All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

A National Law That Defines and Provides for Criminal Prosecution of Cyber Terrorism, Annotated Bibliography Example

Pages: 2

Words: 680

Annotated Bibliography

Research Question: Should we have a national law that defines and provides for criminal prosecution of cyber terrorism?

Why It Matters: With the increased use of the internet as well as social media, crime that is not only international but also virtual is on the increase. This is a new and significant challenge to not only law informant agencies but also legal experts as well. Laws have to be created to protect victims of crime as well as institutions. It matter because cyber crime can attack the heart of democratic institutions and are the greatest threat we face from terrorists and criminals. Being able to put a face and tools to combat them is a very serious and important matter; law must catch up to the reality.

Tentative Thesis: The U. S. Congress should enact a national law governing the definition, prosecution, and punishment of cyber terrorism.

Sources

Samuel McQuade “The Encyclopedia of Cybercrime”, Westport, CT, USA: Greenwood Press. 2009. Print

This is a good resource for terminologies. There are no obvious biases in the book it is as it claims to be an encyclopedia of cyber crime. It uses several resources that I found credible and relevant especially when other sources would use terms that are unfamiliar or when looking for a particular topic or subject matter, it is a good guide. It will help when looking for a specific aspect or topic and provides further references.

David Parker “Fighting Computer Crime”, U.S.: Charles Scribner’s Sons. 1983. Print

The author looks at criminality in the cyber sphere from a unique perspective of both the perpetrator his pathology and motivations pushing him to do the crime. The author also covers how to overcome these people and the methods that they use. However the book relied too much on the psychological reasons for committing cyber terrorism but ignored the political motivations. Its greatest failure is looking at home grown terrorism. The book is also very readable which its winning point is. Its use is mainly in the counter measure proposed that will be used in the paper.

Chuck Easttom and Jeff Taylor “Computer Crime Investigation and the Law”, Course Technology. USA. 2010. Print  

The book is essentially a how to book. How hackers do what they do. How to investigate it, the history of cyber crime. It introduces one to the various legal aspects from expert witnesses and the like. However how the book is useful is that it brings in the concept of encryption and hacker slang language which is a very important aspect in investigating cyber terrorism. This is especially true in a situation in which it is cross border in nature. The book leans too heavily on the law and lacks the psychological and political environment that allows these crimes to grow and exists. This is useful in that it’s a text book with easy to understand language for those who are not that computer sophisticated.

David Wall ‘Cybercrimes: The transformation of crime in the information age’, Cambridge: United Kingdom. 2007. Print

This book looks at hacking specifically. It looks at more from the technical software sphere. It is useful because it is not saying all hackers are bad but how they have a role to play in the prevention and protection. The book will be useful in formulating a rehabilitation plan in the paper. It will also help in seeing them not as only being criminals but also help high light their usefulness in terms of being cyber soldiers. The book is very balanced and does not have a particular leaning.

Verton, Dan (2003). Black Ice: ‘The Invisible Threat of Cyber-terrorism’. Osborne/McGraw-Hill, U.S. 2003. Print

This is the main resource that will be used in that it looks at cyber terrorism specifically in all its different facets the book is well balanced and brings some very useful highlights not considered in most books. It looks at the implications and the impact if such attack were to occur. It even looks at the civil liberties that will be threatened by the legal enactments by government. The author is an expert in the field and the number of experts featured makes it an excellent resource for the paper.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Annotated Bibliography Samples & Examples

Crohn’s Diseases, Annotated Bibliography Example

Chang, M., Cohen, B., & Greenstein, A. (2015). A Review of the Impact of Biologics on Surgical Complications in Crohn?s Disease. Inflammatory Bowel Diseases, 1. [...]

Pages: 2

Words: 638

Annotated Bibliography

Spanking, Annotated Bibliography Example

Best, J. (1994). Troubling children: Studies of children and social problems New York: Aldine De Gruyter. This book explained how the concept of spanking changed [...]

Pages: 2

Words: 544

Annotated Bibliography

Opiate Addiction and Treatment, Annotated Bibliography Example

Sordo, Luis, et al. “Mortality risk during and after opioid substitution treatment: systematic review and meta-analysis of cohort studies.” BMJ 357, j1550: 2017. The article [...]

Pages: 3

Words: 733

Annotated Bibliography

The Psychopathology of Social Phobia, Annotated Bibliography Example

Webster, J. D., & Ma, X. (2013). A balanced time perspective in adulthood: Well-being and developmental effects. Canadian Journal on Aging, 32(4), 433-442. doi:http://dx.doi.org/10.1017/S0714980813000500 Webster [...]

Pages: 8

Words: 2238

Annotated Bibliography

The Management of Business Virtual Teams, Annotated Bibliography Example

Ásólfsdóttir, Á. H. (2012). Leading a Virtual Team: Globalization and IT Project Management. Reykjavík University. Retrieved December 13, 2015, from http://skemman.is/en/stream/get/1946/12963/30713/1/Leading_a_Virtual_Team_%C3%81sta_Hildur.pdf The author provides a [...]

Pages: 6

Words: 1611

Annotated Bibliography

Relationship Counseling, Annotated Bibliography Example

Dartmouth College. (2010). Healthy Exchange. Retrieved from http://www.dartmouth.edu/~eap/library/spring.pdf The selected site is a part of the Dartmouth College newsletter and this information was authored by [...]

Pages: 2

Words: 561

Annotated Bibliography

Crohn’s Diseases, Annotated Bibliography Example

Chang, M., Cohen, B., & Greenstein, A. (2015). A Review of the Impact of Biologics on Surgical Complications in Crohn?s Disease. Inflammatory Bowel Diseases, 1. [...]

Pages: 2

Words: 638

Annotated Bibliography

Spanking, Annotated Bibliography Example

Best, J. (1994). Troubling children: Studies of children and social problems New York: Aldine De Gruyter. This book explained how the concept of spanking changed [...]

Pages: 2

Words: 544

Annotated Bibliography

Opiate Addiction and Treatment, Annotated Bibliography Example

Sordo, Luis, et al. “Mortality risk during and after opioid substitution treatment: systematic review and meta-analysis of cohort studies.” BMJ 357, j1550: 2017. The article [...]

Pages: 3

Words: 733

Annotated Bibliography

The Psychopathology of Social Phobia, Annotated Bibliography Example

Webster, J. D., & Ma, X. (2013). A balanced time perspective in adulthood: Well-being and developmental effects. Canadian Journal on Aging, 32(4), 433-442. doi:http://dx.doi.org/10.1017/S0714980813000500 Webster [...]

Pages: 8

Words: 2238

Annotated Bibliography

The Management of Business Virtual Teams, Annotated Bibliography Example

Ásólfsdóttir, Á. H. (2012). Leading a Virtual Team: Globalization and IT Project Management. Reykjavík University. Retrieved December 13, 2015, from http://skemman.is/en/stream/get/1946/12963/30713/1/Leading_a_Virtual_Team_%C3%81sta_Hildur.pdf The author provides a [...]

Pages: 6

Words: 1611

Annotated Bibliography

Relationship Counseling, Annotated Bibliography Example

Dartmouth College. (2010). Healthy Exchange. Retrieved from http://www.dartmouth.edu/~eap/library/spring.pdf The selected site is a part of the Dartmouth College newsletter and this information was authored by [...]

Pages: 2

Words: 561

Annotated Bibliography