UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author | Type
Jump to: A | B | C | D | F | G | H | J | K | L | M | P | R | S | T | W
Number of items: 77.

A

Abdul-Karim, N; Morgan, R; Binions, R; Temple, T; Harrison, K; (2013) The spatial distribution of postblast RDX residue: forensic implications. J Forensic Sci , 58 (2) pp. 365-371. 10.1111/1556-4029.12045.

Ashby, MPJ; Bowers, KJ; (2013) A comparison of methods for temporal analysis of aoristic crime. Crime Science , 2 (1) 10.1186/2193-7680-2-1. Green open access
file

B

Baudains, P; Braithwaite, A; Johnson, SD; (2013) Spatial Patterns in the 2011 London Riots. Policing: A Journal of Policy and Practice , 7 (1) pp. 21-31. 10.1093/police/pas049.

Baudains, P; Braithwaite, A; Johnson, SD; (2013) TARGET CHOICE DURING EXTREME EVENTS: A DISCRETE SPATIAL CHOICE MODEL OF THE 2011 LONDON RIOTS. CRIMINOLOGY , 51 (2) 251 - 285. 10.1111/1745-9125.12004. Green open access
file

Baudains, P; Johnson, SD; Braithwaite, AM; (2013) Geographic patterns of diffusion in the 2011 London riots. APPLIED GEOGRAPHY , 45 211 - 219. 10.1016/j.apgeog.2013.09.010. Green open access
file

Baudains, PJ; Braithwaite, A; Johnson, SD; (2013) Spatial Patterns in the 2011 London Riots. Policing (Oxford): a journal of policy and practice , 7 (1) pp. 21-31.

Belur, J; Bouhana, N; (2013) Emergence of terrorism'supportive settings in India: The case of Naxalite terrorism. Presented at: Annual Meeting of the American Society of Criminology, Atlanta Marriott Marquis Hotel, Atlanta, GA, USA.

Belur, JS; (2013) Police Shootings: A Culture of Approval. In: Unnithan, P, (ed.) Crime and Justice in India. Sage: New Delhi. (In press).

Belur, JS; (2013) Police Stop and Search in India: Mumbai Nakabandi. In: Weber, L and Bowling, B, (eds.) Police Stop and Search in Global Context. (pp. 68-79). Routledge: Abingdon, Oxford.

Borrion, H; (2013) Quality Assurance in Crime Scripting. Crime Science , 2 (1) 10.1186/2193-7680-2-6.

Borrion, H; Gaballa, M; Wapshott, C; Johnson, SD; Harvey, N; (2013) An empirical study of the impact of reliability values on threat assessment. In: Bosse, E and Shahbazian, E and Rogova, G, (eds.) (Proceedings) NATO Institute on prediction and recognition of piracy efforts using collaborative human-centric information systems. (pp. pp. 89-97). IOS Press BV: Amsterdam.

Borrion, H, ; Mohamed, G; Wapshott, C; Johnson, SD; Harvey, N; (2013) An Empirical Study of the Impact of Reliability Values on Threat Assessment. In: NATO Science for Peace and Security Series - E: Human and Societal Dynamics. (89 - 97). IOS Press

Bouhana, N; (2013) Explaining radicalisation: Theoretical integration and the problem of cross-level interaction. Presented at: Society for Terrorism Research Annual Conference, University of East London, London, UK.

Bouhana, N; (2013) Learning from crime prevention: Foundations of a systemist evaluation framework for online influence activities. Department of Security and Crime Science, University College London: London, UK. Green open access
file

Bouhana, N; (2013) Recruitment of Terrorists. Presented at: UNSPECIFIED.

Bouhana, N; (2013) Vulnerability, exposure, emergence: To radicalise or not radicalise in prison. Presented at: Annual Meeting of the American Society of Criminology, Atlanta Marriott Marquis Hotel, Atlanta, GA, USA.

Bouhana, N; (2013) The reasoning criminal vs. Homer Simpson: conceptual challenges for crime science. FRONTIERS IN HUMAN NEUROSCIENCE , 7 , Article ARTN 682. 10.3389/fnhum.2013.00682. Green open access
file

Bowers, K; Johnson, S; (2013) Contrasting hotspots: Did the opportunists make the heat? In: The Reasoning Criminologist: Essays in Honour of Ronald V. Clarke. (pp. 226-239).

