Security Journal最新文献

筛选
英文 中文
Transit crime and sexual violence in cities: international evidence and prevention 城市过境犯罪和性暴力:国际证据和预防
IF 1.2
Security Journal Pub Date : 2022-10-14 DOI: 10.1057/s41284-022-00345-2
L. Levin
{"title":"Transit crime and sexual violence in cities: international evidence and prevention","authors":"L. Levin","doi":"10.1057/s41284-022-00345-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00345-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"589-591"},"PeriodicalIF":1.2,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41833996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The money laundering and terrorist financing risks of new and disruptive technologies: a futures-oriented scoping review. 新技术和颠覆性技术的洗钱和恐怖主义融资风险:面向未来的范围审查
IF 0.2
Security Journal Pub Date : 2022-09-19 DOI: 10.1057/s41284-022-00356-z
Eray Arda Akartuna, Shane D Johnson, Amy E Thornton
{"title":"The money laundering and terrorist financing risks of new and disruptive technologies: a futures-oriented scoping review.","authors":"Eray Arda Akartuna, Shane D Johnson, Amy E Thornton","doi":"10.1057/s41284-022-00356-z","DOIUrl":"10.1057/s41284-022-00356-z","url":null,"abstract":"<p><p>New and disruptive technologies, including cryptocurrencies and new payment methods, are revolutionising the way people engage with finance. Although they provide significant benefits to consumers, they are also inadvertently creating new money laundering and terrorist financing risks. This paper examines the risks that are, or are predicted to be, prevalent in three technology sectors-distributed ledger technologies (including cryptocurrencies), new payment methods and financial technologies (FinTech), through a systematic scoping review process. Specifically, the paper identifies enablers of both crimes, the precise criminal methods they might facilitate, at-risk stakeholders (of exploitation and/or complicity) and risk characteristics. The study involves systematic scoping reviews of the academic and futures literatures as well as a consultation exercise with experts to assess the likely veracity of the findings. In addition to identifying an array of specific risks, we identify six underlying trends that facilitate them. We discuss these, their policy implications, future directions for research and their benefit for conducting risk assessments to assess forthcoming technological developments.</p><p><strong>Supplementary information: </strong>The online version contains supplementary material available at 10.1057/s41284-022-00356-z.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-36"},"PeriodicalIF":0.2,"publicationDate":"2022-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9483896/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42707554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An evaluation of an Australia-based home Burglary prevention program. 对澳大利亚家庭入室盗窃预防计划的评估
IF 0.2
Security Journal Pub Date : 2022-09-16 DOI: 10.1057/s41284-022-00355-0
Matthew Manning, Gabriel T W Wong, Melody Ip
{"title":"An evaluation of an Australia-based home Burglary prevention program.","authors":"Matthew Manning, Gabriel T W Wong, Melody Ip","doi":"10.1057/s41284-022-00355-0","DOIUrl":"10.1057/s41284-022-00355-0","url":null,"abstract":"<p><p>In response to an increase in the number of burglaries in the Australian Capital Territory (ACT) from 2014 to 2020, the ACT government funded the development of a home-based Burglary prevention program. The aim of the program is to improve household security particularly for those properties at heightened risk of victimisation and re-victimisation. The program consisted of security assessments of properties and, based on assessments, installation of security devices for eligible program clients. Results from the evaluation reveal that the program produces positive benefits overall in terms of enhanced security, reduced risk of re-victimisation, improvement in perceived sense of personal security, and positive economic return on investment.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-22"},"PeriodicalIF":0.2,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9483344/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45819944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries. 印度尼西亚网络犯罪法律与新冠肺炎的综合研究:发达国家和发展中国家的经验教训
IF 0.2
Security Journal Pub Date : 2022-09-11 DOI: 10.1057/s41284-022-00357-y
Agus Nugroho, An An Chandrawulan
{"title":"Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries.","authors":"Agus Nugroho, An An Chandrawulan","doi":"10.1057/s41284-022-00357-y","DOIUrl":"10.1057/s41284-022-00357-y","url":null,"abstract":"<p><p>The COVID-19 pandemic poses an unprecedented global challenge to the whole society. Previously, most of the physical activities were not conducted online and were not exposed to cybercrime. Thus, it necessitates paying attention to this emerging phenomenon and devising strategies for a safe online environment for all stakeholders. The current study presents a historical overview of cybercrime and the cybersecurity system and highlights cybercrimes' legal importance globally and cybercrime regulations during the Covid-19 times, specifically in the Indonesian context. Using a normative juridical approach, this study collected secondary data from various books, journals, regulatory guidelines, institutional reports, research, and the Internet. Additionally, a systematic literature search methodology was used to collect relevant secondary data from the most popular database, i.e., Scopus. Results revealed that although many nations are actively working to control cybercrimes, the issue persists, and many new cyber threats, i.e., scams and phishing, emerged during the Covid-19 pandemic. In such situations, along with the existence of a promising cybersecurity system, cybercitizens should always consider hygienic cyber tips to avoid being victims of cyber coronavirus crimes. Finally, after presenting an overview of the current state of cybercrime legislation on COVID-19, key policy recommendations for developed and developing countries are given, along with future research directions.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":"1-20"},"PeriodicalIF":0.2,"publicationDate":"2022-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9464486/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48704405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Issues with the application of CPTED in urban development: a case of City X, Malaysia CPTED在城市发展中的应用问题——以马来西亚X市为例
IF 1.2
Security Journal Pub Date : 2022-09-04 DOI: 10.1057/s41284-022-00353-2
S. Rajadurai, S. H. A. B. Ah, R. Zainol, Z. Azman, Mitra Manisha Rajadurai
{"title":"Issues with the application of CPTED in urban development: a case of City X, Malaysia","authors":"S. Rajadurai, S. H. A. B. Ah, R. Zainol, Z. Azman, Mitra Manisha Rajadurai","doi":"10.1057/s41284-022-00353-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00353-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"558-588"},"PeriodicalIF":1.2,"publicationDate":"2022-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47632294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria 更正:尼日利亚企业组织的商业电子邮件泄露骗局、网络受害和经济可持续性
IF 1.2
Security Journal Pub Date : 2022-08-27 DOI: 10.1057/s41284-022-00354-1
J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang
{"title":"Correction to: Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria","authors":"J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang","doi":"10.1057/s41284-022-00354-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00354-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"592"},"PeriodicalIF":1.2,"publicationDate":"2022-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45637735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison 在组织内嵌入资讯保安管理:透过组织内联络提高参与及参与
IF 1.2
Security Journal Pub Date : 2022-08-07 DOI: 10.1057/s41284-022-00352-3
Moneer Alshaikh, Shanton Chang, Atif Ahmad, S. Maynard, A. Alammary
{"title":"Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison","authors":"Moneer Alshaikh, Shanton Chang, Atif Ahmad, S. Maynard, A. Alammary","doi":"10.1057/s41284-022-00352-3","DOIUrl":"https://doi.org/10.1057/s41284-022-00352-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"530 - 557"},"PeriodicalIF":1.2,"publicationDate":"2022-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46813685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Old problem, new manifestation: the emergence of cultism in rural secondary schools in Anambra state, Nigeria 老问题,新表现:尼日利亚阿南布拉州农村中学邪教现象的出现
IF 1.2
Security Journal Pub Date : 2022-08-03 DOI: 10.1057/s41284-022-00351-4
I. Alumona, K. Onwuanabile, V. Iwuoha, Ernest Toochi Aniche
{"title":"Old problem, new manifestation: the emergence of cultism in rural secondary schools in Anambra state, Nigeria","authors":"I. Alumona, K. Onwuanabile, V. Iwuoha, Ernest Toochi Aniche","doi":"10.1057/s41284-022-00351-4","DOIUrl":"https://doi.org/10.1057/s41284-022-00351-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"498 - 529"},"PeriodicalIF":1.2,"publicationDate":"2022-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"58556714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Susceptibility for criminal facilitation in social housing: a psychological perspective 社会住房中犯罪便利化的易感性:心理学视角
IF 1.2
Security Journal Pub Date : 2022-08-01 DOI: 10.1057/s41284-022-00348-z
J. Stam, I. Eekhout, Marit Koenen, V. Kallen
{"title":"Susceptibility for criminal facilitation in social housing: a psychological perspective","authors":"J. Stam, I. Eekhout, Marit Koenen, V. Kallen","doi":"10.1057/s41284-022-00348-z","DOIUrl":"https://doi.org/10.1057/s41284-022-00348-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"443 - 458"},"PeriodicalIF":1.2,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42680006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tabletop scenario exercises as a training tool for improving response to workplace violence 桌面情景练习作为提高对工作场所暴力反应的培训工具
IF 1.2
Security Journal Pub Date : 2022-07-25 DOI: 10.1057/s41284-022-00346-1
Carri Casteel, C. Peek-Asa, Robyn O. Espinosa, E. Rugala, M. Ramirez
{"title":"Tabletop scenario exercises as a training tool for improving response to workplace violence","authors":"Carri Casteel, C. Peek-Asa, Robyn O. Espinosa, E. Rugala, M. Ramirez","doi":"10.1057/s41284-022-00346-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00346-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"1-15"},"PeriodicalIF":1.2,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42874735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信