Wednesday, February 26, 2020
Can Rational Choice Theory Explain Cyber Terrorism in the United Research Paper
Can Rational Choice Theory Explain Cyber Terrorism in the United States - Research Paper Example This defines the scope of cyber terrorism and I, in this paper, explore the scope of cyber terrorism and existence of a relationship between the scope of cyber terrorism and Rational Choice Theory and the theoryââ¬â¢s applicability to cyber terrorism in the United States. Cyber terrorism The definition of cyber terrorism is controversial because of differences in professional perspectives. Information technology experts, for example, dispute diversified opinions over the term cyber terrorism and existence of such a crime. There are however many security based definitions of cyber terrorism and their consideration can coin a comprehensive meaning. The North Atlantic Treaty Organization (NATO), defines cyber terrorism as an offensive that employs ââ¬Å"computer or communication networksâ⬠to inflict significant harm or disorientation with the aim of creating ââ¬Å"fear or to intimidateâ⬠a group in order to achieve an objective (Centre of Excellence Defence Against Terro rism, 2008, p. 119). The organization however identifies limitation in this definition because of lack of the physical aspects in the scope of the alleged attacks. The National Infrastructure Protection Center however offers a more comprehensive definition that incorporates elements of violence in the offensive acts, confusion as the attackersââ¬â¢ intentions, and ââ¬Å"political and socialâ⬠influence as possible objectives (Centre of Excellence Defence Against Terrorism, 2008, p. 119). The federal Bureau of Investigations further incorporates pre-established plans into the acts that majorly target civilians (Centre of Excellence Defence Against Terrorism, 2008). Cyber terrorism is therefore a planned attack on a civilian group that is affiliated to a target political force, implemented using computer based applications and communication systems and leads to violence, destruction of property and disorientations in order to instill fear and intimidate people into the offend erââ¬â¢s desires political, social, or ideological needs. Elements of cyber terrorism The scope of cyber terrorism identifies many elements. One of its major elements is the speed with which it is executed and the number of people that it affects. Being an illegal act that authorities would wish to divert, the crime is conducted at a swift speed to ensure success through avoiding possible prevention measures. The faster nature of the crime also identifies with its medium of execution, the internet, which is instant. Cyber terrorism also affects many people because of the mediumââ¬â¢s property and the crimeââ¬â¢s aims. The internet condenses data and this means that extensive information that affects many people can be targeted by a single attack. Further, communication through the internet is fast, information is accessible to many people, and this spreads impacts of the offensive to a wider population (Keene, 2011). Illegal access to a system is another feature of cyber te rrorism whose scope includes hacking of a targetââ¬â¢s website to interfere with its data or use the site to communicate the terroristsââ¬â¢ intended messages (Broadhurst, 2004). Application of computer and computer-based applications is another element of the
Monday, February 10, 2020
The Data Scientists PowerPoint Presentation Example | Topics and Well Written Essays - 250 words
The Data Scientists - PowerPoint Presentation Example In this regard, they suggest that data can amount to four basic objectives, thus report role; where issues that have occurred can be understood, diagnostic role; where the reasons for their occurrences are noted, predictive role; where projections of future events can be based and finally recommendation role; where ideas can be suggested based on the projections made (Davenport and Patil 73). The lasting effect of data storage is vested in vested in their master definitive roles of economic significance. Such data have got overwhelming value. It can also yield to efficiency especially in organizations. Such a pivot is easily provided to make the organization perform on a higher playing ground (Davenport and Patil, 76). In my general perspective, with the advent of data scientists, business models can be rapidly developed. A point to back this is the argument that organizations use enormous capital to maintain the data infrastructure, yet still, the end users doesnââ¬â¢t incur direct monetary implications. The question is then, where could be the compensation for such a massive investment? The answer to this is pointed at the amount of data at the disposal of such
Subscribe to:
Posts (Atom)