Social networks as the new frontier of terrorism: #terror
"Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Routledge
2017
|
Schriftenreihe: | Routledge research in information technology and e-Commerce law
|
Schlagworte: | |
Online-Zugang: | kostenfrei |
Zusammenfassung: | "Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses. |
Beschreibung: | 1 Online-Ressource |
ISBN: | 1315668688 1317361857 9781315668680 9781317361855 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV048278758 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220610s2017 |||| o||u| ||||||eng d | ||
020 | |a 1315668688 |q (electronic bk.) |9 1315668688 | ||
020 | |a 1317361857 |q (electronic bk.) |9 1317361857 | ||
020 | |a 9781315668680 |q (electronic bk.) |9 9781315668680 | ||
020 | |a 9781317361855 |q (electronic bk.) |9 9781317361855 | ||
020 | |z 113895053X |9 113895053X | ||
020 | |z 9781138950535 |9 9781138950535 | ||
035 | |a (OCoLC)967982467 | ||
035 | |a (DE-599)BVBBV048278758 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
100 | 1 | |a Scaife, Laura |e Verfasser |4 aut | |
245 | 1 | 0 | |a Social networks as the new frontier of terrorism |b #terror |c Laura Scaife |
264 | 1 | |a London |b Routledge |c 2017 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Routledge research in information technology and e-Commerce law | |
505 | 8 | |a Man's terrorist is another man's facebook friend -- Terrorism's love affair with social media -- Freedom of the newsfeed -- The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- Let's start a war -- National security and the fourth estate in a brave new social media world | |
520 | 3 | |a "Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses. | |
650 | 7 | |a Cyberterrorism |2 Law and legislation | |
650 | 4 | |a Cyberterrorismus | |
650 | 4 | |a Internet and terrorism | |
650 | 7 | |a LAW |2 Administrative Law & Regulatory Practice | |
650 | 7 | |a National security |2 Law and legislation | |
650 | 7 | |a Online social networks |2 Law and legislation | |
650 | 4 | |a Online-Community | |
650 | 4 | |a Sicherheitspolitik | |
650 | 7 | |a Social media |2 Law and legislation | |
650 | 4 | |a Soziales Netzwerk | |
650 | 7 | |a Terrorism |2 Prevention | |
650 | 4 | |a Cyberterrorism |x Law and legislation | |
650 | 4 | |a Internet and terrorism | |
650 | 4 | |a National security |x Law and legislation | |
650 | 4 | |a Online social networks |x Law and legislation | |
650 | 4 | |a Social media |x Law and legislation | |
650 | 4 | |a Terrorism |x Prevention |x Law and legislation | |
650 | 4 | |a Terrorists |x Social networks | |
653 | 1 | |a Snowden, Edward J. / 1983- | |
653 | 1 | |a Snowden, Edward J. / 1983- | |
653 | 6 | |a Electronic books | |
653 | 6 | |a Electronic books | |
856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1449695 |x Verlag |z kostenfrei |3 Volltext |
912 | |a ZDB-4-EOAC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033658923 |
Datensatz im Suchindex
_version_ | 1804184102135398400 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Scaife, Laura |
author_facet | Scaife, Laura |
author_role | aut |
author_sort | Scaife, Laura |
author_variant | l s ls |
building | Verbundindex |
bvnumber | BV048278758 |
collection | ZDB-4-EOAC |
contents | Man's terrorist is another man's facebook friend -- Terrorism's love affair with social media -- Freedom of the newsfeed -- The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- Let's start a war -- National security and the fourth estate in a brave new social media world |
ctrlnum | (OCoLC)967982467 (DE-599)BVBBV048278758 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03941nmm a2200637 c 4500</leader><controlfield tag="001">BV048278758</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220610s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1315668688</subfield><subfield code="q">(electronic bk.)</subfield><subfield code="9">1315668688</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1317361857</subfield><subfield code="q">(electronic bk.)</subfield><subfield code="9">1317361857</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781315668680</subfield><subfield code="q">(electronic bk.)</subfield><subfield code="9">9781315668680</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781317361855</subfield><subfield code="q">(electronic bk.)</subfield><subfield code="9">9781317361855</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">113895053X</subfield><subfield code="9">113895053X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781138950535</subfield><subfield code="9">9781138950535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)967982467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048278758</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Scaife, Laura</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Social networks as the new frontier of terrorism</subfield><subfield code="b">#terror</subfield><subfield code="c">Laura Scaife</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Routledge</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Routledge research in information technology and e-Commerce law</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Man's terrorist is another man's facebook friend -- Terrorism's love affair with social media -- Freedom of the newsfeed -- The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- Let's start a war -- National security and the fourth estate in a brave