Az OSINT információgyűjtő eszközeiről
The OSINT per se – regardless of whether it is military, civil or business intelligence – is authenticated as the part of life, which is used and formed by all the users according to their needs. In this essay the author scrutinises one part of the OSINT, namely the phase of collecting data and information, or in other words examines the dynamics of ...
openaire +1 more source
Методи і технології відкритого співробітництва у міжнародних відносинах [PDF]
Програма навчальної дисципліни «Методи і технології відкритого співробітництва у міжнародних відносинах» складена відповідно до освітньої програми підготовки магістра «Міжнародна інформація та суспільні комунікації».
Fedoniuk, Serhii V. +1 more
core
OSINT – Gondolatok a kérdéskörhöz
The OSINT as a branch of intelligence has been extensively researched nowadays, and its application is present in the sphere of both economic and government organisations responsible for security. It has many application advantages and limitations, and the technological environment has a significant impact on the development of OSINT.
openaire +1 more source
A multi-INT semantic reasoning framework for intelligence analysis support [PDF]
Lockheed Martin Corp. has funded research to generate a framework and methodology for developing semantic reasoning applications to support the discipline oflntelligence Analysis. This chapter outlines that framework, discusses
Herbert, Basik +3 more
core
The relevance of the research topic is due to unprecedented sanctions pressure on Russian business and the improvement of sanctions policy tools by Western countries, namely the EU and the United States.
Dmitriy A. Medvedev, Anastasia E. Malykh
doaj +1 more source
Use of digital data from open sources during the investigation of criminal offenses: certain aspects
he purpose of the article is to study the possibilities of using digital data from open sources during the investigation of criminal offenses. Methodology.
Basysta I. +3 more
doaj +1 more source
Handling Human Hacking: Creating a Comprehensive Defensive Strategy Against Modern Social Engineering [PDF]
Social engineering is one of the most devastating threats to any company or business. Rather than relying upon technical flaws in order to break into computer networks, social engineers utilize a suave personality in order to deceive individuals through ...
Snyder, Charles
core +1 more source
Open source intelligence and AI: a systematic review of the GELSI literature. [PDF]
Ghioni R, Taddeo M, Floridi L.
europepmc +1 more source
Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security. [PDF]
Yadav A, Kumar A, Singh V.
europepmc +1 more source
Автоматизированные системы управления информационными процессами в социальных сетях в условиях информационных войн [PDF]
Стаття актуалізує питання дослідження інформаційно-комунікаційних технологій, що застосовуються в соціальних онлайн-мережах. Визначається перспективний напрямок роботи з контентом у мережевому просторі, який передбачає використання технологій web 3.0 ...
Курбан, Олександр Васильович
core

