Click here to download

Il ruolo della ICT nella prevenzione e nel contrasto dei fenomeni criminali complessi
Journal Title: SICUREZZA E SCIENZE SOCIALI 
Author/s: Arije Antinori 
Year:  2014 Issue: Language: Italian 
Pages:  15 Pg. 23-37 FullText PDF:  119 KB
DOI:  10.3280/SISS2014-001003
(DOI is like a bar code for intellectual property: to have more infomation:  clicca qui   and here 


The Digital Revolution has created a scenario characterized by systemic complexity based on continuous interconnectivity. In this context, IT plays a central role in knowledge, prevention and fight against complex crime phenomena. The terrorist threat by new hostile entities produces the development of a multidimensional deeply-integrated cybersecurity. Organized Crime increases their business and their infiltration across the Dark Web and Police activity become very hard. The Big Data and the spread of Social Media create knowledge and operative new challenges in terms of security. SOCMINT seems to be a useful tool-box in fighting against new-asymmetric globalized entities.

  1. Anderson D.F., Cappelli D.M., Gonzalez J.J., Mojtahedzadeh M., Moore A.P., Rich E., Sarriegui J.M., Shimeall T.J., Stanton J.M., Weaver E., Zagonel A. (2004). Preliminary System Dynamics Maps of the Insider Cyber-Threat Problem. Proceedings of the 22nd International Conference of the System Dynamics Society. Oxford: System Dynamics Society.
  2. Antinori A. (2011). Sviluppo nell’ambito nazionale del concetto di ‘‘Information Assurance’’ relativo alla protezione delle informazioni nella loro globalità. Roma: Ministero della Difesa – Centro Militare di Studi Strategici.
  3. Antinori A. (2012). “Do-It-Yourself Terrorism. From Ideologies and Groups to New Media Culture in European Society of Criminology. 12th Annual Conference of the European Society of Criminology. Criminology in the 21st Century: a Necessary Balance Between Freedom and Security”. Bilbao, 12 to 15 September 2012 – Book of Abstracs. Lausanne: European Society of Criminology.
  4. Antinori A. (2012). Terrorismo e forme di comunicazione: profili nazionali e internazionali. Roma: Ministero della Difesa – Centro Militare di Studi Strategici.
  5. Antinori A. (2013). “10 Years of Digihad. The Evolution of Global Digital Jihadism”. In 13th Annual Conference of the European Society of Criminology. Beyond Punitiveness: Crime and Crime Control in Europe in a Comparative Perspective. Budapest, 4 to 7 September 2013 – Book of Abstracs.Lausanne: European Society of Criminology.
  6. Antinori A. (2013). Autopercezione ed eteropercezione del mondo militare in rete. Indagine socio-antropologica sull’immagine dei militari nel contesto dei social-networks e nei processi di comunicazione su internet. Prospettive di utilizzo della rete per finalità istituzionali di natura sociologica. Roma: Ministero della Difesa – Centro Militare di Studi Strategici.
  7. Antinori A. (2013). Paura ed insicurezza sociale nello scenario contemporaneo. Criminalità, Paura e Media, 7, dicembre 2012/gennaio 2013.
  8. Antinori A. (2013). The Raising of Generation-T. Media as Weapon and the Culture of Terrorism. In Global Issues in Contemporary Policing.
  9. Antinori A., Marotta G. (2007). Cyberterrorism in WEBCRIMES: Gli usi di internet tra devianza e criminalità. In: Pitasi A., a cura di, Webcrimes: Normalità, devianze e reati nel cyperspace. Milano: Guerini e Associati (G&A).
  10. Armenia S., De Angelis A. (2013). Proposal of a ‘Goldilocks’ Methodology for the Assessment of an International Crisis in Proceedings of The 31st International Conference of the System Dynamics Society - Cambridge, Massachusetts, USA - July 21-25, 2013. Oxford: System Dynamics Society
  11. Gordon L.A., Loeb M.P., Lucyshyn W., Richardson R. (2005-2012). Ninth Annual CSI/FBI Computer Crime and Security Survey. New York: Computer Security Institute.
  12. Harteveldt H.H. (2012). The Future Of Airline Distribution - A Look Ahead To 2017, Cambridge: Atmosphere Research Group LLC.
  13. Hu X., Shen S., Wu J. (2012). Modeling Of Attacking And Defending Strategies. In Situations With Intentional Threats in Proceedings of the 9th International ISCRAM Conference. Vancouver: ISCRAM.
  14. Jrad A., O’Reilly G., Richman S. H., Conrad S., Kelic A. (2006). Dynamic Changes In Subscriber Behavior And Their Impact On The Telecom Network In Cases Of Emergency. Springer Verlag.
  15. Kramer F.D., Starr S.H., Wentz L. (2001). Cyberpower and National Security (National Defense University). Sterling: Potomac Books Inc.
  16. Pederson S. (2013). Understanding The Deep Web. Sioux Falls: BrightPlanet.
  17. Research Center of Cyber Intelligence and Information Security (2013). 2013 Italian Cyber Security Report - Critical Infrastructure and Other Sensitive Sectors Readiness. Roma: “Sapienza” Università di Roma
  18. Sir Omand D. (2012). Introducing Social Media Intelligence (SOCMINT). In Bartlett J., Miller C., Intelligence and National Security. New York: Routledge.
  19. Sterman J.D. (2000). Business Dynamics: Systems Thinking and Modeling for a Complex World. New York: Irwin McGraw-Hill.
  20. U.S. Department of Homeland Security (2005). LLIS - Intelligence and Information Sharing Initiative: Homeland Security Intelligence Requirements Process. Washington D.C.
  21. U.S. Magistrate Judge Southern District of New York (2013). Criminal Complaint 13 mag #2328 Ross William Ulbricht. New York: U.S. District Court.
  22. Wayne B. (2012). Trends in Immersive Environments, Norfolk: Future Solutions - Allied Command Transformation, NATO.
  23. Wang K., Bai M., Marti J., Strivastava K.D. (2012). Optimal Decision Maker Algorithm For Disaster Response Management With i2sim Applications in Proceedings of the 9th International ISCRAM Conference. Vancouver: ISCRAM.

Arije Antinori, in "SICUREZZA E SCIENZE SOCIALI" 1/2014, pp. 23-37, DOI:10.3280/SISS2014-001003

   

FrancoAngeli is a member of Publishers International Linking Association a not for profit orgasnization wich runs the CrossRef service, enabing links to and from online scholarly content