Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract Effective information security management (ISM) is contingent on intra-organisational liaison (IOL) between security personnel and stakeholders in ISM processes. IOL is a set of activities undertaken by information security personnel to communicate with internal stakeholders to increase their participation and involvement in the ISM process. Unfortunately, IOL in many organisations tends to be undertaken in an ad hoc and informal manner rather than as part of a formal and systematic process. We argue that IOL activities should be planned and embedded into mainstream ISM practices. Our review of the relevant literature did not find ‘best practice’ guidelines on intra-organisational liaison (IOL) between security personnel and stakeholders in ISM. Based on findings from an in-depth exploratory study where we interviewed thirty-four information security professionals, we develop a novel framework that explains how intra-organisational liaison can be improved and specifically what IOL practices and activities are critical for effective communication with ISM stakeholders. PubDate: 2022-08-07
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract The menace of cultism is not fundamentally new, especially in the tertiary education system in Nigeria, but it has assumed a worrisome dimension going by the recent experiences in rural areas. This study examines the changing manifestation and extension of school cultism from university campuses to secondary schools in rural communities. Primary data was generated through non-participant observations and focus group discussions (FGD) conducted across twelve rural secondary schools in the study areas. Data analysis reveals that the emergence of cultism in rural secondary schools is closely tied to the infiltration of university students into secondary schools to hunt for recruits among younger students. The study concludes that secondary school cultism lowers the academic performance of students and threatens the security of host rural communities. It suggests the adoption of preventive security approaches in rural secondary schools, such as all-round fencing of school premises, installation of CCTV/technology-based monitoring system and the use of anti-cult groups in curbing the menace. PubDate: 2022-08-03
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract In criminal networks, facilitators seem to play a subordinate role in terms of low financial profit and high risk of being identified in police investigations. Their role is hypothesized to be explained by factors related to poverty or, broadly stated, deprivation. This study explores these factors in a social housing context. Through standardized interviews with employees of social housing institutions, factors distinguishing between facilitators and non-facilitators were identified through univariate and network analyses. Drug use, unemployability, stress, one-person household, and high crime rate neighborhood discriminated most. Financial problems, deviant social relations, impulsivity, social isolation, and low self-esteem also appeared to be relevant. The conclusion that deprivation-related vulnerabilities might increase the risk of becoming a facilitator provides leads for future interventions and research. PubDate: 2022-08-01
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract The objective was to evaluate the effectiveness of tabletop scenario exercises in improving threat management teams’ response to workplace violence. Twenty-two threat management teams (TMTs) from a large multinational manufacturing company participated in two tabletop scenario exercises, one of which presented a worker-on-worker bullying case and the other an interpersonal stalking scenario. TMTs assessed the level of the threat, which steps they should take first in the response, how quickly steps needed to be initiated, and who should be involved, following prescribed threat response and incident management protocols developed from security industry standards. Tabletop exercises improved the teams’ ability to correctly assess the scenario’s level of threat and the comprehensiveness of the response. Improvements were particularly noted for teams with smaller caseloads. Tabletop scenario exercises can be valuable tools for evaluating how companies respond to simulated threats of workplace violence and for identifying the successes and gaps in the response. PubDate: 2022-07-25
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract The article focuses on the notion of fake information as a tool of psychological influence in the context of hybrid wars. Works of the prominent academicians in the area of manipulation studies constitute the theoretical framework of this research. Empirical research methods such as observation, comparison, generalization and expert evaluation are used. First of all, types and methods of psychological influences used by mass media and social networks with a view to manipulate public opinions are distinguished. Moreover, the impact of emotions on the critical perception of the news is highlighted. The indicators of manipulative influence are defined in order to resist them. Besides, the ways of creating and distributing false information are described. In addition, the development of fakes identification mechanisms is considered a priority for the governmental and other public institutions. This is illustrated by a range of technologies developed to automatically detect fake news. Apart from that, the degrees of the information reliability are explored. Furthermore, structural elements of fake messages, which include the source and the message itself, are discussed. Misinformation of the public, promotion of certain opinions, encouragement of aggressive actions and instalment of doubts are singled out as the main tasks of fake information. Additionally, stages of countering fakes are distinguished. Finally, the specific features of the forensic expertise procedure are determined in order to provide information security in Ukraine. The research demonstrates the importance of an efficient security system, which would identify fake information and limit its propagation. PubDate: 2022-07-23
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract The present study aims at understanding what factors contribute to the explanation of online identity theft (OIT) victimization and fear, using the Routine Activity Theory (RAT). Additionally, it tries to uncover the influence of factors such as sociodemographic variables, offline fear of crime, and computer perception skills. Data for the present study were collected from a self-reported online survey administered to a sample of university students and staff (N = 832, 66% female). Concerning the OIT victimization, binary logistic regression analysis showed that those who do not used credit card had lower odds of becoming an OIT victim, and those who reported visiting risky contents presented higher odds of becoming an OIT victim. Moreover, males were less likely than females of being an OIT victim. In turn, fear of OIT was explained by socioeconomic status (negatively associated), education (positively associated) and by fear of crime in general (positively associated). In addition, subjects who reported more online interaction with strangers were less fearful, and those reported more avoiding behaviors reported higher levels of fear of OIT. Finally, subjects with higher computer skills are less fearful. These results will be discussed in the line of routine activities approach and implications for online preventive behaviors will be outlined. PubDate: 2022-07-21
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract In the last three decades, East Africa has turned into a crucial arena in the fight against transnational Islamist terrorism, harbouring Al-Qa’ida’s leadership and subsequently giving rise to one of the most active organisations, Al-Shabaab. Much has been written on jihadism in the region. However, the scholarship still lacks a comprehensive historical analysis shedding light on the dynamics that have favoured its survival and development. This article fills such a gap, reviewing the evolution of transnational Islamist terrorism in East Africa from the early 1990s up to the present day. The article sheds light on the realpolitik of East African terrorism, showing how militants have consistently sought to adapt to and exploit (1) the political morphology of the region and (2) emerging tensions between local groups and national authorities to survive setbacks, expand their influence and gain supporters. The article concludes by arguing that tackling social and political fractures on the ground is of fundamental importance to effectively dismantle terror networks and fight instability in the region. PubDate: 2022-07-19
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract Although numerous studies on cybercrime have been undertaken, very little is known about the BEC scam and its effects on economic sustainability in Nigeria. Using data collected via various methods, this study examines the implications of the BEC scam as cyber victimization on the economic infrastructure of corporate organizations in Cross River State, Nigeria. A specifically structured questionnaire and an in-depth interview with staff (n = 1087) was conducted and the data received were analyzed using descriptive statistics, logistic regression, and content analysis. Findings revealed that BEC victimization is increasing, and has adversely affected such corporate organizations as banks, telecommunications firms, and manufacturing companies. The organization one works for is an important factor in determining one’s vulnerability to BEC scamming. Therefore, a multilateral cybersecurity and cyber-intelligence relationship between the various corporations and government departments is necessary for adequate protection of critical infrastructures. This multi-sectoral approach to cyber-law enforcement requires the installation of uncompromised internal physical and digital access control in order to strengthen targets. This demands robust organizational cyberspace surveillance to complement the existing government counter-cybercrime implementations. PubDate: 2022-06-16
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract The work of private detectives is a young profession in Slovenia. It has only existed for about three decades, and as such has been rarely researched. So far there has been no study on what Slovenian private detectives actually do in the framework of the tasks that are stipulated by law. Therefore, the aim of a survey presented in the article is to find out what private detectives do on a daily basis and what competences they need to perform their tasks. Since there are only around 90 private detectives in Slovenia, they must all have good knowledge of several areas simultaneously. However, our survey suggests that based on the work tasks performed, Slovenian private detectives can be classified into three groups – “business-oriented private detectives,” “typical private detectives” and “multitasking private detectives”. For every task they perform, private detectives need certain general and specific competences. The private detectives who participated in this study agree that they must be able to collect and generate important information from a large amount of data, be IT literate and very self-disciplined. Additionally, they must have extensive legal knowledge and organizational skills. The least important skills for private detectives, in their opinion, are public speaking and martial arts. The only difference found among the groups used to classify private detectives is the importance of analysing large amounts of data. Bearing in mind the findings of the study, it is clear that more work is available for those private detectives who can perform a broader spectrum of tasks and possess more competences. PubDate: 2022-06-13
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract There is an increase in violent clashes between Herdsmen and Farmers in Nigeria. Along with it, there is a growing amount of research that specifically investigates the conflict. Existing research on this topic mostly employed content analysis to understand media coverage of the conflict and often ignored the conflict victims’ perceptions of media performance regarding coverage of the conflict. This study extends previous studies by examining both media reporting and conflict victims’ viewpoints on the coverages. We used a mixed method approach, which combined a quantitative content analysis of news reports and semi-structured interviews with the conflict victims. Our results suggested that both analyses revealed consistent findings. Three key findings were obtained: low prominence, lack of objectivity, and excessive use of negative language/framing of the conflict. Theoretical implications suggested support for the assumption of Agenda Setting Theory in discussing the influence of the media on news prominence and news sources used and Social Responsibility Theory in explaining the journalists’ lack of objectivity and excessive use of negative framing when reporting the conflict. The managerial implication includes our recommendation for conflict reporting in Nigeria to embrace peace journalism. PubDate: 2022-06-01 DOI: 10.1057/s41284-020-00280-0
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract Shoplifting is a growing problem for all stores. Following a 300% increase in the number shopping malls in the past decade, Turkey had 375 malls by 2016, with shoplifting becoming an important issue. This study investigates the use of CPTED-based approaches to prevent shoplifting in Istanbul and is the first such study in Turkey. Data were collected from 389 store managers and shopping mall managers in Istanbul via a structured, self-explanatory questionnaire in face-to-face interviews at stores in shopping malls. The results revealed that among different CPTED-based approaches, stores mostly prefer video cameras and electronic alarm tags for shoplifting prevention. The study identified six factors predicting the use of CPTED approaches: Factor 1—Informal/Natural Surveillance, Factor 2—Target Hardening & Mechanical Surveillance, Factor 3—Territoriality, Factor 4—Access Control, Factor 5—Formal/Organized Surveillance, and Factor 6—Image/Maintenance. These results provide important insights regarding differences using CPTED techniques in terms of store and shopping mall characteristics in Istanbul. PubDate: 2022-06-01 DOI: 10.1057/s41284-021-00283-5
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract The current study aimed to investigate the association of neighbourhood safety in three levels with children’s physical activity. These levels include parental perception and children’s perception as subjective measurements and reported rates of crime and traffic as objective measurements. 1421 questionnaires were distributed in primary schools among eligible children and their parents in Bandar Abbas city, Iran. Boys were more active than girls, but the level of physical activity in children was generally low. Parents were more concerned about neighbourhood safety compared with their children. Both subjective and objective measurements of safety contributed with children’s physical activity. Policymakers and designers should develop environments where both parents and children perceive as having sufficient levels of safety and consider interventions for reducing crime and traffic rates so as to increase children’s physical activity. PubDate: 2022-06-01 DOI: 10.1057/s41284-020-00278-8
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract Co-offending is a common phenomenon in criminology. In previous years, countless studies have contributed to describing the co-offending cooperator's selection process. It has been established that personal characteristics such as age, sex, social/economic status, social/spatial distance, and so on play important roles in co-offender group formation; however, the geographic background of members of the co-offending groups has not received much attention. This study analyzes the assumption that the offender's hometown's homophily enhances co-offending generation and that the size of the offender population of the same hometown (OPSH) would positively impact co-offending formation. To test this, two types of co-offending connections, cross-hometown co-offending (CHCO) and homophily-hometown co-offending (HHCO), are defined respectively, and residential burglary reporting data from Beijing Police from 2005 to 2014 are utilized to investigate the relationship between co-offenders from their hometown backgrounds. The results indicate that HHCO cooperation is more likely to be generated for those who come from large OPSHs, while conversely a large proportion of CHCO cooperation is generated for smaller OPSHs. Additionally, large OPSHs have diverse co-offending connections and attract more partners from the smaller OPSHs, suggesting their more centralized role in co-offending networks. PubDate: 2022-06-01 DOI: 10.1057/s41284-021-00290-6
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract This paper aims to evaluate the cyber security culture readiness of organizations from different countries and business domains when teleworking became a necessity due to the COVID-19 crisis. We have designed a targeted questionnaire and conducted a web-based survey addressing employees while working from home during the COVID-19 spread over the globe. The questionnaire contained no more than 23 questions and was available for almost a month, from 7th April 2020 until 3rd May 2020. During that period, 264 participants from 13 European countries spent approximately 8 minutes to answer it. Gathered data were analyzed from different perspectives leading to evolutionary findings regarding information security readiness and resilience of both individuals and organizations. In this paper, results are being presented and discussed in detail while focusing on future scientific routes and research paths that need to be explored. It concludes on a number of cyber security recommendations addressing both the emerged vulnerabilities and the need for security culture evolution. PubDate: 2022-06-01 DOI: 10.1057/s41284-021-00286-2
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract When visiting universities during recruitment tours, many students and parents want to know if the student will be ‘safe’ while attending the institution. This paper uses a qualitative examination of security at a Canadian university to argue that the increase in security measures on campuses is driven by both the desire to provide physical security and the pressure from the increasing corporatization of academia to use security as a recruitment and retention tool. These goals can be served by the same security measures or compete for budgetary priority. Overall, this study demonstrates how the concepts of corporatization, institutional risk management, security theatre, and university branding are present in how the university designs security policies and brands itself as a ‘safe’ environment, and how this can leave students wanting. PubDate: 2022-06-01 DOI: 10.1057/s41284-021-00293-3
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract Residential burglary in the United States has declined by over 80% across the last four decades, representing a major social phenomenon that remains largely unexplained. International research indicates a need for investigation of the security hypothesis. Here, 50 years of studies are examined chronologically. A consistent narrative emerges which indicates that household security, largely absent in the 1970s, improved gradually over time. Improvement occurred via several mechanisms: the increased prevalence, quality, coverage, and routine use of security fixtures and fittings. In addition, crime displacement declined over time as fewer households offered easy crime opportunities, and the average age of burglars increased as juveniles found burglary increasingly difficult. Hence the study concludes that gradual household security improvements played a central role in the decline in residential burglary. While the findings suggest a considerable revison is needed to our understanding of burglary and burglars, the likelihood that 50 years of diverse burglary research points in the same direction by chance, and without significant contrary evidence, seems remote. Further implications for theory, policy, and research are identified. PubDate: 2022-06-01 DOI: 10.1057/s41284-021-00284-4
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract In the last few years, under the influence of various circumstances, the demand for the private security industry has increased in Serbia. The aim of this research is to examine the extent and quality of cooperation between members of the public and private security sector as the mutual perception of its members because their relations are important for establishing a safe environment for citizens. The survey was conducted from February to June 2019 using a questionnaire among 190 police officers and 178 security personnel. The results of this research showed that mutual relations between the private security personnel and police officers are satisfactory, but also that members of private security look at these relations from a brighter side and have a very positive attitude towards members of the police, while members of the police view these relations more negatively. The results of this research can be used for planning campaigns to improve the relationships between police officers and security personnel. PubDate: 2022-06-01 DOI: 10.1057/s41284-021-00289-z
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract The Fourth Industrial Revolution has combined traditional industry with information and communication technology, leading to appearance of converged security risks. Although this problem is receiving substantial attention, the supply of industrial security experts is still low compared to demand and lacks occupational classification system which enables systematic education and manpower training system. This study presents occupation and basic tasks required for industrial security workforce. Occupations and occupational clusters are classified by adopting big data text mining technique—Latent Dirichlet Allocation topic modeling to analyze a massive dataset analyzed from job openings of industrial security field. Next, inter-coder reliability analysis was conducted to verify validity and reliability. Specifically, survey was further conducted for validity verification and factor analysis was performed for reliability verification. PubDate: 2022-06-01 DOI: 10.1057/s41284-020-00279-7
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract Security and safety culture is an increasingly important term in assessing the security and safety of organizations. It is an internal security and safety factor of an organization that can directly influence its overall security and safety. In many cases, however, organizations do not know, nor do they have a way of assessing the level of their security and safety culture. It is therefore necessary to know the content, elements, and sectors in which it can be identified in order to gain a deeper knowledge of security and safety culture in more detail and be able to examine it. Firstly, we focused on creating a model for evaluating the safety and safety culture and its application in selected organizations. Secondly, we devoted to the description and design of an organization’s security and safety culture assessment model. The proposed model is based on the identification of subsectors and indicators of security and safety culture that will gain their value by using information obtained from combining the four proposed methods. Accordingly, six security and safety culture sectors were defined for the purposes of security and safety culture assessment in selected organizations. These were compared to each other to determine their mutual weight. Finally, using these research methods, security and safety culture indicators were also identified and included in the defined security and safety culture sectors. The research needed to design a security and safety culture assessment model was realized in six selected organizations, which wanted to participate in the research. These were divided according to the size of the organization into two small, two medium, and two large organizations. Crucial element in our research was data collection conducted by means of controlled interviews and questionnaire surveys in these organizations. Based on this survey, indicators of security and safety culture could be identified. As a result of this, security and safety culture values are determined for all analyzed organizations. The conclusions will point up the possible way of evaluating security and safety culture in organizations and it also contains a specific example of their usage in the practice. Thus, by using the resulting values, it is possible to decide the further direction for the organizations, focusing on the sectors of the security and safety culture, which yielded unsatisfactory results. PubDate: 2022-06-01 DOI: 10.1057/s41284-021-00291-5
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Abstract The current study examines failed mass shootings in the United States between 2003 and 2018. This exploratory research provides a summary of failed mass shooting perpetrator and incident characteristics, drawing from crime script analysis to examine the preparation, attack, and conclusion stages, as well as points of failure. Findings indicate suicidal ideation, attack realities, and weapon preparedness may play a role in attack failures. Furthermore, situational crime prevention (SCP) techniques including target hardening and access control contributed to harm mitigation when individuals without legitimate access conducted attacks. Internal SCP measures, including lockdowns, place managers, and armed security, helped prevent victimization in open access or semi-protected locations once the perpetrator entered the building. A discussion of findings highlights implications for public safety and policy. PubDate: 2022-06-01 DOI: 10.1057/s41284-020-00281-z