Pub Date : 2021-07-16DOI: 10.1080/19361610.2021.1947114
Otu Akanu Otu, A. Adedeji
Abstract Kidnapping activities has become the most recurring organized crime in strategic cities, villages and communities in southeast and south-south Nigeria. It has generated a frenzy-like situation among members of the public. It needs to be known why civil police with its dexterity for conventional mechanisms in crime prevention and control are incapacitated to combat recent spate of kidnapping activities in Nigeria. Some pertinent questions about menace of kidnapping in Nigeria are: Why did conventional approach fail to control kidnapping activities in Nigeria? What control strategies were put in place by the respective state governments in southern states? What is the philosophy behind the adoption of unconventional means? What are the instances of its effectiveness? Is there any backlash with this strategy? With fieldworks in two purposively selected states in the southern regions of Nigeria, the study recommends among others, the creation of a specialized court with the mandate to convict suspects/sponsors of kidnapping business if found guilty within a stipulated timeframe.
{"title":"From Conventional to Unconventional Mechanism: The Public Dilemma of Kidnapping Business in the South-East and South-South Regions of Nigeria","authors":"Otu Akanu Otu, A. Adedeji","doi":"10.1080/19361610.2021.1947114","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947114","url":null,"abstract":"Abstract Kidnapping activities has become the most recurring organized crime in strategic cities, villages and communities in southeast and south-south Nigeria. It has generated a frenzy-like situation among members of the public. It needs to be known why civil police with its dexterity for conventional mechanisms in crime prevention and control are incapacitated to combat recent spate of kidnapping activities in Nigeria. Some pertinent questions about menace of kidnapping in Nigeria are: Why did conventional approach fail to control kidnapping activities in Nigeria? What control strategies were put in place by the respective state governments in southern states? What is the philosophy behind the adoption of unconventional means? What are the instances of its effectiveness? Is there any backlash with this strategy? With fieldworks in two purposively selected states in the southern regions of Nigeria, the study recommends among others, the creation of a specialized court with the mandate to convict suspects/sponsors of kidnapping business if found guilty within a stipulated timeframe.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"165 - 189"},"PeriodicalIF":1.3,"publicationDate":"2021-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947114","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48921807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-09DOI: 10.1080/19361610.2021.1900692
Hemalatha Jeyaprakash, K. Kartheeban, A. Sahu, Balasubramanian Chokkalingam
Abstract Steganography deals with hiding information, which offers ultimate security in defense, profitable usages, thus sending the imperceptible information, will not be bare or distinguished by others. In this paper, a multidirectional PVD hiding scheme with RSA algorithm is proposed. Secret bits are embedded in three directions of a color image by dividing the non-overlapping blocks into R, G, b channels by selecting the minimum pixels of each block regrouping. In order to ensure the security of an stego-image, the work proposed by scheme is used, and in addition to that RSA algorithm is proposed.
{"title":"Data Hiding Using PVD and Improving Security Using RSA","authors":"Hemalatha Jeyaprakash, K. Kartheeban, A. Sahu, Balasubramanian Chokkalingam","doi":"10.1080/19361610.2021.1900692","DOIUrl":"https://doi.org/10.1080/19361610.2021.1900692","url":null,"abstract":"Abstract Steganography deals with hiding information, which offers ultimate security in defense, profitable usages, thus sending the imperceptible information, will not be bare or distinguished by others. In this paper, a multidirectional PVD hiding scheme with RSA algorithm is proposed. Secret bits are embedded in three directions of a color image by dividing the non-overlapping blocks into R, G, b channels by selecting the minimum pixels of each block regrouping. In order to ensure the security of an stego-image, the work proposed by scheme is used, and in addition to that RSA algorithm is proposed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"413 - 420"},"PeriodicalIF":1.3,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1900692","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41411834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-05DOI: 10.1080/19361610.2021.1947112
Ravi Teja Batchu, A. Alsadoon, P. Prasad, R. Ali, Tarik A. Rashid, Ghossoon Alsadoon, Oday D. Jerew
Abstract Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized access is an ongoing issue. A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval. The aim of this research is to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints. The proposed model for application in the healthcare sector consists of Collection, Network communication, and Authentication (CNA) using biometrics which replaces an existing, password-based access control method. A sensor then collects data, and by using a network (wireless or Zig-bee), a connection is established, after connectivity analytics and data management work which processes and aggregate the data. Subsequently, access is granted to authenticated users of the application. This IoT-based biometric authentication system facilitates effective recognition and ensures confidentiality, integrity, and reliability of patients’ records and other sensitive data. The proposed solution provides reliable access to healthcare data and enables secure access through the process of user and device authentication. The proposed model has been developed for access control to data through authentication of users in healthcare to reduce data manipulation or theft.
{"title":"A Review-Based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras","authors":"Ravi Teja Batchu, A. Alsadoon, P. Prasad, R. Ali, Tarik A. Rashid, Ghossoon Alsadoon, Oday D. Jerew","doi":"10.1080/19361610.2021.1947112","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947112","url":null,"abstract":"Abstract Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized access is an ongoing issue. A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval. The aim of this research is to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints. The proposed model for application in the healthcare sector consists of Collection, Network communication, and Authentication (CNA) using biometrics which replaces an existing, password-based access control method. A sensor then collects data, and by using a network (wireless or Zig-bee), a connection is established, after connectivity analytics and data management work which processes and aggregate the data. Subsequently, access is granted to authenticated users of the application. This IoT-based biometric authentication system facilitates effective recognition and ensures confidentiality, integrity, and reliability of patients’ records and other sensitive data. The proposed solution provides reliable access to healthcare data and enables secure access through the process of user and device authentication. The proposed model has been developed for access control to data through authentication of users in healthcare to reduce data manipulation or theft.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"16 - 48"},"PeriodicalIF":1.3,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947112","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42476283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-21DOI: 10.1080/19361610.2021.1933323
Mine Özaşçılar, Hakki Ozturk
Abstract Shoplifting is at serious retail crime for all retailers, which reduces profitability. This study investigates the extent and impact of shoplifting in shopping malls in Istanbul, Turkey. It specifically examines differences in the extent and impact of shoplifting by retail sector and shopping mall size and location. Data collection was based on 389 face-to-face interviews with store managers and shopping mall managers in Istanbul. The results revealed that shoplifting is a serious crime for all retail sectors and sizes of shopping malls. The implications for future studies and limitations of the current study are discussed.
{"title":"Shoplifting in Shopping Malls in an Emerging Market: Evidence from Turkey","authors":"Mine Özaşçılar, Hakki Ozturk","doi":"10.1080/19361610.2021.1933323","DOIUrl":"https://doi.org/10.1080/19361610.2021.1933323","url":null,"abstract":"Abstract Shoplifting is at serious retail crime for all retailers, which reduces profitability. This study investigates the extent and impact of shoplifting in shopping malls in Istanbul, Turkey. It specifically examines differences in the extent and impact of shoplifting by retail sector and shopping mall size and location. Data collection was based on 389 face-to-face interviews with store managers and shopping mall managers in Istanbul. The results revealed that shoplifting is a serious crime for all retail sectors and sizes of shopping malls. The implications for future studies and limitations of the current study are discussed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"70 - 85"},"PeriodicalIF":1.3,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1933323","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46881071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-11DOI: 10.1080/19361610.2021.1933322
T. M. Navamani
Abstract Security and privacy are the two terms that are well connected with the current trends in cryptocurrency, and this study gives an extensive review of the same. Cryptocurrency adds security to the transaction flow and regulates the formation of additional units of currency. The massive growth in the market assessment of cryptocurrency leads to misuse of deficiencies for profit by adversaries. In this study, a review was made to focus on the security and protection measurements of cryptocurrencies specifically on Bitcoin. This study describes cryptocurrency conventions, their usefulness, and communications within the framework.
