Subjects -> LAW (Total: 1397 journals)
    - CIVIL LAW (30 journals)
    - CONSTITUTIONAL LAW (52 journals)
    - CORPORATE LAW (65 journals)
    - CRIMINAL LAW (28 journals)
    - CRIMINOLOGY AND LAW ENFORCEMENT (161 journals)
    - FAMILY AND MATRIMONIAL LAW (23 journals)
    - INTERNATIONAL LAW (161 journals)
    - JUDICIAL SYSTEMS (23 journals)
    - LAW (843 journals)
    - LAW: GENERAL (11 journals)

CRIMINOLOGY AND LAW ENFORCEMENT (161 journals)                     

Showing 1 - 160 of 160 Journals sorted alphabetically
Acta Criminologica : Southern African Journal of Criminology     Full-text available via subscription  
Advances in Cement Research     Hybrid Journal   (Followers: 7)
African Safety Promotion     Full-text available via subscription   (Followers: 4)
African Security Review     Partially Free   (Followers: 7)
Aggression and Violent Behavior     Hybrid Journal   (Followers: 362)
Aggressive Behavior     Hybrid Journal   (Followers: 16)
Annual Review of Criminology     Full-text available via subscription   (Followers: 9)
Asian Journal of Criminology     Hybrid Journal   (Followers: 9)
Australian and New Zealand Journal of Criminology     Hybrid Journal   (Followers: 406)
Australian Journal of Forensic Sciences     Hybrid Journal   (Followers: 351)
Biometric Technology Today     Full-text available via subscription   (Followers: 4)
Boletín Criminológico     Open Access  
Brill Research Perspectives in Transnational Crime     Full-text available via subscription   (Followers: 1)
British Journal of Criminology     Hybrid Journal   (Followers: 399)
Campbell Systematic Reviews     Open Access   (Followers: 5)
Canadian Graduate Journal of Sociology and Criminology     Open Access   (Followers: 6)
Canadian Journal of Criminology and Criminal Justice / La Revue canadienne de criminologie et de justice pénale     Full-text available via subscription   (Followers: 15)
Canadian Society of Forensic Science Journal     Hybrid Journal   (Followers: 258)
Champ pénal/Penal field     Open Access  
Computer Fraud & Security     Full-text available via subscription   (Followers: 286)
Computer Law & Security Review     Hybrid Journal   (Followers: 22)
Contemporary Challenges : The Global Crime, Justice and Security Journal     Open Access   (Followers: 3)
Contemporary Justice Review: Issues in Criminal, Social, and Restorative Justice     Hybrid Journal   (Followers: 39)
Corrections : Policy, Practice and Research     Hybrid Journal   (Followers: 1)
Crime & Delinquency     Hybrid Journal   (Followers: 83)
Crime and Justice     Full-text available via subscription   (Followers: 27)
Crime Prevention and Community Safety     Hybrid Journal   (Followers: 110)
Crime Psychology Review     Hybrid Journal   (Followers: 2)
Crime Science     Open Access   (Followers: 56)
Crime, Histoire & Sociétés     Open Access   (Followers: 10)
Crime, Security and Society     Open Access   (Followers: 2)
Criminal Justice and Behavior     Hybrid Journal   (Followers: 61)
Criminal Justice Ethics     Hybrid Journal   (Followers: 10)
Criminal Justice Matters     Hybrid Journal   (Followers: 9)
Criminal Justice Policy Review     Hybrid Journal   (Followers: 31)
Criminal Justice Review     Hybrid Journal   (Followers: 15)
Criminal Justice Studies: A Critical Journal of Crime, Law and Society     Hybrid Journal   (Followers: 24)
Criminal Law and Philosophy     Hybrid Journal   (Followers: 13)
Criminal Law Forum     Hybrid Journal   (Followers: 8)
Criminocorpus, revue hypermédia     Open Access  
Criminological Studies     Open Access  
Criminologie     Open Access   (Followers: 3)
Criminology and Criminal Justice     Hybrid Journal   (Followers: 51)
Crítica Penal y Poder     Open Access  
Critical Criminology     Hybrid Journal   (Followers: 24)
Critical Studies on Terrorism     Hybrid Journal   (Followers: 55)
Cryptologia     Hybrid Journal   (Followers: 3)
Current Issues in Criminal Justice     Hybrid Journal   (Followers: 13)
Datenschutz und Datensicherheit - DuD     Hybrid Journal  
Delito y Sociedad : Revista de Ciencias Sociales     Open Access  
Derecho Penal y Criminología     Open Access   (Followers: 2)
