Security JournalPub Date : 2023-01-24DOI: 10.1057/s41284-022-00363-0
Muhammad Kashan Surahio, H. Mahesar, M. N. Baloch, A. Kovalev, M. Soomro
{"title":"Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project","authors":"Muhammad Kashan Surahio, H. Mahesar, M. N. Baloch, A. Kovalev, M. Soomro","doi":"10.1057/s41284-022-00363-0","DOIUrl":"https://doi.org/10.1057/s41284-022-00363-0","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-31"},"PeriodicalIF":1.2,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41854826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2023-01-09DOI: 10.1057/s41284-022-00365-y
Nohad ‘Ali, D. Rosenberg
{"title":"Understanding the consideration of strategies for coping with locality violence in Arab society in Israel","authors":"Nohad ‘Ali, D. Rosenberg","doi":"10.1057/s41284-022-00365-y","DOIUrl":"https://doi.org/10.1057/s41284-022-00365-y","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-24"},"PeriodicalIF":1.2,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49367392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-12-06DOI: 10.1057/s41284-022-00364-z
M. Lakomy
{"title":"The virtual \"Caliphate\" strikes back? Mapping the Islamic State's information ecosystem on the surface web","authors":"M. Lakomy","doi":"10.1057/s41284-022-00364-z","DOIUrl":"https://doi.org/10.1057/s41284-022-00364-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42673739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-11-27DOI: 10.1057/s41284-022-00361-2
K. Anele
{"title":"Theoretical analysis of the linkages between the IOCs’ oil exploration activities and piracy in Nigeria","authors":"K. Anele","doi":"10.1057/s41284-022-00361-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00361-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48051380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-11-17DOI: 10.1057/s41284-022-00362-1
B. Khamitov, Y.S. Kemali, S. M. Rakhmetov, A. Alibekova
{"title":"International legal approaches in combatting raidership","authors":"B. Khamitov, Y.S. Kemali, S. M. Rakhmetov, A. Alibekova","doi":"10.1057/s41284-022-00362-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00362-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1 - 21"},"PeriodicalIF":1.2,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41978265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-11-14DOI: 10.1057/s41284-022-00359-w
Amanda Bodker, Phil Connolly, Oliver Sing, Benjamin Hutchins, M. Townsley, Jacqueline M. Drew
{"title":"Card-not-present fraud: using crime scripts to inform crime prevention initiatives","authors":"Amanda Bodker, Phil Connolly, Oliver Sing, Benjamin Hutchins, M. Townsley, Jacqueline M. Drew","doi":"10.1057/s41284-022-00359-w","DOIUrl":"https://doi.org/10.1057/s41284-022-00359-w","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1 - 19"},"PeriodicalIF":1.2,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42718492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-11-03DOI: 10.1057/s41284-022-00360-3
C. Kuo, Seng-Su Tsang
{"title":"Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan","authors":"C. Kuo, Seng-Su Tsang","doi":"10.1057/s41284-022-00360-3","DOIUrl":"https://doi.org/10.1057/s41284-022-00360-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1 - 20"},"PeriodicalIF":1.2,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43191080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-11-02DOI: 10.1057/s41284-022-00358-x
C. Kanu, M. U. Nnam, Joy N. Ugwu, N. Achilike, L. Adama, N. Uwajumogu, P. Obidike
{"title":"Frauds and forgeries in banking industry in Africa: a content analyses of Nigeria Deposit Insurance Corporation annual crime report","authors":"C. Kanu, M. U. Nnam, Joy N. Ugwu, N. Achilike, L. Adama, N. Uwajumogu, P. Obidike","doi":"10.1057/s41284-022-00358-x","DOIUrl":"https://doi.org/10.1057/s41284-022-00358-x","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":""},"PeriodicalIF":1.2,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44337750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-10-14DOI: 10.1057/s41284-022-00345-2
L. Levin
{"title":"Transit crime and sexual violence in cities: international evidence and prevention","authors":"L. Levin","doi":"10.1057/s41284-022-00345-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00345-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"589-591"},"PeriodicalIF":1.2,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41833996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-09-19DOI: 10.1057/s41284-022-00356-z
Eray Arda Akartuna, Shane D. Johnson, Amy Thornton
{"title":"The money laundering and terrorist financing risks of new and disruptive technologies: a futures-oriented scoping review","authors":"Eray Arda Akartuna, Shane D. Johnson, Amy Thornton","doi":"10.1057/s41284-022-00356-z","DOIUrl":"https://doi.org/10.1057/s41284-022-00356-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1 - 36"},"PeriodicalIF":1.2,"publicationDate":"2022-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42707554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}