Order Number |
636738393092 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
Impact of Effective Legislation on Cyberterrorism in United States
Impact, Effective, Legislation, Cyberterrorism, United, States
This is the proposal that has been done. Please use scholarly articles and not books for the references. The edits include Introduction should start on the page after the abstract. This intro is far too short. It should provide more background info. Also, you are writing a proposal for actual, raw-data gathering original research, not a proposal or a paper which intends to use the already completed research of others. The problem statement should be one, max two, sentences.
The need was imposed in the US? This doesn’t make sense. This section also doesn’t tell me what the problem is that your proposed research will hopefully address. The lit review should review the literature that already exists related to the topic you are proposing for future research. The research method/design section is not right. This is supposed to be a proposal for future research. Please see the sample proposal for an example. You have written a paper, not a proposal for future research.
Assessing the Impact of Effective Legislation on Cyberterrorism in the United States
Abstract
The world has developed due to the developing technology and the internet. As the internet develops, the risks rise and increase. Cyberterrorism is a threat to the internet and has affected the lives of people in different ways. Some severe ways are leading to death and destruction of the properties. If not taken care of, cyber terrorism would lead to destruction and more severe catastrophes.
The United States has implemented measures to ensure that all those criminals who involve themselves in the crime face the consequences of their acts. The legislation protects the people using the internet and technology, giving them a safer and secure environment.
Introduction
Cyberterrorism has grabbed the attention of not only the U.S. but also the Globe. The general mass media, information technology and all technological fields in the world. The act of cyber terrorists electronically breaking into the computers and controlling them has a worrying trend not only to the affected company or organization but also to the national internet security. In the United States, measures have been put in place to control the cyberterrorism that has been taking place.
To control the rate of cyber terrorism, which is likely to rise at a tremendous rate, and get worse U.S., have implemented legislative laws and regulations acts (Harrison, 2018). This paper will address the impact of the legislation on cyberterrorism in the U.S. The paper has been developed from research papers and documents addressing the cyberterrorism act.
Problem Statement
Cyber terrorism has been coined from cyberspace and terrorism to refer to unlawful attacks and threats towards computers, networks and information technology. Cyberterrorism has affected the livelihood of many people in different areas over the Globe. In the United States, cyberterrorism that resulted in violence led to different scenarios of people losing their lives, destruction of properties, and affected the country’s economy.
Cyber terrorism is severe in that it can be conducted remotely without any personal knowledge and people get to realize it after the damage has already taken place. The need to have legislation and regulatory laws to prevent cyberterrorism was therefore imposed in the United States.
Literature Review
Cyber terrorism has affected people differently, and the act of the government to have laws that protect the lives of the people, computers and information technology from attackers have been effective (Abiodun, 2021). This literature review aims to research the impacts of effective legislation on cyberterrorism in the united states.
Improved psychological well being
Cyber terrorists have affected the well being of the people. Their psychological well being and leads to stress and anxiety. Each attack, be it cyber, lethal, kinetic or non-lethal, affects the people’s well-being and, more so, the people closely related to the attack. The regulation that the U.S. has implemented has protected the lives of the people. The laws only tend to put the attackers’ lives at risk in which they will have to face the consequences of their acts.
For example, the computer fraud and abuse act law of the United States prohibits any person from committing a crime using a computer. Any attack and denial of service (DoS) to cause an attack to pose the attacker to imprisonment for 20 years and above, depending on the offence committed (Ghose & Ali, 2021). The well being ff the people is maintained and protected as they will not have to warry; hence the attackers have been taken care f and most likely, the rate of cyber terrorism is likely to fall.
Reduced threat perception.
Exposure to many and severe terrorism acts from the cyber have led to increased perception of threats. Past cyber attacks lead to the people fearing and may even lead to them fearing to implement the use of the technology in their fields of work despite the enormous growing internet and technology. In a study done at Sitka, Alaska, the people who were the respondents during the research reported that the harms from cyberattacks are so severe. 18 % of the respondents reported that the threat perception in the technology world due to cyber terrorism is 3-9% stronger than those who have never experienced cyber terrorism and attacks.
The legislation and the regulatory laws implemented to hinder the cyber terrorism act reduce the people’s threat and risk perception. Unlike the effects of terrorist groups that tend to affect people’s lives directly and mount catastrophic effects on the economy, cyber terrorism tends to use cyberspace. The effects of terrorism may be harmful to people’s lives as they ultimately endanger them through their information from computers. The risk and threat perception are reduced as any person who acquires information illegally is, or rather the unsolicited penetration, is subjected to imprisonment. According to the 18 U.S.C. 1030 (a)(1) law of the United States (McNicholas & Angle, 2020).
Reduced political attitudes
Cyber terrorism is a boost of the political cloud in the Globe (Abdallah et al. 2019). All important information is shared through the technology in existence that tends to reach all people around the Globe. For faster transmission of information, people embrace the use of technology. However, criminals tend to use it illegally to cause violence and political instability in different countries. In the U.S., non-lethal and lethal terrorism has been practising. However, these acts have been discouraged with the laws and legislation as the criminal faces the probable sentence and judgements.
Research methods/design
This paper is developed under research from e-books and publications. The internet consists of information from the different people who have faced challenges and knowledge on dealing with cyber-terrorism. Published books have enough information to describe the impacts of cyberterrorism and how the implemented law has helped. Analyzing the different books and publications help get clear details and an overview of cyber terrorism and how it has affected the lives of the people and, more so, the developing Globe.
References
Abdallah, J. A., Awang, M. B. B., & Ahmad, A. A. (2019). Cyberterrorism as a Threat to International Peace and Security: A Critical Discourse.
Abiodun, A. (2021). A comparative analysis of the legal framework for the criminalization of cyberterrorism in Nigeria, England and the United States. Nnamdi Azikiwe University Journal of International Law and Jurisprudence, 12(1), 99-112.
Ghose, A., & Ali, S. M. (2021). Cyber Terrorism: Analyzing the Threat in the Light of 9/11 Attack in the U.S.A. and 26/11 Attack in Mumbai (India).
Harrison Dinniss, H. A. (2018). The threat of cyber terrorism and what international law should (try to) do about it. Geo. J. Int’l Aff., 19, 43.
McNicholas, E. & Angle, K. (2020) U.S.A.: Cybersecurity laws and regulations 2021. https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/usa
RUBRIC | |||
Excellent Quality
95-100%
|
Introduction
45-41 points The context and relevance of the issue, as well as a clear description of the study aim, are presented. The history of searches is discussed. |
Literature Support
91-84 points The context and relevance of the issue, as well as a clear description of the study aim, are presented. The history of searches is discussed. |
Methodology
58-53 points With titles for each slide as well as bulleted sections to group relevant information as required, the content is well-organized. Excellent use of typeface, color, images, effects, and so on to improve readability and presenting content. The minimum length criterion of 10 slides/pages is reached. |
Average Score
50-85% |
40-38 points
More depth/information is required for the context and importance, otherwise the study detail will be unclear. There is no search history information supplied. |
83-76 points
There is a review of important theoretical literature, however there is limited integration of research into problem-related ideas. The review is just partly focused and arranged. There is research that both supports and opposes. A summary of the material given is provided. The conclusion may or may not include a biblical integration. |
52-49 points
The content is somewhat ordered, but there is no discernible organization. The use of typeface, color, graphics, effects, and so on may sometimes distract from the presenting substance. It is possible that the length criteria will not be reached. |
Poor Quality
0-45% |
37-1 points
The context and/or importance are lacking. There is no search history information supplied. |
75-1 points
There has been an examination of relevant theoretical literature, but still no research concerning problem-related concepts has been synthesized. The review is just somewhat focused and organized. The provided overview of content does not include any supporting or opposing research. The conclusion has no scriptural references. |
48-1 points
There is no logical or apparent organizational structure. There is no discernible logical sequence. The use of typeface, color, graphics, effects, and so on often detracts from the presenting substance. It is possible that the length criteria will not be reached. |
Place the Order Here: https://standardwriter.com/orders/ordernow / https://standardwriter.com/