Open Access Repository

Terrorism, Technology, and the Profession


Downloads per month over past year

Holmes, WN 2001 , 'Terrorism, Technology, and the Profession' , Computer, vol. 34, no. 11 , 136, 134-135 , doi: 10.1109/2.963451.

Cm1Nv.pdf | Download (111kB)
Available under University of Tasmania Standard License.

| Preview


This essay, written shortly after the September 11 terrorist attack in the U.S., affirms the role of digital technology in terrorism and its prevention, urges computing professionals to apply their skills in system analysis to find and expose the basic cause of terrorism, outlines the basic weakness of security as prevention, examines terrorism as a world-wide system, describes its context, suggests its basic cause as gross social inequality, and puts forward education supported by digital technology as possibly the best solution to the problem. Nothing that has happened since September 11 till the time of writing this abstract (late 2007) has contradicted the arguments of this essay.

Item Type: Article
Authors/Creators:Holmes, WN
Keywords: terrorism, system analysis, security, social inequality, poverty, education
Journal or Publication Title: Computer
ISSN: 0018-9162
DOI / ID Number: 10.1109/2.963451
Additional Information:

This essay has been more formally published as essay 6.3 in the author's book "Computers and People" (Wiley, 2006). This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Copyright 2001 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Item Statistics: View statistics for this item

Actions (login required)

Item Control Page Item Control Page