Sample Thesis Paper
Terrorism will be defined according to the definition drafted in 2000 by the United Nations General Assembly, in the Comprehensive Convention on International Terrorism, as paraphrased below:
The commission of an offence by any means, unlawfully and intentionally, that causes: (a) Death or serious bodily injury; or (b) Serious damage to public or private property, including a place of public use, a State or government facility, a public transportation system, an infrastructure facility or the environment; or (c) Damage to property, places, facilities, or systems resulting or likely to result in major economic loss, when the purpose of the conduct, by its nature or context, is to intimidate a population, or to compel a Government or an international organization to do or abstain from doing any act. (Annex II, art. 2.1.)
There are many aspects involved in defining Information Terrorism. For one, it is considered as the link between “criminal information system fraud or abuse, and the physical violence of terrorism” (Devost et al., 1996, p. 10). It also involves the “intentionally abuse of digital information system, network, or component toward an end that supports or facilitates a terrorist campaign or action” (Thomas, 2002, p. 33). This concise explanation also clearly identifies the participation of internet or computer technology which already provides a basic clue on how to identify information terrorism. Albeit this approach does not really involve the use of violence in influencing people, still the use of fear in manipulating their minds may result to unfavorable actions and consequences (Devost et al., 1996, p. 10).