Article Title,Year,Volume,Issue,Page Range,Author Americans’ Attitudes toward War: Trend Analysis of Public Opinion for the Iraq War,2010,5,2,208,Boussios An Approach to the Study of Transport and Dispersion of Threat Agents in a Subway Station,2009,4,1,68,Richmond-Bryant An Insider View of the Sleeper Cell Terrorist: A Face Validity Study,2008,3,3,325,Homant Delivery Drivers and Long-Haul Truckers: Traveling Serial Murderers,2008,3,2,171,McClellan Disaster Vulnerability Education: A New Focus on Disaster Education Across the Curriculum,2009,4,1,60,Miller Do Individual Characteristics Matter? An Analysis of Americans’ Opinions toward the Korean Vietnam Persian Gulf and Iraq Wars,2010,5,3,279,Boussios Electronic Security Screening: Its Origin with Aviation Security 1968–1973,2010,5,4,460,Haas Eliminating the Learning Curve -- A Pragmatic Look at Jihadist Use of the Internet,2008,3,1,71,Hedges Examining Existing Counter-Terrorism Tactics and Applying Social Network Theory to Fight Cyberterrorism: An Interpersonal Communication Perspective,2008,3,2,191,Breen Excitation Transfer Theory: An Analysis of the Abu Ghraib Prison Abuse Scandal,2009,4,3,309,Breen Forensic Science and Terrorism,2008,3,1,25,Almog How Does the 1979 Iranian Revolution Affect Current Iranian Fundamentalism and International Politics?,2010,5,3,414,Inafuku How to Catch a Terrorist: Is Mass Surveillance the Answer?,2010,5,1,20,Maras Preparing for Terrorism Involving Radioactive Materials: Three Lessons from Recent Experience and Research,2009,4,1,9,Becker Preventing Youths from Joining Gangs: How to Apply Inoculation Theory,2009,4,1,109,Breen Property Crime at O’Hare International Airport: An Examination of the Routine Activities Approach,2010,5,1,42,Yalda Risk Assessment and Management Teams: A Comprehensive Approach to Early Intervention in Workplace Violence,2010,5,2,159,Kenny The Beslan Hostage Crisis: A Case Study for Emergency Responders,2009,4,1,21,McDaniel The Far Horizons of Faith-Religious Conflict in the New Millennium -- Five Key Observations,2008,3,1,57,Fowler The Softest of Targets: A Study on Terrorist Target Selection,2009,4,3,258,Stein The Urban Region as Locus of Security Problems -- Toward Research and Education to Safeguard New York and Other Urban Areas from Terrorism and Disaster,2008,3,1,11,Sternberg Transportation Density and Opportunities for Expediting Recovery to Promote Security,2009,4,1,48,Zimmerman Criminal foreplay: the process from target selection to victimization,2012,7,4,439-451,Kenny Arms trafficking in Transnistria: a European security threat?,2012,7,1,71-92,Peterka-Benton Parliamentary attempts to define terrorism in Canada and Australia,2016,11,2,124-138,Carver Borderland security and migration: balancing humanitarian response with crisis preparedness & emergency management--the social and cultural challenges to homeland security,2017,12,1,1-6,Miller Islamic caliphate: a quasi-state a global security threat,2017,12,1,96-116,Tziarras Organizational trust and fear of injury and the correlates of organizational trust among private correctional staff,2017,12,3,337-355,Minor Airport environment and passengers' satisfaction with safety,2017,12,3,356-373,Ceccato Terrorism as a political violence: the formula,2017,12,3,407-414,Sysoev Hospital security director background opinions and the implementation of security programs,2017,12,4,497-511,Hartley Youth perceptions of private security guard industry in Russia,2017,12,4,543-556,Nalla Why airline passenger screening will be with us forever: past present and prospects for air travel safety,2018,13,2,149-159,McCrie Gravity of terror: a computational model,2018,13,2,172-185,Zahedzadeh Some reflections on radicalization (Editorial),2018,13,1,1-28,Cooper Terrorist group types and tactic choice,2018,13,1,89-110,Ahmed The discretion of Supreme Court justices on sexually indecent acts on women over the age of 15,2018,13,1,128-141,Wijaranayarn Terrorist ideologies and target selection,2018,13,3,376-390,Ahmed Law enforcement fear of crime and violence in Thailand's southernmost provinces,2018,13,3,391-409,Chokprajakchat Impact evaluation of situational prevention strategies and CPTED (crime prevention through environmental design) in vulnerable neighborhoods in Latin America,2018,13,4,437-454,V Communication of terrorism: social noise the signature method and the conduit metaphor,2018,13,4,455-472,Matusitz Critical factors affecting stadiums security,2018,13,4,473-488,Taylor A privacy-preserving passenger information management scheme for road transport system in Nigeria,2018,13,4,502-531,Kamil Does community policing help to solve crime? A look at its relationships with crime clearance rates,2019,14,1,3-31,Kingshott Democratizing school safety,2019,14,2,123-139,Greenberg Responding to terror: an empirical analysis of U.S. military activity public opinion and transnational terrorism,2019,14,2,140-168,Carter Run hide fight--from the AR-15? A study of firearms depictions in active/mass shooter instructional videos,2019,14,3,329-349,Dong Current considerations of counter terrorism in the risk management profession,2019,14,3,350-368,Monaghan Violent crime in bars: a quantitative analysis,2019,14,4,369-389,Kelley Stop them in their tracks: migration policies drug markets and terrorism,2019,14,4,390-426,Avdan The threats of returning foreign terrorist fighters for the European security,2020,15,1,10-27,Babanoski The strategic logic of environmental terrorism: linking terrorist ideology to credit claiming behavior,2020,15,1,28-48,Ahmed Exploring community security interventions using design thinking approach,2020,15,1,73-83,Bonsu Airport security and visibility: security as visualization and its in-place performance,2020,15,3,332-354,Komasová A new terrorism categorization based on casualties and consequences using hierarchical clustering,2020,15,3,369-384,Wario Threats to aviation: modeling effectiveness,2020,15,3,385-407,Hodwitz Patty Hearst and the Symbionese Liberation Army (SLA): an examination through differential association theory,2020,15,3,408-422,Matusitz New dimensions of farmer-herder conflict in the Afram Plains of Ghana: implications for human security,2020,15,4,484-497,Otu Hard versus soft measures to security: explaining the failure of counter-terrorism strategy in Nigeria,2020,15,4,547-567,Onuoha TerrorClassify: an algorithm for terror groups placement into hierarchical categories of casualties and consequences,2020,15,4,568-579,Wario Change-point analysis of Houston crime during Hurricane Harvey,2021,16,1,1-18,Augusto Intelligent fake news detection: a systematic mapping,2021,16,2,168-189,Silva Social support and its link to workplace trust among correctional staff: an exploratory research note,2021,16,2,147-167,Minor