Terrorists' use of the internet :: assessment and response /
"Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack....
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam, Netherlands :
IOS Press,
2017.
|
Schriftenreihe: | NATO science for peace and security series. Human and societal dynamics ;
vol. 136. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a selection of papers delivered at the NATO Advanced Research Workshop (ARW) on "Terrorists' Use of the Internet" held in Dublin, Ireland in June 2016. One aim of the workshop was to nurture dialogue between members of the academic, policy and practitioner communities, so the 60 delegates from 13 countries who attended the workshop included representatives from each of these. The participants encompassed a wide range of expertise (including engineering, computer science, law, criminology, political science, international relations, history, and linguistics) and the chapters contained herein reflect these diverse professional and disciplinary backgrounds. The workshop also aimed to address the convergence of threats. Following an introduction which provides an overview of the various ways in which terrorists use the Internet, the book's remaining 25 chapters are grouped into 5 sections on cyber terrorism and critical infrastructure protection; cyber-enabled terrorist financing; jihadi online propaganda; online counterterrorism; and innovative approaches and responses."-- |
Beschreibung: | "Proceedings of the NATO Advanced Research Workshop on Terrorists' Use of the Internet, Dublin, Ireland, 27-29 June 2016." International conference proceedings. |
Beschreibung: | 1 online resource (393 pages) |
Bibliographie: | Includes bibliographical references and indexes. |
ISBN: | 9781614997658 1614997659 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn993432990 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 170711s2017 ne ob 101 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d IOSPR |d IDEBK |d EBLCP |d BTCTA |d OCLCF |d OCLCQ |d MERUC |d N$T |d YDX |d UAB |d OCLCQ |d AGLDB |d IGB |d INT |d AUW |d BTN |d MHW |d INTCL |d SNK |d OTZ |d OCLCQ |d G3B |d S8I |d S8J |d OCLCQ |d S9I |d STF |d D6H |d M8D |d OCLCQ |d UKAHL |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCL |d OCLCQ |d DXU |d OCLCO | ||
019 | |a 993687651 | ||
020 | |a 9781614997658 |q (electronic bk.) | ||
020 | |a 1614997659 |q (electronic bk.) | ||
020 | |z 9781614997641 |q (print) | ||
035 | |a (OCoLC)993432990 |z (OCoLC)993687651 | ||
050 | 4 | |a HV6431 | |
072 | 7 | |a BUS |x 032000 |2 bisacsh | |
072 | 7 | |a SOC |x 000000 |2 bisacsh | |
082 | 7 | |a 363.325 |2 23 | |
049 | |a MAIN | ||
111 | 2 | |a NATO Advanced Research Workshop on Terrorists' Use of the Internet |d (2016 : |c Dublin, Ireland) |0 http://id.loc.gov/authorities/names/no2018051521 | |
245 | 1 | 0 | |a Terrorists' use of the internet : |b assessment and response / |c edited by Maura Conway, Lee Jarvis, Orla Lehane, Stuart Macdonald and Lella Nouri. |
264 | 1 | |a Amsterdam, Netherlands : |b IOS Press, |c 2017. | |
300 | |a 1 online resource (393 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a NATO science for peace and security series, E, Human and societal dynamics ; |v vol. 136 | |
500 | |a "Proceedings of the NATO Advanced Research Workshop on Terrorists' Use of the Internet, Dublin, Ireland, 27-29 June 2016." | ||
500 | |a International conference proceedings. | ||
504 | |a Includes bibliographical references and indexes. | ||
588 | 0 | |a Online resource; title from PDF title page (IOS Press, viewed July 11, 2017). | |
505 | 0 | |a Title Page; Preface; The Cyberterrorism Project; Contents; Terrorist Use of the Internet and Cyberspace: Issues and Responses; Cyberterrorism and Critical Infrastructure Protection; Cyberterrorism: A Challenge for External and Internal Security; Preliminary Analysis of Cyberterrorism Threats to Internet of Things (IoT) Applications; Critical Infrastructure Cyber-Security Risk Management; The Terrorist -- Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists; Cyber-Enabled Terrorist Financing; Online Terrorist Financing. | |
505 | 8 | |a Cybercrime-Funded Terrorism and the Threats Posed by Future Technologies: Appealing Economics and TargetsJihadi Online Propaganda: Purposes and Effects; Between the Arab Revolutions and the Islamic State's Caliphate: al-Qaeda Leaders' Online Propaganda 2012-2014; Radicalisers as Regulators: An Examination of Dabiq Magazine; The Role of Discourse Analysis in Terrorism Studies: Comparing Inspire and Dabiq; Learning from ISIS's Virtual Propaganda War for Western Muslims: A Comparison of Inspire and Dabiq; Online Jihadi Instructional Content: The Role of Magazines; Online Counterterrorism. | |
505 | 8 | |a Public Actors, Private Actors, and Cooperative ApproachesHard and Soft Power Approaches to Countering Online Extremism; Anglosphere Approaches to Counter-Terrorism in Cyberspace; Prosecuting Terrorist Activity in Canada; An Efficient Response to ISIS in Cyberspace: Public-Private Partnership; Prevention, Anti-Radicalisation and the Role of Social Media: A View from Germany; Online CVE Strategies; Counter-Terrorism Strategic Communications: Back to the Future -- Lessons from Past and Present; Interrupting Engagement with Online Extremist Content: Utilising ""Noisy"" Foreign Fighters. | |
505 | 8 | |a Interpreting Public Reactions to Terrorist Events Using Open Source Network AnalysisSurveillance; Reframing 'Mass Surveillance'; Beyond Big Data: Surveillance, Metadata and Technology-Enabled Intelligence Opportunities in Counter-Terrorism; National Security, Terrorism and the Legality of Secret Surveillance: The Case of France; Innovative Approaches/Responses; Internet Forensics as a Tool for Responding to Cyber-Fronts; (En)gendering Cyberterrorism in the UK News Media: A Discursive Analysis; Predicting the Emergence of Self-Radicalisation Through Social Media: A Complex Systems Approach. | |
520 | |a "Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a selection of papers delivered at the NATO Advanced Research Workshop (ARW) on "Terrorists' Use of the Internet" held in Dublin, Ireland in June 2016. One aim of the workshop was to nurture dialogue between members of the academic, policy and practitioner communities, so the 60 delegates from 13 countries who attended the workshop included representatives from each of these. The participants encompassed a wide range of expertise (including engineering, computer science, law, criminology, political science, international relations, history, and linguistics) and the chapters contained herein reflect these diverse professional and disciplinary backgrounds. The workshop also aimed to address the convergence of threats. Following an introduction which provides an overview of the various ways in which terrorists use the Internet, the book's remaining 25 chapters are grouped into 5 sections on cyber terrorism and critical infrastructure protection; cyber-enabled terrorist financing; jihadi online propaganda; online counterterrorism; and innovative approaches and responses."-- |c Back cover. | ||
650 | 0 | |a Internet and terrorism |v Congresses. | |
650 | 0 | |a Terrorism |x Prevention |v Congresses. | |
650 | 6 | |a Internet et terrorisme |v Congrès. | |
650 | 6 | |a Terrorisme |x Prévention |v Congrès. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Infrastructure. |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE |x General. |2 bisacsh | |
650 | 7 | |a Internet and terrorism |2 fast | |
650 | 7 | |a Terrorism |x Prevention |2 fast | |
655 | 7 | |a proceedings (reports) |2 aat | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
655 | 7 | |a Conference papers and proceedings. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026068 | |
655 | 7 | |a Actes de congrès. |2 rvmgf | |
700 | 1 | |a Conway, Maura, |e editor. | |
700 | 1 | |a Jarvis, Lee, |d 1979- |e editor. |1 https://id.oclc.org/worldcat/entity/E39PBJptWrPJWCPpwBRdtp7T73 |0 http://id.loc.gov/authorities/names/n2009020470 | |
700 | 1 | |a Lehane, Orla, |e editor. | |
700 | 1 | |a Macdonald, Stuart, |e editor. | |
700 | 1 | |a Nouri, Lella, |e editor. | |
758 | |i has work: |a Terrorists' use of the internet (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGHmppKyrjmXmKrBGXBpT3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
830 | 0 | |a NATO science for peace and security series. |n E, |p Human and societal dynamics ; |v vol. 136. |0 http://id.loc.gov/authorities/names/no2007135253 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1549272 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH37537326 | ||
938 | |a Baker and Taylor |b BTCP |n BK0021159547 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL4908228 | ||
938 | |a EBSCOhost |b EBSC |n 1549272 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis38464106 | ||
938 | |a YBP Library Services |b YANK |n 14681535 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn993432990 |
---|---|
_version_ | 1816882394552074240 |
adam_text | |
