Access the full text.
Sign up today, get DeepDyve free for 14 days.
Mary Madden, A. Lenhart, S. Cortesi, Urs Gasser, Maeve Duggan, Aaron Smith (2013)
Teens, social media, and privacy
R. Steele (1995)
The importance of open source intelligence to the militaryInternational Journal of Intelligence and Counterintelligence, 8
(2013)
Social Media, and Privacy. Pew Internet and American Life Project Report
A. Joinson, Ulf-Dietrich Reips, T. Buchanan, Carina Paine (2010)
Privacy, Trust, and Self-Disclosure OnlineHuman–Computer Interaction, 25
C. Best (2007)
Open Source Intelligence
Connecticut school shooting: Police warn of social media 'misinformation
Tsang-Kai Hung, Chen Lin, Benjamin Parng (2016)
The effect of Internet community and select intention for young peopleInternational journal of business, 2
Michael Stohl (2007)
Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games?Crime, Law and Social Change, 46
P. Nancy, R. Ramani, S. Jacob (2012)
Mining of Association Patterns in Social Network Data (Face Book 100 Universities) through Data Mining Techniques and Methods
S. Mercado (2004)
Sailing the Sea of OSINT in the Information Age
Alex Marthews, Catherine Tucker (2017)
Government Surveillance and Internet Search BehaviorInformation Systems: Behavioral & Social Methods eJournal
P. Bell, Mitchell Congram (2013)
Intelligence-Led Policing (ILP) as a strategic planning resource in the fight against Transnational Organized Crime (TOC)International journal of business, 2
nl) is an assistant professor for technology and organizational behavior and program director technology of the Center of Excellence in Public Safety Management at the Rotterdam School of Management
C. Best (2011)
Challenges in Open Source Intelligence2011 European Intelligence and Security Informatics Conference
Akhgar@shu.ac.uk) is a professor of informatics and director of the Center of Excellence in Terrorism
(2012)
Mafia, fermato Vito Roberto Palazzolo scovato a Bangkok grazie a Facebook
(2013)
Policing in an Information Age, London: Demos (Mar
Chenyun Dai, Fang-Yu Rao, T. Truta, E. Bertino (2012)
Privacy-preserving assessment of social network data trustworthiness8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
La Stampa (Mar. 31, 2012); http://www.lastampa.it/2012/03/31/ italia/cronache/mafia-fermato-vito-roberto- palazzoloscovato-a-bangkok-grazie-a-facebook- vpnxhM5z5chH3iuIjttksJ/pagina
R. Best, A. Cumming (2007)
Open Source Intelligence OSINT: Issues for Congress
S. Gibson (2004)
Open source intelligenceThe RUSI Journal, 149
(2007)
Europol in the combat of international terrorism. NATO Security Through Science Series, Volume 19
D. Omand, J. Bartlett, Carl Miller (2012)
Introducing Social Media Intelligence (SOCMINT)Intelligence and National Security, 27
F. Neri, C. Aliprandi, Federico Capeci, Montse Cuadros, Tomas By (2012)
Sentiment Analysis on Social Media2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
uk) is a professor of informatics and director of the Center of Excellence in Terrorism, Resilience, Intelligence, and Organized Crime Research at Sheffield Hallam University
contributed articles DOI:10.1145/ 2699410 Legitimacy of surveillance is crucial to safeguarding validity of OSINT data as a tool for law-enforcement agencies. BY PETRA SASKIA BAYERL AND BABAK AKHGAR for Open Source Intelligence Investigations or OSINT, has become a permanent fixture in the private sector for assessing consumers' product perceptions, tracking public opinions, and measuring customer loyalty.12 The public sector, and, here, particularly law-enforcement agencies, including police, also increasingly acknowledge the value of OSINT techniques for enhancing their investigative capabilities and response to criminal threats.5 OSINT refers to the collection of intelligence from information sources freely available in the public OPEN SOURCE INTELLIGENCE, COM MUNICATIO NS O F TH E AC M | AU GU ST 201 5 | VO L . 5 8 | NO. 8 Surveillance and Falsification Implications domain, including offline sources (such as newspapers, magazines, radio, and television), along with information on the Internet.4,16,17 The spread of social media has vastly increased the quantity and accessibility of OSINT sources.3,11 OSINT thus complements traditional methods of intelligence gathering at very low to no cost.4,15 OSINT increasingly supports the work of law-enforcement agencies in identifying criminals and their activities (such as recruitment, transfer of information and money,
Communications of the ACM – Association for Computing Machinery
Published: Jul 23, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.