000 03827nam a22004215i 4500
001 978-0-387-73578-8
003 DE-He213
005 20250710084017.0
007 cr nn 008mamaa
008 100301s2008 xxu| s |||| 0|eng d
020 _a9780387735788
_a99780387735788
024 7 _a10.1007/978-0-387-73578-8
_2doi
082 0 4 _a364
_223
100 1 _aGolumbic, Martin Charles.
_eauthor.
245 1 0 _aFighting Terror Online
_h[recurso electrónico] :
_bThe Convergence of Security, Technology, and the Law /
_cby Martin Charles Golumbic.
264 1 _aNew York, NY :
_bSpringer New York,
_c2008.
300 _bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aFrom the contents Introduction -- I. The Balance between Security and Civil Rights -- II. The Legal Situation: Prevention and Enforcement in the Information Age -- III. Israel and Online Terrorism.-IV. Technological Issues -- V. Recommendations: Is There a Need for New Regulations?.
520 _a To see the author talk about the book, Fighting Terror Online, click on the link 'The Academic Channel,' under 'Related links' on this webpage. The unprecedented events that have taken place in recent years have led legislators and governments throughout the world to reconsider and restructure their policies regarding security issues. Today, worldwide attention is being given to a new security threat, in the form of global terrorism. Legal systems are being called upon to provide a response to these threats, in all areas of life, including the online environment. Among its many tools, global terror also uses advanced technological methods. This fact presents a difficult challenge to policymakers. Therefore, we have chosen to focus this book on the issue of formulating appropriate policy at the interface between security and technology, human rights and economic policy. The fundamental issue - the tension between security needs and civil rights - is not new. A great deal of experience has been amassed in various countries in this regard, and the question that now arises is whether the existing system of principles and laws, developed on the basis of experience gathered in the "concrete" world, is applicable to the "digital" environment. This book presents the position that the online environment is a significant and relevant theater of activity in the fight against terror, and will identify the threats, the security needs, and the issues that are unique to this environment. We examine whether the unique characteristics of this environment require new legal solutions, or whether existing solutions are sufficient. Three areas of online activity are identified that require reexamination: security, monitoring, and propaganda. For each of these, we will indicate the issues, examine existing legal arrangements, and offer guidelines for formulating legal policy. There is a demonstrated need to relate to the digital environment as a battlefront, map the new security threats, and thereby hope to provide focus to the pressing discussion on today's legislative and technological agenda.
650 0 _aCOMPUTER SCIENCE.
650 0 _aCRIMINAL LAW.
650 0 _aCRIMINOLOGY.
650 1 4 _aSOCIAL SCIENCES, GENERAL.
650 2 4 _aCRIMINOLOGY & CRIMINAL JUSTICE.
650 2 4 _aCOMPUTERS AND SOCIETY.
650 2 4 _aCRIMINAL LAW.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387735771
856 4 0 _uhttp://dx.doi.org/10.1007/978-0-387-73578-8
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-SHU
942 _2ddc
_cER
999 _c58481
_d58481