BibTex RIS Cite

How to Make Social Media More Effective as an Exploitation Area

Year 2015, Volume: 3 Issue: 3, 79 - 87, 04.05.2015
https://doi.org/10.17858/jmisci.92863

Abstract

The immediate rise of social media has made a big change in the habits of communication. All the applications like Facebook, Twitter, Google+ and LinkedIn have gained a wide range of usage allowing the applicants have a very media to express themselves freely. The users of social media have a chance to articulate themselves, share their views and interact with the other. These opportunities also enable the intelligence workers to reach some information that is not possible to catch when directly asked for or cannot be dared to ask indirectly as it is not appreciated. Because, in social media, all the contents are built by the users willingly and the users of social media don’t feel themselves under threat as they build up the content without external push. So it is not possible to talk about privacy. Although some contents have limited access, when the size of unlimited ones are thought, social media presents a big opportunity for data mining. In today’s intelligence literature, social media is a subject of Open Source Intelligence (OSINT). This study tries to explain how to use social media more effectively as an exploitation area for intelligence staff.

References

  • ADRP 2-0 Intelligence (2012), Headquarters, Department of the US Army.
  • Allied Command Transformation, “Bi-Strategic Command, Knowledge Development Concept (2008), Pre-Doctrinal Handbook.
  • ATP 2-22.9 Open Source Intelligence (2012). Headquarters, Department of the US Army.
  • Bartlett J., Miller C., Crump J. and Middleton L. (2013). Policing in an Information Age, CASM Policy Paper.
  • Bartlett, Jamie, and Miller C. (2013). The State of The Art: A Literature Review of Social Media Intelligence Capabilities for Counter-Terrorism.
  • Biermann J., et al. (2004). From Unstructured to Structured Information in Military Intelligence-Some Steps to Improve Information Fusion. FGAN-FKIE, Wachtberg Germany, .3-8.
  • Bunnik A. (2014, August). Opportunities and Ethics of SOCMINT: Practices for State Agencies in the Netherlands, Inaugural VOX-Pol Conference, Centre for Applied Research in Security Innovation (CASI) 29 Aug. 2014.
  • Fischer, E., and Reuber, A. R. (2011). Social Interaction via New Social Media :(How) can Interactions on Twitter Affect Effectual Thinking and Behavior? Journal of Business Venturing, 26, 1-18.
  • Friedman R. S. (1998). Open Source Intelligence, Parameters, 28(2), 159-165.
  • Friedman R. S. (2002). Review Essay – Open Source Intelligence, in NATO Open Source Intelligence Reader, Supreme Allied Command Atlantic (SACLANT), Norfolk VA, US.
  • Gannon J. (2001). The Strategic Use of Open-Source Information, Studies in Intelligence, 45(3), 67.
  • JP 2-0 Joint Intelligence (2013). Headquarters, Department of CJCS, GL-8.
  • Kaplan, A. M. and Haenlein M. (2010). Users of the World, Unite! The Challenges and Opportunities of Social Media. Business Horizons, 53(1), 59-68.
  • Lewis B. K. (2009). Social Media and Strategic Communications: Attitudes and Perceptions among College Students. (Doctoral Dissertation, Oklahoma State University).
  • Lindsay, Bruce R. (2011). Social Media and Disasters: Current Uses, Future Options, and Policy Considerations, Vol. 41987. Congressional Research Service.
  • Omand, D., Bartlett J., and Miller C. (2012). Introducing Social Media Intelligence (SOCMINT), Intelligence and National Security 27(6), 801-823.
  • Social Networking Statistics, [Online]. Available: http://www.statisticbrain.com/social-networking-statistics/ Latest Access Time for the website is 29 December 2014.
  • Steele Robert D. (1995). The Importance of Open Source Intelligence to the Military, International Journal of Intelligence and Counter Intelligence, 8(4), 457-470.
  • Top 15 Most Popular Social Networking Sites, [Online]. Available: http://www.ebizmba.com/articles/social-networking-websites., Latest Access Time for the website is 29 December 2014.
  • World Internet Usage and Population Statistics, [Online]. Available: http://www.internetworldstats.com/stats.htm Latest Access Time for the website is 29 December 2014
Year 2015, Volume: 3 Issue: 3, 79 - 87, 04.05.2015
https://doi.org/10.17858/jmisci.92863

