Terrorismo, tecnologia e sociedade no século XXI

Autores

  • Juan Acerbi Universidad Nacional de Tierra del Fuego

Palavras-chave:

terrorismo, segurança, redes sociais, big data, algoritmos

Resumo

Em termos de segurança e prevenção criminal, a inteligência artificial e o processamento de dados algorítmicos tornaram possível que grande parte das atividades e comunicações realizadas diariamente por milhões de pessoas fosse registrada e analisada em tempo real, a fim de detectar qualquer sinal de atividade criminal. Entre as vantagens que têm sido destacadas da aplicação desta tecnologia no campo social e político está o manuseio seguro e eficiente dos dados e o fato de que os processos são realizados sem a interferência da subjetividade humana. Ao mesmo tempo, o terrorismo, e particularmente o terrorismo que surge da própria sociedade que ele procura atacar, veio para aprofundar o debate sobre a necessidade de um sistema de monitoramento e vigilância destinado a registrar e analisar as atividades da população, a fim de salvaguardar o bem-estar geral e a segurança pública. Neste artigo vamos abordar o alcance e as implicações para as sociedades contemporâneas do uso de novas tecnologias aplicadas ao campo da segurança e, em particular, à luta contra este tipo frequente e particular de terrorismo.

Downloads

Não há dados estatísticos.

Biografia do Autor

Juan Acerbi, Universidad Nacional de Tierra del Fuego

Doctor en ciencias sociales por la Universidad de Buenos Aires, Argentina, y licenciado en ciencia política por la misma universidad. Actualmente se desempeña como investigador y profesor en la Universidad Nacional de Tierra del Fuego, forma parte del Centro Ciencia y Pensamiento de la Universidad Nacional de San Martín y es docente de la Especialización en Lenguaje y Comunicación Digital de la Universidad Nacional de Córdoba.

Referências

Aaronson, T. (2019). Terrorism’s double standard: Violent far right extremists are rarely prosecuted as terrorists. The Intercept, 23 de marzo. Recuperado de: https://theintercept.com/2019/03/23/domestic-terrorism-fbi-prosecutions/

Acerbi, J. (2019). Metapolítica. Enemigo público, poder y muerte civil en la tradición republicana. Buenos Aires: Miño y Dávila.

Acerbi, J. (2020). La identidad del virus. Pensar la pandemia. La filosofía interpelada por el COVID-19. Buenos Aires: Miño y Dávila. Recuperado de: https://germyd.wixsite.com/bitacorabfv.

Adorno, T. (2001). Epistemología y Ciencias Sociales. Valencia: Cátedra.

Albrecht, G. (2003). Sociological Approaches to Individual Violence and their Empirical Evaluation. En W. Heitmeyer y J. Hagan (Eds.), International Handbook of Violence Research (611-656). Dordrecht, Boston y Londres: Kluwer Academic Publishers.

Alsaedi, N., Burnap, P. y Rana, O. (2017). Can we predict a riot? Disruptive event prediction using Twitter. Transactions on Internet Technology, 17(2), 1-26.

Alzahrani, A., et al. (2018). Countering Terrorism on Social Media Using Big Data. CS&IT, 35-42.

Andrejevic M. (2013). Infoglut. How too Much Information is Changing the Way We Think and Know. Nueva York: Routledge.

Anselmino, V. (2013). Las garantías constitucionales y la regla de exlcusión probatoria en el proceso penal. Anales, 42,106-119.

Aquaro, V. (2019). Prólogo. En J. G. Corvalán (Ed.), Prometea. Inteligencia Artificial para transformar organizaciones públicas. Buenos Aires: Astrea.

Battersby, J. y Rhys, B. (2019). Christchurch in the context of New Zealand terrorism and right wing extremism. Journal of Policing, Intelligence and Counter Terrorism,1-17.

Becker, H., Mor, N. y Gravano, L. (2011). Beyond trending topics: Real-world event identification on twitter. Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM’11), 1-4.

Benigni, M., Kenneth, J. y Carley, K. (2017). Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter. PloS one, diciembre, 1-23.

Beresñak, F. (2020). Comentario crítico sobre un posible nuevo orden jurídico-político: la unidimensionalidad de la norma y el uso de la tecnología. En J. G. González, Á. A. Lozano y G. M. Rodríguez (Dir.), El derecho público y privado ante las nuevas tecnologías (568-574). Madrid: Dykinson.

Berkebile, R. (2015). What Is Domestic Terrorism? A Method for Classifying Events From the Global Terrorism Database. Terrorism and Political Violence, 0, 1-26.

Bjørgo, T. (1997). Racist and right-wing violence in Scandinavia: Patterns, perpetrators and responses. Oslo: Tano Aschehoug.

Bjørgo, T. (2005). Root Causes of Terrorism. Myths, reality and ways forward. Londres: Routledge.

Bjørgo, T. (2013). Strategies for Preventing Terrorism, Basingstoke. Palgrave: Macmillan.

Bolin, G. y Andersson Schwarz, J. (2015). Heuristics of the algorithm: Big Data, user interpretation and institutional translation. Big Data & Society, julio–diciembre, 1-12.

Boyd, D. y Crawford, K. (2012). Critical Questions for Big Data, Information. Communication & Society, 15(5), 662-679.

Breivik, A. (2011). 2083: A European Declaration of Independence.

Cafferata Nores, J. I. (1988). La prueba obtenida por quebrantamientos constitucionales. En Temas de Derecho Procesal Penal. Buenos Aires: Depalma.

Cafferata Nores, J. I. (1998). La prueba en el proceso penal. Buenos Aires: Depalma.

Carrio, A. (1994). Garantías constitucionales en el proceso penal. Buenos Aires: Hammurabi.

Carvalho, C. (2016). The Importance of Web 2.0 for Jihad 3.0. Female Jihadists Coming to Grips with Religious Violence on Facebook. Online. Heidelberg Journal of Religions on the Internet, 11, 46-65.

Castelvecchi, D. (2016). Can we open the black box of AI? Nature News, 538(7623), 20-23.

Chichizola, M. (1983). El debido proceso como garantía constitucional. La Ley, Tomo Nro.1983.

Corvalán, J. G. (2017). La primera inteligencia artificial predictiva al servicio de la Justicia: Prometea. La Ley 2017-E-1.

Couture, E. (1979). Estudios de Derecho Procesal Civil. Tomo II. Buenos Aires: Ediciones Depalma.

Delanda M. (1991). War in the Age of Intelligent Machines. Nueva York: Zone.

Eubank, W. y Weinberg, L. (2001). Terrorism and Democracy: Perpetrators and Victims. Terrorism and Political Violence, 13(1), 155-164.

Facebook News Room (2018). Hard Questions: How Effective Is Technology in Keeping Terrorists off Facebook? Recuperado de: https://about.fb.com/news/2018/04/keeping-terrorists-off-facebook/-.

Falk, A., Kuhn, A. y Zweimüller, J. (2011). Unemployment and right-wing extremist crime. Scandinavian Journal of Economics, 113(2), 260-285.

Farzindar, A. y Khreich W. (2015). A survey of techniques for event detection in twitter. Comput. Intell., 31(1), 132-164.

Freilich, J. et al. (2018). Patterns of Fatal Extreme-Right Crime in the United States. Perspectives on Terrorism, 12(6), 38-51.

Greenfield, A. (2018). Radical Technologies: The Design of Every-day Life: Londres: Verso.

Gries, T., Meierrieks, D. y Redlin, M. (2015). Oppressive governments, dependence on the United States and anti-American terrorism. Oxford Economic Papers, 67, 83-103.

Groh, T. (2019). Proxy War. The Least Bad Option. California: Standford University.

Hamm, M. y Spaaij, R. (2017). The Age of Lone Wolf Terrorism. Columbia: Columbia University Press.