Detection     Open Access   (Followers: 3)
Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide     Hybrid Journal   (Followers: 11)
EDPACS: The EDP Audit, Control, and Security Newsletter     Hybrid Journal  
Estudios Penales y Criminológicos     Open Access  
EURASIP Journal on Information Security     Open Access   (Followers: 7)
European Journal of Crime, Criminal Law and Criminal Justice     Hybrid Journal   (Followers: 271)
European Journal of Criminology     Hybrid Journal   (Followers: 32)
European Journal of Probation     Hybrid Journal  
European Journal on Criminal Policy and Research     Hybrid Journal   (Followers: 9)
European Polygraph     Open Access  
European Review of Organised Crime     Open Access   (Followers: 46)
Feminist Criminology     Hybrid Journal   (Followers: 17)
Forensic Science International     Hybrid Journal   (Followers: 361)
Forensic Science International : Reports     Open Access   (Followers: 5)
Forensic Science International: Genetics     Hybrid Journal   (Followers: 15)
Forensic Science, Medicine, and Pathology     Hybrid Journal   (Followers: 27)
Forensic Toxicology     Hybrid Journal   (Followers: 18)
Global Crime     Hybrid Journal   (Followers: 283)
Health & Justice     Open Access   (Followers: 5)
Homicide Studies     Hybrid Journal   (Followers: 8)
IEEE Security & Privacy Magazine     Full-text available via subscription   (Followers: 30)
IEEE Transactions on Dependable and Secure Computing     Hybrid Journal   (Followers: 16)
IEEE Transactions on Information Forensics and Security     Hybrid Journal   (Followers: 25)
Incarceration     Full-text available via subscription  
Information Security Journal : A Global Perspective     Hybrid Journal   (Followers: 10)
International Annals of Criminology     Hybrid Journal  
International Criminal Justice Review     Hybrid Journal   (Followers: 14)
International Criminal Law Review     Hybrid Journal   (Followers: 18)
International Criminology     Hybrid Journal   (Followers: 4)
International Journal for Crime, Justice and Social Democracy     Open Access   (Followers: 7)
International Journal of Applied Cryptography     Hybrid Journal   (Followers: 9)
International Journal of Comparative and Applied Criminal Justice     Hybrid Journal   (Followers: 4)
International Journal of Conflict and Violence     Open Access   (Followers: 25)
International Journal of Criminology and Sociology     Open Access   (Followers: 1)
International Journal of Discrimination and the Law     Hybrid Journal   (Followers: 7)
International Journal of Electronic Security and Digital Forensics     Hybrid Journal   (Followers: 11)
International Journal of Information and Coding Theory     Hybrid Journal   (Followers: 7)
International Journal of Police Science and Management     Full-text available via subscription   (Followers: 313)
International Journal of Prisoner Health     Hybrid Journal   (Followers: 16)
International Journal of Punishment and Sentencing, The     Full-text available via subscription   (Followers: 8)
International Review of Victimology     Hybrid Journal   (Followers: 19)
Journal of Addictions & Offender Counseling     Partially Free   (Followers: 6)
Journal of Adult Protection, The     Hybrid Journal   (Followers: 16)
Journal of Aggression, Conflict and Peace Research     Hybrid Journal   (Followers: 43)
Journal of Computer Security     Hybrid Journal   (Followers: 12)
Journal of Computer Virology and Hacking Techniques     Hybrid Journal   (Followers: 6)
Journal of Contemporary Criminal Justice     Hybrid Journal   (Followers: 24)
Journal of Correctional Education     Full-text available via subscription   (Followers: 2)
Journal of Crime and Justice     Hybrid Journal   (Followers: 14)
Journal of Criminal Justice     Hybrid Journal   (Followers: 58)
Journal of Criminal Justice Education     Hybrid Journal   (Followers: 8)
Journal of Criminal Psychology     Hybrid Journal   (Followers: 126)
Journal of Criminological Research, Policy and Practice     Hybrid Journal   (Followers: 62)
Journal of Criminology     Open Access   (Followers: 12)
