It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-032.mrc:146907307:5452
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-032.mrc:146907307:5452?format=raw

LEADER: 05452cam a2200781Ii 4500
001 15816174
005 20211225231534.0
006 m o d
007 cr cnu|||unuuu
008 150313t20152015enka ob 001 0 eng d
035 $a(OCoLC)ocn904799107
035 $a(NNC)15816174
040 $aN$T$beng$erda$epn$cN$T$dN$T$dE7B$dYDXCP$dDEBSZ$dOCLCO$dEBLCP$dOCLCF$dNAM$dCOH$dTYFRS$dOCL$dYDX$dCNKUC$dNRC$dOCLCQ$dOCL$dOCLCO$dU3W$dBUF$dOCLCQ$dCEF$dCUS$dUKMGB$dNLE$dOCLCQ$dOCLCA$dLEAUB$dAU@$dUKAHL$dOCLCQ$dSFB$dU9X
015 $aGBB542860$2bnb
016 7 $a017134403$2Uk
019 $a905991899$a958099811$a960443538$a1058685851$a1086499140$a1154304895$a1205508555$a1205578229
020 $a9781317908036$q(electronic bk.)
020 $a1317908031$q(electronic bk.)
020 $a9781315848822
020 $a1315848821
020 $a9781317908029
020 $a1317908023
020 $a9781317908012
020 $a1317908015
020 $z9780415732888
020 $z0415732883
024 8 $a40024730098
024 8 $a10.4324/9781315848822$2doi
035 $a(OCoLC)904799107$z(OCoLC)905991899$z(OCoLC)958099811$z(OCoLC)960443538$z(OCoLC)1058685851$z(OCoLC)1086499140$z(OCoLC)1154304895$z(OCoLC)1205508555$z(OCoLC)1205578229
037 $a1987356$bProquest Ebook Central
050 4 $aHV6773.15.C97$bT47 2015eb
072 7 $aBUS$x032000$2bisacsh
072 7 $aSOC$x000000$2bisacsh
082 04 $a363.3250285/4678$223
084 $aPOL000000$aPOL037000$aLAW104000$2bisacsh
049 $aZCUA
245 00 $aTerrorism Online :$bPolitics, Law and Technology /$cedited by Lee Jarvis, Stuart Macdonald and Thomas M. Chen.
264 1 $aAbingdon, Oxon ;$aNew York, NY :$bRoutledge,$c2015.
264 4 $c©2015
300 $a1 online resource (xi, 198 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
490 1 $aRoutledge studies in conflict, security and technology
504 $aIncludes bibliographical references and index.
520 $a"This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter. This book will be of interest to students of cyberterrorism, security studies and IR in general"--$cProvided by publisher.
588 0 $aVendor-supplied metadata.
505 0 $aCover; Half Title; Title Page; Copyright Page; Table of Contents; List of illustrations; Notes on contributors; Acknowledgements; Introduction: Terrorism online -- law, politics, technology; 1 Terrorism online: a new strategic environment; 2 Lone actor terrorist use of the Internet and behavioural correlates; 3 Hacktivism as an emerging cyberthreat: case study of a Turkish hacktivist group; 4 An updated cost-benefit view of cyberterrorism; 5 Cyberterrorism and Moral Panics: a reflection on the discourse of cyberterrorism; 6 Cyberterrorism, criminal law and punishment-based deterrence.
505 8 $a7 State surveillance in cyberspace: a new perspective on digital data practices by intelligence and security services8 Transatlantic collaboration in countering cyberterrorism; 9 The use of force as a response to cyberterrorism; Index.
650 0 $aCyberterrorism.
650 0 $aTerrorism.
650 0 $aComputer crimes$xPolitical aspects.
650 7 $aBUSINESS & ECONOMICS$xInfrastructure.$2bisacsh
650 7 $aSOCIAL SCIENCE$xGeneral.$2bisacsh
650 7 $aComputer crimes$xPolitical aspects.$2fast$0(OCoLC)fst00872067
650 7 $aCyberterrorism.$2fast$0(OCoLC)fst00885802
650 7 $aTerrorism.$2fast$0(OCoLC)fst01148101
650 7 $aTerrorismus$2gnd
650 7 $aInternetkriminalität$2gnd
655 0 $aElectronic books.
655 4 $aElectronic books.
700 1 $aJarvis, Lee,$d1979-$eeditor.
700 1 $aMacdonald, Stuart,$d1946-$eeditor.
700 1 $aChen, Thomas M.,$eeditor.
776 08 $iPrint version:$tTerrorism online.$dLondon ; New York : Routledge, Taylor & Francis Group, 2015$z9780415732888$w(DLC) 2014034280$w(OCoLC)887860854
830 0 $aRoutledge studies in conflict, security and technology.
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio15816174$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS