Dr Paul Stephens


NameDr Paul Stephens
Job titlePrincipal Lecturer in Cybercrime and Digital Policing & School Director of Academic Studies
Research instituteSchool of Law, Policing and Social Sciences

Research outputs

Digital policing

Stephens, P. and Bradbury, P. 2024. Digital policing. in: Wood, D., Dickens, T., Bradshaw, S., Parker-McLeod, J. and Davis, C. (ed.) Blackstone's Handbook for Policing Students 2024 Oxford Oxford University Press. pp. 280-293

Is the digital forensic tool user interface broken?

Werb, D. and Stephens, P. 2022. Is the digital forensic tool user interface broken?

The future of policing cybercrime: Reflections on the Strategic Review of Policing in England and Wales

Stephens, P. 2022. The future of policing cybercrime: Reflections on the Strategic Review of Policing in England and Wales .

Cybercrime

Stephens, P. and Brady, E. 2022. Cybercrime. in: Wood, D., Bradshaw, S., Dickens, T., Parker-McLeod, J., Simpson, F. and Weaver, G. (ed.) Blackstone's Handbook for Policing Students 2023 Oxford University Press.

Analysis of the ‘Open Source Internet Research Tool’: a usage perspective from UK law enforcement

Williams, J. and Stephens, P. 2020. Analysis of the ‘Open Source Internet Research Tool’: a usage perspective from UK law enforcement. in: Clarke, N. and Furnell, S. (ed.) Human Aspects of Information Security and Assurance 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings Springer.

The effectiveness of policing cybercrime

Stephens, P. 2018. The effectiveness of policing cybercrime.

Application of problem based learning – Cybersecurity

Irons, A., Lallie, H., Thomas, P. and Stephens, P. 2017. Application of problem based learning – Cybersecurity.

Problem-based learning in cybersecurity at CCCU

Stephens, P. 2016. Problem-based learning in cybersecurity at CCCU.

Preventing digital crime

Bennett, D. and Stephens, P. 2016. Preventing digital crime. in: Bryant, R. (ed.) Policing Digital Crime New York Routledge. pp. 63-82

OSIRT: a tool for law enforcement research and investigation

Williams, J. and Stephens, P. 2015. OSIRT: a tool for law enforcement research and investigation.

Open source Internet research tool

Williams, J. and Stephens, P. 2015. Open source Internet research tool.

Resourcing computer forensics courses

Stephens, P. and Humphries, G. 2014. Resourcing computer forensics courses.

Policing digital crime

Bryant, R., Bryant, R., Bennett, D., Day, E., Kennedy, I. and Stephens, P. Bryant, R. and Bryant, R. (ed.) 2014. Policing digital crime. Farnham Ashgate.

Quantifying the problem of live data forensics

Stephens, P. and Quay-Ross, A. 2013. Quantifying the problem of live data forensics.

Cutting the costs of cybercrime forensics training without cutting corners

Stephens, P. 2013. Cutting the costs of cybercrime forensics training without cutting corners.

An evaluation of Linux Cybercrime Forensics courses for European law enforcement

Stephens, P. 2012. An evaluation of Linux Cybercrime Forensics courses for European law enforcement. in: Clarke, N. and Furnell, S. (ed.) Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012) Plymouth University. pp. 119-128

The challenges of live data forensics

Stephens, P. and Irons, A. 2011. The challenges of live data forensics.

Employability from computer forensics programmes

Irons, A. and Stephens, P. 2011. Employability from computer forensics programmes.

What can a computer forensics examiner learn from an ethical hacker?

Stephens, P. and Stock, G. 2008. What can a computer forensics examiner learn from an ethical hacker?

Why should we be teaching Linux forensics?

Stephens, P. 2008. Why should we be teaching Linux forensics?

An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl

Stephens, P. and Childs, D. 2008. An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl.

Group-based assignments in computing courses

Stephens, P. and Stock, G. 2008. Group-based assignments in computing courses.

