Journal articles on the topic 'Internet and terrorism – Canada'

To see the other types of publications on this topic, follow the link: Internet and terrorism – Canada.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet and terrorism – Canada.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Isla Joulain, Gabriel Luis. "Célibes involuntarios: ¿Terroristas?. Análisis cualitativo del fenómeno “InCel” y discusión conceptual sobre el “terrorismo”." Revista de Derecho Penal y Criminología, no. 24 (May 13, 2021): 193–244. http://dx.doi.org/10.5944/rdpc.24.2020.28400.

Full text
Abstract:
Los Célibes Involuntarios (InCels) son un grupo de varones, reunidos en foros en Internet, que odian fuertemente a las mujeres por rechazar sus acercamientos afectivo-sexuales, a los que ellos creen tener derecho por naturaleza, y a los hombres atractivos y sexualmente activos, que restringen sus posibilidades con las mujeres y los condenan a la soledad. Y desean utilizar la violencia contra todos ellos; siendo que seis InCels ya han asesinado en masa a un total de 27 personas y herido a 43 en Estados Unidos y Canadá entre 2014 y 2019. En este trabajo, se debate la inclusión de este grupo en la categoría de terrorista. Para ello, primero se exponen las controversias y las características definitorias del terrorismo. Después, se realiza un análisis exhaustivo con metodología cualitativa de los asesinatos InCels mediante un revisión de 54 artículos en prensa y de los manifiestos ideológicos publicados por tres perpetradores. Se debate entonces la inclusión de los InCels en la categoría de terroristas, siguiendo los criterios definitorios del terrorismo expuestos en la introducción. Se concluye que los InCels no pueden considerarse hoy día un fenómeno terrorista, pero sí muy parecido, al cumplir cuatro de los seis criterios pero carecer de dos: una intención real de imponer su voluntad a los poderes estatales y un intento de subvertir los principios democráticos fundamentales. Finalmente, se critican los problemas de ética, rigurosidad y utilidad del concepto de terrorismo, proponiendo su abandono, explicitando la esterilidad del debate planteado y privilegiando el estudio de las causas macroestructurales e histórico-individuales específicas a las conductas concretas de los InCels.The Involuntary Celibates (InCels) are a group of men, gathered in forums on the Internet, who strongly hate women since they reject their affective-sexual approaches, to which they believe they are entitled by nature, and attractive and sexually active men, who restrict their possibilities with women and condemn them to loneliness. Inaddition, some of its members wish to use violence against all of them. Six InCels have already carried out mass murders in the United States and Canada, out of which a total of 27 people were killed and 43 injured between 2014 and 2019. In this paper, the inclusion of this group in the category of terrorist is discussed. To do this, the controversias and defining characteristics of terrorism are first exposed. Then, an exhaustive analysis with qualitative methodology of the InCels murders is carried out through a review of 54 press articles and of the ideological manifestos published by three perpetrators. The inclusion of InCels in the category of terrorists is then discussed, following the defining criteria of terrorism set out in the introduction. It is concluded that the InCels cannot be considered today a terrorist phenomenon, but a very similar one, fulfilling four of the six criteria but lacking other two: a real intention to impose their will on the state powers, and an attempt to subvert fundamental democratic principles. Finally, the problems of ethics, rigor and usefulness of the concept of terrorism are criticized, proposing its abandonment, making explicit the sterility of the proposed debate and favoring the study of macrostructural and historicalindividual causes specific to the concrete behaviors of the InCels.
APA, Harvard, Vancouver, ISO, and other styles
2

deKieffer, Donald E. "The Internet and the Globalization of Counterfeit Drugs." Journal of Pharmacy Practice 19, no. 3 (June 2006): 171–77. http://dx.doi.org/10.1177/0897190006292949.

Full text
Abstract:
Most Internet users receive unsolicited invitations to enhance their health through the purchase of online medications. Often these medications are illegal and may even be counterfeit. However, there are a few legitimate online pharmacies. The National Association of Boards of Pharmacy has established the Verified Internet Pharmacy Practice Sites program, which certifies the legitimacy of some Internet merchants. Also, there are hundreds of Canadian pharmacies online because of the rise in popularity of Canadian drugs. The actual number of online Canadian pharmacies is difficult to estimate, and many of the so-called Canadian pharmacies are not from Canada. Besides the few legitimate sites in the United States and Canada, most online pharmacies deal with unapproved, illegal, and counterfeit medication. It is hard to know the number of online pharmacies because of the complex structure of the Internet. Their rapid growth can mainly be attributed to huge profits, but online pharmacies are also used for money laundering and may be used for terrorism. Although the United States has been limited in its actions, it still has taken numerous measures. However, internationally, online pharmacies do not appear to be as much of a problem, so almost any action taken has been led by the United States.
APA, Harvard, Vancouver, ISO, and other styles
3

Young, Dean R. "A look in the back yard: Mitigating home-grown extremism in Canada." Journal of Community Safety and Well-Being 5, no. 1 (April 23, 2020): 15. http://dx.doi.org/10.35502/jcswb.118.

Full text
Abstract:
Canada has the capability to provide a significant security blanket with which to protect Canadian citizens from the effects of terrorism. I will discuss the scholarly work in the area of extremism and associated ideologies. Contemporary issues of environmentalism, race and gender, and government legitimacy will be examined with respect to how theycontribute to growing extremist segments of Canadian society. Findings support the argument that, as society grows in its liberal approaches, extreme ideologies from those on the fringes may begin to grow in order to counter the influence of opposing views and social policy. This article closes with a discussion of how the growth of extremism may be mitigated through attention to history and societal development, asserting control over the Internet, strengthening the criminaljustice system, and education.
APA, Harvard, Vancouver, ISO, and other styles
4

Meyers, Sarah. "How Canadian Intelligence is Exposed to the Impact of Globalization: A Critical Analysis of the Security Threat of Right-Wing Extremism." Journal of Intelligence, Conflict, and Warfare 1, no. 2 (November 15, 2018): 11. http://dx.doi.org/10.21810/jicw.v1i2.637.

Full text
Abstract:
It could be argued that Canadian intelligence has been negligent toward the impact of globalisation when assessing the security threat of right-wing extremism (RWE), specifically with the advent of the internet and the significant reduction of the influence of state borders on national policy objectives, and therefore has exposed itself to the potential of intelligence failure. This paper is focused on the state of right-wing extremism in Canada through which it addresses the security question: How is Canadian intelligence exposed to the impact of globalisation? The results of this paper are informed by an in-depth analysis of peer-reviewed articles from Canada, the United States (US), and Europe, as well as Canadian government documents, and newspaper articles, as well as the completion of a key assumptions, check to address bias and better evaluate the evidence found. This paper concludes that it appears likely that Canadian intelligence may not be assessing RWE threats through the lens of globalisation. It could be argued that this creates the potential for intelligence failure. However, there remains one significant caveat. It can be interpreted in Public Safety Canada’s latest update that RWE may soon be considered a type of terrorism. If this is the case, the evidence proves that Canadian intelligence may in fact be considering the impact of globalisation in the context of terrorism and therefore would likely implement the same consideration for RWE.
APA, Harvard, Vancouver, ISO, and other styles
5

Kollek, Daniel. "Terrorism in Canada." Prehospital and Disaster Medicine 18, no. 2 (June 2003): 71–79. http://dx.doi.org/10.1017/s1049023x00000790.

Full text
Abstract:
AbstractThis paper reviews terrorism in Canada, assessing the incidence and nature of terrorist activity, the potential targets of terrorist attacks, risk factors to Canadian nationals and institutions, and the responses of the Canadian government in dealing with the threat and the effectiveness of those responses.Despite the fact that there have been no recent high-profile terrorist events in Canada, this country has a serious terrorism problem, the key manifestation of which is the multitude of terrorist organizations that have designated Canada as a base of operations. In addition, Canadians have been attacked overseas and Canadian organizations, both local and abroad, are potential targets of terrorist activity. Canadian attempts to deal with terrorism through foreign and domestic policy have been ineffective, primarily because the policies have been poorly enforced. Until recently, terrorist organizations legally could raise funds in Canada, in direct contravention of international treaties signed by Canada. It is possible that the ineffectiveness in enforcing the anti-terrorism legislation stems from hope that placating terrorist organizations, and the countries that support them, will prevent Canada from becoming a target. Unfortunately evidence from other countries has shown this strategy to be ineffective.
APA, Harvard, Vancouver, ISO, and other styles
6

Kitchen, Veronica, and Karthika Sasikumar. "Canada (En)Counters Terrorism: U.S.-Canada Relations and Counter-terrorism Policy." Terrorism and Political Violence 21, no. 1 (January 5, 2009): 155–73. http://dx.doi.org/10.1080/09546550802587572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

LaFree, Gary. "Terrorism and the Internet." Criminology & Public Policy 16, no. 1 (February 2017): 93–98. http://dx.doi.org/10.1111/1745-9133.12292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

JOHNSON, JEFF. "TERRORISM TRUMPS INTERNET ACCESS." Chemical & Engineering News 78, no. 27 (July 3, 2000): 16–17. http://dx.doi.org/10.1021/cen-v078n027.p016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lewis, James A. "The Internet and Terrorism." Proceedings of the ASIL Annual Meeting 99 (2005): 112–15. http://dx.doi.org/10.1017/s0272503700071196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meserve, Stephen A., and Daniel Pemstein. "Terrorism and internet censorship." Journal of Peace Research 57, no. 6 (October 29, 2020): 752–63. http://dx.doi.org/10.1177/0022343320959369.

