As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
This chapter examines The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. 2014 has been an interesting one in the area of the use of cyberspace by cyber-criminals and cyber-terrorists. it is clear that cyber security has become a matter of vital importance to all organizations, whether in the public or private sectors. It is a matter that should be considered at the highest level in the organization.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.