Terrorists' use of the internet : assessment and response /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , , |
Formato: | Electrónico Congresos, conferencias eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam, Netherlands :
IOS Press,
2017.
|
Colección: | NATO science for peace and security series. Human and societal dynamics ;
vol. 136. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Title Page; Preface; The Cyberterrorism Project; Contents; Terrorist Use of the Internet and Cyberspace: Issues and Responses; Cyberterrorism and Critical Infrastructure Protection; Cyberterrorism: A Challenge for External and Internal Security; Preliminary Analysis of Cyberterrorism Threats to Internet of Things (IoT) Applications; Critical Infrastructure Cyber-Security Risk Management; The Terrorist
- Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists; Cyber-Enabled Terrorist Financing; Online Terrorist Financing.
- Cybercrime-Funded Terrorism and the Threats Posed by Future Technologies: Appealing Economics and TargetsJihadi Online Propaganda: Purposes and Effects; Between the Arab Revolutions and the Islamic State's Caliphate: al-Qaeda Leaders' Online Propaganda 2012-2014; Radicalisers as Regulators: An Examination of Dabiq Magazine; The Role of Discourse Analysis in Terrorism Studies: Comparing Inspire and Dabiq; Learning from ISIS's Virtual Propaganda War for Western Muslims: A Comparison of Inspire and Dabiq; Online Jihadi Instructional Content: The Role of Magazines; Online Counterterrorism.
- Public Actors, Private Actors, and Cooperative ApproachesHard and Soft Power Approaches to Countering Online Extremism; Anglosphere Approaches to Counter-Terrorism in Cyberspace; Prosecuting Terrorist Activity in Canada; An Efficient Response to ISIS in Cyberspace: Public-Private Partnership; Prevention, Anti-Radicalisation and the Role of Social Media: A View from Germany; Online CVE Strategies; Counter-Terrorism Strategic Communications: Back to the Future
- Lessons from Past and Present; Interrupting Engagement with Online Extremist Content: Utilising ""Noisy"" Foreign Fighters.
- Interpreting Public Reactions to Terrorist Events Using Open Source Network AnalysisSurveillance; Reframing 'Mass Surveillance'; Beyond Big Data: Surveillance, Metadata and Technology-Enabled Intelligence Opportunities in Counter-Terrorism; National Security, Terrorism and the Legality of Secret Surveillance: The Case of France; Innovative Approaches/Responses; Internet Forensics as a Tool for Responding to Cyber-Fronts; (En)gendering Cyberterrorism in the UK News Media: A Discursive Analysis; Predicting the Emergence of Self-Radicalisation Through Social Media: A Complex Systems Approach.