首页 > 最新文献

Security Journal最新文献

英文 中文
Framing Amish victimization and security through the lens of criminological theory 从犯罪学理论的角度阐述阿米什人的受害情况和安全问题
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2024-08-02 DOI: 10.1057/s41284-024-00439-z
Joseph F. Donnermeyer

This article explores the crime experience of the Amish, a rural-located religious subculture that is rarely studied by criminologists. Evidence is derived from narratives of crime experiences reported by scribes to a monthly Amish periodical called The Diary. Every month there are reports about community events from hundreds of Amish settlements, including crime. A routine activities approach helps frame the results. From 168 crime narratives, both burglary/attempted burglary and larceny/attempted larceny are the most frequently described. Suggestions for future research, including an expanded collection of crime narratives from The Diary, plus interviews with both law enforcement and other criminal justice practitioners and Amish crime victims will advance criminological understandings of Amish vulnerability to crime. The article concludes with suggested actions to improve safety and security for Amish communities using environmental criminology theories.

本文探讨了阿米什人的犯罪经历,这是一种位于农村的宗教亚文化,犯罪学家很少对其进行研究。证据来自于阿米什人的月刊《日记》中抄写员对犯罪经历的叙述。每月都有来自数百个阿米什人定居点的社区活动报告,其中包括犯罪活动。例行活动方法有助于确定研究结果。在 168 篇犯罪叙述中,入室盗窃/入室盗窃未遂和盗窃/盗窃未遂是最常见的描述。对未来研究的建议,包括从《日记》中收集更多的犯罪叙述,以及对执法人员和其他刑事司法从业人员以及阿米什犯罪受害者进行访谈,将促进犯罪学对阿米什犯罪脆弱性的理解。文章最后提出了利用环境犯罪学理论改善阿米什社区安全和安保的行动建议。
{"title":"Framing Amish victimization and security through the lens of criminological theory","authors":"Joseph F. Donnermeyer","doi":"10.1057/s41284-024-00439-z","DOIUrl":"https://doi.org/10.1057/s41284-024-00439-z","url":null,"abstract":"<p>This article explores the crime experience of the Amish, a rural-located religious subculture that is rarely studied by criminologists. Evidence is derived from narratives of crime experiences reported by scribes to a monthly Amish periodical called <i>The Diary.</i> Every month there are reports about community events from hundreds of Amish settlements, including crime. A routine activities approach helps frame the results. From 168 crime narratives, both burglary/attempted burglary and larceny/attempted larceny are the most frequently described. Suggestions for future research, including an expanded collection of crime narratives from <i>The Diary,</i> plus interviews with both law enforcement and other criminal justice practitioners and Amish crime victims will advance criminological understandings of Amish vulnerability to crime. The article concludes with suggested actions to improve safety and security for Amish communities using environmental criminology theories.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"93 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141883147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reimagining the familiar stranger as a source of security: generating guardianship through everyday mobility 将熟悉的陌生人重新想象为安全之源:通过日常流动产生监护作用
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2024-08-02 DOI: 10.1057/s41284-024-00437-1
Renee Zahnow, Jonathan Corcoran

The familiar stranger is a social phenomenon that emerges from the serial reproduction of daily routines, structured around urban places and practices, that results in repeated encounters with the same individuals over time. Scholarship suggests that increased familiarity among individuals might incur crime control benefits at places by reducing individual anonymity and enhancing the moral obligation to obey behavioural norms. Familiarity with place-based norms and regularities can also enhance guardianship capacity and willingness to intervene when problems arise. In this paper, we detail a framework that integrates geographical, sociological, and psychological understandings of urban daily life to conceptualize the familiar stranger as a uniquely urban phenomenon emerging from multiple social processes synchronising in time-space. Our framework highlights the capacity for variation in relation to intensity contingent on daily regularities, place attributes, structures and social norms and provides for future measurement, modelling, and monitoring of familiar strangers as a protective factor against crime that can be ascribed to individuals, places and/or social systems. We include an operationalisation of our framework for a single use case, namely familiar stranger encounters in a public transit network.

