IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Hackers and Cyber Terrorists

Hackers and Cyber Terrorists
View Sample PDF
Author(s): M. J. Warren (Deakin University, Australia)
Copyright: 2008
Pages: 9
Source title: End-User Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Steve Clarke (University of Hull Business School, UK)
DOI: 10.4018/978-1-59904-945-8.ch116

Purchase

View Hackers and Cyber Terrorists on the publisher's website for pricing and purchasing information.

Abstract

Many aspects of our modern society now have either a direct or implicit dependence upon information technology (IT). As such, a compromise of the availability or integrity in relation to these systems (which may encompass such diverse domains as banking, government, health care, and law enforcement) could have dramatic consequences from a societal perspective.

Related Content

Rod D. Roscoe, Russell J. Branaghan, Nancy J. Cooke, Scotty D. Craig. © 2018. 34 pages.
Steve Ritter, R. Charles Murray, Robert G. M. Hausmann. © 2018. 17 pages.
Yvonne S. Kao, Bryan J. Matlen, Michelle Tiu, Linlin Li. © 2018. 24 pages.
Melissa L. Stone, Kevin M. Kent, Rod D. Roscoe, Kathleen M. Corley, Laura K. Allen, Danielle S. McNamara. © 2018. 23 pages.
Elizabeth R. Kazakoff, Melissa Orkin, Kristine Bundschuh, Rachel L. Schechter. © 2018. 24 pages.
Irfan Kula, Russell J. Branaghan, Robert K. Atkinson, Rod D. Roscoe. © 2018. 17 pages.
Erin Walker, Ruth Wylie, Andreea Danielescu, James P. Rodriguez III, Ed Finn. © 2018. 19 pages.
Body Bottom