@article{Affi_Elmi_Knight_Mohamed_2016, title={Countering piracy through private security in the Horn of Africa: prospects and pitfalls}, volume={37}, DOI={10.1080/01436597.2015.1114882}, number={5}, journal={Third World Quarterly}, author={Affi, Ladan and Elmi, Afyare A. and Knight, W. Andy and Mohamed, Said}, year={2016}, month={May}, pages={934–950} }
@book{Akhgar_Rearick_Kumaraguruparan_Rogers_2014, address={Waltham, Massachusetts}, title={Cyber crime and cyber terrorism investigator’s handbook}, publisher={Elsevier}, author={Akhgar, Babak and Rearick, Benjamin and Kumaraguruparan, Priya and Rogers, Mark}, editor={Akhgar, Babak and Staniforth, Andrew and Bosco, Francesca M. and Elliot, Steve}, year={2014} }
@book{Andrea. Finney_2004, address={London}, title={Violence in the night-time economy : key findings in the research}, url={http://webarchive.nationalarchives.gov.uk/20110218135935/http:/rds.homeoffice.gov.uk/rds/pdfs04/r214.pdf}, publisher={Home Office}, author={Andrea. Finney}, year={2004} }
@book{Andress_Winterfeld_Rogers_2011, address={Waltham, Mass}, title={Cyber warfare: techniques, tactics and tools for security practitioners}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1463416}, publisher={Syngress}, author={Andress, Jason and Winterfeld, Steve and Rogers, Russ}, year={2011} }
@article{ASIS Foundation._1989, address={Stoneham, MA}, title={Security journal.}, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_ALMA51126475410002746&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&isFrbr=true&tab=default_tab&query=any,contains,the%20security%20journal&pcAvailability=false}, publisher={Butterworths}, author={ASIS Foundation.}, year={1989} }
@book{Atkinson_Atkinson_Helms_University of Glasgow. Dept. of Urban Studies_2007, address={Brisol, U.K.}, title={Securing an urban renaissance: crime, community, and British urban policy}, publisher={Policy Press}, author={Atkinson, Dr Rowland and Atkinson, Rowland and Helms, Gesa and University of Glasgow. Dept. of Urban Studies}, year={2007} }
@book{Awan_Blakemore_2012, address={Farnham}, title={Policing cyber hate, cyber threats and cyber terrorism}, publisher={Ashgate}, author={Awan, Imran and Blakemore, Brian}, year={2012} }
@book{Bamfield_2012, address={Basingstoke}, title={Shopping and crime}, url={http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230393554}, publisher={Palgrave Macmillan}, author={Bamfield, Joshua}, year={2012} }
@book{Beare_2012, address={Thousand Oaks, Calif}, title={Encyclopedia of transnational crime and justice}, publisher={SAGE Publications}, author={Beare, Margaret E.}, year={2012} }
@article{Beck, Adrian_2017, title={Moving beyond shrinkage: developing a definition and typology of total retail loss}, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_DSPACE2381%2F39492&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,retail%20crime&sortby=rank}, publisher={Palgrave Macmillan,ASIS International}, author={Beck, Adrian}, year={2017} }
@article{Beck_Hopkins_2017, title={Scan and rob! Convenience shopping, crime opportunity and corporate social responsibility in a mobile world}, volume={30}, DOI={10.1057/sj.2016.6}, number={4}, journal={Security Journal}, author={Beck, Adrian and Hopkins, Matt}, year={2017}, month={Oct}, pages={1080–1096} }
@book{Beck_Willis_1995, address={Leicester}, title={Crime and security: managing the risk to safe shopping}, publisher={Perpetuity Press}, author={Beck, Adrian and Willis, Andrew}, year={1995} }
@book{Beck_1999, address={Malden, Mass}, title={World risk society}, publisher={Polity Press}, author={Beck, Ulrich}, year={1999} }
@article{Beck_2006, title={Living in the world risk society}, volume={35}, DOI={10.1080/03085140600844902}, number={3}, journal={Economy and Society}, author={Beck, Ulrich}, year={2006}, month={Aug}, pages={329–345} }
@book{Blake H. Liventin_2011, address={New York}, title={Organized retail crime}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=3018926}, publisher={Nova Science Publishers}, author={Blake H. Liventin}, year={2011} }