A usability analysis of autopsy forensic browser

Bennett, D. and Stephens, P. 2008. A usability analysis of autopsy forensic browser.

Dealing with contract cheating: policies and procedures

Stephens, P. and Edgar-Nevill, D. 2008. Dealing with contract cheating: policies and procedures.

Teaching European law enforcement forensic scripting using bash

Stephens, P. 2009. Teaching European law enforcement forensic scripting using bash.

Teaching ''Linux as a Forensic Tool'' (Online) to European Law Enforcement

Stephens, P. 2009. Teaching ''Linux as a Forensic Tool'' (Online) to European Law Enforcement.

Cybercrime training versus computer forensics education

Stephens, P. 2007. Cybercrime training versus computer forensics education.

Cybercrime investigation training and specialist education for the European Union

Stephens, P. and Induruwa, A. 2007. Cybercrime investigation training and specialist education for the European Union.

Developing cybercrime forensics: the growing pains of a new discipline

Edgar-Nevill, D. and Stephens, P. 2007. Developing cybercrime forensics: the growing pains of a new discipline.

Teaching the police to program: building a simple IDE to teach shell scripting and reduce syntax errors

Stephens, P. 2010. Teaching the police to program: building a simple IDE to teach shell scripting and reduce syntax errors.

What is the best approach for providing Cybercrime Education for Law Enforcement (LE)?

Stephens, P. 2011. What is the best approach for providing Cybercrime Education for Law Enforcement (LE)?

Digital investigation as a distinct discipline: a pedagogic perspective

Irons, A., Stephens, P. and Ferguson, R. 2009. Digital investigation as a distinct discipline: a pedagogic perspective. Digital Investigation. 6 (1-2), pp. 82-90. https://doi.org/10.1016/j.diin.2009.05.002

IT forensics: training or education?

Edgar-Nevill, D. and Stephens, P. 2007. IT forensics: training or education? Infosecurity. 4 (7), pp. 12-13. https://doi.org/10.1016/S1754-4548(07)70166-3

An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl

Childs, D. and Stephens, P. 2009. An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl. International Journal of Electronic Security and Digital Forensics. 2 (2), pp. 182-198. https://doi.org/10.1504/IJESDF.2009.024902

A cognitive walkthrough of Autopsy Forensic Browser

Bennett, D. and Stephens, P. 2009. A cognitive walkthrough of Autopsy Forensic Browser. Information Management & Computer Security. 17 (1), pp. 20-29. https://doi.org/10.1108/09685220910944731

Developing cybercrime forensics: the growing pains of a new discipline

Stephens, P. and Edgar-Nevill, D. 2008. Developing cybercrime forensics: the growing pains of a new discipline. in: Petratos, P. and Dandapani, P. (ed.) Current Advances in Computing, Engineering and Information Athens Athens Institute for Education and Research. pp. 105-114

The future of forensic computing: challenges, techniques and tools

Stephens, P. 2008. The future of forensic computing: challenges, techniques and tools. in: Petratos, P. and Marcoulides, G. (ed.) Recent Advances in Computing and Management Information Systems Athens Athens Institute for Education and Research. pp. 55-62

Plastic card crime

Bryant, R. and Stephens, P. 2008. Plastic card crime. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 133-151

Identity and identity theft

Marshall, A. and Stephens, P. 2008. Identity and identity theft. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 179-193

Digitalisation and crime

Bryant, R. and Stephens, P. 2008. Digitalisation and crime. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 211-230

Encryption

O'Reilly, D. and Stephens, P. 2008. Encryption. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 97-120

IPR and technological protection measures

Stephens, P. 2008. IPR and technological protection measures. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 121-131

Countering cybercrime

Edgar-Nevill, D. and Stephens, P. 2008. Countering cybercrime. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 79-96
  • 4174
    total views of outputs
  • 557
    total downloads of outputs
  • 35
    views of outputs this month
  • 9
    downloads of outputs this month