Pub Date : 2023-07-03DOI: 10.1080/19361610.2021.2013112
Boris Šturc, Tatyana Gurova, N.I. Zelenkova, V. Shestak
Abstract This study aims to propose a system of indicators for dividing financial cybercrime into groups. The results of this study indicate absence of taxonomic indicators regarding clustering of financial cybercrimes and wide differences in approaches to the development of such indicators in relation to cybercrimes. The proposed system of indicators for clustering of financial cybercrime is designed to help create a unified, consistent and holistic classification of cybercrime. The results of the study can be applied in the criminal legal classification of unlawful acts corresponding to the general concept of financial cybercrime.
{"title":"Developing a System of Indicators for Clustering Financial Cybercrime","authors":"Boris Šturc, Tatyana Gurova, N.I. Zelenkova, V. Shestak","doi":"10.1080/19361610.2021.2013112","DOIUrl":"https://doi.org/10.1080/19361610.2021.2013112","url":null,"abstract":"Abstract This study aims to propose a system of indicators for dividing financial cybercrime into groups. The results of this study indicate absence of taxonomic indicators regarding clustering of financial cybercrimes and wide differences in approaches to the development of such indicators in relation to cybercrimes. The proposed system of indicators for clustering of financial cybercrime is designed to help create a unified, consistent and holistic classification of cybercrime. The results of the study can be applied in the criminal legal classification of unlawful acts corresponding to the general concept of financial cybercrime.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"475 - 494"},"PeriodicalIF":1.3,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44003249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-16DOI: 10.1080/19361610.2023.2189867
J. Ojo
While the post-9/11 event has animated how state actors frame terrorism, contemporary studies have failed to address the politics inherent in proscribing, repressing, and labeling separatist movements as terrorists. This paper explores the politics of framing terrorism using the contemporary self-determination struggles advanced by the Indigenous People of Biafra (IPOB) and the Yoruba Nation ’ s freedom frontiers. The study proposes a United Nations-coordinated global framework for regulating and evaluating states ’ activities in identifying specific groups as terrorists. Taking such a stance would prevent aggrieved agitators from being persecuted by the state in the name of terror.
{"title":"Transforming Pacifists into Warmongers? Separatist Movement, State Repression, and the Politics of Framing Terrorism in Nigeria: Evidence from IPOB and Yoruba Nation’s Freedom Frontiers","authors":"J. Ojo","doi":"10.1080/19361610.2023.2189867","DOIUrl":"https://doi.org/10.1080/19361610.2023.2189867","url":null,"abstract":"While the post-9/11 event has animated how state actors frame terrorism, contemporary studies have failed to address the politics inherent in proscribing, repressing, and labeling separatist movements as terrorists. This paper explores the politics of framing terrorism using the contemporary self-determination struggles advanced by the Indigenous People of Biafra (IPOB) and the Yoruba Nation ’ s freedom frontiers. The study proposes a United Nations-coordinated global framework for regulating and evaluating states ’ activities in identifying specific groups as terrorists. Taking such a stance would prevent aggrieved agitators from being persecuted by the state in the name of terror.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44305903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-25DOI: 10.1080/19361610.2023.2169545
William A. Chernoff
{"title":"A Natural Experiment of the Prince Hypothesis on Classroom Vandalism","authors":"William A. Chernoff","doi":"10.1080/19361610.2023.2169545","DOIUrl":"https://doi.org/10.1080/19361610.2023.2169545","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"1 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41753749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-04DOI: 10.1080/19361610.2022.2161798
E. Lambert, N. Hogan, R. Worley, Monica Solinas-Saunders
{"title":"The Effects of Justice Views on Turnover Intent, Sick-Leave Views, and Sick-Leave Use Among Private Prison Staff","authors":"E. Lambert, N. Hogan, R. Worley, Monica Solinas-Saunders","doi":"10.1080/19361610.2022.2161798","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161798","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42073768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.1080/19361610.2022.2161972
Trushna Parida, Kanika Nath, Suvrojit Das
{"title":"SAM: A Mechanism to Facilitate Smear-Aware Forensic Analysis of Volatile System Memory","authors":"Trushna Parida, Kanika Nath, Suvrojit Das","doi":"10.1080/19361610.2022.2161972","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161972","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"1 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41318590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.1080/19361610.2022.2161799
Katalin Parti
{"title":"Preventing Revictimization in Sexual Assault Investigations: Personal Security and Trauma-Informed Case Management*","authors":"Katalin Parti","doi":"10.1080/19361610.2022.2161799","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161799","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45691356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-19DOI: 10.1080/19361610.2022.2157193
Karishni Mehta, Glen Dhingra, Ramchandra S. Mangrulkar
{"title":"Enhancing Multimedia Security Using Shortest Weight First Algorithm and Symmetric Cryptography","authors":"Karishni Mehta, Glen Dhingra, Ramchandra S. Mangrulkar","doi":"10.1080/19361610.2022.2157193","DOIUrl":"https://doi.org/10.1080/19361610.2022.2157193","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48085267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-30DOI: 10.1080/19361610.2022.2150498
Vaishnavi Sawant, Ahmed Solkar, Ramchandra S. Mangrulkar
{"title":"Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box","authors":"Vaishnavi Sawant, Ahmed Solkar, Ramchandra S. Mangrulkar","doi":"10.1080/19361610.2022.2150498","DOIUrl":"https://doi.org/10.1080/19361610.2022.2150498","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44102271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}