@article{Brands, Jelle, title={Safety, surveillance and policing in the night-time economy: (Re)turning to numbers}, volume={62}, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa421286022&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,security%20and%20the%20night%20time%20economy&sortby=rank&offset=0&pcAvailability=false}, journal={Geoforum}, author={Brands, Jelle} }
@article{Brands_Schwanen_van Aalst_2015, title={Fear of crime and affective ambiguities in the night-time economy}, volume={52}, DOI={10.1177/0042098013505652}, number={3}, journal={Urban Studies}, author={Brands, Jelle and Schwanen, Tim and van Aalst, Irina}, year={2015}, month={Feb}, pages={439–455} }
@article{Brands_Schwanen_van Aalst_2016, title={What are you looking at? Visitors’ perspectives on CCTV in the night-time economy}, volume={23}, DOI={10.1177/0969776413481369}, number={1}, journal={European Urban and Regional Studies}, author={Brands, Jelle and Schwanen, Tim and van Aalst, Irina}, year={2016}, month={Jan}, pages={23–39} }
@book{Bridgeman_Great Britain. Police Research Group_1996, address={London}, title={Crime risk management: making it work}, volume={no.70}, publisher={Home Office Police Research Group}, author={Bridgeman, Cressida and Great Britain. Police Research Group}, year={1996} }
@inbook{Brodeur_2010, address={Oxford}, title={Private Security}, url={http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780199740598.001.0001/acprof-9780199740598-chapter-9}, DOI={10.1093/acprof:oso/9780199740598.003.0009}, booktitle={The policing web}, publisher={Oxford University Press}, author={Brodeur, Jean‐Paul}, year={2010}, pages={255–308} }
@article{Burnett_2011, title={UK: racial violence and the night-time economy}, volume={53}, DOI={10.1177/0306396811406790}, number={1}, journal={Race & Class}, author={Burnett, Jon}, year={2011}, month={Jul}, pages={100–106} }
@article{Button_Stiernstedt_2018, title={Comparing private security regulation in the European Union}, volume={28}, DOI={10.1080/10439463.2016.1161624}, number={4}, journal={Policing and Society}, author={Button, Mark and Stiernstedt, Peter}, year={2018}, month={May}, pages={398–414} }
@article{Campbell_Currie_2006, title={Against Beck}, volume={36}, DOI={10.1177/0048393106287209}, number={2}, journal={Philosophy of the Social Sciences}, author={Campbell, Scott and Currie, Greg}, year={2006}, month={Jun}, pages={149–172} }
@article{Carrapico_Barrinha_2017, title={The EU as a Coherent (Cyber)Security Actor?}, volume={55}, DOI={10.1111/jcms.12575}, number={6}, journal={JCMS: Journal of Common Market Studies}, author={Carrapico, Helena and Barrinha, André}, year={2017}, month={Nov}, pages={1254–1272} }
@article{Chen_Teng_Liao_2018, title={Counterfeit Luxuries: Does Moral Reasoning Strategy Influence Consumers’ Pursuit of Counterfeits?}, volume={151}, DOI={10.1007/s10551-016-3255-y}, number={1}, journal={Journal of Business Ethics}, author={Chen, Jie and Teng, Lefa and Liao, Yonghai}, year={2018}, month={Aug}, pages={249–264} }
@book{Clarke_1997, address={Monsey, N.Y.}, edition={2nd ed}, title={Situational crime prevention: successful case studies}, publisher={Criminal Justice Press}, author={Clarke, Ronald V. G.}, year={1997} }
@article{Cozens_Love_2015, title={A Review and Current Status of Crime Prevention through Environmental Design (CPTED)}, volume={30}, DOI={10.1177/0885412215595440}, number={4}, journal={Journal of Planning Literature}, author={Cozens, Paul and Love, Terence}, year={2015}, month={Nov}, pages={393–412} }
@book{Creese_2015, address={London, [England]}, title={Cyber warfare: a multidisciplinary analysis}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=2058004}, publisher={Routledge}, author={Creese, Sadie}, year={2015} }
@book{Edwards_Edwards_Gill_2003, address={London}, title={Transnational organised crime: perspectives on global security}, publisher={Routledge}, author={Edwards, Adam and Edwards, Adam and Gill, Peter}, year={2003} }
@article{Edwards_Urquhart_2016, title={Privacy in public spaces: what expectations of privacy do we have in social media intelligence?}, volume={24}, DOI={10.1093/ijlit/eaw007}, number={3}, journal={International Journal of Law and Information Technology}, author={Edwards, Lilian and Urquhart, Lachlan}, year={2016}, month={Sep}, pages={279–310} }
@book{Ekblom_Great Britain. Home Office. Crime Prevention Unit_1986, address={London}, title={The prevention of shop theft: an approach through crime analysis}, volume={no.5}, publisher={Home Office}, author={Ekblom, Paul and Great Britain. Home Office. Crime Prevention Unit}, year={1986} }
@article{Ekblom_Sidebottom_2007, title={What Do You Mean, ‘Is It Secure?’ Redesigning Language to be Fit for the Task of Assessing the Security of Domestic and Personal Electronic Goods}, volume={14}, DOI={10.1007/s10610-007-9041-8}, number={1}, journal={European Journal on Criminal Policy and Research}, author={Ekblom, Paul and Sidebottom, Aiden}, year={2007}, month={Nov}, pages={61–87} }
@article{Farrimond_Boyd_Fleischer_2018, title={Reconfiguring the violent encounter? Preloading, security staff and breathalyser use in the night-time economy}, volume={56}, DOI={10.1016/j.drugpo.2018.03.008}, journal={International Journal of Drug Policy}, author={Farrimond, Hannah and Boyd, Katharine and Fleischer, Dreolin}, year={2018}, month={Jun}, pages={108–115} }
@article{Gant_Terry_2017, title={Narrative of the night-out: Student engagement in the night-time economy of Kingston upon Thames}, volume={32}, DOI={10.1177/0269094217722336}, number={5}, journal={Local Economy: The Journal of the Local Economy Policy Unit}, author={Gant, Robert and Terry, Philip}, year={2017}, month={Aug}, pages={467–481} }
@article{Garmany_Galdeano_2018, title={Crime, insecurity and corruption: Considering the growth of urban private security}, volume={55}, DOI={10.1177/0042098017732691}, number={5}, journal={Urban Studies}, author={Garmany, Jeff and Galdeano, Ana Paula}, year={2018}, month={Apr}, pages={1111–1120} }
@book{Gill_1994, address={Leicester}, title={Crime at work: studies in security and crime prevention, Vol.1}, publisher={Perpetuity Press}, author={Gill, M. L.}, year={1994} }
@book{Gill_1998, address={Leicester}, title={Crime at work: increasing the risk for offenders, Vol.2}, publisher={Perpetuity Press}, author={Gill, M. L.}, year={1998} }
@article{Gunby, Clare_2016, title={Location, Libation and Leisure: An examination of the use of licensed venues to help challenge sexual violence}, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_DSPACE2381%2F37256&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,night%20time%20economy&sortby=rank&pcAvailability=false}, publisher={SAGE Publications (UK and US)}, author={Gunby, Clare}, year={2016} }
@book{Guthrie_Guthrie_Todd_2006, address={Bradford, England}, title={Retail crime and loss prevention}, volume={34, no. 11}, publisher={Emerald Group Publishing}, author={Guthrie, John and Guthrie, John and Todd, Sarah}, year={2006} }
@article{Hadfield_Measham_2015, title={The outsourcing of control: Alcohol law enforcement, private-sector governance and the evening and night-time economy}, volume={52}, DOI={10.1177/0042098014554540}, number={3}, journal={Urban Studies}, author={Hadfield, Phil and Measham, Fiona}, year={2015}, month={Feb}, pages={517–537} }
@article{Higate_2012, title={‘Cowboys and Professionals’: The Politics of Identity Work in the Private and Military Security Company}, volume={40}, DOI={10.1177/0305829811425752}, number={2}, journal={Millennium: Journal of International Studies}, author={Higate, Paul}, year={2012}, month={Jan}, pages={321–341} }
@book{Hobbs, title={Bouncers : violence and governance in the night-time economy}, author={Hobbs, Dick} }
@article{Hua_Bapna_2012, title={How Can We Deter Cyber Terrorism?}, volume={21}, DOI={10.1080/19393555.2011.647250}, number={2}, journal={Information Security Journal: A Global Perspective}, author={Hua, Jian and Bapna, Sanjay}, year={2012}, month={Jan}, pages={102–114} }
