Pub Date : 2021-05-05DOI: 10.1080/19361610.2021.1918524
Ishmael Mugari
Abstract This paper, which is based on literature and documentary survey, explores civilian police oversight mechanisms in Europe, Australia and Africa. The paper reveals that Europe has several nations with independent institutions to investigate police misconduct; thought there is limited empirical research on the effectiveness of these institutions. Independent police oversight institutions in Australia have limited investigative powers and they are more of review boards. Two African countries- Kenya and South Africa have independent institutions to investigate police misconduct, though the effectiveness of these two institutions has been questioned.
{"title":"Civilian Police Oversight: A Contemporary Review of Police Oversight Mechanisms in Europe, Australia and Africa","authors":"Ishmael Mugari","doi":"10.1080/19361610.2021.1918524","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918524","url":null,"abstract":"Abstract This paper, which is based on literature and documentary survey, explores civilian police oversight mechanisms in Europe, Australia and Africa. The paper reveals that Europe has several nations with independent institutions to investigate police misconduct; thought there is limited empirical research on the effectiveness of these institutions. Independent police oversight institutions in Australia have limited investigative powers and they are more of review boards. Two African countries- Kenya and South Africa have independent institutions to investigate police misconduct, though the effectiveness of these two institutions has been questioned.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"106 - 127"},"PeriodicalIF":1.3,"publicationDate":"2021-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918524","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41565859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-27DOI: 10.1080/19361610.2021.1907273
N. Shapuan, E. S. Ismail
Abstract The security of the most of the existing strong designated verifier signature (SDVS) scheme are based on a single cryptographic hard problem. Although these schemes seem secure today, there is a possibility for an adversary to find a solution for this problem in the future and if this happens, then such SDVS schemes will no longer be secure. We develop a new SDVS scheme based on hybrid problems; factorization and discrete logarithm. The new developed scheme provides a greater security level than those previous designated SDVS schemes and satisfies the security properties and requirements of a SDVS scheme.
{"title":"A Strong Designated Verifier Signature Scheme with Hybrid Cryptographic Hard Problems","authors":"N. Shapuan, E. S. Ismail","doi":"10.1080/19361610.2021.1907273","DOIUrl":"https://doi.org/10.1080/19361610.2021.1907273","url":null,"abstract":"Abstract The security of the most of the existing strong designated verifier signature (SDVS) scheme are based on a single cryptographic hard problem. Although these schemes seem secure today, there is a possibility for an adversary to find a solution for this problem in the future and if this happens, then such SDVS schemes will no longer be secure. We develop a new SDVS scheme based on hybrid problems; factorization and discrete logarithm. The new developed scheme provides a greater security level than those previous designated SDVS schemes and satisfies the security properties and requirements of a SDVS scheme.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"546 - 558"},"PeriodicalIF":1.3,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1907273","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44012655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-10DOI: 10.1080/19361610.2021.1908102
A. Nguyen, Jonathan Matusitz
Abstract This paper applies relational development theory to the Japanese embassy hostage crisis that took place in Lima, Peru (from December 1996 to April 1997). During the hostage crisis, members of the Túpac Amaru Revolutionary Movement (MRTA), a Peruvian terrorist organization, stormed the Japanese embassy in Lima and took hundreds of people hostage. They presented their demands to the Peruvian government in exchange for the safety of the hostages. Developed by Mark L. Knapp, the theory describes how interactants—e.g., couples, negotiators, and so forth—go through relationship stages to strengthen their interpersonal communication or social bond. In this conceptual analysis, two important relationships are explored: (1) The relationship between the MRTA and the hostages and (2) the relationship between the MRTA and the Peruvian government (including President Fujimori). Overall, the authors of this analysis found that the MRTA-hostage relationship was ultimately more favorable than the Fujimori-MRTA relationship.
{"title":"Interpersonal Relationships in the 1996–1997 Japanese Embassy Hostage Crisis in Peru: A View from Relational Development Theory","authors":"A. Nguyen, Jonathan Matusitz","doi":"10.1080/19361610.2021.1908102","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908102","url":null,"abstract":"Abstract This paper applies relational development theory to the Japanese embassy hostage crisis that took place in Lima, Peru (from December 1996 to April 1997). During the hostage crisis, members of the Túpac Amaru Revolutionary Movement (MRTA), a Peruvian terrorist organization, stormed the Japanese embassy in Lima and took hundreds of people hostage. They presented their demands to the Peruvian government in exchange for the safety of the hostages. Developed by Mark L. Knapp, the theory describes how interactants—e.g., couples, negotiators, and so forth—go through relationship stages to strengthen their interpersonal communication or social bond. In this conceptual analysis, two important relationships are explored: (1) The relationship between the MRTA and the hostages and (2) the relationship between the MRTA and the Peruvian government (including President Fujimori). Overall, the authors of this analysis found that the MRTA-hostage relationship was ultimately more favorable than the Fujimori-MRTA relationship.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"1 - 17"},"PeriodicalIF":1.3,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42324502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-10DOI: 10.1080/19361610.2021.1873681
L. Chunlin, R. Gunaratna
Abstract Explosives continue to be the primary tactic used by terrorists across the world and given the high security risk faced by mega infrastructure, a systematic security risk assessment framework is proposed in this paper. Classification and rating criteria are established for this framework pertaining to threat/vulnerability and impact/consequence assessment, based on which asset risk rating can be calculated. The proposed risk assessment framework refines the author’s previous work of risk rating criteria and evaluates risks in both qualitative and quantitative ways. Risk ratings are classified both numerically and in color codes for the ease of analysis and application. This framework is validated in a case study of risk assessment of a mega infrastructure facility and can support further risk management and investment policy. A case study of a chemical facility utilizing the risk assessment framework is provided.
{"title":"Lebanon’s Single Most Destructive Explosion – Terrorists Plan to Copy and Provision against Such Accidents","authors":"L. Chunlin, R. Gunaratna","doi":"10.1080/19361610.2021.1873681","DOIUrl":"https://doi.org/10.1080/19361610.2021.1873681","url":null,"abstract":"Abstract Explosives continue to be the primary tactic used by terrorists across the world and given the high security risk faced by mega infrastructure, a systematic security risk assessment framework is proposed in this paper. Classification and rating criteria are established for this framework pertaining to threat/vulnerability and impact/consequence assessment, based on which asset risk rating can be calculated. The proposed risk assessment framework refines the author’s previous work of risk rating criteria and evaluates risks in both qualitative and quantitative ways. Risk ratings are classified both numerically and in color codes for the ease of analysis and application. This framework is validated in a case study of risk assessment of a mega infrastructure facility and can support further risk management and investment policy. A case study of a chemical facility utilizing the risk assessment framework is provided.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"310 - 331"},"PeriodicalIF":1.3,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1873681","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47641409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-09DOI: 10.1080/19361610.2021.1883397
Vikas Srivastava, S. Yadav
Abstract Digital images can be manipulated using the latest tools and techniques without leaving any visible traces. Image tampering detection is required to authenticate image validation. It is concluded from previous research that image tampering modifies the texture micropattern in a digital image. Therefore, texture descriptors can be applied to highlight these changes. A texture descriptor–based technique is proposed for detecting both copy-move and splicing forgery. In the proposed method, an RGB image is converted into a YCbCr image and Cb and Cr image components are extracted, as these components are more sensitive to tampering artifacts. Further, a standard deviation (STD) filter and higher-order texture descriptors are applied on Cb and Cr components. The STD filter is used to highlight important details of objects in the image. A support vector machine classifier is used to classify forged and tampered images. Support vector machine (SVM) classifier gives good results on both large- and small-image data sets. The performance is appraised in three online-available, widely used data sets: CASIA v1.0, CASIA v2.0, and Columbia. The proposed method outperforms most of the state-of-the-art methods.
{"title":"Digital Image Tampering Detection Using Multilevel Local Binary Pattern Texture Descriptor","authors":"Vikas Srivastava, S. Yadav","doi":"10.1080/19361610.2021.1883397","DOIUrl":"https://doi.org/10.1080/19361610.2021.1883397","url":null,"abstract":"Abstract Digital images can be manipulated using the latest tools and techniques without leaving any visible traces. Image tampering detection is required to authenticate image validation. It is concluded from previous research that image tampering modifies the texture micropattern in a digital image. Therefore, texture descriptors can be applied to highlight these changes. A texture descriptor–based technique is proposed for detecting both copy-move and splicing forgery. In the proposed method, an RGB image is converted into a YCbCr image and Cb and Cr image components are extracted, as these components are more sensitive to tampering artifacts. Further, a standard deviation (STD) filter and higher-order texture descriptors are applied on Cb and Cr components. The STD filter is used to highlight important details of objects in the image. A support vector machine classifier is used to classify forged and tampered images. Support vector machine (SVM) classifier gives good results on both large- and small-image data sets. The performance is appraised in three online-available, widely used data sets: CASIA v1.0, CASIA v2.0, and Columbia. The proposed method outperforms most of the state-of-the-art methods.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"62 - 79"},"PeriodicalIF":1.3,"publicationDate":"2021-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1883397","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48551846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-06DOI: 10.1080/19361610.2021.1896280
A. Salehian, M. H. Sheikholeslami
Abstract Technologies and communication devices, especially those used in the military area, such as the invention of the atomic bomb or radar, have revolutionized security studies. But this impact is not limited to military technology. Things like the aviation industry have also had an impact on 21st-century security and new threats by changing the social relation on human life. Countries faced with new threats, such as the Covid-19 pandemic, led us to examine the root of the creation and globalization of such threats. Given that the aviation industry has the absolute ability to transfer any type of person or factor in the global arena with remarkable speed, this feature makes the aviation industry a platform for the spread of threats and evolve them as a transnational threat. Given the increasing growth of the aviation industry and its far-reaching effects on the international community, the field of security threats has also evolved due to the effects of this technology. This article, to understand how the aviation industry affects security threats, examines the examples of health threats and based on that, a hypothesis about the impact of this industry on the evolution of threats.
{"title":"The Impact of the Aviation Industry on International Security Threats, Case Study of Health Threats (2002–2020)","authors":"A. Salehian, M. H. Sheikholeslami","doi":"10.1080/19361610.2021.1896280","DOIUrl":"https://doi.org/10.1080/19361610.2021.1896280","url":null,"abstract":"Abstract Technologies and communication devices, especially those used in the military area, such as the invention of the atomic bomb or radar, have revolutionized security studies. But this impact is not limited to military technology. Things like the aviation industry have also had an impact on 21st-century security and new threats by changing the social relation on human life. Countries faced with new threats, such as the Covid-19 pandemic, led us to examine the root of the creation and globalization of such threats. Given that the aviation industry has the absolute ability to transfer any type of person or factor in the global arena with remarkable speed, this feature makes the aviation industry a platform for the spread of threats and evolve them as a transnational threat. Given the increasing growth of the aviation industry and its far-reaching effects on the international community, the field of security threats has also evolved due to the effects of this technology. This article, to understand how the aviation industry affects security threats, examines the examples of health threats and based on that, a hypothesis about the impact of this industry on the evolution of threats.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"477 - 496"},"PeriodicalIF":1.3,"publicationDate":"2021-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1896280","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45860499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-03DOI: 10.1080/19361610.2021.1879613
E. Lambert, Mia Abboud Holbrook, N. Hogan, James B. Wells, K. I. Minor
Abstract Private security staff play an important role in protecting society, including those who work in private prisons. Working in a private prison is a demanding job. Staff are responsible to ensure that the correctional facility is safe, secure, and humane. Past research has found that organizational trust, in terms of supervisor and management trust, influences private prison staff in many outcome areas, such as job involvement, job satisfaction, organizational commitment, job stress, feeling at risk at work, and job burnout; however, there is a dearth of research on how workplace variables may contribute to organizational trust. The current study examined how the major forms of social support (family, coworkers, supervisor, and management) were related to supervisor trust and management trust among 160 staff at a private U.S. prison. Based on ordinary least squares (OLS) multivariate regression, the results indicated coworker, supervisor, and management support each had significant positive effects on supervisor trust, with supervisor support having the largest effect. In another OLS multivariate regression analysis, family, supervisor, and management support had significant positive effects on management trust, with management support having the largest effect. The findings suggest that private prison administrators should consider increasing all four forms of social support in order to raise both supervisor and management trust. It would be a valuable investment in staff.
