Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet203/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   199   200   201   202   203   204   205   206   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

relational aspect
of social media use. Relational usage 
refers to the building and maintenance of relationships with members of the public 
with a focus on increasing the trust in, and legitimacy of LEAs. This is established 
through positive engagement with the public on social media services.
In this chapter, we focus primarily on the performative aspect of social media 
for LEAs and more specifically on intelligence gathering with regard to its explicit 
application in this context. Social media now pervades the everyday lives of many 
people including those breaking the law and conducting other nefarious activities. 
It is the ease with which communication is facilitated by social media services that 
makes them so attractive. Due to its often-open nature, these activities are regularly 
conducted in plain sight. Yet the sheer amount of information sent through social 
media makes detection of these activities difficult. News outlets often pick up on in-
formation from social media in post-event reports that may have provided early indi-
cations of the impending crime. However, identifying these posts prior to the event is 
akin to finding a needle in a haystack (
Brynielsson et al., 2013
). These kinds of threat 
indicators therefore often go ignored, potentially leading to lone-wolf scenarios and 
school shootings (to give two examples). Only in the aftermath of the event are these 
indicator signals picked up by LEAs.
LEA's utilization of social media relies on citizen participation, consisting of 
both public observers and the criminal perpetrators themselves. This participation 
can take the form of status updates, geographic information or pictures and videos, 
containing potentially incriminating information. Also, seemingly innocent informa-
tion may prove a key link in the chain of connecting the dots between disparate social 
media postings and other sources of intelligence. This so-called open-source intel-
ligence (
Best, 2008
) may then go on to increase situational awareness and/or create 
actionable intelligence.
For this process to work it is important to be aware of the “typical” user character-
istics and behaviors as well as the type of information social media users post online.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   199   200   201   202   203   204   205   206   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish