INIS
crime
100%
data
96%
security
89%
risks
89%
detection
73%
information
72%
levels
60%
reviews
57%
environment
52%
decision making
51%
control
50%
applications
49%
comparative evaluations
46%
people
46%
learning
45%
fraud
44%
machine learning
44%
solutions
38%
performance
37%
interventions
37%
covid-19
35%
algorithms
35%
economics
34%
women
34%
children
34%
values
34%
enforcement
32%
accuracy
32%
tools
31%
investigations
31%
management
31%
legal aspects
31%
increasing
27%
policy
26%
devices
26%
business
26%
design
25%
industry
25%
implementation
24%
vehicles
24%
surveys
24%
virtual reality
23%
communities
23%
united kingdom
23%
drawing
23%
evaluation
22%
england
22%
monitoring
22%
compliance
22%
humans
21%
images
21%
ownership
21%
incidents
21%
computer codes
21%
psychology
20%
internet
20%
simulation
20%
universities
19%
criminology
19%
prediction
19%
adults
19%
intrusion detection systems
19%
dynamics
19%
power
17%
accountability
17%
interactions
16%
vulnerability
16%
men
15%
psychological behavior
15%
efficiency
15%
intrusion
14%
clouds
14%
modeling
14%
marketing
14%
risk assessment
14%
neural networks
13%
market
13%
education
13%
datasets
13%
surfaces
13%
optimization
13%
usa
12%
females
12%
therapy
12%
exploitation
12%
drugs
12%
ireland
12%
conventions
12%
cancer
12%
graphs
12%
nigeria
12%
range
12%
computers
11%
artificial intelligence
11%
cryptography
11%
ecosystems
11%
transparency
11%
cost
10%
houses
10%
demand
10%
Social Sciences
UK
74%
Police
38%
Decision Making
31%
Crime
23%
Criminal Justice System
21%
Burglary
17%
Virtual Reality
17%
Sport
16%
Criminology
16%
Legislation
14%
Europe
14%
Corruption
14%
Economic Crime
13%
Guardianship
12%
Police Officer
11%
Occupational Career
11%
Organized Crime
10%
Case Study
9%
Personnel
9%
Probation Service
9%
Artificial Intelligence
9%
Gender Equality
9%
Justice
8%
Semi-Structured Interview
8%
Sentencing
8%
Pedestrian
8%
Technology Assessment
8%
Older Adults
8%
Domestic Abuse
8%
Extremism
8%
Inclusive Education
8%
Metaverse
8%
Sales
7%
Career
7%
Crisis Communication
7%
London
7%
Literature Reviews
7%
Autonomous Vehicles
6%
Technological Change
6%
Courts
6%
Human Rights
6%
Ireland
6%
Home Visiting
6%
Evidence-Based
6%
Counterfeiting
6%
Meso Level
5%
Financial Sustainability
5%
COVID 19 Epidemic
5%
Competitive Advantage
5%
Linguistics
5%
Critical Incident
5%
Morality
5%
Psychology
5%
Legal Procedure
5%
Probation Officer
5%
Computer Science
Blockchain
33%
Artificial Intelligence
28%
Malware
24%
Internet-Of-Things
23%
Intrusion Detection System
23%
Decision-Making
19%
Learning System
18%
Machine Learning
18%
Cybersecurity
16%
Password
16%
Early Detection
13%
Autonomous Vehicles
12%
Exploratory Study
12%
Case Study
11%
Convolutional Neural Network
10%
Deep Learning Method
10%
Machine Learning Algorithm
10%
Digital Forensics
9%
Security Challenge
9%
Response Action
8%
Malware Detection
8%
Open Source Intelligence
8%
Comparative Analysis
8%
Phishing Detection
8%
Password Cracking
8%
Security Management
8%
Cyber Attack
7%
Anomaly Detection
6%
Fuzzy Set
6%
Security Solution
6%
Long Short-Term Memory Network
6%
Textual Document
6%
Large Language Model
6%
Mobile Health Application
6%
Deep Learning Model
6%
Experimental Result
5%
Feature Extraction
5%
Intrusion Detection
5%
Learning Approach
5%
Security Professional
5%
Bidirectional Encoder Representations From Transformers
5%
Phishing Attack
5%
Security and Privacy
5%
Feature Selection
5%