nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analyzing a Dark Web forum page in the context of terrorism: a topic modeling approach
|
Sonmez, Eda |
|
|
37 |
4 |
p. 1360-1381 |
artikel |
2 |
Bridging the gap between criminology and computer vision: A multidisciplinary approach to curb gun violence
|
Houser, Tyler E. |
|
|
37 |
4 |
p. 1409-1429 |
artikel |
3 |
Community-based vigilante violence and corporate social responsibility in Nigeria’s oil-producing region
|
Uduji, Joseph Ikechukwu |
|
|
37 |
4 |
p. 1241-1268 |
artikel |
4 |
Comparative analysis of the activities of authorities to ensure the prevention of offenses in the Republic of Kazakhstan and other world countries
|
Zhakenov, Kassymbek |
|
|
37 |
4 |
p. 1430-1446 |
artikel |
5 |
Correction to: Community-based vigilante violence and corporate social responsibility in Nigeria’s oil-producing region
|
Uduji, Joseph Ikechukwu |
|
|
37 |
4 |
p. 1810-1811 |
artikel |
6 |
Crime analysis and prediction using machine-learning approach in the case of Hossana Police Commission
|
Wubineh, Betelhem Zewdu |
|
|
37 |
4 |
p. 1269-1284 |
artikel |
7 |
Cryptocurrency Ponzi schemes and their modus operandi in South Korea
|
Choi, Seoung Won |
|
|
37 |
4 |
p. 1285-1300 |
artikel |
8 |
Decision-making in balancing fire safety hazards against security threats within the built environment
|
Kathage, Richard |
|
|
37 |
4 |
p. 1546-1575 |
artikel |
9 |
Digital security by design
|
Radanliev, Petar |
|
|
37 |
4 |
p. 1640-1679 |
artikel |
10 |
Disruptive behavior of young people in shopping malls: a security provider perspective
|
Paloušová, Viktorie |
|
|
37 |
4 |
p. 1322-1338 |
artikel |
11 |
Don’t call it a comeback! Revictimization and the cycle of violence at micro-places
|
Schnell, Cory |
|
|
37 |
4 |
p. 1483-1508 |
artikel |
12 |
Drawing the line: public attitudes towards warranted and unwarranted government surveillance in European countries
|
Školník, Milan |
|
|
37 |
4 |
p. 1447-1462 |
artikel |
13 |
Exploring the value of holiday preferences and routine activities for understanding tourist victimisation while on holiday
|
Vakhitova, Zarina I. |
|
|
37 |
4 |
p. 1526-1545 |
artikel |
14 |
Fight or flight? Intended behavior in a school shooting among students who support or oppose concealed campus carry
|
Dum, Christopher P. |
|
|
37 |
4 |
p. 1463-1482 |
artikel |
15 |
Fraudsters target the elderly: Behavioural evidence from randomised controlled scam-baiting experiments
|
Robinson, Jemima |
|
|
37 |
4 |
p. 1173-1196 |
artikel |
16 |
High school gun carrying: the role of disorder, collective efficacy, and police efficacy at school in a predominantly black sample
|
Stoddart, Dahlia |
|
|
37 |
4 |
p. 1787-1809 |
artikel |
17 |
Identifying cyber security competencies and skills from online job advertisements through topic modeling
|
Ozyurt, Ozcan |
|
|
37 |
4 |
p. 1339-1359 |
artikel |
18 |
Improving crime count forecasts in the city of Rio de Janeiro via reconciliation
|
Nascimento, Marcus L. |
|
|
37 |
4 |
p. 1597-1618 |
artikel |
19 |
Ivelaw Lloyd Griffith: Challenged sovereignty: the impact of drugs, crime, terrorism, and cyber threats in the Caribbean
|
Wallace, Wendell C. |
|
|
37 |
4 |
p. 1741-1744 |
artikel |
20 |
Local residents’ perceptions of refugees as neighbors: a qualitative analysis of community social networks, purposive guardianship, and feelings of safety
|
Ahlin, Eileen M. |
|
|
37 |
4 |
p. 1576-1596 |
artikel |
21 |
Measuring the adoption of Enterprise Security Risk Management in Kenya’s higher education using the ASIS ESRM Maturity Model
|
Amuya, Levis Omusugu |
|
|
37 |
4 |
p. 1301-1321 |
artikel |
22 |
Open-source intelligence and great-power competition under mediatization
|
Zhou, Jiaxi |
|
|
37 |
4 |
p. 1769-1786 |
artikel |
23 |
Place of hotel characteristics and security systems in hotel operations, Nigeria
|
Oladehinde, Gbenga John |
|
|
37 |
4 |
p. 1382-1408 |
artikel |
24 |
Public support for gunshot detection technology
|
Henning, Kris |
|
|
37 |
4 |
p. 1619-1639 |
artikel |
25 |
Rethinking the US Global War on Terror in the Sahel (2001–2017) between deterrence and defeat of violent extremist groups
|
Djedei, Abdellatif |
|
|
37 |
4 |
p. 1197-1240 |
artikel |
26 |
RETRACTED ARTICLE: International legal approaches in combatting raidership
|
Khamitov, Bauyrzhan N. |
|
|
37 |
4 |
p. 1745 |
artikel |
27 |
Retraction Note: Formation of a legislative framework in the field of combating cybercrime and strategic directions of its development
|
Nukusheva, Aigul |
|
|
37 |
4 |
p. 1812-1813 |
artikel |
28 |
Shadow of death: the criminal economy of banditry and kidnapping in northwest Nigeria
|
Ojewale, Oluwole |
|
|
37 |
4 |
p. 1680-1710 |
artikel |
29 |
Stakeholders’ views of online surveillance capabilities: a comparative analysis of the debates in UK, Finland and Norway
|
Leppänen, Anna-Riitta |
|
|
37 |
4 |
p. 1711-1740 |
artikel |
30 |
The dimensions of ‘forensic biosecurity’ in genetic and facial contexts
|
Kruger, Erin |
|
|
37 |
4 |
p. 1746-1768 |
artikel |
31 |
The effects of organizational images on security compliance intention: focused on affection and job security in South Korea
|
Oh, Juyeon |
|
|
37 |
4 |
p. 1509-1525 |
artikel |