1.
Gill ML. The Handbook of Security. Second edition. Palgrave Macmillan; 2014. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
2.
Crane A, Matten D. Business Ethics: Managing Corporate Citizenship and Sustainability in the Age of Globalization. 3rd ed. Oxford University Press; 2010.
3.
Lowry PB, Posey C, Roberts TL, Bennett RJ. Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse. Journal of Business Ethics. 2014;121(3):385-401. doi:10.1007/s10551-013-1705-3
4.
BBC - Search results for bae systems fined. http://www.bbc.co.uk/search?q=bae%20systems%20fined
5.
BAE Systems. Our Ethics Programme. Published online 2015. https://www.baesystems.com/cs/Satellite?c=BAEMedia_C&childpagename=UK%2FBAELayout&cid=1434554840982&pagename=UKWrapper
6.
Thomas Cook boss apologises over Corfu gas deaths - BBC News. http://www.bbc.co.uk/news/uk-england-leeds-32809770
7.
Thomas Cook CEO refuses to say sorry for deaths as ex-boss declines questions | UK news | The Guardian. http://www.theguardian.com/uk-news/2015/may/07/ex-thomas-cook-boss-refuses-to-answer-questions-over-childrens-deaths
8.
Thomas Cook shares crash after Harriet Green is pushed out | Business | The Guardian. http://www.theguardian.com/business/2014/nov/26/thomas-cook-chief-harriet-green-shock-departure
9.
praxiom. ISO 9000 2015 Definitions in Plain English. https://www.iso.org/obp/ui/#iso:std:iso:9000:ed-4:v1:en
10.
The Social Responsibility of Business is to Increase its Profits, by Milton Friedman. http://umich.edu/~thecore/doc/Friedman.pdf
11.
Qualityguru. History of Quality. https://www.qualitygurus.com/history-of-quality/
12.
Red Bead Experiment with Dr. W. Edwards Deming. Published online 25AD. https://www.youtube.com/watch?v=ckBfbvOXDvU
13.
ASIS International. Standards and guidelines, quick reference guide. Published online 2010. https://www.asisonline.org/globalassets/standards-and-guidelines/documents/sgquickreferenceguide.pdf
14.
Dr. Marc Siegel discusses international security standards and ISO 31000 Risk Management. Published online 2012. https://www.youtube.com/watch?v=YbmEOqKGBXI&list=PL4E7A1651D7987B82&index=9
15.
ASIS International. Security management standard: Physical asset protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
16.
British Standards Institution. Security Management: Strategic and Operational Guidelines. Vol BS 16000:2015. BSI; 2015. https://edoc.site/bs-16000-2015-pdf-free.html
17.
ASIS International. Security management standard: Physical asset protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
18.
ASIS International. Security Management Standard: Physical Asset Protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
19.
ASIS International. Security Management Standard: Physical Asset Protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
20.
Deloitte. Sharp rise in estimated costs of implementing new global insurance accounting standards | Deloitte UK. https://www2.deloitte.com/uk/en/pages/press-releases/archive-press-release/sharp-rise-in-estimated-costs-of-implementing-new-global-insurance-accounting-standards.html
21.
Chartered Institute of Management Accountants. Simple, practical proposals for better reporting of corporate governance. http://www.cimaglobal.com/Documents/Thought_leadership_docs/Governance/Report-Leadership-Corporate-Governance-Report.pdf
22.
Cadbury A. The Financial Aspects of Corporate Governance. https://www.frc.org.uk/getattachment/9c19ea6f-bcc7-434c-b481-f2e29c1c271a/The-Financial-Aspects-of-Corporate-Governance-(the-Cadbury-Code).pdf
23.
Bevir M. The SAGE Handbook of Governance. SAGE; 2011. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529
24.
Bevir M. Interpreting Global Security. Vol Routledge advances in international relations and global politics. Routledge; 2013. https://ebookcentral.proquest.com/lib/leicester/detail.action?pq-origsite=primo&docID=1344595
25.
Hoogenboom AB. The Governance of Policing and Security: Ironies, Myths and Paradoxes. Vol Crime prevention and security management. Palgrave Macmillan; 2010. http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=346934
26.
Bevir M. The SAGE Handbook of Governance. SAGE; 2011. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529
27.
Hyde company fined over worker’s 40ft death plunge - BBC News. http://www.bbc.co.uk/news/uk-england-manchester-18931390
28.
Rhodes RAW. Understanding Governance: Ten Years On. Organization Studies. 2007;28(8):1243-1264. doi:10.1177/0170840607076586
29.
Mullins LJ, Christy G. Management and Organisational Behaviour. 11th ed. Pearson Education; 2016. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113
30.
Elliott D, Swartz E, Herbane B. Business Continuity Management: A Crisis Management Approach. 2nd ed. Routledge; 2010. http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=308099
31.
