Browse by UCL Departments and Centres
Group by: Author | Type
Number of items: 73.
A
Abdul-Karim, N;
(2016)
Morphological Variations of Explosive Residue Particles and Implications for Understanding Detonation Mechanisms.
Analytical Chemistry
, 88
(7)
pp. 3899-3908.
10.1021/acs.analchem.6b00080.
|
Ashby, MPJ;
(2016)
Using crime science for understanding and preventing theft of metal from the British railway network.
Doctoral thesis , UCL (University College London).
|
B
Baudains, P;
Fry, HM;
Davies, TP;
Wilson, AG;
Bishop, SR;
(2016)
A dynamic spatial model of conflict escalation.
European Journal of Applied Mathematics
, 27
(3)
pp. 530-553.
10.1017/S0956792515000558.
|
Beautement, A;
Becker, I;
Parkin, S;
Krol, K;
Sasse, MA;
(2016)
Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.
In:
Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2016.
(pp. pp. 253-270).
USENIX Association: Denver, CO, USA.
|
Beautement, A;
Becker, IF;
Krol, K;
Parkin, S;
Sasse, MA;
(2016)
Productive Security: A scalable methodology for analysing employee security behaviours.
[Dataset].
UCL Computer Science: London, UK.
|
Becker, I;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, SJ;
Sasse, MA;
(2016)
International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
In:
Proceedings of the 15th Annual Workshop on the Economics of Information Security (WEIS).
Workshop on the Economics of Information Security (WEIS): Berkeley, CA, USA.
(In press).
|
Becker, I;
Parkin, S;
Sasse, MA;
(2016)
Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations.
In:
Proceedings of the 4th Learning from Authoritative Security Experiment Results (LASER) Workshop.
(pp. pp. 43-53).
IEEE: San Jose, CA, USA.
|
Becker, IF;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, SJ;
Sasse, MA;
(2016)
International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
[Dataset].
UCL Computer Science
|
Belur, JS;
Behlendorf, B;
Kumar, S;
(2016)
Peering through the Kaleidoscope: Variation and Validity in Data Collection on Terrorist Attacks.
Studies in Conflict and Terrorism
, 39
(7-8)
pp. 641-667.
10.1080/1057610X.2016.1141004.
|
Belur, JS;
Johnson, S;
(2016)
Is crime analysis at the heart of policing practice? A case study.
Policing and Society: An International Journal of Research and Policy
10.1080/10439463.2016.1262364.
(In press).
|
Bouhana, N;
Thornton, A;
Corner, E;
Malthaner, S;
Lindekilde, L;
Schuurman, B;
Perry, G;
(2016)
PRIME Deliverable D3.1:
PReventing, Interdicting and Mitigating Extremist events: Defending against lone actor extremism.
(Risk Analysis Framework , Public Version
D3.1
).
UCL Jill Dando Institute of Security and Crime Science: London, UK.
|
Bouhana, N;
Johnson, SD;
Porter, M;
(2016)
Consistency and specificity in burglars who commit prolific residential burglary: Testing the core assumptions underpinning behavioural crime linkage.
Legal and Criminological Psychology
, 21
(1)
pp. 77-94.
10.1111/lcrp.12050.
|
Burton, L;
Johnson, SD;
Braithwaite, A;
(2016)
Potential uses of Numerical Simulation for the Modelling of Civil Conflict.
Peace Economics, Peace Science and Public Policy
, 23
(1)
pp. 1-39.
10.1515/peps-2016-0035.
|
C
Chainey, S;
Sidebottom, A;
Wortley, R;
Bowers, K;
Baudains, P;
(2016)
Project MARGIN: Factors affecting insecurity.
UCL Jill Dando Institute of Security and Crime Science and Project Margin: London, UK.
|
Chainey, SP;
da Silva, BFA;
(2016)
Examining the extent of repeat and near repeat victimisation of domestic burglaries in Belo Horizonte, Brazil.
Crime Science
, 5
(1)
10.1186/s40163-016-0049-6.
|
Chen, Q;
Chetty, K;
Woodbridge, K;
Tan, B;
(2016)
Signs of life detection using wireless passive radar.
In:
Proceedings of the 2016 IEEE Radar Conference (RadarConf).
IEEE: Philadelphia, PA, USA.
|
Chen, Q;
Tan, B;
Chetty, K;
Woodbridge, K;
(2016)
Activity Recognition Based on Micro-Doppler Signature with In-Home Wi-Fi.
In:
Proceedings of the 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
(pp. pp. 216-221).
IEEE: Munich, Germany.
|
Cheng, T;
Bowers, K;
Longley, P;
Shawe-Taylor, J;
Trevor, A;
Davies, T;
Rosser, G;
+ view all
(2016)
CPC: Crime, Policing and Citizenship - Intelligent Policing and Big Data.
