Skip to main content

Author: Rachel Sakhi--DeVry University, JADM110 Criminology || POLICY ISSUES: PERSONAL FREEDOMS IN THE INFORMATION AGE: TERRORISM HAS BECOME ENHANCED BY THE CONVENIENCES OF THE WORLD WIDE WEB:...




  • Collapse Subdiscussion
    Rachel Sakhi

    Rachel Sakhi






    TYPES OF TERRORISM: Advancements in Defining Terrorism
    According to Schmalleger (2014) "Kidnapping, Assassination, and Disruptive" activities upon the peaceful goings of daily life in a society is considered terrorism which works in collaboration with the other major types of terrorism as listed here below: 
    • STATE SPONSORED TERRORISM - Upon or utilizing government officials (i.e., attacking cops or politicians, etc.)
    • RETRIBUTIVE TERRORISM - Seeking revenge for some wrong doing felt is owed to a group or cause (i.e., eating or sending cows, chickens, and other animals to the butcher to sell for food at grocery stores, etc.)
    • NATIONALIST TERRORISM - Seeking to represent parties and groups in conquering laws
    • POLITICAL TERRORISM - Crimes against the government (Spreading blasphemy to influence citizens, etc.)
    • REVOLUTIONARY TERRORISM - Trying to alter and reinvent a government, supporting negative social change
    The United States governments takes every step necessary to investigate and prevent any potential risks or threats of security breaches to the country, and here is one example according to Schmalleger (2011)
    "The Cyber Security Enhancement Act (CSEA) (Links to an external site.) of 2002,18 (Links to an external site.) which is part of the Homeland Security Act of 2002, directed the U.S. Sentencing Commission to take several factors into account in creating new sentencing guidelines for computer criminals. The law told the commission to consider not only what financial loss was caused by computer crime, but also what level of planning was involved in the offense, whether the crime was committed for commercial or private advantage, and whether malicious intent existed on the part of the perpetrator"  which is one example of the measures utilized to enhance monitoring of potential dangers to conveniences made available for citizens and residents without having to reside in constant fear or confusion as to public or national safety and security. 
    POLICY ISSUES: PERSONAL FREEDOMS IN THE INFORMATION AGE: 
    TERRORISM HAS BECOME ENHANCED BY THE CONVENIENCES OF THE WORLD WIDE WEB: 


    • Globalization carries potential to mate with many types of terrorism:
      • Cybercrime
      • Voice-Over Software to Disguise the Voice
      • High Technology and Opportunity
      • Cyber Theft
      • Cyber Vandalism
      • Any Computer-Related Crimes
      • Hacking
      • Bank Fraud
      • Phishing
      • Phone Phreak
      • Software Piracy
      • Digital Copyright Theft or Infringement

    Citation
    Schmalleger, F. J. (2014-01-01). Criminology Today: An Integrative Introduction, 7th Edition. [Bookshelf Online]. Retrieved from https://online.vitalsource.com/#/books/9781323105238/


     Reply Reply to Comment

Comments

Popular posts from this blog

CO 5 There's murder (like installation of snake eggs inside a silicone breast bag with tied intestines paid for to a hired hitman, etc.), rape, aggravated assault, etc. and therefore:

Image: "Horizantes: A Cocaine Cartel" || Flickr Images, 2017 || Author: Rachel Sakhi, DeVry U--JADM210 (Introductions to Corrections) - The Beverly Hills Act for Offender Protections and Rights of 2018

Collapse Subdiscussion Rachel Sakhi Rachel Sakhi 1:42pmSep 28 at 1:42pm Manage Discussion Entry Wednesday, September 27, 2017 DeVry University: Week 5, JADM-110 Professor Swerine Rachel Sakhi, Discussion Meeting: "Crimes Against Persons" Title of Post: Boyeurism vs.Voyeurism (The Peeping Tom Psychopathy Personality)