Saturday, December 28, 2019

Huey P. Long s Speech - 1588 Words

Huey P. Long’s speech was judged based on his practices as a Louisiana senator and governor, however it had the potential to be so much more had he lived to continue his legacy. People appeared to be afraid of how Governor Long operated within the legislative system of Louisiana because of the fact that, he tended to find his way around legal statutes that hindered his agenda. Some could argue that he stepped out of the bounds of power that reigns in a representative of a democratic nation, however he wound up being one of the most effective public servants in the country. Amidst the Great Depression, Governor Long gave Louisiana s economy a huge lift with the vast construction of bridges, schools, and roads. In fact the state of Louisiana has not had anything close to such an economic boost as to what Huey p. Long offered since that time. As time has passed, Louisiana has become infamous for its lack of proper public education, especially regarding grades one through twelve. This lack of proper education has become constantly associated with the state since Huey Long’s assassination. Despite the controversy over how Long executed his political agenda, it cannot be refuted on how productive and beneficial his reign was for the state. For instance, in Huey P Long’s speech directed towards the entirety of the United State’s population vied for the spread of wealth around the country. Initially he proclaimed how absurd it was that nearly a dozen men owned more monetaryShow MoreRelatedA Speech Delivered By The Great Depression1549 Words   |  7 PagesIt is quite ironic how a speech delivered nearly 80 years ago about the financial state of this country still applies today. Huey P Long delivered his radio speech amidst the United States of America’s most excruciating financial crisis, the Great Depression. However, it appears that the Great Depression and the more recent Great Recession have all too much in common. I don’t particularly believe history has repeated itself simply because the America has not learned from its mistakes. Rather, itRead MoreA Functional Understanding Of Historical And Social Context1484 Words   |  6 Pagesthought, constitutes dialectical materialism, requiring an examination of the end-goal to determine the means of societal change. This theorization of revolutionary action established the backdrop for the creation of the Black Panther Party in 1966 by Huey P. Newton and Bobby Seale, who drew from dialectical materialism and general Marxist-Leninist philosophy to create their revolutionary organization. Using many of the tenets of Marxist-Leninist socialism, the BPP began a vigorous program of politicalRead MoreEssay on The Black Panther Party for Self Defense 1598 Words   |  7 PagesCivil Rights Movement Era. It was founded in Oakland, California by Huey P. Newton and Bobby Seale in October of 1966. The Black Panthers Party was founded to fight for and protect the rights of African Americans. Believing that the approach Martin Luther King Jr. was expressing would take too long, the approach Black Panther Party took was more along the lines of Malcolm X more aggressive theories rather than Martin Luther King Jr.’s more peaceful strategy. Although it gained a lot of support quicklyRead MoreInfluential Americans in Politics2600 Words   |  11 Pagessenators Huey Long, Salmon Chase, and William Seward in particular helped change this great nation for the good. They all somewhat had the same view politically and had similar goals. All three of these men were very much for equal rights for all people. Huey Long was no exception to this. Long truly believed that the government should protect, enrich, and improve conditions to its most exposed citizens; the poor and the stereotyped regardless of their race or class. Huey Pierce Long, Jr. wasRead MoreAmerican Foreign Policy After The Great Depression1390 Words   |  6 PagesWilson on April 2, 1917, called for a Declaration of War against Germany saying The world must be made safe for democracy.(Wilson s Speech to Congress April 2) and sold the war to the American people by claiming that it was in the name of the safety of democracy. However, this goal was not achieved and this failure was clearly seen by Americans as after the war, Wilson s League of Nations which was supposed to be created to protect democracy in the future, was not approved by the U.S. Congress.( TheRead MoreA Brief Note On The Civil Rights Movement1745 Words   |  7 Pagesshow more hatred, what started the Civil Rights Movement; because it leads to a few different events that change the future for all blacks, it stopped inequality for blacks, but was it the right move at the time? The Civil Rights Movement unfolded long before it was completely established. 