Security JournalPub Date : 2023-06-19DOI: 10.1057/s41284-023-00387-0
C. Jen
{"title":"Prediction of male inmate infractions in Taiwan prisons","authors":"C. Jen","doi":"10.1057/s41284-023-00387-0","DOIUrl":"https://doi.org/10.1057/s41284-023-00387-0","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48589320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-06-19DOI: 10.1057/s41284-023-00388-z
Andrés De Castro, Rodrigo Gaona Prieto, J. Antón
{"title":"International cooperation in police training: evaluation of a European Union programme for African gendarmes","authors":"Andrés De Castro, Rodrigo Gaona Prieto, J. Antón","doi":"10.1057/s41284-023-00388-z","DOIUrl":"https://doi.org/10.1057/s41284-023-00388-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45352798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-06-16DOI: 10.1057/s41284-023-00385-2
Kevin F. Steinmetz, T. Holt, C. G. Brewer
{"title":"Developing and implementing social engineering-prevention policies: a qualitative study","authors":"Kevin F. Steinmetz, T. Holt, C. G. Brewer","doi":"10.1057/s41284-023-00385-2","DOIUrl":"https://doi.org/10.1057/s41284-023-00385-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49520110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-06-10DOI: 10.1057/s41284-023-00378-1
Paul Kariuki, Lizzy Oluwatoyin Ofusori, Prabhakar Rontala Subramaniam
{"title":"Cybersecurity threats and vulnerabilities experienced by small-scale African migrant traders in Southern Africa.","authors":"Paul Kariuki, Lizzy Oluwatoyin Ofusori, Prabhakar Rontala Subramaniam","doi":"10.1057/s41284-023-00378-1","DOIUrl":"10.1057/s41284-023-00378-1","url":null,"abstract":"<p><p>Cybersecurity threats have increased as the world becomes increasingly interconnected. Whilst the use of technology to facilitate commercial activities is now common practice, there is a need to limit exposure to these threats so that traders can transact safely. This study aimed to identify and analyse common cybersecurity vulnerabilities and threats experienced by small-scale African migrant traders in Southern Africa. A qualitative approach was employed and semi-structured and key informant interviews were conducted to gather the primary data, with secondary data sourced from the relevant literature. The study found that the majority of the small-scale traders experienced hacking while using their mobile devices for transacting. Moreover, most reported a lack of knowledge of cybersecurity and were therefore vulnerable to further threats. It is recommended that small-scale traders be capacitated with relevant technical information to enhance their understanding of cybersecurity risks that can negatively affect their commercial activities. There is also a need for further research to identify mitigation techniques and infrastructure to protect small-scale traders.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-30"},"PeriodicalIF":0.2,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10256576/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44416645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-06-02DOI: 10.1057/s41284-023-00381-6
Jose Marquez-Tejon, Montserrat Jimenez-Partearroyo, Diana Benito-Osorio
{"title":"Integrated security management model: a proposal applied to organisational resilience.","authors":"Jose Marquez-Tejon, Montserrat Jimenez-Partearroyo, Diana Benito-Osorio","doi":"10.1057/s41284-023-00381-6","DOIUrl":"10.1057/s41284-023-00381-6","url":null,"abstract":"<p><p>The purpose of this article is to contribute scientifically to the thematic areas of organisational resilience and security risk management by providing a model of a flexible security management system that can be integrated with other management systems and be applied to the operational dimension of organisational resilience. To this end, the literature on security risk and operational resilience has been reviewed, as well as on security governance models based on enterprise security risk management and other international standards that allow integration with business processes. During the study, an incipient production of specific models that determine the maturity of different management systems was observed in the academic sphere, with a gap being detected in terms of security management system maturity models linked to organisational governance and enterprise risk management, which would facilitate their inclusion in the organisation's integrated management system in a practical way. It is concluded that the proposed model provides scientific support to practitioners, and, to a greater extent, to companies and other organisations irrespective of their size, sector of activity or location.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":"1-24"},"PeriodicalIF":0.2,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10234797/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47336976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-05-28DOI: 10.1057/s41284-023-00383-4
H. Luong
{"title":"Foundations and trends in the darknet-related criminals in the last 10 years: a systematic literature review and bibliometric analysis","authors":"H. Luong","doi":"10.1057/s41284-023-00383-4","DOIUrl":"https://doi.org/10.1057/s41284-023-00383-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48906213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-05-27DOI: 10.1057/s41284-023-00382-5
Z. Trabelsi, M. Parambil
{"title":"A bibliometric study on recent trends in artificial intelligence-based suspicious activity recognition","authors":"Z. Trabelsi, M. Parambil","doi":"10.1057/s41284-023-00382-5","DOIUrl":"https://doi.org/10.1057/s41284-023-00382-5","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43903484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-05-26DOI: 10.1057/s41284-023-00380-7
Shannon Dodd, E. Antrobus, Michelle Sydes
{"title":"Body-worn camera activation in prisons: understanding correctional officers’ decision-making and use of discretion","authors":"Shannon Dodd, E. Antrobus, Michelle Sydes","doi":"10.1057/s41284-023-00380-7","DOIUrl":"https://doi.org/10.1057/s41284-023-00380-7","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48100595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-05-18DOI: 10.1057/s41284-023-00379-0
Gustavo Fondevila, Sveinung Sandberg
{"title":"The \"new\" crimes of pandemics: observations and insights from Latin America.","authors":"Gustavo Fondevila, Sveinung Sandberg","doi":"10.1057/s41284-023-00379-0","DOIUrl":"10.1057/s41284-023-00379-0","url":null,"abstract":"<p><p>We study the emergence of new forms of law violations in Latin America during the coronavirus pandemic. Based on data from online news articles, we construct a typology of \"new\" crimes: (1) hate or fear crimes against health workers and hospitals; (2) illegal denials of public mobility out of fear of infection; (3) looting and other traditional crimes justified by the pandemic; and (4) violations of pandemic regulations. Studies of crime during the pandemic have focused on traditional crime and have been based on rational choice theory and a routine activities approach. We argue that in order to understand the recent crime trends in Latin America, these must be accompanied by other theories of crime, together with a better understanding of the role of the State. Our typology can be a starting point for discussions and further research on the complex relationship between criminal behavior and policy responses in pandemics.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-32"},"PeriodicalIF":0.2,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10194040/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46669642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}