首页 > 最新文献

Security Journal最新文献

英文 中文
Tabletop scenario exercises as a training tool for improving response to workplace violence 桌面情景练习作为提高对工作场所暴力反应的培训工具
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-07-25 DOI: 10.1057/s41284-022-00346-1
Carri Casteel, C. Peek-Asa, Robyn O. Espinosa, E. Rugala, M. Ramirez
{"title":"Tabletop scenario exercises as a training tool for improving response to workplace violence","authors":"Carri Casteel, C. Peek-Asa, Robyn O. Espinosa, E. Rugala, M. Ramirez","doi":"10.1057/s41284-022-00346-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00346-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"1-15"},"PeriodicalIF":1.2,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42874735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Countering fake information as a guarantee of state information security. 打击虚假信息,保障国家信息安全
IF 0.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-07-23 DOI: 10.1057/s41284-022-00347-0
Andrii V Svintsytskyi, Oleksandr H Semeniuk, Olena S Ufimtseva, Yurii B Irkha, Serhii V Suslin

The article focuses on the notion of fake information as a tool of psychological influence in the context of hybrid wars. Works of the prominent academicians in the area of manipulation studies constitute the theoretical framework of this research. Empirical research methods such as observation, comparison, generalization and expert evaluation are used. First of all, types and methods of psychological influences used by mass media and social networks with a view to manipulate public opinions are distinguished. Moreover, the impact of emotions on the critical perception of the news is highlighted. The indicators of manipulative influence are defined in order to resist them. Besides, the ways of creating and distributing false information are described. In addition, the development of fakes identification mechanisms is considered a priority for the governmental and other public institutions. This is illustrated by a range of technologies developed to automatically detect fake news. Apart from that, the degrees of the information reliability are explored. Furthermore, structural elements of fake messages, which include the source and the message itself, are discussed. Misinformation of the public, promotion of certain opinions, encouragement of aggressive actions and instalment of doubts are singled out as the main tasks of fake information. Additionally, stages of countering fakes are distinguished. Finally, the specific features of the forensic expertise procedure are determined in order to provide information security in Ukraine. The research demonstrates the importance of an efficient security system, which would identify fake information and limit its propagation.

本文重点讨论了在混合战争背景下,虚假信息作为心理影响工具的概念。手法研究领域的杰出学者的著作构成了本研究的理论框架。采用观察法、比较法、概括法和专家评价法等实证研究方法。首先,区分大众媒体和社交网络为操纵民意而使用的心理影响的类型和方法。此外,强调了情绪对新闻批判性感知的影响。为了抵制操纵影响,定义了操纵影响的指标。此外,还描述了虚假信息的制造和传播途径。此外,假币识别机制的发展被认为是政府和其他公共机构的优先事项。为自动检测假新闻而开发的一系列技术说明了这一点。此外,还探讨了信息可靠性的程度。此外,还讨论了假消息的结构要素,包括消息源和消息本身。虚假信息的主要任务是误导公众、宣传某些观点、鼓励攻击性行为和制造怀疑。此外,打击假货的阶段是有区别的。最后,为了在乌克兰提供信息安全,确定了法医鉴定程序的具体特征。研究证明了一个有效的安全系统的重要性,它可以识别虚假信息并限制其传播。
{"title":"Countering fake information as a guarantee of state information security.","authors":"Andrii V Svintsytskyi, Oleksandr H Semeniuk, Olena S Ufimtseva, Yurii B Irkha, Serhii V Suslin","doi":"10.1057/s41284-022-00347-0","DOIUrl":"10.1057/s41284-022-00347-0","url":null,"abstract":"<p><p>The article focuses on the notion of fake information as a tool of psychological influence in the context of hybrid wars. Works of the prominent academicians in the area of manipulation studies constitute the theoretical framework of this research. Empirical research methods such as observation, comparison, generalization and expert evaluation are used. First of all, types and methods of psychological influences used by mass media and social networks with a view to manipulate public opinions are distinguished. Moreover, the impact of emotions on the critical perception of the news is highlighted. The indicators of manipulative influence are defined in order to resist them. Besides, the ways of creating and distributing false information are described. In addition, the development of fakes identification mechanisms is considered a priority for the governmental and other public institutions. This is illustrated by a range of technologies developed to automatically detect fake news. Apart from that, the degrees of the information reliability are explored. Furthermore, structural elements of fake messages, which include the source and the message itself, are discussed. Misinformation of the public, promotion of certain opinions, encouragement of aggressive actions and instalment of doubts are singled out as the main tasks of fake information. Additionally, stages of countering fakes are distinguished. Finally, the specific features of the forensic expertise procedure are determined in order to provide information security in Ukraine. The research demonstrates the importance of an efficient security system, which would identify fake information and limit its propagation.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-16"},"PeriodicalIF":0.2,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9307711/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45858783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the determinants of victimization and fear of online identity theft: an empirical study. 探索网络身份盗窃受害和恐惧的决定因素:一项实证研究
IF 0.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-07-21 DOI: 10.1057/s41284-022-00350-5
Inês Guedes, Margarida Martins, Carla Sofia Cardoso

