The author stresses that overreacting would not hinder the terrorists, as they would simply seek other means to access the technology and innocents would likely be bared from access. As with so many other documents associated with the CSIS there is a clear sense that the organization and its members seek to offer logical rather than counterproductive solutions to battling terrorism.
There is no traditional literature review within this work. There are only a few quotes, lacking citation a clear opinion piece that offers little in the way of evidence, and an great deal of expert opinion. A traditional review of literature would supplement this work with additional information in favor of the arguments as well as contrary to the arguments, which would likely be as illogical as the options the author counters in the work.
Again there is no traditional methodology section in this work as it is largely an expert opinion of the current state of the use of the internet by terrorists. The hypothesis as stated is assumed to be used by the reader and possibly future researchers as a basis for future research, rather than an isolated research hypothesis. The author gives logical reasoning to his opinion but does not prove or disprove...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now