@article{Jacques_Rosenfeld_Wright_van Gemert_2016, title={Effects of Prohibition and Decriminalization on Drug Market Conflict}, volume={15}, DOI={10.1111/1745-9133.12218}, number={3}, journal={Criminology & Public Policy}, author={Jacques, Scott and Rosenfeld, Richard and Wright, Richard and van Gemert, Frank}, year={2016}, month={Aug}, pages={843–875} }
@article{Jansen, Jurjen1 j.jansen@nhl.nlLeukfeldt, Rutger1 E.R.Leukfeldt@nhl.nl_2016, title={Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization.}, volume={10}, url={http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=117120749&site=ehost-live}, DOI={10.5281/zenodo.58523}, number={Issue 1}, journal={International Journal of Cyber Criminology}, author={Jansen, Jurjen1 j.jansen@nhl.nlLeukfeldt, Rutger1 E.R.Leukfeldt@nhl.nl}, year={2016}, pages={79–91} }
@article{Kennedy_2016, title={Shedding Light on Employee Theft’s Dark Figure: A Typology of Employee Theft Nonreporting Rationalizations}, volume={13}, DOI={10.1080/15416518.2015.1110513}, number={1}, journal={Organization Management Journal}, author={Kennedy, Jay P.}, year={2016}, month={Jan}, pages={49–60} }
@article{Lavorgna, Anita1 A.Lavorgna@soton.ac.ukSergi, Anna2 asergi@essex.ac.uk_2016, title={Serious, therefore Organised? A Critique of the Emerging ‘Cyber-Organised Crime’ Rhetoric in the United Kingdom.}, volume={10}, url={http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=119119113&site=ehost-live}, DOI={10.5281/zenodo.163400}, number={Issue 2}, journal={International Journal of Cyber Criminology}, author={Lavorgna, Anita1 A.Lavorgna@soton.ac.ukSergi, Anna2 asergi@essex.ac.uk}, year={2016}, pages={170–187} }
@book{Martin Gill_2016, edition={Second}, title={The Handbook of Security}, url={https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=4427344&ppg=351}, publisher={Palgrave Macmillan Limited}, author={Martin Gill}, year={2016} }
@article{Miller, Kevin, title={Total surveillance, big data, and predictive crime technology: privacy’s perfect storm}, volume={19}, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_legal398036055&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,Privacy,%20surveillance,%20and%20crime%20prevention&sortby=rank&offset=0&pcAvailability=false}, number={1}, journal={Journal of Technology Law & Policy}, author={Miller, Kevin} }
@book{Nemeth_2012, address={Amsterdam}, edition={4th ed}, title={Private security and the law}, publisher={Elsevier Butterworth Heinemann}, author={Nemeth, Charles P.}, year={2012} }
@book{Norris_Wilson_2006, address={Aldershot}, title={Surveillance, crime, and social control}, publisher={Ashgate}, author={Norris, Clive and Wilson, Dean}, year={2006} }
@inbook{O’Brien_Hobbs_Westmarland_2008, address={New York}, title={Negotiating Violence and Gender: Security and the Night Time Economy in the UK}, url={http://link.springer.com/10.1007/978-0-387-09705-3_10}, DOI={10.1007/978-0-387-09705-3_10}, booktitle={Violence in Europe: historical and contemporary perspectives}, publisher={Springer}, author={O’Brien, Kate and Hobbs, Dick and Westmarland, Louise}, year={2008}, pages={161–173} }
@book{O’Malley_2010a, address={London}, title={Crime and risk}, url={http://ezproxy.lib.le.ac.uk/login?url=http://knowledge.sagepub.com/view/crime-and-risk/SAGE.xml}, publisher={Sage}, author={O’Malley, Pat}, year={2010} }
@book{O’Malley_2010b, address={London}, title={Crime and risk}, url={http://ezproxy.lib.le.ac.uk/login?url=http://knowledge.sagepub.com/view/crime-and-risk/SAGE.xml}, publisher={Sage}, author={O’Malley, Pat}, year={2010} }
@inproceedings{Palmer_Warren_Miller_2010, title={ID scanners in the night time economy}, url={http://ieeexplore.ieee.org/document/5514634/}, DOI={10.1109/ISTAS.2010.5514634}, booktitle={2010 IEEE International Symposium on Technology and Society}, publisher={IEEE}, author={Palmer, Darren and Warren, Ian and Miller, Peter}, year={2010}, month={Jun}, pages={234–241} }
