Terrorism online: politics, law and technology
"This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disc...
Contributors: | ; ; |
---|---|
Format: | Print Book |
Language: | English |
Published: |
London New York
Routledge, Taylor & Francis Group
2015
|
In: | Year: 2015 |
Online Access: |
Inhaltsverzeichnis (Verlag) |
Availability in Tübingen: | Present in Tübingen. UB: KB 20 A 8896 |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: |
MARC
LEADER | 00000cam a2200000 c 4500 | ||
---|---|---|---|
001 | 1613421516 | ||
003 | DE-627 | ||
005 | 20250221105031.0 | ||
007 | tu | ||
008 | 150211s2015 xxk||||| 00| ||eng c | ||
016 | 7 | |a GBB512449 |2 UK | |
020 | |a 9780415732888 |c hbk. : £85.00 |9 978-0-415-73288-8 | ||
035 | |a (DE-627)1613421516 | ||
035 | |a (DE-576)426174496 | ||
035 | |a (DE-599)BSZ426174496 | ||
035 | |a (OCoLC)910620343 | ||
035 | |a (OCoLC)910620343 | ||
035 | |a (BL)017036421 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
044 | |c XA-GB |c XD-US | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 363.32502854678 | |
082 | 0 | |a 363.3250285/4678 | |
082 | 0 | 4 | |a POL000000 |a POL037000 |a LAW104000 |q bisacsh |
084 | |a 2,1 |2 ssgn | ||
084 | |a MD 8920 |q BVB |2 rvk |0 (DE-625)rvk/122569: | ||
084 | |a 54.38 |2 bkl | ||
084 | |a 89.58 |2 bkl | ||
084 | |a 05.38 |2 bkl | ||
245 | 0 | 0 | |a Terrorism online |b politics, law and technology |c ed. by Lee Jarvis ... |
264 | 1 | |a London |a New York |b Routledge, Taylor & Francis Group |c 2015 | |
300 | |a XI, 198 S. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
490 | 0 | |a Routledge studies in conflict, security and technology | |
500 | |a Includes bibliographical references and index | ||
520 | |a "This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general"-- | ||
520 | |a "This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general"-- | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f SSG |x XA-DE-BW |2 pdager |5 DE-21 | |
650 | 0 | |a Computer crimes |x Political aspects | |
650 | 0 | |a Cyberterrorism | |
650 | 0 | |a Terrorism | |
650 | 0 | |a Computer crimes |x Political aspects | |
655 | 7 | |a Aufsatzsammlung |0 (DE-588)4143413-4 |0 (DE-627)105605727 |0 (DE-576)209726091 |2 gnd-content | |
689 | 0 | 0 | |d s |0 (DE-588)7864395-8 |0 (DE-627)700634487 |0 (DE-576)363213635 |a Internetkriminalität |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4059534-1 |0 (DE-627)106143212 |0 (DE-576)209131136 |a Terrorismus |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)1118882725 |0 (DE-627)872358631 |0 (DE-576)479682461 |a Cyberterrorismus |2 gnd |
689 | 0 | |5 (DE-627) | |
689 | 1 | 0 | |d s |0 (DE-588)7864395-8 |0 (DE-627)700634487 |0 (DE-576)363213635 |a Internetkriminalität |2 gnd |
689 | 1 | |5 (DE-627) | |
700 | 1 | |a Jarvis, Lee |d 1979- |e Hrsg. |0 (DE-588)138757224 |0 (DE-627)605702918 |0 (DE-576)308953991 |4 edt | |
700 | 1 | |a Macdonald, Stuart Keith |d 1979- |4 oth | |
700 | 1 | |8 1\p |a Chen, Thomas M. |0 (DE-588)1056945060 |0 (DE-627)794262163 |0 (DE-576)174365322 |4 oth | |
776 | 1 | |z 9781315848822 | |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz426174496inh.htm |m B:DE-576;DE-Frei85 |q application/pdf |v 20150608153004 |x Verlag |3 Inhaltsverzeichnis |
883 | |8 1 |a cgwrk |d 20241001 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | ||
889 | |w (DE-627)796490767 | ||
935 | |a mkri | ||
935 | |i mdedup | ||
936 | r | v | |a MD 8920 |b Terror, Gewalt, Mord |k Politologie |k Politische Theorie, Grundbegriffe des Politischen |k Politische Auseinandersetzung |k Terror, Gewalt, Mord |0 (DE-627)1271426560 |0 (DE-625)rvk/122569: |0 (DE-576)201426560 |
936 | b | k | |a 54.38 |j Computersicherheit |0 (DE-627)106418866 |
936 | b | k | |a 89.58 |j Politische Gewalt |0 (DE-627)106416960 |
936 | b | k | |a 05.38 |j Neue elektronische Medien |x Kommunikationswissenschaft |0 (DE-627)106419579 |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 317525022X | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1613421516 | ||
LOK | |0 005 20170816151101 | ||
LOK | |0 008 170613||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 20 A 8896 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 938 |a 1708 |f 34 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3175250319 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1613421516 | ||
LOK | |0 005 20150602145646 | ||
LOK | |0 008 150211||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 20 A 8896 |