[Book].
(1st ed.).
UCL Space Lab: London, UK.
|
Cheshire, K;
Morgan, RM;
Holmes, J;
(2016)
The potential for geochemical discrimination of single- and mixed-source soil samples from close proximity urban parkland locations.
Australian Journal of Forensic Sciences
, 49
(2)
pp. 161-174.
10.1080/00450618.2016.1144789.
|
Chetty, K;
Chen, Q;
Woodbridge, K;
(2016)
Train Monitoring using GSM-R Based Passive Radar.
In:
Proceedings of the 2016 IEEE Radar Conference.
IEEE: Philadelphia, PA, USA.
|
Cockbain, EP;
Reynald, D;
(2016)
Introduction to the special edition ‘Child sexual abuse: analysis and intervention’.
Crime Science
, 5
(4)
pp. 1-3.
10.1186/s40163-016-0052-y.
|
Corner, E;
Gill, P;
Mason, O;
(2016)
Mental Health Disorders and the Terrorist: A Research Note Probing Selection Effects and Disorder Prevalence.
Studies in Conflict and Terrorism
, 39
(6)
pp. 560-568.
10.1080/1057610X.2015.1120099.
|
Creutzfeldt, N;
Bradford, B;
(2016)
Dispute Resolution Outside of Courts: Procedural Justice and Decision Acceptance Among Users of Ombuds Services in the UK.
Law & Society Review
, 50
(4)
pp. 985-1016.
10.1111/lasr.12234.
|
F
Farrell, G;
Tseloni, A;
Tilley, N;
(2016)
Signature dish: Triangulation from data signatures to examine the role of security in falling crime.
Methodological Innovations
, 9
pp. 1-11.
10.1177/2059799115622754.
|
G
Gamble, SC;
(2016)
Forensic detection of explosives in the wastewater system: Implications for intelligence gathering.
Doctoral thesis , UCL (University College London).
|
Gherghel, S;
Morgan, RM;
Blackman, CS;
Karu, K;
Parkin, IP;
(2016)
Analysis of transferred fragrance and its forensic implications.
Science and Justice
, 56
(6)
pp. 413-420.
10.1016/j.scijus.2016.08.004.
|
Gill, P;
(2016)
Lone-Actor Terrorist Target Choice.
Behavioral Sciences & the Law
, 34
(5)
pp. 693-705.
10.1002/bsl.2268.
|
Gill, P;
(2016)
Toward a scientific approach to identifying and understanding indicators of radicalization and terrorist intent: Eight key problems.
Journal of Threat Assessment and Management
, 2
(3)
pp. 187-191.
10.1037/tam0000047.
|
Gill, P;
Piazza, J;
Horgan, J;
(2016)
Counterterrorism Killings and Provisional IRA Bombings, 1970-1998.
Terrorism and Political Violence
, 28
(3)
pp. 473-496.
10.1080/09546553.2016.1155932.
|
H
Horgan, J;
Gill, P;
Bouhana, N;
Silver, J;
Corner, E;
(2016)
Across the Universe? A Comparative Analysis of Violent Radicalization Across Three Offender Types with Implications for Criminal Justice Training and Education.
The Office of Justice Programs:NCJRS: USA.
|
Hough, M;
May, T;
Hales, G;
Belur, JS;
(2016)
Misconduct by police leaders in England and Wales: an exploratory study.
Policing and Society
10.1080/10439463.2016.1216989.
(In press).
|
K
Karppinen, IA;
(2016)
'Mission impossible': how conflicting security and productivity demands induce non-compliance with security policies.
Doctoral thesis , UCL (University College London).
|
Kempinska, KK;
Davies, T;
Shawe-Taylor, J;
(2016)
Probabilistic Map-matching using Particle Filters.
In:
Proceedings of 24th GIS Research UK (GISRUK 2016) Conference.
Greenwich GIS Research Group: London, UK.
|
Kirlappos, I;
(2016)
Learning from "shadow security": understanding non-compliant behaviours to improve information security management.
Doctoral thesis , UCL (University College London).
|
Kolokytha, S;
(2016)
On-belt Tomosynthesis: 3D Imaging of Baggage for Security Inspection.
Doctoral thesis , UCL (University College London).
|
Krol, K;
(2016)
The role of effort in security and privacy behaviours online.
Doctoral thesis , UCL (University College London).
|
L
Leclerc, B;
Wortley, R;
Dowling, C;
(2016)
Situational Precipitators and Interactive Forces in Sexual Crime Events Involving Adult Offenders.
Criminal Justice and Behavior
, 43
(11)
pp. 1600-1618.
