Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Cyber Terrorism Mcgraw Hill - 1,352 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

Irrational and Destructive Logic of Cyber Terrorism The study of Political science encompasses the areas of governments, public policies, political processes, and systems including political behaviors and theories concerning the ideal government and how power and resources are allocated in society. Critical issues that concern the community like the environment, health, civil rights, international relations and affairs are but some of the sub-fields included in the scope of Political Science. Scientists (as well as students of political science) depend on an array of perspectives (both humanistic and scientific), methodological approaches and tools in examining and analysing the process, systems, and political dynamics. The study of the past events is definitely vital and indispensable in understanding current situations.

Knowledge of the historical perspective of each issue helps in making effective and impartial appraisal of the state of affairs. Being in touch with both the past and the present gives a political analyst / scientist a good grip of forecasting and preparing for the future course of actions. This particular paper will give a situational analysis of cyber terrorism. The global conditions and circumstances that we are in now needs an in-depth and critical investigation so that governments can develop institutions of peace and justice that are effective in upholding the rights of all human being.

The topic of cyber terrorism falls under International Relations (IR) which includes under its banner the study of global issues and foreign relations among states within the international system. The rapid rise and evolving changes in globalization have fueled the integration of international economies and the speedy development and growth in the field of communications and technology. The anonymity afforded by cyberspace has open many doors to become more pervasive in all areas of human endeavors. Opportunities to threaten individuals, entities and institutions are manifold plus the convenience of the absence of inherent threat of capture, injury and death to the attacker that physical presence would normally bring. As the expansion and revolutionary development of the Internet continues and so with the increasing dependence and reliance of most of the worlds business on it. The computer systems are becoming more and more complex and interdependent with each other thus the facility of assigning huge amount of responsibilities (e.

g. banking, hospital records, government security plans and projects) to it. With this situation, instances for sabotage or terrorism via the cyberspace have become more serious, more real and more lethal. There have been a lot of attempts at defining the word terrorism but Leonard Weinberg and company have found out that there were hundreds of them and some have even conflicting ideas. From the hundreds they have studies, the group of researchers was able to formulate one definition which almost encompasses all [t]errors is a politically motivated tactic involving the threat or use of force or violence in which the pursuit of publicity plays a significant role. The creation, coining of the term cyber terrorism has created a lot of gray-areas in terms of clarity and consistency.

Since the use of the term first came out from discussions conducted by popular media, the operational definitions of new terms was not a basic feature but the effect, the sensation and the drama the word evokes is. The tendency to freely invent and pair words with "cyber, "computer, " or "information" when dealing with computers has created an arsenal of words -- - cybercrime, insofar, network, cyber terrorism, cyber harassment, virtual warfare, digital terrorism, cyber tactics, computer warfare, cyber attack, and cyber-break-ins -- - which can actually mean anything and which must largely refer to what some military ambiguously call new terrorism. A professor of computer science, Dorothy Denning, has introduced a greater semantic precision by putting forward an unambiguous definition in her numerous articles about the subject and in her testimony on the subject before the House Armed Services Committee in May 2000: Cyber terrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyber terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, or severe economic loss would be examples.

Serious attacks against critical infrastructures could be acts of cyber terrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not. Cyber terrorism has posed a very potential threat and has provoked considerable alarm. The danger of cyber terrorists hacking into government and private computer systems and crippling the military, financial, and service sectors of advanced economies is real. And yet, despite much publicized danger and threat by numerous security experts, politicians, and others predicts there is no single instance of recorded cyber terrorism. The fear of cyber terrorism might be well-founded but it is also largely exaggerated because of the psychological, political, and economic forces that have combined to promote it.

The natural tendency of man to distrust anything new and revolutionary has escalated the fear of computer technology added to the constant and real fear of random, violent victimization that is rampant in these modern times. Cyber terrorism is, to be sure, an attractive option for modern terrorists, who value its anonymity, the potential to inflict massive damage, its psychological impact, and its media appeal but reports, records and researches have found out that even highly sophisticated terrorists do not have the capability, as of today, to conduct massive cyber attacks. The most they can do is inflict harm and serious damages to several institutions but putting down the whole system is very remote. A number of cyber exercises have been conducted by both the US military and energy sectors (the most likely entities to be attacked in cyberspace) and they were able to pinpoint several vulnerabilities in the computer network but this do not mean that there is a remote possibility that someone can break into them. With cyber technology playing a very significant role in many national and global institutions and infrastructures, the dread and the horror of cyber attacks is probable and can actually be expected. In fact several attacks have been carried out and some were even successful on critical components of the national infrastructure but these are not conducted by terrorists and have not sought to inflict the kind of damage that would qualify as cyber terrorism.

Most infrastructures with sensitive records on the computer system have conducted and are continuously creating efforts and measures to protect their systems and make them inaccessible to outside hackers. Although the private sector tend to have less protection than military systems, they are far from defenseless, and the nightmarish tales of their vulnerability tend to be largely dubious and untrue. The horror of cyber terrorism may be manipulated and exaggerated but the community can neither deny nor ignore it. Oddly enough, the massive campaign and the success in the global war on terror is likely to make terrorists more creative and might just push them to turn to unconventional weapons, such as cyber terrorism. And as a new, more computer-savvy generation of terrorists comes of age, the danger seems set to increase and the possibility of its success is highly probable.

Works Cited Leonard Weinberg, Ami Pedahzur & Sivan Hirsch-Hoefler. (2004). The Challenges of Conceptualizing Terrorism. Terrorism and Political Violence, Vol. 16, No. 4. Dan Version. (2003) Black Ice: The Invisible Threat of Cyber-Terror. New York, USA: McGraw-Hill Osborne Media.

Bibliography Burton, Brian. On Welfare and Terror: Social Welfare Policies and Political-Economic Roots of Terrorism, Journal of Conflict Resolution. Online (2006). Retrieved on April 27, 2008 at web Heineman, Robert A. Introduction to Political Science.

London: Mcgraw-Hill Education Europe, 1995. Mitchell, Faith and Neil J. Seller. Terrorism: Perspectives from the Behavioral and Social, Online e-book: National Academies Press, 2002.

O'Brien, Kevin A. Information Age, Terrorism and Warfare, Small Wars and Insurgencies, Vol. 14, No. 1, (2003), pp. 183 - 206.


Free research essays on topics related to: mcgraw hill, significant role, international relations, political science, cyber terrorism

Research essay sample on Cyber Terrorism Mcgraw Hill

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com