首页 > 最新文献

Security Journal最新文献

英文 中文
Tracking violence in Thailand: the making of violent crime index 追踪泰国的暴力:暴力犯罪指数的制定
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2023-03-09 DOI: 10.1057/s41284-023-00369-2
Srisombat Chokprajakchat, Wanaporn Techagaisiyavanit, Dhanakorn Mulaphong, Tongyai Iyavarakul, Attapol Kuanliang, Chawan Laosunthorn
{"title":"Tracking violence in Thailand: the making of violent crime index","authors":"Srisombat Chokprajakchat, Wanaporn Techagaisiyavanit, Dhanakorn Mulaphong, Tongyai Iyavarakul, Attapol Kuanliang, Chawan Laosunthorn","doi":"10.1057/s41284-023-00369-2","DOIUrl":"https://doi.org/10.1057/s41284-023-00369-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42474554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Carrying a handgun in public vs. taking a handgun to school among youth: an exploration of the predicting power of risk factors related to delinquency, aggression, and victimization 青少年在公共场合携带手枪与携带手枪上学:与犯罪、攻击和受害相关的风险因素预测力的探索
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2023-02-09 DOI: 10.1057/s41284-023-00368-3
Hasan Buker, Ihsan E. Buker, Bailey Bullion
{"title":"Carrying a handgun in public vs. taking a handgun to school among youth: an exploration of the predicting power of risk factors related to delinquency, aggression, and victimization","authors":"Hasan Buker, Ihsan E. Buker, Bailey Bullion","doi":"10.1057/s41284-023-00368-3","DOIUrl":"https://doi.org/10.1057/s41284-023-00368-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-25"},"PeriodicalIF":1.2,"publicationDate":"2023-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42597101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptocurrency is new vogue: a reflection on money laundering prevention 加密货币是新时尚:对洗钱预防的思考
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2023-01-30 DOI: 10.1057/s41284-023-00366-5
Hsiao‐Ming Wang, Ming-Li Hsieh
{"title":"Cryptocurrency is new vogue: a reflection on money laundering prevention","authors":"Hsiao‐Ming Wang, Ming-Li Hsieh","doi":"10.1057/s41284-023-00366-5","DOIUrl":"https://doi.org/10.1057/s41284-023-00366-5","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-22"},"PeriodicalIF":1.2,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49219603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project 探讨中国企业在中巴经济走廊项目下的实际风险和安全机制
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2023-01-24 DOI: 10.1057/s41284-022-00363-0
Muhammad Kashan Surahio, H. Mahesar, M. N. Baloch, A. Kovalev, M. Soomro
{"title":"Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project","authors":"Muhammad Kashan Surahio, H. Mahesar, M. N. Baloch, A. Kovalev, M. Soomro","doi":"10.1057/s41284-022-00363-0","DOIUrl":"https://doi.org/10.1057/s41284-022-00363-0","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-31"},"PeriodicalIF":1.2,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41854826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the consideration of strategies for coping with locality violence in Arab society in Israel 了解对以色列阿拉伯社会应对地方暴力战略的考虑
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2023-01-09 DOI: 10.1057/s41284-022-00365-y
Nohad ‘Ali, D. Rosenberg
{"title":"Understanding the consideration of strategies for coping with locality violence in Arab society in Israel","authors":"Nohad ‘Ali, D. Rosenberg","doi":"10.1057/s41284-022-00365-y","DOIUrl":"https://doi.org/10.1057/s41284-022-00365-y","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-24"},"PeriodicalIF":1.2,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49367392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The virtual "Caliphate" strikes back? Mapping the Islamic State's information ecosystem on the surface web 虚拟的“哈里发国”会反击吗?在地面网络上绘制伊斯兰国的信息生态系统
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-12-06 DOI: 10.1057/s41284-022-00364-z
M. Lakomy
{"title":"The virtual \"Caliphate\" strikes back? Mapping the Islamic State's information ecosystem on the surface web","authors":"M. Lakomy","doi":"10.1057/s41284-022-00364-z","DOIUrl":"https://doi.org/10.1057/s41284-022-00364-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42673739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Theoretical analysis of the linkages between the IOCs’ oil exploration activities and piracy in Nigeria 国际石油公司石油勘探活动与尼日利亚海盗关系的理论分析
IF 1.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-11-27 DOI: 10.1057/s41284-022-00361-2
K. Anele
{"title":"Theoretical analysis of the linkages between the IOCs’ oil exploration activities and piracy in Nigeria","authors":"K. Anele","doi":"10.1057/s41284-022-00361-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00361-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48051380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
International legal approaches in combatting raidership. 打击袭击的国际法律途径
IF 0.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-11-17 DOI: 10.1057/s41284-022-00362-1
Bauyrzhan N Khamitov, Yerzhan S Kemali, Sattar M Rakhmetov, Assel M Alibekova

