This research paper is about Cyber Security and it’s relations to terrorism. This paper serves to answer the topic question ” How does cyber security effectively change the risk of terrorism?”. The paper MUST include a minimum of 25 pages and 25 academic resources and all 25 or more resources MUST be included in the paper in APA style, including APA in-text citations. Note that I have already attached the first 25 resources to help you.
Research topic question: How does cyber security effectively change the risk of terrorism?
This paper should include:
- Introduction
- Literature Review
- Research Methods or Methodology (Discuss the research method/methods that grounds your paper (the type of method and why the method is used in social sciences, sampling, and limitations)
- Findings (from the Research based on the topic)
- Discussion (show how the findings address your research
- question)
- Conclusion
- Recommendations
- References
**Note** for the literature review, you must provide a broad summary of how scholars and researchers have addressed Cyber Security and Terrorism. That is, how have scholars defined the issue, is their consensus in the definitions, or have scholars discuss your topic without offering definitions, what has the bulk of the research focused on, what are the implication, etc. It is recommended that you organize the similarities or lack of similarities in the literature into themes. Themes are are an effective method for organizing your ideas in a research paper and improving the readability of your essay.
Homeland Security Cyber Securityterrorismgovernmentresearch paper
References
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
Bogdanoski, M., & Petreski, D. (2013). Cyber terrorism–global security threat. Contemporary
Macedonian Defense-International Scientific Defense, Security and Peace Journal, 13(24), 59-73.
Brenner, S. W. (2006). Cybercrime jurisdiction. Crime, law and social change, 46(4-5), 189-206.
Broadhurst, R., Grabosky, P., Alazab, M., & Bouhours, B. (2013). Organizations and
Cybercrime. Available at SSRN 2345525.
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the
internet. Academic press.
Cashell, B., Jackson, W. D., Jickling, M., & Webel, B. (2004). The economic impact of cyber-
attacks. Congressional Research Service Documents, CRS RL32331 (Washington DC),
Ciardhuáin, S. Ó. (2004). An extended model of cybercrime investigations. International Journal
of Digital Evidence, 3(1), 1-22.
Crenshaw, M. (1981). The causes of terrorism. Comparative politics, 13(4), 379-399.
Friedman, B. H. (2011). Managing fear: The politics of homeland security. Political Science
Quarterly, 126(1), 77-106.
Greitzer, F., & Hohimer, R. (2011). Modeling Human Behavior to Anticipate Insider Attacks.
Journal of Strategic Security, 4(2), 25-48. Retrieved February 7, 2020, from
www.jstor.org/stable/26463925
.
Heidenreich, B., & Gray, D. H. (2014). Cyber-Security: The Threat of the Internet. Global
Security Studies, 5(1).
Hunker, J., & Probst, C. W. (2011). Insiders and Insider Threats-An Overview of Definitions and
Mitigation Techniques. JoWUA, 2(1), 4-27.
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of
Computer and System Sciences, 80(5), 973-993.
Lewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats.
Washington, DC: Center for Strategic & International Studies.
Limba, T., Plėta, T., Agafonov, K., & Damkus, M. (2019). Cyber security management model
for critical infrastructure.
Maglaras, L. A., Kim, K. H., Janicke, H., Ferrag, M. A., Rallis, S., Fragkou, P., … & Cruz, T. J.
Moffett, J. D., & Nuseibeh, B. A. (2003). A framework for security requirements engineering.
Report-University of York Department of Computer Science YCS.
O’Connell, M. E. (2012). Cyber security without cyber war. Journal of Conflict and Security
Law, 17(2), 187-209.
Oladimeji, E. A., Supakkul, S., & Chung, L. (2006). Security threat modeling and analysis: A
goal-oriented approach. In Proc. of the 10th IASTED International Conference on
Software Engineering and Applications (SEA 2006) (pp. 13-15).
Oluwafemi, O., Adesuyi, F. A., & Abdulhamid, S. M. (2013). Combating terrorism with
cybersecurity: The Nigerian perspective. World journal of computer application and technology, 1(4), 103-109.
Peltier, T. R. (2010). Information security risk analysis. Auerbach publications.
Theohary, C. A. (2011). Terrorist use of the internet: Information operations in cyberspace.
DIANE Publishing.
Turkle, S. (1999). Cyberspace and identity. Contemporary sociology, 28(6), 643-648.
Wilson, C. (2003). Computer attack and cyber terrorism: vulnerabilities and policy issues for
Congress. Focus on Terrorism, 9(1), 1-42.
Yu, X., & Xue, Y. (2016). Smart grids: A cyber–physical systems perspective. Proceedings of
the IEEE, 104(5), 1058-1070.