1. The web never forgets: persistent tracking mechanisms in the wild;Acar;ACM conference on computer and communications security,2014
2. Cybervetting: Internet searches for vetting, investigations, and open-source intelligence;Appel,2014
3. Big data’s end run around anonymity and consent;Barocas,2014
4. The state of the art: a literature review of social media intelligence capabilities for counter-terrorism;Bartlett;Demos,2013
5. The state of the art: A literature review of social media intelligence capabilities for counter-terrorism;Bartlett;Demos,2013