Browse by UCL people
Group by: Type | Date
Number of items: 34.
Article
Ashby, MPJ;
Bowers, KJ;
Borrion, H;
Fujiyama, T;
(2014)
The when and where of an emerging crime type: The example of metal theft from the railway network of Great Britain.
Security Journal
10.1057/sj.2014.43.
|
Borrion, H;
Ekblom, P;
Alrajeh, D;
Borrion, A;
Keane, A;
Koch, D;
Mitchener-Nissen, T;
(2020)
The Problem with Crime Problem-Solving: Towards a Second Generation POP?
British Journal of Criminology
, 60
(1)
pp. 219-240.
10.1093/bjc/azz029.
|
Borrion, H;
Amiri, A;
Delpech, D;
Lemieux, A;
(2019)
Experimental Assessment of the Viability of Using Ground Penetrating Radar for Metal Wire-Snare Detection.
Crime Science
, 8
, Article 9. 10.1186/s40163-019-0105-0.
|
Borrion, H;
Dehghanniri, H;
(2019)
Crime scripting: a systematic review.
European Journal of Criminology
(In press).
|
Borrion, H;
Kurland, J;
Tilley, N;
Chen, P;
(2020)
Measuring the resilience of criminogenic ecosystems to global disruption: A case-study of COVID-19 in China.
PLoS One
, 15
(10)
, Article e0240077. 10.1371/journal.pone.0240077.
|
Chen, P;
Kurland, J;
Piquero, A;
Borrion, H;
(2021)
Measuring the Impact of the COVID-19 Lockdown on Crime in a Medium-Sized City in China.
Journal of Experimental Criminology
10.1007/s11292-021-09486-7.
(In press).
|
Connolly, Lena Yuryna;
Borrion, Hervé;
Arief, Budi;
(2025)
Ransomware crime through the lens of neutralisation theory.
European Journal of Criminology
10.1177/14773708251320464.
(In press).
|
Delpech, D;
Borrion, H;
Johnson, S;
(2021)
Systematic review of situational prevention methods for crime against species.
Crime Science
, 10
, Article 1. 10.1186/s40163-020-00138-1.
|
Fioranelli, F;
Ritchie, M;
Borrion, H;
Griffiths, H;
(2015)
Classification of Loaded/Unloaded Micro-Drones Using Multistatic Radar.
Electronic Letters
, 51
(22)
pp. 1813-1815.
10.1049/el.2015.3038.
|
Kwon, Doy;
Borrion, Herve;
Wortley, Richard;
(2024)
Measuring Cybercrime in Calls for Police Service.
Asian Journal of Criminology
, 19
(3)
pp. 329-351.
10.1007/s11417-024-09432-2.
|
Laufs, J;
Borrion, H;
Bradford, B;
(2020)
Security and the smart city: A systematic review.
Sustainable Cities and Society
, 55
, Article 102023. 10.1016/j.scs.2020.102023.
|
Le Sage, T;
Borrion, H;
Toubaline, S;
(2014)
A user-layered approach for modelling and simulating terrorist attacks.
International Journal of Critical Infrastructures (IJCIS)
, 10
(3/4)
10.1504/IJCIS.2014.066342..
|
Macoveciuc, I;
Rando, C;
Borrion, H;
(2019)
Forensic Gait Analysis and Recognition: Standards of Evidence Admissibility.
Journal of Forensic Sciences
, 64
(5)
pp. 1294-1303.
10.1111/1556-4029.14036.
|
Nieto, Alberto;
Davies, Toby;
Borrion, Hervé;
(2022)
“Offending with the accomplices of my accomplices”: Evidence and implications regarding triadic closure in co-offending networks.
Social Networks
, 70
pp. 325-333.
10.1016/j.socnet.2022.02.013.
|
Padur, Kart;
Borrion, Herve;
Hailes, Stephen;
(2025)
Using Agent-Based Modelling and Reinforcement Learning to Study Hybrid Threats.
Journal of Artificial Societies and Social Simulation
, 28
(1)
, Article 1. 10.18564/jasss.5539.
|
Ritchie, M;
Fioranelli, F;
Borrion, H;
Griffiths, H;
(2017)
Multistatic micro-Doppler radar feature extraction for classification of unloaded/loaded micro-drones.
IET Radar, Sonar & Navigation
, 11
(1)
pp. 116-124.
10.1049/iet-rsn.2016.0063.
|
Tripathi, K;
Borrion, H;
(2016)
Safe, secure or punctual? A simulator study of train driver response to reports of explosives on a metro train.
Security Journal
, 29
(1)
pp. 87-105.
10.1057/sj.2015.46.
|
Tripathi, K;
Borrion, H;
Belur, J;
(2017)
Sexual harassment of students on public transport: An exploratory study in Lucknow, India.
Crime Prevention and Community Safety
, 19
(3-4)
pp. 240-250.
