StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cyber Terrorism in International Relations - Research Paper Example

Cite this document
Summary
This research paper "Cyber Terrorism in International Relations" focuses on cyber-terrorism as one of the most dangerous forms of terrorism in the present era. "Cyber terrorism" appeared after the spread of information technology, the use of computers, and the Internet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful

Extract of sample "Cyber Terrorism in International Relations"

Download file to see previous pages

Despite the multiplicity of the peaceful uses and civil nature of the Internet, there have been other non-peaceful uses. This trend has led to new international conflicts based on the cyber terrorism phenomenon. This is brought by an interaction between information and communication technology, on one hand, terrorism and war, on the other hand, triggering complex issues and different challenges in front of all actors of the States and groups and individuals. Cyberterrorism is the use of digital technologies to scare the subjection of others.

It involves attacking information systems on the background of political motives, and ethnic, social, or religious issues. Thus criminals create a terrorist attacks on the internet aiming at violence against people or property or at least spread fear and terror (Wiemann, 2006). Cyberterrorism depends on the exploitation of the means of communication and information networks, in order to intimidate others, damage, or threaten. Terrorism and the internet are linked in two ways. First, there is exercise or acts of sabotage on computer networks and the internet.

  Secondly, the internet has become a platform for groups and individuals to disseminate messages of hatred and violence and to communicate with each other and supporters and sympathizers (Graham, 2010). With the growth of the Internet and information technology, terrorists will be more dependent on electronic communication technology in the future. Thus, future wars will become more complex and dangerous. States and governments must impose adequate control of all internet networks to prevent entry into some of the sites which are used by terrorists.

Cyberterrorism is within the fourth generation of wars which evolved from realistic wars during the three generations and ended in proxy wars on the territory of other States (Wiemann, 2006). The fourth generation of digital wars penetrates the limits of solid-state tractor armies. It has become easy to penetrate the borders of the state due to transparent infiltration using internet information networks. 

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cyber Terrorism - the Decline of the Specificity of the State, and a T Research Paper, n.d.)
Cyber Terrorism - the Decline of the Specificity of the State, and a T Research Paper. https://studentshare.org/information-technology/2067869-cyber-terrorism
(Cyber Terrorism - the Decline of the Specificity of the State, and a T Research Paper)
Cyber Terrorism - the Decline of the Specificity of the State, and a T Research Paper. https://studentshare.org/information-technology/2067869-cyber-terrorism.
“Cyber Terrorism - the Decline of the Specificity of the State, and a T Research Paper”. https://studentshare.org/information-technology/2067869-cyber-terrorism.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Terrorism in International Relations

Cyber Terrorists: Shutdown the Internet

here is no dogmatic definition of cyber terrorism and its interpretation varies across society.... terrorism has been the common agenda among people all around the modern world.... The concept of terrorism hit the social civilians of this planet in a bad way when The United States Of America was paralyzed by the attacks on the World Trade Center.... Cyber attacks relating to terrorism have been a serious concern for security agents all over....
15 Pages (3750 words) Essay

Discuss some of the treats that Cyberterrorism pose. How can cyberattacks be prevented

Unfortunately, this rapid and immense growth of computer technology has engendered a This new class of threats has been termed as cyber – threats, and in the present scenario, there is no section of society that can afford it.... The modus operandi of cyber – threats entails the employment of computer technology to perpetrate fraud, heinous crimes and other harmful acts against society.... With this arsenal, even smalltime cyber terrorists can communicate with other members in their group and their opponents....
11 Pages (2750 words) Essay

Cyber Terrorisum Past Present and Future

his paper will, therefore, discuss cyber terrorism in relation to its definition, the difference between Cyber terrorism and information warfare, the main targets of cyber terrorism, and the reasons why IT is the most preferred tool for cyber terrorism.... However, among all the definitions given, there is no universally accepted definition of cyber terrorism.... cyber terrorism results from the act of violence when technology is used in order to generate fear among the civilians,....
10 Pages (2500 words) Research Paper

Emergency, Exception and New Technologies in International Relations

In his 2012 article titled “Cyber Conflict and international Humanitarian Law”, Herbert Lin highlights the vulnerability to cyber conflict which the globe is continually immersing itself into.... These are collectively known as “cyber attacks.... ?? Lin asserts that cyber conflict has attained a level where it is a humanitarian issue but it is still not fully addressed by existing interventions such as the Geneva Conventions and the UN Charter....
4 Pages (1000 words) Essay

Digital Terrorism Risk Currently Facing Australia

This research "Digital Terrorism Risk Currently Facing Australia" will describe how does the risk of cyberterrorism compare to other forms of terrorism in terms of potential damage.... The term 'cyberterrorism' is becoming increasingly popular today, perhaps due to an increase in such a form of terrorism.... o see the difference and comparisons of both cyberterrorism and other forms of terrorism we will look at both their definitions and assess their impacts with the help of Gordon and Ford's (2003) terrorism Matrices....
10 Pages (2500 words) Research Paper

Cyber Terrorists: Shutdown the Internet

There is no dogmatic definition of cyber terrorism and its interpretation varies across society.... It is to be admitted that the domain of the threats in cyberspace is not restricted to any particular region and adherence to international cooperation is needed on a much larger scale.... The author concludes that the threats by the possible cyber attacks can be critical enough to drive the attention of the security agents of the developed and the developing countries....
10 Pages (2500 words) Term Paper

Cyber Crime: Investigating Cyber Terrorism

"Cyber Crime: Investigating Cyber Terrorism" paper looks at cyber terrorism in detail.... cyber terrorism refers to the use of Information Technology-based attacks in terrorist activities.... The following are some of the criminal activities regarded as Cyber Crimes: Online Fraud, Spam, Cyber Bullying, Piracy, and cyber terrorism.... cyber terrorism refers to the use of Information Technology-based attacks in terrorist activities (Matusitz, 2005)....
10 Pages (2500 words) Coursework

Electronic Terrorism and International Relations in Saudi Arabia

The deteriorating situation in international relations due to electronic terrorism has thus increased the level of concern among most people and the government in general.... The paper "Electronic Terrorism and international relations in Saudi Arabia" is an outstanding example of a military research proposal.... The paper "Electronic Terrorism and international relations in Saudi Arabia" is an outstanding example of a military research proposal....
8 Pages (2000 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us