Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Keiran Hardy is active.

Publication


Featured researches published by Keiran Hardy.


Theoretical Criminology | 2015

Resilience in UK counter-terrorism

Keiran Hardy

Resilience describes the capacity of an individual, community or ecosystem to mitigate the impact of a shock or disturbance and then to recover in its aftermath. In recent years, resilience has become the favoured solution for a range of contemporary policy problems including natural disasters, mental health issues and terrorism. However, the concept is understood far less in criminology and counter-terrorism than in other fields such as psychology and natural hazards studies. This article compares resilience-building measures in the Prepare and Prevent strands of CONTEST, the UK government’s national strategy for countering terrorism. Its aim is to explore the benefits and dangers of resilience according to how the concept is defined and applied across different contexts.


Archive | 2014

What is ‘Cyberterrorism’? Computer and Internet Technology in Legal Definitions of Terrorism

Keiran Hardy; George Williams

The idea that terrorists could cause massive loss of life, worldwide economic chaos and irreparable environmental damage by hacking into critical infrastructure systems has captured the public imagination. Air traffic control systems, nuclear power stations, hospitals and stock markets are all viable targets for ‘cyberterrorists’ wanting to wreak havoc and destruction. On the less serious end of the spectrum, cyber-attacks against websites and other non-essential infrastructure by political ‘hacktivists’ are increasing by the day. Governments clearly need laws in place to protect against acts of cyberterrorism, but they also need to ensure that these laws do not encompass less serious uses of computer and Internet technology. This chapter examines legal definitions of terrorism and related offences in four Commonwealth nations (the United Kingdom, Australia, Canada and New Zealand). In doing so it addresses two questions. Firstly, what uses of computer and Internet technology does domestic law regard as acts of terrorism? Secondly, are existing legal responses to terrorism sufficient to cover the possibility of a serious act of cyberterrorism?


Computer Law & Security Review | 2017

Opening up government data for Big Data analysis and public benefit

Keiran Hardy; Alana Maurushat


Computer Law & Security Review | 2011

WWWMDs: Cyber-attacks against infrastructure in domestic anti-terror laws

Keiran Hardy


University of New South Wales law journal | 2010

Operation Titstorm: Hacktivism or Cyberterrorism?

Keiran Hardy


University of New South Wales law journal | 2014

Terrorist, traitor, or whistleblower?: Offences and protections in Australia for disclosing national security information

George Williams; Keiran Hardy


Archive | 2013

What is Terrorism? Assessing Domestic Legal Definitions

Keiran Hardy; George Williams


University of New South Wales law journal | 2011

Hijacking Public Discourse: Religious Motive in the Australian Definition of a Terrorist Act

Keiran Hardy


Alternative Law Journal | 2011

Bright lines and open prisons: The effect of a statutory human rights instrument on control order regimes

Keiran Hardy


Archive | 2016

Executive Oversight of Intelligence Agencies in Australia

Keiran Hardy; George Williams

Collaboration


Dive into the Keiran Hardy's collaboration.

Top Co-Authors

Avatar

George Williams

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar

Alana Maurushat

University of New South Wales

View shared research outputs
Researchain Logo
Decentralizing Knowledge