Security Journal

Papers
(The median citation count of Security Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Working from home during COVID-19 crisis: a cyber security culture assessment survey48
Impacts of COVID-19 pandemic on national security issues: Indonesia as a case study30
Hate in the time of coronavirus: exploring the impact of the COVID-19 pandemic on violent extremism and terrorism in the West18
Ambient lighting, use of outdoor spaces and perceptions of public safety: evidence from a survey experiment15
Protests and blood on the streets: repressive state, police brutality and #EndSARS protest in Nigeria13
Cyber-security and risky behaviors in a developing country context: a Pakistani perspective13
Contributions of human and environmental factors to concerns of personal safety and crime in urban parks12
Exploring the determinants of victimization and fear of online identity theft: an empirical study11
‘Beyond military might’: Boko Haram and the asymmetries of counter-insurgency in Nigeria10
Sexual harassment on transit: a global, comparative examination10
An exploratory study of failed mass shootings in America9
The money laundering and terrorist financing risks of new and disruptive technologies: a futures-oriented scoping review9
Police recruits’ wants and needs in police training in Germany9
Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria9
Coaching self-defense under COVID-19: challenges and solutions in the police and civilian domain8
RETRACTED ARTICLE: Formation of a legislative framework in the field of combating cybercrime and strategic directions of its development8
The planning and reflection of police use of force training: a German case study7
Reliability: understanding cognitive human bias in artificial intelligence for national security and intelligence analysis7
Situational awareness and public Wi-Fi users’ self-protective behaviors6
Forty years of declining burglary in the United States: Explanation and evidence relating to the security hypothesis6
Critical workers? Private security, public perceptions and the Covid-19 pandemic6
Community perceptions of private security at a mega-event6
Security as a key contributor to organisational resilience: a bibliometric analysis of enterprise security risk management6
The effect of unreported gun-related violent crime on crime hot spots6
Should firearms be allowed in K-12 public schools? An analysis of law enforcement’s perceptions of armed teacher policies5
Security and urban satisfaction: developing a model based on safe urban park design components extracted from users' preferences5
Profiling consumers who reported mass marketing scams: demographic characteristics and emotional sentiments associated with victimization5
A survey of extremism online content analysis and prediction techniques in twitter based on sentiment analysis4
Bias and noise in security risk assessments, an empirical study on the information position and confidence of security professionals4
Implementing Converged Security Risk Management: Drivers, Barriers, and Facilitators4
Nigeria and Niger Republic trans-border management against arms trafficking: a whistleblowing model4
Crime prevention through environmental design (CPTED) and its potential for campus safety: a qualitative study4
Countering fake information as a guarantee of state information security4
Post-amnesty peacebuilding and restiveness in the Niger Delta: what do grassroots narratives suggest?4
Prevention and mitigation measures against phishing emails: a sequential schema model4
Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment4
The role of subjective and objective indicators of neighbourhood safety on children’s physical activity level4
Routine activities theory and food fraud victimization4
Body-worn camera activation in prisons: understanding correctional officers’ decision-making and use of discretion3
Factors of Mass Casualty Terrorism3
What really works in preventing fraud against organisations and do decision-makers really need to know?3
Relations between police and private security officers: a case study of Serbia3
Exploring public trust in policing at a community in Ghana3
Let’s go throwing stones and stealing cars: offender adaptability and the security hypothesis3
Foundations and trends in the darknet-related criminals in the last 10 years: a systematic literature review and bibliometric analysis3
What is the role of private intelligence in the Slovak Republic? Legal and practical aspects of private detective services3
The effect of perceived citizen views and supervisor support on Private Security Officers’ job satisfaction: the mediating role of self-legitimacy3
Addressing cybersecurity and safety disconnects in United States army aviation: an exploratory qualitative case study3
A comparison of target types, weapon types, and attack types in suicide-terrorism incidents before and after 9/11 terrorist attacks3
Effects of socioeconomic and digital inequalities on cybersecurity in a developing country3
Exploring the value of holiday preferences and routine activities for understanding tourist victimisation while on holiday2
