Affi, Ladan, Afyare A. Elmi, W. Andy Knight, and Said Mohamed. 2016. ‘Countering Piracy through Private Security in the Horn of Africa: Prospects and Pitfalls’. Third World Quarterly 37(5):934–50. doi: 10.1080/01436597.2015.1114882.
Akhgar, Babak, Benjamin Rearick, Priya Kumaraguruparan, and Mark Rogers. 2014. Cyber Crime and Cyber Terrorism Investigator’s Handbook. edited by B. Akhgar, A. Staniforth, F. M. Bosco, and S. Elliot. Waltham, Massachusetts: Elsevier.
Andrea. Finney. 2004. Violence in the Night-Time Economy : Key Findings in the Research. London: Home Office.
Andress, Jason, Steve Winterfeld, and Russ Rogers. 2011. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Waltham, Mass: Syngress.
Anon. 2007. ‘International Journal of Cyber Criminology.’
Anon. 2016a. ‘The 21st Century DarkNet Market: Lessons from the Fall of Silk Road.’ International Journal of Cyber Criminology.
Anon. 2016b. ‘Where Do Beliefs about Music Piracy Come from and How Are They Shared? An E...’ International Journal of Cyber Criminology.
Anon. 2017. ‘Hackers’ Motivations: Testing Schwartz’s Theory of Motivational Types of Va...’ International Journal of Cyber Criminology.
Anon. n.d.-a. ‘CHAIRMAN JOHNSON OPENING STATEMENT: “PREVENTING DRUG TRAFFICKING THROUGH INTERNATIONAL MAIL”’. States News Service.
Anon. n.d.-b. ‘Crime Risk Assessment/Crime Impact Assessment’.
Anon. n.d.-c. ‘Preventing Human Trafficking by Empowering Aircraft Cabin Crew’. Premium Official News.
Anon. n.d.-d. ‘Public Disorder and Business Crime Victimization in the Retail Sector’.
Anon. n.d.-e. ‘The Case for Private Prisons’.
Anon. n.d.-f. ‘The Dark Truth about Blackwater’. Retrieved (https://www.brookings.edu/articles/the-dark-truth-about-blackwater/).
Anon. n.d.-g. ‘Volume 26, Issue 3, July 2013’. Volume 26, Issue 3, July 2013.
ASIS Foundation. 1989. ‘Security Journal.’
Atkinson, Dr Rowland, Rowland Atkinson, Gesa Helms, and University of Glasgow. Dept. of Urban Studies. 2007. Securing an Urban Renaissance: Crime, Community, and British Urban Policy. Brisol, U.K.: Policy Press.
Awan, Imran, and Brian Blakemore. 2012. Policing Cyber Hate, Cyber Threats and Cyber Terrorism. Farnham: Ashgate.
Bamfield, Joshua. 2012. Shopping and Crime. Basingstoke: Palgrave Macmillan.
Beare, Margaret E. 2012. Encyclopedia of Transnational Crime and Justice. Thousand Oaks, Calif: SAGE Publications.
Beck, Adrian. 2017. ‘Moving beyond Shrinkage: Developing a Definition and Typology of Total Retail Loss’.
Beck, Adrian, and Matt Hopkins. 2017. ‘Scan and Rob! Convenience Shopping, Crime Opportunity and Corporate Social Responsibility in a Mobile World’. Security Journal 30(4):1080–96. doi: 10.1057/sj.2016.6.
Beck, Adrian, and Andrew Willis. 1995. Crime and Security: Managing the Risk to Safe Shopping. Leicester: Perpetuity Press.
Beck, Ulrich. 1999. World Risk Society. Malden, Mass: Polity Press.
Beck, Ulrich. 2006. ‘Living in the World Risk Society’. Economy and Society 35(3):329–45. doi: 10.1080/03085140600844902.
Blake H. Liventin. 2011. Organized Retail Crime. New York: Nova Science Publishers.
Brands, Jelle. n.d. ‘Safety, Surveillance and Policing in the Night-Time Economy: (Re)Turning to Numbers’. Geoforum 62.
Brands, Jelle, Tim Schwanen, and Irina van Aalst. 2015. ‘Fear of Crime and Affective Ambiguities in the Night-Time Economy’. Urban Studies 52(3):439–55. doi: 10.1177/0042098013505652.
Brands, Jelle, Tim Schwanen, and Irina van Aalst. 2016. ‘What Are You Looking at? Visitors’ Perspectives on CCTV in the Night-Time Economy’. European Urban and Regional Studies 23(1):23–39. doi: 10.1177/0969776413481369.
Bridgeman, Cressida and Great Britain. Police Research Group. 1996. Crime Risk Management: Making It Work. Vol. no.70. London: Home Office Police Research Group.
Brodeur, Jean‐Paul. 2010. ‘Private Security’. Pp. 255–308 in The policing web. Oxford: Oxford University Press.
Burnett, Jon. 2011. ‘UK: Racial Violence and the Night-Time Economy’. Race & Class 53(1):100–106. doi: 10.1177/0306396811406790.
Button, Mark, and Peter Stiernstedt. 2018. ‘Comparing Private Security Regulation in the European Union’. Policing and Society 28(4):398–414. doi: 10.1080/10439463.2016.1161624.
Campbell, Scott, and Greg Currie. 2006. ‘Against Beck’. Philosophy of the Social Sciences 36(2):149–72. doi: 10.1177/0048393106287209.
Carrapico, Helena, and André Barrinha. 2017. ‘The EU as a Coherent (Cyber)Security Actor?’ JCMS: Journal of Common Market Studies 55(6):1254–72. doi: 10.1111/jcms.12575.
Chen, Jie, Lefa Teng, and Yonghai Liao. 2018. ‘Counterfeit Luxuries: Does Moral Reasoning Strategy Influence Consumers’ Pursuit of Counterfeits?’ Journal of Business Ethics 151(1):249–64. doi: 10.1007/s10551-016-3255-y.
Clarke, Ronald V. G. 1997. Situational Crime Prevention: Successful Case Studies. 2nd ed. Monsey, N.Y.: Criminal Justice Press.
Cozens, Paul, and Terence Love. 2015. ‘A Review and Current Status of Crime Prevention through Environmental Design (CPTED)’. Journal of Planning Literature 30(4):393–412. doi: 10.1177/0885412215595440.
Creese, Sadie. 2015. Cyber Warfare: A Multidisciplinary Analysis. London, [England]: Routledge.
Edwards, Adam, Adam Edwards, and Peter Gill. 2003. Transnational Organised Crime: Perspectives on Global Security. London: Routledge.
Edwards, Lilian, and Lachlan Urquhart. 2016. ‘Privacy in Public Spaces: What Expectations of Privacy Do We Have in Social Media Intelligence?’ International Journal of Law and Information Technology 24(3):279–310. doi: 10.1093/ijlit/eaw007.
Ekblom, Paul and Great Britain. Home Office. Crime Prevention Unit. 1986. The Prevention of Shop Theft: An Approach through Crime Analysis. Vol. no.5. London: Home Office.
Ekblom, Paul, and Aiden Sidebottom. 2007. ‘What Do You Mean, “Is It Secure?” Redesigning Language to Be Fit for the Task of Assessing the Security of Domestic and Personal Electronic Goods’. European Journal on Criminal Policy and Research 14(1):61–87. doi: 10.1007/s10610-007-9041-8.
Farrimond, Hannah, Katharine Boyd, and Dreolin Fleischer. 2018. ‘Reconfiguring the Violent Encounter? Preloading, Security Staff and Breathalyser Use in the Night-Time Economy’. International Journal of Drug Policy 56:108–15. doi: 10.1016/j.drugpo.2018.03.008.
Gant, Robert, and Philip Terry. 2017. ‘Narrative of the Night-out: Student Engagement in the Night-Time Economy of Kingston upon Thames’. Local Economy: The Journal of the Local Economy Policy Unit 32(5):467–81. doi: 10.1177/0269094217722336.
Garmany, Jeff, and Ana Paula Galdeano. 2018. ‘Crime, Insecurity and Corruption: Considering the Growth of Urban Private Security’. Urban Studies 55(5):1111–20. doi: 10.1177/0042098017732691.
Gill, M. L. 1994. Crime at Work: Studies in Security and Crime Prevention, Vol.1. Leicester: Perpetuity Press.
Gill, M. L. 1998. Crime at Work: Increasing the Risk for Offenders, Vol.2. Leicester: Perpetuity Press.
Gunby, Clare. 2016. ‘Location, Libation and Leisure: An Examination of the Use of Licensed Venues to Help Challenge Sexual Violence’.
Guthrie, John, John Guthrie, and Sarah Todd. 2006. Retail Crime and Loss Prevention. Vol. 34, no. 11. Bradford, England: Emerald Group Publishing.
Hadfield, Phil, and Fiona Measham. 2015. ‘The Outsourcing of Control: Alcohol Law Enforcement, Private-Sector Governance and the Evening and Night-Time Economy’. Urban Studies 52(3):517–37. doi: 10.1177/0042098014554540.
Higate, Paul. 2012. ‘“Cowboys and Professionals”: The Politics of Identity Work in the Private and Military Security Company’. Millennium: Journal of International Studies 40(2):321–41. doi: 10.1177/0305829811425752.
Hobbs, Dick. n.d. Bouncers : Violence and Governance in the Night-Time Economy.
Hua, Jian, and Sanjay Bapna. 2012. ‘How Can We Deter Cyber Terrorism?’ Information Security Journal: A Global Perspective 21(2):102–14. doi: 10.1080/19393555.2011.647250.
Jacques, Scott, Richard Rosenfeld, Richard Wright, and Frank van Gemert. 2016. ‘Effects of Prohibition and Decriminalization on Drug Market Conflict’. Criminology & Public Policy 15(3):843–75. doi: 10.1111/1745-9133.12218.
Jansen, Jurjen1 j.jansen@nhl.nlLeukfeldt, Rutger1 E.R.Leukfeldt@nhl.nl. 2016. ‘Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization.’ International Journal of Cyber Criminology 10(Issue 1):79–91. doi: 10.5281/zenodo.58523.
Kennedy, Jay P. 2016. ‘Shedding Light on Employee Theft’s Dark Figure: A Typology of Employee Theft Nonreporting Rationalizations’. Organization Management Journal 13(1):49–60. doi: 10.1080/15416518.2015.1110513.
Lavorgna, Anita1 A.Lavorgna@soton.ac.ukSergi, Anna2 asergi@essex.ac.uk. 2016. ‘Serious, Therefore Organised? A Critique of the Emerging “Cyber-Organised Crime” Rhetoric in the United Kingdom.’ International Journal of Cyber Criminology 10(Issue 2):170–87. doi: 10.5281/zenodo.163400.
Martin Gill. 2016. The Handbook of Security. Second. Palgrave Macmillan Limited.
Miller, Kevin. n.d. ‘Total Surveillance, Big Data, and Predictive Crime Technology: Privacy’s Perfect Storm’. Journal of Technology Law & Policy 19(1).
Nemeth, Charles P. 2012. Private Security and the Law. 4th ed. Amsterdam: Elsevier Butterworth Heinemann.
Norris, Clive, and Dean Wilson. 2006. Surveillance, Crime, and Social Control. Aldershot: Ashgate.
O’Brien, Kate, Dick Hobbs, and Louise Westmarland. 2008. ‘Negotiating Violence and Gender: Security and the Night Time Economy in the UK’. Pp. 161–73 in Violence in Europe: historical and contemporary perspectives. New York: Springer.
O’Malley, Pat. 2010a. Crime and Risk. London: Sage.
O’Malley, Pat. 2010b. Crime and Risk. London: Sage.
Palmer, Darren, Ian Warren, and Peter Miller. 2010. ‘ID Scanners in the Night Time Economy’. Pp. 234–41 in 2010 IEEE International Symposium on Technology and Society. IEEE.
Pease, Ken, and Graham Farrell. 2014. ‘What Have Criminologists Done for Us Lately?’ Pp. 65–88 in The Handbook of Security, edited by M. L. Gill. London: Palgrave Macmillan UK.
Pennay, Amy, Elizabeth Manton, and Michael Savic. 2014. ‘Geographies of Exclusion: Street Drinking, Gentrification and Contests over Public Space’. International Journal of Drug Policy 25(6):1084–93. doi: 10.1016/j.drugpo.2014.06.001.
Perry, Marianna. 2012. ‘Designing Crime Risk Management Systems’. Pp. 49–56 in Handbook of Loss Prevention and Crime Prevention. Elsevier.
Perry, Marianna. n.d. ‘Proactive vs. Reactive Security: Performing a Risk Assessment Ensures a Proactive Approach to Crime and Loss Prevention.(Safety&Security)’. Buildings 104(3).
Raymen, Thomas. 2016. ‘Designing-in Crime by Designing-out the Social? Situational Crime Prevention and the Intensification of Harmful Subjectivities’. British Journal of Criminology 56(3):497–514. doi: 10.1093/bjc/azv069.
Rosenzweig, Paul. n.d. ‘Privacy and Counter-Terrorism: The Pervasiveness of Data.(Somebody’s Watching Me: Surveillance and Privacy in an Age of National Insecurity)’. Case Western Reserve Journal of International Law 42(3).
Shakarian, Paulo, Jana Shakarian, and Andrew Ruef. 2013a. Introduction to Cyber-Warfare: A Multidisciplinary Approach. Amsterdam [Netherlands]: Morgan Kaufmann Publishers, an imprint of Elsevier.
Shakarian, Paulo, Jana Shakarian, and Andrew Ruef. 2013b. Introduction to Cyber-Warfare: A Multidisciplinary Approach. Amsterdam [Netherlands]: Morgan Kaufmann Publishers, an imprint of Elsevier.
Sheard, Laura. 2011. ‘“Anything Could Have Happened”: Women, the Night-Time Economy, Alcohol and Drink Spiking’. Sociology 45(4):619–33. doi: 10.1177/0038038511406596.
Slomski, Anita. 2014. ‘Three Bills to Prevent Sex Trafficking’. JAMA 311(22). doi: 10.1001/jama.2014.6831.
Smith, Frank, and Graham Ingram. 2017. ‘Organising Cyber Security in Australia and Beyond’. Australian Journal of International Affairs 71(6):642–60. doi: 10.1080/10357718.2017.1320972.
SpringerLink (Online service). 2014a. The Handbook of Security. 2nd Edition. edited by M. L. Gill. London: Palgrave Macmillan UK.
SpringerLink (Online service). 2014b. The Handbook of Security. 2nd Edition. edited by M. L. Gill. London: Palgrave Macmillan UK.
van Steden, Ronald. 2018. ‘Street Pastors: On Security, Care and Faith in the British Night-Time Economy’. European Journal of Criminology 15(4):403–20. doi: 10.1177/1477370817747499.
Sullivan, John P. 2014. ‘Transnational Crime’. Pp. 160–74 in The handbook of global security policy, edited by M. Kaldor and I. Rangelov. Chichester, England: Wiley-Blackwell.
Talbot, Deborah. 2007. Regulating the Night: Race, Culture and Exclusion in the Making of the Night-Time Economy. Aldershot: Ashgate.
Tanner, Samuel1Mulone, Massimiliano1. 2013. ‘Private Security and Armed Conflict A Case Study of the Scorpions during the Mass Killings in Former Yugoslavia.’ British Journal of Criminology 53(Issue 1):41–58.
Trim, Peter R. J., and David Upton. 2013. Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and Training. Farnham, England: Gower.
Tseloni, Andromachi, Rebecca Thompson, Louise Grove, Nick Tilley, and Graham Farrell. 2017. ‘The Effectiveness of Burglary Security Devices’. Security Journal 30(2):646–64. doi: 10.1057/sj.2014.30.
United Nations Office on Drugs and Crime. 2009. Current Practices in Electronic Surveillance in the Investigation of Serious and Organised Crime. New York: United Nations.
Van de Bunt, Henk, Cathelijne van der Schoot, and Wetenschappelijk Onderzoek- en Documentatiecentrum. 2003. Prevention of Organised Crime: A Situational Approach. Vol. 215. [Den Haag]: Boom Juridische uitgevers.
Vellani, Karim. 2006. ‘Chapter 6 Risk Assessments’. Pp. 109–32 in Strategic Security Management. Butterworth-Heinemann.
Ventre, Daniel, and Daniel Ventre. 2012. Cyber Conflict: Competing National Perspectives. London: Iste.
Wadds, Phillip. n.d. ‘Crime, Policing and (in)Security: Press Depictions of Sydney’s Night-Time Economy’. Current Issues in Criminal Justice 27(1):95–112.
Wall, David. 2003. Crime and the Internet. Routledge.
Welsh, Brandon C., Mark E. Mudge, and David P. Farrington. 2010. ‘Reconceptualizing Public Area Surveillance and Crime Prevention: Security Guards, Place Managers and Defensible Space’. Security Journal 23(4):299–319. doi: 10.1057/sj.2008.22.
Wilson, J. R. 2015. ‘Cyber Security Expands to Meet Demands.’ Military & Aerospace Electronics 26(Issue 12):5–11.
Winterfeld, Steve, and Jason Andress. 2013. The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice. Boston: Syngress.
Wright, Alan. 2013. Organised Crime: Concepts, Cases, Controls. 1st ed. Uffculme: Taylor and Francis.
Wylie, Gillian, and Penny McRedmond. 2010. Human Trafficking in Europe: Character, Causes and Consequences. New York: Palgrave Macmillan.
Zedner, Lucia. 2009a. Security. 1st ed. Florence: Taylor and Francis.
Zedner, Lucia. 2009b. Security. 1st ed. Florence: Taylor and Francis.
Zedner, Lucia. n.d. ‘Neither Safe Nor Sound? The Perils and Possibilities of Risk’. Canadian Journal of Criminology and Criminal Justice 48(3):423–34.