Cyber Warfare and Organised Crime. A Regulatory Model and Meta-Model for Open Source Intelligence (OSINT)
暂无分享,去创建一个
[1] Marta Poblet. Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation , 2013 .
[2] Pompeu Casanovas,et al. Fighting Organized Crime Through Open Source Intelligence: Regulatory Strategies of the CAPER Project , 2014, JURIX.
[3] Sherali Zeadally,et al. Cyberwar: The What, When, Why, and How [Commentary] , 2014, IEEE Technol. Soc. Mag..
[4] Gianluigi Palombella,et al. The Rule of Law as Institutional Ideal , 2010 .
[5] Pompeu Casanovas,et al. OPJK into PROTON: Legal Domain Ontology Integration into an Upper-Level Ontology , 2005, OTM Workshops.
[6] N. Kshetri. The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives , 2010 .
[7] Ronald Leenes,et al. Privacy regulation cannot be hardcoded. A critical comment on the ‘privacy by design’ provision in data-protection law , 2014 .
[8] Petter Gottschalk. Information Sources in Police Intelligence , 2009 .
[9] Serge Gutwirth,et al. Reforming European Data Protection , 2015 .
[10] Marta Poblet,et al. Mobile Technologies for Conflict Management , 2011 .
[11] Danny Bradbury. In plain view: open source intelligence , 2011 .
[12] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[13] Pompeu Casanovas,et al. Agreement and Relational Justice: A Perspective from Philosophy and Sociology of Law , 2013 .
[14] M. Risch. Virtual rule of law , 2018 .
[15] Pompeu Casanovas,et al. Crowdsourcing Tools for Disaster Management: A Review of Platforms and Methods , 2013, AICOL.
[16] Cody Burke. Freeing knowledge, telling secrets: Open source intelligence and development , 2007 .
[17] M. Poblet. Visualizing the law: crisis mapping as an open tool for legal practice , 2013 .
[18] M. Schmitt. The Law of Cyber Warfare: Quo Vadis? , 2013 .
[19] L. Floridi,et al. The Ethics of Information Warfare , 2014 .
[20] Cristiano Castelfranchi,et al. Minds as social institutions , 2014 .
[21] Mark Burdon. Privacy invasive geo-mashups: privacy 2.0 and the limits of first generation information privacy laws , 2009 .
[22] Jaap-Henk Hoepman,et al. Open-source intelligence and privacy by design , 2013, Comput. Law Secur. Rev..
[23] Pablo Noriega,et al. Crowd-Based Socio-Cognitive Systems , 2014 .
[24] Pompeu Casanovas,et al. Drafting a Composite Indicator of Validity for Regulatory Models and Legal Systems , 2013, AICOL.
[25] M. Wendy Hennequin,et al. The Future of the Internet and How to Stop It , 2011 .
[26] B. Tamanaha. The Rule of Law and Legal Pluralism in Development , 2011 .
[27] G. Palombella. The Rule of Law Beyond the State: Failures, Promises and Theory , 2009 .
[28] Fabio Vitali,et al. Special Issue on The Semantic Web for the Legal Domain - Guest Editors’ Editorial: The Next Step , 2016 .
[29] Pompeu Casanovas,et al. Online Dispute Resolution and Models of Relational Law and Justice: A Table of Ethical Principles , 2013, AICOL.
[30] John H. Aldrich. Elinor Ostrom and the “just right” solution , 2010 .
[31] Ann Cavoukian,et al. Privacy by Design [Leading Edge] , 2012, IEEE Technol. Soc. Mag..
[32] Ido Kilovaty. Cyber Warfare and the Jus Ad Bellum Challenges: Evaluation in the Light of the Tallinn Manual on the International Law Applicable to Cyber Warfare , 2014 .
[33] John Arquilla. From blitzkrieg to bitskrieg: the military encounter with computers , 2011, CACM.
[34] Pompeu Casanovas,et al. Semantic Web Regulatory Models: Why Ethics Matter , 2014, Philosophy & Technology.
[35] Andreas Kornmaier,et al. Beyond technical data - a more comprehensive situational awareness fed by available intelligence information , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).
[36] Police and User-led Investigations on Social Media , 2014 .
