Security Journal最新文献

筛选
英文 中文
Open-source intelligence and great-power competition under mediatization 媒介化下的开源情报与大国竞争
IF 1.2
Security Journal Pub Date : 2024-09-12 DOI: 10.1057/s41284-024-00446-0
Jiaxi Zhou
{"title":"Open-source intelligence and great-power competition under mediatization","authors":"Jiaxi Zhou","doi":"10.1057/s41284-024-00446-0","DOIUrl":"https://doi.org/10.1057/s41284-024-00446-0","url":null,"abstract":"<p>With the rise of mediatization, open-source intelligence (OSINT) has evolved into a decentralized form of intelligence gathering, influenced by both political and commercial logic. This transformation has positioned social media as a primary source of OSINT, enhancing the capabilities of non-state actors and significantly impacting international politics, particularly in the realm of great-power competition. Through an analysis spanning individual, state, and systemic levels, this article examines OSINT’s role in shaping contemporary international politics. By exploring case studies such as the Russo-Ukrainian War, Israel-Hamas War, and strategic competition between China and the United States, this article illuminates how OSINT influences decision-making processes and global power struggles and contributes to a deeper understanding of the evolving landscape of intelligence and its implications for statecraft.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142222115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stakeholders’ views of online surveillance capabilities: a comparative analysis of the debates in UK, Finland and Norway 利益相关者对在线监控能力的看法:英国、芬兰和挪威辩论的比较分析
IF 1.2
Security Journal Pub Date : 2024-09-09 DOI: 10.1057/s41284-024-00443-3
Anna-Riitta Leppänen, Guro Flinterud, Amy Long, Megan O’Neill, Johan Boucht, Burkhard Schaefer, Jarmo Houtsonen
{"title":"Stakeholders’ views of online surveillance capabilities: a comparative analysis of the debates in UK, Finland and Norway","authors":"Anna-Riitta Leppänen, Guro Flinterud, Amy Long, Megan O’Neill, Johan Boucht, Burkhard Schaefer, Jarmo Houtsonen","doi":"10.1057/s41284-024-00443-3","DOIUrl":"https://doi.org/10.1057/s41284-024-00443-3","url":null,"abstract":"<p>We examine how stakeholders (<i>n</i> = 74) in the United Kingdom, Finland and Norway perceive security authorities’ online surveillance capabilities, and how these perceptions form patterns transcending national borders and organisational boundaries. Using a Q-methodological approach, we found variation within and between nations that is usually obscured in the polarised public debates. Furthermore, our stakeholders presented areas of consensus not usually apparent in public discourses. We argue for using awareness of this nuance and areas of convergence as platforms on which to build more effective public debates to further principles of deliberative democracy.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142222116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A general problem-solving matrix (GPSM): combining crime prevention and public health tools 一般问题解决矩阵(GPSM):将预防犯罪和公共卫生工具结合起来
IF 1.2
Security Journal Pub Date : 2024-09-05 DOI: 10.1057/s41284-024-00438-0
John E. Eck, Vania Ceccato, Rob T. Guerette
{"title":"A general problem-solving matrix (GPSM): combining crime prevention and public health tools","authors":"John E. Eck, Vania Ceccato, Rob T. Guerette","doi":"10.1057/s41284-024-00438-0","DOIUrl":"https://doi.org/10.1057/s41284-024-00438-0","url":null,"abstract":"<p>Crime involves different individuals interacting in complex social and physical settings. Often, crime problem solvers reach for a common generic response, when they need to consider a number of possible solutions. Thinking tools can help. In this article, we show how uniting an injury prevention tool—the Haddon Matrix used widely in public health—and a crime prevention tool—the crime problem triangle used widely in policing—can provide guidance to crime problem solvers. We call our hybrid the General Problem-Solving Matrix (GPSM). We apply GPSM to rape and burglary to illustrates its features. We conclude the article by examining the alternative versions of GPSM in crime prevention.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142222284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The dimensions of ‘forensic biosecurity’ in genetic and facial contexts 基因和面部情况下的 "法医生物安全 "问题
IF 1.2
Security Journal Pub Date : 2024-09-03 DOI: 10.1057/s41284-024-00445-1
Erin Kruger, Glenn Porter, Philip Birch, Lewis Bizo, Michael Kennedy
{"title":"The dimensions of ‘forensic biosecurity’ in genetic and facial contexts","authors":"Erin Kruger, Glenn Porter, Philip Birch, Lewis Bizo, Michael Kennedy","doi":"10.1057/s41284-024-00445-1","DOIUrl":"https://doi.org/10.1057/s41284-024-00445-1","url":null,"abstract":"<p>This article seeks to examine the co-productions of security and emerging technologies in the two contexts of forensic genetics and forensic facial identification. These surfacing co-productions, deemed here as ‘forensic biosecurity’, are evolving rapidly in both theoretical and practical terms. Definitions and conceptualisations of security are contingent and multiple, impacting forensic biological techniques and innovations in both predictable and unpredictable ways. The military, counter-terrorism, law enforcement, immigration, customs, border patrol, mass disasters, cold case reviews, health, defence, private security, and biometric applications are just a few of the many security environments where forensic biological techniques are applied. The continual development of variations in forensic genetics and facial identification renders a futher blurring of traditional evidence with that of intelligence. Drawing in particular from Joly’s (in: S. Hilgartner, C. Miller, and R. Hagendijk (eds) Science and democracy: Making knowledge and making power in the biosciences and beyond, Taylor and Francis, London, 2015) work on emerging technologies, forensic biosecurity is analysed from a science and technology studies (STS) perspective. An emerging technology in the initial stages is thought to be highly flexible with the potential impacts on society and criminal justice being possibly difficult to predict. Once the science and/or technology has become entrenched and mainstream, it may be difficult to change. The enthusiasm portrayed by law enforcement and security agencies regarding emerging technologies, shows that it is important to remain somewhat cautious about the proliferation of these techniques. While such science and technologies appear to be effective and innovative in the present, it is difficult to accurately forecast or predict the future consequences of such innovations.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142222117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying and preventing future forms of crimes using situational crime prevention 利用情境犯罪预防识别和预防未来形式的犯罪
IF 1.2
Security Journal Pub Date : 2024-08-29 DOI: 10.1057/s41284-024-00441-5
Shane D. Johnson
{"title":"Identifying and preventing future forms of crimes using situational crime prevention","authors":"Shane D. Johnson","doi":"10.1057/s41284-024-00441-5","DOIUrl":"https://doi.org/10.1057/s41284-024-00441-5","url":null,"abstract":"<p>Traditional crime has been falling for some time in most countries. However, developing technologies and our use of them are creating new opportunities for offending. For example, estimates from the Crime Survey of England and Wales indicate that in the UK, online fraud and related offences account for as many crimes as do “traditional” offences. To date, academia, law enforcement and governments have been reactive both in terms of identifying new and emerging forms of offending and in developing approaches to address them. In this paper, I will discuss the future crime agenda, and how futures thinking can help identify future crime opportunities and security threats including online fraud, crimes involving artificial intelligence, and crime in the metaverse. The paper will close with a discussion of the implications for theory and crime prevention.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142222118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What is the role of architects and urban planners in crime prevention? 建筑师和城市规划师在预防犯罪方面发挥什么作用?
IF 1.2
Security Journal Pub Date : 2024-08-22 DOI: 10.1057/s41284-024-00442-4
Vania Ceccato, Patricia Brantingham
{"title":"What is the role of architects and urban planners in crime prevention?","authors":"Vania Ceccato, Patricia Brantingham","doi":"10.1057/s41284-024-00442-4","DOIUrl":"https://doi.org/10.1057/s41284-024-00442-4","url":null,"abstract":"<p>In this article, we discuss the role of urban planning professionals in situational crime prevention. We begin by examining their role as city “shapers” and the reasons behind their frequent neglect of crime-related factors in their decision-making process. We also explore why criminology tends to underestimate the influence of urban planning professionals on the urban environment, a factor crucial for effective crime prevention. To highlight the disconnection between urban planning and crime prevention, we present findings from a survey conducted with urban planners and safety experts in 290 Swedish municipalities. The article concludes with future research and practice recommendations, stressing the urgent need for improved communication and collaboration between urban shapers and environmental criminologists and a more comprehensive understanding from all parties involved.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142222283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the special issue “environmental criminology in crime prevention: theories for practice” "预防犯罪中的环境犯罪学:实践理论 "特刊导言
IF 1.2
Security Journal Pub Date : 2024-08-12 DOI: 10.1057/s41284-024-00440-6
Vania Ceccato, Ioannis Ioannidis
{"title":"Introduction to the special issue “environmental criminology in crime prevention: theories for practice”","authors":"Vania Ceccato, Ioannis Ioannidis","doi":"10.1057/s41284-024-00440-6","DOIUrl":"https://doi.org/10.1057/s41284-024-00440-6","url":null,"abstract":"<p>In this special issue, five articles demonstrate the impact of contemporary Environmental Criminology theory on the understanding of crime and the development of crime prevention practices in both urban and rural contexts. The articles exemplify the development of Environmental Criminology as a field that extends beyond crime in physical spaces to encompass offenses in cyberspace, illustrating the field’s adaptability and relevance in an increasingly digital world. Authored by environmental criminologists from diverse disciplinary backgrounds, these articles offer a range of international perspectives, thereby contributing to the field of security while addressing broader social issues.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141943608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framing Amish victimization and security through the lens of criminological theory 从犯罪学理论的角度阐述阿米什人的受害情况和安全问题
