Security JournalPub Date : 2023-02-09DOI: 10.1057/s41284-023-00368-3
Hasan Buker, Ihsan E. Buker, Bailey Bullion
{"title":"Carrying a handgun in public vs. taking a handgun to school among youth: an exploration of the predicting power of risk factors related to delinquency, aggression, and victimization","authors":"Hasan Buker, Ihsan E. Buker, Bailey Bullion","doi":"10.1057/s41284-023-00368-3","DOIUrl":"https://doi.org/10.1057/s41284-023-00368-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-25"},"PeriodicalIF":1.2,"publicationDate":"2023-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42597101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-01-30DOI: 10.1057/s41284-023-00366-5
Hsiao‐Ming Wang, Ming-Li Hsieh
{"title":"Cryptocurrency is new vogue: a reflection on money laundering prevention","authors":"Hsiao‐Ming Wang, Ming-Li Hsieh","doi":"10.1057/s41284-023-00366-5","DOIUrl":"https://doi.org/10.1057/s41284-023-00366-5","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-22"},"PeriodicalIF":1.2,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49219603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-01-24DOI: 10.1057/s41284-022-00363-0
Muhammad Kashan Surahio, H. Mahesar, M. N. Baloch, A. Kovalev, M. Soomro
{"title":"Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project","authors":"Muhammad Kashan Surahio, H. Mahesar, M. N. Baloch, A. Kovalev, M. Soomro","doi":"10.1057/s41284-022-00363-0","DOIUrl":"https://doi.org/10.1057/s41284-022-00363-0","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-31"},"PeriodicalIF":1.2,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41854826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-01-09DOI: 10.1057/s41284-022-00365-y
Nohad ‘Ali, D. Rosenberg
{"title":"Understanding the consideration of strategies for coping with locality violence in Arab society in Israel","authors":"Nohad ‘Ali, D. Rosenberg","doi":"10.1057/s41284-022-00365-y","DOIUrl":"https://doi.org/10.1057/s41284-022-00365-y","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-24"},"PeriodicalIF":1.2,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49367392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-12-06DOI: 10.1057/s41284-022-00364-z
M. Lakomy
{"title":"The virtual \"Caliphate\" strikes back? Mapping the Islamic State's information ecosystem on the surface web","authors":"M. Lakomy","doi":"10.1057/s41284-022-00364-z","DOIUrl":"https://doi.org/10.1057/s41284-022-00364-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42673739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-11-27DOI: 10.1057/s41284-022-00361-2
K. Anele
{"title":"Theoretical analysis of the linkages between the IOCs’ oil exploration activities and piracy in Nigeria","authors":"K. Anele","doi":"10.1057/s41284-022-00361-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00361-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48051380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-11-17DOI: 10.1057/s41284-022-00362-1
Bauyrzhan N Khamitov, Yerzhan S Kemali, Sattar M Rakhmetov, Assel M Alibekova
{"title":"International legal approaches in combatting raidership.","authors":"Bauyrzhan N Khamitov, Yerzhan S Kemali, Sattar M Rakhmetov, Assel M Alibekova","doi":"10.1057/s41284-022-00362-1","DOIUrl":"10.1057/s41284-022-00362-1","url":null,"abstract":"<p><p>The presented article is relevant, as the dynamics of international legislative changes indicate the transformation of the legal regulation of approaches in combatting raidership. The purpose of this study was to perform an independent investigation of issues arising upon considering international legislative regulation of effective approaches in the field of combatting raidership. The methodological framework of this study comprised modern general and special methods of scientific cognition, namely logical, dialectical, historical, formal legal, comparative legal, system analysis, analogy, induction, deduction, synthesis, abstraction, generalisation, modelling, and other methods. Based on the results of the investigation, the study covered the main issues of the state of modern international legal regulation of methods for combatting raidership; analysed the leading mechanisms for improving international legal approaches regarding combatting raidership, and suggested new algorithms for further improving the practice of corresponding law enforcement.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-21"},"PeriodicalIF":0.2,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9672541/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41978265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-11-14DOI: 10.1057/s41284-022-00359-w
Amanda Bodker, Phil Connolly, Oliver Sing, Benjamin Hutchins, Michael Townsley, Jacqueline Drew
{"title":"Card-not-present fraud: using crime scripts to inform crime prevention initiatives.","authors":"Amanda Bodker, Phil Connolly, Oliver Sing, Benjamin Hutchins, Michael Townsley, Jacqueline Drew","doi":"10.1057/s41284-022-00359-w","DOIUrl":"10.1057/s41284-022-00359-w","url":null,"abstract":"<p><p>Growth in the online retail sector and improvements in card-present authorisation measures have led to substantial increases in card-not-present (CNP) fraud, particularly in the online retail sector. This article uses crime script analysis to understand the commission process of CNP fraud in online retail settings. Drawing upon previous crime script articles and industry reports we outline the steps involved in the three stages of CNP fraud: preparation; doing it; and getting away. From this script, points of disruption are identified and we discuss prevention measures that stakeholders such as businesses and financial institutions could implement to reduce bad actors opportunities for CNP fraud.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-19"},"PeriodicalIF":0.2,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9664753/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42718492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-11-03DOI: 10.1057/s41284-022-00360-3
Chin Kuo, Seng-Su Tsang
{"title":"Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan.","authors":"Chin Kuo, Seng-Su Tsang","doi":"10.1057/s41284-022-00360-3","DOIUrl":"10.1057/s41284-022-00360-3","url":null,"abstract":"<p><p>All enterprises, regardless of industry, are exposed to fraud risk. In the retail industry, the perpetrators of fraud manipulate the sales price of products instead of the quantity sold to avoid inventory discrepancies. Fraud examiners attempt to identify anomalous transactions using data analysis. This study analyzes the causes of fraudulent behavior, conceptualized based on the aspect of rational choice, and proposes an anomalous transaction detection model using variables identified as indicating fraud. A two-phase experiment analyzing a real-world data set from a retailer in Taiwan was designed to evaluate the performance of fraud variables. The findings demonstrate that these variables could slightly improve the results of the analysis and demonstrate that machine learning is applicable to fraud detection. In addition, this study contributes to rational choice theory to validate the applicability in fraud detection. Fraud examiners in the retail industry could reduce fraud losses by adopting the proposed approach, implemented using Weka software, to identify anomalies.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-20"},"PeriodicalIF":0.2,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9630802/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43191080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-11-02DOI: 10.1057/s41284-022-00358-x
C. Kanu, M. U. Nnam, Joy N. Ugwu, N. Achilike, L. Adama, N. Uwajumogu, P. Obidike
{"title":"Frauds and forgeries in banking industry in Africa: a content analyses of Nigeria Deposit Insurance Corporation annual crime report","authors":"C. Kanu, M. U. Nnam, Joy N. Ugwu, N. Achilike, L. Adama, N. Uwajumogu, P. Obidike","doi":"10.1057/s41284-022-00358-x","DOIUrl":"https://doi.org/10.1057/s41284-022-00358-x","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44337750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}