首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
A Review on Cryptocurrencies Security 加密货币安全综述
IF 1.3 Q1 Social Sciences Pub Date : 2021-06-11 DOI: 10.1080/19361610.2021.1933322
T. M. Navamani
Abstract Security and privacy are the two terms that are well connected with the current trends in cryptocurrency, and this study gives an extensive review of the same. Cryptocurrency adds security to the transaction flow and regulates the formation of additional units of currency. The massive growth in the market assessment of cryptocurrency leads to misuse of deficiencies for profit by adversaries. In this study, a review was made to focus on the security and protection measurements of cryptocurrencies specifically on Bitcoin. This study describes cryptocurrency conventions, their usefulness, and communications within the framework.
摘要安全和隐私是与加密货币当前趋势密切相关的两个术语,本研究对此进行了广泛的回顾。加密货币为交易流增加了安全性,并规范了额外货币单位的形成。加密货币市场评估的巨大增长导致对手滥用缺陷牟利。在这项研究中,对加密货币的安全和保护措施进行了审查,特别是比特币。本研究描述了加密货币约定、它们的有用性以及框架内的通信。
{"title":"A Review on Cryptocurrencies Security","authors":"T. M. Navamani","doi":"10.1080/19361610.2021.1933322","DOIUrl":"https://doi.org/10.1080/19361610.2021.1933322","url":null,"abstract":"Abstract Security and privacy are the two terms that are well connected with the current trends in cryptocurrency, and this study gives an extensive review of the same. Cryptocurrency adds security to the transaction flow and regulates the formation of additional units of currency. The massive growth in the market assessment of cryptocurrency leads to misuse of deficiencies for profit by adversaries. In this study, a review was made to focus on the security and protection measurements of cryptocurrencies specifically on Bitcoin. This study describes cryptocurrency conventions, their usefulness, and communications within the framework.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1933322","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46761095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Security has Gone to Pot: An Analysis of Marijuana Cultivation Security Laws and Regulations in the United States 安全走向了大麻:美国大麻种植安全法律法规分析
IF 1.3 Q1 Social Sciences Pub Date : 2021-05-31 DOI: 10.1080/19361610.2021.1908103
Brian R. Johnson, C. Kierkus
Abstract Using the principle of defense in depth and Routine Activities Theory, and a qualitative methodology that led to the construction of themes and subthemes, it was found that the most common security requirements are related to detection-based elements that include camera-related and CCTV systems. Security requirements related to deterrence, delay, and response elements, while present in many states, are required to a lesser degree. These findings, therefore, suggest that not all state regulations and subsequent security policies have a comprehensive defense in depth strategy for the physical protection of commercial marijuana cultivation facilities.
摘要利用深度防御原理和日常活动理论,以及导致主题和子主题构建的定性方法,发现最常见的安全要求与基于检测的元素有关,包括与摄像头相关的和CCTV系统。与威慑、拖延和反应要素有关的安全要求虽然在许多州都存在,但要求的程度较低。因此,这些发现表明,并非所有的州法规和随后的安全政策都对商业大麻种植设施的物理保护有全面的纵深防御战略。
{"title":"Security has Gone to Pot: An Analysis of Marijuana Cultivation Security Laws and Regulations in the United States","authors":"Brian R. Johnson, C. Kierkus","doi":"10.1080/19361610.2021.1908103","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908103","url":null,"abstract":"Abstract Using the principle of defense in depth and Routine Activities Theory, and a qualitative methodology that led to the construction of themes and subthemes, it was found that the most common security requirements are related to detection-based elements that include camera-related and CCTV systems. Security requirements related to deterrence, delay, and response elements, while present in many states, are required to a lesser degree. These findings, therefore, suggest that not all state regulations and subsequent security policies have a comprehensive defense in depth strategy for the physical protection of commercial marijuana cultivation facilities.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48430996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ethical Issues in Police Robots. The Case of Crowd Control Robots in a Pandemic 警用机器人的伦理问题。流行病中的人群控制机器人案例
IF 1.3 Q1 Social Sciences Pub Date : 2021-05-27 DOI: 10.1080/19361610.2021.1923365
K. Szocik, Rakhat Abylkasymova
Abstract Progress in automatization and robotization is unavoidable. However, while progress in some fields is relatively rapid, others including policing seem to be untouched by automatization. This article discusses arguments which favor the use of police robots, in particular crowd control robots. The special case of pandemics is discussed. The article argues that while we have some ethical issues associated with crowd control robots, in general, the benefits are higher than the possible risks.