Journal of Criminology and Forensic Science     Open Access   (Followers: 7)
Journal of Developmental and Life-Course Criminology     Hybrid Journal  
Journal of Ethnicity in Criminal Justice     Hybrid Journal   (Followers: 3)
Journal of Forensic and Legal Medicine     Hybrid Journal   (Followers: 292)
Journal of Forensic Practice     Hybrid Journal   (Followers: 61)
Journal of Forensic Psychiatry & Psychology     Hybrid Journal   (Followers: 50)
Journal of Forensic Sciences     Hybrid Journal   (Followers: 369)
Journal of Gender-Based Violence     Hybrid Journal   (Followers: 13)
Journal of Genocide Research     Hybrid Journal   (Followers: 13)
Journal of Illicit Economies and Development     Open Access  
Journal of International Criminal Justice     Hybrid Journal   (Followers: 38)
Journal of Investigative Psychology and Offender Profiling     Hybrid Journal   (Followers: 11)
Journal of Learning Disabilities and Offending Behaviour     Hybrid Journal   (Followers: 30)
Journal of Penal Law & Criminology     Open Access   (Followers: 2)
Journal of Perpetrator Research     Open Access   (Followers: 1)
Journal of Policing, Intelligence and Counter Terrorism     Hybrid Journal   (Followers: 417)
Journal of Quantitative Criminology     Hybrid Journal   (Followers: 32)
Journal of Scandinavian Studies in Criminology and Crime Prevention     Hybrid Journal   (Followers: 10)
Journal of Strategic Security     Open Access   (Followers: 11)
Justice Evaluation Journal     Hybrid Journal   (Followers: 1)
Justice Research and Policy     Full-text available via subscription  
Juvenile and Family Court Journal     Hybrid Journal   (Followers: 34)
Kriminologia ikasten : Irakaskuntzarako aldizkaria     Open Access  
Kriminologisches Journal     Full-text available via subscription  
Law, Innovation and Technology     Hybrid Journal   (Followers: 15)
Nordic Journal of Criminology     Hybrid Journal   (Followers: 1)
Occasional Series in Criminal Justice and International Studies     Full-text available via subscription   (Followers: 3)
Police Journal : Theory, Practice and Principles     Hybrid Journal   (Followers: 320)
Police Quarterly     Hybrid Journal   (Followers: 298)
Policing: A Journal of Policy and Practice     Hybrid Journal   (Followers: 296)
Policing: An International Journal of Police Strategies & Management     Hybrid Journal   (Followers: 327)
Policy & Internet     Hybrid Journal   (Followers: 12)
Política Criminal     Open Access  
Psychology of Violence     Full-text available via subscription   (Followers: 15)
Psychology, Crime & Law     Hybrid Journal   (Followers: 27)
Punishment & Society     Hybrid Journal   (Followers: 37)
Research and Reports in Forensic Medical Science     Open Access   (Followers: 7)
Revista Arbitrada de Ciencias Jurídicas y Criminalísticas Iustitia Socialis     Open Access  
Revista Brasileira de Criminalística     Open Access  
Revista de Estudios Jurídicos y Criminológicos     Open Access  
Revista de Movimentos Sociais e Conflitos     Open Access  
Revista Digital de la Maestría en Ciencias Penales     Open Access  
Rivista di Studi e Ricerche sulla criminalità organizzata     Open Access  
Science & Global Security: The Technical Basis for Arms Control, Disarmament, and Nonproliferation Initiatives     Hybrid Journal   (Followers: 4)
Security and Defence Quarterly     Open Access   (Followers: 6)
Security Journal     Hybrid Journal   (Followers: 22)
Sexual Abuse in Australia and New Zealand     Full-text available via subscription   (Followers: 9)
South African Crime Quarterly     Open Access   (Followers: 4)
The Howard Journal of Criminal Justice     Hybrid Journal   (Followers: 9)
Theory and Practice of Forensic Science     Open Access   (Followers: 1)
Trauma, Violence, & Abuse     Hybrid Journal   (Followers: 58)
Trends in Organized Crime     Hybrid Journal   (Followers: 374)
URVIO - Revista Latinoamericana de Estudios de Seguridad     Open Access  
Women & Criminal Justice     Hybrid Journal   (Followers: 282)
Women Against Violence : An Australian Feminist Journal     Full-text available via subscription   (Followers: 15)

           

Similar Journals
Journal Cover
Security Journal
Journal Prestige (SJR): 0.313
Citation Impact (citeScore): 1
Number of Followers: 22  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 0955-1662 - ISSN (Online) 1743-4645
Published by Springer-Verlag Homepage  [2469 journals]
  • Embedding information security management in organisations: improving
           participation and engagement through intra-organisational Liaison

    • Free pre-print version: Loading...

      Abstract: Abstract Effective information security management (ISM) is contingent on intra-organisational liaison (IOL) between security personnel and stakeholders in ISM processes. IOL is a set of activities undertaken by information security personnel to communicate with internal stakeholders to increase their participation and involvement in the ISM process. Unfortunately, IOL in many organisations tends to be undertaken in an ad hoc and informal manner rather than as part of a formal and systematic process. We argue that IOL activities should be planned and embedded into mainstream ISM practices. Our review of the relevant literature did not find ‘best practice’ guidelines on intra-organisational liaison (IOL) between security personnel and stakeholders in ISM. Based on findings from an in-depth exploratory study where we interviewed thirty-four information security professionals, we develop a novel framework that explains how intra-organisational liaison can be improved and specifically what IOL practices and activities are critical for effective communication with ISM stakeholders.
      PubDate: 2022-08-07
       
  • Old problem, new manifestation: the emergence of cultism in rural
           secondary schools in Anambra state, Nigeria

    • Free pre-print version: Loading...

      Abstract: Abstract The menace of cultism is not fundamentally new, especially in the tertiary education system in Nigeria, but it has assumed a worrisome dimension going by the recent experiences in rural areas. This study examines the changing manifestation and extension of school cultism from university campuses to secondary schools in rural communities. Primary data was generated through non-participant observations and focus group discussions (FGD) conducted across twelve rural secondary schools in the study areas. Data analysis reveals that the emergence of cultism in rural secondary schools is closely tied to the infiltration of university students into secondary schools to hunt for recruits among younger students. The study concludes that secondary school cultism lowers the academic performance of students and threatens the security of host rural communities. It suggests the adoption of preventive security approaches in rural secondary schools, such as all-round fencing of school premises, installation of CCTV/technology-based monitoring system and the use of anti-cult groups in curbing the menace.
      PubDate: 2022-08-03
       
  • Susceptibility for criminal facilitation in social housing: a
           psychological perspective

    • Free pre-print version: Loading...

      Abstract: Abstract In criminal networks, facilitators seem to play a subordinate role in terms of low financial profit and high risk of being identified in police investigations. Their role is hypothesized to be explained by factors related to poverty or, broadly stated, deprivation. This study explores these factors in a social housing context. Through standardized interviews with employees of social housing institutions, factors distinguishing between facilitators and non-facilitators were identified through univariate and network analyses. Drug use, unemployability, stress, one-person household, and high crime rate neighborhood discriminated most. Financial problems, deviant social relations, impulsivity, social isolation, and low self-esteem also appeared to be relevant. The conclusion that deprivation-related vulnerabilities might increase the risk of becoming a facilitator provides leads for future interventions and research.
      PubDate: 2022-08-01
       
  • Tabletop scenario exercises as a training tool for improving response to
           workplace violence

    • Free pre-print version: Loading...

      Abstract: Abstract The objective was to evaluate the effectiveness of tabletop scenario exercises in improving threat management teams’ response to workplace violence. Twenty-two threat management teams (TMTs) from a large multinational manufacturing company participated in two tabletop scenario exercises, one of which presented a worker-on-worker bullying case and the other an interpersonal stalking scenario. TMTs assessed the level of the threat, which steps they should take first in the response, how quickly steps needed to be initiated, and who should be involved, following prescribed threat response and incident management protocols developed from security industry standards. Tabletop exercises improved the teams’ ability to correctly assess the scenario’s level of threat and the comprehensiveness of the response. Improvements were particularly noted for teams with smaller caseloads. Tabletop scenario exercises can be valuable tools for evaluating how companies respond to simulated threats of workplace violence and for identifying the successes and gaps in the response.
      PubDate: 2022-07-25
       
  • Countering fake information as a guarantee of state information security

    • Free pre-print version: Loading...

