Monday, December 30, 2019

Essay On A Separate Peace - 1916 Words

A Separate Peace Honors English Essay By Devin E. Price From juvenility to maturity, A Separate Peace combines classic American Literature with a thoughtful plot-line that is developed to affect the readers’ mind and heart. The author, John Knowles of Fairmont, West Virginia, had one clear purpose for writing this book. This purpose was to show the disastrous mental and physical problems which arise as the result of war, specifically the repercussions they have on the home front. A good lesson to learn from this book is that even a war three-thousand miles away can have just as much ramification as a war three miles away. This novel shows the transition of Gene Forrester and his friends from boyhood to manhood during a†¦show more content†¦While presenting itself as an institution of the upmost moral character, the Devon School is really the breeding ground for broken students. As a result it is this very framework, the war and the prestige of a distinguished academy, which caused these students to bre ak. The youth at this school were forced to put up with emotional struggle after struggle, and that reflects the harsh setting of this story. Moving on, there were a multitude of different characters in this book each with different social and physical dispositions. The main character, Gene Forrester, started out as the best friend of Finny. He soon however started to have realizations through a series of events that led him to realize that he really had a deep resentment toward Finny, and wanted only to best Finny. Gene, after Finny’s accident, soon loses all of his bitterness and becomes a bit more reserved. Gene also starts to develop a hostile attitude which leads him to get into several fights. Finny, the so-called best friend of Gene, is a happy, athletic, and confident boy, who makes up in the field what he lacks in the classroom. He falls into a silent depression after his accident which only shows threw his upbeat cover a few times after the accident. However, Finny is different from everyoneShow MoreRelated A Separate Peace Essay753 Words   |  4 Pages A Separate Peace Dealing with enemies has been a problem since the beginning of time. â€Å"I never killed anybody,† Gene had commented later in his life, â€Å"And I never developed an intense level of hatred for the enemy. Because my war ended before I ever put on a uniform, I was on active duty all my time at Devon; I killed my enemy there.† In A Separate Peace, by John Knowles, the value of dealing with enemies is shown by Gene, who was dealing with few human enemies, but his emotions created far greaterRead MoreA Separate Peace Essay 11996 Words   |  4 PagesA Separate Peace Essay Betrayal, one of the most horrible things you could do to anyone your family, a friend anyone. To me it’s one of my all time most hated things a person could do and it’s almost unforgivable. In this book A Separate Peace by John Knowles two boys Phineas and Gene who are best friends at a boarding school in New Hampshire experience some of the worst kinds of Betrayal you could think of. Gene commits a very bad betrayal when he jousts the tree limb they are bothRead MoreFriendship in A Separate Peace Essay806 Words   |  4 PagesFriendship in A Separate Peace A Separate Peace is a story about two youths, Gene and Phineas, growing up at a beautiful boys’ boarding school in New England. Set at the background of the World War II, the friendship between them grows as the peace in Devon School diminishes. Gene and Phineas are like two poles of a magnet, opposite yet bound together. Gene is academic, Finny is athletic; Gene is hard worker, Finny is not; Finny is the extroverted leaderRead More A Separate Peace Essay example1149 Words   |  5 Pages A Separate Peace: by John Knowles nbsp;nbsp;nbsp;nbsp;nbsp;During World War II in the struggle for peace among nations comes a smaller, but still significant struggle, in a prep school boy becoming a man and waking up to reality. nbsp;nbsp;nbsp;nbsp;nbsp;In the book A Separate Peace, the author John Knowles, creates the image of two sixteen-year old boys struggling to keep what little sense of peace they know, even though there is a war going on all around them. Gene Forrester, theRead MoreA Separate Peace Essay Synopsis1019 Words   |  5 PagesIn A Separate Peace†, John Knowles uses the characters come to understand the difference between fantasy and reality, innocence and  experience, and sympathy and hatred. Phineas uses denial to protect himself against the reality of war. One person can need protection to hide from an  experience  thats been haunting their lives like a death in the family. They need this protection to help them move on in life and find peace within themselves again. Some need protection from war in the thought of deathRead MoreA Separate Peace Analysis Essay1697 Words   |  7 PagesWith using a simile to compare him to weather helps readers realize what kind of person Fin ny is and why he is gaining all the attention from people around him. â€Å"Peace had deserted Devon† (Knowles 72). This quote in A Separate Peace foreshadows the future relationship between Gene and Finny. Gene is finally back at school, and the peace of the summer session has finally been shattered by the return of the rigorous traditions of the Devon School. The change of seasons also foreshadows a change inRead MoreA Separate Peace Essay examples1290 Words   |  6 PagesBrittany Schafer September 21, 2012 Period 4 A Separate Peace Final Draft In the novel A Separate Peace by John Knowles, it relates to a complicated friendship of two young boys Gene and Phineas. Gene is jealous of Phineas’ achievements and lets his anger destroy their relationship. The boys at Devon in the summer of 1942 have to deal with the fear World War II brings. Each time the boys feel safe and peaceful, reality sets in and reminds them of the warfare around them. The boy’s mentalRead MoreA Separate Peace, by John Knowles Essay736 Words   |  3 PagesPeople frequently betray others because of the evil in their hearts. In A Separate Peace, John Knowles uses the pureness of the rakish Finny to portray the savage or bad side of the vulpine Gene. He also uses it to prove that peace is exceedingly difficult to acquire until a person accepts the ignorance in their own heart. That means that acceptance is the key to finding peace. Thus, Gene finds his peace when Finny forgives him and when Gene learns to forgive himself as well. Gene assumes thatRead MoreA Separate Peace by John Knowles Essay1256 Words   |  6 PagesThe main character in my book, A Separate Peace, is Gene Forrester. At the beginning of the book, Gene is an innocent boy, going along with everything his roommate, the outgoing and energetic Phineas, says. â€Å"What was I doing up here anyway? Why did I let Finny talk me into doing stupid things like this?† (17) During this scene in the book, Gene is questioning his decision to jump out of a very tall tree, which he was convinced to climb by Phineas. As the story continues, Gene starts to believe thatRead MoreA Separate Peace. Chapter analisys Essay1253 Words   |  6 Pages 4. How does the Winter Carnival offer a â€Å"separate peace† for the boys? How does it end? 5. Describe Gene’s visit with Leper and his character now: Chapters 11-13 1. Describe the â€Å"trial.† How does it affect Gene? How does it affect Finny? 2. Gene is asked to take Finny’s things to him the next morning and gets to talk to him. What does he say? What does he find out about Finny and the war? Do they come to some kind of peace in their friendship? How? 3. Gene gives

