Journal of Applied Security Research Impact Factor & Information

Publisher: Taylor & Francis (Routledge)

Journal description

The Journal of Applied Security Research: Prevention and Response in Asset Protection, Terrorism and Violence (re-titled from the Journal of Security Education to reflect a more comprehensive focus) is a one-stop resource on security research, education, and training programs that will help scholars, educators, practitioners, and students meet the increasing need for security in the United States. The Journal is the official journal of the Academy of Criminal Justice Sciences and is affiliated with the Academy of Security Educators and Trainers and Protect New York -- a new academic organization representing faculty from a variety of disciplines and colleges and universities, including the State University of New York system, the journal presents the latest developments in theory, practice, research, and assessment with an emphasis on up-to-date methods, techniques, and technology.

Current impact factor: 0.00

Impact Factor Rankings

Additional details

5-year impact 0.00
Cited half-life 0.00
Immediacy index 0.00
Eigenfactor 0.00
Article influence 0.00
Website Journal of Applied Security Research website
Other titles Journal of applied security research, Applied security research
ISSN 1936-1610
OCLC 85481760
Material type Periodical, Internet resource
Document type Journal / Magazine / Newspaper, Internet Resource

Publisher details

Taylor & Francis (Routledge)

  • Pre-print
    • Author can archive a pre-print version
  • Post-print
    • Author can archive a post-print version
  • Conditions
    • Some individual journals may have policies prohibiting pre-print archiving
    • On author's personal website or departmental website immediately
    • On institutional repository or subject-based repository after a 18 months embargo
    • Publisher's version/PDF cannot be used
    • On a non-profit server
    • Published source must be acknowledged
    • Must link to publisher version
    • Set statements to accompany deposits (see policy)
    • The publisher will deposit in on behalf of authors to a designated institutional repository including PubMed Central, where a deposit agreement exists with the repository
    • SSH: Social Science and Humanities
    • Publisher last contacted on 25/03/2014
    • This policy is an exception to the default policies of 'Taylor & Francis (Routledge)'
  • Classification

Publications in this journal

  • [Show abstract] [Hide abstract]
    ABSTRACT: Secret sharing scheme creates an effective method to safeguard a secret by dividing it among several participants. By using cryptographic hash functions and the herding hashes technique, Chum and Zhang proposed a simple and efficient secret sharing scheme. In this article, we implement such scheme by several examples, namely, a general (t, n) threshold scheme, a one-weighted (t, n) threshold scheme, a multisecret scheme, a verifiable (t, n) threshold scheme, and a proactive scheme. We conduct a performance comparison study and find that the hash-based threshold scheme setup is two times, and secret recovery is six times faster than Shamir threshold scheme.
    Journal of Applied Security Research 07/2015; 10(4):00-00. DOI:10.1080/19361610.2015.1069639

  • Journal of Applied Security Research 07/2015; DOI:10.1080/19361610.2015.1069532
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this article, Critical Race Theory (CRT) is employed as a pedagogical tool to help students understand themselves as well as the standards and virtues used in American society to judge others. A solid understanding of race, culture, and ethnicity and how these factors intersect is critical in the fields of emergency management, security studies and homeland security. Such an understanding will afford educators, students, and practitioners the opportunity to view and value the multiple strengths culture and racial background bring to the continued development of communities. In this article, we discuss how an understanding of ethnicity, culture, and race in recognizing one's own raciality can enhance a practitioner's education and experiences in the field prior to graduation, in one's career after graduation as well as for life-long learning. Specifically, the use of CRT in academic, training, and community-based settings via broad curricular modules, along with a Social Justice Ally (SJA) framework for purposeful action, will lead to a greater understanding of one's role in the community as an emergency manager, homeland security, or security professional. This article proposes techniques for addressing cultural diversity on the microlevel in the classroom or during training exercises. Arguably, programs and training exercises that couple CRT and a SJA perspective, will graduate/certify students with a more complete set of skills in order to enhance their effectiveness as policy makers, emergency management community-based practitioners, and homeland security and security professionals of the next generation.
    Journal of Applied Security Research 07/2015; 10(4):00-00. DOI:10.1080/19361610.2015.1069542
  • [Show abstract] [Hide abstract]
    ABSTRACT: One of the major problems faced in today's fast growing ever-expanding Internet world is user authentication. The common method which is based exclusively on username–password has several issues. Some of the issues include loss of password, growing prowess of hackers, and easy access to methods such as phishing and usage of bots. One of the available methods for authentication includes the usage of biometrics as a method to authenticate the user. The method specified in this article is based on keystroke dynamics. A new keystroke algorithm is proposed to make the authentication procedure more secure, reliable, and cheap.
    Journal of Applied Security Research 07/2015; 10(3):375-384. DOI:10.1080/19361610.2015.1038767

  • Journal of Applied Security Research 07/2015; 10(3):411-426. DOI:10.1080/19361610.2015.1025212

  • Journal of Applied Security Research 07/2015; 10(3):308-316. DOI:10.1080/19361610.2015.1038765
  • [Show abstract] [Hide abstract]
    ABSTRACT: One major issue the Ghanaian state has been grappling with is the upsurge in farmer-herders' conflicts. One of such instance is the conflict between the Konkomba and Fulani ethnic groups in Gushiegu, Northern Ghana. On December 7, 2011, the Konkomba and Fulani ethnic groups in Gushiegu engaged in conflict that resulted in killings, destruction, and expulsion. The pertinent questions that arose from the conflict are: (a) What triggered a conflict between the two groups? (b) How was the crisis resolved? and (c) What are the lessons learned? Employing fieldwork conducted in Gushiegu, this study undertakes an analysis of the phenomenon of farmer–herder conflict in Ghana.
    Journal of Applied Security Research 07/2015; 10(3):330-340. DOI:10.1080/19361610.2015.1038763
  • [Show abstract] [Hide abstract]
    ABSTRACT: A misconception has emerged in the empirical literature about the nature of the relationship between politics and Islam. It has been assumed that Islam, based on specific features in the Islamic religion and culture, had dominated politics in the Middle East, thus Islamic movements and formations have been responsible for the increase of political use of Islam overlooking the role of the state in pushing religion into the political domain. This article attempts to analyze the reasons of why political instrumentalization of Islam increases in the Syrian violent conflict showing that the prominence of Islamic rhetoric does not owe to specific features of the Islamic religion and culture but rather to the exploitation of religion in mobilization, contestation, and outbidding processes. Politics dominate religion in the Syrian conflict. Political instrumentalization of Islam is more likely to remain on the rise in the Syrian violent crisis causing serious implications on peace building and leading to a political vicious cycle that increases radicalization, deepens division, and hampers political development toward political reconciliation. The state instrumentalized religion from the early days of the uprising. Insurgent formations have become fragmented based on Islamic interpretations. Foreignism and interventionism contributed to the prominence of religion.
    Journal of Applied Security Research 07/2015; 10(3):341-361. DOI:10.1080/19361610.2015.1038769

  • Journal of Applied Security Research 07/2015; 10(3):362-374. DOI:10.1080/19361610.2015.1038766
  • [Show abstract] [Hide abstract]
    ABSTRACT: Drawing upon Cognitive Resources Theory (CRT), this article examines the collective performance and leadership effectiveness of U.S. Navy SEALs. CRT postulates that stress runs contrary to rationality. It impedes the capacity of a group to operate logically and analytically, and it affects both leadership and group performance. “Cognitive resources” designate the combined skills of group members and the leader's experience and decision-making faculties. An important conclusion is that “cognitive resources” are vital to the Navy SEALs. In addition to being intelligent, experienced, and skilled, SEAL leaders have to be supported by their teams. Indeed, responsible group performance is mirrored in unparalleled selflessness that is observed, for example, in the Navy SEAL Team Six—the one that killed Osama bin Laden. CRT also posits that effective leaders must be able to withstand high stress. Under these circumstances, U.S. Navy SEALs, as a whole, must have adequate “cognitive resources.”
    Journal of Applied Security Research 07/2015; 10(3):317-329. DOI:10.1080/19361610.2015.1038764
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Adequately addressing security concerns within public transportation will become a pressing issue over the next decade. These safety concerns frequently relate to terrorism, crime, and general disorder within public transportation with little systematic analysis directed toward transit locations. The given study geocoded 2 years of outdoor crime data within a midsized city and found the main bus terminal and three bus stop locations generated the highest levels of concentrated crime. Nonparticipatory windshield survey site observations were conducted at each location to qualitatively identify attributes that were possibly generating general disorder and crime incidents within these hot-spots. Implications for the criminology of place are discussed along with policing/security strategies for specific locations that facilitate an unusually high amount of official crime.
    Journal of Applied Security Research 07/2015; 10(3):277-307. DOI:10.1080/19361610.2015.1038762
  • [Show abstract] [Hide abstract]
    ABSTRACT: The continued transference of electronic waste from industrialized nations to nations in the global south is a contributor to not only health and environmental risks, but also security threats. Cybercrime is estimated to cost the global economy over $375 billion dollars annually, and an increasing number of cybercrimes are originating in West Africa. This research note explores the relationship between e-waste and cybercrime in Ghana and Nigeria, and the serious implications regarding cybersecurity in the age of globalization.
    Journal of Applied Security Research 04/2015; 10(2):207-220. DOI:10.1080/19361610.2015.1004511
  • [Show abstract] [Hide abstract]
    ABSTRACT: Many methods have been introduced to establish a secure multicast communication between different nodes in the network, but these methods have not achieved the secured data transfer. This article explains the most significant way for the key distribution among the nodes, so that any outside infringement won't be able to access the data as well as the key. It uses different algorithms for secure data transfer. Self-healing technique is being used so that when the key is lost, the group members can recover the key by themselves and unnecessary interactions with the group manager can be avoided, which saves additional cost and reduces traffic.
    Journal of Applied Security Research 04/2015; 10(2):221-237. DOI:10.1080/19361610.2015.1004512
  • [Show abstract] [Hide abstract]
    ABSTRACT: Throughout 2008, the multifactional Palestinian armed movement initiated a series of attacks targeting the commercial, humanitarian, and industrial crossings encircling the Gaza Strip. Over the course of 3 months, at least 11 attacks were carried out targeting Gaza's crossing points. Following each strike, an element of critical infrastructure was affected, and as a result, discontinued operations harming the entirety of the resource-deprived Gazan population. In establishing why the attacks were carried out and their impact on the wider conflict, a unique analytical lens must be employed that expands the understanding of benefits and sanctions. Whereas in traditional cost-benefit calculations, a group is less likely to attack a target that will result in the discontinuation of essential services, in the Gazan arena, Palestinian reliance on Israeli critical infrastructure has not historically served to protect such systems from attack. The consistent Palestinian-led initiatives targeting the Gazan infrastructure demonstrate the difficulty in protecting critical systems maintained by a foreign entity—the State of Israel—in its capacity as an occupying power. Despite the fact that Palestinian attacks lead to a cessation of services, and despite such stoppage's negative effects, the Palestinian population's material needs have not served to protect the Israeli facilities.
    Journal of Applied Security Research 04/2015; 10(2):267-276. DOI:10.1080/19361610.2015.1004607
  • [Show abstract] [Hide abstract]
    ABSTRACT: Research efforts on the unending insecurity in Nigeria showed that lapses exist in the job role designed and values the physical protection security agents and agencies hold for the job. These had called for providing a job placement factor yard stick with built-in criterion for operatives’ passion and skills for the job. The attempt yielded an 84 factor-item sentence questionnaire with reliability of 0.75 as recommended instrument for selecting Nigerians to security duties. The present case study adopted the data generated by this scale for further analysis. This article gave explanations on how the factor point weights were derived and could be translated to prices befitting each level of performance of guards, supervisors, officers, advisers, and managers in all spheres of security protection services. The information obtained indicates an eye opener to satisfactory measure of job performance for workers. With this confidence set in, the yardstick could hold value for job employment of Nigerians to meet the societal security expectations.
    Journal of Applied Security Research 04/2015; 10(2):249-266. DOI:10.1080/19361610.2015.1004510
  • [Show abstract] [Hide abstract]
    ABSTRACT: This article deals with modeling hacktivism. The methodological approach—system dynamics—is described. Concept of hacktivism is analyzed in relation to various dimensions of the use of this term. The model of hacktivism is explained. The core of this model is formed by an adapted risk equation and then expanded upon using causal feedback loops. The authors come to conclusion that system dynamics model is useful in the field of cybersecurity research, however, further work on this scientific approach is necessary.
    Journal of Applied Security Research 04/2015; 10(2):238-248. DOI:10.1080/19361610.2015.1004514
  • [Show abstract] [Hide abstract]
    ABSTRACT: Are people more likely to reveal secret information when in physical pain? To investigate, participants played a game that was designed to be a proxy of an interrogation scenario. As part of the game, participants were instructed to keep specific information hidden from an opponent. Participants played the game with their hand fully submerged in varying temperatures of ice water (a cold pressor test). Further, their opponent (actually a confederate) verbally pressured them to reveal the information. Participants could choose to give false information to their opponent, true information, or a combination of both; each decision had various advantages and disadvantages in the game. Results suggested that participants were more likely to either give false information or reveal the secret information when under the highest levels of pain (colder water temperatures) compared to when experiencing less pain. This study can inform our understanding of the efficacy of coercion in interrogation scenarios.
    Society for Personality and Social Psychology, Long Beach, CA; 02/2015
  • [Show abstract] [Hide abstract]
    ABSTRACT: Boko Haram's domestic terrorist activities, which are mostly localized in the North-East region of Nigeria, have remained a threat to the security of the country since 2009. As a way of drawing attention to itself, the group has launched and still launches deadly campaigns in which large numbers of civilians and security forces are killed and kidnapped. Quite recently, in the second half of 2014, their method has extended to violently taking over towns and territories, hoisting their flag, exercising control, and imposing Sharia in those areas. To understand how Boko Haram's domestic terrorism came to be such a Gordian knot in Nigeria's contemporary security situation, one should have a grasp of the region's realities and the political and economic histories that have caused and conditioned them. This working article argues that Boko Haram's domestic terrorism activities in the North-East region of Nigeria since December 2009 prepared the fertile ground for the growth of terrorism in the region.
    Journal of Applied Security Research 01/2015; 10(1):121-146. DOI:10.1080/19361610.2015.972289