SlideShare a Scribd company logo
1 of 10
Running head: TECHNOLOGY INFLUENCES 1
TECHNOLOGY INFLUENCES 4
Technology Influences
Tiara Miller
Professor Gauvreau
CRJ 499
5/5/16
Technology Influences
Criminal injustice can take many forms and in this case, we
choose to focus on terrorism which is the currently trending
form of criminal injustice. According to Wilkinson, (2012)
technology involves the application of scientific knowledge in
order to achieve any objectives and affects the values of a given
society. In one way or another technology has adversely
contributed to its increment and effect rate of terrorism in many
countries, thus affecting both the external and internal
stakeholders. Technology takes a huge platform and due to the
rate at which technology is advancing then many people are
being affected by this since it is out of this that terrorism is also
advancing.
For any terrorism threat to be conveyed any country then it has
to be channeled through a medium of communication which
takes any form of technology, it could be an email or a short
message service through the social media platforms. The threat
could also be through the magazines, audios or even video clips
which are spread through the internet and this results in a threat
in any given state. The terrorist can use the technology to
disseminate a propaganda and takes the form of multimedia
communications providing ideological or practical instruction,
explanations, justifications or promotion of terrorist activities.
With this justification then a part of the population tend to
believe that their actions are right but in the real sense, it is
affecting a country in many ways. The economy is greatly
affected and therefore, it results to a countries downfall.
The internet has also been used as a platform to recruit the
minors to the terrorist groups, it may sound impossible but it is
the new direction taken by the terrorists. This is possible as
they establish a relationship between themselves and those that
are interested. Terrorist organization use many platforms such
as password protected website platforms and restricted chat
groups that enhance direct communication. The restriction
offers a platform for them to learn about the organization its
mission and vision and the objectives it wants to achieve. With
this then they are supported and in any way, the organization
will never die since the number of people to replace those who
died increases. It is with the use of technological barriers to
entering to the recruitment platforms also increases the
complexity of tracking terrorism-related activity by intelligence
and law enforcement personnel.
The internet being one of the forms of technology has been used
as a good platform to incite the people and this makes terrorism
gain more power. The Internet provides an abundance of
material and opportunities to download, edit and distribute
content that may be considered unlawful glorification of, or
provocation to, acts of terrorism. Also with the incite comes
the radicalization on which the it refers to the process of
training that often accompanies the transformation of recruits
into individuals determined to act with violence based on
extremist ideologies. It often involves the use of propaganda.
The process of recruitment and radicalization commonly
realizes on an individual’s sentiments of injustice, exclusion or
humiliation.
How to implement this is by constantly monitoring the internet
and as well as know the content of each message. An
information system that monitors the restricted website
platforms should also be developed so that it can also monitor
the communication of the terrorist officials and the new
recruits. A new policy should be developed that will enable the
law to control young people and how they use the internet since
they are the most affected by radicalization.
References
Wilkinson, P. (2012). Technology and terrorism. Hoboken:
Taylor and Francis.
Running head: INTERNAL AND EXTERNAL
STAKEHOLDERS 1
INTERNAL AND EXTERNAL STAKEHOLDERS
5
Internal and External Stakeholders
Tiara Miller
Strayer University
CRJ 499
4/29/16
Internal and External Stakeholders
Identify the Internal and External Stakeholders.
Internal stakeholders are the people who the individuals and the
parties of a certain organization in a country while the external
stakeholders are the individuals or the groups of people that are
not part of an organization, but they are directly affected by the
activities of that organization (Henisz, 2014). In this context
regarding to terrorism, the internal stakeholders are the people
who are involved in the criminal groups that organize and
conduct the terrorist activities such as mass killing, raping,
bombing buildings and other nasty activities in order to change
some laws that are in operation in a certain country or as a
result of the religious differences. External stakeholders, on the
other hand, can be attributed to the loyal citizens of a country
who are innocent but end up being affected by the activities
conducted by these terroristic activities. The external
stakeholders also include the children and women who are not
part of the terrorist activities, but they get to suffer as a result
of the humiliating and the negative activities that are performed
by the terrorists in these organizations leaving them as orphans
and widows when their fathers and their husbands respectively
die.
Discuss how internal or external stakeholders have influenced
the situation in a positive or negative way?
One of the ways in which the internal stakeholders in the
terrorist groups have influenced the situation of the
continuously increasing terrorists’ activities in the different
countries is that once the parents of the children have been
killed, the terrorist groups takes up the helpless kids. When the
victims of terrorism die, the terrorists take their helpless
children and induct them in their vices. For example in the
country of Somali, the Al Shabaab abducts the children left by
the parents behind after their death and takes them in their
hideouts. It is in these places that they train them and introduce
them to the terrorist group. This increases the instances of
terrorism due to the increased manpower to conduct the
inhuman activities leading to so much suffering on the loyal
citizens in the country.
The other way in which the stakeholders have influenced the
situation negatively is that some of the external stakeholders
find it a pleasure to support the al-Shabaab and other terrorist
groups by giving them the finances to support their activities.
The support given to these groups fuel their inhuman activities
since it becomes easy for them t attain the amount of funds that
they require purchasing the ammunitions that they require using
for the bombing activities and the mass killing (Sandler, &
Enders, 2010). This at times makes it difficult for the affected
country to inhibit such activities due to lack of the necessary
funds and support to inhibit the terrorist activities in the
country. This results in a reduction in the economic growth of a
country as a result of the reduction in the level of revenue
received from investments since many investors prefer to
withdraw from the countries facing political upheavals.
The other way in which the external stakeholders have
influenced the situation negatively is failing to collaborate with
their respective governments on their fight against terrorism in
their countries. Many citizens in the different countries that are
affected by the terrorist activities tend not to cooperate with
their governments in revealing the individuals committing the
terroristic activities (Malisow, & French, 2008). Other people
especially the youths in the different countries make the largest
portion of the terrorists attacking their mother countries. Their
failure to be loyalty to their mother country can be attributed to
the increase in the level of terroristic activities in these
countries. For instance, many youths in Kenya have been
inducted in the Al Shabaab activities which are a terrorist group
located in Somali and responsible for so many inhuman
incidences in Kenya which show that they are not loyal to their
mother countries and also their brothers and sisters who are
living there.
How will you consider stakeholders in your solution to the
problem? How will you motivate individuals to buy into your
solution?
One of the ways in which I will consider the stakeholders in the
solution to my problem is to urge the government to train more
young and energetic youths in the defense countries so that they
can be used to fight for the country and protect it from the
terrorist attacks. The recruitment and training of more people in
the defense forces of the countries will increase the number of
people deployed in the key areas to prevent the terrorist
activities from taking place in the country. This will also assist
at the times of attacks to ensure that order is maintained and
help offered is adequate. The other way that I will take the
stakeholders into account is to ban any transaction done by the
groups that are known to be funding the terrorist groups in the
countries where the attacks were taking place. This will assist in
ensuring that no financial support is issued to them to reduce
their strength. The other way is training the youths in the
country on the importance of becoming loyal to their country
and also encourage them to engage in income generating
activities so that they can ensure economic growth of their
country. I will motivate the individuals to buy in my solution by
convincing them on how the terrorist activities have a negative
impact on the economic growth and development of a country
and how curbing it would be of great importance to all the
people. I will also encourage them to report all the people who
they suspect are involved in the terrorist activities.
References
Henisz, W. (2014). Corporate diplomacy: building reputations
and relationships with external stakeholders. Sheffield, U.K:
Greenleaf Publishing.
Malisow, B. & French, J. (2008). Terrorism. New York, NY:
Chelsea House.
