Plastic card crime

Book chapter


Bryant, R. and Stephens, P. 2008. Plastic card crime. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 133-151
AuthorsBryant, R. and Stephens, P.
EditorsBryant, R.
Page range133-151
Year2008
Book titleInvestigating Digital Crime
PublisherWiley
Output statusPublished
Place of publicationChichester
ISBN9780470516003
Publication dates
Print2008
Publication process dates
Deposited17 Mar 2011
Permalink -

https://repository.canterbury.ac.uk/item/851v7/plastic-card-crime

  • 121
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

Digital policing
Stephens, P. and Bradbury, P. 2024. Digital policing. in: Wood, D., Dickens, T., Bradshaw, S., Parker-McLeod, J. and Davis, C. (ed.) Blackstone's Handbook for Policing Students 2024 Oxford Oxford University Press. pp. 280-293
Neighbourhood policing in the Metropolitan Police Service – 8 April 2022
Bryant, R., Blackburn, B., Arditti, R. and Lewis, H. 2023. Neighbourhood policing in the Metropolitan Police Service – 8 April 2022. Canterbury Centre for Policing Research.
Blackstone's handbook for policing students 2023
Graca, S., Bryant, R., Lawton-Barrett, K., Gilbert, P., Hooper, G., Jones, N., Blackburn, B., McCormack, T., Mitchell, S., Nunn, J., O'Neill, M. and Owens, J. 2022. Blackstone's handbook for policing students 2023. Oxford Oxford University Press.
Is the digital forensic tool user interface broken?
Werb, D. and Stephens, P. 2022. Is the digital forensic tool user interface broken?
Cybercrime
Stephens, P. and Brady, E. 2022. Cybercrime. in: Wood, D., Bradshaw, S., Dickens, T., Parker-McLeod, J., Simpson, F. and Weaver, G. (ed.) Blackstone's Handbook for Policing Students 2023 Oxford University Press.
The future of policing cybercrime: Reflections on the Strategic Review of Policing in England and Wales
Stephens, P. 2022. The future of policing cybercrime: Reflections on the Strategic Review of Policing in England and Wales .
Blackstone's handbook for policing students 2021
Graca, S., Bryant, R., Lawton-Barrett, K., Gilbert, P., Hooper, G., Jones, N., Blackburn, B., McCormack, T., Mitchell, S., Nunn, J., O'Neill, M. and Owens, J. Bryant, S. and Bryant, R. (ed.) 2020. Blackstone's handbook for policing students 2021. Oxford Oxford University Press.
Project 7708 understanding heritage crime in Kent and Medway – a data analytical approach
Bryant, R., Kent, A. and Hills, J. 2020. Project 7708 understanding heritage crime in Kent and Medway – a data analytical approach.
Preventing and countering CSE in SE Kent school-based peer mentorship schemes
Bryant, R., Christie, S., Heaton, R., Ozcakir Mozova, K. and Ms Becky Thomson 2020. Preventing and countering CSE in SE Kent school-based peer mentorship schemes.
Analysis of the ‘Open Source Internet Research Tool’: a usage perspective from UK law enforcement
Williams, J. and Stephens, P. 2020. Analysis of the ‘Open Source Internet Research Tool’: a usage perspective from UK law enforcement. in: Clarke, N. and Furnell, S. (ed.) Human Aspects of Information Security and Assurance 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings Springer.
Preventing digital crime
Bennett, D. and Stephens, P. 2016. Preventing digital crime. in: Bryant, R. (ed.) Policing Digital Crime New York Routledge. pp. 63-82
Blackstone's handbook for policing students 2020
Graca, S., Bryant, R., Lawton-Barrett, K., Gilbert, P., Hooper, G., Jones, N., Blackburn, B., McCormack, T., Mitchell, S., Nunn, J., O'Neill, M. and Owens, J. Bryant, S. and Bryant, R. (ed.) 2019. Blackstone's handbook for policing students 2020. Oxford Oxford University Press.
Just a nudge
Bryant, R. and Heaton, R. 2019. Just a nudge.
Commentary - guns and psychiatry: what psychiatrists need to know
Bryant, R. 2019. Commentary - guns and psychiatry: what psychiatrists need to know. BJPsych Advances. https://doi.org/BJPsychAdv-19-0039
Assessing the threat posed by registered firearms dealers in the UK
Bryant, R., Arditti, R. and Gustafson, K. 2019. Assessing the threat posed by registered firearms dealers in the UK. Policing: A Journal of Policy and Practice. https://doi.org/10.1093/police/paz031
The effectiveness of policing cybercrime
Stephens, P. 2018. The effectiveness of policing cybercrime.