熟悉的陌生人是一种社会现象,它产生于日常例行活动的连续复制,围绕着城市场所和惯例,导致随着时间的推移与相同的人重复相遇。有研究表明,增加个人之间的熟悉程度可能会减少个人的匿名性,增强遵守行为规范的道德义务,从而对场所的犯罪控制产生益处。对场所规范和规律性的熟悉还能提高监护能力,并在问题出现时提高干预意愿。在本文中,我们详细介绍了一个框架,该框架综合了地理学、社会学和心理学对城市日常生活的理解,将熟悉的陌生人概念化为一种独特的城市现象,它产生于时空同步的多个社会过程。我们的框架强调了与日常生活规律、场所属性、结构和社会规范相关的强度变化能力,并为未来测量、建模和监控熟悉的陌生人提供了依据,使其成为可归因于个人、场所和/或社会系统的犯罪保护因素。我们的框架包括一个单一使用案例的可操作性,即在公共交通网络中遇到熟悉的陌生人。
{"title":"Reimagining the familiar stranger as a source of security: generating guardianship through everyday mobility","authors":"Renee Zahnow, Jonathan Corcoran","doi":"10.1057/s41284-024-00437-1","DOIUrl":"https://doi.org/10.1057/s41284-024-00437-1","url":null,"abstract":"<p>The familiar stranger is a social phenomenon that emerges from the serial reproduction of daily routines, structured around urban places and practices, that results in repeated encounters with the same individuals over time. Scholarship suggests that increased familiarity among individuals might incur crime control benefits at places by reducing individual anonymity and enhancing the moral obligation to obey behavioural norms. Familiarity with place-based norms and regularities can also enhance guardianship capacity and willingness to intervene when problems arise. In this paper, we detail a framework that integrates geographical, sociological, and psychological understandings of urban daily life to conceptualize the familiar stranger as a uniquely urban phenomenon emerging from multiple social processes synchronising in time-space. Our framework highlights the capacity for variation in relation to intensity contingent on daily regularities, place attributes, structures and social norms and provides for future measurement, modelling, and monitoring of familiar strangers as a protective factor against crime that can be ascribed to individuals, places and/or social systems. We include an operationalisation of our framework for a single use case, namely familiar stranger encounters in a public transit network.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"103 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141883146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shadow of death: the criminal economy of banditry and kidnapping in northwest Nigeria 死亡阴影:尼日利亚西北部土匪和绑架的犯罪经济
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2024-06-22 DOI: 10.1057/s41284-024-00436-2
Oluwole Ojewale

This study explores the phenomenon of banditry as a criminal enterprise in Nigeria. By employing qualitative and quantitative data, it provides a historical context for banditry and discusses kidnapping for ransom as its variant. The spatial distribution and patterns of kidnapping incidents are also highlighted. In response to this persistent challenge posed by banditry, the study notes the government and community members have implemented three distinct strategies. They are enhancing security and law enforcement, negotiations, and legislation. The limitations of these responses are also examined. The paper offers guidance on the necessary policy imperatives to effectively combat armed banditry through a multifaceted approach. It emphasizes that addressing the escalating incidents of kidnapping for ransom in the northwest region cannot be addressed independently from the broader need for reform within the security sector of the country. Strengthening border security, preventing the free flow of illicit firearms into the nation, and concerted effort focused on the recruitment, training, and deployment of adequately equipped security personnel to the border areas become pivotal.

