Pub Date : 2024-04-01DOI: 10.1080/19361610.2024.2331885
Suyesha Singh, Vaishnavi Nambiar
Online Child sexual abuse (OCSA) is a major menace in the digitalized world. Every year, more than a billion children between the ages of 2–17 years are sexually abused. Despite the harsh reality o...
{"title":"Role of Artificial Intelligence in the Prevention of Online Child Sexual Abuse: A Systematic Review of Literature","authors":"Suyesha Singh, Vaishnavi Nambiar","doi":"10.1080/19361610.2024.2331885","DOIUrl":"https://doi.org/10.1080/19361610.2024.2331885","url":null,"abstract":"Online Child sexual abuse (OCSA) is a major menace in the digitalized world. Every year, more than a billion children between the ages of 2–17 years are sexually abused. Despite the harsh reality o...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140598097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-26DOI: 10.1080/19361610.2024.2322238
Jared R. Dmello, Christine H. Neudecker
Climate change is a global phenomenon that has been associated with a growing list of concerns in society today, often leaving more questions than answers. Thus, it is no surprise that questions ar...
{"title":"Monsoon Marauders and Summer Violence: Exploring the Spatial Relationship between Climate Change and Terrorist Activity in India","authors":"Jared R. Dmello, Christine H. Neudecker","doi":"10.1080/19361610.2024.2322238","DOIUrl":"https://doi.org/10.1080/19361610.2024.2322238","url":null,"abstract":"Climate change is a global phenomenon that has been associated with a growing list of concerns in society today, often leaving more questions than answers. Thus, it is no surprise that questions ar...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139977801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-19DOI: 10.1080/19361610.2024.2314392
Ram Krishn Mishra, Abdul Rahmaan Ansari, J. Angel Arul Jothi, Vinaytosh Mishra
This research intends to provide law enforcement organizations with a deep learning model that uses trends in past crimes to forecast future crimes. The study will enable them to dispatch security ...
{"title":"Analysis of Criminal Landscape by Utilizing Statistical Analysis and Deep Learning Techniques","authors":"Ram Krishn Mishra, Abdul Rahmaan Ansari, J. Angel Arul Jothi, Vinaytosh Mishra","doi":"10.1080/19361610.2024.2314392","DOIUrl":"https://doi.org/10.1080/19361610.2024.2314392","url":null,"abstract":"This research intends to provide law enforcement organizations with a deep learning model that uses trends in past crimes to forecast future crimes. The study will enable them to dispatch security ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139910357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-12DOI: 10.1080/19361610.2024.2314405
Liqun Cao, Xiaohan Mei, Jiayu Li
This paper explores the correlates of mass shooting severity in the United States. Relying on the stacked data from 1966 to 2022 in the Violence Project (version 5), we developed a model of mass sh...
{"title":"Correlates of Severity of Mass Public Shootings in the United States, 1966–2022","authors":"Liqun Cao, Xiaohan Mei, Jiayu Li","doi":"10.1080/19361610.2024.2314405","DOIUrl":"https://doi.org/10.1080/19361610.2024.2314405","url":null,"abstract":"This paper explores the correlates of mass shooting severity in the United States. Relying on the stacked data from 1966 to 2022 in the Violence Project (version 5), we developed a model of mass sh...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139769588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime scene suspect prediction involves classifying potential perpetrators based on location, time, and crime type. Electronic forensics in large data scenarios poses challenges for investigators. ...
{"title":"An Investigation of Crime Detection Using Artificial Intelligence and Face Sketch Synthesis","authors":"Rajesh Natarajan, Natesh Mahadev, Shashi Kant Gupta, Badria Sulaiman Alfurhood","doi":"10.1080/19361610.2024.2302237","DOIUrl":"https://doi.org/10.1080/19361610.2024.2302237","url":null,"abstract":"Crime scene suspect prediction involves classifying potential perpetrators based on location, time, and crime type. Electronic forensics in large data scenarios poses challenges for investigators. ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139579602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-23DOI: 10.1080/19361610.2023.2301267
Deepanshu Garg, R. S. Bali
{"title":"QoS-Based Secure Data Communication for Software-Defined Autonomous Vehicles Using Blockchain","authors":"Deepanshu Garg, R. S. Bali","doi":"10.1080/19361610.2023.2301267","DOIUrl":"https://doi.org/10.1080/19361610.2023.2301267","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139604770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-18DOI: 10.1080/19361610.2024.2302241
Mine Özaşçılar
Recognizing that it is a widespread crime, retailers in Turkey have adopted Crime Prevention through Environmental Design (CPTED) techniques to prevent shoplifting. Using data from 1,150 young adul...
{"title":"Young Adults’ Perceptions of Store Environment: Evaluation of the Perceived Effectiveness of CPTED-Based Techniques in Preventing Shoplifting","authors":"Mine Özaşçılar","doi":"10.1080/19361610.2024.2302241","DOIUrl":"https://doi.org/10.1080/19361610.2024.2302241","url":null,"abstract":"Recognizing that it is a widespread crime, retailers in Turkey have adopted Crime Prevention through Environmental Design (CPTED) techniques to prevent shoplifting. Using data from 1,150 young adul...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139552817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-08DOI: 10.1080/19361610.2023.2296765
Susan Henrico, Dries Putter
Intelligence collection is an integral part of the intelligence cycle. In fact, some authors declare that it is at the heart of the intelligence discipline. Intelligence collection is typically don...
情报收集是情报周期的一个组成部分。事实上,一些作者宣称它是情报学科的核心。情报收集工作通常...
{"title":"Intelligence Collection Disciplines—A Systematic Review","authors":"Susan Henrico, Dries Putter","doi":"10.1080/19361610.2023.2296765","DOIUrl":"https://doi.org/10.1080/19361610.2023.2296765","url":null,"abstract":"Intelligence collection is an integral part of the intelligence cycle. In fact, some authors declare that it is at the heart of the intelligence discipline. Intelligence collection is typically don...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139397927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-30DOI: 10.1080/19361610.2023.2288419
Walid Dhifallah, Tarek Moulahi, Mounira Tarhouni, Salah Zidi
Many strategies use ML algorithms for intelligent IDS as part of the development of IoT security. These algorithms are quite susceptible to being manipulated to provide biased results. A variety of...
{"title":"Intelligent Chain: A Safer Decision-Making Framework with Blockchain-Based Incentives","authors":"Walid Dhifallah, Tarek Moulahi, Mounira Tarhouni, Salah Zidi","doi":"10.1080/19361610.2023.2288419","DOIUrl":"https://doi.org/10.1080/19361610.2023.2288419","url":null,"abstract":"Many strategies use ML algorithms for intelligent IDS as part of the development of IoT security. These algorithms are quite susceptible to being manipulated to provide biased results. A variety of...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138504943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-22DOI: 10.1080/19361610.2023.2279399
Bapi Saha, Ajoy Kumar Khan, Vuyyuru Lakshmi Lalitha, L. V. Narasimha Prasad
There are various new-age crime rackets reported with the help of digital technology and such cases are routinely investigated by the police and digital forensics analysts. In the course of investi...
{"title":"A Digital Forensics Model for the Examination of QR Code and Android App to Investigate Aadhaar Card Identity Fraud","authors":"Bapi Saha, Ajoy Kumar Khan, Vuyyuru Lakshmi Lalitha, L. V. Narasimha Prasad","doi":"10.1080/19361610.2023.2279399","DOIUrl":"https://doi.org/10.1080/19361610.2023.2279399","url":null,"abstract":"There are various new-age crime rackets reported with the help of digital technology and such cases are routinely investigated by the police and digital forensics analysts. In the course of investi...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138504950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}