Tuesday, August 13, 2019

Can Rational Choice Theory Explain Cyber Terrorism in the United Research Paper

Can Rational Choice Theory Explain Cyber Terrorism in the United States - Research Paper Example This defines the scope of cyber terrorism and I, in this paper, explore the scope of cyber terrorism and existence of a relationship between the scope of cyber terrorism and Rational Choice Theory and the theory’s applicability to cyber terrorism in the United States. Cyber terrorism The definition of cyber terrorism is controversial because of differences in professional perspectives. Information technology experts, for example, dispute diversified opinions over the term cyber terrorism and existence of such a crime. There are however many security based definitions of cyber terrorism and their consideration can coin a comprehensive meaning. The North Atlantic Treaty Organization (NATO), defines cyber terrorism as an offensive that employs â€Å"computer or communication networks† to inflict significant harm or disorientation with the aim of creating â€Å"fear or to intimidate† a group in order to achieve an objective (Centre of Excellence Defence Against Terro rism, 2008, p. 119). The organization however identifies limitation in this definition because of lack of the physical aspects in the scope of the alleged attacks. The National Infrastructure Protection Center however offers a more comprehensive definition that incorporates elements of violence in the offensive acts, confusion as the attackers’ intentions, and â€Å"political and social† influence as possible objectives (Centre of Excellence Defence Against Terrorism, 2008, p. 119). The federal Bureau of Investigations further incorporates pre-established plans into the acts that majorly target civilians (Centre of Excellence Defence Against Terrorism, 2008). Cyber terrorism is therefore a planned attack on a civilian group that is affiliated to a target political force, implemented using computer based applications and communication systems and leads to violence, destruction of property and disorientations in order to instill fear and intimidate people into the offend er’s desires political, social, or ideological needs. Elements of cyber terrorism The scope of cyber terrorism identifies many elements. One of its major elements is the speed with which it is executed and the number of people that it affects. Being an illegal act that authorities would wish to divert, the crime is conducted at a swift speed to ensure success through avoiding possible prevention measures. The faster nature of the crime also identifies with its medium of execution, the internet, which is instant. Cyber terrorism also affects many people because of the medium’s property and the crime’s aims. The internet condenses data and this means that extensive information that affects many people can be targeted by a single attack. Further, communication through the internet is fast, information is accessible to many people, and this spreads impacts of the offensive to a wider population (Keene, 2011). Illegal access to a system is another feature of cyber te rrorism whose scope includes hacking of a target’s website to interfere with its data or use the site to communicate the terrorists’ intended messages (Broadhurst, 2004). Application of computer and computer-based applications is another element of the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.