      Abstract: Abstract The article focuses on the notion of fake information as a tool of psychological influence in the context of hybrid wars. Works of the prominent academicians in the area of manipulation studies constitute the theoretical framework of this research. Empirical research methods such as observation, comparison, generalization and expert evaluation are used. First of all, types and methods of psychological influences used by mass media and social networks with a view to manipulate public opinions are distinguished. Moreover, the impact of emotions on the critical perception of the news is highlighted. The indicators of manipulative influence are defined in order to resist them. Besides, the ways of creating and distributing false information are described. In addition, the development of fakes identification mechanisms is considered a priority for the governmental and other public institutions. This is illustrated by a range of technologies developed to automatically detect fake news. Apart from that, the degrees of the information reliability are explored. Furthermore, structural elements of fake messages, which include the source and the message itself, are discussed. Misinformation of the public, promotion of certain opinions, encouragement of aggressive actions and instalment of doubts are singled out as the main tasks of fake information. Additionally, stages of countering fakes are distinguished. Finally, the specific features of the forensic expertise procedure are determined in order to provide information security in Ukraine. The research demonstrates the importance of an efficient security system, which would identify fake information and limit its propagation.
      PubDate: 2022-07-23
       
  • Exploring the determinants of victimization and fear of online identity
           theft: an empirical study

    • Free pre-print version: Loading...

      Abstract: Abstract The present study aims at understanding what factors contribute to the explanation of online identity theft (OIT) victimization and fear, using the Routine Activity Theory (RAT). Additionally, it tries to uncover the influence of factors such as sociodemographic variables, offline fear of crime, and computer perception skills. Data for the present study were collected from a self-reported online survey administered to a sample of university students and staff (N = 832, 66% female). Concerning the OIT victimization, binary logistic regression analysis showed that those who do not used credit card had lower odds of becoming an OIT victim, and those who reported visiting risky contents presented higher odds of becoming an OIT victim. Moreover, males were less likely than females of being an OIT victim. In turn, fear of OIT was explained by socioeconomic status (negatively associated), education (positively associated) and by fear of crime in general (positively associated). In addition, subjects who reported more online interaction with strangers were less fearful, and those reported more avoiding behaviors reported higher levels of fear of OIT. Finally, subjects with higher computer skills are less fearful. These results will be discussed in the line of routine activities approach and implications for online preventive behaviors will be outlined.
      PubDate: 2022-07-21
       
  • The realpolitik of jihad: an anatomy of transnational Islamist terrorism
           in East Africa

    • Free pre-print version: Loading...

      Abstract: Abstract In the last three decades, East Africa has turned into a crucial arena in the fight against transnational Islamist terrorism, harbouring Al-Qa’ida’s leadership and subsequently giving rise to one of the most active organisations, Al-Shabaab. Much has been written on jihadism in the region. However, the scholarship still lacks a comprehensive historical analysis shedding light on the dynamics that have favoured its survival and development. This article fills such a gap, reviewing the evolution of transnational Islamist terrorism in East Africa from the early 1990s up to the present day. The article sheds light on the realpolitik of East African terrorism, showing how militants have consistently sought to adapt to and exploit (1) the political morphology of the region and (2) emerging tensions between local groups and national authorities to survive setbacks, expand their influence and gain supporters. The article concludes by arguing that tackling social and political fractures on the ground is of fundamental importance to effectively dismantle terror networks and fight instability in the region.
      PubDate: 2022-07-19
       
  • Business e-mail compromise scam, cyber victimization, and economic
           sustainability of corporate organizations in Nigeria

    • Free pre-print version: Loading...

      Abstract: Abstract Although numerous studies on cybercrime have been undertaken, very little is known about the BEC scam and its effects on economic sustainability in Nigeria. Using data collected via various methods, this study examines the implications of the BEC scam as cyber victimization on the economic infrastructure of corporate organizations in Cross River State, Nigeria. A specifically structured questionnaire and an in-depth interview with staff (n = 1087) was conducted and the data received were analyzed using descriptive statistics, logistic regression, and content analysis. Findings revealed that BEC victimization is increasing, and has adversely affected such corporate organizations as banks, telecommunications firms, and manufacturing companies. The organization one works for is an important factor in determining one’s vulnerability to BEC scamming. Therefore, a multilateral cybersecurity and cyber-intelligence relationship between the various corporations and government departments is necessary for adequate protection of critical infrastructures. This multi-sectoral approach to cyber-law enforcement requires the installation of uncompromised internal physical and digital access control in order to strengthen targets. This demands robust organizational cyberspace surveillance to complement the existing government counter-cybercrime implementations.
      PubDate: 2022-06-16
       
  • Tasks and competences of a private eye in a small society: the case of
           private detectives in Slovenia

    • Free pre-print version: Loading...

      Abstract: Abstract The work of private detectives is a young profession in Slovenia. It has only existed for about three decades, and as such has been rarely researched. So far there has been no study on what Slovenian private detectives actually do in the framework of the tasks that are stipulated by law. Therefore, the aim of a survey presented in the article is to find out what private detectives do on a daily basis and what competences they need to perform their tasks. Since there are only around 90 private detectives in Slovenia, they must all have good knowledge of several areas simultaneously. However, our survey suggests that based on the work tasks performed, Slovenian private detectives can be classified into three groups – “business-oriented private detectives,” “typical private detectives” and “multitasking private detectives”. For every task they perform, private detectives need certain general and specific competences. The private detectives who participated in this study agree that they must be able to collect and generate important information from a large amount of data, be IT literate and very self-disciplined. Additionally, they must have extensive legal knowledge and organizational skills. The least important skills for private detectives, in their opinion, are public speaking and martial arts. The only difference found among the groups used to classify private detectives is the importance of analysing large amounts of data. Bearing in mind the findings of the study, it is clear that more work is available for those private detectives who can perform a broader spectrum of tasks and possess more competences.
      PubDate: 2022-06-13
       
  • Media and conflict reporting: a content analysis and victims
           assessment of media coverage of the conflict between Farmers and Herdsmen
           in Nigeria

    • Free pre-print version: Loading...

      Abstract: Abstract There is an increase in violent clashes between Herdsmen and Farmers in Nigeria. Along with it, there is a growing amount of research that specifically investigates the conflict. Existing research on this topic mostly employed content analysis to understand media coverage of the conflict and often ignored the conflict victims’ perceptions of media performance regarding coverage of the conflict. This study extends previous studies by examining both media reporting and conflict victims’ viewpoints on the coverages. We used a mixed method approach, which combined a quantitative content analysis of news reports and semi-structured interviews with the conflict victims. Our results suggested that both analyses revealed consistent findings. Three key findings were obtained: low prominence, lack of objectivity, and excessive use of negative language/framing of the conflict. Theoretical implications suggested support for the assumption of Agenda Setting Theory in discussing the influence of the media on news prominence and news sources used and Social Responsibility Theory in explaining the journalists’ lack of objectivity and excessive use of negative framing when reporting the conflict. The managerial implication includes our recommendation for conflict reporting in Nigeria to embrace peace journalism.
      PubDate: 2022-06-01
      DOI: 10.1057/s41284-020-00280-0
       
  • The use of CPTED-based techniques to prevent shoplifting: a survey in
           Istanbul

    • Free pre-print version: Loading...

      Abstract: Abstract Shoplifting is a growing problem for all stores. Following a 300% increase in the number shopping malls in the past decade, Turkey had 375 malls by 2016, with shoplifting becoming an important issue. This study investigates the use of CPTED-based approaches to prevent shoplifting in Istanbul and is the first such study in Turkey. Data were collected from 389 store managers and shopping mall managers in Istanbul via a structured, self-explanatory questionnaire in face-to-face interviews at stores in shopping malls. The results revealed that among different CPTED-based approaches, stores mostly prefer video cameras and electronic alarm tags for shoplifting prevention. The study identified six factors predicting the use of CPTED approaches: Factor 1—Informal/Natural Surveillance, Factor 2—Target Hardening & Mechanical Surveillance, Factor 3—Territoriality, Factor 4—Access Control, Factor 5—Formal/Organized Surveillance, and Factor 6—Image/Maintenance. These results provide important insights regarding differences using CPTED techniques in terms of store and shopping mall characteristics in Istanbul.
      PubDate: 2022-06-01
      DOI: 10.1057/s41284-021-00283-5
       
  • The role of subjective and objective indicators of neighbourhood safety on
           children’s physical activity level

    • Free pre-print version: Loading...

      Abstract: Abstract The current study aimed to investigate the association of neighbourhood safety in three levels with children’s physical activity. These levels include parental perception and children’s perception as subjective measurements and reported rates of crime and traffic as objective measurements. 1421 questionnaires were distributed in primary schools among eligible children and their parents in Bandar Abbas city, Iran. Boys were more active than girls, but the level of physical activity in children was generally low. Parents were more concerned about neighbourhood safety compared with their children. Both subjective and objective measurements of safety contributed with children’s physical activity. Policymakers and designers should develop environments where both parents and children perceive as having sufficient levels of safety and consider interventions for reducing crime and traffic rates so as to increase children’s physical activity.
      PubDate: 2022-06-01
      DOI: 10.1057/s41284-020-00278-8
       
  • Investigating co-offender connections from offender’s hometown
           background: a practical study in Beijing

    • Free pre-print version: Loading...

