Gianpiero Greco, Nicola Montinaro


Information technology has brought about epochal changes in every area of society, offering opportunities for development on a social, cultural, and economic level, but also a fertile ground for activities with criminal purposes that take place in cyberspace. The threat present in the intangible world of cyberspace is extremely concrete and is one of the major sources of concern and investment by States, given that the Internet is considered the critical infrastructure for excellence. Cybercrime, characterized by a transnational connotation of borderless or aspatial crime, provides a position of advantage to the cybercriminal compared to the traditional criminal. The development of information technologies has led to the digitization of organized crime which thus succeeds in maximizing profits by exploiting the opportunities offered by new communication technologies and minimizing the risk of being identified, arrested, convicted and of suffering the seizure of the proceeds of criminal activities. Considering the contradictory and inhomogeneous international legal framework due to the transnational scope of cybercrime, the identification of the locus commissi delicti is difficult and the legal prosecution of cybercrimes is complex; therefore, cybercriminals could operate without an adequate response from some states in terms of prevention, sanction, containment and contrast. The sovereignty of States, in the context of cybercrime repression, is identified as an insurmountable obstacle in the creation of a supranational union of law. Therefore, to put legal operators in the real conditions to suppress transnational cybercrime, globalization of justice is needed.

Article visualizations:

Hit counter


cyberspace; criminal law; organized crime; crime globalization; transnational crime

Full Text:



Ambos, K. (2015). International criminal responsibility in cyberspace. In Research Handbook on International Law and Cyberspace. Edward Elgar Publishing.

Balsano, A. M. & Del Monte, L. (2013). Il diritto internazionale di fronte al cyberspace. In Osservatorio per la sicurezza nazionale (Eds.), Cyberworld. Capire, proteggersi e capire gli attacchi in rete. Milano: Hoepli.

Cadoppi, A., Canestrari, S., Manna, A., & Papa, M. (2019). Cybercrime. Vicenza: UTET Giuridica.

Europol Press Release (2011). Cybercrime as a business: The digital underground economy. Available at

Faga, H. P. (2017). The implications of transnational cyber threats in international humanitarian law: analysing the distinction between cybercrime, cyber-attack, and cyber warfare in the 21st century. Baltic Journal of Law & Politics, 10(1), 1-34.

Floridi, L. (2012). La rivoluzione dell'informazione. Torino: Codice Edizioni.

Foggetti, N. (2004). Ipotesi di criminalità informatica transnazionale: profili di diritto applicabile al caso concreto. Problematiche attuali ed eventuali prospettive future. In AA.VV., Diritto e società dell’informazione. Riflessioni su informatica giuridica e diritto dell’informatica. Milano: Nyberg Edizioni.

Iaselli, M. (2020). Investigazioni digitali. Milano: Giuffrè.

Levy, P. (1997). Il virtuale. Milano: Raffaello Cortina Editore, pp. 9-14.

Lorusso, P. (2011). L'insicurezza dell'era digitale. Tra cybercrimes e nuove frontiere dell'investigazione. Milano: Franco Angeli.

Martino, L. (2018). La quinta dimensione della conflittualità. L'ascesa del cyberspazio ei suoi effetti sulla politica internazionale. Politica & Società, 7(1), 61-76.

Mele, S. (2010). Privacy ed equilibri strategici nel cyber-spazio. Diritto, economia e tecnologie della privacy, 1.

Pansa, A. (2004). Cybercrime: conferenza internazionale. La Convenzione del Consiglio d’Europa sulla Criminalità Informatica. Milano: Giuffrè.

National strategic framework for the security of cyber space (2013). Retrieved from

Rapetto, U., & Di Nunzio, R. (2001). Le nuove guerre: dalla cyberwar ai black bloc, dal sabotaggio mediatico a Bin Laden (Vol. 11). Milano: Rizzoli.

Richet, J. L. (2013). Laundering Money Online: a review of cybercriminals’ methods. Available at

Santoro, F. (2011). Cooperazione internazionale in materia di criminalità informatica. Roma: Aracne Editrice.

Teti, A. (2018). Cyber espionage e cyber counterintelligence: spionaggio e controspionaggio cibernetico (Vol. 9). Catanzaro: Rubbettino Editore.

Teti, A., & Caligiuri, M. (2015). Open source intelligence & cyberspace: la nuova frontiera della conoscenza. Rubbettino.

We are Social (2019). Report available at


Copyright (c) 2020 Gianpiero Greco, Nicola Montinaro

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

The research works published in this journal are free to be accessed. They can be shared (copied and redistributed in any medium or format) and\or adapted (remixed, transformed, and built upon the material for any purpose, commercially and\or not commercially) under the following terms: attribution (appropriate credit must be given indicating original authors, research work name and publication name mentioning if changes were made) and without adding additional restrictions (without restricting others from doing anything the actual license permits). Authors retain the full copyright of their published research works and cannot revoke these freedoms as long as the license terms are followed.

Copyright © 2015 - 2018. European Journal Of Social Sciences Studies (ISSN 2501-8590) is a registered trademark of Open Access Publishing Group. All rights reserved.

This journal is a serial publication uniquely identified by an International Standard Serial Number (ISSN) serial number certificate issued by Romanian National Library. All the research works are uniquely identified by a CrossRef DOI digital object identifier supplied by indexing and repository platforms. All the research works published on this journal are meeting the Open Access Publishing requirements and standards formulated by Budapest Open Access Initiative (2002), the Bethesda Statement on Open Access Publishing (2003) and  Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities (2003) and can be freely accessed, shared, modified, distributed and used in educational, commercial and non-commercial purposes under a Creative Commons Attribution 4.0 International License. Copyrights of the published research works are retained by authors.


Hit counter