Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Lisa TompsonSenior Lecturer, NZ Institute for Security and Crime Science, University ofVerified email at waikato.ac.nz
- Shane D JohnsonProfessor Security and Crime Science, University College LondonVerified email at ucl.ac.uk
- Kate BowersUCLVerified email at ucl.ac.uk
- Paul GillProfessor, Department of Security and Crime Science, University College LondonVerified email at ucl.ac.uk
- Emily CornerAssociate Professor, POLIS: The Centre for Social Policy Research, Australian National UniversityVerified email at anu.edu.au
- Aiden SidebottomAssociate Professor, University College LondonVerified email at ucl.ac.uk
- Maura ConwayMoriarty Prof. Gov & Intern’l Studies, Dublin City Uni; Prof. Cyber Threats, Swansea UniVerified email at dcu.ie
- Eray Arda AkartunaCity University of Hong Kong | EllipticVerified email at cityu.edu.hk
- Miranda SimonSenior Lecturer (Associate Professor), University of EssexVerified email at essex.ac.uk
- Noémie BouhanaUniversity College LondonVerified email at ucl.ac.uk
- John HorganDistinguished University Professor, Department of Psychology, Georgia StateVerified email at gsu.edu
- Mia BloomGeorgia State UniversityVerified email at gsu.edu
- Elizabeth GroffTemple UniversityVerified email at temple.edu
- Lasse LindekildeProfessor, Department of Political Science, Aarhus UniversityVerified email at ps.au.dk
- Bart SchuurmanInstitute of Security and Global Affairs, Leiden University - Campus The HagueVerified email at fgga.leidenuniv.nl
- Dagmar HeinrichUniversity of SalfordVerified email at salford.ac.uk