![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 16 of 16 matches in All Departments
This book offers the first sustained investigation into non-elite understandings of radicalisation and counter-radicalisation policy. Drawing on original focus group research with students from universities across England and Wales, the book explores how ‘ordinary’ citizens understand radicalisation, how they make sense of counter-radicalisation initiatives like the UK Prevent Strategy, and how they evaluate its functioning and effects across society. Radicalisation, counter-radicalisation and Prevent demonstrates that these non-elite insights often contradict and diverge from traditional (elite) security knowledge and thus shed new light on wider questions around the politics of security. This has vitally important implications not only for counter-radicalisation and counter-terrorism policy but for the very study and practice of security. -- .
Text, Cases and Materials on Criminal Law offers a thought-provoking, engaging and comprehensive account of criminal law and its underpinning principles and policies. It includes a range of carefully selected extracts to help you get used to reading court judgments, legislation, official reports and academic writings. Dedicated questions also help you to analyse each extract and develop your critical thinking skills. A range of features, specifically designed to help make your reading as interesting and active as possible, are also available within each chapter including: * Chapter objectives at the start of each chapter, and checklists at the end, so that you know exactly what you need to achieve and are able to assess your progress; * Practical activities, so you can develop your legal skills by practising applying what you have learnt to scenario-based problems; * Self-test questions, which consolidate your understanding by providing an opportunity to apply the material you have studied; * Further reading lists, to enable you to explore key issues in greater depth. This new edition has been fully updated with all major legal developments in the area, including R v Jogee [2016] UKSC 8 and R v Johnson [2016] EWCA Crim 1613 on joint enterprise and the Law Commission's scoping report on non-fatal offences against the person. Stuart Macdonald is Professor of Law at Swansea University. He has taught criminal law for over 15 years and has published widely on criminal justice issues, particularly the regulation of anti-social behaviour and counterterrorism legislation and policy.
Islamic State's Online Activity and Responses provides a unique examination of Islamic State's online activity at the peak of its "golden age" between 2014 and 2017 and evaluates some of the principal responses to this phenomenon. Featuring contributions from experts across a range of disciplines, the volume examines a variety of aspects of IS's online activity, including their strategic objectives, the content and nature of their magazines and videos, and their online targeting of females and depiction of children. It also details and analyses responses to IS's online activity - from content moderation and account suspensions to informal counter-messaging and disrupting terrorist financing - and explores the possible impact of technological developments, such as decentralised and peer-to-peer networks, going forward. Platforms discussed include dedicated jihadi forums, major social media sites such as Facebook, Twitter, and YouTube, and newer services, including Twister. Islamic State's Online Activity and Responses is essential reading for researchers, students, policymakers, and all those interested in the contemporary challenges posed by online terrorist propaganda and radicalisation. The chapters were originally published as a special issue of Studies in Conflict & Terrorism.
This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
Information is not taken seriously. Much is said about the information age, the information economy, the information society, and particularly about information technology, but little about information itself. If these are important, then so is information. But information is not as other goods: it has some peculiar characteristics. It cannot be displayed for sale without giving it away in the process. Sold, it goes to the buyer but still remains with the seller. Buying entails expressing demand in ignorance for buyers who do not know just what it is that they do not know. Such characteristics have long been recognised by economists, but it is not generally economists who have most to say about the importance of information. This privilege is exercised by senior managers, who speak passionately about knowledge-based, learning organizations; by politicians and public servants, anxious to compensate with policy and programme for the information failure of organization and market; and by specialists in telecommunications and information technology, bent on adding value to what they treat as just a commodity. Information usually requires new information. Finding, acquiring, and mixing
Islamic State's Online Activity and Responses provides a unique examination of Islamic State's online activity at the peak of its "golden age" between 2014 and 2017 and evaluates some of the principal responses to this phenomenon. Featuring contributions from experts across a range of disciplines, the volume examines a variety of aspects of IS's online activity, including their strategic objectives, the content and nature of their magazines and videos, and their online targeting of females and depiction of children. It also details and analyses responses to IS's online activity - from content moderation and account suspensions to informal counter-messaging and disrupting terrorist financing - and explores the possible impact of technological developments, such as decentralised and peer-to-peer networks, going forward. Platforms discussed include dedicated jihadi forums, major social media sites such as Facebook, Twitter, and YouTube, and newer services, including Twister. Islamic State's Online Activity and Responses is essential reading for researchers, students, policymakers, and all those interested in the contemporary challenges posed by online terrorist propaganda and radicalisation. The chapters were originally published as a special issue of Studies in Conflict & Terrorism.