Sandler, T. and Enders, W. (2010). Economic consequences of
Terrorism in Developed and Developing Countries. Washington
Blog Post.
CRJ 499
The Federal Bureau of Investigation (FBI) defines terrorism as
any act of violence or any dangerous act that that poses a threat
to human life that violates federal and state laws. If the said
violent acts are designed to try and influence the state
government to act in any way through intimidation and/or
coercion then that definitely is terrorism. Those performing acts
of terror do so hoping to achieve a political, ideological or
religious aim This acts of violence may include part or all of
kidnapping, assassinations or mass destruction. Terrorism is of
two type, that is, domestic terrorism and international terrorism.
Domestic terrorism are act of terror that occur primarily within
the territorial jurisdiction of a particular country. International
terrorism on the other hand are acts of terror perpetuated and
planned in other foreign countries other than the country in
question.
Terrorism is a relatively new phenomena in the world. As recent
as the turn of the millennium acts of terrorism were minimal up
until September 11th, 2001when all hell broke loose. Al Qaeda
masterminded one of the deadliest attack on American soil by
blowing up the World Trade Centre by crashing four planes that
they had hijacked into the building. Masterminds of this attack
were Khaled Shaykh Muhammad and Osama Bin Laden (Riedel,
2011). From this point on words acts of terror have been on the
rise with recent attacks witnessed in Paris 2015 and Brussels
2016.
So as to protect its citizen’s post 9/11, the Department of
Homeland Security (DHS) undertook several measure to fight
this vice. The DHS implemented a four point policy structure
that touched on key issues such as:
1. Creation of a Homeland Security Enterprise that functioned
to train personnel with the appropriate technical skills to detect
and combat terror. It also has a system that detects and reports
suspicious activities to the authorities. This enterprise also had
funding to the tune of billions of dollars to aid in the fight
against terror. This money would be used for training and
purchase of specialized equipment.
2. Improved passenger screening so as to Prevent Travel
Terrorism.
3. Detecting, Preventing and eliminating Biological and Nuclear
Threats.
4. Protecting Crucial infrastructure and
Terrorism needs to be addressed so as to bring peace to the
world. Our kids should be able to safely go to school without
the fear that some lunatic would hold them hostage in a class
room as he or she demands this or that. Economies are failing
because of terrorism. A case in point is Somalia. In Somalia the
government can be overthrown any minute when the rebels Al-
Shabaab feel like doing so. The capital city of Mogadishu is in
ruins and tatters because of the frequent bombings on its
buildings. Defenseless women and children are killed when
bombs are blown up. Children are orphaned and they end up
being taken up by terror groups when there is no one left to take
care of them. By joining these groups, they contribute in make
terrorism grow and that is not something we want. Terrorism
needs to be addressed rather urgently and measure on how to
stop it be drafted and implemented so as to make the world a
better place to live.
When terror hits, the first to be affected are the casualties and
their close family. Losing a loved one through acts of terrorism
is really painful. The victims suffer for the rest of their lives
and as such terrorism need to be eradicated for their sake. Small
economies such as Kenya and Colombia are really affected
when they are hit with terrorism. Terrorism reduces a country’s
GDP and curbs development (Sandler and Enders, 2010). This is
because tourists will be discouraged from visiting the country.
Externally, foreign relations will be compromised therefore
affecting a country’s ability to receive financial aids and grants.
Terrorism is yet to be solve in the world because cases of
terrorism are still being reported. As recently as November
2015 the city of Paris was hit at two places claiming the lives of
about 150 people. Terrorism will not end soon because there are
plenty of sympathizers of terror groups. The Saudi’s of Saudi
Arabia are among the leading financers of Al Qaeda (Meyer,
2008). If such groups continue getting monetary support, then
what is to stop them from acts of terror? The west needs to stop
overthrowing rulers by arming rebel group to fight the said
rulers (Washington Blog Post, 2015). These same rebel group
would later blow up buildings in cities in the west.
References
Economic consequences of Terrorism in Developed and
Developing Countries: An overview by Todd Sandler and
Walter Enders, 2010.
Washington Blog Post, Retrieved from
www.washingtonsblog.com
Saudi’s Faulted for Funding Terror by Josh Meyer The LA
Times, 2008
Federal Bureau of Investigation website www.fbi.gov
Department of Homeland Security www.dhs.gov
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx

More Related Content

Similar to Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx

Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfBrown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfvenuspatatag4
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracyCol Mukteshwar Prasad
 
Terrorism and Criminal SEC400 Terrorism .docx
Terrorism and Criminal     SEC400 Terrorism .docxTerrorism and Criminal     SEC400 Terrorism .docx
Terrorism and Criminal SEC400 Terrorism .docxmattinsonjanel
 
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docxDiscussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docxcuddietheresa
 
The Radicalisation and Recruitment game_ How Terrorist and Violent Extremist ...
The Radicalisation and Recruitment game_ How Terrorist and Violent Extremist ...The Radicalisation and Recruitment game_ How Terrorist and Violent Extremist ...
The Radicalisation and Recruitment game_ How Terrorist and Violent Extremist ...Cecilia Polizzi
 

Similar to Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx (8)

Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfBrown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracy
 
ethics paper 1
ethics paper 1ethics paper 1
ethics paper 1
 
Terrorism and Criminal SEC400 Terrorism .docx
Terrorism and Criminal     SEC400 Terrorism .docxTerrorism and Criminal     SEC400 Terrorism .docx
Terrorism and Criminal SEC400 Terrorism .docx
 
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docxDiscussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
 
The Radicalisation and Recruitment game_ How Terrorist and Violent Extremist ...
The Radicalisation and Recruitment game_ How Terrorist and Violent Extremist ...The Radicalisation and Recruitment game_ How Terrorist and Violent Extremist ...
The Radicalisation and Recruitment game_ How Terrorist and Violent Extremist ...
 
Confrance presntstation
Confrance presntstationConfrance presntstation
Confrance presntstation
 
Essay On Terrorism
Essay On TerrorismEssay On Terrorism
Essay On Terrorism
 

More from toltonkendal

Elementary CurriculaBoth articles highlight the fact that middle.docx
Elementary CurriculaBoth articles highlight the fact that middle.docxElementary CurriculaBoth articles highlight the fact that middle.docx
Elementary CurriculaBoth articles highlight the fact that middle.docxtoltonkendal
 
Elementary Statistics (MATH220)Assignment Statistic.docx
Elementary Statistics (MATH220)Assignment Statistic.docxElementary Statistics (MATH220)Assignment Statistic.docx
Elementary Statistics (MATH220)Assignment Statistic.docxtoltonkendal
 
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docx
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docxElements of Religious Traditions PaperWritea 700- to 1,050-word .docx
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docxtoltonkendal
 
Elements of MusicPitch- relative highness or lowness that we .docx
Elements of MusicPitch-  relative highness or lowness that we .docxElements of MusicPitch-  relative highness or lowness that we .docx
Elements of MusicPitch- relative highness or lowness that we .docxtoltonkendal
 
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docx
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docxElevated Blood Lead Levels in Children AssociatedWith the Fl.docx
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docxtoltonkendal
 
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docx
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docxElev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docx
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docxtoltonkendal
 
Elements of the Communication ProcessIn Chapter One, we learne.docx
Elements of the Communication ProcessIn Chapter One, we learne.docxElements of the Communication ProcessIn Chapter One, we learne.docx
Elements of the Communication ProcessIn Chapter One, we learne.docxtoltonkendal
 
Elements of Music #1 Handout1. Rhythm the flow of music in te.docx
Elements of Music #1 Handout1. Rhythm  the flow of music in te.docxElements of Music #1 Handout1. Rhythm  the flow of music in te.docx
Elements of Music #1 Handout1. Rhythm the flow of music in te.docxtoltonkendal
 
Elements of Music Report InstrumentsFor the assignment on the el.docx
Elements of Music Report InstrumentsFor the assignment on the el.docxElements of Music Report InstrumentsFor the assignment on the el.docx
Elements of Music Report InstrumentsFor the assignment on the el.docxtoltonkendal
 
Elements of GenreAfter watching three of the five .docx
Elements of GenreAfter watching three of the five .docxElements of GenreAfter watching three of the five .docx
Elements of GenreAfter watching three of the five .docxtoltonkendal
 
Elements of DesignDuring the process of envisioning and designing .docx
Elements of DesignDuring the process of envisioning and designing .docxElements of DesignDuring the process of envisioning and designing .docx
Elements of DesignDuring the process of envisioning and designing .docxtoltonkendal
 
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docx
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docxElements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docx
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docxtoltonkendal
 
Elements of DesignDuring the process of envisioning and design.docx
Elements of DesignDuring the process of envisioning and design.docxElements of DesignDuring the process of envisioning and design.docx
Elements of DesignDuring the process of envisioning and design.docxtoltonkendal
 