‘A wicked problem’? risk assessment and decision-making when licensing possession and use of firearms in Greater London
Bryant, R. and Arditti, R. 2018. ‘A wicked problem’? risk assessment and decision-making when licensing possession and use of firearms in Greater London. The Police Journal. 0 (0). https://doi.org/10.1177/0032258X18797992
The matrix reloaded? why we should improve the MPS ‘gang violence matrix’, not dismantle it
Bryant, R. 2018. The matrix reloaded? why we should improve the MPS ‘gang violence matrix’, not dismantle it. Police Professional.
Operational risk, omissions and liability in policing
Heaton, R., Bryant, R. and Tong, S. 2018. Operational risk, omissions and liability in policing. The Police Journal.
Blackstone's handbook for policing students 2018
Graca, S., Bryant, R., Lawton-Barrett, K., Gilbert, P., Hooper, G., Jones, N., Blackburn, B., McCormack, T., Mitchell, S., Nunn, J., O'Neill, M. and Owens, J. Bryant, S. and Bryant, R. (ed.) 2017. Blackstone's handbook for policing students 2018. Oxford Oxford University Press.
Researching professional development
Wood, D. and Bryant, R. 2015. Researching professional development. in: Brunger, M., Tong, S. and Martin, D. (ed.) Introduction to policing research. Taking lessons from practice. London Routledge. pp. 87-99
Risk management in relation to firearms licensing
Bryant, R., Blackburn, B., Hewitt, M. and Falade, M. 2016. Risk management in relation to firearms licensing.
Application of problem based learning – Cybersecurity
Irons, A., Lallie, H., Thomas, P. and Stephens, P. 2017. Application of problem based learning – Cybersecurity.
Evaluation of the MPS Predictive Policing Trial (redacted)
Bryant, R., Azhar, H., Blackburn, B. and Falade, M. 2015. Evaluation of the MPS Predictive Policing Trial (redacted).
Protecting the protectors
Bryant, R. and Leonard, V. 2016. Protecting the protectors. Police Professional.
Mediating serious crime: an analysis of victim and prisoner mediation
Tong, S., Waters, B., Bryant, R., Williams, E. and Norman, J. 2017. Mediating serious crime: an analysis of victim and prisoner mediation.
The importance of context and cognitive agency in developing police knowledge: going beyond the police science discourse
Wood, D., Cockcroft, T., Tong, S. and Bryant, R. 2017. The importance of context and cognitive agency in developing police knowledge: going beyond the police science discourse. The Police Journal. https://doi.org/10.1177/0032258X17696101
Problem-based learning in cybersecurity at CCCU
Stephens, P. 2016. Problem-based learning in cybersecurity at CCCU.
The impact of dispersal powers on congregating youth
Bryant, R., Cockcroft, T. and Keval, H. 2016. The impact of dispersal powers on congregating youth. Safer Communities. 15 (4). https://doi.org/10.1108/SC-11-2015-0038
OSIRT: a tool for law enforcement research and investigation
Williams, J. and Stephens, P. 2015. OSIRT: a tool for law enforcement research and investigation.
Child homicide: generating victim and suspect risk profiles
Roach, J. and Bryant, R. 2015. Child homicide: generating victim and suspect risk profiles. Journal of Criminal Psychology. 5 (3), pp. 201-215. https://doi.org/10.1108/JCP-04-2015-0013
Open source Internet research tool
Williams, J. and Stephens, P. 2015. Open source Internet research tool.
Resourcing computer forensics courses
Stephens, P. and Humphries, G. 2014. Resourcing computer forensics courses.
Mediating serious crime: an analysis of adult prison restorative justice mediation
Bryant, R., Tong, S., Waters, B., Williams, E. and Norman, J. 2014. Mediating serious crime: an analysis of adult prison restorative justice mediation. London Nuffield Foundation.
Policing digital crime
Bryant, R., Bryant, R., Bennett, D., Day, E., Kennedy, I. and Stephens, P. Bryant, R. and Bryant, R. (ed.) 2014. Policing digital crime. Farnham Ashgate.
Quantifying the problem of live data forensics
Stephens, P. and Quay-Ross, A. 2013. Quantifying the problem of live data forensics.
Cutting the costs of cybercrime forensics training without cutting corners
Stephens, P. 2013. Cutting the costs of cybercrime forensics training without cutting corners.
