Cyberterrorism, while understood by some on a basic level, remains an elusive concept to many. There is no agreed upon definition in academia or government for this term. Due to this, it can be difficult to pinpoint what exactly constitutes cyberterrorism. In their article, Klein (2018) utilized a definition by Denning (2000), who described cyberterrorism as the place where cyberspace meets terrorism. This by itself seems easy enough to understand. Denning’s (2000) definition also states cyberterrorism includes unlawful acts committed to threaten a government or people to act in accordance with the terrorists’ wishes. Furthermore, the act must include violence, or cause enough damage to elicit fear (Denning, 2000). This definition provides many requirements for an act to be considered terrorism. This could prove difficult for prosecution purposes, depending on the region the act occurs in.
There are several reasons why there is no single definition of cyberterrorism. For one, cyberterrorism depends on the technological capabilities of the victim in addition to the suspect. What could be considered cyberterrorism to one country may be different to another, depending on technological advancements. Additionally, technology is always advancing. This makes it difficult to solidify a definition as it could change in coming years. Cavelty (2007) stated, “academics agree in general that to be labeled cyber-terrorism, cyber-incidents must be mounted by sub-national terrorist groups, be aimed at parts of the information infrastructure, instill terror by effects that are sufficiently destructive or disruptive to generate fear, and must have a political, religious, or ideological motivation” (p. 22). Compared to Denning’s (2000) definition, Cavelty’s (2007) seems rather similar. However, Cavelty’s (2007) includes that cyberterrorism must be aimed at the information infrastructure and narrowed down the categories of the terrorists’ motivations. This definition provides more information but also states cyberterrorism must be violent in nature. This shows how it would be prudent to have a single definition for cyberterrorism so as to decrease confusion and make laws more precise.
Denning, D. (2000, May 23). “Cyberterrorism,” testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives. www.stealthiss.com/documents/pdf/cyberterrorism.pdf
Cavelty, M. D. (2007). Cyber-terror–looming threat or phantom menace? The framing of the US cyber-threat debate. Journal of Information Technology & Politics, 4(1), 19–36. Doi: 10.1300/J516v04n01_03
Klein, J. J. (2018). Deterring and dissuading cyberterrorism. Air & Space Power Journal: Afrique et Francophonie, 9(1), 21–34. Doi: 10.5038/1944-0418.104.22.1680
Why Work with Us
Top Quality and Well-Researched Papers
Our writers are encouraged to read and research widely to have rich information before writing clients’ papers. Therefore, be it high school or PhD level paper, it will always be a well-researched work handled by experts.
Professional and Experienced Academic Writers
For one to become part of our team, thorough interview and vetting is undertaken to make sure their academic level and experience are beyond reproach, hence enabling us give our clients top quality work.
Free Unlimited Revisions
Once you have received your paper and feel that some issues have been missed, just request for revision and it will be done. In addition, you can present your work to the tutor and he/she asks for improvement/changes, we are always ready to assist.
Prompt Delivery and 100% Money-Back-Guarantee
All our papers are sent to the clients before the deadline to allow them time to review the work before presenting to the tutor. If for some reason we feel our writers cannot meet the deadline, we will contact you to ask for more time. If this is not possible, then the paid amount will be refunded.
Original & Confidential
Our writers have been trained to ensure work produced is free of plagiarism. Software to check originality are also applied. Our clients’ information is highly guarded from third parties to ensure confidentiality is maintained.
24/7 Customer Support
Our support team is available 24 hours, 7 days a week. You can reach the team via live chat, email or phone call. You can always get in touch whenever you need any assistance.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
You have had a hectic day, and still need to complete your assignment, yet it is late at night. No need to panic. Place your order with us, retire to bed, and once you wake up, the paper will be ready.
It does not matter the urgency of your paper, or the academic level, our team is ready to help you 24/7. Just contact us and all your academic needs will be sorted.
Admission Essays & Business Writing Help
A student is often required to write an admission letter requesting to be admitted in a certain institution. For you to be gain that admission in your dream institution, you must write a convincing letter. You can depend on our team for the best admission letters.
Academic writing is not just about getting information and throwing it all over. Our team will ensure you have a polished paper that is coherent and has a good flow of information. We also ensure the paper follows the correct formatting styles like APA, Harvard, MLA, Chicago/Turabian.
If our writers write a paper but you are not satisfied in one way or another, you can always ask for revision. This is totally free. Our writers and editors will revise your paper untill you are be totally satisfied. We as well offer revision for papers not done by our writers at a small fee.