As an adjunct professor at Utica College, I come across many research papers while teaching Cyber Intelligence, Cyber Counterintelligence and Principles of Cybercrime ( http://www.onlineuticacollege.com/programs/masters-cybersecurity.asp ).
Below is the executive summary of one such paper by Rebecca J. Rohan. The actual paper can be found at the link on the bottom of this page. I believe it to be very timely and an extremely interesting read.
Social networking is discussed along with applications of social networking by criminals, the United States, foreign governments, law enforcement, and employers. Once applications of social networking are presented, relationships will be drawn between social networking applications and CI methods including deception and counterintelligence operations. Legal, ethical, and privacy issues surrounding the use of social networking will be presented.
With the understanding of social networking applications, CI methods, and various issues, protective measures for both individuals and organizations will be discussed. Discussion of how social networking issues and the intelligence life cycle will be presented. Suggestions for how individuals, organizations, and intelligence analysts can identify and remediate issues in using social networking will be noted. Understanding the importance of social networking and its related issues will better prepare individuals, organizations, and intelligence agencies to employ it wisely.
To download and view this paper - http://www.treadstone71.com/whitepapers/SocialNetworking_Counterintelligence_CyberCounterintelligence_Rebecca_Rohan.pdf