Bowers, KJ; (2013) Situational crime prevention: what we know and what we are starting to understand. Keynote speech. Presented at: Applied Research in Crime and Justice Conference, Sydney, Australia.

Bowers, KJ; Guerette, R; (2013) Evaluation of Situational Crime Prevention. In: Bruinsma, G and Weisburd, D, (eds.) Encyclopedia of Criminology and Criminal Justice. (? - ?). Springer Verlag

Bowers, KJ; Tompson, L; (2013) A Stab in the Dark? Analysing Temporal Trends of Street Robbery. Journal of Research in Crime and Delinquency , 50 (4) pp. 616-631. 10.1177/0022427812469114. Green open access
file

Brayley, H; (2013) Designing police investigation strategies for child sex offending groups. Doctoral thesis, UCL (University College London).

C

Calvert, N; Morton, EJ; Speller, RD; (2013) Preliminary Monte Carlo simulations of linear accelerators in Time-of-Flight Compton Scatter imaging for cargo security. Crime Science , 2 (1) ?-?. 10.1186/2193-7680-2-2. Green open access
file

Cassematis, P; Wortley, R; (2013) Prediction of whistleblowing or non-reporting observation: the role of personal and situational factors. Journal of Business Ethics

Chainey, S; (2013) Using the vulnerable localities index to identify priority areas for targeting fire safety services. FIRE SAFETY JOURNAL , 62 pp. 30-36. 10.1016/j.firesaf.2013.03.013.

Chainey, S; Chapman, J; (2013) A problem-oriented approach to the production of strategic intelligence assessments. POLICING-AN INTERNATIONAL JOURNAL OF POLICE STRATEGIES & MANAGEMENT , 36 (3) pp. 474-490. 10.1108/PIJPSM-02-2012-0012.

Chainey, SP; (2013) Examining the influence of cell size and bandwidth size on kernel density estimation crime hotspot maps for predicting spatial patterns of crime. Bulletin of the Geographical Society of Liege , 60 pp. 7-19. Green open access
file

Chainey, SP; (2013) Understanding the crime fall in the Core Cities (part 1: examining the change in crime in the Core Cities between 2007 to 2012).

Cockbain, E; (2013) Grooming and the 'Asian sex gang predator': the construction of a racial crime threat. Race & Class , 54 (4) 22 - 32. 10.1177/0306396813475983. Green open access
file

Cockbain, E; Brayley, H; Sullivan, J; (2013) Towards a common framework for assessing the activity and associations of groups who sexually abuse children. Journal of Sexual Aggression , 20 (2) 156- 171. 10.1080/13552600.2013.791730. Green open access
file

Cockbain, EP; (2013) The Trafficking of British Children within the UK for Sexual Exploitation: A Situational Analysis. Doctoral thesis, UCL (University College London).

D

Dror, I; (2013) What is (or will be) happening to the cognitive abilities of forensic experts in the new technological age. J Forensic Sci , 58 (2) 563-. 10.1111/1556-4029.12079.

Dror, I; (2013) The ambition to be scientific: Human expert performance and objectivity. Science and Justice , 53 (2) pp. 81-82. 10.1016/j.scijus.2013.03.002.

Dror, IE; Kassin, SM; Kukucka, J; (2013) New application of psychology to law: Improving forensic evidence and expert witness contributions. Journal of Applied Research in Memory and Cognition , 2 (1) pp. 78-81. 10.1016/j.jarmac.2013.02.003.

F

Fischer, MH; Riello, M; Giordano, BL; Rusconi, E; (2013) Singing numbers…in cognitive space--a dual-task study of the link between pitch, space, and numbers. Top Cogn Sci , 5 (2) pp. 354-366. 10.1111/tops.12017.

Fraser-Mackenzie, PA; Dror, IE; Wertheim, K; (2013) Cognitive and contextual influences in determination of latent fingerprint suitability for identification judgments. Sci Justice , 53 (2) pp. 144-153. 10.1016/j.scijus.2012.12.002.

French, J; (2013) Transfers of gunshot residue (GSR) to hands: an experimental study of mechanisms of transfer and deposition carried out using SEM-EDX, with explorations of the implications for forensic protocol and the application of Bayesian Networks to interpretation. Doctoral thesis, UCL (University College London).

G

Ghose, T; Erlikhman, G; Garrigan, P; Kellman, P; Mnookin, J; Dror, I; Charlton, D; (2013) Perception, Image Processing and Fingerprint-Matching Expertise. PERCEPTION , 42 pp. 11-12.