Police training and education: past, present and future
Bryant, R., Cockcroft, T., Tong, S. and Wood, D. 2013. Police training and education: past, present and future. in: Brown, J. (ed.) The Future of Policing London Routledge.
Submission to the Home Affairs Committee inquiry into leadership and standards in the police. (Written evidence.)
Bryant, R., Tong, S. and Wood, D. 2012. Submission to the Home Affairs Committee inquiry into leadership and standards in the police. (Written evidence.). London Home Office.
ASC 547 higher education and policing. Report submitted to the Higher Education Academy Social Sciences Cluster
Bryant, R., Bryant, S., Tong, S. and Wood, D. 2012. ASC 547 higher education and policing. Report submitted to the Higher Education Academy Social Sciences Cluster. Higher Education Academy.
An evaluation of Linux Cybercrime Forensics courses for European law enforcement
Stephens, P. 2012. An evaluation of Linux Cybercrime Forensics courses for European law enforcement. in: Clarke, N. and Furnell, S. (ed.) Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012) Plymouth University. pp. 119-128
Employability from computer forensics programmes
Irons, A. and Stephens, P. 2011. Employability from computer forensics programmes.
The challenges of live data forensics
Stephens, P. and Irons, A. 2011. The challenges of live data forensics.
What is the best approach for providing Cybercrime Education for Law Enforcement (LE)?
Stephens, P. 2011. What is the best approach for providing Cybercrime Education for Law Enforcement (LE)?
Toward a theory of intelligence
Bryant, R. 2008. Toward a theory of intelligence.
What can a computer forensics examiner learn from an ethical hacker?
Stephens, P. and Stock, G. 2008. What can a computer forensics examiner learn from an ethical hacker?
Why should we be teaching Linux forensics?
Stephens, P. 2008. Why should we be teaching Linux forensics?
An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl
Stephens, P. and Childs, D. 2008. An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl.
Group-based assignments in computing courses
Stephens, P. and Stock, G. 2008. Group-based assignments in computing courses.
A usability analysis of autopsy forensic browser
Bennett, D. and Stephens, P. 2008. A usability analysis of autopsy forensic browser.
Dealing with contract cheating: policies and procedures
Stephens, P. and Edgar-Nevill, D. 2008. Dealing with contract cheating: policies and procedures.
Interim report: An evaluation of adult prison RJ (Restorative Justice) mediation
Bryant, R., O'Mahoney, J., Waters, B. and Tong, S. 2009. Interim report: An evaluation of adult prison RJ (Restorative Justice) mediation. Canterbury, Kent, UK Canterbury Christ Church University.
An evaluation of the Broadstairs dispersal area
Bryant, R. and Cockcroft, T. 2009. An evaluation of the Broadstairs dispersal area. Thanet District Council.
Restorative justice in prisons
Bryant, R. 2009. Restorative justice in prisons.
Teaching European law enforcement forensic scripting using bash
Stephens, P. 2009. Teaching European law enforcement forensic scripting using bash.
Teaching ''Linux as a Forensic Tool'' (Online) to European Law Enforcement
Stephens, P. 2009. Teaching ''Linux as a Forensic Tool'' (Online) to European Law Enforcement.
Teaching and training in post-compulsory education
Armitage, A., Bryant, R., Dunnill, R., Hammersley, A., Hayes, D., Hudson, A. and Lawes, S. 1998. Teaching and training in post-compulsory education. Buckingham; Philadelphia Open University Press.
Cybercrime training versus computer forensics education
Stephens, P. 2007. Cybercrime training versus computer forensics education.
Cybercrime investigation training and specialist education for the European Union
Stephens, P. and Induruwa, A. 2007. Cybercrime investigation training and specialist education for the European Union.
Developing cybercrime forensics: the growing pains of a new discipline
Edgar-Nevill, D. and Stephens, P. 2007. Developing cybercrime forensics: the growing pains of a new discipline.
Teaching the police to program: building a simple IDE to teach shell scripting and reduce syntax errors
Stephens, P. 2010. Teaching the police to program: building a simple IDE to teach shell scripting and reduce syntax errors.
The work of the European cybercrime training and education group
Bryant, R. 2010. The work of the European cybercrime training and education group.
An analysis of conversion to UCAS 'Accepted Applicant' status of AHKM partnership school students
Apps, J., Bryant, R. and Rogers, R. 2010. An analysis of conversion to UCAS 'Accepted Applicant' status of AHKM partnership school students. Aimhigher Kent and Medway.
