Internet and Terrorism by James Term Paper

Total Length: 857 words ( 3 double-spaced pages)

Total Sources: 0

Page 1 of 3

The author stresses that overreacting would not hinder the terrorists, as they would simply seek other means to access the technology and innocents would likely be bared from access. As with so many other documents associated with the CSIS there is a clear sense that the organization and its members seek to offer logical rather than counterproductive solutions to battling terrorism.

There is no traditional literature review within this work. There are only a few quotes, lacking citation a clear opinion piece that offers little in the way of evidence, and an great deal of expert opinion. A traditional review of literature would supplement this work with additional information in favor of the arguments as well as contrary to the arguments, which would likely be as illogical as the options the author counters in the work.

Again there is no traditional methodology section in this work as it is largely an expert opinion of the current state of the use of the internet by terrorists. The hypothesis as stated is assumed to be used by the reader and possibly future researchers as a basis for future research, rather than an isolated research hypothesis. The author gives logical reasoning to his opinion but does not prove or disprove his hypothesis with current research.
This work could be judged as macro-analytical as it focuses on an issue that is global, as internet technology and those seeking to utilize it for unsavory purposes is a universal concern, and terrorism is a global problem in part being financed and supported through the utilization of the internet as a tool rather than a weapon of the fight.

Results of this article again are not in the traditional research format, as it is an educated opinion statement. The flow of the article however is logical and could serve as a logical piece to begin a research project that was more traditional, on the subject. Alternative interpretations of the work are many though the logical alternative would be to argue the counter point, that forcing greater restrictions of access is the way to stop the spread of information associated with ideology and internet fraud associated with terrorism, though the author makes a logical argument that counters this plan in his opinion.

Lewis, James a. (April 1, 2005) "The Internet and Terrorism" in the Proceedings of the 99th Annual Meeting of the American Society for International Law at http://www.csis.org/component/option,com_csis_pubs/task, view/id,523.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Internet And Terrorism By James" (2007, May 22) Retrieved May 21, 2025, from
https://www.aceyourpaper.com/essays/internet-terrorism-james-37584

Latest MLA Format (8th edition)

Copy Reference
"Internet And Terrorism By James" 22 May 2007. Web.21 May. 2025. <
https://www.aceyourpaper.com/essays/internet-terrorism-james-37584>

Latest Chicago Format (16th edition)

Copy Reference
"Internet And Terrorism By James", 22 May 2007, Accessed.21 May. 2025,
https://www.aceyourpaper.com/essays/internet-terrorism-james-37584