100 years befor e, there was the Emancipation Proclamation that was put forth. It gave the order to free all slaves within all states. But after this proclamation had taken place African-Americans in the southernRead MoreThe Civil Rights Movement in the 1960’s Essay1796 Words   |  8 Pages The 1960’s were one of the most significant decades in the twentieth century. The sixties were filled with new music, clothes, and an overall change in the way people acted, but most importantly it was a decade filled with civil rights movements. On February 1, 1960, four black freshmen from North Carolina Agriculture and Technical College in Greensboro went to a Woolworth’s lunch counter and sat down politely and asked for service. The waitress refused to serve them and the students remainedRead More The Great Depression in America Essay2388 Words   |  10 Pages1920’s was the main cause of the Depression. This unequal distribution happened on many different classes of people. The imbalance of money is what created such an unstable economy. The stock market was doing much worse than people thought during this period. This lead to the biggest stock market crash in our history. The misdistribution of wealth and the stock market crash caused the economy to plu mmet (Modern). nbsp;nbsp;nbsp;nbsp;nbsp;The stock market was bigger than ever in the 1920’s. PricesRead MoreEssay on The Glory and The Dream9497 Words   |  38 Pagesvery well known. He and other priests from his parish created the Union Party. His success with the radio shows how popular the radio had become and how it was changing the nation socially. 4. Who was Huey Long? a. Huey Long was a senator known as ‘the leader of the Depression Extremism.’ Long was the governor of Louisiana and strengthened its education and roads who also strived to be the â€Å"dictator† of the US. 5. George Washington Hill was a pioneer in what field? a. George Washington HillRead MoreRonald Reagan Bibliography Essay3427 Words   |  14 PagesJack and Nelle. Jack Reagan was an unsuccessful salesman who was also known as an alcoholic. His mother, Nelle Wilson Reagon was a devout farmwoman who raised Ronald and his older brother, Neil, in the Disciples of Christ Church despite their father s Catholicism. The family moved frequently, sometimes in response to new job opportunities, sometimes after Jack had been fired because of his drinking. In 1920 they settled in Dixon, Illinois, where Jack became the proprietor and part owner of a shoe

Thursday, December 19, 2019

Never Ending Events On The Movie A Raisin Of The Sun

Never Ending Events In the story, A Raisin in the Sun by Lorraine Hansberry (1988), the main characters face many difficulties that pertain to their life in the 1950s. One issue the family faces is residential segregation. Another difficulty is pursuing education in a field that is predominantly male or female. A third challenge is dealing with money issues. Hansberry wrote the book to reflect the current events of the 1950s, but these events also relate to before the 1950s and the present, 2016. Residential Segregation Before the 1950s, America heavily participated in slavery. Rich white males would buy male and female African Americans of various ages. The owners had full control over their slaves and usually made them sleep in small†¦show more content†¦She is scared that the Younger family with have their house bombed by the ku klux klan. The only residential segregation the family has to fight against is the welcome committee representative, Karl Lindner, offering to pay the family double their house payment so that they will leave. Walter accepts Lindner s offer falling into the racial segregation. Walter doesn t realize that this is a bad idea until Mama tells Travis to watch his father give into the man. This issue of residential segregation is less common now but still happens. Minority groups in some towns still receive threats. Thankfully the police now tries to track down the culprits threatening the family. This doesn t stop the segregation that forms th e ghetto towns. You can still find ghetto towns such as Brockton and Worcester in Massachusetts. Also, according to the book The Rise of the Ku Klux Klan, the Ku Klux Klan is still around. Most of the members live down south, where racism is still easy to find, but members of the Ku klux klan live all around America. (McVeigh 2009). Minority Education Before the 1950s, majority of the women that desired a college education went to an all girls school. These all girl colleges were safer and less intimidating for many women. The women were divided by race because of slavery. Educated women were the minority as many of them were talked out of pursuing a high education. Beneatha Younger decides to continue her

Wednesday, December 11, 2019

Effects Caffeine Reaction Anxiety Attitude -Myassignmenthelp.Com

Question: Discuss About The Effects Caffeine Reaction Anxiety Attitude? Answer: Introduction Psychology and neuroscience have in the past concentrated at an early stage inspiration and its connection to addiction, endeavoring to comprehend why a man chooses to embrace one sort of conduct regardless of whether it might wind up noticeably impulsive and unsafe. Caffeine is one of these substances that can trigger a compulsion. Caffeine is a psychoactive substance which works by restraining the activity of a neurotransmitter, the adenosine, exhibit all through the body. Despite the fact that caffeine is connected to coffee which it takes its name, this alkaloid found in an assortment of items. Chocolate and tea contain and is found in extensive amounts in plants, for example, kola nut, guarana and yerba mate (Dijkstra, Pieterse, Pruyn, 2008). There are additionally in different soda pops (particularly colas) and additionally in a few medications, including painkillers and medications to soothe the manifestations of colds and influenza. Its impacts on the performance