Search results

1 – 4 of 4
Article
Publication date: 1 June 1991

Stefano Folletti, Giampiero Giacomello and Jonathan Cooper

The restrictive legislation on recruitment in Italy is a well‐knownexample of state control of a labour market; the means Italian companiesemploy to get round the legislation is…

Abstract

The restrictive legislation on recruitment in Italy is a well‐known example of state control of a labour market; the means Italian companies employ to get round the legislation is, if anything, even more interesting. Problems are recognised by the government and in mid‐1991 the legislation was “reformed”. A detailed study of the working of the old legislation and the situation which led to its reform concludes that although the latest law is a step forward it amounts to a missed opportunity.

Details

Personnel Review, vol. 20 no. 6
Type: Research Article
ISSN: 0048-3486

Keywords

Book part
Publication date: 21 June 2014

Giampiero Giacomello

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak…

Abstract

Purpose

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.

Methodology/approach

Review of relevant literature.

Findings

The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.

Research limitations/implications

Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.

Originality/value of the chapter

The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.

Content available
Book part
Publication date: 21 June 2014

Abstract

Details

Understanding Terrorism
Type: Book
ISBN: 978-1-78350-828-0

Book part
Publication date: 21 June 2014

Abstract

Details

Understanding Terrorism
Type: Book
ISBN: 978-1-78350-828-0

1 – 4 of 4