Security Journal最新文献

筛选
英文 中文
Carrying a handgun in public vs. taking a handgun to school among youth: an exploration of the predicting power of risk factors related to delinquency, aggression, and victimization 青少年在公共场合携带手枪与携带手枪上学:与犯罪、攻击和受害相关的风险因素预测力的探索
IF 1.2
Security Journal Pub Date : 2023-02-09 DOI: 10.1057/s41284-023-00368-3
Hasan Buker, Ihsan E. Buker, Bailey Bullion
{"title":"Carrying a handgun in public vs. taking a handgun to school among youth: an exploration of the predicting power of risk factors related to delinquency, aggression, and victimization","authors":"Hasan Buker, Ihsan E. Buker, Bailey Bullion","doi":"10.1057/s41284-023-00368-3","DOIUrl":"https://doi.org/10.1057/s41284-023-00368-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-25"},"PeriodicalIF":1.2,"publicationDate":"2023-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42597101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptocurrency is new vogue: a reflection on money laundering prevention 加密货币是新时尚:对洗钱预防的思考
IF 1.2
Security Journal Pub Date : 2023-01-30 DOI: 10.1057/s41284-023-00366-5
Hsiao‐Ming Wang, Ming-Li Hsieh
{"title":"Cryptocurrency is new vogue: a reflection on money laundering prevention","authors":"Hsiao‐Ming Wang, Ming-Li Hsieh","doi":"10.1057/s41284-023-00366-5","DOIUrl":"https://doi.org/10.1057/s41284-023-00366-5","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-22"},"PeriodicalIF":1.2,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49219603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project 探讨中国企业在中巴经济走廊项目下的实际风险和安全机制
IF 1.2
Security Journal Pub Date : 2023-01-24 DOI: 10.1057/s41284-022-00363-0
Muhammad Kashan Surahio, H. Mahesar, M. N. Baloch, A. Kovalev, M. Soomro
{"title":"Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project","authors":"Muhammad Kashan Surahio, H. Mahesar, M. N. Baloch, A. Kovalev, M. Soomro","doi":"10.1057/s41284-022-00363-0","DOIUrl":"https://doi.org/10.1057/s41284-022-00363-0","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-31"},"PeriodicalIF":1.2,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41854826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the consideration of strategies for coping with locality violence in Arab society in Israel 了解对以色列阿拉伯社会应对地方暴力战略的考虑
IF 1.2
Security Journal Pub Date : 2023-01-09 DOI: 10.1057/s41284-022-00365-y
Nohad ‘Ali, D. Rosenberg
{"title":"Understanding the consideration of strategies for coping with locality violence in Arab society in Israel","authors":"Nohad ‘Ali, D. Rosenberg","doi":"10.1057/s41284-022-00365-y","DOIUrl":"https://doi.org/10.1057/s41284-022-00365-y","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-24"},"PeriodicalIF":1.2,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49367392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The virtual "Caliphate" strikes back? Mapping the Islamic State's information ecosystem on the surface web 虚拟的“哈里发国”会反击吗?在地面网络上绘制伊斯兰国的信息生态系统
IF 1.2
Security Journal Pub Date : 2022-12-06 DOI: 10.1057/s41284-022-00364-z
M. Lakomy
{"title":"The virtual \"Caliphate\" strikes back? Mapping the Islamic State's information ecosystem on the surface web","authors":"M. Lakomy","doi":"10.1057/s41284-022-00364-z","DOIUrl":"https://doi.org/10.1057/s41284-022-00364-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42673739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Theoretical analysis of the linkages between the IOCs’ oil exploration activities and piracy in Nigeria 国际石油公司石油勘探活动与尼日利亚海盗关系的理论分析
IF 1.2
Security Journal Pub Date : 2022-11-27 DOI: 10.1057/s41284-022-00361-2
K. Anele
{"title":"Theoretical analysis of the linkages between the IOCs’ oil exploration activities and piracy in Nigeria","authors":"K. Anele","doi":"10.1057/s41284-022-00361-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00361-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48051380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
International legal approaches in combatting raidership. 打击袭击的国际法律途径
IF 0.2
Security Journal Pub Date : 2022-11-17 DOI: 10.1057/s41284-022-00362-1
Bauyrzhan N Khamitov, Yerzhan S Kemali, Sattar M Rakhmetov, Assel M Alibekova