@inbook{Pease_Farrell_2014, address={London}, edition={2nd Edition}, title={What Have Criminologists Done for Us Lately?}, url={http://link.springer.com/10.1007/978-1-349-67284-4_4}, DOI={10.1007/978-1-349-67284-4_4}, booktitle={The Handbook of Security}, publisher={Palgrave Macmillan UK}, author={Pease, Ken and Farrell, Graham}, editor={Gill, M. L.}, year={2014}, pages={65–88} }
@article{Pennay_Manton_Savic_2014, title={Geographies of exclusion: Street drinking, gentrification and contests over public space}, volume={25}, DOI={10.1016/j.drugpo.2014.06.001}, number={6}, journal={International Journal of Drug Policy}, author={Pennay, Amy and Manton, Elizabeth and Savic, Michael}, year={2014}, month={Nov}, pages={1084–1093} }
@inbook{Perry_2012, title={Designing Crime Risk Management Systems}, url={http://linkinghub.elsevier.com/retrieve/pii/B9780123852465000043}, DOI={10.1016/B978-0-12-385246-5.00004-3}, booktitle={Handbook of Loss Prevention and Crime Prevention}, publisher={Elsevier}, author={Perry, Marianna}, year={2012}, pages={49–56} }
@article{Perry, Marianna, title={Proactive vs. Reactive security: performing a risk assessment ensures a proactive approach to crime and loss prevention.(Safety&Security)}, volume={104}, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_bcrc223527650&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,crime%20risk%20security&sortby=rank}, number={3}, journal={Buildings}, author={Perry, Marianna} }
@article{Raymen_2016, title={Designing-in Crime by Designing-out the Social? Situational Crime Prevention and the Intensification of Harmful Subjectivities}, volume={56}, DOI={10.1093/bjc/azv069}, number={3}, journal={British Journal of Criminology}, author={Raymen, Thomas}, year={2016}, month={May}, pages={497–514} }
@article{Rosenzweig, Paul, title={Privacy and counter-terrorism: the pervasiveness of data.(Somebody’s Watching Me: Surveillance and Privacy in an Age of National Insecurity)}, volume={42}, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa230865687&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,Privacy,%20dataveillance,%20and%20crime%20prevention&sortby=rank&pcAvailability=false}, number={3}, journal={Case Western Reserve Journal of International Law}, author={Rosenzweig, Paul} }
@book{Shakarian_Shakarian_Ruef_2013a, address={Amsterdam [Netherlands]}, title={Introduction to cyber-warfare: a multidisciplinary approach}, publisher={Morgan Kaufmann Publishers, an imprint of Elsevier}, author={Shakarian, Paulo and Shakarian, Jana and Ruef, Andrew}, year={2013} }
@book{Shakarian_Shakarian_Ruef_2013b, address={Amsterdam [Netherlands]}, title={Introduction to cyber-warfare: a multidisciplinary approach}, publisher={Morgan Kaufmann Publishers, an imprint of Elsevier}, author={Shakarian, Paulo and Shakarian, Jana and Ruef, Andrew}, year={2013} }
@article{Sheard_2011, title={‘Anything Could Have Happened’: Women, the Night-time Economy, Alcohol and Drink Spiking}, volume={45}, DOI={10.1177/0038038511406596}, number={4}, journal={Sociology}, author={Sheard, Laura}, year={2011}, month={Aug}, pages={619–633} }
@article{Slomski_2014, title={Three Bills to Prevent Sex Trafficking}, volume={311}, DOI={10.1001/jama.2014.6831}, number={22}, journal={JAMA}, author={Slomski, Anita}, year={2014}, month={Jun} }
@article{Smith_Ingram_2017, title={Organising cyber security in Australia and beyond}, volume={71}, DOI={10.1080/10357718.2017.1320972}, number={6}, journal={Australian Journal of International Affairs}, author={Smith, Frank and Ingram, Graham}, year={2017}, month={Nov}, pages={642–660} }
@book{SpringerLink (Online service)_2014a, address={London}, edition={2nd Edition}, title={The Handbook of Security}, url={http://dx.doi.org/10.1007/978-1-349-67284-4}, publisher={Palgrave Macmillan UK}, author={SpringerLink (Online service)}, editor={Gill, M. L.}, year={2014} }
@book{SpringerLink (Online service)_2014b, address={London}, edition={2nd Edition}, title={The Handbook of Security}, url={http://dx.doi.org/10.1007/978-1-349-67284-4}, publisher={Palgrave Macmillan UK}, author={SpringerLink (Online service)}, editor={Gill, M. L.}, year={2014} }
