| Counterterrorism in Africa: an analysis of the civilian joint task force and military partnership in Nigeria |
10 |
| Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities |
8 |
| Preventing occupational corruption: utilising situational crime prevention techniques and theory to enhance organisational resilience |
7 |
| Gender, age, crime victimization, and fear of crime: findings from a sample of Kenyan College students |
7 |
| The role of land use and walkability in predicting crime patterns: A spatiotemporal analysis of Miami-Dade County neighborhoods, 2007-2015 |
7 |
| Near-repeat shootings in contemporary Sweden 2011 to 2015 |
6 |
| Online romance scams and victimhood |
5 |
| Repeat and near-repeat victimization in Campinas, Brazil: new explanations from the Global South |
4 |
| Did they report it to stop it? A realist evaluation of the effect of an advertising campaign on victims' willingness to report unwanted sexual behaviour |
4 |
| From system to pedagogy: towards a nonlinear pedagogy of self-defense training in the police and the civilian domain |
4 |
| A tale of two universities: a comparison of college students' attitudes about concealed carry on campus |
4 |
| The near repeats of gun violence using acoustic triangulation data |
3 |
| A security risk perception model for the adoption of mobile devices in the healthcare industry |
3 |
| Perception of police legitimacy among private security officers |
3 |
| The spatial concentration and stability of crime in a South African township |
3 |
| The not so dark side of the darknet: a qualitative study |
3 |
| Do sports stadiums generate crime on days without matches? A natural experiment on the delayed exploitation of criminal opportunities |
2 |
| You can trust me: a multimethod analysis of the Nigerian email scam |
2 |
| Burglars' take on crime prevention through environmental design (CPTED): reconsidering the relevance from an offender perspective |
2 |
| Situational crime prevention and Public Safety Canada's crime-prevention programme |
2 |
| Explaining the adoption of security measures by places of worship: perceived risk of victimization and organizational structure |
2 |
| Arson in an urban setting: a multi-event near repeat chain analysis in Flint, Michigan |
2 |
| The snitching hour: investigations and interviewing in a county jail |
2 |
| The dispersion of crime concentration during a period of crime increase |
2 |
| Predicting job satisfaction and motivation of aviation security personnel: a test of job characteristics theory |
2 |
| Leader power and employees' information security policy compliance |
2 |
| The rating model of corporate information for economic security activities |
2 |
| A quasi-experimental evaluation using roadblocks and automatic license plate readers to reduce crime in Buffalo, NY |
1 |
| The effects of perceptions of staff-inmate boundary violations and willingness to follow rules upon work stress |
1 |
| Understanding shoplifting of fast-moving consumer goods: an application of the CRAVED model |
1 |
| Adding to the mix: a multilevel analysis of residential burglary |
1 |
| Understanding risky facilities: an analysis of factors associated with jail escapes in eight states |
1 |
| Perceptions of crime hot-spots and real locations of crime incidents in two South African neighbourhoods |
1 |
| The police corruption crime problem in Kenya |
1 |
| Football pollution: an investigation of spatial and temporal patterns of crime in and around stadia in England |
1 |
| Situational determinants of enhanced public view monitor (ePVM) noticeability in retail environments: a randomized controlled trial |
1 |
| The role of perceived effectiveness in home security choices |
1 |
| The use of the risk management model ISO 31000 by private security companies in South Africa |
1 |
| Understanding the role of parenting in developing radical beliefs: Lessons learned from Indonesia |
1 |
| Preventing near-repeat residential burglary through cocooning: post hoc evaluation of a targeted police-led pilot intervention |
1 |
| The Ipswich (Queensland) safe city program: an evaluation |
1 |
| Domestic extremist criminal damage events: behaving like criminals or terrorists? |
1 |
| Police moonlighting and gender difference: exploring paid detail security for men and women officers in North American police departments |
0 |
| An assessment of factors affecting airport security services: an AHP approach and case in Turkey |
0 |
| Quality of work life of bank security guards in Brazil: a research note |
0 |
| Smart use of smart weapons: jail officer liability for the inappropriate use of tasers and stun guns on pretrial detainees |
0 |
| PAUSED for thought? Using verbal protocol analysis to understand the situational and temporal cues in the decision-making of residential burglars |
0 |
| Global trends in the standardization of the burglary-resistance testing of security hardware |
0 |
| A case study of bicycle theft on the Washington DC Metrorail system using a Routine Activities and Crime Pattern theory framework |
0 |
| Moving beyond shrinkage: developing a definition and typology of total retail loss |
0 |