Friday, June 21, 2019

Can Rational Choice Theory Explain Cyber Terrorism in the United Research Paper

Can logical Choice Theory Explain Cyber Terrorism in the United States - enquiry Paper ExampleThis defines the scope of cyber terrorism and I, in this paper, explore the scope of cyber terrorism and existence of a relationship between the scope of cyber terrorism and Rational Choice Theory and the theorys applicability to cyber terrorism in the United States. Cyber terrorism The definition of cyber terrorism is controversial because of differences in professional perspectives. instruction technology experts, for example, dispute diversified opinions over the term cyber terrorism and existence of such a crime. There are however many security base definitions of cyber terrorism and their consideration can coin a comprehensive meaning. The North Atlantic Treaty Organization (NATO), defines cyber terrorism as an offensive that employs information processing system or communication networks to inflict significant harm or disorientation with the aim of creating fear or to intimidate a group in order to come upon an objective (Centre of Excellence Defence Against Terrorism, 2008, p. 119). The organization however identifies limitation in this definition because of lack of the physical aspects in the scope of the alleged blows. The National alkali Protection Center however offers a more comprehensive definition that incorporates elements of violence in the offensive acts, confusion as the attackers intentions, and political and social persuade as possible objectives (Centre of Excellence Defence Against Terrorism, 2008, p. 119). The federal Bureau of Investigations further incorporates pre-established plans into the acts that majorly target civilians (Centre of Excellence Defence Against Terrorism, 2008). Cyber terrorism is therefore a planned attack on a civilian group that is affiliated to a target political force, implemented using computer based applications and communication systems and leads to violence, destruction of stead and disorientations in order to instill fear and intimidate people into the offenders desires political, social, or ideological needs. Elements of cyber terrorism The scope of cyber terrorism identifies many elements. wizard of its major elements is the pelt along with which it is executed and the number of people that it affects. Being an illegal act that authorities would wish to divert, the crime is conducted at a swift speed to ensure success through avoiding possible prevention measures. The faster nature of the crime also identifies with its moderate of execution, the internet, which is instant. Cyber terrorism also affects many people because of the mediums property and the crimes aims. The internet condenses data and this means that extensive information that affects many people can be targeted by a single attack. Further, communication through the internet is fast, information is accessible to many people, and this spreads impacts of the offensive to a wider population (Keene, 2011). Illegal access to a system is other feature of cyber terrorism whose scope includes hacking of a targets website to interfere with its data or use the site to communicate the terrorists intended messages (Broadhurst, 2004). Application of computer and computer-based applications is another element of the

No comments:

Post a Comment