References
- Alaimo, K., Olson, C. M., & Frongillo, E. A. (2001). Food insufficiency and american school-aged children’s cognitive, academic, and psychosocial development. Pediatrics, 108, 1.
- Amoore, L. (2006). Biometric borders: Governing mobilities in the war on terror. Political Geography, 25(3), 336–351. doi:10.1016/j.polgeo.2006.02.001
- Andrews, J., & Shabani, B. (2012). Re-envisioning the role of hydrogen in a sustainable energy economy. International Journal of Hydrogen Energy, 37(2), 1184–1203. doi:10.1016/j.ijhydene.2011.09.137
- Anwar, M. A., & Rafique, Z. (2012). Defense spending and national security of Pakistan: A policy perspective. Democracy and Security, 8(4), 374–399. doi:10.1080/17419166.2012.739551
- Ayoob, M. (1991). The Security Problematic of the Third World. World Politics, 43(2), 257–283. doi:10.2307/2010473
- Azar, E. E., & Moon, C. (1988). National security in the third world : The management of internal and external threats. Aldershot: Edward Elgar.
- Baldwin, D. A., & Baldwin, D. A. (1997). The concept of security *. Review of international studies, 19(1993), 5–26.
- Bazilian, M., Rogner, H., Howells, M., Hermann, S., Arent, D., Gielen, D., … Yumkella, K. K. (2011). Considering the energy, water and food nexus : Towards an integrated modelling approach. Energy Policy, 39(12), 7896–7906. doi:10.1016/j.enpol.2011.09.039
- Bethell, C. D., Read, D., Stein, R. E. K., Blumberg, S. J., Wells, N., & Newacheck, P. W. (2002). Identifying children with special health care needs: Development and evaluation of a short screening instrument. Ambulatory Pediatrics, 2(1), 38–48.
- Bettencourt, L. M. A., & Kaur, J. (2011). Evolution and structure of sustainability science. Proceedings of the National Academy of Sciences of the United States of America, 108(49), 19540–19545. doi:10.1073/pnas.1102712108
- Budd, J. M. (1988). A bibliometric analysis of higher education literature. Research in Higher Education, 28(2), 180–190.
- Buzan, B. (1991). New Patterns of Global Security in the twenty-frst century. International Affairs, 67(3), 431–451. doi:10.2307/2621945
- Buzan, B., & Hansen, L. (2009). The evolution of international security studies. Political science. doi:10.1017/CBO9780511817762
- Buzan, B., & Wæver, O. (2003). Regions and powers: The structure of international security. United States of America by Cambridge University Press, 190. doi:10.1017/CBO9781107415324.004
- Buzan, B., Wæver, O., & Wilde, J. D. (1998). Security : A new framework for analysis. Boulder, Colo: Lynne Rienner Pub.
- Chen, C. (2006). CiteSpace II : Detecting and visualizing emerging trends. Journal of the American Society for information Science and Technology, 57(3), 359–377. doi:10.1002/asi
- Chen, C., Hu, Z., Liu, S., & Tseng, H. (2012). Emerging trends in regenerative medicine: A scientometric analysis in CiteSpace. Expert Opinion on Biological Therapy, 12(5), 593–608. doi:10.1517/14712598.2012.674507
- Chen, C., & Ibekwe-Sanjuan, F. (2010). The structure and dynamics of cocitation clusters : A multiple-perspective cocitation analysis. Journal of the American Society for information Science and Technology, 61(7), 1386–1409. doi:10.1002/asi
- Chen, D., Liu, Z., Luo, Z., Webber, M., & Chen, J. (2016). Bibliometric and visualized analysis of emergy research. Ecological Engineering, 90, 285–293.
- Chen, J. (2007). Rapid urbanization in China: A real challenge to soil protection and food security. Catena, 69(1), 1–15. doi:10.1016/j.catena.2006.04.019
- Coid, J., Yang, M., Ullrich, S., Roberts, A., Moran, P., Bebbington, P., … Hare, R. (2009). International journal of law and psychiatry psychopathy among prisoners in England and Wales ☆. International Journal of Law and Psychiatry, 32(3), 134–141. doi:10.1016/j.ijlp.2009.02.008
- Elbe, S. (2006). Should HIV/AIDS be securitized? The ethical dilemmas of linking HIV/AIDS and security. International Studies Quaterly, 50(1), 119–144. doi:10.1111/j.1468-2478.2006.00395.x
- Erar, A. (2002). Bibliometrics or informetrics: Displaying regularity in scientific patterns by using statistical distributions. Hacettepe Journal of Mathematics and Statistics, 31, 113–125.
