<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2183-9522</journal-id>
<journal-title><![CDATA[Revista Internacional CONSINTER de Direito]]></journal-title>
<abbrev-journal-title><![CDATA[Revista Internacional CONSINTER de Direito]]></abbrev-journal-title>
<issn>2183-9522</issn>
<publisher>
<publisher-name><![CDATA[Editorial Juruá]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2183-95222024000200413</article-id>
<article-id pub-id-type="doi">10.19135/revista.consinter.00019.18</article-id>
<title-group>
<article-title xml:lang="pt"><![CDATA[DESAFIOS DO DIREITO PENAL NA REPRESSÃO DA ENGENHARIA SOCIAL EM AMBIENTES VIRTUAIS NO BRASIL]]></article-title>
<article-title xml:lang="en"><![CDATA[CHALLENGES OF PENAL LAW IN REPRESSING SOCIAL ENGINEERING IN VIRTUAL ENVIRONMENTS IN BRAZIL]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Quadros]]></surname>
<given-names><![CDATA[Matheus de]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cruz]]></surname>
<given-names><![CDATA[Fabrício Bittencourt da]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,UEPG  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Brasil</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<numero>19</numero>
<fpage>413</fpage>
<lpage>427</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_arttext&amp;pid=S2183-95222024000200413&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_abstract&amp;pid=S2183-95222024000200413&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_pdf&amp;pid=S2183-95222024000200413&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo Este artigo objetiva, através do método hipotético-dedutivo, analisar a eficácia do Direito Penal na prevenção às práticas de engenharia social em ambientes virtuais no Brasil. Foi conduzida uma pesquisa qualitativa e exploratória, utilizando-se de recursos documentais e bibliográficos. O artigo também explora estudos e experiências internacionais para identificar potenciais abordagens complementares ao combate da engenharia social online. A conclusão aponta que, apesar dos esforços legislativos em fazer com que o Direito Penal abranja as práticas de engenharia social em ambientes virtuais, obstáculos estruturais dificultam a efetividade dessa abordagem. Ademais, o artigo destaca a necessidade de uma estratégia preventiva por parte do Estado, a ser implementada por meio de políticas públicas complementares.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This article aims, through the hypothetical-deductive method, to analyze the effectiveness of Criminal Law in preventing social engineering practices in virtual environments in Brazil. A qualitative and exploratory research was conducted, using documentary and bibliographic resources. The article also explores international studies and experiences to identify potential complementary approaches to combating online social engineering. The conclusion points out that, despite legislative efforts to make Criminal Law encompass social engineering practices in virtual environments, structural obstacles hinder the effectiveness of this approach. Furthermore, the article highlights the need for a preventive strategy by the State, to be implemented through complementary public policies.]]></p></abstract>
<kwd-group>
<kwd lng="pt"><![CDATA[Engenharia Social]]></kwd>
<kwd lng="pt"><![CDATA[Prevenção]]></kwd>
<kwd lng="pt"><![CDATA[Direito Penal.]]></kwd>
<kwd lng="en"><![CDATA[Social engineering]]></kwd>
<kwd lng="en"><![CDATA[Prevention]]></kwd>
<kwd lng="en"><![CDATA[criminal law.]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[ARAUJO]]></surname>
<given-names><![CDATA[Fábio Lucena de]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Aspectos jurídicos no combate e prevenção ao ransomware]]></article-title>
<collab>BRASIL, Ministério Público Federal, 2ª Câmara de Coordenação e Revisão</collab>
<source><![CDATA[Crimes Cibernéticos: coletânea de artigos]]></source>
<year>2018</year>
<volume>3</volume>
<publisher-loc><![CDATA[Brasília ]]></publisher-loc>
<publisher-name><![CDATA[MPF]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[BARRETO]]></surname>
<given-names><![CDATA[Alessandro Gonçalves]]></given-names>
</name>
<name>
<surname><![CDATA[BRASIL]]></surname>
<given-names><![CDATA[Beatriz Silveira]]></given-names>
</name>
</person-group>
