-
Post-amnesty peacebuilding and restiveness in the Niger Delta: what do grassroots narratives suggest? Security Journal (IF 0.838) Pub Date : 2021-04-13 Prince C. Agwu, Chikodiri Nwangwu, Uzoma O. Okoye
The Presidential Amnesty Programme in Nigeria is perceived as a mere contrivance designed to foster the exploitation of oil resources in the Niger Delta. This is because evidence indicates that a significant number of the registered ex-militants are yet to be reintegrated into the society, while others have relapsed into militancy or other criminal activities. Although studies have interrogated some
-
‘Beyond military might’: Boko Haram and the asymmetries of counter-insurgency in Nigeria Security Journal (IF 0.838) Pub Date : 2021-04-12 Al Chukwuma Okoli, Nsemba Edward Lenshie
Boko Haram insurgency has presented a peculiar theatre of unconventional warfare. The combat dynamics of the belligerents have oscillated between the asymmetries of hard and soft violence. While the insurgents have been able to sustain their violent campaign mainly through tactical opportunism based on irregular strategies, including suicide terrorism, the government forces have been locked in intractable
-
Ambient lighting, use of outdoor spaces and perceptions of public safety: evidence from a survey experiment Security Journal (IF 0.838) Pub Date : 2021-04-11 Jacob Kaplan, Aaron Chalfin
Observational evidence suggests that better ambient lighting leads people to feel safer when spending time outdoors in their community. We subject this finding to greater scrutiny and elaborate on the extent to which improvements in street lighting affect routine activities during nighttime hours. We report evidence from a survey experiment that examines individuals’ perceptions of safety under two
-
What is the role of private intelligence in the Slovak Republic? Legal and practical aspects of private detective services Security Journal (IF 0.838) Pub Date : 2021-04-04 Martin Boroš, Zuzana Zvaková, Viktor Šoltés, Andrej Veľas
The article focuses on legal and practical aspects of private detective services in the Slovak Republic (further Slovakia). The article is divided into two parts. The first part is theoretical and provides the reader with a description of the legal environment in Slovakia and explains its impact on private detective services. The section devoted to legal aspects deals with the legal environment codifying
-
Safety in numbers: security on campus and the importance of the corporatization of universities Security Journal (IF 0.838) Pub Date : 2021-03-25 Andrea Corradi, James Popham
When visiting universities during recruitment tours, many students and parents want to know if the student will be ‘safe’ while attending the institution. This paper uses a qualitative examination of security at a Canadian university to argue that the increase in security measures on campuses is driven by both the desire to provide physical security and the pressure from the increasing corporatization
-
Security as a key contributor to organisational resilience: a bibliometric analysis of enterprise security risk management Security Journal (IF 0.838) Pub Date : 2021-03-20 Jose Marquez-Tejon, Montserrat Jimenez-Partearroyo, Diana Benito-Osorio
Globalisation and hyperconnectivity affect organisational resilience with threats such as the recent COVID-19 pandemic or large-scale cyberattacks. To strengthen organisational resilience capabilities, a framework such as enterprise risk management (ERM) is necessary so as to enable holistic risk management. Specifically, in this paper, we analyse the role of security, which has great potential in
-
Research of security and safety culture within an organization. The case study within the Slovak Republic Security Journal Pub Date : 2021-03-10 Andrej Veľas, Martin Halaj, Ladislav Hofreiter, Katarína Kampová, Zuzana Zvaková, Richard Jankura
Security and safety culture is an increasingly important term in assessing the security and safety of organizations. It is an internal security and safety factor of an organization that can directly influence its overall security and safety. In many cases, however, organizations do not know, nor do they have a way of assessing the level of their security and safety culture. It is therefore necessary
-
Relations between police and private security officers: a case study of Serbia Security Journal Pub Date : 2021-03-09 Bojan Janković, Vladimir M. Cvetković, Saša Milojević, Zvonimir Ivanović
In the last few years, under the influence of various circumstances, the demand for the private security industry has increased in Serbia. The aim of this research is to examine the extent and quality of cooperation between members of the public and private security sector as the mutual perception of its members because their relations are important for establishing a safe environment for citizens
-
Routine activities theory and food fraud victimization Security Journal Pub Date : 2021-03-09 Byung Lee, Roy Fenoff, John Spink
Food fraud is a widespread problem that involves the act of defrauding consumers for economic gain. Food fraud incidents pose a considerable threat to the economic stability of agri-food industry as well as the health and welfare of consumers. With the increasing use of online grocery shopping, the Internet has facilitated deceptive and fraudulent practices by criminals. Using a sample of U.S. consumers
-
Working from home during COVID-19 crisis: a cyber security culture assessment survey Security Journal Pub Date : 2021-02-26 Anna Georgiadou, Spiros Mouzakitis, Dimitris Askounis
This paper aims to evaluate the cyber security culture readiness of organizations from different countries and business domains when teleworking became a necessity due to the COVID-19 crisis. We have designed a targeted questionnaire and conducted a web-based survey addressing employees while working from home during the COVID-19 spread over the globe. The questionnaire contained no more than 23 questions
-
Nudging as a crime prevention strategy: the use of nudges to improve cyclists’ locking behavior and reduce the opportunities for bicycle theft Security Journal Pub Date : 2021-02-25 Marlies Sas, Koen Ponnet, Genserik Reniers, Wim Hardyns
As policy makers are developing new alternative strategies to prevent bicycle theft, a nudging approach could provide useful insights in this field. In the current study, two different nudges were implemented at a selection of bicycle parking facilities in the neighborhood of a Belgian university campus. To measure the effectiveness of the nudges, a multi-method approach was used with a combination
-
Forty years of declining burglary in the United States: Explanation and evidence relating to the security hypothesis Security Journal Pub Date : 2021-02-20 Graham Farrell
Residential burglary in the United States has declined by over 80% across the last four decades, representing a major social phenomenon that remains largely unexplained. International research indicates a need for investigation of the security hypothesis. Here, 50 years of studies are examined chronologically. A consistent narrative emerges which indicates that household security, largely absent in
-
The use of CPTED-based techniques to prevent shoplifting: a survey in Istanbul Security Journal Pub Date : 2021-02-15 Mine Özaşçılar
Shoplifting is a growing problem for all stores. Following a 300% increase in the number shopping malls in the past decade, Turkey had 375 malls by 2016, with shoplifting becoming an important issue. This study investigates the use of CPTED-based approaches to prevent shoplifting in Istanbul and is the first such study in Turkey. Data were collected from 389 store managers and shopping mall managers
-
The role of subjective and objective indicators of neighbourhood safety on children’s physical activity level Security Journal Pub Date : 2021-01-29 Zeinab Aliyas
The current study aimed to investigate the association of neighbourhood safety in three levels with children’s physical activity. These levels include parental perception and children’s perception as subjective measurements and reported rates of crime and traffic as objective measurements. 1421 questionnaires were distributed in primary schools among eligible children and their parents in Bandar Abbas
-
An exploratory study of failed mass shootings in America Security Journal Pub Date : 2021-01-29 Jason R. Silva, Emily Ann Greene-Colozzi
The current study examines failed mass shootings in the United States between 2003 and 2018. This exploratory research provides a summary of failed mass shooting perpetrator and incident characteristics, drawing from crime script analysis to examine the preparation, attack, and conclusion stages, as well as points of failure. Findings indicate suicidal ideation, attack realities, and weapon preparedness
-
Television and conflict reporting: framing of ethno-religious conflict in Southern Kaduna by Nigerian Television Authority and Channels television Security Journal Pub Date : 2020-10-08 Chika Euphemia Asogwa, Somtochukwu Victor Okeke, Gregory Ezeah, Verlumun Celestine Gever
Despite the lingering ethno-religious conflict in Southern Kaduna, studies regarding how the media frame the conflict are still at the developing stage. In particular, scholars have not examined how both private and public television stations frame the conflict. The current study attempted to fill this gap by examining how the Nigerian Television Authority (NTA) and Channels TV frame the conflict.
-
The differential effects of identity theft victimization: how demographics predict suffering out-of-pocket losses Security Journal Pub Date : 2020-09-08 Dylan Reynolds
Research consistently finds that individuals with higher incomes have increased rates of identity theft victimization. Although the majority of these victims are able to recuperate losses by contacting various institutions, including credit card companies and banks, many victims still suffer out-of-pocket financial losses. Using logistic regression analyses, the effect of demographic predictors on
-
Security guards as victims of violence: using organisational support theory to understand how support for victims could have positive implications for the security industry Security Journal Pub Date : 2020-08-29 Benjamin Koeppen, Matt Hopkins
Although it has been acknowledged that security guards are at high risk of becoming victims of violence, little previous research has considered (a) what support is provided for victims and (b) how a lack of adequate provision could have negative impacts on both security guards and the security industry. The paper focuses on data collected with retail security guards working in the United Kingdom through
-
Perceptions of the effectiveness of security measures used at security estates: case studies from Centurion in the city of Tshwane, Gauteng Security Journal Pub Date : 2020-07-28 Blanche Störm, Anthony Minnaar
Residential security estates are built to deliver the kind of security (and personal safety) that residents seek and, from a visitor’s point of view, one of the primary reasons for choosing to live in a security estate. However, incidents of crime continue to be reported as occurring at these sought-after residential security estates. This raises the question whether living in these types of estates
-
Assessing disparities in school safety: implications for promoting equality in current efforts to keep kids safe Security Journal Pub Date : 2020-07-25 Matthew J. Cuellar, Samantha Coyle
Disproportionality in exposure to school safety strategies in the United States has received increasing attention across the literature. These inequalities are a very important topic for administrators and educators to consider when addressing school safety needs, as they have implications for how student behavior is processed. While research has extensively examined inequalities in exposure to school
-
Situational crime prevention strategies in schools: an assessment of principals’ perceptions of the effectiveness of security approaches in public high schools Security Journal Pub Date : 2020-07-20 Julie Kiernan Coon
This work examines the use of security strategies in schools that are consistent with situational crime prevention (SCP). Results from a mail survey of a random sample of public high schools in New England are used to understand approaches to prevent crime and other problems. School principals were asked about their use of 31 SCP strategies, such as cameras, locks, alarm systems, and rapid repair of
-
Preventing fraud and providing services: The Private Healthcare Insurance Sector Security Journal Pub Date : 2020-07-06 Peter Stiernstedt, Graham Brooks
The private healthcare insurance sector is rarely the subject of criminological analysis unless seen as corrupt. It is even more unusual that it is the subject of analysis as a victim of fraud. This paper is thus different in that it establishes a picture of international private healthcare insurance sectors approach in preventing fraud and providing healthcare services. We start by explaining why
-
Investigating the relationships between FATF recommendation compliance, regulatory affiliations and the Basel Anti-Money Laundering Index Security Journal Pub Date : 2020-05-22 Matthew Manning, Gabriel T. W. Wong, Nada Jevtovic
Money laundering (ML) is harmful as it provides an opportunity for criminals to launder (or legitimise) criminal proceeds and reinvest laundered funds into their activities. ML also creates economic distortions, erosion of financial sectors, reduced government revenue and other socioeconomic effects. To reduce potential ML, governments use security intelligence and financial regulation. To enhance
-
The role of the private sector in counter-terrorism: a scoping review of the literature on emergency responses to terrorism Security Journal Pub Date : 2020-05-22 Matthew Phelps
Partnerships between public and private sector actors are expected to grow in response to calls for a broader cross-sectoral counter-terrorism strategy. However, the formation of these partnerships is a current challenge for private sector security professionals, as there is no standardised approach to securitising terrorism or even a common understanding of how private security can contribute to prevention
-
Private security and the public sector in France: regulatory processes, administrative restructuring and prospects Security Journal Pub Date : 2020-04-08 Bresson Jonathan
This article introduces the progressive development of French private security and analyzes the accelerated changes in its roles since the 2015 Paris Attacks. It describes the evolution of private security’s legal framework and the operational framework supporting it. This sector’s structuring needs and means are then discussed. This development indicates a major change in the French model: the concept
-
Blackmail on social media: what do we know and what remains unknown? Security Journal Pub Date : 2020-04-04 Abdullah Al Habsi, Michelle Butler, Andrew Percy, Sakir Sezer
Increasing numbers of people fall victim to blackmail on social media. Yet, there has been little attempt to synthesise research on this topic. This study seeks to address this gap by investigating what is currently known about blackmail and the disclosure of sensitive information on social media. Two rapid reviews were conducted and based on their findings those who disclose more information, are
-
Perceived risk of terrorism, indirect victimization, and individual-level determinants of fear of terrorism Security Journal Pub Date : 2020-03-21 M. Salih Elmas
This paper tests the pertinence of individual-level theoretical framework of fear of crime to explain fear of terrorism and underscores the significance of the nexus between fear of terrorism and perceived risk of terrorism. It reviews the literature on conceptualization of terrorism and crime, focusing on individual-level determinants of fear of crime and terrorism through victimization and vulnerability
-
Proposal for a typology in criminology from a place-oriented perspective Security Journal Pub Date : 2020-03-07 Aygün Erdoğan, Gökhan H. Erkan
Crime is a major ‘research subject’ in the social sciences and a ‘concern’ in policy making. Hence, criminology emerged as a specialised discipline which is gradually building a theoretical body of its own. However, since the phenomenon of crime is highly complex and multi-dimensional, any single theory of crime cannot cover all aspects. What is more critical is the effective use and improvement of
-
Building a CPTED research culture in Portugal: a bibliometric and social network analysis Security Journal Pub Date : 2020-02-29 Miguel Saraiva, Ana Amante, Hélder Santos, Paula Ribeiro
Although CPTED is recognized as an important crime deterrent for some decades, there are countries where it is still in its infancy, and knowledge and dissemination are scarce. Portugal is such an example. Only in the last decade has research specifically focused on CPTED, with little convergence between the different spheres of knowledge production, such as the academia, the police or the administration
-
Public dilemmas about security measures in the field of civil aviation Security Journal Pub Date : 2020-02-22 Jelena Juvan, Iztok Prezelj, Erik Kopač
New security measures in civil aviation have been introduced as a consequence of security incidents in the past decades and to prevent potential threats in the future. Some of these measures have provoked serious negative public reactions. This paper aims to analyse the current civil aviation security framework and related public dilemmas about individual security measures, such as body scanners, the
-
Interagency collaboration and the management of counter-insurgency campaigns against Boko Haram in Nigeria Security Journal Pub Date : 2020-02-21 Okechukwu M. Ikeanyibe, Charles N. Olise, Isah Abdulrouf, Ikechukwu Emeh
This paper examines interagency collaboration (IAC) among key security agencies and how this has impacted the counter-insurgency campaign against Boko Haram insurgency in Nigeria. Interagency collaboration is often perceived as a panacea for dealing with many complex social problems. But there still exists fogginess about the nature, triggers, and what determines results of interagency collaboration
-
Counterinsurgency operations of the Nigerian military and Boko Haram insurgency: expounding the viscid manacle Security Journal Pub Date : 2020-02-17 Freedom C. Onuoha, Chikodiri Nwangwu, Michael I. Ugwueze
A number of studies have reviewed the military operational tactics vis-à-vis the claims of Boko Haram defeat. However, there is empirical evidence of soldiers’ mutiny, desertion from war fronts and low morale resulting in high success rate of Boko Haram insurgency. Despite the rise in security sector budget from about US$1.44 billion in 2009 to US2.81 billion in 2018, military-led counterinsurgency
-
Automated monitoring for security camera networks: promise from computer vision labs Security Journal Pub Date : 2020-02-17 Chen Chen, Ray Surette, Mubarak Shah
A substantial increase in the number of surveillance camera systems has not delivered the promised deterrent effects or investigative case evidence and their usefulness has been underwhelming. A potential solution to practical camera monitor needs is computer vision (CV)-enhanced camera networks that can provide automated real-time video analysis, quick processing of monitor query-based searches, and
-
Boko Haram insurgency: a decade of dynamic evolution and struggle for a caliphate Security Journal Pub Date : 2020-02-17 J. Tochukwu Omenma, Ifeanyichukwu M. Abada, Z. Onyinyechi Omenma
Is Boko Haram consistently motivated by the need for a territorial caliphate? That is, the creation of the Community of Ummah rather than religion as their envisioned motivation. We seek to take this question seriously due to a series of studies that have started drawing conclusions on the territorial goal of most terrorist organisations. One of such body of literature focuses on the relationship between
-
Boko Haram, pro-synergic conditions and community involvement in counterinsurgency Security Journal Pub Date : 2020-02-17 Bonaventure N. Nwokeoma, Kelechi E. Okpara, Nnabuike O. Osadebe
Beyond the traditional military response to insurgent situations and acknowledging the internal mechanisms underlying insurgency, community involvement in counterinsurgency campaign became imperative especially with the emergence of Civilian Joint Task Force (CJTF) operation in Northeast Nigeria. However, the extent to which communal consciousness (CC), anti-insurgent sentiments (AIS), confidence in
-
Mathematical approach to the analysis of terrorism dynamics Security Journal Pub Date : 2020-02-17 C. Okoye, O. C. Collins, G. C. E. Mbah
In pursuance of differing goals and ideologies, nations, religions, political groups rising against themselves have characterized human existence over the years. In recent times, such animosities have widened to the point of dehumanization and wide destruction of properties with threat and fear as strong arsenal. Terrorism has become very prevalent especially its many new forms that use drones and
-
Non-military approach against terrorism in Nigeria: deradicalization strategies and challenges in countering Boko Haram Security Journal Pub Date : 2020-02-17 Hakeem Onapajo, Kemal Ozden
For a successful counter-terrorism campaign, scholars and conflict practitioners emphasize a combination of military and non-military strategies. While a military strategy is useful to weaken the military capacity of terrorists, non-military strategies including negotiations, deradicalization, disarmament, rehabilitation, reintegration, and other soft measures are advanced to tackle the underlying
-
A decade of terror: revisiting Nigeria’s interminable Boko Haram insurgency Security Journal Pub Date : 2020-02-10 Olumuyiwa Babatunde Amao
Since 2009 when Boko Haram launched its first attack in Nigeria, the terrorist sect has remained a significant security and economic threat to the countries of the Lake Chad region. While moderate successes were recorded between 2015 and 2016, with the government maintaining that the insurgent sect has been technically defeated, empirical evidence suggests otherwise. Using the historical approach as
-
Responsibility to protect: external intervention on Boko Haram terrorism in Nigeria Security Journal Pub Date : 2020-02-10 Chijioke Egwu Ekumaoko, Kingsley Emeka Ezemenaka
The lingering Boko Haram terrorism deserves investigation to determine whether external intervention is needed under the principle of responsibility to protect. In the application of responsibility to protect, the principal challenges have been how to respond, when to respond, and who has the authority to initiate response, especially when the protection of people at risk falls outside one’s territory
-
Mapping the online presence and activities of the Islamic State’s unofficial propaganda cell: Ahlut-Tawhid Publications Security Journal Pub Date : 2020-02-10 Miron Lakomy
This paper, which takes the form of a case study, aims to contribute to the debate on activities of the Islamic State’s unofficial media bureaus. Based on tools of open source intelligence, as well as a limited content analysis, it maps the online presence and activities of Ahlut-Tawhid Publications (AHP). Its means of distributing pro-Daesh content in the surface web as well as its general impact
-
Measuring the security culture in organizations: a systematic overview of existing tools Security Journal Pub Date : 2020-02-07 Marlies Sas, Wim Hardyns, Karolien van Nunen, Genserik Reniers, Koen Ponnet
There has been an increase in research into the security culture in organizations in recent years. This growing interest has been accompanied by the development of tools to measure the level of security culture in order to identify potential threats and formulate solutions. This article provides a systematic overview of the existing tools. A total of 16 are identified, of which six are studied in detail
-
“Translational Criminology” in action: a national survey of TSA’s Playbook implementation at U.S. Airports Security Journal Pub Date : 2019-12-24 Charlotte Gill, Julie Hibdon, Cynthia Lum, Devon Johnson, Linda Merola, David Weisburd, Breanne Cave, Jaspreet Chahal
Security at U.S. airports has been a key priority since September 11, 2001. The Transportation Security Administration (TSA) was established shortly thereafter to oversee aviation security operations. However, there have been few rigorous evaluations of airport security strategies, and even less is known about how they are implemented in practice. As part of a larger study that used a “translational
-
Students plans to obtain a license to carry on campus after the passage of Texas Senate Bill 11 Security Journal Pub Date : 2019-12-07 Brooke Nodeland, Mark Saber, Lee DeBoer
This study examines factors predicting possession of a license to carry and plans to obtain a license to carry for the purpose of carrying a concealed handgun on campus after the passage of Texas Senate Bill 11 (SB11). Utilizing plans to obtain a license to carry we examine four models each with a more refined dependent variable to determine the factors specifically related to campus carry. The study
-
The impact of security scanners at airports and ethnic minority travellers’ experience Security Journal Pub Date : 2019-12-06 Steve Wood, Razaq Raj
Today, airports have a rigorous security focus on operational consistency from legislative and policy mandates being a priority rather than allowing airport operators satisfactory autonomy to adapt policy to their requirements (Poole in World Custom J, 3(2), 2009). Poole and Passantino (2003) stated that there is a tendency to try to treat all passengers the same, which can mean resources are not allocated
-
The ‘three-pillars model of regulation’: a fusion of governance models for private security Security Journal Pub Date : 2019-12-02 Peter Stiernstedt, Mark Button, Tim Prenzler, Rick Sarre
The growth in size, role and authority of private security has triggered a variety of regulatory reactions. These have stimulated a growing academic debate on preferred regulatory models. This paper summarizes the key existing models of regulation. It then provides a critique of the observations of Loader and White (Regul Gov 11(2):166–184, 2017) on the existing models. It critically examines their
-
Ontological and epistemological challenges of measuring the effectiveness of urban counterterrorism measures Security Journal Pub Date : 2019-11-26 Sissel H. Jore
Cities and their citizens are increasingly seen as vulnerable targets for terrorist attacks, and nowadays city planners have become important actors in making decisions about urban security. Multiple urban counterterrorism measures that have affected the urban landscape have been implemented in recent years. Simultaneously, new legislation requires security measures to be effective. This article outlines
-
Analyzing crime foreseeability: premises security litigation and the case of convenience stores and gas stations Security Journal Pub Date : 2019-11-18 Kevin Fox Gotham, Daniel B. Kennedy
Over the decades, the social and behavioral sciences have become increasingly integral to the assessment of crime foreseeability in criminal and civil court cases. This paper uses case examples from litigation involving convenience stores and gas stations to describe the analytical steps of a forensic criminological investigation to assess crime foreseeability. We describe the investigative tasks of
-
Crime and off-premise alcohol outlets: do characteristics matter? Security Journal Pub Date : 2019-11-04 Aleksandra J. Snowden
Areas with higher off-premise alcohol outlet availability have higher rates of violent, property, and disorder crime. Less is known about the characteristics of off-premise outlets that can explain the alcohol outlets–crime relationship. This study examined the association between off-premise alcohol outlets and crime and identified the characteristics associated with crime occurring in off-premise
-
Behaviour tracking: using geospatial and behaviour sequence analysis to map crime Security Journal Pub Date : 2019-11-04 D. A. Keatley, M. Arntfield, P. Gill, J. Clare, G. Oatley, N. Bouhana, D. D. Clarke
Crime is a complex phenomenon. To understand the commission of crime, researchers must map both the temporal and the spatial processes involved. The current research combines a temporal method of analysis, Behaviour Sequence Analysis, with geospatial mapping, to outline a new method of integrating temporal and spatial movements of criminals. To show how the new method can be applied, a burglary scenario
-
Correction to: A configurative synthesis of evidence for fear in the criminal decision-making process Security Journal Pub Date : 2019-10-29 Paul Gill, Lisa Tompson, Zoe Marchment, Florian Hetzel, Sanaz Zolghadriha, Aiden Sidebottom
In the original publication of the article, the Acknowledgement section was missed. The Acknowledgement section should read as: Acknowledgements This research was funded by the Centre for Protection of National Infrastructure (CPNI).