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docx
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docxElements of a contact due 16 OctRead the Case Campbell Soup Co. v..docx
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docxtoltonkendal
 
Elements for analyzing mise en sceneIdentify the components of.docx
Elements for analyzing mise en sceneIdentify the components of.docxElements for analyzing mise en sceneIdentify the components of.docx
Elements for analyzing mise en sceneIdentify the components of.docxtoltonkendal
 
Elements in the same row have the same number of () levelsWhi.docx
Elements in the same row have the same number of () levelsWhi.docxElements in the same row have the same number of () levelsWhi.docx
Elements in the same row have the same number of () levelsWhi.docxtoltonkendal
 
ELEG 421 Control Systems Transient and Steady State .docx
ELEG 421 Control Systems  Transient and Steady State .docxELEG 421 Control Systems  Transient and Steady State .docx
ELEG 421 Control Systems Transient and Steady State .docxtoltonkendal
 
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docx
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docxElement 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docx
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docxtoltonkendal
 
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docx
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docxELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docx
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docxtoltonkendal
 
Electronic Media PresentationChoose two of the following.docx
Electronic Media PresentationChoose two of the following.docxElectronic Media PresentationChoose two of the following.docx
Electronic Media PresentationChoose two of the following.docxtoltonkendal
 

More from toltonkendal (20)

Elementary CurriculaBoth articles highlight the fact that middle.docx
Elementary CurriculaBoth articles highlight the fact that middle.docxElementary CurriculaBoth articles highlight the fact that middle.docx
Elementary CurriculaBoth articles highlight the fact that middle.docx
 
Elementary Statistics (MATH220)Assignment Statistic.docx
Elementary Statistics (MATH220)Assignment Statistic.docxElementary Statistics (MATH220)Assignment Statistic.docx
Elementary Statistics (MATH220)Assignment Statistic.docx
 
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docx
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docxElements of Religious Traditions PaperWritea 700- to 1,050-word .docx
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docx
 
Elements of MusicPitch- relative highness or lowness that we .docx
Elements of MusicPitch-  relative highness or lowness that we .docxElements of MusicPitch-  relative highness or lowness that we .docx
Elements of MusicPitch- relative highness or lowness that we .docx
 
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docx
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docxElevated Blood Lead Levels in Children AssociatedWith the Fl.docx
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docx
 
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docx
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docxElev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docx
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docx
 
Elements of the Communication ProcessIn Chapter One, we learne.docx
Elements of the Communication ProcessIn Chapter One, we learne.docxElements of the Communication ProcessIn Chapter One, we learne.docx
Elements of the Communication ProcessIn Chapter One, we learne.docx
 
Elements of Music #1 Handout1. Rhythm the flow of music in te.docx
Elements of Music #1 Handout1. Rhythm  the flow of music in te.docxElements of Music #1 Handout1. Rhythm  the flow of music in te.docx
Elements of Music #1 Handout1. Rhythm the flow of music in te.docx
 
Elements of Music Report InstrumentsFor the assignment on the el.docx
Elements of Music Report InstrumentsFor the assignment on the el.docxElements of Music Report InstrumentsFor the assignment on the el.docx
Elements of Music Report InstrumentsFor the assignment on the el.docx
 
Elements of GenreAfter watching three of the five .docx
Elements of GenreAfter watching three of the five .docxElements of GenreAfter watching three of the five .docx
Elements of GenreAfter watching three of the five .docx
 
Elements of DesignDuring the process of envisioning and designing .docx
Elements of DesignDuring the process of envisioning and designing .docxElements of DesignDuring the process of envisioning and designing .docx
Elements of DesignDuring the process of envisioning and designing .docx
 
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docx
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docxElements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docx
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docx
 
Elements of DesignDuring the process of envisioning and design.docx
Elements of DesignDuring the process of envisioning and design.docxElements of DesignDuring the process of envisioning and design.docx
Elements of DesignDuring the process of envisioning and design.docx
 
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docx
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docxElements of a contact due 16 OctRead the Case Campbell Soup Co. v..docx
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docx
 
