首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
Civilian Police Oversight: A Contemporary Review of Police Oversight Mechanisms in Europe, Australia and Africa 民警监督:欧洲、澳大利亚和非洲警察监督机制的当代回顾
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-05-05 DOI: 10.1080/19361610.2021.1918524
Ishmael Mugari
Abstract This paper, which is based on literature and documentary survey, explores civilian police oversight mechanisms in Europe, Australia and Africa. The paper reveals that Europe has several nations with independent institutions to investigate police misconduct; thought there is limited empirical research on the effectiveness of these institutions. Independent police oversight institutions in Australia have limited investigative powers and they are more of review boards. Two African countries- Kenya and South Africa have independent institutions to investigate police misconduct, though the effectiveness of these two institutions has been questioned.
摘要本文在文献和文献调查的基础上,探讨了欧洲、澳大利亚和非洲的民警监督机制。该文件显示,欧洲有几个国家拥有独立的机构来调查警察的不当行为;认为对这些制度有效性的实证研究是有限的。澳大利亚的独立警察监督机构的调查权力有限,更多的是审查委员会。肯尼亚和南非这两个非洲国家有独立的机构来调查警察的不当行为,尽管这两个机构的有效性受到了质疑。
{"title":"Civilian Police Oversight: A Contemporary Review of Police Oversight Mechanisms in Europe, Australia and Africa","authors":"Ishmael Mugari","doi":"10.1080/19361610.2021.1918524","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918524","url":null,"abstract":"Abstract This paper, which is based on literature and documentary survey, explores civilian police oversight mechanisms in Europe, Australia and Africa. The paper reveals that Europe has several nations with independent institutions to investigate police misconduct; thought there is limited empirical research on the effectiveness of these institutions. Independent police oversight institutions in Australia have limited investigative powers and they are more of review boards. Two African countries- Kenya and South Africa have independent institutions to investigate police misconduct, though the effectiveness of these two institutions has been questioned.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"106 - 127"},"PeriodicalIF":1.3,"publicationDate":"2021-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918524","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41565859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Strong Designated Verifier Signature Scheme with Hybrid Cryptographic Hard Problems 具有混合密码难题的强指定验证者签名方案
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-04-27 DOI: 10.1080/19361610.2021.1907273
N. Shapuan, E. S. Ismail
Abstract The security of the most of the existing strong designated verifier signature (SDVS) scheme are based on a single cryptographic hard problem. Although these schemes seem secure today, there is a possibility for an adversary to find a solution for this problem in the future and if this happens, then such SDVS schemes will no longer be secure. We develop a new SDVS scheme based on hybrid problems; factorization and discrete logarithm. The new developed scheme provides a greater security level than those previous designated SDVS schemes and satisfies the security properties and requirements of a SDVS scheme.
摘要现有的大多数强指定验证者签名(SDVS)方案的安全性都是基于单个密码难题。尽管这些方案在今天看来是安全的,但对手在未来有可能找到解决这个问题的方案,如果发生这种情况,那么这种SDVS方案将不再安全。我们开发了一个新的基于混合问题的SDVS方案;因子分解和离散对数。新开发的方案比以前指定的SDVS方案提供了更高的安全级别,并满足SDVS方案的安全特性和要求。
{"title":"A Strong Designated Verifier Signature Scheme with Hybrid Cryptographic Hard Problems","authors":"N. Shapuan, E. S. Ismail","doi":"10.1080/19361610.2021.1907273","DOIUrl":"https://doi.org/10.1080/19361610.2021.1907273","url":null,"abstract":"Abstract The security of the most of the existing strong designated verifier signature (SDVS) scheme are based on a single cryptographic hard problem. Although these schemes seem secure today, there is a possibility for an adversary to find a solution for this problem in the future and if this happens, then such SDVS schemes will no longer be secure. We develop a new SDVS scheme based on hybrid problems; factorization and discrete logarithm. The new developed scheme provides a greater security level than those previous designated SDVS schemes and satisfies the security properties and requirements of a SDVS scheme.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"546 - 558"},"PeriodicalIF":1.3,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1907273","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44012655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interpersonal Relationships in the 1996–1997 Japanese Embassy Hostage Crisis in Peru: A View from Relational Development Theory 关系发展理论视角下的1996-1997年秘鲁日本大使馆人质危机中的人际关系
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-04-10 DOI: 10.1080/19361610.2021.1908102
A. Nguyen, Jonathan Matusitz
Abstract This paper applies relational development theory to the Japanese embassy hostage crisis that took place in Lima, Peru (from December 1996 to April 1997). During the hostage crisis, members of the Túpac Amaru Revolutionary Movement (MRTA), a Peruvian terrorist organization, stormed the Japanese embassy in Lima and took hundreds of people hostage. They presented their demands to the Peruvian government in exchange for the safety of the hostages. Developed by Mark L. Knapp, the theory describes how interactants—e.g., couples, negotiators, and so forth—go through relationship stages to strengthen their interpersonal communication or social bond. In this conceptual analysis, two important relationships are explored: (1) The relationship between the MRTA and the hostages and (2) the relationship between the MRTA and the Peruvian government (including President Fujimori). Overall, the authors of this analysis found that the MRTA-hostage relationship was ultimately more favorable than the Fujimori-MRTA relationship.
本文将关系发展理论应用于1996年12月至1997年4月发生在秘鲁利马的日本大使馆人质危机。在人质危机中,秘鲁恐怖组织“Túpac阿马鲁革命运动”(MRTA)成员袭击了日本驻利马大使馆,劫持了数百名人质。他们向秘鲁政府提出要求,以换取人质的安全。这个理论是由马克·l·纳普提出的,它描述了相互作用——例如:夫妻、谈判者等等,都要经历关系的各个阶段,以加强他们的人际沟通或社会联系。在这个概念分析中,探讨了两个重要的关系:(1)MRTA与人质之间的关系;(2)MRTA与秘鲁政府(包括藤森总统)之间的关系。总的来说,本分析的作者发现mrta -人质关系最终比藤森- mrta关系更有利。
{"title":"Interpersonal Relationships in the 1996–1997 Japanese Embassy Hostage Crisis in Peru: A View from Relational Development Theory","authors":"A. Nguyen, Jonathan Matusitz","doi":"10.1080/19361610.2021.1908102","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908102","url":null,"abstract":"Abstract This paper applies relational development theory to the Japanese embassy hostage crisis that took place in Lima, Peru (from December 1996 to April 1997). During the hostage crisis, members of the Túpac Amaru Revolutionary Movement (MRTA), a Peruvian terrorist organization, stormed the Japanese embassy in Lima and took hundreds of people hostage. They presented their demands to the Peruvian government in exchange for the safety of the hostages. Developed by Mark L. Knapp, the theory describes how interactants—e.g., couples, negotiators, and so forth—go through relationship stages to strengthen their interpersonal communication or social bond. In this conceptual analysis, two important relationships are explored: (1) The relationship between the MRTA and the hostages and (2) the relationship between the MRTA and the Peruvian government (including President Fujimori). Overall, the authors of this analysis found that the MRTA-hostage relationship was ultimately more favorable than the Fujimori-MRTA relationship.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"1 - 17"},"PeriodicalIF":1.3,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42324502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lebanon’s Single Most Destructive Explosion – Terrorists Plan to Copy and Provision against Such Accidents 黎巴嫩最具破坏性的一次爆炸——恐怖分子计划复制并防范此类事故
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-04-10 DOI: 10.1080/19361610.2021.1873681
L. Chunlin, R. Gunaratna
Abstract Explosives continue to be the primary tactic used by terrorists across the world and given the high security risk faced by mega infrastructure, a systematic security risk assessment framework is proposed in this paper. Classification and rating criteria are established for this framework pertaining to threat/vulnerability and impact/consequence assessment, based on which asset risk rating can be calculated. The proposed risk assessment framework refines the author’s previous work of risk rating criteria and evaluates risks in both qualitative and quantitative ways. Risk ratings are classified both numerically and in color codes for the ease of analysis and application. This framework is validated in a case study of risk assessment of a mega infrastructure facility and can support further risk management and investment policy. A case study of a chemical facility utilizing the risk assessment framework is provided.