10.1057/s41300-017-0029-0.
|
Tripathi, K;
Borrion, H;
Fujiyama, T;
(2017)
Potential Explosive Device on a Commuter Train: What drives train drivers to deviate from the security procedure?
Urban Rail Transit
, 3
(4)
pp. 192-202.
10.1007/s40864-017-0050-8.
|
Yuryna Connolly, Lena;
Borrion, Herve;
(2022)
Reducing Ransomware Crime: Analysis of Victims' Payment Decisions.
Computers & Security
, 119
, Article 102760. 10.1016/j.cose.2022.102760.
|
Book chapter
Borrion, H;
(2018)
Engineering.
In: Wortley, R and Sidebottom, A and Tilley, N and Laycock, G, (eds.)
Routledge Handbook of Crime Science.
Routledge: London, UK.
|
Borrion, H;
Bordeanu, O;
Toubaline, S;
(2019)
Simulation of dependencies between armed response vehicles and CPTED measures in counter-terrorism resource allocation: Strengthening the Links with Crime Science.
In: Armitage, R and Ekblom, P, (eds.)
Rebuilding Crime Prevention Through Environmental Design Strengthening the Links with Crime Science.
Routledge: London, UK.
|
|
Borrion, H;
Koch, D;
(2018)
Architecture.
In: Wortley, R and Sidebottom, A and Tilley, N and Laycock, G, (eds.)
Routledge Handbook of Crime Science.
Routledge: London, UK.
|
Solymosi, R;
Borrion, H;
Fujiyama, T;
(2015)
Crowd Spatial Patterns at Bus Stops: Security Implications and Effects of Warning Messages.
In: Newton, A and Ceccato, V, (eds.)
Safety and Security in Transit Environments: An Interdisciplinary Approach.
(pp. 156-178).
Palgrave Macmillan: London, UK.
|
Proceedings paper
Becker, I;
Posner, R;
Islam, T;
Ekblom, P;
Borrion, H;
McGuire, M;
Li, S;
(2021)
Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation.
In:
Proceedings of the 54th Hawaii International Conference on System Sciences.
(pp. pp. 5347-5356).
Shidler College of Business, University of Hawaii at Manoa: Honolulu, HI, USA.
|
Borrion, H;
Dehghanniri, H;
Li, Y;
(2017)
Comparative Analysis of Crime Scripts: One CCTV Footage—Twenty-One Scripts.
In:
Proceedings of the 2017 European Intelligence and Security Informatics Conference (EISIC).
(pp. pp. 115-122).
IEEE Computer Society: Athens, Greece.
|
Borrion, H;
Yuryna Connolly, L;
(2020)
Your Money or Your Business: Decision-Making Processes in Ransomware Attacks.
In:
Proceedings of the Forty-First International Conference on Information Systems 2020.
Association for Information Systems: Virtual.
(In press).
|
Connolly, Lena;
Borrion, Hervé;
Arief, Budi;
Kaddoura, Sanna;
(2023)
Applying Neutralisation Theory to Better Understand Ransomware Offenders.
In:
Proceedings of the 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
(pp. pp. 177-182).
IEEE: Delft, Netherlands.
|
Dehghanniri, H;
Borrion, H;
(2017)
Toward a More Structured Crime Scripting Method.
In: Liu, L and Wnuk, K, (eds.)
2016 IEEE 24th International Requirements Engineering Conference Workshops.
(pp. pp. 94-97).
IEEE
|
Dehghanniri, H;
Letier, E;
Borrion, H;
(2015)
Improving Security Decision under Uncertainty: A Multidisciplinary Approach.
In: Onwubiko, C, (ed.)
(Proceedings) International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA).
(pp. pp. 1-7).
IEEE: London, UK.
|
Islam, T;
Becker, I;
Posner, R;
Ekblom, P;
McGuire, M;
Borrion, H;
Li, S;
(2019)
A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems.
In: Wang, G and Bhuiyan, M and De Capitani, di Vimercati S and Ren Y, Y, (eds.)
Communications in Computer and Information Science.
Springer: Singapore.
|
Wang, Yichao;
Roscoe, Sophia;
Arief, Budi;
Connolly, Lena;
Borrion, Herve;
Kaddoura, Sanaa;
(2023)
The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities.
In:
International Symposium on Security and Privacy in Social Networks and Big Data SocialSec 2023: Security and Privacy in Social Networks and Big Data.
(pp. pp. 149-163).
Springer Nature
|
Conference item
Thornton, A;
Borrion, H;
(2018)
The Design of a Professional Practice Module for Security and Crime Science.
Presented at: ISEE 2018: The 7th International Symposium of Engineering Education, London, UK.
|
Thesis
Ashby, MPJ;
(2016)
Using crime science for understanding and preventing theft of metal from the British railway network.
Doctoral thesis , UCL (University College London).
|