Pub Date : 2024-08-02DOI: 10.1080/19361610.2024.2386180
Judith Harris, Hsiao-Ming Wang
Campus security and crime prevention is a critical issue to the police department of any educational institutions in the United States. The article interviewed a police chief with doctorate degree ...
{"title":"Campus Security and Crime Prevention: A View from a Police Chief with a Ph.D. in Criminology","authors":"Judith Harris, Hsiao-Ming Wang","doi":"10.1080/19361610.2024.2386180","DOIUrl":"https://doi.org/10.1080/19361610.2024.2386180","url":null,"abstract":"Campus security and crime prevention is a critical issue to the police department of any educational institutions in the United States. The article interviewed a police chief with doctorate degree ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"45 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-04DOI: 10.1080/19361610.2024.2372989
Fahad Nabeel, Khuram Iqbal
Advancements in information and communication technologies have increased the vulnerabilities surrounding our personal data. The absence of privacy by design in digital devices has allowed them to ...
{"title":"Privacy, Data Protection and Cyber Crimes: Mapping Perceptions of Pakistani Users","authors":"Fahad Nabeel, Khuram Iqbal","doi":"10.1080/19361610.2024.2372989","DOIUrl":"https://doi.org/10.1080/19361610.2024.2372989","url":null,"abstract":"Advancements in information and communication technologies have increased the vulnerabilities surrounding our personal data. The absence of privacy by design in digital devices has allowed them to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"2011 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141613479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study proposes a framework integrating Routine Activities Theory into a hybrid physical-virtual space. Utilizing a space-time path metaphor, it explores phishing susceptibility in relation to ...
{"title":"Theoretical and Experimental Framework for Estimating Cyber Victimization Risk in a Hybrid Physical-Virtual World","authors":"Ling Wu, Suphanut Jamonnak, Xinyue Ye, Shih-Lung Shaw, Nitesh Saxena, Kyung-Shick Choi","doi":"10.1080/19361610.2024.2368969","DOIUrl":"https://doi.org/10.1080/19361610.2024.2368969","url":null,"abstract":"This study proposes a framework integrating Routine Activities Theory into a hybrid physical-virtual space. Utilizing a space-time path metaphor, it explores phishing susceptibility in relation to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"1 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-29DOI: 10.1080/19361610.2024.2358272
Jordan Allison
Amidst security concerns, there has become an increased focus on ensuring cybersecurity becomes a mainstream part of higher education. Cybersecurity requires the development of technical and non-te...
{"title":"Cybersecurity Risk Management Scenarios for Teaching Information Security Management","authors":"Jordan Allison","doi":"10.1080/19361610.2024.2358272","DOIUrl":"https://doi.org/10.1080/19361610.2024.2358272","url":null,"abstract":"Amidst security concerns, there has become an increased focus on ensuring cybersecurity becomes a mainstream part of higher education. Cybersecurity requires the development of technical and non-te...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"23 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-15DOI: 10.1080/19361610.2024.2341477
Ghady X. Hbeilini, Jared R. Dmello
Mexican cartel activity has become increasingly violent, causing civilians to question the government’s ability to defend against this social and political threat. Within this context, the current ...
{"title":"The Rise of #Cartels: Exploring the Organizational Operations and Messaging of Public Perception on Twitter","authors":"Ghady X. Hbeilini, Jared R. Dmello","doi":"10.1080/19361610.2024.2341477","DOIUrl":"https://doi.org/10.1080/19361610.2024.2341477","url":null,"abstract":"Mexican cartel activity has become increasingly violent, causing civilians to question the government’s ability to defend against this social and political threat. Within this context, the current ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"48 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140562504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1080/19361610.2024.2331885
Suyesha Singh, Vaishnavi Nambiar
Online Child sexual abuse (OCSA) is a major menace in the digitalized world. Every year, more than a billion children between the ages of 2–17 years are sexually abused. Despite the harsh reality o...
{"title":"Role of Artificial Intelligence in the Prevention of Online Child Sexual Abuse: A Systematic Review of Literature","authors":"Suyesha Singh, Vaishnavi Nambiar","doi":"10.1080/19361610.2024.2331885","DOIUrl":"https://doi.org/10.1080/19361610.2024.2331885","url":null,"abstract":"Online Child sexual abuse (OCSA) is a major menace in the digitalized world. Every year, more than a billion children between the ages of 2–17 years are sexually abused. Despite the harsh reality o...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"300 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140598097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-26DOI: 10.1080/19361610.2024.2322238
Jared R. Dmello, Christine H. Neudecker
Climate change is a global phenomenon that has been associated with a growing list of concerns in society today, often leaving more questions than answers. Thus, it is no surprise that questions ar...
{"title":"Monsoon Marauders and Summer Violence: Exploring the Spatial Relationship between Climate Change and Terrorist Activity in India","authors":"Jared R. Dmello, Christine H. Neudecker","doi":"10.1080/19361610.2024.2322238","DOIUrl":"https://doi.org/10.1080/19361610.2024.2322238","url":null,"abstract":"Climate change is a global phenomenon that has been associated with a growing list of concerns in society today, often leaving more questions than answers. Thus, it is no surprise that questions ar...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"54 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139977801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-19DOI: 10.1080/19361610.2024.2314392
Ram Krishn Mishra, Abdul Rahmaan Ansari, J. Angel Arul Jothi, Vinaytosh Mishra
This research intends to provide law enforcement organizations with a deep learning model that uses trends in past crimes to forecast future crimes. The study will enable them to dispatch security ...
{"title":"Analysis of Criminal Landscape by Utilizing Statistical Analysis and Deep Learning Techniques","authors":"Ram Krishn Mishra, Abdul Rahmaan Ansari, J. Angel Arul Jothi, Vinaytosh Mishra","doi":"10.1080/19361610.2024.2314392","DOIUrl":"https://doi.org/10.1080/19361610.2024.2314392","url":null,"abstract":"This research intends to provide law enforcement organizations with a deep learning model that uses trends in past crimes to forecast future crimes. The study will enable them to dispatch security ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"20 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139910357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-12DOI: 10.1080/19361610.2024.2314405
Liqun Cao, Xiaohan Mei, Jiayu Li
This paper explores the correlates of mass shooting severity in the United States. Relying on the stacked data from 1966 to 2022 in the Violence Project (version 5), we developed a model of mass sh...
{"title":"Correlates of Severity of Mass Public Shootings in the United States, 1966–2022","authors":"Liqun Cao, Xiaohan Mei, Jiayu Li","doi":"10.1080/19361610.2024.2314405","DOIUrl":"https://doi.org/10.1080/19361610.2024.2314405","url":null,"abstract":"This paper explores the correlates of mass shooting severity in the United States. Relying on the stacked data from 1966 to 2022 in the Violence Project (version 5), we developed a model of mass sh...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"217 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139769588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime scene suspect prediction involves classifying potential perpetrators based on location, time, and crime type. Electronic forensics in large data scenarios poses challenges for investigators. ...
{"title":"An Investigation of Crime Detection Using Artificial Intelligence and Face Sketch Synthesis","authors":"Rajesh Natarajan, Natesh Mahadev, Shashi Kant Gupta, Badria Sulaiman Alfurhood","doi":"10.1080/19361610.2024.2302237","DOIUrl":"https://doi.org/10.1080/19361610.2024.2302237","url":null,"abstract":"Crime scene suspect prediction involves classifying potential perpetrators based on location, time, and crime type. Electronic forensics in large data scenarios poses challenges for investigators. ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"323 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139579602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}