Security Journal

Papers
(The median citation count of Security Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Transit crime and sexual violence in cities: international evidence and prevention30
High school gun carrying: the role of disorder, collective efficacy, and police efficacy at school in a predominantly black sample21
The planning and reflection of police use of force training: a German case study20
Identifying trends and patterns in offending and victimization on Snapchat: a rapid review18
Awareness of cybersecurity vulnerabilities in virtual reality: an analytical study13
The great American car crime decline12
A family affair? Exploratory insights into the role of family members of those who joined jihadist groups11
Evolving regularity and geographical patterns of global piracy incidents distribution10
Review of Sutton, B. 2023. Bulletproof fashion: security, emotions, and the fortress body10
A bibliometric study on recent trends in artificial intelligence-based suspicious activity recognition10
The age of terror: how to combine efforts for counteraction at the level of international and national law?9
Comparative analysis of the activities of authorities to ensure the prevention of offenses in the Republic of Kazakhstan and other world countries9
How effective are residential CCTV systems: Evaluating the impact of natural versus mechanical surveillance on house break-ins and theft in hotspots of Penang Island, Malaysia8
The effect of unreported gun-related violent crime on crime hot spots8
Drawing the line: public attitudes towards warranted and unwarranted government surveillance in European countries8
Protests and blood on the streets: repressive state, police brutality and #EndSARS protest in Nigeria7
The “new” crimes of pandemics: observations and insights from Latin America7
Crime prevention through environmental design and its challenges in reducing crime: a case of Selangor, Malaysia7
International cooperation in police training: evaluation of a European Union programme for African gendarmes6
Assessment of performance during cybersecurity tabletop exercises6
Will the future policing of fraud be ‘a fundamental shift in our approach to tackling fraud’ or largely more of the same? Reviewing the 2023 UK fraud strategy through evidence on the ground6
Herders without borders: transhumance securitisation and the challenges of national security in Ghana and Nigeria6
Fraudsters target the elderly: Behavioural evidence from randomised controlled scam-baiting experiments6
Industrial security protection in the United States before the Pearl Harbor attack: failures to prepare, presidential executive orders, and guard force militarization5
Measuring the adoption of Enterprise Security Risk Management in Kenya’s higher education using the ASIS ESRM Maturity Model5
Assessing the time-varying spatial influence of bus stops on crime by context: a street network analysis5
The influence of pledging allegiance on terrorist attacks: the case of Boko Haram and Islamic State5
Missing targets: which entities are affected by UN counter-terrorism sanctions?5
Effects of socioeconomic and digital inequalities on cybersecurity in a developing country5
Cyberbullying victimization among university students- a national study of Pakistan4
Using hotspot analysis to prioritize security efforts in Colombian critical infrastructure, a focus on the power grid4
Consciousness towards religious belief and re-radicalization in societies4
Correction to: Reliability: understanding cognitive human bias in artificial intelligence for national security and intelligence analysis4
Police recruits’ wants and needs in police training in Germany3
Prediction of male inmate infractions in Taiwan prisons3
Critical workers? Private security, public perceptions and the Covid-19 pandemic3
The crime drop in South Africa: an exploratory research note3
The (in)security and educational perspectives of child sexual abuse: insights from Nigerian newspaper records3
What is the role of architects and urban planners in crime prevention? 3
A comparison of target types, weapon types, and attack types in suicide-terrorism incidents before and after 9/11 terrorist attacks3
External auditors’ use and perceptions of fraud factors in assessing fraudulent financial reporting risk (FFRR): Implications for audit policy and practice3
Local residents’ perceptions of refugees as neighbors: a qualitative analysis of community social networks, purposive guardianship, and feelings of safety3
Identifying cyber security competencies and skills from online job advertisements through topic modeling2
A survey of extremism online content analysis and prediction techniques in twitter based on sentiment analysis2
The dimensions of ‘forensic biosecurity’ in genetic and facial contexts2
Bruneau, T. C.: Outsourcing National Defense: Why and How Private Contractors are Providing Public Services2
Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project2
