Social networks as the new frontier of terrorism : : #terror / / Laura Scaife.
Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in wh...
Saved in:
Superior document: | Routledge Research in IT and E-Commerce Law |
---|---|
VerfasserIn: | |
Place / Publishing House: | London ;, New York : : Routledge,, 2017. |
Year of Publication: | 2017 |
Edition: | 1 ed. |
Language: | English |
Series: | Routledge research in IT and E-commerce law.
|
Physical Description: | 1 online resource (233 pages). |
Notes: | Includes index. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993546834004498 |
---|---|
ctrlnum |
(CKB)3710000001010652 (MiAaPQ)EBC4779322 (OCoLC)967982467 (ScCtBLL)9e525313-6eb4-49e2-81d1-b42de9c11df0 (oapen)https://directory.doabooks.org/handle/20.500.12854/78186 (EXLCZ)993710000001010652 |
collection |
bib_alma |
record_format |
marc |
spelling |
Scaife, Laura., author. Social networks as the new frontier of terrorism : #terror / Laura Scaife. 1 ed. Taylor & Francis 2017 London ; New York : Routledge, 2017. 1 online resource (233 pages). text rdacontent computer rdamedia online resource rdacarrier Routledge Research in IT and E-Commerce Law Includes index. Description based on print version record. 1. One man's terrorist is another man's Facebook friend -- 2. Terrorism's love affair with social media -- 3. Freedom of the newsfeed -- 4. The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- 5. Let's start a #war -- 6. National security and the 'fourth estate' in a brave new social media world. CC BY-NC-ND Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence.This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate.This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses. English Snowden, Edward J., 1983- Cyberterrorism Law and legislation. Online social networks Law and legislation. National security Law and legislation. Terrorists Social networks. Internet and terrorism. Social media Law and legislation. Terrorism Prevention Law and legislation. Communications Act 2003 Crime and Disorder Act 1998 human rights law ISIS information society service legal and regulatory frameworks Malicious Communications Act 1988 Public Order Act 1986 Regulation of Investigatory Powers Act 2000 Right to Freedom of Expression regulation of online content Serious Crime Act 2007 social media Terrorism Act 2000 terrorism traditional media United Nations Counter-Terrorism Committee 1-138-95053-X Routledge research in IT and E-commerce law. |
language |
English |
format |
eBook |
author |
Scaife, Laura., |
spellingShingle |
Scaife, Laura., Social networks as the new frontier of terrorism : #terror / Routledge Research in IT and E-Commerce Law 1. One man's terrorist is another man's Facebook friend -- 2. Terrorism's love affair with social media -- 3. Freedom of the newsfeed -- 4. The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- 5. Let's start a #war -- 6. National security and the 'fourth estate' in a brave new social media world. |
author_facet |
Scaife, Laura., |
author_variant |
l s ls |
author_role |
VerfasserIn |
author_sort |
Scaife, Laura., |
title |
Social networks as the new frontier of terrorism : #terror / |
title_sub |
#terror / |
title_full |
Social networks as the new frontier of terrorism : #terror / Laura Scaife. |
title_fullStr |
Social networks as the new frontier of terrorism : #terror / Laura Scaife. |
title_full_unstemmed |
Social networks as the new frontier of terrorism : #terror / Laura Scaife. |
title_auth |
Social networks as the new frontier of terrorism : #terror / |
title_new |
Social networks as the new frontier of terrorism : |
title_sort |
social networks as the new frontier of terrorism : #terror / |
series |
Routledge Research in IT and E-Commerce Law |
series2 |
Routledge Research in IT and E-Commerce Law |
publisher |
Taylor & Francis Routledge, |
publishDate |
2017 |
physical |
1 online resource (233 pages). |
edition |
1 ed. |
contents |
1. One man's terrorist is another man's Facebook friend -- 2. Terrorism's love affair with social media -- 3. Freedom of the newsfeed -- 4. The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- 5. Let's start a #war -- 6. National security and the 'fourth estate' in a brave new social media world. |
isbn |
1-315-66868-8 1-317-36184-9 1-317-36185-7 1-138-95053-X |
callnumber-first |
K - Law |
callnumber-subject |
KZ - Law of Nations |
callnumber-label |
KZ7225 |
callnumber-sort |
KZ 47225 C93 S335 42017 |
era_facet |
1983- |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
340 - Law |
dewey-ones |
344 - Labor, social, education & cultural law |
dewey-full |
344.05/325 |
dewey-sort |
3344.05 3325 |
dewey-raw |
344.05/325 |
dewey-search |
344.05/325 |
oclc_num |
967982467 |
work_keys_str_mv |
AT scaifelaura socialnetworksasthenewfrontierofterrorismterror |
status_str |
c |
ids_txt_mv |
(CKB)3710000001010652 (MiAaPQ)EBC4779322 (OCoLC)967982467 (ScCtBLL)9e525313-6eb4-49e2-81d1-b42de9c11df0 (oapen)https://directory.doabooks.org/handle/20.500.12854/78186 (EXLCZ)993710000001010652 |
hierarchy_parent_title |
Routledge Research in IT and E-Commerce Law |
is_hierarchy_title |
Social networks as the new frontier of terrorism : #terror / |
container_title |
Routledge Research in IT and E-Commerce Law |
_version_ |
1796651979894685696 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01661cam a2200337Ii 4500</leader><controlfield tag="001">993546834004498</controlfield><controlfield tag="005">20191203012600.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#cnu||||||||</controlfield><controlfield tag="008">180706s2017 enk ob 001 0deng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-315-66868-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-317-36184-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-317-36185-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4324/9781315668680 </subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)3710000001010652</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC4779322</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)967982467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ScCtBLL)9e525313-6eb4-49e2-81d1-b42de9c11df0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/78186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)993710000001010652</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">KZ7225.C93</subfield><subfield code="b">.S335 2017</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">344.05/325</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Scaife, Laura.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Social networks as the new frontier of terrorism :</subfield><subfield code="b">#terror /</subfield><subfield code="c">Laura Scaife.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1 ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Taylor & Francis</subfield><subfield code="c">2017</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ;</subfield><subfield code="a">New York :</subfield><subfield code="b">Routledge,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (233 pages).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Routledge Research in IT and E-Commerce Law</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. One man's terrorist is another man's Facebook friend -- 2. Terrorism's love affair with social media -- 3. Freedom of the newsfeed -- 4. The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- 5. Let's start a #war -- 6. National security and the 'fourth estate' in a brave new social media world.</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="f">CC BY-NC-ND</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence.This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate.This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="600" ind1="1" ind2="0"><subfield code="a">Snowden, Edward J.,</subfield><subfield code="d">1983-</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Online social networks</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorists</subfield><subfield code="x">Social networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet and terrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Social media</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Communications Act 2003</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Crime and Disorder Act 1998</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">human rights law</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ISIS</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">information society service</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">legal and regulatory frameworks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Malicious Communications Act 1988</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Public Order Act 1986</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Regulation of Investigatory Powers Act 2000</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Right to Freedom of Expression</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">regulation of online content</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Serious Crime Act 2007</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">social media</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Terrorism Act 2000</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">terrorism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">traditional media</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">United Nations Counter-Terrorism Committee</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-138-95053-X</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Routledge research in IT and E-commerce law.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 21:22:51 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2017-01-15 09:15:08 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338362760004498&Force_direct=true</subfield><subfield code="Z">5338362760004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338362760004498</subfield></datafield></record></collection> |