Crime prevention through environmental design and its challenges in reducing crime: a case of Selangor, Malaysia2
How effective are residential CCTV systems: Evaluating the impact of natural versus mechanical surveillance on house break-ins and theft in hotspots of Penang Island, Malaysia2
Cybersecurity threats and vulnerabilities experienced by small-scale African migrant traders in Southern Africa2
Research of security and safety culture within an organization. The case study within the Slovak Republic2
Exploring socio-demographic factors, avoiding being a victim and fear of crime in a Nigerian university2
Digital evidence experts in the law enforcement community: understanding the use of forensics examiners by police agencies2
A family affair? Exploratory insights into the role of family members of those who joined jihadist groups2
Public parks and crimes of property: get out there and enjoy the sunshine, lock your cars, and hide your bike2
The protection of crowded places from terrorist threats: does protective security advice meet the needs of security managers?2
The virtual "Caliphate" strikes back? Mapping the Islamic State's information ecosystem on the surface web2
Bridging the gap between criminology and computer vision: A multidisciplinary approach to curb gun violence2
The influence of pledging allegiance on terrorist attacks: the case of Boko Haram and Islamic State2
Crime at micro-places in public libraries2
Role of esthetic judgment on perceived safety of urban parks’ users2
Design of the required tasks of industrial security experts based on job openings2
A model of citizens’ trust in intelligence services2
Cryptocurrency is new vogue: a reflection on money laundering prevention2
The use of CPTED-based techniques to prevent shoplifting: a survey in Istanbul2
Blackmail and the self-disclosure of sensitive information on social media: prevalence, victim characteristics and reporting behaviours amongst Omani WhatsApp users2
Integrated security management model: a proposal applied to organisational resilience2
Correction to: Reliability: understanding cognitive human bias in artificial intelligence for national security and intelligence analysis2
Retrofit design for preventing theft on the university campus2
Good, but not good enough: what church leaders think about the Presidential Amnesty Programme in Rivers State, Nigeria2
Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison2
Identifying cyber security competencies and skills from online job advertisements through topic modeling1
Do cybercrime laws address emergent IoT security threats? The case of UAE federal cybercrime law regarding RFID technology1
Correction to: Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria1
Public support for gunshot detection technology1
A quasi-experimental evaluation of the impact of forensic property marking in decreasing burglaries1
Analyzing Nigerians’ perspectives on the causes of violent extremism, government responses, and possible solutions1
Card-not-present fraud: using crime scripts to inform crime prevention initiatives1
Nigerian state and the management of armed conflicts: rethinking the amnesty approach1
Public perceptions of dangerous places: sources of variability in evaluating criminogenic environments1
Carrying a handgun in public vs. taking a handgun to school among youth: an exploration of the predicting power of risk factors related to delinquency, aggression, and victimization1
A new financial crime: proliferation financing and China's countermeasures1
The “new” crimes of pandemics: observations and insights from Latin America1
Tourism safety on train systems: A case study on electronic word-of-mouth in Spain, Italy and Greece1
The age of terror: how to combine efforts for counteraction at the level of international and national law?1
Nudging as a crime prevention strategy: the use of nudges to improve cyclists’ locking behavior and reduce the opportunities for bicycle theft1
A bibliometric study on recent trends in artificial intelligence-based suspicious activity recognition1
Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan1
Media and conflict reporting: a content analysis and victims assessment of media coverage of the conflict between Farmers and Herdsmen in Nigeria1
Correction to: Community-based vigilante violence and corporate social responsibility in Nigeria’s oil-producing region1
The realpolitik of jihad: an anatomy of transnational Islamist terrorism in East Africa1
Specifics of the legal regulation of the prevention of the taking and killing of hostages in the context of terrorist threats1
Tracking violence in Thailand: the making of violent crime index1
Theoretical analysis of the linkages between the IOCs’ oil exploration activities and piracy in Nigeria1
Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries1
State or private security supply? An analysis from the institutional economics perspective1
Identifying trends and patterns in offending and victimization on Snapchat: a rapid review1
0.025433778762817