本研究探讨了尼日利亚的土匪犯罪现象。通过采用定性和定量数据,本研究提供了土匪行为的历史背景,并讨论了绑架勒索赎金这一变种。报告还强调了绑架事件的空间分布和模式。为应对土匪行为带来的持续挑战,研究指出政府和社区成员实施了三项不同的战略。它们是加强安全和执法、谈判和立法。研究还探讨了这些对策的局限性。本文就通过多层面方法有效打击武装盗匪活动的必要政策要领提供了指导。文件强调,解决西北地区不断升级的绑架勒索事件不能脱离该国安全部门内部更广泛的改革需求。加强边境安全、防止非法枪支自由流入该国,以及协同努力重点招募、培训和向边境地区部署装备齐全的安全人员,这些都变得至关重要。
{"title":"Shadow of death: the criminal economy of banditry and kidnapping in northwest Nigeria","authors":"Oluwole Ojewale","doi":"10.1057/s41284-024-00436-2","DOIUrl":"https://doi.org/10.1057/s41284-024-00436-2","url":null,"abstract":"<p>This study explores the phenomenon of banditry as a criminal enterprise in Nigeria. By employing qualitative and quantitative data, it provides a historical context for banditry and discusses kidnapping for ransom as its variant. The spatial distribution and patterns of kidnapping incidents are also highlighted. In response to this persistent challenge posed by banditry, the study notes the government and community members have implemented three distinct strategies. They are enhancing security and law enforcement, negotiations, and legislation. The limitations of these responses are also examined. The paper offers guidance on the necessary policy imperatives to effectively combat armed banditry through a multifaceted approach. It emphasizes that addressing the escalating incidents of kidnapping for ransom in the northwest region cannot be addressed independently from the broader need for reform within the security sector of the country. Strengthening border security, preventing the free flow of illicit firearms into the nation, and concerted effort focused on the recruitment, training, and deployment of adequately equipped security personnel to the border areas become pivotal.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"38 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital security by design 数字安全设计
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2024-06-19 DOI: 10.1057/s41284-024-00435-3
Petar Radanliev

This paper scrutinises the evolving digital security landscape, encompassing technological advancements, regulatory frameworks, and industry-specific challenges. It explores the influence of technologies like AI, quantum computing, and blockchain on security paradigms whilst identifying emergent threats. The study analyses the interplay between digital security and legislative policies, underlining their impact on industry practices and individual behaviours. Sector-specific examinations are conducted, pinpointing unique security concerns in sectors such as healthcare and finance and advocating bespoke solutions. The study highlights discrepancies between security intentions and actions, proposing strategies to bridge this divide. Projecting into the future, we anticipate shifts in technology and regulation, culminating in pragmatic recommendations for stakeholders. This article offers an informed perspective on digital security, laying the groundwork for proactive approaches in a dynamic digital environment.

本文仔细研究了不断变化的数字安全形势,包括技术进步、监管框架和特定行业的挑战。它探讨了人工智能、量子计算和区块链等技术对安全模式的影响,同时识别了新出现的威胁。研究分析了数字安全与立法政策之间的相互作用,强调了它们对行业实践和个人行为的影响。研究还针对具体行业进行了分析,指出了医疗保健和金融等行业特有的安全问题,并提出了定制解决方案。研究强调了安全意图与行动之间的差异,提出了弥合这一鸿沟的策略。展望未来,我们预计技术和监管会发生变化,最终为利益相关者提出务实的建议。本文为数字安全提供了一个明智的视角,为在动态数字环境中采取积极主动的方法奠定了基础。
{"title":"Digital security by design","authors":"Petar Radanliev","doi":"10.1057/s41284-024-00435-3","DOIUrl":"https://doi.org/10.1057/s41284-024-00435-3","url":null,"abstract":"<p>This paper scrutinises the evolving digital security landscape, encompassing technological advancements, regulatory frameworks, and industry-specific challenges. It explores the influence of technologies like AI, quantum computing, and blockchain on security paradigms whilst identifying emergent threats. The study analyses the interplay between digital security and legislative policies, underlining their impact on industry practices and individual behaviours. Sector-specific examinations are conducted, pinpointing unique security concerns in sectors such as healthcare and finance and advocating bespoke solutions. The study highlights discrepancies between security intentions and actions, proposing strategies to bridge this divide. Projecting into the future, we anticipate shifts in technology and regulation, culminating in pragmatic recommendations for stakeholders. This article offers an informed perspective on digital security, laying the groundwork for proactive approaches in a dynamic digital environment.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"31 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision-making in balancing fire safety hazards against security threats within the built environment 在建筑环境中平衡消防安全危险与安全威胁的决策
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2024-06-02 DOI: 10.1057/s41284-024-00431-7
Richard Kathage, David J. Brooks, Michael Coole