Sunday, December 22, 2019

Outside Beauty And Staying Forever Young - 912 Words

Essay 2 Outside beauty and staying forever young are the newest trends among today s society. Women have the highest rate of this surgical procedure because women have been conditioned at a young age to believe outer beauty is the most important part of a women’s body. Plastic or cosmetic surgery in the past has been kept a secret. Today plastic surgery is being embraced by the millions of women of all ages. Recently a friend of mine had a breast augmentation. Her argument was that she needed to feel more confident in her own body. She felt left out of her group of friends because they were all skinny and fit and just so perfect. of proportion to the rest of her body. Young and old women today feel the need to look perfect like those victories secret models. Some other causes for plastic surgery comes from low self-esteem issues and the need to be accepted as beautiful by everyone. In other words, in the 2000’s more than 6.3 million women underwent the surgery. The most popular surgical procedures for women in 2000’s were eyelid surgery, breast augmentation and facelifts. There were nearly 11.9 million surgical and non-surgical cosmetic procedures performed in 2004. In addition, the top surgical procedures in 2004 were breast augmentation, eyelid surgery, and facelift. The non-surgical cosmetic procedures in 2004 were Botox injection and laser hair removal wherever needed. Since 1997 there has been a major increase in the total number of cosmetic procedures. SurgicalShow MoreRelatedOutside Beauty And Staying Forever Young1238 Words   |  5 PagesOutside beauty and staying forever young are the newest trends among today s society. Women are the highest percentage of this trend because women have been conditioned at young age to believe outer beauty is unsurpassed. Plastic or cosmetic surgery in the past has been kept hushed, never knowing did she have her nose worked on? Today plastic surgery is being embraced by the millions and highly lo oked upon. Recently a friend of mine had a breast augmentation. Her argument was the need to feel moreRead MoreDescriptive Essay On Beauty850 Words   |  4 PagesBeauty. Every person has a different standard of it. The hill country is my place of beauty and peace. Green trees and grass. Flowers blooming and butterflies everywhere. Birds singing their melodies and deer roaming peacefully. The sparkling sun causing everything around us to sparkle. Lampasas, Texas is a little town many people know nothing of. However, it’s the closest place to Heaven on this earth. My family is from there. My great-grandma has a house on the outside of Lampasas. The beauty ofRead MoreThe Truth about Forever by Sara Dessen Essay812 Words   |  4 Pagesperson for her. The theme/main idea for this novel is friendship and finding your voice, â€Å"As for me, I was just trying to get it right, whatever that meant...Everyone has a forever, but given a choice, this {moment} would be mine† (3 70). Macy’s friends help her in life, and teach her important lessons that she will remember forever. â€Å"fly† (368 and 41) denotative~ move through the air connotative~ like you are on top of the world, a great feeling, finally coming out into the open, like you are soaringRead MoreThe Pressures Of Youth And Beauty2204 Words   |  9 PagesThe Pressures of Youth and Beauty The novel, The Picture of Dorian Gray, tells the story of a man obsessed with the pursuit of beauty and youth. He goes as far as to sell his soul, both literally and figuratively, in order to maintain his own youthful beauty. To preserve his youthful beauty, Dorian Gray allows his sins to be captured in a canvas self-portrait. However, in doing so, he does not take into account the impact his actions will have on others as well as on his own soul. In the novel,Read MoreFashion in My Passion Essay710 Words   |  3 Pagesfeels, how their day went, or what lifestyle they live. Ive always wanted to help women enhance their natural beauty. I suffered from low self esteem myself, but embracing who I was and my style bought confidence and drive to my life. This has been my passion since I was five years old and even in the present day fashion is my biggest muse in life. Though I have had my obstacles staying true to my style, dedication to be successful, and my learning from my mistakes has gotten me to this opportunityRead MorePride And Prejudice By Jane Austen1595 Words   |  7 Pagesin which women had no rights and no importance outside of marriage. Pride and Prejudice was written in 1813. Romanticism begins around 1789. Their priorities consists of emotionalism, self consciousness, respect for dignity of childhood, an interest in folk culture, and primitive origins for rural life.Pride and Prejudice is a window into the lives of young eighteenth century British women. â€Å"Romanticism reflected a deep appreciation of the beauties of nature. For the romantics, nature was how theRead MoreThe Medias Dependence On Technology1510 Words   |  7 PagesCombination After All†, she discusses a recommendation from the American Academy of Pediatrics that suggests children under the age of two should have little exposure to games and media. Children’s brains grow rapidly during the first years of life and â€Å"...young children learn best by interacting with people, not screens† (Gregoire). Unfortunately, it has become common for parents to rely on technology to distract or â€Å"teach† their children. However, Loren Frank, a psychologist at the University of CaliforniaRead MoreThe Market And Increase Profit Within The Retail Markets Essay1780 Words   |  8 PagesStaying relevant in the market and increase profit within the retail markets in America are very challenged. Especially, it is more difficult in this current economy and highly competitive industry. Macy’s is well-known as a mid to high range department store sells huge variety products from luxury such as Michael Kors, Ralph Lauren, Coach to economic products which is more affordable for people. The main strategy that Macy’s used to stay ahead of their competitors was their ability to sell theirRead MoreSocietys Dependence On Technology1405 Words   |  6 PagesAcademy of Pediatrics that suggests children under the age of two should have little exposure to games and media, this includes even games that are designed for educational purposes. Children’s brains grow rapidly during the first years of life and â€Å"...young children learn best by interacting with people, not screens† (Gregoire). Unfortunately, it has become common for parents to rely on technology to distract or â€Å"teach† their children. However, Nancy Carlsson-Paige, a professor at Lesley University inRead MoreHow Media Has Become A Big Influ ence For Teenage Cosmetic Surgeries1757 Words   |  8 Pageswere surgical procedures such as nose reshaping, breast lifts, breast augmentation, liposuction, and tummy tucks.† Among today’s society, outside beauty and staying forever young are the newest trends. Today, a devastating amount of American teenagers choose to alter their body in order to fit the unrealistic standard of physical attractiveness created by our beauty-obsessed culture. Media has become a big influence for teenage cosmetic surgeries. Magazines, social media, and television have portrayed

Saturday, December 14, 2019

Policy of Neutrality and the United States of America Free Essays

In 1792, the European struggle began which started when the French Revolution concluded with the Napoleonic Wars. During the same year, the American government first noticed that a state of war subsisted when Thomas Jefferson, then the American Secretary of State, received a message from the French Minister at Philadelphia. In reply to the notification, Jefferson assured that the United States will remain forthcoming to France â€Å"and render all those good offices which shall be consistent with the duties of a neutral nation. We will write a custom essay sample on Policy of Neutrality and the United States of America or any similar topic only for you Order Now †(Hyneman) During that time, President Washington was art Mount Vernon, this statement from the Secretary of State seemed to be the only direct acknowledgement by the government; thus, the United States was placed in an arrangement of a neutral state. Alongside the implementation of the policy, there were various acts and bills that were made and ratified to effectively compromise with the current state of the nation. Amongst the bill, acts, treaties that were made during that time were the Non-Intercourse Act, Macon’s Bill No.2, Pickney’s Treaty, Treaty of 1778 and the Convention of 1800 (Brodeur). For most of the treaties and acts that were made, it became ineffective and unimportant for most of its existence. The Neutrality Policy fulfilled the idealistic objectives of the nation but it did not fulfill the realistic objectives of the country. The United States did not want to partake in the European War and they were successful in doing so by agreeing with France; however, the acts and bills that were signed to further protect themselves from war caused them futile or even more losses. Works Cited: Brodeur, Paul. â€Å"Restitution: The Land Claims of the Mashpee, Passamaquoddy, and Penobscot Indians of New England.† American ndian Quarterly 12.4 (1988): 337-39 pp. MArch 2, 2008 http://links.jstor.org/sici?sici=0095-182X%28198823%2912%3A4%3C337%3ARTLCOT%3E2.0.CO%3B2-Isize=LARGEorigin=JSTOR-enlargePage. Hyneman, Charles S. â€Å"Neutrality During the European Wars of 1792-1815: America’s Understanding of Her Obligations † The American Journal of Internationla Law 24.2 (1930): 279-309 pp. March 2, 2008 http://links.jstor.org/sici?sici=0002-9300%28193004%2924%3A2%3C279%3ANDTEWO%3E2.0.CO%3B2-2size=LARGEorigin=JSTOR-enlargePage.       How to cite Policy of Neutrality and the United States of America, Essay examples