Full text
Abstract:
The internet provides a powerful tool to terror organizations, enhancing their public messaging, recruitment ability, and internal communication. In turn, governments have increasingly moved to disrupt terror organizations’ internet communications, and even democracies now routinely work to censor terrorist propaganda, and related political messaging, in the name of national security. We argue that democratic states respond to terror attacks by increasing internet censorship and broadening their capacity to limit the digital dissemination of information. This article builds on previous work suggesting this relationship, substantially improving measurement and estimation strategy. We use latent variable modeling techniques to create a new measure of internet censorship, cross nationally and over time, from internet firm transparency reports, and compare this measure to an expert-survey based indicator. Leveraging both measures, we use a variety of panel specifications to establish that, in democracies, increases in terror predict surges in digital censorship. Finally, we examine the posited relationship using synthetic control methods in a liberal democracy that experienced a large shock in terror deaths, France, showing that digital censorship ramped up after several large terrorist attacks.
APA, Harvard, Vancouver, ISO, and other styles
11

Hatta, Muhammad, Ramalinggam Rajamanickam, Dahlan Abdullah, H. Hartono, A. A. Saleh, Hardianto Djanggih, Marten Bunga, et al. "Internet and Terrorism in Indonesia." Journal of Physics: Conference Series 1114 (November 2018): 012080. http://dx.doi.org/10.1088/1742-6596/1114/1/012080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Anderson, Alison G. "Risk, terrorism, and the internet." Knowledge, Technology & Policy 16, no. 2 (June 2003): 24–33. http://dx.doi.org/10.1007/s12130-003-1023-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Barrett, Danny. "Canada and Terrorism: A Case Study." Agora: Political Science Undergraduate Journal 1 (March 27, 2011): 48–60. http://dx.doi.org/10.29173/agora10090.

Full text
Abstract:
Despite an all-pervasive focus on terrorism, there is little critical discussion about its precise meaning or applicability to modern international relations. This paper seeks to examine Canada's role in relation to terrorism, by comparing official policy statements to the ways in which key government actors responded to a key, concrete example of international terrorism (the Israeli bombardment of Gaza in the winter of 2008-9). Based on the example discussed, the paper argues that contrary to official policy statements, Canada seems to offers firm support for international terrorism when it is committed by our allies.
APA, Harvard, Vancouver, ISO, and other styles
14

Goswami, Pranab Kumar, Sunandan Baurah, and Laba Thakuria. "Internet of Things and Cyber Terrorism." Cross Current International Journal of Economics, Management and Media Studies 3, no. 1 (March 23, 2021): 1–4. http://dx.doi.org/10.36344/ccijemms.2021.v03i01.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Clem, A., Sagar Galwankar, and George Buck. "Health Implications of Cyber-Terrorism." Prehospital and Disaster Medicine 18, no. 3 (September 2003): 272–75. http://dx.doi.org/10.1017/s1049023x00001163.

Full text
Abstract:
AbstractThe world is becoming ever more interconnected via the Internet, creating both benefits and disadvantages for human communities. This article examines cyber-terrorism, one of the major negative consequences of the Internet. It also examines the potential impact of cyber-terrorism on the health of populations, its possible perpetrators, and its prevention and control.
APA, Harvard, Vancouver, ISO, and other styles
16

Leman‐Langlois, Stéphane, and Jean‐Paul Brodeur. "Terrorism Old and New: Counterterrorism in Canada." Police Practice and Research 6, no. 2 (January 2005): 121–40. http://dx.doi.org/10.1080/15614260500121096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Gultom, Rudy Agus Gemilang, Asep Adang Supriyadi, and Tatan Kustana. "A Strengthening Asean Cyber Cooperation in Countering Cyber Terrorist Groups Activities on the Internet by Implementing the Six-Ware Cyber Security Framework." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 13 (October 9, 2018): 3288–300. http://dx.doi.org/10.24297/ijmit.v13i0.7624.