new social media world</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet and terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="2">Administrative Law & Regulatory Practice</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Online social networks</subfield><subfield code="2">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online-Community</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sicherheitspolitik</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Social media</subfield><subfield code="2">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Soziales Netzwerk</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="2">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet and terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online social networks</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social media</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorists</subfield><subfield code="x">Social networks</subfield></datafield><datafield tag="653" ind1=" " ind2="1"><subfield code="a">Snowden, Edward J. / 1983-</subfield></datafield><datafield tag="653" ind1=" " ind2="1"><subfield code="a">Snowden, Edward J. / 1983-</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1449695</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EOAC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033658923</subfield></datafield></record></collection> |
id | DE-604.BV048278758 |
illustrated | Not Illustrated |
index_date | 2024-07-03T20:00:48Z |
indexdate | 2024-07-10T09:34:00Z |
institution | BVB |
isbn | 1315668688 1317361857 9781315668680 9781317361855 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033658923 |
oclc_num | 967982467 |
open_access_boolean | 1 |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-4-EOAC |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Routledge |
record_format | marc |
series2 | Routledge research in information technology and e-Commerce law |
spelling | Scaife, Laura Verfasser aut Social networks as the new frontier of terrorism #terror Laura Scaife London Routledge 2017 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Routledge research in information technology and e-Commerce law Man's terrorist is another man's facebook friend -- Terrorism's love affair with social media -- Freedom of the newsfeed -- The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- Let's start a war -- National security and the fourth estate in a brave new social media world "Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses. Cyberterrorism Law and legislation Cyberterrorismus Internet and terrorism LAW Administrative Law & Regulatory Practice National security Law and legislation Online social networks Law and legislation Online-Community Sicherheitspolitik Social media Law and legislation Soziales Netzwerk Terrorism Prevention Terrorism Prevention Law and legislation Terrorists Social networks Snowden, Edward J. / 1983- Electronic books https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1449695 Verlag kostenfrei Volltext |
spellingShingle | Scaife, Laura Social networks as the new frontier of terrorism #terror Man's terrorist is another man's facebook friend -- Terrorism's love affair with social media -- Freedom of the newsfeed -- The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- Let's start a war -- National security and the fourth estate in a brave new social media world Cyberterrorism Law and legislation Cyberterrorismus Internet and terrorism LAW Administrative Law & Regulatory Practice National security Law and legislation Online social networks Law and legislation Online-Community Sicherheitspolitik Social media Law and legislation Soziales Netzwerk Terrorism Prevention Terrorism Prevention Law and legislation Terrorists Social networks |
title | Social networks as the new frontier of terrorism #terror |
title_auth | Social networks as the new frontier of terrorism #terror |
title_exact_search | Social networks as the new frontier of terrorism #terror |
title_exact_search_txtP | Social networks as the new frontier of terrorism #terror |
title_full | Social networks as the new frontier of terrorism #terror Laura Scaife |
title_fullStr | Social networks as the new frontier of terrorism #terror Laura Scaife |
title_full_unstemmed | Social networks as the new frontier of terrorism #terror Laura Scaife |
title_short | Social networks as the new frontier of terrorism |
title_sort | social networks as the new frontier of terrorism terror |
title_sub | #terror |
topic | Cyberterrorism Law and legislation Cyberterrorismus Internet and terrorism LAW Administrative Law & Regulatory Practice National security Law and legislation Online social networks Law and legislation Online-Community Sicherheitspolitik Social media Law and legislation Soziales Netzwerk Terrorism Prevention Terrorism Prevention Law and legislation Terrorists Social networks |
topic_facet | Cyberterrorism Cyberterrorismus Internet and terrorism LAW National security Online social networks Online-Community Sicherheitspolitik Social media Soziales Netzwerk Terrorism Cyberterrorism Law and legislation National security Law and legislation Online social networks Law and legislation Social media Law and legislation Terrorism Prevention Law and legislation Terrorists Social networks |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1449695 |
work_keys_str_mv | AT scaifelaura socialnetworksasthenewfrontierofterrorismterror |