Attacco informatico e mondo digitale tra prevenzione e difesa

Author/s Nicola Strizzolo
Publishing Year 2014 Issue 2014/1 Language Italian
Pages 15 P. 38-52 File size 117 KB
DOI 10.3280/SISS2014-001004
DOI is like a bar code for intellectual property: to have more infomation click here

Below, you can see the article first page

If you want to buy this article in PDF format, you can do it, following the instructions to buy download credits

Article preview

FrancoAngeli is member of Publishers International Linking Association, Inc (PILA), a not-for-profit association which run the CrossRef service enabling links to and from online scholarly content.

The reticular structure of Internet represents his force, the standardization of a global codex has granted his planetary diffusion. The most important human activities have delegated control and management on to online computers. Finally, the power grid uses informatics online devices. This imposing, increasingly accelerated and interconnected use of the medium, however, has exposed so many users at serious, not only digital but also physical risks.

  1. Adams J. (2001). Virtual defense. Foreign Affairs, 80: 98-112. DOI: 10.2307/2005015
  2. Baldoni R., Chockler G., a cura di (2012). Collaborative financial infrastructure protection. Berlin: Springer. DOI: 10.1007/978-3-642-20420-
  3. Balkin J.M, Grimmelmann J., Katz E., Kozlovsky N., Wagman S., Zarsky T. (2007). Cybercrime. Digital cops and laws in a networked environment. New York: New York University Press.
  4. Blengino C. (2009). La devianza informatica tra crimini e diritti. Un’analisi socio giuridica. Roma: Carrocci-
  5. Britz M.T. (2011). Terrorism and Technology: Operationalizing Cyberterrorism and Identifyng Concepts. In Holt T.J, a cura di (2011), op. cit.
  6. Cipolla C. (2013). Perché non possiamo non essere eclettici. Il sapere sociale nella web society. Milano: FrancoAngeli.
  7. Civita A. (2011). Cyberbulling. Un nuovo tipo di devianza. Milano: FrancoAngeli.
  8. Council of Europe (2011). Convention on cybercrime, Budapest 23 novembre 2001.
  9. Dinh H., Lee C., Niyato D., Wang P. (2011). A survey of mobile cloud computing: architecture, applications, and approaches. Wirelles Communications and mobile computing, 13: 1587-1611.
  10. Fu T., Abbassi A., Chen H. (2010). A Focused Crawler for DarkWeb Forums. Journal of the American Society for Information Science and Technology, 61 (6): 1213-1231.
  11. Grillo V., Strizzolo N., Cane G. (2013). Cybercrime: analisi ed interventi. In Cipolla C., Antonilli A., a cura di, La sicurezza come politica. Milano: FrancoAngeli.
  12. Herrington L., Aldrich R. (2013). The Future of Cyber-Resilience in an Age of Global Complexity. Politics, 33 (4): 299-310. DOI: 10.1111/1467-9256.1203
  13. Holt T.J, a cura di (2011). Crime On-line. Correlates, Causes, and Context, Durham: Carolina Academic Press.
  14. Kao D.Y., Wangb S.J., Huang F.Y. (2010). SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases. Computer Law and Security Review, 26 (2010): 52-60. DOI: 10.1016/j.clsr.2009.09.00
  15. Kelsey J.T.G. (2008). Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare. Michigan Law Review, 106 (7): 1427-1451.
  16. Kessler G.C. (2007), Anti-forensics and the Digital Investigator, in Proceedings of the Fifth Australian Digital Forensics Conference, Cowan University.
  17. Kim W., Jeong O.-R., Kim C., So J. (2010). The dark side of the Internet: Attacks, costs and responses. Information Systems, 36: 675-705. DOI: 10.1016/
  18. Kshetri N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11: 541–562. DOI: 10.1016/j.intman.2005.09.00
  19. Ng D., Tsui E. (2010). Knowledge-Intensive Collaboration to Combat Cyber Crime in the Asia Pacific Region, in Proceedings of the International Conference on Intellectual Capital.
  20. Papagiannakis G., Singh G., Magnenat-Thalmann N. (2008). A survey of mobile and wireless technologies for augmented reality systems. Computer Animation and Virtual Worlds, 19: 3-22. DOI: 10.1002/cav.22
  21. Pearson I.L.G. (2011). Smart grid cyber security for Europe. Energy Policy, 39: 5211-5218. DOI: 10.1016/j.enpol.2011.05.04
  22. Shubert A. (2003). Taking a swipe at cyber card fraud. Disponibile al sito internet, (ultimo accesso 13/01/2013).
  23. Smith C.S., Hung L.C. (2010). The Patriot Act. Issues and controversies. Springfield: Charles C Thomas Publisher.
  24. Sorice M. (2009). Sociologia dei mass media. Roma: Carocci.
  25. Strizzolo N. (2012). Criminalità informatica. In Cipolla C., a cura di, La devianza come sociologia. Milano: FrancoAngeli.
  26. Tehrani P.M., Manap N.A., Taji H. (2013). Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime. Computer Law and Security Review, 29: 207-215. DOI: 10.1016/j.clsr.2013.03.01
  27. Updegrove A. (2011). Cyber Security and the Vulnerability of Networks: Why we Need to Rethink our Cyber Defenses Now. Disponibile al sito internet (ultimo accesso 13/01/2013).
  28. Wade C., Aldridge J., Hopper L., Drummond H., Hopper R.H., Andrew K. (2011). Haking into the Hacker: Separating Fact from Fiction. In Holt T.J, a cura di, op. cit.
  29. Waller V., Johnston R.B. (2009). Making Ubiquitous Computing Available. Communications of the ACM, 52: 127-130. DOI: 10.1145/1562764.156279
  30. Wang W., Lu Z. (2012). Cyber security in the Smart Grid: Survey and challenges, Computer Networks, 57: 1344-1371. DOI: 10.1016/j.comnet.2012.12.01
  31. Westby J.R. (2003). International guide to combating cybercrime. Chicago: ABA Publishing.
  32. Yar M. (2006). Cybercrime and Society. London: Sage.

Nicola Strizzolo, Attacco informatico e mondo digitale tra prevenzione e difesa in "SICUREZZA E SCIENZE SOCIALI" 1/2014, pp 38-52, DOI: 10.3280/SISS2014-001004