Get my own profile
Public access
View all62 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Kate BowersUCLVerified email at ucl.ac.uk
Lisa TompsonAssociate Professor, NZ Institute for Security and Crime Science, University ofVerified email at waikato.ac.nz
Lucia SummersTexas State UniversityVerified email at txstate.edu
Michael TownsleyVerified email at griffith.edu.au
Alex BraithwaiteUniversity of ArizonaVerified email at email.arizona.edu
Aiden SidebottomAssociate Professor, University College LondonVerified email at ucl.ac.uk
Mark KebbellSchool of Applied PsychologyVerified email at griffith.edu.au
Toby DaviesUniversity of LeedsVerified email at leeds.ac.uk
Daniel BirksProfessor of Computational Social Science, University of LeedsVerified email at leeds.ac.uk
Rob T. GueretteFlorida International University, MiamiVerified email at fiu.edu
Wim BernascoNSCRVerified email at nscr.nl
Phil EdwardsProfessorVerified email at LSHTM.ac.uk
Eray Arda AkartunaCity University of Hong Kong | EllipticVerified email at cityu.edu.hk
Graham FarrellProfessor at University of LeedsVerified email at leeds.ac.uk
Dr. John M BlytheDirector of Cyber Psychology, Immersive LabsVerified email at ucl.ac.uk
Bennett KleinbergAssociate ProfessorVerified email at tilburguniversity.edu
David WeisburdDistinguished Professor, George Mason University; Walter E. Mayer Professor, Hebrew UniversityVerified email at gmu.edu
Jerry RatcliffeTemple UniversityVerified email at temple.edu
Stijn RuiterSenior researcher NSCR / Professor Vrije Universiteit AmsterdamVerified email at nscr.nl
Michael J. FrithPostdoctoral Fellow, University of OsloVerified email at sosgeo.uio.no
Follow
Shane D Johnson
Professor Security and Crime Science, University College London
Verified email at ucl.ac.uk