|
Showing 1 - 19 of
19 matches in All Departments
Text, Cases and Materials on Criminal Law offers a
thought-provoking, engaging and comprehensive account of criminal
law and its underpinning principles and policies. It includes a
range of carefully selected extracts to help you get used to
reading court judgments, legislation, official reports and academic
writings. Dedicated questions also help you to analyse each extract
and develop your critical thinking skills. A range of features,
specifically designed to help make your reading as interesting and
active as possible, are also available within each chapter
including: * Chapter objectives at the start of each chapter, and
checklists at the end, so that you know exactly what you need to
achieve and are able to assess your progress; * Practical
activities, so you can develop your legal skills by practising
applying what you have learnt to scenario-based problems; *
Self-test questions, which consolidate your understanding by
providing an opportunity to apply the material you have studied; *
Further reading lists, to enable you to explore key issues in
greater depth. This new edition has been fully updated with all
major legal developments in the area, including R v Jogee [2016]
UKSC 8 and R v Johnson [2016] EWCA Crim 1613 on joint enterprise
and the Law Commission's scoping report on non-fatal offences
against the person. Stuart Macdonald is Professor of Law at Swansea
University. He has taught criminal law for over 15 years and has
published widely on criminal justice issues, particularly the
regulation of anti-social behaviour and counterterrorism
legislation and policy.
This book offers the first sustained investigation into non-elite
understandings of radicalisation and counter-radicalisation policy.
Drawing on original focus group research with students from
universities across England and Wales, the book explores how
‘ordinary’ citizens understand radicalisation, how they make
sense of counter-radicalisation initiatives like the UK Prevent
Strategy, and how they evaluate its functioning and effects across
society. Radicalisation, counter-radicalisation and Prevent
demonstrates that these non-elite insights often contradict and
diverge from traditional (elite) security knowledge and thus shed
new light on wider questions around the politics of security. This
has vitally important implications not only for
counter-radicalisation and counter-terrorism policy but for the
very study and practice of security. -- .
This is the first book to present a multidisciplinary approach to
cyberterrorism. It traces the threat posed by cyberterrorism today,
with chapters discussing possible technological vulnerabilities,
potential motivations to engage in cyberterrorism, and the
challenges of distinguishing this from other cyber threats. The
book also addresses the range of potential responses to this threat
by exploring policy and legislative frameworks as well as a
diversity of techniques for deterring or countering terrorism in
cyber environments. The case studies throughout the book are global
in scope and include the United States, United Kingdom, Australia,
New Zealand and Canada. With contributions from distinguished
experts with backgrounds including international relations, law,
engineering, computer science, public policy and politics,
Cyberterrorism: Understanding, Assessment and Response offers a
cutting edge analysis of contemporary debate on, and issues
surrounding, cyberterrorism. This global scope and diversity of
perspectives ensure it is of great interest to academics, students,
practitioners, policymakers and other stakeholders with an interest
in cyber security.
Islamic State's Online Activity and Responses provides a unique
examination of Islamic State's online activity at the peak of its
"golden age" between 2014 and 2017 and evaluates some of the
principal responses to this phenomenon. Featuring contributions
from experts across a range of disciplines, the volume examines a
variety of aspects of IS's online activity, including their
strategic objectives, the content and nature of their magazines and
videos, and their online targeting of females and depiction of
children. It also details and analyses responses to IS's online
activity - from content moderation and account suspensions to
informal counter-messaging and disrupting terrorist financing - and
explores the possible impact of technological developments, such as
decentralised and peer-to-peer networks, going forward. Platforms
discussed include dedicated jihadi forums, major social media sites
such as Facebook, Twitter, and YouTube, and newer services,
including Twister. Islamic State's Online Activity and Responses is
essential reading for researchers, students, policymakers, and all
those interested in the contemporary challenges posed by online
terrorist propaganda and radicalisation. The chapters were
originally published as a special issue of Studies in Conflict
& Terrorism.
Along the coast of Fife, in villages like Culross and Pittenweem,
history records that some women were executed as witches.
Nevertheless, the reality of what happened the night that Janet
Cornfoot was lynched at Pittenweem is hard to grasp as one sits by
the harbour watching the fishing boats unload their catch and the
pleasure boats rising with the tide. How could people do this to an
old woman? Why was no-one ever brought to justice? And why would
anyone defend such a lynching? The task of the historian is to try
to make events in the past come alive and seem less strange. The
details of the witch-hunt are fascinating. Some of the anecdotes
are strange. The modern reader finds it hard to imagine illness
being blamed on the malevolence of a beggar woman denied charity,
or the economic failure of a sea voyage being attributed to the
village hag, not bad weather. Witch-hunting was related to ideas,
values, attitudes and political events. It was a complicated
process, involving religious and civil authorities, village
tensions and the fears of the elite. The witch-hunt in Scotland
also took place at a time when one of the main agendas was the
creation of a righteous or godly society. As a result, religious
authorities had control over aspects of people's lives which seem
as strange to us today as beliefs about magic or witchcraft. It was
not accidental that the witch-hunt in Scotland, and specifically in
Fife, should have happened at this time. This book tells the story
of what occurred over a period of a century and a half, and offers
some explanation as to why it occurred.
