UCL Discovery
UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL people

Group by: Type | Date
Number of items: 34.

Article

Ashby, MPJ; Bowers, KJ; Borrion, H; Fujiyama, T; (2014) The when and where of an emerging crime type: The example of metal theft from the railway network of Great Britain. Security Journal 10.1057/sj.2014.43. Green open access
file

Borrion, H; Ekblom, P; Alrajeh, D; Borrion, A; Keane, A; Koch, D; Mitchener-Nissen, T; (2020) The Problem with Crime Problem-Solving: Towards a Second Generation POP? British Journal of Criminology , 60 (1) pp. 219-240. 10.1093/bjc/azz029. Green open access
file

Borrion, H; Amiri, A; Delpech, D; Lemieux, A; (2019) Experimental Assessment of the Viability of Using Ground Penetrating Radar for Metal Wire-Snare Detection. Crime Science , 8 , Article 9. 10.1186/s40163-019-0105-0. Green open access
file

Borrion, H; Dehghanniri, H; (2019) Crime scripting: a systematic review. European Journal of Criminology (In press). Green open access
file

Borrion, H; Kurland, J; Tilley, N; Chen, P; (2020) Measuring the resilience of criminogenic ecosystems to global disruption: A case-study of COVID-19 in China. PLoS One , 15 (10) , Article e0240077. 10.1371/journal.pone.0240077. Green open access
file

Chen, P; Kurland, J; Piquero, A; Borrion, H; (2021) Measuring the Impact of the COVID-19 Lockdown on Crime in a Medium-Sized City in China. Journal of Experimental Criminology 10.1007/s11292-021-09486-7. (In press). Green open access
file

Connolly, Lena Yuryna; Borrion, Hervé; Arief, Budi; (2025) Ransomware crime through the lens of neutralisation theory. European Journal of Criminology 10.1177/14773708251320464. (In press). Green open access
file

Delpech, D; Borrion, H; Johnson, S; (2021) Systematic review of situational prevention methods for crime against species. Crime Science , 10 , Article 1. 10.1186/s40163-020-00138-1. Green open access
file

Fioranelli, F; Ritchie, M; Borrion, H; Griffiths, H; (2015) Classification of Loaded/Unloaded Micro-Drones Using Multistatic Radar. Electronic Letters , 51 (22) pp. 1813-1815. 10.1049/el.2015.3038. Green open access
file

Kwon, Doy; Borrion, Herve; Wortley, Richard; (2024) Measuring Cybercrime in Calls for Police Service. Asian Journal of Criminology , 19 (3) pp. 329-351. 10.1007/s11417-024-09432-2. Green open access
file

Laufs, J; Borrion, H; Bradford, B; (2020) Security and the smart city: A systematic review. Sustainable Cities and Society , 55 , Article 102023. 10.1016/j.scs.2020.102023. Green open access
file

Le Sage, T; Borrion, H; Toubaline, S; (2014) A user-layered approach for modelling and simulating terrorist attacks. International Journal of Critical Infrastructures (IJCIS) , 10 (3/4) 10.1504/IJCIS.2014.066342.. Green open access
file

Macoveciuc, I; Rando, C; Borrion, H; (2019) Forensic Gait Analysis and Recognition: Standards of Evidence Admissibility. Journal of Forensic Sciences , 64 (5) pp. 1294-1303. 10.1111/1556-4029.14036. Green open access
file

Nieto, Alberto; Davies, Toby; Borrion, Hervé; (2022) “Offending with the accomplices of my accomplices”: Evidence and implications regarding triadic closure in co-offending networks. Social Networks , 70 pp. 325-333. 10.1016/j.socnet.2022.02.013. Green open access
file

Padur, Kart; Borrion, Herve; Hailes, Stephen; (2025) Using Agent-Based Modelling and Reinforcement Learning to Study Hybrid Threats. Journal of Artificial Societies and Social Simulation , 28 (1) , Article 1. 10.18564/jasss.5539. Green open access
file

Ritchie, M; Fioranelli, F; Borrion, H; Griffiths, H; (2017) Multistatic micro-Doppler radar feature extraction for classification of unloaded/loaded micro-drones. IET Radar, Sonar & Navigation , 11 (1) pp. 116-124. 10.1049/iet-rsn.2016.0063. Green open access
file

Tripathi, K; Borrion, H; (2016) Safe, secure or punctual? A simulator study of train driver response to reports of explosives on a metro train. Security Journal , 29 (1) pp. 87-105. 10.1057/sj.2015.46. Green open access
file

Tripathi, K; Borrion, H; Belur, J; (2017) Sexual harassment of students on public transport: An exploratory study in Lucknow, India. Crime Prevention and Community Safety , 19 (3-4) pp. 240-250. 10.1057/s41300-017-0029-0. Green open access
filefile

Tripathi, K; Borrion, H; Fujiyama, T; (2017) Potential Explosive Device on a Commuter Train: What drives train drivers to deviate from the security procedure? Urban Rail Transit , 3 (4) pp. 192-202. 10.1007/s40864-017-0050-8. Green open access
file

Yuryna Connolly, Lena; Borrion, Herve; (2022) Reducing Ransomware Crime: Analysis of Victims' Payment Decisions. Computers & Security , 119 , Article 102760. 10.1016/j.cose.2022.102760. Green open access
file

Book chapter

Borrion, H; (2018) Engineering. In: Wortley, R and Sidebottom, A and Tilley, N and Laycock, G, (eds.) Routledge Handbook of Crime Science. Routledge: London, UK. Green open access
file

Borrion, H; Bordeanu, O; Toubaline, S; (2019) Simulation of dependencies between armed response vehicles and CPTED measures in counter-terrorism resource allocation: Strengthening the Links with Crime Science. In: Armitage, R and Ekblom, P, (eds.) Rebuilding Crime Prevention Through Environmental Design Strengthening the Links with Crime Science. Routledge: London, UK. Green open access
file

Borrion, H; Koch, D; (2018) Architecture. In: Wortley, R and Sidebottom, A and Tilley, N and Laycock, G, (eds.) Routledge Handbook of Crime Science. Routledge: London, UK.

Solymosi, R; Borrion, H; Fujiyama, T; (2015) Crowd Spatial Patterns at Bus Stops: Security Implications and Effects of Warning Messages. In: Newton, A and Ceccato, V, (eds.) Safety and Security in Transit Environments: An Interdisciplinary Approach. (pp. 156-178). Palgrave Macmillan: London, UK. Green open access
file

Proceedings paper

Becker, I; Posner, R; Islam, T; Ekblom, P; Borrion, H; McGuire, M; Li, S; (2021) Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation. In: Proceedings of the 54th Hawaii International Conference on System Sciences. (pp. pp. 5347-5356). Shidler College of Business, University of Hawaii at Manoa: Honolulu, HI, USA. Green open access
file

Borrion, H; Dehghanniri, H; Li, Y; (2017) Comparative Analysis of Crime Scripts: One CCTV Footage—Twenty-One Scripts. In: Proceedings of the 2017 European Intelligence and Security Informatics Conference (EISIC). (pp. pp. 115-122). IEEE Computer Society: Athens, Greece. Green open access
file

Borrion, H; Yuryna Connolly, L; (2020) Your Money or Your Business: Decision-Making Processes in Ransomware Attacks. In: Proceedings of the Forty-First International Conference on Information Systems 2020. Association for Information Systems: Virtual. (In press). Green open access
file

Connolly, Lena; Borrion, Hervé; Arief, Budi; Kaddoura, Sanna; (2023) Applying Neutralisation Theory to Better Understand Ransomware Offenders. In: Proceedings of the 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). (pp. pp. 177-182). IEEE: Delft, Netherlands. Green open access
file

Dehghanniri, H; Borrion, H; (2017) Toward a More Structured Crime Scripting Method. In: Liu, L and Wnuk, K, (eds.) 2016 IEEE 24th International Requirements Engineering Conference Workshops. (pp. pp. 94-97). IEEE Green open access
file

Dehghanniri, H; Letier, E; Borrion, H; (2015) Improving Security Decision under Uncertainty: A Multidisciplinary Approach. In: Onwubiko, C, (ed.) (Proceedings) International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). (pp. pp. 1-7). IEEE: London, UK. Green open access
file

Islam, T; Becker, I; Posner, R; Ekblom, P; McGuire, M; Borrion, H; Li, S; (2019) A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. In: Wang, G and Bhuiyan, M and De Capitani, di Vimercati S and Ren Y, Y, (eds.) Communications in Computer and Information Science. Springer: Singapore. Green open access
file

Wang, Yichao; Roscoe, Sophia; Arief, Budi; Connolly, Lena; Borrion, Herve; Kaddoura, Sanaa; (2023) The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities. In: International Symposium on Security and Privacy in Social Networks and Big Data SocialSec 2023: Security and Privacy in Social Networks and Big Data. (pp. pp. 149-163). Springer Nature Green open access
file

Conference item

Thornton, A; Borrion, H; (2018) The Design of a Professional Practice Module for Security and Crime Science. Presented at: ISEE 2018: The 7th International Symposium of Engineering Education, London, UK. Green open access
file

Thesis

Ashby, MPJ; (2016) Using crime science for understanding and preventing theft of metal from the British railway network. Doctoral thesis , UCL (University College London). Green open access
file

This list was generated on Sun Jan 11 03:53:46 2026 GMT.