any_adam_object | |
author2 | Conway, Maura Jarvis, Lee, 1979- Lehane, Orla Macdonald, Stuart Nouri, Lella |
author2_role | edt edt edt edt edt |
author2_variant | m c mc l j lj o l ol s m sm l n ln |
author_GND | http://id.loc.gov/authorities/names/n2009020470 |
author_corporate | NATO Advanced Research Workshop on Terrorists' Use of the Internet Dublin, Ireland |
author_corporate_role | |
author_facet | Conway, Maura Jarvis, Lee, 1979- Lehane, Orla Macdonald, Stuart Nouri, Lella NATO Advanced Research Workshop on Terrorists' Use of the Internet Dublin, Ireland |
author_sort | NATO Advanced Research Workshop on Terrorists' Use of the Internet Dublin, Ireland |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6431 |
callnumber-raw | HV6431 |
callnumber-search | HV6431 |
callnumber-sort | HV 46431 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Title Page; Preface; The Cyberterrorism Project; Contents; Terrorist Use of the Internet and Cyberspace: Issues and Responses; Cyberterrorism and Critical Infrastructure Protection; Cyberterrorism: A Challenge for External and Internal Security; Preliminary Analysis of Cyberterrorism Threats to Internet of Things (IoT) Applications; Critical Infrastructure Cyber-Security Risk Management; The Terrorist -- Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists; Cyber-Enabled Terrorist Financing; Online Terrorist Financing. Cybercrime-Funded Terrorism and the Threats Posed by Future Technologies: Appealing Economics and TargetsJihadi Online Propaganda: Purposes and Effects; Between the Arab Revolutions and the Islamic State's Caliphate: al-Qaeda Leaders' Online Propaganda 2012-2014; Radicalisers as Regulators: An Examination of Dabiq Magazine; The Role of Discourse Analysis in Terrorism Studies: Comparing Inspire and Dabiq; Learning from ISIS's Virtual Propaganda War for Western Muslims: A Comparison of Inspire and Dabiq; Online Jihadi Instructional Content: The Role of Magazines; Online Counterterrorism. Public Actors, Private Actors, and Cooperative ApproachesHard and Soft Power Approaches to Countering Online Extremism; Anglosphere Approaches to Counter-Terrorism in Cyberspace; Prosecuting Terrorist Activity in Canada; An Efficient Response to ISIS in Cyberspace: Public-Private Partnership; Prevention, Anti-Radicalisation and the Role of Social Media: A View from Germany; Online CVE Strategies; Counter-Terrorism Strategic Communications: Back to the Future -- Lessons from Past and Present; Interrupting Engagement with Online Extremist Content: Utilising ""Noisy"" Foreign Fighters. Interpreting Public Reactions to Terrorist Events Using Open Source Network AnalysisSurveillance; Reframing 'Mass Surveillance'; Beyond Big Data: Surveillance, Metadata and Technology-Enabled Intelligence Opportunities in Counter-Terrorism; National Security, Terrorism and the Legality of Secret Surveillance: The Case of France; Innovative Approaches/Responses; Internet Forensics as a Tool for Responding to Cyber-Fronts; (En)gendering Cyberterrorism in the UK News Media: A Discursive Analysis; Predicting the Emergence of Self-Radicalisation Through Social Media: A Complex Systems Approach. |
ctrlnum | (OCoLC)993432990 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07502cam a2200757 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn993432990</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">170711s2017 ne ob 101 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">IOSPR</subfield><subfield code="d">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">BTCTA</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">N$T</subfield><subfield code="d">YDX</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">IGB</subfield><subfield code="d">INT</subfield><subfield code="d">AUW</subfield><subfield code="d">BTN</subfield><subfield code="d">MHW</subfield><subfield code="d">INTCL</subfield><subfield code="d">SNK</subfield><subfield code="d">OTZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">G3B</subfield><subfield code="d">S8I</subfield><subfield code="d">S8J</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">S9I</subfield><subfield code="d">STF</subfield><subfield code="d">D6H</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DXU</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">993687651</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614997658</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614997659</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781614997641</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)993432990</subfield><subfield code="z">(OCoLC)993687651</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6431</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">NATO Advanced Research Workshop on Terrorists' Use of the Internet</subfield><subfield code="d">(2016 :</subfield><subfield code="c">Dublin, Ireland)</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2018051521</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Terrorists' use of the internet :</subfield><subfield code="b">assessment and response /</subfield><subfield code="c">edited by Maura Conway, Lee Jarvis, Orla Lehane, Stuart Macdonald and Lella Nouri.