首页 > 最新文献

Security Journal最新文献

英文 中文
Comparative analysis of the activities of authorities to ensure the prevention of offenses in the Republic of Kazakhstan and other world countries 对哈萨克斯坦共和国和世界其他国家当局为确保预防犯罪而开展的活动进行比较分析
IF 1.2 Q1 Social Sciences Pub Date : 2024-04-05 DOI: 10.1057/s41284-024-00425-5
Kassymbek Zhakenov, Leila Kultemirova, Alua Ibraeva

The relevance of this topic is due to the increase in the level of crime in Kazakhstan, as well as in foreign countries amid the global crisis, inflation, and other aspects that affect the criminal behavior of citizens. The purpose of the work within this topic is to study the main aspects underlying the legal activities of entities authorized to apply measures to prevent and combat offences. These are the main methods used in this article: comparative method, statistical method, and method of systematization. The identification of the main regulatory legal acts of the Republic of Kazakhstan (RK) are the results of the work, which regulates the activities of internal affairs authorities in the relevant area; it has clarified the issue of problems that arise when performing the functions for prevention of offences among minors, as well as violations of legislation in the transport sector, and others. The most effective types and methods of preventing and deterring offences have been investigated. In addition, in the course of conducting research, it was analyzed foreign experience in the prevention and deterrence of several types of criminals, administrative, and other offences and the main achievements in the relevant field.

本专题之所以具有现实意义,是因为在全球危机、通货膨胀以及影响公民犯罪行为的其他方面的影响下,哈萨克斯坦以及外国的犯罪率有所上升。本专题工作的目的是研究受权采取措施预防和打击犯罪的实体的法律活动的主要方面。本文采用的主要方法有:比较法、统计法和系统化方法。确定哈萨克斯坦共和国(RK)的主要规范性法案是规范内务机关在相关领域活动的工作成果;它明确了在履行预防未成年人犯罪职能时出现的问题,以及交通部门的违法行为等。调查了预防和遏制犯罪的最有效类型和方法。此外,在研究过程中,还分析了外国在预防和威慑几类犯罪、行政犯罪和其他犯罪方面的经验,以及在相关领域取得的主要成就。
{"title":"Comparative analysis of the activities of authorities to ensure the prevention of offenses in the Republic of Kazakhstan and other world countries","authors":"Kassymbek Zhakenov, Leila Kultemirova, Alua Ibraeva","doi":"10.1057/s41284-024-00425-5","DOIUrl":"https://doi.org/10.1057/s41284-024-00425-5","url":null,"abstract":"<p>The relevance of this topic is due to the increase in the level of crime in Kazakhstan, as well as in foreign countries amid the global crisis, inflation, and other aspects that affect the criminal behavior of citizens. The purpose of the work within this topic is to study the main aspects underlying the legal activities of entities authorized to apply measures to prevent and combat offences. These are the main methods used in this article: comparative method, statistical method, and method of systematization. The identification of the main regulatory legal acts of the Republic of Kazakhstan (RK) are the results of the work, which regulates the activities of internal affairs authorities in the relevant area; it has clarified the issue of problems that arise when performing the functions for prevention of offences among minors, as well as violations of legislation in the transport sector, and others. The most effective types and methods of preventing and deterring offences have been investigated. In addition, in the course of conducting research, it was analyzed foreign experience in the prevention and deterrence of several types of criminals, administrative, and other offences and the main achievements in the relevant field.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140566956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bridging the gap between criminology and computer vision: A multidisciplinary approach to curb gun violence 缩小犯罪学与计算机视觉之间的差距:遏制枪支暴力的多学科方法
IF 1.2 Q1 Social Sciences Pub Date : 2024-04-02 DOI: 10.1057/s41284-024-00423-7
Tyler E. Houser, Alan McMillan, Beidi Dong

Gun violence significantly threatens tens of thousands of people annually in the United States. This paper proposes a multidisciplinary approach to address this issue. Specifically, we bridge the gap between criminology and computer vision by exploring the applicability of firearm object detection algorithms to the criminal justice system. By situating firearm object detection algorithms in situational crime prevention, we outline how they could enhance the current use of closed-circuit television (CCTV) systems to mitigate gun violence. We elucidate our approach to training a firearm object detection algorithm and describe why its results are meaningful to scholars beyond the realm of computer vision. Lastly, we discuss limitations associated with object detection algorithms and why they are valuable to criminal justice practices.

在美国,枪支暴力每年严重威胁着成千上万的人。本文提出了一种多学科方法来解决这一问题。具体来说,我们通过探索枪支物体检测算法在刑事司法系统中的适用性,在犯罪学和计算机视觉之间架起了一座桥梁。通过将枪支物体检测算法置于情景犯罪预防中,我们概述了这些算法如何能够加强目前闭路电视系统的使用,以减少枪支暴力。我们阐明了训练枪支目标检测算法的方法,并说明了为什么其结果对计算机视觉领域以外的学者有意义。最后,我们讨论了与物体检测算法相关的局限性,以及为什么这些算法对刑事司法实践很有价值。
{"title":"Bridging the gap between criminology and computer vision: A multidisciplinary approach to curb gun violence","authors":"Tyler E. Houser, Alan McMillan, Beidi Dong","doi":"10.1057/s41284-024-00423-7","DOIUrl":"https://doi.org/10.1057/s41284-024-00423-7","url":null,"abstract":"<p>Gun violence significantly threatens tens of thousands of people annually in the United States. This paper proposes a multidisciplinary approach to address this issue. Specifically, we bridge the gap between criminology and computer vision by exploring the applicability of firearm object detection algorithms to the criminal justice system. By situating firearm object detection algorithms in situational crime prevention, we outline how they could enhance the current use of closed-circuit television (CCTV) systems to mitigate gun violence. We elucidate our approach to training a firearm object detection algorithm and describe why its results are meaningful to scholars beyond the realm of computer vision. Lastly, we discuss limitations associated with object detection algorithms and why they are valuable to criminal justice practices.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140567024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Place of hotel characteristics and security systems in hotel operations, Nigeria 尼日利亚酒店特点和安全系统在酒店运营中的地位
IF 1.2 Q1 Social Sciences Pub Date : 2024-03-30 DOI: 10.1057/s41284-024-00422-8
G. Oladehinde, Adeola Francisca Oladele, Olubunmi Lukman Lawal, O. J. Kehinde
{"title":"Place of hotel characteristics and security systems in hotel operations, Nigeria","authors":"G. Oladehinde, Adeola Francisca Oladele, Olubunmi Lukman Lawal, O. J. Kehinde","doi":"10.1057/s41284-024-00422-8","DOIUrl":"https://doi.org/10.1057/s41284-024-00422-8","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140364339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing a Dark Web forum page in the context of terrorism: a topic modeling approach 分析恐怖主义背景下的暗网论坛页面:主题建模方法
IF 1.2 Q1 Social Sciences Pub Date : 2024-03-13 DOI: 10.1057/s41284-024-00421-9
Eda Sonmez, Keziban Seckin Codal

Dark Web has turned into a platform for a variety of criminal activities, including weapon trafficking, pornography, fake documents, drug trafficking, and, most notably terrorism as detailed in this study. This article uses an LDA-based topic modeling approach to identify the topics addressed in discussions on the Dark Web. The main purpose is to present an overview of jihadists’ communication in cyberspace for the detection of unusual behavior or terrorism-related purposes. According to the findings, conversations in the context of recruitment and propaganda predominated at the forum. There was no direct evidence of terrorist collaboration at the conclusion of the investigation. This does not, however, imply that these sites are risk-free. Propaganda and recruitment tools feed the terrorist activities.

暗网已成为各种犯罪活动的平台,包括武器贩运、色情、伪造证件、毒品贩运,以及本研究中详述的最引人注目的恐怖主义。本文采用基于 LDA 的主题建模方法来识别暗网上讨论的主题。主要目的是概述圣战分子在网络空间中的交流情况,以发现异常行为或与恐怖主义相关的目的。研究结果表明,论坛上有关招募和宣传的对话占主导地位。在调查结束时,没有直接证据表明存在恐怖主义合作。但这并不意味着这些网站没有风险。宣传和招募工具助长了恐怖活动。
{"title":"Analyzing a Dark Web forum page in the context of terrorism: a topic modeling approach","authors":"Eda Sonmez, Keziban Seckin Codal","doi":"10.1057/s41284-024-00421-9","DOIUrl":"https://doi.org/10.1057/s41284-024-00421-9","url":null,"abstract":"<p>Dark Web has turned into a platform for a variety of criminal activities, including weapon trafficking, pornography, fake documents, drug trafficking, and, most notably terrorism as detailed in this study. This article uses an LDA-based topic modeling approach to identify the topics addressed in discussions on the Dark Web. The main purpose is to present an overview of jihadists’ communication in cyberspace for the detection of unusual behavior or terrorism-related purposes. According to the findings, conversations in the context of recruitment and propaganda predominated at the forum. There was no direct evidence of terrorist collaboration at the conclusion of the investigation. This does not, however, imply that these sites are risk-free. Propaganda and recruitment tools feed the terrorist activities.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140117028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disruptive behavior of young people in shopping malls: a security provider perspective 年轻人在购物中心的破坏行为:安保提供商的视角
IF 1.2 Q1 Social Sciences Pub Date : 2024-03-08 DOI: 10.1057/s41284-024-00419-3
Viktorie Paloušová

This research is dedicated to unpacking the complex dynamics of disruptive behavior among youths in shopping malls. It leverages discursive psychology to dissect eight semi-structured interviews with security staff from Czech retail complexes. The study reveals that social control mechanisms within these semi-public spaces significantly impact young people’s conduct. Contributory factors to the onset and progression of unruly behavior are identified as Wi-Fi availability, which seeds the environment for practical jokes, peer pressure, and a lack of parental oversight. Although security measures tend to conform to formal protocols, they frequently rely on instinct or adopt an informal, parental approach. The research suggests that partnering with youth workers could provide a more effective strategy for addressing such behaviors, bridging the gap between formal policy and practice.

本研究致力于揭示商场中青少年破坏行为的复杂动态。研究利用辨证心理学,对捷克零售商场的安保人员进行了八次半结构化访谈。研究揭示了这些半公共场所的社会控制机制对青少年行为的重大影响。研究发现,导致不守规矩行为发生和发展的因素有:Wi-Fi 的可用性,这为恶作剧、同伴压力和缺乏父母监督提供了环境。虽然安全措施往往符合正式协议,但他们经常依赖本能或采用非正式的家长方式。研究表明,与青年工作者合作可以为解决此类行为提供更有效的策略,弥合正式政策与实践之间的差距。
{"title":"Disruptive behavior of young people in shopping malls: a security provider perspective","authors":"Viktorie Paloušová","doi":"10.1057/s41284-024-00419-3","DOIUrl":"https://doi.org/10.1057/s41284-024-00419-3","url":null,"abstract":"<p>This research is dedicated to unpacking the complex dynamics of disruptive behavior among youths in shopping malls. It leverages discursive psychology to dissect eight semi-structured interviews with security staff from Czech retail complexes. The study reveals that social control mechanisms within these semi-public spaces significantly impact young people’s conduct. Contributory factors to the onset and progression of unruly behavior are identified as Wi-Fi availability, which seeds the environment for practical jokes, peer pressure, and a lack of parental oversight. Although security measures tend to conform to formal protocols, they frequently rely on instinct or adopt an informal, parental approach. The research suggests that partnering with youth workers could provide a more effective strategy for addressing such behaviors, bridging the gap between formal policy and practice.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140076671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptocurrency Ponzi schemes and their modus operandi in South Korea 韩国的加密货币庞氏骗局及其作案手法
IF 1.2 Q1 Social Sciences Pub Date : 2024-03-08 DOI: 10.1057/s41284-024-00417-5
Seoung Won Choi, Julak Lee, Sang-Hak Lee

The surge of interest in digital currencies has led to a corresponding global increase in Ponzi schemes associated with cryptocurrencies. Scammers of cryptocurrency Ponzi schemes often target older adults who are cash-rich and have limited knowledge of digital assets. Therefore, to reduce the number of victims, it is imperative to increase the understanding of the crime itself. However, there remains a paucity of scholarly exploration focused on the criminal mechanisms underpinning such schemes and the strategic decision-making process of the perpetrators. This study seeks to address this gap in the literature and enhance the current understanding of cryptocurrency-based Ponzi schemes through an examination of their operational tactics. The methodology employed in this study distinguishes the progression of these schemes into two stages: the pre-crime phase and the criminal event phase, each scripted for further clarity, yielding three scripts for the former and eleven for the latter. Based on these parsed narratives, this research proposes several policy strategies aimed at curtailing the prevalence of cryptocurrency Ponzi schemes.

人们对数字货币的兴趣激增,导致全球与加密货币相关的庞氏骗局也相应增加。加密货币庞氏骗局的诈骗者通常以现金充裕、对数字资产了解有限的老年人为目标。因此,要减少受害者人数,就必须加强对犯罪本身的了解。然而,学术界对此类骗局的犯罪机制和犯罪者的战略决策过程的探索仍然很少。本研究旨在弥补文献中的这一空白,并通过研究基于加密货币的庞氏骗局的运作策略,加深当前对此类骗局的理解。本研究采用的方法将这些计划的进展分为两个阶段:犯罪前阶段和犯罪事件阶段,每个阶段都编写了脚本以进一步明确,前者编写了三个脚本,后者编写了十一个脚本。根据这些经过解析的叙述,本研究提出了几项旨在遏制加密货币庞氏骗局盛行的政策战略。
{"title":"Cryptocurrency Ponzi schemes and their modus operandi in South Korea","authors":"Seoung Won Choi, Julak Lee, Sang-Hak Lee","doi":"10.1057/s41284-024-00417-5","DOIUrl":"https://doi.org/10.1057/s41284-024-00417-5","url":null,"abstract":"<p>The surge of interest in digital currencies has led to a corresponding global increase in Ponzi schemes associated with cryptocurrencies. Scammers of cryptocurrency Ponzi schemes often target older adults who are cash-rich and have limited knowledge of digital assets. Therefore, to reduce the number of victims, it is imperative to increase the understanding of the crime itself. However, there remains a paucity of scholarly exploration focused on the criminal mechanisms underpinning such schemes and the strategic decision-making process of the perpetrators. This study seeks to address this gap in the literature and enhance the current understanding of cryptocurrency-based Ponzi schemes through an examination of their operational tactics. The methodology employed in this study distinguishes the progression of these schemes into two stages: the pre-crime phase and the criminal event phase, each scripted for further clarity, yielding three scripts for the former and eleven for the latter. Based on these parsed narratives, this research proposes several policy strategies aimed at curtailing the prevalence of cryptocurrency Ponzi schemes.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140073364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Community-based vigilante violence and corporate social responsibility in Nigeria’s oil-producing region 更正为尼日利亚产油区基于社区的私刑暴力与企业社会责任
IF 1.2 Q1 Social Sciences Pub Date : 2024-03-07 DOI: 10.1057/s41284-024-00424-6
J. I. Uduji, E. N. Okolo-obasi, Damian Uche Aja, Deborah Chinwendu Otei, H. O. Obi-Anike, Samuel Chukwuemeka Ezuka, E. E. Nwanmuoh, Steve Emeka Emengini
{"title":"Correction to: Community-based vigilante violence and corporate social responsibility in Nigeria’s oil-producing region","authors":"J. I. Uduji, E. N. Okolo-obasi, Damian Uche Aja, Deborah Chinwendu Otei, H. O. Obi-Anike, Samuel Chukwuemeka Ezuka, E. E. Nwanmuoh, Steve Emeka Emengini","doi":"10.1057/s41284-024-00424-6","DOIUrl":"https://doi.org/10.1057/s41284-024-00424-6","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140259117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying cyber security competencies and skills from online job advertisements through topic modeling 通过主题建模从在线招聘广告中识别网络安全能力和技能
IF 1.2 Q1 Social Sciences Pub Date : 2024-03-06 DOI: 10.1057/s41284-024-00420-w
Ozcan Ozyurt, Ahmet Ayaz

This study aims to reveal the competence areas and skill sets needed in the business world in the field of cyber security (CS). For this purpose, descriptive analysis, topic modeling analysis, and semantic content analysis were conducted on 9407 CS job advertisements obtained from Indeed.com. The results of the study revealed a total of 10 job titles and 23 skill sets expected by the business world in CS job postings. The first three titles in terms of volume were “Engineer”, “Analyst” and “Specialist”, while the first three skill sets were determined as “Business/Customer services”, “System engineering”, and “Bachelor degree”. In addition, maps showing the relationships between titles and skills were created with a title-skill set matrix. The results of our study can be expected to contribute to candidates and professionals in the field of cyber security, IT organizations, and educational institutions in the cyber security business world by seeing, evaluating, developing, and expanding the current knowledge, skills, and competencies needed in the field.

本研究旨在揭示商业世界在网络安全(CS)领域所需的能力领域和技能组合。为此,我们对从 Indeed.com 上获取的 9407 份 CS 招聘广告进行了描述性分析、主题建模分析和语义内容分析。研究结果显示,在 CS 招聘广告中,商业界期望的职位名称共有 10 个,技能组合有 23 种。数量排在前三位的职位分别是 "工程师"、"分析师 "和 "专家",而技能组合排在前三位的分别是 "商业/客户服务"、"系统工程 "和 "学士学位"。此外,还利用职称-技能组合矩阵绘制了显示职称与技能之间关系的地图。通过了解、评估、开发和扩展当前网络安全领域所需的知识、技能和能力,我们的研究结果有望为网络安全领域的候选人和专业人员、IT 组织和教育机构做出贡献。
{"title":"Identifying cyber security competencies and skills from online job advertisements through topic modeling","authors":"Ozcan Ozyurt, Ahmet Ayaz","doi":"10.1057/s41284-024-00420-w","DOIUrl":"https://doi.org/10.1057/s41284-024-00420-w","url":null,"abstract":"<p>This study aims to reveal the competence areas and skill sets needed in the business world in the field of cyber security (CS). For this purpose, descriptive analysis, topic modeling analysis, and semantic content analysis were conducted on 9407 CS job advertisements obtained from Indeed.com. The results of the study revealed a total of 10 job titles and 23 skill sets expected by the business world in CS job postings. The first three titles in terms of volume were “Engineer”, “Analyst” and “Specialist”, while the first three skill sets were determined as “Business/Customer services”, “System engineering”, and “Bachelor degree”. In addition, maps showing the relationships between titles and skills were created with a title-skill set matrix. The results of our study can be expected to contribute to candidates and professionals in the field of cyber security, IT organizations, and educational institutions in the cyber security business world by seeing, evaluating, developing, and expanding the current knowledge, skills, and competencies needed in the field.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140046861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crime analysis and prediction using machine-learning approach in the case of Hossana Police Commission 利用机器学习方法对霍萨纳警察委员会的犯罪情况进行分析和预测
IF 1.2 Q1 Social Sciences Pub Date : 2024-03-01 DOI: 10.1057/s41284-024-00416-6
Betelhem Zewdu Wubineh

Crime is a socioeconomic problem that affects the quality of life and economic growth of a country, and it continues to increase. Crime prevention and prediction are systematic approaches used to locate and analyze historical data to identify trends that can be employed in identifying crimes and criminals. The objective of this study is to predict the type of crime that occurred in the city and identify the important features that make this prediction using a machine learning technique. For this experimental investigation, a supervised learning method was used to classify the types of crimes based on the final labelled class that indicates which type of crime is committed. Thus, decision tree (DT), random forest (RF), and K-nearest neighbor (KNN) algorithms are utilized along with the Python programming language in the Jupyter notebook environment. A total of 1400 records and nine attributes were used, and the data were split into training and testing sets, with 80% allocated to training and 20% for testing. The decision tree achieved an accuracy score of 84%, followed by the random forest at 86.07% and K-nearest neighbor at 81%. Besides this, the job of the offender, the victim’s age, and the offender’s age are the important features that cause crime. Therefore, it can be concluded that the use of machine learning to analyze historical data and the random forest algorithm to classify crimes yields promising results in predicting the type of crime.

犯罪是一个社会经济问题,影响着一个国家的生活质量和经济增长,而且犯罪率还在持续上升。犯罪预防和预测是一种系统方法,用于查找和分析历史数据,以确定可用于识别犯罪和罪犯的趋势。本研究的目的是利用机器学习技术预测城市中发生的犯罪类型,并确定进行预测的重要特征。在这项实验调查中,我们使用了一种监督学习方法,根据最终标记的类别来对犯罪类型进行分类,该类别表明实施了哪种类型的犯罪。因此,在 Jupyter 笔记本环境中使用了决策树(DT)、随机森林(RF)和 K 近邻(KNN)算法以及 Python 编程语言。共使用了 1400 条记录和 9 个属性,数据被分成训练集和测试集,其中 80% 用于训练,20% 用于测试。结果表明,决策树的准确率为 84%,随机森林的准确率为 86.07%,K-近邻的准确率为 81%。除此以外,罪犯的职业、受害者的年龄和罪犯的年龄也是导致犯罪的重要特征。因此,可以得出结论,使用机器学习分析历史数据和随机森林算法对犯罪进行分类,在预测犯罪类型方面取得了可喜的成果。
{"title":"Crime analysis and prediction using machine-learning approach in the case of Hossana Police Commission","authors":"Betelhem Zewdu Wubineh","doi":"10.1057/s41284-024-00416-6","DOIUrl":"https://doi.org/10.1057/s41284-024-00416-6","url":null,"abstract":"<p>Crime is a socioeconomic problem that affects the quality of life and economic growth of a country, and it continues to increase. Crime prevention and prediction are systematic approaches used to locate and analyze historical data to identify trends that can be employed in identifying crimes and criminals. The objective of this study is to predict the type of crime that occurred in the city and identify the important features that make this prediction using a machine learning technique. For this experimental investigation, a supervised learning method was used to classify the types of crimes based on the final labelled class that indicates which type of crime is committed. Thus, decision tree (DT), random forest (RF), and K-nearest neighbor (KNN) algorithms are utilized along with the Python programming language in the Jupyter notebook environment. A total of 1400 records and nine attributes were used, and the data were split into training and testing sets, with 80% allocated to training and 20% for testing. The decision tree achieved an accuracy score of 84%, followed by the random forest at 86.07% and K-nearest neighbor at 81%. Besides this, the job of the offender, the victim’s age, and the offender’s age are the important features that cause crime. Therefore, it can be concluded that the use of machine learning to analyze historical data and the random forest algorithm to classify crimes yields promising results in predicting the type of crime.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140019403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring the adoption of Enterprise Security Risk Management in Kenya’s higher education using the ASIS ESRM Maturity Model 利用 ASIS ESRM 成熟度模型衡量肯尼亚高等教育机构采用企业安全风险管理的情况
IF 1.2 Q1 Social Sciences Pub Date : 2024-02-20 DOI: 10.1057/s41284-024-00418-4
Levis Omusugu Amuya, Peterson Mwai Kariuki

