia. Holger Nitsch is Head of the Research and Social Science Department at the College of the Bavarian Police, Germany Krishna Chandramouli is Chief Technology Officer at Venaka Media Limited and Subject Matter Expert of AI at CBRNE Ltd.
The circle of change: technology impact on LEAs
Data Protection Impact Assessments in Law Enforcement: Identifying and Mitigating Risks in Algorithmic Policing
Methods of Stakeholder Engagement for the Co-Design of Security Technologies
Performance Assessment of Soft biometrics technologies for border crossing
Counter-Unmanned Aerial Vehicle Systems: Technical, Training and Regulatory Challenges
Critical Infrastructure security using Computer Vision Technologies
Evaluation of Content Fusion Algorithms for Large and Heterogeneous Datasets
Stakeholder Engagement Model to facilitate the uptake by end-users of Crisis Communication Systems
CRIME MAPPING IN CRIME ANALYSIS - THE DEVELOPMENTS IN THE PAST TWO DECADES
The Threat of Behavioural Radicalization Online: Conceptual Challenges and Technical Solutions Provided by the PROPHETS (Preventing Radicalization Online through the Proliferation of Harmonized ToolkitS) Project
Blockchain technologies for chain of custody authentication
Chances and challenges of predictive policing for law enforcement agencies
Conclusions
Erscheint lt. Verlag | 7.10.2022 |
---|---|
Sprache | englisch |
Themenwelt | Recht / Steuern ► Allgemeines / Lexika |
Recht / Steuern ► EU / Internationales Recht | |
Recht / Steuern ► Strafrecht | |
Schlagworte | Computer Science • Computer Security & Cryptography • Computersicherheit • Computersicherheit u. Kryptographie • Informatik • Law • Militär • Militär, Sicherheitsdienste, Geheimdienste • Military / Security / Intelligence • Penology & Police Science • Political Science • Politikwissenschaft • Pönologie • Pönologie u. Polizeiwissenschaft • Rechtswissenschaft |
ISBN-10 | 1-119-83415-5 / 1119834155 |
ISBN-13 | 978-1-119-83415-1 / 9781119834151 |
Haben Sie eine Frage zum Produkt? |
Größe: 12,6 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich