E. Lambert, N. Hogan, R. Worley, Monica Solinas-Saunders
{"title":"The Effects of Justice Views on Turnover Intent, Sick-Leave Views, and Sick-Leave Use Among Private Prison Staff","authors":"E. Lambert, N. Hogan, R. Worley, Monica Solinas-Saunders","doi":"10.1080/19361610.2022.2161798","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161798","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42073768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SAM: A Mechanism to Facilitate Smear-Aware Forensic Analysis of Volatile System Memory","authors":"Trushna Parida, Kanika Nath, Suvrojit Das","doi":"10.1080/19361610.2022.2161972","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161972","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41318590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preventing Revictimization in Sexual Assault Investigations: Personal Security and Trauma-Informed Case Management*","authors":"Katalin Parti","doi":"10.1080/19361610.2022.2161799","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161799","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45691356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karishni Mehta, Glen Dhingra, Ramchandra S. Mangrulkar
{"title":"Enhancing Multimedia Security Using Shortest Weight First Algorithm and Symmetric Cryptography","authors":"Karishni Mehta, Glen Dhingra, Ramchandra S. Mangrulkar","doi":"10.1080/19361610.2022.2157193","DOIUrl":"https://doi.org/10.1080/19361610.2022.2157193","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48085267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vaishnavi Sawant, Ahmed Solkar, Ramchandra S. Mangrulkar
{"title":"Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box","authors":"Vaishnavi Sawant, Ahmed Solkar, Ramchandra S. Mangrulkar","doi":"10.1080/19361610.2022.2150498","DOIUrl":"https://doi.org/10.1080/19361610.2022.2150498","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44102271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication in Global Jihad","authors":"Frank Musmar","doi":"10.1080/19361610.2022.2125253","DOIUrl":"https://doi.org/10.1080/19361610.2022.2125253","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45382865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jamil R. Alzghoul, E. Abdallah, Abdel-hafiz S. Al-khawaldeh
{"title":"Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey","authors":"Jamil R. Alzghoul, E. Abdallah, Abdel-hafiz S. Al-khawaldeh","doi":"10.1080/19361610.2022.2124328","DOIUrl":"https://doi.org/10.1080/19361610.2022.2124328","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45173914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enni Soerjati Priowirjanto, Eman Suparman, M. Amirulloh, Ema Rahmawati
{"title":"QR Codes to Prevent Copyright Infringement: Case Study of Trusmi Batik in Cirebon, Indonesia","authors":"Enni Soerjati Priowirjanto, Eman Suparman, M. Amirulloh, Ema Rahmawati","doi":"10.1080/19361610.2022.2113731","DOIUrl":"https://doi.org/10.1080/19361610.2022.2113731","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48139478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}