Friday, December 6, 2019

Cyber Crime Terrorism and Activism-Free-Samples-Myassignmenthelp

Question: What are some possible unintended consequences in the development of Machine learning and AI, and what are possible options to protect against such unintended consequences? Answer: Thesis Statement The popularity of internet protest or Hacktivism is growing significantly; many peoples oppose this form of protest because it is difficult to control and supervise but the popularity of the internet has made it inevitable to stop Hacktivism; Instead, the government should focus on properly regulating the Hacktivism protests. Introduction Hacktivism is a new form of protesting against social change or political agendas which are performed by using computer or internet based devices to hack or access the data of organisations or individuals. There are several hacktivists association which has attacked large corporations and governments for various political and social causes such as Wikileaks and Anonymous. Most notable attacks of Hacktivism include Ashley Madison, Sony, Panama Papers and others. Many peoples debate whether Hacktivism should be justified or not, and should government create laws for regulating hacktivists activities. This report will focus on analysing the meaning of Hacktivism and other related terms and discuss various examples of Hacktivism attacks. Further, the report will evaluate whether the Hacktivism should be justified and if yes than what laws should be applied by the government to regulate its actions properly. Cyber Crime, Cyber Terrorism, and Cyber Activism Cybercrimes define such illegal acts which involve a computer or any other devices that are connected through the internet, it is also called computer crimes. Cyber terrorism referred to illegal actions that are conducted using internet with a motive to threaten, achieve political gain or cause bodily harm through intimidation. Cyberactivism is the process using internet-based services such as social media, podcasts or email as a mode of communication to share information regarding citizen movement and providing specific details or coordination regarding any activism action (McCaughey Ayers, 2013). Hacktivism is defined as the act of breaking into, hacking or using a computer or network-based device to promote a social change or political agenda (Hampson, 2012). The hacktivist groups usually hack organisations or individuals computer for political or social causes rather than personal benefits, the peoples who perform these actions are known as hacktivists. The term hacktivism was first provided by a Cult of Dead Cow member called Omega in 1994; the CDC is a computer hacking organisation and its motto is worldwide domination through media saturation. Hacktivism is a form of activism, and they perform different acts through a network of hacktivists by collaborating on different projects to achieve a common objective (Busch, 2008). Many experts have provided different definitions of hacktivism, therefore, it is difficult to track specific activities that are included in hacktivism. Hacktivism is considered as a controversial term because many of its actions are related to cyber terrorism but the primary difference is that Hacktivism is related to social and political agendas. The hacktivists believe that information should be accessible to each individual and they focus on revealing illegal secrets of governments, organisations or peoples (Kelly, 2012). Many experts argue that Hacktivism shows how technology can be utilised while taking actions for social change, and others describe it a malicious, illegal, and destructive acts that concentrates on undermining the securities of the internet. Primarily, the controversy of Hacktivism is divided into two parts; one side believes that activist movements should be peaceful and they should not be destructive. And other side thinks that malicious cyber-attacks should be acceptable if they are conducted for the welfare of society by revealing illegal activities that affect a large number of peoples. According to Lohrmann (2017), the number of hacktivists acts has proliferated in 2016. The hacktivists started to attack peoples personally instead of corporations since 2015. Hackers mostly target wealthy peoples with high incomes to reveal their illegal sources of income, for example, Panama Papers is considered as historys biggest data leak ever by many experts. The hack reveals 11.5 million files relating to the database of Mossack Fonseca, which is worlds fourth-biggest law firm. The papers reveal offshore tax regimes of many political leaders, celebrities, and businesses men. For example, a 2 billion dollar tax fraud trails led to Vladimir Putin, president of Russia (Harding, 2016). The data breach of Ashley Madison is another example in which a