Social Networks as the New Frontier of Terrorism #Terror

Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in wh...

Full description

Saved in:
Bibliographic Details
Main Author: Scaife, Laura (auth)
Format: Electronic Book Chapter
Language:English
Published: Taylor & Francis 2017
Series:Routledge Research in Information Technology and E-Commerce Law
Subjects:
Online Access:OAPEN Library: download the publication
OAPEN Library: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 oapen_2024_20_500_12657_52759
005 20220210
003 oapen
006 m o d
007 cr|mn|---annan
008 20220210s2017 xx |||||o ||| 0|eng d
020 |a 9781315668680 
020 |a 9781317361855 
020 |a 9780367874995 
020 |a 9781315668680 
020 |a 9781138950535 
040 |a oapen  |c oapen 
024 7 |a 10.4324/9781315668680  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a LNQ  |2 bicssc 
072 7 |a LNJ  |2 bicssc 
100 1 |a Scaife, Laura  |4 auth 
245 1 0 |a Social Networks as the New Frontier of Terrorism  |b #Terror 
260 |b Taylor & Francis  |c 2017 
300 |a 1 electronic resource (216 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Routledge Research in Information Technology and E-Commerce Law 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-nc-nd/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ 
546 |a English 
650 7 |a IT & Communications law  |2 bicssc 
650 7 |a Entertainment & media law  |2 bicssc 
653 |a Communications Act 2003 
653 |a Crime and Disorder Act 1998 
653 |a human rights law 
653 |a ISIS 
653 |a information society service 
653 |a legal and regulatory frameworks 
653 |a Malicious Communications Act 1988 
653 |a Public Order Act 1986 
653 |a Regulation of Investigatory Powers Act 2000 
653 |a Right to Freedom of Expression 
653 |a regulation of online content 
653 |a Serious Crime Act 2007 
653 |a social media 
653 |a Terrorism Act 2000 
653 |a terrorism 
653 |a traditional media 
653 |a United Nations Counter-Terrorism Committee 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/id/f511df23-571a-479e-a82d-f20209eb6e30/9781317361855.pdf  |7 0  |z OAPEN Library: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/handle/20.500.12657/52759  |7 0  |z OAPEN Library: description of the publication