Academic Paper from the year 2018 in the subject Politics - Topic: Peace and Conflict Security grade: 100.00 language: English abstract: The purpose of this research is to investigate both the government and extremists use of technology and discuss why the governments use and enhanced strategies are vital along with providing suggestions for future research and practicing of cyber security strategies. Extremists have always had some method in which they make their presence known whether it be via messages phone or through acts of violence and terror to convey a point. However more recently in the past two decades extremists began catching onto a more modern method of communicating : the use of the internet. What used to be a simple method for people to surf the web purchase household items and perform other daily activities has now been compromised as a channel for extremists to recruit and make financial advances (and prey on those using the internet unknowingly). Extremists have been turning their attention toward internet infiltration since the Chechen- Russian conflict era. However extremists’ more increased use of the internet can be traced back to the beginning of when the United States and a few other partners went to war with Iraq and Afghanistan in the early 2000’s. The internet became widely known amongst muslim youth as a transnational mode of communication which catalyzed the ideologies of several muslim youth making for easier targets within the United States.
Piracy-free
Assured Quality
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.