Elements for analyzing mise en sceneIdentify the components of.docx
Elements for analyzing mise en sceneIdentify the components of.docxElements for analyzing mise en sceneIdentify the components of.docx
Elements for analyzing mise en sceneIdentify the components of.docx
 
Elements in the same row have the same number of () levelsWhi.docx
Elements in the same row have the same number of () levelsWhi.docxElements in the same row have the same number of () levelsWhi.docx
Elements in the same row have the same number of () levelsWhi.docx
 
ELEG 421 Control Systems Transient and Steady State .docx
ELEG 421 Control Systems  Transient and Steady State .docxELEG 421 Control Systems  Transient and Steady State .docx
ELEG 421 Control Systems Transient and Steady State .docx
 
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docx
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docxElement 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docx
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docx
 
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docx
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docxELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docx
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docx
 
Electronic Media PresentationChoose two of the following.docx
Electronic Media PresentationChoose two of the following.docxElectronic Media PresentationChoose two of the following.docx
Electronic Media PresentationChoose two of the following.docx
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx

  • 1. Running head: TECHNOLOGY INFLUENCES 1 TECHNOLOGY INFLUENCES 4 Technology Influences Tiara Miller Professor Gauvreau CRJ 499 5/5/16 Technology Influences Criminal injustice can take many forms and in this case, we choose to focus on terrorism which is the currently trending form of criminal injustice. According to Wilkinson, (2012) technology involves the application of scientific knowledge in order to achieve any objectives and affects the values of a given society. In one way or another technology has adversely contributed to its increment and effect rate of terrorism in many countries, thus affecting both the external and internal stakeholders. Technology takes a huge platform and due to the rate at which technology is advancing then many people are being affected by this since it is out of this that terrorism is also advancing. For any terrorism threat to be conveyed any country then it has to be channeled through a medium of communication which takes any form of technology, it could be an email or a short message service through the social media platforms. The threat could also be through the magazines, audios or even video clips which are spread through the internet and this results in a threat
  • 2. in any given state. The terrorist can use the technology to disseminate a propaganda and takes the form of multimedia communications providing ideological or practical instruction, explanations, justifications or promotion of terrorist activities. With this justification then a part of the population tend to believe that their actions are right but in the real sense, it is affecting a country in many ways. The economy is greatly affected and therefore, it results to a countries downfall. The internet has also been used as a platform to recruit the minors to the terrorist groups, it may sound impossible but it is the new direction taken by the terrorists. This is possible as they establish a relationship between themselves and those that are interested. Terrorist organization use many platforms such as password protected website platforms and restricted chat groups that enhance direct communication. The restriction offers a platform for them to learn about the organization its mission and vision and the objectives it wants to achieve. With this then they are supported and in any way, the organization will never die since the number of people to replace those who died increases. It is with the use of technological barriers to entering to the recruitment platforms also increases the complexity of tracking terrorism-related activity by intelligence and law enforcement personnel. The internet being one of the forms of technology has been used as a good platform to incite the people and this makes terrorism gain more power. The Internet provides an abundance of material and opportunities to download, edit and distribute content that may be considered unlawful glorification of, or provocation to, acts of terrorism. Also with the incite comes the radicalization on which the it refers to the process of training that often accompanies the transformation of recruits into individuals determined to act with violence based on extremist ideologies. It often involves the use of propaganda. The process of recruitment and radicalization commonly realizes on an individual’s sentiments of injustice, exclusion or humiliation.
  • 3. How to implement this is by constantly monitoring the internet and as well as know the content of each message. An information system that monitors the restricted website platforms should also be developed so that it can also monitor the communication of the terrorist officials and the new recruits. A new policy should be developed that will enable the law to control young people and how they use the internet since they are the most affected by radicalization. References Wilkinson, P. (2012). Technology and terrorism. Hoboken: Taylor and Francis. Running head: INTERNAL AND EXTERNAL STAKEHOLDERS 1 INTERNAL AND EXTERNAL STAKEHOLDERS 5 Internal and External Stakeholders Tiara Miller Strayer University CRJ 499 4/29/16 Internal and External Stakeholders Identify the Internal and External Stakeholders. Internal stakeholders are the people who the individuals and the
