Catalogue

COVID-19: Updates on library services and operations.

Internet searches for vetting, investigations, and open-source intelligence [electronic resource] /
Edward J. Appel.
imprint
Boca Raton, FL : CRC Press, c2011.
description
xviii, 302 p. : ill. ; 25 cm.
ISBN
1439827516 (hardcover : alk. paper), 9781439827512 (hardcover : alk. paper)
format(s)
Book
More Details
imprint
Boca Raton, FL : CRC Press, c2011.
isbn
1439827516 (hardcover : alk. paper)
9781439827512 (hardcover : alk. paper)
restrictions
Licensed for access by U. of T. users.
contents note
Behavior and technology -- The internet's potential for investigators and intelligence officers -- People, places, organizations, and topics -- A practitioner's perspective -- The search -- Internet posts and the people they profile -- Finding the needles -- The need for speed -- What we can't do without -- Social and technological change -- Internet use growth -- Evolution of internet uses -- Physical world, virtual activities -- Connection and disconnection -- Use and abuse : crime on the internet -- By the numbers? -- Online venues -- Digital delinquency -- "Free" intellectual property -- The insider.
catalogue key
13438126
 
Includes bibliographical references and index.
A Look Inside
Reviews
Review Quotes
I was excited to hear CRC Press was releasing Internet Searches for Vetting, Investigations, and Open-Source Intelligence, by Edward J. Appel, a retired FBI agent. His company has done work for me so I knew the quality of his work and assumed his book would be at the same level as his investigative efforts. I wasn't disappointed. ... Appel develops a framework for preparation and planning of successful Internet research. He covers basic information about search engines, metasearch engines, social networking sites and search terms. I found the chapters Automation of Searching and Internet Intelligence Reporting to be the most enlightening. ... delivers with content and is an easy read. It met my criteria for a successful investigations book ... . --Larry Zilliox, in the PISA Newsletter, April 2011
I was excited to hear CRC Press was releasingInternet Searches for Vetting, Investigations, and Open-Source Intelligence, by Edward J. Appel, a retired FBI agent. His company has done work for me so I knew the quality of his work and assumed his book would be at the same level as his investigative efforts. I wasn't disappointed. … Appel develops a framework for preparation and planning of successful Internet research. He covers basic information about search engines, metasearch engines, social networking sites and search terms. I found the chapters Automation of Searching and Internet Intelligence Reporting to be the most enlightening. … delivers with content and is an easy read. It met my criteria for a successful investigations book … . -Larry Zilliox, in the PISA Newsletter, April 2011
This item was reviewed in:
Reference & Research Book News, April 2011
To find out how to look for other reviews, please see our guides to finding book reviews in the Sciences or Social Sciences and Humanities.
Summaries
Bowker Data Service Summary
Addressing legal, policy, privacy, and management issues, this text provides a procedural framework for effective Internet searching in investigations and intelligence. It describes the proper use of Internet vetting, investigations, and open-source intelligence.
Main Description
In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security. Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals' privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities. Outlining appropriate adoption of legal, policy, and procedural principles--and emphasizing the careful and appropriate use of Internet searching within the law--the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.
Main Description
In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security. Internet Searches for Vetting, Investigations, and Open-Source Intelligenceprovides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals " privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities. Outlining appropriate adoption of legal, policy, and procedural principles ”and emphasizing the careful and appropriate use of Internet searching within the law ”the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.
Main Description
In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security.Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals' privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities.Outlining appropriate adoption of legal, policy, and procedural principles'”and emphasizing the careful and appropriate use of Internet searching within the law'”the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.
Main Description
Virtual activities made possible by high-bandwidth Internet connectivity have changed societal behavior. As a result, employers, investigators, and intelligence analysts must adopt better strategies for Internet searching in order to protect information assets. Addressing legal, policy, privacy, and management issues, this book provides a procedural framework for effective Internet searching in investigations and intelligence. The text describes the proper use of Internet vetting, investigations, and open-source intelligence and offers solutions to common stumbling blocks that prevent the adoption of appropriate defenses against those who misuse information systems.

This information is provided by a service that aggregates data from review sources and other sources that are often consulted by libraries, and readers. The University does not edit this information and merely includes it as a convenience for users. It does not warrant that reviews are accurate. As with any review users should approach reviews critically and where deemed necessary should consult multiple review sources. Any concerns or questions about particular reviews should be directed to the reviewer and/or publisher.

  link to old catalogue

Report a problem