nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
About time? Exploring the temporal dimensions and imperatives to crime prevention through environmental design (CPTED) using a construction industry-aligned methodology for more sustainable and resilient cities
|
Cozens, Paul |
|
|
38 |
1 |
|
artikel |
2 |
A comparison of Project Servator and routine stop and search outcomes in the city of London
|
Marchment, Zoe |
|
|
38 |
1 |
|
artikel |
3 |
Assessing cybersecurity dynamics: a comparative analysis of data breaches in urban and rural hospitals in the United States
|
Cornejo, Gilbert Munoz |
|
|
38 |
1 |
|
artikel |
4 |
Assessment the effectiveness of central crisis management at Charles University during the 2023 active shooter incident: a thematic analysis
|
Kalvach, Zdeněk |
|
|
38 |
1 |
|
artikel |
5 |
Awareness of cybersecurity vulnerabilities in virtual reality: an analytical study
|
Wedyan, Mohammad |
|
|
38 |
1 |
|
artikel |
6 |
Balancing campus security and student rights: the case of the University of Botswana
|
Oabile, Goroga |
|
|
38 |
1 |
|
artikel |
7 |
Campus security and students’ perceptions of safety: an evaluation of security practices
|
Roberts, Nicola |
|
|
38 |
1 |
|
artikel |
8 |
Comparing safety perceptions and active mobility in two urban settings: a case study
|
Vozmediano, Laura |
|
|
38 |
1 |
|
artikel |
9 |
Correction to: Counter-terrorism training for business in UK crowded places: is the desire for quantity to the detriment of quality?
|
Aplin, Dylan |
|
|
38 |
1 |
|
artikel |
10 |
Cybercrime against senior citizens: exploring ageism, ideal victimhood, and the pivotal role of socioeconomics
|
Lazarus, Suleman |
|
|
38 |
1 |
|
artikel |
11 |
Cyber-enabled imposter scams against older adults in the United States
|
Shapiro, Lauren R. |
|
|
38 |
1 |
|
artikel |
12 |
Does age matter? Examining seniors’ experiences of romance fraud
|
Cross, Cassandra |
|
|
38 |
1 |
|
artikel |
13 |
Economic espionage via fake social media profiles in the UK: professional workers awareness and resilience
|
Button, Mark |
|
|
38 |
1 |
|
artikel |
14 |
Evolving regularity and geographical patterns of global piracy incidents distribution
|
He, Zhaoyang |
|
|
38 |
1 |
|
artikel |
15 |
Exploring banditry in Nigeria
|
Thompson, Sara T. |
|
|
38 |
1 |
|
artikel |
16 |
Extended editorial: preventing fraud and cybercrime in an ageing society
|
Button, Mark |
|
|
38 |
1 |
|
artikel |
17 |
Fear of fraud amongst older adults: a hidden epidemic?
|
Button, Mark |
|
|
38 |
1 |
|
artikel |
18 |
Fraud and cybercrime against older adults in Christian-dominated southern Nigeria
|
Uroko, Favour Chukwuemeka |
|
|
38 |
1 |
|
artikel |
19 |
Governmentality, financial security and money laundering: the Estonian case of Danske Bank
|
Makarychev, Andrey |
|
|
38 |
1 |
|
artikel |
20 |
Herders without borders: transhumance securitisation and the challenges of national security in Ghana and Nigeria
|
Nwangwu, Chikodiri |
|
|
38 |
1 |
|
artikel |
21 |
How much protection is enough? Predicting the use of webcam protective measures through the lens of low self-control and social learning
|
Nicholson, Jason |
|
|
38 |
1 |
|
artikel |
22 |
Identifying personality traits associated with phishing susceptibility
|
Islam, Amanul |
|
|
38 |
1 |
|
artikel |
23 |
Identifying the spatial patterns and environmental predictors of card skimming at gas stations: a remote systematic social observation of Google Street View imagery
|
Sundquist, Hannah |
|
|
38 |
1 |
|
artikel |
24 |
Identifying urban park design criteria based on women’s sense of security at nighttime leisure activities (case study: Saei Park, Tehran)
|
Gholipour, Soudabeh |
|
|
38 |
1 |
|
artikel |
25 |
Investigating the self-disclosure of personal information on snapchat stories
|
Huie, Kelly |
|
|
38 |
1 |
|
artikel |
26 |
Policing AI-generated crimes: an ethnographic study on anti-cybercrime police in China
|
Qiu, Yaxian |
|
|
38 |
1 |
|
artikel |
27 |
Preventive counselling against online fraud: Does this work?
|
Lee, Youngsub |
|
|
38 |
1 |
|
artikel |
28 |
Promoting employees’ information security vigilance by enhancing awareness: the roles of organizational climate and deterrence measures
|
Paek, Seung Yeop |
|
|
38 |
1 |
|
artikel |
29 |
Public–private partnerships in alarm monitoring and filtering: a Belgian case study into intrusion alarm management
|
Vanscheeuwijck, Amandine |
|
|
38 |
1 |
|
artikel |
30 |
Risk perceptions and safe behaviours on the internet among older adults in India
|
Datti, Ravi Shanker |
|
|
38 |
1 |
|
artikel |
31 |
Risk, regulation, and governance: evaluating artificial intelligence across diverse application scenarios
|
Szadeczky, Tamas |
|
|
38 |
1 |
|
artikel |
32 |
Risky facilities, physical site features, and comparing crime between urban parks
|
Spencer, M. Dylan |
|
|
38 |
1 |
|
artikel |
33 |
Spatial effects of insecurity on attracting tourists in Middle East countries
|
Pesyan, Vahid Nikpey |
|
|
38 |
1 |
|
artikel |
34 |
Tactical and psychological aspects of interrogation using new digital technologies and Gesell spy mirror
|
Biinazarov, Daulet |
|
|
38 |
1 |
|
artikel |
35 |
The crime drop in South Africa: an exploratory research note
|
Breetzke, Gregory D. |
|
|
38 |
1 |
|
artikel |
36 |
The evolving nexus of cybercrime and terrorism: A systematic review of convergence and policy implications
|
Farber, Shai |
|
|
38 |
1 |
|
artikel |
37 |
The great American car crime decline
|
Farrell, Graham |
|
|
38 |
1 |
|
artikel |
38 |
The Portuguese Muslim community: integration and its role against radicalization
|
de Carvalho, Cátia Moreira |
|
|
38 |
1 |
|
artikel |
39 |
The role of the internal auditor, stakeholders, and external auditor in discovering and reducing creative accounting practices in UAE companies
|
Abubakr, Ayman Abdalla Mohammed |
|
|
38 |
1 |
|
artikel |
40 |
The shadow of digital society: why the elderly are vulnerable to online phishing—a case study from South Korea
|
Kim, Myounghoon |
|
|
38 |
1 |
|
artikel |
41 |
The use of home security technology by survivors of intimate partner and sexual violence: an exploratory study
|
Hefner, M. Kristen |
|
|
38 |
1 |
|
artikel |
42 |
The wisdom of the scammed: redefining older fraud victim support by utilizing the ecological systems framework
|
Parti, Katalin |
|
|
38 |
1 |
|
artikel |
43 |
The word mobile phone missing in the Cyber Crime Act, 2015
|
Hassan, Kilavo |
|
|
38 |
1 |
|
artikel |
44 |
Urban green infrastructure and safety: examining the relative effects of socio-economic and environmental factors on perceived safety of users
|
Saeedi, Iman |
|
|
38 |
1 |
|
artikel |
45 |
Vulnerability to Social Engineering Across Digital User Generations: A Dual-Theory Approach
|
Viana, José Augusto Lopes |
|
|
38 |
1 |
|
artikel |
46 |
“Why did I fall for it?” Exploring internet fraud susceptibility in the pig butchering scam
|
Xie, Ziyi |
|
|
38 |
1 |
|
artikel |
47 |
Will the future policing of fraud be ‘a fundamental shift in our approach to tackling fraud’ or largely more of the same? Reviewing the 2023 UK fraud strategy through evidence on the ground
|
Doig, Alan |
|
|
38 |
1 |
|
artikel |