摘要针对大型基础设施面临的高安全风险,本文提出了一个系统的安全风险评估框架。为该框架建立了与威胁/脆弱性和影响/后果评估有关的分类和评级标准,可根据这些标准计算资产风险评级。本文提出的风险评估框架完善了作者之前的风险评级标准,从定性和定量两方面对风险进行评估。为了便于分析和应用,风险等级以数字和颜色代码进行分类。该框架在大型基础设施风险评估的案例研究中得到验证,可以支持进一步的风险管理和投资政策。提供了一个利用风险评估框架的化学设施的案例研究。
{"title":"Lebanon’s Single Most Destructive Explosion – Terrorists Plan to Copy and Provision against Such Accidents","authors":"L. Chunlin, R. Gunaratna","doi":"10.1080/19361610.2021.1873681","DOIUrl":"https://doi.org/10.1080/19361610.2021.1873681","url":null,"abstract":"Abstract Explosives continue to be the primary tactic used by terrorists across the world and given the high security risk faced by mega infrastructure, a systematic security risk assessment framework is proposed in this paper. Classification and rating criteria are established for this framework pertaining to threat/vulnerability and impact/consequence assessment, based on which asset risk rating can be calculated. The proposed risk assessment framework refines the author’s previous work of risk rating criteria and evaluates risks in both qualitative and quantitative ways. Risk ratings are classified both numerically and in color codes for the ease of analysis and application. This framework is validated in a case study of risk assessment of a mega infrastructure facility and can support further risk management and investment policy. A case study of a chemical facility utilizing the risk assessment framework is provided.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"310 - 331"},"PeriodicalIF":1.3,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1873681","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47641409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Image Tampering Detection Using Multilevel Local Binary Pattern Texture Descriptor 基于多级局部二值模式纹理描述符的数字图像篡改检测
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-04-09 DOI: 10.1080/19361610.2021.1883397
Vikas Srivastava, S. Yadav
Abstract Digital images can be manipulated using the latest tools and techniques without leaving any visible traces. Image tampering detection is required to authenticate image validation. It is concluded from previous research that image tampering modifies the texture micropattern in a digital image. Therefore, texture descriptors can be applied to highlight these changes. A texture descriptor–based technique is proposed for detecting both copy-move and splicing forgery. In the proposed method, an RGB image is converted into a YCbCr image and Cb and Cr image components are extracted, as these components are more sensitive to tampering artifacts. Further, a standard deviation (STD) filter and higher-order texture descriptors are applied on Cb and Cr components. The STD filter is used to highlight important details of objects in the image. A support vector machine classifier is used to classify forged and tampered images. Support vector machine (SVM) classifier gives good results on both large- and small-image data sets. The performance is appraised in three online-available, widely used data sets: CASIA v1.0, CASIA v2.0, and Columbia. The proposed method outperforms most of the state-of-the-art methods.
数字图像可以使用最新的工具和技术进行处理,而不会留下任何可见的痕迹。需要图像篡改检测来验证图像验证。以往的研究表明,图像篡改会改变数字图像中的纹理微图案。因此,纹理描述符可以用来突出这些变化。提出了一种基于纹理描述符的复制-移动和拼接伪造检测方法。该方法将RGB图像转换为YCbCr图像,提取Cb和Cr图像分量,因为这些分量对篡改伪影更敏感。此外,在Cb和Cr分量上应用了标准偏差(STD)滤波器和高阶纹理描述符。STD过滤器用于突出显示图像中物体的重要细节。采用支持向量机分类器对伪造和篡改图像进行分类。支持向量机分类器在大图像和小图像数据集上都有很好的分类效果。性能在三个在线可用的、广泛使用的数据集中进行评估:CASIA v1.0、CASIA v2.0和Columbia。所提出的方法优于大多数最先进的方法。
{"title":"Digital Image Tampering Detection Using Multilevel Local Binary Pattern Texture Descriptor","authors":"Vikas Srivastava, S. Yadav","doi":"10.1080/19361610.2021.1883397","DOIUrl":"https://doi.org/10.1080/19361610.2021.1883397","url":null,"abstract":"Abstract Digital images can be manipulated using the latest tools and techniques without leaving any visible traces. Image tampering detection is required to authenticate image validation. It is concluded from previous research that image tampering modifies the texture micropattern in a digital image. Therefore, texture descriptors can be applied to highlight these changes. A texture descriptor–based technique is proposed for detecting both copy-move and splicing forgery. In the proposed method, an RGB image is converted into a YCbCr image and Cb and Cr image components are extracted, as these components are more sensitive to tampering artifacts. Further, a standard deviation (STD) filter and higher-order texture descriptors are applied on Cb and Cr components. The STD filter is used to highlight important details of objects in the image. A support vector machine classifier is used to classify forged and tampered images. Support vector machine (SVM) classifier gives good results on both large- and small-image data sets. The performance is appraised in three online-available, widely used data sets: CASIA v1.0, CASIA v2.0, and Columbia. The proposed method outperforms most of the state-of-the-art methods.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"62 - 79"},"PeriodicalIF":1.3,"publicationDate":"2021-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1883397","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48551846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Impact of the Aviation Industry on International Security Threats, Case Study of Health Threats (2002–2020) 航空业对国际安全威胁的影响,健康威胁案例研究(2002-2020)
