Journal of Applied Security Research (J Appl Secur Res)

Publisher: Taylor & Francis (Routledge)

Journal description

The Journal of Applied Security Research: Prevention and Response in Asset Protection, Terrorism and Violence (re-titled from the Journal of Security Education to reflect a more comprehensive focus) is a one-stop resource on security research, education, and training programs that will help scholars, educators, practitioners, and students meet the increasing need for security in the United States. The Journal is the official journal of the Academy of Criminal Justice Sciences and is affiliated with the Academy of Security Educators and Trainers and Protect New York -- a new academic organization representing faculty from a variety of disciplines and colleges and universities, including the State University of New York system, the journal presents the latest developments in theory, practice, research, and assessment with an emphasis on up-to-date methods, techniques, and technology.

Current impact factor: 0.00

Impact Factor Rankings

Additional details

5-year impact 0.00
Cited half-life 0.00
Immediacy index 0.00
Eigenfactor 0.00
Article influence 0.00
Website Journal of Applied Security Research website
Other titles Journal of applied security research, Applied security research
ISSN 1936-1610
OCLC 85481760
Material type Periodical, Internet resource
Document type Journal / Magazine / Newspaper, Internet Resource

Publisher details

Taylor & Francis (Routledge)

  • Pre-print
    • Author can archive a pre-print version
  • Post-print
    • Author can archive a post-print version
  • Conditions
    • Some individual journals may have policies prohibiting pre-print archiving
    • On author's personal website or departmental website immediately
    • On institutional repository or subject-based repository after a 18 months embargo
    • Publisher's version/PDF cannot be used
    • On a non-profit server
    • Published source must be acknowledged
    • Must link to publisher version
    • Set statements to accompany deposits (see policy)
    • The publisher will deposit in on behalf of authors to a designated institutional repository including PubMed Central, where a deposit agreement exists with the repository
    • SSH: Social Science and Humanities
    • Publisher last contacted on 25/03/2014
    • This policy is an exception to the default policies of 'Taylor & Francis (Routledge)'
  • Classification
    green

Publications in this journal

  • [Show abstract] [Hide abstract]
    ABSTRACT: Using the principles of thermodynamics for analogical purposes, this article seeks to answer the following question: What can the principles of thermodynamics reveal about the effects of cross-border migration and Boko Haram crisis on security challenges in Africa? The increase in the intensity of terrorist attacks by Boko Haram and the responses of government security forces to curb the situation in Nigeria has resulted in internal displacement of people and the movement of affected people in Northern Nigeria to neighboring African countries such as Niger, Cameroon, and Chad. Consequently, this article uses the principles of thermodynamics in the physical sciences to explain the likely security-related consequences of cross-border migration as a result of Boko Haram activities in Northern Nigeria. Some thermodynamics concepts used in this article include heat transfer, thermal equilibrium, exothermic reaction, and entropy. The major argument of the article is that the persistence of cross-border migration as a result of Boko Haram activities portends dangerous security challenges for African countries especially Nigeria's border countries in the future. It is, therefore, pertinent that effective strategies be identified locally and internationally to curb the activities of the Boko Haram group.
    No preview · Article · Jan 2016 · Journal of Applied Security Research
  • [Show abstract] [Hide abstract]
    ABSTRACT: In the 54 years since Nigeria's independence, the country has not had political leadership that could foster national cohesion among its citizens. Currently, a relatively small group has taken up arms to challenge the authority of the state. When one views Nigeria's experience with extremism through a wide-angled lens, one would see that its rise and continued presence are the consequences of the coming together of a number of circumstances. Affected areas in the North-East region of the country will not be able to make economic and social progress unless the various groups that have taken up arms against the state are made to abide by the laws of the land. History has played an important role, as has public policy, in bringing about this situation. International policies have been equally important. Although the Nigerian federal Government headed by President Goodluck Ebele Jonathan, which came into power on May 29, 2009, identified extremism and economy as public policy priorities, it has been wavering in dealing with extremism. There is need for well-defined approaches to countering extremism, followed through robustly and as the situation demands in order for this existential threat to Nigeria to be fully addressed.
    No preview · Article · Jan 2016 · Journal of Applied Security Research
  • [Show abstract] [Hide abstract]
    ABSTRACT: The phrase “design thinking” stands for design-specific cognitive activities that designers apply during the process of designing; it is progressively used to mean the human-centered “open” problem solving procedure. It has been used widely in the industry and business, in particular Systems, Applications, and Products in Data Processing, to satisfy customer needs. Design thinking has an increasing influence on 21st century education across disciplines. This work introduces cryptography curriculum using a design thinking model. The work was introduced in Spring 2014 and is for graduate levels. The course evaluations show high level of student sympathetic, and improvement in their abilities in solving complex problems.
    No preview · Article · Jan 2016 · Journal of Applied Security Research
  • [Show abstract] [Hide abstract]
    ABSTRACT: The plight of private security workers in Nigeria has mostly been gruesome. These plights are mostly unguarded and unrecorded for them on many issues confronting their future, hence, the job looked indeterminate. The discrepancies often involve or occasioned in pay received by security operatives which has been extensively mentioned. Pay packages for security guards differ across borders, and these vary largely across the various levels of security operations. This trend has led to security employees seeking employment in other sectors of the economy which guarantees less risk and more financial incentive. In order to motivate security operatives for work, the present study tried to advocate a convenience goal at getting them to a structured salary scale position through the starting point of median pay. The result revealed that the calculated mean pay values for the five categories of security workers from the median pay levels and steps were possible and a flexible way to prepare the prototype and new pay scales. They presented values in five levels and steps, which equally correspond to individual aggregate point weight brackets deemed satisfactory. The flexibility is seen as good procedures for preparing the operatives’ salaries. The outcome is therefore crucial to psychosocial and economic development in Nigeria.
    No preview · Article · Jan 2016 · Journal of Applied Security Research
  • [Show abstract] [Hide abstract]
    ABSTRACT: This article examines visual motifs in Islamist terrorism based on Conceptual Metaphor Theory, a theory using three key categories of metaphors (structural, orientational, and ontological metaphors). These metaphors are applied to three case studies to show how visual motifs can be used by Islamists to manipulate their audiences. The case studies are the symbols of (a) the waterfall, (b) the hand, and (c) the color black. Overall, in this analysis, an essential deduction from Islamist visual motifs is that metaphors are a principal conceptual system for Islamists. Metaphors are their main conduit for categorizing what they see in their universe and how they perceive both their in-group members and outside groups (e.g., infidels).
    No preview · Article · Jan 2016 · Journal of Applied Security Research
  • [Show abstract] [Hide abstract]
    ABSTRACT: Although professional police forces in the western world were developed owing in large part to the need for agencies capable of handling violent crowds and riots, the ability of police agencies to control riots remains questionable. The present work provides an overview of the nature of crowd violence, a brief description of the historical evolution of crowd violence in the United States, the role law enforcement agencies played in incidents of crowd violence, and broad theoretically informed policy recommendations for the handling of crowds and crowd violence. Building upon this review of the history of rioting in the United States and extant empirical research pertinent to crowds, group dynamics, and rioting, it is suggested that constant police professionalism and just treatment of the citizenry by police officers, thorough planning and preparation for crowd events, engagement of crowds, and rapid identification and removal of individual troublemakers may help reduce the potential for crowd violence.
    No preview · Article · Jul 2015 · Journal of Applied Security Research
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this article, Critical Race Theory (CRT) is employed as a pedagogical tool to help students understand themselves as well as the standards and virtues used in American society to judge others. A solid understanding of race, culture, and ethnicity and how these factors intersect is critical in the fields of emergency management, security studies and homeland security. Such an understanding will afford educators, students, and practitioners the opportunity to view and value the multiple strengths culture and racial background bring to the continued development of communities. In this article, we discuss how an understanding of ethnicity, culture, and race in recognizing one's own raciality can enhance a practitioner's education and experiences in the field prior to graduation, in one's career after graduation as well as for life-long learning. Specifically, the use of CRT in academic, training, and community-based settings via broad curricular modules, along with a Social Justice Ally (SJA) framework for purposeful action, will lead to a greater understanding of one's role in the community as an emergency manager, homeland security, or security professional. This article proposes techniques for addressing cultural diversity on the microlevel in the classroom or during training exercises. Arguably, programs and training exercises that couple CRT and a SJA perspective, will graduate/certify students with a more complete set of skills in order to enhance their effectiveness as policy makers, emergency management community-based practitioners, and homeland security and security professionals of the next generation.
    No preview · Article · Jul 2015 · Journal of Applied Security Research
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: One of the major problems faced in today's fast growing ever-expanding Internet world is user authentication. The common method which is based exclusively on username–password has several issues. Some of the issues include loss of password, growing prowess of hackers, and easy access to methods such as phishing and usage of bots. One of the available methods for authentication includes the usage of biometrics as a method to authenticate the user. The method specified in this article is based on keystroke dynamics. A new keystroke algorithm is proposed to make the authentication procedure more secure, reliable, and cheap.
    Preview · Article · Jul 2015 · Journal of Applied Security Research

  • No preview · Article · Jul 2015 · Journal of Applied Security Research
  • [Show abstract] [Hide abstract]
    ABSTRACT: Data mining is a relatively new technology employed in counterterrorism. It involves obtaining large data sets and analyzing them to predict what individuals are going to do based on their past behavior. Large numbers of records about innocent individuals are included in these sets, the fact of which sparked concern about civil liberties and privacy concerns. Due to a number of factors, strong conclusions cannot be made regarding the relationship between data mining and privacy complaints. However, research has been done that indicates data mining's costs may outweigh its benefits.
    No preview · Article · Jul 2015 · Journal of Applied Security Research
  • [Show abstract] [Hide abstract]
    ABSTRACT: One major issue the Ghanaian state has been grappling with is the upsurge in farmer-herders' conflicts. One of such instance is the conflict between the Konkomba and Fulani ethnic groups in Gushiegu, Northern Ghana. On December 7, 2011, the Konkomba and Fulani ethnic groups in Gushiegu engaged in conflict that resulted in killings, destruction, and expulsion. The pertinent questions that arose from the conflict are: (a) What triggered a conflict between the two groups? (b) How was the crisis resolved? and (c) What are the lessons learned? Employing fieldwork conducted in Gushiegu, this study undertakes an analysis of the phenomenon of farmer–herder conflict in Ghana.
    No preview · Article · Jul 2015 · Journal of Applied Security Research

  • No preview · Article · Jul 2015 · Journal of Applied Security Research
  • [Show abstract] [Hide abstract]
    ABSTRACT: A misconception has emerged in the empirical literature about the nature of the relationship between politics and Islam. It has been assumed that Islam, based on specific features in the Islamic religion and culture, had dominated politics in the Middle East, thus Islamic movements and formations have been responsible for the increase of political use of Islam overlooking the role of the state in pushing religion into the political domain. This article attempts to analyze the reasons of why political instrumentalization of Islam increases in the Syrian violent conflict showing that the prominence of Islamic rhetoric does not owe to specific features of the Islamic religion and culture but rather to the exploitation of religion in mobilization, contestation, and outbidding processes. Politics dominate religion in the Syrian conflict. Political instrumentalization of Islam is more likely to remain on the rise in the Syrian violent crisis causing serious implications on peace building and leading to a political vicious cycle that increases radicalization, deepens division, and hampers political development toward political reconciliation. The state instrumentalized religion from the early days of the uprising. Insurgent formations have become fragmented based on Islamic interpretations. Foreignism and interventionism contributed to the prominence of religion.
    No preview · Article · Jul 2015 · Journal of Applied Security Research
  • [Show abstract] [Hide abstract]
    ABSTRACT: Drawing upon Cognitive Resources Theory (CRT), this article examines the collective performance and leadership effectiveness of U.S. Navy SEALs. CRT postulates that stress runs contrary to rationality. It impedes the capacity of a group to operate logically and analytically, and it affects both leadership and group performance. “Cognitive resources” designate the combined skills of group members and the leader's experience and decision-making faculties. An important conclusion is that “cognitive resources” are vital to the Navy SEALs. In addition to being intelligent, experienced, and skilled, SEAL leaders have to be supported by their teams. Indeed, responsible group performance is mirrored in unparalleled selflessness that is observed, for example, in the Navy SEAL Team Six—the one that killed Osama bin Laden. CRT also posits that effective leaders must be able to withstand high stress. Under these circumstances, U.S. Navy SEALs, as a whole, must have adequate “cognitive resources.”
    No preview · Article · Jul 2015 · Journal of Applied Security Research
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Adequately addressing security concerns within public transportation will become a pressing issue over the next decade. These safety concerns frequently relate to terrorism, crime, and general disorder within public transportation with little systematic analysis directed toward transit locations. The given study geocoded 2 years of outdoor crime data within a midsized city and found the main bus terminal and three bus stop locations generated the highest levels of concentrated crime. Nonparticipatory windshield survey site observations were conducted at each location to qualitatively identify attributes that were possibly generating general disorder and crime incidents within these hot-spots. Implications for the criminology of place are discussed along with policing/security strategies for specific locations that facilitate an unusually high amount of official crime.
    Preview · Article · Jul 2015 · Journal of Applied Security Research
  • [Show abstract] [Hide abstract]
    ABSTRACT: The continued transference of electronic waste from industrialized nations to nations in the global south is a contributor to not only health and environmental risks, but also security threats. Cybercrime is estimated to cost the global economy over $375 billion dollars annually, and an increasing number of cybercrimes are originating in West Africa. This research note explores the relationship between e-waste and cybercrime in Ghana and Nigeria, and the serious implications regarding cybersecurity in the age of globalization.
    No preview · Article · Apr 2015 · Journal of Applied Security Research