|Tipo di tesi||Tesi di laurea magistrale|
|Titolo||La Frode Informatica|
|Titolo in inglese||The Computer Fraud|
|Struttura||Dipartimento di Giurisprudenza|
|Corso di studi||GIURISPRUDENZA (D.M. 270/04)|
|Data inizio appello||2015-03-09|
|Disponibilità||Accesso limitato: si può decidere quali file della tesi rendere accessibili. Disponibilità mixed (scegli questa opzione se vuoi rendere inaccessibili tutti i file della tesi o parte di essi)|
|Data di rilascio||2055-03-09|
Questa tesi pone come obiettivo quello di trattare una fattispecie di reato di “nuova concezione” e in sviluppo parallelo alla tecnologia: La frode informatica.
This thesis aims to treat a criminal offense of " new concept " and in parallel development to technology : The computer fraud . This topic interested me and very passionate , especially for the speed with which it has evolved Codest criminal phenomenon ; I decided to tackle this issue to try to deepen and grasp some aspects that, even today , are not clear or do not have the proper protection . In the construction of the ' index and in the writing of the thesis I tried to follow a "skeleton " progressive , so as to address the issue starting from his birth , describing its evolution and its problems until today . The first chapter is an introduction to the phenomenon chronologically to understand how the world , and in the smaller Italy , has flattened , appropriate and protected from the constant evolution of computer crimes arising by the exponential growth in the use / abuse of technology ; in this chapter is therefore seeking to provide some food for theoretical and historical to give a more understandable in the next moment analysis of the case focus of the thesis . In the second chapter I expose what is the fulcrum of the thesis or the birth of computer fraud and evolution , pausing with a focus on the relationship between this case and the case of fraud which results ; up to deal with precisely the normative elements that characterize this crime and application problems that derive from it , citing the cases. The third chapter is entirely aimed at the comparison of computer fraud and other crimes related with which it is possible an engagement in law and commissive , also trying to argue the reasons why there are certain affinities or less . By analyzing the material that I used to do this work, I learned how vast the world of computer crime and how much damage you can create with a crime such as computer fraud.