Journal of Applied Security Research最新文献

筛选
英文 中文
Civilian Police Oversight: A Contemporary Review of Police Oversight Mechanisms in Europe, Australia and Africa 民警监督:欧洲、澳大利亚和非洲警察监督机制的当代回顾
IF 1.3
Journal of Applied Security Research Pub Date : 2021-05-05 DOI: 10.1080/19361610.2021.1918524
Ishmael Mugari
{"title":"Civilian Police Oversight: A Contemporary Review of Police Oversight Mechanisms in Europe, Australia and Africa","authors":"Ishmael Mugari","doi":"10.1080/19361610.2021.1918524","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918524","url":null,"abstract":"Abstract This paper, which is based on literature and documentary survey, explores civilian police oversight mechanisms in Europe, Australia and Africa. The paper reveals that Europe has several nations with independent institutions to investigate police misconduct; thought there is limited empirical research on the effectiveness of these institutions. Independent police oversight institutions in Australia have limited investigative powers and they are more of review boards. Two African countries- Kenya and South Africa have independent institutions to investigate police misconduct, though the effectiveness of these two institutions has been questioned.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"106 - 127"},"PeriodicalIF":1.3,"publicationDate":"2021-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918524","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41565859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Strong Designated Verifier Signature Scheme with Hybrid Cryptographic Hard Problems 具有混合密码难题的强指定验证者签名方案
IF 1.3
Journal of Applied Security Research Pub Date : 2021-04-27 DOI: 10.1080/19361610.2021.1907273
N. Shapuan, E. S. Ismail
{"title":"A Strong Designated Verifier Signature Scheme with Hybrid Cryptographic Hard Problems","authors":"N. Shapuan, E. S. Ismail","doi":"10.1080/19361610.2021.1907273","DOIUrl":"https://doi.org/10.1080/19361610.2021.1907273","url":null,"abstract":"Abstract The security of the most of the existing strong designated verifier signature (SDVS) scheme are based on a single cryptographic hard problem. Although these schemes seem secure today, there is a possibility for an adversary to find a solution for this problem in the future and if this happens, then such SDVS schemes will no longer be secure. We develop a new SDVS scheme based on hybrid problems; factorization and discrete logarithm. The new developed scheme provides a greater security level than those previous designated SDVS schemes and satisfies the security properties and requirements of a SDVS scheme.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"546 - 558"},"PeriodicalIF":1.3,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1907273","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44012655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interpersonal Relationships in the 1996–1997 Japanese Embassy Hostage Crisis in Peru: A View from Relational Development Theory 关系发展理论视角下的1996-1997年秘鲁日本大使馆人质危机中的人际关系
IF 1.3
Journal of Applied Security Research Pub Date : 2021-04-10 DOI: 10.1080/19361610.2021.1908102
A. Nguyen, Jonathan Matusitz
{"title":"Interpersonal Relationships in the 1996–1997 Japanese Embassy Hostage Crisis in Peru: A View from Relational Development Theory","authors":"A. Nguyen, Jonathan Matusitz","doi":"10.1080/19361610.2021.1908102","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908102","url":null,"abstract":"Abstract This paper applies relational development theory to the Japanese embassy hostage crisis that took place in Lima, Peru (from December 1996 to April 1997). During the hostage crisis, members of the Túpac Amaru Revolutionary Movement (MRTA), a Peruvian terrorist organization, stormed the Japanese embassy in Lima and took hundreds of people hostage. They presented their demands to the Peruvian government in exchange for the safety of the hostages. Developed by Mark L. Knapp, the theory describes how interactants—e.g., couples, negotiators, and so forth—go through relationship stages to strengthen their interpersonal communication or social bond. In this conceptual analysis, two important relationships are explored: (1) The relationship between the MRTA and the hostages and (2) the relationship between the MRTA and the Peruvian government (including President Fujimori). Overall, the authors of this analysis found that the MRTA-hostage relationship was ultimately more favorable than the Fujimori-MRTA relationship.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"1 - 17"},"PeriodicalIF":1.3,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42324502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lebanon’s Single Most Destructive Explosion – Terrorists Plan to Copy and Provision against Such Accidents 黎巴嫩最具破坏性的一次爆炸——恐怖分子计划复制并防范此类事故
IF 1.3
Journal of Applied Security Research Pub Date : 2021-04-10 DOI: 10.1080/19361610.2021.1873681
L. Chunlin, R. Gunaratna
{"title":"Lebanon’s Single Most Destructive Explosion – Terrorists Plan to Copy and Provision against Such Accidents","authors":"L. Chunlin, R. Gunaratna","doi":"10.1080/19361610.2021.1873681","DOIUrl":"https://doi.org/10.1080/19361610.2021.1873681","url":null,"abstract":"Abstract Explosives continue to be the primary tactic used by terrorists across the world and given the high security risk faced by mega infrastructure, a systematic security risk assessment framework is proposed in this paper. Classification and rating criteria are established for this framework pertaining to threat/vulnerability and impact/consequence assessment, based on which asset risk rating can be calculated. The proposed risk assessment framework refines the author’s previous work of risk rating criteria and evaluates risks in both qualitative and quantitative ways. Risk ratings are classified both numerically and in color codes for the ease of analysis and application. This framework is validated in a case study of risk assessment of a mega infrastructure facility and can support further risk management and investment policy. A case study of a chemical facility utilizing the risk assessment framework is provided.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"310 - 331"},"PeriodicalIF":1.3,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1873681","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47641409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Image Tampering Detection Using Multilevel Local Binary Pattern Texture Descriptor 基于多级局部二值模式纹理描述符的数字图像篡改检测
IF 1.3
Journal of Applied Security Research Pub Date : 2021-04-09 DOI: 10.1080/19361610.2021.1883397
Vikas Srivastava, S. Yadav
{"title":"Digital Image Tampering Detection Using Multilevel Local Binary Pattern Texture Descriptor","authors":"Vikas Srivastava, S. Yadav","doi":"10.1080/19361610.2021.1883397","DOIUrl":"https://doi.org/10.1080/19361610.2021.1883397","url":null,"abstract":"Abstract Digital images can be manipulated using the latest tools and techniques without leaving any visible traces. Image tampering detection is required to authenticate image validation. It is concluded from previous research that image tampering modifies the texture micropattern in a digital image. Therefore, texture descriptors can be applied to highlight these changes. A texture descriptor–based technique is proposed for detecting both copy-move and splicing forgery. In the proposed method, an RGB image is converted into a YCbCr image and Cb and Cr image components are extracted, as these components are more sensitive to tampering artifacts. Further, a standard deviation (STD) filter and higher-order texture descriptors are applied on Cb and Cr components. The STD filter is used to highlight important details of objects in the image. A support vector machine classifier is used to classify forged and tampered images. Support vector machine (SVM) classifier gives good results on both large- and small-image data sets. The performance is appraised in three online-available, widely used data sets: CASIA v1.0, CASIA v2.0, and Columbia. The proposed method outperforms most of the state-of-the-art methods.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"62 - 79"},"PeriodicalIF":1.3,"publicationDate":"2021-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1883397","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48551846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Impact of the Aviation Industry on International Security Threats, Case Study of Health Threats (2002–2020) 航空业对国际安全威胁的影响,健康威胁案例研究(2002-2020)
IF 1.3
Journal of Applied Security Research Pub Date : 2021-04-06 DOI: 10.1080/19361610.2021.1896280
A. Salehian, M. H. Sheikholeslami
{"title":"The Impact of the Aviation Industry on International Security Threats, Case Study of Health Threats (2002–2020)","authors":"A. Salehian, M. H. Sheikholeslami","doi":"10.1080/19361610.2021.1896280","DOIUrl":"https://doi.org/10.1080/19361610.2021.1896280","url":null,"abstract":"Abstract Technologies and communication devices, especially those used in the military area, such as the invention of the atomic bomb or radar, have revolutionized security studies. But this impact is not limited to military technology. Things like the aviation industry have also had an impact on 21st-century security and new threats by changing the social relation on human life. Countries faced with new threats, such as the Covid-19 pandemic, led us to examine the root of the creation and globalization of such threats. Given that the aviation industry has the absolute ability to transfer any type of person or factor in the global arena with remarkable speed, this feature makes the aviation industry a platform for the spread of threats and evolve them as a transnational threat. Given the increasing growth of the aviation industry and its far-reaching effects on the international community, the field of security threats has also evolved due to the effects of this technology. This article, to understand how the aviation industry affects security threats, examines the examples of health threats and based on that, a hypothesis about the impact of this industry on the evolution of threats.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"477 - 496"},"PeriodicalIF":1.3,"publicationDate":"2021-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1896280","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45860499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction 修正
IF 1.3
Journal of Applied Security Research Pub Date : 2021-04-03 DOI: 10.1080/19361610.2021.1901035
Methanias Colaço
{"title":"Correction","authors":"Methanias Colaço","doi":"10.1080/19361610.2021.1901035","DOIUrl":"https://doi.org/10.1080/19361610.2021.1901035","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"16 1","pages":"279 - 279"},"PeriodicalIF":1.3,"publicationDate":"2021-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1901035","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41356649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Support and Its Link to Workplace Trust Among Correctional Staff: An Exploratory Research Note 惩教人员的社会支持及其与工作场所信任的关系:一项探索性研究
IF 1.3
Journal of Applied Security Research Pub Date : 2021-04-03 DOI: 10.1080/19361610.2021.1879613
E. Lambert, Mia Abboud Holbrook, N. Hogan, James B. Wells, K. I. Minor
{"title":"Social Support and Its Link to Workplace Trust Among Correctional Staff: An Exploratory Research Note","authors":"E. Lambert, Mia Abboud Holbrook, N. Hogan, James B. Wells, K. I. Minor","doi":"10.1080/19361610.2021.1879613","DOIUrl":"https://doi.org/10.1080/19361610.2021.1879613","url":null,"abstract":"Abstract Private security staff play an important role in protecting society, including those who work in private prisons. Working in a private prison is a demanding job. Staff are responsible to ensure that the correctional facility is safe, secure, and humane. Past research has found that organizational trust, in terms of supervisor and management trust, influences private prison staff in many outcome areas, such as job involvement, job satisfaction, organizational commitment, job stress, feeling at risk at work, and job burnout; however, there is a dearth of research on how workplace variables may contribute to organizational trust. The current study examined how the major forms of social support (family, coworkers, supervisor, and management) were related to supervisor trust and management trust among 160 staff at a private U.S. prison. Based on ordinary least squares (OLS) multivariate regression, the results indicated coworker, supervisor, and management support each had significant positive effects on supervisor trust, with supervisor support having the largest effect. In another OLS multivariate regression analysis, family, supervisor, and management support had significant positive effects on management trust, with management support having the largest effect. The findings suggest that private prison administrators should consider increasing all four forms of social support in order to raise both supervisor and management trust. It would be a valuable investment in staff.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"16 1","pages":"147 - 167"},"PeriodicalIF":1.3,"publicationDate":"2021-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1879613","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48381110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Systematic Literature Review on Private Security Governance by Government 政府私人保安治理的系统文献综述
IF 1.3
Journal of Applied Security Research Pub Date : 2021-03-11 DOI: 10.1080/19361610.2021.1883398
Vigneswary Pranava Rasahugan, Samihah Khalil
{"title":"Systematic Literature Review on Private Security Governance by Government","authors":"Vigneswary Pranava Rasahugan, Samihah Khalil","doi":"10.1080/19361610.2021.1883398","DOIUrl":"https://doi.org/10.1080/19361610.2021.1883398","url":null,"abstract":"Abstract Private security governance has gained increased attention from the government for the governance mechanism but still remains fragmented. This paper attempts to clarify the governance of private security by government through a systematic review of literature. The review process contributed to four themes which addressed three major trends. First is the response of government toward the governance objective, set by either public actors or in collaboration by both public and private actors. Second is the coordination mechanism adapted by the government in handling multiple governors from public and private security industries. Third is the regulatory mechanism of the private security industry adhered to by the government.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"426 - 450"},"PeriodicalIF":1.3,"publicationDate":"2021-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1883398","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45803453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Violence Resembling Terrorism—From the First Responder Viewpoint 类似恐怖主义的暴力——从第一响应者的角度看
IF 1.3
Journal of Applied Security Research Pub Date : 2021-03-09 DOI: 10.1080/19361610.2021.1889895
Tero Ihatsu, Soili Paananen, Teija Sederholm
{"title":"Violence Resembling Terrorism—From the First Responder Viewpoint","authors":"Tero Ihatsu, Soili Paananen, Teija Sederholm","doi":"10.1080/19361610.2021.1889895","DOIUrl":"https://doi.org/10.1080/19361610.2021.1889895","url":null,"abstract":"Abstract Terrorist attacks, school shootings, and other man-made incidents are demanding situations for first responders and society as a whole. Currently used concepts, like “active shooter” and “mass killing,” are typically created from the point of view of the perpetrator(s) or based on the incident site or the number of victims. In this paper, six police pretrial investigation records and four reports by the Investigation Commission are analyzed using inductive content analysis. The aim of the research is to determine attributes of violence resembling terrorism by approaching the subject from the position of first responders. Based on these attributes, the concept of violence resembling terrorism (VRT) is then created. VRT as a research unit produces essentially more empirical data, which is an advantage for research both on the academic level and in the more practical branches of security education.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"451 - 476"},"PeriodicalIF":1.3,"publicationDate":"2021-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1889895","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46567267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信