Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
A National Law That Defines and Provides for Criminal Prosecution of Cyber Terrorism, Annotated Bibliography Example
Hire a Writer for Custom Annotated Bibliography
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Research Question: Should we have a national law that defines and provides for criminal prosecution of cyber terrorism?
Why It Matters: With the increased use of the internet as well as social media, crime that is not only international but also virtual is on the increase. This is a new and significant challenge to not only law informant agencies but also legal experts as well. Laws have to be created to protect victims of crime as well as institutions. It matter because cyber crime can attack the heart of democratic institutions and are the greatest threat we face from terrorists and criminals. Being able to put a face and tools to combat them is a very serious and important matter; law must catch up to the reality.
Tentative Thesis: The U. S. Congress should enact a national law governing the definition, prosecution, and punishment of cyber terrorism.
Sources
Samuel McQuade “The Encyclopedia of Cybercrime”, Westport, CT, USA: Greenwood Press. 2009. Print
This is a good resource for terminologies. There are no obvious biases in the book it is as it claims to be an encyclopedia of cyber crime. It uses several resources that I found credible and relevant especially when other sources would use terms that are unfamiliar or when looking for a particular topic or subject matter, it is a good guide. It will help when looking for a specific aspect or topic and provides further references.
David Parker “Fighting Computer Crime”, U.S.: Charles Scribner’s Sons. 1983. Print
The author looks at criminality in the cyber sphere from a unique perspective of both the perpetrator his pathology and motivations pushing him to do the crime. The author also covers how to overcome these people and the methods that they use. However the book relied too much on the psychological reasons for committing cyber terrorism but ignored the political motivations. Its greatest failure is looking at home grown terrorism. The book is also very readable which its winning point is. Its use is mainly in the counter measure proposed that will be used in the paper.
Chuck Easttom and Jeff Taylor “Computer Crime Investigation and the Law”, Course Technology. USA. 2010. Print
The book is essentially a how to book. How hackers do what they do. How to investigate it, the history of cyber crime. It introduces one to the various legal aspects from expert witnesses and the like. However how the book is useful is that it brings in the concept of encryption and hacker slang language which is a very important aspect in investigating cyber terrorism. This is especially true in a situation in which it is cross border in nature. The book leans too heavily on the law and lacks the psychological and political environment that allows these crimes to grow and exists. This is useful in that it’s a text book with easy to understand language for those who are not that computer sophisticated.
David Wall ‘Cybercrimes: The transformation of crime in the information age’, Cambridge: United Kingdom. 2007. Print
This book looks at hacking specifically. It looks at more from the technical software sphere. It is useful because it is not saying all hackers are bad but how they have a role to play in the prevention and protection. The book will be useful in formulating a rehabilitation plan in the paper. It will also help in seeing them not as only being criminals but also help high light their usefulness in terms of being cyber soldiers. The book is very balanced and does not have a particular leaning.
Verton, Dan (2003). Black Ice: ‘The Invisible Threat of Cyber-terrorism’. Osborne/McGraw-Hill, U.S. 2003. Print
This is the main resource that will be used in that it looks at cyber terrorism specifically in all its different facets the book is well balanced and brings some very useful highlights not considered in most books. It looks at the implications and the impact if such attack were to occur. It even looks at the civil liberties that will be threatened by the legal enactments by government. The author is an expert in the field and the number of experts featured makes it an excellent resource for the paper.
Stuck with your Annotated Bibliography?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee