Results 41 to 50 of about 5,200 (210)
OSINT Analysis of the TOR Foundation
8 pages, 4 figures This paper has been presented at the 13th International Conference on Cyber Warfare and Security (ICCWS'2018), National Defense University, Washington DC, USA. March 8-9th, 2018 This second version is correcting English and a few typos.
Maxence Delong +4 more
openaire +2 more sources
With the growing amount of data available in the digital age, it has become increasingly important to use automated methods to extract useful information from data.
Eduan Kotzé +2 more
doaj +1 more source
Twitter Tweetleri Üzerinden Açık Kaynak İstihbaratı Tabanlı YarıOtomatik Siber Güvenlik Modeli
Açık kaynak istihbaratı (Open Source Intelligence, OSINT), kamuya açık bilgilerin sistematik olarak toplanması,işlenmesi ve analiz edilmesi sonucu elde edilen bilgiden istihbarat üretme disiplinidir.
Ali Ekşim, İrem Civelek
doaj +1 more source
Privacy in public spaces: what expectations of privacy do we have in social media intelligence? [PDF]
In this paper we give an introduction to the transition in contemporary surveillance from top down traditional police surveillance to profiling and “pre-crime” methods.
Edwards, Lilian, Urquhart, Lachlan
core +3 more sources
The rise of open-source intelligence
This article challenges the perception of Open-Source Intelligence (OSINT) as a revolutionary shift driven by the explosion of publicly accessible data. Instead, we argue that the rise of OSINT reflects an evolution of traditional intelligence practices:
Damien Van Puyvelde +1 more
doaj +1 more source
Can you identify violent extremists using a screening checklist and open-source intelligence alone? [PDF]
Checklist-based screening instruments have a role in the assessment of mentally disordered and criminal offenders, but their value for screening for vulnerability to violent extremism remains moot.
Alison, Emily +6 more
core +3 more sources
The dangers, directness, and purposes of online collective actions
Abstract Most research on online collective action investigates low‐effort, social media‐based actions rather than tactics with highly disruptive potential. To better account for the variety of forms of collective actions that use digital technologies, we conducted an open‐source intelligence search (Study 1a) and an expert consultation survey (Study ...
Catherine G. Lowery +2 more
wiley +1 more source
У цій статті здійснюється ґрунтовне дослідження технології Open Source Intelligence (OSINT), яка відіграє значну роль у сучасному інформаційному суспільстві, пропонуючи нові методи збору та аналізу даних.
Анастасія Главацька +2 more
doaj +1 more source
Hackers as terrorists? Why it doesn't compute [PDF]
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism.
Conway, Maura
core +1 more source
OPEN SOURCE INTELLIGENCE (OSINT) AS AN ELEMENT OF MILITARY RECON
One of the most basic functions of the state is to ensure the security to it and its citizens. Significant elements are: perseverance, political independence, territorial integrity and maintenance proper level of life quality. Today’s intelligence, which
Agata ZIÓŁKOWSKA
doaj +1 more source

