Otwarty dostęp

An Intelligence Perspective on Privacy and Data Protection Risks in Social Media


Zacytuj

[1] Surya NEPAL, Cecile PARIS, Atham BOUGUETTAYA, Trusting the Social Web: issues and challenges, World Wide Web, Vol. 18, No. 1, pp. 1-7, p. 3, 2015.10.1007/s11280-013-0252-2Search in Google Scholar

[2] Jared ETTINGER, Cyber Intelligence Tradecraft Report. The State of Cyber Intelligence Practices in the United States, Carnegie Mellon University, Software Engineering Institute, p.113, 2019.Search in Google Scholar

[3] Robert M. CLARK, Mark C. OLESON, Cyber Intelligence, Intelligencer: Journal of U.S. Intelligence Studies, Vol. 24, No. 3, pp. 11-23, p.14, 2018.Search in Google Scholar

[4] Andreas HEPP, Andreas BREITER, Digital traces in context, International Journal of Communication, No. 12, pp. 439-449, p.439, 2018.Search in Google Scholar

[5] Adrian BARBU, Tudor RAȚ, Big data analysis through the lens of Business Intelligence – world conflict incidents case study (1989-2016), Revista Română de Studii de Intelligence Studies, No. 17-18, pp. 157-164, p.159, 2017.Search in Google Scholar

[6] Elena SUSNEA, A real-time social media monitoring system as an Open Source Intelligence (OSINT) platform for early warning in crisis situations, International Conference Knowledge-Based Organization, Vol. 24, Issue 2, pp. 427-431, p. 429, 2018.10.1515/kbo-2018-0127Search in Google Scholar

[7] Marat Rashitovich SAFIULLIN, Polina Olegovna ERMOLAEVA, Oleg Petrovich YERMOLAEV, Renat Nailevich SELIANOV, Current Perspectives on Social Mapping of Urban Territories, Asian Social Science, Vol. 11, No. 6, pp. 207-213, p. 207, 2015.10.5539/ass.v11n6p207Search in Google Scholar

[8] Ana BADEA-MIHALCEA, People and Machines: Dealing with Human Factor in Cyber-Security, Considerations on Challenges and Future Directions in Cybersecurity, pp. 143-154, p. 207, 2019.Search in Google Scholar

[9] https://www.dogana-project.eu/index.php/social-engineering-blog/11-social-engineering/42-persuasion-techniques, accessed 21.02.2020, 15:45.Search in Google Scholar

[10] Neetu BANSLA, Swati KUNWAR, Khushboo JAIN, Social Engineering: A Technique for Managing Human Behavior, Journal of Information Technology and Sciences, Vol. 5, Issue 1, pp. 18-22, p. 10, 2019.Search in Google Scholar

[11] https://www.social-engineer.org/framework/influencing-others/influence-tactics/social-proof/, accessed 21.02.2020, 14:45.Search in Google Scholar

[12] Keith Gregory LOGAN, Homeland Security and Intelligence, Second Edition, p. 161, 2018.10.4324/9780429499685-9Search in Google Scholar

eISSN:
2451-3113
ISSN:
1843-6722
Język:
Angielski