1.
Zedner L. Security [Internet]. 1st ed. Florence: Taylor and Francis; 2009. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=425617
2.
O’Malley P. Crime and risk [Internet]. London: Sage; 2010. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://knowledge.sagepub.com/view/crime-and-risk/SAGE.xml
3.
ASIS Foundation. Security journal. 1989; Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_ALMA51126475410002746&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&isFrbr=true&tab=default_tab&query=any,contains,the%20security%20journal&pcAvailability=false
4.
SpringerLink (Online service). The Handbook of Security [Internet]. 2nd Edition. Gill ML, editor. London: Palgrave Macmillan UK; 2014. Available from: http://dx.doi.org/10.1007/978-1-349-67284-4
5.
Pease K, Farrell G. What Have Criminologists Done for Us Lately? In: Gill ML, editor. The Handbook of Security [Internet]. 2nd Edition. London: Palgrave Macmillan UK; 2014. p. 65–88. Available from: http://link.springer.com/10.1007/978-1-349-67284-4_4
6.
Beck U. Living in the world risk society. Economy and Society. 2006 Aug;35(3):329–45.
7.
Beck U. World risk society. Malden, Mass: Polity Press; 1999.
8.
Campbell S, Currie G. Against Beck. Philosophy of the Social Sciences. 2006 Jun;36(2):149–72.
9.
O’Malley P. Crime and risk [Internet]. London: Sage; 2010. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://knowledge.sagepub.com/view/crime-and-risk/SAGE.xml
10.
Zedner L. Security [Internet]. 1st ed. Florence: Taylor and Francis; 2009. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=425617
11.
Cozens P, Love T. A Review and Current Status of Crime Prevention through Environmental Design (CPTED). Journal of Planning Literature. 2015 Nov;30(4):393–412.
12.
Tseloni A, Thompson R, Grove L, Tilley N, Farrell G. The effectiveness of burglary security devices. Security Journal. 2017 May;30(2):646–64.
13.
Perry M. Designing Crime Risk Management Systems. In: Handbook of Loss Prevention and Crime Prevention [Internet]. Elsevier; 2012. p. 49–56. Available from: http://linkinghub.elsevier.com/retrieve/pii/B9780123852465000043
14.
Vellani K. Chapter 6 Risk Assessments. In: Strategic Security Management [Internet]. Butterworth-Heinemann; 2006. p. 109–32. Available from: http://www.sciencedirect.com/science/book/9780123708977
15.
Perry, Marianna. Proactive vs. Reactive security: performing a risk assessment ensures a proactive approach to crime and loss prevention.(Safety&Security). Buildings [Internet]. 104(3). Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_bcrc223527650&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,crime%20risk%20security&sortby=rank
16.
Ekblom P, Sidebottom A. What Do You Mean, ‘Is It Secure?’ Redesigning Language to be Fit for the Task of Assessing the Security of Domestic and Personal Electronic Goods. European Journal on Criminal Policy and Research. 2007 Nov 29;14(1):61–87.
17.
Raymen T. Designing-in Crime by Designing-out the Social? Situational Crime Prevention and the Intensification of Harmful Subjectivities. British Journal of Criminology. 2016 May;56(3):497–514.
18.
Crime risk assessment/crime impact assessment [Internet]. Available from: http://www.designagainstcrime.com/files/crimeframeworks/Crime_risk_asssement_EKBLOM.pdf
19.
Bridgeman C, Great Britain. Police Research Group. Crime risk management: making it work. Vol. no.70. London: Home Office Police Research Group; 1996.
20.
Zedner, Lucia. Neither Safe Nor Sound? The Perils and Possibilities of Risk. Canadian Journal of Criminology and Criminal Justice [Internet]. 48(3):423–34. Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_museS1911021906304238&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,neither%20safe%20nor%20sound%20the%20perils%20and%20possibilities%20of%20risk&sortby=rank&offset=0
21.
