Pub Date : 2024-06-19DOI: 10.1057/s41284-024-00435-3
Petar Radanliev
This paper scrutinises the evolving digital security landscape, encompassing technological advancements, regulatory frameworks, and industry-specific challenges. It explores the influence of technologies like AI, quantum computing, and blockchain on security paradigms whilst identifying emergent threats. The study analyses the interplay between digital security and legislative policies, underlining their impact on industry practices and individual behaviours. Sector-specific examinations are conducted, pinpointing unique security concerns in sectors such as healthcare and finance and advocating bespoke solutions. The study highlights discrepancies between security intentions and actions, proposing strategies to bridge this divide. Projecting into the future, we anticipate shifts in technology and regulation, culminating in pragmatic recommendations for stakeholders. This article offers an informed perspective on digital security, laying the groundwork for proactive approaches in a dynamic digital environment.
{"title":"Digital security by design","authors":"Petar Radanliev","doi":"10.1057/s41284-024-00435-3","DOIUrl":"https://doi.org/10.1057/s41284-024-00435-3","url":null,"abstract":"<p>This paper scrutinises the evolving digital security landscape, encompassing technological advancements, regulatory frameworks, and industry-specific challenges. It explores the influence of technologies like AI, quantum computing, and blockchain on security paradigms whilst identifying emergent threats. The study analyses the interplay between digital security and legislative policies, underlining their impact on industry practices and individual behaviours. Sector-specific examinations are conducted, pinpointing unique security concerns in sectors such as healthcare and finance and advocating bespoke solutions. The study highlights discrepancies between security intentions and actions, proposing strategies to bridge this divide. Projecting into the future, we anticipate shifts in technology and regulation, culminating in pragmatic recommendations for stakeholders. This article offers an informed perspective on digital security, laying the groundwork for proactive approaches in a dynamic digital environment.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-09DOI: 10.1057/s41284-024-00433-5
Marcus L. Nascimento, Leonardo M. Barreto
{"title":"Improving crime count forecasts in the city of Rio de Janeiro via reconciliation","authors":"Marcus L. Nascimento, Leonardo M. Barreto","doi":"10.1057/s41284-024-00433-5","DOIUrl":"https://doi.org/10.1057/s41284-024-00433-5","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141366820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-06DOI: 10.1057/s41284-024-00434-4
Kris Henning, Joshua Carmony, Christian Peterson
{"title":"Public support for gunshot detection technology","authors":"Kris Henning, Joshua Carmony, Christian Peterson","doi":"10.1057/s41284-024-00434-4","DOIUrl":"https://doi.org/10.1057/s41284-024-00434-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-02DOI: 10.1057/s41284-024-00431-7
Richard Kathage, David J. Brooks, Michael Coole
The built environment faces challenges from fire hazards and threats by malicious actors. Risks presented from these hazards and threats are managed through the practices of fire safety and physical security. Whilst distinct disciplines, both impact the built environment systems, resulting in potential conflict. To manage this conflict, a complex process is required. Through the framework of Governmentality, using a mixed methods approach, the study explored the process which fire safety engineers and security practitioners undertake to manage this conflict. The study produced a conceptual model that explains how practitioners operate and manage risk associated with fire safety hazards and security threats. The model indicates that the process for resolving conflicts is a dichotomy between physical security and fire safety, with fire safety being the most dominate and influential. Nevertheless, both fire safety and physical security are subservient to building regulations in this process; however unlike security, fire safety is codified through building regulations. Risk assessment and the design process are core processes, but only used in decision-making when there is conflict between the fire safety and physical security. Findings demonstrated that context remains static for greater threats, whereas context is dynamic for fire safety.
{"title":"Decision-making in balancing fire safety hazards against security threats within the built environment","authors":"Richard Kathage, David J. Brooks, Michael Coole","doi":"10.1057/s41284-024-00431-7","DOIUrl":"https://doi.org/10.1057/s41284-024-00431-7","url":null,"abstract":"<p>The built environment faces challenges from fire hazards and threats by malicious actors. Risks presented from these hazards and threats are managed through the practices of fire safety and physical security. Whilst distinct disciplines, both impact the built environment systems, resulting in potential conflict. To manage this conflict, a complex process is required. Through the framework of Governmentality, using a mixed methods approach, the study explored the process which fire safety engineers and security practitioners undertake to manage this conflict. The study produced a conceptual model that explains how practitioners operate and manage risk associated with fire safety hazards and security threats. The model indicates that the process for resolving conflicts is a dichotomy between physical security and fire safety, with fire safety being the most dominate and influential. Nevertheless, both fire safety and physical security are subservient to building regulations in this process; however unlike security, fire safety is codified through building regulations. <i>Risk assessment</i> and the <i>design process</i> are core processes, but only used in decision-making when there is conflict between the fire safety and physical security. Findings demonstrated that context remains static for greater threats, whereas context is dynamic for fire safety.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141255429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-16DOI: 10.1057/s41284-024-00432-6
E. Ahlin, D. Reynald, Shazib Altaf
{"title":"Local residents’ perceptions of refugees as neighbors: a qualitative analysis of community social networks, purposive guardianship, and feelings of safety","authors":"E. Ahlin, D. Reynald, Shazib Altaf","doi":"10.1057/s41284-024-00432-6","DOIUrl":"https://doi.org/10.1057/s41284-024-00432-6","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140967676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-14DOI: 10.1057/s41284-024-00429-1
Juyeon Oh, Seunghwan Myeong
This study investigates the factors influencing Korean corporate workers to increase their intention to comply with security voluntarily. Specifically, this study investigates whether organizational attractiveness affects employees' intention to comply with security. In addition, this study will examine whether affection and job security, which represent the Korean corporate image, affect organizational attractiveness. 477 data collecting online survey was used to test the research model. Participants for our survey were derived from workers and public officials in South Korea. The results were as follows. First, the symbolic image of being affectionate influences the instrumental image of job security. Second, an instrumental image has a significantly positive effect on corporate attractiveness. Third, it was found that job security increased the attractiveness of the organization perceived by the employees and, in turn, increased the intention of the employees to comply with the organization's security. Our findings can be used to develop strategies to enhance security compliance intention within firms.
{"title":"The effects of organizational images on security compliance intention: focused on affection and job security in South Korea","authors":"Juyeon Oh, Seunghwan Myeong","doi":"10.1057/s41284-024-00429-1","DOIUrl":"https://doi.org/10.1057/s41284-024-00429-1","url":null,"abstract":"<p>This study investigates the factors influencing Korean corporate workers to increase their intention to comply with security voluntarily. Specifically, this study investigates whether organizational attractiveness affects employees' intention to comply with security. In addition, this study will examine whether affection and job security, which represent the Korean corporate image, affect organizational attractiveness. 477 data collecting online survey was used to test the research model. Participants for our survey were derived from workers and public officials in South Korea. The results were as follows. First, the symbolic image of being affectionate influences the instrumental image of job security. Second, an instrumental image has a significantly positive effect on corporate attractiveness. Third, it was found that job security increased the attractiveness of the organization perceived by the employees and, in turn, increased the intention of the employees to comply with the organization's security. Our findings can be used to develop strategies to enhance security compliance intention within firms.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140935147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-13DOI: 10.1057/s41284-024-00430-8
Zarina I. Vakhitova, Rob I. Mawby, Nicola Helps
Crime risk can affect tourists’ choices of holiday destination, accommodation, and activities. However, victimisation of tourists has received limited attention in existing studies. This paper integrates tourists’ holiday preferences with lifestyles and routine activities explanations to examine the relationship between tourism and victimisation. Using a sample of Australian tourists who travelled to Bali or the British Isles (N = 1027), we demonstrate the usefulness of this integrated approach in understanding the risk of theft while on holiday. We found that tourists aspiring to be adventurous, but opting for pre-arranged package holidays and spending most of their time with other tourists, were most vulnerable to theft from their person. The findings can help ensure that security measures target those who will benefit it the most.
{"title":"Exploring the value of holiday preferences and routine activities for understanding tourist victimisation while on holiday","authors":"Zarina I. Vakhitova, Rob I. Mawby, Nicola Helps","doi":"10.1057/s41284-024-00430-8","DOIUrl":"https://doi.org/10.1057/s41284-024-00430-8","url":null,"abstract":"<p>Crime risk can affect tourists’ choices of holiday destination, accommodation, and activities. However, victimisation of tourists has received limited attention in existing studies. This paper integrates tourists’ holiday preferences with lifestyles and routine activities explanations to examine the relationship between tourism and victimisation. Using a sample of Australian tourists who travelled to Bali or the British Isles (<i>N</i> = 1027), we demonstrate the usefulness of this integrated approach in understanding the risk of theft while on holiday. We found that tourists aspiring to be adventurous, but opting for pre-arranged package holidays and spending most of their time with other tourists, were most vulnerable to theft from their person. The findings can help ensure that security measures target those who will benefit it the most.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140935144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-24DOI: 10.1057/s41284-024-00428-2
Cory Schnell
{"title":"Don’t call it a comeback! Revictimization and the cycle of violence at micro-places","authors":"Cory Schnell","doi":"10.1057/s41284-024-00428-2","DOIUrl":"https://doi.org/10.1057/s41284-024-00428-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140659939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-23DOI: 10.1057/s41284-024-00427-3
Christopher P. Dum, Quintin Myers, Kevin Weng
{"title":"Fight or flight? Intended behavior in a school shooting among students who support or oppose concealed campus carry","authors":"Christopher P. Dum, Quintin Myers, Kevin Weng","doi":"10.1057/s41284-024-00427-3","DOIUrl":"https://doi.org/10.1057/s41284-024-00427-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140669754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-16DOI: 10.1057/s41284-024-00426-4
M. Školník, M. Haman
{"title":"Drawing the line: public attitudes towards warranted and unwarranted government surveillance in European countries","authors":"M. Školník, M. Haman","doi":"10.1057/s41284-024-00426-4","DOIUrl":"https://doi.org/10.1057/s41284-024-00426-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140697141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}