PL EN RU
SYSTEMATISATION OF CONCEPTS RELATED TO METHODS AND SOURCES OF GATHERING INFORMATION FOR THE INFOBROKERING
 
 
Подробнее
Скрыть детали
1
absolwent Akademii Obrony Narodowej w Warszawie
 
 
Дата публикации: 2020-01-15
 
 
Studia Politologiczne 2019;54
 
КЛЮЧЕВЫЕ СЛОВА:
СТАТЬЯ:
The dynamic development of technology causes the need to organize existing and conceptualize new methods of gathering information. Current typology contained in the doctrinal documents of NATO and the United States Army partially corresponds to the possibilities offered by new technologies. Noteworthy are also the proposals for new disciplines, which in recent years appeared in the literature. The analysis includes reflection about the new trends in the work of the information broker.
PEER REVIEW INFORMATION
Article has been screened for originality
 
ЛИТЕРАТУРА (28)
1.
Aid M.M., Measurement and Signature Intelligence, [w:] R. Dover, M.S. Goodman, C. Hillebrand (red.), Routledge Companion to Intelligence Studies, Londyn 2014.
 
2.
Aleksandrowicz T.R., Podstawy walki informacyjnej, Warszawa 2016.
 
3.
Aleksandrowicz T.A., Biały wywiad w walce z terroryzmem, [w:] K. Liedel, P. Piasecka (red.), Rola mediów w przeciwdziałaniu terroryzmowi, Warszawa 2009.
 
4.
Barr N., Pennycook G., Stolz J.A., Fugelsang J.A., The Brain in Your Pocket: Evidence that Smartphones are Used to Supplant Thinking, „Computers in Human Behavior” 2015, nr 48.
 
5.
Castells M., The Rise of the Network Society. The Information Age. Economy, Society and Culture. Volume 1, Oxford 1996.
 
6.
Ciecierski M., Wywiad biznesowy w korporacjach transnarodowych. Teoria i praktyka, Toruń 2009.
 
7.
Cillario L., Il capitalismo cognitivo: Saper, sfruttamento e accumulazione dopo la rivoluzione informatica, [w:] L. Cillario i in. (red.), Trasformazione e persistenza. Saggi sulla storicità, Mediolan 1990.
 
8.
Clark A., Chalmers D., The Extended Mind, „Analysis” 1998, t. 58, nr 1.
 
9.
Dukaj J., Smartfon jest protezą naszego umysłu, „Rozmowy o Przyszłości”, Onet News, (wideo), https://www.youtube.com/watch?... (dostęp: 19.01.2019).
 
10.
Elvy S., Paying for Privacy and the Personal Data Economy, „Columbia Law Review” 2017, t. 117, nr 6.
 
11.
Favarel-Garrigues G., Godefroy T., Lascoumes P., Reluctant Partners? Banks in the Fight against Money Laundering and Terrorism Financing in France, „Security Dialogue” 2011, nr 42(2).
 
12.
Giles M., Bounty Hunters Tracked People Secretly Using US Phone Giants Location Data, „MIT Technology Review”, 7.02.2019, https://www.technologyreview.c... (dostęp: 8.02.2019).
 
13.
Hurley M.M., For and from Cyberspace Conceptualizing Cyber Intelligence, Surveillance, and Reconnaissance, „Air and Space Power Journal” 2012, nr 26(6).
 
14.
Jamil G.L., Santos L.H.R., Alves M.L., Furbino L., A Design Framework for a Market Intelligence System for Healthcare Sector: a Support Decision Tool in an Emergent Economy, [w:] Handbook on Research of ICTs for Social Services and Healthcare: Developments and Applications, Hershey 2012.
 
15.
Jani K.P., Soni A., Promise and Perils of Big Data Science for Intelligence Community, [w:] M.E. Kosal (red.), Technology and the Intelligence Community Challenges and Advances for the 21st Century, Cham 2018.
 
16.
Liaropoulos A.N., The Challenge of Social Media for the Intelligence Community, „Journal of Mediterranean and Balkan Intelligence” 2013, nr 1(1).
 
17.
Loper M.L., Situational Awareness in Megacities, [w:] M.E. Kosal (red.), Technology and the Intelligence Community Challenges and Advances for the 21st Century, Cham 2018.
 
18.
Mercado S.C., Sailing the Sea of OSINT in the Information Age, „Studies in Intelligence” (CIA Journal) 2004, t. 48, nr 3.
 
19.
Murch R., A Perspective on the Strategy of Intelligence, [w:] V. Radosavljevic, I. Banjari, G. Belojevic (red.), Defence Against Bioterrorism. Methods for Prevention and Control, Dordrecht 2018.
 
20.
Omand D., Bartlett J., Miller C., Introducing Social Media Intelligence (SOCMINT), „Intelligence and National Security” 2012, nr 27(6).
 
21.
Płoszajski P., Big Data: nowe źródło przewag i wzrostu firm, „E-mentor” 2013, nr 3(50).
 
22.
Porter M.E., Competitive Advantage: Creating and Sustaining Superior Performance, Nowy Jork 2008.
 
23.
Saramak B., Wykorzystanie otwartych źródeł informacji w działalności wywiadowczej: historia, praktyka, perspektywy, Warszawa 2015.
 
24.
Selding P.B. de, Pentagon Struggles with Avalanche of Data, SpaceNews, 29.11.2011, https:// spacenews.com/pentagon-struggles-avalanche-data (dostęp: 19.10.2011).
 
25.
Shane S., These are the Ads Russia Bought on Facebook in 2016, „The New York Times”, 1.11.2017, https://www.nytimes.com/2017/1.... html (dostęp: 19.02.2019).
 
26.
Svendsen A.D.M., Collective Intelligence (COLINT), [w:] Encyclopedia of U.S. Intelligence, Nowy Jork 2015.
 
27.
Svendsen A.D.M., Introducing RESINT: A Missing and Undervalued „INT” in All-Source Intelligence Efforts, „International Journal of Intelligence and CounterIntelligence” 2013, nr 26.
 
28.
Vines P., Roesner F., Kohno T., Exploring ADINT: Using Ad Targeting for Surveillance on a Budget – or – How Alice Can Buy Ads to Track Bob, Waszyngton 2017, https://adint.cs.washington.ed... (dostęp: 15.07.2018).
 
ISSN:1640-8888
Journals System - logo
Scroll to top