<source><![CDATA[Manual de investigação cibernética à luz do Marco Civil da Internet]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Rio de Janeiro ]]></publisher-loc>
<publisher-name><![CDATA[Brasport]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[BECK]]></surname>
<given-names><![CDATA[Ulrich]]></given-names>
</name>
</person-group>
<source><![CDATA[Sociedade de risco: rumo a uma outra modernidade]]></source>
<year>2011</year>
<edition>2</edition>
<publisher-loc><![CDATA[São Paulo ]]></publisher-loc>
<publisher-name><![CDATA[Editora 34]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[DUPONT]]></surname>
<given-names><![CDATA[Benoit]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime]]></article-title>
<source><![CDATA[Crime Law Soc Change]]></source>
<year>2017</year>
<volume>67</volume>
<page-range>97-116</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[BIANCAMANO]]></surname>
<given-names><![CDATA[Paula]]></given-names>
</name>
</person-group>
<source><![CDATA[Mais de 5 milhões de brasileiros foram vítimas do golpe de Clonagem de WhatsApp em 2020]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<collab>BRASIL, Câmara dos Deputados</collab>
<source><![CDATA[Relatório Final da Comissão Parlamentar de Inquérito destinada a investigar a prática de crimes cibernéticos e seus efeitos deletérios perante a economia e a sociedade neste país]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Brasília ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<collab>BRASIL</collab>
<article-title xml:lang=""><![CDATA[Decreto-Lei n°. 2.848, de 7 de dezembro de 1940, Código Penal]]></article-title>
<source><![CDATA[Diário Oficial da União]]></source>
<year>1940</year>
<publisher-loc><![CDATA[Rio de Janeiro ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<collab>BRASIL</collab>
<article-title xml:lang=""><![CDATA[Lei n°. 12.965, de 23 de abril de 2014, Estabelece princípios, garantias, direitos e deveres para o uso da Internet no Brasil]]></article-title>
<source><![CDATA[Diário Oficial da União]]></source>
<year></year>
<publisher-loc><![CDATA[Brasília ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<collab>BRASIL</collab>
<article-title xml:lang=""><![CDATA[Lei n°. 13.709, de 14 de agosto de 2018, Lei Geral de Proteção de Dados Pessoais (LGPD)]]></article-title>
<source><![CDATA[Diário Oficial da União]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Brasília ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<collab>BRASIL</collab>
<article-title xml:lang=""><![CDATA[Lei n°. 13.853, de 8 de julho de 2019, Altera a Lei 13.709, de 14 de agosto de 2018, para dispor sobre a proteção de dados pessoais e para criar a Autoridade Nacional de Proteção de Dados; e dá outras providências]]></article-title>
<source><![CDATA[Diário Oficial da União]]></source>
<year>2019</year>
<publisher-loc><![CDATA[Brasília ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<collab>BRASIL</collab>
<article-title xml:lang=""><![CDATA[Lei n°. 14.155, de 27 de maio de 2021, Altera o Decreto-Lei 2.848, de 7 de dezembro de 1940 (Código Penal), para tornar mais graves os crimes de violação de dispositivo informático, furto e estelionato cometidos de forma eletrônica ou pela internet; e o Decreto-Lei 3.689, de 3 de outubro de 1941 (Código de Processo Penal), para definir a competência em modalidades de estelionato]]></article-title>
<source><![CDATA[Diário Oficial da União]]></source>
<year>2021</year>
<publisher-loc><![CDATA[Brasília ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<collab>BRASIL</collab>
<article-title xml:lang=""><![CDATA[Lei n°. 14.460, de 25 de outubro de 2022, Transforma a Autoridade Nacional de Proteção de Dados (ANPD) em autarquia de natureza especial e transforma cargos comissionados; altera as Leis nºs 13.709, de 14 de agosto de 2018 (Lei Geral de Proteção de Dados Pessoais), e 13.844, de 18 de junho de 2019; e revoga dispositivos da Lei 13.853, de 8 de julho de 2019]]></article-title>
<source><![CDATA[Diário Oficial da União]]></source>
<year>2022</year>
<publisher-loc><![CDATA[Brasília ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[CRESPO]]></surname>
<given-names><![CDATA[Marcelo Xavier de Freitas]]></given-names>
</name>
</person-group>
<source><![CDATA[Crimes digitais]]></source>
<year>2011</year>
<publisher-loc><![CDATA[São Paulo ]]></publisher-loc>
