Results 101 to 110 of about 4,943 (194)

Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The amount of personal data in open sources increases, which makes it possible for third parties to access it using open source intelligence (OSINT) methods, which can be used for malicious purposes.
N. N. Romanova, V. V. Gryzunov
doaj   +1 more source

OSINT Beyond Security Policy

open access: yesHonvédségi Szemle
The objective of the paper is to give a brief overview of OSINT, which was originally used mainly in military operations in the field of state security intelligence, in light of the literature. First, the concept of information is clarified by illuminating it with concisedefinitions.
openaire   +1 more source

Determinants of Manufacturing Concentration Patterns in Mercosur [PDF]

open access: yes, 2003
Over the last fifteen years, Argentina, Brazil, Paraguay and Uruguay have implemented major economic reforms including unilateral trade liberalization programs and the constitution of a regional trade bloc, Mercosur. This trade policy change has led to a
Martincus, Christian Volpe   +1 more
core  

OPEN SOURCE INTELLIGENCE (OSINT)

open access: yesProceedings of the international scientific conference " MODERN CHALLENGES IN TELECOMMUNICATIONS ", 2022
The article describes the technologies, methods, and exploration of open-source intelligence (OSINT). Namely, methods and examples of use, frameworks, and recommendations for the operation of certain types of information will be considered.
openaire   +2 more sources

The role of new technologies in transforming open-source intelligence [PDF]

open access: yesRevista Română de Informatică și Automatică, 2018
The new technologies change the paradigm of information in society. The quality and use of intelligence depend on the quality of information, information and decision-makers.
Gabriela TATU
doaj  

Crowd-Sourced Intelligence Agency: Prototyping counterveillance

open access: yesBig Data & Society, 2017
This paper discusses how an interactive artwork, the Crowd-Sourced Intelligence Agency (CSIA), can contribute to discussions of Big Data intelligence analytics.
Jennifer Gradecki, Derek Curry
doaj   +1 more source

Managing 'threats': uses of social media for policing domestic extremism and disorder in the UK [PDF]

open access: yes, 2015
This project examines the uses of social media for policing domestic extremism and disorder in the UK. The collection and analysis of social media data for the purposes of policing forms part of a broader shift from ‘reactive’ to ‘proactive’ forms of ...
Carey, Zoe   +3 more
core  

Home - About - Disclaimer - Privacy