Security Journal

Papers
(The TQCC of Security Journal is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Investigating co-offender connections from offender’s hometown background: a practical study in Beijing48
Terrorism, democracy and human security: a communication model. Ronald Crelinsten. 2021. Abingdon, Routledge, ISBN 978-036786089-930
Transit crime and sexual violence in cities: international evidence and prevention15
The effect of perceived citizen views and supervisor support on Private Security Officers’ job satisfaction: the mediating role of self-legitimacy13
Understanding the consideration of strategies for coping with locality violence in Arab society in Israel13
Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan11
Body-worn camera activation in prisons: understanding correctional officers’ decision-making and use of discretion10
Public perceptions of dangerous places: sources of variability in evaluating criminogenic environments9
‘They won’t steal my tilili phone’: expanding the market reduction approach to reduce property crime in South Africa9
The planning and reflection of police use of force training: a German case study9
Exploring public trust in policing at a community in Ghana8
Improving crime count forecasts in the city of Rio de Janeiro via reconciliation7
High school gun carrying: the role of disorder, collective efficacy, and police efficacy at school in a predominantly black sample7
Identifying trends and patterns in offending and victimization on Snapchat: a rapid review6
Ambient lighting, use of outdoor spaces and perceptions of public safety: evidence from a survey experiment6
Stakeholders’ views of online surveillance capabilities: a comparative analysis of the debates in UK, Finland and Norway6
State or private security supply? An analysis from the institutional economics perspective6
Ivelaw Lloyd Griffith: Challenged sovereignty: the impact of drugs, crime, terrorism, and cyber threats in the Caribbean6
The use of home security technology by survivors of intimate partner and sexual violence: an exploratory study6
How much protection is enough? Predicting the use of webcam protective measures through the lens of low self-control and social learning5
Retraction Note: Formation of a legislative framework in the field of combating cybercrime and strategic directions of its development5
Standardisation of investigative process in invasive and destructive techniques of mobile forensics in India4
Frauds and forgeries in banking industry in Africa: a content analyses of Nigeria Deposit Insurance Corporation annual crime report4
Evolving regularity and geographical patterns of global piracy incidents distribution4
A bibliometric study on recent trends in artificial intelligence-based suspicious activity recognition4
A family affair? Exploratory insights into the role of family members of those who joined jihadist groups4
Prevention and mitigation measures against phishing emails: a sequential schema model4
What is the role of private intelligence in the Slovak Republic? Legal and practical aspects of private detective services4
Security and urban satisfaction: developing a model based on safe urban park design components extracted from users' preferences4
The great American car crime decline4
Effects of socioeconomic and digital inequalities on cybersecurity in a developing country3
Missing targets: which entities are affected by UN counter-terrorism sanctions?3
Relations between police and private security officers: a case study of Serbia3
Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries3
Foundations and trends in the darknet-related criminals in the last 10 years: a systematic literature review and bibliometric analysis3
Community perceptions of private security at a mega-event3
Exploring socio-demographic factors, avoiding being a victim and fear of crime in a Nigerian university3
Role of esthetic judgment on perceived safety of urban parks’ users3
Retrofit design for preventing theft on the university campus3
Crime at micro-places in public libraries3
Good, but not good enough: what church leaders think about the Presidential Amnesty Programme in Rivers State, Nigeria3
Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison3
Measuring the adoption of Enterprise Security Risk Management in Kenya’s higher education using the ASIS ESRM Maturity Model2
The dimensions of ‘forensic biosecurity’ in genetic and facial contexts2
Bruneau, T. C.: Outsourcing National Defense: Why and How Private Contractors are Providing Public Services2
Are tourists being targeted? Panel data analysis of terror attacks against tourist targets2
Using hotspot analysis to prioritize security efforts in Colombian critical infrastructure, a focus on the power grid2
Examining the simultaneous use of home protection methods2
Socio-spatial structure of urban communities and the distribution of crime in Makurdi, Nigeria2
Research of security and safety culture within an organization. The case study within the Slovak Republic2
Disruptive behavior of young people in shopping malls: a security provider perspective2
Catch ‘em if you can: examining how often and how quickly people who escape from prisons and jails are recaptured2
What really works in preventing fraud against organisations and do decision-makers really need to know?2
Nudging as a crime prevention strategy: the use of nudges to improve cyclists’ locking behavior and reduce the opportunities for bicycle theft2
Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project2
Routine activities theory and food fraud victimization2
‘We shall triumph like the Jews’: unveiling the implicit side of IPOB’s armed separatism in Southeast Nigeria2
Nigerian state and the management of armed conflicts: rethinking the amnesty approach2
Open-source intelligence and great-power competition under mediatization2
Framing Amish victimization and security through the lens of criminological theory2
RETRACTED ARTICLE: International legal approaches in combatting raidership2
Issues with the application of CPTED in urban development: a case of City X, Malaysia2
Nigeria and Niger Republic trans-border management against arms trafficking: a whistleblowing model2
Introducing Bayesian belief updating as a method to counter improvised explosive devices: a qualitative case study on identifying human behaviours associated with explosive chemical precursor diversio2
The influence of pledging allegiance on terrorist attacks: the case of Boko Haram and Islamic State2
0.028310060501099