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-04-06 DOI: 10.1080/19361610.2021.1896280
A. Salehian, M. H. Sheikholeslami
Abstract Technologies and communication devices, especially those used in the military area, such as the invention of the atomic bomb or radar, have revolutionized security studies. But this impact is not limited to military technology. Things like the aviation industry have also had an impact on 21st-century security and new threats by changing the social relation on human life. Countries faced with new threats, such as the Covid-19 pandemic, led us to examine the root of the creation and globalization of such threats. Given that the aviation industry has the absolute ability to transfer any type of person or factor in the global arena with remarkable speed, this feature makes the aviation industry a platform for the spread of threats and evolve them as a transnational threat. Given the increasing growth of the aviation industry and its far-reaching effects on the international community, the field of security threats has also evolved due to the effects of this technology. This article, to understand how the aviation industry affects security threats, examines the examples of health threats and based on that, a hypothesis about the impact of this industry on the evolution of threats.
摘要技术和通信设备,特别是那些用于军事领域的技术和设备,如原子弹或雷达的发明,已经彻底改变了安全研究。但这种影响并不局限于军事技术。航空业等行业也通过改变人类生活的社会关系,对21世纪的安全和新的威胁产生了影响。面临新冠肺炎大流行等新威胁的国家促使我们审视了这种威胁的产生和全球化的根源。鉴于航空业有绝对能力以惊人的速度在全球舞台上转移任何类型的人或因素,这一特点使航空业成为威胁传播的平台,并将其演变为跨国威胁。鉴于航空业的日益增长及其对国际社会的深远影响,安全威胁领域也因这一技术的影响而发生了变化。为了了解航空业如何影响安全威胁,本文考察了健康威胁的例子,并在此基础上提出了一个关于航空业对威胁演变的影响的假设。
{"title":"The Impact of the Aviation Industry on International Security Threats, Case Study of Health Threats (2002–2020)","authors":"A. Salehian, M. H. Sheikholeslami","doi":"10.1080/19361610.2021.1896280","DOIUrl":"https://doi.org/10.1080/19361610.2021.1896280","url":null,"abstract":"Abstract Technologies and communication devices, especially those used in the military area, such as the invention of the atomic bomb or radar, have revolutionized security studies. But this impact is not limited to military technology. Things like the aviation industry have also had an impact on 21st-century security and new threats by changing the social relation on human life. Countries faced with new threats, such as the Covid-19 pandemic, led us to examine the root of the creation and globalization of such threats. Given that the aviation industry has the absolute ability to transfer any type of person or factor in the global arena with remarkable speed, this feature makes the aviation industry a platform for the spread of threats and evolve them as a transnational threat. Given the increasing growth of the aviation industry and its far-reaching effects on the international community, the field of security threats has also evolved due to the effects of this technology. This article, to understand how the aviation industry affects security threats, examines the examples of health threats and based on that, a hypothesis about the impact of this industry on the evolution of threats.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"477 - 496"},"PeriodicalIF":1.3,"publicationDate":"2021-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1896280","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45860499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction 修正
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-04-03 DOI: 10.1080/19361610.2021.1901035
Methanias Colaço
{"title":"Correction","authors":"Methanias Colaço","doi":"10.1080/19361610.2021.1901035","DOIUrl":"https://doi.org/10.1080/19361610.2021.1901035","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"16 1","pages":"279 - 279"},"PeriodicalIF":1.3,"publicationDate":"2021-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1901035","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41356649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Support and Its Link to Workplace Trust Among Correctional Staff: An Exploratory Research Note 惩教人员的社会支持及其与工作场所信任的关系:一项探索性研究
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-04-03 DOI: 10.1080/19361610.2021.1879613
E. Lambert, Mia Abboud Holbrook, N. Hogan, James B. Wells, K. I. Minor
