Academic literature on the topic 'Internet and terrorism – Canada'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet and terrorism – Canada.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internet and terrorism – Canada"

1

Isla Joulain, Gabriel Luis. "Célibes involuntarios: ¿Terroristas?. Análisis cualitativo del fenómeno “InCel” y discusión conceptual sobre el “terrorismo”." Revista de Derecho Penal y Criminología, no. 24 (May 13, 2021): 193–244. http://dx.doi.org/10.5944/rdpc.24.2020.28400.

Full text
Abstract:
Los Célibes Involuntarios (InCels) son un grupo de varones, reunidos en foros en Internet, que odian fuertemente a las mujeres por rechazar sus acercamientos afectivo-sexuales, a los que ellos creen tener derecho por naturaleza, y a los hombres atractivos y sexualmente activos, que restringen sus posibilidades con las mujeres y los condenan a la soledad. Y desean utilizar la violencia contra todos ellos; siendo que seis InCels ya han asesinado en masa a un total de 27 personas y herido a 43 en Estados Unidos y Canadá entre 2014 y 2019. En este trabajo, se debate la inclusión de este grupo en la categoría de terrorista. Para ello, primero se exponen las controversias y las características definitorias del terrorismo. Después, se realiza un análisis exhaustivo con metodología cualitativa de los asesinatos InCels mediante un revisión de 54 artículos en prensa y de los manifiestos ideológicos publicados por tres perpetradores. Se debate entonces la inclusión de los InCels en la categoría de terroristas, siguiendo los criterios definitorios del terrorismo expuestos en la introducción. Se concluye que los InCels no pueden considerarse hoy día un fenómeno terrorista, pero sí muy parecido, al cumplir cuatro de los seis criterios pero carecer de dos: una intención real de imponer su voluntad a los poderes estatales y un intento de subvertir los principios democráticos fundamentales. Finalmente, se critican los problemas de ética, rigurosidad y utilidad del concepto de terrorismo, proponiendo su abandono, explicitando la esterilidad del debate planteado y privilegiando el estudio de las causas macroestructurales e histórico-individuales específicas a las conductas concretas de los InCels.The Involuntary Celibates (InCels) are a group of men, gathered in forums on the Internet, who strongly hate women since they reject their affective-sexual approaches, to which they believe they are entitled by nature, and attractive and sexually active men, who restrict their possibilities with women and condemn them to loneliness. Inaddition, some of its members wish to use violence against all of them. Six InCels have already carried out mass murders in the United States and Canada, out of which a total of 27 people were killed and 43 injured between 2014 and 2019. In this paper, the inclusion of this group in the category of terrorist is discussed. To do this, the controversias and defining characteristics of terrorism are first exposed. Then, an exhaustive analysis with qualitative methodology of the InCels murders is carried out through a review of 54 press articles and of the ideological manifestos published by three perpetrators. The inclusion of InCels in the category of terrorists is then discussed, following the defining criteria of terrorism set out in the introduction. It is concluded that the InCels cannot be considered today a terrorist phenomenon, but a very similar one, fulfilling four of the six criteria but lacking other two: a real intention to impose their will on the state powers, and an attempt to subvert fundamental democratic principles. Finally, the problems of ethics, rigor and usefulness of the concept of terrorism are criticized, proposing its abandonment, making explicit the sterility of the proposed debate and favoring the study of macrostructural and historicalindividual causes specific to the concrete behaviors of the InCels.
APA, Harvard, Vancouver, ISO, and other styles
2

deKieffer, Donald E. "The Internet and the Globalization of Counterfeit Drugs." Journal of Pharmacy Practice 19, no. 3 (June 2006): 171–77. http://dx.doi.org/10.1177/0897190006292949.

