Terrorismi 4.0: il ruolo della tecnologia nei terrorismi globali

Journal title SICUREZZA E SCIENZE SOCIALI
Author/s Alessandro Cardazzone
Publishing Year 2017 Issue 2017/2 Language Italian
Pages 42 P. 83-124 File size 421 KB
DOI 10.3280/SISS2017-002007
DOI is like a bar code for intellectual property: to have more infomation click here

Below, you can see the article first page

If you want to buy this article in PDF format, you can do it, following the instructions to buy download credits

Article preview

FrancoAngeli is member of Publishers International Linking Association, Inc (PILA), a not-for-profit association which run the CrossRef service enabling links to and from online scholarly content.

Technological innovations have changed the way of human relations within the global Society. Internet, has modified the concept of Communication, making possible the diffusion of news, images and opinions in real time and in mobility. In Cyber-space, social media are powerful means of socialization, interaction and political organization; in this way they are changing the social environment, which becomes more cyber-social. The concept of "Industry 4.0" which provides for a gradual digitalization of the society and interconnection between Physical and Digital systems (CPS), is posing as a new industrial paradigm and in a social-economical term could indicate the beginning of a new industrial revolution. In this way, the aim of this work, is to analyze the technological context of future Societies (Society 4.0), trying to outline the types of threats to which they are exposed, as cyber-crime or cyber-terrorism, in order to highlight critical issues and implement new perspective of development of a mature cyber-democracy.

Keywords: Industry 4.0; Society 4.0; Cyber-Terrorism; Cyber-Security; Cyber-Democracy; Complex Systems analysis.