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam, Netherlands :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (393 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO science for peace and security series, E, Human and societal dynamics ;</subfield><subfield code="v">vol. 136</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Research Workshop on Terrorists' Use of the Internet, Dublin, Ireland, 27-29 June 2016."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">International conference proceedings.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and indexes.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (IOS Press, viewed July 11, 2017).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Title Page; Preface; The Cyberterrorism Project; Contents; Terrorist Use of the Internet and Cyberspace: Issues and Responses; Cyberterrorism and Critical Infrastructure Protection; Cyberterrorism: A Challenge for External and Internal Security; Preliminary Analysis of Cyberterrorism Threats to Internet of Things (IoT) Applications; Critical Infrastructure Cyber-Security Risk Management; The Terrorist -- Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists; Cyber-Enabled Terrorist Financing; Online Terrorist Financing.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cybercrime-Funded Terrorism and the Threats Posed by Future Technologies: Appealing Economics and TargetsJihadi Online Propaganda: Purposes and Effects; Between the Arab Revolutions and the Islamic State's Caliphate: al-Qaeda Leaders' Online Propaganda 2012-2014; Radicalisers as Regulators: An Examination of Dabiq Magazine; The Role of Discourse Analysis in Terrorism Studies: Comparing Inspire and Dabiq; Learning from ISIS's Virtual Propaganda War for Western Muslims: A Comparison of Inspire and Dabiq; Online Jihadi Instructional Content: The Role of Magazines; Online Counterterrorism.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Public Actors, Private Actors, and Cooperative ApproachesHard and Soft Power Approaches to Countering Online Extremism; Anglosphere Approaches to Counter-Terrorism in Cyberspace; Prosecuting Terrorist Activity in Canada; An Efficient Response to ISIS in Cyberspace: Public-Private Partnership; Prevention, Anti-Radicalisation and the Role of Social Media: A View from Germany; Online CVE Strategies; Counter-Terrorism Strategic Communications: Back to the Future -- Lessons from Past and Present; Interrupting Engagement with Online Extremist Content: Utilising ""Noisy"" Foreign Fighters.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Interpreting Public Reactions to Terrorist Events Using Open Source Network AnalysisSurveillance; Reframing 'Mass Surveillance'; Beyond Big Data: Surveillance, Metadata and Technology-Enabled Intelligence Opportunities in Counter-Terrorism; National Security, Terrorism and the Legality of Secret Surveillance: The Case of France; Innovative Approaches/Responses; Internet Forensics as a Tool for Responding to Cyber-Fronts; (En)gendering Cyberterrorism in the UK News Media: A Discursive Analysis; Predicting the Emergence of Self-Radicalisation Through Social Media: A Complex Systems Approach.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a selection of papers delivered at the NATO Advanced Research Workshop (ARW) on "Terrorists' Use of the Internet" held in Dublin, Ireland in June 2016. One aim of the workshop was to nurture dialogue between members of the academic, policy and practitioner communities, so the 60 delegates from 13 countries who attended the workshop included representatives from each of these. The participants encompassed a wide range of expertise (including engineering, computer science, law, criminology, political science, international relations, history, and linguistics) and the chapters contained herein reflect these diverse professional and disciplinary backgrounds. The workshop also aimed to address the convergence of threats. Following an introduction which provides an overview of the various ways in which terrorists use the Internet, the book's remaining 25 chapters are grouped into 5 sections on cyber terrorism and critical infrastructure protection; cyber-enabled terrorist financing; jihadi online propaganda; online counterterrorism; and innovative approaches and responses."