MARC details
000 -LIDER |
fixed length control field |
05729nam a22006495i 4500 |
001 - CONTROL NUMBER |
control field |
978-3-031-50454-9 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250516155948.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240118s2024 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783031504549 |
-- |
978-3-031-50454-9 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UTN |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM053000 |
Source |
bisacsh |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UTN |
Source |
thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Montasari, Reza. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
245 10 - TITLE STATEMENT |
Title |
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution |
Medium |
[electronic resource] : |
Remainder of title |
Threats, Assessment and Responses / |
Statement of responsibility, etc. |
by Reza Montasari. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. 2024. |
264 #1 - |
-- |
Cham : |
-- |
Springer International Publishing : |
-- |
Imprint: Springer, |
-- |
2024. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XVII, 270 p. 3 illus., 2 illus. in color. |
Other physical details |
online resource. |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
347 ## - |
-- |
text file |
-- |
PDF |
-- |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Advanced Sciences and Technologies for Security Applications, |
International Standard Serial Number |
2363-9466 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Unravelling State Crimes: A Critical Analysis of the Iraq War and Its Global Ramifications -- 2. Assessing the Effectiveness of UK Counter-Terrorism Strategies and Alternative Approaches -- 3. Understanding and Assessing the Role of Women in Terrorism -- 4. Exploring the Current Landscape of Cyberterrorism: Insights, Strategies, and the Impact of COVID-19 -- 5. Exploring the Imminence of Cyberterrorism Threat to National Security -- 6. The Impact of Technology on Radicalisation to Violent Extremism and Terrorism in Contemporary Security Landscape -- 7. Techniques in Countering Cyberterrorism Approaches with Those Adopted by State Adversaries -- 8. Analysing Ethical, Legal, Technical and Operational Challenges of the Application of Machine Learning in Countering Cyber Terrorism -- 9. Addressing Ethical, Legal, Technical, and Operational Challenges in Counterterrorism with Machine Learning: Recommendations and Strategies -- 10. The Dual Role of Artificial Intelligence in Online Disinformation: A Critical Analysis. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications. The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content. Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it. Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security. Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book's exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies. Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI's transformative role in shaping the future of national and international security. |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Owner |
UABC ; |
Method of acquisition |
Perpetuidad |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Computer crimes. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Artificial intelligence. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
International criminal law. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Criminology. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Security systems. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Cybercrime. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Artificial Intelligence. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
International Criminal Law. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Crime Control and Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Security Science and Technology. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783031504532 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783031504556 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783031504563 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Advanced Sciences and Technologies for Security Applications, |
-- |
2363-9466 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Public note |
Libro electrónico |
Uniform Resource Identifier |
http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-50454-9 |
912 ## - |
-- |
ZDB-2-SCS |
912 ## - |
-- |
ZDB-2-SXCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Libro Electrónico |