Social Networks as the New Frontier of Terrorism : #Terror

Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in wh...

Full description

Bibliographic Details
Main Author: Scaife, Laura (auth)
Format: eBook
Published: Taylor & Francis 2017
Subjects:
Online Access:Get fulltext
LEADER 02860naaaa2200481uu 4500
001 52759
005 20220210
020 |a 9781315668680 
020 |a 9781317361855 
020 |a 9780367874995 
020 |a 9781315668680 
020 |a 9781138950535 
024 7 |a 10.4324/9781315668680  |c doi 
041 0 |h English 
042 |a dc 
100 1 |a Scaife, Laura  |e auth 
245 1 0 |a Social Networks as the New Frontier of Terrorism : #Terror 
260 |b Taylor & Francis  |c 2017 
300 |a 1 electronic resource (216 p.) 
856 |z Get fulltext  |u https://library.oapen.org/handle/20.500.12657/52759 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses. 
540 |a Creative Commons 
546 |a English 
650 7 |a IT & Communications law  |2 bicssc 
650 7 |a Entertainment & media law  |2 bicssc 
653 |a Communications Act 2003 
653 |a Crime and Disorder Act 1998 
653 |a human rights law 
653 |a ISIS 
653 |a information society service 
653 |a legal and regulatory frameworks 
653 |a Malicious Communications Act 1988 
653 |a Public Order Act 1986 
653 |a Regulation of Investigatory Powers Act 2000 
653 |a Right to Freedom of Expression 
653 |a regulation of online content 
653 |a Serious Crime Act 2007 
653 |a social media 
653 |a Terrorism Act 2000 
653 |a terrorism 
653 |a traditional media 
653 |a United Nations Counter-Terrorism Committee