{"title":"A Review on Cryptocurrencies Security","authors":"T. M. Navamani","doi":"10.1080/19361610.2021.1933322","DOIUrl":"https://doi.org/10.1080/19361610.2021.1933322","url":null,"abstract":"Abstract Security and privacy are the two terms that are well connected with the current trends in cryptocurrency, and this study gives an extensive review of the same. Cryptocurrency adds security to the transaction flow and regulates the formation of additional units of currency. The massive growth in the market assessment of cryptocurrency leads to misuse of deficiencies for profit by adversaries. In this study, a review was made to focus on the security and protection measurements of cryptocurrencies specifically on Bitcoin. This study describes cryptocurrency conventions, their usefulness, and communications within the framework.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"49 - 69"},"PeriodicalIF":1.3,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1933322","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46761095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-31DOI: 10.1080/19361610.2021.1908103
Brian R. Johnson, C. Kierkus
Abstract Using the principle of defense in depth and Routine Activities Theory, and a qualitative methodology that led to the construction of themes and subthemes, it was found that the most common security requirements are related to detection-based elements that include camera-related and CCTV systems. Security requirements related to deterrence, delay, and response elements, while present in many states, are required to a lesser degree. These findings, therefore, suggest that not all state regulations and subsequent security policies have a comprehensive defense in depth strategy for the physical protection of commercial marijuana cultivation facilities.
{"title":"Security has Gone to Pot: An Analysis of Marijuana Cultivation Security Laws and Regulations in the United States","authors":"Brian R. Johnson, C. Kierkus","doi":"10.1080/19361610.2021.1908103","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908103","url":null,"abstract":"Abstract Using the principle of defense in depth and Routine Activities Theory, and a qualitative methodology that led to the construction of themes and subthemes, it was found that the most common security requirements are related to detection-based elements that include camera-related and CCTV systems. Security requirements related to deterrence, delay, and response elements, while present in many states, are required to a lesser degree. These findings, therefore, suggest that not all state regulations and subsequent security policies have a comprehensive defense in depth strategy for the physical protection of commercial marijuana cultivation facilities.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"497 - 529"},"PeriodicalIF":1.3,"publicationDate":"2021-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48430996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-27DOI: 10.1080/19361610.2021.1923365
K. Szocik, Rakhat Abylkasymova
Abstract Progress in automatization and robotization is unavoidable. However, while progress in some fields is relatively rapid, others including policing seem to be untouched by automatization. This article discusses arguments which favor the use of police robots, in particular crowd control robots. The special case of pandemics is discussed. The article argues that while we have some ethical issues associated with crowd control robots, in general, the benefits are higher than the possible risks.
{"title":"Ethical Issues in Police Robots. The Case of Crowd Control Robots in a Pandemic","authors":"K. Szocik, Rakhat Abylkasymova","doi":"10.1080/19361610.2021.1923365","DOIUrl":"https://doi.org/10.1080/19361610.2021.1923365","url":null,"abstract":"Abstract Progress in automatization and robotization is unavoidable. However, while progress in some fields is relatively rapid, others including policing seem to be untouched by automatization. This article discusses arguments which favor the use of police robots, in particular crowd control robots. The special case of pandemics is discussed. The article argues that while we have some ethical issues associated with crowd control robots, in general, the benefits are higher than the possible risks.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"530 - 545"},"PeriodicalIF":1.3,"publicationDate":"2021-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1923365","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47029418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-10DOI: 10.1080/19361610.2021.1918995
Salifu Yusif, Abdul Hafeez-Baig
Abstract Cybersecurity is a growing problem associated with everything an individual or an organization does that is facilitated by the Internet. It is a multi-facetted program that can be addressed by cybersecurity governance. However, research has shown that many organizations face at least five basic challenges of cybersecurity. In this study, we developed a model for an effective cybersecurity governance that hopes to address these challenges, conceptualized as factors that must continuously be measured and evaluated. They are: (1) Cybersecurity strategy; (2) Standardized processes, (3) Compliance, (4) Senior leadership oversight, and (5) Resources.
