There is a need to investigate new technologic approaches where economic and social aspects become mutually supportive to enhance their impact on the communities' development. However, the protection of information infrastructure implies that no access, modification, deletion or otherwise denial of access to data or network resources or services is performed by unauthorized persons or entities. In this context, this book intends to be a thorough reflection on the awareness of potential threats and vulnerabilities, as well as a preoccupation towards cooperation in countering them with well-established rules and mechanisms created at a national and organizational level. This book is also relevant to better understand how the actors involved in information and communication technologies could develop new models of information systems and risk management strategies.