Full text
Abstract:
Most Internet users receive unsolicited invitations to enhance their health through the purchase of online medications. Often these medications are illegal and may even be counterfeit. However, there are a few legitimate online pharmacies. The National Association of Boards of Pharmacy has established the Verified Internet Pharmacy Practice Sites program, which certifies the legitimacy of some Internet merchants. Also, there are hundreds of Canadian pharmacies online because of the rise in popularity of Canadian drugs. The actual number of online Canadian pharmacies is difficult to estimate, and many of the so-called Canadian pharmacies are not from Canada. Besides the few legitimate sites in the United States and Canada, most online pharmacies deal with unapproved, illegal, and counterfeit medication. It is hard to know the number of online pharmacies because of the complex structure of the Internet. Their rapid growth can mainly be attributed to huge profits, but online pharmacies are also used for money laundering and may be used for terrorism. Although the United States has been limited in its actions, it still has taken numerous measures. However, internationally, online pharmacies do not appear to be as much of a problem, so almost any action taken has been led by the United States.
APA, Harvard, Vancouver, ISO, and other styles
3

Young, Dean R. "A look in the back yard: Mitigating home-grown extremism in Canada." Journal of Community Safety and Well-Being 5, no. 1 (April 23, 2020): 15. http://dx.doi.org/10.35502/jcswb.118.

Full text
Abstract:
Canada has the capability to provide a significant security blanket with which to protect Canadian citizens from the effects of terrorism. I will discuss the scholarly work in the area of extremism and associated ideologies. Contemporary issues of environmentalism, race and gender, and government legitimacy will be examined with respect to how theycontribute to growing extremist segments of Canadian society. Findings support the argument that, as society grows in its liberal approaches, extreme ideologies from those on the fringes may begin to grow in order to counter the influence of opposing views and social policy. This article closes with a discussion of how the growth of extremism may be mitigated through attention to history and societal development, asserting control over the Internet, strengthening the criminaljustice system, and education.
APA, Harvard, Vancouver, ISO, and other styles
4

Meyers, Sarah. "How Canadian Intelligence is Exposed to the Impact of Globalization: A Critical Analysis of the Security Threat of Right-Wing Extremism." Journal of Intelligence, Conflict, and Warfare 1, no. 2 (November 15, 2018): 11. http://dx.doi.org/10.21810/jicw.v1i2.637.

Full text
Abstract:
It could be argued that Canadian intelligence has been negligent toward the impact of globalisation when assessing the security threat of right-wing extremism (RWE), specifically with the advent of the internet and the significant reduction of the influence of state borders on national policy objectives, and therefore has exposed itself to the potential of intelligence failure. This paper is focused on the state of right-wing extremism in Canada through which it addresses the security question: How is Canadian intelligence exposed to the impact of globalisation? The results of this paper are informed by an in-depth analysis of peer-reviewed articles from Canada, the United States (US), and Europe, as well as Canadian government documents, and newspaper articles, as well as the completion of a key assumptions, check to address bias and better evaluate the evidence found. This paper concludes that it appears likely that Canadian intelligence may not be assessing RWE threats through the lens of globalisation. It could be argued that this creates the potential for intelligence failure. However, there remains one significant caveat. It can be interpreted in Public Safety Canada’s latest update that RWE may soon be considered a type of terrorism. If this is the case, the evidence proves that Canadian intelligence may in fact be considering the impact of globalisation in the context of terrorism and therefore would likely implement the same consideration for RWE.
APA, Harvard, Vancouver, ISO, and other styles
5

Kollek, Daniel. "Terrorism in Canada." Prehospital and Disaster Medicine 18, no. 2 (June 2003): 71–79. http://dx.doi.org/10.1017/s1049023x00000790.

Full text
Abstract:
AbstractThis paper reviews terrorism in Canada, assessing the incidence and nature of terrorist activity, the potential targets of terrorist attacks, risk factors to Canadian nationals and institutions, and the responses of the Canadian government in dealing with the threat and the effectiveness of those responses.Despite the fact that there have been no recent high-profile terrorist events in Canada, this country has a serious terrorism problem, the key manifestation of which is the multitude of terrorist organizations that have designated Canada as a base of operations. In addition, Canadians have been attacked overseas and Canadian organizations, both local and abroad, are potential targets of terrorist activity. Canadian attempts to deal with terrorism through foreign and domestic policy have been ineffective, primarily because the policies have been poorly enforced. Until recently, terrorist organizations legally could raise funds in Canada, in direct contravention of international treaties signed by Canada. It is possible that the ineffectiveness in enforcing the anti-terrorism legislation stems from hope that placating terrorist organizations, and the countries that support them, will prevent Canada from becoming a target. Unfortunately evidence from other countries has shown this strategy to be ineffective.
APA, Harvard, Vancouver, ISO, and other styles
6

Kitchen, Veronica, and Karthika Sasikumar. "Canada (En)Counters Terrorism: U.S.-Canada Relations and Counter-terrorism Policy." Terrorism and Political Violence 21, no. 1 (January 5, 2009): 155–73. http://dx.doi.org/10.1080/09546550802587572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

LaFree, Gary. "Terrorism and the Internet." Criminology & Public Policy 16, no. 1 (February 2017): 93–98. http://dx.doi.org/10.1111/1745-9133.12292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

JOHNSON, JEFF. "TERRORISM TRUMPS INTERNET ACCESS." Chemical & Engineering News 78, no. 27 (July 3, 2000): 16–17. http://dx.doi.org/10.1021/cen-v078n027.p016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lewis, James A. "The Internet and Terrorism." Proceedings of the ASIL Annual Meeting 99 (2005): 112–15. http://dx.doi.org/10.1017/s0272503700071196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meserve, Stephen A., and Daniel Pemstein. "Terrorism and internet censorship." Journal of Peace Research 57, no. 6 (October 29, 2020): 752–63. http://dx.doi.org/10.1177/0022343320959369.

Full text
Abstract:
The internet provides a powerful tool to terror organizations, enhancing their public messaging, recruitment ability, and internal communication. In turn, governments have increasingly moved to disrupt terror organizations’ internet communications, and even democracies now routinely work to censor terrorist propaganda, and related political messaging, in the name of national security. We argue that democratic states respond to terror attacks by increasing internet censorship and broadening their capacity to limit the digital dissemination of information. This article builds on previous work suggesting this relationship, substantially improving measurement and estimation strategy. We use latent variable modeling techniques to create a new measure of internet censorship, cross nationally and over time, from internet firm transparency reports, and compare this measure to an expert-survey based indicator. Leveraging both measures, we use a variety of panel specifications to establish that, in democracies, increases in terror predict surges in digital censorship. Finally, we examine the posited relationship using synthetic control methods in a liberal democracy that experienced a large shock in terror deaths, France, showing that digital censorship ramped up after several large terrorist attacks.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Internet and terrorism – Canada"

1

Ducol, Benjamin. "Devenir jihadiste à l'ère numérique : une approche processuelle et situationnelle de l'engagement jihadiste au regard du Web." Doctoral thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/25744.

Full text
Abstract:
Les individus peuvent-ils véritablement verser dans la militance clandestine violente sous l’influence des réseaux numériques? Au cours de la dernière décennie, le cyberespace a en effet été caractérisé par la prolifération des cybercontenus défendant l’engagement clandestin violent comme une avenue d’action légitime. Le mouvement jihadiste et ses acteurs ne constituent à cet égard pas une exception dans l’utilisation des réseaux numériques à des fins de mobilisation militante. C’est à cette forme de militance particulière qu’est consacrée la présente thèse. Notre thèse vise plus spécifiquement à explorer la problématique du rôle des espaces numériques dans les phénomènes d’engagement jihadiste contemporains. Elle a pour ambition de clarifier, tant d’un point de vue théorique que d’un point de vue empirique, les mécanismes complexes qui conduisent certains individus à s’engager dans ces formes radicalisées d’activisme, en interrogeant l’empreinte des environnements numériques dans ces comportements sociologiquement déviants. Mobilisant une architecture théorique inspirée par la théorie de l’action situationnelle (TAS), nous appréhendons l’entrée dans la militance jihadiste dans une perspective processuelle et situationnelle. À partir d’une enquête de terrain réalisée dans trois pays — Canada, Belgique et France —, notre thèse mobilise l’outil biographique ou plutôt le récit de vie, comme un instrument méthodologique permettant d’appréhender les douze trajectoires individuelles observées. Au final, notre thèse conduit à nuancer le rôle des espaces numériques vis-à-vis des trajectoires d’engagement dans le jihadisme. Dans une vaste majorité des cas, l’Internet ne constitue qu’un outil de renforcement des croyances et de construction des justifications morales entourant l’engagement des individus dans l’activisme jihadiste. Dans un nombre de cas plus restreint, le cyberespace joue néanmoins un rôle crucial comme contexte d’exposition initial à l’univers militant. En conclusion, il semble impossible de conclure que l’engagement dans le militantisme clandestin puisse s’opérer par la simple exposition d’un individu à des espaces numériques validant cette avenue d’action. La prise en considération des influences environnementales et du contexte cognitif dans lequel se trouvent les individus apparaît une considération indispensable pour faire sens du poids que les environnements numériques font peser, de manière différenciée, sur les trajectoires d’engagement dans le jihadisme. Mots clés : jihadisme, engagement clandestin, Internet, environnements numériques, radicalisation.
APA, Harvard, Vancouver, ISO, and other styles
2

Diab, Robert. "Terrorism and the administration of justice in Canada." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/32370.

Full text
Abstract:
This thesis explores ways in which perspectives in Canada on the administration of justice have shifted after September 11, 2001, in criminal and administrative law. The introductory chapter sets out the general context of my thesis, including a discussion of the development of due process and constitutional rights, and a brief comparison between American, British and Canadian legislative responses to 9 /11. Chapter 2 concerns the context, in which the Canadian Anti-terrorism Act (2001) was drafted, the government's understanding of its purpose and function, and critical reception of the Act. In the face of considerable skepticism, the government (and a minority of sympathetic figures) insisted upon the consistency of the Act with the Canadian Charier of Rights and Freedoms, and argued that it struck a balance between individual and communal interests in a new yet appropriate fashion. Chapter 3 focuses on judicial responses to anti-terror legislation, including provisions dealings with 'security certificate' detentions; the deportation of terrorist suspects to face the risk of torture; and provisions of the Anti- terrorism Act. The cases suggest a general tendency to justify or rationalize departures, from traditional notions of due process, constitutionalism and 'fundamental justice' (in section 7 of the Charter) as appropriate, balanced, and normal. Chapter 4 addresses the problem of accountability of law enforcement and intelligence agencies in light of the post-9/11 amendments to the Canada Evidence Act that significantly expand the scope of state secrecy and privilege in 'national security' matters.
Law, Peter A. Allard School of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
3

Kelly, Michael J. Carleton University Dissertation Political Science. "The media and terrorism; an examination of news coverage of Armenian terrorism in Canada." Ottawa, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Algwaiz, Noura. "Modeling Internet Penetration in Canada." Thesis, University of Ottawa (Canada), 2010. http://hdl.handle.net/10393/28733.

Full text
Abstract:
Internet penetration is an important measure for a knowledge-based economy as it indicates how connected it is to the internet. It does not spread evenly across regions and societies, which results in digital divides. Despite being one of the most connected countries, Canada suffers from uneven penetration rates across the country. In this research, we study the socio-economic factors that int1uence Internet penetration in Canada. We found that the int1uence of rurality has decreased between 2005 and 2007, which suggests that initiatives that took place in those two years were effective. We also analyze the differences among the regions of Canada and found that the regions least int1uenced by the demographic variables are not necessarily the ones with the highest penetration rates. Therefore, a mere look at the penetration rates across the regions is not enough to assess the connectivity of the region and the digital divide within.
APA, Harvard, Vancouver, ISO, and other styles
5

Banez, Justin D. "The internet and homegrown jihadist terrorism assessing U.S. detection techniques." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5027.

Full text
Abstract:
Approved for public release; distribution is unlimited
The idea of homegrown terrorism is not a new concept, especially considering the history of challenges faced by the United States and other Western countries. However, the current violent jihadist problem has overshadowed those past misfortunes in terms of its objective and volatility. What is emergent is the means by which the individuals involved in this movement reinforce or possibly operationalize their radicalized behavior. The Internet is often that vehicle. Efforts to reform U.S. intelligence have placed increasing value on open source information for threat assessments. Consequently, the open Internet has been targeted in search of radical actors, both foreign and homegrown. Some analysts contend that the availability of radical discourse on the Internet presents an opportunity for early identification by authorities. This thesis analyzes the value of open source exploitation of the Internet in the domestic counterterrorism role in relation to other detection techniques in order to extract best practices and lessons learned for improved intelligence and law enforcement activities.
APA, Harvard, Vancouver, ISO, and other styles
6

Sampson, Kirk J. "Winning the battle of ideas through individual resiliency a multi-dimensional approach for countering radicalization in the homeland /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FSampson.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Supinski, Stanley ; Strindberg, Anders. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Community Outreach, Counterradicalization, Counterterrorism, Deradicalization, Education, Extremism, Homeland Security, Internet, Media, Multi-Discipline, Multi-Dimensional, Radicalization, Resiliency, Terrorism. Includes bibliographical references (p. 123-143). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Wilson, II Samuel Forrest. "Terrorist Experts' Perceptions of how the Internet has Shaped International Terrorism." ScholarWorks, 2014. http://scholarworks.waldenu.edu/dissertations/110.

Full text
Abstract:
Mass media and the Internet have emerged as enablers for terrorist planning, facilitation, and communication. The Internet allows terrorists to operate without the confines of borders and increases the potential impact on victims. The purpose of this phenomenological study was to explore the perceptions of American terrorist experts on how terrorists' Internet use has shaped international terrorism. Stepanova's asymmetric conflict theory served as the theoretical framework of this study. Specifically, this study explored terrorists' Internet-based recruitment strategies, the ways in which those recruitment efforts were supported in the United States, the measures to counter such recruitment efforts, and the future direction of terrorist recruitment in the 21st century. Data were collected through in-depth semistructured interviews with a purposive sample of 10 American terrorist experts. Data were analyzed using thematic coding. Findings indicated that terrorists' Internet use has resulted in challenges for counterterrorism agencies in the United States and abroad due to the ability of terrorists to easily close, change, and create new websites or accounts. These findings may inform the work of domestic and international counterterrorism entities in creating policy objectives that address the fluid nature of Internet recruitment, including proactive and coordinated responses by member states. This action may improve the United States' security through more effective recognition and response to terrorist Internet tactics.
APA, Harvard, Vancouver, ISO, and other styles
8

Reilly, Paul John. "Framing online communications of civil and uncivil groups in post-conflict Northern Ireland." Connect to e-thesis. Move to record for print version, 2008. http://theses.gla.ac.uk/131/.

Full text
Abstract:
Thesis (Ph.D.) - University of Glasgow, 2008.
Ph.D. thesis submitted to the Faculty of Law, Business and Social Sciences, Department of Politics, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
APA, Harvard, Vancouver, ISO, and other styles
9

teBrake, Rebecca. "Campaigning online : the internet, elections and democracy in Canada." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/24891.

Full text
Abstract:
As political engagement declines in Western democracies, the Internet has been held up as a promising site for citizen participation and engagement. This optimism has been fuelled by recent political events that seem to confirm the Internet's democratic potential. Barack Obama channelled the Internet's power for fundraising and voter mobilization in the 2009 U.S. election. Likewise, Iranian voters successfully used social media such as Twitter to organize protests of the country's 2009 presidential election. This paper presents a first look at how Canadian political parties are using and responding to online communication tools during elections campaigns. Specifically it examines the role of online communications tools in building and developing a campaign platform. Moreover, it discusses whether these activities represent a shift towards a strengthened democracy or are simply reflective of current political culture. The findings are based on data gathered through semi-structured interviews with political strategists involved in the 2008-09 federal, British Columbia provincial and Vancouver municipal elections. This study found that online communication during election campaigns has little influence on the shape of the policy platform. However, political parties have been quick to adopt new online communications platforms allowing them to market their candidates and policies. Moreover, the Internet has shaped traditional campaign functions allowing parties to recruit funds, voter information and volunteers online. Rather than fundamentally shifting the character of democracy in Canada, the current use of online communication tools seems to be defined by the existing political culture.
APA, Harvard, Vancouver, ISO, and other styles
10

Carpenter, Pauline. "Korean international graduate students in Canada: identity and internet use." Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=66863.

Full text
Abstract:
East Asian international students often face challenges identifying and participating as active and equal members in western academic communities (Morita, 2004). Even though international students often depend on the internet during this critical time (Yang, et al., 2004), how their internet uses impact their identity is largely unknown. Using semi-structured interviews, this phenomenological study explores the experiences of seven South Korean graduate students in Canada, their internet uses, and how these uses influence their identity construction. Findings reveal that these students often experience identity challenges and report that using the internet for socializing, entertainment and information alleviates these issues. Depending on the degree of awareness and purposes of their online practices, these students' internet uses both enable and constrain their identities. Understanding these processes is useful for university student services and students themselves in considering ways the internet can be used to facilitate overcoming challenges international students face during educational sojourn.
Les étudiants internationaux d'Asie de l'Est se retrouvent souvent confrontés à de nombreux challenges quant il s'agit de s'identifier et de participer de manière active et égale aux autres étudiants au sein des communautés universitaires occidentals (Morita, 2004). Même si l'on sait que les étudiants internationaux dépendent souvent d'internet durant cette période cruciale (Yang, et al., 2004), la façon dont ils l'utilisent et l'influence que cela peut avoir sur leur identité reste un domaine largement peu connu. En utilisant des interviews semi structurés, cette étude phénoménologique explore les expériences de sept étudiants universitaires au Canada, leur utilisation d'internet et comment cette utilisation peut avoir une influence sur la construction de leur identité. Les résultats nous révèlent que ces étudiants se retrouvent fréquemment confrontés à des challenges identitaires et que l'utilisation d'internet à des fins de socialisation, d'amusement et d'information les aident dans les difficultés qu'ils rencontrent. L'utilisation d'internet peut à la fois affirmer leur identité ou alors être une source de contrainte suivant le degré de conscience et les raisons pour lesquelles ils se servent d'internet. La compréhension de ces processus décrits précédemment est non seulement utile pour les services aux étudiants au sein des Universités, mais également pour les étudiants eux-mêmes, puisqu'elle met en lumière différentes manières dont internet peut être utilisé afin de dépasser les difficultés que peuvent rencontrer les étudiants internationaux durant leur parcours universitaire.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Internet and terrorism – Canada"

1

1963-, Hamilton Dwight, ed. Inside Canadian intelligence: Exposing the new realities of espionage and international terrorism. Toronto: Dundurn, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Human rights in the prevention and punishment of terrorism: Commonwealth approaches---the United Kingdom, Canada, Australia and New Zealand. New York: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Conte, Alex. Human rights in the prevention and punishment of terrorism: Commonwealth approaches---the United Kingdom, Canada, Australia and New Zealand. New York: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Religious radicalization and securitization in Canada and beyond. Toronto: University of Toronto Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kellett, Anthony. Terrorism in Canada, 1960-1989. Ottawa: Solicitor General Canada, Ministry Secretariat, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weimann, Gabriel. Www.terror.net: How modern terrorism uses the Internet. Washington, DC: United States Institute of Peace, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Canada. Canadian Security Intelligence Service. International terrorism: The threat to Canada. Ottawa: Canadian Secuirty Intelligence Service, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dienel, Hans-Liudger. Terrorism and the Internet: Threats, target groups, deradicalisation strategies. Amsterdam: IOS Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pearson, Mike. Waging war from Canada: Why Canada is the perfect base for organizing, supporting, and conducting international insurgency. Port Townsend, Wash: Loompanics Unlimited, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Terrorism and the Internet: Threats, target groups, deradicalisation strategies. Amsterdam: IOS Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Internet and terrorism – Canada"