Enterprise Security Risk Management (ESRM) is gaining popularity in industry circles, especially after the American Society of Industrial Security (ASIS International) elevated it as its strategic priority in 2016. However, research on its adoption has attracted little attention, especially in universities which are often characterized by outstanding variations in culture, structure, and more. In this paper, we conduct a self-assessment of ESRM maturity in Kenya’s accredited universities using process metrics of the 2019 ASIS ESRM Maturity Model and insights from university security executives. The findings reveal that more than 35% of accredited universities have achieved advanced levels of ESRM adoption, with over 57% at average or middle levels, predominantly at Level 3. Public accredited universities exhibit higher ESRM adoption levels compared to their private counterparts. The study also identifies variations in the terminology used, with 60% using “Security Risk Management (SRM),” 35% using “University Risk Management,” and a minority adopting ESRM. The discomfort with the “enterprise” term indicates a need for awareness and sensitization programs. We argue that benchmarking with optimized ESRM adopters and increasing awareness and integration of ESRM in strategic planning and institutional governance are crucial for comprehensive security risk management in higher education.

企业安全风险管理(ESRM)在业界越来越受欢迎,尤其是在美国工业安全协会(ASIS International)于 2016 年将其提升为战略重点之后。然而,对其采用情况的研究却鲜有人关注,尤其是在文化、结构等方面往往存在突出差异的大学中。在本文中,我们利用 2019 ASIS ESRM 成熟度模型的流程指标和大学安全管理人员的见解,对肯尼亚经认证的大学的 ESRM 成熟度进行了自我评估。研究结果显示,超过 35% 的经认证大学在采用 ESRM 方面达到了高级水平,超过 57% 的大学处于平均或中等水平,主要是第 3 级。与私立大学相比,公立大学的 ESRM 应用水平更高。研究还发现了所用术语的差异,其中 60% 使用 "安全风险管理 (SRM)",35% 使用 "大学风险管理",少数采用 ESRM。对 "企业 "一词的不习惯表明,需要开展提高认识和宣传计划。我们认为,与ESRM的最佳采用者建立基准,提高对ESRM的认识并将其纳入战略规划和机构管理,对于高等教育的全面安全风险管理至关重要。
{"title":"Measuring the adoption of Enterprise Security Risk Management in Kenya’s higher education using the ASIS ESRM Maturity Model","authors":"Levis Omusugu Amuya, Peterson Mwai Kariuki","doi":"10.1057/s41284-024-00418-4","DOIUrl":"https://doi.org/10.1057/s41284-024-00418-4","url":null,"abstract":"<p>Enterprise Security Risk Management (ESRM) is gaining popularity in industry circles, especially after the American Society of Industrial Security (ASIS International) elevated it as its strategic priority in 2016. However, research on its adoption has attracted little attention, especially in universities which are often characterized by outstanding variations in culture, structure, and more. In this paper, we conduct a self-assessment of ESRM maturity in Kenya’s accredited universities using process metrics of the 2019 ASIS ESRM Maturity Model and insights from university security executives. The findings reveal that more than 35% of accredited universities have achieved advanced levels of ESRM adoption, with over 57% at average or middle levels, predominantly at Level 3. Public accredited universities exhibit higher ESRM adoption levels compared to their private counterparts. The study also identifies variations in the terminology used, with 60% using “Security Risk Management (SRM),” 35% using “University Risk Management,” and a minority adopting ESRM. The discomfort with the “enterprise” term indicates a need for awareness and sensitization programs. We argue that benchmarking with optimized ESRM adopters and increasing awareness and integration of ESRM in strategic planning and institutional governance are crucial for comprehensive security risk management in higher education.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139926417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1