menu
Impacts of Lack of Ethics in Cyber Technology Annotated | Ace My Homework | Acemyhomework Writers
Impacts of Lack of Ethics in Cyber Technology Annotated | Ace My Homework | Acemyhomework Writers
Task: This assignment asks you to write an annotated bibliography for your research paper. An annotated bibliography is a document that compiles citation

Impacts of Lack of Ethics in Cyber Technology Annotated | Ace My Homework | Acemyhomework Writers

Task:

This assignment asks you to write an annotated bibliography for your research paper. An annotated bibliography is a document that compiles citation information for the sources you gather as you conduct your research, along with a brief paragraph-long description of what the source is and how you might use it in your paper.

Here is what I expect to see in your annotated bibliography:

1)      An introduction (one substantial paragraph) in which you briefly discuss the sources you found, and the themes or big ideas that emerged from them. What kind of material did you find? Was there a lot, or a little? What did you notice about what you found, generally?

2)      Your collection of high quality sources, arranged in alphabetical order by author or source, as for a works cited page. Each source should be properly cited following a standard MLA format. Do not number or bullet this list.

3)      After each full citation, summarize the information in the source in your own words. For example, is it an old book, a 40-page scholarly article, the web site of an activist group, a documentary film, a news article you found online? What’s it about? Who wrote it? What is its intent or purpose? Summarize the information and ideas in the work and name its main point or highlights. Then, briefly evaluate or respond to the source. Is this source well written? Is it trustworthy and factual? What could a reader learn from this source? What makes this source interesting, or valuable to your research paper? This summary and evaluation should be one substantial paragraph long for each source.

4)      A concluding discussion (one substantial paragraph) of your research process, including the most interesting or surprising thing you learned during that research. This can be informal – just describe the ups and downs of your research. End with a statement of what you finally learned or what you take to be most important about the topic.

ANSWER

Impacts of Lack of Ethics in Cyber Technology

 Various authors have explored the various improvement in technology especially cyber technology. Besides the positive effects of technology, It has emerged that these improvements have negative impacts when they are not ethically used. The majority of the majority work in this field covers the cases studies on the relationship between the United States and the Islamic states. Most sources bring out the argument that there is an increase in cybercrime led by increased cyber technology. The United States is also in danger of being attacked hence they are always trying to enhance their security systems.

Ashley, B. The United States is vulnerable to cybercrime: The danger is real, and the country  must prepare (2004). Retrieved from: https://www.afcea.org/content/united-states-          vulnerable-cyberterrorism

This is an article in the Signal magazine. It covers the dangers of cybercrime that the United States is facing. The author, Ashley is the chief directorate of resources policy, plans, communications and information at the Pacific air force headquarters. The article gives a history of cyber terrorism in relation to technology and how it has developed to become a threat. Ashley explores the various examples where internet and communication technology is misused leading to security threats especially to the United States. This argument connects to my argument in the sense that it covers the reasons for the cause of alarm due to the growth of cyber technology. The source is relevant to my research paper as it provides more information on the efforts of the US government and security agencies to curb cyber terrorism.

Hoffman, Bruce. “A First Draft of the History of America’s Ongoing Wars on  Terrorism.”            Studies in Conflict & Terrorism. 38.1 (2015): 75-83. Print.

The purpose of this journal is to map out the Al Qaeda trends and movements since the attack of 2001 to the terrorism events of 2014 which led to the rise of ISIS. The author Hoffman Bruce is a tenured professor at the University of Georgetown and a political analyst specializing in the field of terrorism. In this journal, he brings out and explains the reasons why the United States is interested in the rise of terrorism in the Islamic states that stated during the time of George Bush and how the acts of terrorism affect the world. The rise of crime is highly related to improvement in technology in machinery, communication, and internet hence rise of cyber terrorism. His argument connects with mine on the contribution of cyber technology to rise of crime hence I find the document relevant to my research paper. The source is factual and gives a series of terrorist events between the Islamic states and the United States of America.

Kawilarang, Harry. Quotations on Terrorism. Victoria, B.C: Trafford, 2004. Print.

This is a 532-page book with a wide coverage of information from various sources related to terrorism around the world. Harry Kawilarang is an Indonesian journalist with experience since 1965. He has covered high profile and international military affairs in over 120 countries. He, therefore, has compiled this invaluable collection of causes and sources of terrorism. The author, Kawilarang argues that terrorism continues to a threat to many governments despite the efforts that they have made to stop it. He backs up his argument by facts and quotes in his book that are collected from all over the world. This connects with my argument that evolvement of cyber technology has created growth of crime. The sector is sensitive to security and that it has attracted attention from the citizens, government, businesses, banks and various sectors. The source is well written with facts from various authors. The collection of many sources also helps the reader to find a variety of material and different writers’ perspectives in one document. The source is relevant to my research as it documents information of the rise of terrorism around the world.

Kushner, Harvey W. The Future of Terrorism: Violence in the New Millennium. Thousand            Oaks,  Calif: Sage Publications, 1998. Print.

The purpose of this excerpt of the book was to discuss the future of cyber technology and the resulting threats to security. It discusses how improvement in biological and computer technology leads to crime when misused. The author is Kushner. He is a chair of the department and professor of criminal justice at the Long Island University. Kushner has experience in matters of international terrorism. He has worked with some of the United States security agencies such as the FBI. This book provides insight into classes of terrorism, international and local terrorism in the US. It discusses how terror groups use technology to infiltrate the US, the current threats, and future expectations. This book shares a common idea in my research paper that rise in cyber technology leads to increased chances of cyber insecurity in the US. The source is relevant to my research paper because they share a common theme.

Lehto, Martti, Aki-Mauri Huhtinen, and Saara Jantunen. “The Open Definition of Cyber:              Technology or a Social Construction?” International Journal of Cyber Warfare and        Terrorism (ijcwt). 1.2 (2011): 1-9. Print.

This is an article in the international journal of cyber welfare and terrorism. This journal publishes original social, political, legal, ethical and innovative findings related to cybersecurity and cybercrime. The authors, Lehto and Huhtnen are both professors at the Finnish national university and have given great contributions to the study of cybersecurity and leadership. The article is a discussion of the different perspective and understanding of cyberspace in business, government, security and social life. The authors argue that cyberspace is defined by incorporating the social and technical aspects even though it has not been comprehensively defined. The authors’ argument connects with my argument as it supports that improvement in technology has led to cyberspace becoming more comprehensive and its abuse is a threat to the government and security agencies. The article provides a wider perspective of how cyber technology is related to other social entities especially security and the military.

Lewis, James A. Assessing the Risks of Cyber Terrorism, Cyber War, and Other Cyber Threats.    Washington, D.C: Center for Strategic & International Studies, 2002. Print. Retrieved    from http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf

The article was published by the center for strategic and international studies I 2002. This article brings together the recent history of cybercrime and the strategies that have been used to stop the crime. The author is James Lewis. He is a senior fellow and director of technology at the center for strategic and international studies. He also has worked as a senior member of the United States Security Council. The document reflects the infrastructure that has been put in place to secure the United States from cases of cybercrime. Lewis argues that the security systems sometimes are prone to failure due improved technical abilities of cyber terrorists. His argument agrees with mine in that there is a constant increase in the risk of crime with improvement in technology. The source is well written and factual as the author has first-hand information. This is because he has worked with the security agencies of the US. It is relevant to my research paper because it gives factual information on the cases of cybercrime that have happened in the past to support my argument.

Conclusion

Lack of ethics in use of cyber technology has led to various impacts such as cybercrime which is the major threat related to internet use and growth of cyber technology. Therefore, it’s necessary to find out the major effects of cyber-related crime in the modern age. Most authors’ have foreseen the future of cyber technology and as time moves some of the documented arguments have come to pass. It is necessary for the government and concerned urgencies to act fast before the foreseen threats come to pass. During the research process I learned that most Americans are becoming smatter for wrong reasons, the urge to hack, access other people’s information illegally, and involvement in internet related crimes is growing among the country’s citizenry. ). Technology is an important tool but while it is being used, intelligence has to be the guide. The concern in the misuse of technology is paramount in the United States because if it is uncontrolled, the good qualities of technology will be attached.

Kindly visit acemyhomeworks.com and get help on your annotated bibliography

© 2019 Acemyhomework Writers - WordPress Theme by Kadence WP