Full text
Abstract:
Nowadays, the extremism, radicalism and terrorism groups have taken advantages the use of Internet access to support their activities, i.e, member recruitment, propaganda, fundraising, cyberattack actions against their targets, etc. This is one of the issues of cyber security as a negative impact of internet utilization especially by the extremism, radicalism and terrorism groups. They know the benefits of the internet services and social media can be used to facilitate the control of information in their organizational command and control system. In order to tackle this cyber security issue, the internet users in Association of Southeast Asian Nations (ASEAN) member countries should get more understanding as well as protection from their government against the danger of cyber extremism, cyber radicalism or cyber terrorism activities over the Internet. Therefore, this paper tries to explain the need of an ASEAN Cyber Security Framework standard in order to countering cyber terrorism activities via Internet as well as introducing the initial concept of Six-Ware Cyber Security Framework (SWCSF).
APA, Harvard, Vancouver, ISO, and other styles
18

Hunter, Lance Y., Candace E. Griffith, and Thomas Warren. "Internet connectivity and domestic terrorism in democracies." International Journal of Sociology 50, no. 3 (May 2, 2020): 201–19. http://dx.doi.org/10.1080/00207659.2020.1757297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gordon, Avishag. "Terrorism on the internet: Discovering the unsought." Terrorism and Political Violence 9, no. 4 (December 1997): 159–65. http://dx.doi.org/10.1080/09546559708427435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Benson, David C. "Why the Internet Is Not Increasing Terrorism." Security Studies 23, no. 2 (April 3, 2014): 293–328. http://dx.doi.org/10.1080/09636412.2014.905353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Brown, Ian, and Douwe Korff. "Terrorism and the Proportionality of Internet Surveillance." European Journal of Criminology 6, no. 2 (March 2009): 119–34. http://dx.doi.org/10.1177/1477370808100541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Dostić, Siniša, and Dragana Vidaković. "Terrorist propaganda on the Internet." Bastina, no. 51 (2020): 225–37. http://dx.doi.org/10.5937/bastina30-26323.

Full text
Abstract:
The exchange of large amount of data contributed to making information technologies an integral part of the modern world, often shaping public opinion, whether through its using, or abusing. In such a sense, modern terrorism uses or abuses various possibilities of information technologies, especially Internet, for the promotion of its own activities, as well as for the recruitment. Internet usage made the eradiation of terrorism propaganda such an easy task, so Internet practically became overwhelmed by it. Attitudes and threats expressed by terrorists that put their opponents under serious pressure, as well as recruitment of new members has contributed to to an increase in the number of terrorist groups that abuse the Internet for media purposes. Additional problems stem from the impossibility of their effective and timely control in a bid to prevent abuse aimed at terrorist propaganda, but also from the fact that most propaganda activities can neither be prevented nor limited in time, since such preventions and limitations infringe human rights, such as freedom of expression, religion and others. Since propaganda itself is not prohibited, the use of propaganda for promotion, financing, recruitment, training and commission of terrorism purposes is characterized as a criminal offense. In accordance with the European legislation, in order to provide evidence of incitement to terrorism, the connection between intent and direct causality has to be specified between the alleged propaganda, actual conspiracy or commission of terrorist acts. In this regard, the aim of this paper is to point out to danger of terrorist propaganda on the Internet, as well as to its types of manifestations (symbols) in an attempt to identify it in a timely manner and to curtail it in an adequate way.
APA, Harvard, Vancouver, ISO, and other styles
23

Sarinastiti, Eska Nia, and Nabilla Kusuma Vardhani. "Internet dan Terorisme : Menguatnya Aksi Global Cyber-Terrorism New Media." Jurnal Gama Societa 1, no. 1 (March 20, 2018): 40. http://dx.doi.org/10.22146/jgs.34048.

