Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet200/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   196   197   198   199   200   201   202   203   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

195
 
References
Law University of Amsterdam. 
http://www.ivir.nl/publications/vanhoboken/Cloud_
Computing_Patriot_Act_2012.pdf
 [25.10.13].
Veenswijk, M., Koerten, H., Poot, J., 2012. Unravelling Organizational Consequences of PSI 
Reform—An In-depth Study of the Organizational Impact of the Reuse of Public Sector 
Data. ETLA, Helsinki, 
http://www.etla.fi/en/julkaisut/dp1275-en/
 [10.12.13].
Wang, Z., 2012. Systematic government access to private-sector data in China. Int. Data 
Privacy Law 2 (4), 220–229.
Wolfe, N., 2012. The new totalitarianism of surveillance technology. Guardian [On-line]. 
http://
www.theguardian.com/commentisfree/2012/aug/15/new-totalitarianism-surveillance- 
technology
 [31.01.14].


CHAPTER
197
15
Social media and its role 
for LEAs: Review and 
applications
P. Saskia Bayerl, Babak Akhgar, Ben Brewster, Konstantinos Domdouzis,
Helen Gibson
INTRODUCTION
Social media has become a major aspect of online activity, and thus an essential part 
of cybercrime and cyber terrorism-related operations. As LEA's (law enforcement 
agencies) focus on cybercrime and cyber terrorism threats increases, so does the 
requirement to consider the potential application of social media as a vital aspect 
of any cyber defense strategy. In order to develop an understanding of cyber-related 
activity, an appreciation of social media's role in society is required to enable the 
development of strategies that tackle not only cybercrime and cyber terrorism, but 
also crimes facilitated through the use of social media. These include its potential 
exploitation in combatting a wide variety of criminal threats, such as those identi-
fied in the scenarios in the section “LEA Usage Scenarios for Social Media,” and 
ultimately in the development of competitive advantage over a wide variety of illicit 
criminal activity.
Although social media is often associated with large network services such as 
Facebook and Twitter, the term social media refers to a larger family of service 
platforms. These services can be clustered into six groups (
Kaplan and Haenlein, 
2010
):

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   196   197   198   199   200   201   202   203   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish