Journal of Applied Security Research最新文献

筛选
英文 中文
Fake News Detection Using Pos Tagging and Machine Learning 基于位置标记和机器学习的假新闻检测
IF 1.3
Journal of Applied Security Research Pub Date : 2021-09-01 DOI: 10.1080/19361610.2021.1963605
Afreen Kansal
{"title":"Fake News Detection Using Pos Tagging and Machine Learning","authors":"Afreen Kansal","doi":"10.1080/19361610.2021.1963605","DOIUrl":"https://doi.org/10.1080/19361610.2021.1963605","url":null,"abstract":"Abstract In this digital era, one major concern is not knowing what news to believe and not to believe. With the ever-growing progress being made in social media and technology, the problem has become more prominent. This also played a very important role in spreading fake information in this pandemic, creating chaos and worry throughout the world. Through the paper, I propose to understand and analyze the underlying writing style that can help in detecting fake news before it can be published, using a style-based approach in detection. An ensemble machine learning classification model was tried out to detect fake news.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47186690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comprehensive Review of the Internet of Things Security 物联网安全综述
IF 1.3
Journal of Applied Security Research Pub Date : 2021-08-28 DOI: 10.1080/19361610.2021.1962677
Maroua Ahmid, O. Kazar
{"title":"A Comprehensive Review of the Internet of Things Security","authors":"Maroua Ahmid, O. Kazar","doi":"10.1080/19361610.2021.1962677","DOIUrl":"https://doi.org/10.1080/19361610.2021.1962677","url":null,"abstract":"Abstract Currently, the Internet of Things (IoT) is the most contentious research subject. However, IoT still suffers from many security problems, and the security concerns are overgrowing with substantial IoT deployment. IoT will remain in danger unless understanding and addressing the security challenges. For this reason, this paper implements a full view of the IoT architecture and describes the characteristics and functionality of each layer. For a deeper understanding of IoT security challenges, we focus on identifying security requirements, and vulnerabilities in each IoT layer. Also, we discuss and classified the different security attacks in IoT.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41411770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Problems of Proving the Electronic Arbitration Agreement in Applicable International Laws and Agreements 在适用的国际法和协议中证明电子仲裁协议的问题
IF 1.3
Journal of Applied Security Research Pub Date : 2021-08-26 DOI: 10.1080/19361610.2021.1964324
Muawya Naser Al Dalaien, Ziad Al Enizi, Ahmad Al Dalaien
{"title":"Problems of Proving the Electronic Arbitration Agreement in Applicable International Laws and Agreements","authors":"Muawya Naser Al Dalaien, Ziad Al Enizi, Ahmad Al Dalaien","doi":"10.1080/19361610.2021.1964324","DOIUrl":"https://doi.org/10.1080/19361610.2021.1964324","url":null,"abstract":"<p><b>Abstract</b></p><p>This research deals with the legal problems faced by the proof of the electronic arbitration agreement in the national laws. The research ended with important results, one of them is at the level of national legislation, that some national legislations require the use of public-key technology in order for the electronic arbitration agreement to have evidentiary value, and other legislations do not require the use of a specific technology. The study concluded that the best solution at the international level is to make amendments to the New York Convention.</p>","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139103431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Ethnography to Identify Deviant Behaviors, for the Development of Crime Prevention Interventions 利用人种学识别偏差行为,促进犯罪预防干预措施的发展
IF 1.3
Journal of Applied Security Research Pub Date : 2021-07-26 DOI: 10.1080/19361610.2021.1956268
David Harding
{"title":"Using Ethnography to Identify Deviant Behaviors, for the Development of Crime Prevention Interventions","authors":"David Harding","doi":"10.1080/19361610.2021.1956268","DOIUrl":"https://doi.org/10.1080/19361610.2021.1956268","url":null,"abstract":"Abstract This paper introduces a crime prevention methodology that focuses on deviant beliefs and behaviors. Situated between developmental and environmental crime prevention approaches, this empirical study utilized ethnographical methods to identify potential and active deviants and their support networks. Interventions were implemented through the community program of Neighborhood Watch, which focused on the identified deviant communities before the actuation of a burglary crime. Comparison between the pre-intervention period and intervention periods show the incidence of burglary crime reducing by 42%. If validated through replication, other fields that engage with active actors, such as insurgents, gangs, and terrorists, may have similar success.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1956268","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48336326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulating Interrogation in the Lab: Examining the Effectiveness of Physical Pain, Coercive Verbal Pressure, and Rapport-Building for Obtaining Reliable Information 在实验室模拟审讯:检验身体疼痛、强制性语言压力和建立可靠信息的关系的有效性
IF 1.3
Journal of Applied Security Research Pub Date : 2021-07-22 DOI: 10.1080/19361610.2021.1949954
S. Houck, Joeann M. Salvati, A. Vrij, L. Newman
{"title":"Simulating Interrogation in the Lab: Examining the Effectiveness of Physical Pain, Coercive Verbal Pressure, and Rapport-Building for Obtaining Reliable Information","authors":"S. Houck, Joeann M. Salvati, A. Vrij, L. Newman","doi":"10.1080/19361610.2021.1949954","DOIUrl":"https://doi.org/10.1080/19361610.2021.1949954","url":null,"abstract":"Abstract Three lab experiments used an interrogation simulation to examine the relative effectiveness of pain, coercive verbal pressure, and rapport-building for obtaining reliable information. Investigators questioned participants about information they were instructed to keep secret. We measured how many people gave reliable and unreliable information under pain (Study 1; N = 49), verbal pressure alone and in combination with pain (Study 2; N = 87), and verbal pressure and pain compared to a rapport-based interrogation (Study 3; N = 158). Results empirically support much of what field experts and scholars have previously claimed: pain and psychological coercion result in unreliable information.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1949954","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47983981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application and Criminalization of Artificial Intelligence in the Digital Society: Security Threats and the Regulatory Challenges 数字社会中人工智能的应用和犯罪化:安全威胁和监管挑战
IF 1.3
Journal of Applied Security Research Pub Date : 2021-07-19 DOI: 10.1080/19361610.2021.1947113
A. Mahmud
{"title":"Application and Criminalization of Artificial Intelligence in the Digital Society: Security Threats and the Regulatory Challenges","authors":"A. Mahmud","doi":"10.1080/19361610.2021.1947113","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947113","url":null,"abstract":"Abstract We are living in a technology-based digital society where the application of autonomous machines and artificial intelligence (AI) is growing rapidly and is having an impact on our social life and the public sphere. Like many other technologies, AI will open new doors for criminals, and consequently, social security has been threatened by different modes of AI criminalization. It is imposing a complex challenge to frame an effective regulatory framework. This article provided a structured literature analysis of the application and criminalization of AI by recommending principles for countering the regulatory challenges and protect the right of individuals.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947113","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41376275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
From Conventional to Unconventional Mechanism: The Public Dilemma of Kidnapping Business in the South-East and South-South Regions of Nigeria 从常规机制到非常规机制:尼日利亚东南和南南地区绑架业务的公共困境
IF 1.3
Journal of Applied Security Research Pub Date : 2021-07-16 DOI: 10.1080/19361610.2021.1947114
Otu Akanu Otu, A. Adedeji
{"title":"From Conventional to Unconventional Mechanism: The Public Dilemma of Kidnapping Business in the South-East and South-South Regions of Nigeria","authors":"Otu Akanu Otu, A. Adedeji","doi":"10.1080/19361610.2021.1947114","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947114","url":null,"abstract":"Abstract Kidnapping activities has become the most recurring organized crime in strategic cities, villages and communities in southeast and south-south Nigeria. It has generated a frenzy-like situation among members of the public. It needs to be known why civil police with its dexterity for conventional mechanisms in crime prevention and control are incapacitated to combat recent spate of kidnapping activities in Nigeria. Some pertinent questions about menace of kidnapping in Nigeria are: Why did conventional approach fail to control kidnapping activities in Nigeria? What control strategies were put in place by the respective state governments in southern states? What is the philosophy behind the adoption of unconventional means? What are the instances of its effectiveness? Is there any backlash with this strategy? With fieldworks in two purposively selected states in the southern regions of Nigeria, the study recommends among others, the creation of a specialized court with the mandate to convict suspects/sponsors of kidnapping business if found guilty within a stipulated timeframe.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947114","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48921807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Hiding Using PVD and Improving Security Using RSA 使用PVD隐藏数据和使用RSA提高安全性