[37] Sebastian Zimmeck. The Information Privacy Law of Web Applications and Cloud Computing , 2013 .
[38] Serge Gutwirth,et al. Reforming European Data Protection Law , 2014 .
[39] John Arquilla. TWENTY YEARS OF CYBERWAR , 2013 .
[40] Michael Glassman,et al. Intelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT) , 2012, Comput. Hum. Behav..
[41] Mark McCary. Sun Tzu’s Battle for Your Footnotes: The Emergent Role of Libraries in Judicial Warfare , 2013 .
[42] N. Kshetri. The Global Cybercrime Industry , 2010 .
[43] Won Kim,et al. On cyberwarfare , 2012, Int. J. Web Grid Serv..
[44] T. V. Beken,et al. Proactive Policing and the Assessment of Organised Crime , 2008 .
[45] Pompeu Casanovas,et al. OPJK and DILIGENT: ontology modeling in a distributed environment , 2007, Artificial Intelligence and Law.
[46] Peter J. Boettke,et al. The Two Social Philosophies of Ostroms' Institutionalism , 2011 .
[47] Gerald Quirchmayr,et al. Open Source Intelligence in Disaster Management , 2012, 2012 European Intelligence and Security Informatics Conference.
[48] Thomas A. Robson. A Burning Need to Know: The Use of Open Source Intelligence in the Fire Service , 2009 .
[49] Jaap-Henk Hoepman,et al. A Critical Analysis of Privacy Design Strategies , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[50] Laura K. Donohue. Anglo-American Privacy and Surveillance , 2006 .
[51] Pompeu Casanovas,et al. Semantic Web for the Legal Domain: The next step , 2016, Semantic Web.
[52] M. Schmitt,et al. The Decline of International Humanitarian Law Opinio Juris and the Law of Cyber Warfare , 2014 .
[53] Julian Padget,et al. The Challenge of Artificial Socio-Cognitive Systems , 2014 .
[54] Mitchell Bartholomew,et al. Creating an educational context for Open Source Intelligence: The development of Internet self-efficacy through a blogcentric course , 2013, Comput. Educ..
[55] Peter Schaar,et al. Privacy by Design , 2010 .
[56] M. Taddeo. Information Warfare: A Philosophical Perspective , 2011, Philosophy & Technology.
[57] John Arquilla,et al. Cyberwar is coming , 1993 .
[58] Paul De Hert,et al. The new General Data Protection Regulation: Still a sound system for the protection of individuals? , 2016, Comput. Law Secur. Rev..
[59] Jaap-Henk Hoepman,et al. PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .
[60] Pompeu Casanovas. Open Source Intelligence, Open Social Intelligence and Privacy by Design , 2014, ECSI.
[61] Brian Orend. Fog in the Fifth Dimension: The Ethics of Cyber-War , 2014 .
[62] Jerry H. Ratcliffe. Intelligence-Led Policing , 2016 .
[63] Mark Cenite. Code and Other Laws of Cyberspace , 2000 .
[64] P. Bell,et al. Confidence in the police: Balancing public image with community safety – A comparative review of the literature , 2013 .
[65] J. Murkens. The Future of Staatsrecht: Dominance, Demise or Demystification? , 2007 .
[66] Joshua Fairfield. Mixed reality: how the laws of virtual worlds govern everyday life , 2018 .
[67] Jorge González-Conejero,et al. Organized Crime Structure Modelling for European Law Enforcement Agencies Interoperability through Ontologies , 2013, AICOL.
[68] Patrick Lin,et al. Is Warfare the Right Frame for the Cyber Debate , 2014 .
[69] Pompeu Casanovas. Conceptualisation of rights and meta-rule of law for the web of data , 2015 .
[70] M. Phythian,et al. Intellectuals of the Left and the Atomic Dilemma in the Age of the US Atomic Monopoly, 1945–1949 , 2015 .
[71] John Arquilla,et al. Three Wars of Ideas about the Idea of War , 2015 .
[72] Pompeu Casanovas,et al. Legal aspects of linked data - The European framework , 2016, Comput. Law Secur. Rev..
[73] Clive Best,et al. Open Source Intelligence , 2007, NATO ASI Mining Massive Data Sets for Security.