about
Workplace violence against female long-haul truckersSpatial impact of burglar alarms on the decline of residential burglaryIssues in courtroom security: A key role for the private sector in Australia and New ZealandDeveloping a Risk Profile and Model Regulatory System for the Security IndustrySecurity in Stockholm's underground stations: The importance of environmental attributes and contextGender, age, crime victimization, and fear of crime: findings from a sample of Kenyan College studentsThe effectiveness of women's safety auditsPerceptions of the eCrime controllers: Modelling the influence of cooperation and data source factorsThe Conjunction of Terrorist Opportunity: A Framework for Diagnosing and Preventing Acts of TerrorismThe projection and measurement of cyberpowerThe effectiveness of burglary security devicesPhone Theft IndexIntroductionUsing trust and anonymity to expand the use of anonymizing systems that improve security across organizationsResearch on Burglary at the End of the Millennium: A Grounded Approach to Understanding CrimeBreaking bad? In search of a (softer) systems view of security ergonomicsSafe, secure or punctual? A simulator study of train driver response to reports of explosives on a metro trainThe when and where of an emerging crime type: The example of metal theft from the railway network of Great BritainAnatomy of the online dating romance scamSituational crime prevention and Public Safety Canada’s crime-prevention programmeReducing harm from explosive attacks against railwaysPublic disorder and business crime victimization in the retail sectorDoes Finland need an entry-ban system for football matches (and similar public events)? Examining the current state of regulation and security issuesCross-border Crime and the Interface between Legal and Illegal ActorsCampus violence preparedness of US college campusesManaging Security in Semi-Penal Institutions for WomenVolunteer police: History, benefits, costs and current descriptions
P1433
Q23912005-E0337E09-0C45-4741-9D78-7981B7C61E11Q56485080-BB18BF67-C69B-4A46-8B2B-3D8B779F2594Q57379819-9B59AE2A-E055-48AA-ABA6-BA9399ABB65DQ57379845-49E16B3C-AC02-43BA-AB95-36E81F268BC4Q57498270-4D9440E9-8C7C-406A-9BB7-B9A6114C5BCDQ57536755-AC8DD126-1AEE-4785-A8F3-C838E36A7472Q57571602-C071AF19-B303-4D4F-9BE7-911F14DF4BB8Q57659132-68C9657D-FD5F-4F76-A6FD-60B2CE566CF1Q57719287-415D3825-01FE-40FE-BA35-684244DADD14Q57751633-3B6E1C6A-6C3F-4E3F-9861-E77223AB8BEBQ58421872-D8A55444-C63F-41FE-B093-E24BEC21DF86Q58421904-45231FAF-AEA0-44F5-9A03-CC5481932949Q58421913-84F9F26B-4BC1-40F7-B88F-61F19E449A6CQ59108891-DA303878-B2B5-40B5-9B2D-61D73595E22AQ59287378-0007D577-D6A4-4187-94CC-5B6D18DFD233Q59476538-0396E93C-ADD5-4B62-A49E-66602E8A9E20Q59476620-35C2DBDB-7932-462E-ACEB-AB999A21146BQ59615571-8A35F8BA-4BBA-4F13-BBB2-BB6E35CDE755Q59816471-DA79D7D6-EEA4-4F25-A1FC-260ADD76ED11Q59885380-2CB43DC2-683B-4BC8-811F-8B5B9E001D97Q60330866-ADE60D2E-8A6B-41E4-80BD-3F33EE033CB3Q60644151-D48A5AB5-129A-498B-9EBE-EAA5540EE5E4Q60644156-637AD615-AD9C-4F42-B9AE-A1D51BD4F67FQ61440729-5F3AC44C-B589-4EAA-BF53-14D7F442A8F7Q61773730-CBAA1E6C-77B7-480C-83A2-45D79E4162D7Q61835120-FC766FF1-4643-4C62-9D69-7D45D7E3AA69Q64357312-D14E2ECB-D2F6-4D41-9B78-EEF9D6CAD18D
P1433
description
journal
@en
revista científica
@es
rivista scientifica
@it
wetenschappelijk tijdschrift van Palgrave Macmillan
@nl
wissenschaftliche Fachzeitschrift
@de
مجلة
@ar
name
Security Journal
@ast
Security Journal
@en
Security Journal
@es
Security Journal
@it
Security Journal
@nl
type
label
Security Journal
@ast
Security Journal
@en
Security Journal
@es
Security Journal
@it
Security Journal
@nl
prefLabel
Security Journal
@ast
Security Journal
@en
Security Journal
@es
Security Journal
@it
Security Journal
@nl
P236
P3181
P1058
P1156
5700169004
P1277
P1476
Security Journal
@en