Privacy concerns and acceptance factors of osint for cybersecurity: A representative survey

T Riebe - Technology Assessment of Dual-Use ICTs: How to …, 2023 - Springer
Abstract The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity
threats is gaining popularity among many organizations. This is especially relevant to …

Key Challenges and Limitations of the OSINT Framework in the Context of Cybersecurity

D Govardhan, GGSH Krishna, V Charan… - … Conference on Edge …, 2023 - ieeexplore.ieee.org
In today's world, Open-Source Intelligence (OSINT) has gained popularity as a method of
gathering data, both for cyber-attacks and detecting cyber threats. It involves using publicly …

Assessing the Impact of Security Behavior on the Awareness of Open-Source Intelligence: A Quantitative Study of IT Knowledge Workers.

DB Daniels III - ProQuest LLC, 2014 - ERIC
There is a lack of literature linking end-user behavior to the availability of open-source
intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of …

Designing Privacy-Aware IoT Applications for Unregulated Domains

N Alhirabi, S Beaumont, O Rana, C Perera - ACM Transactions on …, 2024 - dl.acm.org
Internet of Things (IoT) applications (apps) are challenging to design because of the
heterogeneous systems on which they are deployed. IoT devices and apps may collect and …

[PDF][PDF] Privacy and Ethical Implications of IoT Data Collection and Usage

A Egon, F Temiloluwa - Journal of Computer Science, 2023 - researchgate.net
The rapid proliferation of Internet of Things (IoT) devices has brought about numerous
benefits, but it also raises significant privacy and ethical concerns. This paper examines the …

ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities

G González-Granadillo, M Faiella, I Medeiros… - Journal of Information …, 2021 - Elsevier
Abstract Open Source Intelligence (OSINT) data is collected by publicly available sources to
be used by intelligence contexts among which Threat Intelligence Platforms (TIPs) are the …

How national CSIRTs leverage public data, OSINT and free tools in operational practices: An empirical study

SRBM Kassim, S Li, B Arief - Cyber Security: A Peer-Reviewed …, 2022 - ingentaconnect.com
Computer security incident response teams (CSIRTs) have been established at national and
organisational levels to coordinate responses to computer security incidents. It is known that …

Confident privacy decision-making in IoT environments

H Lee, A Kobsa - ACM Transactions on Computer-Human Interaction …, 2019 - dl.acm.org
Researchers are building Internet of Things (IoT) systems that aim to raise users' privacy
awareness, so that these users can make informed privacy decisions. However, there is a …

Privacy expectations and preferences in an {IoT} world

PE Naeini, S Bhagavatula, H Habib… - … symposium on usable …, 2017 - usenix.org
With the rapid deployment of Internet of Things (IoT) technologies and the variety of ways in
which IoT-connected sensors collect and use personal data, there is a need for …

Five common misconceptions about privacy-preserving internet of things

MA Alsheikh - IEEE Communications Magazine, 2022 - ieeexplore.ieee.org
Billions of devices in the Internet of Things (IoT) collect sensitive data about people, creating
data privacy risks and breach vulnerabilities. Accordingly, data privacy preservation is vital …