Hainsworth, P. (2018). The Extreme Right in Western Europe. Londres y Nueva York: Routledge.

Hamidreza, A., Soumajyoti, S. y Shakarian, P. (2019). Detection of Violent Extremists in Social Media. ArXiv:1902.01577, 1-5. Ithaca: Cornell University.

Hebberecht, P. y Baillergeau, E. (2012). Social Crime Prevention in Europe. Bruselas: Brussels University Press.

Heitmeyer, W. (1993). Hostility and violence towards foreigners in Germany. En T. Bjørgo y R. Witte (Eds.), Racist violence in Europe (17-28). Basingstoke: Palgrave Macmillan.

Heitmeyer, W. (2005). Right-Wing terrorism. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward (141-153), Londres: Routledge.

Hemmingby, C. y Bjørgo, T. (2016). The Dynamics of a Terrorist Targeting Process: Anders B. Breivik and the 22 July Attacks in Norway. Londres: Palgrave Macmillan.

Hemmingby, C. y Bjørgo, T. (2018). Terrorist Target Selection: The Case of Anders Behring Breivik. Perspectives on Terrorism, 12(6), 164-176.

Hilbert, M., Liu, B., Luu, J. y Fishbein, J. (2019). Behavioral Experiments With Social Algorithms: An Information Theoretic Approach to Input–Output Conversions. Communication Methods and Measures, 13, 267-286.

Horgan, J. (2005). The social and psychological characteristics of terrorism and terrorists. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward (44-53). Londres: Routledge.

Jurczak, J., Łachacz, T. y Nitsch, H. (2020). The So-Called ‘Lone Wolf’ Phenomenon. En B. Akhgar, D. Wells y J. M. Blanco (Eds.), Investigating Radicalization Trends. Case Studies in Europe and Asia. Suiza: Springer.

Kearns, E., Betus, A. y Lemieux, A. (2019). Why do some terrorist attacks receive more media attention than others? Justice Quarterly, 26 [online first], 985-1022.

Koehler, D. (2018). Recent Trends in German Right-Wing Violence and Terrorism: What are the Contextual Factors behind ‘Hive Terrorism’? Perspectives on Terrorism, 12(6), 72-88.

Koehler, D. (2017). Right-Wing Terrorism in the 21st Century. The “National Socialist Underground” and the history of terror from the Far-Right in Germany. Londres y Nueva York: Routledge.

Koehler, D. (2019). Violence and Terrorism from the Far-Right: Policy Options to Counter an Elusive Threat. The International Centre for Counter-Terrorism – The Hague, 10.

Latour, B. (2009). Tarde’s idea of quantification. En M. Candea (Ed.), The Social after Gabriel Tarde: Debates and Assessments. Londres: Routledge.

Lecun, Y., Bengio, Y. y Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444.

Levin, J. (2006). Domestic Terrorism. Reno: Chelsea House Publishers.

Levitt, M. (2018). Neither Remaining nor Expanding. The Decline of the Islamic State. Washington: The Washington Institute for Near East Policy.

Mager, A. (2012). Algorithmic Ideology. Information, Communication & Society, 15(5), 769-787.

Manch, T. (2019). Alarming’ increase in extreme-right genocide theory came before Christchurch terror attack – report, Stuff News. Recuperado de: https://www.stuff.co.nz/national/christchurch-shooting/114066106/alarming-increase-in-extremeright-genocide-theory-came-before-christchurch-terror-attack--report.

Medhurst, P. (2000). Global terrorism, a course produced by UNITAR. Nueva York: UNITAR.

Mohammad, A. (2005). Roots of terrorism in the Middle East. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward. Londres: Routledge.

Münkler, H. (2002). Die neuen Kriege. Hamburgo: Rowohlt Verlag.

Nesser, P. (2010). Joining jihadi terrorist cells in Europe: Exploring motivational aspects of recruitment and radicalisation. En M. Ranstorp (Ed.), Understanding Violent Radicalisation: Terrorist and Jihadist Movements in Europe (81-114). Londres: Taylor and Francis.

O’Neil, C. (2016). Weapons of Math Destruction. Londres: Penguin.

Pasquale, P. (2015). The black box society: The secret algorithms that control money and information. Cambridge: Harvard University Press.

Piazza, J. (2017). The determinants of domestic right-wing terrorism in the USA: Economic grievance, societal change and political resentment. Conflict Management and Peace Science, 34(I), 52-80.

Post, J. (2005). The socio-cultural underpinnings of terrorist psychology. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward (54-69). Londres: Routledge.

Powell, K. (2011). Framing Islam: An analysis of U.S. Media coverage of terrorism since 9/11. Communication Studies, 62(1), 90-112.

Raffaello, P. (2011). What Have We Learned about Lone Wolves from Anders Behring Breivik? Perspectives on Terrorism, 5(5/6), 27-42.

Ravndal, J. (2017). Explaining right-wing terrorism and violence in Western Europe: Grievances, opportunities and polarisation. European Journal of Political Research, 57(4), 845-866.

Sadin, É. (2018a). La humanidad aumentada. La administración digital del mundo. Buenos Aires: Caja Negra.

Sadin, É. (2018b). La silicolonización del mundo. La irresistible expansión del liberalismo digital. Buenos Aires: Caja Negra.

Sandler, T. (2015). Terrorism and Counterterrorism: An Overview. Oxford Economic Papers, 67(1), 1-20.

Savage, M. y Burrows, R. (2007). The coming crisis of empirical sociology. Sociology, 41(5), 885-899.

Schmid, A. et al. (1984). Political Terrorism: A Research Guide to Concepts, Theories, Data Bases and Literature. Amsterdam: North-Holland.

Schmid, A. (2001). The Routledge Handbook of Terrorism Research. Londres y Nueva York: Routledge.

Schmid, A. (2005). Preventing of terrorism. Towards a multi-pronged approach. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward. Londres: Routledge.

Seliktar, O. y Rezaei, F. (2020). Iran, Revolution and Proxy Wars. Suiza: Palgrave Macmillan.

Sikkens E., Van San, M., Sieckelinck, S., Boeije, H. y Winter, M. (2016). Participant Recruitment through Social Media: Lessons Learned from a Qualitative Radicalization Study Using Facebook. Sage Journals, 29(2),130-139.

Simon, J. D. (2013). Lone Wolf Terrorism: Understanding the Growing Threat. Amsterdam: Prometheus books.

Small, D. (2011). The uneasy relationship between national security and personal freedom: New Zealand and the ‘War on terror’. International Journal of Law in Context, 7(4), 467-486.

Srnicek, N. (2018). Capitalismo de plataformas. Buenos Aires: Caja Negra.

Steinbock, D. (2005). Data Matching, Data Mining, and Due Process. 40 Georgia Law Review, 1, 1-88.

Stohl, M. (2005). Expected utility and state terrorism. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward. Londres: Routledge.

Tarrant, B. (2019). The Great Replacement.

Taylor, H. (2019). Domestic terrorism and hate crimes: legal definitions and media framing of mass shootings in the United States. Journal of Policing, Intelligence and Counter Terrorism, 14(3), 227-244.

Van Dijck, J. (2014). Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology. Surveillance & Society, 12(2), 197-208.

Vieweg, S., Castillo, C. y Imran, M. (2014). Integrating social media communications into the rapid assessment of sudden onset disasters. Proceedings of the 6th International Conference on Social Informatics, 444–461.

Waldmann, P. (2005). Social-revolutionary terrorism in Latin America and Europe. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward. Londres: Routledge.

Downloads

Publicado

2021-11-25

Como Citar

Acerbi, J. (2021). Terrorismo, tecnologia e sociedade no século XXI. Revista Iberoamericana De Ciencia, Tecnología Y Sociedad - CTS, 16(48). Recuperado de https://ojs.revistacts.net/index.php/CTS/article/view/246

Edição

Seção

Artigos