The Locator -- [(author = "Stuart Keith")]

6 records matched your query       


Record 1 | Previous Record | MARC Display | Next Record | Search Results
Author:
NATO Advanced Research Workshop on Terrorists' Use of the Internet (2016 : Dublin, Ireland)
Title:
Terrorists' use of the internet : assessment and response / edited by Maura Conway, Professor of International Security at Dublin City University ; Lee Jarvis, Reader in International Security at the University of East Anglia ; Orla Lehane, PhD Candidate in the School of Law and Government at Dublin City University ; Stuart Macdonald, Professor of Law at Swansea University ; and Lella Nouri, Lecturer of Criminology at Swansea University.
Publisher:
IOS Press,
Copyright Date:
2017
Description:
xix, 393 pages : illustrations ; 24 cm.
Subject:
Internet and terrorism--Congresses.
Terrorism--Prevention--Congresses.
Internet and terrorism.
Terrorism--Prevention.
Conference papers and proceedings.
Other Authors:
Conway, Maura, editor.
Jarvis, Lee, 1979- editor.
Lehane, Orla, editor.
Macdonald, Stuart Keith, 1979- editor.
Nouri, Lella, editor.
Notes:
Proceedings of the NATO Advanced Research Workshop on Terrorists' Use of the Internet, Dublin, Ireland, 27-29 June 2016. International conference proceedings. Includes bibliographical references and indexes.
Contents:
Title Page; Preface; The Cyberterrorism Project; Contents; Terrorist Use of the Internet and Cyberspace: Issues and Responses; Cyberterrorism and Critical Infrastructure Protection; Cyberterrorism: A Challenge for External and Internal Security; Preliminary Analysis of Cyberterrorism Threats to Internet of Things (IoT) Applications; Critical Infrastructure Cyber-Security Risk Management; The Terrorist -- Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists; Cyber-Enabled Terrorist Financing; Online Terrorist Financing
Cybercrime-Funded Terrorism and the Threats Posed by Future Technologies: Appealing Economics and TargetsJihadi Online Propaganda: Purposes and Effects; Between the Arab Revolutions and the Islamic State's Caliphate: al-Qaeda Leaders' Online Propaganda 2012-2014; Radicalisers as Regulators: An Examination of Dabiq Magazine; The Role of Discourse Analysis in Terrorism Studies: Comparing Inspire and Dabiq; Learning from ISIS's Virtual Propaganda War for Western Muslims: A Comparison of Inspire and Dabiq; Online Jihadi Instructional Content: The Role of Magazines; Online Counterterrorism
Public Actors, Private Actors, and Cooperative ApproachesHard and Soft Power Approaches to Countering Online Extremism; Anglosphere Approaches to Counter-Terrorism in Cyberspace; Prosecuting Terrorist Activity in Canada; An Efficient Response to ISIS in Cyberspace: Public-Private Partnership; Prevention, Anti-Radicalisation and the Role of Social Media: A View from Germany; Online CVE Strategies; Counter-Terrorism Strategic Communications: Back to the Future -- Lessons from Past and Present; Interrupting Engagement with Online Extremist Content: Utilising ""Noisy"" Foreign Fighters
Interpreting Public Reactions to Terrorist Events Using Open Source Network AnalysisSurveillance; Reframing 'Mass Surveillance'; Beyond Big Data: Surveillance, Metadata and Technology-Enabled Intelligence Opportunities in Counter-Terrorism; National Security, Terrorism and the Legality of Secret Surveillance: The Case of France; Innovative Approaches/Responses; Internet Forensics as a Tool for Responding to Cyber-Fronts; (En)gendering Cyberterrorism in the UK News Media: A Discursive Analysis; Predicting the Emergence of Self-Radicalisation Through Social Media: A Complex Systems Approach
Summary:
Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack.0This book presents revised versions of a selection of papers delivered at the NATO Advanced Research Workshop (ARW) on ?Terrorists? Use of the Internet? held in Dublin, Ireland in June 2016. One aim of the workshop was to nurture dialogue between members of the academic, policy and practitioner communities, so the 60 delegates from 13 countries who attended the workshop included representatives from each of these. The participants encompassed a wide range of expertise (including engineering, computer science, law, criminology, political science, international relations, history, and linguistics) and the chapters contained herein reflect these diverse professional and disciplinary backgrounds. The workshop also aimed to address the convergence of threats. Following an introduction which provides an overview of the various ways in which terrorists use the Internet, the book?s remaining 25 chapters are grouped into 5 sections on cyber terrorism and critical infrastructure protection; cyber-enabled terrorist financing; jihadi online propaganda; online counterterrorism; and innovative approaches and responses.
Series:
NATO science for peace and security series, E, Human and societal dynamics ; vol. 136
ISBN:
1614997640
9781614997641
OCLC:
(OCoLC)994231559
Locations:
OVUX522 -- University of Iowa Libraries (Iowa City)

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.