1

Leman-Langlois, Stéphane. "Canada." In Routledge Handbook Of Terrorism And Counterterrorism, 504–16. Abingdon, Oxon; New York, NY: Routledge, 2018.: Routledge, 2018. http://dx.doi.org/10.4324/9781315744636-44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Janke, Peter. "Canada and the FLQ." In Terrorism and Democracy, 34–72. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12452-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Simeon, James C. "Terrorism Law in Canada." In Beyond Human Rights and the War on Terror, 143–67. Abingdon, Oxon ; New York, NY : Routledge, 2019. |Series: Routledge research in human rights law: Routledge, 2018. http://dx.doi.org/10.4324/9781351006064-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Conte, Alex. "Counter-Terrorism Law in Canada." In Human Rights in the Prevention and Punishment of Terrorism, 157–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11608-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Hsinchun, Jialun Qin, Edna Reid, and Yilu Zhou. "Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System." In Terrorism Informatics, 237–66. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-71613-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Castets-Renard, Céline. "Online Surveillance in the Fight Against Terrorism in France." In EU Internet Law, 385–406. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64955-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Scassa, Teresa. "Data Protection and the Internet: Canada." In Ius Comparatum - Global Studies in Comparative Law, 55–76. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-28049-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Badouard, Romain. "On the Internet: From Conflicting Values to Counter-Publics." In Facing Terrorism in France, 45–54. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94163-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wagner, Markus. "Country Report on Canada." In Terrorism as a Challenge for National and International Law: Security versus Liberty?, 173–215. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-642-18896-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gonzales, Daniel. "It’s Getting Harder to Do: Countering Terrorist Use of the Internet." In Terrorism and Transatlantic Relations, 165–90. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83347-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Internet and terrorism – Canada"

1

Ulfa, Maria. "Internet Memes and Indonesian Online Anti-Terrorism Movement." In Proceedings of the 2nd Internasional Conference on Culture and Language in Southeast Asia (ICCLAS 2018). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/icclas-18.2019.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zolfaghar, K., A. Barfar, and S. Mohammadi. "A framework for online counter terrorism." In 2009 4th International Conference for Internet Technology and Secured Transactions (ICITST 2009). IEEE, 2009. http://dx.doi.org/10.1109/icitst.2009.5402641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goodman, Nicole, and Jon Pammett. "The patchwork of internet voting in Canada." In 2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE). IEEE, 2014. http://dx.doi.org/10.1109/evote.2014.7001134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Михнева, Анастасия Ильинична, and Илья Павлович Михнев. "INFORMATION TECHNOLOGY IN ANTI-TERRORISM." In Национальная безопасность России: актуальные аспекты: сборник избранных статей Всероссийской научно-практической конференции (Санкт-Петербург, Март 2021). Crossref, 2021. http://dx.doi.org/10.37539/nb190.2021.71.46.004.

Full text
Abstract:
В статье рассматриваются вопросы использования на территории Волгоградского региона современных информационных технологий для обеспечения безопасности и антитеррористической защищенности населения. Предложены варианты решения проблем системы миграционного учета и интернет-мониторинга. The article discusses the issues of using modern information technologies on the territory of the Volgograd region to ensure security and anti-terrorist protection of the population. The options for solving the problems of the migration registration system and Internet monitoring are proposed.
APA, Harvard, Vancouver, ISO, and other styles
5

Huszti-Orban, Krisztina. "Internet intermediaries and counter-terrorism: Between self-regulation and outsourcing law enforcement1." In 2018 10th International Conference on Cyber Conflict (CyCon). IEEE, 2018. http://dx.doi.org/10.23919/cycon.2018.8405019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vilić, Vida. "Cyber Terrorism on The Internet and Social Networking: A Threat to Global Security." In Sinteza 2017. Belgrade, Serbia: Singidunum University, 2017. http://dx.doi.org/10.15308/sinteza-2017-68-73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vajjhala, Narasimha Rao, Kenneth David Strang, and Zhaohao Sun. "Statistical Modeling and Visualizing Open Big Data Using a Terrorism Case Study." In 2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2015. http://dx.doi.org/10.1109/ficloud.2015.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guler, Emine Rumeysa, and Suat Ozdemir. "Applications of Stream Data Mining on the Internet of Things: A Survey." In 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT). IEEE, 2018. http://dx.doi.org/10.1109/ibigdelft.2018.8625289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kulik, Anna Valerievna, and Anna Alekseevna Vikulova. "Emotional pressure as a main tool of the modern form of terrorism in the Internet." In V International Scientific and Practical Conference. TSNS Interaktiv Plus, 2017. http://dx.doi.org/10.21661/r-210765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ivanov, Radmir Vladimirovich. "Prevention of Extremism and Terrorism Among Young People in the Internet Information and Communication Network." In International Scientific and Practical Conference. TSNS Interaktiv Plus, 2020. http://dx.doi.org/10.21661/r-552183.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Internet and terrorism – Canada"

1

Winseck, Dwayne. Media and Internet Concentration in Canada 1984 – 2017. Canadian Media Concentration Research Project (CMCRP), December 2018. http://dx.doi.org/10.22215/cmcrp/2018.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Winseck, Dwayne. Media and Internet Concentration in Canada, 1984 – 2018. Canadian Media Concentration Research Project (CMCRP), December 2019. http://dx.doi.org/10.22215/cmcrp/2019.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Winseck, D. (Dwayne). Media and Internet Concentration in Canada, 1984–2020. Global Media and Internet Concentration Project (GMICP), Carleton University, December 2021. http://dx.doi.org/10.22215/gmicp/2021.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Winseck, Dwayne. Media and Internet Concentration in Canada, 1984–2021. Carleton University, November 2022. http://dx.doi.org/10.22215/gmicp/2022.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Winseck, D. Growth and Upheaval in the Network Media Economy in Canada, 1984-2019. Canadian Media Concentration Research Project (CMCRP), Carleton University, November 2020. http://dx.doi.org/10.22215/cmcrp/2020.1.

Full text
Abstract:
This report examines the development of the media economy over the past thirty-five years. Since beginning this project a decade ago, we have focused on analyzing a comprehensive as possible selection of the biggest telecoms, Internet and media industries (based on revenue) in Canada, including: mobile wireless and wireline telecoms; Internet access; cable, satellite & IPTV; broadcast television, specialty and pay television services as well as Internet-based video subscription and download services; radio; newspapers; magazines; music; Internet advertising; social media; operating systems; browsers, etc.
APA, Harvard, Vancouver, ISO, and other styles
6

Winseck, Dwayne. Growth and Upheaval in the Network Media Economy in Canada, 1984-2021. Canadian Media Concentration Research Project (CMCRP), November 2022. http://dx.doi.org/10.22215/gmicp/2022.01.

Full text
Abstract:
The Canadian contribution and data set prepared as part of the Global Media and Internet Concentration (GMIC) project offers an independent academic, empirical and data-driven analysis of a deceptively simple yet profoundly important question: have telecom, media and internet markets become more concentrated over time, or less? Media Ownership and Concentration is presented from more than a dozen sectors of the telecom-media-internet industries, including film, music and book industries.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography