Results 31 to 40 of about 4,943 (194)

The insider on the outside: a novel system for the detection of information leakers in social networks [PDF]

open access: yes, 2017
Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers.
Cascavilla, Giuseppe   +3 more
core   +1 more source

Surveillance and falsification implications for open source intelligence investigations [PDF]

open access: yes, 2015
© 2015 ACM. Legitimacy of surveillance is crucial to safeguarding validity of OSINT data as a tool for law-enforcement ...
Babak Akhgar   +8 more
core   +1 more source

Open source intelligence (OSINT) in a colombian context and sentiment analysis

open access: yesRevista Vínculos, 2018
Open source intelligence (OSINT) is used to obtain and analyze information related to adversaries, so it can support risk assessments aimed to prevent damages against critical assets.
Martin Jose Hernandez Mediná   +4 more
doaj   +1 more source

Muckraker websites (American and European examples) [PDF]

open access: yes, 2017
The goal of the article is to compare contemporary websites used by investigative reporters for organising their inquiries and propagating their outcomes.
Adamczyk, Wojciech
core   +2 more sources

Twitter Tweetleri Üzerinden Açık Kaynak İstihbaratı Tabanlı YarıOtomatik Siber Güvenlik Modeli

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2019
Açık kaynak istihbaratı (Open Source Intelligence, OSINT), kamuya açık bilgilerin sistematik olarak toplanması,işlenmesi ve analiz edilmesi sonucu elde edilen bilgiden istihbarat üretme disiplinidir.
Ali Ekşim, İrem Civelek
doaj   +1 more source

Collaborative OSINT [PDF]

open access: yes, 2016
Fedoniuk, Serhii V.   +1 more
openaire   +3 more sources

Automatic classification of social media reports on violent incidents in South Africa using machine learning

open access: yesSouth African Journal of Science, 2020
With the growing amount of data available in the digital age, it has become increasingly important to use automated methods to extract useful information from data.
Eduan Kotzé   +2 more
doaj   +1 more source

A nyílt forrásból származó adatgyűjtés automatizálásának lehetőségei

open access: yesBelügyi Szemle, 2023
Cél: A digitális forradalom korát éljük, amelyben a korszerű technológiáknak és ezek dinamikusan növekvő felhasználói táborának köszönhetően eddig soha nem látott mennyiségű, szabadon hozzáférhető, részben nemzetbiztonsági szempontból fontos adat ...
Attila Gulyás
doaj   +1 more source

The rise of open-source intelligence

open access: yesEuropean Journal of International Security
This article challenges the perception of Open-Source Intelligence (OSINT) as a revolutionary shift driven by the explosion of publicly accessible data. Instead, we argue that the rise of OSINT reflects an evolution of traditional intelligence practices:
Damien Van Puyvelde   +1 more
doaj   +1 more source

Can you identify violent extremists using a screening checklist and open-source intelligence alone? [PDF]

open access: yes, 2016
Checklist-based screening instruments have a role in the assessment of mentally disordered and criminal offenders, but their value for screening for vulnerability to violent extremism remains moot.
Alison, Emily   +6 more
core   +3 more sources

Home - About - Disclaimer - Privacy