自动化和机器人化的进步是不可避免的。然而,尽管一些领域的进展相对较快,但包括警务在内的其他领域似乎没有受到自动化的影响。本文讨论了支持使用警用机器人,特别是人群控制机器人的论点。讨论了流行病的特殊情况。文章认为,虽然我们在人群控制机器人方面存在一些道德问题,但总的来说,其收益高于可能的风险。
{"title":"Ethical Issues in Police Robots. The Case of Crowd Control Robots in a Pandemic","authors":"K. Szocik, Rakhat Abylkasymova","doi":"10.1080/19361610.2021.1923365","DOIUrl":"https://doi.org/10.1080/19361610.2021.1923365","url":null,"abstract":"Abstract Progress in automatization and robotization is unavoidable. However, while progress in some fields is relatively rapid, others including policing seem to be untouched by automatization. This article discusses arguments which favor the use of police robots, in particular crowd control robots. The special case of pandemics is discussed. The article argues that while we have some ethical issues associated with crowd control robots, in general, the benefits are higher than the possible risks.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1923365","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47029418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Conceptual Model for Cybersecurity Governance 网络安全治理的概念模型
IF 1.3 Q1 Social Sciences Pub Date : 2021-05-10 DOI: 10.1080/19361610.2021.1918995
Salifu Yusif, Abdul Hafeez-Baig
Abstract Cybersecurity is a growing problem associated with everything an individual or an organization does that is facilitated by the Internet. It is a multi-facetted program that can be addressed by cybersecurity governance. However, research has shown that many organizations face at least five basic challenges of cybersecurity. In this study, we developed a model for an effective cybersecurity governance that hopes to address these challenges, conceptualized as factors that must continuously be measured and evaluated. They are: (1) Cybersecurity strategy; (2) Standardized processes, (3) Compliance, (4) Senior leadership oversight, and (5) Resources.
摘要网络安全是一个日益严重的问题,与个人或组织在互联网推动下所做的一切有关。这是一个多方面的计划,可以通过网络安全治理来解决。然而,研究表明,许多组织在网络安全方面至少面临五个基本挑战。在这项研究中,我们开发了一个有效的网络安全治理模型,希望解决这些挑战,将其概念化为必须不断衡量和评估的因素。它们是:(1)网络安全战略;(2) 标准化流程,(3)合规性,(4)高级领导监督,以及(5)资源。
{"title":"A Conceptual Model for Cybersecurity Governance","authors":"Salifu Yusif, Abdul Hafeez-Baig","doi":"10.1080/19361610.2021.1918995","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918995","url":null,"abstract":"Abstract Cybersecurity is a growing problem associated with everything an individual or an organization does that is facilitated by the Internet. It is a multi-facetted program that can be addressed by cybersecurity governance. However, research has shown that many organizations face at least five basic challenges of cybersecurity. In this study, we developed a model for an effective cybersecurity governance that hopes to address these challenges, conceptualized as factors that must continuously be measured and evaluated. They are: (1) Cybersecurity strategy; (2) Standardized processes, (3) Compliance, (4) Senior leadership oversight, and (5) Resources.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918995","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44187134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Adopting the Divide-and-Conquer Strategy for Use of Terrorists in Counterterrorism Through the Stag Hunt Game-Theoretic Environment 从阶段狩猎博弈论环境看利用恐怖分子实施分而治之的反恐策略
IF 1.3 Q1 Social Sciences Pub Date : 2021-05-06 DOI: 10.1080/19361610.2021.1908814
D. Atsa’am, R. Wario
Abstract This study interweaved the divide-and-conquer strategy with the stag hunt game to model a terrorism and counterterrorism environment. The records in the global terrorism database show that 98% of total terror attack incidents from 1970 to 2018 were targeted on law-abiding citizens/facilities, while 2% were targeted on terrorists. Three divide-and-conquer strategies are proposed: destruction of communication channels, payment of bribes, and fomenting distrust among terror groups. When these strategies are implemented, terrorists will effectively be used as tools in counterterrorism. Consequently, attacks on citizens will be reduced while attacks on terrorists will be increased.