10.1177/0093854816660144.
|
M
Manrique, P;
Cao, Z;
Gabriel, A;
Horgan, J;
Gill, P;
Qi, H;
Restrepo, E;
... Johnson, N; + view all
(2016)
Women's Connectivity in Extreme Networks.
Science Advances
, 2
(6)
, Article e1501742. 10.1126/sciadv.1501742.
|
Mariconti, E;
Onaolapo, J;
Ahmad, SS;
Nikiforou, N;
Egele, M;
Nikiforakis, M;
Stringhini, G;
(2016)
Why Allowing Profile Name Reuse Is A Bad Idea.
Proceedings of the 9th European Workshop on System Security
, Article 3. 10.1145/2905760.2905762.
|
Mariconti, E;
Onaolapo, J;
Ross, G;
Stringhini, G;
(2016)
What's your major threat? On the differences between the network behavior of targeted and commodity malware.
In:
Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES).
(pp. pp. 599-608).
IEEE: Salzburg, Austria.
|
Mariconti, E;
Onaolapo, J;
Ross, G;
Stringhini, G;
(2016)
What's your major threat? On the differences between the network behavior of targeted and commodity malware.
[Dataset].
UCL Computer Science: London, UK.
|
Mattijssen, EJ;
Kerkhoff, W;
Berger, CE;
Dror, IE;
Stoel, RD;
(2016)
Implementing context information management in forensic casework: minimizing contextual bias in firearms examination.
Science & Justice
, 56
(2)
pp. 113-122.
10.1016/j.scijus.2015.11.004.
|
McElhone, RL;
Meakin, GE;
French, JC;
Alexander, T;
Morgan, RM;
(2016)
Simulating forensic casework scenarios in experimental studies: The generation of footwear marks in blood.
Forensic Science International
, 264
pp. 34-40.
10.1016/j.forsciint.2016.03.023.
|
McKillop, N;
Smallbone, S;
Wortley, R;
(2016)
Predicting multiple victim versus single victim sexual abuse: an examination of distal factors and proximal factors associated with the first abuse incident.
Journal of Sexual Aggression
, 22
(1)
pp. 52-65.
10.1080/13552600.2014.971892.
|
Meakin, GE;
(2016)
Transfer: DNA.
In: Jamieson, A and Moenssens, A, (eds.)
Wiley Encyclopedia of Forensic Science.
Wiley
|
Meakin, GE;
Jamieson, A;
(2016)
A response to a response to Meakin and Jamieson DNA transfer: Review and implications for casework.
[Letter].
Forensic Science International: Genetics
, 22
e5-e6.
10.1016/j.fsigen.2016.02.010.
|
Meloy, R;
Gill, P;
(2016)
The Lone Actor Terrorist and the TRAP-18.
Journal of Threat Assessment and Management
, 3
(1)
pp. 37-52.
10.1037/tam0000061.
|
Morrison, J;
Gill, P;
(2016)
100 Years of Irish Republican Violence: Introduction to the Special Issue.
Terrorism and Political Violence
, 28
(3)
pp. 409-416.
10.1080/09546553.2016.1155927.
|
Murdoch, SJ;
Becker, I;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Hutchings, A;
Sasse, MA;
(2016)
Are Payment Card Contracts Unfair?
In: Grossklags, J and Preneel, B, (eds.)
International Conference on Financial Cryptography and Data Security FC 2016: Financial Cryptography and Data Security.
(pp. pp. 600-608).
Springer
|
O
Onaolapo, J;
Mariconti, E;
Stringhini, G;
(2016)
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild.
In:
Proceedings of the ACM Internet Measurement Conference 2016 (IMC 2016).
(pp. pp. 65-79).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Onaolapo, J;
Stringhini, G;
Mariconti, E;
(2016)
Understanding The Use Of Stolen Webmail Credentials In The Wild.
[Dataset].
UCL Computer Science: London, UK.
|
P
Parkin, S;
Krol, K;
Becker, I;
Sasse, MA;
(2016)
Applying Cognitive Control Modes to Identify Security Fatigue Hotspots.
In:
(Proceedings) Workshop on Security Fatigue, [part of] SOUPS 2016: Twelfth Symposium on Usable Privacy and Security, 22-24 June 2016, Denver, Colorado, USA.
USENIX Association
|
Pasculli, Lorenzo;
(2016)
Harm, Offence and Offesa in the English and the Italian Criminal Law. For a Constitutionalisation of a Unitary Principle of Harm in the English Legal System, also as a Criterion of Judicial Interpretation.
Diritto Penale XXI Secolo
, 2
pp. 302-349.
|
Pasculli, Lorenzo;
(2016)
A Right Turn in the English Criminal Law: No More Anomalous Forms of Complicity. An Important Lesson from the UK Supreme Court.