  • 4. parties of a certain organization in a country while the external stakeholders are the individuals or the groups of people that are not part of an organization, but they are directly affected by the activities of that organization (Henisz, 2014). In this context regarding to terrorism, the internal stakeholders are the people who are involved in the criminal groups that organize and conduct the terrorist activities such as mass killing, raping, bombing buildings and other nasty activities in order to change some laws that are in operation in a certain country or as a result of the religious differences. External stakeholders, on the other hand, can be attributed to the loyal citizens of a country who are innocent but end up being affected by the activities conducted by these terroristic activities. The external stakeholders also include the children and women who are not part of the terrorist activities, but they get to suffer as a result of the humiliating and the negative activities that are performed by the terrorists in these organizations leaving them as orphans and widows when their fathers and their husbands respectively die. Discuss how internal or external stakeholders have influenced the situation in a positive or negative way? One of the ways in which the internal stakeholders in the terrorist groups have influenced the situation of the continuously increasing terrorists’ activities in the different countries is that once the parents of the children have been killed, the terrorist groups takes up the helpless kids. When the victims of terrorism die, the terrorists take their helpless children and induct them in their vices. For example in the country of Somali, the Al Shabaab abducts the children left by the parents behind after their death and takes them in their hideouts. It is in these places that they train them and introduce them to the terrorist group. This increases the instances of terrorism due to the increased manpower to conduct the inhuman activities leading to so much suffering on the loyal citizens in the country. The other way in which the stakeholders have influenced the
  • 5. situation negatively is that some of the external stakeholders find it a pleasure to support the al-Shabaab and other terrorist groups by giving them the finances to support their activities. The support given to these groups fuel their inhuman activities since it becomes easy for them t attain the amount of funds that they require purchasing the ammunitions that they require using for the bombing activities and the mass killing (Sandler, & Enders, 2010). This at times makes it difficult for the affected country to inhibit such activities due to lack of the necessary funds and support to inhibit the terrorist activities in the country. This results in a reduction in the economic growth of a country as a result of the reduction in the level of revenue received from investments since many investors prefer to withdraw from the countries facing political upheavals. The other way in which the external stakeholders have influenced the situation negatively is failing to collaborate with their respective governments on their fight against terrorism in their countries. Many citizens in the different countries that are affected by the terrorist activities tend not to cooperate with their governments in revealing the individuals committing the terroristic activities (Malisow, & French, 2008). Other people especially the youths in the different countries make the largest portion of the terrorists attacking their mother countries. Their failure to be loyalty to their mother country can be attributed to the increase in the level of terroristic activities in these countries. For instance, many youths in Kenya have been inducted in the Al Shabaab activities which are a terrorist group located in Somali and responsible for so many inhuman incidences in Kenya which show that they are not loyal to their mother countries and also their brothers and sisters who are living there. How will you consider stakeholders in your solution to the problem? How will you motivate individuals to buy into your solution? One of the ways in which I will consider the stakeholders in the solution to my problem is to urge the government to train more
  • 6. young and energetic youths in the defense countries so that they can be used to fight for the country and protect it from the terrorist attacks. The recruitment and training of more people in the defense forces of the countries will increase the number of people deployed in the key areas to prevent the terrorist activities from taking place in the country. This will also assist at the times of attacks to ensure that order is maintained and help offered is adequate. The other way that I will take the stakeholders into account is to ban any transaction done by the groups that are known to be funding the terrorist groups in the countries where the attacks were taking place. This will assist in ensuring that no financial support is issued to them to reduce their strength. The other way is training the youths in the country on the importance of becoming loyal to their country and also encourage them to engage in income generating activities so that they can ensure economic growth of their country. I will motivate the individuals to buy in my solution by convincing them on how the terrorist activities have a negative impact on the economic growth and development of a country and how curbing it would be of great importance to all the people. I will also encourage them to report all the people who they suspect are involved in the terrorist activities. References Henisz, W. (2014). Corporate diplomacy: building reputations and relationships with external stakeholders. Sheffield, U.K: Greenleaf Publishing. Malisow, B. & French, J. (2008). Terrorism. New York, NY: Chelsea House. Sandler, T. and Enders, W. (2010). Economic consequences of Terrorism in Developed and Developing Countries. Washington Blog Post.