      Abstract: Abstract Co-offending is a common phenomenon in criminology. In previous years, countless studies have contributed to describing the co-offending cooperator's selection process. It has been established that personal characteristics such as age, sex, social/economic status, social/spatial distance, and so on play important roles in co-offender group formation; however, the geographic background of members of the co-offending groups has not received much attention. This study analyzes the assumption that the offender's hometown's homophily enhances co-offending generation and that the size of the offender population of the same hometown (OPSH) would positively impact co-offending formation. To test this, two types of co-offending connections, cross-hometown co-offending (CHCO) and homophily-hometown co-offending (HHCO), are defined respectively, and residential burglary reporting data from Beijing Police from 2005 to 2014 are utilized to investigate the relationship between co-offenders from their hometown backgrounds. The results indicate that HHCO cooperation is more likely to be generated for those who come from large OPSHs, while conversely a large proportion of CHCO cooperation is generated for smaller OPSHs. Additionally, large OPSHs have diverse co-offending connections and attract more partners from the smaller OPSHs, suggesting their more centralized role in co-offending networks.
      PubDate: 2022-06-01
      DOI: 10.1057/s41284-021-00290-6
       
  • Working from home during COVID-19 crisis: a cyber security culture
           assessment survey

    • Free pre-print version: Loading...

      Abstract: Abstract This paper aims to evaluate the cyber security culture readiness of organizations from different countries and business domains when teleworking became a necessity due to the COVID-19 crisis. We have designed a targeted questionnaire and conducted a web-based survey addressing employees while working from home during the COVID-19 spread over the globe. The questionnaire contained no more than 23 questions and was available for almost a month, from 7th April 2020 until 3rd May 2020. During that period, 264 participants from 13 European countries spent approximately 8 minutes to answer it. Gathered data were analyzed from different perspectives leading to evolutionary findings regarding information security readiness and resilience of both individuals and organizations. In this paper, results are being presented and discussed in detail while focusing on future scientific routes and research paths that need to be explored. It concludes on a number of cyber security recommendations addressing both the emerged vulnerabilities and the need for security culture evolution.
      PubDate: 2022-06-01
      DOI: 10.1057/s41284-021-00286-2
       
  • Safety in numbers: security on campus and the importance of the
           corporatization of universities

    • Free pre-print version: Loading...

      Abstract: Abstract When visiting universities during recruitment tours, many students and parents want to know if the student will be ‘safe’ while attending the institution. This paper uses a qualitative examination of security at a Canadian university to argue that the increase in security measures on campuses is driven by both the desire to provide physical security and the pressure from the increasing corporatization of academia to use security as a recruitment and retention tool. These goals can be served by the same security measures or compete for budgetary priority. Overall, this study demonstrates how the concepts of corporatization, institutional risk management, security theatre, and university branding are present in how the university designs security policies and brands itself as a ‘safe’ environment, and how this can leave students wanting.
      PubDate: 2022-06-01
      DOI: 10.1057/s41284-021-00293-3
       
  • Forty years of declining burglary in the United States: Explanation and
           evidence relating to the security hypothesis

    • Free pre-print version: Loading...

      Abstract: Abstract Residential burglary in the United States has declined by over 80% across the last four decades, representing a major social phenomenon that remains largely unexplained. International research indicates a need for investigation of the security hypothesis. Here, 50 years of studies are examined chronologically. A consistent narrative emerges which indicates that household security, largely absent in the 1970s, improved gradually over time. Improvement occurred via several mechanisms: the increased prevalence, quality, coverage, and routine use of security fixtures and fittings. In addition, crime displacement declined over time as fewer households offered easy crime opportunities, and the average age of burglars increased as juveniles found burglary increasingly difficult. Hence the study concludes that gradual household security improvements played a central role in the decline in residential burglary. While the findings suggest a considerable revison is needed to our understanding of burglary and burglars, the likelihood that 50 years of diverse burglary research points in the same direction by chance, and without significant contrary evidence, seems remote. Further implications for theory, policy, and research are identified.
      PubDate: 2022-06-01
      DOI: 10.1057/s41284-021-00284-4
       
  • Relations between police and private security officers: a case study of
           Serbia

    • Free pre-print version: Loading...