Understanding the consideration of strategies for coping with locality violence in Arab society in Israel2
The asymmetric effect of environmental pollution and macroeconomic indicators on interpersonal violence across OECD countries2
Balancing campus security and student rights: the case of the University of Botswana2
Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan2
Role of esthetic judgment on perceived safety of urban parks’ users2
Community-based vigilante violence and corporate social responsibility in Nigeria’s oil-producing region2
Socio-spatial structure of urban communities and the distribution of crime in Makurdi, Nigeria2
The use of home security technology by survivors of intimate partner and sexual violence: an exploratory study2
The realpolitik of jihad: an anatomy of transnational Islamist terrorism in East Africa2
Assessing cybersecurity dynamics: a comparative analysis of data breaches in urban and rural hospitals in the United States2
What really works in preventing fraud against organisations and do decision-makers really need to know?2
Security and urban satisfaction: developing a model based on safe urban park design components extracted from users' preferences2
Examining the simultaneous use of home protection methods2
Open-source intelligence and great-power competition under mediatization2
Crime prevention through environmental design (CPTED) and its potential for campus safety: a qualitative study2
Population distribution and terrorist attack preference: evidence from Xinjiang, China1
Students care “who” carries: probing attributes associated with college students’ attitudes toward campus carry1
Specifics of the legal regulation of the prevention of the taking and killing of hostages in the context of terrorist threats1
The money laundering and terrorist financing risks of new and disruptive technologies: a futures-oriented scoping review1
‘We shall triumph like the Jews’: unveiling the implicit side of IPOB’s armed separatism in Southeast Nigeria1
State or private security supply? An analysis from the institutional economics perspective1
Profiling consumers who reported mass marketing scams: demographic characteristics and emotional sentiments associated with victimization1
Introducing Bayesian belief updating as a method to counter improvised explosive devices: a qualitative case study on identifying human behaviours associated with explosive chemical precursor diversio1
Correction to: Football as a national security threat for the Turkish Republic of Northern Cyprus1
Standardisation of investigative process in invasive and destructive techniques of mobile forensics in India1
Exploring socio-demographic factors, avoiding being a victim and fear of crime in a Nigerian university1
Tabletop scenario exercises as a training tool for improving response to workplace violence1
PISA: A proximity-based social networking (PBSN) protection model1
Developing and implementing social engineering-prevention policies: a qualitative study1
Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria1
Shadow of death: the criminal economy of banditry and kidnapping in northwest Nigeria1
Addressing cybersecurity and safety disconnects in United States army aviation: an exploratory qualitative case study1
Issues with the application of CPTED in urban development: a case of City X, Malaysia1
Card-not-present fraud: using crime scripts to inform crime prevention initiatives1
Integrated security management model: a proposal applied to organisational resilience1
The effects of organizational images on security compliance intention: focused on affection and job security in South Korea1
Disruptive behavior of young people in shopping malls: a security provider perspective1
Frauds and forgeries in banking industry in Africa: a content analyses of Nigeria Deposit Insurance Corporation annual crime report1
Reimagining the familiar stranger as a source of security: generating guardianship through everyday mobility1
The word mobile phone missing in the Cyber Crime Act, 20151
Cryptocurrency Ponzi schemes and their modus operandi in South Korea1
The virtual "Caliphate" strikes back? Mapping the Islamic State's information ecosystem on the surface web1
Should firearms be allowed in K-12 public schools? An analysis of law enforcement’s perceptions of armed teacher policies1
Susceptibility for criminal facilitation in social housing: a psychological perspective1
Retraction Note: Formation of a legislative framework in the field of combating cybercrime and strategic directions of its development1
Cybersecurity threats and vulnerabilities experienced by small-scale African migrant traders in Southern Africa1
Terrorism, democracy and human security: a communication model. Ronald Crelinsten. 2021. Abingdon, Routledge, ISBN 978-036786089-91
Prevention and mitigation measures against phishing emails: a sequential schema model1
Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison1
Exploring banditry in Nigeria1
0.073009967803955