IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

In Plaintext: Electronic Profiling in Public Online Spaces

In Plaintext: Electronic Profiling in Public Online Spaces
View Sample PDF
Author(s): Shalin Hai-Jew (Hutchinson Community College, USA)
Copyright: 2014
Pages: 34
Source title: Remote Workforce Training: Effective Technologies and Strategies
Source Author(s)/Editor(s): Shalin Hai-Jew (Hutchinson Community College, USA)
DOI: 10.4018/978-1-4666-5137-1.ch011

Purchase

View In Plaintext: Electronic Profiling in Public Online Spaces on the publisher's website for pricing and purchasing information.

Abstract

People have long gone online to groom their online identities, to communicate some aspects of themselves in the real. The information shared is purposive and strategic. Inevitably, the information is selective and incomplete. The cyber may evoke something about the physical only to a degree, in the cyber-physical confluence. In an asymmetrical information environment, those who have the most accurate and requisite information often have the advantage. It is said that much of intelligence is conducted using Open-Source Intelligence (OSINT), which suggests a need for reading between the lines of publicly released information; indeed, much of life is conducted in online public spaces. A number of tools enable the extraction and analysis of information from public sites. When used in combination, these tools may create a fairly clear sense of the online presences of various individuals or organizations or networks online for increased transparency. This chapter describes some of the tools (Maltego Radium™ and Network Overview, Discovery, and Exploration for Excel/NodeXL™) that may be used to increase the knowability of others in the creation of various profiles. This includes some light applications of “inference attacks” based on publicly available information. Further information may be captured from the Hidden Web through tools designed to crawl that understructure, and this potential is addressed a little as well.

Related Content

Sunil Ramlall, Ted Cross, Michelle Love. © 2022. 13 pages.
Huri B. Kose, Isha Kalanee, Yetkin Yildirim. © 2022. 13 pages.
Zeynep Merve Ünal. © 2022. 28 pages.
Sharon Kehl Califano. © 2022. 16 pages.
Miary Andriamiarisoa. © 2022. 23 pages.
Matthew Williwam Hurtienne. © 2022. 17 pages.
Emily Guetzoian. © 2022. 18 pages.
Body Bottom