--</subfield><subfield code="c">Back cover.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet and terrorism</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet et terrorisme</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terrorisme</subfield><subfield code="x">Prévention</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Infrastructure.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet and terrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">proceedings (reports)</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026068</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Actes de congrès.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Conway, Maura,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jarvis, Lee,</subfield><subfield code="d">1979-</subfield><subfield code="e">editor.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJptWrPJWCPpwBRdtp7T73</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2009020470</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lehane, Orla,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Macdonald, Stuart,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nouri, Lella,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Terrorists' use of the internet (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGHmppKyrjmXmKrBGXBpT3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO science for peace and security series.</subfield><subfield code="n">E,</subfield><subfield code="p">Human and societal dynamics ;</subfield><subfield code="v">vol. 136.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007135253</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1549272</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37537326</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker and Taylor</subfield><subfield code="b">BTCP</subfield><subfield code="n">BK0021159547</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4908228</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1549272</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis38464106</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">14681535</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | proceedings (reports) aat Conference papers and proceedings fast Conference papers and proceedings. lcgft http://id.loc.gov/authorities/genreForms/gf2014026068 Actes de congrès. rvmgf |
genre_facet | proceedings (reports) Conference papers and proceedings Conference papers and proceedings. Actes de congrès. |
id | ZDB-4-EBA-ocn993432990 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:27:55Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no2018051521 |
isbn | 9781614997658 1614997659 |
language | English |
oclc_num | 993432990 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (393 pages) |
psigel | ZDB-4-EBA |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IOS Press, |
record_format | marc |
series | NATO science for peace and security series. Human and societal dynamics ; |
series2 | NATO science for peace and security series, E, Human and societal dynamics ; |
spelling | NATO Advanced Research Workshop on Terrorists' Use of the Internet (2016 : Dublin, Ireland) http://id.loc.gov/authorities/names/no2018051521 Terrorists' use of the internet : assessment and response / edited by Maura Conway, Lee Jarvis, Orla Lehane, Stuart Macdonald and Lella Nouri. Amsterdam, Netherlands : IOS Press, 2017. 