Security JournalPub Date : 2023-04-24DOI: 10.1057/s41284-023-00377-2
Nnamdi Egonu, Raymond Adibe, R. Nnamani, J. Nwaogaidu, Henry Uchenna Oranye
{"title":"Nigerian state and the management of armed conflicts: rethinking the amnesty approach","authors":"Nnamdi Egonu, Raymond Adibe, R. Nnamani, J. Nwaogaidu, Henry Uchenna Oranye","doi":"10.1057/s41284-023-00377-2","DOIUrl":"https://doi.org/10.1057/s41284-023-00377-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-28"},"PeriodicalIF":1.2,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41815527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-04-22DOI: 10.1057/s41284-023-00376-3
Abdullah Al Habsi, Michelle Butler, Andrew Percy
{"title":"Blackmail and the self-disclosure of sensitive information on social media: prevalence, victim characteristics and reporting behaviours amongst Omani WhatsApp users.","authors":"Abdullah Al Habsi, Michelle Butler, Andrew Percy","doi":"10.1057/s41284-023-00376-3","DOIUrl":"10.1057/s41284-023-00376-3","url":null,"abstract":"<p><p>Increasing numbers of social media users report being blackmailed on social media following their sharing of sensitive and personal information. However, little is known about this emerging crime and its victims. Using a survey of adult WhatsApp users in Oman (<i>n</i> = 1452) and interviews (<i>n</i> = 18) with victims and Omani criminal justice professionals, this study addresses this gap by examining the prevalence of blackmail among adult WhatsApp users arising from their voluntary self-disclosures, as well as the characteristics and vulnerabilities of those who fall victim to this activity. New insights are also offered into the factors influencing victim's decisions to report their experiences to criminal justice professionals, as well as the challenges associated with investigating and prosecuting this activity.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-19"},"PeriodicalIF":0.2,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10122079/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44566375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-04-22DOI: 10.1057/s41284-023-00375-4
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem
{"title":"Effects of socioeconomic and digital inequalities on cybersecurity in a developing country.","authors":"Naurin Farooq Khan, Naveed Ikram, Sumera Saleem","doi":"10.1057/s41284-023-00375-4","DOIUrl":"10.1057/s41284-023-00375-4","url":null,"abstract":"<p><p>In developing countries, increased reliance on cyberspace for carrying out educational activities has implications for cybersecurity threats. In the light of stratification model of diffusion of technologies, socioeconomic and digital disparities are reproduced in the use of digital knowledge and skills. Cybersecurity is a digital skill that is affected by socioeconomic and digital inequalities; specifically in the developing nations. With lack of digital divide's empirical evidence in terms of cybersecurity, this study employs a face-to-face survey to understand the computer and smartphone security practices of students enrolled in higher education institutes (HEIs) across Pakistan. A multi-stage stratified sampling technique was used to recruit a sample of 758 participants located in socioeconomically and geographically diverse cities in the country. Analysis was carried out using descriptive and Pearson's Chi-square statistics. The results show lax cybersecurity behavior of students both on computer and smartphone devices. Significant differences were found in the cybersecurity practices of students in terms of socioeconomic and digital divide variables. This highlights that the individuals with lower socioeconomic status and who are digitally less connected are at a greater risk of falling victims to cyber-threats. The implications of the study state to impart tailored cybersecurity trainings with respect to digital divide and socioeconomic status of the students.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-31"},"PeriodicalIF":0.2,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10122089/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45286075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-04-12DOI: 10.1057/s41284-023-00374-5
Brandaan Huigen
{"title":"‘They won’t steal my tilili phone’: expanding the market reduction approach to reduce property crime in South Africa","authors":"Brandaan Huigen","doi":"10.1057/s41284-023-00374-5","DOIUrl":"https://doi.org/10.1057/s41284-023-00374-5","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-21"},"PeriodicalIF":1.2,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43307612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-04-05DOI: 10.1057/s41284-023-00372-7
J. Pearson, O. Oni
{"title":"Addressing cybersecurity and safety disconnects in United States army aviation: an exploratory qualitative case study","authors":"J. Pearson, O. Oni","doi":"10.1057/s41284-023-00372-7","DOIUrl":"https://doi.org/10.1057/s41284-023-00372-7","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-17"},"PeriodicalIF":1.2,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43029120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-03-21DOI: 10.1057/s41284-023-00371-8
Heemeng Ho, John Gilmour, Lorraine Mazerolle, Ryan Ko
{"title":"Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study.","authors":"Heemeng Ho, John Gilmour, Lorraine Mazerolle, Ryan Ko","doi":"10.1057/s41284-023-00371-8","DOIUrl":"10.1057/s41284-023-00371-8","url":null,"abstract":"<p><p>Place management is central to Routine Activities Theory and proactive utilization of place managers is one of 25 Situational Crime Prevention techniques. Yet little is known about the effectiveness of using place managers to prevent cybercrimes. This paper uses a vignette experimental survey of 213 cybersecurity professionals to explore their perceptions of cybercrime prevention. We find that organizations that partner with and proactively utilize cybersecurity professionals as place managers are perceived as more effective in controlling cybercrimes than those organizations that do not specifically assign professionals to proactively prevent and control cybercrimes. We conclude that assigned cyberplace managers are more likely to use their cyber skills and knowledge than those who lack the time and space to utilize their cyber expertise.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-24"},"PeriodicalIF":0.2,"publicationDate":"2023-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10028752/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46356605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-03-16DOI: 10.1057/s41284-023-00370-9
Wolfgang Bretschneider, Andreas Freytag, Johannes P. Rieckmann, Tim H. Stuchtey
{"title":"State or private security supply? An analysis from the institutional economics perspective","authors":"Wolfgang Bretschneider, Andreas Freytag, Johannes P. Rieckmann, Tim H. Stuchtey","doi":"10.1057/s41284-023-00370-9","DOIUrl":"https://doi.org/10.1057/s41284-023-00370-9","url":null,"abstract":"The issue of domestic security has become increasingly complex over the past decades. As there is an increasing overlap between private and public provision of security, the question of how to allocate responsibility for security between the public sphere (state) and the private sphere has become important. Concepts that can provide both clarity and sufficient complexity are much needed. This article offers an institutional economics concept. This implies a method where basic elements of neoclassical public finance (e.g. differences like provision v. production or public v. private goods) are combined with explicitly institutional and security economic elements (degree of prevention, specificity, repressivity, state monopoly on the use of force). As a result, a normative distinction between state and private security responsibilities based on qualitative arguments is offered.","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135488708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Bretschneider, A. Freytag, Johannes P. Rieckmann, Tim H. Stuchtey
{"title":"State or private security supply? An analysis from the institutional economics perspective","authors":"W. Bretschneider, A. Freytag, Johannes P. Rieckmann, Tim H. Stuchtey","doi":"10.2139/ssrn.4169383","DOIUrl":"https://doi.org/10.2139/ssrn.4169383","url":null,"abstract":"The issue of domestic security has become increasingly complex over the past decades. As there is an increasing overlap between private and public provision of security, the question of how to allocate responsibility for security between the public sphere (state) and the private sphere has become important. Concepts that can provide both clarity and sufficient complexity are much needed. This article offers an institutional economics concept. This implies a method where basic elements of neoclassical public finance (e.g. differences like provision v. production or public v. private goods) are combined with explicitly institutional and security economic elements (degree of prevention, specificity, repressivity, state monopoly on the use of force). As a result, a normative distinction between state and private security responsibilities based on qualitative arguments is offered.","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-19"},"PeriodicalIF":1.2,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45959903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-03-13DOI: 10.1057/s41284-023-00367-4
V. White, Joel Hunt, Brannon M. Green
{"title":"A discussion of current crime forecasting indices and an improvement to the prediction efficiency index for applications","authors":"V. White, Joel Hunt, Brannon M. Green","doi":"10.1057/s41284-023-00367-4","DOIUrl":"https://doi.org/10.1057/s41284-023-00367-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-18"},"PeriodicalIF":1.2,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42137884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}