Full text
Abstract:
Tujuan dari penelitian ini adalah mengeksplorasi tindakan cyber-terrorism global, jenis media baru dalamcyber-terrorism, dan fenomena cyber-terrorism di Indonesia. Penelitian ini menggunakan metode studi kasus,teknik pengumpulan data menggunakan observasi dan dokumentasi. Analisis data menggunakan analisis isi untukmencari data. Hasil penelitian ini menunjukkan bahwa penggunaan internet untuk tindakan mereka dimotivasioleh kelemahan media massa (televisi dan media cetak) yang tidak lagi aman dan banyak manipulasi isi tentangaktivitas kelompok teroris. Salah satu kelompok teroris paling canggih dan intensitas tertinggi penggunaanmedia online untuk kegiatan terorisme adalah kelompok Al-Qaeda. Secara keseluruhan, Internet digunakanoleh teroris untuk kegiatan terorisme serta tindakan cyber-terrorism yang meliputi pelatihan, penggalangandana, koordinasi, perencanaan dan pelaksanaan tanpa mempresentasikan secara fisik lokasi eksekusi, menghacksistem target, menyebarkan propaganda radikal, hasutan, rekrutmen anggota baru, mencari informasitentang data anggota militer, intelijen, atau pejabat politik. Berdasarkan hasil beberapa penelitian dan laporanmedia, media online yang secara terbuka dapat kita lihat sebagai media mereka, yaitu youtube, game online,situs web, media sosial (twitter dan facebook), dan majalah online. Indonesia menjadi salah satu negara yangjuga memiliki efek kuat dari cyber-terrorism sejak bom Bali pada tahun 2002 sampai sekarang. Ketersediaandan tingkat kekuatan cyber-terrorism dan peraturan penggunaan media online di sebuah pemerintahan akanmenentukan keamanan masyarakat dari kelompok aksi teroris melalui internet.
APA, Harvard, Vancouver, ISO, and other styles
24

Nasrullah, Rulli. "Politik Siber dan Terorisme Virtual." ESENSIA: Jurnal Ilmu-Ilmu Ushuluddin 13, no. 1 (January 22, 2012): 109. http://dx.doi.org/10.14421/esensia.v13i1.724.

Full text
Abstract:
It is interesting to look at the Head of Criminal Investigation statement of the Indonesian National Police Commissioner General Ito Sumardi (Kompas, 22 / 9/2010), which warns that the crime of terrorism is closely related to ideology. Sociologist Van Dijk (1993) states that ideology is basically a mental system that is exchanged, represented both in the level of discourse and action to achieve certain goals or desires in a groups (defined as the system of mental representations and processes of group members). Why (technology) Internet so powerful in spreading the message of terrorism? First, the interaction happens on internet can be done anywhere and anytime. Second, Internet users in Indonesia, which are increasingly growing in number, allow access to the site or content to be easily obtained terrorism. Third, Internet medium provides not only cheap but free access. Fourth, the Internet allows anyone to construct new identity. In fact it proves that theidentities of individuals in cyber world are individuals who have two possibilities. It could be the same or different identities as in the real world. Furthermore, the individual does not only have one identity per se on the internet, they could have multiple identities as well as different characteristics from each other. In addition, according to Gilmore (1996), those on the Internet nobody knows you at all, neither knows your race nor your sex. This is the opportunities that could be used by the perpetrators of terrorism to spread the ideology of terrorism and violence in the name of religion without having to worried their identity will be revealed.
APA, Harvard, Vancouver, ISO, and other styles
25

Nasrullah, Rulli. "Media Baru dan Potensi Terorisme Virtual." EMPATI: Jurnal Ilmu Kesejahteraan Sosial 1, no. 1 (June 5, 2012): 59–70. http://dx.doi.org/10.15408/empati.v1i1.9768.

Full text
Abstract:
It is interesting to look at the Head of Criminal Investigation statement of the Indonesian National Police Commissioner General Ito Sumardi (Kompas, 22/9/2010), which warns that the crime of terrorism is closely related to ideology. Sociologist Van Dijk (1993) states that ideology is basically a mental system that is exchanged, represented both in the level of discourse and action to achieve certain goals or desires in a groups (defi ned as the system of mental representations and processes of group members). Why (technology) Internet so powerful in spreading the message of terrorism? First, the interaction happens on internet can be done anywhere and anytime. Second, Internet users in Indonesia, which is increasingly growing in number, allows access to the site or content to be easily obtained terrorism. Third, Internet medium provides access not only cheap but free. Fourth, the Internet allows anyone to construct new identity. In a fact proves that the identities of individuals in cyber world are individuals who have two possibilities, it could be the same or different identities as in the real world. Furthermore, the individual does not only have one identity per se on the internet, they could have multiple identities as well as different characteristics from each other. In according to Gilmore (1996), those on the Internet nobody knows you at all, not either knows your race or your sex. This is the opportunities that could be used by the perpetrators of terrorism to spread the ideology of terrorism and violence in the name of religion without worried their identity will be revealed. Key words: cybermedia, virtual terorism, internet, identity.
APA, Harvard, Vancouver, ISO, and other styles
26

Nihayaty, Arini Indah, and Atikah Mardhiya Rohmy. "Pemanfaatan Media Sosial Komunitas Untuk Menghadapi Konten Islam Ekstrim Di Internet." Dakwatuna: Jurnal Dakwah dan Komunikasi Islam 6, no. 2 (August 25, 2020): 213. http://dx.doi.org/10.36835/dakwatuna.v6i2.632.

Full text
Abstract:
Terrorism and radicalism, in the name of religion, which in nature deconstruct the development of the existing state, must be completely eliminated. Moreover, if terrorism and radicalism, by making social media a means of recruiting members. If so, the policy makers must intervene and make a stronghold in the digital space. In addition, there must be a step from the community exponents to participate in combating terrorism and radicalism. For example, from Islamic boarding schools and Islamic community organizations, such as Nahdlatul Ulama or NU and Muhammadiyah, in Indonesia. The existence of NU and Muhammadiyah is central because so far, they have played a role in advancing the nation from all fronts. The activeness of these two community organizations in counter movement, dealing with terrorism and radicalism is a must. Ways that can be taken include da’wah or the spread of positive messages through social media. What is aggressively done through time and space. Keywords: Da'wah, Social Media, Terrorism, Radicalism
APA, Harvard, Vancouver, ISO, and other styles
27

Goricheva, Vlasta Leonidovna, and Yuliya Andreevna Chernysheva. "Information terrorism." LAPLAGE EM REVISTA 7, Extra-C (June 25, 2021): 171–77. http://dx.doi.org/10.24115/s2446-622020217extra-c1001p.171-177.

Full text
Abstract:
The article deals with the actual problem of the spread of information terrorism in the world space. Information terrorism is a new type of criminal activity. Terrorists use modern information resources, the Internet to spread the ideology of terrorism. The general scientific dialectical method and a complex of scientific methods of cognition (system-structural, formal-logical) represent the methodological basis of the research. The results reached by the authors are that in modern conditions the threat of information terrorism has become a reality. Comprehensive prevention of the threat of information terrorism must be carried out within the framework of reforming the country through the widespread automation and digitalization of all life support facilities, as well as the country's integration into international information exchange. In the conclusion, the authors formulated the main conclusions of the study, substantiated the need to develop measures to counter information terrorism.
APA, Harvard, Vancouver, ISO, and other styles
28

McCoy, John, and W. Andy Knight. "Homegrown Terrorism in Canada: Local Patterns, Global Trends." Studies in Conflict & Terrorism 38, no. 4 (January 30, 2015): 253–74. http://dx.doi.org/10.1080/1057610x.2014.994349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Hope, Wayne. "Terrorism section weakens primer on e-policy." Pacific Journalism Review : Te Koakoa 15, no. 1 (May 1, 2009): 223–25. http://dx.doi.org/10.24135/pjr.v15i1.973.

Full text
Abstract:
The editor describes this book as a first ever attempt to map the impact of the internet on key aspects of governance within Asia: democratisation, e-government, cybersecurity and terrorism, technical coordination, internet policy and regulation. The subtitle of the book also suggests that these matters will be critically evaluated.
APA, Harvard, Vancouver, ISO, and other styles
30

Cole, David R. "Virtual Terrorism and the Internet E-Learning Options." E-Learning and Digital Media 4, no. 2 (June 2007): 116–27. http://dx.doi.org/10.2304/elea.2007.4.2.116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Keene, Shima D. "Terrorism and the internet: a double‐edged sword." Journal of Money Laundering Control 14, no. 4 (October 11, 2011): 359–70. http://dx.doi.org/10.1108/13685201111173839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Mueller, John, and Mark G. Stewart. "Terrorism, counterterrorism, and the Internet: The American cases." Dynamics of Asymmetric Conflict 8, no. 2 (May 4, 2015): 176–90. http://dx.doi.org/10.1080/17467586.2015.1065077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Marsden, Christopher T. "Hyperglobalized individuals: the Internet, globalization, freedom and terrorism." Foresight 6, no. 3 (June 2004): 128–40. http://dx.doi.org/10.1108/14636680410547735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Valeri, Lorenzo, and Michael Knights. "Affecting trust: Terrorism, internet and offensive information warfare." Terrorism and Political Violence 12, no. 1 (March 2000): 15–36. http://dx.doi.org/10.1080/09546550008427547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Conway, Maura. "Terrorism and the Internet: New Media—New Threat?" Parliamentary Affairs 59, no. 2 (February 10, 2006): 283–98. http://dx.doi.org/10.1093/pa/gsl009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

&NA;. "Internet Resources Related to Biological and Chemical Terrorism." Journal of Public Health Management and Practice 6, no. 4 (2000): 68–69. http://dx.doi.org/10.1097/00124784-200006040-00012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Simeon, James. "The Evolving Common Law Jurisprudence Combatting the Threat of Terrorism in the United Kingdom, United States, and Canada." Laws 8, no. 1 (February 14, 2019): 5. http://dx.doi.org/10.3390/laws8010005.

