As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
This chapter examines The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. 2014 has been an interesting one in the area of the use of cyberspace by cyber-criminals and cyber-terrorists. it is clear that cyber security has become a matter of vital importance to all organizations, whether in the public or private sectors. It is a matter that should be considered at the highest level in the organization.