The present study aims at understanding what factors contribute to the explanation of online identity theft (OIT) victimization and fear, using the Routine Activity Theory (RAT). Additionally, it tries to uncover the influence of factors such as sociodemographic variables, offline fear of crime, and computer perception skills. Data for the present study were collected from a self-reported online survey administered to a sample of university students and staff (N = 832, 66% female). Concerning the OIT victimization, binary logistic regression analysis showed that those who do not used credit card had lower odds of becoming an OIT victim, and those who reported visiting risky contents presented higher odds of becoming an OIT victim. Moreover, males were less likely than females of being an OIT victim. In turn, fear of OIT was explained by socioeconomic status (negatively associated), education (positively associated) and by fear of crime in general (positively associated). In addition, subjects who reported more online interaction with strangers were less fearful, and those reported more avoiding behaviors reported higher levels of fear of OIT. Finally, subjects with higher computer skills are less fearful. These results will be discussed in the line of routine activities approach and implications for online preventive behaviors will be outlined.

本研究旨在利用常规活动理论(RAT)了解哪些因素有助于解释网络身份盗窃(OIT)受害和恐惧。此外,它还试图揭示诸如社会人口变量、对犯罪的离线恐惧和计算机感知技能等因素的影响。本研究的数据收集自一项自我报告的在线调查,调查对象为大学生和教职工(N = 832, 66%为女性)。二值logistic回归分析结果显示,不使用信用卡者成为OIT受害者的可能性较低,而访问过危险内容者成为OIT受害者的可能性较高。此外,男性成为OIT受害者的可能性低于女性。反过来,对OIT的恐惧可以用社会经济地位(负相关)、教育(正相关)和对犯罪的恐惧(正相关)来解释。此外,报告与陌生人进行更多在线互动的研究对象的恐惧程度较低,而那些报告有更多回避行为的研究对象对网络信息技术的恐惧程度较高。最后,计算机技能较高的受试者不那么害怕。这些结果将在日常活动方法中进行讨论,并概述在线预防行为的含义。
{"title":"Exploring the determinants of victimization and fear of online identity theft: an empirical study.","authors":"Inês Guedes, Margarida Martins, Carla Sofia Cardoso","doi":"10.1057/s41284-022-00350-5","DOIUrl":"10.1057/s41284-022-00350-5","url":null,"abstract":"<p><p>The present study aims at understanding what factors contribute to the explanation of online identity theft (OIT) victimization and fear, using the Routine Activity Theory (RAT). Additionally, it tries to uncover the influence of factors such as sociodemographic variables, offline fear of crime, and computer perception skills. Data for the present study were collected from a self-reported online survey administered to a sample of university students and staff (<i>N</i> = 832, 66% female). Concerning the OIT victimization, binary logistic regression analysis showed that those who do not used credit card had lower odds of becoming an OIT victim, and those who reported visiting risky contents presented higher odds of becoming an OIT victim. Moreover, males were less likely than females of being an OIT victim. In turn, fear of OIT was explained by socioeconomic status (negatively associated), education (positively associated) and by fear of crime in general (positively associated). In addition, subjects who reported more online interaction with strangers were less fearful, and those reported more avoiding behaviors reported higher levels of fear of OIT. Finally, subjects with higher computer skills are less fearful. These results will be discussed in the line of routine activities approach and implications for online preventive behaviors will be outlined.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-26"},"PeriodicalIF":0.2,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9302955/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48766633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The realpolitik of jihad: an anatomy of transnational Islamist terrorism in East Africa 圣战的现实政治:剖析东非的跨国伊斯兰恐怖主义
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-07-19 DOI: 10.1057/s41284-022-00349-y
Simone Papale
{"title":"The realpolitik of jihad: an anatomy of transnational Islamist terrorism in East Africa","authors":"Simone Papale","doi":"10.1057/s41284-022-00349-y","DOIUrl":"https://doi.org/10.1057/s41284-022-00349-y","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"459 - 471"},"PeriodicalIF":1.2,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43799403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria 商业电子邮件泄露骗局、网络受害和尼日利亚企业组织的经济可持续性
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-06-16 DOI: 10.1057/s41284-022-00342-5
J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang
{"title":"Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria","authors":"J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang","doi":"10.1057/s41284-022-00342-5","DOIUrl":"https://doi.org/10.1057/s41284-022-00342-5","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"350-372"},"PeriodicalIF":1.2,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42715087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Tasks and competences of a private eye in a small society: the case of private detectives in Slovenia 小社会私家侦探的任务和能力:斯洛文尼亚私家侦探的案例
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-06-13 DOI: 10.1057/s41284-022-00344-3
Miha Dvojmoč, V. Erčulj, A. Sotlar
{"title":"Tasks and competences of a private eye in a small society: the case of private detectives in Slovenia","authors":"Miha Dvojmoč, V. Erčulj, A. Sotlar","doi":"10.1057/s41284-022-00344-3","DOIUrl":"https://doi.org/10.1057/s41284-022-00344-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"406-425"},"PeriodicalIF":1.2,"publicationDate":"2022-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46828324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-security and risky behaviors in a developing country context: a Pakistani perspective. 发展中国家背景下的网络安全和危险行为:巴基斯坦视角
IF 0.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-05-29 DOI: 10.1057/s41284-022-00343-4
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem, Saad Zafar

