Journal of Applied Security Research最新文献

筛选
英文 中文
Campus Security and Crime Prevention: A View from a Police Chief with a Ph.D. in Criminology 校园安全与犯罪预防:一位拥有犯罪学博士学位的警察局长的观点
IF 1.3
Journal of Applied Security Research Pub Date : 2024-08-02 DOI: 10.1080/19361610.2024.2386180
Judith Harris, Hsiao-Ming Wang
{"title":"Campus Security and Crime Prevention: A View from a Police Chief with a Ph.D. in Criminology","authors":"Judith Harris, Hsiao-Ming Wang","doi":"10.1080/19361610.2024.2386180","DOIUrl":"https://doi.org/10.1080/19361610.2024.2386180","url":null,"abstract":"Campus security and crime prevention is a critical issue to the police department of any educational institutions in the United States. The article interviewed a police chief with doctorate degree ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group-Motivated and Periodic Fire Setting for Terrorism in Urban Landscapes: An Analysis in Time and Space 城市景观中为恐怖主义目的的群体动机和周期性放火:时空分析
IF 1.1
Journal of Applied Security Research Pub Date : 2024-07-27 DOI: 10.1080/19361610.2024.2385200
Ismail Onat, Oguzhan Basibuyuk, Mustafa Bal, H. Duru, Kadir Akyuz
{"title":"Group-Motivated and Periodic Fire Setting for Terrorism in Urban Landscapes: An Analysis in Time and Space","authors":"Ismail Onat, Oguzhan Basibuyuk, Mustafa Bal, H. Duru, Kadir Akyuz","doi":"10.1080/19361610.2024.2385200","DOIUrl":"https://doi.org/10.1080/19361610.2024.2385200","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141798414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy, Data Protection and Cyber Crimes: Mapping Perceptions of Pakistani Users 隐私、数据保护和网络犯罪:了解巴基斯坦用户的看法
IF 1.3
Journal of Applied Security Research Pub Date : 2024-07-04 DOI: 10.1080/19361610.2024.2372989
Fahad Nabeel, Khuram Iqbal
{"title":"Privacy, Data Protection and Cyber Crimes: Mapping Perceptions of Pakistani Users","authors":"Fahad Nabeel, Khuram Iqbal","doi":"10.1080/19361610.2024.2372989","DOIUrl":"https://doi.org/10.1080/19361610.2024.2372989","url":null,"abstract":"Advancements in information and communication technologies have increased the vulnerabilities surrounding our personal data. The absence of privacy by design in digital devices has allowed them to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141613479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey of Social Engineering Attacks: Taxonomy of Attacks, Prevention, and Mitigation Strategies 社会工程学攻击综合调查:攻击分类、预防和缓解策略
IF 1.1
Journal of Applied Security Research Pub Date : 2024-07-02 DOI: 10.1080/19361610.2024.2372986
Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain
{"title":"A Comprehensive Survey of Social Engineering Attacks: Taxonomy of Attacks, Prevention, and Mitigation Strategies","authors":"Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain","doi":"10.1080/19361610.2024.2372986","DOIUrl":"https://doi.org/10.1080/19361610.2024.2372986","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141688378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Rights Policies, Guidelines, and Standards in The Private Security Industry: A Scoping Review 私营保安行业的人权政策、准则和标准:范围审查
IF 1.1
Journal of Applied Security Research Pub Date : 2024-07-01 DOI: 10.1080/19361610.2024.2368962
Brian R. Johnson, Jennifer Marson-Reed, C. Kierkus, Adrian Copeland
{"title":"Human Rights Policies, Guidelines, and Standards in The Private Security Industry: A Scoping Review","authors":"Brian R. Johnson, Jennifer Marson-Reed, C. Kierkus, Adrian Copeland","doi":"10.1080/19361610.2024.2368962","DOIUrl":"https://doi.org/10.1080/19361610.2024.2368962","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141714496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical and Experimental Framework for Estimating Cyber Victimization Risk in a Hybrid Physical-Virtual World 估算物理-虚拟混合世界中网络受害风险的理论和实验框架
IF 1.3
Journal of Applied Security Research Pub Date : 2024-06-17 DOI: 10.1080/19361610.2024.2368969
Ling Wu, Suphanut Jamonnak, Xinyue Ye, Shih-Lung Shaw, Nitesh Saxena, Kyung-Shick Choi
{"title":"Theoretical and Experimental Framework for Estimating Cyber Victimization Risk in a Hybrid Physical-Virtual World","authors":"Ling Wu, Suphanut Jamonnak, Xinyue Ye, Shih-Lung Shaw, Nitesh Saxena, Kyung-Shick Choi","doi":"10.1080/19361610.2024.2368969","DOIUrl":"https://doi.org/10.1080/19361610.2024.2368969","url":null,"abstract":"This study proposes a framework integrating Routine Activities Theory into a hybrid physical-virtual space. Utilizing a space-time path metaphor, it explores phishing susceptibility in relation to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Risk Management Scenarios for Teaching Information Security Management 用于信息安全管理教学的网络安全风险管理场景
IF 1.3
Journal of Applied Security Research Pub Date : 2024-05-29 DOI: 10.1080/19361610.2024.2358272
Jordan Allison
{"title":"Cybersecurity Risk Management Scenarios for Teaching Information Security Management","authors":"Jordan Allison","doi":"10.1080/19361610.2024.2358272","DOIUrl":"https://doi.org/10.1080/19361610.2024.2358272","url":null,"abstract":"Amidst security concerns, there has become an increased focus on ensuring cybersecurity becomes a mainstream part of higher education. Cybersecurity requires the development of technical and non-te...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated and Interpretable Fake News Detection With Explainable Artificial Intelligence 利用可解释人工智能自动检测和解释假新闻
IF 1.3
Journal of Applied Security Research Pub Date : 2024-05-22 DOI: 10.1080/19361610.2024.2356431
Moyank Giri, Sivaraman Eswaran, Prasad B Honnavalli, Daniel D
{"title":"Automated and Interpretable Fake News Detection With Explainable Artificial Intelligence","authors":"Moyank Giri, Sivaraman Eswaran, Prasad B Honnavalli, Daniel D","doi":"10.1080/19361610.2024.2356431","DOIUrl":"https://doi.org/10.1080/19361610.2024.2356431","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141110835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Law-Abiding Criminals: How a Group of Military Over-Interested Persons Became a Threat Against National Security 守法罪犯:一群过度关注军事的人如何成为危害国家安全的威胁
IF 1.3
Journal of Applied Security Research Pub Date : 2024-05-11 DOI: 10.1080/19361610.2024.2351736
David M. Bergman
{"title":"Law-Abiding Criminals: How a Group of Military Over-Interested Persons Became a Threat Against National Security","authors":"David M. Bergman","doi":"10.1080/19361610.2024.2351736","DOIUrl":"https://doi.org/10.1080/19361610.2024.2351736","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140987446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Rise of #Cartels: Exploring the Organizational Operations and Messaging of Public Perception on Twitter 卡特尔的崛起:探索推特上公众认知的组织运作和信息传递
IF 1.3
Journal of Applied Security Research Pub Date : 2024-04-15 DOI: 10.1080/19361610.2024.2341477
Ghady X. Hbeilini, Jared R. Dmello
{"title":"The Rise of #Cartels: Exploring the Organizational Operations and Messaging of Public Perception on Twitter","authors":"Ghady X. Hbeilini, Jared R. Dmello","doi":"10.1080/19361610.2024.2341477","DOIUrl":"https://doi.org/10.1080/19361610.2024.2341477","url":null,"abstract":"Mexican cartel activity has become increasingly violent, causing civilians to question the government’s ability to defend against this social and political threat. Within this context, the current ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140562504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信