Information has acquired the status of asset in public or private organizations in the information society. It is perceived that the use of information and communication technologies by institutions has potentiated and increased its competitiveness, providing speed and celerity of transmission and information processing. Likewise, threats to information security stand out as more sophisticated forms of attacks on information assets, such as cyber-terrorism, the subject of this study, emerge. This research aimed to prospect scenarios about cyber terrorism in Paraíba. Public agencies and companies that have suffered attacks or threats of attacks described in the media as cyber terrorism from January 2016 to 2017 have been consulted as an inte...
Terrorism aims to cause as many deaths as possible and to create psychological, economic, social and...
New digital economy technologies, such as the initial coin offering (ICO) and its virtual assets, to...
Cybercrime statistics about destructive malware, botnets anddenial of services attacks, show that we...
Inside the context of a globalized and technological modern society, new possibilities for communica...
Inside the context of a globalized and technological modern society, new possibilities for communica...
With the formation of an information society, the use of the Internet and the media in virtual netwo...
Nos últimos anos tornou-se óbvio que o mundo virtual das bases de dados e do software – popularmente...
This article aims to present and contextualize the concept of terrorism in Eugenio Diniz’s point of ...
Com o objetivo de identificar a diferença entre o uso da Internet por terroristas e o uso do ciberes...
Este artigo versa sobre o relacionamento simbiótico entre o (ciber)terrorismo e os media. Assumindo ...
The cyberattacks and cybercrime (attacks with economic motivation or against national interests) are...
Dissertação de Mestrado em Direito: Especialidade em Ciências Juridico-Forenses apresentada à Faculd...
Dissertação de Mestrado em Direito: Especialidade em Ciências Juridico-Forenses apresentada à Faculd...
New digital economy technologies, such as the initial coin offering (ICO) and its virtual assets, to...
New digital economy technologies, such as the initial coin offering (ICO) and its virtual assets, to...
Terrorism aims to cause as many deaths as possible and to create psychological, economic, social and...
New digital economy technologies, such as the initial coin offering (ICO) and its virtual assets, to...
Cybercrime statistics about destructive malware, botnets anddenial of services attacks, show that we...
Inside the context of a globalized and technological modern society, new possibilities for communica...
Inside the context of a globalized and technological modern society, new possibilities for communica...
With the formation of an information society, the use of the Internet and the media in virtual netwo...
Nos últimos anos tornou-se óbvio que o mundo virtual das bases de dados e do software – popularmente...
This article aims to present and contextualize the concept of terrorism in Eugenio Diniz’s point of ...
Com o objetivo de identificar a diferença entre o uso da Internet por terroristas e o uso do ciberes...
Este artigo versa sobre o relacionamento simbiótico entre o (ciber)terrorismo e os media. Assumindo ...
The cyberattacks and cybercrime (attacks with economic motivation or against national interests) are...
Dissertação de Mestrado em Direito: Especialidade em Ciências Juridico-Forenses apresentada à Faculd...
Dissertação de Mestrado em Direito: Especialidade em Ciências Juridico-Forenses apresentada à Faculd...
New digital economy technologies, such as the initial coin offering (ICO) and its virtual assets, to...
New digital economy technologies, such as the initial coin offering (ICO) and its virtual assets, to...
Terrorism aims to cause as many deaths as possible and to create psychological, economic, social and...
New digital economy technologies, such as the initial coin offering (ICO) and its virtual assets, to...
Cybercrime statistics about destructive malware, botnets anddenial of services attacks, show that we...