- Fairthrone, R. A. (1969). Empirical hyperbolic distributions (Bradford-Zipf-Mandelbrot) for bibliometric description and prediction. Journal of Documentation, 2(4), 319–343. doi:10.1108/eb026404
- Fearon, J. D., & Laitin, D. D. (2001). Ethnicity, insurgency, and civil war ∗. American political science review, (April 2000), 75–89. doi:10.1017/S0003055403000534
- Food and Agriculture Organization. (2002). The state of food insecurity in the world 2002 : Food insecurity : When people must live with hunger and fear starvation. Rome : Food and Agriculture Organization of the United Nations.
- Foucault, M. (2007). Security, territory, population : Lectures at the Collège de France, 1977-78. (Arnold I. Davidson & G. Burchell, Eds.). Palgrave Macmillan.
- Frost, A. (2007). The state secrets privilege and separation of powers. Fordham L. Rev., 75, 4.
- Godfray, H. C. J., Beddington, J. R., Crute, I. R., Haddad, L., Lawrence, D., Muir, J. F., & Toulmin, C. (2010). Food security: The challenge of feeding 9 billion people. Science, 327(5967), 812–818. Retreived from https://doi.org/10.1126/science.1185383
- Godfray, H. C. J., Beddington, J. R., Crute, I. R., Haddad, L., Lawrence, D., Muir, J. F., & Toulmin, C. (2010). Food security: The challenge of feeding 9 billion people. Science, 327(5967), 812–818.
- Godfray, H. C. J., Beddington, J. R., Crute, I. R., Haddad, L., Lawrence, D., Muir, J. F., … Toulmin, C. (2012). The challenge of food security. Science, 327(February), 812. doi:10.4337/9780857939388
- Greenwald, G. (2013). XKeyscore: NSA tool collects “nearly everything a user does on the internet” US news | The Guardian. Retrieved from https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
- Gu, D., Li, J., Li, X., & Liang, C. (2017). Visualizing the knowledge structure and evolution of big data research in healthcare informatics. International Journal of Medical Informatics, 98, 22–32. Retreived from https://doi.org/10.1016/j.ijmedinf.2016.11.006
- Hansen, L. (2000). The little mermaid’s silent security dilemma and the absence of gender in the copenhagen school. Millennium - Journal of International Studies, 29(2), 285–306. doi:10.1177/03058298000290020501
- Harvey, D. (2005).The new imperialism. Oxford: Oxford University Press.
- Hillyard, P. (1993). Suspect community : People’s experience of the prevention of terrorism acts in Britain. Pluto Press.
- Katzenstein, P. J. (1996). The culture of national security: Norms and identity in world politics. Columbia University Press.
- Khoury, C. K., Bjorkman, A. D., Dempewolf, H., Ramirez-Villegas, J., Guarino, L., Jarvis, A., … Struik, P. C. (2014). Increasing homogeneity in global food supplies and the implications for food security. Proceedings of the National Academy of Sciences, 111(11), 4001–4006. doi:10.1073/pnas.1313490111
- Kirkpatrick, S. I., & Tarasuk, V. (2008). Food insecurity is associated with nutrient inadequacies among canadian adults and adolescents. The Journal of Nutrition, 138(3), 604–612.
- Kruyt, B., van Vuuren, D. P., de Vries, H. J. M., & Groenenberg, H. (2009). Indicators for energy security. Energy Policy, 37(6), 2166–2181. doi:10.1016/j.enpol.2009.02.006
- Lasswell, H. D. (1936). Politics who gets what, when, how. McGraw Hill. Retrieved from http://www.policysciences.org/classics/politics.pdf
- Li, K., Gao, P., Xiang, P., Zhang, X., Cui, X., & Ma, L. Q. (2016). Molecular mechanisms of PFOA-induced toxicity in animals and humans: Implications for health risks. Environment International. Retreived from https://doi.org/10.1016/j.envint.2016.11.014
- Li, X., Ma, E., & Qu, H. (2017). Knowledge mapping of hospitality research ? A visual analysis using CiteSpace. International Journal of Hospitality Management, 60, 77–93. doi:10.1016/j.ijhm.2016.10.006
- Lipp, J. (2007). Lessons for effective renewable electricity policy from denmark, germany and the united kingdom. Energy Policy, 35(11), 5481–5495. doi:10.1016/J.ENPOL.2007.05.015
- Lippmann, W. (1943). U.S. foreign policy: Shield of the republic. Walter Lippmann: Amazon.com: Books. Little, Brown & Company.
