Security Technologies and Social Implications
eBook - ePub

Security Technologies and Social Implications

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Security Technologies and Social Implications

Book details
Table of contents
Citations

About This Book

SECURITY TECHNOLOGIES AND SOCIAL IMPLICATIONS

Explains how the latest technologies can advance policing and security, identify threats, and defend citizens from crime and terrorism

Security Technologies and Social Implications focuses on the development and application of new technologies that police and homeland security officers can leverage as a tool for both predictive and intelligence-led investigations. The book recommends the best practices for incorporation of these technologies into day-to-day activities by law enforcement agencies and counter-terrorism units. Practically, it addresses legal, technological, and organizational challenges (e.g. resource limitation and privacy concerns) combined with challenges related to the adoption of innovative technologies.

In contrast to classic tools, modern policing and security requires the development and implementation of new technologies using AI, machine learning, social media tracking, drones, robots, GIS, computer vision, and more. As crime (and cybercrime in particular) becomes more and more sophisticated, security requires a complex mix of social measures, including prevention, detection, investigation, and prosecution. Key topics related to these developments and their implementations covered in Security Technologies and Social Implications include:

  • New security technologies and how these technologies can be implemented in practice, plus associated social, ethical or policy issues
  • Expertise and commentary from individuals developing and testing new technologies and individuals using the technologies within their everyday roles
  • The latest advancements in commercial and professional law enforcement technologies and platforms
  • Commentary on how technologies can advance humanity by making policing and security more efficient and keeping citizens safe

Security Technologies and Social Implications serves as a comprehensive resource for defense personnel and law enforcement staff, practical security engineers, and trainee staff in security and police colleges to understand the latest security technologies, with a critical look at their uses and limitations regarding potential ethical, regulatory, or legal issues.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Security Technologies and Social Implications by Garik Markarian,Ruza Karlovic,Holger Nitsch,Krishna Chandramouli in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Year
2022
ISBN
9781119834168
Edition
1

Table of contents

  1. Cover
  2. Table of Contents
  3. Series Page
  4. Title Page
  5. Copyright Page
  6. List of Contributors
  7. Preface
  8. Introduction
  9. 1 The Circle of Change
  10. 2 Data Protection Impact Assessments in Law Enforcement
  11. 3 Methods of Stakeholder Engagement for the Co‐Design of Security Technologies
  12. 4 Performance Assessment of Soft Biometrics Technologies for Border Crossing
  13. 5 Counter‐Unmanned Aerial Vehicle Systems
  14. 6 Critical Infrastructure Security Using Computer Vision Technologies
  15. 7 Evaluation of Content Fusion Algorithms for Large and Heterogeneous Datasets
  16. 8 Stakeholder Engagement Model to Facilitate the Uptake by End Users of Crisis Communication Systems
  17. 9 Crime Mapping in Crime Analysis
  18. 10 The Threat of Behavioral Radicalization Online
  19. 11 Blockchain Technologies for Chain of Custody Authentication
  20. 12 Chances and Challenges of Predictive Policing for Law Enforcement Agencies
  21. Index
  22. End User License Agreement