{"title":"Social Support and Its Link to Workplace Trust Among Correctional Staff: An Exploratory Research Note","authors":"E. Lambert, Mia Abboud Holbrook, N. Hogan, James B. Wells, K. I. Minor","doi":"10.1080/19361610.2021.1879613","DOIUrl":"https://doi.org/10.1080/19361610.2021.1879613","url":null,"abstract":"Abstract Private security staff play an important role in protecting society, including those who work in private prisons. Working in a private prison is a demanding job. Staff are responsible to ensure that the correctional facility is safe, secure, and humane. Past research has found that organizational trust, in terms of supervisor and management trust, influences private prison staff in many outcome areas, such as job involvement, job satisfaction, organizational commitment, job stress, feeling at risk at work, and job burnout; however, there is a dearth of research on how workplace variables may contribute to organizational trust. The current study examined how the major forms of social support (family, coworkers, supervisor, and management) were related to supervisor trust and management trust among 160 staff at a private U.S. prison. Based on ordinary least squares (OLS) multivariate regression, the results indicated coworker, supervisor, and management support each had significant positive effects on supervisor trust, with supervisor support having the largest effect. In another OLS multivariate regression analysis, family, supervisor, and management support had significant positive effects on management trust, with management support having the largest effect. The findings suggest that private prison administrators should consider increasing all four forms of social support in order to raise both supervisor and management trust. It would be a valuable investment in staff.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"16 1","pages":"147 - 167"},"PeriodicalIF":1.3,"publicationDate":"2021-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1879613","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48381110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-11DOI: 10.1080/19361610.2021.1883398
Vigneswary Pranava Rasahugan, Samihah Khalil
Abstract Private security governance has gained increased attention from the government for the governance mechanism but still remains fragmented. This paper attempts to clarify the governance of private security by government through a systematic review of literature. The review process contributed to four themes which addressed three major trends. First is the response of government toward the governance objective, set by either public actors or in collaboration by both public and private actors. Second is the coordination mechanism adapted by the government in handling multiple governors from public and private security industries. Third is the regulatory mechanism of the private security industry adhered to by the government.
{"title":"Systematic Literature Review on Private Security Governance by Government","authors":"Vigneswary Pranava Rasahugan, Samihah Khalil","doi":"10.1080/19361610.2021.1883398","DOIUrl":"https://doi.org/10.1080/19361610.2021.1883398","url":null,"abstract":"Abstract Private security governance has gained increased attention from the government for the governance mechanism but still remains fragmented. This paper attempts to clarify the governance of private security by government through a systematic review of literature. The review process contributed to four themes which addressed three major trends. First is the response of government toward the governance objective, set by either public actors or in collaboration by both public and private actors. Second is the coordination mechanism adapted by the government in handling multiple governors from public and private security industries. Third is the regulatory mechanism of the private security industry adhered to by the government.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"426 - 450"},"PeriodicalIF":1.3,"publicationDate":"2021-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1883398","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45803453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-09DOI: 10.1080/19361610.2021.1889895
Tero Ihatsu, Soili Paananen, Teija Sederholm
Abstract Terrorist attacks, school shootings, and other man-made incidents are demanding situations for first responders and society as a whole. Currently used concepts, like “active shooter” and “mass killing,” are typically created from the point of view of the perpetrator(s) or based on the incident site or the number of victims. In this paper, six police pretrial investigation records and four reports by the Investigation Commission are analyzed using inductive content analysis. The aim of the research is to determine attributes of violence resembling terrorism by approaching the subject from the position of first responders. Based on these attributes, the concept of violence resembling terrorism (VRT) is then created. VRT as a research unit produces essentially more empirical data, which is an advantage for research both on the academic level and in the more practical branches of security education.
{"title":"Violence Resembling Terrorism—From the First Responder Viewpoint","authors":"Tero Ihatsu, Soili Paananen, Teija Sederholm","doi":"10.1080/19361610.2021.1889895","DOIUrl":"https://doi.org/10.1080/19361610.2021.1889895","url":null,"abstract":"Abstract Terrorist attacks, school shootings, and other man-made incidents are demanding situations for first responders and society as a whole. Currently used concepts, like “active shooter” and “mass killing,” are typically created from the point of view of the perpetrator(s) or based on the incident site or the number of victims. In this paper, six police pretrial investigation records and four reports by the Investigation Commission are analyzed using inductive content analysis. The aim of the research is to determine attributes of violence resembling terrorism by approaching the subject from the position of first responders. Based on these attributes, the concept of violence resembling terrorism (VRT) is then created. VRT as a research unit produces essentially more empirical data, which is an advantage for research both on the academic level and in the more practical branches of security education.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"451 - 476"},"PeriodicalIF":1.3,"publicationDate":"2021-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1889895","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46567267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}