The built environment faces challenges from fire hazards and threats by malicious actors. Risks presented from these hazards and threats are managed through the practices of fire safety and physical security. Whilst distinct disciplines, both impact the built environment systems, resulting in potential conflict. To manage this conflict, a complex process is required. Through the framework of Governmentality, using a mixed methods approach, the study explored the process which fire safety engineers and security practitioners undertake to manage this conflict. The study produced a conceptual model that explains how practitioners operate and manage risk associated with fire safety hazards and security threats. The model indicates that the process for resolving conflicts is a dichotomy between physical security and fire safety, with fire safety being the most dominate and influential. Nevertheless, both fire safety and physical security are subservient to building regulations in this process; however unlike security, fire safety is codified through building regulations. Risk assessment and the design process are core processes, but only used in decision-making when there is conflict between the fire safety and physical security. Findings demonstrated that context remains static for greater threats, whereas context is dynamic for fire safety.

建筑环境面临着火灾危险和恶意行为者威胁的挑战。这些危害和威胁所带来的风险可通过消防安全和实体安保实践加以控制。虽然这两门学科截然不同,但都会对建筑环境系统产生影响,从而导致潜在的冲突。要管理这种冲突,需要一个复杂的过程。这项研究通过 "政府性 "框架,采用混合方法,探讨了消防安全工程师和安保从业人员管理这种冲突的过程。研究提出了一个概念模型,解释了从业人员如何操作和管理与消防安全危险和安保威胁相关的风险。该模型表明,解决冲突的过程是实体安保和消防安全之间的二元对立,其中消防安全占主导地位,影响最大。尽管如此,在这一过程中,消防安全和实体安全都服从于建筑法规;但与安全不同的是,消防安全是通过建筑法规来规范的。风险评估和设计过程是核心过程,但只有在消防安全和实体安保发生冲突时才会用于决策。研究结果表明,对于更大的威胁而言,环境是静态的,而对于消防安全而言,环境是动态的。
{"title":"Decision-making in balancing fire safety hazards against security threats within the built environment","authors":"Richard Kathage, David J. Brooks, Michael Coole","doi":"10.1057/s41284-024-00431-7","DOIUrl":"https://doi.org/10.1057/s41284-024-00431-7","url":null,"abstract":"<p>The built environment faces challenges from fire hazards and threats by malicious actors. Risks presented from these hazards and threats are managed through the practices of fire safety and physical security. Whilst distinct disciplines, both impact the built environment systems, resulting in potential conflict. To manage this conflict, a complex process is required. Through the framework of Governmentality, using a mixed methods approach, the study explored the process which fire safety engineers and security practitioners undertake to manage this conflict. The study produced a conceptual model that explains how practitioners operate and manage risk associated with fire safety hazards and security threats. The model indicates that the process for resolving conflicts is a dichotomy between physical security and fire safety, with fire safety being the most dominate and influential. Nevertheless, both fire safety and physical security are subservient to building regulations in this process; however unlike security, fire safety is codified through building regulations. <i>Risk assessment</i> and the <i>design process</i> are core processes, but only used in decision-making when there is conflict between the fire safety and physical security. Findings demonstrated that context remains static for greater threats, whereas context is dynamic for fire safety.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"37 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141255429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The effects of organizational images on security compliance intention: focused on affection and job security in South Korea 组织形象对安全合规意向的影响:以韩国的亲情和工作安全为重点
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2024-05-14 DOI: 10.1057/s41284-024-00429-1
Juyeon Oh, Seunghwan Myeong

This study investigates the factors influencing Korean corporate workers to increase their intention to comply with security voluntarily. Specifically, this study investigates whether organizational attractiveness affects employees' intention to comply with security. In addition, this study will examine whether affection and job security, which represent the Korean corporate image, affect organizational attractiveness. 477 data collecting online survey was used to test the research model. Participants for our survey were derived from workers and public officials in South Korea. The results were as follows. First, the symbolic image of being affectionate influences the instrumental image of job security. Second, an instrumental image has a significantly positive effect on corporate attractiveness. Third, it was found that job security increased the attractiveness of the organization perceived by the employees and, in turn, increased the intention of the employees to comply with the organization's security. Our findings can be used to develop strategies to enhance security compliance intention within firms.

本研究调查了影响韩国企业员工提高自愿遵守安全规定意愿的因素。具体而言,本研究将探讨组织吸引力是否会影响员工遵守安全规定的意愿。此外,本研究还将探讨代表韩国企业形象的亲和力和工作安全感是否会影响组织吸引力。本研究使用了 477 份在线调查数据来检验研究模型。调查对象来自韩国的工人和政府官员。结果如下。首先,亲切的象征性形象会影响工作保障的工具性形象。第二,工具性形象对企业吸引力有明显的积极影响。第三,研究发现工作安全感增加了员工感知到的组织吸引力,进而增加了员工遵守组织安全感的意愿。我们的研究结果可用于制定战略,以增强企业内部的安全合规意向。
{"title":"The effects of organizational images on security compliance intention: focused on affection and job security in South Korea","authors":"Juyeon Oh, Seunghwan Myeong","doi":"10.1057/s41284-024-00429-1","DOIUrl":"https://doi.org/10.1057/s41284-024-00429-1","url":null,"abstract":"<p>This study investigates the factors influencing Korean corporate workers to increase their intention to comply with security voluntarily. Specifically, this study investigates whether organizational attractiveness affects employees' intention to comply with security. In addition, this study will examine whether affection and job security, which represent the Korean corporate image, affect organizational attractiveness. 477 data collecting online survey was used to test the research model. Participants for our survey were derived from workers and public officials in South Korea. The results were as follows. First, the symbolic image of being affectionate influences the instrumental image of job security. Second, an instrumental image has a significantly positive effect on corporate attractiveness. Third, it was found that job security increased the attractiveness of the organization perceived by the employees and, in turn, increased the intention of the employees to comply with the organization's security. Our findings can be used to develop strategies to enhance security compliance intention within firms.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"9 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140935147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the value of holiday preferences and routine activities for understanding tourist victimisation while on holiday 探讨度假偏好和日常活动对了解游客在度假期间受害情况的价值
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2024-05-13 DOI: 10.1057/s41284-024-00430-8
Zarina I. Vakhitova, Rob I. Mawby, Nicola Helps

Crime risk can affect tourists’ choices of holiday destination, accommodation, and activities. However, victimisation of tourists has received limited attention in existing studies. This paper integrates tourists’ holiday preferences with lifestyles and routine activities explanations to examine the relationship between tourism and victimisation. Using a sample of Australian tourists who travelled to Bali or the British Isles (N = 1027), we demonstrate the usefulness of this integrated approach in understanding the risk of theft while on holiday. We found that tourists aspiring to be adventurous, but opting for pre-arranged package holidays and spending most of their time with other tourists, were most vulnerable to theft from their person. The findings can help ensure that security measures target those who will benefit it the most.

犯罪风险会影响游客对度假目的地、住宿和活动的选择。然而,现有研究对游客受害情况的关注有限。本文将游客的度假偏好与生活方式和日常活动解释相结合,研究旅游业与受害情况之间的关系。通过对前往巴厘岛或英伦三岛旅游的澳大利亚游客(N = 1027)进行抽样调查,我们证明了这种综合方法在了解度假期间的盗窃风险方面的实用性。我们发现,渴望冒险但选择预先安排的套餐式假期、大部分时间与其他游客在一起的游客最容易遭受人身盗窃。这些发现有助于确保安保措施针对最受益的人群。
{"title":"Exploring the value of holiday preferences and routine activities for understanding tourist victimisation while on holiday","authors":"Zarina I. Vakhitova, Rob I. Mawby, Nicola Helps","doi":"10.1057/s41284-024-00430-8","DOIUrl":"https://doi.org/10.1057/s41284-024-00430-8","url":null,"abstract":"<p>Crime risk can affect tourists’ choices of holiday destination, accommodation, and activities. However, victimisation of tourists has received limited attention in existing studies. This paper integrates tourists’ holiday preferences with lifestyles and routine activities explanations to examine the relationship between tourism and victimisation. Using a sample of Australian tourists who travelled to Bali or the British Isles (<i>N</i> = 1027), we demonstrate the usefulness of this integrated approach in understanding the risk of theft while on holiday. We found that tourists aspiring to be adventurous, but opting for pre-arranged package holidays and spending most of their time with other tourists, were most vulnerable to theft from their person. The findings can help ensure that security measures target those who will benefit it the most.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"23 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140935144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of the activities of authorities to ensure the prevention of offenses in the Republic of Kazakhstan and other world countries 对哈萨克斯坦共和国和世界其他国家当局为确保预防犯罪而开展的活动进行比较分析
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2024-04-05 DOI: 10.1057/s41284-024-00425-5
Kassymbek Zhakenov, Leila Kultemirova, Alua Ibraeva