The presented article is relevant, as the dynamics of international legislative changes indicate the transformation of the legal regulation of approaches in combatting raidership. The purpose of this study was to perform an independent investigation of issues arising upon considering international legislative regulation of effective approaches in the field of combatting raidership. The methodological framework of this study comprised modern general and special methods of scientific cognition, namely logical, dialectical, historical, formal legal, comparative legal, system analysis, analogy, induction, deduction, synthesis, abstraction, generalisation, modelling, and other methods. Based on the results of the investigation, the study covered the main issues of the state of modern international legal regulation of methods for combatting raidership; analysed the leading mechanisms for improving international legal approaches regarding combatting raidership, and suggested new algorithms for further improving the practice of corresponding law enforcement.

所提出的这篇文章是相关的,因为国际立法变化的动态表明了打击偷袭行为的法律规定的转变。这项研究的目的是对在审议关于打击偷袭行为的有效办法的国际立法条例时所产生的问题进行独立调查。本研究的方法论框架包括现代科学认知的一般方法和特殊方法,即逻辑方法、辩证方法、历史方法、形式法方法、比较法方法、系统分析方法、类比方法、归纳方法、演绎方法、综合方法、抽象方法、概括方法、建模方法等。根据调查结果,该研究报告涵盖了打击偷袭行为方法的现代国际法律管制现状的主要问题;分析了改进关于打击偷袭行为的国际法律办法的主要机制,并建议了进一步改进相应执法做法的新算法。
{"title":"International legal approaches in combatting raidership.","authors":"Bauyrzhan N Khamitov, Yerzhan S Kemali, Sattar M Rakhmetov, Assel M Alibekova","doi":"10.1057/s41284-022-00362-1","DOIUrl":"10.1057/s41284-022-00362-1","url":null,"abstract":"<p><p>The presented article is relevant, as the dynamics of international legislative changes indicate the transformation of the legal regulation of approaches in combatting raidership. The purpose of this study was to perform an independent investigation of issues arising upon considering international legislative regulation of effective approaches in the field of combatting raidership. The methodological framework of this study comprised modern general and special methods of scientific cognition, namely logical, dialectical, historical, formal legal, comparative legal, system analysis, analogy, induction, deduction, synthesis, abstraction, generalisation, modelling, and other methods. Based on the results of the investigation, the study covered the main issues of the state of modern international legal regulation of methods for combatting raidership; analysed the leading mechanisms for improving international legal approaches regarding combatting raidership, and suggested new algorithms for further improving the practice of corresponding law enforcement.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-21"},"PeriodicalIF":0.2,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9672541/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41978265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Card-not-present fraud: using crime scripts to inform crime prevention initiatives. 无卡欺诈:利用犯罪脚本为预防犯罪举措提供信息
IF 0.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-11-14 DOI: 10.1057/s41284-022-00359-w
Amanda Bodker, Phil Connolly, Oliver Sing, Benjamin Hutchins, Michael Townsley, Jacqueline Drew

Growth in the online retail sector and improvements in card-present authorisation measures have led to substantial increases in card-not-present (CNP) fraud, particularly in the online retail sector. This article uses crime script analysis to understand the commission process of CNP fraud in online retail settings. Drawing upon previous crime script articles and industry reports we outline the steps involved in the three stages of CNP fraud: preparation; doing it; and getting away. From this script, points of disruption are identified and we discuss prevention measures that stakeholders such as businesses and financial institutions could implement to reduce bad actors opportunities for CNP fraud.

在线零售行业的增长和持卡人授权措施的改进导致了无卡(CNP)欺诈的大幅增加,特别是在在线零售行业。本文采用犯罪脚本分析的方法来了解网络零售环境下CNP欺诈的佣金过程。根据以前的犯罪脚本文章和行业报告,我们概述了CNP欺诈的三个阶段所涉及的步骤:准备;这样做;然后离开。从这个脚本中,我们确定了中断点,并讨论了企业和金融机构等利益相关者可以实施的预防措施,以减少不良行为者进行CNP欺诈的机会。
{"title":"Card-not-present fraud: using crime scripts to inform crime prevention initiatives.","authors":"Amanda Bodker, Phil Connolly, Oliver Sing, Benjamin Hutchins, Michael Townsley, Jacqueline Drew","doi":"10.1057/s41284-022-00359-w","DOIUrl":"10.1057/s41284-022-00359-w","url":null,"abstract":"<p><p>Growth in the online retail sector and improvements in card-present authorisation measures have led to substantial increases in card-not-present (CNP) fraud, particularly in the online retail sector. This article uses crime script analysis to understand the commission process of CNP fraud in online retail settings. Drawing upon previous crime script articles and industry reports we outline the steps involved in the three stages of CNP fraud: preparation; doing it; and getting away. From this script, points of disruption are identified and we discuss prevention measures that stakeholders such as businesses and financial institutions could implement to reduce bad actors opportunities for CNP fraud.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-19"},"PeriodicalIF":0.2,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9664753/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42718492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan. 理性选择理论对价格操纵欺诈的检测——台湾零售业的证据
IF 0.2 0 LANGUAGE & LINGUISTICS Pub Date : 2022-11-03 DOI: 10.1057/s41284-022-00360-3
Chin Kuo, Seng-Su Tsang

All enterprises, regardless of industry, are exposed to fraud risk. In the retail industry, the perpetrators of fraud manipulate the sales price of products instead of the quantity sold to avoid inventory discrepancies. Fraud examiners attempt to identify anomalous transactions using data analysis. This study analyzes the causes of fraudulent behavior, conceptualized based on the aspect of rational choice, and proposes an anomalous transaction detection model using variables identified as indicating fraud. A two-phase experiment analyzing a real-world data set from a retailer in Taiwan was designed to evaluate the performance of fraud variables. The findings demonstrate that these variables could slightly improve the results of the analysis and demonstrate that machine learning is applicable to fraud detection. In addition, this study contributes to rational choice theory to validate the applicability in fraud detection. Fraud examiners in the retail industry could reduce fraud losses by adopting the proposed approach, implemented using Weka software, to identify anomalies.

所有企业,无论哪个行业,都面临欺诈风险。在零售业中,诈骗者操纵产品的销售价格,而不是销售数量,以避免库存不符。欺诈审查人员试图通过数据分析来识别异常交易。本研究从理性选择的角度出发,分析了欺诈行为产生的原因,并提出了一种使用识别为欺诈的变量的异常交易检测模型。本文设计了一个两阶段的实验,分析了台湾一家零售商的真实数据集,以评估欺诈变量的性能。研究结果表明,这些变量可以略微改善分析结果,并证明机器学习适用于欺诈检测。此外,本研究有助于理性选择理论验证其在欺诈检测中的适用性。零售行业的欺诈审查人员可以通过采用使用Weka软件实现的建议方法来识别异常情况,从而减少欺诈损失。
{"title":"Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan.","authors":"Chin Kuo, Seng-Su Tsang","doi":"10.1057/s41284-022-00360-3","DOIUrl":"10.1057/s41284-022-00360-3","url":null,"abstract":"<p><p>All enterprises, regardless of industry, are exposed to fraud risk. In the retail industry, the perpetrators of fraud manipulate the sales price of products instead of the quantity sold to avoid inventory discrepancies. Fraud examiners attempt to identify anomalous transactions using data analysis. This study analyzes the causes of fraudulent behavior, conceptualized based on the aspect of rational choice, and proposes an anomalous transaction detection model using variables identified as indicating fraud. A two-phase experiment analyzing a real-world data set from a retailer in Taiwan was designed to evaluate the performance of fraud variables. The findings demonstrate that these variables could slightly improve the results of the analysis and demonstrate that machine learning is applicable to fraud detection. In addition, this study contributes to rational choice theory to validate the applicability in fraud detection. Fraud examiners in the retail industry could reduce fraud losses by adopting the proposed approach, implemented using Weka software, to identify anomalies.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-20"},"PeriodicalIF":0.2,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9630802/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43191080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1