Show simple item record

dc.contributor.authorScaife, Laura
dc.date.accessioned2022-02-11T04:01:39Z
dc.date.available2022-02-11T04:01:39Z
dc.date.issued2017
dc.date.submitted2022-02-10T12:47:59Z
dc.identifierONIX_20220210_9781317361855_14
dc.identifierhttps://library.oapen.org/handle/20.500.12657/52759
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/78186
dc.description.abstractTerrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.
dc.languageEnglish
dc.relation.ispartofseriesRoutledge Research in Information Technology and E-Commerce Law
dc.rightsopen access
dc.subject.otherCommunications Act 2003
dc.subject.otherCrime and Disorder Act 1998
dc.subject.otherhuman rights law
dc.subject.otherISIS
dc.subject.otherinformation society service
dc.subject.otherlegal and regulatory frameworks
dc.subject.otherMalicious Communications Act 1988
dc.subject.otherPublic Order Act 1986
dc.subject.otherRegulation of Investigatory Powers Act 2000
dc.subject.otherRight to Freedom of Expression
dc.subject.otherregulation of online content
dc.subject.otherSerious Crime Act 2007
dc.subject.othersocial media
dc.subject.otherTerrorism Act 2000
dc.subject.otherterrorism
dc.subject.othertraditional media
dc.subject.otherUnited Nations Counter-Terrorism Committee
dc.subject.otherthema EDItEUR::L Law::LN Laws of specific jurisdictions and specific areas of law::LNQ IT and Communications law / Postal laws and regulations
dc.subject.otherthema EDItEUR::L Law::LN Laws of specific jurisdictions and specific areas of law::LNJ Entertainment and media law
dc.titleSocial Networks as the New Frontier of Terrorism
dc.title.alternative#Terror
dc.typebook
oapen.identifier.doi10.4324/9781315668680
oapen.relation.isPublishedByfa69b019-f4ee-4979-8d42-c6b6c476b5f0
oapen.relation.isbn9781317361855
oapen.relation.isbn9780367874995
oapen.relation.isbn9781315668680
oapen.relation.isbn9781138950535
oapen.collectionKnowledge Unlatched (KU)
oapen.imprintRoutledge
oapen.pages216
dc.relationisFundedByKnowledge Unlatched


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

open access
Except where otherwise noted, this item's license is described as open access