Cyber-security behavior research is scant with even scarce studies carried out in developing countries. We examine the cyber-security and risky Internet behaviors of undergraduate students from Pakistan, taking into account the diversity of these students in terms of demographics, socioeconomic status, and the digital divide. Data were collected using a survey questionnaire. A total of 294 students belonging to six different cities of Pakistan were surveyed employing multistage stratified sampling in face-to-face interaction. The results indicated significant differences of cyber-security posture in terms of gender, age and digital divide variables. The profiles of students based on cyber-security and risky Internet behaviors indicate three groups with a majority of them falling into group that exhibits more risk-averse yet low cyber-security behavior. Moreover, proactive cyber-security awareness behavior has a positive impact on high risk-averse behavior. The implications of the findings are studied in terms of providing customized training and awareness. The future directions are laid out for further explorations in terms of cultural differences within and cross-country contexts.

网络安全行为研究很少,在发展中国家开展的研究甚至很少。考虑到这些学生在人口统计学、社会经济地位和数字鸿沟方面的多样性,我们研究了巴基斯坦本科生的网络安全和危险的互联网行为。数据收集采用调查问卷。采用多阶段分层抽样面对面互动的方式,对来自巴基斯坦6个不同城市的294名学生进行了调查。结果表明,网络安全态势在性别、年龄和数字鸿沟变量上存在显著差异。基于网络安全和网络风险行为的学生概况显示出三个群体,其中大多数学生属于风险厌恶程度较高但网络安全行为较低的群体。此外,主动网络安全意识行为对高风险厌恶行为具有正向影响。从提供定制培训和意识的角度研究了调查结果的含义。未来的发展方向是进一步探索国内和跨国背景下的文化差异。
{"title":"Cyber-security and risky behaviors in a developing country context: a Pakistani perspective.","authors":"Naurin Farooq Khan, Naveed Ikram, Sumera Saleem, Saad Zafar","doi":"10.1057/s41284-022-00343-4","DOIUrl":"10.1057/s41284-022-00343-4","url":null,"abstract":"<p><p>Cyber-security behavior research is scant with even scarce studies carried out in developing countries. We examine the cyber-security and risky Internet behaviors of undergraduate students from Pakistan, taking into account the diversity of these students in terms of demographics, socioeconomic status, and the digital divide. Data were collected using a survey questionnaire. A total of 294 students belonging to six different cities of Pakistan were surveyed employing multistage stratified sampling in face-to-face interaction. The results indicated significant differences of cyber-security posture in terms of gender, age and digital divide variables. The profiles of students based on cyber-security and risky Internet behaviors indicate three groups with a majority of them falling into group that exhibits more risk-averse yet low cyber-security behavior. Moreover, proactive cyber-security awareness behavior has a positive impact on high risk-averse behavior. The implications of the findings are studied in terms of providing customized training and awareness. The future directions are laid out for further explorations in terms of cultural differences within and cross-country contexts.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-33"},"PeriodicalIF":0.2,"publicationDate":"2022-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9148392/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47904443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing Converged Security Risk Management: Drivers, Barriers, and Facilitators. 实施融合安全风险管理:驱动因素、障碍和促进者
IF 0.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-05-12 DOI: 10.1057/s41284-022-00341-6
Louisa Schneller, Cody Normitta Porter, Alison Wakefield

Converged security risk management is an approach that addresses interdependencies between security-related business functions that have traditionally been managed by separate departments within organizations. It is a more effective means of addressing organizational security risks and threats than tackling physical and information security challenges separately, given that the boundaries between the two are frequently blurred. However, fully converged security remains the exception rather than the rule, leaving organizations increasingly vulnerable as their adoption and reliance on digital technologies accelerates. Through interviews with eight senior security professionals, this research identified key factors critical to effective converged security risk management, expressed as 'drivers,' 'barriers,' and 'facilitators.' The practitioners' accounts illuminated how the modern threat landscape continues to drive further the need for such an approach, while the traditional separation of corporate security departments from the information security function in organizations remains a barrier. A greater focus on training and education, as well as soft skills, were identified as key priorities in the drive for an effective converged approach.

