New approach to cybersecurity.Published in:Issues in Science & Technology, 2012, v. 28, n. 2, p. 15Publication type:Article