Information technology and internet represent an event grow in a very rapid manner: this, new, electronic world, «whose limits and borders are perhaps still out of the understanding of the host», is the field of the most important cultural clash in this century, because bearer of modification capable of having a big effect on the main social’s events. The informatic’s evolution has, infact, carry on arouse reactions and clashing opinion. The same definition of reato informatico has keep doctrine busy since more than a quarter of a century, but almost all the attempt to give a common settlement has broke against the barrier of the rapid and sudden evolution. Every time has been give a lot of definition of computer’s crime, more or less correct, but the best definition seem to be the one maintaining that the computer’s crime is every act or event against a penal law involving a computer as subject, object or instrument. Still, not every crime made by a computer could be name «reato informatico», but only those crimes in whitch computer represent a necesary component of the criminal case. In the work will be make the difference between «reati informatici propri» and «reati informatici impropri» on the basis of the fact that computer is a necessary component of the crime or a simple means. The criminals quickly discovered, and appreciated, the new criminal opportunity offered by information technology moving theirs action’s plan in this new sphere. So, information technology only supplied «ancient sins with new means». Besides computers open the criminal road to subject never capable of breaking law in the «real life». In the last pages of the work examined the principal criminologic aspect linked to computer’s crimes. This is a sector characterized by a lot of very fast change of scene, where seem show, in a most evdent matter, the need of news cultural course because «populated» by news kinds of criminal. This first phase, that could call «pioneeristic», is characterized by some researchers that, before other understanded the change and gained the necessary competence and the ability to co-ordinate them to the human actions and to the deviance, but can’t be slip that in the near future this competences will have to been insert steady in the professional bag of every professional figure near to the human’s study. Noticed that information technology act on crime along different ways: modding the classic criminal form, introducing new criminal form or altering the perception of the crime and so simplifying the removal’s mechanisms of the inhibitory brakes. Then the work has proceeded to analyse the interesting phenomenon of the hacking going back to source of such figure. One is observed as the hacking very often has been object of a remarkable simplification that took to being assimilate without further explanation to the data processing crime while actually the world of the hacker, very complex, melts on a rigid series of ethical rules that him they bring to the creation of that typical caste feeling of a elite. At last, has evaluated the reason for the immense damages caused by the telemathic vandal and the nature of the true risks for the data processing security analysing the bases of that «culture of the security» which too much often seems to be ignored. Last we have proceeded to a quick analysis of cryptography and steganography, analysing uses and origins and highlighting the conflict, apparently irremediable, between tutelage of the privacy and defence of the public order.

L'informatica ed Internet rappresentano un fenomeno cresciuto in maniera estremamente rapida, caratterizzandosi per aver reso un'immensa infrastruttura tecnica disponibile per tutti coloro che sono in grado di utilizzarla. Soprattutto il giurista deve relazionarsi con le nuove tecnologie consapevole che, accanto agli sviluppi scientifici e culturali indotti dal digitale, si è assistito ad un incremento dell'attitudine criminale mirata a sfruttare tutte le possibilità di mimetizzazione e di elusione offerte dall'ambiente digitale. Il fenomeno dei computer's crimes, sorto negli Stati Uniti e poi rapidamente diffusosi, comprende figure criminose particolarmente importanti e in continua evoluzione e riguarda qualsiasi atto o fatto contrario alle norme penali, nel quale il computer è stato coinvolto come soggetto, oggetto o strumento. Tale assunto è il punto di partenza adottato in questo volume per procedere all'analisi dei reati informatici in quanto pone in evidenza, in ognuna delle tre ipotesi previste la presenza di un elaboratore. Nel corso dell'opera si è distinto poi tra "reati informatici propri" includendovi tutte quelle fattispecie che vedono nel computer l'oggetto o il soggetto del reato e che non potrebbero esistere in sua assenza e "reati informatici impropri" che sono tutti i reati comuni (ingiuria, diffamazione, ..), che possono essere commessi anche mediante l'utilizzo di un computer. Accanto alle problematiche di base, si è analizzata la rilevanza penale di condotte particolarmente diffuse in ambito informatico come, ad esempio, portscanning, sniffing di pacchetti in transito attraverso una rete, joe job, rogue cancel e i cosiddetti dialer. Detti fatti rap-presentano i reati informatici che maggiormente hanno impegnato il legislatore, trattandosi di figure completamente nuove ed autonome in grado di manifestarsi soltanto in relazione ad un ambiente informatico. Questo volume si raccomanda quindi a tutti gli operatori del diritto e delle tecnologie dell'informazione e della comunicazione, pubblici e privati, che, per motivi di studio e professionali, intendono approfondire l'intreccio degli aspetti giuridici, criminologici e tecnici della sicurezza dell'informazione, della tutela della privacy, delle tecniche di crittografia e steganografia.

