{"title":"Campus Security and Crime Prevention: A View from a Police Chief with a Ph.D. in Criminology","authors":"Judith Harris, Hsiao-Ming Wang","doi":"10.1080/19361610.2024.2386180","DOIUrl":"https://doi.org/10.1080/19361610.2024.2386180","url":null,"abstract":"Campus security and crime prevention is a critical issue to the police department of any educational institutions in the United States. The article interviewed a police chief with doctorate degree ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ismail Onat, Oguzhan Basibuyuk, Mustafa Bal, H. Duru, Kadir Akyuz
{"title":"Group-Motivated and Periodic Fire Setting for Terrorism in Urban Landscapes: An Analysis in Time and Space","authors":"Ismail Onat, Oguzhan Basibuyuk, Mustafa Bal, H. Duru, Kadir Akyuz","doi":"10.1080/19361610.2024.2385200","DOIUrl":"https://doi.org/10.1080/19361610.2024.2385200","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141798414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy, Data Protection and Cyber Crimes: Mapping Perceptions of Pakistani Users","authors":"Fahad Nabeel, Khuram Iqbal","doi":"10.1080/19361610.2024.2372989","DOIUrl":"https://doi.org/10.1080/19361610.2024.2372989","url":null,"abstract":"Advancements in information and communication technologies have increased the vulnerabilities surrounding our personal data. The absence of privacy by design in digital devices has allowed them to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141613479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Brian R. Johnson, Jennifer Marson-Reed, C. Kierkus, Adrian Copeland
{"title":"Human Rights Policies, Guidelines, and Standards in The Private Security Industry: A Scoping Review","authors":"Brian R. Johnson, Jennifer Marson-Reed, C. Kierkus, Adrian Copeland","doi":"10.1080/19361610.2024.2368962","DOIUrl":"https://doi.org/10.1080/19361610.2024.2368962","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141714496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theoretical and Experimental Framework for Estimating Cyber Victimization Risk in a Hybrid Physical-Virtual World","authors":"Ling Wu, Suphanut Jamonnak, Xinyue Ye, Shih-Lung Shaw, Nitesh Saxena, Kyung-Shick Choi","doi":"10.1080/19361610.2024.2368969","DOIUrl":"https://doi.org/10.1080/19361610.2024.2368969","url":null,"abstract":"This study proposes a framework integrating Routine Activities Theory into a hybrid physical-virtual space. Utilizing a space-time path metaphor, it explores phishing susceptibility in relation to ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Risk Management Scenarios for Teaching Information Security Management","authors":"Jordan Allison","doi":"10.1080/19361610.2024.2358272","DOIUrl":"https://doi.org/10.1080/19361610.2024.2358272","url":null,"abstract":"Amidst security concerns, there has become an increased focus on ensuring cybersecurity becomes a mainstream part of higher education. Cybersecurity requires the development of technical and non-te...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moyank Giri, Sivaraman Eswaran, Prasad B Honnavalli, Daniel D
{"title":"Automated and Interpretable Fake News Detection With Explainable Artificial Intelligence","authors":"Moyank Giri, Sivaraman Eswaran, Prasad B Honnavalli, Daniel D","doi":"10.1080/19361610.2024.2356431","DOIUrl":"https://doi.org/10.1080/19361610.2024.2356431","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141110835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Law-Abiding Criminals: How a Group of Military Over-Interested Persons Became a Threat Against National Security","authors":"David M. Bergman","doi":"10.1080/19361610.2024.2351736","DOIUrl":"https://doi.org/10.1080/19361610.2024.2351736","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140987446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Rise of #Cartels: Exploring the Organizational Operations and Messaging of Public Perception on Twitter","authors":"Ghady X. Hbeilini, Jared R. Dmello","doi":"10.1080/19361610.2024.2341477","DOIUrl":"https://doi.org/10.1080/19361610.2024.2341477","url":null,"abstract":"Mexican cartel activity has become increasingly violent, causing civilians to question the government’s ability to defend against this social and political threat. Within this context, the current ...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140562504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}