Diritto Penale XXI Secolo
, 1
pp. 116-129.
|
Pepys, RC;
(2016)
Developing mathematical models of complex social processes: radicalisation and criminality development.
Doctoral thesis , UCL (University College London).
|
R
Ritchie, M;
Ash, M;
Chen, Q;
Chetty, K;
(2016)
Through Wall Radar Classification of Human Micro-Doppler Using Singular Value Decomposition Analysis.
Sensors
, 16
(9)
, Article 1401. 10.3390/s16091401.
|
Rosser, G;
Davies, T;
Bowers, KJ;
Johnson, SD;
Cheng, T;
(2016)
Predictive Crime Mapping: Arbitrary Grids or Street Networks?
Journal of Quantitative Criminology
10.1007/s10940-016-9321-x.
(In press).
|
S
Schwartz, C;
(2016)
The Paradox of Confrontation: Experimental Evidence on the Audience Effects of Protest.
In:
Proceedings of the 6th Annual General Conference of the European Political Science Association.
European Political Science Association: Brussels, Belgium.
|
Schwartz, C;
Simon, M;
Hudson, D;
Johnson, S;
(2016)
Illegality is in the Eye of the Beholder: Experimental Evidence on Criminality and Risks of Irregular Migration.
In:
Proceedings of the 6th Annual Workshop on Comparative Approaches to Immigration, Ethnicity, and Integration.
Institution for Social and Policy Studies, Yale University: New Haven, CT, USA.
|
Smallbone, S;
Wortley, R;
(2016)
Preventing Child Sexual Abuse Online.
In:
Online Risk to Children: Impact, Protection and Prevention: First Edition.
(pp. 143-162).
Wiley
|
Smit, NM;
Lagnado, DA;
Morgan, RM;
Fenton, NE;
(2016)
Using Bayesian networks to guide the assessment of new evidence in an appeal case.
Crime Science
, 5
, Article 9. 10.1186/s40163-016-0057-6.
|
Sombatruang, N;
Sasse, MA;
Baddeley, M;
(2016)
Why do people use unsecure public Wi-Fi? An investigation of behaviour and factors driving decisions.
In:
(Proceedings) STAST '16 Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust.
(pp. pp. 61-72).
Association for Computing Machinery
|
T
Tench, S;
Fry, H;
Gill, P;
(2016)
Spatio-temporal patterns of IED usage by the Provisional Irish Republican Army.
European Journal of Applied Mathematics
, 27
(3)
pp. 377-402.
10.1017/S0956792515000686.
|
Thornton, A;
Tompson, L;
(2016)
What Works? Integrating evidence into crime prevention decision-making.
Presented at: International Crime and Intelligence Analysis Conference 2016, Manchester, UK.
|
Tilley, N;
(2016)
EMMIE and engineering: What works as evidence to improve decisions?
Evaluation
, 22
(3)
pp. 304-322.
10.1177/1356389016656518.
|
Tilley, N;
Laycock, G;
(2016)
Engineering a safer society.
Public Safety Leadership Research Focus
, 4
(2)
pp. 1-6.
|
Tilley, N;
Tseloni, A;
(2016)
Choosing and Using Statistical Sources in Criminology: What Can the Crime Survey for England and Wales Tell Us?
Legal Information Management
, 16
(2)
pp. 78-90.
10.1017/S1472669616000219.
|
Tompson, L;
Belur, J;
(2016)
Information retrieval in systematic reviews: a case study of the crime prevention literature.
Journal of Experimental Criminology
, 12
(2)
pp. 187-207.
10.1007/s11292-015-9243-x.
|
Tompson, LA;
(2016)
Explaining temporal patterns in street robbery.
Doctoral thesis , UCL (University College London).
|
Tripathi, K;
Borrion, H;
(2016)
Safe, secure or punctual? A simulator study of train driver response to reports of explosives on a metro train.
Security Journal
, 29
(1)
pp. 87-105.
10.1057/sj.2015.46.
|
W
Weston-Ford, KA;
Moseley, ML;
Hall, LJ;
Marsh, NP;
Morgan, RM;
Barron, LP;
(2016)
The retrieval of fingerprint friction ridge detail from elephant ivory using reduced-scale magnetic and non-magnetic powdering materials.
Science & Justice
, 56
(1)
pp. 1-8.
10.1016/j.scijus.2015.10.003.
|
Wortley, RK;
(2016)
Situational precipitators of crime.
In: Wortley, RK and Townsley, M, (eds.)
Environmental Criminology and Crime Analysis.
Routledge
|
Wortley, RK;
Townsley, M;
(2016)
Environmental criminology and crime analysis: Situating the theory, analytic approach and application.
In: Wortley, RK and Townsley, M, (eds.)
Environmental Criminology and Crime Analysis.
Routledge
|