首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
Campus Security and Crime Prevention: A View from a Police Chief with a Ph.D. in Criminology 校园安全与犯罪预防:一位拥有犯罪学博士学位的警察局长的观点
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2024-08-02 DOI: 10.1080/19361610.2024.2386180
Judith Harris, Hsiao-Ming Wang
Campus security and crime prevention is a critical issue to the police department of any educational institutions in the United States. The article interviewed a police chief with doctorate degree ...
校园安全和犯罪预防对于美国任何教育机构的警察部门来说都是一个至关重要的问题。文章采访了一位拥有博士学位的警察局长。
{"title":"Campus Security and Crime Prevention: A View from a Police Chief with a Ph.D. in Criminology","authors":"Judith Harris, Hsiao-Ming Wang","doi":"10.1080/19361610.2024.2386180","DOIUrl":"https://doi.org/10.1080/19361610.2024.2386180","url":null,"abstract":"Campus security and crime prevention is a critical issue to the police department of any educational institutions in the United States. The article interviewed a police chief with doctorate degree ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group-Motivated and Periodic Fire Setting for Terrorism in Urban Landscapes: An Analysis in Time and Space 城市景观中为恐怖主义目的的群体动机和周期性放火:时空分析
IF 1.1 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2024-07-27 DOI: 10.1080/19361610.2024.2385200
Ismail Onat, Oguzhan Basibuyuk, Mustafa Bal, H. Duru, Kadir Akyuz
{"title":"Group-Motivated and Periodic Fire Setting for Terrorism in Urban Landscapes: An Analysis in Time and Space","authors":"Ismail Onat, Oguzhan Basibuyuk, Mustafa Bal, H. Duru, Kadir Akyuz","doi":"10.1080/19361610.2024.2385200","DOIUrl":"https://doi.org/10.1080/19361610.2024.2385200","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141798414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy, Data Protection and Cyber Crimes: Mapping Perceptions of Pakistani Users 隐私、数据保护和网络犯罪:了解巴基斯坦用户的看法
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2024-07-04 DOI: 10.1080/19361610.2024.2372989
Fahad Nabeel, Khuram Iqbal
Advancements in information and communication technologies have increased the vulnerabilities surrounding our personal data. The absence of privacy by design in digital devices has allowed them to ...
信息和通信技术的进步增加了我们个人数据的脆弱性。数字设备在设计上缺乏隐私保护,这使它们能够......
{"title":"Privacy, Data Protection and Cyber Crimes: Mapping Perceptions of Pakistani Users","authors":"Fahad Nabeel, Khuram Iqbal","doi":"10.1080/19361610.2024.2372989","DOIUrl":"https://doi.org/10.1080/19361610.2024.2372989","url":null,"abstract":"Advancements in information and communication technologies have increased the vulnerabilities surrounding our personal data. The absence of privacy by design in digital devices has allowed them to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141613479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey of Social Engineering Attacks: Taxonomy of Attacks, Prevention, and Mitigation Strategies 社会工程学攻击综合调查:攻击分类、预防和缓解策略
IF 1.1 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2024-07-02 DOI: 10.1080/19361610.2024.2372986
Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain
{"title":"A Comprehensive Survey of Social Engineering Attacks: Taxonomy of Attacks, Prevention, and Mitigation Strategies","authors":"Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain","doi":"10.1080/19361610.2024.2372986","DOIUrl":"https://doi.org/10.1080/19361610.2024.2372986","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141688378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Rights Policies, Guidelines, and Standards in The Private Security Industry: A Scoping Review 私营保安行业的人权政策、准则和标准:范围审查
IF 1.1 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2024-07-01 DOI: 10.1080/19361610.2024.2368962
Brian R. Johnson, Jennifer Marson-Reed, C. Kierkus, Adrian Copeland
{"title":"Human Rights Policies, Guidelines, and Standards in The Private Security Industry: A Scoping Review","authors":"Brian R. Johnson, Jennifer Marson-Reed, C. Kierkus, Adrian Copeland","doi":"10.1080/19361610.2024.2368962","DOIUrl":"https://doi.org/10.1080/19361610.2024.2368962","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141714496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical and Experimental Framework for Estimating Cyber Victimization Risk in a Hybrid Physical-Virtual World 估算物理-虚拟混合世界中网络受害风险的理论和实验框架
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2024-06-17 DOI: 10.1080/19361610.2024.2368969
Ling Wu, Suphanut Jamonnak, Xinyue Ye, Shih-Lung Shaw, Nitesh Saxena, Kyung-Shick Choi
This study proposes a framework integrating Routine Activities Theory into a hybrid physical-virtual space. Utilizing a space-time path metaphor, it explores phishing susceptibility in relation to ...