A fascinating and rigorously researched account of the ideas and
influence of the artists and teachers who brought about the major
advances in national art education during the nineteenth and
twentieth centuries. The outstanding artists to whom the Author
gives special attention are: Walter Crane, C.R. Ashbee, R.
Catterson-Smith, W.R. Lethaby, Fred Burridge and Fra Newbery. These
adherents of Morris believed in the unity of the arts and crafts
and in one of the central tenets of the Arts and Crafts movement:
namely, that work should represent pleasure, rather than a resented
duty. Furthermore, the same disciples insisted upon the students
working from memory, as well as from life; together these
approaches brought impressive gains for visual education. This
highly informative work examines each follower of the movement in
turn and also looks at the role played by progress in Glasgow. The
book concludes by confronting the dilemma faced by teachers of art
and design, which has arisen from the contemplation of the ideas of
Sir Herbert Read and the promoters of Conceptual Art.
Dr. Macdonald investigates the continuous developments of art and
design education in Italy, France, Britain, Germany, and the United
States. The study traces the philosophies of teachers from the age
of the guilds and the academies to today, and sets them in the
context of the general education theories of their times. Stuart
Macdonald clarifies the whole field of art education for research
and teaching purposes. He points out that the knowledge of the
principles and methods of art education is essential for a true
understanding of the art of different periods. He makes clear that
art education should be studied within the existing education
disciplines of history, philosophy, psychology, and sociology of
education. Essentially factual, using many quotations from primary
sources not generally available, this book gives a disciplined
grounding in a branch of the history of education, and describes
the philosophies which continue to govern courses in Art and
Design. This finely illustrated book provides a vivid review of the
history of art teaching.
This is the first book to present a multidisciplinary approach to
cyberterrorism. It traces the threat posed by cyberterrorism today,
with chapters discussing possible technological vulnerabilities,
potential motivations to engage in cyberterrorism, and the
challenges of distinguishing this from other cyber threats. The
book also addresses the range of potential responses to this threat
by exploring policy and legislative frameworks as well as a
diversity of techniques for deterring or countering terrorism in
cyber environments. The case studies throughout the book are global
in scope and include the United States, United Kingdom, Australia,
New Zealand and Canada. With contributions from distinguished
experts with backgrounds including international relations, law,
engineering, computer science, public policy and politics,
Cyberterrorism: Understanding, Assessment and Response offers a
cutting edge analysis of contemporary debate on, and issues
surrounding, cyberterrorism. This global scope and diversity of
perspectives ensure it is of great interest to academics, students,
practitioners, policymakers and other stakeholders with an interest
in cyber security.
This book investigates the intersection of terrorism, digital
technologies and cyberspace. The evolving field of cyber-terrorism
research is dominated by single-perspective, technological,
political, or sociological texts. In contrast, Terrorism Online
uses a multi-disciplinary framework to provide a broader
introduction to debates and developments that have largely been
conducted in isolation. Drawing together key academics from a range
of disciplinary fields, including Computer Science, Engineering,
Social Psychology, International Relations, Law and Politics, the
volume focuses on three broad themes: 1) how - and why - do
terrorists engage with the Internet, digital technologies and
cyberspace?; 2) what threat do these various activities pose, and
to whom?; 3) how might these activities be prevented, deterred or
addressed? Exploring these themes, the book engages with a range of
contemporary case studies and different forms of terrorism: from
lone-actor terrorists and protest activities associated with
'hacktivist' groups to state-based terrorism. Through the book's
engagement with questions of law, politics, technology and beyond,
the volume offers a holistic approach to cyberterrorism which
provides a unique and invaluable contribution to this subject
matter. This book will be of great interest to students of
cybersecurity, security studies, terrorism and International
Relations.
Whilst there are some studies of architecture in Scotland
post-devolution, writings on design are largely non-existent.
Designs on Democracy seeks to fill that gap and ranges over the
debates concerning architecture, urbanism, design and the Creative
and Cultural Industries and the policies, people and places that
stimulate and animate them. The book also tells a story about
Scotland's creatives -where they work and how their ideas and what
they create and design contribute to Scotland's democratic culture
and identity.
Islamic State's Online Activity and Responses provides a unique
examination of Islamic State's online activity at the peak of its
"golden age" between 2014 and 2017 and evaluates some of the
principal responses to this phenomenon. Featuring contributions
from experts across a range of disciplines, the volume examines a
variety of aspects of IS's online activity, including their
strategic objectives, the content and nature of their magazines and
videos, and their online targeting of females and depiction of
children. It also details and analyses responses to IS's online
activity - from content moderation and account suspensions to
informal counter-messaging and disrupting terrorist financing - and
explores the possible impact of technological developments, such as
decentralised and peer-to-peer networks, going forward. Platforms
discussed include dedicated jihadi forums, major social media sites
such as Facebook, Twitter, and YouTube, and newer services,
including Twister. Islamic State's Online Activity and Responses is
essential reading for researchers, students, policymakers, and all
those interested in the contemporary challenges posed by online
terrorist propaganda and radicalisation. The chapters were
originally published as a special issue of Studies in Conflict
& Terrorism.
