Tuesday, August 13, 2019
Can Rational Choice Theory Explain Cyber Terrorism in the United Research Paper
Can Rational Choice Theory Explain Cyber Terrorism in the United States - Research Paper Example This defines the scope of cyber terrorism and I, in this paper, explore the scope of cyber terrorism and existence of a relationship between the scope of cyber terrorism and Rational Choice Theory and the theoryââ¬â¢s applicability to cyber terrorism in the United States. Cyber terrorism The definition of cyber terrorism is controversial because of differences in professional perspectives. Information technology experts, for example, dispute diversified opinions over the term cyber terrorism and existence of such a crime. There are however many security based definitions of cyber terrorism and their consideration can coin a comprehensive meaning. The North Atlantic Treaty Organization (NATO), defines cyber terrorism as an offensive that employs ââ¬Å"computer or communication networksâ⬠to inflict significant harm or disorientation with the aim of creating ââ¬Å"fear or to intimidateâ⬠a group in order to achieve an objective (Centre of Excellence Defence Against Terro rism, 2008, p. 119). The organization however identifies limitation in this definition because of lack of the physical aspects in the scope of the alleged attacks. The National Infrastructure Protection Center however offers a more comprehensive definition that incorporates elements of violence in the offensive acts, confusion as the attackersââ¬â¢ intentions, and ââ¬Å"political and socialâ⬠influence as possible objectives (Centre of Excellence Defence Against Terrorism, 2008, p. 119). The federal Bureau of Investigations further incorporates pre-established plans into the acts that majorly target civilians (Centre of Excellence Defence Against Terrorism, 2008). Cyber terrorism is therefore a planned attack on a civilian group that is affiliated to a target political force, implemented using computer based applications and communication systems and leads to violence, destruction of property and disorientations in order to instill fear and intimidate people into the offend erââ¬â¢s desires political, social, or ideological needs. Elements of cyber terrorism The scope of cyber terrorism identifies many elements. One of its major elements is the speed with which it is executed and the number of people that it affects. Being an illegal act that authorities would wish to divert, the crime is conducted at a swift speed to ensure success through avoiding possible prevention measures. The faster nature of the crime also identifies with its medium of execution, the internet, which is instant. Cyber terrorism also affects many people because of the mediumââ¬â¢s property and the crimeââ¬â¢s aims. The internet condenses data and this means that extensive information that affects many people can be targeted by a single attack. Further, communication through the internet is fast, information is accessible to many people, and this spreads impacts of the offensive to a wider population (Keene, 2011). Illegal access to a system is another feature of cyber te rrorism whose scope includes hacking of a targetââ¬â¢s website to interfere with its data or use the site to communicate the terroristsââ¬â¢ intended messages (Broadhurst, 2004). Application of computer and computer-based applications is another element of the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.