Security Journal最新文献

筛选
英文 中文
The realpolitik of jihad: an anatomy of transnational Islamist terrorism in East Africa 圣战的现实政治:剖析东非的跨国伊斯兰恐怖主义
IF 1.2
Security Journal Pub Date : 2022-07-19 DOI: 10.1057/s41284-022-00349-y
Simone Papale
{"title":"The realpolitik of jihad: an anatomy of transnational Islamist terrorism in East Africa","authors":"Simone Papale","doi":"10.1057/s41284-022-00349-y","DOIUrl":"https://doi.org/10.1057/s41284-022-00349-y","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"459 - 471"},"PeriodicalIF":1.2,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43799403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria 商业电子邮件泄露骗局、网络受害和尼日利亚企业组织的经济可持续性
IF 1.2
Security Journal Pub Date : 2022-06-16 DOI: 10.1057/s41284-022-00342-5
J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang
{"title":"Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria","authors":"J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang","doi":"10.1057/s41284-022-00342-5","DOIUrl":"https://doi.org/10.1057/s41284-022-00342-5","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"350-372"},"PeriodicalIF":1.2,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42715087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Tasks and competences of a private eye in a small society: the case of private detectives in Slovenia 小社会私家侦探的任务和能力:斯洛文尼亚私家侦探的案例
IF 1.2
Security Journal Pub Date : 2022-06-13 DOI: 10.1057/s41284-022-00344-3
Miha Dvojmoč, V. Erčulj, A. Sotlar
{"title":"Tasks and competences of a private eye in a small society: the case of private detectives in Slovenia","authors":"Miha Dvojmoč, V. Erčulj, A. Sotlar","doi":"10.1057/s41284-022-00344-3","DOIUrl":"https://doi.org/10.1057/s41284-022-00344-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"406-425"},"PeriodicalIF":1.2,"publicationDate":"2022-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46828324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-security and risky behaviors in a developing country context: a Pakistani perspective 发展中国家背景下的网络安全和危险行为:巴基斯坦视角
IF 1.2
Security Journal Pub Date : 2022-05-29 DOI: 10.1057/s41284-022-00343-4
N. Khan, N. Ikram, Sumera Saleem, Saad Zafar
{"title":"Cyber-security and risky behaviors in a developing country context: a Pakistani perspective","authors":"N. Khan, N. Ikram, Sumera Saleem, Saad Zafar","doi":"10.1057/s41284-022-00343-4","DOIUrl":"https://doi.org/10.1057/s41284-022-00343-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1 - 33"},"PeriodicalIF":1.2,"publicationDate":"2022-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47904443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Implementing Converged Security Risk Management: Drivers, Barriers, and Facilitators 实施融合安全风险管理:驱动因素、障碍和促进者
IF 1.2
Security Journal Pub Date : 2022-05-12 DOI: 10.1057/s41284-022-00341-6
Louisa Schneller, C. Porter, A. Wakefield
{"title":"Implementing Converged Security Risk Management: Drivers, Barriers, and Facilitators","authors":"Louisa Schneller, C. Porter, A. Wakefield","doi":"10.1057/s41284-022-00341-6","DOIUrl":"https://doi.org/10.1057/s41284-022-00341-6","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1 - 17"},"PeriodicalIF":1.2,"publicationDate":"2022-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48292552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey of extremism online content analysis and prediction techniques in twitter based on sentiment analysis 基于情感分析的推特极端主义网络内容分析与预测技术研究
IF 1.2
Security Journal Pub Date : 2022-04-18 DOI: 10.1057/s41284-022-00335-4
Z. Trabelsi, Firas Saidi, Eswari Thangaraj, T. Veni
{"title":"A survey of extremism online content analysis and prediction techniques in twitter based on sentiment analysis","authors":"Z. Trabelsi, Firas Saidi, Eswari Thangaraj, T. Veni","doi":"10.1057/s41284-022-00335-4","DOIUrl":"https://doi.org/10.1057/s41284-022-00335-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"221 - 248"},"PeriodicalIF":1.2,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47918658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Critical workers? Private security, public perceptions and the Covid-19 pandemic 关键员工呢?私人安全、公众认知和Covid-19大流行
IF 1.2
Security Journal Pub Date : 2022-04-13 DOI: 10.1057/s41284-022-00339-0
A. White
{"title":"Critical workers? Private security, public perceptions and the Covid-19 pandemic","authors":"A. White","doi":"10.1057/s41284-022-00339-0","DOIUrl":"https://doi.org/10.1057/s41284-022-00339-0","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":"1 - 16"},"PeriodicalIF":1.2,"publicationDate":"2022-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46808890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The (in)security and educational perspectives of child sexual abuse: insights from Nigerian newspaper records 儿童性虐待的安全和教育视角:来自尼日利亚报纸记录的见解
IF 1.2
Security Journal Pub Date : 2022-04-10 DOI: 10.1057/s41284-022-00337-2
Patience N. Obiweluozor, C. Onyishi, Chinwe Okpoko
{"title":"The (in)security and educational perspectives of child sexual abuse: insights from Nigerian newspaper records","authors":"Patience N. Obiweluozor, C. Onyishi, Chinwe Okpoko","doi":"10.1057/s41284-022-00337-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00337-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"286 - 316"},"PeriodicalIF":1.2,"publicationDate":"2022-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43967845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new financial crime: proliferation financing and China's countermeasures 一种新型金融犯罪:扩散融资及中国的对策
IF 1.2
Security Journal Pub Date : 2022-04-08 DOI: 10.1057/s41284-022-00340-7
Shacheng Wang, Xixi Zhu, Bing Zhang
{"title":"A new financial crime: proliferation financing and China's countermeasures","authors":"Shacheng Wang, Xixi Zhu, Bing Zhang","doi":"10.1057/s41284-022-00340-7","DOIUrl":"https://doi.org/10.1057/s41284-022-00340-7","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"272 - 285"},"PeriodicalIF":1.2,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45515601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Police recruits’ wants and needs in police training in Germany 德国警察培训中的新兵需求
IF 1.2
Security Journal Pub Date : 2022-04-06 DOI: 10.1057/s41284-022-00338-1
Mario S. Staller, Swen Koerner, Valentina Heil, A. Abraham, J. Poolton
{"title":"Police recruits’ wants and needs in police training in Germany","authors":"Mario S. Staller, Swen Koerner, Valentina Heil, A. Abraham, J. Poolton","doi":"10.1057/s41284-022-00338-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00338-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"249 - 271"},"PeriodicalIF":1.2,"publicationDate":"2022-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44667523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信