Abstract Private security staff play an important role in protecting society, including those who work in private prisons. Working in a private prison is a demanding job. Staff are responsible to ensure that the correctional facility is safe, secure, and humane. Past research has found that organizational trust, in terms of supervisor and management trust, influences private prison staff in many outcome areas, such as job involvement, job satisfaction, organizational commitment, job stress, feeling at risk at work, and job burnout; however, there is a dearth of research on how workplace variables may contribute to organizational trust. The current study examined how the major forms of social support (family, coworkers, supervisor, and management) were related to supervisor trust and management trust among 160 staff at a private U.S. prison. Based on ordinary least squares (OLS) multivariate regression, the results indicated coworker, supervisor, and management support each had significant positive effects on supervisor trust, with supervisor support having the largest effect. In another OLS multivariate regression analysis, family, supervisor, and management support had significant positive effects on management trust, with management support having the largest effect. The findings suggest that private prison administrators should consider increasing all four forms of social support in order to raise both supervisor and management trust. It would be a valuable investment in staff.
摘要私人保安人员在保护社会方面发挥着重要作用,包括那些在私人监狱工作的人。在私人监狱工作是一项要求很高的工作。工作人员有责任确保惩教设施的安全、可靠和人道。过去的研究发现,就主管和管理层的信任而言,组织信任在许多结果领域影响私人监狱工作人员,如工作参与度、工作满意度、组织承诺、工作压力、工作风险感和工作倦怠;然而,关于工作场所变量如何促进组织信任的研究却很少。目前的研究调查了美国一所私立监狱160名工作人员的主要社会支持形式(家庭、同事、主管和管理层)与主管信任和管理层信任的关系。基于普通最小二乘(OLS)多元回归,结果表明,同事、主管和管理支持对主管信任均具有显著的正向影响,其中主管支持的影响最大。在另一项OLS多元回归分析中,家庭、主管和管理支持对管理信任有显著的正向影响,其中管理支持的影响最大。研究结果表明,私人监狱管理人员应考虑增加所有四种形式的社会支持,以提高监管人员和管理人员的信任。这将是对员工的宝贵投资。
{"title":"Social Support and Its Link to Workplace Trust Among Correctional Staff: An Exploratory Research Note","authors":"E. Lambert, Mia Abboud Holbrook, N. Hogan, James B. Wells, K. I. Minor","doi":"10.1080/19361610.2021.1879613","DOIUrl":"https://doi.org/10.1080/19361610.2021.1879613","url":null,"abstract":"Abstract Private security staff play an important role in protecting society, including those who work in private prisons. Working in a private prison is a demanding job. Staff are responsible to ensure that the correctional facility is safe, secure, and humane. Past research has found that organizational trust, in terms of supervisor and management trust, influences private prison staff in many outcome areas, such as job involvement, job satisfaction, organizational commitment, job stress, feeling at risk at work, and job burnout; however, there is a dearth of research on how workplace variables may contribute to organizational trust. The current study examined how the major forms of social support (family, coworkers, supervisor, and management) were related to supervisor trust and management trust among 160 staff at a private U.S. prison. Based on ordinary least squares (OLS) multivariate regression, the results indicated coworker, supervisor, and management support each had significant positive effects on supervisor trust, with supervisor support having the largest effect. In another OLS multivariate regression analysis, family, supervisor, and management support had significant positive effects on management trust, with management support having the largest effect. The findings suggest that private prison administrators should consider increasing all four forms of social support in order to raise both supervisor and management trust. It would be a valuable investment in staff.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"16 1","pages":"147 - 167"},"PeriodicalIF":1.3,"publicationDate":"2021-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1879613","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48381110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Systematic Literature Review on Private Security Governance by Government 政府私人保安治理的系统文献综述
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-03-11 DOI: 10.1080/19361610.2021.1883398
Vigneswary Pranava Rasahugan, Samihah Khalil
Abstract Private security governance has gained increased attention from the government for the governance mechanism but still remains fragmented. This paper attempts to clarify the governance of private security by government through a systematic review of literature. The review process contributed to four themes which addressed three major trends. First is the response of government toward the governance objective, set by either public actors or in collaboration by both public and private actors. Second is the coordination mechanism adapted by the government in handling multiple governors from public and private security industries. Third is the regulatory mechanism of the private security industry adhered to by the government.
