Pub Date : 2024-08-02DOI: 10.1080/19361610.2024.2386180
Judith Harris, Hsiao-Ming Wang
Campus security and crime prevention is a critical issue to the police department of any educational institutions in the United States. The article interviewed a police chief with doctorate degree ...
{"title":"Campus Security and Crime Prevention: A View from a Police Chief with a Ph.D. in Criminology","authors":"Judith Harris, Hsiao-Ming Wang","doi":"10.1080/19361610.2024.2386180","DOIUrl":"https://doi.org/10.1080/19361610.2024.2386180","url":null,"abstract":"Campus security and crime prevention is a critical issue to the police department of any educational institutions in the United States. The article interviewed a police chief with doctorate degree ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-27DOI: 10.1080/19361610.2024.2385200
Ismail Onat, Oguzhan Basibuyuk, Mustafa Bal, H. Duru, Kadir Akyuz
{"title":"Group-Motivated and Periodic Fire Setting for Terrorism in Urban Landscapes: An Analysis in Time and Space","authors":"Ismail Onat, Oguzhan Basibuyuk, Mustafa Bal, H. Duru, Kadir Akyuz","doi":"10.1080/19361610.2024.2385200","DOIUrl":"https://doi.org/10.1080/19361610.2024.2385200","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141798414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-04DOI: 10.1080/19361610.2024.2372989
Fahad Nabeel, Khuram Iqbal
Advancements in information and communication technologies have increased the vulnerabilities surrounding our personal data. The absence of privacy by design in digital devices has allowed them to ...
{"title":"Privacy, Data Protection and Cyber Crimes: Mapping Perceptions of Pakistani Users","authors":"Fahad Nabeel, Khuram Iqbal","doi":"10.1080/19361610.2024.2372989","DOIUrl":"https://doi.org/10.1080/19361610.2024.2372989","url":null,"abstract":"Advancements in information and communication technologies have increased the vulnerabilities surrounding our personal data. The absence of privacy by design in digital devices has allowed them to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141613479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.1080/19361610.2024.2368962
Brian R. Johnson, Jennifer Marson-Reed, C. Kierkus, Adrian Copeland
{"title":"Human Rights Policies, Guidelines, and Standards in The Private Security Industry: A Scoping Review","authors":"Brian R. Johnson, Jennifer Marson-Reed, C. Kierkus, Adrian Copeland","doi":"10.1080/19361610.2024.2368962","DOIUrl":"https://doi.org/10.1080/19361610.2024.2368962","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141714496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study proposes a framework integrating Routine Activities Theory into a hybrid physical-virtual space. Utilizing a space-time path metaphor, it explores phishing susceptibility in relation to ...
{"title":"Theoretical and Experimental Framework for Estimating Cyber Victimization Risk in a Hybrid Physical-Virtual World","authors":"Ling Wu, Suphanut Jamonnak, Xinyue Ye, Shih-Lung Shaw, Nitesh Saxena, Kyung-Shick Choi","doi":"10.1080/19361610.2024.2368969","DOIUrl":"https://doi.org/10.1080/19361610.2024.2368969","url":null,"abstract":"This study proposes a framework integrating Routine Activities Theory into a hybrid physical-virtual space. Utilizing a space-time path metaphor, it explores phishing susceptibility in relation to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-29DOI: 10.1080/19361610.2024.2358272
Jordan Allison
Amidst security concerns, there has become an increased focus on ensuring cybersecurity becomes a mainstream part of higher education. Cybersecurity requires the development of technical and non-te...
{"title":"Cybersecurity Risk Management Scenarios for Teaching Information Security Management","authors":"Jordan Allison","doi":"10.1080/19361610.2024.2358272","DOIUrl":"https://doi.org/10.1080/19361610.2024.2358272","url":null,"abstract":"Amidst security concerns, there has become an increased focus on ensuring cybersecurity becomes a mainstream part of higher education. Cybersecurity requires the development of technical and non-te...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-22DOI: 10.1080/19361610.2024.2356431
Moyank Giri, Sivaraman Eswaran, Prasad B Honnavalli, Daniel D
{"title":"Automated and Interpretable Fake News Detection With Explainable Artificial Intelligence","authors":"Moyank Giri, Sivaraman Eswaran, Prasad B Honnavalli, Daniel D","doi":"10.1080/19361610.2024.2356431","DOIUrl":"https://doi.org/10.1080/19361610.2024.2356431","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141110835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-11DOI: 10.1080/19361610.2024.2351736
David M. Bergman
{"title":"Law-Abiding Criminals: How a Group of Military Over-Interested Persons Became a Threat Against National Security","authors":"David M. Bergman","doi":"10.1080/19361610.2024.2351736","DOIUrl":"https://doi.org/10.1080/19361610.2024.2351736","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140987446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-15DOI: 10.1080/19361610.2024.2341477
Ghady X. Hbeilini, Jared R. Dmello
Mexican cartel activity has become increasingly violent, causing civilians to question the government’s ability to defend against this social and political threat. Within this context, the current ...
{"title":"The Rise of #Cartels: Exploring the Organizational Operations and Messaging of Public Perception on Twitter","authors":"Ghady X. Hbeilini, Jared R. Dmello","doi":"10.1080/19361610.2024.2341477","DOIUrl":"https://doi.org/10.1080/19361610.2024.2341477","url":null,"abstract":"Mexican cartel activity has become increasingly violent, causing civilians to question the government’s ability to defend against this social and political threat. Within this context, the current ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140562504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}