UCL Discovery Stage
UCL home » Library Services » Electronic resources » UCL Discovery Stage

Browse by UCL Departments and Centres

Group by: Author | Type
Jump to: A | B | C | F | G | H | K | L | M | O | P | R | S | T | W
Number of items: 73.

A

Abdul-Karim, N; (2016) Morphological Variations of Explosive Residue Particles and Implications for Understanding Detonation Mechanisms. Analytical Chemistry , 88 (7) pp. 3899-3908. 10.1021/acs.analchem.6b00080. Green open access
file

Ashby, MPJ; (2016) Using crime science for understanding and preventing theft of metal from the British railway network. Doctoral thesis , UCL (University College London). Green open access
file

B

Baudains, P; Fry, HM; Davies, TP; Wilson, AG; Bishop, SR; (2016) A dynamic spatial model of conflict escalation. European Journal of Applied Mathematics , 27 (3) pp. 530-553. 10.1017/S0956792515000558. Green open access
file

Beautement, A; Becker, I; Parkin, S; Krol, K; Sasse, MA; (2016) Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2016. (pp. pp. 253-270). USENIX Association: Denver, CO, USA. Green open access
file

Beautement, A; Becker, IF; Krol, K; Parkin, S; Sasse, MA; (2016) Productive Security: A scalable methodology for analysing employee security behaviours. [Dataset]. UCL Computer Science: London, UK. Green open access
file

Becker, I; Hutchings, A; Abu-Salma, R; Anderson, R; Bohm, N; Murdoch, SJ; Sasse, MA; (2016) International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms. In: Proceedings of the 15th Annual Workshop on the Economics of Information Security (WEIS). Workshop on the Economics of Information Security (WEIS): Berkeley, CA, USA. (In press). Green open access
file

Becker, I; Parkin, S; Sasse, MA; (2016) Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations. In: Proceedings of the 4th Learning from Authoritative Security Experiment Results (LASER) Workshop. (pp. pp. 43-53). IEEE: San Jose, CA, USA. Green open access
file

Becker, IF; Hutchings, A; Abu-Salma, R; Anderson, R; Bohm, N; Murdoch, SJ; Sasse, MA; (2016) International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms. [Dataset]. UCL Computer Science Green open access
file

Belur, JS; Behlendorf, B; Kumar, S; (2016) Peering through the Kaleidoscope: Variation and Validity in Data Collection on Terrorist Attacks. Studies in Conflict and Terrorism , 39 (7-8) pp. 641-667. 10.1080/1057610X.2016.1141004. Green open access
file

Belur, JS; Johnson, S; (2016) Is crime analysis at the heart of policing practice? A case study. Policing and Society: An International Journal of Research and Policy 10.1080/10439463.2016.1262364. (In press). Green open access
file

Bouhana, N; Thornton, A; Corner, E; Malthaner, S; Lindekilde, L; Schuurman, B; Perry, G; (2016) PRIME Deliverable D3.1: PReventing, Interdicting and Mitigating Extremist events: Defending against lone actor extremism. (Risk Analysis Framework , Public Version D3.1 ). UCL Jill Dando Institute of Security and Crime Science: London, UK. Green open access
file

Bouhana, N; Johnson, SD; Porter, M; (2016) Consistency and specificity in burglars who commit prolific residential burglary: Testing the core assumptions underpinning behavioural crime linkage. Legal and Criminological Psychology , 21 (1) pp. 77-94. 10.1111/lcrp.12050. Green open access
file

Burton, L; Johnson, SD; Braithwaite, A; (2016) Potential uses of Numerical Simulation for the Modelling of Civil Conflict. Peace Economics, Peace Science and Public Policy , 23 (1) pp. 1-39. 10.1515/peps-2016-0035. Green open access
file

C

Chainey, S; Sidebottom, A; Wortley, R; Bowers, K; Baudains, P; (2016) Project MARGIN: Factors affecting insecurity. UCL Jill Dando Institute of Security and Crime Science and Project Margin: London, UK. Green open access
file

Chainey, SP; da Silva, BFA; (2016) Examining the extent of repeat and near repeat victimisation of domestic burglaries in Belo Horizonte, Brazil. Crime Science , 5 (1) 10.1186/s40163-016-0049-6. Green open access
file

Chen, Q; Chetty, K; Woodbridge, K; Tan, B; (2016) Signs of life detection using wireless passive radar. In: Proceedings of the 2016 IEEE Radar Conference (RadarConf). IEEE: Philadelphia, PA, USA. Green open access
file

Chen, Q; Tan, B; Chetty, K; Woodbridge, K; (2016) Activity Recognition Based on Micro-Doppler Signature with In-Home Wi-Fi. In: Proceedings of the 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). (pp. pp. 216-221). IEEE: Munich, Germany. Green open access
file

