Pub Date : 2022-09-16DOI: 10.1057/s41284-022-00355-0
M. Manning, Gabriel T. W. Wong, M. Ip
{"title":"An evaluation of an Australia-based home Burglary prevention program","authors":"M. Manning, Gabriel T. W. Wong, M. Ip","doi":"10.1057/s41284-022-00355-0","DOIUrl":"https://doi.org/10.1057/s41284-022-00355-0","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45819944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-11DOI: 10.1057/s41284-022-00357-y
Agus Nugroho, A. Chandrawulan
{"title":"Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries","authors":"Agus Nugroho, A. Chandrawulan","doi":"10.1057/s41284-022-00357-y","DOIUrl":"https://doi.org/10.1057/s41284-022-00357-y","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48704405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-04DOI: 10.1057/s41284-022-00353-2
S. Rajadurai, S. H. A. B. Ah, R. Zainol, Z. Azman, Mitra Manisha Rajadurai
{"title":"Issues with the application of CPTED in urban development: a case of City X, Malaysia","authors":"S. Rajadurai, S. H. A. B. Ah, R. Zainol, Z. Azman, Mitra Manisha Rajadurai","doi":"10.1057/s41284-022-00353-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00353-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47632294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-27DOI: 10.1057/s41284-022-00354-1
J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang
{"title":"Correction to: Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria","authors":"J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang","doi":"10.1057/s41284-022-00354-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00354-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45637735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-07DOI: 10.1057/s41284-022-00352-3
Moneer Alshaikh, Shanton Chang, Atif Ahmad, S. Maynard, A. Alammary
{"title":"Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison","authors":"Moneer Alshaikh, Shanton Chang, Atif Ahmad, S. Maynard, A. Alammary","doi":"10.1057/s41284-022-00352-3","DOIUrl":"https://doi.org/10.1057/s41284-022-00352-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46813685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-03DOI: 10.1057/s41284-022-00351-4
I. Alumona, K. Onwuanabile, V. Iwuoha, Ernest Toochi Aniche
{"title":"Old problem, new manifestation: the emergence of cultism in rural secondary schools in Anambra state, Nigeria","authors":"I. Alumona, K. Onwuanabile, V. Iwuoha, Ernest Toochi Aniche","doi":"10.1057/s41284-022-00351-4","DOIUrl":"https://doi.org/10.1057/s41284-022-00351-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"58556714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1057/s41284-022-00348-z
J. Stam, I. Eekhout, Marit Koenen, V. Kallen
{"title":"Susceptibility for criminal facilitation in social housing: a psychological perspective","authors":"J. Stam, I. Eekhout, Marit Koenen, V. Kallen","doi":"10.1057/s41284-022-00348-z","DOIUrl":"https://doi.org/10.1057/s41284-022-00348-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42680006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1057/s41284-022-00346-1
Carri Casteel, C. Peek-Asa, Robyn O. Espinosa, E. Rugala, M. Ramirez
{"title":"Tabletop scenario exercises as a training tool for improving response to workplace violence","authors":"Carri Casteel, C. Peek-Asa, Robyn O. Espinosa, E. Rugala, M. Ramirez","doi":"10.1057/s41284-022-00346-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00346-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42874735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-23DOI: 10.1057/s41284-022-00347-0
A. Svintsytskyi, O. Semeniuk, Olena S. Ufimtseva, Y. Irkha, Serhii V. Suslin
{"title":"Countering fake information as a guarantee of state information security","authors":"A. Svintsytskyi, O. Semeniuk, Olena S. Ufimtseva, Y. Irkha, Serhii V. Suslin","doi":"10.1057/s41284-022-00347-0","DOIUrl":"https://doi.org/10.1057/s41284-022-00347-0","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45858783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-21DOI: 10.1057/s41284-022-00350-5
I. Guedes, M. Martins, C. S. Cardoso
{"title":"Exploring the determinants of victimization and fear of online identity theft: an empirical study","authors":"I. Guedes, M. Martins, C. S. Cardoso","doi":"10.1057/s41284-022-00350-5","DOIUrl":"https://doi.org/10.1057/s41284-022-00350-5","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48766633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}