Internet searches for vetting, investigations, and open-source intelligence. (2014)
- Record Type:
- Book
- Title:
- Internet searches for vetting, investigations, and open-source intelligence. (2014)
- Main Title:
- Internet searches for vetting, investigations, and open-source intelligence
- Further Information:
- Note: Edward J. Appel.
- Authors:
- Appel, Edward J
- Contents:
- Section I Behavior and Technology The Internet’s Potential for Investigators and Intelligence Officers Introduction Growth of Internet Use A Practitioner’s Perspective The Search Internet Posts and the People They Profile Finding the Needles The Need for Speed Sufficiency of Searches Notes Behavior Online Internet Use Growth Evolution of Internet Uses Physical World, Virtual Activities Connections and Disconnecting Notes Use and Abuse: Crime and Misbehavior Online Introduction By the Numbers? Online Venues Digital Delinquency "Free" Intellectual Property The Insider Misbehavior Online Notes Internet Search Studies Introduction Academic Study Study Summary iNameCheck Cybervetting Case Study Notes Implications for the Enterprise Introduction The New User: Someone You Would Trust? Employer Liability Vetting, Monitoring, and Accountability The Evolving Personnel Security Model Notes Section II Legal and Policy Context Liability, Privacy, and Management Issues Liability for Service Providers Liability for Employers Accountability for Employees Notes Laws Introduction Constitutional Rights Statutes Federal Statutes State Statutes Federal Rules of Evidence and Computer Records International Treaties and Standards US Legislative Proposals Notes Litigation Introduction Internet Search Litigation Anonymity Expectation of Privacy Due Process Libel/Defamation Invasion of Privacy Torts Sanctions for Public Postings Internet Privacy for the Twenty-First Century Admissibility ofSection I Behavior and Technology The Internet’s Potential for Investigators and Intelligence Officers Introduction Growth of Internet Use A Practitioner’s Perspective The Search Internet Posts and the People They Profile Finding the Needles The Need for Speed Sufficiency of Searches Notes Behavior Online Internet Use Growth Evolution of Internet Uses Physical World, Virtual Activities Connections and Disconnecting Notes Use and Abuse: Crime and Misbehavior Online Introduction By the Numbers? Online Venues Digital Delinquency "Free" Intellectual Property The Insider Misbehavior Online Notes Internet Search Studies Introduction Academic Study Study Summary iNameCheck Cybervetting Case Study Notes Implications for the Enterprise Introduction The New User: Someone You Would Trust? Employer Liability Vetting, Monitoring, and Accountability The Evolving Personnel Security Model Notes Section II Legal and Policy Context Liability, Privacy, and Management Issues Liability for Service Providers Liability for Employers Accountability for Employees Notes Laws Introduction Constitutional Rights Statutes Federal Statutes State Statutes Federal Rules of Evidence and Computer Records International Treaties and Standards US Legislative Proposals Notes Litigation Introduction Internet Search Litigation Anonymity Expectation of Privacy Due Process Libel/Defamation Invasion of Privacy Torts Sanctions for Public Postings Internet Privacy for the Twenty-First Century Admissibility of Electronically Generated and Stored Evidence Trends and Legal Challenges to Investigative Searching Notes International and Domestic Principles US and International Privacy Principles Government Standards Parallel Guidance: Internet Research Ethics Notes Professional Standards and the Internet Introduction ASIS Standards National Association of Professional Background Screeners Association of Internet Researchers Librarians Inside and Outside the Workplace Reputational Risk, Public Affairs Bottom Line Notes The Insider Threat Introduction Benevolent Big Brother Notes Section III Framework for Internet Searching Internet Vetting and Open-Source Intelligence Policy Introduction Legal and Ethical Limitations Policy Information Assets Protection Notes Tools, Techniques, and Training Introduction Training Analysts Open-Source Intelligence Process Quality Control Notes Proper Procedures for Internet Searching Introduction Criteria Security Standard Methodology Notes Section IV Internet Search Methodology Preparation and Planning Introduction The Library Scope Notes Notes Search Techniques Introduction Internet Content The Browser The Search Engine Metasearch Engines Finding Search Engines Search Terms Social and Commercial Searching Social Networking Sites E-Commerce Sites Directories Blogs Chat Notes Finding Sources Introduction US Government State, County, and Local Governments Other Government-Related Sources Business-Related Sources News Web 2.0 Looking Up Subscribers E-Mail Commercial Database Providers Notes Automation of Searching Introduction Why Automate Searching? Enterprise Search Middleware Best-in-Class Desktop Tool Investigative Search Tool Requirements A Homegrown Solution Reducing Analytical Time Using Automation Caching and Data Mining The Human Interface in Internet Investigations Notes Internet Intelligence Reporting Introduction Records Content Analyst’s Comments Organization and Formatting Source Citations Attribution Verification Notes Illicit Websites and Illegal Behavior Online Introduction Cybercrime Child Pornography and Internet Porn Unauthorized Use of Computer Systems Contraband Digital Assets Information (Cyber) Warfare Notes Model Cybervetting Investigative Guidelines Introduction Enterprise Strategy Model Internet Search Guidelines Authorized Internet Search (Cybervetting) Personnel Definitions to Consider Notes A Model Internet Investigation Policy Introduction Key Considerations Higher-Risk Candidates Application Procedures and Forms Legal Issues Confidentiality Ethics in Investigations Disciplinary Action Model Forms for Candidates Notes A Model Internet Posting Policy Note Internet Intelligence Issues Introduction Privacy Smoking Guns Completeness of Internet Searching Adjudication Conclusion Notes Index … (more)
- Edition:
- Second edition
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2014
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 025.0425
Internet searching
Confidential business information
Knowledge management - Languages:
- English
- ISBNs:
- 9781482238860
- Related ISBNs:
- 9781482238853
- Notes:
- Note: Description based on CIP data; item not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.140485
- Ingest File:
- 02_039.xml