Giovanni Ziccardi

University of Milan

Giovanni Ziccardi is Professor of Legal Informatics in the Law Faculty of the University of Milan and founder and director of the post-graduate course in Computer Forensics and Digital Investigations. He is the founder and editor of the review Ciberspazio e Diritto. His fields of expertise are principally new technology and digital rights, digital activism, computing crime, open source and digital investigations.

He received his law degree from the University of Modena and his Ph.D. in Legal Informatics from the University of Bologna. He is the editor of the Italian issue of the International Encyclopaedia of Laws – Cyber Law, published by Wolters Kluwer Law International, The Netherlands, 2008. His works in English include: Cybercrime and jurisdiction in Italy, a Chapter of the Volume Cybercrime and Jurisdiction. A Global Survey, edited by B.-J. Koops and Susan W. Brenner (2006), The legal framework of electronic document and digital signature in Italy, a chapter of the book Cyberspace Law edited by Makoto Ibusuki and published by Kagoshima University Press, Japan and The legal framework of electronic document and digital signature in Italy, an article published in the Hogaku Semina Review, vol. 3, Japan. Alongside his English works, he has published more than sixty articles and ten books in Italian, including Hacker - Il richiamo della libertà (2011), L'ultimo hacker (2012) and Internet, controllo e libertà: trasparenza, sorveglianza e segreto nell'era tecnologica (2015) and La rete ombra (Marsilio, 2018). His latest book is Tecnologie per il potere (Raffaello Cortina, 2019).

read more

Events in past editions
#IJF18 / 15 april 2018

Local political hatred online

“Piccola città, bastardo posto”: l’odio istituzionale online in piccoli contesti di provincia e la sua corretta gestione I social network hanno azzerato le distanze tra i cittadini e le istitu...

#IJF18 / 11 april 2018

Online political hatred and extremism

L’odio politico vanta una lunga tradizione, ben precedente alla diffusione dei social network, delle grandi piattaforme e dell’avvento delle forme di comunicazione e di propaganda online. In quest...

#IJF16 / 8 april 2016

Expression of hatred on the web

What are the limits of an aggressive discussion on the web? Has there been an "institutionalization" of hatred that has been spread especially by media, politicians and institutions? What are the di...

#IJF13 / 25 april 2013

From "Internet assassin" to "blog people"

In this workshop we will analyze dozens of titles and articles published in recent years in the national and international press related to events characterized by a strong technological aspect. The...

#IJF12 / 28 april 2012


Cybercrime 21st-century computing crime. From hacking as a lark to hacking as organised crime: tales to tell from the digital underground. A brief overview of recent hacking history, including fam...

#IJF12 / 28 april 2012

How sensitive you are!

How sensitive you are! - Data is sensitive: learn how to keep it safe and send it safely How much do you know about your webmail, social network accounts and pendrives? How secure are they? Who oth...

#IJF12 / 28 april 2012

Cloud computing

Cloud computing - the hows and whys Cloud computing has been the flavour of the month for a while now. The objective of this workshop is to clarify matters in a practical, interactive way. What is ...

#IJF12 / 27 april 2012

Ethical hacking

Ethical hacking There’s a war on and it won’t be won by who has the most bombs. Ethical hacking in the raw. Workshops are free entry but registration is required. Each workshop will have a l...

#IJF12 / 27 april 2012

Wiretaps and "webtaps"

Wiretaps and "webtaps" Who can tap what and how? From the near impossibility of ensuring secure phone calls to the ease of ensuring near secure web communications. A romp through security, technolo...

#IJF12 / 27 april 2012


Firewalls Are firewalls essential self-defence mechanisms or Trojan horses? Is so-called secure data transfer really so secure? An insight into how vulnerable your data might be. Workshops are f...