-
A systematic review of crime facilitated by the consumer Internet of Things Security Journal Pub Date : 2019-10-15 John M. Blythe, Shane D. Johnson
The nature of crime is changing—estimates suggest that at least half of all crime is now committed online. Once everyday objects (e.g. televisions, baby monitors, door locks) that are now internet connected, collectively referred to as the Internet of Things (IoT), have the potential to transform society, but this increase in connectivity may generate new crime opportunities. Here, we conducted a systematic
-
An investigation into microcycles of violence by the Taliban Security Journal Pub Date : 2019-10-15 Julie Haukland Rieber-Mohn, Kartikeya Tripathi
This study investigated the notion of near-repeat victimisation in the context of the Taliban insurgency in Afghanistan. Applying methods originally developed for epidemiological research the current study found strong evidence that attacks by the Taliban insurgency occurred in microcycles of localised bursts of terrorist events. Nearly 40% of the 305 attacks analysed by the Taliban in 2016 took place
-
Guardianship in action among Brisbane suburban residents: environmental facilitators of guardianship intensity and the influence of living in a Queenslander Security Journal Pub Date : 2019-10-05 Emily Moir, Danielle M. Reynald, Timothy C. Hart, Anna Stewart
Using data collected from observations made of 279 properties located in two homogeneous Brisbane neighbourhoods, the current study examines guardianship intensity among Australian suburban residents. Comparisons between findings from similar studies conducted in The Hague (the Netherlands) and two U.S. cities suggest that some guardianship behaviours observed in Brisbane are unique to the suburban
-
In the shoes of George Zimmerman: the impact of promotion of mistrust, subcultural diversity and fear of crime on expected personal reactions Security Journal (IF 0.838) Pub Date : 2019-10-04 Jodi Lane, Ashley Price Kuhn
Abstract In February 2012, George Zimmerman, a Hispanic man, shot and killed Trayvon Martin, an African-American teen, after encountering Martin walking in a hoodie in the rain in his neighborhood. A media frenzy followed, focusing on the racial differences between the two and the possible injustice of the incident. A key legal and public question was whether Zimmerman was acting in self-defense or
-
Law enforcement corruption along the U.S. borders Security Journal Pub Date : 2019-10-02 David Jancsics
The purpose of the study is to provide an empirical characterization of law enforcement corruption along the U.S. borders. Data were analyzed on 156 criminal cases of officers and agents employed by the U.S. Customs and Border Protection (CBP). Results from the present work advance the understanding of the significantly under-studied topic of border law enforcement corruption in the U.S. context. The
-
Hard, soft or situational controls? Bridging the gap between security, compliance and internal control Security Journal Pub Date : 2019-10-01 Harald Haelterman
A historic focus on preventing losses from crime and a growing demand for compliance and internal control have placed the risk of employee crime and misconduct high on the corporate risk map. Its potential impact has become increasingly evident and operational management supported by various functional teams are being held accountable for establishing and implementing effective risk mitigating strategies
-
Current trends in insurance fraud in Russia: evidence from a survey of industry experts Security Journal Pub Date : 2019-10-01 Yuriy Timofeyev, Tatiana Busalaeva
This study aims to explore the current trends in fraud prevention in the insurance industry in Russia. Survey responses from 20 experts and professionals of the leading insurance companies in Moscow were collected. More than a half of them are former police officers who work at security or investigation departments. Survey data analysis was employed. According to the experts’ opinion, existing gaps
-
Fighting industrial and economic espionage through criminal law: lessons to be learned from Austria and Switzerland Security Journal Pub Date : 2019-09-30 Cathrine Konopatsch
Empirical figures show that, especially in recent years, the frequency of industrial and economic espionage, and consequently its dangers and negative impact, has increased greatly worldwide. This has impacted not only the individual victims of the infringement of trade secrets, but also the national and global economies at large. This espionage cannot be tackled effectively through uncoordinated,
-
Airport artificial intelligence can detect deception: or am i lying? Security Journal Pub Date : 2019-09-24 Louise Marie Jupe, David Adam Keatley
Since the 9/11 terrorist attacks, research has enveloped numerous areas within the psychological sciences as a means to increase the ability to spot potential threats. While airports took to heightened security protocols, many academics looked deeper into ways of detecting deception within international airport settings. Various verbal and nonverbal systems were intensely scrutinised under the empirical
-
Cyber espionage through Botnets Security Journal Pub Date : 2019-09-24 Zsolt Bederna, Tamas Szadeczky
Botnets, the groups of illegally controlled infected devices on the Internet have had a history of two decades already. This history shows an evolution of the infection techniques, the scope of the target devices, and their usage. Thus, the new direction is the usage of sophisticated data leakage techniques by state-sponsored hacker groups. Our article analyses this evolution while focusing on Botnet
Contents have been reproduced by permission of the publishers.