TITLE

Los derechos fundamentales en el uso y abuso de las redes sociales en Italia: aspectos penales¹

AUTHOR(S)
Picotti, Lorenzo
PUB. DATE
June 2013
SOURCE
IDP: Revista de Internet, Derecho y Politica;jun2013, Issue 16, p59
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This analysis of criminal behaviour in the use and abuse of social networks focuses, firstly, on the crimes that this behaviour can lead to (epigraphs 3 to 6) - some of which have been introduced recently, such as child grooming - where users of these networks can be both the offender or victim in the violation of the fundamental rights affected by such behaviour (epigraph 2). Secondly, it looks at the question of the possible criminal responsibility of social network managers - who are taking on an increasingly incisive role and becoming more important agents in the system's evolution, and, thus, also in the strategies for preventing and controlling criminal activities on the web (epigraph 7). The main critical aspects arising from this research highlight initial indications for how to adapt the criminal law regulating this area to the current needs.
ACCESSION #
97347340

 

Related Articles

  • Los derechos fundamentales en el uso y abuso de las redes sociales en Italia: aspectos penales (II). Picotti, Lorenzo // IDP: Revista de Internet, Derecho y Politica;oct2013, Issue 17, p63 

    This analysis of criminal behaviour in the use and abuse of social networks focuses, firstly, on the crimes that this behaviour can lead to (epigraphs 3 to 6) - some of which have been introduced recently, such as child grooming - where users of these networks can be both the offender or victim...

  • Unintentional and Unbalanced Transparency. Booch, Grady // IEEE Software;Sep2011, Vol. 28 Issue 5, p12 

    Security and privacy are interdependent concepts. Each impacts the other, but to say that they are alternatives is a false dichotomy. Both are issues of human concern; their policies and their risks may be made manifest in software-intensive systems. Architecting a system that attends to the...

  • Pint of View. Lager, Marshall // CRM Magazine;Jan2011, Vol. 15 Issue 1, p42 

    The article offers the author's insights on the changes in the attitude of people in terms of personal data transmission. He says that various factors contributed to the way people divided their public and private lives including capitalism, social media, and vanity. He adds that consumers in...

  • Are Online Predators More Dangerous? Myers, Roslyn // Criminal Justice Research Review;Jan/Feb2014, Vol. 15 Issue 6, p42 

    The article focuses on the rise in the rate of online sexual predation as suggested by two studies in Switzerland of the year 1996 and 2013. Topics discussed include use of social media networks, internet and cell phones in coercing young victims for online sex abuse, difference in online and...

  • Fotografie, die Feindin der Privatheit/Photography, the Enemy of Privacy. Müller-Pohle, Andreas // European Photography;Fall/Winter2011, Issue 90, p3 

    In this article the author offers insights on the degradation of privacy in the twentieth and twenty-first century. Particular focus is given to how individuals often participate in the destruction of their private sphere through the use of cell phones, the social networking website Facebook and...

  • DIGITAL THREATS ON CAMPUS: EXAMINING THE DUTY OF COLLEGES TO PROTECT THEIR SOCIAL NETWORKING STUDENTS. BARR, JAMISON; LUGUS, EMMY // Western New England Law Review;2011, Vol. 33 Issue 1, p757 

    The article offers information regarding the threats generated by social networking by college students in campus and the responsibility of college management and parents to protect the students from the same. It mentions that once irrelevant "in loco parentis" doctrine needs to be implemented...

  • La reina de las redes sociales. Parra, Raúl López // Revista Mexicana de Comunicacion;sep/oct2010, Vol. 23 Issue 123, p12 

    No abstract available.

  • An agent-based model of the development of friendship links within Facebook. Abbas, Syed // Computational & Mathematical Organization Theory;Jun2013, Vol. 19 Issue 2, p232 

    This paper investigates how local preferences and social structural constraints might affect the development of the friendship network in Facebook. We do this by analyzing a dataset of an American university, Caltech, and by building an agent-based simulation for comparison. Several different,...

  • ID thievery is on the rise. Fletcher, Charlie // Catalog Age;Jun2000, Vol. 17 Issue 7, p57 

    Explores the increasing incidence of identity theft on the Internet. Use of identifying information to commit fraud or engage in other unlawful activities; Use of the Internet to quickly distribute stolen identifying information; Ways of stealing identifying information.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics