Security Journal最新文献

筛选
英文 中文
Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project 探讨中国企业在中巴经济走廊项目下的实际风险和安全机制
IF 1.2
Security Journal Pub Date : 2023-01-24 DOI: 10.1057/s41284-022-00363-0
Muhammad Kashan Surahio, H. Mahesar, M. N. Baloch, A. Kovalev, M. Soomro
{"title":"Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project","authors":"Muhammad Kashan Surahio, H. Mahesar, M. N. Baloch, A. Kovalev, M. Soomro","doi":"10.1057/s41284-022-00363-0","DOIUrl":"https://doi.org/10.1057/s41284-022-00363-0","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41854826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the consideration of strategies for coping with locality violence in Arab society in Israel 了解对以色列阿拉伯社会应对地方暴力战略的考虑
IF 1.2
Security Journal Pub Date : 2023-01-09 DOI: 10.1057/s41284-022-00365-y
Nohad ‘Ali, D. Rosenberg
{"title":"Understanding the consideration of strategies for coping with locality violence in Arab society in Israel","authors":"Nohad ‘Ali, D. Rosenberg","doi":"10.1057/s41284-022-00365-y","DOIUrl":"https://doi.org/10.1057/s41284-022-00365-y","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49367392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The virtual "Caliphate" strikes back? Mapping the Islamic State's information ecosystem on the surface web 虚拟的“哈里发国”会反击吗?在地面网络上绘制伊斯兰国的信息生态系统
IF 1.2
Security Journal Pub Date : 2022-12-06 DOI: 10.1057/s41284-022-00364-z
M. Lakomy
{"title":"The virtual \"Caliphate\" strikes back? Mapping the Islamic State's information ecosystem on the surface web","authors":"M. Lakomy","doi":"10.1057/s41284-022-00364-z","DOIUrl":"https://doi.org/10.1057/s41284-022-00364-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42673739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Theoretical analysis of the linkages between the IOCs’ oil exploration activities and piracy in Nigeria 国际石油公司石油勘探活动与尼日利亚海盗关系的理论分析
IF 1.2
Security Journal Pub Date : 2022-11-27 DOI: 10.1057/s41284-022-00361-2
K. Anele
{"title":"Theoretical analysis of the linkages between the IOCs’ oil exploration activities and piracy in Nigeria","authors":"K. Anele","doi":"10.1057/s41284-022-00361-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00361-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48051380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
International legal approaches in combatting raidership 打击袭击的国际法律途径
IF 1.2
Security Journal Pub Date : 2022-11-17 DOI: 10.1057/s41284-022-00362-1
B. Khamitov, Y.S. Kemali, S. M. Rakhmetov, A. Alibekova
{"title":"International legal approaches in combatting raidership","authors":"B. Khamitov, Y.S. Kemali, S. M. Rakhmetov, A. Alibekova","doi":"10.1057/s41284-022-00362-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00362-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41978265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Card-not-present fraud: using crime scripts to inform crime prevention initiatives 无卡欺诈:利用犯罪脚本为预防犯罪举措提供信息
IF 1.2
Security Journal Pub Date : 2022-11-14 DOI: 10.1057/s41284-022-00359-w
Amanda Bodker, Phil Connolly, Oliver Sing, Benjamin Hutchins, M. Townsley, Jacqueline M. Drew
{"title":"Card-not-present fraud: using crime scripts to inform crime prevention initiatives","authors":"Amanda Bodker, Phil Connolly, Oliver Sing, Benjamin Hutchins, M. Townsley, Jacqueline M. Drew","doi":"10.1057/s41284-022-00359-w","DOIUrl":"https://doi.org/10.1057/s41284-022-00359-w","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42718492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan 理性选择理论对价格操纵欺诈的检测——台湾零售业的证据
IF 1.2
Security Journal Pub Date : 2022-11-03 DOI: 10.1057/s41284-022-00360-3
C. Kuo, Seng-Su Tsang
{"title":"Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan","authors":"C. Kuo, Seng-Su Tsang","doi":"10.1057/s41284-022-00360-3","DOIUrl":"https://doi.org/10.1057/s41284-022-00360-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43191080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frauds and forgeries in banking industry in Africa: a content analyses of Nigeria Deposit Insurance Corporation annual crime report 非洲银行业的欺诈和伪造行为——尼日利亚存款保险公司年度犯罪报告的内容分析
IF 1.2
Security Journal Pub Date : 2022-11-02 DOI: 10.1057/s41284-022-00358-x
C. Kanu, M. U. Nnam, Joy N. Ugwu, N. Achilike, L. Adama, N. Uwajumogu, P. Obidike
{"title":"Frauds and forgeries in banking industry in Africa: a content analyses of Nigeria Deposit Insurance Corporation annual crime report","authors":"C. Kanu, M. U. Nnam, Joy N. Ugwu, N. Achilike, L. Adama, N. Uwajumogu, P. Obidike","doi":"10.1057/s41284-022-00358-x","DOIUrl":"https://doi.org/10.1057/s41284-022-00358-x","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44337750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transit crime and sexual violence in cities: international evidence and prevention 城市过境犯罪和性暴力:国际证据和预防
IF 1.2
Security Journal Pub Date : 2022-10-14 DOI: 10.1057/s41284-022-00345-2
L. Levin
{"title":"Transit crime and sexual violence in cities: international evidence and prevention","authors":"L. Levin","doi":"10.1057/s41284-022-00345-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00345-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41833996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The money laundering and terrorist financing risks of new and disruptive technologies: a futures-oriented scoping review 新技术和颠覆性技术的洗钱和恐怖主义融资风险:面向未来的范围审查
IF 1.2
Security Journal Pub Date : 2022-09-19 DOI: 10.1057/s41284-022-00356-z
Eray Arda Akartuna, Shane D. Johnson, Amy Thornton
{"title":"The money laundering and terrorist financing risks of new and disruptive technologies: a futures-oriented scoping review","authors":"Eray Arda Akartuna, Shane D. Johnson, Amy Thornton","doi":"10.1057/s41284-022-00356-z","DOIUrl":"https://doi.org/10.1057/s41284-022-00356-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42707554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信