Page 110 - Read Online
P. 110
Chen. J Surveill Secur Saf 2020;1:102-5 I http://dx.doi.org/10.20517/jsss.2020.26 Page 103
JOURNAL OF SURVEILLANCE, SECURITY AND SAFETY: WHY A NEW JOURNAL?
While related Special Sections of existing journals have appeared regularly, research results in the fields
of surveillance, security, and safety have been published in many different journals, creating a somewhat
dispersed audience. In response, the Journal of Surveillance, Security and Safety (JSSS) has been badly
needed as a platform for publishing research results in the foundations, methods, and mechanisms, with
surveillance, security, and safety tending to have been to be treated separately.
Surveillance involves relevant observation methods that aim at preventing or detecting crime behavior.
Security, with its classic foundations in cryptography, involves issues related to data and privacy protection,
intrusion detection, authentication, protocols, and reliable transaction, as well as other security-related
fields. Safety is primarily defined as including the means designed to prevent inadvertent or hazardous
operation. I am also certain that this publication will be of interest to everyone working in the general area
of surveillance, security, and safety.
The journal is the result of the dedication of many individuals who are selflessly willing to put in long hours
of work in an attempt to give back to the community. We owe thanks to those who completed the initial
work and those who will follow through in the next few years.
WHAT IS SPECIAL IN THE FIRST ISSUE?
The journal has an impressive opening in the first issue. These papers illustrate various studies that can
advance our understanding of surveillance, security, and safety when considered in a forum.
[1]
Shmidt et al. in “Learning and unlearning from disasters: an analysis of the Virginia Tech, USA shooting
and the Lion Air 610 Airline crash” provide an analysis about organizational learning and theories of
learning from failures. This work attempts to stimulate organizational learning and improve organizational
processes to mitigate disasters from happening again. I expect this work to continue and extend the
proposed methodology to other cases in the fields of surveillance, security, and safety.
[2]
Xu et al. ’s “Big data analytics of crime prevention and control based on image processing upon cloud
computing” presents a cloud computing-based image processing technology to identify individual crimes
and subject segmentation, which uses statistical methods to collect the characteristics of criminal behavior,
addressing the issues of non-real-time observation of criminal behavior.
In “A survey of domain name system vulnerabilities and attacks”, Kim and Reeves efficiently analyzed the
[3]
vulnerabilities of DNS and four categories of representative DNS attacks. I expect the defense mechanisms
introduced in this paper will motivate greater participation in this effort.
[4]
“Stereo storage structure assisted one-way anonymous auditing protocol in e-health system” by Jiang et al.
examines the challenges of the design of the storage structure in the cloud and the data integrity verification
in the medical environment with clients’ privacy protection. A novel stereo storage structure-assisted one-
way anonymous auditing protocol in the e-health system is proposed, which can implement the storage and
fast search of medical data.
[5]
Salmani and Barker ’s “Leakless Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud
Data” presents an efficient encrypted cloud data search service that employs the secure inner product
similarity and chaining encryption notion and addresses the problem of leakless privacy-preserving multi-
keyword ranked search over encrypted cloud data.
Future issues will contain additional papers solicited for the first issues and the latest solicited papers of the
journal. These papers will continue this trend, that is the first issue begins with high hope.