{"title":"International legal approaches in combatting raidership.","authors":"Bauyrzhan N Khamitov, Yerzhan S Kemali, Sattar M Rakhmetov, Assel M Alibekova","doi":"10.1057/s41284-022-00362-1","DOIUrl":"10.1057/s41284-022-00362-1","url":null,"abstract":"<p><p>The presented article is relevant, as the dynamics of international legislative changes indicate the transformation of the legal regulation of approaches in combatting raidership. The purpose of this study was to perform an independent investigation of issues arising upon considering international legislative regulation of effective approaches in the field of combatting raidership. The methodological framework of this study comprised modern general and special methods of scientific cognition, namely logical, dialectical, historical, formal legal, comparative legal, system analysis, analogy, induction, deduction, synthesis, abstraction, generalisation, modelling, and other methods. Based on the results of the investigation, the study covered the main issues of the state of modern international legal regulation of methods for combatting raidership; analysed the leading mechanisms for improving international legal approaches regarding combatting raidership, and suggested new algorithms for further improving the practice of corresponding law enforcement.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-21"},"PeriodicalIF":0.2,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9672541/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41978265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Card-not-present fraud: using crime scripts to inform crime prevention initiatives. 无卡欺诈:利用犯罪脚本为预防犯罪举措提供信息
IF 0.2
Security Journal Pub Date : 2022-11-14 DOI: 10.1057/s41284-022-00359-w
Amanda Bodker, Phil Connolly, Oliver Sing, Benjamin Hutchins, Michael Townsley, Jacqueline Drew
{"title":"Card-not-present fraud: using crime scripts to inform crime prevention initiatives.","authors":"Amanda Bodker, Phil Connolly, Oliver Sing, Benjamin Hutchins, Michael Townsley, Jacqueline Drew","doi":"10.1057/s41284-022-00359-w","DOIUrl":"10.1057/s41284-022-00359-w","url":null,"abstract":"<p><p>Growth in the online retail sector and improvements in card-present authorisation measures have led to substantial increases in card-not-present (CNP) fraud, particularly in the online retail sector. This article uses crime script analysis to understand the commission process of CNP fraud in online retail settings. Drawing upon previous crime script articles and industry reports we outline the steps involved in the three stages of CNP fraud: preparation; doing it; and getting away. From this script, points of disruption are identified and we discuss prevention measures that stakeholders such as businesses and financial institutions could implement to reduce bad actors opportunities for CNP fraud.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-19"},"PeriodicalIF":0.2,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9664753/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42718492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan. 理性选择理论对价格操纵欺诈的检测——台湾零售业的证据
IF 0.2
Security Journal Pub Date : 2022-11-03 DOI: 10.1057/s41284-022-00360-3
Chin Kuo, Seng-Su Tsang
{"title":"Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan.","authors":"Chin Kuo, Seng-Su Tsang","doi":"10.1057/s41284-022-00360-3","DOIUrl":"10.1057/s41284-022-00360-3","url":null,"abstract":"<p><p>All enterprises, regardless of industry, are exposed to fraud risk. In the retail industry, the perpetrators of fraud manipulate the sales price of products instead of the quantity sold to avoid inventory discrepancies. Fraud examiners attempt to identify anomalous transactions using data analysis. This study analyzes the causes of fraudulent behavior, conceptualized based on the aspect of rational choice, and proposes an anomalous transaction detection model using variables identified as indicating fraud. A two-phase experiment analyzing a real-world data set from a retailer in Taiwan was designed to evaluate the performance of fraud variables. The findings demonstrate that these variables could slightly improve the results of the analysis and demonstrate that machine learning is applicable to fraud detection. In addition, this study contributes to rational choice theory to validate the applicability in fraud detection. Fraud examiners in the retail industry could reduce fraud losses by adopting the proposed approach, implemented using Weka software, to identify anomalies.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-20"},"PeriodicalIF":0.2,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9630802/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43191080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frauds and forgeries in banking industry in Africa: a content analyses of Nigeria Deposit Insurance Corporation annual crime report 非洲银行业的欺诈和伪造行为——尼日利亚存款保险公司年度犯罪报告的内容分析
IF 1.2
Security Journal Pub Date : 2022-11-02 DOI: 10.1057/s41284-022-00358-x
C. Kanu, M. U. Nnam, Joy N. Ugwu, N. Achilike, L. Adama, N. Uwajumogu, P. Obidike
{"title":"Frauds and forgeries in banking industry in Africa: a content analyses of Nigeria Deposit Insurance Corporation annual crime report","authors":"C. Kanu, M. U. Nnam, Joy N. Ugwu, N. Achilike, L. Adama, N. Uwajumogu, P. Obidike","doi":"10.1057/s41284-022-00358-x","DOIUrl":"https://doi.org/10.1057/s41284-022-00358-x","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44337750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信