IF 1.3
Journal of Applied Security Research Pub Date : 2021-07-09 DOI: 10.1080/19361610.2021.1900692
Hemalatha Jeyaprakash, K. Kartheeban, A. Sahu, Balasubramanian Chokkalingam
{"title":"Data Hiding Using PVD and Improving Security Using RSA","authors":"Hemalatha Jeyaprakash, K. Kartheeban, A. Sahu, Balasubramanian Chokkalingam","doi":"10.1080/19361610.2021.1900692","DOIUrl":"https://doi.org/10.1080/19361610.2021.1900692","url":null,"abstract":"Abstract Steganography deals with hiding information, which offers ultimate security in defense, profitable usages, thus sending the imperceptible information, will not be bare or distinguished by others. In this paper, a multidirectional PVD hiding scheme with RSA algorithm is proposed. Secret bits are embedded in three directions of a color image by dividing the non-overlapping blocks into R, G, b channels by selecting the minimum pixels of each block regrouping. In order to ensure the security of an stego-image, the work proposed by scheme is used, and in addition to that RSA algorithm is proposed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1900692","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41411834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review-Based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras 基于评论的安全医疗监控分类:无线智能摄像头
IF 1.3
Journal of Applied Security Research Pub Date : 2021-07-05 DOI: 10.1080/19361610.2021.1947112
Ravi Teja Batchu, A. Alsadoon, P. Prasad, R. Ali, Tarik A. Rashid, Ghossoon Alsadoon, Oday D. Jerew
{"title":"A Review-Based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras","authors":"Ravi Teja Batchu, A. Alsadoon, P. Prasad, R. Ali, Tarik A. Rashid, Ghossoon Alsadoon, Oday D. Jerew","doi":"10.1080/19361610.2021.1947112","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947112","url":null,"abstract":"Abstract Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized access is an ongoing issue. A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval. The aim of this research is to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints. The proposed model for application in the healthcare sector consists of Collection, Network communication, and Authentication (CNA) using biometrics which replaces an existing, password-based access control method. A sensor then collects data, and by using a network (wireless or Zig-bee), a connection is established, after connectivity analytics and data management work which processes and aggregate the data. Subsequently, access is granted to authenticated users of the application. This IoT-based biometric authentication system facilitates effective recognition and ensures confidentiality, integrity, and reliability of patients’ records and other sensitive data. The proposed solution provides reliable access to healthcare data and enables secure access through the process of user and device authentication. The proposed model has been developed for access control to data through authentication of users in healthcare to reduce data manipulation or theft.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947112","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42476283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shoplifting in Shopping Malls in an Emerging Market: Evidence from Turkey 新兴市场的商场行窃:来自土耳其的证据
IF 1.3
Journal of Applied Security Research Pub Date : 2021-06-21 DOI: 10.1080/19361610.2021.1933323
Mine Özaşçılar, Hakki Ozturk
{"title":"Shoplifting in Shopping Malls in an Emerging Market: Evidence from Turkey","authors":"Mine Özaşçılar, Hakki Ozturk","doi":"10.1080/19361610.2021.1933323","DOIUrl":"https://doi.org/10.1080/19361610.2021.1933323","url":null,"abstract":"Abstract Shoplifting is at serious retail crime for all retailers, which reduces profitability. This study investigates the extent and impact of shoplifting in shopping malls in Istanbul, Turkey. It specifically examines differences in the extent and impact of shoplifting by retail sector and shopping mall size and location. Data collection was based on 389 face-to-face interviews with store managers and shopping mall managers in Istanbul. The results revealed that shoplifting is a serious crime for all retail sectors and sizes of shopping malls. The implications for future studies and limitations of the current study are discussed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1933323","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46881071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信