000 03208 a2200457 4500
001 1138112232
005 20250317100404.0
008 250312042017GB 5 eng
020 _a9781138112230
037 _bTaylor & Francis
_cGBP 74.99
_fBB
040 _a01
041 _aeng
072 7 _aUY
_2thema
072 7 _aUBL
_2thema
072 7 _aKC
_2thema
072 7 _aKJMV2
_2thema
072 7 _aJB
_2thema
072 7 _aUR
_2thema
072 7 _aJKV
_2thema
072 7 _aKNS
_2thema
072 7 _aUY
_2bic
072 7 _aUBL
_2bic
072 7 _aKC
_2bic
072 7 _aKJMV2
_2bic
072 7 _aJF
_2bic
072 7 _aUR
_2bic
072 7 _aJKV
_2bic
072 7 _aKNSS
_2bic
072 7 _aBUS030000
_2bisac
072 7 _aBUS041000
_2bisac
072 7 _aCOM053000
_2bisac
072 7 _aHIS027000
_2bisac
072 7 _aLAW041000
_2bisac
072 7 _a303.4833
_2bisac
100 1 _aEdward J. Appel
245 1 0 _aInternet Searches for Vetting, Investigations, and Open-Source Intelligence
_bInternet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition
250 _a1
260 _aOxford
_bCRC Press
_c20170531
300 _a320 p
520 _bIn the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security. Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals’ privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities. Outlining appropriate adoption of legal, policy, and procedural principles—and emphasizing the careful and appropriate use of Internet searching within the law—the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.
999 _c1557
_d1557