Abstract
This book investigates the intersection of terrorism, digital technologies and cyberspace.
Recent years have witnessed a small, but growing, collection of book length publications dealing with cyber-terrorism or cognate issues. These existing books mostly take a single perspective: technological, political, or sociological. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a borader introduction to debates and developments that have largely been conducted in isolation to date.
Drawing together a range of key academics in the field, this edited volume is organised around three broad themes. First, how – and why – do terrorists engage with the Internet, digital technologies and cyberspace? Second, what threat do these various activities pose, and to whom? And, third, how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor to state-based. The book’s engagement with questions of law, politics, technology and beyond is intended to offer a holistic approach to this subject matter, and provides the unique selling point of the book.
This book will be of interest to students of cyberterrorism, security studies and IR in general.
Recent years have witnessed a small, but growing, collection of book length publications dealing with cyber-terrorism or cognate issues. These existing books mostly take a single perspective: technological, political, or sociological. In contrast, Terrorism Online utilises a multi-disciplinary framework to provide a borader introduction to debates and developments that have largely been conducted in isolation to date.
Drawing together a range of key academics in the field, this edited volume is organised around three broad themes. First, how – and why – do terrorists engage with the Internet, digital technologies and cyberspace? Second, what threat do these various activities pose, and to whom? And, third, how might these activities be prevented, deterred or responded to? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor to state-based. The book’s engagement with questions of law, politics, technology and beyond is intended to offer a holistic approach to this subject matter, and provides the unique selling point of the book.
This book will be of interest to students of cyberterrorism, security studies and IR in general.
Original language | English |
---|---|
Place of Publication | Abingdon |
Publisher | Routledge |
Number of pages | 224 |
ISBN (Print) | 978-0-415-73288-8 |
Publication status | Published - 18 Mar 2015 |
Publication series
Name | Routledge Studies in Conflict, Security and Technology |
---|