BibTex RIS Kaynak Göster

How to Make Social Media More Effective as an Exploitation Area

Yıl 2015, Cilt: 3 Sayı: 3, 79 - 87, 04.05.2015
https://doi.org/10.17858/jmisci.92863

Öz

The immediate rise of social media has made a big change in the habits of communication. All the applications like Facebook, Twitter, Google+ and LinkedIn have gained a wide range of usage allowing the applicants have a very media to express themselves freely. The users of social media have a chance to articulate themselves, share their views and interact with the other. These opportunities also enable the intelligence workers to reach some information that is not possible to catch when directly asked for or cannot be dared to ask indirectly as it is not appreciated. Because, in social media, all the contents are built by the users willingly and the users of social media don’t feel themselves under threat as they build up the content without external push. So it is not possible to talk about privacy. Although some contents have limited access, when the size of unlimited ones are thought, social media presents a big opportunity for data mining. In today’s intelligence literature, social media is a subject of Open Source Intelligence (OSINT). This study tries to explain how to use social media more effectively as an exploitation area for intelligence staff.

Kaynakça

  • ADRP 2-0 Intelligence (2012), Headquarters, Department of the US Army.
  • Allied Command Transformation, “Bi-Strategic Command, Knowledge Development Concept (2008), Pre-Doctrinal Handbook.
  • ATP 2-22.9 Open Source Intelligence (2012). Headquarters, Department of the US Army.
  • Bartlett J., Miller C., Crump J. and Middleton L. (2013). Policing in an Information Age, CASM Policy Paper.
  • Bartlett, Jamie, and Miller C. (2013). The State of The Art: A Literature Review of Social Media Intelligence Capabilities for Counter-Terrorism.
  • Biermann J., et al. (2004). From Unstructured to Structured Information in Military Intelligence-Some Steps to Improve Information Fusion. FGAN-FKIE, Wachtberg Germany, .3-8.
  • Bunnik A. (2014, August). Opportunities and Ethics of SOCMINT: Practices for State Agencies in the Netherlands, Inaugural VOX-Pol Conference, Centre for Applied Research in Security Innovation (CASI) 29 Aug. 2014.
  • Fischer, E., and Reuber, A. R. (2011). Social Interaction via New Social Media :(How) can Interactions on Twitter Affect Effectual Thinking and Behavior? Journal of Business Venturing, 26, 1-18.
  • Friedman R. S. (1998). Open Source Intelligence, Parameters, 28(2), 159-165.
  • Friedman R. S. (2002). Review Essay – Open Source Intelligence, in NATO Open Source Intelligence Reader, Supreme Allied Command Atlantic (SACLANT), Norfolk VA, US.
  • Gannon J. (2001). The Strategic Use of Open-Source Information, Studies in Intelligence, 45(3), 67.
  • JP 2-0 Joint Intelligence (2013). Headquarters, Department of CJCS, GL-8.
  • Kaplan, A. M. and Haenlein M. (2010). Users of the World, Unite! The Challenges and Opportunities of Social Media. Business Horizons, 53(1), 59-68.
  • Lewis B. K. (2009). Social Media and Strategic Communications: Attitudes and Perceptions among College Students. (Doctoral Dissertation, Oklahoma State University).
  • Lindsay, Bruce R. (2011). Social Media and Disasters: Current Uses, Future Options, and Policy Considerations, Vol. 41987. Congressional Research Service.
  • Omand, D., Bartlett J., and Miller C. (2012). Introducing Social Media Intelligence (SOCMINT), Intelligence and National Security 27(6), 801-823.
  • Social Networking Statistics, [Online]. Available: http://www.statisticbrain.com/social-networking-statistics/ Latest Access Time for the website is 29 December 2014.
  • Steele Robert D. (1995). The Importance of Open Source Intelligence to the Military, International Journal of Intelligence and Counter Intelligence, 8(4), 457-470.
  • Top 15 Most Popular Social Networking Sites, [Online]. Available: http://www.ebizmba.com/articles/social-networking-websites., Latest Access Time for the website is 29 December 2014.
  • World Internet Usage and Population Statistics, [Online]. Available: http://www.internetworldstats.com/stats.htm Latest Access Time for the website is 29 December 2014
Yıl 2015, Cilt: 3 Sayı: 3, 79 - 87, 04.05.2015
https://doi.org/10.17858/jmisci.92863

