Search results
1 – 4 of 4Stefano Folletti, Giampiero Giacomello and Jonathan Cooper
The restrictive legislation on recruitment in Italy is a well‐knownexample of state control of a labour market; the means Italian companiesemploy to get round the legislation is…
Abstract
The restrictive legislation on recruitment in Italy is a well‐known example of state control of a labour market; the means Italian companies employ to get round the legislation is, if anything, even more interesting. Problems are recognised by the government and in mid‐1991 the legislation was “reformed”. A detailed study of the working of the old legislation and the situation which led to its reform concludes that although the latest law is a step forward it amounts to a missed opportunity.
Details
Keywords
This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak…
Abstract
Purpose
This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.
Methodology/approach
Review of relevant literature.
Findings
The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.
Research limitations/implications
Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.
Originality/value of the chapter
The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.
Details