data of 25 gigabytes was revealed by the hackers which included personal information of 30 million users of the website. Anonymous is one of the most notable group of activists that consists of various international hackers and hacktivist entities; it originated in 2003 on popular website 4chan. The group's website describes them as a loose association that operates on new ideas rather than directives. They become popular after using distributed denial-of-service (DDoS) attacks on various entities including government, corporate websites and religious group and they publicised it for the entire world (Sauter, 2014). The members and supporter of the Anonymous group wear Guy Fawkes Masks however that may not always be the case, and they use other popular masks to hide their identity. Firstly that caught attention in 2008 when they decided to attack and show the world how dangerous Church of Scientology is and how they are violating free speech right of peoples (Vamosi, 2008). Since then, Anonymous has involved in many incidents relating to Wall Street, government and large corporation. One of their biggest attacks was on Sony Corporation during the NBA session. Sony filed a suit against George Hotz for producing and selling software that allows people to install third party software on PlayStation, Anonymous attacked the PlayStation network and shut down the Sonys website during the second half of NBA season (Mansfield-Devine, 2011). Another good example of Hacktivism group is Wikileaks; it is a non-profit organisation that uploads classified media, news leaks and secret information on their website through anonymous sources. The website was first started in 2006 in Iceland, and their biggest ever attack was on CIA documents which revealed information relating to secrets of CIA, their headquarters, and how that uses television and other gadgets to monitor their suspects (MacAskill, Thielman Oltermann, 2017). Hacktivism is a process of using computer hacking collect illegal secrets of corporations and individuals both of them has a different meaning. Hacking is mostly done by people to gain an unfair advantage of other peoples or access their personal data; many peoples do hacking for fun as well. Hacktivism, on the other hand, is completely different; it is a tool for hacktivists to bring a change in social or political conditions. Mostly Hacktivism is used to reveal secret information regarding political figure or organisation. Hacking is dividing into two types, general hacking and ethical hacking (Wazid, Katal, Goudar Rao, 2013). General hacking means normal hacking which is conducted to gain access to personal data of another person or just for fun. Most of the peoples who do general hacking have a motive to blackmail or earn unfair profits. Ethical hacking on the other hand is conducted by government or other organisations to assess their security measures. The government or other corporations hire ethical hackers and provide them access to their networks to access their weakness so they will remove such shortcomings before actual hacking (Losh, 2012). I believe that actions of Hacktivism are justified when it is done to protect the rights of individuals and reveal the illegal activities of large organisations. I think that Hacktivism is a prevalent form of protest and it is growing with the popularity of internet and internet based services (Fuchs, 2014). Many experts believe that the popularity of social media and internet of things has increased the risk of cyber-attacks; hacktivists use these platforms to hack the data of individuals and organisations easily. But other illegal entities also use the popularity of social media and IoT devices to conduct terrorist activities. For example, ISIS has started using professional hackers, and they use social media and other websites to spread their messages and plan their next attacks. The ISIS organisation targets teenagers on social media sites and lures them into their illegal operations by giving them money or other things (Stampler, 2017). Many websites also use independence of int ernet to show child pornography which is a horrific offense. The government throughout the world has failed to regulate the actions of illegal organisations on internet properly. The growth in technology and specifically internet-based services has been substantial in past few decades, corporations provide their services through online websites and mobile applications, and people are dependent on them. Peoples use internet services for various activities such as online shopping, banking services, home security, job application, and communication (Himma, 2008). Along with personal uses, the internet will be used by peoples as a method to protest against political agendas and social causes. Social media debates are a good example; people use websites such as Twitter, Reddit, and Facebook to share their opinion regarding specific actions and protest against the decision of the government. Online protesting or Hacktivism is inevitable, and the government can not stop it without drastically changing peoples' lives. Therefore, the government should create specific rules for the Hacktivism to regulate it properly and to protect the interest of public. Any illegal act done by hacktivists or other peoples using online services should be punishable with punitive action. The government should work with hacktivists to conduct ethical hacking to improve their infrastructure and making it invincible against cyber-attacks (Fitri, 2011). Proper regulations should be created for Hacktivism; the government can create its own hacktivist groups to collect and reveal illegal data from large corporations. Many attacks reveal data that can be utilise by the government to stop illegal activities. For example, Panama paper provides information regarding peoples who were using offshore banking to avoid taxes and government can use such information to levy tax on such individuals and make strict regulations for the future. The process of legalising and regulating Hacktivism will be substantially difficult for the government, but in the long run, it will benefit society. Conclusion To conclude, Hacktivism is a new method of protesting which is used by online groups to attack on political agendas and social causes. In recent years, Hacktivism protests have affected various individuals, organisations and governments such as Sony, Panama Papers, Ashley Madison, and many others. I think that Hacktivism should be properly legalised and regulated by the government to catch illegal acts of individuals and corporations. The government can implement rules of Hacktivism and punish such hackers which act outside the law. The government should also work with hacktivists to implement modern technology in their operations to protect themselves from the hacking attacks. The government can also use data reveal by hacktivists to help individuals and corporations liable for their actions, such as Panama papers. The government will face several difficulties while regulating the Hacktivism actions but it will be beneficial for the public and organisations. References Fitri, N. (2011). Democracy discourses through the Internet communication: Understanding the hacktivism for the global changing.Online Journal of Communication and Media Technologies,1(2), 1-20. Fuchs, C. (2014). Hacktivism and Contemporary Politics.Social media, politics and the state: Protests, revolutions, riots, crime and policing in the age of Facebook, Twitter and YouTube. New York, 88-106. Hampson, N. C. (2012). Hacktivism: A new breed of protest in a networked world.BC Int'l Comp. L. Rev.,35, 511. Harding, L. (2016). What are the Panama Papers? A guide to history's biggest data leak. [Online] The Guardian. Available at: https://www.theguardian.com/news/2016/apr/03/what-you-need-to-know-about-the-panama-papers [Accessed on 19/11/2017] Himma, K. E. (2008). Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking.The handbook of information and computer ethics, 191. Kelly, B. B. (2012). Investing in a centralized cybersecurity infrastructure: Why hacktivism can and should influence cybersecurity reform.BUL Rev.,92, 1663. Lohrmann, D. (2017). The dramatic rise in hacktivism. [Online] Tech Crunch. Available at: https://techcrunch.com/2017/02/22/the-dramatic-rise-in-hacktivism/ [Accessed on 19/11/2017] Losh, E. (2012). Hacktivism and the humanities: Programming protest in the era of the digital university.Debates in the digital humanities, 161-186. MacAskill, E., Thielman, S. Oltermann, P. (2017). WikiLeaks publishes 'biggest ever leak of secret CIA documents'. [Online] The Guardian. Available at: https://www.theguardian.com/media/2017/mar/07/wikileaks-publishes-biggest-ever-leak-of-secret-cia-documents-hacking-surveillance [Accessed on 19/11/2017] Mansfield-Devine, S. (2011). Hacktivism: assessing the damage.Network Security,2011(8), 5-13. McCaughey, M., Ayers, M. D. (Eds.). (2013).Cyberactivism: Online activism in theory and practice. Routledge. Sauter, M. (2014).The coming swarm: DDOS actions, hacktivism, and civil disobedience on the Internet. Bloomsbury Publishing USA. Stampler, L. (2017). How ISIS Uses Social Media to Their Advantage. [Online] Teen Vogue. Available at: https://www.teenvogue.com/story/how-isis-uses-social-media-to-their-advantage [Accessed on 19/11/2017] Vamosi, R. (2008). Anonymous hackers take on the Church of Scientology.CNET News. Wazid, M., Katal, A., Goudar, R. H., Rao, S. (2013, April). Hacktivism trends, digital forensic tools and challenges: A survey. InInformation Communication Technologies (ICT), 2013 IEEE Conference on(pp. 138-144). IEEE.