Öz

Kaynakça

  • ADRP 2-0 Intelligence (2012), Headquarters, Department of the US Army.
  • Allied Command Transformation, “Bi-Strategic Command, Knowledge Development Concept (2008), Pre-Doctrinal Handbook.
  • ATP 2-22.9 Open Source Intelligence (2012). Headquarters, Department of the US Army.
  • Bartlett J., Miller C., Crump J. and Middleton L. (2013). Policing in an Information Age, CASM Policy Paper.
  • Bartlett, Jamie, and Miller C. (2013). The State of The Art: A Literature Review of Social Media Intelligence Capabilities for Counter-Terrorism.
  • Biermann J., et al. (2004). From Unstructured to Structured Information in Military Intelligence-Some Steps to Improve Information Fusion. FGAN-FKIE, Wachtberg Germany, .3-8.
  • Bunnik A. (2014, August). Opportunities and Ethics of SOCMINT: Practices for State Agencies in the Netherlands, Inaugural VOX-Pol Conference, Centre for Applied Research in Security Innovation (CASI) 29 Aug. 2014.
  • Fischer, E., and Reuber, A. R. (2011). Social Interaction via New Social Media :(How) can Interactions on Twitter Affect Effectual Thinking and Behavior? Journal of Business Venturing, 26, 1-18.
  • Friedman R. S. (1998). Open Source Intelligence, Parameters, 28(2), 159-165.
  • Friedman R. S. (2002). Review Essay – Open Source Intelligence, in NATO Open Source Intelligence Reader, Supreme Allied Command Atlantic (SACLANT), Norfolk VA, US.
  • Gannon J. (2001). The Strategic Use of Open-Source Information, Studies in Intelligence, 45(3), 67.
  • JP 2-0 Joint Intelligence (2013). Headquarters, Department of CJCS, GL-8.
  • Kaplan, A. M. and Haenlein M. (2010). Users of the World, Unite! The Challenges and Opportunities of Social Media. Business Horizons, 53(1), 59-68.
  • Lewis B. K. (2009). Social Media and Strategic Communications: Attitudes and Perceptions among College Students. (Doctoral Dissertation, Oklahoma State University).
  • Lindsay, Bruce R. (2011). Social Media and Disasters: Current Uses, Future Options, and Policy Considerations, Vol. 41987. Congressional Research Service.
  • Omand, D., Bartlett J., and Miller C. (2012). Introducing Social Media Intelligence (SOCMINT), Intelligence and National Security 27(6), 801-823.
  • Social Networking Statistics, [Online]. Available: http://www.statisticbrain.com/social-networking-statistics/ Latest Access Time for the website is 29 December 2014.
  • Steele Robert D. (1995). The Importance of Open Source Intelligence to the Military, International Journal of Intelligence and Counter Intelligence, 8(4), 457-470.
  • Top 15 Most Popular Social Networking Sites, [Online]. Available: http://www.ebizmba.com/articles/social-networking-websites., Latest Access Time for the website is 29 December 2014.
  • World Internet Usage and Population Statistics, [Online]. Available: http://www.internetworldstats.com/stats.htm Latest Access Time for the website is 29 December 2014
Toplam 20 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Reports
Yazarlar

Cetin Arslan

Murat Yanık

Yayımlanma Tarihi 4 Mayıs 2015
Yayımlandığı Sayı Yıl 2015 Cilt: 3 Sayı: 3

Kaynak Göster

APA Arslan, C., & Yanık, M. (2015). How to Make Social Media More Effective as an Exploitation Area. Journal of Management and Information Science, 3(3), 79-87. https://doi.org/10.17858/jmisci.92863
AMA Arslan C, Yanık M. How to Make Social Media More Effective as an Exploitation Area. JMISCI. Mayıs 2015;3(3):79-87. doi:10.17858/jmisci.92863
Chicago Arslan, Cetin, ve Murat Yanık. “How to Make Social Media More Effective As an Exploitation Area”. Journal of Management and Information Science 3, sy. 3 (Mayıs 2015): 79-87. https://doi.org/10.17858/jmisci.92863.
EndNote Arslan C, Yanık M (01 Mayıs 2015) How to Make Social Media More Effective as an Exploitation Area. Journal of Management and Information Science 3 3 79–87.
IEEE C. Arslan ve M. Yanık, “How to Make Social Media More Effective as an Exploitation Area”, JMISCI, c. 3, sy. 3, ss. 79–87, 2015, doi: 10.17858/jmisci.92863.
ISNAD Arslan, Cetin - Yanık, Murat. “How to Make Social Media More Effective As an Exploitation Area”. Journal of Management and Information Science 3/3 (Mayıs 2015), 79-87. https://doi.org/10.17858/jmisci.92863.
JAMA Arslan C, Yanık M. How to Make Social Media More Effective as an Exploitation Area. JMISCI. 2015;3:79–87.
MLA Arslan, Cetin ve Murat Yanık. “How to Make Social Media More Effective As an Exploitation Area”. Journal of Management and Information Science, c. 3, sy. 3, 2015, ss. 79-87, doi:10.17858/jmisci.92863.
Vancouver Arslan C, Yanık M. How to Make Social Media More Effective as an Exploitation Area. JMISCI. 2015;3(3):79-87.