Gill, P; (2013) Tipping Point - The Adoption of Suicide Bombings. Psicologia Politica , 46 (1) pp. 77-94.

Gill, P; Corner, E; (2013) Disaggregating Terrorist Offenders: Implications for Research and Practice. Criminology and Public Policy , 12 (1) 93 - 101. 10.1111/1745-9133.12015. Green open access
file

Gill, P; Horgan, J; (2013) Who were the Volunteers? The Shifting Sociological and Operational Profile of 1240 Provisional Irish Republican Army Members. Terrorism and Political Violence , 25 (3) 435 - 456. 10.1080/09546553.2012.664587. Green open access
file

Gill, P; Horgan, J; Hunter, S; Cushenbery, L; (2013) Malevolent Creativity in Terrorist Organizations. The Journal of Creative Behavior , 47 (2) pp. 125-151. 10.1002/jocb.28. Green open access
file

Guagnano, D; Rusconi, E; Umiltà, C; (2013) Joint (mis-)representations: a reply to Welsh et al. (2013). J Mot Behav , 45 (1) pp. 7-8. 10.1080/00222895.2012.752688.

H

Homel, R; Macintryre, S; Wortley, R; (2013) How house burglars decide on targets: a computer-based scenario approach. In: Leclerc, B and Wortley, R, (eds.) Cognition and Crime: offender Decision Making and Script Analyses. (26 - 47). Routledge: London.

Huth, M; Kuo, JH; Sasse, MA; Kirlappos, I; (2013) Towards Usable Generation and Enforcement of Trust Evidence from Programmers’ Intent. In: Human Aspects of Information Security, Privacy, and Trust.

Huth, M; Kuo, JH; Sasse, MA; Kirlappos, I; (2013) Towards usable generation and enforcement of trust evidence from programmers’ intent. In: Marinos, L and Askoxylakis, I, (eds.) HAS/HCII 2013, LNCS 8030. (pp. 246 - 255). Springer Berlin Heidelberg Green open access
file

J

Johnson, NF; Medina, P; Zhao, G; Messinger, D; Horgan, J; Gill, P; (2013) Simple mathematical law benchmarks human confrontations. Scientific Reports , 3 , Article 3463. 10.1038/srep03463.

Johnson, SD; Bowers, K; (2013) How guardianship dynamics may vary across the street network: A case study of residential burglary. In: Ruiter, S and Bernasco, W and Huisman, W and Bruinsma, G, (eds.) Liber amicorum voor Henk Elffers. NSCR: Amsterdam, Netherlands.

Johnson, SD; Bowers, KJ; (2013) Near repeats and crime forecasting. In: Bruinsma, G and Weisburd, D, (eds.) Encyclopedia of Criminology and Criminal Justice. (? - ?). Springer Verlag

K

Kassin, SM; Dror, IE; Kukucka, J; (2013) The forensic confirmation bias: Problems, perspectives, and proposed solutions. Journal of Applied Research in Memory and Cognition , 2 (1) pp. 42-52. 10.1016/j.jarmac.2013.01.001.

Kirlappos, I; Beautement, A; Sasse, MA; (2013) "Comply or die" is dead: Long live security-aware principal agents. In: Financial Cryptography and Data Security. (pp. 70 -82). Springer: Berlin. Green open access
file

L

Le Sage, T; (2013) Scenario based risk assessment.

Le Sage, T; Toubaline, S; Borrion, H; (2013) An Object-Oriented Approach for Modelling Security Scenarios. Presented at: UNSPECIFIED.

Leclerc, B; Smallbone, S; Wortley, R; (2013) Prevention nearby: the influence of the presence of a potential guardian on the severity of child sexual abuse. Sexual Abuse: a journal of research and treatment

Leclerc, B; Smallbone, S; Wortley, R; (2013) Interpersonal scripts and victim reactions in child sexual abuse: a quantitative analysis of offender-victim interchange. In: Leclerc, B and Wortley, R, (eds.) Cognition and Crime: Offender Decision Making and Script Analyses. (101 - 119). Routledge: London.

Leclerc, R; Wortley, R; (2013) The reasoning criminal: 25 years on. In: Leclerc, B and Wortley, R, (eds.) Cognition and Crime: Offender Decision Making and Crime Analyses. (1 - 11). Routledge: London.

M

Marchione, E; Johnson, SD; (2013) Space-time Dynamics of Maritime Piracy. Journal of Research in Crime and Delinquency. (In press).

Marchione, E; Johnson, SD; (2013) Spatial, Temporal and Spatio-Temporal Patterns of Maritime Piracy. JOURNAL OF RESEARCH IN CRIME AND DELINQUENCY , 50 (4) 504 - 524. 10.1177/0022427812469113. Green open access
file

Mayor, W; Cox, I; (2013) On unstructured distributed search over BitTorrent. 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013 - Proceedings 10.1109/P2P.2013.6688715. Green open access
file

Meakin, G; Jamieson, A; (2013) DNA transfer: review and implications for casework. Forensic Sci Int Genet , 7 (4) pp. 434-443. 10.1016/j.fsigen.2013.03.013.

Morgan, RM; Davies, G; Balestri, F; Bull, PA; (2013) The recovery of pollen evidence from documents and its forensic implications. Sci Justice , 53 (4) pp. 375-384. 10.1016/j.scijus.2013.03.004.

P

Penny, R; Bowles, R; Bouhana, N; (2013) Social Network Modelling for Counter Extremism - Comparing Criminality in Two Activist Networks. Presented at: UNSPECIFIED.

R

Rusconi, E; Dervinis, M; Verbruggen, F; Chambers, CD; (2013) Critical time course of right frontoparietal involvement in mental number space. J Cogn Neurosci , 25 (3) pp. 465-483. 10.1162/jocn_a_00330.

Rusconi, E; Mitchener-Nissen, T; (2013) Prospects of functional magnetic resonance imaging as lie detector. Frontiers in Human Neuroscience , 7 , Article 594. 10.3389/fnhum.2013.00594. Green open access
file

S

Sidebottom, AL; (2013) On the Application of CRAVED to Livestock Theft in Malawi. International Journal of Comparative and Applied Criminal Justice , 37 (3) pp. 195-212. 10.1080/01924036.2012.734960.

Sidebottom, AL; (2013) Understanding and preventing crime in Malawi: an opportunity perspective. Doctoral thesis, UCL (University College London).

Sidebottom, AL; (2013) Bike theft. In: Ross, JI, (ed.) Encyclopedia of Street Crime in America. (pp. 29-31). Sage

Sidebottom, AL; Graycar, A; (2013) Corruption and Control: A Corruption Reduction Approach. Journal of Financial Crime , 19 (4) pp. 384-399. 10.1108/13590791211266377.

Smith, GE; Chetty, K; Baker, CJ; Woodbridge, K; (2013) Extended time processing for passive bistatic radar. IET RADAR SONAR AND NAVIGATION , 7 (9) pp. 1012-1018. 10.1049/iet-rsn.2012.0321.

Smith, MJ; Tilley, N; (2013) Crime science: New approaches to preventing and detecting crime.

Smith, MJ; Webb, B; (2013) Vehicle excise duty evasion in the UK. In: Crime Science: New Approaches to Preventing and Detecting Crime. (pp. 126-144).

Summers, L; Johnson, SD; Rengert, GF; (2013) The use of maps in offender interviewing. In: Offenders on Offending: Learning about Crime from Criminals. (pp. 246-272).

T

Taylor, J; Margaritis, D; Nasir, Z; Borrion, H; Lai, KM; (2013) The role of protection measures and their interaction in determining building vulnerability and resilience to bioterrorism. Journal of Bioterrorism & Biodefense (10.4172/) 10.4172/2157-2526.1000123.

Tompson, LA; Chainey, S; (2013) Integrating environmental considerations into prisoner risk assessments. European Journal of Probation , 5 (2) 66 - 80. Green open access
file

W

Wortley, R; (2013) Rational choice and offender decision making: lessons from the cognitive sciences. In: Leclerc, B and Wortley, R, (eds.) Cognition and Crime: Offender Decision Making and Script Analyes. (237 - 251).

Wortley, R; Smallbone, S; (2013) Emotional arousal and child sex offending: a situational perspective. In: van Gelder, J-L and Elffers, H and Nagin, D and Reynald, D, (eds.) Affect and Cognition in Criminal justice Decision Making. Routledge: London.

Wortley, RK; Smallbone, SW; (2013) A criminal careers typology of child sexual abusers. Sexual Abuse: a journal of research and treatment 10.1177/1079063213503689.

This list was generated on Sun Aug 21 11:01:51 2016 BST.