Tuesday, May 14, 2019
Can Rational Choice Theory Explain Cyber Terrorism in the United Research Paper
Can sage Choice Theory Explain Cyber Terrorism in the unite States - Research Paper ExampleThis defines the background knowledge of cyber terrorism and I, in this paper, explore the arena of cyber terrorism and existence of a relationship between the domain of cyber terrorism and Rational Choice Theory and the theorys applicability to cyber terrorism in the United States. Cyber terrorism The definition of cyber terrorism is controversial because of differences in professional perspectives. Information technology experts, for example, dispute diversify opinions over the term cyber terrorism and existence of such a annoyance. There are notwithstanding numerous security based definitions of cyber terrorism and their consideration can coin a comprehensive meaning. The North Atlantic Treaty Organization (NATO), defines cyber terrorism as an skanky that employs computer or conversation networks to inflict operative harm or disorientation with the aim of creating fear or to intim idate a group in order to achieve an objective (Centre of Excellence Defence Against Terrorism, 2008, p. 119). The organization however identifies limitation in this definition because of lack of the physical aspects in the scope of the alleged attacks. The National Infrastructure Protection Center however offers a more comprehensive definition that incorporates elements of violence in the offensive acts, confusion as the attackers intentions, and political and social influence as possible objectives (Centre of Excellence Defence Against Terrorism, 2008, p. 119). The federal Bureau of Investigations further incorporates pre-established plans into the acts that majorly fundament civils (Centre of Excellence Defence Against Terrorism, 2008). Cyber terrorism is therefore a planned attack on a civilian group that is affiliated to a target political force, implemented using computer based applications and communication systems and leads to violence, destruction of property and disorien tations in order to instill fear and intimidate people into the offenders desires political, social, or ideological needs. Elements of cyber terrorism The scope of cyber terrorism identifies many elements. One of its major elements is the speed with which it is kill and the number of people that it affects. Being an illegal act that authorities would wish to divert, the plague is conducted at a swift speed to ensure success through avoiding possible prevention measures. The faster nature of the crime also identifies with its medium of execution, the internet, which is instant. Cyber terrorism also affects many people because of the mediums property and the crimes aims. The internet condenses data and this means that extensive information that affects many people can be targeted by a single attack. Further, communication through the internet is fast, information is accessible to many people, and this spreads impacts of the offensive to a wider population (Keene, 2011). Illegal acce ss to a system is another feature of cyber terrorism whose scope includes hacking of a targets website to interfere with its data or use the site to communicate the terrorists think messages (Broadhurst, 2004). Application of computer and computer-based applications is another element of the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.