of an individual are different: caffeine would decrease response time and enhance singular exhibitions and accordingly reassuring the person to ingest caffeine to keep response times to the most elevated conceivable level (Addicott Laurienti, 2009). In this way, caffeine can be considered as an innovative prompting prize and which can make reliance on a pretty much medium-term (Alpert, 2012). Terry Robinson and Kent Berridge have endeavored to build up a hypothesis of dependence called the Incentive Sensitization Theory of Addiction by which rehashed presentation of the sensory system to addictive medications, for example, caffeine, may cause motivating force sharpening (Schliep, Schisterman, Mumford, 2012). This term portrays an adjustment in the properties of the motivational procedures that underlie sedate chasing and medication taking (Penolazzi, Natale, Leone, Russo, 2012). It is in this manner critical to comprehend whether caffeine enhances the execution of an individual, inciting then a sentiment delight. The reason for this examination is to determine whether caffeine really influences response time and the trial theory that has been tried is that caffeine decreases response time. This is a directional theory since it demonstrates a bearing between the two factors of the speculation, to be specific caffeine and response time. The invalid theory is that caffeine has no impact on the response time and response time is the same with or without caffeine ingestion. The independent factor is the measure of caffeine given to the participants in the study, which is dependably the same, and the response (dependent) variable is the measure of response time by the participants in response to an online test given to them. Hypothesis This study sought to test three hypothesis. The hypothesis tested are as follows; For the effect of caffeine on the reaction time we had; H0: There is no significant relationship between caffeine intake and reaction time HA: There is significant relationship between caffeine intake and reaction time For the effect of caffeine on the general anxiety scores we had; H0: There is no significant relationship between caffeine intake and general anxiety scores HA: There is significant relationship between caffeine intake and general anxiety scores Lastly for the effect of caffeine on the attitude scores we had; H0: There is no significant relationship between caffeine intake and attitude scores HA: There is significant relationship between caffeine intake and attitude scores Research Design This investigation quantitatively investigated the habits of caffeine consumption, expectations, general anxiety and attitude among a selected sample of undergraduate students. The advantages of a quantitative analysis incorporate the capacity to critically describe the phenomena and investigate the quality and dependability of connections between the phenomena (Polit and Beck, 2012). In order to get a large pool of participants, convenience sampling method was used. Participants One hundred participants who were all adults (42 females, 58 males) aged between the ages of 18 and 30 (mean age = 23.1) participated in this study. We did not have any exclusionary criteria for the participants in this study; however though, all participants were required to be healthy in order to participant. The independent variable was the uptake or non-uptake of caffeine; that is, there were two groups i.e. those who took caffeine and those who did not take caffeine. The participants were required to sign an informed consent indicating that they are willing and aware of the study. The participants did not receive any form of compensation from the researcher. Materials Participants were required to take coffee that had caffeine. Coffee was prepared and each cup had approximately 100mg of caffeine. Online test was prepared where participants-whether took coffee or not had to take an online test and their reaction times noted. Procedure The recruited participants were encouraged to come and take coffee at any interval they would wish. The researcher only recorded the number of times the participant took coffee. Each cup of coffee had approximately 100mg of caffeine. Maximum number of cups taken by the participants was 4 cups (equivalent to 400 mg of caffeine). Out of those recruited, there are those who did not turn up to take coffee the whole day. At the end of the day the participants were required to take an online test where their reaction time to the test was monitored and recorded. The general anxiety and attitude scores of the participants were also taken. Descriptive Statistics First we looked at the descriptive (summary) statistics of the data. As can be seen in table 1 below, the average age of the participants was 23.1 years old. The average number of cups taken by the participants was 2.01 cups (equivalent to 201 mg of caffeine). The standard deviation shows that the data are not widely spread out for all the variables of the data. Skewness showed that the data are close to being normally distributed. Table 1: Descriptive Statistics Age Gender Cups of coffee taken in a day General anxiety score Attitude score Reaction time Mean 23.10 1.58 2.01 10.86 65.88 108.39 Standard Error 0.31 0.05 0.14 0.61 1.64 3.28 Median 23.00 2.00 2.00 11.00 63.50 106.00 Mode 24.00 2.00 1.00 15.00 60.00 157.00 Standard Deviation 