Security Journal

短名Secur J
Journal Impact1.24
国际分区CRIMINOLOGY & PENOLOGY(Q3)
期刊索引SCI Q4中科院 4 区
ISSN0955-1662, 1743-4645
h-index31
国内分区社会学(4区)社会学犯罪学与刑罚学(4区)

The Security Journal is a dynamic publication that keeps you informed about the latest developments and techniques in security management. Written in an accessible style, it is the world's premier peer-reviewed journal for today's security researcher and professional. The journal is affiliated to ASIS International and has an advisory board which includes representatives from major associations, expert practitioners and leading academics. The Security Journal publishes papers at the cutting edge in developing ideas and improving practice, focusing on the latest research findings on all aspects of security. Regular features include personal opinions and informed comment on key issues in security, as well as incisive reviews of books, videos and official reports.What are the benefits of subscribing? Learn from evaluations of the latest security measures, policies and initiatives; keep up-to-date with new techniques for managing security, as well as the latest findings and recommendations of independent research; understand new perspectives and how they inform the theory and practice of security management.What makes the journal distinct? Articles are jargon free and independently refereed; papers are at the cutting edge in developing ideas and improving practice; we have appointed an Advisory Board which includes representatives from leading associations, skilled practitioners and the world's leading academics.How does the journal inform? The Security Journal publishes innovative papers highlighting the latest research findings on all aspects of security; incisive reviews of books, videos and official reports; personal opinions and informed comment on key issues.Topics covered include:fraudevaluations of security measuresshop theftburglaryorganised crimecomputer and information securityrepeat victimisationviolence within the work placeprivate policinginsuranceregulation of the security industryCCTVtaggingaccess controlaviation securityhealth and safetyarmed robberydesigning out crimesecurity staffoffenders' viewsPlease note that the journal does not accept technical or mathematic submissions or research based on formulas or prototypes.期刊官方网站https://www.springer.com/41284期刊投稿网址https://www.editorialmanager.com/sejo作者指南网址https://www.springer.com/41284/submission-guidelines是否OA开放访问No通讯方式出版商Springer Nature涉及的研究方向CRIMINOLOGY & PENOLOGY-出版国家或地区出版语言出版周期4 issues per year出版年份0年文章数 63注册 或登录 后,查看年文章数趋势图Gold OA文章占比5.96%研究类文章占比: 文章 ÷(文章 + 综述)100.00%WOS期刊SCI分区 ( 2021-2022年最新版)WOS分区等级:3区 按学科分区CRIMINOLOGY & PENOLOGY Q4 Q3 Q4 中科院《国际期刊预警 名单(试行)》名单 2021年12月发布的2021版:不在预警名单中 2021年01月发布的2020版:不在预警名单中中科院SCI期刊分区 ( 2022年12月最新升级版) 注册 或登录 后,查看中科院SCI期刊分区趋势图 大类学科小类学科Top期刊综述期刊法学 2区 4区 4区 CRIMINOLOGY & PENOLOGY 犯罪学与刑罚学2区 4区 4区 否否中科院SCI期刊分区 ( 2021年12月基础版)(没有被2021年的JCR基础版收录,仅供参考)中科院SCI期刊分区 ( 2021年12月升级版)大类学科小类学科Top期刊综述期刊法学 4区 4区 4区 CRIMINOLOGY & PENOLOGY 犯罪学与刑罚学3区 1区 4区 否否中科院SCI期刊分区 ( 2020年12月旧的升级版)大类学科小类学科Top期刊综述期刊法学 4区 4区 1区 CRIMINOLOGY & PENOLOGY 犯罪学与刑罚学3区 1区 4区 否否SCI期刊收录coverage Social Science Citation Index (SSCI) Scopus (CiteScore) PubMed Central (PMC)链接http://www.ncbi.nlm.nih.gov/nlmcatalog?term=0955-1662%5BISSN%5D平均审稿速度网友分享经验: 平均录用比例网友分享经验: 期刊常用信息链接 同领域相关期刊 Security Journal期刊近年CiteScore指标趋势图 该杂志的自引率趋势图 Security Journal中科院SCI期刊分区趋势图 该杂志的年文章数趋势图 同领域作者分享投稿经验 Security Journal上中国学者近期发表的论文

期刊主页
涉及主题计算机科学政治学计算机安全医学工程类业务航空航天工程放射科机场保安法学心理学社会学地理犯罪学历史考古组织犯罪经济互联网隐私哲学生物
出版信息出版商: Palgrave Macmillan Ltd.出版周期: 期刊类型: journal
基本数据创刊年份: 2009原创研究文献占比自引率:8.30%Gold OA占比: 16.44%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

Open-source intelligence and great-power competition under mediatization

2024-9-12

Stakeholders’ views of online surveillance capabilities: a comparative analysis of the debates in UK, Finland and Norway

2024-9-9

A general problem-solving matrix (GPSM): combining crime prevention and public health tools

2024-9-5

The dimensions of ‘forensic biosecurity’ in genetic and facial contexts

2024-9-3

Identifying and preventing future forms of crimes using situational crime prevention

2024-8-29

What is the role of architects and urban planners in crime prevention?

2024-8-22

Ivelaw Lloyd Griffith: Challenged sovereignty: the impact of drugs, crime, terrorism, and cyber threats in the Caribbean

2024-8-13

Introduction to the special issue “environmental criminology in crime prevention: theories for practice”

2024-8-12

Framing Amish victimization and security through the lens of criminological theory

2024-8-2

Reimagining the familiar stranger as a source of security: generating guardianship through everyday mobility

2024-8-2

Shadow of death: the criminal economy of banditry and kidnapping in northwest Nigeria

2024-6-22

Digital security by design

2024-6-19

Improving crime count forecasts in the city of Rio de Janeiro via reconciliation

2024-6-9

Public support for gunshot detection technology

2024-6-6

Decision-making in balancing fire safety hazards against security threats within the built environment

2024-6-2

Local residents’ perceptions of refugees as neighbors: a qualitative analysis of community social networks, purposive guardianship, and feelings of safety

2024-5-16

The effects of organizational images on security compliance intention: focused on affection and job security in South Korea

2024-5-14

Exploring the value of holiday preferences and routine activities for understanding tourist victimisation while on holiday

2024-5-13

Don’t call it a comeback! Revictimization and the cycle of violence at micro-places

2024-4-24

Fight or flight? Intended behavior in a school shooting among students who support or oppose concealed campus carry

2024-4-23

Drawing the line: public attitudes towards warranted and unwarranted government surveillance in European countries

2024-4-16

Comparative analysis of the activities of authorities to ensure the prevention of offenses in the Republic of Kazakhstan and other world countries

2024-4-5

Bridging the gap between criminology and computer vision: A multidisciplinary approach to curb gun violence

2024-4-2

Place of hotel characteristics and security systems in hotel operations, Nigeria

2024-3-30

Analyzing a Dark Web forum page in the context of terrorism: a topic modeling approach

2024-3-13

Disruptive behavior of young people in shopping malls: a security provider perspective

2024-3-8

Cryptocurrency Ponzi schemes and their modus operandi in South Korea

2024-3-8

Correction to: Community-based vigilante violence and corporate social responsibility in Nigeria’s oil-producing region

2024-3-7

Identifying cyber security competencies and skills from online job advertisements through topic modeling

2024-3-6

Crime analysis and prediction using machine-learning approach in the case of Hossana Police Commission

2024-3-1

Measuring the adoption of Enterprise Security Risk Management in Kenya’s higher education using the ASIS ESRM Maturity Model

2024-2-20

Rethinking the US Global War on Terror in the Sahel (2001–2017) between deterrence and defeat of violent extremist groups

2024-2-12

‘We shall triumph like the Jews’: unveiling the implicit side of IPOB’s armed separatism in Southeast Nigeria

2024-2-4

Community-based vigilante violence and corporate social responsibility in Nigeria’s oil-producing region

2024-2-4

Catch ‘em if you can: examining how often and how quickly people who escape from prisons and jails are recaptured

2024-1-22

Fraudsters target the elderly: Behavioural evidence from randomised controlled scam-baiting experiments

2024-1-18

Retraction Note: Formation of a legislative framework in the field of combating cybercrime and strategic directions of its development

2023-12-28

Terrorism, democracy and human security: a communication model. Ronald Crelinsten. 2021. Abingdon, Routledge, ISBN 978-036786089-9

2023-12-28

Was there a better time to be a mother? Past and present times of socio-cultural fear of crime in Turkiye

2023-12-11

Do cybercrime laws address emergent IoT security threats? The case of UAE federal cybercrime law regarding RFID technology

2023-12-8

Tourism safety on train systems: A case study on electronic word-of-mouth in Spain, Italy and Greece

2023-12-1

Population distribution and terrorist attack preference: evidence from Xinjiang, China

2023-12-1

The asymmetric effect of environmental pollution and macroeconomic indicators on interpersonal violence across OECD countries

2023-11-6

Are tourists being targeted? Panel data analysis of terror attacks against tourist targets

2023-11-2

What really works in preventing fraud against organisations and do decision-makers really need to know?

2023-10-11

Profiling consumers who reported mass marketing scams: demographic characteristics and emotional sentiments associated with victimization

2023-9-28

External auditors’ use and perceptions of fraud factors in assessing fraudulent financial reporting risk (FFRR): Implications for audit policy and practice

2023-9-23

Identifying trends and patterns in offending and victimization on Snapchat: a rapid review

2023-9-13

Socio-spatial structure of urban communities and the distribution of crime in Makurdi, Nigeria

2023-9-6

From cross-border banditry to insurgency in the Lake Chad region: response, collaboration and conflicting interest of Lake Chad region states

2023-9-5

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司