Affi L and others, ‘Countering Piracy through Private Security in the Horn of Africa: Prospects and Pitfalls’ (2016) 37 Third World Quarterly 934
Akhgar B and others, Cyber Crime and Cyber Terrorism Investigator’s Handbook (Babak Akhgar and others eds, Elsevier 2014)
Andrea. Finney, Violence in the Night-Time Economy : Key Findings in the Research (Home Office 2004) <http://webarchive.nationalarchives.gov.uk/20110218135935/http:/rds.homeoffice.gov.uk/rds/pdfs04/r214.pdf>
Andress J, Winterfeld S and Rogers R, Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (Syngress 2011) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1463416>
ASIS Foundation., ‘Security Journal.’ <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_ALMA51126475410002746&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&isFrbr=true&tab=default_tab&query=any,contains,the%20security%20journal&pcAvailability=false>
Atkinson DR and others, Securing an Urban Renaissance: Crime, Community, and British Urban Policy (Policy Press 2007)
Awan I and Blakemore B, Policing Cyber Hate, Cyber Threats and Cyber Terrorism (Ashgate 2012)
Bamfield J, Shopping and Crime (Palgrave Macmillan 2012) <http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230393554>
Beare ME, Encyclopedia of Transnational Crime and Justice (SAGE Publications 2012)
Beck A and Hopkins M, ‘Scan and Rob! Convenience Shopping, Crime Opportunity and Corporate Social Responsibility in a Mobile World’ (2017) 30 Security Journal 1080
Beck A and Willis A, Crime and Security: Managing the Risk to Safe Shopping (Perpetuity Press 1995)
Beck, Adrian, ‘Moving beyond Shrinkage: Developing a Definition and Typology of Total Retail Loss’ <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_DSPACE2381%2F39492&amp;context=L&amp;vid=44UOLE_NUI&amp;lang=en_US&amp;search_scope=default_scope&amp;adaptor=Local%20Search%20Engine&amp;tab=default_tab&amp;query=any,contains,retail%20crime&amp;sortby=rank>
Beck U, World Risk Society (Polity Press 1999)
——, ‘Living in the World Risk Society’ (2006) 35 Economy and Society 329
Blake H. Liventin, Organized Retail Crime (Nova Science Publishers 2011) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=3018926>
Brands J, Schwanen T and van Aalst I, ‘Fear of Crime and Affective Ambiguities in the Night-Time Economy’ (2015) 52 Urban Studies 439
——, ‘What Are You Looking at? Visitors’ Perspectives on CCTV in the Night-Time Economy’ (2016) 23 European Urban and Regional Studies 23
Brands, Jelle, ‘Safety, Surveillance and Policing in the Night-Time Economy: (Re)Turning to Numbers’ 62 Geoforum <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa421286022&amp;context=PC&amp;vid=44UOLE_NUI〈=en_US&amp;search_scope=default_scope&amp;adaptor=primo_central_multiple_fe&amp;tab=default_tab&amp;query=any,contains,security%20and%20the%20night%20time%20economy&amp;sortby=rank&amp;offset=0&amp;pcAvailability=false>
Bridgeman C and Great Britain. Police Research Group, Crime Risk Management: Making It Work, vol no.70 (Home Office Police Research Group 1996)
Brodeur J, ‘Private Security’, The policing web (Oxford University Press 2010) <http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780199740598.001.0001/acprof-9780199740598-chapter-9>
Burnett J, ‘UK: Racial Violence and the Night-Time Economy’ (2011) 53 Race & Class 100
Button M and Stiernstedt P, ‘Comparing Private Security Regulation in the European Union’ (2018) 28 Policing and Society 398
Campbell S and Currie G, ‘Against Beck’ (2006) 36 Philosophy of the Social Sciences 149
Carrapico H and Barrinha A, ‘The EU as a Coherent (Cyber)Security Actor?’ (2017) 55 JCMS: Journal of Common Market Studies 1254
‘CHAIRMAN JOHNSON OPENING STATEMENT: “PREVENTING DRUG TRAFFICKING THROUGH INTERNATIONAL MAIL”’ States News Service <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa449951374&amp;context=PC&amp;vid=44UOLE_NUI&amp;lang=en_US&amp;search_scope=default_scope&amp;adaptor=primo_central_multiple_fe&amp;tab=default_tab&amp;query=any,contains,preventing%20drug%20trafficking&amp;sortby=rank&amp;facet=searchcreationdate,include,2015%7C,%7C2018&amp;offset=0&amp;pcAvailability=false>
Chen J, Teng L and Liao Y, ‘Counterfeit Luxuries: Does Moral Reasoning Strategy Influence Consumers’ Pursuit of Counterfeits?’ (2018) 151 Journal of Business Ethics 249
Clarke RVG, Situational Crime Prevention: Successful Case Studies (2nd ed, Criminal Justice Press 1997)
Cozens P and Love T, ‘A Review and Current Status of Crime Prevention through Environmental Design (CPTED)’ (2015) 30 Journal of Planning Literature 393
Creese S, Cyber Warfare: A Multidisciplinary Analysis (Routledge 2015) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=2058004>
‘Crime Risk Assessment/Crime Impact Assessment’ <http://www.designagainstcrime.com/files/crimeframeworks/Crime_risk_asssement_EKBLOM.pdf>
Edwards A, Edwards A and Gill P, Transnational Organised Crime: Perspectives on Global Security (Routledge 2003)
Edwards L and Urquhart L, ‘Privacy in Public Spaces: What Expectations of Privacy Do We Have in Social Media Intelligence?’ (2016) 24 International Journal of Law and Information Technology 279
Ekblom P and Great Britain. Home Office. Crime Prevention Unit, The Prevention of Shop Theft: An Approach through Crime Analysis, vol no.5 (Home Office 1986)
Ekblom P and Sidebottom A, ‘What Do You Mean, “Is It Secure?” Redesigning Language to Be Fit for the Task of Assessing the Security of Domestic and Personal Electronic Goods’ (2007) 14 European Journal on Criminal Policy and Research 61
Farrimond H, Boyd K and Fleischer D, ‘Reconfiguring the Violent Encounter? Preloading, Security Staff and Breathalyser Use in the Night-Time Economy’ (2018) 56 International Journal of Drug Policy 108
Gant R and Terry P, ‘Narrative of the Night-out: Student Engagement in the Night-Time Economy of Kingston upon Thames’ (2017) 32 Local Economy: The Journal of the Local Economy Policy Unit 467
Garmany J and Galdeano AP, ‘Crime, Insecurity and Corruption: Considering the Growth of Urban Private Security’ (2018) 55 Urban Studies 1111
Gill ML, Crime at Work: Studies in Security and Crime Prevention, Vol.1 (Perpetuity Press 1994)
——, Crime at Work: Increasing the Risk for Offenders, Vol.2 (Perpetuity Press 1998)
Gunby, Clare, ‘Location, Libation and Leisure: An Examination of the Use of Licensed Venues to Help Challenge Sexual Violence’ <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_DSPACE2381%2F37256&amp;context=L&amp;vid=44UOLE_NUI&amp;lang=en_US&amp;search_scope=default_scope&amp;adaptor=Local%20Search%20Engine&amp;tab=default_tab&amp;query=any,contains,night%20time%20economy&amp;sortby=rank&amp;pcAvailability=false>
Guthrie J, Guthrie J and Todd S, Retail Crime and Loss Prevention, vol 34, no. 11 (Emerald Group Publishing 2006)
‘Hackers’ Motivations: Testing Schwartz’s Theory of Motivational Types of Va...’ [2017] International Journal of Cyber Criminology <http://search.ebscohost.com/login.aspx?direct=true&amp;db=i3h&amp;AN=122614546&amp;site=ehost-live>
Hadfield P and Measham F, ‘The Outsourcing of Control: Alcohol Law Enforcement, Private-Sector Governance and the Evening and Night-Time Economy’ (2015) 52 Urban Studies 517
Higate P, ‘“Cowboys and Professionals”: The Politics of Identity Work in the Private and Military Security Company’ (2012) 40 Millennium: Journal of International Studies 321
Hobbs D, Bouncers : Violence and Governance in the Night-Time Economy
Hua J and Bapna S, ‘How Can We Deter Cyber Terrorism?’ (2012) 21 Information Security Journal: A Global Perspective 102
‘International Journal of Cyber Criminology.’ <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_ALMA51124799820002746&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,cyber&sortby=rank>
Jacques S and others, ‘Effects of Prohibition and Decriminalization on Drug Market Conflict’ (2016) 15 Criminology & Public Policy 843
Jansen, Jurjen1 j.jansen@nhl.nlLeukfeldt, Rutger1 E.R.Leukfeldt@nhl.nl, ‘Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization.’ (2016) 10 International Journal of Cyber Criminology 79 <http://search.ebscohost.com/login.aspx?direct=true&amp;db=i3h&amp;AN=117120749&amp;site=ehost-live>
Kennedy JP, ‘Shedding Light on Employee Theft’s Dark Figure: A Typology of Employee Theft Nonreporting Rationalizations’ (2016) 13 Organization Management Journal 49
Lavorgna, Anita1 A.Lavorgna@soton.ac.ukSergi, Anna2 asergi@essex.ac.uk, ‘Serious, Therefore Organised? A Critique of the Emerging “Cyber-Organised Crime” Rhetoric in the United Kingdom.’ (2016) 10 International Journal of Cyber Criminology 170 <http://search.ebscohost.com/login.aspx?direct=true&amp;db=i3h&amp;AN=119119113&amp;site=ehost-live>
Martin Gill, The Handbook of Security (Second, Palgrave Macmillan Limited 2016) <https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=4427344&amp;ppg=351>
Miller, Kevin, ‘Total Surveillance, Big Data, and Predictive Crime Technology: Privacy’s Perfect Storm’ 19 Journal of Technology Law & Policy <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_legal398036055&amp;context=PC&amp;vid=44UOLE_NUI&amp;lang=en_US&amp;search_scope=default_scope&amp;adaptor=primo_central_multiple_fe&amp;tab=default_tab&amp;query=any,contains,Privacy,%20surveillance,%20and%20crime%20prevention&amp;sortby=rank&amp;offset=0&amp;pcAvailability=false>
Nemeth CP, Private Security and the Law (4th ed, Elsevier Butterworth Heinemann 2012)
Norris C and Wilson D, Surveillance, Crime, and Social Control (Ashgate 2006)
O’Brien K, Hobbs D and Westmarland L, ‘Negotiating Violence and Gender: Security and the Night Time Economy in the UK’, Violence in Europe: historical and contemporary perspectives (Springer 2008) <http://link.springer.com/10.1007/978-0-387-09705-3_10>
O’Malley P, Crime and Risk (Sage 2010) <http://ezproxy.lib.le.ac.uk/login?url=http://knowledge.sagepub.com/view/crime-and-risk/SAGE.xml>
——, Crime and Risk (Sage 2010) <http://ezproxy.lib.le.ac.uk/login?url=http://knowledge.sagepub.com/view/crime-and-risk/SAGE.xml>
Palmer D, Warren I and Miller P, ‘ID Scanners in the Night Time Economy’, 2010 IEEE International Symposium on Technology and Society (IEEE 2010) <http://ieeexplore.ieee.org/document/5514634/>
Pease K and Farrell G, ‘What Have Criminologists Done for Us Lately?’ in ML Gill (ed), The Handbook of Security (2nd Edition, Palgrave Macmillan UK 2014) <http://link.springer.com/10.1007/978-1-349-67284-4_4>
Pennay A, Manton E and Savic M, ‘Geographies of Exclusion: Street Drinking, Gentrification and Contests over Public Space’ (2014) 25 International Journal of Drug Policy 1084
Perry M, ‘Designing Crime Risk Management Systems’, Handbook of Loss Prevention and Crime Prevention (Elsevier 2012) <http://linkinghub.elsevier.com/retrieve/pii/B9780123852465000043>
Perry, Marianna, ‘Proactive vs. Reactive Security: Performing a Risk Assessment Ensures a Proactive Approach to Crime and Loss Prevention.(Safety&Security)’ 104 Buildings <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_bcrc223527650&amp;context=PC&amp;vid=44UOLE_NUI〈=en_US&amp;search_scope=default_scope&amp;adaptor=primo_central_multiple_fe&amp;tab=default_tab&amp;query=any,contains,crime%20risk%20security&amp;sortby=rank>
‘Preventing Human Trafficking by Empowering Aircraft Cabin Crew’ Premium Official News <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_bcrc540633210&amp;context=PC&amp;vid=44UOLE_NUI&amp;lang=en_US&amp;search_scope=default_scope&amp;adaptor=primo_central_multiple_fe&amp;tab=default_tab&amp;query=any,contains,preventing%20trafficking&amp;sortby=rank&amp;offset=0&amp;pcAvailability=false>
‘Public Disorder and Business Crime Victimization in the Retail Sector’ <https://link.springer.com/content/pdf/10.1057/sj.2012.56.pdf>
Raymen T, ‘Designing-in Crime by Designing-out the Social? Situational Crime Prevention and the Intensification of Harmful Subjectivities’ (2016) 56 British Journal of Criminology 497
Rosenzweig, Paul, ‘Privacy and Counter-Terrorism: The Pervasiveness of Data.(Somebody’s Watching Me: Surveillance and Privacy in an Age of National Insecurity)’ 42 Case Western Reserve Journal of International Law <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa230865687&amp;context=PC&amp;vid=44UOLE_NUI&amp;lang=en_US&amp;search_scope=default_scope&amp;adaptor=primo_central_multiple_fe&amp;tab=default_tab&amp;query=any,contains,Privacy,%20dataveillance,%20and%20crime%20prevention&amp;sortby=rank&amp;pcAvailability=false>
Shakarian P, Shakarian J and Ruef A, Introduction to Cyber-Warfare: A Multidisciplinary Approach (Morgan Kaufmann Publishers, an imprint of Elsevier 2013)
——, Introduction to Cyber-Warfare: A Multidisciplinary Approach (Morgan Kaufmann Publishers, an imprint of Elsevier 2013)
Sheard L, ‘“Anything Could Have Happened”: Women, the Night-Time Economy, Alcohol and Drink Spiking’ (2011) 45 Sociology 619
Slomski A, ‘Three Bills to Prevent Sex Trafficking’ (2014) 311 JAMA
Smith F and Ingram G, ‘Organising Cyber Security in Australia and Beyond’ (2017) 71 Australian Journal of International Affairs 642
SpringerLink (Online service), The Handbook of Security (ML Gill ed, 2nd Edition, Palgrave Macmillan UK 2014) <http://dx.doi.org/10.1007/978-1-349-67284-4>
——, The Handbook of Security (ML Gill ed, 2nd Edition, Palgrave Macmillan UK 2014) <http://dx.doi.org/10.1007/978-1-349-67284-4>
Sullivan JP, ‘Transnational Crime’ in Mary Kaldor and Iavor Rangelov (eds), The handbook of global security policy (Wiley-Blackwell 2014) <http://doi.wiley.com/10.1002/9781118442975.ch9>
Talbot D, Regulating the Night: Race, Culture and Exclusion in the Making of the Night-Time Economy (Ashgate 2007)
Tanner, Samuel1Mulone, Massimiliano1, ‘Private Security and Armed Conflict A Case Study of the Scorpions during the Mass Killings in Former Yugoslavia.’ (2013) 53 British Journal of Criminology 41 <http://search.ebscohost.com/login.aspx?direct=true&amp;db=i3h&amp;AN=84194406&amp;site=ehost-live>
‘The 21st Century DarkNet Market: Lessons from the Fall of Silk Road.’ [2016] International Journal of Cyber Criminology <http://search.ebscohost.com/login.aspx?direct=true&amp;db=i3h&amp;AN=117120750&amp;site=ehost-live>
‘The Case for Private Prisons’ <http://www.reform.uk/wp-content/uploads/2014/10/Reform_Ideas_No_2_-_The_case_for_private_prisons.pdf>
‘The Dark Truth about Blackwater’ <https://www.brookings.edu/articles/the-dark-truth-about-blackwater/>
Trim PRJ and Upton D, Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and Training (Gower 2013)
Tseloni A and others, ‘The Effectiveness of Burglary Security Devices’ (2017) 30 Security Journal 646
United Nations Office on Drugs and Crime, Current Practices in Electronic Surveillance in the Investigation of Serious and Organised Crime (United Nations 2009)
Van de Bunt H, Schoot C van der, and Wetenschappelijk Onderzoek- en Documentatiecentrum, Prevention of Organised Crime: A Situational Approach, vol 215 (Boom Juridische uitgevers 2003)
van Steden R, ‘Street Pastors: On Security, Care and Faith in the British Night-Time Economy’ (2018) 15 European Journal of Criminology 403
Vellani K, ‘Chapter 6 Risk Assessments’, Strategic Security Management (Butterworth-Heinemann 2006) <http://www.sciencedirect.com/science/book/9780123708977>
Ventre D and Ventre D, Cyber Conflict: Competing National Perspectives (Iste 2012)
‘Volume 26, Issue 3, July 2013’ Volume 26, Issue 3, July 2013 <https://link.springer.com/journal/41284/26/3/page/1>
Wadds, Phillip, ‘Crime, Policing and (in)Security: Press Depictions of Sydney’s Night-Time Economy’ 27 Current Issues in Criminal Justice 95 <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofg426505174&amp;context=PC&amp;vid=44UOLE_NUI〈=en_US&amp;search_scope=default_scope&amp;adaptor=primo_central_multiple_fe&amp;tab=default_tab&amp;query=any,contains,security%20and%20the%20night%20time%20economy&amp;sortby=rank&amp;offset=0&amp;pcAvailability=false>
Wall D, Crime and the Internet (Routledge 2003) <https://www.taylorfrancis.com/books/9780203299180>
Welsh BC, Mudge ME and Farrington DP, ‘Reconceptualizing Public Area Surveillance and Crime Prevention: Security Guards, Place Managers and Defensible Space’ (2010) 23 Security Journal 299
‘Where Do Beliefs about Music Piracy Come from and How Are They Shared? An E...’ [2016] International Journal of Cyber Criminology <http://search.ebscohost.com/login.aspx?direct=true&amp;db=i3h&amp;AN=117120746&amp;site=ehost-live>
Wilson, J. R., ‘Cyber Security Expands to Meet Demands.’ (2015) 26 Military & Aerospace Electronics 5 <http://search.ebscohost.com/login.aspx?direct=true&amp;db=buh&amp;AN=111632271&amp;site=ehost-live>
Winterfeld S and Andress J, The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice (Syngress 2013)
Wright A, Organised Crime: Concepts, Cases, Controls (1st ed, Taylor and Francis 2013) <http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=449736>
Wylie G and McRedmond P, Human Trafficking in Europe: Character, Causes and Consequences (Palgrave Macmillan 2010)
Zedner L, Security (1st ed, Taylor and Francis 2009) <http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=425617>
——, Security (1st ed, Taylor and Francis 2009) <http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=425617>
Zedner, Lucia, ‘Neither Safe Nor Sound? The Perils and Possibilities of Risk’ 48 Canadian Journal of Criminology and Criminal Justice 423 <https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_museS1911021906304238&amp;context=PC&amp;vid=44UOLE_NUI〈=en_US&amp;search_scope=default_scope&amp;adaptor=primo_central_multiple_fe&amp;tab=default_tab&amp;query=any,contains,neither%20safe%20nor%20sound%20the%20perils%20and%20possibilities%20of%20risk&amp;sortby=rank&amp;offset=0>