Security Journal最新文献

筛选
英文 中文
An evaluation of an Australia-based home Burglary prevention program 对澳大利亚家庭入室盗窃预防计划的评估
IF 1.2
Security Journal Pub Date : 2022-09-16 DOI: 10.1057/s41284-022-00355-0
M. Manning, Gabriel T. W. Wong, M. Ip
{"title":"An evaluation of an Australia-based home Burglary prevention program","authors":"M. Manning, Gabriel T. W. Wong, M. Ip","doi":"10.1057/s41284-022-00355-0","DOIUrl":"https://doi.org/10.1057/s41284-022-00355-0","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45819944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries 印度尼西亚网络犯罪法律与新冠肺炎的综合研究:发达国家和发展中国家的经验教训
IF 1.2
Security Journal Pub Date : 2022-09-11 DOI: 10.1057/s41284-022-00357-y
Agus Nugroho, A. Chandrawulan
{"title":"Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries","authors":"Agus Nugroho, A. Chandrawulan","doi":"10.1057/s41284-022-00357-y","DOIUrl":"https://doi.org/10.1057/s41284-022-00357-y","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48704405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Issues with the application of CPTED in urban development: a case of City X, Malaysia CPTED在城市发展中的应用问题——以马来西亚X市为例
IF 1.2
Security Journal Pub Date : 2022-09-04 DOI: 10.1057/s41284-022-00353-2
S. Rajadurai, S. H. A. B. Ah, R. Zainol, Z. Azman, Mitra Manisha Rajadurai
{"title":"Issues with the application of CPTED in urban development: a case of City X, Malaysia","authors":"S. Rajadurai, S. H. A. B. Ah, R. Zainol, Z. Azman, Mitra Manisha Rajadurai","doi":"10.1057/s41284-022-00353-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00353-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47632294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria 更正:尼日利亚企业组织的商业电子邮件泄露骗局、网络受害和经济可持续性
IF 1.2
Security Journal Pub Date : 2022-08-27 DOI: 10.1057/s41284-022-00354-1
J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang
{"title":"Correction to: Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria","authors":"J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang","doi":"10.1057/s41284-022-00354-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00354-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45637735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison 在组织内嵌入资讯保安管理:透过组织内联络提高参与及参与
IF 1.2
Security Journal Pub Date : 2022-08-07 DOI: 10.1057/s41284-022-00352-3
Moneer Alshaikh, Shanton Chang, Atif Ahmad, S. Maynard, A. Alammary
{"title":"Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison","authors":"Moneer Alshaikh, Shanton Chang, Atif Ahmad, S. Maynard, A. Alammary","doi":"10.1057/s41284-022-00352-3","DOIUrl":"https://doi.org/10.1057/s41284-022-00352-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46813685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Old problem, new manifestation: the emergence of cultism in rural secondary schools in Anambra state, Nigeria 老问题,新表现:尼日利亚阿南布拉州农村中学邪教现象的出现
IF 1.2
Security Journal Pub Date : 2022-08-03 DOI: 10.1057/s41284-022-00351-4
I. Alumona, K. Onwuanabile, V. Iwuoha, Ernest Toochi Aniche
{"title":"Old problem, new manifestation: the emergence of cultism in rural secondary schools in Anambra state, Nigeria","authors":"I. Alumona, K. Onwuanabile, V. Iwuoha, Ernest Toochi Aniche","doi":"10.1057/s41284-022-00351-4","DOIUrl":"https://doi.org/10.1057/s41284-022-00351-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"58556714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Susceptibility for criminal facilitation in social housing: a psychological perspective 社会住房中犯罪便利化的易感性:心理学视角
IF 1.2
Security Journal Pub Date : 2022-08-01 DOI: 10.1057/s41284-022-00348-z
J. Stam, I. Eekhout, Marit Koenen, V. Kallen
{"title":"Susceptibility for criminal facilitation in social housing: a psychological perspective","authors":"J. Stam, I. Eekhout, Marit Koenen, V. Kallen","doi":"10.1057/s41284-022-00348-z","DOIUrl":"https://doi.org/10.1057/s41284-022-00348-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42680006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tabletop scenario exercises as a training tool for improving response to workplace violence 桌面情景练习作为提高对工作场所暴力反应的培训工具
IF 1.2
Security Journal Pub Date : 2022-07-25 DOI: 10.1057/s41284-022-00346-1
Carri Casteel, C. Peek-Asa, Robyn O. Espinosa, E. Rugala, M. Ramirez
{"title":"Tabletop scenario exercises as a training tool for improving response to workplace violence","authors":"Carri Casteel, C. Peek-Asa, Robyn O. Espinosa, E. Rugala, M. Ramirez","doi":"10.1057/s41284-022-00346-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00346-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42874735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Countering fake information as a guarantee of state information security 打击虚假信息,保障国家信息安全
IF 1.2
Security Journal Pub Date : 2022-07-23 DOI: 10.1057/s41284-022-00347-0
A. Svintsytskyi, O. Semeniuk, Olena S. Ufimtseva, Y. Irkha, Serhii V. Suslin
{"title":"Countering fake information as a guarantee of state information security","authors":"A. Svintsytskyi, O. Semeniuk, Olena S. Ufimtseva, Y. Irkha, Serhii V. Suslin","doi":"10.1057/s41284-022-00347-0","DOIUrl":"https://doi.org/10.1057/s41284-022-00347-0","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45858783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring the determinants of victimization and fear of online identity theft: an empirical study 探索网络身份盗窃受害和恐惧的决定因素:一项实证研究
IF 1.2
Security Journal Pub Date : 2022-07-21 DOI: 10.1057/s41284-022-00350-5
I. Guedes, M. Martins, C. S. Cardoso
{"title":"Exploring the determinants of victimization and fear of online identity theft: an empirical study","authors":"I. Guedes, M. Martins, C. S. Cardoso","doi":"10.1057/s41284-022-00350-5","DOIUrl":"https://doi.org/10.1057/s41284-022-00350-5","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48766633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信