Journal of Applied Security Research (J Appl Secur Res )


The Journal of Applied Security Research: Prevention and Response in Asset Protection, Terrorism and Violence (re-titled from the Journal of Security Education to reflect a more comprehensive focus) is a one-stop resource on security research, education, and training programs that will help scholars, educators, practitioners, and students meet the increasing need for security in the United States. The Journal is the official journal of the Academy of Criminal Justice Sciences and is affiliated with the Academy of Security Educators and Trainers and Protect New York -- a new academic organization representing faculty from a variety of disciplines and colleges and universities, including the State University of New York system, the journal presents the latest developments in theory, practice, research, and assessment with an emphasis on up-to-date methods, techniques, and technology.

  • Impact factor
  • 5-year impact
  • Cited half-life
  • Immediacy index
  • Eigenfactor
  • Article influence
  • Website
    Journal of Applied Security Research website
  • Other titles
    Journal of applied security research, Applied security research
  • ISSN
  • OCLC
  • Material type
    Periodical, Internet resource
  • Document type
    Journal / Magazine / Newspaper, Internet Resource

Publications in this journal

  • [Show abstract] [Hide abstract]
    ABSTRACT: The present research addresses the nature of the security guard industry in Singapore. In 2009, Singapore had 273 guard com- panies employing nearly 29,000 personnel, a number nearly three times that of police officers. In this study, we outline the regulatory framework for the unarmed security guard industry followed by a preliminary assessment of the security personnel views on their job scope and empowerment, organizational attributes, and satis- faction level regarding pay and benefits. Data for this research is drawn from a survey conducted in 2010 of 251 security guards. The respondents found satisfaction and meaning in their work and ex- perienced competent supervision though they appeared dissatisfied with pay and benefits. They also strongly believed that mandatory training was necessary for private security officers.
    Journal of Applied Security Research 01/2014; 9:41-56.
  • Journal of Applied Security Research 01/2013; 8:1-23.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Breaches involving private consumer data are gaining more attention with the increasing push towards electronic records, and the demand for freer access to data. In the medical field, these breaches assume greater significance as they involve private data, and are regulated in far greater measure. The health care industry stores vast amounts of data, and the opportunity for breaches is considerable. This article examines reported medical data breaches and identifies patterns in the data. The results provide insights into the nature of breaches, their frequency, and trends. Implications for health care organizations and individuals are discussed.
    Journal of Applied Security Research 12/2012; 8(1):61-79.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Data security breaches involving personal and sensitive information have significantly grown over the last few years. The stolen personal information—which includes social security number (SSN), medical records, date of birth, etc.—has been used to launch fraud against individuals and organizations. It already costs billions of dollars in the United States to detect and remediate consequences of security breaches which include identity theft frauds and lawsuits. It is estimated that on an average a company spends $2 million per data breach. With the increase in the rate of breaches, it has become equally important for organizations and individuals to understand the risks and take measures to safeguard personal information. This article investigates data security breaches, which accounted for about 26 million compromised records of personal information in the United States, to present the trends and risks that characterize the security breaches. The article categorizes the incident and loss trends into different dimensions including the industry, victim type, data type, and threats such as stolen computer, hacking and unauthorized access. The research can aid individuals and organizations understand the data breach, trends and evaluate their own risks in handling personal information, which will help them to make better and informed decisions to protect against data breaches.
    Journal of Applied Security Research 01/2012; 7(3):375.
  • [Show abstract] [Hide abstract]
    ABSTRACT: While the concept of security-in-depth or layered security has a long history, it still lacks clear definition, hampering attempts to identify the most effective target of security enhancement. A rigorous definition of security layer enables the development of useful principles to guide security investment. Risk minimization is best achieved by strengthening the layer that may already be the most effective, and by focusing on the weakest function within that layer. Moreover, security-in-depth relies not only on generating effective layers, but also on their coherent integration with maintenance, training, protocols and policies, all aligned with management structures and culture.
    Journal of Applied Security Research 07/2011; 6(3):372-393.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Much of the research on correctional officers over the past two decades has focused on job stress, job satisfaction, the job environment, and how demographic variables such as gender, race, health and family conflict influenced stress and job satisfaction. Because correctional staff is such an integral part of corrections, understanding job involvement and its impact on correctional employees is important, yet it has received little attention in the literature. Using survey data from a private correctional facility in the Midwest, the authors examined the effects of job involvement on job stress, job satisfaction, organizational commitment, absenteeism, and turnover intentions. A multivariate analysis indicated that job involvement had significant effects on all the predicted outcome variables.
    Journal of Applied Security Research 04/2011; 6(2):158-183.
  • [Show abstract] [Hide abstract]
    ABSTRACT: A recent increase in the number of threats against judges has led to the wider use of protective details to safeguard the judiciary. By applying content analysis methods to a random sample of news media accounts mentioning protective details for public figures from March 1999 to March 2009, this article explores (a) a possible relation between the level of intrusiveness of protective details and their success or failure as protective measures and (b) the implications of these findings for anyone requiring executive protection.
    Journal of Applied Security Research 04/2011; 6(2):209-246.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The dearth of research on spatial analyses for installation patterns and characteristics of residential burglar alarms exists in the crime prevention literature in general, and even a few existing studies are based on observational and anthropological approaches with little quantitative analyses. Spatially analytical approaches have not been used to examine the distribution and pattern of burglar alarms. With installation record of burglar alarms, spatial statistical techniques are used to examine spatial patterns of residential burglar alarms with demographic, socioeconomic, and housing characteristic variables. Various spatial analyses demonstrate that at a macro-level, many spatially concentrated areas of burglar alarm installation are observed, indicating that installation patterns of residential burglar alarms are not evenly distributed throughout the city. Such patterns occur depending on neighborhoods’ conditions such as demographic, socioeconomic, and housing characteristics. A higher black population and neighborhoods with a higher proportion of the younger population—ages below 17 years, lower unemployment rate, and higher proportion of black householders are among identified variables to explain spatial characteristics and patterns of burglar alarm installations. A feasible policy implication from the present study is that crime prevention communities (e.g., local governments, police department, private security companies) can utilize research findings to promote local communities and neighborhoods with property crime problems to use alarm systems as part of crime prevention efforts in conjunction with local crime data analysis.
    Journal of Applied Security Research 01/2011; 6(1):82-109.
  • Journal of Applied Security Research 01/2011;
  • [Show abstract] [Hide abstract]
    ABSTRACT: Electronic Security Screening (ESS), in addition to preventing a major disruption to the aviation industry after 1970, has produced social changes by providing positive protection for people and assets throughout the world. The sustained wave of hijackings in 1968–1972, which morphed into criminal extortion and political terrorism, could have disrupted or even destroyed the passenger airline business (as well as worldwide tourism). After five years, the Federal Aviation Administration (FAA) was finally able to resolve this new social phenomenon (aviation security) by a series of security measures required of the airlines and airports, of which ESS of airline passengers was the primary element. Historically, we have to thank two individuals, George W. Shepherd Jr. of Philips Government Systems who invented and built the Saferay, the first low-dose x-ray system for screening articles (handbags, luggage) and Malcolm Schwartz of Infinetics who built the first aviation walk-through metal detectors for passengers. Citizens of the United States (and the world) voluntarily submitted themselves to ESS (searches) in 1973 in order to resolve the aviation security issue. Today, forty years later, ESS remains basically unchanged—people still walk through metal detectors and hand-carried articles are still x-rayed.
    Journal of Applied Security Research 10/2010; 5(4):460-532.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Mixing a discussion of the law with a discussion of pedagogical methods, this article examines the source and scope of the international legal obligation to educate military members on the law of armed conflict (LOAC). United States Air Force officer candidate education systems serve as the vehicle to identify a quantitative and qualitative baseline LOAC education requirement and assess how such a baseline standard is met by Air Force officer commissioning sources. This article asserts that such a baseline is no longer sufficient for professional military officers engaged in modern armed conflicts. The quantitative and qualitative methodology employed by the United States Air Force Academy to achieve an aspirational level of LOAC education is offered as an example of what the new LOAC education baseline should become to properly instruct future officers for the unique nature of modern armed conflict.
    Journal of Applied Security Research 07/2010; 5(3):397-413.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The consequences of workplace violence are too great for organizations to be surprised by or unprepared to reduce the risk. Risk Assessment and Management (RAM) Teams offer employers proactive, coordinated, and planned strategies to identify and address troubling behaviors before they become violent. RAM Teams look to identify potential problems before they evolve into crises. They help coordinate intervention strategies that seek to promptly investigate, evaluate, and effectively respond to minimize the danger and the harm to their employees. RAM Teams reduce their organizations’ vulnerabilities by planning effective policies and procedures, employment practices, security measures, and prevention education. Building a successful RAM Team requires a clearly defined mission statement, senior management commitment, operational protocols, financial and material resources, talented and committed members, a team Champion, and minimal organizational resistance.
    Journal of Applied Security Research 04/2010; 5(2):159-175.
  • [Show abstract] [Hide abstract]
    ABSTRACT: In the last decade, a series of books have been published that have sparked the popular imagination. The Worst Case Scenario Survival Handbooks (Piven and Borgenich 199934. Piven , J. and Borgenich , D. 1999 . “ The worst-case scenario survival handbook ” . San Francisco, CA : Chronicle Books . View all references) deal with managing crisis situations from everyday domestic circumstances to travel and natural disasters and they have sold in the hundreds of thousands worldwide. They appeal to a human tendency to want to be forearmed and the desire to contemplate disaster from the perspective of a comfortable armchair. The same tendency to be fascinated and repulsed by tragedy was identified as fundamental to the human psyche by Aristotle over two millennia ago. “All tragedy creates pity and terror in the human observer.” This article addresses a fundamental problem: How is it possible for organizations to plan effectively for the worst-case scenario? It focuses on a basic dilemma for organizations wishing to establish effective protective measures to mitigate security risks, which can be identified as two propositions: (1) It is crucially important to find a cost-effective way of securing susceptible assets, but security measures implemented on the basis of unspecified risk may be both costly and counterproductive. (2) It is the nature of risk that past risk or crisis events may prove no adequate predictor of future risks.
    Journal of Applied Security Research 04/2010; 5(2):234-270.
  • [Show abstract] [Hide abstract]
    ABSTRACT: This article examines the current position of corporate security risk assessment focusing on how effectively and extensively the guidance of Turnbull, Sarbanes Oxley, and the Combined Code on Corporate Governance has been incorporated into practice. It examines the importance of an integrated approach and aims to set out the case for a more centralized role for the security management team within the corporate domain. It does this by presenting evidence from the literature and through discussion of the author's twenty years’ practical experience of security management and academic study of crisis risk and security management in such environments.
    Journal of Applied Security Research 01/2010; 5(1):138-152.
  • [Show abstract] [Hide abstract]
    ABSTRACT: This article deals with problems of personal safety and security in current times. It addresses a variety of dangerous situations and their prudent avoidance. Training and education for classes at risk are suggested, along with the kinds of professional help that may be sought and utilized.
    Journal of Applied Security Research 01/2010; 5(1):3-19.
  • [Show abstract] [Hide abstract]
    ABSTRACT: This article is about situational crime prevention in the (European) supply chain. It is based on a thorough analysis of two international supply chain security programs, and on the consequent observation that the security measures that form part of these programs can all be classified as situational techniques.One of the main conclusions of the research has been that an `ex ante' consideration of preventive measures, and a careful consideration of any interdependencies, may prove to be extremely beneficial to the success of future programming. The outcome of these considerations can be applied to rank potential interventions, and decide on the most promising and feasible one(s). In order to facilitate a thorough consideration of the effectiveness, efficiency and acceptability of potential measures, a series of ‘success indicators’ was developed.
    Journal of Applied Security Research 10/2009; 4(4):483-500.