Full text
Abstract:
Terrorism is a concept that defies a simple and straightforward legal definition. Therefore, it is not surprising to find that there is no Comprehensive Convention on Terrorism with a universally accepted definition of what constitutes “terrorism.” Consequently, States have devised their own definitions of what constitutes terrorism that are typically found in their criminal law. This raises the fundamental question of whether there is a convergence or divergence in jurisprudential trends on what constitutes terrorism among States? Presumably, a convergence in jurisprudential trends is more likely to contribute to combatting the threat of terrorism at the international and national levels. Accordingly, this article comparatively analyzes the definition of terrorism in three common law jurisdictions: the United Kingdom, the United States, and Canada. It finds that although there are a number of similarities in the definition of terrorism in these three States, they have significantly different definitions of what constitutes terrorism. The UK definition, ostensibly, has the broadest definition of terrorism of the three States. The US has, undoubtedly, the most unique, with separate definitions for “international terrorism” and “domestic terrorism.” Additionally, Canada has the most international definition of terrorism, drawing on 13 functional terrorism Conventions to define offenses such as hijacking, hostage taking, and bombing, etc. The second part of the article comparatively analyzes seven of the leading Supreme Court cases on terrorism in these three States. From the ratio or rationes decidendi in each of these cases, it draws out the twelve legal principles that underlie these judgements and finds that they are similar and overall consistent. The conclusion reached is that there is, at least in these three common law jurisdictions, an apparent convergence in jurisprudential trends in the law of terrorism. This augurs well for the development and emergence of a common definition of what constitutes terrorism at the international and transnational levels, as well as more rigorous and effective counter-terrorism laws and policies within and across States.
APA, Harvard, Vancouver, ISO, and other styles
38

Garber, Mitchell A. "Internet Gaming Law in Canada." Gaming Law Review 2, no. 2 (March 1998): 163–65. http://dx.doi.org/10.1089/glr.1998.2.163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Al-Shair, Mahmood. "Legal problems in confronting digital terrorism. Statistic study." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 21, 2021): 1–36. http://dx.doi.org/10.55562/jrucs.v28i2.385.

Full text
Abstract:
The crime of digital terrorism (terrorism via internet) is a kind of terrorist crimes. The terrorist crime is very old and taken place for a long time in different kinds, but its new kind is digital terrorism took place due to the technological advance witnessed by the world. The terrorist crime could be confronted by the traditional legal texts. Such legal texts cannot face the digital terrorism which means that there should be new legal frame works that enable the societies to face the crime of digital terrorism, terrorism via internet on one hand. This kind of crime is taken place by a means totally different from that terrorist crime before on the other hand. Sometimes these means are considered crimes even there is no action to be punished. The use of internet in certain methods to reach certain goal is formed a crime whether actually there is terrorist crime or not.This means that confronting the crime of digital terrorism entails removing a number of criminal rules even some constitutional criminal principles in order to face such crime and punish the doers. Thus, the rules governing the terrorist crime whether of responsibility or punishment are different from the rules that governing the normal crimes and sometimes are exception of the general rules. This topic has been dealt with from the legal angel with statistics done by surveying to collect data to find out the other legal opinions.
APA, Harvard, Vancouver, ISO, and other styles
40

Nesbitt, Michael. "Violent crime, hate speech or terrorism? How Canada views and prosecutes far-right extremism (2001–2019)." Common Law World Review 50, no. 1 (February 16, 2021): 38–56. http://dx.doi.org/10.1177/1473779521991557.

Full text
Abstract:
Fifty-six individuals were charged with terrorism between December 2001 when Canada first enacted its antiterrorism criminal offences and December 2019. Not a single such individual was associated with a far-right group or espoused a far-right ideology. Over the same period of time, Canada saw a rise in far-right violence and crime, including several deadly attacks that raised the spectre of terrorism. This article seeks to identify why terrorism has not been associated with the activities of those on the far right, how Canada has prosecuted far-right violence if not for terrorism and what the implications are for Canada’s criminal prosecutions going forward. It finds that since December 2001 all publicly reported hate speech cases and cases where an individual’s sentence was aggravated for hate have involved individuals espousing far-right rhetoric; likewise, all but one case where the media raised the spectre of terrorism but no such charge ensued can be described as being motivated by far-right ideation. In the result, Canadian law punishes more seriously Al-Qaida (AQ)-inspired extremism than far-right extremism, while stigmatizing the former more than the latter. The time has thus come to tackle head-on the concept of ideology in Canadian criminal law, and how the law treats various ideologies.
APA, Harvard, Vancouver, ISO, and other styles
41

Lemyre, Louise, Jennifer E. C. Lee, Michelle C. Turner, and Daniel Krewski. "Terrorism preparedness in Canada: a public survey on perceived institutional and individual response to terrorism." International Journal of Emergency Management 4, no. 2 (2007): 296. http://dx.doi.org/10.1504/ijem.2007.013995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Roberts, Joni R., and Carol A. Drost. "Internet Reviews." College & Research Libraries News 82, no. 1 (January 8, 2021): 45. http://dx.doi.org/10.5860/crln.82.1.45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Roberts, Joni R., and Carol A. Drost. "Internet Reviews." College & Research Libraries News 82, no. 1 (January 8, 2021): 45. http://dx.doi.org/10.5860/crln.82.1.45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ross, Jeffrey Ian. "Attributes of domestic political terrorism in Canada, 1960–1985." Terrorism 11, no. 3 (January 1988): 213–33. http://dx.doi.org/10.1080/10576108808435712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Carver, Ashley. "Parliamentary Attempts to Define Terrorism in Canada and Australia." Journal of Applied Security Research 11, no. 2 (April 2, 2016): 124–38. http://dx.doi.org/10.1080/19361610.2016.1137173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Crepeau, F. "Anti-Terrorism Measures and Refugee Law Challenges in Canada." Refugee Survey Quarterly 29, no. 4 (December 1, 2010): 31–44. http://dx.doi.org/10.1093/rsq/hdq039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Poole, T. "Recent Developments in the 'War on Terrorism' in Canada." Human Rights Law Review 7, no. 3 (July 3, 2007): 633–42. http://dx.doi.org/10.1093/hrlr/ngm020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Antonyan, E. A., and I. I. Aminov. "BLOCKCHAIN TECHNOLOGY IN COUNTERING CYBER TERRORISM." Actual Problems of Russian Law, no. 6 (July 18, 2019): 167–77. http://dx.doi.org/10.17803/1994-1471.2019.103.6.167-177.

Full text
Abstract:
In the paper, modern blockchain technologies are called a revolutionary phenomenon, equal in importance to the ingenious invention of the 20th century — the Internet. Originally developed for Bitcoin digital currency and launching the network of the same name, the blockchain technology created a platform for the new type of the Internet, influenced the decentralization of the Network according to the distributed registry principle, and began to be used in various types and combinations for various purposes, including cybersecurity. The paper argues that the use of blockchain technology to ensure cybersecurity is infinite due to such unique properties as reliability, accessibility, high adaptability, economic efficiency, profitability. The use of blockchain technologies to combat cybercrime, including cyberterrorism, may extend to control over financial services, transportation or any other industry. However, the growth of criminal activity using the blockchain technology will also be enhanced if the law enforcement agencies are not technologically competent, can detect these developing centers, determine their actions and destroy plans at a faster pace.
APA, Harvard, Vancouver, ISO, and other styles
49

Wade, Lindsey. "Terrorism and the internet: Resistance in the information age." Knowledge, Technology & Policy 16, no. 1 (March 2003): 104–27. http://dx.doi.org/10.1007/s12130-003-1018-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Lindi Chandrika, Katya, Risky Perdana Adiperkasa, and Yana Ningtyas. "Cyber terrorism in Indonesia." Bulletin of Social Informatics Theory and Application 2, no. 2 (December 30, 2018): 65–72. http://dx.doi.org/10.31763/businta.v2i2.115.

Full text
Abstract:
Cyber terrorism is one of cybercrime. Cyber terrorism is an activity using computer technology and information to create an atmosphere of terror and fear on a large scale through good threats to the government and citizens with brings politics, religion or ideology objectives which can lead paralysis of important infrastructure. There are several reasons why the internet is considered as the right choice to do Cyber terrorism. Many methods are used to do Cyber terrorism. In Indonesia, people’s understanding about Cyber terrorism is very low. This creates ignorance in tackling Cyber terrorism crime in the future when people become victims of Cyber terrorism. The low knowledge about Cyber terrorism requires the government to make education about Cyber terrorism. The education provided will help people find solutions in the against Cyber terrorism. In avoiding Cyber terrorism crime the government is expected to cooperate with other developed countries that have a high level of security.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography