|
Showing 1 - 3 of
3 matches in All Departments
In the information age, it is critical that we understand the
implications and exposure of the activities and data documented on
the Internet. Improved efficiencies and the added capabilities of
instant communication, high-speed connectivity to browsers, search
engines, websites, databases, indexing, searching and analytical
applications have made information technology (IT) and the Internet
a vital issued for public and private enterprises. The downside is
that this increased level of complexity and vulnerability presents
a daunting challenge for enterprise and personal security. Internet
Searches for Vetting, Investigations, and Open-Source Intelligence
provides an understanding of the implications of the activities and
data documented by individuals on the Internet. It delineates a
much-needed framework for the responsible collection and use of the
Internet for intelligence, investigation, vetting, and open-source
information. This book makes a compelling case for action as well
as reviews relevant laws, regulations, and rulings as they pertain
to Internet crimes, misbehaviors, and individuals' privacy.
Exploring technologies such as social media and aggregate
information services, the author outlines the techniques and skills
that can be used to leverage the capabilities of networked systems
on the Internet and find critically important data to complete an
up-to-date picture of people, employees, entities, and their
activities. Outlining appropriate adoption of legal, policy, and
procedural principles-and emphasizing the careful and appropriate
use of Internet searching within the law-the book includes coverage
of cases, privacy issues, and solutions for common problems
encountered in Internet searching practice and information usage,
from internal and external threats. The book is a valuable resource
on how to utilize open-source, online sources to gather important
information and screen and vet employees, prospective employees,
corporate partners, and vendors.
Researching an individual's, firm's or brand's online presence has
become standard practice for many employers, investigators, and
intelligence officers, including law enforcement. Countless
companies and organizations are implementing their own policies,
procedures, and practices for Internet investigations,
cybervetting, and intelligence. Cybervetting: Internet Searches for
Vetting, Investigations, and Open-Source Intelligence, Second
Edition examines our society's growing dependence on networked
systems, exploring how individuals, businesses, and governments
have embraced the Internet, including social networking for
communications and transactions. It presents two previously
unpublished studies of the effectiveness of cybervetting, and
provides best practices for ethical cybervetting, advocating
strengthened online security. Relevant to investigators,
researchers, legal and policy professionals, educators, law
enforcement, intelligence, and other practitioners, this book
establishes the core skills, applicable techniques, and suitable
guidelines to greatly enhance their practices. The book includes
the outcomes of recent legal cases relating to discoverable
information on social media that have established guidelines for
using the Internet in vetting, investigations, and open-source
intelligence. It outlines new tools and tactics, and indicates what
is and isn't admissible under current laws. It also highlights
current cybervetting methods, provides legal frameworks for
Internet searching as part of investigations, and describes how to
effectively integrate cybervetting into an existing screening
procedure. What's New in the Second Edition: Presents and analyzes
results of two recent studies of the effectiveness of cybervetting
Updates key litigation trends, investigative advances, HR
practices, policy considerations, social networking, and Web 2.0
searching Includes the latest tactics and guidelines for
cybervetting Covers policy, legal issues, professional methodology,
and the operational techniques of cybervetting Provides a
strengthened rationale, legal foundation, and procedures for
successful cybervetting Contains compelling evidence that trends in
legal, policy, and procedural developments argue for early adoption
of cybervetting Presents new strategies and methodologies
Cybervetting: Internet Searches for Vetting, Investigations, and
Open-Source Intelligence, Second Edition is a relevant and timely
resource well suited to businesses, government, non-profits, and
academia looking to formulate effective Internet search strategies,
methodologies, policies, and procedures for their practices or
organizations.
|
|