The relevance of this topic is due to the increase in the level of crime in Kazakhstan, as well as in foreign countries amid the global crisis, inflation, and other aspects that affect the criminal behavior of citizens. The purpose of the work within this topic is to study the main aspects underlying the legal activities of entities authorized to apply measures to prevent and combat offences. These are the main methods used in this article: comparative method, statistical method, and method of systematization. The identification of the main regulatory legal acts of the Republic of Kazakhstan (RK) are the results of the work, which regulates the activities of internal affairs authorities in the relevant area; it has clarified the issue of problems that arise when performing the functions for prevention of offences among minors, as well as violations of legislation in the transport sector, and others. The most effective types and methods of preventing and deterring offences have been investigated. In addition, in the course of conducting research, it was analyzed foreign experience in the prevention and deterrence of several types of criminals, administrative, and other offences and the main achievements in the relevant field.

本专题之所以具有现实意义,是因为在全球危机、通货膨胀以及影响公民犯罪行为的其他方面的影响下,哈萨克斯坦以及外国的犯罪率有所上升。本专题工作的目的是研究受权采取措施预防和打击犯罪的实体的法律活动的主要方面。本文采用的主要方法有:比较法、统计法和系统化方法。确定哈萨克斯坦共和国(RK)的主要规范性法案是规范内务机关在相关领域活动的工作成果;它明确了在履行预防未成年人犯罪职能时出现的问题,以及交通部门的违法行为等。调查了预防和遏制犯罪的最有效类型和方法。此外,在研究过程中,还分析了外国在预防和威慑几类犯罪、行政犯罪和其他犯罪方面的经验,以及在相关领域取得的主要成就。
{"title":"Comparative analysis of the activities of authorities to ensure the prevention of offenses in the Republic of Kazakhstan and other world countries","authors":"Kassymbek Zhakenov, Leila Kultemirova, Alua Ibraeva","doi":"10.1057/s41284-024-00425-5","DOIUrl":"https://doi.org/10.1057/s41284-024-00425-5","url":null,"abstract":"<p>The relevance of this topic is due to the increase in the level of crime in Kazakhstan, as well as in foreign countries amid the global crisis, inflation, and other aspects that affect the criminal behavior of citizens. The purpose of the work within this topic is to study the main aspects underlying the legal activities of entities authorized to apply measures to prevent and combat offences. These are the main methods used in this article: comparative method, statistical method, and method of systematization. The identification of the main regulatory legal acts of the Republic of Kazakhstan (RK) are the results of the work, which regulates the activities of internal affairs authorities in the relevant area; it has clarified the issue of problems that arise when performing the functions for prevention of offences among minors, as well as violations of legislation in the transport sector, and others. The most effective types and methods of preventing and deterring offences have been investigated. In addition, in the course of conducting research, it was analyzed foreign experience in the prevention and deterrence of several types of criminals, administrative, and other offences and the main achievements in the relevant field.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"22 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140566956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bridging the gap between criminology and computer vision: A multidisciplinary approach to curb gun violence 缩小犯罪学与计算机视觉之间的差距:遏制枪支暴力的多学科方法
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2024-04-02 DOI: 10.1057/s41284-024-00423-7
Tyler E. Houser, Alan McMillan, Beidi Dong

Gun violence significantly threatens tens of thousands of people annually in the United States. This paper proposes a multidisciplinary approach to address this issue. Specifically, we bridge the gap between criminology and computer vision by exploring the applicability of firearm object detection algorithms to the criminal justice system. By situating firearm object detection algorithms in situational crime prevention, we outline how they could enhance the current use of closed-circuit television (CCTV) systems to mitigate gun violence. We elucidate our approach to training a firearm object detection algorithm and describe why its results are meaningful to scholars beyond the realm of computer vision. Lastly, we discuss limitations associated with object detection algorithms and why they are valuable to criminal justice practices.