本研究将分而治之策略与猎鹿游戏相结合,模拟恐怖主义和反恐环境。全球恐怖主义数据库记录显示,1970年至2018年,98%的恐怖袭击事件针对的是守法公民/设施,2%针对的是恐怖分子。他们提出了三种分而治之的策略:破坏沟通渠道、支付贿赂、煽动恐怖组织之间的不信任。一旦实施这些战略,恐怖分子将被有效地用作反恐的工具。因此,对市民的攻击将减少,而对恐怖分子的攻击将增加。
{"title":"Adopting the Divide-and-Conquer Strategy for Use of Terrorists in Counterterrorism Through the Stag Hunt Game-Theoretic Environment","authors":"D. Atsa’am, R. Wario","doi":"10.1080/19361610.2021.1908814","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908814","url":null,"abstract":"Abstract This study interweaved the divide-and-conquer strategy with the stag hunt game to model a terrorism and counterterrorism environment. The records in the global terrorism database show that 98% of total terror attack incidents from 1970 to 2018 were targeted on law-abiding citizens/facilities, while 2% were targeted on terrorists. Three divide-and-conquer strategies are proposed: destruction of communication channels, payment of bribes, and fomenting distrust among terror groups. When these strategies are implemented, terrorists will effectively be used as tools in counterterrorism. Consequently, attacks on citizens will be reduced while attacks on terrorists will be increased.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908814","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48946097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advanced Classification Techniques for Improving Networks’ Intrusion Detection System Efficiency 提高网络入侵检测系统效率的高级分类技术
IF 1.3 Q1 Social Sciences Pub Date : 2021-05-05 DOI: 10.1080/19361610.2021.1918500
Mohammed Al-Enazi, Salim El Khediri
Abstract This research aims to enhance the accuracy and speed of the intrusion detection process by using the feature selection method to reduce the feature space dimensions that eliminate irrelevant features. Further, we employed ensemble learning in the UNSW-NB15 dataset, by using a classifier of the Stacking method, to prevent the intrusion detection system (IDS) from becoming archaic, to adjust it with a modern attack resistance feature, and to make it less costly. We used logistic regression as a meta-classifier and combined random forests, sequential minimal optimization (SMO), and naïve Bayes methods. Our approach allowed us to achieve 97.88% accuracy in intrusion detection.
摘要采用特征选择方法降低特征空间维数,剔除不相关特征,提高入侵检测过程的准确性和速度。此外,我们在UNSW-NB15数据集中使用集成学习,通过使用堆叠方法的分类器,防止入侵检测系统(IDS)过时,并使用现代攻击抵抗特征对其进行调整,并使其成本更低。我们使用逻辑回归作为元分类器,并结合随机森林、顺序最小优化(SMO)和naïve贝叶斯方法。我们的方法使我们在入侵检测中达到97.88%的准确率。
{"title":"Advanced Classification Techniques for Improving Networks’ Intrusion Detection System Efficiency","authors":"Mohammed Al-Enazi, Salim El Khediri","doi":"10.1080/19361610.2021.1918500","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918500","url":null,"abstract":"Abstract This research aims to enhance the accuracy and speed of the intrusion detection process by using the feature selection method to reduce the feature space dimensions that eliminate irrelevant features. Further, we employed ensemble learning in the UNSW-NB15 dataset, by using a classifier of the Stacking method, to prevent the intrusion detection system (IDS) from becoming archaic, to adjust it with a modern attack resistance feature, and to make it less costly. We used logistic regression as a meta-classifier and combined random forests, sequential minimal optimization (SMO), and naïve Bayes methods. Our approach allowed us to achieve 97.88% accuracy in intrusion detection.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918500","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42864338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Civilian Police Oversight: A Contemporary Review of Police Oversight Mechanisms in Europe, Australia and Africa 民警监督:欧洲、澳大利亚和非洲警察监督机制的当代回顾
IF 1.3 Q1 Social Sciences Pub Date : 2021-05-05 DOI: 10.1080/19361610.2021.1918524
Ishmael Mugari
Abstract This paper, which is based on literature and documentary survey, explores civilian police oversight mechanisms in Europe, Australia and Africa. The paper reveals that Europe has several nations with independent institutions to investigate police misconduct; thought there is limited empirical research on the effectiveness of these institutions. Independent police oversight institutions in Australia have limited investigative powers and they are more of review boards. Two African countries- Kenya and South Africa have independent institutions to investigate police misconduct, though the effectiveness of these two institutions has been questioned.
