Social networks as the new frontier of terrorism : : #terror / / Laura Scaife.

Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in wh...

Full description

Saved in:
Bibliographic Details
Superior document:Routledge Research in IT and E-Commerce Law
VerfasserIn:
Place / Publishing House:London ;, New York : : Routledge,, 2017.
Year of Publication:2017
Edition:1 ed.
Language:English
Series:Routledge research in IT and E-commerce law.
Physical Description:1 online resource (233 pages).
Notes:Includes index.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993546834004498
ctrlnum (CKB)3710000001010652
(MiAaPQ)EBC4779322
(OCoLC)967982467
(ScCtBLL)9e525313-6eb4-49e2-81d1-b42de9c11df0
(oapen)https://directory.doabooks.org/handle/20.500.12854/78186
(EXLCZ)993710000001010652
collection bib_alma
record_format marc
spelling Scaife, Laura., author.
Social networks as the new frontier of terrorism : #terror / Laura Scaife.
1 ed.
Taylor & Francis 2017
London ; New York : Routledge, 2017.
1 online resource (233 pages).
text rdacontent
computer rdamedia
online resource rdacarrier
Routledge Research in IT and E-Commerce Law
Includes index.
Description based on print version record.
1. One man's terrorist is another man's Facebook friend -- 2. Terrorism's love affair with social media -- 3. Freedom of the newsfeed -- 4. The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- 5. Let's start a #war -- 6. National security and the 'fourth estate' in a brave new social media world.
CC BY-NC-ND
Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence.This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate.This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.
English
Snowden, Edward J., 1983-
Cyberterrorism Law and legislation.
Online social networks Law and legislation.
National security Law and legislation.
Terrorists Social networks.
Internet and terrorism.
Social media Law and legislation.
Terrorism Prevention Law and legislation.
Communications Act 2003
Crime and Disorder Act 1998
human rights law
ISIS
information society service
legal and regulatory frameworks
Malicious Communications Act 1988
Public Order Act 1986
Regulation of Investigatory Powers Act 2000
Right to Freedom of Expression
regulation of online content
Serious Crime Act 2007
social media
Terrorism Act 2000
terrorism
traditional media
United Nations Counter-Terrorism Committee
1-138-95053-X
Routledge research in IT and E-commerce law.
language English
format eBook
author Scaife, Laura.,
spellingShingle Scaife, Laura.,
Social networks as the new frontier of terrorism : #terror /
Routledge Research in IT and E-Commerce Law
1. One man's terrorist is another man's Facebook friend -- 2. Terrorism's love affair with social media -- 3. Freedom of the newsfeed -- 4. The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- 5. Let's start a #war -- 6. National security and the 'fourth estate' in a brave new social media world.
author_facet Scaife, Laura.,
author_variant l s ls
author_role VerfasserIn
author_sort Scaife, Laura.,
title Social networks as the new frontier of terrorism : #terror /
title_sub #terror /
title_full Social networks as the new frontier of terrorism : #terror / Laura Scaife.
title_fullStr Social networks as the new frontier of terrorism : #terror / Laura Scaife.
title_full_unstemmed Social networks as the new frontier of terrorism : #terror / Laura Scaife.
title_auth Social networks as the new frontier of terrorism : #terror /
title_new Social networks as the new frontier of terrorism :
title_sort social networks as the new frontier of terrorism : #terror /
series Routledge Research in IT and E-Commerce Law
series2 Routledge Research in IT and E-Commerce Law
publisher Taylor & Francis
Routledge,
publishDate 2017
physical 1 online resource (233 pages).
edition 1 ed.
contents 1. One man's terrorist is another man's Facebook friend -- 2. Terrorism's love affair with social media -- 3. Freedom of the newsfeed -- 4. The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- 5. Let's start a #war -- 6. National security and the 'fourth estate' in a brave new social media world.
isbn 1-315-66868-8
1-317-36184-9
1-317-36185-7
1-138-95053-X
callnumber-first K - Law
callnumber-subject KZ - Law of Nations
callnumber-label KZ7225
callnumber-sort KZ 47225 C93 S335 42017
era_facet 1983-
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 340 - Law
dewey-ones 344 - Labor, social, education & cultural law
dewey-full 344.05/325
dewey-sort 3344.05 3325
dewey-raw 344.05/325
dewey-search 344.05/325
oclc_num 967982467
work_keys_str_mv AT scaifelaura socialnetworksasthenewfrontierofterrorismterror
status_str c
ids_txt_mv (CKB)3710000001010652
(MiAaPQ)EBC4779322
(OCoLC)967982467
(ScCtBLL)9e525313-6eb4-49e2-81d1-b42de9c11df0
(oapen)https://directory.doabooks.org/handle/20.500.12854/78186
(EXLCZ)993710000001010652
hierarchy_parent_title Routledge Research in IT and E-Commerce Law
is_hierarchy_title Social networks as the new frontier of terrorism : #terror /
container_title Routledge Research in IT and E-Commerce Law
_version_ 1796651979894685696
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01661cam a2200337Ii 4500</leader><controlfield tag="001">993546834004498</controlfield><controlfield tag="005">20191203012600.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#cnu||||||||</controlfield><controlfield tag="008">180706s2017 enk ob 001 0deng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-315-66868-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-317-36184-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-317-36185-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4324/9781315668680 </subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)3710000001010652</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC4779322</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)967982467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ScCtBLL)9e525313-6eb4-49e2-81d1-b42de9c11df0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/78186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)993710000001010652</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">KZ7225.C93</subfield><subfield code="b">.S335 2017</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">344.05/325</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Scaife, Laura.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Social networks as the new frontier of terrorism :</subfield><subfield code="b">#terror /</subfield><subfield code="c">Laura Scaife.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1 ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Taylor &amp; Francis</subfield><subfield code="c">2017</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ;</subfield><subfield code="a">New York :</subfield><subfield code="b">Routledge,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (233 pages).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Routledge Research in IT and E-Commerce Law</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. One man's terrorist is another man's Facebook friend -- 2. Terrorism's love affair with social media -- 3. Freedom of the newsfeed -- 4. The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- 5. Let's start a #war -- 6. National security and the 'fourth estate' in a brave new social media world.</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="f">CC BY-NC-ND</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence.This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate.This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="600" ind1="1" ind2="0"><subfield code="a">Snowden, Edward J.,</subfield><subfield code="d">1983-</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Online social networks</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorists</subfield><subfield code="x">Social networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet and terrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Social media</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Communications Act 2003</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Crime and Disorder Act 1998</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">human rights law</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ISIS</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">information society service</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">legal and regulatory frameworks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Malicious Communications Act 1988</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Public Order Act 1986</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Regulation of Investigatory Powers Act 2000</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Right to Freedom of Expression</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">regulation of online content</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Serious Crime Act 2007</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">social media</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Terrorism Act 2000</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">terrorism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">traditional media</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">United Nations Counter-Terrorism Committee</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-138-95053-X</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Routledge research in IT and E-commerce law.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 21:22:51 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2017-01-15 09:15:08 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338362760004498&amp;Force_direct=true</subfield><subfield code="Z">5338362760004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338362760004498</subfield></datafield></record></collection>