在美国,枪支暴力每年严重威胁着成千上万的人。本文提出了一种多学科方法来解决这一问题。具体来说,我们通过探索枪支物体检测算法在刑事司法系统中的适用性,在犯罪学和计算机视觉之间架起了一座桥梁。通过将枪支物体检测算法置于情景犯罪预防中,我们概述了这些算法如何能够加强目前闭路电视系统的使用,以减少枪支暴力。我们阐明了训练枪支目标检测算法的方法,并说明了为什么其结果对计算机视觉领域以外的学者有意义。最后,我们讨论了与物体检测算法相关的局限性,以及为什么这些算法对刑事司法实践很有价值。
{"title":"Bridging the gap between criminology and computer vision: A multidisciplinary approach to curb gun violence","authors":"Tyler E. Houser, Alan McMillan, Beidi Dong","doi":"10.1057/s41284-024-00423-7","DOIUrl":"https://doi.org/10.1057/s41284-024-00423-7","url":null,"abstract":"<p>Gun violence significantly threatens tens of thousands of people annually in the United States. This paper proposes a multidisciplinary approach to address this issue. Specifically, we bridge the gap between criminology and computer vision by exploring the applicability of firearm object detection algorithms to the criminal justice system. By situating firearm object detection algorithms in situational crime prevention, we outline how they could enhance the current use of closed-circuit television (CCTV) systems to mitigate gun violence. We elucidate our approach to training a firearm object detection algorithm and describe why its results are meaningful to scholars beyond the realm of computer vision. Lastly, we discuss limitations associated with object detection algorithms and why they are valuable to criminal justice practices.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"49 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140567024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing a Dark Web forum page in the context of terrorism: a topic modeling approach 分析恐怖主义背景下的暗网论坛页面:主题建模方法
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2024-03-13 DOI: 10.1057/s41284-024-00421-9
Eda Sonmez, Keziban Seckin Codal

Dark Web has turned into a platform for a variety of criminal activities, including weapon trafficking, pornography, fake documents, drug trafficking, and, most notably terrorism as detailed in this study. This article uses an LDA-based topic modeling approach to identify the topics addressed in discussions on the Dark Web. The main purpose is to present an overview of jihadists’ communication in cyberspace for the detection of unusual behavior or terrorism-related purposes. According to the findings, conversations in the context of recruitment and propaganda predominated at the forum. There was no direct evidence of terrorist collaboration at the conclusion of the investigation. This does not, however, imply that these sites are risk-free. Propaganda and recruitment tools feed the terrorist activities.

暗网已成为各种犯罪活动的平台,包括武器贩运、色情、伪造证件、毒品贩运,以及本研究中详述的最引人注目的恐怖主义。本文采用基于 LDA 的主题建模方法来识别暗网上讨论的主题。主要目的是概述圣战分子在网络空间中的交流情况,以发现异常行为或与恐怖主义相关的目的。研究结果表明,论坛上有关招募和宣传的对话占主导地位。在调查结束时,没有直接证据表明存在恐怖主义合作。但这并不意味着这些网站没有风险。宣传和招募工具助长了恐怖活动。
{"title":"Analyzing a Dark Web forum page in the context of terrorism: a topic modeling approach","authors":"Eda Sonmez, Keziban Seckin Codal","doi":"10.1057/s41284-024-00421-9","DOIUrl":"https://doi.org/10.1057/s41284-024-00421-9","url":null,"abstract":"<p>Dark Web has turned into a platform for a variety of criminal activities, including weapon trafficking, pornography, fake documents, drug trafficking, and, most notably terrorism as detailed in this study. This article uses an LDA-based topic modeling approach to identify the topics addressed in discussions on the Dark Web. The main purpose is to present an overview of jihadists’ communication in cyberspace for the detection of unusual behavior or terrorism-related purposes. According to the findings, conversations in the context of recruitment and propaganda predominated at the forum. There was no direct evidence of terrorist collaboration at the conclusion of the investigation. This does not, however, imply that these sites are risk-free. Propaganda and recruitment tools feed the terrorist activities.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"19 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140117028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1