Affi, L., Elmi, A. A., Knight, W. A., & Mohamed, S. (2016). Countering piracy through private security in the Horn of Africa: prospects and pitfalls. Third World Quarterly, 37(5), 934–950. https://doi.org/10.1080/01436597.2015.1114882
Akhgar, B., Rearick, B., Kumaraguruparan, P., & Rogers, M. (2014). Cyber crime and cyber terrorism investigator’s handbook (B. Akhgar, A. Staniforth, F. M. Bosco, & S. Elliot, Eds.). Elsevier.
Andrea. Finney. (2004). Violence in the night-time economy : key findings in the research. Home Office. http://webarchive.nationalarchives.gov.uk/20110218135935/http:/rds.homeoffice.gov.uk/rds/pdfs04/r214.pdf
Andress, J., Winterfeld, S., & Rogers, R. (2011). Cyber warfare: techniques, tactics and tools for security practitioners. Syngress. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1463416
ASIS Foundation. (1989). Security journal. https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_ALMA51126475410002746&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&isFrbr=true&tab=default_tab&query=any,contains,the%20security%20journal&pcAvailability=false
Atkinson, D. R., Atkinson, R., Helms, G., & University of Glasgow. Dept. of Urban Studies. (2007). Securing an urban renaissance: crime, community, and British urban policy. Policy Press.
Awan, I., & Blakemore, B. (2012). Policing cyber hate, cyber threats and cyber terrorism. Ashgate.
Bamfield, J. (2012). Shopping and crime. Palgrave Macmillan. http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230393554
Beare, M. E. (2012). Encyclopedia of transnational crime and justice. SAGE Publications.
Beck, A., & Hopkins, M. (2017). Scan and rob! Convenience shopping, crime opportunity and corporate social responsibility in a mobile world. Security Journal, 30(4), 1080–1096. https://doi.org/10.1057/sj.2016.6
Beck, A., & Willis, A. (1995). Crime and security: managing the risk to safe shopping. Perpetuity Press.
Beck, Adrian. (2017). Moving beyond shrinkage: developing a definition and typology of total retail loss. https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_DSPACE2381%2F39492&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,retail%20crime&sortby=rank
Beck, U. (1999). World risk society. Polity Press.
Beck, U. (2006). Living in the world risk society. Economy and Society, 35(3), 329–345. https://doi.org/10.1080/03085140600844902
Blake H. Liventin. (2011). Organized retail crime. Nova Science Publishers. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=3018926
Brands, J., Schwanen, T., & van Aalst, I. (2015). Fear of crime and affective ambiguities in the night-time economy. Urban Studies, 52(3), 439–455. https://doi.org/10.1177/0042098013505652
Brands, J., Schwanen, T., & van Aalst, I. (2016). What are you looking at? Visitors’ perspectives on CCTV in the night-time economy. European Urban and Regional Studies, 23(1), 23–39. https://doi.org/10.1177/0969776413481369
Brands, Jelle. (n.d.). Safety, surveillance and policing in the night-time economy: (Re)turning to numbers. Geoforum, 62. https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa421286022&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,security%20and%20the%20night%20time%20economy&sortby=rank&offset=0&pcAvailability=false
Bridgeman, C. & Great Britain. Police Research Group. (1996). Crime risk management: making it work: Vol. no.70. Home Office Police Research Group.
Brodeur, J. (2010). Private Security. In The policing web (pp. 255–308). Oxford University Press. https://doi.org/10.1093/acprof:oso/9780199740598.003.0009
Burnett, J. (2011). UK: racial violence and the night-time economy. Race & Class, 53(1), 100–106. https://doi.org/10.1177/0306396811406790
Button, M., & Stiernstedt, P. (2018). Comparing private security regulation in the European Union. Policing and Society, 28(4), 398–414. https://doi.org/10.1080/10439463.2016.1161624
Campbell, S., & Currie, G. (2006). Against Beck. Philosophy of the Social Sciences, 36(2), 149–172. https://doi.org/10.1177/0048393106287209
Carrapico, H., & Barrinha, A. (2017). The EU as a Coherent (Cyber)Security Actor? JCMS: Journal of Common Market Studies, 55(6), 1254–1272. https://doi.org/10.1111/jcms.12575
CHAIRMAN JOHNSON OPENING STATEMENT: ‘PREVENTING DRUG TRAFFICKING THROUGH INTERNATIONAL MAIL’. (n.d.). States News Service. https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa449951374&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,preventing%20drug%20trafficking&sortby=rank&facet=searchcreationdate,include,2015%7C,%7C2018&offset=0&pcAvailability=false
Chen, J., Teng, L., & Liao, Y. (2018). Counterfeit Luxuries: Does Moral Reasoning Strategy Influence Consumers’ Pursuit of Counterfeits? Journal of Business Ethics, 151(1), 249–264. https://doi.org/10.1007/s10551-016-3255-y
Clarke, R. V. G. (1997). Situational crime prevention: successful case studies (2nd ed). Criminal Justice Press.
Cozens, P., & Love, T. (2015). A Review and Current Status of Crime Prevention through Environmental Design (CPTED). Journal of Planning Literature, 30(4), 393–412. https://doi.org/10.1177/0885412215595440
Creese, S. (2015). Cyber warfare: a multidisciplinary analysis. Routledge. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=2058004
Crime risk assessment/crime impact assessment. (n.d.). http://www.designagainstcrime.com/files/crimeframeworks/Crime_risk_asssement_EKBLOM.pdf
Edwards, A., Edwards, A., & Gill, P. (2003). Transnational organised crime: perspectives on global security. Routledge.
Edwards, L., & Urquhart, L. (2016). Privacy in public spaces: what expectations of privacy do we have in social media intelligence? International Journal of Law and Information Technology, 24(3), 279–310. https://doi.org/10.1093/ijlit/eaw007
Ekblom, P. & Great Britain. Home Office. Crime Prevention Unit. (1986). The prevention of shop theft: an approach through crime analysis: Vol. no.5. Home Office.
Ekblom, P., & Sidebottom, A. (2007). What Do You Mean, ‘Is It Secure?’ Redesigning Language to be Fit for the Task of Assessing the Security of Domestic and Personal Electronic Goods. European Journal on Criminal Policy and Research, 14(1), 61–87. https://doi.org/10.1007/s10610-007-9041-8
Farrimond, H., Boyd, K., & Fleischer, D. (2018). Reconfiguring the violent encounter? Preloading, security staff and breathalyser use in the night-time economy. International Journal of Drug Policy, 56, 108–115. https://doi.org/10.1016/j.drugpo.2018.03.008
Gant, R., & Terry, P. (2017). Narrative of the night-out: Student engagement in the night-time economy of Kingston upon Thames. Local Economy: The Journal of the Local Economy Policy Unit, 32(5), 467–481. https://doi.org/10.1177/0269094217722336
Garmany, J., & Galdeano, A. P. (2018). Crime, insecurity and corruption: Considering the growth of urban private security. Urban Studies, 55(5), 1111–1120. https://doi.org/10.1177/0042098017732691
Gill, M. L. (1994). Crime at work: studies in security and crime prevention, Vol.1. Perpetuity Press.
Gill, M. L. (1998). Crime at work: increasing the risk for offenders, Vol.2. Perpetuity Press.
Gunby, Clare. (2016). Location, Libation and Leisure: An examination of the use of licensed venues to help challenge sexual violence. https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_DSPACE2381%2F37256&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,night%20time%20economy&sortby=rank&pcAvailability=false
Guthrie, J., Guthrie, J., & Todd, S. (2006). Retail crime and loss prevention (Vol. 34, no. 11). Emerald Group Publishing.
Hackers’ Motivations: Testing Schwartz’s Theory of Motivational Types of Va... (2017). International Journal of Cyber Criminology. http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=122614546&site=ehost-live
Hadfield, P., & Measham, F. (2015). The outsourcing of control: Alcohol law enforcement, private-sector governance and the evening and night-time economy. Urban Studies, 52(3), 517–537. https://doi.org/10.1177/0042098014554540
Higate, P. (2012). ‘Cowboys and Professionals’: The Politics of Identity Work in the Private and Military Security Company. Millennium: Journal of International Studies, 40(2), 321–341. https://doi.org/10.1177/0305829811425752
Hobbs, D. (n.d.). Bouncers : violence and governance in the night-time economy.
Hua, J., & Bapna, S. (2012). How Can We Deter Cyber Terrorism? Information Security Journal: A Global Perspective, 21(2), 102–114. https://doi.org/10.1080/19393555.2011.647250
International journal of cyber criminology. (2007). https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_ALMA51124799820002746&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,cyber&sortby=rank
Jacques, S., Rosenfeld, R., Wright, R., & van Gemert, F. (2016). Effects of Prohibition and Decriminalization on Drug Market Conflict. Criminology & Public Policy, 15(3), 843–875. https://doi.org/10.1111/1745-9133.12218
Jansen, Jurjen1 j.jansen@nhl.nlLeukfeldt, Rutger1 E.R.Leukfeldt@nhl.nl. (2016). Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization. International Journal of Cyber Criminology, 10(Issue 1), 79–91. https://doi.org/10.5281/zenodo.58523
Kennedy, J. P. (2016). Shedding Light on Employee Theft’s Dark Figure: A Typology of Employee Theft Nonreporting Rationalizations. Organization Management Journal, 13(1), 49–60. https://doi.org/10.1080/15416518.2015.1110513
Lavorgna, Anita1 A.Lavorgna@soton.ac.ukSergi, Anna2 asergi@essex.ac.uk. (2016). Serious, therefore Organised? A Critique of the Emerging ‘Cyber-Organised Crime’ Rhetoric in the United Kingdom. International Journal of Cyber Criminology, 10(Issue 2), 170–187. https://doi.org/10.5281/zenodo.163400
Martin Gill. (2016). The Handbook of Security (Second). Palgrave Macmillan Limited. https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=4427344&ppg=351
Miller, Kevin. (n.d.). Total surveillance, big data, and predictive crime technology: privacy’s perfect storm. Journal of Technology Law & Policy, 19(1). https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_legal398036055&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,Privacy,%20surveillance,%20and%20crime%20prevention&sortby=rank&offset=0&pcAvailability=false
Nemeth, C. P. (2012). Private security and the law (4th ed). Elsevier Butterworth Heinemann.
Norris, C., & Wilson, D. (2006). Surveillance, crime, and social control. Ashgate.
O’Brien, K., Hobbs, D., & Westmarland, L. (2008). Negotiating Violence and Gender: Security and the Night Time Economy in the UK. In Violence in Europe: historical and contemporary perspectives (pp. 161–173). Springer. https://doi.org/10.1007/978-0-387-09705-3_10
O’Malley, P. (2010a). Crime and risk. Sage. http://ezproxy.lib.le.ac.uk/login?url=http://knowledge.sagepub.com/view/crime-and-risk/SAGE.xml
O’Malley, P. (2010b). Crime and risk. Sage. http://ezproxy.lib.le.ac.uk/login?url=http://knowledge.sagepub.com/view/crime-and-risk/SAGE.xml
Palmer, D., Warren, I., & Miller, P. (2010). ID scanners in the night time economy. 2010 IEEE International Symposium on Technology and Society, 234–241. https://doi.org/10.1109/ISTAS.2010.5514634
Pease, K., & Farrell, G. (2014). What Have Criminologists Done for Us Lately? In M. L. Gill (Ed.), The Handbook of Security (2nd Edition, pp. 65–88). Palgrave Macmillan UK. https://doi.org/10.1007/978-1-349-67284-4_4
Pennay, A., Manton, E., & Savic, M. (2014). Geographies of exclusion: Street drinking, gentrification and contests over public space. International Journal of Drug Policy, 25(6), 1084–1093. https://doi.org/10.1016/j.drugpo.2014.06.001
Perry, M. (2012). Designing Crime Risk Management Systems. In Handbook of Loss Prevention and Crime Prevention (pp. 49–56). Elsevier. https://doi.org/10.1016/B978-0-12-385246-5.00004-3
Perry, Marianna. (n.d.). Proactive vs. Reactive security: performing a risk assessment ensures a proactive approach to crime and loss prevention.(Safety&Security). Buildings, 104(3). https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_bcrc223527650&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,crime%20risk%20security&sortby=rank
Preventing human trafficking by empowering aircraft cabin crew. (n.d.). Premium Official News. https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_bcrc540633210&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,preventing%20trafficking&sortby=rank&offset=0&pcAvailability=false
Public disorder and business crime victimization in the retail sector. (n.d.). https://link.springer.com/content/pdf/10.1057/sj.2012.56.pdf
Raymen, T. (2016). Designing-in Crime by Designing-out the Social? Situational Crime Prevention and the Intensification of Harmful Subjectivities. British Journal of Criminology, 56(3), 497–514. https://doi.org/10.1093/bjc/azv069
Rosenzweig, Paul. (n.d.). Privacy and counter-terrorism: the pervasiveness of data.(Somebody’s Watching Me: Surveillance and Privacy in an Age of National Insecurity). Case Western Reserve Journal of International Law, 42(3). https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa230865687&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,Privacy,%20dataveillance,%20and%20crime%20prevention&sortby=rank&pcAvailability=false
Shakarian, P., Shakarian, J., & Ruef, A. (2013a). Introduction to cyber-warfare: a multidisciplinary approach. Morgan Kaufmann Publishers, an imprint of Elsevier.
Shakarian, P., Shakarian, J., & Ruef, A. (2013b). Introduction to cyber-warfare: a multidisciplinary approach. Morgan Kaufmann Publishers, an imprint of Elsevier.
Sheard, L. (2011). ‘Anything Could Have Happened’: Women, the Night-time Economy, Alcohol and Drink Spiking. Sociology, 45(4), 619–633. https://doi.org/10.1177/0038038511406596
Slomski, A. (2014). Three Bills to Prevent Sex Trafficking. JAMA, 311(22). https://doi.org/10.1001/jama.2014.6831
Smith, F., & Ingram, G. (2017). Organising cyber security in Australia and beyond. Australian Journal of International Affairs, 71(6), 642–660. https://doi.org/10.1080/10357718.2017.1320972
SpringerLink (Online service). (2014a). The Handbook of Security (M. L. Gill, Ed.; 2nd Edition). Palgrave Macmillan UK. http://dx.doi.org/10.1007/978-1-349-67284-4
SpringerLink (Online service). (2014b). The Handbook of Security (M. L. Gill, Ed.; 2nd Edition). Palgrave Macmillan UK. http://dx.doi.org/10.1007/978-1-349-67284-4
Sullivan, J. P. (2014). Transnational Crime. In M. Kaldor & I. Rangelov (Eds.), The handbook of global security policy (pp. 160–174). Wiley-Blackwell. https://doi.org/10.1002/9781118442975.ch9
Talbot, D. (2007). Regulating the night: race, culture and exclusion in the making of the night-time economy. Ashgate.
Tanner, Samuel1Mulone, Massimiliano1. (2013). Private Security and Armed Conflict A Case Study of the Scorpions during the Mass Killings in Former Yugoslavia. British Journal of Criminology, 53(Issue 1), 41–58. http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=84194406&site=ehost-live
The 21st Century DarkNet Market: Lessons from the Fall of Silk Road. (2016). International Journal of Cyber Criminology. http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=117120750&site=ehost-live
The case for private prisons. (n.d.). http://www.reform.uk/wp-content/uploads/2014/10/Reform_Ideas_No_2_-_The_case_for_private_prisons.pdf
The Dark Truth about Blackwater. (n.d.). https://www.brookings.edu/articles/the-dark-truth-about-blackwater/
Trim, P. R. J., & Upton, D. (2013). Cyber security culture: counteracting cyber threats through organizational learning and training. Gower.
Tseloni, A., Thompson, R., Grove, L., Tilley, N., & Farrell, G. (2017). The effectiveness of burglary security devices. Security Journal, 30(2), 646–664. https://doi.org/10.1057/sj.2014.30
United Nations Office on Drugs and Crime. (2009). Current practices in electronic surveillance in the investigation of serious and organised crime. United Nations.
Van de Bunt, H., Schoot, C. van der, & Wetenschappelijk Onderzoek- en Documentatiecentrum. (2003). Prevention of organised crime: a situational approach (Vol. 215). Boom Juridische uitgevers.
van Steden, R. (2018). Street Pastors: On security, care and faith in the British night-time economy. European Journal of Criminology, 15(4), 403–420. https://doi.org/10.1177/1477370817747499
Vellani, K. (2006). Chapter 6 Risk Assessments. In Strategic Security Management (pp. 109–132). Butterworth-Heinemann. http://www.sciencedirect.com/science/book/9780123708977
Ventre, D., & Ventre, D. (2012). Cyber conflict: competing national perspectives. Iste.
Volume 26, Issue 3, July 2013. (n.d.). Volume 26, Issue 3, July 2013. https://link.springer.com/journal/41284/26/3/page/1
Wadds, Phillip. (n.d.). Crime, policing and (in)security: press depictions of Sydney’s night-time economy. Current Issues in Criminal Justice, 27(1), 95–112. https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofg426505174&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,security%20and%20the%20night%20time%20economy&sortby=rank&offset=0&pcAvailability=false
Wall, D. (2003). Crime and the Internet. Routledge. https://doi.org/10.4324/9780203299180
Welsh, B. C., Mudge, M. E., & Farrington, D. P. (2010). Reconceptualizing public area surveillance and crime prevention: Security guards, place managers and defensible space. Security Journal, 23(4), 299–319. https://doi.org/10.1057/sj.2008.22
Where do beliefs about Music Piracy come from and how are they shared? An E... (2016). International Journal of Cyber Criminology. http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=117120746&site=ehost-live
Wilson, J. R. (2015). Cyber Security expands to meet demands. Military & Aerospace Electronics, 26(Issue 12), 5–11. http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=111632271&site=ehost-live
Winterfeld, S., & Andress, J. (2013). The basics of cyber warfare: understanding the fundamentals of cyber warfare in theory and practice. Syngress.
Wright, A. (2013). Organised Crime: Concepts, Cases, Controls (1st ed). Taylor and Francis. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=449736
Wylie, G., & McRedmond, P. (2010). Human trafficking in Europe: character, causes and consequences. Palgrave Macmillan.
Zedner, L. (2009a). Security (1st ed). Taylor and Francis. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=425617
Zedner, L. (2009b). Security (1st ed). Taylor and Francis. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=425617
Zedner, Lucia. (n.d.). Neither Safe Nor Sound? The Perils and Possibilities of Risk. Canadian Journal of Criminology and Criminal Justice, 48(3), 423–434. https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_museS1911021906304238&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,neither%20safe%20nor%20sound%20the%20perils%20and%20possibilities%20of%20risk&sortby=rank&offset=0