本研究提出了一个将常规活动理论融入物理-虚拟混合空间的框架。它利用时空路径隐喻,探讨了网络钓鱼易感性与...
{"title":"Theoretical and Experimental Framework for Estimating Cyber Victimization Risk in a Hybrid Physical-Virtual World","authors":"Ling Wu, Suphanut Jamonnak, Xinyue Ye, Shih-Lung Shaw, Nitesh Saxena, Kyung-Shick Choi","doi":"10.1080/19361610.2024.2368969","DOIUrl":"https://doi.org/10.1080/19361610.2024.2368969","url":null,"abstract":"This study proposes a framework integrating Routine Activities Theory into a hybrid physical-virtual space. Utilizing a space-time path metaphor, it explores phishing susceptibility in relation to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Risk Management Scenarios for Teaching Information Security Management 用于信息安全管理教学的网络安全风险管理场景
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2024-05-29 DOI: 10.1080/19361610.2024.2358272
Jordan Allison
Amidst security concerns, there has become an increased focus on ensuring cybersecurity becomes a mainstream part of higher education. Cybersecurity requires the development of technical and non-te...
在对安全问题的关注中,人们越来越重视确保网络安全成为高等教育的主流。网络安全要求培养技术和非技术方面的人才。
{"title":"Cybersecurity Risk Management Scenarios for Teaching Information Security Management","authors":"Jordan Allison","doi":"10.1080/19361610.2024.2358272","DOIUrl":"https://doi.org/10.1080/19361610.2024.2358272","url":null,"abstract":"Amidst security concerns, there has become an increased focus on ensuring cybersecurity becomes a mainstream part of higher education. Cybersecurity requires the development of technical and non-te...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated and Interpretable Fake News Detection With Explainable Artificial Intelligence 利用可解释人工智能自动检测和解释假新闻
IF 1.3 Q1 Social Sciences Pub Date : 2024-05-22 DOI: 10.1080/19361610.2024.2356431
Moyank Giri, Sivaraman Eswaran, Prasad B Honnavalli, Daniel D
{"title":"Automated and Interpretable Fake News Detection With Explainable Artificial Intelligence","authors":"Moyank Giri, Sivaraman Eswaran, Prasad B Honnavalli, Daniel D","doi":"10.1080/19361610.2024.2356431","DOIUrl":"https://doi.org/10.1080/19361610.2024.2356431","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141110835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Law-Abiding Criminals: How a Group of Military Over-Interested Persons Became a Threat Against National Security 守法罪犯:一群过度关注军事的人如何成为危害国家安全的威胁
IF 1.3 Q1 Social Sciences Pub Date : 2024-05-11 DOI: 10.1080/19361610.2024.2351736
David M. Bergman
{"title":"Law-Abiding Criminals: How a Group of Military Over-Interested Persons Became a Threat Against National Security","authors":"David M. Bergman","doi":"10.1080/19361610.2024.2351736","DOIUrl":"https://doi.org/10.1080/19361610.2024.2351736","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140987446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Rise of #Cartels: Exploring the Organizational Operations and Messaging of Public Perception on Twitter 卡特尔的崛起:探索推特上公众认知的组织运作和信息传递
IF 1.3 Q1 Social Sciences Pub Date : 2024-04-15 DOI: 10.1080/19361610.2024.2341477
Ghady X. Hbeilini, Jared R. Dmello
Mexican cartel activity has become increasingly violent, causing civilians to question the government’s ability to defend against this social and political threat. Within this context, the current ...
墨西哥贩毒集团的活动越来越暴力,导致平民质疑政府是否有能力抵御这一社会和政治威胁。在此背景下,当前的...
{"title":"The Rise of #Cartels: Exploring the Organizational Operations and Messaging of Public Perception on Twitter","authors":"Ghady X. Hbeilini, Jared R. Dmello","doi":"10.1080/19361610.2024.2341477","DOIUrl":"https://doi.org/10.1080/19361610.2024.2341477","url":null,"abstract":"Mexican cartel activity has become increasingly violent, causing civilians to question the government’s ability to defend against this social and political threat. Within this context, the current ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140562504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1