| 000 | 01785nam a2200289Ia 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20250924120218.0 | ||
| 008 | 220909b |||||||| |||| 00| 0 eng d | ||
| 020 | _a9781482238853 | ||
| 037 | _cTextbook | ||
| 040 |
_aCSL _beng _cCSL |
||
| 041 | _aeng | ||
| 084 |
_aD65,8(B):(894) Q5 TY _qCSL |
||
| 100 |
_aAppel, Edward J _eauthor _9846438 |
||
| 245 | 0 |
_aCybervetting _b: Internet searches for vetting, investigations, and open-source intelligence |
|
| 250 | _a2nd ed. | ||
| 260 |
_aBoca Raton : _bCRC Press, _c2015. |
||
| 300 |
_axix, 302p. _b: ill. |
||
| 500 | _aIndex 289-302p. | ||
| 520 | _aResearching an individual’s, firm’s or brand’s online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for Internet investigations, cybervetting, and intelligence. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition examines our society’s growing dependence on networked systems, exploring how individuals, businesses, and governments have embraced the Internet, including social networking for communications and transactions. It presents two previously unpublished studies of the effectiveness of cybervetting, and provides best practices for ethical cybervetting, advocating strengthened online security. | ||
| 650 |
_a Finding sources _9846439 |
||
| 650 |
_a Insider threat _9846440 |
||
| 650 |
_a Internet search studies _9846441 |
||
| 650 |
_aBehavior online _9846442 |
||
| 942 |
_hD65,8(B):(894) Q5 TY _cTB _2CC _n0 |
||
| 999 |
_c6568 _d6568 |
||