1 online resource (393 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier NATO science for peace and security series, E, Human and societal dynamics ; vol. 136 "Proceedings of the NATO Advanced Research Workshop on Terrorists' Use of the Internet, Dublin, Ireland, 27-29 June 2016." International conference proceedings. Includes bibliographical references and indexes. Online resource; title from PDF title page (IOS Press, viewed July 11, 2017). Title Page; Preface; The Cyberterrorism Project; Contents; Terrorist Use of the Internet and Cyberspace: Issues and Responses; Cyberterrorism and Critical Infrastructure Protection; Cyberterrorism: A Challenge for External and Internal Security; Preliminary Analysis of Cyberterrorism Threats to Internet of Things (IoT) Applications; Critical Infrastructure Cyber-Security Risk Management; The Terrorist -- Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists; Cyber-Enabled Terrorist Financing; Online Terrorist Financing. Cybercrime-Funded Terrorism and the Threats Posed by Future Technologies: Appealing Economics and TargetsJihadi Online Propaganda: Purposes and Effects; Between the Arab Revolutions and the Islamic State's Caliphate: al-Qaeda Leaders' Online Propaganda 2012-2014; Radicalisers as Regulators: An Examination of Dabiq Magazine; The Role of Discourse Analysis in Terrorism Studies: Comparing Inspire and Dabiq; Learning from ISIS's Virtual Propaganda War for Western Muslims: A Comparison of Inspire and Dabiq; Online Jihadi Instructional Content: The Role of Magazines; Online Counterterrorism. Public Actors, Private Actors, and Cooperative ApproachesHard and Soft Power Approaches to Countering Online Extremism; Anglosphere Approaches to Counter-Terrorism in Cyberspace; Prosecuting Terrorist Activity in Canada; An Efficient Response to ISIS in Cyberspace: Public-Private Partnership; Prevention, Anti-Radicalisation and the Role of Social Media: A View from Germany; Online CVE Strategies; Counter-Terrorism Strategic Communications: Back to the Future -- Lessons from Past and Present; Interrupting Engagement with Online Extremist Content: Utilising ""Noisy"" Foreign Fighters. Interpreting Public Reactions to Terrorist Events Using Open Source Network AnalysisSurveillance; Reframing 'Mass Surveillance'; Beyond Big Data: Surveillance, Metadata and Technology-Enabled Intelligence Opportunities in Counter-Terrorism; National Security, Terrorism and the Legality of Secret Surveillance: The Case of France; Innovative Approaches/Responses; Internet Forensics as a Tool for Responding to Cyber-Fronts; (En)gendering Cyberterrorism in the UK News Media: A Discursive Analysis; Predicting the Emergence of Self-Radicalisation Through Social Media: A Complex Systems Approach. "Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a selection of papers delivered at the NATO Advanced Research Workshop (ARW) on "Terrorists' Use of the Internet" held in Dublin, Ireland in June 2016. One aim of the workshop was to nurture dialogue between members of the academic, policy and practitioner communities, so the 60 delegates from 13 countries who attended the workshop included representatives from each of these. The participants encompassed a wide range of expertise (including engineering, computer science, law, criminology, political science, international relations, history, and linguistics) and the chapters contained herein reflect these diverse professional and disciplinary backgrounds. The workshop also aimed to address the convergence of threats. Following an introduction which provides an overview of the various ways in which terrorists use the Internet, the book's remaining 25 chapters are grouped into 5 sections on cyber terrorism and critical infrastructure protection; cyber-enabled terrorist financing; jihadi online propaganda; online counterterrorism; and innovative approaches and responses."-- Back cover. Internet and terrorism Congresses. Terrorism Prevention Congresses. Internet et terrorisme Congrès. Terrorisme Prévention Congrès. BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Internet and terrorism fast Terrorism Prevention fast proceedings (reports) aat Conference papers and proceedings fast Conference papers and proceedings. lcgft http://id.loc.gov/authorities/genreForms/gf2014026068 Actes de congrès. rvmgf Conway, Maura, editor. Jarvis, Lee, 1979- editor. https://id.oclc.org/worldcat/entity/E39PBJptWrPJWCPpwBRdtp7T73 http://id.loc.gov/authorities/names/n2009020470 Lehane, Orla, editor. Macdonald, Stuart, editor. Nouri, Lella, editor. has work: Terrorists' use of the internet (Text) https://id.oclc.org/worldcat/entity/E39PCGHmppKyrjmXmKrBGXBpT3 https://id.oclc.org/worldcat/ontology/hasWork NATO science for peace and security series. E, Human and societal dynamics ; vol. 136. http://id.loc.gov/authorities/names/no2007135253 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1549272 Volltext |
spellingShingle | Terrorists' use of the internet : assessment and response / NATO science for peace and security series. Human and societal dynamics ; Title Page; Preface; The Cyberterrorism Project; Contents; Terrorist Use of the Internet and Cyberspace: Issues and Responses; Cyberterrorism and Critical Infrastructure Protection; Cyberterrorism: A Challenge for External and Internal Security; Preliminary Analysis of Cyberterrorism Threats to Internet of Things (IoT) Applications; Critical Infrastructure Cyber-Security Risk Management; The Terrorist -- Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists; Cyber-Enabled Terrorist Financing; Online Terrorist Financing. Cybercrime-Funded Terrorism and the Threats Posed by Future Technologies: Appealing Economics and TargetsJihadi Online Propaganda: Purposes and Effects; Between the Arab Revolutions and the Islamic State's Caliphate: al-Qaeda Leaders' Online Propaganda 2012-2014; Radicalisers as Regulators: An Examination of Dabiq Magazine; The Role of Discourse Analysis in Terrorism Studies: Comparing Inspire and Dabiq; Learning from ISIS's Virtual Propaganda War for Western Muslims: A Comparison of Inspire and Dabiq; Online Jihadi Instructional Content: The Role of Magazines; Online Counterterrorism. Public Actors, Private Actors, and Cooperative ApproachesHard and Soft Power Approaches to Countering Online Extremism; Anglosphere Approaches to Counter-Terrorism in Cyberspace; Prosecuting Terrorist Activity in Canada; An Efficient Response to ISIS in Cyberspace: Public-Private Partnership; Prevention, Anti-Radicalisation and the Role of Social Media: A View from Germany; Online CVE Strategies; Counter-Terrorism Strategic Communications: Back to the Future -- Lessons from Past and Present; Interrupting Engagement with Online Extremist Content: Utilising ""Noisy"" Foreign Fighters. Interpreting Public Reactions to Terrorist Events Using Open Source Network AnalysisSurveillance; Reframing 'Mass Surveillance'; Beyond Big Data: Surveillance, Metadata and Technology-Enabled Intelligence Opportunities in Counter-Terrorism; National Security, Terrorism and the Legality of Secret Surveillance: The Case of France; Innovative Approaches/Responses; Internet Forensics as a Tool for Responding to Cyber-Fronts; (En)gendering Cyberterrorism in the UK News Media: A Discursive Analysis; Predicting the Emergence of Self-Radicalisation Through Social Media: A Complex Systems Approach. Internet and terrorism Congresses. Terrorism Prevention Congresses. Internet et terrorisme Congrès. Terrorisme Prévention Congrès. BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Internet and terrorism fast Terrorism Prevention fast |
subject_GND | http://id.loc.gov/authorities/genreForms/gf2014026068 |
title | Terrorists' use of the internet : assessment and response / |
title_auth | Terrorists' use of the internet : assessment and response / |
title_exact_search | Terrorists' use of the internet : assessment and response / |
title_full | Terrorists' use of the internet : assessment and response / edited by Maura Conway, Lee Jarvis, Orla Lehane, Stuart Macdonald and Lella Nouri. |
title_fullStr | Terrorists' use of the internet : assessment and response / edited by Maura Conway, Lee Jarvis, Orla Lehane, Stuart Macdonald and Lella Nouri. |
title_full_unstemmed | Terrorists' use of the internet : assessment and response / edited by Maura Conway, Lee Jarvis, Orla Lehane, Stuart Macdonald and Lella Nouri. |
title_short | Terrorists' use of the internet : |
title_sort | terrorists use of the internet assessment and response |
title_sub | assessment and response / |
topic | Internet and terrorism Congresses. Terrorism Prevention Congresses. Internet et terrorisme Congrès. Terrorisme Prévention Congrès. BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Internet and terrorism fast Terrorism Prevention fast |
topic_facet | Internet and terrorism Congresses. Terrorism Prevention Congresses. Internet et terrorisme Congrès. Terrorisme Prévention Congrès. BUSINESS & ECONOMICS Infrastructure. SOCIAL SCIENCE General. Internet and terrorism Terrorism Prevention proceedings (reports) Conference papers and proceedings Conference papers and proceedings. Actes de congrès. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1549272 |
work_keys_str_mv | AT natoadvancedresearchworkshoponterroristsuseoftheinternetdublinireland terroristsuseoftheinternetassessmentandresponse AT conwaymaura terroristsuseoftheinternetassessmentandresponse AT jarvislee terroristsuseoftheinternetassessmentandresponse AT lehaneorla terroristsuseoftheinternetassessmentandresponse AT macdonaldstuart terroristsuseoftheinternetassessmentandresponse AT nourilella terroristsuseoftheinternetassessmentandresponse |