私人安全治理作为一种治理机制,越来越受到政府的重视,但仍处于碎片化状态。本文试图通过对文献的系统梳理,厘清政府对私人安全的治理。审查过程促成了涉及三个主要趋势的四个主题。首先是政府对治理目标的反应,这些目标要么是由公共行为者设定的,要么是由公共和私人行为者共同设定的。二是政府在处理公私保安行业多方管理者时所适应的协调机制。三是政府对私人保安行业坚持的监管机制。
{"title":"Systematic Literature Review on Private Security Governance by Government","authors":"Vigneswary Pranava Rasahugan, Samihah Khalil","doi":"10.1080/19361610.2021.1883398","DOIUrl":"https://doi.org/10.1080/19361610.2021.1883398","url":null,"abstract":"Abstract Private security governance has gained increased attention from the government for the governance mechanism but still remains fragmented. This paper attempts to clarify the governance of private security by government through a systematic review of literature. The review process contributed to four themes which addressed three major trends. First is the response of government toward the governance objective, set by either public actors or in collaboration by both public and private actors. Second is the coordination mechanism adapted by the government in handling multiple governors from public and private security industries. Third is the regulatory mechanism of the private security industry adhered to by the government.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"426 - 450"},"PeriodicalIF":1.3,"publicationDate":"2021-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1883398","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45803453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Violence Resembling Terrorism—From the First Responder Viewpoint 类似恐怖主义的暴力——从第一响应者的角度看
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-03-09 DOI: 10.1080/19361610.2021.1889895
Tero Ihatsu, Soili Paananen, Teija Sederholm
Abstract Terrorist attacks, school shootings, and other man-made incidents are demanding situations for first responders and society as a whole. Currently used concepts, like “active shooter” and “mass killing,” are typically created from the point of view of the perpetrator(s) or based on the incident site or the number of victims. In this paper, six police pretrial investigation records and four reports by the Investigation Commission are analyzed using inductive content analysis. The aim of the research is to determine attributes of violence resembling terrorism by approaching the subject from the position of first responders. Based on these attributes, the concept of violence resembling terrorism (VRT) is then created. VRT as a research unit produces essentially more empirical data, which is an advantage for research both on the academic level and in the more practical branches of security education.
恐怖袭击、校园枪击案和其他人为事件对急救人员和整个社会都有很高的要求。目前使用的概念,如“活跃枪手”和“大规模杀戮”,通常是从肇事者的角度或基于事件地点或受害者的数量来创造的。本文采用归纳内容分析法对6份警方审前侦查笔录和4份侦查委员会报告进行分析。这项研究的目的是通过从第一反应者的角度来确定暴力行为与恐怖主义相似的属性。基于这些属性,类似恐怖主义的暴力(VRT)概念由此产生。VRT作为一个研究单位,本质上产生了更多的经验数据,这对于学术层面的研究和更实际的安全教育分支来说都是一个优势。
{"title":"Violence Resembling Terrorism—From the First Responder Viewpoint","authors":"Tero Ihatsu, Soili Paananen, Teija Sederholm","doi":"10.1080/19361610.2021.1889895","DOIUrl":"https://doi.org/10.1080/19361610.2021.1889895","url":null,"abstract":"Abstract Terrorist attacks, school shootings, and other man-made incidents are demanding situations for first responders and society as a whole. Currently used concepts, like “active shooter” and “mass killing,” are typically created from the point of view of the perpetrator(s) or based on the incident site or the number of victims. In this paper, six police pretrial investigation records and four reports by the Investigation Commission are analyzed using inductive content analysis. The aim of the research is to determine attributes of violence resembling terrorism by approaching the subject from the position of first responders. Based on these attributes, the concept of violence resembling terrorism (VRT) is then created. VRT as a research unit produces essentially more empirical data, which is an advantage for research both on the academic level and in the more practical branches of security education.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"451 - 476"},"PeriodicalIF":1.3,"publicationDate":"2021-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1889895","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46567267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1