This book explores the interface between terrorism and the internet and presents contemporary approaches to understanding violent extremism online. The volume focuses on four issues in particular: terrorist propaganda on the internet; radicalisation and the internet; counter campaigns and approaches to disrupting internet radicalisation; and approaches to researching and understanding the role of the internet in radicalisation. The book brings together expertise from a wide range of disciplines and geographical regions including Europe, the US, Canada and Australia. These contributions explore the various roles played by the Internet in radicalisation; the reasons why terroristic propaganda may or may not influence others to engage in violence; the role of political conflict in online radicalisation; and the future of research into terrorism and the internet. By covering this broad range of topics, the volume will make an important and timely addition to the current collections on a growing and international subject. This book will be of much interest to students and researchers of cyber-security, internet politics, terrorism studies, media and communications studies, and International Relations.
This book explores the interface between terrorism and the internet and presents contemporary approaches to understanding violent extremism online. The volume focuses on four issues in particular: terrorist propaganda on the internet; radicalisation and the internet; counter campaigns and approaches to disrupting internet radicalisation; and approaches to researching and understanding the role of the internet in radicalisation. The book brings together expertise from a wide range of disciplines and geographical regions including Europe, the US, Canada and Australia. These contributions explore the various roles played by the Internet in radicalisation; the reasons why terroristic propaganda may or may not influence others to engage in violence; the role of political conflict in online radicalisation; and the future of research into terrorism and the internet. By covering this broad range of topics, the volume will make an important and timely addition to the current collections on a growing and international subject. This book will be of much interest to students and researchers of cyber-security, internet politics, terrorism studies, media and communications studies, and International Relations.
This book investigates the intersection of terrorism, digital technologies and cyberspace. The evolving field of cyber-terrorism research is dominated by single-perspective, technological, political, or sociological texts. In contrast, Terrorism Online uses a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or addressed? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists and protest activities associated with 'hacktivist' groups to state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach to cyberterrorism which provides a unique and invaluable contribution to this subject matter. This book will be of great interest to students of cybersecurity, security studies, terrorism and International Relations.
This book investigates the intersection of terrorism, digital technologies and cyberspace. The evolving field of cyber-terrorism research is dominated by single-perspective, technological, political, or sociological texts. In contrast, Terrorism Online uses a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or addressed? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists and protest activities associated with 'hacktivist' groups to state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach to cyberterrorism which provides a unique and invaluable contribution to this subject matter. This book will be of great interest to students of cybersecurity, security studies, terrorism and International Relations.
This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
Semiconductor electronics is the major technology of our age. Its achievement and potential are vast, its application and influence ubiquitous, its social and economic consequences uncertain. Semiconductor electronics has become the vehicle for nearly all technological change and, consequently, the subject of much discussion. This revised and up dated edition is offered as a basic contribution to that vital discussion by authors who have long studied the process of technological change and who are familiar with the peculiarities of the semiconductor industry. Although it dealt with a highly technical subject, the first edition proved readily intelligible to a wide audience. The second edition is designed for that same group - those who seek an understanding of the processes at the heart of technological change.
Much is said about the information age, the information economy, the information society, and above all about information technology. However, not much is said about information itself. The author investigates information as the central issue in a variety of areas: from patents to high technology and from corporate strategy to industrial espionage. In doing so he shows that the role information may play in processes of innovation and change is far from straightforward.
Canadians were once church-goers. During the post-war boom of the 1950s, Canadian churches were vibrant institutions, with attendance rates even higher than in the United States, but the following decade witnessed emptying pews. What happened? In Leaving Christianity Brian Clarke and Stuart Macdonald quantitatively map the nature and extent of Canadians' disengagement with organized religion and assess the implications for Canadian society and its religious institutions. Drawing on a wide array of national and denominational statistics, they illustrate how the exodus that began with disaffected baby boomers and their parents has become so widespread that religiously unaffiliated Canadians are now the new majority. While the old mainstream Protestant churches have been the hardest hit, the Roman Catholic Church has also experienced a significant decline in numbers, especially in Quebec. Canada's civil society has historically depended on church members for support, and a massive drift away from churches has profound implications for its future. Leaving Christianity documents the true extent of the decline, the timing of it, and the reasons for this major cultural shift.
|
You may like...
Numerical Simulation of Distributed…
Tiberiu Colosi, Mihail-Ioan Abrudean, …
Hardcover
R3,471
Discovery Miles 34 710
Tsunami: Progress in Prediction…
Yoshito Tsuchiya, Nobuo Shuto
Hardcover
R4,072
Discovery Miles 40 720
Abnormal Psychology - An Integrative…
V. Durand, David Barlow, …
Paperback
(1)R930 Discovery Miles 9 300
Chaos in Structural Mechanics
Jan Awrejcewicz, Vadim Anatolevich Krysko
Hardcover
R4,246
Discovery Miles 42 460
|