<publisher-name><![CDATA[Editora Saraiva]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[CUNHA]]></surname>
<given-names><![CDATA[Rogério Sanches]]></given-names>
</name>
</person-group>
<source><![CDATA[Manual de Direito Penal: parte especial (arts. 121 ao 361)]]></source>
<year>2019</year>
<edition>11</edition>
<publisher-loc><![CDATA[Salvador ]]></publisher-loc>
<publisher-name><![CDATA[Editora Juspodivm]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[FORNASIER]]></surname>
<given-names><![CDATA[Mateus de Oliveira]]></given-names>
</name>
<name>
<surname><![CDATA[KNEBEL]]></surname>
<given-names><![CDATA[Norberto Milton Paiva]]></given-names>
</name>
<name>
<surname><![CDATA[SILVA]]></surname>
<given-names><![CDATA[Fernanda Viero da]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Phishing e engenharia social: entre a criminalização e a utilização de meios sociais de proteção]]></article-title>
<source><![CDATA[Meritum]]></source>
<year>2020</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>116-29</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<collab>FORUM BRASILEIRO DE SEGURANÇA PÚBLICA</collab>
<article-title xml:lang=""><![CDATA[Os crimes patrimoniais no Brasil: entre novas e velhas dinâmicas]]></article-title>
<source><![CDATA[Anuário Brasileiro de Segurança Pública 2022]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[FULLER]]></surname>
<given-names><![CDATA[Greice Patricia]]></given-names>
</name>
<name>
<surname><![CDATA[TATEOKI]]></surname>
<given-names><![CDATA[Victor Augusto]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Os dados pessoais como bem jurídico a ser penalmente tutelado na sociedade da informação]]></article-title>
<source><![CDATA[Revista em Tempo]]></source>
<year>2023</year>
<volume>22</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>110-24</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[GHAZI-TEHRANI]]></surname>
<given-names><![CDATA[Adam Kavon]]></given-names>
</name>
<name>
<surname><![CDATA[PONTELL]]></surname>
<given-names><![CDATA[Henry N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Phishing evolves: analyzing the enduring cybercrime]]></article-title>
<source><![CDATA[Victims &amp; Offenders]]></source>
<year>2021</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>316-42</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[GIL]]></surname>
<given-names><![CDATA[Antonio Carlos]]></given-names>
</name>
</person-group>
<source><![CDATA[Como elaborar projetos de pesquisa]]></source>
<year>2017</year>
<edition>4</edition>
<publisher-loc><![CDATA[São Paulo ]]></publisher-loc>
<publisher-name><![CDATA[Atlas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[HATFIELD]]></surname>
<given-names><![CDATA[Joseph M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social engineering in cybersecurity: The evolution of a concept]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2018</year>
<volume>73</volume>
<page-range>1-28</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<collab>INSTITUTO BRASILEIRO DE GEOGRAFIA E ESTATÍSTICA</collab>
<source><![CDATA[Internet já é acessível em 90,0% dos domicílios do país em 2021]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[JESUS]]></surname>
<given-names><![CDATA[Damásio de]]></given-names>
</name>
<name>
<surname><![CDATA[MILAGRE]]></surname>
<given-names><![CDATA[José Antônio]]></given-names>
</name>
</person-group>
<source><![CDATA[Manual de crimes informáticos]]></source>
<year>2016</year>
<publisher-loc><![CDATA[São Paulo ]]></publisher-loc>
<publisher-name><![CDATA[Editora Saraiva]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[KULIKOVA]]></surname>
<given-names><![CDATA[Tatyana]]></given-names>
</name>
</person-group>
<source><![CDATA[El spam y el phishing en 2022]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[LYNCH]]></surname>
<given-names><![CDATA[Jennifer]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identity theft in cryberspace: crime control methods and their effectiveness in combating phishing attacks]]></article-title>
<source><![CDATA[Berkeley Techonology Law Journal]]></source>
<year>2005</year>
<volume>20</volume>
<page-range>259-300</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[MARCONI]]></surname>
<given-names><![CDATA[Marina de Andrade]]></given-names>
</name>
<name>
<surname><![CDATA[LAKATOS]]></surname>
