Terrorism online: politics, law and technology
"This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disc...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
2015
|
Schriftenreihe: | Routledge studies in conflict, security and technology
|
Schlagworte: | |
Zusammenfassung: | "This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general".. |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9780415732888 9781315848822 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV042486788 | ||
003 | DE-604 | ||
005 | 20180523 | ||
007 | cr|uuu---uuuuu | ||
008 | 150408s2015 xxk|||| o||u| ||||||eng d | ||
020 | |a 9780415732888 |c print |9 978-0-415-73288-8 | ||
020 | |a 9781315848822 |c Online |9 978-1-315-84882-2 | ||
035 | |a (OCoLC)907794385 | ||
035 | |a (DE-599)BVBBV042486788 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-29 | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 363.3250285/4678 |2 23 | |
245 | 1 | 0 | |a Terrorism online |b politics, law and technology |c edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen |
264 | 1 | |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Routledge studies in conflict, security and technology | |
500 | |a Includes bibliographical references and index | ||
520 | |a "This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general".. | ||
650 | 7 | |a POLITICAL SCIENCE / General |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a LAW / Computer & Internet |2 bisacsh | |
650 | 4 | |a Politik | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Terrorism | |
650 | 4 | |a Computer crimes |x Political aspects | |
650 | 4 | |a POLITICAL SCIENCE / General | |
650 | 4 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism | |
650 | 4 | |a LAW / Computer & Internet | |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Jarvis, Lee |d 1979- |e Sonstige |0 (DE-588)138757224 |4 oth | |
700 | 1 | |a Macdonald, Stuart |e Sonstige |4 oth | |
700 | 1 | |a Chen, Thomas M. |e Sonstige |0 (DE-588)1056945060 |4 oth | |
912 | |a ZDB-38-EBR | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027921649 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804153220102094848 |
---|---|
any_adam_object | |
author_GND | (DE-588)138757224 (DE-588)1056945060 |
building | Verbundindex |
bvnumber | BV042486788 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-38-EBR |
ctrlnum | (OCoLC)907794385 (DE-599)BVBBV042486788 |
dewey-full | 363.3250285/4678 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.3250285/4678 |
dewey-search | 363.3250285/4678 |
dewey-sort | 3363.3250285 44678 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03644nmm a2200601 c 4500</leader><controlfield tag="001">BV042486788</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180523 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150408s2015 xxk|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780415732888</subfield><subfield code="c">print</subfield><subfield code="9">978-0-415-73288-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781315848822</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-315-84882-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)907794385</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042486788</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.3250285/4678</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Terrorism online</subfield><subfield code="b">politics, law and technology</subfield><subfield code="c">edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Routledge studies in conflict, security and technology</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general"..</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Computer & Internet</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">POLITICAL SCIENCE / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">LAW / Computer & Internet</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jarvis, Lee</subfield><subfield code="d">1979-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)138757224</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Macdonald, Stuart</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Thomas M.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1056945060</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-38-EBR</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027921649</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV042486788 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:23:08Z |
institution | BVB |
isbn | 9780415732888 9781315848822 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027921649 |
oclc_num | 907794385 |
open_access_boolean | |
owner | DE-29 |
owner_facet | DE-29 |
physical | 1 Online-Ressource |
psigel | ZDB-38-EBR |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
record_format | marc |
series2 | Routledge studies in conflict, security and technology |
spelling | Terrorism online politics, law and technology edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen 2015 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Routledge studies in conflict, security and technology Includes bibliographical references and index "This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general".. POLITICAL SCIENCE / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh LAW / Computer & Internet bisacsh Politik Terrorismus Cyberterrorism Terrorism Computer crimes Political aspects POLITICAL SCIENCE / General POLITICAL SCIENCE / Political Freedom & Security / Terrorism LAW / Computer & Internet Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf 1\p (DE-588)1071861417 Konferenzschrift gnd-content Internetkriminalität (DE-588)7864395-8 s Terrorismus (DE-588)4059534-1 s 2\p DE-604 Jarvis, Lee 1979- Sonstige (DE-588)138757224 oth Macdonald, Stuart Sonstige oth Chen, Thomas M. Sonstige (DE-588)1056945060 oth 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Terrorism online politics, law and technology POLITICAL SCIENCE / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh LAW / Computer & Internet bisacsh Politik Terrorismus Cyberterrorism Terrorism Computer crimes Political aspects POLITICAL SCIENCE / General POLITICAL SCIENCE / Political Freedom & Security / Terrorism LAW / Computer & Internet Internetkriminalität (DE-588)7864395-8 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)7864395-8 (DE-588)4059534-1 (DE-588)1071861417 |
title | Terrorism online politics, law and technology |
title_auth | Terrorism online politics, law and technology |
title_exact_search | Terrorism online politics, law and technology |
title_full | Terrorism online politics, law and technology edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen |
title_fullStr | Terrorism online politics, law and technology edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen |
title_full_unstemmed | Terrorism online politics, law and technology edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen |
title_short | Terrorism online |
title_sort | terrorism online politics law and technology |
title_sub | politics, law and technology |
topic | POLITICAL SCIENCE / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh LAW / Computer & Internet bisacsh Politik Terrorismus Cyberterrorism Terrorism Computer crimes Political aspects POLITICAL SCIENCE / General POLITICAL SCIENCE / Political Freedom & Security / Terrorism LAW / Computer & Internet Internetkriminalität (DE-588)7864395-8 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | POLITICAL SCIENCE / General POLITICAL SCIENCE / Political Freedom & Security / Terrorism LAW / Computer & Internet Politik Terrorismus Cyberterrorism Terrorism Computer crimes Political aspects Internetkriminalität Konferenzschrift |
work_keys_str_mv | AT jarvislee terrorismonlinepoliticslawandtechnology AT macdonaldstuart terrorismonlinepoliticslawandtechnology AT chenthomasm terrorismonlinepoliticslawandtechnology |