摘要本文在文献和文献调查的基础上,探讨了欧洲、澳大利亚和非洲的民警监督机制。该文件显示,欧洲有几个国家拥有独立的机构来调查警察的不当行为;认为对这些制度有效性的实证研究是有限的。澳大利亚的独立警察监督机构的调查权力有限,更多的是审查委员会。肯尼亚和南非这两个非洲国家有独立的机构来调查警察的不当行为,尽管这两个机构的有效性受到了质疑。
{"title":"Civilian Police Oversight: A Contemporary Review of Police Oversight Mechanisms in Europe, Australia and Africa","authors":"Ishmael Mugari","doi":"10.1080/19361610.2021.1918524","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918524","url":null,"abstract":"Abstract This paper, which is based on literature and documentary survey, explores civilian police oversight mechanisms in Europe, Australia and Africa. The paper reveals that Europe has several nations with independent institutions to investigate police misconduct; thought there is limited empirical research on the effectiveness of these institutions. Independent police oversight institutions in Australia have limited investigative powers and they are more of review boards. Two African countries- Kenya and South Africa have independent institutions to investigate police misconduct, though the effectiveness of these two institutions has been questioned.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918524","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41565859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Strong Designated Verifier Signature Scheme with Hybrid Cryptographic Hard Problems 具有混合密码难题的强指定验证者签名方案
IF 1.3 Q1 Social Sciences Pub Date : 2021-04-27 DOI: 10.1080/19361610.2021.1907273
N. Shapuan, E. S. Ismail
Abstract The security of the most of the existing strong designated verifier signature (SDVS) scheme are based on a single cryptographic hard problem. Although these schemes seem secure today, there is a possibility for an adversary to find a solution for this problem in the future and if this happens, then such SDVS schemes will no longer be secure. We develop a new SDVS scheme based on hybrid problems; factorization and discrete logarithm. The new developed scheme provides a greater security level than those previous designated SDVS schemes and satisfies the security properties and requirements of a SDVS scheme.
摘要现有的大多数强指定验证者签名(SDVS)方案的安全性都是基于单个密码难题。尽管这些方案在今天看来是安全的,但对手在未来有可能找到解决这个问题的方案,如果发生这种情况,那么这种SDVS方案将不再安全。我们开发了一个新的基于混合问题的SDVS方案;因子分解和离散对数。新开发的方案比以前指定的SDVS方案提供了更高的安全级别,并满足SDVS方案的安全特性和要求。
{"title":"A Strong Designated Verifier Signature Scheme with Hybrid Cryptographic Hard Problems","authors":"N. Shapuan, E. S. Ismail","doi":"10.1080/19361610.2021.1907273","DOIUrl":"https://doi.org/10.1080/19361610.2021.1907273","url":null,"abstract":"Abstract The security of the most of the existing strong designated verifier signature (SDVS) scheme are based on a single cryptographic hard problem. Although these schemes seem secure today, there is a possibility for an adversary to find a solution for this problem in the future and if this happens, then such SDVS schemes will no longer be secure. We develop a new SDVS scheme based on hybrid problems; factorization and discrete logarithm. The new developed scheme provides a greater security level than those previous designated SDVS schemes and satisfies the security properties and requirements of a SDVS scheme.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1907273","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44012655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interpersonal Relationships in the 1996–1997 Japanese Embassy Hostage Crisis in Peru: A View from Relational Development Theory 关系发展理论视角下的1996-1997年秘鲁日本大使馆人质危机中的人际关系
IF 1.3 Q1 Social Sciences Pub Date : 2021-04-10 DOI: 10.1080/19361610.2021.1908102
A. Nguyen, Jonathan Matusitz
Abstract This paper applies relational development theory to the Japanese embassy hostage crisis that took place in Lima, Peru (from December 1996 to April 1997). During the hostage crisis, members of the Túpac Amaru Revolutionary Movement (MRTA), a Peruvian terrorist organization, stormed the Japanese embassy in Lima and took hundreds of people hostage. They presented their demands to the Peruvian government in exchange for the safety of the hostages. Developed by Mark L. Knapp, the theory describes how interactants—e.g., couples, negotiators, and so forth—go through relationship stages to strengthen their interpersonal communication or social bond. In this conceptual analysis, two important relationships are explored: (1) The relationship between the MRTA and the hostages and (2) the relationship between the MRTA and the Peruvian government (including President Fujimori). Overall, the authors of this analysis found that the MRTA-hostage relationship was ultimately more favorable than the Fujimori-MRTA relationship.
