000 01785nam a2200289Ia 4500
003 OSt
005 20250924120218.0
008 220909b |||||||| |||| 00| 0 eng d
020 _a9781482238853
037 _cTextbook
040 _aCSL
_beng
_cCSL
041 _aeng
084 _aD65,8(B):(894) Q5 TY
_qCSL
100 _aAppel, Edward J
_eauthor
_9846438
245 0 _aCybervetting
_b: Internet searches for vetting, investigations, and open-source intelligence
250 _a2nd ed.
260 _aBoca Raton :
_bCRC Press,
_c2015.
300 _axix, 302p.
_b: ill.
500 _aIndex 289-302p.
520 _aResearching an individual’s, firm’s or brand’s online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for Internet investigations, cybervetting, and intelligence. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition examines our society’s growing dependence on networked systems, exploring how individuals, businesses, and governments have embraced the Internet, including social networking for communications and transactions. It presents two previously unpublished studies of the effectiveness of cybervetting, and provides best practices for ethical cybervetting, advocating strengthened online security.
650 _a Finding sources
_9846439
650 _a Insider threat
_9846440
650 _a Internet search studies
_9846441
650 _aBehavior online
_9846442
942 _hD65,8(B):(894) Q5 TY
_cTB
_2CC
_n0
999 _c6568
_d6568