1
Zedner L. Security. 1st ed. Florence: : Taylor and Francis 2009. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=425617
2
O’Malley P. Crime and risk. London: : Sage 2010. http://ezproxy.lib.le.ac.uk/login?url=http://knowledge.sagepub.com/view/crime-and-risk/SAGE.xml
3
ASIS Foundation. Security journal. Published Online First: 1989.https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_ALMA51126475410002746&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&isFrbr=true&tab=default_tab&query=any,contains,the%20security%20journal&pcAvailability=false
4
SpringerLink (Online service). The Handbook of Security. 2nd Edition. London: : Palgrave Macmillan UK 2014. http://dx.doi.org/10.1007/978-1-349-67284-4
5
Pease K, Farrell G. What Have Criminologists Done for Us Lately? In: Gill ML, ed. The Handbook of Security. London: : Palgrave Macmillan UK 2014. 65–88. doi:10.1007/978-1-349-67284-4_4
6
Beck U. Living in the world risk society. Economy and Society 2006;35:329–45. doi:10.1080/03085140600844902
7
Beck U. World risk society. Malden, Mass: : Polity Press 1999.
8
Campbell S, Currie G. Against Beck. Philosophy of the Social Sciences 2006;36:149–72. doi:10.1177/0048393106287209
9
O’Malley P. Crime and risk. London: : Sage 2010. http://ezproxy.lib.le.ac.uk/login?url=http://knowledge.sagepub.com/view/crime-and-risk/SAGE.xml
10
Zedner L. Security. 1st ed. Florence: : Taylor and Francis 2009. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=425617
11
Cozens P, Love T. A Review and Current Status of Crime Prevention through Environmental Design (CPTED). Journal of Planning Literature 2015;30:393–412. doi:10.1177/0885412215595440
12
Tseloni A, Thompson R, Grove L, et al. The effectiveness of burglary security devices. Security Journal 2017;30:646–64. doi:10.1057/sj.2014.30
13
Perry M. Designing Crime Risk Management Systems. In: Handbook of Loss Prevention and Crime Prevention. Elsevier 2012. 49–56. doi:10.1016/B978-0-12-385246-5.00004-3
14
Vellani K. Chapter 6 Risk Assessments. In: Strategic Security Management. Butterworth-Heinemann 2006. 109–32.http://www.sciencedirect.com/science/book/9780123708977
15
Perry, Marianna. Proactive vs. Reactive security: performing a risk assessment ensures a proactive approach to crime and loss prevention.(Safety&Security). Buildings;104.https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_bcrc223527650&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,crime%20risk%20security&sortby=rank
16
Ekblom P, Sidebottom A. What Do You Mean, ‘Is It Secure?’ Redesigning Language to be Fit for the Task of Assessing the Security of Domestic and Personal Electronic Goods. European Journal on Criminal Policy and Research 2007;14:61–87. doi:10.1007/s10610-007-9041-8
17
Raymen T. Designing-in Crime by Designing-out the Social? Situational Crime Prevention and the Intensification of Harmful Subjectivities. British Journal of Criminology 2016;56:497–514. doi:10.1093/bjc/azv069
18
Crime risk assessment/crime impact assessment. http://www.designagainstcrime.com/files/crimeframeworks/Crime_risk_asssement_EKBLOM.pdf
19
Bridgeman C, Great Britain. Police Research Group. Crime risk management: making it work. London: : Home Office Police Research Group 1996.
20
Zedner, Lucia. Neither Safe Nor Sound? The Perils and Possibilities of Risk. Canadian Journal of Criminology and Criminal Justice;48:423–34.https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_museS1911021906304238&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,neither%20safe%20nor%20sound%20the%20perils%20and%20possibilities%20of%20risk&sortby=rank&offset=0
21
Volume 26, Issue 3, July 2013. Volume 26, Issue 3, July 2013https://link.springer.com/journal/41284/26/3/page/1
22
Brodeur J. Private Security. In: The policing web. Oxford: : Oxford University Press 2010. 255–308. doi:10.1093/acprof:oso/9780199740598.003.0009
23
Button M, Stiernstedt P. Comparing private security regulation in the European Union. Policing and Society 2018;28:398–414. doi:10.1080/10439463.2016.1161624
24
Higate P. ‘Cowboys and Professionals’: The Politics of Identity Work in the Private and Military Security Company. Millennium: Journal of International Studies 2012;40:321–41. doi:10.1177/0305829811425752
25
The Dark Truth about Blackwater. https://www.brookings.edu/articles/the-dark-truth-about-blackwater/
26
Tanner, Samuel1Mulone, Massimiliano1. Private Security and Armed Conflict A Case Study of the Scorpions during the Mass Killings in Former Yugoslavia. British Journal of Criminology 2013;53:41–58.http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=84194406&site=ehost-live
27
The case for private prisons. http://www.reform.uk/wp-content/uploads/2014/10/Reform_Ideas_No_2_-_The_case_for_private_prisons.pdf
28
Affi L, Elmi AA, Knight WA, et al. Countering piracy through private security in the Horn of Africa: prospects and pitfalls. Third World Quarterly 2016;37:934–50. doi:10.1080/01436597.2015.1114882
29
Garmany J, Galdeano AP. Crime, insecurity and corruption: Considering the growth of urban private security. Urban Studies 2018;55:1111–20. doi:10.1177/0042098017732691
30
Nemeth CP. Private security and the law. 4th ed. Amsterdam: : Elsevier Butterworth Heinemann 2012.
31
Hadfield P, Measham F. The outsourcing of control: Alcohol law enforcement, private-sector governance and the evening and night-time economy. Urban Studies 2015;52:517–37. doi:10.1177/0042098014554540
32
Brands, Jelle. Safety, surveillance and policing in the night-time economy: (Re)turning to numbers. Geoforum;62.https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa421286022&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,security%20and%20the%20night%20time%20economy&sortby=rank&offset=0&pcAvailability=false
33
Atkinson DR, Atkinson R, Helms G, et al. Securing an urban renaissance: crime, community, and British urban policy. Brisol, U.K.: : Policy Press 2007.
34
Clarke RVG. Situational crime prevention: successful case studies. 2nd ed. Monsey, N.Y.: : Criminal Justice Press 1997.
35
Gill ML. Crime at work: increasing the risk for offenders, Vol.2. Leicester: : Perpetuity Press 1998.
36
Gill ML. Crime at work: studies in security and crime prevention, Vol.1. Leicester: : Perpetuity Press 1994.
37
Palmer D, Warren I, Miller P. ID scanners in the night time economy. In: 2010 IEEE International Symposium on Technology and Society. IEEE 2010. 234–41. doi:10.1109/ISTAS.2010.5514634
38
Wadds, Phillip. Crime, policing and (in)security: press depictions of Sydney’s night-time economy. Current Issues in Criminal Justice;27:95–112.https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofg426505174&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,security%20and%20the%20night%20time%20economy&sortby=rank&offset=0&pcAvailability=false
39
O’Brien K, Hobbs D, Westmarland L. Negotiating Violence and Gender: Security and the Night Time Economy in the UK. In: Violence in Europe: historical and contemporary perspectives. New York: : Springer 2008. 161–73. doi:10.1007/978-0-387-09705-3_10
40
Farrimond H, Boyd K, Fleischer D. Reconfiguring the violent encounter? Preloading, security staff and breathalyser use in the night-time economy. International Journal of Drug Policy 2018;56:108–15. doi:10.1016/j.drugpo.2018.03.008
41
van Steden R. Street Pastors: On security, care and faith in the British night-time economy. European Journal of Criminology 2018;15:403–20. doi:10.1177/1477370817747499
42
Gant R, Terry P. Narrative of the night-out: Student engagement in the night-time economy of Kingston upon Thames. Local Economy: The Journal of the Local Economy Policy Unit 2017;32:467–81. doi:10.1177/0269094217722336
43
Brands J, Schwanen T, van Aalst I. What are you looking at? Visitors’ perspectives on CCTV in the night-time economy. European Urban and Regional Studies 2016;23:23–39. doi:10.1177/0969776413481369
44
Gunby, Clare. Location, Libation and Leisure: An examination of the use of licensed venues to help challenge sexual violence. Published Online First: 2016.https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_DSPACE2381%2F37256&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,night%20time%20economy&sortby=rank&pcAvailability=false
45
Talbot D. Regulating the night: race, culture and exclusion in the making of the night-time economy. Aldershot: : Ashgate 2007.
46
Andrea. Finney. Violence in the night-time economy : key findings in the research. London: : Home Office 2004. http://webarchive.nationalarchives.gov.uk/20110218135935/http:/rds.homeoffice.gov.uk/rds/pdfs04/r214.pdf
47
Burnett J. UK: racial violence and the night-time economy. Race & Class 2011;53:100–6. doi:10.1177/0306396811406790
48
Sheard L. ‘Anything Could Have Happened’: Women, the Night-time Economy, Alcohol and Drink Spiking. Sociology 2011;45:619–33. doi:10.1177/0038038511406596
49
Hobbs D. Bouncers : violence and governance in the night-time economy.
50
Brands J, Schwanen T, van Aalst I. Fear of crime and affective ambiguities in the night-time economy. Urban Studies 2015;52:439–55. doi:10.1177/0042098013505652
51
Pennay A, Manton E, Savic M. Geographies of exclusion: Street drinking, gentrification and contests over public space. International Journal of Drug Policy 2014;25:1084–93. doi:10.1016/j.drugpo.2014.06.001
52
Beck A, Hopkins M. Scan and rob! Convenience shopping, crime opportunity and corporate social responsibility in a mobile world. Security Journal 2017;30:1080–96. doi:10.1057/sj.2016.6
53
Bamfield J. Shopping and crime. Basingstoke: : Palgrave Macmillan 2012. http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230393554
54
Blake H. Liventin. Organized retail crime. New York: : Nova Science Publishers 2011. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=3018926
55
Beck A, Willis A. Crime and security: managing the risk to safe shopping. Leicester: : Perpetuity Press 1995.
56
Public disorder and business crime victimization in the retail sector. https://link.springer.com/content/pdf/10.1057/sj.2012.56.pdf
57
Ekblom P, Great Britain. Home Office. Crime Prevention Unit. The prevention of shop theft: an approach through crime analysis. London: : Home Office 1986.
58
Kennedy JP. Shedding Light on Employee Theft’s Dark Figure: A Typology of Employee Theft Nonreporting Rationalizations. Organization Management Journal 2016;13:49–60. doi:10.1080/15416518.2015.1110513
59
Beck, Adrian. Moving beyond shrinkage: developing a definition and typology of total retail loss. Published Online First: 2017.https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_DSPACE2381%2F39492&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,retail%20crime&sortby=rank
60
Guthrie J, Guthrie J, Todd S. Retail crime and loss prevention. Bradford, England: : Emerald Group Publishing 2006.
61
Martin Gill. The Handbook of Security. Second. Palgrave Macmillan Limited 2016. https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=4427344&ppg=351
62
Wall D. Crime and the Internet. Routledge 2003. doi:10.4324/9780203299180
63
International journal of cyber criminology. Published Online First: 2007.https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_ALMA51124799820002746&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,cyber&sortby=rank
64
Shakarian P, Shakarian J, Ruef A. Introduction to cyber-warfare: a multidisciplinary approach. Amsterdam [Netherlands]: : Morgan Kaufmann Publishers, an imprint of Elsevier 2013.
65
Trim PRJ, Upton D. Cyber security culture: counteracting cyber threats through organizational learning and training. Farnham, England: : Gower 2013.
66
Akhgar B, Rearick B, Kumaraguruparan P, et al. Cyber crime and cyber terrorism investigator’s handbook. Waltham, Massachusetts: : Elsevier 2014.
67
Wilson, J. R. Cyber Security expands to meet demands. Military & Aerospace Electronics 2015;26:5–11.http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=111632271&site=ehost-live
68
Jansen, Jurjen1 j.jansen@nhl.nlLeukfeldt, Rutger1 E.R.Leukfeldt@nhl.nl. Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization. International Journal of Cyber Criminology 2016;10:79–91. doi:10.5281/zenodo.58523
69
Where do beliefs about Music Piracy come from and how are they shared? An E... International Journal of Cyber Criminology Published Online First: 2016.http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=117120746&site=ehost-live
70
The 21st Century DarkNet Market: Lessons from the Fall of Silk Road. International Journal of Cyber Criminology Published Online First: 2016.http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=117120750&site=ehost-live
71
Lavorgna, Anita1 A.Lavorgna@soton.ac.ukSergi, Anna2 asergi@essex.ac.uk. Serious, therefore Organised? A Critique of the Emerging ‘Cyber-Organised Crime’ Rhetoric in the United Kingdom. International Journal of Cyber Criminology 2016;10:170–87. doi:10.5281/zenodo.163400
72
Hackers’ Motivations: Testing Schwartz’s Theory of Motivational Types of Va... International Journal of Cyber Criminology Published Online First: 2017.http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=122614546&site=ehost-live
73
Smith F, Ingram G. Organising cyber security in Australia and beyond. Australian Journal of International Affairs 2017;71:642–60. doi:10.1080/10357718.2017.1320972
74
Carrapico H, Barrinha A. The EU as a Coherent (Cyber)Security Actor? JCMS: Journal of Common Market Studies 2017;55:1254–72. doi:10.1111/jcms.12575
75
SpringerLink (Online service). The Handbook of Security. 2nd Edition. London: : Palgrave Macmillan UK 2014. http://dx.doi.org/10.1007/978-1-349-67284-4
76
Chen J, Teng L, Liao Y. Counterfeit Luxuries: Does Moral Reasoning Strategy Influence Consumers’ Pursuit of Counterfeits? Journal of Business Ethics 2018;151:249–64. doi:10.1007/s10551-016-3255-y
77
Sullivan JP. Transnational Crime. In: Kaldor M, Rangelov I, eds. The handbook of global security policy. Chichester, England: : Wiley-Blackwell 2014. 160–74. doi:10.1002/9781118442975.ch9
78
Van de Bunt H, Schoot C van der, Wetenschappelijk Onderzoek- en Documentatiecentrum. Prevention of organised crime: a situational approach. [Den Haag]: : Boom Juridische uitgevers 2003.
79
Wright A. Organised Crime: Concepts, Cases, Controls. 1st ed. Uffculme: : Taylor and Francis 2013. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=449736
80
Edwards A, Edwards A, Gill P. Transnational organised crime: perspectives on global security. London: : Routledge 2003.
81
Beare ME. Encyclopedia of transnational crime and justice. Thousand Oaks, Calif: : SAGE Publications 2012.
82
Awan I, Blakemore B. Policing cyber hate, cyber threats and cyber terrorism. Farnham: : Ashgate 2012.
83
Hua J, Bapna S. How Can We Deter Cyber Terrorism? Information Security Journal: A Global Perspective 2012;21:102–14. doi:10.1080/19393555.2011.647250
84
Andress J, Winterfeld S, Rogers R. Cyber warfare: techniques, tactics and tools for security practitioners. Waltham, Mass: : Syngress 2011. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1463416
85
Winterfeld S, Andress J. The basics of cyber warfare: understanding the fundamentals of cyber warfare in theory and practice. Boston: : Syngress 2013.
86
Shakarian P, Shakarian J, Ruef A. Introduction to cyber-warfare: a multidisciplinary approach. Amsterdam [Netherlands]: : Morgan Kaufmann Publishers, an imprint of Elsevier 2013.
87
Ventre D, Ventre D. Cyber conflict: competing national perspectives. London: : Iste 2012.
88
Creese S. Cyber warfare: a multidisciplinary analysis. London, [England]: : Routledge 2015. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=2058004
89
Jacques S, Rosenfeld R, Wright R, et al. Effects of Prohibition and Decriminalization on Drug Market Conflict. Criminology & Public Policy 2016;15:843–75. doi:10.1111/1745-9133.12218
90
CHAIRMAN JOHNSON OPENING STATEMENT: ‘PREVENTING DRUG TRAFFICKING THROUGH INTERNATIONAL MAIL’. States News Servicehttps://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa449951374&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,preventing%20drug%20trafficking&sortby=rank&facet=searchcreationdate,include,2015%7C,%7C2018&offset=0&pcAvailability=false
91
Preventing human trafficking by empowering aircraft cabin crew. Premium Official Newshttps://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_bcrc540633210&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,preventing%20trafficking&sortby=rank&offset=0&pcAvailability=false
92
Slomski A. Three Bills to Prevent Sex Trafficking. JAMA 2014;311. doi:10.1001/jama.2014.6831
93
Wylie G, McRedmond P. Human trafficking in Europe: character, causes and consequences. New York: : Palgrave Macmillan 2010.
94
Miller, Kevin. Total surveillance, big data, and predictive crime technology: privacy’s perfect storm. Journal of Technology Law & Policy;19.https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_legal398036055&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,Privacy,%20surveillance,%20and%20crime%20prevention&sortby=rank&offset=0&pcAvailability=false
95
Rosenzweig, Paul. Privacy and counter-terrorism: the pervasiveness of data.(Somebody’s Watching Me: Surveillance and Privacy in an Age of National Insecurity). Case Western Reserve Journal of International Law;42.https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa230865687&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,Privacy,%20dataveillance,%20and%20crime%20prevention&sortby=rank&pcAvailability=false
96
Welsh BC, Mudge ME, Farrington DP. Reconceptualizing public area surveillance and crime prevention: Security guards, place managers and defensible space. Security Journal 2010;23:299–319. doi:10.1057/sj.2008.22
97
Norris C, Wilson D. Surveillance, crime, and social control. Aldershot: : Ashgate 2006.
98
United Nations Office on Drugs and Crime. Current practices in electronic surveillance in the investigation of serious and organised crime. New York: : United Nations 2009.
99
Edwards L, Urquhart L. Privacy in public spaces: what expectations of privacy do we have in social media intelligence? International Journal of Law and Information Technology 2016;24:279–310. doi:10.1093/ijlit/eaw007