Resources for teaching and learning
Bryant, R. 2007. Resources for teaching and learning. in: Armitage, A., Bryant, R., Dunnill, R., Flanagan, K., Hayes, D., Hudson, A., Kent, J. and Lawes, S. (ed.) Teaching and Training in Post-Compulsory Education Maidenhead Open University Press. pp. 108-142
Validation and quality assurance of foundation degrees - a case study of a foundation degree in policing
Bryant, R. 2005. Validation and quality assurance of foundation degrees - a case study of a foundation degree in policing. Journal of Foundation Degree Forward. 5, pp. 48-53.
Developing cybercrime forensics: the growing pains of a new discipline
Stephens, P. and Edgar-Nevill, D. 2008. Developing cybercrime forensics: the growing pains of a new discipline. in: Petratos, P. and Dandapani, P. (ed.) Current Advances in Computing, Engineering and Information Athens Athens Institute for Education and Research. pp. 105-114
Understanding criminal investigation
Tong, S., Bryant, R. and Horvath, M. Tong, S., Bryant, R. and Horvarth, M. (ed.) 2009. Understanding criminal investigation. Oxford, UK Wiley-Blackwell.
Future challenges in criminal investigation
Tong, S., Bryant, R. and Horvath, M. 2009. Future challenges in criminal investigation. in: Tong, S., Bryant, R. and Horvarth, M. (ed.) Understanding Criminal Investigation Oxford, UK Wiley-Blackwell. pp. 217-222
Criminal investigation in context
Tong, S., Bryant, R. and Horvath, M. 2009. Criminal investigation in context. in: Tong, S., Bryant, R. and Horvarth, M. (ed.) Understanding Criminal Investigation Oxford, UK Wiley-Blackwell. pp. 171-196
Forms of reasoning and the analysis of intelligence
Bryant, R. 2009. Forms of reasoning and the analysis of intelligence. in: Tong, S., Bryant, R. and Horvarth, M. (ed.) Understanding Criminal Investigation Oxford, UK Wiley-Blackwell. pp. 35-68
Theories of criminal investigation
Bryant, R. 2009. Theories of criminal investigation. in: Tong, S., Bryant, R. and Horvarth, M. (ed.) Understanding Criminal Investigation Oxford, UK Wiley-Blackwell. pp. 13-34
The future of forensic computing: challenges, techniques and tools
Stephens, P. 2008. The future of forensic computing: challenges, techniques and tools. in: Petratos, P. and Marcoulides, G. (ed.) Recent Advances in Computing and Management Information Systems Athens Athens Institute for Education and Research. pp. 55-62
Identity and identity theft
Marshall, A. and Stephens, P. 2008. Identity and identity theft. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 179-193
Digitalisation and crime
Bryant, R. and Stephens, P. 2008. Digitalisation and crime. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 211-230
Encryption
O'Reilly, D. and Stephens, P. 2008. Encryption. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 97-120
IPR and technological protection measures
Stephens, P. 2008. IPR and technological protection measures. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 121-131
Countering cybercrime
Edgar-Nevill, D. and Stephens, P. 2008. Countering cybercrime. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 79-96
Digital investigation as a distinct discipline: a pedagogic perspective
Irons, A., Stephens, P. and Ferguson, R. 2009. Digital investigation as a distinct discipline: a pedagogic perspective. Digital Investigation. 6 (1-2), pp. 82-90. https://doi.org/10.1016/j.diin.2009.05.002
IT forensics: training or education?
Edgar-Nevill, D. and Stephens, P. 2007. IT forensics: training or education? Infosecurity. 4 (7), pp. 12-13. https://doi.org/10.1016/S1754-4548(07)70166-3
Intelligence and its application to contemporary policing
Phillips, D., Caless, B. and Bryant, R. 2007. Intelligence and its application to contemporary policing. Policing. 1 (4), pp. 438-446. https://doi.org/10.1093/police/pam060
An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl
Childs, D. and Stephens, P. 2009. An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl. International Journal of Electronic Security and Digital Forensics. 2 (2), pp. 182-198. https://doi.org/10.1504/IJESDF.2009.024902
A cognitive walkthrough of Autopsy Forensic Browser
Bennett, D. and Stephens, P. 2009. A cognitive walkthrough of Autopsy Forensic Browser. Information Management & Computer Security. 17 (1), pp. 20-29. https://doi.org/10.1108/09685220910944731
Foundations of the theory of maps on surfaces with boundary
Bryant, R. and Singerman, D. 1985. Foundations of the theory of maps on surfaces with boundary. The Quarterly Journal of Mathematics. 36 (1), pp. 17-41. https://doi.org/10.1093/qmath/36.1.17