Security Journal

Papers
(The TQCC of Security Journal is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Transit crime and sexual violence in cities: international evidence and prevention34
High school gun carrying: the role of disorder, collective efficacy, and police efficacy at school in a predominantly black sample33
The planning and reflection of police use of force training: a German case study23
Awareness of cybersecurity vulnerabilities in virtual reality: an analytical study21
Identifying trends and patterns in offending and victimization on Snapchat: a rapid review20
The great American car crime decline14
Risk, regulation, and governance: evaluating artificial intelligence across diverse application scenarios14
A bibliometric study on recent trends in artificial intelligence-based suspicious activity recognition13
Evolving regularity and geographical patterns of global piracy incidents distribution12
Review of Sutton, B. 2023. Bulletproof fashion: security, emotions, and the fortress body12
Comparative analysis of the activities of authorities to ensure the prevention of offenses in the Republic of Kazakhstan and other world countries12
How effective are residential CCTV systems: Evaluating the impact of natural versus mechanical surveillance on house break-ins and theft in hotspots of Penang Island, Malaysia10
The effect of unreported gun-related violent crime on crime hot spots10
Drawing the line: public attitudes towards warranted and unwarranted government surveillance in European countries9
Protests and blood on the streets: repressive state, police brutality and #EndSARS protest in Nigeria8
Comparing safety perceptions and active mobility in two urban settings: a case study8
International cooperation in police training: evaluation of a European Union programme for African gendarmes7
Assessment of performance during cybersecurity tabletop exercises7
The “new” crimes of pandemics: observations and insights from Latin America7
Will the future policing of fraud be ‘a fundamental shift in our approach to tackling fraud’ or largely more of the same? Reviewing the 2023 UK fraud strategy through evidence on the ground7
Herders without borders: transhumance securitisation and the challenges of national security in Ghana and Nigeria7
Fraudsters target the elderly: Behavioural evidence from randomised controlled scam-baiting experiments6
Cyber-enabled imposter scams against older adults in the United States6
Policing AI-generated crimes: an ethnographic study on anti-cybercrime police in China6
Assessing the time-varying spatial influence of bus stops on crime by context: a street network analysis6
Industrial security protection in the United States before the Pearl Harbor attack: failures to prepare, presidential executive orders, and guard force militarization5
Measuring the adoption of Enterprise Security Risk Management in Kenya’s higher education using the ASIS ESRM Maturity Model5
Missing targets: which entities are affected by UN counter-terrorism sanctions?5
About time? Exploring the temporal dimensions and imperatives to crime prevention through environmental design (CPTED) using a construction industry-aligned methodology for more sustainable and resili5
Effects of socioeconomic and digital inequalities on cybersecurity in a developing country5
Prediction of male inmate infractions in Taiwan prisons4
The influence of pledging allegiance on terrorist attacks: the case of Boko Haram and Islamic State4
The (in)security and educational perspectives of child sexual abuse: insights from Nigerian newspaper records4
Consciousness towards religious belief and re-radicalization in societies4
Correction to: Reliability: understanding cognitive human bias in artificial intelligence for national security and intelligence analysis4
The crime drop in South Africa: an exploratory research note4
Fortifying the digital realm: a comprehensive analysis of cyberspace security and the EU legislative framework4
Perception toward autonomous ride-pooling services and public buses in Pakistan: perspectives in crime and victimization3
Local residents’ perceptions of refugees as neighbors: a qualitative analysis of community social networks, purposive guardianship, and feelings of safety3
What is the role of architects and urban planners in crime prevention? 3
Critical workers? Private security, public perceptions and the Covid-19 pandemic3
Police recruits’ wants and needs in police training in Germany3
The realpolitik of jihad: an anatomy of transnational Islamist terrorism in East Africa3
The shadow of digital society: why the elderly are vulnerable to online phishing—a case study from South Korea3
Cyberbullying victimization among university students- a national study of Pakistan3
Balancing campus security and student rights: the case of the University of Botswana3
External auditors’ use and perceptions of fraud factors in assessing fraudulent financial reporting risk (FFRR): Implications for audit policy and practice3
Socio-spatial structure of urban communities and the distribution of crime in Makurdi, Nigeria2
What really works in preventing fraud against organisations and do decision-makers really need to know?2
Open-source intelligence and great-power competition under mediatization2
Understanding the consideration of strategies for coping with locality violence in Arab society in Israel2
Crime prevention through environmental design (CPTED) and its potential for campus safety: a qualitative study2
Regional inequality in citizens’ attitudes towards the police and the effect of stop-and-search2
Role of esthetic judgment on perceived safety of urban parks’ users2
Specifics of the legal regulation of the prevention of the taking and killing of hostages in the context of terrorist threats2
Bruneau, T. C.: Outsourcing National Defense: Why and How Private Contractors are Providing Public Services2
Shadow of death: the criminal economy of banditry and kidnapping in northwest Nigeria2
Risk perceptions and safe behaviours on the internet among older adults in India2
Assessing cybersecurity dynamics: a comparative analysis of data breaches in urban and rural hospitals in the United States2
The use of home security technology by survivors of intimate partner and sexual violence: an exploratory study2
Tactical and psychological aspects of interrogation using new digital technologies and Gesell spy mirror2
The dimensions of ‘forensic biosecurity’ in genetic and facial contexts2
Community-based vigilante violence and corporate social responsibility in Nigeria’s oil-producing region2
Exploring the physical risks and security mechanisms for Chinese companies operating under the China–Pakistan Economic Corridor Project2
Should firearms be allowed in K-12 public schools? An analysis of law enforcement’s perceptions of armed teacher policies2
Campus security and students’ perceptions of safety: an evaluation of security practices2
Examining the simultaneous use of home protection methods2
Detection of price manipulation fraud through rational choice theory: evidence for the retail industry in Taiwan2
Identifying cyber security competencies and skills from online job advertisements through topic modeling2
The asymmetric effect of environmental pollution and macroeconomic indicators on interpersonal violence across OECD countries2
A survey of extremism online content analysis and prediction techniques in twitter based on sentiment analysis2
Digital trust and the adoption of e-government services in Pakistan: a systematic literature review2
‘We shall triumph like the Jews’: unveiling the implicit side of IPOB’s armed separatism in Southeast Nigeria2
0.044497013092041