Combating internet-enabled terrorism: emerging research and opportunities
"This book explores the opportunities afford to internet-enabled terrorism via digital technologies and their evolution, the role of non-State actors such as Anonymous in the fight to stop the influx of extremist rhetoric into mainstream digital culture. The goal is more effective identificatio...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
Information Science Reference
[2017]
|
Schriftenreihe: | Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series
Research insights |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-573 DE-898 DE-1049 DE-91 DE-473 DE-20 DE-706 DE-83 Volltext |
Zusammenfassung: | "This book explores the opportunities afford to internet-enabled terrorism via digital technologies and their evolution, the role of non-State actors such as Anonymous in the fight to stop the influx of extremist rhetoric into mainstream digital culture. The goal is more effective identification and containment of jihadist dialogue in online spaces"... |
Beschreibung: | 1 Online-Ressource (133 Seiten) |
ISBN: | 9781522521914 |
DOI: | 10.4018/978-1-5225-2190-7 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044338928 | ||
003 | DE-604 | ||
005 | 20211103 | ||
007 | cr|uuu---uuuuu | ||
008 | 170606s2017 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781522521914 |c Online |9 978-1-5225-2191-4 | ||
024 | 7 | |a 10.4018/978-1-5225-2190-7 |2 doi | |
035 | |a (ZDB-98-IGB)978-1-5225-2191-4 | ||
035 | |a (OCoLC)986505168 | ||
035 | |a (DE-599)BVBBV044338928 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-473 |a DE-91 |a DE-573 |a DE-1050 |a DE-20 |a DE-1049 |a DE-898 |a DE-706 |a DE-83 | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 363.325/16 |2 23 | |
084 | |a MD 8920 |0 (DE-625)122569: |2 rvk | ||
100 | 1 | |a Stacey, Emily |d 1984- |e Verfasser |0 (DE-588)1135681260 |4 aut | |
245 | 1 | 0 | |a Combating internet-enabled terrorism |b emerging research and opportunities |c Emily Stacey |
264 | 1 | |a Hershey, PA |b Information Science Reference |c [2017] | |
300 | |a 1 Online-Ressource (133 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series | |
490 | 0 | |a Research insights | |
520 | |a "This book explores the opportunities afford to internet-enabled terrorism via digital technologies and their evolution, the role of non-State actors such as Anonymous in the fight to stop the influx of extremist rhetoric into mainstream digital culture. The goal is more effective identification and containment of jihadist dialogue in online spaces"... | ||
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 0 | 7 | |a Prävention |0 (DE-588)4076308-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberterrorismus |0 (DE-588)1118882725 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyberterrorismus |0 (DE-588)1118882725 |D s |
689 | 0 | 1 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-5225-2190-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-5225-2190-9 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-2190-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://www.igi-global.com/gateway/book/172444?ct=-8587048562624364318 |l DE-473 |p ZDB-98-IGB |q UBG_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-2190-7 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805078996203864064 |
---|---|
adam_text | |
any_adam_object | |
author | Stacey, Emily 1984- |
author_GND | (DE-588)1135681260 |
author_facet | Stacey, Emily 1984- |
author_role | aut |
author_sort | Stacey, Emily 1984- |
author_variant | e s es |
building | Verbundindex |
bvnumber | BV044338928 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | MD 8920 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (ZDB-98-IGB)978-1-5225-2191-4 (OCoLC)986505168 (DE-599)BVBBV044338928 |
dewey-full | 363.325/16 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325/16 |
dewey-search | 363.325/16 |
dewey-sort | 3363.325 216 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie Politologie |
doi_str_mv | 10.4018/978-1-5225-2190-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044338928</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211103</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170606s2017 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522521914</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-5225-2191-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-2190-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)978-1-5225-2191-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)986505168</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044338928</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325/16</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MD 8920</subfield><subfield code="0">(DE-625)122569:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stacey, Emily</subfield><subfield code="d">1984-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1135681260</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Combating internet-enabled terrorism</subfield><subfield code="b">emerging research and opportunities</subfield><subfield code="c">Emily Stacey</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (133 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Research insights</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores the opportunities afford to internet-enabled terrorism via digital technologies and their evolution, the role of non-State actors such as Anonymous in the fight to stop the influx of extremist rhetoric into mainstream digital culture. The goal is more effective identification and containment of jihadist dialogue in online spaces"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-5225-2190-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-2190-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-2190-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.igi-global.com/gateway/book/172444?ct=-8587048562624364318</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">UBG_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-2190-7</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2190-7</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044338928 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:37:57Z |
institution | BVB |
isbn | 9781522521914 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029742020 |
oclc_num | 986505168 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-91 DE-BY-TUM DE-573 DE-1050 DE-20 DE-1049 DE-898 DE-BY-UBR DE-706 DE-83 |
owner_facet | DE-473 DE-BY-UBG DE-91 DE-BY-TUM DE-573 DE-1050 DE-20 DE-1049 DE-898 DE-BY-UBR DE-706 DE-83 |
physical | 1 Online-Ressource (133 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB UBG_Einzelkauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Information Science Reference |
record_format | marc |
series2 | Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series Research insights |
spelling | Stacey, Emily 1984- Verfasser (DE-588)1135681260 aut Combating internet-enabled terrorism emerging research and opportunities Emily Stacey Hershey, PA Information Science Reference [2017] 1 Online-Ressource (133 Seiten) txt rdacontent c rdamedia cr rdacarrier Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series Research insights "This book explores the opportunities afford to internet-enabled terrorism via digital technologies and their evolution, the role of non-State actors such as Anonymous in the fight to stop the influx of extremist rhetoric into mainstream digital culture. The goal is more effective identification and containment of jihadist dialogue in online spaces"... Cyberterrorism Prevention Computer crimes Prevention Prävention (DE-588)4076308-0 gnd rswk-swf Cyberterrorismus (DE-588)1118882725 gnd rswk-swf Cyberterrorismus (DE-588)1118882725 s Prävention (DE-588)4076308-0 s 1\p DE-604 Erscheint auch als Druck-Ausgabe 978-1-5225-2190-7 Erscheint auch als Druck-Ausgabe 1-5225-2190-9 https://doi.org/10.4018/978-1-5225-2190-7 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Stacey, Emily 1984- Combating internet-enabled terrorism emerging research and opportunities Cyberterrorism Prevention Computer crimes Prevention Prävention (DE-588)4076308-0 gnd Cyberterrorismus (DE-588)1118882725 gnd |
subject_GND | (DE-588)4076308-0 (DE-588)1118882725 |
title | Combating internet-enabled terrorism emerging research and opportunities |
title_auth | Combating internet-enabled terrorism emerging research and opportunities |
title_exact_search | Combating internet-enabled terrorism emerging research and opportunities |
title_full | Combating internet-enabled terrorism emerging research and opportunities Emily Stacey |
title_fullStr | Combating internet-enabled terrorism emerging research and opportunities Emily Stacey |
title_full_unstemmed | Combating internet-enabled terrorism emerging research and opportunities Emily Stacey |
title_short | Combating internet-enabled terrorism |
title_sort | combating internet enabled terrorism emerging research and opportunities |
title_sub | emerging research and opportunities |
topic | Cyberterrorism Prevention Computer crimes Prevention Prävention (DE-588)4076308-0 gnd Cyberterrorismus (DE-588)1118882725 gnd |
topic_facet | Cyberterrorism Prevention Computer crimes Prevention Prävention Cyberterrorismus |
url | https://doi.org/10.4018/978-1-5225-2190-7 |
work_keys_str_mv | AT staceyemily combatinginternetenabledterrorismemergingresearchandopportunities |