LEADER 04571oam 2200865I 450 001 9910158572403321 005 20191203012600.0 010 $a1-315-66868-8 010 $a1-317-36184-9 010 $a1-317-36185-7 024 7 $a10.4324/9781315668680 035 $a(CKB)3710000001010652 035 $a(MiAaPQ)EBC4779322 035 $a(OCoLC)967982467 035 $a(ScCtBLL)9e525313-6eb4-49e2-81d1-b42de9c11df0 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/78186 035 $a(EXLCZ)993710000001010652 100 $a20180706d2017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aSocial networks as the new frontier of terrorism $e#terror /$fLaura Scaife 205 $a1 ed. 210 $cTaylor & Francis$d2017 210 1$aLondon ;$aNew York :$cRoutledge,$d2017. 215 $a1 online resource (233 pages) 225 1 $aRoutledge Research in IT and E-Commerce Law 300 $aIncludes index. 311 $a1-138-95053-X 327 $a1. One man's terrorist is another man's Facebook friend -- 2. Terrorism's love affair with social media -- 3. Freedom of the newsfeed -- 4. The spy who liked my tweet : counter-intelligence and the terrorists' reaction to Snowden -- 5. Let's start a #war -- 6. National security and the 'fourth estate' in a brave new social media world. 330 $aTerrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence.This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate.This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses. 410 0$aRoutledge research in IT and E-commerce law. 606 $aCyberterrorism$xLaw and legislation 606 $aOnline social networks$xLaw and legislation 606 $aNational security$xLaw and legislation 606 $aTerrorists$xSocial networks 606 $aInternet and terrorism 606 $aSocial media$xLaw and legislation 606 $aTerrorism$xPrevention$xLaw and legislation 610 $aCommunications Act 2003 610 $aCrime and Disorder Act 1998 610 $ahuman rights law 610 $aISIS 610 $ainformation society service 610 $alegal and regulatory frameworks 610 $aMalicious Communications Act 1988 610 $aPublic Order Act 1986 610 $aRegulation of Investigatory Powers Act 2000 610 $aRight to Freedom of Expression 610 $aregulation of online content 610 $aSerious Crime Act 2007 610 $asocial media 610 $aTerrorism Act 2000 610 $aterrorism 610 $atraditional media 610 $aUnited Nations Counter-Terrorism Committee 615 0$aCyberterrorism$xLaw and legislation. 615 0$aOnline social networks$xLaw and legislation. 615 0$aNational security$xLaw and legislation. 615 0$aTerrorists$xSocial networks. 615 0$aInternet and terrorism. 615 0$aSocial media$xLaw and legislation. 615 0$aTerrorism$xPrevention$xLaw and legislation. 676 $a344.05/325 676 $a344.05325 700 $aScaife$b Laura.$0981975 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910158572403321 996 $aSocial networks as the new frontier of terrorism$92241140 997 $aUNINA