Terrorism online: politics, law and technology
"This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disc...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London ; New York
Routledge
2015
|
Ausgabe: | First published |
Schriftenreihe: | Routledge studies in conflict, security and technology
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general".. |
Beschreibung: | Literaturangaben. - Hier auch später erschienene, unveränderte Nachdrucke. - This edited collection emerged during the course of the "Multidisciplinary Conference in Cyberterrorism", that took place in Birmingham, UK, in April 2013 |
Beschreibung: | xi, 198 Seiten |
ISBN: | 9780415732888 9781138221864 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042488188 | ||
003 | DE-604 | ||
005 | 20170224 | ||
007 | t | ||
008 | 150408s2015 xxk |||| 10||| eng d | ||
010 | |a 014034280 | ||
020 | |a 9780415732888 |c hbk. |9 978-0-415-73288-8 | ||
020 | |a 9781138221864 |c pbk |9 978-1-138-22186-4 | ||
035 | |a (OCoLC)910620343 | ||
035 | |a (DE-599)BVBBV042488188 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-12 |a DE-473 |a DE-739 | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 363.3250285/4678 |2 23 | |
084 | |a MD 8920 |0 (DE-625)122569: |2 rvk | ||
245 | 1 | 0 | |a Terrorism online |b politics, law and technology |c edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen |
250 | |a First published | ||
264 | 1 | |a London ; New York |b Routledge |c 2015 | |
300 | |a xi, 198 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Routledge studies in conflict, security and technology | |
500 | |a Literaturangaben. - Hier auch später erschienene, unveränderte Nachdrucke. - This edited collection emerged during the course of the "Multidisciplinary Conference in Cyberterrorism", that took place in Birmingham, UK, in April 2013 | ||
520 | |a "This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general".. | ||
650 | 7 | |a POLITICAL SCIENCE / General |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a LAW / Computer & Internet |2 bisacsh | |
650 | 4 | |a Politik | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Terrorism | |
650 | 4 | |a Computer crimes |x Political aspects | |
650 | 4 | |a POLITICAL SCIENCE / General | |
650 | 4 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism | |
650 | 4 | |a LAW / Computer & Internet | |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
655 | 7 | |a Aufsatzsammlung |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 2 | |a Aufsatzsammlung |A f |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Jarvis, Lee |d 1979- |0 (DE-588)138757224 |4 edt | |
700 | 1 | |a Macdonald, Stuart |4 edt | |
700 | 1 | |a Chen, Thomas M. |0 (DE-588)1056945060 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, Ebook |z 978-1-315-84882-2 |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027923023&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027923023 |
Datensatz im Suchindex
_version_ | 1804153222035668992 |
---|---|
adam_text | Contents
List of illustrations vii
Notes on contributors viii
Acknowledgements xii
Introduction: Terrorism online - law, politics, technology 1
LEE JARVIS, STUART MACDONALD AND THOMAS M. CHEN
1 Terrorism online: a new strategic environment 10
STUART MACDONALD AND DAVID MAIR
2 Lone actor terrorist use of the Internet and behavioural
correlates 35
PAUL GILL AND EMILY CORNER
3 Hacktivism as an emerging cyberthreat: case study of a
Turkish hacktivist group 54
UNAL TATAR AND M. MI N H AC £ EL I K
4 An updated cost-benefit view of cyberterrorism 72
TURKI AL-GARNI AND THOMAS M. CHEN
5 Cyberterrorism and Moral Panics: a reflection on the
discourse of cyberterrorism 86
LORRAINE BOWMAN-GRIEVE
6 Cyberterrorism, criminal law and punishment-based
deterrence 107
PATRICK BISHOP
vi Contents
7 State surveillance in cyberspace: a new perspective on
digital data practices by intelligence and security services 125
SERGEI BOHKH AND QUIRINE EIJKMAN
8 Transatlantic collaboration in countering cyberterrorism 144
EVA NAGYFEJEO
9 The use of force as a response to cyberterrorism 173
IRENE COUZIGOU
Index 190
|
any_adam_object | 1 |
author2 | Jarvis, Lee 1979- Macdonald, Stuart Chen, Thomas M. |
author2_role | edt edt edt |
author2_variant | l j lj s m sm t m c tm tmc |
author_GND | (DE-588)138757224 (DE-588)1056945060 |
author_facet | Jarvis, Lee 1979- Macdonald, Stuart Chen, Thomas M. |
building | Verbundindex |
bvnumber | BV042488188 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | MD 8920 |
ctrlnum | (OCoLC)910620343 (DE-599)BVBBV042488188 |
dewey-full | 363.3250285/4678 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.3250285/4678 |
dewey-search | 363.3250285/4678 |
dewey-sort | 3363.3250285 44678 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie Politologie |
edition | First published |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04161nam a2200649 c 4500</leader><controlfield tag="001">BV042488188</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170224 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150408s2015 xxk |||| 10||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">014034280</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780415732888</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-0-415-73288-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138221864</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-138-22186-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)910620343</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042488188</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.3250285/4678</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MD 8920</subfield><subfield code="0">(DE-625)122569:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Terrorism online</subfield><subfield code="b">politics, law and technology</subfield><subfield code="c">edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First published</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ; New York</subfield><subfield code="b">Routledge</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xi, 198 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Routledge studies in conflict, security and technology</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben. - Hier auch später erschienene, unveränderte Nachdrucke. - This edited collection emerged during the course of the "Multidisciplinary Conference in Cyberterrorism", that took place in Birmingham, UK, in April 2013</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general"..