Volume 26, Issue 3, July 2013. Volume 26, Issue 3, July 2013 [Internet]. Available from: https://link.springer.com/journal/41284/26/3/page/1
22.
Brodeur J. Private Security. In: The policing web [Internet]. Oxford: Oxford University Press; 2010. p. 255–308. Available from: http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780199740598.001.0001/acprof-9780199740598-chapter-9
23.
Button M, Stiernstedt P. Comparing private security regulation in the European Union. Policing and Society. 2018 May 4;28(4):398–414.
24.
Higate P. ‘Cowboys and Professionals’: The Politics of Identity Work in the Private and Military Security Company. Millennium: Journal of International Studies. 2012 Jan;40(2):321–41.
25.
The Dark Truth about Blackwater [Internet]. Available from: https://www.brookings.edu/articles/the-dark-truth-about-blackwater/
26.
Tanner, Samuel1Mulone, Massimiliano1. Private Security and Armed Conflict A Case Study of the Scorpions during the Mass Killings in Former Yugoslavia. British Journal of Criminology [Internet]. 2013;53(Issue 1):41–58. Available from: http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=84194406&site=ehost-live
27.
The case for private prisons [Internet]. Available from: http://www.reform.uk/wp-content/uploads/2014/10/Reform_Ideas_No_2_-_The_case_for_private_prisons.pdf
28.
Affi L, Elmi AA, Knight WA, Mohamed S. Countering piracy through private security in the Horn of Africa: prospects and pitfalls. Third World Quarterly. 2016 May 3;37(5):934–50.
29.
Garmany J, Galdeano AP. Crime, insecurity and corruption: Considering the growth of urban private security. Urban Studies. 2018 Apr;55(5):1111–20.
30.
Nemeth CP. Private security and the law. 4th ed. Amsterdam: Elsevier Butterworth Heinemann; 2012.
31.
Hadfield P, Measham F. The outsourcing of control: Alcohol law enforcement, private-sector governance and the evening and night-time economy. Urban Studies. 2015 Feb;52(3):517–37.
32.
Brands, Jelle. Safety, surveillance and policing in the night-time economy: (Re)turning to numbers. Geoforum [Internet]. 62. Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa421286022&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,security%20and%20the%20night%20time%20economy&sortby=rank&offset=0&pcAvailability=false
33.
Atkinson DR, Atkinson R, Helms G, University of Glasgow. Dept. of Urban Studies. Securing an urban renaissance: crime, community, and British urban policy. Brisol, U.K.: Policy Press; 2007.
34.
Clarke RVG. Situational crime prevention: successful case studies. 2nd ed. Monsey, N.Y.: Criminal Justice Press; 1997.
35.
Gill ML. Crime at work: increasing the risk for offenders, Vol.2. Leicester: Perpetuity Press; 1998.
36.
Gill ML. Crime at work: studies in security and crime prevention, Vol.1. Leicester: Perpetuity Press; 1994.
37.
Palmer D, Warren I, Miller P. ID scanners in the night time economy. In: 2010 IEEE International Symposium on Technology and Society [Internet]. IEEE; 2010. p. 234–41. Available from: http://ieeexplore.ieee.org/document/5514634/
38.
Wadds, Phillip. Crime, policing and (in)security: press depictions of Sydney’s night-time economy. Current Issues in Criminal Justice [Internet]. 27(1):95–112. Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofg426505174&context=PC&vid=44UOLE_NUI〈=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,security%20and%20the%20night%20time%20economy&sortby=rank&offset=0&pcAvailability=false
39.
O’Brien K, Hobbs D, Westmarland L. Negotiating Violence and Gender: Security and the Night Time Economy in the UK. In: Violence in Europe: historical and contemporary perspectives [Internet]. New York: Springer; 2008. p. 161–73. Available from: http://link.springer.com/10.1007/978-0-387-09705-3_10
40.
Farrimond H, Boyd K, Fleischer D. Reconfiguring the violent encounter? Preloading, security staff and breathalyser use in the night-time economy. International Journal of Drug Policy. 2018 Jun;56:108–15.
41.
van Steden R. Street Pastors: On security, care and faith in the British night-time economy. European Journal of Criminology. 2018 Jul;15(4):403–20.
42.
Gant R, Terry P. Narrative of the night-out: Student engagement in the night-time economy of Kingston upon Thames. Local Economy: The Journal of the Local Economy Policy Unit. 2017 Aug;32(5):467–81.
43.
Brands J, Schwanen T, van Aalst I. What are you looking at? Visitors’ perspectives on CCTV in the night-time economy. European Urban and Regional Studies. 2016 Jan;23(1):23–39.
44.
Gunby, Clare. Location, Libation and Leisure: An examination of the use of licensed venues to help challenge sexual violence. 2016; Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_DSPACE2381%2F37256&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,night%20time%20economy&sortby=rank&pcAvailability=false
45.
Talbot D. Regulating the night: race, culture and exclusion in the making of the night-time economy. Aldershot: Ashgate; 2007.
46.
Andrea. Finney. Violence in the night-time economy : key findings in the research [Internet]. London: Home Office; 2004. Available from: http://webarchive.nationalarchives.gov.uk/20110218135935/http:/rds.homeoffice.gov.uk/rds/pdfs04/r214.pdf
47.
Burnett J. UK: racial violence and the night-time economy. Race & Class. 2011 Jul;53(1):100–6.
48.
Sheard L. ‘Anything Could Have Happened’: Women, the Night-time Economy, Alcohol and Drink Spiking. Sociology. 2011 Aug;45(4):619–33.
49.
Hobbs D. Bouncers : violence and governance in the night-time economy.
50.
Brands J, Schwanen T, van Aalst I. Fear of crime and affective ambiguities in the night-time economy. Urban Studies. 2015 Feb;52(3):439–55.
51.
Pennay A, Manton E, Savic M. Geographies of exclusion: Street drinking, gentrification and contests over public space. International Journal of Drug Policy. 2014 Nov;25(6):1084–93.
52.
Beck A, Hopkins M. Scan and rob! Convenience shopping, crime opportunity and corporate social responsibility in a mobile world. Security Journal. 2017 Oct;30(4):1080–96.
53.
Bamfield J. Shopping and crime [Internet]. Basingstoke: Palgrave Macmillan; 2012. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230393554
54.
Blake H. Liventin. Organized retail crime [Internet]. New York: Nova Science Publishers; 2011. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=3018926
55.
Beck A, Willis A. Crime and security: managing the risk to safe shopping. Leicester: Perpetuity Press; 1995.
56.
Public disorder and business crime victimization in the retail sector [Internet]. Available from: https://link.springer.com/content/pdf/10.1057/sj.2012.56.pdf
57.
Ekblom P, Great Britain. Home Office. Crime Prevention Unit. The prevention of shop theft: an approach through crime analysis. Vol. no.5. London: Home Office; 1986.
58.
Kennedy JP. Shedding Light on Employee Theft’s Dark Figure: A Typology of Employee Theft Nonreporting Rationalizations. Organization Management Journal. 2016 Jan 2;13(1):49–60.
59.
Beck, Adrian. Moving beyond shrinkage: developing a definition and typology of total retail loss. 2017; Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_DSPACE2381%2F39492&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,retail%20crime&sortby=rank
60.
Guthrie J, Guthrie J, Todd S. Retail crime and loss prevention. Vol. 34, no. 11. Bradford, England: Emerald Group Publishing; 2006.
61.
Martin Gill. The Handbook of Security [Internet]. Second. Palgrave Macmillan Limited; 2016. Available from: https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=4427344&ppg=351
62.
Wall D. Crime and the Internet [Internet]. Routledge; 2003. Available from: https://www.taylorfrancis.com/books/9780203299180
63.
International journal of cyber criminology. 2007; Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=44UOLE_ALMA51124799820002746&context=L&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=Local%20Search%20Engine&tab=default_tab&query=any,contains,cyber&sortby=rank
64.
Shakarian P, Shakarian J, Ruef A. Introduction to cyber-warfare: a multidisciplinary approach. Amsterdam [Netherlands]: Morgan Kaufmann Publishers, an imprint of Elsevier; 2013.
65.
Trim PRJ, Upton D. Cyber security culture: counteracting cyber threats through organizational learning and training. Farnham, England: Gower; 2013.
66.
Akhgar B, Rearick B, Kumaraguruparan P, Rogers M. Cyber crime and cyber terrorism investigator’s handbook. Akhgar B, Staniforth A, Bosco FM, Elliot S, editors. Waltham, Massachusetts: Elsevier; 2014.
67.
Wilson, J. R. Cyber Security expands to meet demands. Military & Aerospace Electronics [Internet]. 2015;26(Issue 12):5–11. Available from: http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=111632271&site=ehost-live
68.
Jansen, Jurjen1 j.jansen@nhl.nlLeukfeldt, Rutger1 E.R.Leukfeldt@nhl.nl. Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization. International Journal of Cyber Criminology [Internet]. 2016;10(Issue 1):79–91. Available from: http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=117120749&site=ehost-live
69.
Where do beliefs about Music Piracy come from and how are they shared? An E... International Journal of Cyber Criminology [Internet]. 2016; Available from: http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=117120746&site=ehost-live
70.
The 21st Century DarkNet Market: Lessons from the Fall of Silk Road. International Journal of Cyber Criminology [Internet]. 2016; Available from: http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=117120750&site=ehost-live
71.
Lavorgna, Anita1 A.Lavorgna@soton.ac.ukSergi, Anna2 asergi@essex.ac.uk. Serious, therefore Organised? A Critique of the Emerging ‘Cyber-Organised Crime’ Rhetoric in the United Kingdom. International Journal of Cyber Criminology [Internet]. 2016;10(Issue 2):170–87. Available from: http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=119119113&site=ehost-live
72.
Hackers’ Motivations: Testing Schwartz’s Theory of Motivational Types of Va... International Journal of Cyber Criminology [Internet]. 2017; Available from: http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=122614546&site=ehost-live
73.
Smith F, Ingram G. Organising cyber security in Australia and beyond. Australian Journal of International Affairs. 2017 Nov 2;71(6):642–60.
74.
Carrapico H, Barrinha A. The EU as a Coherent (Cyber)Security Actor? JCMS: Journal of Common Market Studies. 2017 Nov;55(6):1254–72.
75.
SpringerLink (Online service). The Handbook of Security [Internet]. 2nd Edition. Gill ML, editor. London: Palgrave Macmillan UK; 2014. Available from: http://dx.doi.org/10.1007/978-1-349-67284-4
76.
Chen J, Teng L, Liao Y. Counterfeit Luxuries: Does Moral Reasoning Strategy Influence Consumers’ Pursuit of Counterfeits? Journal of Business Ethics. 2018 Aug;151(1):249–64.
77.
Sullivan JP. Transnational Crime. In: Kaldor M, Rangelov I, editors. The handbook of global security policy [Internet]. Chichester, England: Wiley-Blackwell; 2014. p. 160–74. Available from: http://doi.wiley.com/10.1002/9781118442975.ch9
78.
Van de Bunt H, Schoot C van der, Wetenschappelijk Onderzoek- en Documentatiecentrum. Prevention of organised crime: a situational approach. Vol. 215. [Den Haag]: Boom Juridische uitgevers; 2003.
79.
Wright A. Organised Crime: Concepts, Cases, Controls [Internet]. 1st ed. Uffculme: Taylor and Francis; 2013. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=449736
80.
Edwards A, Edwards A, Gill P. Transnational organised crime: perspectives on global security. London: Routledge; 2003.
81.
Beare ME. Encyclopedia of transnational crime and justice. Thousand Oaks, Calif: SAGE Publications; 2012.
82.
Awan I, Blakemore B. Policing cyber hate, cyber threats and cyber terrorism. Farnham: Ashgate; 2012.
83.
Hua J, Bapna S. How Can We Deter Cyber Terrorism? Information Security Journal: A Global Perspective. 2012 Jan;21(2):102–14.
84.
Andress J, Winterfeld S, Rogers R. Cyber warfare: techniques, tactics and tools for security practitioners [Internet]. Waltham, Mass: Syngress; 2011. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1463416
85.
Winterfeld S, Andress J. The basics of cyber warfare: understanding the fundamentals of cyber warfare in theory and practice. Boston: Syngress; 2013.
86.
Shakarian P, Shakarian J, Ruef A. Introduction to cyber-warfare: a multidisciplinary approach. Amsterdam [Netherlands]: Morgan Kaufmann Publishers, an imprint of Elsevier; 2013.
87.
Ventre D, Ventre D. Cyber conflict: competing national perspectives. London: Iste; 2012.
88.
Creese S. Cyber warfare: a multidisciplinary analysis [Internet]. London, [England]: Routledge; 2015. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=2058004
89.
Jacques S, Rosenfeld R, Wright R, van Gemert F. Effects of Prohibition and Decriminalization on Drug Market Conflict. Criminology & Public Policy. 2016 Aug;15(3):843–75.
90.
CHAIRMAN JOHNSON OPENING STATEMENT: ‘PREVENTING DRUG TRAFFICKING THROUGH INTERNATIONAL MAIL’. States News Service [Internet]. Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa449951374&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,preventing%20drug%20trafficking&sortby=rank&facet=searchcreationdate,include,2015%7C,%7C2018&offset=0&pcAvailability=false
91.
Preventing human trafficking by empowering aircraft cabin crew. Premium Official News [Internet]. Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_bcrc540633210&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,preventing%20trafficking&sortby=rank&offset=0&pcAvailability=false
92.
Slomski A. Three Bills to Prevent Sex Trafficking. JAMA. 2014 Jun 11;311(22).
93.
Wylie G, McRedmond P. Human trafficking in Europe: character, causes and consequences. New York: Palgrave Macmillan; 2010.
94.
Miller, Kevin. Total surveillance, big data, and predictive crime technology: privacy’s perfect storm. Journal of Technology Law & Policy [Internet]. 19(1). Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_legal398036055&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,Privacy,%20surveillance,%20and%20crime%20prevention&sortby=rank&offset=0&pcAvailability=false
95.
Rosenzweig, Paul. Privacy and counter-terrorism: the pervasiveness of data.(Somebody’s Watching Me: Surveillance and Privacy in an Age of National Insecurity). Case Western Reserve Journal of International Law [Internet]. 42(3). Available from: https://librarysearch.le.ac.uk/primo-explore/fulldisplay?docid=TN_gale_ofa230865687&context=PC&vid=44UOLE_NUI&lang=en_US&search_scope=default_scope&adaptor=primo_central_multiple_fe&tab=default_tab&query=any,contains,Privacy,%20dataveillance,%20and%20crime%20prevention&sortby=rank&pcAvailability=false
96.
Welsh BC, Mudge ME, Farrington DP. Reconceptualizing public area surveillance and crime prevention: Security guards, place managers and defensible space. Security Journal. 2010 Oct;23(4):299–319.
97.
Norris C, Wilson D. Surveillance, crime, and social control. Aldershot: Ashgate; 2006.
98.
United Nations Office on Drugs and Crime. Current practices in electronic surveillance in the investigation of serious and organised crime. New York: United Nations; 2009.
99.
Edwards L, Urquhart L. Privacy in public spaces: what expectations of privacy do we have in social media intelligence? International Journal of Law and Information Technology. 2016 Sep;24(3):279–310.