3.13 0.50 1.44 6.14 16.42 32.80 Sample Variance 9.81 0.25 2.07 37.66 269.72 1075.55 Kurtosis -0.65 -1.93 -1.35 -1.21 -1.09 -1.24 Skewness 0.15 -0.33 0.00 0.01 0.17 -0.06 Range 12.00 1.00 4.00 21.00 59.00 107.00 Minimum 18.00 1.00 0.00 0.00 40.00 53.00 Maximum 30.00 2.00 4.00 21.00 99.00 160.00 Sum 2310 158 201 1086 6588 10839 Count 100 100 100 100 100 100 Test for normality Kolmogorov-Smirnov and Levenes tests were used to test for normality and equal variance respectively. Results showed that none of them was violated. Table 2 and 3. Table 2: Tests of Normality Kolmogorov-Smirnova Shapiro-Wilk Statistic df Sig. Statistic df Sig. Cups of coffee taken in a day .169 100 .000 .883 100 .000 General anxiety score .106 100 .008 .951 100 .001 Attitude score .083 100 .083 .958 100 .003 Reaction time .104 100 .009 .942 100 .000 a. Lilliefors Significance Correction Table 3: Levene's Test of Equality of Error Variancesa F df1 df2 Sig. . 97 2 0.085 Tests the null hypothesis that the error variance of the dependent variable is equal across groups. a. Design: Intercept + coffee_cups + Anxiety + Attitude + coffee_cups * Anxiety + coffee_cups * Attitude + Anxiety * Attitude + coffee_cups * Anxiety * Attitude Inferential Analysis Since all the underlying assumptions were established to be true and not violated by the data, a MANOVA test was performed to investigate the effects on caffeine on reaction time, general anxiety and attitude. Overall findings showed that there was significant effect of the caffeine on the combined dependent variables F(4, 96) = 8.49, p = 0.000, . Analysis of individual dependent variables however showed that one of the dependent variables had insignificant effect with regard to caffeine intake. The caffeine intake had insignificant effect on the general anxiety score F(1, 98) = 0.245, p = 0.622, . That is, the general anxiety scores are not in any influenced by whether an individual took caffeine or not. However, caffeine was found to have statistically significant effect with the attitude and reaction time of the participantsF(1, 98) = 14.18, p = 0.000, and F(1, 98) = 8.96, p = 0.003, respectively). The participants who did not take caffeine reported significantly lower (i.e. more active) reaction time (M = 84.75, SD = 22.74) than those who had taken caffeine (M = 108.18, SD = 33.04). On the other hand, those who had not consumed caffeine reported significantly higher scores for the attitude values (M = 77.50, SD = 15.21) as compared to those who had taken caffeine (M = 62.98, SD = 15.48). This shows that those who have not taken caffeine have good or better attitude than those who have taken caffeine. Discussion Results of this study found out that indeed the uptake of caffeine has some significant effect on the reaction time, the general anxiety of those who take it and their attitude. Those who take caffeine tend to have lower attitude scores as compared to those who do not take caffeine. Similarly, we found out that the reaction time for those who take caffeine was lower than that of those who do not take caffeine. The results are also very much consistent with the findings in studies related to caffeine, as well as to the general anxiety scores and the attitude scores. The results of this study can however not be taken as conclusive as they are since some bias might be in the data as a result of unforeseen confounders that might influence the validity of the results. To overcome this, future study should consider randomization of the participants and introduce a placebo as a control effect. Conclusion Caffeine is thought to have a number of adverse effects (either negative or positive) on its consumers. This study sought to investigate the effect of caffeine on the consumers reaction time, their general anxiety score and attitude scores. To test this, a sample of 100 students was included in the study where we had those who did not take caffeine representing the control group while those who took caffeine represented the treatment group. 42 females, 58 males aged between the ages of 18 and 30 (with a mean age of 23.1 years old) participated in this study. Results showed that the reaction times significantly vary among those who take caffeine and those who dont take it. We found out that the reaction time is higher among those who dont take caffeine and lower among those who take large amounts of caffeine. On the other hand, results showed that those who had not consumed caffeine had significantly higher scores for the attitude values as compared to those who had taken caffeine. There was however no significant relationship between taking caffeine and the general anxiety scores. References Addicott, M. A., Laurienti, P. J. (2009). A comparison of the effects of caffeine following abstinence and normal caffeine use. Psychopharmacology, 207, 423- 431. Alpert, P. T. (2012). The health lowdown on caffeine. Home Health Care Management Practice. 24(3), 156-158. Penolazzi, B., Natale, V., Leone, L., Russo, P. (2012). Individual differences affecting caffeine intake: Analysis of consumption behaviours for different times of day and caffeine sources. Appetite, 58, 971-977. Schliep, K. C., Schisterman, E. F., Mumford, S. L. (2012). Caffeinated beverage intake and reproductive hormones among premenopausal women in the BioCycle Study. American Journal of Clinical Nursing, 95(3), 488-497.

Wednesday, December 4, 2019

Cyber Terrorism for Security and Mobility-myassignmenthelp.com

Question: Write about theCyber Terrorism for Security and Mobility. Answer: Introduction In this era of technology, cyber crimes are increasing at a high rate. Information and communication technology has been profitable for the society but at the same time it imposes high threat to the society (Alsaadi Tubaishat, 2015). Cyber crimes have different forms and types. The general meaning of terrorism is a threat that aims to create a sense of fear in the society. There is no clear understanding of this issue. Cyber terrorism tends to create severe threat for the security of information system (Ahmad Yunos, 2012). Cyber terrorism comprises of the concept of terrorism as well as cyberspace. This is an unlawful act that attacks computer systems as well as networks. This research report gives a brief overview of what cyber terrorism is. It discusses about the challenges and problems that are encountered by the society due to this cyber attack. It also talks about the technologies that are relevant in this context as well as the application of these technologies. This report also points out the issues that are not given much importance. It also gives a brief explanation about the importance of these issues. . At the end this report gave a proper explanation about the lessons learnt. Discussion Cyber Terrorism This type of terrorist act is done over the Internet. Terrorist activities take place because of some kind of political or national influence (Ahmad, Yunos Sahib, 2012). There is no clear understanding behind the motive of terrorism. The cyber terrorists use the cyber space to get access to information and misuse the information for their own benefits. The result of the cyber terrorism can create the fear of traditional terrorist attacks. Some computer attacks can even lead to the death of people and infrastructural damage. The cyber terrorists tend to destroy the system and attack the interest of the civilians as well as the public sector people. The target of this terrorist attack is to have an impact on the political structure. These types of attacks are planned from before. There is convergence in the logic of terrorism as well as the cyberspace. Technology is responsible for making a connection between the physical and virtual world. Technology has weaknesses and these weakness es can be exploited by the attackers to take advantage of the system and harm the nation. Jihadists, insurgents and terrorist organizations have made use of the Internet in order to plan attacks and spread wrong messages among the society. They had disruptive purpose. There are vulnerabilities that exist in the system that can be exploited by the cyber terrorists. The act of computer fraud also falls under the category of cyber terrorism. They create access the information system in an unauthorized manner to gain access to sensitive data so that they can utilize the data for harming the social, religious, ideological, political as well as similar objectives. Denial of service attack cannot generate much fear in the nation but it has high potential for generating second and high order effects. Consider a situation where emergency and telecommunication services are stopped during a period of crisis, the impact of this can be catastrophic in nature. Cyberspace can be defined as the global domain that exists within the environment of information technology. Important information can be shared over the internet. This is a dangerous space and has vulnerabilities. Cyber terrorists focus on giving up the old techniques of attacking by weapons and make the use of the technology. The cyber terrorism can attack several targets like computer system, gover nment information system, data banks and oil refineries. Characteristics of Cyber Terrorism The cyber in the cyber terrorism is the virtual space or the internet (Torres Soriano, 2012). There are certain characteristics of cyber terrorisms like: It is executed over the cyberspace. The aim of the terrorist attack is ideological or political. Cyber terrorism is either violent in nature or it threatens violence. The psychological repercussions are beyond immediate targets or victims. This type of act is conducted by organization or a conspiracy cell or individuals who are influenced by any religious or ideological move. A non state entity plays a major role. Challenges and Problems The effects of any cyber terrorist attacks are extremely devastating in nature. It affects the entire nation as the infrastructures are totally dependent on the computer networks (Awan, 2014). The major problem that occurs due to cyber terrorism is the threat of national security. It also affects the public policy in a negative manner. This act is effective for terrorist groups. Technical Impediments: The authorities are unable to detect any type of terrorist activity over the internet (PakObserver, 2017). Internet features does not disclose the identity of the people and therefore