  • 7. CRJ 499 The Federal Bureau of Investigation (FBI) defines terrorism as any act of violence or any dangerous act that that poses a threat to human life that violates federal and state laws. If the said violent acts are designed to try and influence the state government to act in any way through intimidation and/or coercion then that definitely is terrorism. Those performing acts of terror do so hoping to achieve a political, ideological or religious aim This acts of violence may include part or all of kidnapping, assassinations or mass destruction. Terrorism is of two type, that is, domestic terrorism and international terrorism. Domestic terrorism are act of terror that occur primarily within the territorial jurisdiction of a particular country. International terrorism on the other hand are acts of terror perpetuated and planned in other foreign countries other than the country in question. Terrorism is a relatively new phenomena in the world. As recent as the turn of the millennium acts of terrorism were minimal up until September 11th, 2001when all hell broke loose. Al Qaeda masterminded one of the deadliest attack on American soil by blowing up the World Trade Centre by crashing four planes that they had hijacked into the building. Masterminds of this attack were Khaled Shaykh Muhammad and Osama Bin Laden (Riedel, 2011). From this point on words acts of terror have been on the rise with recent attacks witnessed in Paris 2015 and Brussels 2016. So as to protect its citizen’s post 9/11, the Department of Homeland Security (DHS) undertook several measure to fight this vice. The DHS implemented a four point policy structure that touched on key issues such as: 1. Creation of a Homeland Security Enterprise that functioned to train personnel with the appropriate technical skills to detect and combat terror. It also has a system that detects and reports
  • 8. suspicious activities to the authorities. This enterprise also had funding to the tune of billions of dollars to aid in the fight against terror. This money would be used for training and purchase of specialized equipment. 2. Improved passenger screening so as to Prevent Travel Terrorism. 3. Detecting, Preventing and eliminating Biological and Nuclear Threats. 4. Protecting Crucial infrastructure and Terrorism needs to be addressed so as to bring peace to the world. Our kids should be able to safely go to school without the fear that some lunatic would hold them hostage in a class room as he or she demands this or that. Economies are failing because of terrorism. A case in point is Somalia. In Somalia the government can be overthrown any minute when the rebels Al- Shabaab feel like doing so. The capital city of Mogadishu is in ruins and tatters because of the frequent bombings on its buildings. Defenseless women and children are killed when bombs are blown up. Children are orphaned and they end up being taken up by terror groups when there is no one left to take care of them. By joining these groups, they contribute in make terrorism grow and that is not something we want. Terrorism needs to be addressed rather urgently and measure on how to stop it be drafted and implemented so as to make the world a better place to live. When terror hits, the first to be affected are the casualties and their close family. Losing a loved one through acts of terrorism is really painful. The victims suffer for the rest of their lives and as such terrorism need to be eradicated for their sake. Small economies such as Kenya and Colombia are really affected when they are hit with terrorism. Terrorism reduces a country’s GDP and curbs development (Sandler and Enders, 2010). This is because tourists will be discouraged from visiting the country. Externally, foreign relations will be compromised therefore affecting a country’s ability to receive financial aids and grants. Terrorism is yet to be solve in the world because cases of
  • 9. terrorism are still being reported. As recently as November 2015 the city of Paris was hit at two places claiming the lives of about 150 people. Terrorism will not end soon because there are plenty of sympathizers of terror groups. The Saudi’s of Saudi Arabia are among the leading financers of Al Qaeda (Meyer, 2008). If such groups continue getting monetary support, then what is to stop them from acts of terror? The west needs to stop overthrowing rulers by arming rebel group to fight the said rulers (Washington Blog Post, 2015). These same rebel group would later blow up buildings in cities in the west. References Economic consequences of Terrorism in Developed and Developing Countries: An overview by Todd Sandler and Walter Enders, 2010. Washington Blog Post, Retrieved from www.washingtonsblog.com Saudi’s Faulted for Funding Terror by Josh Meyer The LA Times, 2008 Federal Bureau of Investigation website www.fbi.gov Department of Homeland Security www.dhs.gov