- Liu, Z., Yin, Y., Liu, W., & Dunford, M. (2015). Visualizing the intellectual structure and evolution of innovation systems research: A bibliometric analysis. Scientometrics, 103(1), 135–158. doi:10.1007/s11192-014-1517-y
- Lobell, D. B., Burke, M. B., Tebaldi, C., Mastrandrea, M. D., Falcon, W. P., & Naylor, R. L. (2008). Prioritizing climate change adaptation needs for food security in 2030. Science (New York, N.Y.), 319(5863), 607–610. doi:10.1126/science.1152339
- Mcculloch, J., & Pickering, S. (2009). Pre-crime and counter-terrorism imagining future crime in the “ War on terror. The British Journal of Criminology, (May), 628–645. doi:10.1093/bjc/azp023
- Mcdonald, M. (2008). Securitization and the construction of security. European journal of international relations, 14(4), 563–587. doi:10.1177/1354066108097553
- Meltzer, H., Bebbington, P., Brugha, T., Jenkins, R., Mcmanus, S., & Stansfeld, S. (2010). Job insecurity. Socio-Economic Circumstances and Depression, 1401–1407. doi:10.1017/S0033291709991802
- Morris, T., & Morris, T. (2012). Police practice and research : An achieving national security : Comparing four state security models Achieving national security : Comparing four state security models. Police Practice and Research, (December 2014), 37–41. doi:10.1080/15614263.2011.596689
- Overland, S., Dahl, A. A., Ph, D., Krokstad, S., Ph, D., Bjerkeset, O., … Psych, M. R. C. (2006). A population-based cohort study of the effect of common mental disorders on disability pension awards. American journal of Psychiatry, (August), 1412–1418.
- Paleri, P. (2008). National security : Imperatives and challenges. New Delhi: Tata McGraw-Hill Pub. Co.
- Pantazis, C., & Pemberton, S. (2009). From the “ old ” to the “ new ” suspect community examining the impacts of recent UK counter-terrorist legislation. British Journal of Criminology, 646–666. doi:10.1093/bjc/azp031
- Pao, M. L. (1985). Lotka’s law: A testing procedure. Information Processing and Management, 21(4), 305–320. doi:10.1016/0306-4573(85)90055-X
- Perls, T. T., Wilmoth, J., Levenson, R., Drinkwater, M., Cohen, M., Bogan, H., … Puca, A. (2002). Life-long sustained mortality advantage of siblings of centenarians, (Track II).
- Piantadosi, S. T. (2014). Zipf’s word frequency law in natural language: A critical review and future directions. Psychonomic Bulletin\& Review, 21(5), 1112–1130. doi:10.3758/s13423-014-0585-6
- Pozen, D. E. (2005). The Mosaic theory, national security, and the freedom of information act. Yale Law Journal, 628–679.
- Romm, J. J. (1993). Defining national security : The nonmilitary aspects. Council on Foreign Relations Press.
- Ross, M. L. (2001). Does oil hinder democracy? World politics, 53(3), 325–361. doi:10.1353/wp.2001.0011
- Rudel, T. K., Schneider, L., Uriarte, M., Turner, B. L., Defries, R. S., Lawrence, D., … Grau, R. (2009). Agricultural intensification and changes in cultivated areas, 1970-2005. Proceedings of the National Academy of Sciences of the United States of America, 106(49), 20675–20680. doi:10.1073/pnas.0812540106
- Safran, C., Bloomrosen, M., Hammond, W. E., Labkoff, S., Markel-Fox, S., & Tang, P. C. (2007). Toward a national framework for the secondary use of health data: An American Medical Informatics Association White Paper. Journal of the American Medical Informatics Association : JAMIA, 14(1),1–9. Retreived from https://doi.org/10.1197/jamia.M2273
- Schmidhuber, J., & Tubiello, F. N. (2007). Global food security under climate change. Proceedings of the National Academy of Sciences of the United States of America, 104(50), 19703–19708. doi:10.1073/pnas.0701976104
- Seligman, H. K., Bindman, A. B., Vittinghoff, E., Kanaya, A. M., & Kushel, M. B. (2007). Food insecurity is associated with diabetes mellitus: Results from the National Health Examination and Nutrition Examination Survey (NHANES) 1999-2002. Journal of General Internal Medicine, 22(7), 1018–1023. doi:10.1007/s11606-007-0192-6
- Seligman, H. K., Bindman, A. B., Vittinghoff, E., Kanaya, A. M., & Kushel, M. B. (2007). Food insecurity is associated with diabetes mellitus: Results from the national health examination and nutrition examination survey (nhanes) 1999-2002. Journal of General Internal Medicine, 22(7), 1018–23. doi:10.1007/s11606-007-0192-6
- Seligman, H. K., Laraia, B. A., & Kushel, M. B. (2009). Food insecurity is associated with chronic disease among low-income. The Journal of Nutrition\, 140, 304–310. doi:10.3945/jn.109.112573.number
- Seyedghorban, Z., Matanda, M. J., & LaPlaca, P. (2016). Advancing theory and knowledge in the business-to-business branding literature. Journal of Business Research, 69(8), 2664–2677. doi:10.1016/j.jbusres.2015.11.002
- Shiau, C. S. N., Samaras, C., Hauffe, R., & Michalek, J. J. (2009). Impact of battery weight and charging patterns on the economic and environmental benefits of plug-in hybrid vehicles. Energy Policy, 37(7), 2653–2663. doi:10.1016/j.enpol.2009.02.040
- Shiau, W.-L. (2015). The intellectual core of enterprise information systems: A co-citation analysis. Enterprise Information Systems, 7575(March), 1–30. doi:10.1080/17517575.2015.1019570
- Smith, S. (1999). The increasing insecurity of security studies: Conceptualizing security in the last twenty years. Contemporary Security Policy, 20(3), 72–101.
- Sparke, M. B. (2006). A neoliberal nexus: Economy, security and the biopolitics of citizenship on the border. Political Geography, 25(2), 151–180. doi:10.1016/j.polgeo.2005.10.002
- Stolle, D., Soroka, S., & Johnston, R. (2008). When does diversity erode trust? Neighborhood diversity, interpersonal trust and the mediating effect of social interactions. Political Studies, 56(1), 57–75. doi:10.1111/j.1467-9248.2007.00717.x
- Stone, M. (2009). Security according to Buzan: A comprehensive security analysis. Security Discussion Papers. Series 1 edn. Grouped’ Etudesetd’ Expertise “Sécuritéet Technologies” GEEST-2009. New York
- Stritzel, H. (2007). Towards a theory of securitization: Copenhagen and Beyond. European Journal of International Relations, 13(3), 357–383. doi:10.1177/1354066107080128
- Topalli, M., & Ivanaj, S. (2016). Mapping the evolution of the impact of economic transition on Central and Eastern European enterprises: A co-word analysis. Journal of World Business, 51(5), 744–759. doi:10.1016/j.jwb.2016.06.003
- Turner, B. S. (2001). The erosion of citizenship. British Journal of Sociology, 2(52), 189–209. doi:10.1080/00071310120044944
- Wæver, O. (1993). Securitization and desecuritization. Copenhagen: Centre for Peace and Conflict Research.
- Wang, Y., Lai, N., Zuo, J., Chen, G., & Du, H. (2016). Characteristics and trends of research on waste-to-energy incineration: A bibliometric analysis, 1999–2015. Renewable and Sustainable Energy Reviews, 66, 95–104. doi:10.1016/j.rser.2016.07.006
- Waxman, M. C. (2012). National security federalism in the age of terror | stanford law review. Stanford Law Review, 64, 2.
- Web of Science. (2016). The citaton connection - real facts - ip & science - thomson reuters.United Kingdom : Clarivate Analytics
- White, H. D., & Griffith, B. C. (1981). Author cocitation: A literature measure of intellectual structure. Journal of the American Society for Information Science, 32(3), 163–171. doi:10.1002/asi.4630320302
- Wolfers, A. (1952). National security as an ambiguous symbol. Political Science Quarterly, 67(4), 481.
- Yang, H., & Li, X. (2000). Cultivated land and food supply in China. Land Use Policy, 17(2), 73–88. doi:10.1016/S0264-8377(00)00008-9