{"title":"A Conceptual Model for Cybersecurity Governance","authors":"Salifu Yusif, Abdul Hafeez-Baig","doi":"10.1080/19361610.2021.1918995","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918995","url":null,"abstract":"Abstract Cybersecurity is a growing problem associated with everything an individual or an organization does that is facilitated by the Internet. It is a multi-facetted program that can be addressed by cybersecurity governance. However, research has shown that many organizations face at least five basic challenges of cybersecurity. In this study, we developed a model for an effective cybersecurity governance that hopes to address these challenges, conceptualized as factors that must continuously be measured and evaluated. They are: (1) Cybersecurity strategy; (2) Standardized processes, (3) Compliance, (4) Senior leadership oversight, and (5) Resources.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"16 1","pages":"490 - 513"},"PeriodicalIF":1.3,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918995","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44187134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-06DOI: 10.1080/19361610.2021.1908814
D. Atsa’am, R. Wario
Abstract This study interweaved the divide-and-conquer strategy with the stag hunt game to model a terrorism and counterterrorism environment. The records in the global terrorism database show that 98% of total terror attack incidents from 1970 to 2018 were targeted on law-abiding citizens/facilities, while 2% were targeted on terrorists. Three divide-and-conquer strategies are proposed: destruction of communication channels, payment of bribes, and fomenting distrust among terror groups. When these strategies are implemented, terrorists will effectively be used as tools in counterterrorism. Consequently, attacks on citizens will be reduced while attacks on terrorists will be increased.
{"title":"Adopting the Divide-and-Conquer Strategy for Use of Terrorists in Counterterrorism Through the Stag Hunt Game-Theoretic Environment","authors":"D. Atsa’am, R. Wario","doi":"10.1080/19361610.2021.1908814","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908814","url":null,"abstract":"Abstract This study interweaved the divide-and-conquer strategy with the stag hunt game to model a terrorism and counterterrorism environment. The records in the global terrorism database show that 98% of total terror attack incidents from 1970 to 2018 were targeted on law-abiding citizens/facilities, while 2% were targeted on terrorists. Three divide-and-conquer strategies are proposed: destruction of communication channels, payment of bribes, and fomenting distrust among terror groups. When these strategies are implemented, terrorists will effectively be used as tools in counterterrorism. Consequently, attacks on citizens will be reduced while attacks on terrorists will be increased.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"128 - 136"},"PeriodicalIF":1.3,"publicationDate":"2021-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908814","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48946097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-05DOI: 10.1080/19361610.2021.1918500
Mohammed Al-Enazi, Salim El Khediri
Abstract This research aims to enhance the accuracy and speed of the intrusion detection process by using the feature selection method to reduce the feature space dimensions that eliminate irrelevant features. Further, we employed ensemble learning in the UNSW-NB15 dataset, by using a classifier of the Stacking method, to prevent the intrusion detection system (IDS) from becoming archaic, to adjust it with a modern attack resistance feature, and to make it less costly. We used logistic regression as a meta-classifier and combined random forests, sequential minimal optimization (SMO), and naïve Bayes methods. Our approach allowed us to achieve 97.88% accuracy in intrusion detection.
{"title":"Advanced Classification Techniques for Improving Networks’ Intrusion Detection System Efficiency","authors":"Mohammed Al-Enazi, Salim El Khediri","doi":"10.1080/19361610.2021.1918500","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918500","url":null,"abstract":"Abstract This research aims to enhance the accuracy and speed of the intrusion detection process by using the feature selection method to reduce the feature space dimensions that eliminate irrelevant features. Further, we employed ensemble learning in the UNSW-NB15 dataset, by using a classifier of the Stacking method, to prevent the intrusion detection system (IDS) from becoming archaic, to adjust it with a modern attack resistance feature, and to make it less costly. We used logistic regression as a meta-classifier and combined random forests, sequential minimal optimization (SMO), and naïve Bayes methods. Our approach allowed us to achieve 97.88% accuracy in intrusion detection.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"257 - 273"},"PeriodicalIF":1.3,"publicationDate":"2021-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918500","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42864338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}