Abstract

References

  • ADRP 2-0 Intelligence (2012), Headquarters, Department of the US Army.
  • Allied Command Transformation, “Bi-Strategic Command, Knowledge Development Concept (2008), Pre-Doctrinal Handbook.
  • ATP 2-22.9 Open Source Intelligence (2012). Headquarters, Department of the US Army.
  • Bartlett J., Miller C., Crump J. and Middleton L. (2013). Policing in an Information Age, CASM Policy Paper.
  • Bartlett, Jamie, and Miller C. (2013). The State of The Art: A Literature Review of Social Media Intelligence Capabilities for Counter-Terrorism.
  • Biermann J., et al. (2004). From Unstructured to Structured Information in Military Intelligence-Some Steps to Improve Information Fusion. FGAN-FKIE, Wachtberg Germany, .3-8.
  • Bunnik A. (2014, August). Opportunities and Ethics of SOCMINT: Practices for State Agencies in the Netherlands, Inaugural VOX-Pol Conference, Centre for Applied Research in Security Innovation (CASI) 29 Aug. 2014.
  • Fischer, E., and Reuber, A. R. (2011). Social Interaction via New Social Media :(How) can Interactions on Twitter Affect Effectual Thinking and Behavior? Journal of Business Venturing, 26, 1-18.
  • Friedman R. S. (1998). Open Source Intelligence, Parameters, 28(2), 159-165.
  • Friedman R. S. (2002). Review Essay – Open Source Intelligence, in NATO Open Source Intelligence Reader, Supreme Allied Command Atlantic (SACLANT), Norfolk VA, US.
  • Gannon J. (2001). The Strategic Use of Open-Source Information, Studies in Intelligence, 45(3), 67.
  • JP 2-0 Joint Intelligence (2013). Headquarters, Department of CJCS, GL-8.
  • Kaplan, A. M. and Haenlein M. (2010). Users of the World, Unite! The Challenges and Opportunities of Social Media. Business Horizons, 53(1), 59-68.
  • Lewis B. K. (2009). Social Media and Strategic Communications: Attitudes and Perceptions among College Students. (Doctoral Dissertation, Oklahoma State University).
  • Lindsay, Bruce R. (2011). Social Media and Disasters: Current Uses, Future Options, and Policy Considerations, Vol. 41987. Congressional Research Service.
  • Omand, D., Bartlett J., and Miller C. (2012). Introducing Social Media Intelligence (SOCMINT), Intelligence and National Security 27(6), 801-823.
  • Social Networking Statistics, [Online]. Available: http://www.statisticbrain.com/social-networking-statistics/ Latest Access Time for the website is 29 December 2014.
  • Steele Robert D. (1995). The Importance of Open Source Intelligence to the Military, International Journal of Intelligence and Counter Intelligence, 8(4), 457-470.
  • Top 15 Most Popular Social Networking Sites, [Online]. Available: http://www.ebizmba.com/articles/social-networking-websites., Latest Access Time for the website is 29 December 2014.
  • World Internet Usage and Population Statistics, [Online]. Available: http://www.internetworldstats.com/stats.htm Latest Access Time for the website is 29 December 2014
There are 20 citations in total.

Details

Primary Language English
Journal Section Reports
Authors

Cetin Arslan

Murat Yanık

Publication Date May 4, 2015
Published in Issue Year 2015 Volume: 3 Issue: 3

Cite

APA Arslan, C., & Yanık, M. (2015). How to Make Social Media More Effective as an Exploitation Area. Journal of Management and Information Science, 3(3), 79-87. https://doi.org/10.17858/jmisci.92863
AMA Arslan C, Yanık M. How to Make Social Media More Effective as an Exploitation Area. JMISCI. May 2015;3(3):79-87. doi:10.17858/jmisci.92863
Chicago Arslan, Cetin, and Murat Yanık. “How to Make Social Media More Effective As an Exploitation Area”. Journal of Management and Information Science 3, no. 3 (May 2015): 79-87. https://doi.org/10.17858/jmisci.92863.
EndNote Arslan C, Yanık M (May 1, 2015) How to Make Social Media More Effective as an Exploitation Area. Journal of Management and Information Science 3 3 79–87.
IEEE C. Arslan and M. Yanık, “How to Make Social Media More Effective as an Exploitation Area”, JMISCI, vol. 3, no. 3, pp. 79–87, 2015, doi: 10.17858/jmisci.92863.
ISNAD Arslan, Cetin - Yanık, Murat. “How to Make Social Media More Effective As an Exploitation Area”. Journal of Management and Information Science 3/3 (May 2015), 79-87. https://doi.org/10.17858/jmisci.92863.
JAMA Arslan C, Yanık M. How to Make Social Media More Effective as an Exploitation Area. JMISCI. 2015;3:79–87.
MLA Arslan, Cetin and Murat Yanık. “How to Make Social Media More Effective As an Exploitation Area”. Journal of Management and Information Science, vol. 3, no. 3, 2015, pp. 79-87, doi:10.17858/jmisci.92863.
Vancouver Arslan C, Yanık M. How to Make Social Media More Effective as an Exploitation Area. JMISCI. 2015;3(3):79-87.