ICT e tutela della persona / Florindi, Emanuele. - (2003). [10.5281/zenodo.10694838]

ICT e tutela della persona

Emanuele Florindi
Writing – Original Draft Preparation
2003

Abstract

Information technology and internet represent an event grow in a very rapid manner: this, new, electronic world, «whose limits and borders are perhaps still out of the understanding of the host», is the field of the most important cultural clash in this century, because bearer of modification capable of having a big effect on the main social’s events. The informatic’s evolution has, infact, carry on arouse reactions and clashing opinion. The same definition of reato informatico has keep doctrine busy since more than a quarter of a century, but almost all the attempt to give a common settlement has broke against the barrier of the rapid and sudden evolution. Every time has been give a lot of definition of computer’s crime, more or less correct, but the best definition seem to be the one maintaining that the computer’s crime is every act or event against a penal law involving a computer as subject, object or instrument. Still, not every crime made by a computer could be name «reato informatico», but only those crimes in whitch computer represent a necesary component of the criminal case. In the work will be make the difference between «reati informatici propri» and «reati informatici impropri» on the basis of the fact that computer is a necessary component of the crime or a simple means. The criminals quickly discovered, and appreciated, the new criminal opportunity offered by information technology moving theirs action’s plan in this new sphere. So, information technology only supplied «ancient sins with new means». Besides computers open the criminal road to subject never capable of breaking law in the «real life». In the last pages of the work examined the principal criminologic aspect linked to computer’s crimes. This is a sector characterized by a lot of very fast change of scene, where seem show, in a most evdent matter, the need of news cultural course because «populated» by news kinds of criminal. This first phase, that could call «pioneeristic», is characterized by some researchers that, before other understanded the change and gained the necessary competence and the ability to co-ordinate them to the human actions and to the deviance, but can’t be slip that in the near future this competences will have to been insert steady in the professional bag of every professional figure near to the human’s study. Noticed that information technology act on crime along different ways: modding the classic criminal form, introducing new criminal form or altering the perception of the crime and so simplifying the removal’s mechanisms of the inhibitory brakes. Then the work has proceeded to analyse the interesting phenomenon of the hacking going back to source of such figure. One is observed as the hacking very often has been object of a remarkable simplification that took to being assimilate without further explanation to the data processing crime while actually the world of the hacker, very complex, melts on a rigid series of ethical rules that him they bring to the creation of that typical caste feeling of a elite. At last, has evaluated the reason for the immense damages caused by the telemathic vandal and the nature of the true risks for the data processing security analysing the bases of that «culture of the security» which too much often seems to be ignored. Last we have proceeded to a quick analysis of cryptography and steganography, analysing uses and origins and highlighting the conflict, apparently irremediable, between tutelage of the privacy and defence of the public order.
2003
978-88-464-6549-8
Franco Angeli
ITALIA
ICT e tutela della persona / Florindi, Emanuele. - (2003). [10.5281/zenodo.10694838]
Florindi, Emanuele
File in questo prodotto:
File Dimensione Formato  
ICTestratto.pdf

Accesso riservato

Descrizione: estratto
Tipologia: Versione pubblicata dall'editore
Dimensione 1.86 MB
Formato Adobe PDF
1.86 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

Licenza Creative Commons
I metadati presenti in IRIS UNIMORE sono rilasciati con licenza Creative Commons CC0 1.0 Universal, mentre i file delle pubblicazioni sono rilasciati con licenza Attribuzione 4.0 Internazionale (CC BY 4.0), salvo diversa indicazione.
In caso di violazione di copyright, contattare Supporto Iris

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11380/1334111
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact