Journal of Applied Security Research最新文献

筛选
英文 中文
A Review on Cryptocurrencies Security 加密货币安全综述
IF 1.3
Journal of Applied Security Research Pub Date : 2021-06-11 DOI: 10.1080/19361610.2021.1933322
T. M. Navamani
{"title":"A Review on Cryptocurrencies Security","authors":"T. M. Navamani","doi":"10.1080/19361610.2021.1933322","DOIUrl":"https://doi.org/10.1080/19361610.2021.1933322","url":null,"abstract":"Abstract Security and privacy are the two terms that are well connected with the current trends in cryptocurrency, and this study gives an extensive review of the same. Cryptocurrency adds security to the transaction flow and regulates the formation of additional units of currency. The massive growth in the market assessment of cryptocurrency leads to misuse of deficiencies for profit by adversaries. In this study, a review was made to focus on the security and protection measurements of cryptocurrencies specifically on Bitcoin. This study describes cryptocurrency conventions, their usefulness, and communications within the framework.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1933322","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46761095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Security has Gone to Pot: An Analysis of Marijuana Cultivation Security Laws and Regulations in the United States 安全走向了大麻:美国大麻种植安全法律法规分析
IF 1.3
Journal of Applied Security Research Pub Date : 2021-05-31 DOI: 10.1080/19361610.2021.1908103
Brian R. Johnson, C. Kierkus
{"title":"Security has Gone to Pot: An Analysis of Marijuana Cultivation Security Laws and Regulations in the United States","authors":"Brian R. Johnson, C. Kierkus","doi":"10.1080/19361610.2021.1908103","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908103","url":null,"abstract":"Abstract Using the principle of defense in depth and Routine Activities Theory, and a qualitative methodology that led to the construction of themes and subthemes, it was found that the most common security requirements are related to detection-based elements that include camera-related and CCTV systems. Security requirements related to deterrence, delay, and response elements, while present in many states, are required to a lesser degree. These findings, therefore, suggest that not all state regulations and subsequent security policies have a comprehensive defense in depth strategy for the physical protection of commercial marijuana cultivation facilities.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48430996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ethical Issues in Police Robots. The Case of Crowd Control Robots in a Pandemic 警用机器人的伦理问题。流行病中的人群控制机器人案例
IF 1.3
Journal of Applied Security Research Pub Date : 2021-05-27 DOI: 10.1080/19361610.2021.1923365
K. Szocik, Rakhat Abylkasymova
{"title":"Ethical Issues in Police Robots. The Case of Crowd Control Robots in a Pandemic","authors":"K. Szocik, Rakhat Abylkasymova","doi":"10.1080/19361610.2021.1923365","DOIUrl":"https://doi.org/10.1080/19361610.2021.1923365","url":null,"abstract":"Abstract Progress in automatization and robotization is unavoidable. However, while progress in some fields is relatively rapid, others including policing seem to be untouched by automatization. This article discusses arguments which favor the use of police robots, in particular crowd control robots. The special case of pandemics is discussed. The article argues that while we have some ethical issues associated with crowd control robots, in general, the benefits are higher than the possible risks.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1923365","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47029418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Conceptual Model for Cybersecurity Governance 网络安全治理的概念模型
IF 1.3
Journal of Applied Security Research Pub Date : 2021-05-10 DOI: 10.1080/19361610.2021.1918995
Salifu Yusif, Abdul Hafeez-Baig
{"title":"A Conceptual Model for Cybersecurity Governance","authors":"Salifu Yusif, Abdul Hafeez-Baig","doi":"10.1080/19361610.2021.1918995","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918995","url":null,"abstract":"Abstract Cybersecurity is a growing problem associated with everything an individual or an organization does that is facilitated by the Internet. It is a multi-facetted program that can be addressed by cybersecurity governance. However, research has shown that many organizations face at least five basic challenges of cybersecurity. In this study, we developed a model for an effective cybersecurity governance that hopes to address these challenges, conceptualized as factors that must continuously be measured and evaluated. They are: (1) Cybersecurity strategy; (2) Standardized processes, (3) Compliance, (4) Senior leadership oversight, and (5) Resources.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918995","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44187134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Adopting the Divide-and-Conquer Strategy for Use of Terrorists in Counterterrorism Through the Stag Hunt Game-Theoretic Environment 从阶段狩猎博弈论环境看利用恐怖分子实施分而治之的反恐策略
IF 1.3
Journal of Applied Security Research Pub Date : 2021-05-06 DOI: 10.1080/19361610.2021.1908814
D. Atsa’am, R. Wario
{"title":"Adopting the Divide-and-Conquer Strategy for Use of Terrorists in Counterterrorism Through the Stag Hunt Game-Theoretic Environment","authors":"D. Atsa’am, R. Wario","doi":"10.1080/19361610.2021.1908814","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908814","url":null,"abstract":"Abstract This study interweaved the divide-and-conquer strategy with the stag hunt game to model a terrorism and counterterrorism environment. The records in the global terrorism database show that 98% of total terror attack incidents from 1970 to 2018 were targeted on law-abiding citizens/facilities, while 2% were targeted on terrorists. Three divide-and-conquer strategies are proposed: destruction of communication channels, payment of bribes, and fomenting distrust among terror groups. When these strategies are implemented, terrorists will effectively be used as tools in counterterrorism. Consequently, attacks on citizens will be reduced while attacks on terrorists will be increased.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908814","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48946097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advanced Classification Techniques for Improving Networks’ Intrusion Detection System Efficiency 提高网络入侵检测系统效率的高级分类技术
IF 1.3
Journal of Applied Security Research Pub Date : 2021-05-05 DOI: 10.1080/19361610.2021.1918500
Mohammed Al-Enazi, Salim El Khediri
{"title":"Advanced Classification Techniques for Improving Networks’ Intrusion Detection System Efficiency","authors":"Mohammed Al-Enazi, Salim El Khediri","doi":"10.1080/19361610.2021.1918500","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918500","url":null,"abstract":"Abstract This research aims to enhance the accuracy and speed of the intrusion detection process by using the feature selection method to reduce the feature space dimensions that eliminate irrelevant features. Further, we employed ensemble learning in the UNSW-NB15 dataset, by using a classifier of the Stacking method, to prevent the intrusion detection system (IDS) from becoming archaic, to adjust it with a modern attack resistance feature, and to make it less costly. We used logistic regression as a meta-classifier and combined random forests, sequential minimal optimization (SMO), and naïve Bayes methods. Our approach allowed us to achieve 97.88% accuracy in intrusion detection.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918500","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42864338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Civilian Police Oversight: A Contemporary Review of Police Oversight Mechanisms in Europe, Australia and Africa 民警监督:欧洲、澳大利亚和非洲警察监督机制的当代回顾
IF 1.3
Journal of Applied Security Research Pub Date : 2021-05-05 DOI: 10.1080/19361610.2021.1918524
Ishmael Mugari
{"title":"Civilian Police Oversight: A Contemporary Review of Police Oversight Mechanisms in Europe, Australia and Africa","authors":"Ishmael Mugari","doi":"10.1080/19361610.2021.1918524","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918524","url":null,"abstract":"Abstract This paper, which is based on literature and documentary survey, explores civilian police oversight mechanisms in Europe, Australia and Africa. The paper reveals that Europe has several nations with independent institutions to investigate police misconduct; thought there is limited empirical research on the effectiveness of these institutions. Independent police oversight institutions in Australia have limited investigative powers and they are more of review boards. Two African countries- Kenya and South Africa have independent institutions to investigate police misconduct, though the effectiveness of these two institutions has been questioned.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918524","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41565859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Strong Designated Verifier Signature Scheme with Hybrid Cryptographic Hard Problems 具有混合密码难题的强指定验证者签名方案
IF 1.3
Journal of Applied Security Research Pub Date : 2021-04-27 DOI: 10.1080/19361610.2021.1907273
N. Shapuan, E. S. Ismail
{"title":"A Strong Designated Verifier Signature Scheme with Hybrid Cryptographic Hard Problems","authors":"N. Shapuan, E. S. Ismail","doi":"10.1080/19361610.2021.1907273","DOIUrl":"https://doi.org/10.1080/19361610.2021.1907273","url":null,"abstract":"Abstract The security of the most of the existing strong designated verifier signature (SDVS) scheme are based on a single cryptographic hard problem. Although these schemes seem secure today, there is a possibility for an adversary to find a solution for this problem in the future and if this happens, then such SDVS schemes will no longer be secure. We develop a new SDVS scheme based on hybrid problems; factorization and discrete logarithm. The new developed scheme provides a greater security level than those previous designated SDVS schemes and satisfies the security properties and requirements of a SDVS scheme.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1907273","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44012655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interpersonal Relationships in the 1996–1997 Japanese Embassy Hostage Crisis in Peru: A View from Relational Development Theory 关系发展理论视角下的1996-1997年秘鲁日本大使馆人质危机中的人际关系
IF 1.3
Journal of Applied Security Research Pub Date : 2021-04-10 DOI: 10.1080/19361610.2021.1908102
A. Nguyen, Jonathan Matusitz
{"title":"Interpersonal Relationships in the 1996–1997 Japanese Embassy Hostage Crisis in Peru: A View from Relational Development Theory","authors":"A. Nguyen, Jonathan Matusitz","doi":"10.1080/19361610.2021.1908102","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908102","url":null,"abstract":"Abstract This paper applies relational development theory to the Japanese embassy hostage crisis that took place in Lima, Peru (from December 1996 to April 1997). During the hostage crisis, members of the Túpac Amaru Revolutionary Movement (MRTA), a Peruvian terrorist organization, stormed the Japanese embassy in Lima and took hundreds of people hostage. They presented their demands to the Peruvian government in exchange for the safety of the hostages. Developed by Mark L. Knapp, the theory describes how interactants—e.g., couples, negotiators, and so forth—go through relationship stages to strengthen their interpersonal communication or social bond. In this conceptual analysis, two important relationships are explored: (1) The relationship between the MRTA and the hostages and (2) the relationship between the MRTA and the Peruvian government (including President Fujimori). Overall, the authors of this analysis found that the MRTA-hostage relationship was ultimately more favorable than the Fujimori-MRTA relationship.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42324502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lebanon’s Single Most Destructive Explosion – Terrorists Plan to Copy and Provision against Such Accidents 黎巴嫩最具破坏性的一次爆炸——恐怖分子计划复制并防范此类事故
IF 1.3
Journal of Applied Security Research Pub Date : 2021-04-10 DOI: 10.1080/19361610.2021.1873681
L. Chunlin, R. Gunaratna
{"title":"Lebanon’s Single Most Destructive Explosion – Terrorists Plan to Copy and Provision against Such Accidents","authors":"L. Chunlin, R. Gunaratna","doi":"10.1080/19361610.2021.1873681","DOIUrl":"https://doi.org/10.1080/19361610.2021.1873681","url":null,"abstract":"Abstract Explosives continue to be the primary tactic used by terrorists across the world and given the high security risk faced by mega infrastructure, a systematic security risk assessment framework is proposed in this paper. Classification and rating criteria are established for this framework pertaining to threat/vulnerability and impact/consequence assessment, based on which asset risk rating can be calculated. The proposed risk assessment framework refines the author’s previous work of risk rating criteria and evaluates risks in both qualitative and quantitative ways. Risk ratings are classified both numerically and in color codes for the ease of analysis and application. This framework is validated in a case study of risk assessment of a mega infrastructure facility and can support further risk management and investment policy. A case study of a chemical facility utilizing the risk assessment framework is provided.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1873681","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47641409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信