Verified Document

Internet And Terrorism By James Term Paper

The author stresses that overreacting would not hinder the terrorists, as they would simply seek other means to access the technology and innocents would likely be bared from access. As with so many other documents associated with the CSIS there is a clear sense that the organization and its members seek to offer logical rather than counterproductive solutions to battling terrorism. There is no traditional literature review within this work. There are only a few quotes, lacking citation a clear opinion piece that offers little in the way of evidence, and an great deal of expert opinion. A traditional review of literature would supplement this work with additional information in favor of the arguments as well as contrary to the arguments, which would likely be as illogical as the options the author counters in the work.

Again there is no traditional methodology section in this work as it is largely an expert opinion of the current state of the use of the internet by terrorists. The hypothesis as stated is assumed to be used by the reader and possibly future researchers as a basis for future research, rather than an isolated research hypothesis. The author gives logical reasoning to his opinion but does not prove or disprove...

This work could be judged as macro-analytical as it focuses on an issue that is global, as internet technology and those seeking to utilize it for unsavory purposes is a universal concern, and terrorism is a global problem in part being financed and supported through the utilization of the internet as a tool rather than a weapon of the fight.
Results of this article again are not in the traditional research format, as it is an educated opinion statement. The flow of the article however is logical and could serve as a logical piece to begin a research project that was more traditional, on the subject. Alternative interpretations of the work are many though the logical alternative would be to argue the counter point, that forcing greater restrictions of access is the way to stop the spread of information associated with ideology and internet fraud associated with terrorism, though the author makes a logical argument that counters this plan in his opinion.

Lewis, James a. (April 1, 2005) "The Internet and Terrorism" in the Proceedings of the 99th Annual Meeting of the American Society for International Law at http://www.csis.org/component/option,com_csis_pubs/task, view/id,523

Sources used in this document:
Again there is no traditional methodology section in this work as it is largely an expert opinion of the current state of the use of the internet by terrorists. The hypothesis as stated is assumed to be used by the reader and possibly future researchers as a basis for future research, rather than an isolated research hypothesis. The author gives logical reasoning to his opinion but does not prove or disprove his hypothesis with current research. This work could be judged as macro-analytical as it focuses on an issue that is global, as internet technology and those seeking to utilize it for unsavory purposes is a universal concern, and terrorism is a global problem in part being financed and supported through the utilization of the internet as a tool rather than a weapon of the fight.

Results of this article again are not in the traditional research format, as it is an educated opinion statement. The flow of the article however is logical and could serve as a logical piece to begin a research project that was more traditional, on the subject. Alternative interpretations of the work are many though the logical alternative would be to argue the counter point, that forcing greater restrictions of access is the way to stop the spread of information associated with ideology and internet fraud associated with terrorism, though the author makes a logical argument that counters this plan in his opinion.

Lewis, James a. (April 1, 2005) "The Internet and Terrorism" in the Proceedings of the 99th Annual Meeting of the American Society for International Law at http://www.csis.org/component/option,com_csis_pubs/task, view/id,523
Cite this Document:
Copy Bibliography Citation

Related Documents

Terrorism and National Policy
Words: 2263 Length: 6 Document Type: Essay

TERRORISM & NATIONAL POLICY Terrorism and National Policy The main concern of the U.S. National Security Council relates to the existing terrorist movements that pose risks to Americans citizens and its territory. The U.S. has historically been one of the main targets of the Islamist terrorist groups alongside other countries such as Israel. The U.S. has undertaken various national policies to combat terrorism within and beyond its borders. However, the September 11

Terrorism and Raymond James Stadium
Words: 3212 Length: 9 Document Type: Thesis

According to Stefanie Olson (2001), the Act provides government with increased electronic surveillance, search and data gathering power. Under the guise of tracking down "potential" terrorists, the expansion of Internet eavesdropping technology provides the government with full viewing rights into any private life they choose. In this way, immigrants who enter the country and conduct their business in a perfectly legal manner are now targeted for such surveys (White,

Terrorism Encyclopedias and Dictionaries Define
Words: 4573 Length: 15 Document Type: Term Paper

At times terrorist succeed and at times they fail. Some times they have larger and long-term goal and some times they have short-term aims. For example, a group hijacking a plane wanted some immediate results like release of the prisoners or financial gain but blowing a plane into a building would definitely mean that terrorists wanted something big out of it. Sometimes terrorists want to just cause panic and

Terrorism and Domestic "Soft Targets"
Words: 3109 Length: 10 Document Type: Term Paper

In the first instance an attack of this nature usually serves a symbolic purpose from the terrorist's point-of-view in that he or she is seen to be attacking the bastion of global Western commerce. Secondly, many business concerns are more vulnerable to attack as they are usually not as heavily secured as military or energy installations. There is also the factor that American financial institutions are invariably identified with

Terrorism and Weapons of Mass Destruction
Words: 1626 Length: 5 Document Type: Term Paper

Weapons of Mass Destruction Nuclear terrorism or weapons of mass destruction (WMD) were labeled as the single most serious threat to the national security of the United States of America by President George W. Bush. When President Barack Obama came into office, he had the same sentiments about the growing terrorism in the Middle East. Our leaders and security experts see terrorist having access to WMD as nightmares when they sleep.

Latin America American Terrorism Issues and Possible
Words: 7613 Length: 25 Document Type: Research Paper

Latin America American terrorism issues and possible convergence with drug cartels in Central and South America Terrorism in Latin America Columbia The leftist National Liberation Army (ELN) United Self-Defense Forces of Colombia (AUC) The leftist Revolutionary Armed Forces of Colombia (FARC) Cuba Venezuela Mexico Iranian Activity and Sponsorship Focus Tri- Boarder area of Argentina, Brazil and Paraguay Regional Overview and Criminal Activities and Concerns Parallel developments of Terrorism and Organized Crime Poverty, Discrimination and Relative Denial Interconnections between Terrorism and Organized Crime Groups Abu Nidal organization (ANO) The

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now