Security JournalPub Date : 2022-07-23DOI: 10.1057/s41284-022-00347-0
Andrii V Svintsytskyi, Oleksandr H Semeniuk, Olena S Ufimtseva, Yurii B Irkha, Serhii V Suslin
{"title":"Countering fake information as a guarantee of state information security.","authors":"Andrii V Svintsytskyi, Oleksandr H Semeniuk, Olena S Ufimtseva, Yurii B Irkha, Serhii V Suslin","doi":"10.1057/s41284-022-00347-0","DOIUrl":"10.1057/s41284-022-00347-0","url":null,"abstract":"<p><p>The article focuses on the notion of fake information as a tool of psychological influence in the context of hybrid wars. Works of the prominent academicians in the area of manipulation studies constitute the theoretical framework of this research. Empirical research methods such as observation, comparison, generalization and expert evaluation are used. First of all, types and methods of psychological influences used by mass media and social networks with a view to manipulate public opinions are distinguished. Moreover, the impact of emotions on the critical perception of the news is highlighted. The indicators of manipulative influence are defined in order to resist them. Besides, the ways of creating and distributing false information are described. In addition, the development of fakes identification mechanisms is considered a priority for the governmental and other public institutions. This is illustrated by a range of technologies developed to automatically detect fake news. Apart from that, the degrees of the information reliability are explored. Furthermore, structural elements of fake messages, which include the source and the message itself, are discussed. Misinformation of the public, promotion of certain opinions, encouragement of aggressive actions and instalment of doubts are singled out as the main tasks of fake information. Additionally, stages of countering fakes are distinguished. Finally, the specific features of the forensic expertise procedure are determined in order to provide information security in Ukraine. The research demonstrates the importance of an efficient security system, which would identify fake information and limit its propagation.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-16"},"PeriodicalIF":0.2,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9307711/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45858783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-07-21DOI: 10.1057/s41284-022-00350-5
Inês Guedes, Margarida Martins, Carla Sofia Cardoso
{"title":"Exploring the determinants of victimization and fear of online identity theft: an empirical study.","authors":"Inês Guedes, Margarida Martins, Carla Sofia Cardoso","doi":"10.1057/s41284-022-00350-5","DOIUrl":"10.1057/s41284-022-00350-5","url":null,"abstract":"<p><p>The present study aims at understanding what factors contribute to the explanation of online identity theft (OIT) victimization and fear, using the Routine Activity Theory (RAT). Additionally, it tries to uncover the influence of factors such as sociodemographic variables, offline fear of crime, and computer perception skills. Data for the present study were collected from a self-reported online survey administered to a sample of university students and staff (<i>N</i> = 832, 66% female). Concerning the OIT victimization, binary logistic regression analysis showed that those who do not used credit card had lower odds of becoming an OIT victim, and those who reported visiting risky contents presented higher odds of becoming an OIT victim. Moreover, males were less likely than females of being an OIT victim. In turn, fear of OIT was explained by socioeconomic status (negatively associated), education (positively associated) and by fear of crime in general (positively associated). In addition, subjects who reported more online interaction with strangers were less fearful, and those reported more avoiding behaviors reported higher levels of fear of OIT. Finally, subjects with higher computer skills are less fearful. These results will be discussed in the line of routine activities approach and implications for online preventive behaviors will be outlined.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-26"},"PeriodicalIF":0.2,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9302955/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48766633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-07-19DOI: 10.1057/s41284-022-00349-y
Simone Papale
{"title":"The realpolitik of jihad: an anatomy of transnational Islamist terrorism in East Africa","authors":"Simone Papale","doi":"10.1057/s41284-022-00349-y","DOIUrl":"https://doi.org/10.1057/s41284-022-00349-y","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"459 - 471"},"PeriodicalIF":1.2,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43799403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-06-16DOI: 10.1057/s41284-022-00342-5
J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang
{"title":"Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria","authors":"J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang","doi":"10.1057/s41284-022-00342-5","DOIUrl":"https://doi.org/10.1057/s41284-022-00342-5","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"350-372"},"PeriodicalIF":1.2,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42715087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-06-13DOI: 10.1057/s41284-022-00344-3
Miha Dvojmoč, V. Erčulj, A. Sotlar
{"title":"Tasks and competences of a private eye in a small society: the case of private detectives in Slovenia","authors":"Miha Dvojmoč, V. Erčulj, A. Sotlar","doi":"10.1057/s41284-022-00344-3","DOIUrl":"https://doi.org/10.1057/s41284-022-00344-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"406-425"},"PeriodicalIF":1.2,"publicationDate":"2022-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46828324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-05-29DOI: 10.1057/s41284-022-00343-4
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem, Saad Zafar
{"title":"Cyber-security and risky behaviors in a developing country context: a Pakistani perspective.","authors":"Naurin Farooq Khan, Naveed Ikram, Sumera Saleem, Saad Zafar","doi":"10.1057/s41284-022-00343-4","DOIUrl":"10.1057/s41284-022-00343-4","url":null,"abstract":"<p><p>Cyber-security behavior research is scant with even scarce studies carried out in developing countries. We examine the cyber-security and risky Internet behaviors of undergraduate students from Pakistan, taking into account the diversity of these students in terms of demographics, socioeconomic status, and the digital divide. Data were collected using a survey questionnaire. A total of 294 students belonging to six different cities of Pakistan were surveyed employing multistage stratified sampling in face-to-face interaction. The results indicated significant differences of cyber-security posture in terms of gender, age and digital divide variables. The profiles of students based on cyber-security and risky Internet behaviors indicate three groups with a majority of them falling into group that exhibits more risk-averse yet low cyber-security behavior. Moreover, proactive cyber-security awareness behavior has a positive impact on high risk-averse behavior. The implications of the findings are studied in terms of providing customized training and awareness. The future directions are laid out for further explorations in terms of cultural differences within and cross-country contexts.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-33"},"PeriodicalIF":0.2,"publicationDate":"2022-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9148392/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47904443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Converged Security Risk Management: Drivers, Barriers, and Facilitators.","authors":"Louisa Schneller, Cody Normitta Porter, Alison Wakefield","doi":"10.1057/s41284-022-00341-6","DOIUrl":"10.1057/s41284-022-00341-6","url":null,"abstract":"<p><p>Converged security risk management is an approach that addresses interdependencies between security-related business functions that have traditionally been managed by separate departments within organizations. It is a more effective means of addressing organizational security risks and threats than tackling physical and information security challenges separately, given that the boundaries between the two are frequently blurred. However, fully converged security remains the exception rather than the rule, leaving organizations increasingly vulnerable as their adoption and reliance on digital technologies accelerates. Through interviews with eight senior security professionals, this research identified key factors critical to effective converged security risk management, expressed as 'drivers,' 'barriers,' and 'facilitators.' The practitioners' accounts illuminated how the modern threat landscape continues to drive further the need for such an approach, while the traditional separation of corporate security departments from the information security function in organizations remains a barrier. A greater focus on training and education, as well as soft skills, were identified as key priorities in the drive for an effective converged approach.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-17"},"PeriodicalIF":0.2,"publicationDate":"2022-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9096777/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48292552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-04-18DOI: 10.1057/s41284-022-00335-4
Z. Trabelsi, Firas Saidi, Eswari Thangaraj, T. Veni
{"title":"A survey of extremism online content analysis and prediction techniques in twitter based on sentiment analysis","authors":"Z. Trabelsi, Firas Saidi, Eswari Thangaraj, T. Veni","doi":"10.1057/s41284-022-00335-4","DOIUrl":"https://doi.org/10.1057/s41284-022-00335-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"221 - 248"},"PeriodicalIF":1.2,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47918658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-04-13DOI: 10.1057/s41284-022-00339-0
Adam White
{"title":"Critical workers? Private security, public perceptions and the Covid-19 pandemic.","authors":"Adam White","doi":"10.1057/s41284-022-00339-0","DOIUrl":"10.1057/s41284-022-00339-0","url":null,"abstract":"<p><p>This article is among the first to explore the role and status of the private security industry during the Covid-19 pandemic. Focussing on the UK case, it illustrates how even though most private security officers were designated as 'critical workers' in this time of crisis, performing a range of functions essential to national infrastructure and law and order, the public have been slow or reluctant to recognise the contribution of the sector. It argues that this disposition is reflective of a longstanding public ambivalence or unease towards the private security industry which can ultimately be traced to the state-centric sociological terrain of the policing field.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":"1-16"},"PeriodicalIF":0.2,"publicationDate":"2022-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9007576/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46808890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-04-10DOI: 10.1057/s41284-022-00337-2
Patience N. Obiweluozor, C. Onyishi, Chinwe Okpoko
{"title":"The (in)security and educational perspectives of child sexual abuse: insights from Nigerian newspaper records","authors":"Patience N. Obiweluozor, C. Onyishi, Chinwe Okpoko","doi":"10.1057/s41284-022-00337-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00337-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"286 - 316"},"PeriodicalIF":1.2,"publicationDate":"2022-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43967845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}