Journal of Applied Security Research最新文献

筛选
英文 中文
Campus Security and Crime Prevention: A View from a Police Chief with a Ph.D. in Criminology 校园安全与犯罪预防:一位拥有犯罪学博士学位的警察局长的观点
IF 1.3
Journal of Applied Security Research Pub Date : 2024-08-02 DOI: 10.1080/19361610.2024.2386180
Judith Harris, Hsiao-Ming Wang
{"title":"Campus Security and Crime Prevention: A View from a Police Chief with a Ph.D. in Criminology","authors":"Judith Harris, Hsiao-Ming Wang","doi":"10.1080/19361610.2024.2386180","DOIUrl":"https://doi.org/10.1080/19361610.2024.2386180","url":null,"abstract":"Campus security and crime prevention is a critical issue to the police department of any educational institutions in the United States. The article interviewed a police chief with doctorate degree ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"45 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy, Data Protection and Cyber Crimes: Mapping Perceptions of Pakistani Users 隐私、数据保护和网络犯罪:了解巴基斯坦用户的看法
IF 1.3
Journal of Applied Security Research Pub Date : 2024-07-04 DOI: 10.1080/19361610.2024.2372989
Fahad Nabeel, Khuram Iqbal
{"title":"Privacy, Data Protection and Cyber Crimes: Mapping Perceptions of Pakistani Users","authors":"Fahad Nabeel, Khuram Iqbal","doi":"10.1080/19361610.2024.2372989","DOIUrl":"https://doi.org/10.1080/19361610.2024.2372989","url":null,"abstract":"Advancements in information and communication technologies have increased the vulnerabilities surrounding our personal data. The absence of privacy by design in digital devices has allowed them to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"2011 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141613479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical and Experimental Framework for Estimating Cyber Victimization Risk in a Hybrid Physical-Virtual World 估算物理-虚拟混合世界中网络受害风险的理论和实验框架
IF 1.3
Journal of Applied Security Research Pub Date : 2024-06-17 DOI: 10.1080/19361610.2024.2368969
Ling Wu, Suphanut Jamonnak, Xinyue Ye, Shih-Lung Shaw, Nitesh Saxena, Kyung-Shick Choi
{"title":"Theoretical and Experimental Framework for Estimating Cyber Victimization Risk in a Hybrid Physical-Virtual World","authors":"Ling Wu, Suphanut Jamonnak, Xinyue Ye, Shih-Lung Shaw, Nitesh Saxena, Kyung-Shick Choi","doi":"10.1080/19361610.2024.2368969","DOIUrl":"https://doi.org/10.1080/19361610.2024.2368969","url":null,"abstract":"This study proposes a framework integrating Routine Activities Theory into a hybrid physical-virtual space. Utilizing a space-time path metaphor, it explores phishing susceptibility in relation to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"1 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Risk Management Scenarios for Teaching Information Security Management 用于信息安全管理教学的网络安全风险管理场景
IF 1.3
Journal of Applied Security Research Pub Date : 2024-05-29 DOI: 10.1080/19361610.2024.2358272
Jordan Allison
{"title":"Cybersecurity Risk Management Scenarios for Teaching Information Security Management","authors":"Jordan Allison","doi":"10.1080/19361610.2024.2358272","DOIUrl":"https://doi.org/10.1080/19361610.2024.2358272","url":null,"abstract":"Amidst security concerns, there has become an increased focus on ensuring cybersecurity becomes a mainstream part of higher education. Cybersecurity requires the development of technical and non-te...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"23 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Rise of #Cartels: Exploring the Organizational Operations and Messaging of Public Perception on Twitter 卡特尔的崛起:探索推特上公众认知的组织运作和信息传递
IF 1.3
Journal of Applied Security Research Pub Date : 2024-04-15 DOI: 10.1080/19361610.2024.2341477
Ghady X. Hbeilini, Jared R. Dmello
{"title":"The Rise of #Cartels: Exploring the Organizational Operations and Messaging of Public Perception on Twitter","authors":"Ghady X. Hbeilini, Jared R. Dmello","doi":"10.1080/19361610.2024.2341477","DOIUrl":"https://doi.org/10.1080/19361610.2024.2341477","url":null,"abstract":"Mexican cartel activity has become increasingly violent, causing civilians to question the government’s ability to defend against this social and political threat. Within this context, the current ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"48 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140562504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of Artificial Intelligence in the Prevention of Online Child Sexual Abuse: A Systematic Review of Literature 人工智能在预防在线儿童性虐待中的作用:系统性文献综述
IF 1.3
Journal of Applied Security Research Pub Date : 2024-04-01 DOI: 10.1080/19361610.2024.2331885
Suyesha Singh, Vaishnavi Nambiar
{"title":"Role of Artificial Intelligence in the Prevention of Online Child Sexual Abuse: A Systematic Review of Literature","authors":"Suyesha Singh, Vaishnavi Nambiar","doi":"10.1080/19361610.2024.2331885","DOIUrl":"https://doi.org/10.1080/19361610.2024.2331885","url":null,"abstract":"Online Child sexual abuse (OCSA) is a major menace in the digitalized world. Every year, more than a billion children between the ages of 2–17 years are sexually abused. Despite the harsh reality o...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"300 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140598097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monsoon Marauders and Summer Violence: Exploring the Spatial Relationship between Climate Change and Terrorist Activity in India 季风掠夺者和夏季暴力:探索印度气候变化与恐怖活动之间的空间关系
IF 1.3
Journal of Applied Security Research Pub Date : 2024-02-26 DOI: 10.1080/19361610.2024.2322238
Jared R. Dmello, Christine H. Neudecker
{"title":"Monsoon Marauders and Summer Violence: Exploring the Spatial Relationship between Climate Change and Terrorist Activity in India","authors":"Jared R. Dmello, Christine H. Neudecker","doi":"10.1080/19361610.2024.2322238","DOIUrl":"https://doi.org/10.1080/19361610.2024.2322238","url":null,"abstract":"Climate change is a global phenomenon that has been associated with a growing list of concerns in society today, often leaving more questions than answers. Thus, it is no surprise that questions ar...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"54 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139977801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Criminal Landscape by Utilizing Statistical Analysis and Deep Learning Techniques 利用统计分析和深度学习技术分析犯罪景观
IF 1.3
Journal of Applied Security Research Pub Date : 2024-02-19 DOI: 10.1080/19361610.2024.2314392
Ram Krishn Mishra, Abdul Rahmaan Ansari, J. Angel Arul Jothi, Vinaytosh Mishra
{"title":"Analysis of Criminal Landscape by Utilizing Statistical Analysis and Deep Learning Techniques","authors":"Ram Krishn Mishra, Abdul Rahmaan Ansari, J. Angel Arul Jothi, Vinaytosh Mishra","doi":"10.1080/19361610.2024.2314392","DOIUrl":"https://doi.org/10.1080/19361610.2024.2314392","url":null,"abstract":"This research intends to provide law enforcement organizations with a deep learning model that uses trends in past crimes to forecast future crimes. The study will enable them to dispatch security ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"20 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139910357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correlates of Severity of Mass Public Shootings in the United States, 1966–2022 1966-2022 年美国大规模公共枪击事件严重程度的相关因素
IF 1.3
Journal of Applied Security Research Pub Date : 2024-02-12 DOI: 10.1080/19361610.2024.2314405
Liqun Cao, Xiaohan Mei, Jiayu Li
{"title":"Correlates of Severity of Mass Public Shootings in the United States, 1966–2022","authors":"Liqun Cao, Xiaohan Mei, Jiayu Li","doi":"10.1080/19361610.2024.2314405","DOIUrl":"https://doi.org/10.1080/19361610.2024.2314405","url":null,"abstract":"This paper explores the correlates of mass shooting severity in the United States. Relying on the stacked data from 1966 to 2022 in the Violence Project (version 5), we developed a model of mass sh...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"217 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139769588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Investigation of Crime Detection Using Artificial Intelligence and Face Sketch Synthesis 利用人工智能和人脸草图合成进行犯罪侦测的研究
IF 1.3
Journal of Applied Security Research Pub Date : 2024-01-24 DOI: 10.1080/19361610.2024.2302237
Rajesh Natarajan, Natesh Mahadev, Shashi Kant Gupta, Badria Sulaiman Alfurhood
{"title":"An Investigation of Crime Detection Using Artificial Intelligence and Face Sketch Synthesis","authors":"Rajesh Natarajan, Natesh Mahadev, Shashi Kant Gupta, Badria Sulaiman Alfurhood","doi":"10.1080/19361610.2024.2302237","DOIUrl":"https://doi.org/10.1080/19361610.2024.2302237","url":null,"abstract":"Crime scene suspect prediction involves classifying potential perpetrators based on location, time, and crime type. Electronic forensics in large data scenarios poses challenges for investigators. ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"323 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139579602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信