      Abstract: Abstract In the last few years, under the influence of various circumstances, the demand for the private security industry has increased in Serbia. The aim of this research is to examine the extent and quality of cooperation between members of the public and private security sector as the mutual perception of its members because their relations are important for establishing a safe environment for citizens. The survey was conducted from February to June 2019 using a questionnaire among 190 police officers and 178 security personnel. The results of this research showed that mutual relations between the private security personnel and police officers are satisfactory, but also that members of private security look at these relations from a brighter side and have a very positive attitude towards members of the police, while members of the police view these relations more negatively. The results of this research can be used for planning campaigns to improve the relationships between police officers and security personnel.
      PubDate: 2022-06-01
      DOI: 10.1057/s41284-021-00289-z
       
  • Design of the required tasks of industrial security experts based on job
           openings

    • Free pre-print version: Loading...

      Abstract: Abstract The Fourth Industrial Revolution has combined traditional industry with information and communication technology, leading to appearance of converged security risks. Although this problem is receiving substantial attention, the supply of industrial security experts is still low compared to demand and lacks occupational classification system which enables systematic education and manpower training system. This study presents occupation and basic tasks required for industrial security workforce. Occupations and occupational clusters are classified by adopting big data text mining technique—Latent Dirichlet Allocation topic modeling to analyze a massive dataset analyzed from job openings of industrial security field. Next, inter-coder reliability analysis was conducted to verify validity and reliability. Specifically, survey was further conducted for validity verification and factor analysis was performed for reliability verification.
      PubDate: 2022-06-01
      DOI: 10.1057/s41284-020-00279-7
       
  • Research of security and safety culture within an organization. The case
           study within the Slovak Republic

    • Free pre-print version: Loading...

      Abstract: Abstract Security and safety culture is an increasingly important term in assessing the security and safety of organizations. It is an internal security and safety factor of an organization that can directly influence its overall security and safety. In many cases, however, organizations do not know, nor do they have a way of assessing the level of their security and safety culture. It is therefore necessary to know the content, elements, and sectors in which it can be identified in order to gain a deeper knowledge of security and safety culture in more detail and be able to examine it. Firstly, we focused on creating a model for evaluating the safety and safety culture and its application in selected organizations. Secondly, we devoted to the description and design of an organization’s security and safety culture assessment model. The proposed model is based on the identification of subsectors and indicators of security and safety culture that will gain their value by using information obtained from combining the four proposed methods. Accordingly, six security and safety culture sectors were defined for the purposes of security and safety culture assessment in selected organizations. These were compared to each other to determine their mutual weight. Finally, using these research methods, security and safety culture indicators were also identified and included in the defined security and safety culture sectors. The research needed to design a security and safety culture assessment model was realized in six selected organizations, which wanted to participate in the research. These were divided according to the size of the organization into two small, two medium, and two large organizations. Crucial element in our research was data collection conducted by means of controlled interviews and questionnaire surveys in these organizations. Based on this survey, indicators of security and safety culture could be identified. As a result of this, security and safety culture values are determined for all analyzed organizations. The conclusions will point up the possible way of evaluating security and safety culture in organizations and it also contains a specific example of their usage in the practice. Thus, by using the resulting values, it is possible to decide the further direction for the organizations, focusing on the sectors of the security and safety culture, which yielded unsatisfactory results.
      PubDate: 2022-06-01
      DOI: 10.1057/s41284-021-00291-5
       
  • An exploratory study of failed mass shootings in America

    • Free pre-print version: Loading...

      Abstract: Abstract The current study examines failed mass shootings in the United States between 2003 and 2018. This exploratory research provides a summary of failed mass shooting perpetrator and incident characteristics, drawing from crime script analysis to examine the preparation, attack, and conclusion stages, as well as points of failure. Findings indicate suicidal ideation, attack realities, and weapon preparedness may play a role in attack failures. Furthermore, situational crime prevention (SCP) techniques including target hardening and access control contributed to harm mitigation when individuals without legitimate access conducted attacks. Internal SCP measures, including lockdowns, place managers, and armed security, helped prevent victimization in open access or semi-protected locations once the perpetrator entered the building. A discussion of findings highlights implications for public safety and policy.
      PubDate: 2022-06-01
      DOI: 10.1057/s41284-020-00281-z
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.235.140.84
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-