IF 1.2
Security Journal Pub Date : 2024-08-02 DOI: 10.1057/s41284-024-00439-z
Joseph F. Donnermeyer
{"title":"Framing Amish victimization and security through the lens of criminological theory","authors":"Joseph F. Donnermeyer","doi":"10.1057/s41284-024-00439-z","DOIUrl":"https://doi.org/10.1057/s41284-024-00439-z","url":null,"abstract":"<p>This article explores the crime experience of the Amish, a rural-located religious subculture that is rarely studied by criminologists. Evidence is derived from narratives of crime experiences reported by scribes to a monthly Amish periodical called <i>The Diary.</i> Every month there are reports about community events from hundreds of Amish settlements, including crime. A routine activities approach helps frame the results. From 168 crime narratives, both burglary/attempted burglary and larceny/attempted larceny are the most frequently described. Suggestions for future research, including an expanded collection of crime narratives from <i>The Diary,</i> plus interviews with both law enforcement and other criminal justice practitioners and Amish crime victims will advance criminological understandings of Amish vulnerability to crime. The article concludes with suggested actions to improve safety and security for Amish communities using environmental criminology theories.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141883147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reimagining the familiar stranger as a source of security: generating guardianship through everyday mobility 将熟悉的陌生人重新想象为安全之源:通过日常流动产生监护作用
IF 1.2
Security Journal Pub Date : 2024-08-02 DOI: 10.1057/s41284-024-00437-1
Renee Zahnow, Jonathan Corcoran
{"title":"Reimagining the familiar stranger as a source of security: generating guardianship through everyday mobility","authors":"Renee Zahnow, Jonathan Corcoran","doi":"10.1057/s41284-024-00437-1","DOIUrl":"https://doi.org/10.1057/s41284-024-00437-1","url":null,"abstract":"<p>The familiar stranger is a social phenomenon that emerges from the serial reproduction of daily routines, structured around urban places and practices, that results in repeated encounters with the same individuals over time. Scholarship suggests that increased familiarity among individuals might incur crime control benefits at places by reducing individual anonymity and enhancing the moral obligation to obey behavioural norms. Familiarity with place-based norms and regularities can also enhance guardianship capacity and willingness to intervene when problems arise. In this paper, we detail a framework that integrates geographical, sociological, and psychological understandings of urban daily life to conceptualize the familiar stranger as a uniquely urban phenomenon emerging from multiple social processes synchronising in time-space. Our framework highlights the capacity for variation in relation to intensity contingent on daily regularities, place attributes, structures and social norms and provides for future measurement, modelling, and monitoring of familiar strangers as a protective factor against crime that can be ascribed to individuals, places and/or social systems. We include an operationalisation of our framework for a single use case, namely familiar stranger encounters in a public transit network.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141883146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shadow of death: the criminal economy of banditry and kidnapping in northwest Nigeria 死亡阴影:尼日利亚西北部土匪和绑架的犯罪经济
IF 1.2
Security Journal Pub Date : 2024-06-22 DOI: 10.1057/s41284-024-00436-2
Oluwole Ojewale
{"title":"Shadow of death: the criminal economy of banditry and kidnapping in northwest Nigeria","authors":"Oluwole Ojewale","doi":"10.1057/s41284-024-00436-2","DOIUrl":"https://doi.org/10.1057/s41284-024-00436-2","url":null,"abstract":"<p>This study explores the phenomenon of banditry as a criminal enterprise in Nigeria. By employing qualitative and quantitative data, it provides a historical context for banditry and discusses kidnapping for ransom as its variant. The spatial distribution and patterns of kidnapping incidents are also highlighted. In response to this persistent challenge posed by banditry, the study notes the government and community members have implemented three distinct strategies. They are enhancing security and law enforcement, negotiations, and legislation. The limitations of these responses are also examined. The paper offers guidance on the necessary policy imperatives to effectively combat armed banditry through a multifaceted approach. It emphasizes that addressing the escalating incidents of kidnapping for ransom in the northwest region cannot be addressed independently from the broader need for reform within the security sector of the country. Strengthening border security, preventing the free flow of illicit firearms into the nation, and concerted effort focused on the recruitment, training, and deployment of adequately equipped security personnel to the border areas become pivotal.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信