Security JournalPub Date : 2022-10-14DOI: 10.1057/s41284-022-00345-2
L. Levin
{"title":"Transit crime and sexual violence in cities: international evidence and prevention","authors":"L. Levin","doi":"10.1057/s41284-022-00345-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00345-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"589-591"},"PeriodicalIF":1.2,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41833996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-09-19DOI: 10.1057/s41284-022-00356-z
Eray Arda Akartuna, Shane D Johnson, Amy E Thornton
{"title":"The money laundering and terrorist financing risks of new and disruptive technologies: a futures-oriented scoping review.","authors":"Eray Arda Akartuna, Shane D Johnson, Amy E Thornton","doi":"10.1057/s41284-022-00356-z","DOIUrl":"10.1057/s41284-022-00356-z","url":null,"abstract":"<p><p>New and disruptive technologies, including cryptocurrencies and new payment methods, are revolutionising the way people engage with finance. Although they provide significant benefits to consumers, they are also inadvertently creating new money laundering and terrorist financing risks. This paper examines the risks that are, or are predicted to be, prevalent in three technology sectors-distributed ledger technologies (including cryptocurrencies), new payment methods and financial technologies (FinTech), through a systematic scoping review process. Specifically, the paper identifies enablers of both crimes, the precise criminal methods they might facilitate, at-risk stakeholders (of exploitation and/or complicity) and risk characteristics. The study involves systematic scoping reviews of the academic and futures literatures as well as a consultation exercise with experts to assess the likely veracity of the findings. In addition to identifying an array of specific risks, we identify six underlying trends that facilitate them. We discuss these, their policy implications, future directions for research and their benefit for conducting risk assessments to assess forthcoming technological developments.</p><p><strong>Supplementary information: </strong>The online version contains supplementary material available at 10.1057/s41284-022-00356-z.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-36"},"PeriodicalIF":0.2,"publicationDate":"2022-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9483896/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42707554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-09-16DOI: 10.1057/s41284-022-00355-0
Matthew Manning, Gabriel T W Wong, Melody Ip
{"title":"An evaluation of an Australia-based home Burglary prevention program.","authors":"Matthew Manning, Gabriel T W Wong, Melody Ip","doi":"10.1057/s41284-022-00355-0","DOIUrl":"10.1057/s41284-022-00355-0","url":null,"abstract":"<p><p>In response to an increase in the number of burglaries in the Australian Capital Territory (ACT) from 2014 to 2020, the ACT government funded the development of a home-based Burglary prevention program. The aim of the program is to improve household security particularly for those properties at heightened risk of victimisation and re-victimisation. The program consisted of security assessments of properties and, based on assessments, installation of security devices for eligible program clients. Results from the evaluation reveal that the program produces positive benefits overall in terms of enhanced security, reduced risk of re-victimisation, improvement in perceived sense of personal security, and positive economic return on investment.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"1 1","pages":"1-22"},"PeriodicalIF":0.2,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9483344/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45819944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-09-11DOI: 10.1057/s41284-022-00357-y
Agus Nugroho, An An Chandrawulan
{"title":"Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries.","authors":"Agus Nugroho, An An Chandrawulan","doi":"10.1057/s41284-022-00357-y","DOIUrl":"10.1057/s41284-022-00357-y","url":null,"abstract":"<p><p>The COVID-19 pandemic poses an unprecedented global challenge to the whole society. Previously, most of the physical activities were not conducted online and were not exposed to cybercrime. Thus, it necessitates paying attention to this emerging phenomenon and devising strategies for a safe online environment for all stakeholders. The current study presents a historical overview of cybercrime and the cybersecurity system and highlights cybercrimes' legal importance globally and cybercrime regulations during the Covid-19 times, specifically in the Indonesian context. Using a normative juridical approach, this study collected secondary data from various books, journals, regulatory guidelines, institutional reports, research, and the Internet. Additionally, a systematic literature search methodology was used to collect relevant secondary data from the most popular database, i.e., Scopus. Results revealed that although many nations are actively working to control cybercrimes, the issue persists, and many new cyber threats, i.e., scams and phishing, emerged during the Covid-19 pandemic. In such situations, along with the existence of a promising cybersecurity system, cybercitizens should always consider hygienic cyber tips to avoid being victims of cyber coronavirus crimes. Finally, after presenting an overview of the current state of cybercrime legislation on COVID-19, key policy recommendations for developed and developing countries are given, along with future research directions.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":" ","pages":"1-20"},"PeriodicalIF":0.2,"publicationDate":"2022-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9464486/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48704405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-09-04DOI: 10.1057/s41284-022-00353-2
S. Rajadurai, S. H. A. B. Ah, R. Zainol, Z. Azman, Mitra Manisha Rajadurai
{"title":"Issues with the application of CPTED in urban development: a case of City X, Malaysia","authors":"S. Rajadurai, S. H. A. B. Ah, R. Zainol, Z. Azman, Mitra Manisha Rajadurai","doi":"10.1057/s41284-022-00353-2","DOIUrl":"https://doi.org/10.1057/s41284-022-00353-2","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"558-588"},"PeriodicalIF":1.2,"publicationDate":"2022-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47632294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-08-27DOI: 10.1057/s41284-022-00354-1
J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang
{"title":"Correction to: Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria","authors":"J. T. Okpa, B. O. Ajah, Ogochukwu Favour Nzeakor, Emmanuel Eshiotse, T. A. Abang","doi":"10.1057/s41284-022-00354-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00354-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"592"},"PeriodicalIF":1.2,"publicationDate":"2022-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45637735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-08-07DOI: 10.1057/s41284-022-00352-3
Moneer Alshaikh, Shanton Chang, Atif Ahmad, S. Maynard, A. Alammary
{"title":"Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison","authors":"Moneer Alshaikh, Shanton Chang, Atif Ahmad, S. Maynard, A. Alammary","doi":"10.1057/s41284-022-00352-3","DOIUrl":"https://doi.org/10.1057/s41284-022-00352-3","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"530 - 557"},"PeriodicalIF":1.2,"publicationDate":"2022-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46813685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-08-03DOI: 10.1057/s41284-022-00351-4
I. Alumona, K. Onwuanabile, V. Iwuoha, Ernest Toochi Aniche
{"title":"Old problem, new manifestation: the emergence of cultism in rural secondary schools in Anambra state, Nigeria","authors":"I. Alumona, K. Onwuanabile, V. Iwuoha, Ernest Toochi Aniche","doi":"10.1057/s41284-022-00351-4","DOIUrl":"https://doi.org/10.1057/s41284-022-00351-4","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"498 - 529"},"PeriodicalIF":1.2,"publicationDate":"2022-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"58556714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-08-01DOI: 10.1057/s41284-022-00348-z
J. Stam, I. Eekhout, Marit Koenen, V. Kallen
{"title":"Susceptibility for criminal facilitation in social housing: a psychological perspective","authors":"J. Stam, I. Eekhout, Marit Koenen, V. Kallen","doi":"10.1057/s41284-022-00348-z","DOIUrl":"https://doi.org/10.1057/s41284-022-00348-z","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"443 - 458"},"PeriodicalIF":1.2,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42680006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security JournalPub Date : 2022-07-25DOI: 10.1057/s41284-022-00346-1
Carri Casteel, C. Peek-Asa, Robyn O. Espinosa, E. Rugala, M. Ramirez
{"title":"Tabletop scenario exercises as a training tool for improving response to workplace violence","authors":"Carri Casteel, C. Peek-Asa, Robyn O. Espinosa, E. Rugala, M. Ramirez","doi":"10.1057/s41284-022-00346-1","DOIUrl":"https://doi.org/10.1057/s41284-022-00346-1","url":null,"abstract":"","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"36 1","pages":"1-15"},"PeriodicalIF":1.2,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42874735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}