This book explores the interface between terrorism and the internet
and presents contemporary approaches to understanding violent
extremism online. The volume focuses on four issues in particular:
terrorist propaganda on the internet; radicalisation and the
internet; counter campaigns and approaches to disrupting internet
radicalisation; and approaches to researching and understanding the
role of the internet in radicalisation. The book brings together
expertise from a wide range of disciplines and geographical regions
including Europe, the US, Canada and Australia. These contributions
explore the various roles played by the Internet in radicalisation;
the reasons why terroristic propaganda may or may not influence
others to engage in violence; the role of political conflict in
online radicalisation; and the future of research into terrorism
and the internet. By covering this broad range of topics, the
volume will make an important and timely addition to the current
collections on a growing and international subject. This book will
be of much interest to students and researchers of cyber-security,
internet politics, terrorism studies, media and communications
studies, and International Relations.
Semiconductor electronics is the major technology of our age. Its
achievement and potential are vast, its application and influence
ubiquitous, its social and economic consequences uncertain.
Semiconductor electronics has become the vehicle for nearly all
technological change and, consequently, the subject of much
discussion. This revised and up dated edition is offered as a basic
contribution to that vital discussion by authors who have long
studied the process of technological change and who are familiar
with the peculiarities of the semiconductor industry. Although it
dealt with a highly technical subject, the first edition proved
readily intelligible to a wide audience. The second edition is
designed for that same group - those who seek an understanding of
the processes at the heart of technological change.
This book explores the interface between terrorism and the internet
and presents contemporary approaches to understanding violent
extremism online. The volume focuses on four issues in particular:
terrorist propaganda on the internet; radicalisation and the
internet; counter campaigns and approaches to disrupting internet
radicalisation; and approaches to researching and understanding the
role of the internet in radicalisation. The book brings together
expertise from a wide range of disciplines and geographical regions
including Europe, the US, Canada and Australia. These contributions
explore the various roles played by the Internet in radicalisation;
the reasons why terroristic propaganda may or may not influence
others to engage in violence; the role of political conflict in
online radicalisation; and the future of research into terrorism
and the internet. By covering this broad range of topics, the
volume will make an important and timely addition to the current
collections on a growing and international subject. This book will
be of much interest to students and researchers of cyber-security,
internet politics, terrorism studies, media and communications
studies, and International Relations.
This book investigates the intersection of terrorism, digital
technologies and cyberspace. The evolving field of cyber-terrorism
research is dominated by single-perspective, technological,
political, or sociological texts. In contrast, Terrorism Online
uses a multi-disciplinary framework to provide a broader
introduction to debates and developments that have largely been
conducted in isolation. Drawing together key academics from a range
of disciplinary fields, including Computer Science, Engineering,
Social Psychology, International Relations, Law and Politics, the
volume focuses on three broad themes: 1) how - and why - do
terrorists engage with the Internet, digital technologies and
cyberspace?; 2) what threat do these various activities pose, and
to whom?; 3) how might these activities be prevented, deterred or
addressed? Exploring these themes, the book engages with a range of
contemporary case studies and different forms of terrorism: from
lone-actor terrorists and protest activities associated with
'hacktivist' groups to state-based terrorism. Through the book's
engagement with questions of law, politics, technology and beyond,
the volume offers a holistic approach to cyberterrorism which
provides a unique and invaluable contribution to this subject
matter. This book will be of great interest to students of
cybersecurity, security studies, terrorism and International
Relations.
Information is not taken seriously. Much is said about the
information age, the information economy, the information society,
and particularly about information technology, but little about
information itself. If these are important, then so is information.
But information is not as other goods: it has some peculiar
characteristics. It cannot be displayed for sale without giving it
away in the process. Sold, it goes to the buyer but still remains
with the seller. Buying entails expressing demand in ignorance for
buyers who do not know just what it is that they do not know. Such
characteristics have long been recognised by economists, but it is
not generally economists who have most to say about the importance
of information. This privilege is exercised by senior managers, who
speak passionately about knowledge-based, learning organizations;
by politicians and public servants, anxious to compensate with
policy and programme for the information failure of organization
and market; and by specialists in telecommunications and
information technology, bent on adding value to what they treat as
just a commodity. Information usually requires new information.
Finding, acquiring, and mixing
Much is said about the information age, the information economy, the information society, and above all about information technology. However, not much is said about information itself. The author investigates information as the central issue in a variety of areas: from patents to high technology and from corporate strategy to industrial espionage. In doing so he shows that the role information may play in processes of innovation and change is far from straightforward.
|
You may like...
Peekaboo!
Campbell Books
Board book
R195
R153
Discovery Miles 1 530
Ongeskonde
Alwyn Uys
Paperback
R240
R206
Discovery Miles 2 060
|