@article{van Steden_2018, title={Street Pastors: On security, care and faith in the British night-time economy}, volume={15}, DOI={10.1177/1477370817747499}, number={4}, journal={European Journal of Criminology}, author={van Steden, Ronald}, year={2018}, month={Jul}, pages={403–420} }
@inbook{Sullivan_2014, address={Chichester, England}, title={Transnational Crime}, url={http://doi.wiley.com/10.1002/9781118442975.ch9}, DOI={10.1002/9781118442975.ch9}, booktitle={The handbook of global security policy}, publisher={Wiley-Blackwell}, author={Sullivan, John P.}, editor={Kaldor, Mary and Rangelov, Iavor}, year={2014}, pages={160–174} }
@book{Talbot_2007, address={Aldershot}, title={Regulating the night: race, culture and exclusion in the making of the night-time economy}, publisher={Ashgate}, author={Talbot, Deborah}, year={2007} }
@article{Tanner, Samuel1Mulone, Massimiliano1_2013, title={Private Security and Armed Conflict A Case Study of the Scorpions during the Mass Killings in Former Yugoslavia.}, volume={53}, url={http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=84194406&site=ehost-live}, number={Issue 1}, journal={British Journal of Criminology}, author={Tanner, Samuel1Mulone, Massimiliano1}, year={2013}, pages={41–58} }
@book{Trim_Upton_2013, address={Farnham, England}, title={Cyber security culture: counteracting cyber threats through organizational learning and training}, publisher={Gower}, author={Trim, Peter R. J. and Upton, David}, year={2013} }
@article{Tseloni_Thompson_Grove_Tilley_Farrell_2017, title={The effectiveness of burglary security devices}, volume={30}, DOI={10.1057/sj.2014.30}, number={2}, journal={Security Journal}, author={Tseloni, Andromachi and Thompson, Rebecca and Grove, Louise and Tilley, Nick and Farrell, Graham}, year={2017}, month={May}, pages={646–664} }
@book{United Nations Office on Drugs and Crime_2009, address={New York}, title={Current practices in electronic surveillance in the investigation of serious and organised crime}, publisher={United Nations}, author={United Nations Office on Drugs and Crime}, year={2009} }
@book{Van de Bunt_Schoot_Wetenschappelijk Onderzoek- en Documentatiecentrum_2003, address={[Den Haag]}, title={Prevention of organised crime: a situational approach}, volume={215}, publisher={Boom Juridische uitgevers}, author={Van de Bunt, Henk and Schoot, Cathelijne van der and Wetenschappelijk Onderzoek- en Documentatiecentrum}, year={2003} }
@inbook{Vellani_2006, title={Chapter 6 Risk Assessments}, url={http://www.sciencedirect.com/science/book/9780123708977}, booktitle={Strategic Security Management}, publisher={Butterworth-Heinemann}, author={Vellani, Karim}, year={2006}, pages={109–132} }
@book{Ventre_Ventre_2012, address={London}, title={Cyber conflict: competing national perspectives}, publisher={Iste}, author={Ventre, Daniel and Ventre, Daniel}, year={2012} }
@article{Wadds, Phillip, title={Crime, policing and (in)security: press depictions of Sydney’s night-time economy}, volume={27}, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofg426505174&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,security%20and%20the%20night%20time%20economy&sortby=rank&offset=0&pcAvailability=false}, number={1}, journal={Current Issues in Criminal Justice}, author={Wadds, Phillip}, pages={95–112} }
@book{Wall_2003, title={Crime and the Internet}, url={https://www.taylorfrancis.com/books/9780203299180}, DOI={10.4324/9780203299180}, publisher={Routledge}, author={Wall, David}, year={2003}, month={Sep} }
@article{Welsh_Mudge_Farrington_2010, title={Reconceptualizing public area surveillance and crime prevention: Security guards, place managers and defensible space}, volume={23}, DOI={10.1057/sj.2008.22}, number={4}, journal={Security Journal}, author={Welsh, Brandon C and Mudge, Mark E and Farrington, David P}, year={2010}, month={Oct}, pages={299–319} }
@article{Wilson, J. R._2015, title={Cyber Security expands to meet demands.}, volume={26}, url={http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=111632271&site=ehost-live}, number={Issue 12}, journal={Military & Aerospace Electronics}, author={Wilson, J. R.}, year={2015}, pages={5–11} }
@book{Winterfeld_Andress_2013, address={Boston}, title={The basics of cyber warfare: understanding the fundamentals of cyber warfare in theory and practice}, publisher={Syngress}, author={Winterfeld, Steve and Andress, Jason}, year={2013} }
@book{Wright_2013, address={Uffculme}, edition={1st ed}, title={Organised Crime: Concepts, Cases, Controls}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=449736}, publisher={Taylor and Francis}, author={Wright, Alan}, year={2013} }
@book{Wylie_McRedmond_2010, address={New York}, title={Human trafficking in Europe: character, causes and consequences}, publisher={Palgrave Macmillan}, author={Wylie, Gillian and McRedmond, Penny}, year={2010} }
@book{Zedner_2009a, address={Florence}, edition={1st ed}, title={Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=425617}, publisher={Taylor and Francis}, author={Zedner, Lucia}, year={2009} }
@book{Zedner_2009b, address={Florence}, edition={1st ed}, title={Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=425617}, publisher={Taylor and Francis}, author={Zedner, Lucia}, year={2009} }
@article{Zedner, Lucia, title={Neither Safe Nor Sound? The Perils and Possibilities of Risk}, volume={48}, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_museS1911021906304238&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,neither%20safe%20nor%20sound%20the%20perils%20and%20possibilities%20of%20risk&sortby=rank&offset=0}, number={3}, journal={Canadian Journal of Criminology and Criminal Justice}, author={Zedner, Lucia}, pages={423–434} }
@article{International journal of cyber criminology._2007, address={India}, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_ALMA51124799820002746&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,cyber&sortby=rank}, publisher={publisher not identified}, year={2007} }
@article{Where do beliefs about Music Piracy come from and how are they shared? An E..._2016, url={http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=117120746&site=ehost-live}, journal={International Journal of Cyber Criminology}, year={2016} }
@article{The 21st Century DarkNet Market: Lessons from the Fall of Silk Road._2016, url={http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=117120750&site=ehost-live}, journal={International Journal of Cyber Criminology}, year={2016} }
@article{Hackers’ Motivations: Testing Schwartz’s Theory of Motivational Types of Va..._2017, url={http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=122614546&site=ehost-live}, journal={International Journal of Cyber Criminology}, year={2017} }
@misc{Crime risk assessment/crime impact assessment, url={http://www.designagainstcrime.com/files/crimeframeworks/Crime_risk_asssement_EKBLOM.pdf} }
@article{Volume 26, Issue 3, July 2013, url={https://link.springer.com/journal/41284/26/3/page/1}, journal={Volume 26, Issue 3, July 2013} }
@misc{The Dark Truth about Blackwater, url={https://www.brookings.edu/articles/the-dark-truth-about-blackwater/} }
@misc{The case for private prisons, url={http://www.reform.uk/wp-content/uploads/2014/10/Reform_Ideas_No_2_-_The_case_for_private_prisons.pdf} }
@misc{Public disorder and business crime victimization in the retail sector, url={https://link.springer.com/content/pdf/10.1057/sj.2012.56.pdf} }
@article{CHAIRMAN JOHNSON OPENING STATEMENT: ‘PREVENTING DRUG TRAFFICKING THROUGH INTERNATIONAL MAIL’, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa449951374&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,preventing%20drug%20trafficking&sortby=rank&facet=searchcreationdate,include,2015%7C,%7C2018&offset=0&pcAvailability=false}, journal={States News Service} }
@article{Preventing human trafficking by empowering aircraft cabin crew, url={https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_bcrc540633210&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,preventing%20trafficking&sortby=rank&offset=0&pcAvailability=false}, journal={Premium Official News} }