Get my own profile
Public access
View all63 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Kate BowersUCLVerified email at ucl.ac.uk
- Lisa TompsonSenior Lecturer, NZ Institute for Security and Crime Science, University ofVerified email at waikato.ac.nz
- Lucia SummersTexas State UniversityVerified email at txstate.edu
- Michael TownsleyVerified email at griffith.edu.au
- Alex BraithwaiteUniversity of ArizonaVerified email at email.arizona.edu
- Aiden SidebottomAssociate Professor, University College LondonVerified email at ucl.ac.uk
- Mark KebbellSchool of Applied PsychologyVerified email at griffith.edu.au
- Rob T. GueretteFlorida International University, MiamiVerified email at fiu.edu
- Daniel BirksProfessor of Computational Social Science, University of LeedsVerified email at leeds.ac.uk
- Toby DaviesUniversity of LeedsVerified email at leeds.ac.uk
- Wim BernascoNSCRVerified email at nscr.nl
- Phil EdwardsProfessorVerified email at LSHTM.ac.uk
- Graham FarrellProfessor at University of LeedsVerified email at leeds.ac.uk
- Eray Arda AkartunaCity University of Hong Kong | EllipticVerified email at cityu.edu.hk
- Bennett KleinbergAssociate ProfessorVerified email at tilburguniversity.edu
- David WeisburdDistinguished Professor, George Mason University; Walter E. Mayer Professor, Hebrew UniversityVerified email at gmu.edu
- Jerry RatcliffeTemple UniversityVerified email at temple.edu
- Stijn RuiterSenior researcher NSCR / Professor Utrecht UniversityVerified email at nscr.nl
- Michael J. FrithPostdoctoral Fellow, University of OsloVerified email at sosgeo.uio.no
- Charlotte GillAssociate Professor of Criminology, Law and Society, George Mason UniversityVerified email at gmu.edu
Follow
Shane D Johnson
Professor Security and Crime Science, University College London
Verified email at ucl.ac.uk