Search results

1 – 10 of over 65000
Article
Publication date: 7 April 2023

Devang Chhtrapati, Dharmendra Trivedi, Shanti P. Chaudhari, Arpit Sharma and Atul Bhatt

This study concentrates on assessing the research productivity in the domain of social media security in the past decades. The purpose of this study is to conduct a comprehensive…

Abstract

Purpose

This study concentrates on assessing the research productivity in the domain of social media security in the past decades. The purpose of this study is to conduct a comprehensive bibliometric review on social media using various bibliometric indicators.

Design/methodology/approach

A total of 8,121 scientific publications were retrieved from Scopus database from period 1998 to 2021 using associated keyword search. This study also used VOSviewer© tool to evaluate the network visualisation.

Findings

The result of this study revealed that there is a steady growth of annual publications except for the years 2015 and 2016. A total of 8,121 scientific publications and 80,454 total citations were found with 11.2 average citations per publication. The USA, China and India were top productive countries in terms of publishing research in the field; Chinese Academy of Sciences secured top position with 126 publications in highly productive organisation in the domain. The lecture notes in computer science from Springer Nature received a highly produced title with 553 publications and 4,453 total citations. For co-occurrence of author’s keywords, network visualisation analysis revealed that “Social Media”, “Social Network”, “Security”, “Privacy” and “Trust” found maximum occurrence in the domain of social media security.

Research limitations/implications

This study provides comprehensive research status of social media security by performing a bibliometric analysis. The findings of this study will help relevant researchers to understand the research trend, pursue scientific collaborators and enhance research topic preferences.

Originality/value

The rareness of this study, detailed bibliometric analysis on the domain of social media security, is proven using numerous bibliometric indicators and application of VOSviewer in the domain.

Details

Information Discovery and Delivery, vol. 52 no. 1
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 19 May 2023

Oluwafemi David Bodunde, Goodluck Tamaramieye Layefa and Joseph Kehinde Fasae

This paper aims to investigate the relationship between media reporting and violent extremism to explain the ethical and security issues emanating from it in Nigeria.

Abstract

Purpose

This paper aims to investigate the relationship between media reporting and violent extremism to explain the ethical and security issues emanating from it in Nigeria.

Design/methodology/approach

This paper draws on security and ethical literature, while a multimethod approach consisting of in-depth and focus group interviews was used. Content analysis was also relied upon from the interviews granted by media experts on terrorism, security and ethics.

Findings

Findings revealed that journalists are facing problems in areas of freedom of expression, framing, content selection and personal security. Again, this paper opines that elements of public awareness and issues of relevance also push the media to excessive reporting in which ethics and security must stand to play a restraining role.

Research limitations/implications

The first limitation of this paper is the inability to interview some terrorists and know their reaction to mass media reporting on their activities because nobody is ready to own up that he is a terrorist and to point to an individual as a terrorist is a dangerous phenomenon. Again, not all reporters are ready for interviews because of the fact that they are not prepared for the academic exercise but rather for assignments that can yield fat money such as selling secret information to those who can buy them with huge amounts of money like the politicians.

Practical implications

There is a threat to life on both sides of the government and terrorists. Favoring one side in their report is an offense from another side. There is also a violation of their human rights in freedom of speech as a result of the political situation in Nigeria where the government is faced with insecurity that hinders media from freedom of the press to publish reports. Moreover, where the ethical issue is suppressed, it makes the government unpopular all over the world because of the lack of press freedom.

Originality/value

To the best of the authors’ knowledge, this paper is novel as being the first of its kind where media experts are involved in research attempts on media reporting and violent extremism in relation to security and ethical issues in Nigeria.

Details

Journal of Aggression, Conflict and Peace Research, vol. 15 no. 4
Type: Research Article
ISSN: 1759-6599

Keywords

Article
Publication date: 11 December 2023

Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai and Quynh-Chi Le

This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.

Abstract

Purpose

This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.

Design/methodology/approach

Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account.

Findings

The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting.

Research limitations/implications

This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances.

Practical implications

Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems.

Originality/value

The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 8 December 2010

Evan Yacoub

Low security is a poorly understood concept, particularly in relation to people with an intellectual disability. Characteristics of patients offered an admission to low secure…

Abstract

Low security is a poorly understood concept, particularly in relation to people with an intellectual disability. Characteristics of patients offered an admission to low secure intellectual disability settings have not been robustly demonstrated. The same applies to staff perceptions of low security. The aims of the study were to ascertain the characteristics of patients referred to a low secure intellectual disability unit which lead to an offer of admission, identify the views of staff working on the unit on the concept of low security, and use both sets of data to discuss low secure provision for people with intellectual disability. A case‐controlled study was carried out for 33 patients referred to the unit over 42 months. The characteristics of 18 patients offered an admission were compared with those of 15 patients not offered an admission, and five of the staff working on the unit were interviewed about the concept of low security. Patients offered an admission were more able than those not offered an admission, posed more risks and were more complex diagnostically. Staff working on the unit agreed that their patients were complex, but felt that they were appropriately placed overall. The challenges of low secure provision were discussed by staff. Patients sampled were complex and heterogeneous, but not necessarily ‘forensic’. Their complexity requires sophisticated care plans and management strategies. This study has implications for referrers, staff, patients and managers, and highlights areas for future research.

Details

Advances in Mental Health and Intellectual Disabilities, vol. 4 no. 4
Type: Research Article
ISSN: 2044-1282

Keywords

Article
Publication date: 13 March 2019

Petra Habets, Inge Jeandarme and Harry G. Kennedy

Criteria to determine in which level of security forensic patients should receive treatment are currently non-existent in Belgium. Research regarding the assessment of security

Abstract

Purpose

Criteria to determine in which level of security forensic patients should receive treatment are currently non-existent in Belgium. Research regarding the assessment of security level is minimal and few instruments are available. The DUNDRUM toolkit is a structured clinical judgement instrument that can be used to provide support when determining security level. The purpose of this paper is to investigate the applicability and validity of the DUNDRUM-1 in Flanders.

Design/methodology/approach

The DUNDRUM-1 was scored for 50 male patients admitted at the forensic units in the public psychiatric hospital Rekem. Some files were rated by three researchers who were blind to participants’ security status, resulting in 33 double measurements.

Findings

Almost all files (96 per cent) contained enough information to score the DUNDRUM-1. Average DUNDRUM-1 final judgement scores were concordant with a medium security profile. No difference was found between the current security levels and the DUNDRUM-1 final judgement scores. Inter-rater reliability was excellent for the DUNDRUM-1 final judgement scores. On item level, all items had excellent to good inter-rater reliability with the exception of one item institutional behaviour which had an average inter-rater reliability.

Practical implications

The DUNDRUM-1 can be a useful tool in Flemish forensic settings. It has good psychometric properties. More research is needed to investigate the relationship between DUNDRUM-1 scores and security level decisions by the courts.

Originality/value

This is the first study that investigated the applicability of the DUNDRUM-1 in a Belgian setting, also a relative large number of repeated measurements were available to investigate the inter-rater reliability of the DUNDRUM-1.

Details

Journal of Forensic Practice, vol. 21 no. 1
Type: Research Article
ISSN: 2050-8794

Keywords

Book part
Publication date: 26 January 2011

Hillel Nossek and Yehiel Limor

Although the state of Israel is a democracy, military censorship has been in use since its establishment in 1948 and is still imposed. The chapter analyzes the theoretical and…

Abstract

Although the state of Israel is a democracy, military censorship has been in use since its establishment in 1948 and is still imposed. The chapter analyzes the theoretical and practical grounds for military censorship in Israel based on an agreement between relevant parties: the government, the army, the media, and the public. Analysis of Israeli military censorship reveals that military censorship is not necessarily the enemy of the media and the public's right to know. On the contrary and paradoxically, we show that in Israel's case, military censorship not only performs its task of preventing the publication of information that threatens the national security, at times it sustains the country's freedom of the press, freedom of information, and the public's right to know.

Details

Government Secrecy
Type: Book
ISBN: 978-0-85724-390-4

Keywords

Article
Publication date: 3 October 2016

Jianqiang Hao and Hongying Dai

Security breaches have been arising issues that cast a large amount of financial losses and social problems to society and people. Little is known about how social media could be…

1945

Abstract

Purpose

Security breaches have been arising issues that cast a large amount of financial losses and social problems to society and people. Little is known about how social media could be used a surveillance tool to track messages related to security breaches. This paper aims to fill the gap by proposing a framework in studying the social media surveillance on security breaches along with an empirical study to shed light on public attitudes and concerns.

Design/methodology/approach

In this study, the authors propose a framework for real-time monitoring of public perception to security breach events using social media metadata. Then, an empirical study was conducted on a sample of 1,13,340 related tweets collected in August 2015 on Twitter. By text mining a large number of unstructured, real-time information, the authors extracted topics, opinions and knowledge about security breaches from the general public. The time series analysis suggests significant trends for multiple topics and the results from sentiment analysis show a significant difference among topics.

Findings

The study confirms that social media monitoring provides a supplementary tool for the traditional surveys which are costly and time-consuming to track security breaches. Sentiment score and impact factors are good predictors of real-time public opinions and attitudes to security breaches. Unusual patterns/events of security breaches can be detected in the early stage, which could prevent further destruction by raising public awareness.

Research limitations/implications

The sample data were collected from a short period of time on Twitter. Future study could extend the research to a longer period of time or expand key words search to observe the sentiment trend, especially before and after large security breaches, and to track various topics across time.

Practical implications

The findings could be useful to inform public policy and guide companies responding to consumer security breaches in shaping public perception.

Originality/value

This study is the first of its kind to undertake the analysis of social media (Twitter) content and sentiment on public perception to security breaches.

Details

Journal of Financial Crime, vol. 23 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 27 July 2010

John Jacques, Sarah‐Jane Spencer and Paul Gilluley

Medium secure units were designed to treat patients for up to three years, but some patients spend longer in acute medium secure settings which in general do not have a 'longer…

Abstract

Medium secure units were designed to treat patients for up to three years, but some patients spend longer in acute medium secure settings which in general do not have a 'longer term focus'. The aim of this investigation was to assess and describe the needs of these patients. A survey questionnaire was designed and sent to responsible clinicians who had patients admitted at least five years previously to the Three Bridges Medium Secure Unit (males) in West London. Carer ratings using the Camberwell Assessment of Need: forensic version (CAN‐FOR) were completed by the primary nurse for each patient, complementing the survey questionnaire. Of 122 medium secure male patients 25 (21%) had been admitted at least five years before. We found high levels of co‐morbidity and treatment resistance. The CAN‐FOR revealed two groups, one with chronic challenging behaviour, treatment‐resistant mental illness and need for a high level of support, and another more able group not needing as much support but with a dependency on the hospital. It is considered here whether certain groups would benefit from a different approach or setting.

Details

The British Journal of Forensic Practice, vol. 12 no. 3
Type: Research Article
ISSN: 1463-6646

Keywords

Open Access
Article
Publication date: 13 November 2018

Yousaf Ali, Zainab Ahmed Shah and Amin Ullah Khan

This study aims to cover issues regarding traveling to a tourist destination which has seen war and terrorism. These problems can be addressed altogether, as they are…

10779

Abstract

Purpose

This study aims to cover issues regarding traveling to a tourist destination which has seen war and terrorism. These problems can be addressed altogether, as they are interrelated. Based on tourists’ opinions, this paper aims to focus on measures or steps that can be taken to ensure changing their perceptions about a certain destination.

Design/methodology/approach

This study targets tourism experts for their opinions regarding the measures most necessary to change the perceptions of tourists. Their opinions were extracted through a questionnaire based on three criteria with four alternatives. Furthermore, raw data extracted are studied using the Fuzzy-VIKOR technique to rank the alternatives in order of importance. Moreover, the questionnaire also aims to know the perception of participants by asking them what would make them trust a destination with a history of terrorism.

Findings

The problems captivate the attention of government, guiding them to ensure that they need to focus more on physical security of tourists if they expect tourism industry to thrive. It was found that the steps needed to be taken are in the areas of international trade, cultural exchange programs and social media advertising.

Originality/value

Research based on improving tourist perception of Pakistan to develop Pakistan as a tourist destination is scarce. The study takes four different alternatives into account for image recovery and based on those alternatives, it provides a unique solution to the government in this regard with the necessary steps they need to take and attempts to help the government ensure tourism expansion in the country.

Details

Journal of Tourism Analysis: Revista de Análisis Turístico, vol. 25 no. 2
Type: Research Article
ISSN: 2254-0644

Keywords

Article
Publication date: 1 March 2006

Mébarek Djebabra, Toufik Bentarcia, Saadia Saadi and Lylia Bahmed

This paper proposes a risk management process that provides general specifications of the impact and hazard studies applied to a natural medium called Oued el‐gourzi (Batna) in…

1736

Abstract

Purpose

This paper proposes a risk management process that provides general specifications of the impact and hazard studies applied to a natural medium called Oued el‐gourzi (Batna) in Algeria.

Design/methodology/approach

The proposed approach can be divided into two phases. First, the diagnosis consists of medium description, analysis and assessment of pollution risk and second, the therapy which includes identification, qualification and implementation of means, follow‐up and continuous amelioration. This approach is supported by the Fault‐tree method.

Findings

The approach defines risks that can affect a natural medium. Improvement of the medium security is required. The establishment of a program for the management and control of these risks is needed.

Practical implications

In the context of impact studies, solutions required regarding the pollution of a natural medium are going to lead concerned authorities toward the establishment of a policy of preventive and curative measures. Instigators will be influenced by the comparison of indemnities and environmental investments of pollutants.

Originality/value

The diffusion of information about risk management allows the establishment of relations between different actors by the risk management process and consequently ensures its credibility.

Details

Management of Environmental Quality: An International Journal, vol. 17 no. 2
Type: Research Article
ISSN: 1477-7835

Keywords

1 – 10 of over 65000