融合安全风险管理是一种处理安全相关业务功能之间相互依赖关系的方法,这些功能传统上由组织内的独立部门管理。它是解决组织安全风险和威胁的更有效的方法,而不是单独解决物理和信息安全挑战,因为两者之间的界限经常是模糊的。然而,完全融合的安全仍然是例外,而不是规则,随着对数字技术的采用和依赖加速,组织越来越容易受到攻击。通过对8位高级安全专家的访谈,本研究确定了有效融合安全风险管理的关键因素,表达为“驱动因素”、“障碍因素”和“促进因素”。从业人员的描述说明了现代威胁形势如何继续推动对这种方法的需求,而企业安全部门与组织中信息安全功能的传统分离仍然是一个障碍。会议确定,在推动采取有效的综合办法方面,更加注重培训和教育以及软技能是关键优先事项。
{"title":"Implementing Converged Security Risk Management: Drivers, Barriers, and Facilitators.","authors":"Louisa Schneller, Cody Normitta Porter, Alison Wakefield","doi":"10.1057/s41284-022-00341-6","DOIUrl":"10.1057/s41284-022-00341-6","url":null,"abstract":"<p><p>Converged security risk management is an approach that addresses interdependencies between security-related business functions that have traditionally been managed by separate departments within organizations. It is a more effective means of addressing organizational security risks and threats than tackling physical and information security challenges separately, given that the boundaries between the two are frequently blurred. However, fully converged security remains the exception rather than the rule, leaving organizations increasingly vulnerable as their adoption and reliance on digital technologies accelerates. Through interviews with eight senior security professionals, this research identified key factors critical to effective converged security risk management, expressed as 'drivers,' 'barriers,' and 'facilitators.' The practitioners' accounts illuminated how the modern threat landscape continues to drive further the need for such an approach, while the traditional separation of corporate security departments from the information security function in organizations remains a barrier. A greater focus on training and education, as well as soft skills, were identified as key priorities in the drive for an effective converged approach.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-17"},"PeriodicalIF":0.2,"publicationDate":"2022-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9096777/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48292552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of extremism online content analysis and prediction techniques in twitter based on sentiment analysis 基于情感分析的推特极端主义网络内容分析与预测技术研究
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-04-18 DOI: 10.1057/s41284-022-00335-4
Z. Trabelsi, Firas Saidi, Eswari Thangaraj, T. Veni
{"title":"A survey of extremism online content analysis and prediction techniques in twitter based on sentiment analysis","authors":"Z. Trabelsi, Firas Saidi, Eswari Thangaraj, T. Veni","doi":"10.1057/s41284-022-00335-4","DOIUrl":"https://doi.org/10.1057/s41284-022-00335-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"221 - 248"},"PeriodicalIF":1.2,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47918658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Critical workers? Private security, public perceptions and the Covid-19 pandemic. 关键员工呢?私人安全、公众认知和Covid-19大流行
IF 0.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-04-13 DOI: 10.1057/s41284-022-00339-0
Adam White

This article is among the first to explore the role and status of the private security industry during the Covid-19 pandemic. Focussing on the UK case, it illustrates how even though most private security officers were designated as 'critical workers' in this time of crisis, performing a range of functions essential to national infrastructure and law and order, the public have been slow or reluctant to recognise the contribution of the sector. It argues that this disposition is reflective of a longstanding public ambivalence or unease towards the private security industry which can ultimately be traced to the state-centric sociological terrain of the policing field.

本文是首批探讨私人保安行业在新冠疫情期间的作用和地位的文章之一。以英国的案例为例,它说明了即使大多数私人保安人员在这个危机时期被指定为“关键工作人员”,履行对国家基础设施和法律秩序至关重要的一系列职能,公众仍然缓慢或不愿承认该部门的贡献。它认为,这种倾向反映了长期以来公众对私人保安行业的矛盾心理或不安,这最终可以追溯到以国家为中心的警务领域的社会学地形。
{"title":"Critical workers? Private security, public perceptions and the Covid-19 pandemic.","authors":"Adam White","doi":"10.1057/s41284-022-00339-0","DOIUrl":"10.1057/s41284-022-00339-0","url":null,"abstract":"<p><p>This article is among the first to explore the role and status of the private security industry during the Covid-19 pandemic. Focussing on the UK case, it illustrates how even though most private security officers were designated as 'critical workers' in this time of crisis, performing a range of functions essential to national infrastructure and law and order, the public have been slow or reluctant to recognise the contribution of the sector. It argues that this disposition is reflective of a longstanding public ambivalence or unease towards the private security industry which can ultimately be traced to the state-centric sociological terrain of the policing field.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":"1-16"},"PeriodicalIF":0.2,"publicationDate":"2022-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9007576/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46808890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1