Click here to download

Attacco informatico e mondo digitale tra prevenzione e difesa
Author/s: Nicola Strizzolo 
Year:  2014 Issue: Language: Italian 
Pages:  15 Pg. 38-52 FullText PDF:  117 KB
DOI:  10.3280/SISS2014-001004
(DOI is like a bar code for intellectual property: to have more infomation:  clicca qui   and here 

The reticular structure of Internet represents his force, the standardization of a global codex has granted his planetary diffusion. The most important human activities have delegated control and management on to online computers. Finally, the power grid uses informatics online devices. This imposing, increasingly accelerated and interconnected use of the medium, however, has exposed so many users at serious, not only digital but also physical risks.

  1. Adams J. (2001). Virtual defense. Foreign Affairs, 80: 98-112., DOI: 10.2307/2005015
  2. Baldoni R., Chockler G., a cura di (2012). Collaborative financial infrastructure protection. Berlin: Springer., DOI: 10.1007/978-3-642-20420-
  3. Balkin J.M, Grimmelmann J., Katz E., Kozlovsky N., Wagman S., Zarsky T. (2007). Cybercrime. Digital cops and laws in a networked environment. New York: New York University Press.
  4. Blengino C. (2009). La devianza informatica tra crimini e diritti. Un’analisi socio giuridica. Roma: Carrocci-
  5. Britz M.T. (2011). Terrorism and Technology: Operationalizing Cyberterrorism and Identifyng Concepts. In Holt T.J, a cura di (2011), op. cit.
  6. Cipolla C. (2013). Perché non possiamo non essere eclettici. Il sapere sociale nella web society. Milano: FrancoAngeli.
  7. Civita A. (2011). Cyberbulling. Un nuovo tipo di devianza. Milano: FrancoAngeli.
  8. Council of Europe (2011). Convention on cybercrime, Budapest 23 novembre 2001.
  9. Dinh H., Lee C., Niyato D., Wang P. (2011). A survey of mobile cloud computing: architecture, applications, and approaches. Wirelles Communications and mobile computing, 13: 1587-1611.
  10. Fu T., Abbassi A., Chen H. (2010). A Focused Crawler for DarkWeb Forums. Journal of the American Society for Information Science and Technology, 61 (6): 1213-1231.
  11. Grillo V., Strizzolo N., Cane G. (2013). Cybercrime: analisi ed interventi. In Cipolla C., Antonilli A., a cura di, La sicurezza come politica. Milano: FrancoAngeli.
  12. Herrington L., Aldrich R. (2013). The Future of Cyber-Resilience in an Age of Global Complexity. Politics, 33 (4): 299-310., DOI: 10.1111/1467-9256.1203
  13. Holt T.J, a cura di (2011). Crime On-line. Correlates, Causes, and Context, Durham: Carolina Academic Press.
  14. Kao D.Y., Wangb S.J., Huang F.Y. (2010). SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases. Computer Law and Security Review, 26 (2010): 52-60., DOI: 10.1016/j.clsr.2009.09.00
  15. Kelsey J.T.G. (2008). Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare. Michigan Law Review, 106 (7): 1427-1451.
  16. Kessler G.C. (2007), Anti-forensics and the Digital Investigator, in Proceedings of the Fifth Australian Digital Forensics Conference, Cowan University.
  17. Kim W., Jeong O.-R., Kim C., So J. (2010). The dark side of the Internet: Attacks, costs and responses. Information Systems, 36: 675-705., DOI: 10.1016/
  18. Kshetri N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11: 541–562., DOI: 10.1016/j.intman.2005.09.00
  19. Ng D., Tsui E. (2010). Knowledge-Intensive Collaboration to Combat Cyber Crime in the Asia Pacific Region, in Proceedings of the International Conference on Intellectual Capital.
  20. Papagiannakis G., Singh G., Magnenat-Thalmann N. (2008). A survey of mobile and wireless technologies for augmented reality systems. Computer Animation and Virtual Worlds, 19: 3-22., DOI: 10.1002/cav.22
  21. Pearson I.L.G. (2011). Smart grid cyber security for Europe. Energy Policy, 39: 5211-5218., DOI: 10.1016/j.enpol.2011.05.04
  22. Shubert A. (2003). Taking a swipe at cyber card fraud. Disponibile al sito internet, (ultimo accesso 13/01/2013).
  23. Smith C.S., Hung L.C. (2010). The Patriot Act. Issues and controversies. Springfield: Charles C Thomas Publisher.
  24. Sorice M. (2009). Sociologia dei mass media. Roma: Carocci.
  25. Strizzolo N. (2012). Criminalità informatica. In Cipolla C., a cura di, La devianza come sociologia. Milano: FrancoAngeli.
  26. Tehrani P.M., Manap N.A., Taji H. (2013). Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime. Computer Law and Security Review, 29: 207-215., DOI: 10.1016/j.clsr.2013.03.01
  27. Updegrove A. (2011). Cyber Security and the Vulnerability of Networks: Why we Need to Rethink our Cyber Defenses Now. Disponibile al sito internet (ultimo accesso 13/01/2013).
  28. Wade C., Aldridge J., Hopper L., Drummond H., Hopper R.H., Andrew K. (2011). Haking into the Hacker: Separating Fact from Fiction. In Holt T.J, a cura di, op. cit.
  29. Waller V., Johnston R.B. (2009). Making Ubiquitous Computing Available. Communications of the ACM, 52: 127-130., DOI: 10.1145/1562764.156279
  30. Wang W., Lu Z. (2012). Cyber security in the Smart Grid: Survey and challenges, Computer Networks, 57: 1344-1371., DOI: 10.1016/j.comnet.2012.12.01
  31. Westby J.R. (2003). International guide to combating cybercrime. Chicago: ABA Publishing.
  32. Yar M. (2006). Cybercrime and Society. London: Sage.

Nicola Strizzolo, in "SICUREZZA E SCIENZE SOCIALI" 1/2014, pp. 38-52, DOI:10.3280/SISS2014-001004


FrancoAngeli is a member of Publishers International Linking Association a not for profit orgasnization wich runs the CrossRef service, enabing links to and from online scholarly content