</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Computer & Internet</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">POLITICAL SCIENCE / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">LAW / Computer & Internet</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Aufsatzsammlung</subfield><subfield code="A">f</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jarvis, Lee</subfield><subfield code="d">1979-</subfield><subfield code="0">(DE-588)138757224</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Macdonald, Stuart</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Thomas M.</subfield><subfield code="0">(DE-588)1056945060</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, Ebook</subfield><subfield code="z">978-1-315-84882-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027923023&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027923023</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content Aufsatzsammlung gnd |
genre_facet | Konferenzschrift Aufsatzsammlung |
id | DE-604.BV042488188 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:23:10Z |
institution | BVB |
isbn | 9780415732888 9781138221864 |
language | English |
lccn | 014034280 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027923023 |
oclc_num | 910620343 |
open_access_boolean | |
owner | DE-12 DE-473 DE-BY-UBG DE-739 |
owner_facet | DE-12 DE-473 DE-BY-UBG DE-739 |
physical | xi, 198 Seiten |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Routledge |
record_format | marc |
series2 | Routledge studies in conflict, security and technology |
spelling | Terrorism online politics, law and technology edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen First published London ; New York Routledge 2015 xi, 198 Seiten txt rdacontent n rdamedia nc rdacarrier Routledge studies in conflict, security and technology Literaturangaben. - Hier auch später erschienene, unveränderte Nachdrucke. - This edited collection emerged during the course of the "Multidisciplinary Conference in Cyberterrorism", that took place in Birmingham, UK, in April 2013 "This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general".. POLITICAL SCIENCE / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh LAW / Computer & Internet bisacsh Politik Terrorismus Cyberterrorism Terrorism Computer crimes Political aspects POLITICAL SCIENCE / General POLITICAL SCIENCE / Political Freedom & Security / Terrorism LAW / Computer & Internet Terrorismus (DE-588)4059534-1 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Aufsatzsammlung gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s Terrorismus (DE-588)4059534-1 s Aufsatzsammlung f DE-604 Jarvis, Lee 1979- (DE-588)138757224 edt Macdonald, Stuart edt Chen, Thomas M. (DE-588)1056945060 edt Erscheint auch als Online-Ausgabe, Ebook 978-1-315-84882-2 Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027923023&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Terrorism online politics, law and technology POLITICAL SCIENCE / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh LAW / Computer & Internet bisacsh Politik Terrorismus Cyberterrorism Terrorism Computer crimes Political aspects POLITICAL SCIENCE / General POLITICAL SCIENCE / Political Freedom & Security / Terrorism LAW / Computer & Internet Terrorismus (DE-588)4059534-1 gnd Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)4059534-1 (DE-588)7864395-8 (DE-588)1071861417 |
title | Terrorism online politics, law and technology |
title_auth | Terrorism online politics, law and technology |
title_exact_search | Terrorism online politics, law and technology |
title_full | Terrorism online politics, law and technology edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen |
title_fullStr | Terrorism online politics, law and technology edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen |
title_full_unstemmed | Terrorism online politics, law and technology edited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen |
title_short | Terrorism online |
title_sort | terrorism online politics law and technology |
title_sub | politics, law and technology |
topic | POLITICAL SCIENCE / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh LAW / Computer & Internet bisacsh Politik Terrorismus Cyberterrorism Terrorism Computer crimes Political aspects POLITICAL SCIENCE / General POLITICAL SCIENCE / Political Freedom & Security / Terrorism LAW / Computer & Internet Terrorismus (DE-588)4059534-1 gnd Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | POLITICAL SCIENCE / General POLITICAL SCIENCE / Political Freedom & Security / Terrorism LAW / Computer & Internet Politik Terrorismus Cyberterrorism Terrorism Computer crimes Political aspects Internetkriminalität Konferenzschrift Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027923023&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT jarvislee terrorismonlinepoliticslawandtechnology AT macdonaldstuart terrorismonlinepoliticslawandtechnology AT chenthomasm terrorismonlinepoliticslawandtechnology |