000 | 05218nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-030-25436-0 | ||
003 | DE-He213 | ||
005 | 20220801214753.0 | ||
007 | cr nn 008mamaa | ||
008 | 191002s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030254360 _9978-3-030-25436-0 |
||
024 | 7 |
_a10.1007/978-3-030-25436-0 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
245 | 1 | 0 |
_aInvestigating Radicalization Trends _h[electronic resource] : _bCase Studies in Europe and Asia / _cedited by Babak Akhgar, Douglas Wells, José María Blanco. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXIV, 294 p. 35 illus., 18 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity Informatics and Law Enforcement, _x2523-8515 |
|
505 | 0 | _aChapter 1. Introduction -- Chapter 2. Security and European Polarisation -- Chapter 3. The Radicalisation-Factor Model (RFM): Proposing a Framework for the Systematic Investigation and Modelling of Online Radicalisation -- Chapter 4. The So-Called ‘Lone Wolf’ Phenomenon -- Chapter 5. Cyber Intelligence Against Radicalisation and Violent Extremism -- Chapter 6. Testing for Reliability of the TARGET Threat Analysis Instrument (TTAI) An Interdisciplinary Instrument for the Analysis of School Shooting Threats -- Chapter 7. Counter-Radicalisation Strategies: An Analysis of German and French Approaches and Implementations -- Chapter 8. Radicalisation: No Prevention Without ‘Juridicalisation’ -- Chapter 9. Countering Radicalisation in the United Kingdom: A Community-Based Approach -- Chapter 10. Enhancing Community Resilience: Assessing the role that black, Asian and minority ethnic law enforcement (LEA) staff associations and networks can play in the fight against radicalisation -- Chapter 11. The 'Choice to Challenge' Extreme Views in the Classroom? Counter-radicalisation and the Prevent Agenda in the University context -- Chapter 12. Mothers' Agency as an Alternative to the War on Terror. | |
520 | _aThis book provides a detailed insight into the complex dynamics of radicalization that are in play amongst contemporary society. The authors focus on understanding emerging trends and models that can be used to analyse and understand modern violent extremist and xenophobic discourse. The chapters cover multiple regions, providing a collective analysis of country-specific case studies for the formulation of best practices, recommendations and learning material. It is recommended that this book may serve as a compendium for practitioners, academics, teachers and students wishing to gain state-of-the art knowledge. Topics covered by the authors vary from hands-on practical information to tactical, operational, strategic and ethical guidance. This book provides a holistic, harmonized approach based upon European internal security strategies recognizing that internal security cannot be achieved in isolation from the rest of the world. Additionally, this material resonates with the EU’s commitment to fight extremism in a rational manner, alongside promoting human rights, democracy, peace and stability within the EU Member States. Presents a comprehensive understanding of the interconnectivities and trends behind emerging radicalisation patterns; Features newest conceptual and practical knowledge to monitor, analyse and respond to radicalization around the world; Provides a comprehensive view into the methodologies for analysis, through visualizations, case studies and applications. | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aInternational criminal law. _940338 |
|
650 | 0 |
_aCriminology. _940339 |
|
650 | 0 |
_aTerrorism. _940340 |
|
650 | 0 |
_aPolitical violence. _940341 |
|
650 | 1 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
650 | 2 | 4 |
_aComputer Communication Networks. _940342 |
650 | 2 | 4 |
_aInternational Criminal Law. _940343 |
650 | 2 | 4 |
_aCrime Control and Security. _940344 |
650 | 2 | 4 |
_aTerrorism and Political Violence. _940345 |
700 | 1 |
_aAkhgar, Babak. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _940346 |
|
700 | 1 |
_aWells, Douglas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _940347 |
|
700 | 1 |
_aBlanco, José María. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _940348 |
|
710 | 2 |
_aSpringerLink (Online service) _940349 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030254353 |
776 | 0 | 8 |
_iPrinted edition: _z9783030254377 |
830 | 0 |
_aSecurity Informatics and Law Enforcement, _x2523-8515 _940350 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-25436-0 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c76731 _d76731 |