La natura del Diritto d'autore |
G. Ramello & F. Silva |
 |
 |
 |
RAPPORTO NICP OTTOBRE 2001 SUL TERRORISMO INFORMATICO |
e-jus.it |
 |
 |
 |
Clarifying Misinformation on TCPA |
David Safford |
 |
 |
 |
I contenuti digitali nell'era di internet |
Commissione Interministeriale sui contenuti digitali nell'era di internet |
 |
 |
 |
Linux, la GPL e le virtù dimenticate dei beni pubblici |
Maria Chiara Pievatolo |
 |
 |
 |
Lawrence Lessig, The future of ideas. The fate of the commons in a connected world, New York, Random House, 2001 |
Maria Chiara Pievatolo |
 |
 |
 |
Nuove idee per un nuovo diritto d’autore |
Lorenzo De Tomasi |
 |
 |
 |
CREATIVE COMMONS: alcuni diritti riservati per la diffusione della cultura e della conoscenza |
Lia Provezza |
 |
 |
 |
Dal cyberfuturismo al cybercrime: la spiegazione del comportamento criminale connesso alla tecnologia digitale |
Marco Strano |
 |
 |
 |
Come funziona Creative Commons |
CC |
 |
 |
 |
Creative Commons : creativi insieme |
RNB - Traduzione : Nilocram |
 |
 |
 |
Creative Commons some rights reserved |
Andrea Fantini |
 |
 |
 |
Protezione dei dati personali e diritti di proprietà intellettuale: alla ricerca di un difficile equilibrio |
Roberto Lattanzi |
 |
 |
 |
Hacking e criminalità informatica |
Federico Tavassi La Greca |
 |
 |
 |
L'altra faccia del copyright - diritto d'autore e copyleft nella cultura opencontent versione 1.0. (gennaio 2004) |
SIMONE ALIPRANDI |
 |
 |
 |
APPENDICE (v. 1.0) dell’opera “L’altra faccia del copyright - diritto d’autore e copyleft nella cultura opencontent” |
SIMONE ALIPRANDI |
 |
 |
 |
Sentenza anticopyright e diritto all'accesso |
Gennaro Francione |
 |
 |
 |
Aspetti sociali relativi alla tutela dei diritti umani sulla rete Internet |
GIANCLAUDIO FLORIA |
 |
 |
 |
Comunicato hacker contro la legge urbani |
Edito da JFK, distributore ufficiale del manifesto negli hub fastempire |
 |
 |
 |
Relazioni digitali e comportamenti devianti |
Marco Strano |
 |
 |
 |
Computer crime nelle organizzazioni: problematiche investigative |
Marco Strano |
 |
 |
 |
Il computer crime nelle aziende e nella Pubblica Amministrazione |
Marco Strano |
 |
 |
 |
La nuova frontiera del disagio giovanile: l’illegalità sulla rete internet |
Marco Strano |
 |
 |
 |
I pericoli di Internet |
Marco Strano |
 |
 |
 |
Il possesso illegale di software e di file MP3: spinte motivazionali e brevi cenni legali |
Bruno Fiammella |
 |
 |
 |
La prevenzione del crimine in azienda |
Fabio Battelli |
 |
 |
 |
Psychological Theories of Crime and “Hacking” [DOC] |
Marc Rogers |
 |
 |
 |
Psychological Theories of Crime and “Hacking” [PDF] |
Marc Rogers |
 |
 |
 |
INSIDE ATTACK: WHAT PREVENTION [EN] |
Marco Strano |
 |
 |
 |
INSIDE ATTACK: QUALE PREVENZIONE POSSIBILE? [IT] |
Marco Strano |
 |
 |
 |
The Importance of Human Factor in ICT Security Policy [EN] |
Roberta Bruzzone |
 |
 |
 |
L'importanza del fattore umano nelle policy di sicurezza informatica [IT] |
Roberta Bruzzone |
 |
 |
 |
CYBERSTALKING |
Marco Strano |
 |
 |
 |
Cybercrime International Conference 2002 |
Marco Strano |
 |
 |
 |
Nuove tecnologie e nuove forme criminali |
Marco Strano |
 |
 |
 |
La tutela della privacy e Internet. Fra netiquette e disciplina legislativa |
Barbara Gualtieri |
 |
 |
 |
L' EUCD e la DMCA nel 2003 |
Gwen Hinze |
 |
 |
 |
Copyright: il decreto che piace ai DS |
Wu Ming 1 |
 |
 |
 |
EUCD e diritti digitali |
Nicola Folletti |
 |
 |
 |
EUCD in Italia: i pericoli del nuovo diritto d'autore |
Alceste Scalas |
 |
 |
 |
La Democrazia Telematica delle Reti: un caso di censura |
Dino Baldi |
 |
 |
 |
Psychology and Computer Crime |
Marc Rogers |
 |
 |
 |
Cybercrime, Infowar, and Infosecurity |
Dorothy E. Denning |
 |
 |
 |
Hiding Crimes in Cyberspace |
Dorothy E. Denning |
 |
 |
 |
Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy |
Dorothy E. Denning |
 |
 |
 |
A Viewpoint on Electronic Publishing, Constitutional Rights, and Hacking |
Dorothy E. Denning |
 |
 |
 |
HACKERS: um estudo criminológico da subcultura cyberpunk |
Túlio Lima Vianna |
 |
 |
 |
Unauthorized Use of a Computer Section 342.1 |
Criminal Code of Canada |
 |
 |
 |
Modern-day Robin Hood or Moral Disengagement: Understanding the Justification for Criminal Computer Activity [DOC] |
Marc Rogers |
 |
 |
 |
Modern-day Robin Hood or Moral Disengagement: Understanding the Justification for Criminal Computer Activity [PDF] |
Marc Rogers |
 |
 |
 |
Organized Computer Crime and More Sophisticated Security Controls: Which Came First the Chicken or the Egg? [DOC] |
Marc Rogers |
 |
 |
 |
Organized Computer Crime and More Sophisticated Security Controls: Which Came First the Chicken or the Egg? [PDF] |
Marc Rogers |
 |
 |
 |
A Social Learning Theory and Moral Disengagement Analysis of Criminal Behavior |
Marcus K. Rogers |
 |
 |
 |
Five Issues in European Criminal Justice: Corruption, Women in the criminal justice system, criminal policy indicators, community crime prevention, and computer crime |
Matti Joutsen |
 |
 |
 |