Security Journal

Papers
(The median citation count of Security Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Working from home during COVID-19 crisis: a cyber security culture assessment survey43
Hate in the time of coronavirus: exploring the impact of the COVID-19 pandemic on violent extremism and terrorism in the West18
Impacts of COVID-19 pandemic on national security issues: Indonesia as a case study14
Protests and blood on the streets: repressive state, police brutality and #EndSARS protest in Nigeria11
Cyber-security and risky behaviors in a developing country context: a Pakistani perspective11
Ambient lighting, use of outdoor spaces and perceptions of public safety: evidence from a survey experiment11
An exploratory study of failed mass shootings in America9
Exploring the determinants of victimization and fear of online identity theft: an empirical study8
Police recruits’ wants and needs in police training in Germany8
Perceived risk of terrorism, indirect victimization, and individual-level determinants of fear of terrorism8
The differential effects of identity theft victimization: how demographics predict suffering out-of-pocket losses8
‘Beyond military might’: Boko Haram and the asymmetries of counter-insurgency in Nigeria8
The money laundering and terrorist financing risks of new and disruptive technologies: a futures-oriented scoping review7
The planning and reflection of police use of force training: a German case study7
Coaching self-defense under COVID-19: challenges and solutions in the police and civilian domain6
Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria6
RETRACTED ARTICLE: Formation of a legislative framework in the field of combating cybercrime and strategic directions of its development6
Sexual harassment on transit: a global, comparative examination6
Block-healthnet: security based healthcare system using block-chain technology5
Forty years of declining burglary in the United States: Explanation and evidence relating to the security hypothesis5
Assessing disparities in school safety: implications for promoting equality in current efforts to keep kids safe5
Television and conflict reporting: framing of ethno-religious conflict in Southern Kaduna by Nigerian Television Authority and Channels television5
Security guards as victims of violence: using organisational support theory to understand how support for victims could have positive implications for the security industry5
The role of the private sector in counter-terrorism: a scoping review of the literature on emergency responses to terrorism5
Contributions of human and environmental factors to concerns of personal safety and crime in urban parks5
Student perceptions of campus safety: testing the vulnerability and disorder models4
Security as a key contributor to organisational resilience: a bibliometric analysis of enterprise security risk management4
Investigating the relationships between FATF recommendation compliance, regulatory affiliations and the Basel Anti-Money Laundering Index4
Reliability: understanding cognitive human bias in artificial intelligence for national security and intelligence analysis4
Critical workers? Private security, public perceptions and the Covid-19 pandemic4
Situational awareness and public Wi-Fi users’ self-protective behaviors4
Routine activities theory and food fraud victimization4
Crime prevention through environmental design (CPTED) and its potential for campus safety: a qualitative study4
Post-amnesty peacebuilding and restiveness in the Niger Delta: what do grassroots narratives suggest?4
Should firearms be allowed in K-12 public schools? An analysis of law enforcement’s perceptions of armed teacher policies4
Let’s go throwing stones and stealing cars: offender adaptability and the security hypothesis3
Implementing Converged Security Risk Management: Drivers, Barriers, and Facilitators3
Community perceptions of private security at a mega-event3
Blackmail on social media: what do we know and what remains unknown?3
Preventing fraud and providing services: The Private Healthcare Insurance Sector3
A comparison of target types, weapon types, and attack types in suicide-terrorism incidents before and after 9/11 terrorist attacks3
Relations between police and private security officers: a case study of Serbia3
What is the role of private intelligence in the Slovak Republic? Legal and practical aspects of private detective services3
Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment3
Countering fake information as a guarantee of state information security3
Prevention and mitigation measures against phishing emails: a sequential schema model3
Redefining insider threats: a distinction between insider hazards and insider threats3
The effect of perceived citizen views and supervisor support on Private Security Officers’ job satisfaction: the mediating role of self-legitimacy3
The use of CPTED-based techniques to prevent shoplifting: a survey in Istanbul2
The role of subjective and objective indicators of neighbourhood safety on children’s physical activity level2
Do crime generators exist in a developing context? An exploratory study in the township of Khayelitsha, South Africa2
Correction to: Reliability: understanding cognitive human bias in artificial intelligence for national security and intelligence analysis2
Design of the required tasks of industrial security experts based on job openings2
A model of citizens’ trust in intelligence services2
The protection of crowded places from terrorist threats: does protective security advice meet the needs of security managers?2
Factors of Mass Casualty Terrorism2
The effect of unreported gun-related violent crime on crime hot spots2
Exploring socio-demographic factors, avoiding being a victim and fear of crime in a Nigerian university2
Digital evidence experts in the law enforcement community: understanding the use of forensics examiners by police agencies2
Exploring public trust in policing at a community in Ghana2
Cryptocurrency is new vogue: a reflection on money laundering prevention2
Crime prevention through environmental design and its challenges in reducing crime: a case of Selangor, Malaysia2
A quasi-experimental evaluation of the impact of forensic property marking in decreasing burglaries2
Nigeria and Niger Republic trans-border management against arms trafficking: a whistleblowing model2
Good, but not good enough: what church leaders think about the Presidential Amnesty Programme in Rivers State, Nigeria2
Security and urban satisfaction: developing a model based on safe urban park design components extracted from users' preferences2
Situational crime prevention strategies in schools: an assessment of principals’ perceptions of the effectiveness of security approaches in public high schools1
Addressing cybersecurity and safety disconnects in United States army aviation: an exploratory qualitative case study1
Specifics of the legal regulation of the prevention of the taking and killing of hostages in the context of terrorist threats1
Public parks and crimes of property: get out there and enjoy the sunshine, lock your cars, and hide your bike1
Analyzing Nigerians’ perspectives on the causes of violent extremism, government responses, and possible solutions1
The realpolitik of jihad: an anatomy of transnational Islamist terrorism in East Africa1
The influence of pledging allegiance on terrorist attacks: the case of Boko Haram and Islamic State1
Crime at micro-places in public libraries1
Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison1
Correction to: Security guards as victims of violence: using organisational support theory to understand how support for victims could have positive implications for the security industry1
Social context of energy theft among electricity consumers in Lagos and Ibadan Metropolis, Nigeria1
Tracking violence in Thailand: the making of violent crime index1
Media and conflict reporting: a content analysis and victims assessment of media coverage of the conflict between Farmers and Herdsmen in Nigeria1
Theoretical analysis of the linkages between the IOCs’ oil exploration activities and piracy in Nigeria1
Background checks: the theories behind the process1
The “new” crimes of pandemics: observations and insights from Latin America1
Blackmail and the self-disclosure of sensitive information on social media: prevalence, victim characteristics and reporting behaviours amongst Omani WhatsApp users1
Research of security and safety culture within an organization. The case study within the Slovak Republic1
Effects of socioeconomic and digital inequalities on cybersecurity in a developing country1
Retrofit design for preventing theft on the university campus1
Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan1
Profiling consumers who reported mass marketing scams: demographic characteristics and emotional sentiments associated with victimization1
A new financial crime: proliferation financing and China's countermeasures1
The virtual "Caliphate" strikes back? Mapping the Islamic State's information ecosystem on the surface web1
Correction to: A decade of Boko Haram activities: the attacks, responses and challenges ahead1
Integrated security management model: a proposal applied to organisational resilience1
Foundations and trends in the darknet-related criminals in the last 10 years: a systematic literature review and bibliometric analysis1
A family affair? Exploratory insights into the role of family members of those who joined jihadist groups1
Role of esthetic judgment on perceived safety of urban parks’ users1
Public perceptions of dangerous places: sources of variability in evaluating criminogenic environments1
0.020340204238892