Security Journal

Papers
(The median citation count of Security Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Transit crime and sexual violence in cities: international evidence and prevention57
Public perception of CPTED maintenance strategies: a VR study on residential burglary prevention30
High school gun carrying: the role of disorder, collective efficacy, and police efficacy at school in a predominantly black sample25
Awareness of cybersecurity vulnerabilities in virtual reality: an analytical study23
Identifying trends and patterns in offending and victimization on Snapchat: a rapid review19
Review of Sutton, B. 2023. Bulletproof fashion: security, emotions, and the fortress body14
A bibliometric study on recent trends in artificial intelligence-based suspicious activity recognition14
Grid-based crisis governance: integrating 4R theory and AGIL model with a keyword-based exploratory analysis14
The great American car crime decline12
From defensive walls to AI fences: the architectural evolution of borders11
Comparative analysis of the activities of authorities to ensure the prevention of offenses in the Republic of Kazakhstan and other world countries11
Evolving regularity and geographical patterns of global piracy incidents distribution11
Risk, regulation, and governance: evaluating artificial intelligence across diverse application scenarios11
Unveiling the efficacy of the elaborated social identity model as a lens for understanding crowd psychology in South Korea: an empirical inquiry10
Enhancing the resilience of state institutions to security threats: strategic approaches for Ukraine10
Drawing the line: public attitudes towards warranted and unwarranted government surveillance in European countries9
Comparing safety perceptions and active mobility in two urban settings: a case study8
Herders without borders: transhumance securitisation and the challenges of national security in Ghana and Nigeria8
Will the future policing of fraud be ‘a fundamental shift in our approach to tackling fraud’ or largely more of the same? Reviewing the 2023 UK fraud strategy through evidence on the ground8
The role of individual and situational factors on repeat victimization of online fraud in China7
Policing AI-generated crimes: an ethnographic study on anti-cybercrime police in China7
International cooperation in police training: evaluation of a European Union programme for African gendarmes7
Prenzler, T.: preventing crime and disorder in public places: blending opportunity reduction, guardianship and welfare7
The “new” crimes of pandemics: observations and insights from Latin America7
Assessment of performance during cybersecurity tabletop exercises6
About time? Exploring the temporal dimensions and imperatives to crime prevention through environmental design (CPTED) using a construction industry-aligned methodology for more sustainable and resili6
Effects of socioeconomic and digital inequalities on cybersecurity in a developing country6
Assessing the time-varying spatial influence of bus stops on crime by context: a street network analysis6
Measuring the adoption of Enterprise Security Risk Management in Kenya’s higher education using the ASIS ESRM Maturity Model6
Fraudsters target the elderly: Behavioural evidence from randomised controlled scam-baiting experiments6
Cyber-enabled imposter scams against older adults in the United States6
Industrial security protection in the United States before the Pearl Harbor attack: failures to prepare, presidential executive orders, and guard force militarization6
Consciousness towards religious belief and re-radicalization in societies5
Local residents’ perceptions of refugees as neighbors: a qualitative analysis of community social networks, purposive guardianship, and feelings of safety5
Cyber war(fare)s: a bibliometric and topic analysis5
Cyberbullying victimization among university students- a national study of Pakistan5
Michael John Williams, James Wesley Hutto & Asli Peker Dogra: Understanding international security: theory and practice5
Missing targets: which entities are affected by UN counter-terrorism sanctions?5
Prediction of male inmate infractions in Taiwan prisons5
The crime drop in South Africa: an exploratory research note5
Fortifying the digital realm: a comprehensive analysis of cyberspace security and the EU legislative framework5
The realpolitik of jihad: an anatomy of transnational Islamist terrorism in East Africa4
What is the role of architects and urban planners in crime prevention? 4
Balancing campus security and student rights: the case of the University of Botswana4
Regional inequality in citizens’ attitudes towards the police and the effect of stop-and-search4
Perception toward autonomous ride-pooling services and public buses in Pakistan: perspectives in crime and victimization4
Risk perceptions and safe behaviours on the internet among older adults in India3
External auditors’ use and perceptions of fraud factors in assessing fraudulent financial reporting risk (FFRR): Implications for audit policy and practice3
Tactical and psychological aspects of interrogation using new digital technologies and Gesell spy mirror3
Understanding the consideration of strategies for coping with locality violence in Arab society in Israel3
Assessing cybersecurity dynamics: a comparative analysis of data breaches in urban and rural hospitals in the United States3
Open-source intelligence and great-power competition under mediatization3
The dimensions of ‘forensic biosecurity’ in genetic and facial contexts3
Investigating the data in investor alerting portals3
The asymmetric effect of environmental pollution and macroeconomic indicators on interpersonal violence across OECD countries3
Making terrorist content findable: search engines as a key to mitigating Salafi-jihadi persistent presence on the internet3
Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan3
Campus security and students’ perceptions of safety: an evaluation of security practices3
Upholding civil rights through commitment to the rule of law in advocacy3
The shadow of digital society: why the elderly are vulnerable to online phishing—a case study from South Korea3
Identifying cyber security competencies and skills from online job advertisements through topic modeling3
The use of home security technology by survivors of intimate partner and sexual violence: an exploratory study3
Bruneau, T. C.: Outsourcing National Defense: Why and How Private Contractors are Providing Public Services3
Socio-spatial structure of urban communities and the distribution of crime in Makurdi, Nigeria2
Safety perception across boundaries: comparing gated and open Chinese university towns in pathways to security, satisfaction, and engagement2
The virtual "Caliphate" strikes back? Mapping the Islamic State's information ecosystem on the surface web2
Terrorism, democracy and human security: a communication model. Ronald Crelinsten. 2021. Abingdon, Routledge, ISBN 978-036786089-92
Direct and indirect situational crime prevention: using the COSTS criteria to improve interventions2
Population distribution and terrorist attack preference: evidence from Xinjiang, China2
Susceptibility for criminal facilitation in social housing: a psychological perspective2
‘We shall triumph like the Jews’: unveiling the implicit side of IPOB’s armed separatism in Southeast Nigeria2
Digital trust and the adoption of e-government services in Pakistan: a systematic literature review2
Developing and implementing social engineering-prevention policies: a qualitative study2
State or private security supply? An analysis from the institutional economics perspective2
Review of Gates, K. 2025. Targeted: corporations and the police surveillance economy. New York: NYU Press. pp. 196. ISBN 97814798292172
Tabletop scenario exercises as a training tool for improving response to workplace violence2
The money laundering and terrorist financing risks of new and disruptive technologies: a futures-oriented scoping review2
The word mobile phone missing in the Cyber Crime Act, 20152
What really works in preventing fraud against organisations and do decision-makers really need to know?2
Shadow of death: the criminal economy of banditry and kidnapping in northwest Nigeria2
Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project2
Students care “who” carries: probing attributes associated with college students’ attitudes toward campus carry2
Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria2
Does age matter? Examining seniors’ experiences of romance fraud2
Suslov, Tymur: Rethinking security, the human side of risk management2
Reimagining the familiar stranger as a source of security: generating guardianship through everyday mobility2
Addressing cybersecurity and safety disconnects in United States army aviation: an exploratory qualitative case study2
Cryptocurrency Ponzi schemes and their modus operandi in South Korea2
Hidden players: the role of ‘drops’ in the cybercrime ecosystem2
Community-based vigilante violence and corporate social responsibility in Nigeria’s oil-producing region2
Exploring banditry in Nigeria1
Disruptive behavior of young people in shopping malls: a security provider perspective1
Frauds and forgeries in banking industry in Africa: a content analyses of Nigeria Deposit Insurance Corporation annual crime report1
Cyber risks in healthcare and social organizations: analyzing the relationship between cybersecurity profiles and the opinion of protection of managers1
Vulnerability to Social Engineering Across Digital User Generations: A Dual-Theory Approach1
Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study1
Crime at micro-places in public libraries1
Schneider, G. (2025). Presilience: how to navigate risk, embrace opportunity, and build resilience1
Card-not-present fraud: using crime scripts to inform crime prevention initiatives1
Carrying a handgun in public vs. taking a handgun to school among youth: an exploration of the predicting power of risk factors related to delinquency, aggression, and victimization1
Integrated security management model: a proposal applied to organisational resilience1
Issues with the application of CPTED in urban development: a case of City X, Malaysia1
Fraud and cybercrime against older adults in Christian-dominated southern Nigeria1
Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison1
A general problem-solving matrix (GPSM): combining crime prevention and public health tools1
Exploring the value of holiday preferences and routine activities for understanding tourist victimisation while on holiday1
The global digital compact impact on the spread of violence and disinformation on the internet1
Place of hotel characteristics and security systems in hotel operations, Nigeria1
Economic espionage via fake social media profiles in the UK: professional workers awareness and resilience1
Disposable spies: a proposal for a model1
Profiling consumers who reported mass marketing scams: demographic characteristics and emotional sentiments associated with victimization1
Introducing Bayesian belief updating as a method to counter improvised explosive devices: a qualitative case study on identifying human behaviours associated with explosive chemical precursor diversio1
Retraction Note: Formation of a legislative framework in the field of combating cybercrime and strategic directions of its development1
Honor, fear, and coercion: cyberbullying and blackmailing in Palestinian society1
Identifying and preventing future forms of crimes using situational crime prevention1
Cybersecurity threats and vulnerabilities experienced by small-scale African migrant traders in Southern Africa1
Nigerian state and the management of armed conflicts: rethinking the amnesty approach1
How much protection is enough? Predicting the use of webcam protective measures through the lens of low self-control and social learning1
Spatial effects of insecurity on attracting tourists in Middle East countries1
Old problem, new manifestation: the emergence of cultism in rural secondary schools in Anambra state, Nigeria1
Towards safer public spaces: a systematic literature review on CPTED strategies in park design1
Bias and noise in security risk assessments, an empirical study on the information position and confidence of security professionals1
Shifting Cartel powers: an examination of the impact on U.S. and Mexican law enforcement1
The effects of organizational images on security compliance intention: focused on affection and job security in South Korea1
0.089905023574829