本文将关系发展理论应用于1996年12月至1997年4月发生在秘鲁利马的日本大使馆人质危机。在人质危机中,秘鲁恐怖组织“Túpac阿马鲁革命运动”(MRTA)成员袭击了日本驻利马大使馆,劫持了数百名人质。他们向秘鲁政府提出要求,以换取人质的安全。这个理论是由马克·l·纳普提出的,它描述了相互作用——例如:夫妻、谈判者等等,都要经历关系的各个阶段,以加强他们的人际沟通或社会联系。在这个概念分析中,探讨了两个重要的关系:(1)MRTA与人质之间的关系;(2)MRTA与秘鲁政府(包括藤森总统)之间的关系。总的来说,本分析的作者发现mrta -人质关系最终比藤森- mrta关系更有利。
{"title":"Interpersonal Relationships in the 1996–1997 Japanese Embassy Hostage Crisis in Peru: A View from Relational Development Theory","authors":"A. Nguyen, Jonathan Matusitz","doi":"10.1080/19361610.2021.1908102","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908102","url":null,"abstract":"Abstract This paper applies relational development theory to the Japanese embassy hostage crisis that took place in Lima, Peru (from December 1996 to April 1997). During the hostage crisis, members of the Túpac Amaru Revolutionary Movement (MRTA), a Peruvian terrorist organization, stormed the Japanese embassy in Lima and took hundreds of people hostage. They presented their demands to the Peruvian government in exchange for the safety of the hostages. Developed by Mark L. Knapp, the theory describes how interactants—e.g., couples, negotiators, and so forth—go through relationship stages to strengthen their interpersonal communication or social bond. In this conceptual analysis, two important relationships are explored: (1) The relationship between the MRTA and the hostages and (2) the relationship between the MRTA and the Peruvian government (including President Fujimori). Overall, the authors of this analysis found that the MRTA-hostage relationship was ultimately more favorable than the Fujimori-MRTA relationship.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42324502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lebanon’s Single Most Destructive Explosion – Terrorists Plan to Copy and Provision against Such Accidents 黎巴嫩最具破坏性的一次爆炸——恐怖分子计划复制并防范此类事故
IF 1.3 Q1 Social Sciences Pub Date : 2021-04-10 DOI: 10.1080/19361610.2021.1873681
L. Chunlin, R. Gunaratna
Abstract Explosives continue to be the primary tactic used by terrorists across the world and given the high security risk faced by mega infrastructure, a systematic security risk assessment framework is proposed in this paper. Classification and rating criteria are established for this framework pertaining to threat/vulnerability and impact/consequence assessment, based on which asset risk rating can be calculated. The proposed risk assessment framework refines the author’s previous work of risk rating criteria and evaluates risks in both qualitative and quantitative ways. Risk ratings are classified both numerically and in color codes for the ease of analysis and application. This framework is validated in a case study of risk assessment of a mega infrastructure facility and can support further risk management and investment policy. A case study of a chemical facility utilizing the risk assessment framework is provided.
摘要针对大型基础设施面临的高安全风险,本文提出了一个系统的安全风险评估框架。为该框架建立了与威胁/脆弱性和影响/后果评估有关的分类和评级标准,可根据这些标准计算资产风险评级。本文提出的风险评估框架完善了作者之前的风险评级标准,从定性和定量两方面对风险进行评估。为了便于分析和应用,风险等级以数字和颜色代码进行分类。该框架在大型基础设施风险评估的案例研究中得到验证,可以支持进一步的风险管理和投资政策。提供了一个利用风险评估框架的化学设施的案例研究。
{"title":"Lebanon’s Single Most Destructive Explosion – Terrorists Plan to Copy and Provision against Such Accidents","authors":"L. Chunlin, R. Gunaratna","doi":"10.1080/19361610.2021.1873681","DOIUrl":"https://doi.org/10.1080/19361610.2021.1873681","url":null,"abstract":"Abstract Explosives continue to be the primary tactic used by terrorists across the world and given the high security risk faced by mega infrastructure, a systematic security risk assessment framework is proposed in this paper. Classification and rating criteria are established for this framework pertaining to threat/vulnerability and impact/consequence assessment, based on which asset risk rating can be calculated. The proposed risk assessment framework refines the author’s previous work of risk rating criteria and evaluates risks in both qualitative and quantitative ways. Risk ratings are classified both numerically and in color codes for the ease of analysis and application. This framework is validated in a case study of risk assessment of a mega infrastructure facility and can support further risk management and investment policy. A case study of a chemical facility utilizing the risk assessment framework is provided.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1873681","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47641409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1