Show simple item record

dc.contributor.authorScaife, Laura
dc.date.accessioned2022-02-10T12:47:59Z
dc.date.available2022-02-10T12:47:59Z
dc.date.issued2017
dc.identifierONIX_20220210_9781317361855_14
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/52759
dc.description.abstractTerrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.
dc.languageEnglish
dc.relation.ispartofseriesRoutledge Research in Information Technology and E-Commerce Law
dc.subject.classificationthema EDItEUR::L Law::LN Laws of specific jurisdictions and specific areas of law::LNQ IT and Communications law / Postal laws and regulationsen_US
dc.subject.classificationthema EDItEUR::L Law::LN Laws of specific jurisdictions and specific areas of law::LNJ Entertainment and media lawen_US
dc.subject.otherCommunications Act 2003
dc.subject.otherCrime and Disorder Act 1998
dc.subject.otherhuman rights law
dc.subject.otherISIS
dc.subject.otherinformation society service
dc.subject.otherlegal and regulatory frameworks
dc.subject.otherMalicious Communications Act 1988
dc.subject.otherPublic Order Act 1986
dc.subject.otherRegulation of Investigatory Powers Act 2000
dc.subject.otherRight to Freedom of Expression
dc.subject.otherregulation of online content
dc.subject.otherSerious Crime Act 2007
dc.subject.othersocial media
dc.subject.otherTerrorism Act 2000
dc.subject.otherterrorism
dc.subject.othertraditional media
dc.subject.otherUnited Nations Counter-Terrorism Committee
dc.titleSocial Networks as the New Frontier of Terrorism
dc.title.alternative#Terror
dc.typebook
oapen.identifier.doi10.4324/9781315668680
oapen.relation.isPublishedBy7b3c7b10-5b1e-40b3-860e-c6dd5197f0bb
oapen.relation.isFundedByKnowledge Unlatched
oapen.relation.isbn9781317361855
oapen.relation.isbn9780367874995
oapen.relation.isbn9781315668680
oapen.relation.isbn9781138950535
oapen.collectionKnowledge Unlatched (KU)
oapen.imprintRoutledge
oapen.pages216
oapen.grant.number7200
peerreview.anonymitySingle-anonymised
peerreview.idbc80075c-96cc-4740-a9f3-a234bc2598f1
peerreview.open.reviewNo
peerreview.publish.responsibilityPublisher
peerreview.review.stagePre-publication
peerreview.review.typeProposal
peerreview.reviewer.typeInternal editor
peerreview.reviewer.typeExternal peer reviewer
peerreview.titleProposal review
oapen.review.commentsTaylor & Francis open access titles are reviewed as a minimum at proposal stage by at least two external peer reviewers and an internal editor (additional reviews may be sought and additional content reviewed as required).


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record