Surveillance and falsification implications for open source intelligence investigations
暂无分享,去创建一个
[1] Carlo Aliprandi,et al. Sentiment Analysis on Social Media , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[2] Elisa Bertino,et al. Privacy-preserving assessment of social network data trustworthiness , 2012, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[3] Peter Bell,et al. Intelligence-Led Policing (ILP) as a strategic planning resource in the fight against Transnational Organized Crime (TOC) , 2013 .
[4] Michael Stohl. Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? , 2007 .
[5] David Omand,et al. Introducing Social Media Intelligence (SOCMINT) , 2012 .
[6] Tsang-Kai Hung,et al. The effect of Internet community and select intention for young people , 2016 .
[7] R. Steele. The importance of open source intelligence to the military , 1995 .
[8] Elisa Bertino,et al. Privacy-preserving assessment of social network data trustworthiness , 2012, COLLABORATECOM 2012.
[9] Clive Best. Challenges in Open Source Intelligence , 2011, 2011 European Intelligence and Security Informatics Conference.
[10] Adam N. Joinson,et al. Privacy, Trust, and Self-Disclosure Online , 2010, Hum. Comput. Interact..
[11] R. Geetha Ramani,et al. Mining of Association Patterns in Social Network Data (Face Book 100 Universities) through Data Mining Techniques and Methods , 2012, ACITY.
[12] Urs Gasser,et al. Teens, social media, and privacy , 2013 .
[13] Catherine Tucker,et al. Government Surveillance and Internet Search Behavior , 2017 .
[14] Robert David Steele. Open source intelligence , 2006 .
[15] Richard A. Best,et al. Open Source Intelligence OSINT: Issues for Congress , 2007 .
[16] Stevyn D. Gibson,et al. Open source intelligence , 2004 .