Cheng, T; Bowers, K; Longley, P; Shawe-Taylor, J; Trevor, A; Davies, T; Rosser, G; + view all (2016) CPC: Crime, Policing and Citizenship - Intelligent Policing and Big Data. [Book]. (1st ed.). UCL Space Lab: London, UK. Green open access
file

Cheshire, K; Morgan, RM; Holmes, J; (2016) The potential for geochemical discrimination of single- and mixed-source soil samples from close proximity urban parkland locations. Australian Journal of Forensic Sciences , 49 (2) pp. 161-174. 10.1080/00450618.2016.1144789. Green open access
file

Chetty, K; Chen, Q; Woodbridge, K; (2016) Train Monitoring using GSM-R Based Passive Radar. In: Proceedings of the 2016 IEEE Radar Conference. IEEE: Philadelphia, PA, USA. Green open access
file

Cockbain, EP; Reynald, D; (2016) Introduction to the special edition ‘Child sexual abuse: analysis and intervention’. Crime Science , 5 (4) pp. 1-3. 10.1186/s40163-016-0052-y. Green open access
file

Corner, E; Gill, P; Mason, O; (2016) Mental Health Disorders and the Terrorist: A Research Note Probing Selection Effects and Disorder Prevalence. Studies in Conflict and Terrorism , 39 (6) pp. 560-568. 10.1080/1057610X.2015.1120099. Green open access
file

Creutzfeldt, N; Bradford, B; (2016) Dispute Resolution Outside of Courts: Procedural Justice and Decision Acceptance Among Users of Ombuds Services in the UK. Law & Society Review , 50 (4) pp. 985-1016. 10.1111/lasr.12234. Green open access
file

F

Farrell, G; Tseloni, A; Tilley, N; (2016) Signature dish: Triangulation from data signatures to examine the role of security in falling crime. Methodological Innovations , 9 pp. 1-11. 10.1177/2059799115622754. Green open access
file

G

Gamble, SC; (2016) Forensic detection of explosives in the wastewater system: Implications for intelligence gathering. Doctoral thesis , UCL (University College London). Green open access
file

Gherghel, S; Morgan, RM; Blackman, CS; Karu, K; Parkin, IP; (2016) Analysis of transferred fragrance and its forensic implications. Science and Justice , 56 (6) pp. 413-420. 10.1016/j.scijus.2016.08.004. Green open access
file

Gill, P; (2016) Lone-Actor Terrorist Target Choice. Behavioral Sciences & the Law , 34 (5) pp. 693-705. 10.1002/bsl.2268. Green open access
file

Gill, P; (2016) Toward a scientific approach to identifying and understanding indicators of radicalization and terrorist intent: Eight key problems. Journal of Threat Assessment and Management , 2 (3) pp. 187-191. 10.1037/tam0000047. Green open access
file

Gill, P; Piazza, J; Horgan, J; (2016) Counterterrorism Killings and Provisional IRA Bombings, 1970-1998. Terrorism and Political Violence , 28 (3) pp. 473-496. 10.1080/09546553.2016.1155932. Green open access
file

H

Horgan, J; Gill, P; Bouhana, N; Silver, J; Corner, E; (2016) Across the Universe? A Comparative Analysis of Violent Radicalization Across Three Offender Types with Implications for Criminal Justice Training and Education. The Office of Justice Programs:NCJRS: USA. Green open access
file

Hough, M; May, T; Hales, G; Belur, JS; (2016) Misconduct by police leaders in England and Wales: an exploratory study. Policing and Society 10.1080/10439463.2016.1216989. (In press). Green open access
file

K

Karppinen, IA; (2016) 'Mission impossible': how conflicting security and productivity demands induce non-compliance with security policies. Doctoral thesis , UCL (University College London).

Kempinska, KK; Davies, T; Shawe-Taylor, J; (2016) Probabilistic Map-matching using Particle Filters. In: Proceedings of 24th GIS Research UK (GISRUK 2016) Conference. Greenwich GIS Research Group: London, UK. Green open access
file

Kirlappos, I; (2016) Learning from "shadow security": understanding non-compliant behaviours to improve information security management. Doctoral thesis , UCL (University College London). Green open access
file

Kolokytha, S; (2016) On-belt Tomosynthesis: 3D Imaging of Baggage for Security Inspection. Doctoral thesis , UCL (University College London). Green open access
file

Krol, K; (2016) The role of effort in security and privacy behaviours online. Doctoral thesis , UCL (University College London). Green open access
file

L

Leclerc, B; Wortley, R; Dowling, C; (2016) Situational Precipitators and Interactive Forces in Sexual Crime Events Involving Adult Offenders. Criminal Justice and Behavior , 43 (11) pp. 1600-1618. 10.1177/0093854816660144. Green open access
file

M

Manrique, P; Cao, Z; Gabriel, A; Horgan, J; Gill, P; Qi, H; Restrepo, E; ... Johnson, N; + view all (2016) Women's Connectivity in Extreme Networks. Science Advances , 2 (6) , Article e1501742. 10.1126/sciadv.1501742. Green open access
file

Mariconti, E; Onaolapo, J; Ahmad, SS; Nikiforou, N; Egele, M; Nikiforakis, M; Stringhini, G; (2016) Why Allowing Profile Name Reuse Is A Bad Idea. Proceedings of the 9th European Workshop on System Security , Article 3. 10.1145/2905760.2905762.

Mariconti, E; Onaolapo, J; Ross, G; Stringhini, G; (2016) What's your major threat? On the differences between the network behavior of targeted and commodity malware. In: Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES). (pp. pp. 599-608). IEEE: Salzburg, Austria. Green open access
file

Mariconti, E; Onaolapo, J; Ross, G; Stringhini, G; (2016) What's your major threat? On the differences between the network behavior of targeted and commodity malware. [Dataset]. UCL Computer Science: London, UK. Green open access
file

Mattijssen, EJ; Kerkhoff, W; Berger, CE; Dror, IE; Stoel, RD; (2016) Implementing context information management in forensic casework: minimizing contextual bias in firearms examination. Science & Justice , 56 (2) pp. 113-122. 10.1016/j.scijus.2015.11.004.

McElhone, RL; Meakin, GE; French, JC; Alexander, T; Morgan, RM; (2016) Simulating forensic casework scenarios in experimental studies: The generation of footwear marks in blood. Forensic Science International , 264 pp. 34-40. 10.1016/j.forsciint.2016.03.023. Green open access
file

McKillop, N; Smallbone, S; Wortley, R; (2016) Predicting multiple victim versus single victim sexual abuse: an examination of distal factors and proximal factors associated with the first abuse incident. Journal of Sexual Aggression , 22 (1) pp. 52-65. 10.1080/13552600.2014.971892. Green open access
file

Meakin, GE; (2016) Transfer: DNA. In: Jamieson, A and Moenssens, A, (eds.) Wiley Encyclopedia of Forensic Science. Wiley

Meakin, GE; Jamieson, A; (2016) A response to a response to Meakin and Jamieson DNA transfer: Review and implications for casework. [Letter]. Forensic Science International: Genetics , 22 e5-e6. 10.1016/j.fsigen.2016.02.010. Green open access
file

Meloy, R; Gill, P; (2016) The Lone Actor Terrorist and the TRAP-18. Journal of Threat Assessment and Management , 3 (1) pp. 37-52. 10.1037/tam0000061. Green open access
file

Morrison, J; Gill, P; (2016) 100 Years of Irish Republican Violence: Introduction to the Special Issue. Terrorism and Political Violence , 28 (3) pp. 409-416. 10.1080/09546553.2016.1155927. Green open access
file

Murdoch, SJ; Becker, I; Abu-Salma, R; Anderson, R; Bohm, N; Hutchings, A; Sasse, MA; (2016) Are Payment Card Contracts Unfair? In: Grossklags, J and Preneel, B, (eds.) International Conference on Financial Cryptography and Data Security FC 2016: Financial Cryptography and Data Security. (pp. pp. 600-608). Springer Green open access
file

O

Onaolapo, J; Mariconti, E; Stringhini, G; (2016) What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild. In: Proceedings of the ACM Internet Measurement Conference 2016 (IMC 2016). (pp. pp. 65-79). Association for Computing Machinery (ACM): New York, NY, USA. Green open access
file

Onaolapo, J; Stringhini, G; Mariconti, E; (2016) Understanding The Use Of Stolen Webmail Credentials In The Wild. [Dataset]. UCL Computer Science: London, UK. Green open access
file

P

Parkin, S; Krol, K; Becker, I; Sasse, MA; (2016) Applying Cognitive Control Modes to Identify Security Fatigue Hotspots. In: (Proceedings) Workshop on Security Fatigue, [part of] SOUPS 2016: Twelfth Symposium on Usable Privacy and Security, 22-24 June 2016, Denver, Colorado, USA. USENIX Association Green open access
file

Pasculli, Lorenzo; (2016) Harm, Offence and Offesa in the English and the Italian Criminal Law. For a Constitutionalisation of a Unitary Principle of Harm in the English Legal System, also as a Criterion of Judicial Interpretation. Diritto Penale XXI Secolo , 2 pp. 302-349. Green open access
file

Pasculli, Lorenzo; (2016) A Right Turn in the English Criminal Law: No More Anomalous Forms of Complicity. An Important Lesson from the UK Supreme Court. Diritto Penale XXI Secolo , 1 pp. 116-129. Green open access
file

Pepys, RC; (2016) Developing mathematical models of complex social processes: radicalisation and criminality development. Doctoral thesis , UCL (University College London). Green open access
file

R

Ritchie, M; Ash, M; Chen, Q; Chetty, K; (2016) Through Wall Radar Classification of Human Micro-Doppler Using Singular Value Decomposition Analysis. Sensors , 16 (9) , Article 1401. 10.3390/s16091401. Green open access
file

Rosser, G; Davies, T; Bowers, KJ; Johnson, SD; Cheng, T; (2016) Predictive Crime Mapping: Arbitrary Grids or Street Networks? Journal of Quantitative Criminology 10.1007/s10940-016-9321-x. (In press). Green open access
file

S

Schwartz, C; (2016) The Paradox of Confrontation: Experimental Evidence on the Audience Effects of Protest. In: Proceedings of the 6th Annual General Conference of the European Political Science Association. European Political Science Association: Brussels, Belgium. Green open access
file

Schwartz, C; Simon, M; Hudson, D; Johnson, S; (2016) Illegality is in the Eye of the Beholder: Experimental Evidence on Criminality and Risks of Irregular Migration. In: Proceedings of the 6th Annual Workshop on Comparative Approaches to Immigration, Ethnicity, and Integration. Institution for Social and Policy Studies, Yale University: New Haven, CT, USA. Green open access
file

Smallbone, S; Wortley, R; (2016) Preventing Child Sexual Abuse Online. In: Online Risk to Children: Impact, Protection and Prevention: First Edition. (pp. 143-162). Wiley

Smit, NM; Lagnado, DA; Morgan, RM; Fenton, NE; (2016) Using Bayesian networks to guide the assessment of new evidence in an appeal case. Crime Science , 5 , Article 9. 10.1186/s40163-016-0057-6. Green open access
file

Sombatruang, N; Sasse, MA; Baddeley, M; (2016) Why do people use unsecure public Wi-Fi? An investigation of behaviour and factors driving decisions. In: (Proceedings) STAST '16 Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust. (pp. pp. 61-72). Association for Computing Machinery Green open access
file

T

Tench, S; Fry, H; Gill, P; (2016) Spatio-temporal patterns of IED usage by the Provisional Irish Republican Army. European Journal of Applied Mathematics , 27 (3) pp. 377-402. 10.1017/S0956792515000686. Green open access
file

Thornton, A; Tompson, L; (2016) What Works? Integrating evidence into crime prevention decision-making. Presented at: International Crime and Intelligence Analysis Conference 2016, Manchester, UK. Green open access
file

Tilley, N; (2016) EMMIE and engineering: What works as evidence to improve decisions? Evaluation , 22 (3) pp. 304-322. 10.1177/1356389016656518. Green open access
file

Tilley, N; Laycock, G; (2016) Engineering a safer society. Public Safety Leadership Research Focus , 4 (2) pp. 1-6. Green open access
file

Tilley, N; Tseloni, A; (2016) Choosing and Using Statistical Sources in Criminology: What Can the Crime Survey for England and Wales Tell Us? Legal Information Management , 16 (2) pp. 78-90. 10.1017/S1472669616000219. Green open access
file

Tompson, L; Belur, J; (2016) Information retrieval in systematic reviews: a case study of the crime prevention literature. Journal of Experimental Criminology , 12 (2) pp. 187-207. 10.1007/s11292-015-9243-x. Green open access
file

Tompson, LA; (2016) Explaining temporal patterns in street robbery. Doctoral thesis , UCL (University College London). Green open access
file

Tripathi, K; Borrion, H; (2016) Safe, secure or punctual? A simulator study of train driver response to reports of explosives on a metro train. Security Journal , 29 (1) pp. 87-105. 10.1057/sj.2015.46. Green open access
file

W

Weston-Ford, KA; Moseley, ML; Hall, LJ; Marsh, NP; Morgan, RM; Barron, LP; (2016) The retrieval of fingerprint friction ridge detail from elephant ivory using reduced-scale magnetic and non-magnetic powdering materials. Science & Justice , 56 (1) pp. 1-8. 10.1016/j.scijus.2015.10.003. Green open access
file

Wortley, RK; (2016) Situational precipitators of crime. In: Wortley, RK and Townsley, M, (eds.) Environmental Criminology and Crime Analysis. Routledge Green open access
file

Wortley, RK; Townsley, M; (2016) Environmental criminology and crime analysis: Situating the theory, analytic approach and application. In: Wortley, RK and Townsley, M, (eds.) Environmental Criminology and Crime Analysis. Routledge Green open access
file

This list was generated on Mon Oct 21 02:46:10 2024 BST.