<given-names><![CDATA[Eva Maria]]></given-names>
</name>
</person-group>
<source><![CDATA[Fundamentos de metodologia científica]]></source>
<year>2003</year>
<edition>5</edition>
<publisher-loc><![CDATA[São Paulo ]]></publisher-loc>
<publisher-name><![CDATA[Atlas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[PETHERS]]></surname>
<given-names><![CDATA[Brent]]></given-names>
</name>
<name>
<surname><![CDATA[BELLO]]></surname>
<given-names><![CDATA[Abubakar]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks]]></article-title>
<source><![CDATA[Future Internet]]></source>
<year>2023</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[PINTO]]></surname>
<given-names><![CDATA[Luiz Tiago Souza]]></given-names>
</name>
<name>
<surname><![CDATA[BERENGUEL]]></surname>
<given-names><![CDATA[Orlando Leonardo]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Engenharia social: a porta de entrada para informações confidenciais]]></article-title>
<source><![CDATA[Revista Científica E-Locução]]></source>
<year>2020</year>
<volume>1</volume>
<numero>17</numero>
<issue>17</issue>
<page-range>483-98</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="">
<collab>REINO UNIDO</collab>
<source><![CDATA[National cyber security strategy 2016-2021]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[RODRIGUES]]></surname>
<given-names><![CDATA[Alex]]></given-names>
</name>
</person-group>
<source><![CDATA[Quase 50% dos brasileiros não têm acesso a redes de esgoto, diz MDR]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[SILVA]]></surname>
<given-names><![CDATA[Francisco José Albino Faria Castro e]]></given-names>
</name>
</person-group>
<source><![CDATA[Classificação taxonómica dos ataques de Engenharia Social: caracterização da problemática da segurança de informação em Portugal relativamente à Engenharia Social]]></source>
<year>2013</year>
<page-range>131</page-range><publisher-loc><![CDATA[Porto, Portugal ]]></publisher-loc>
<publisher-name><![CDATA[Faculdade Engenharia, Universidade Católica de Portugal]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[SUMAN]]></surname>
<given-names><![CDATA[Shreya]]></given-names>
</name>
<name>
<surname><![CDATA[SRIVASTAVA]]></surname>
<given-names><![CDATA[Neha]]></given-names>
</name>
<name>
<surname><![CDATA[PANDIT]]></surname>
<given-names><![CDATA[Renu]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber crimes and phishing attacks]]></article-title>
<source><![CDATA[International Journal on Recent and Innovation Trends in Computing and Communication]]></source>
<year>2014</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>324-7</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[TEIXEIRA]]></surname>
<given-names><![CDATA[Tarcísio]]></given-names>
</name>
<name>
<surname><![CDATA[GUERREIRO]]></surname>
<given-names><![CDATA[Ruth Maria]]></given-names>
</name>
</person-group>
<source><![CDATA[Lei Geral de Proteção de Dados Pessoais (LGPD): comentada artigo por artigo]]></source>
<year>2022</year>
<publisher-loc><![CDATA[São Paulo ]]></publisher-loc>
<publisher-name><![CDATA[Editora Saraiva]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[VILELA]]></surname>
<given-names><![CDATA[Erica]]></given-names>
</name>
<name>
<surname><![CDATA[UEDA]]></surname>
<given-names><![CDATA[Eduardo Takeo]]></given-names>
</name>
<name>
<surname><![CDATA[GAVA]]></surname>
<given-names><![CDATA[Vagner Luiz]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Phishing e engenharia social: conceitos, modalidades, técnicas de detecção e prevenção de fraudes. Uma revisão sistemática da literatura]]></article-title>
<source><![CDATA[19th CONTECSI - International Conferece on Information Systems and Technology Management]]></source>
<year>2022</year>
<publisher-loc><![CDATA[São Paulo ]]></publisher-loc>
<publisher-name><![CDATA[Anais Eletrônicos]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[WENDT]]></surname>
<given-names><![CDATA[Emerson]]></given-names>
</name>
<name>
<surname><![CDATA[JORGE]]></surname>
<given-names><![CDATA[Higor Vinicius Nogueira]]></given-names>
</name>
</person-group>
<source><![CDATA[Crimes cibernéticos: ameaças e procedimentos de investigação]]></source>
<year>2021</year>
<edition>3</edition>
<publisher-loc><![CDATA[Rio de Janeiro ]]></publisher-loc>
<publisher-name><![CDATA[Brasport]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
