Sample Thesis Paper
Thomas (2002) provided an extensive overview on how internet facilities are used in terrorist operations. Still, however, it was unclear whether individuals who were involved in any of these nine activities was always and indeed terrorists or whether they were just ordinary individuals who were operating out of motives that were their own. This raised a further question of the extent to which private individuals may know how their activities may or may not support terrorists in their cause. Because terrorists often attempt to remain undetected (Zalman, 2011), it was found critical to understand how the public viewed the efforts of terrorists and what their extent of knowledge was regarding such terrorists activities.
The questions arose, then, what does the public believe about information terrorism and how can they avoid taking part in activities that promote it? This was difficult to answer because no firm definition was found in the literature. For example, Gordon and Ford (2003) investigated cyberterrorism using the definition of the term taken from the Special Oversight Panel on Terrorism Committee which is as follows:
“Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss would be examples. Serious attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not.”