Muutke küpsiste eelistusi

E-raamat: Social Networks as the New Frontier of Terrorism: #Terror

  • Formaat - PDF+DRM
  • Hind: 40,08 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Terrorism. Why does this word grab our attention so?

Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence.

This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate.

This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.
Acknowledgements xi
Foreword xiii
1 One man's terrorist is another man's Facebook friend
1(33)
1.1 Background to the development of social media
3(4)
1.1.1 Development of social media
3(4)
1.2 What is terrorism? An evolving concept or just a word
7(25)
1.2.1 Types of terrorism
8(1)
1.2.2 Defining terrorism
8(1)
1.2.2.1 Lessons from history
9(3)
1.2.2.2 Finding a consensus as to the modern definition of terrorism
12(2)
1.2.2.3 Distinction: a path to definition?
14(1)
1.2.2.3 Guerrilla warfare or terrorism?
15(1)
1.2.2.4 Criminal activity
16(1)
1.2.2.4 Narco-terrorism -- same product, or just a different brand?
17(3)
1.2.3 Towards a framework
20(1)
1.2.4 Legal definitions
21(1)
1.2.4.1 Introduction
21(1)
1.2.4.2 International instruments
22(1)
1.2.4.2.1 Ruggie Principles and multilateralism
22(2)
1.2.4.2.2 United Nations General Assembly global counter-terrorism strategy
24(1)
1.2.4.2.3 The World Summit outcome
24(2)
1.2.4.3 National legislation
26(1)
1.2.4.3.1 Terrorism Act 2000
26(2)
1.2.4.4 The American context
28(1)
1.2.4.5 Definitions adopted in other jurisdictions
29(1)
1.2.5 What is not terrorism?
29(1)
1.2.5.1 Introduction
29(1)
1.2.5.2 Extremism
30(1)
1.2.5.3 Hate crime
31(1)
1.3 Opening thoughts
32(2)
2 Terrorism's love affair with social media
34(31)
2.1 Terrorism and the media tour de force
37(7)
2.1.1 Campaign 1: beta media
38(3)
2.1.2 The social network
41(1)
2.1.2.1 Adoption of social media
41(3)
2.2 Express yourself
44(3)
2.2.1 Philosophical arguments in favour of freedom of expression
44(1)
2.2.2 Legal protection of freedom of expression
45(1)
2.2.2.1 The Johannesburg Principles
45(1)
2.2.2.2 Europe
46(1)
2.2.2.3 America
47(1)
2.3 Terror groups' use of social media
47(18)
2.3.1 Growth of terrorist organisations online presence
48(1)
2.3.2 Mobilisation of online battalions
49(1)
2.3.3 Strategies deployed
50(2)
2.3.4 Image is everything
52(6)
2.3.5 Refer, recruit, reward
58(2)
2.3.6 Jihadi whispers: is it official yet?
60(1)
2.3.6.1 #Error
61(2)
2.3.7 The command and control network
63(1)
2.3.8 Will social media replace the forums?
64(1)
3 Freedom of the newsfeed
65(28)
3.1 Freedom of the newsfeed
66(11)
3.1.1 Takedown requests made by the state
67(1)
3.1.1.1 Restrictions on freedom of expression
67(1)
3.1.2 The margin of appreciation
68(2)
3.1.3 Legislation restricting freedom of expression
70(2)
3.1.4 Offensive content and hate speech
72(3)
3.1.5 General blocking
75(2)
3.2 Self regulation
77(9)
3.2.1 Introduction
77(1)
3.2.2 Locating social media sites within an existing statutory framework
78(3)
3.2.3 Contractual terms
81(1)
3.2.4 Filtering and content blocking
82(4)
3.3 Does takedown work?
86(7)
3.3.1 Whack-a-mole!
86(2)
3.3.2 Jurisdiction
88(2)
3.3.3 A question of trust?
90(3)
4 The spy who liked my tweet: counter-intelligence and the terrorists' reaction to Snowden
93(53)
4.1 Privacy
96(12)
4.1.1 The importance of privacy
96(1)
4.1.2 What is `privacy'?
97(3)
4.1.3 The value of privacy
100(2)
4.1.4 Checks and balances on the right to privacy
102(1)
4.1.5 Is privacy dead?
102(2)
4.1.6 The private sector's role in privacy protection
104(4)
4.2 Surveillance: a potted history
108(19)
4.2.1 The origins of modern surveillance
108(2)
4.2.2 Project Tempora
110(2)
4.2.3 The Snowden leaks
112(2)
4.2.4 What I talk about, when I talk about surveillance
114(1)
4.2.4.1 Interception
115(1)
4.2.4.1.1 Targeted warrants
115(1)
4.2.4.2 Communications data
116(2)
4.2.4.2.1 Bulk warrants
118(2)
4.2.5 A wider playing field
120(1)
4.2.6 Safeguards
120(2)
4.2.7 Powers outside RIPA
122(1)
4.2.8 The future of surveillance
123(3)
4.2.9 Brexit
126(1)
4.3 Cat and mouse: the terrorists' response
127(11)
4.3.1 #Carelesstalkcostslives
127(1)
4.3.2 Of politics and policies: the Ladybird guide to online jihad
128(5)
4.3.3 Dear Deidre: Jihadi agony aunts
133(1)
4.3.4 There's an app for that
134(4)
4.4 Quantifying gain
138(8)
5 Let's start a #war
146(19)
5.1 Official counter-narratives
147(9)
5.1.1 `Official' postings
147(3)
5.1.2 Counter-narratives
150(4)
5.1.2.1 Are counter narratives successful?
154(2)
5.2 Responses from the social media community
156(6)
5.2.1 Introduction
156(1)
5.2.2 Public outrage/grief
157(2)
5.2.3 The ethics of posting graphic content and blackouts
159(1)
5.2.4 Spoofing
160(1)
5.2.5 Islamlic Bloggers
161(1)
5.3 Cyber war
162(3)
5.3.1 War games
162(1)
5.3.2 Anonymous
162(3)
6 National security and the `fourth estate' in a brave new social media world
165(28)
Peter Coe
6.1 The media landscape: a multi-jurisdictional perspective on the purpose of the media as the fourth estate'
165(4)
6.2 Reporting on terrorism: legal principles and frameworks
169(14)
6.2.1 The role of the state in protecting `public order'
170(2)
6.2.2 The international legal framework
172(4)
6.2.3 A view from the UK Part 1: David Miranda, Glenn Greenwald, Edward Snowden and the Terrorism Act 2000
176(4)
6.2.4 A view from the UK Part 2: The Terrorism Act 2006
180(3)
6.3 The demise of the traditional fourth estate' and the emergence of citizen journalism
183(9)
6.3.1 The `fourth estate' and the reporting of terrorist activity
183(3)
6.3.2 The demise of the traditional media and the rise of citizen journalism: a brave new world
186(6)
6.4 Conclusion
192(1)
Index 193
Laura Scaife is is a privacy practitioner and academic. She has appeared on the BBC and featured in New Statesman and on Radio 4. She regularly publishes scholarly articles on Social Media and is the author of The Handbook of Social Media and the Law, described in peer review as the seminal text in the area.