Browse and search a list of publications and products both published by NIJ and resulting from NIJ funding. This list includes reports submitted by grantees, NIJ reports and other publications, NIJ Journal issues and articles, products published by grantees, and articles appearing in peer review and other publications.
We Don't Like Your Type Around Here: Regional and Residential Differences in Exposure to Online Hate Material Targeting Sexuality
The Situated Contexts of American Terrorism: A Conjunctive Analysis of Case Configurations
Mapping Attitudes Towards the Police at Micro Places
Neighborhood violent crime and adolescent relationship aggression
Assessing best practices in crime labs structure, processes, and performance: A partial test of Gagliardi's 13 Critical tasks
Finding Emergent Patterns of Behaviors in Dynamic Heterogeneous Social Networks
Self-similar turbulent vortex rings: interaction of propellant gases with blood backspatter and the transport of gunshot residue
The Best Way Out is Always Through: Addressing the Problem of Untested Sexual Assault Kits (SAKs) through Multidisciplinary Collaboration
Assessing the Transnational Criminal Capacity of MS-13 in the U.S. and El Salvador
Real Time Electronic Feedback for Improved Acoustic Trapping of Micron-Scale Particles
Radicalization on the Internet: Virtual Extremism in the U.S. from 2012-2017
Longevity of American Terrorists: Factors Affecting Sustainability
Evaluating the Safe Spaces Program: Using a Community-based Public Health Approach to Prevent Violent Extremism
How Can A Public Health Framework Be Applied To Preventing Violent Extremism?
Using Gatekeeper Training as a CVE Tool: Replication and Evaluation of a Gatekeeper Program in Prince George's County
What Does A Community-Based Organization Need To Successfully Implement A Public Health Approach To Preventing Violent Extremism?
What Should Program Designers Consider To Successfully Develop And Implement A Public Health Approach To Preventing Violent Extremism?
Importance of Nonfatal Shooting Data To Inform Violence-Prevention Policy, Practice, and Research
The Last Link: from Gun Acquisition to Criminal Use
Beyond DNA - The Impact of Toxicological Evidence in Sexual Assault Investigations
Beyond DNA - The Role of Biological Evidence in Sexual Assault Investigations
Beyond DNA - The Role of Physical Evidence in Sexual Assault Investigations
Safeguarding Houses of Worship
Protect Your School with JTIC's Security and Safety Assessment Tool
Forensic Markers of Physical Elder Abuse: Establishing a Medical Characterization and Identifying the Criminal Justice Approach to Investigation and Prosecution
Research Forensic Library
We invite you to also search the Research Forensic Library, a curated collection of publicly-accessible material relating to every discipline of the forensic sciences.