메뉴 건너뛰기




Volumn 6, Issue 2, 2009, Pages 119-134

Terrorism and the proportionality of internet surveillance

Author keywords

Correspondence; Electronic Communications; Human Rights; Privacy; Surveillance

Indexed keywords


EID: 63649149615     PISSN: 14773708     EISSN: 17412609     Source Type: Journal    
DOI: 10.1177/1477370808100541     Document Type: Article
Times cited : (61)

References (24)
  • 2
    • 63649087772 scopus 로고    scopus 로고
    • The Second International Scientific Conference on Security and Countering Terrorism Issues, Moscow State University Institute for Information Security Issues, 25-28 October
    • Bird, J. (2006). Terrorist Use of the Internet. The Second International Scientific Conference on Security and Countering Terrorism Issues, Moscow State University Institute for Information Security Issues, 25-28 October.
    • (2006) Terrorist Use of the Internet
    • Bird, J.1
  • 4
    • 63649163767 scopus 로고    scopus 로고
    • The Law and Economics of Cybersecurity
    • Brown, I. (2007). The Law and Economics of Cybersecurity. Law Quarterly Review 123, 172-5.
    • (2007) Law Quarterly Review , vol.123 , pp. 172-175
    • Brown, I.1
  • 5
    • 63649103065 scopus 로고    scopus 로고
    • OSCE/ODIHR - UN HCHR Expert Workshop on Human Rights and International Co-operation in Counter-terrorism, ODIHR.GAL/14/07. URL (accessed 25 February 2008):
    • Bowring, W. (2006). The Human Rights Implications of International Listing Mechanisms for 'Terrorist' Organisations. OSCE/ODIHR - UN HCHR Expert Workshop on Human Rights and International Co-operation in Counter-terrorism, ODIHR.GAL/14/07. URL (accessed 25 February 2008): http://www.statewatch.org/terrorlists/OSCE-UN-feb-2007.pdf
    • (2006) The Human Rights Implications of International Listing Mechanisms for 'Terrorist' Organisations
    • Bowring, W.1
  • 6
    • 60950503129 scopus 로고    scopus 로고
    • Carlile (Lord) of Berriew, Cm 7052. London: The Stationery Office
    • Carlile (Lord) of Berriew (2007). The Definition of Terrorism, Cm 7052. London: The Stationery Office.
    • (2007) The Definition of Terrorism
  • 12
    • 63649094236 scopus 로고    scopus 로고
    • Beware Rise of Big Brother State, Warns Data Watchdog
    • 16 August. URL (accessed 28 February 2008):
    • Ford, R. (2004). Beware Rise of Big Brother State, Warns Data Watchdog. The Times, 16 August. URL (accessed 28 February 2008): http://www.timesonline.co.uk/tol/news/uk/article470264.ece
    • (2004) The Times
    • Ford, R.1
  • 13
    • 63649159214 scopus 로고    scopus 로고
    • Institute for Race Relations. URL (accessed 27 February 2008):
    • Institute for Race Relations (2004). Arrests Under Anti-terrorist Legislation Since 11 September 2001. URL (accessed 27 February 2008): http://www.irr.org.uk/pdf/terror_arrests_study.pdf
    • (2004) Arrests Under Anti-terrorist Legislation Since 11 September 2001
  • 15
    • 63649129635 scopus 로고    scopus 로고
    • Privacy International. URL (accessed 27 February 2008):
    • Privacy International (2005). Discrimination and Anti-Terror Policy Across Europe. URL (accessed 27 February 2008): http://www.privacyinternational.org/ article.shtml?cmd%5B347%5D=x-347-360509
    • (2005) Discrimination and Anti-Terror Policy Across Europe
  • 18
    • 63649160176 scopus 로고    scopus 로고
    • Schneier on Security, 9 March 2006. URL (accessed 25 February 2008):
    • Schneier, B. (2006). Data Mining for Terrorists. Schneier on Security, 9 March 2006. URL (accessed 25 February 2008): http://www.schneier.com/blog/archives/2006/03/data_mining_for.html 19
    • (2006) Data Mining for Terrorists
    • Schneier, B.1
  • 19
    • 63649160588 scopus 로고    scopus 로고
    • The Internet as a Tool for Counter-terrorism
    • NATO: Advanced Research Workshop, Garmisch-Partenkirchen, April
    • Shahar, Y. (2007). The Internet as a Tool for Counter-terrorism. Patrolling and Controlling Cyberspace. NATO: Advanced Research Workshop, Garmisch-Partenkirchen, April.
    • (2007) Patrolling and Controlling Cyberspace
    • Shahar, Y.1
  • 20
    • 43149095451 scopus 로고    scopus 로고
    • Chem-bio Cyber-class - Assessing Jihadist Chemical and Biological Weapons
    • Stenersen, A. (2007). Chem-bio Cyber-class - Assessing Jihadist Chemical and Biological Weapons. Jane's Intelligence Review 1 September, 8-13.
    • (2007) Jane's Intelligence Review 1 September, 8-13
    • Stenersen, A.1
  • 23
    • 63649119355 scopus 로고    scopus 로고
    • Terrorism and Information Sharing between the Intelligence and Law Enforcement Communities in the US and the Netherlands: Emergency Criminal Law?
    • Vervaele, J. (2005). Terrorism and Information Sharing between the Intelligence and Law Enforcement Communities in the US and the Netherlands: Emergency Criminal Law? Utrecht Law Review 1(1), 1-27.
    • (2005) Utrecht Law Review , vol.1 , Issue.1 , pp. 1-27
    • Vervaele, J.1
  • 24
    • 2442524420 scopus 로고    scopus 로고
    • Anti-terrorism Laws and Data Retention: War Is Over?
    • Walker, C. and Akdeniz, Y. (2003). Anti-terrorism Laws and Data Retention: War Is Over? Northern Ireland Legal Quarterly 54(2), 159-82.
    • (2003) Northern Ireland Legal Quarterly , vol.54 , Issue.2 , pp. 159-182
    • Walker, C.1    Akdeniz, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.