  1. AA.VV. (2013). Cyberworld, Capire proteggersi e prevenire gli attacchi in rete, a cura dell’Osservatorio per la Sicurezza Nazionale, HOEPLI.
  2. Agenzia per l’Italia Digitale (AgID) (2017). Misure minime di sicurezza ICT per le pubbliche amministrazioni (Direttiva del Presidente del Consiglio dei Ministri 1 agosto 2015), testo disponibile al sito: http://www.gazzettaufficiale.it/do/atto/serie_generale/caricaPdf?cdimg=17A0239900100010110001&dgu=2017-04-04&art.dataPubblicazioneGazzetta= 2017-04-04&art.codiceRedazionale=17A02399&art.num=1&art.tiposerie=SG.
  3. Assolombarda (2016). Approfondimento sulle tecnologie abilitanti Industria 4.0, testo disponibile al sito: https://www.aspeninstitute.it/system/files/inline/Ricerca%20n%2008%20Approfondimento%20Industry%204%200.pdf.
  4. Amato M., Fantacci L. (2016), Per un Pugno di Bitcoin, Rischi e opportunità delle monete virtuali. Milano: Università Bocconi Editore.
  5. Antinori A. (2016). Sicurezza nazionale: Intelligence e cyber-security, Ministero della Difesa – CeMiSS, Centro Militare di Studi Strategici, Roma, testo disponibile al sito: http://www.difesa.it/SMD_/CASD/IM/CeMiSS/Pubblicazioni/ricerche/Pagine/sicurezza_nazionale.aspx.
  6. Baldoni R., Montanari L., Querzoni L., a cura di (2017) 2016 Italian Cyber Security Report - Controlli essenziali di Cyber Security, CIS-Sapienza e Laboratorio Nazionale di Cyber Security, testo disponibile al sito: http://www.cybersecurityframework.it/sites/default/files/csr2016web.pdf.
  7. Baldoni R., Montanari L., a cura di (2016). 2015 Italian Cyber Security Report - Un Framework Nazionale per la Cybersecurity, CIS-Sapienza e Laboratorio Nazionale di Cyber Security, testo disponibile al sito: http://www.cybersecurityframework.it/sites/default/files/CSR2015_web.pdf.
  8. Bejtlich R. (2010). What Is APT and What Does It Want?, testo disponibile al sito: https://taosecurity.blogspot.it/2010/01/what-is-apt-and-what-does-it-want.html.
  9. Bernabè B. (2008). La comunicazione nell’era digitale. Italianieuropei, 2/2008, testo disponibile al sito: http://www.italianieuropei.it/i-libri/item/347-la-comunicazione-nellera-digitale.html.
  10. Bellini M. (2016). Internet of Things, gli ambiti applicativi in Italia, testo disponibili al sito: http://www.internet4things.it/iot-library/internet-of-things-gli-ambiti-applicativi-in-italia/.
  11. Boston Consulting Group (2015). Industry 4.0: The Future of Productivity and Growth in Manufacturing Industries, testo disponibile al sito: https://www.bcgperspectives.com/content/articles/engineered_products_project_business_industry_40_future_ productivi-ty_growth_manufacturing_industries/.
  12. Cardazzone A. (2015). Terrorismo islamico, dalla tesi premiata un modello per capire, testo disponibile al sito: http://www.cattolicanews.it/laureati-terrorismo-islamico-dalla-tesi-premiata-un-modello-per-capire.
  13. CIS (Center For Internet Security) (2016). The CIS Critical Security Controls for Effective Cyber Defense Version 6.1, testo disponible al sito: https://www.sans.org/critical-security-controls.
  14. Europol (2014). The Internet Organised Crime Threat Assessment (iOCTA), testo disponibile al sito: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2014.
  15. Europol (2015). The Internet Organised Crime Threat Assessment (iOCTA), testo disponibile al sito: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2015.
  16. Europol (2016). The Internet Organised Crime Threat Assessment (iOCTA), testo disponibile al sito: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2016.
  17. Europol (2017). The Internet Organised Crime Threat Assessment (iOCTA), disponibile alla risorsa web: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2017.
  18. Flashpoint (2016). Hacking for ISIS, The Emergent Cyber Threat Landscape, disponibile alla risorsa web: https://www.flashpoint-intel.com/library/.
  19. Howard P., Woolley S. (2017). Computational Propaganda Worldwide: Executive Summary, University of Oxford, testo disponibile al sito: http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2017/06/Casestudies-ExecutiveSummary.pdf.
  20. IBM Italia S.p.A. (2016). Industria 4.0; Ripensare il Made in Italy nell’Era del digitale, testo disponibile al sito: http://www-05.ibm.com/it/industria40/
  21. Infosec Inst. (2012). Cyberterrorism Defined (as distinct from Cybercrime), testo disponibile al sito: http://resources.infosecinstitute.com/cyberterrorism-distinct-from-cybercrime/.
  22. International Institute for Counter-Terrorism (ICT) (2017). ICT Cyber-Desk Review: Report #19, disponibile alla risorsa web: https://www.ict.org.il/Article/1941/Cyber-Desk-Review-Report-19#gsc.tab=0.
  23. International Institute for Counter-Terrorism (ICT) (2017). ICT Cyber-Desk Review: Report #18, disponibile alla risorsa web: https://www.ict.org.il/Article/1922/Cyber-Desk-Review-Report-18#gsc.tab=0.
  24. International Institute for Counter-Terrorism (ICT) (2016). ICT Cyber-Desk Review: Report #17, disponibile alla risorsa web: https://www.ict.org.il/Article/1872/Cyber-Desk-Review-Report-17#gsc.tab=0.
  25. International Institute for Counter-Terrorism (ICT) (2016). ICT Cyber-Desk Review: Report #16, disponibile alla risorsa web: https://www.ict.org.il/Article/1773/Cyber-Desk-Review-Report-16#gsc.tab=0.
  26. International Institute for Counter-Terrorism (ICT) (2016). ICT Cyber-Desk Review: Report #15, disponibile alla risorsa web: https://www.ict.org.il/Article/1686/Cyber-Desk-Review-Report-15#gsc.tab=0.
  27. International Institute for Counter-Terrorism (ICT) (2016). ICT Cyber-Desk Review: Report #14, disponibile alla risorsa web: https://www.ict.org.il/Article/1619/Cyber-Desk-Review-Report-14#gsc.tab=0.
  28. Lombardi M. (2015). The Islamic State (2015): il libro di IS che annuncia missili sull’Italia e recluta personale, testo disponibile al sito: http://www.itstime.it/w/the-islamic-state-2015-il-libro-di-is-che-annuncia-missili-sullitalia-e-recluta-personale-by-marco-lombardi/
  29. Mckinsey & C. (2016). Industry 4.0 at McKinsey’s model factories, Get ready for the disruptive wave, testo disponibile al sito: https://capability-center.mckinsey.com/files/mccn/2017-03/digital_4.0_model_factories_brochure_2.pdf.
  30. Ministero dello Sviluppo Economico (2016), Piano nazionale industria 4.0, testo disponibile al sito: http://www.sviluppoeconomico.gov.it/images/stories/documenti/Industria_40%20_conferenza_21_9.
  31. Nakamoto S. (2009). Bitcoin: A Peer-to-Peer Electronic Cash System, testo disponibile sito: https://bitcoin.org/bitcoin.pdf.
  32. National institute of Standards and Technology (NIST) (2011). Information Security; Managing Information Security Risk, Organization, Mission, and Information System View, testo disponibile al sito: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf.
  33. Newell C. et al. (2015). Cabinet ministers' email hacked by Isil spies, testo disponibile al sito: http://www.telegraph.co.uk/news/politics/11859005/Cabinet-ministers-email-hacked-by-Isil-spies.html
  34. Presidenza del Consiglio dei Ministri (2017). Piano nazionale per la protezione cibernetica e la sicurezza informatica, testo disponibile al sito: https://www.sicurezzanazionale.gov.it/sisr.nsf/wp-content/uploads/2017/05/piano-nazionale-cyber-2017.pdf
  35. Presidenza del Consiglio dei Ministri (2016). Relazione sulla politica dell’informazione per la sicurezza, testo disponibile al sito: http://www.sicurezzanazionale.gov.it/sisr.nsf/relazione-annuale/relazione-al-parlamento-2016.html
  36. Presidenza del Consiglio dei Ministri (2013). Decreto del 24 gennaio 2013 - Direttiva recante indirizzi per la protezione cibernetica e la sicurezza informatica nazionale, testo disponibile al sito: http://www.gazzettaufficiale.it/eli/id/2013/03/19/13A02504/sg
  37. Presidenza del Consiglio dei Ministri (2013). Quadro Strategico Nazionale per la Sicurezza dello Spazio Cibernetico, testo disponibile al sito: https://www.sicurezzanazionale.gov.it/sisr.nsf/wp-content/uploads/2014/02/quadro-strategico-nazionale-cyber.pdf
  38. Twitter PublicPolicy (2017). Update: Russian Interference in 2016 US Election, Bots, & Misinformation, testo disponibile al sito: https://blog.twitter.com/official/en_us/topics/company/2017/Update-Russian-Interference-in-2016--Election-Bots-and-Misinformation.html
  39. Wilson C. (2003). Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress, CRS Report for Congress, testo disponibile al sito: http://www.iwar.org.uk/cyberterror/resources/crs/45184.pdf

Alessandro Cardazzone, Terrorismi 4.0: il ruolo della tecnologia nei terrorismi globali in "SICUREZZA E SCIENZE SOCIALI" 2/2017, pp 83-124, DOI: 10.3280/SISS2017-002007