this causes issues in tracing any type of criminal activity. Legislative Aspect: There are several laws for controlling the crime levels in the country. But these laws are not able to address properly any type of cyber terrorism act. Most of the laws do not include the use of internet technology. Partnership: Cooperation becomes a main issue because of cyber terrorism. This takes place because the fear of cyber terrorism creates a sense of unwillingness to share sensitive information among the organizations (Bogdanoski Petreski, 2013). This will create a sense of negativity and there will be issues in creating partnership between the public and private sectors. The System of Electric Power: One of the main targets of cyber terrorists is the power system. There are computer systems that control these systems (Tehrani, Manap Taji, 2013). If these controlling systems are attacked then it can disrupt and shut down the power supply. This could affect a society or nation. Money Transactions: Most of the people prefer perform online transaction of money. The terrorists can easily get access to the bank details and transfer money to their own country by affecting the economy of the victim country (Hua Bapna, 2013). Military Operations: Cyber terrorists can hack the system operated by the military and steal sensitive information later on to make a physical attack. Government Security: The government of the state can be in problem if the government information is stolen by the cyber terrorists. Relevant Technologies and its Applications in Cyber Terrorism Cyber terrorists make the most use of advanced technology in order to create terror. If a country is extremely advanced in technology then it is more prone to the attacks of the cyber terrorists. Terrorist organizations make the use of information and communication technology in order to gain power over the nation or state. ICT can be used for faster communication among the terrorist groups. Internet plays a major role in cyber terrorism. The terrorists use the internet to harm the nation and state (Abomhara, 2015). Internet has several advantages that help the community to survive and develop with time. But at the same time the vulnerabilities can be exploited by the terrorists to spread fear in the country. Malware tools are designed by the terrorist groups to get access to sensitive information (Luiijf, 2012). The information of the people is stored in several cloud servers that can be attacked in order to affect the entire nation. Mobile technology can be used by the Jihadists to spread some kind of propaganda regarding any political or ideological issue. This can influence the minds of the people. The computer systems can get attacked. The cyber terrorists can hack the computer and information system of a government site so that it can be used to get sensitive information for harming the state. There can be virus attacks and also denial of service attacks. The information technology plays a vital role in assisting the cyber terrorists to plan and execute cyber attacks and spreading fear over the internet (Jarvis, Macdonald Nouri, 2014). The internet can be used by terrorist groups to publish any type of wrong ideas for creating fear among the public. The terrorist groups can even find each other over the internet to plan a harmful act. Operational information can be hacked. Logistics operations are also possible by using internet. Bluetooth technology is also harmful because it helps to connect wireless devices and helps the terrorists to transmit information and creates propaganda. Use of social media platforms also assist in the act of cyber terrorism. The advancement of te chnology is increasing the chance of cyber terrorism. Cryptography is a technique of converting plain texts into cipher or encrypted text. It has several advantages. But it can be used in order to harm the nation as well. It can be a threat to the government. This technology can prevent the government from getting details about the attackers and will not be able to prevent the attack. Steganography is an act of hiding information and data inside objects. Organizations can use these tools to prevent any unauthorized access. Some images can contain secret data in them. This technology can be used by the cyber terrorists to exchange messages. Issues Discussed The cyber terrorists use the ICT to disrupt the systems and services in order to create fear in the nation. It uses the advanced technologies to spread threatening messages among the people of the nation (Manap Tehrani, 2012). There are several other issues like it can affect online transactions also. It uses disruptive activities to attack a computer system or network. Another major issue related to cyber terrorism is the attack of government system to harm the society (Chuipka, 2016). The terrorists can take the help of ICT to hack the system. Cyber terrorism is violent in nature and is designed for creating a psychological repercussion. It has political and ideological aim. Malware tools are designed by the terrorist groups to get access to sensitive information. The information of the people is stored in several cloud servers that can be attacked in order to affect the entire nation Important Issues that are not Addressed and its Impact The main focus was given on financial transaction and monetary issues. But there can be issues beyond that. Some of them are as follows: The System of Water Supply: The cyber terrorists can attack the flood gates of the dams. It is based on functional system and if they are attacked then it can result in the loss of lives of several people. There can be shut down in the supply of water. The System of Air Traffic Control: The emergency call system can be disrupted plus there can be delays in the flights due to the attack (Ackoski Dojcinovski, 2012). Healthcare Infrastructure: Most of the healthcare systems are dependent on the use of Internet. The cyber terrorists can attack such systems and harm the healthcare facilities of the entire society and nation (Harries Yellowlees, 2013). The health records and records regarding any insurance or medicines can be modified or removed. Important Lessons It can be seen that in this era of technology, people need the internet for the purpose of communication and other development purposes. ICT has several advantages. We have been familiar with the benefits of the use of ICT. But this research report has pointed out the harmful side of the advanced technologies also. Cyberspace is a huge space in the internet. There are several vulnerabilities in the internet. These vulnerabilities can be exploited by the attackers in order to harm the society. There are several types of attacks that can take place over the internet. There is a difference between cyber attack and cyber terrorism. Cyber terrorism aims to spread fear among the people in the nation or state. Cyber attacks are meant for stealing the data from an information system. The cyber terrorists use the ICT to disrupt the systems and services in order to create fear in the nation. It uses the advanced technologies to spread threatening messages among the people of the nation. Conclusion This research report concludes that the information and technological advances are responsible for the cause of cyber terrorism. This research report gave a brief overview of what cyber terrorism is. It discussed about the challenges and problems that are encountered by the society due to this cyber attack. It also gave a brief explanation about the importance of these issues. At the end this report gave a proper explanation about the lessons learnt. References Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks.Journal of Cyber Security and Mobility,4(1), 65-88. Ackoski, J., Dojcinovski, M. (2012, June). Cyber terrorism and cyber-crimethreats for cyber security. InProceedings of First Annual International Scientific Conference, Makedonski Brod, Macedonia, 09 June 2012. MIT UniversitySkopje. Ahmad, R., Yunos, Z. (2012). A dynamic cyber terrorism framework.International Journal of Computer Science and Information Security,10(2), 149. Ahmad, R., Yunos, Z., Sahib, S. (2012, June). Understanding cyber terrorism: The grounded theory method applied. InCyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on(pp. 323-328). IEEE. Alsaadi, E., Tubaishat, A. (2015). Internet of things: Features, challenges, and vulnerabilities.International Journal of Advanced Computer Science and Information Technology,4(1), 1-13. Awan, I. (2014). Debating the Term Cyber-terrorism: issues and problems.Internet Journal of Criminology. ISSN,2045(6743), 1-14. Bogdanoski, M., Petreski, D. (2013). Cyber terrorismglobal security threat.Contemporary Macedonian Defense-International Scientific Defense, Security and Peace Journal,13(24), 59-73. Chuipka, A. (2016). The Strategies of Cyberterrorism. Graduate School of Public and International Affairs. 1(2). Harries, D., Yellowlees, P. M. (2013). Cyberterrorism: Is the US healthcare system safe?.Telemedicine and e-Health,19(1), 61-66. Hua, J., Bapna, S. (2013). The economic impact of cyber terrorism.The Journal of Strategic Information Systems,22(2), 175-186. Jarvis, L., Macdonald, S., Nouri, L. (2014). The cyberterrorism threat: Findings from a survey of researchers.Studies in Conflict Terrorism,37(1), 68-90. Luiijf, E. (2012). Understanding cyber threats and vulnerabilities. InCritical Infrastructure Protection(pp. 52-67). Springer Berlin Heidelberg. Manap, N. A., Tehrani, P. M. (2012). Cyber Terrorism: Issues in Its Interpretation andEnforcement.International Journal of Information and Electronics Engineering,2(3), 409. PakObserver. (2017). Challenges of cyber terrorism. Retrieved 13 September 2017, from https://pakobserver.net/challenges-of-cyber-terrorism/ Tehrani, P. M., Manap, N. A., Taji, H. (2013). Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime.Computer Law Security Review,29(3), 207-215. Torres Soriano, M. R. (2012). The vulnerabilities of online terrorism.Studies in Conflict Terrorism,35(4), 263-277.