A Summary of the GM Recall of Chevrolet Cobalts and Other Cars | New Republic. https://newrepublic.com/article/117224/summary-gm-recall-chevrolet-cobalts-and-other-cars
32.
GM: Steps to a recall nightmare - CNNMoney. http://money.cnn.com/infographic/pf/autos/gm-recall-timeline/
33.
GM Ignition Update - United States - Home. http://www.gmignitionupdate.com/product/public/us/en/GMIgnitionUpdate/index.html
34.
Better Ignition Switch Would Have Cost GM 90 Cents. Published online 2AD. https://www.youtube.com/watch?v=op4UlpNo0D0&feature=youtu.be
35.
A mammoth guilt trip; Criminalising the American company. The Economist. http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?p=EAIM&u=leicester&id=GALE|A380327111&v=2.1&it=r&sid=summon&userGroup=leicester&authCount=1
36.
James Gobert. The Corporate Manslaughter and Corporate Homicide Act 2007: Thirteen Years in the Making but Was It Worth the Wait? The Modern Law Review. 2008;71(3):413-433. http://www.jstor.org/stable/25151209?pq-origsite=summon&seq=1#page_scan_tab_contents
37.
Pieth M, Ivory R. Corporate Criminal Liability: Emergence, Convergence, and Risk. Vol Ius gentium. Springer; 2011. http://ezproxy.lib.le.ac.uk/login?url=http://site.ebrary.com/lib/leicester/detail.action?docID=10465362
38.
Allens Arthur Robinson. CORPORATE CULTURE’ AS A BASIS FOR THE CRIMINAL LIABILITY OF CORPORATIONS. http://www.reports-and-materials.org/sites/default/files/reports-and-materials/Allens-Arthur-Robinson-Corporate-Culture-paper-for-Ruggie-Feb-2008.pdf
39.
Mullins LJ, Christy G. Management and Organisational Behaviour. 11th ed. Pearson Education; 2016. https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=5175113&ppg=8
40.
Hopkin P. Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management. 2nd ed. Kogan Page; 2012.
41.
Improving safety and health at work through a Decent Work Agenda (short version). Published online 2012. https://www.youtube.com/watch?v=_4gX5ue2_dA&list=PL994662ED670AB984&index=22
42.
EN - European Agency for Safety and Health at Work: What we do. Published online 2014. https://www.youtube.com/watch?v=Nu2fR-J7zxA
43.
Locke RM. The Promise and Limits of Private Power: Promoting Labor Standards in a Global Economy. Vol Cambridge studies in comparative politics. Cambridge University Press; 2013. http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=566170
44.
United Nations. Human Security Presentation. Published online 2011. https://docs.unocha.org/sites/dms/HSU/Publications%20and%20Products/Human%20Security%20Tools/Human%20Security%20Presentation.pdf
45.
United Nations. Human Security Unit Strategic Plan 2014-2017. https://drive.google.com/file/d/1DZ0kGYD3RG5zWWyiC3abSE2rYnw_XFi3/view
46.
United Nations. Human Security - A New Response to Complex Threats. Published online 2013. https://www.youtube.com/watch?v=axb0KkB2Le4
47.
Roland Paris. Human Security: Paradigm Shift or Hot Air? International Security. 2001;26(2):87-102. http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/3092123?pq-origsite=summon&seq=1#page_scan_tab_contents
48.
A Brief History of the Responsibility to Protect (R2P). Published online 2013. https://www.youtube.com/watch?v=zql34A4elhY
49.
Keeler C. The End of the Responsibility to Protect? | Foreign Policy Journal. http://www.foreignpolicyjournal.com/2011/10/12/the-end-of-the-responsibility-to-protect/
50.
Paris R. Is it possible to meet the Responsibility to Protect? https://www.washingtonpost.com/blogs/monkey-cage/wp/2014/12/09/is-it-possible-to-meet-the-responsibility-to-protect/
51.
Wolf KD, Deitelhoff N, Engert S. Corporate Security Responsibility: Towards a Conceptual Framework for a Comparative Research Agenda. Cooperation and Conflict. 2007;42(3):294-320. doi:10.1177/0010836707079934
52.
D. C. Seyle. Business Participation in the Responsibility to Protect. Published online 2013. http://oefresearch.org/publications/business-participation-responsibility-protect?page=4
53.
Data Protection Act 2018. http://www.legislation.gov.uk/ukpga/2018/12/contents/enacted
54.
General Data Protection Regulation (GDPR) – Final text neatly arranged. https://gdpr-info.eu/
55.
Serious Crime Act 2015. http://www.legislation.gov.uk/ukpga/2015/9/part/2/enacted
56.
James S. Can legislation stop cyber crime? http://www.computerweekly.com/opinion/Can-legislation-stop-cyber-crime
57.
Clarke RA, Knake RK. Cyber War: The next Threat to National Security and What to Do about It. Ecco; 2012. https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=8531520750002746&institutionId=2746&customerId=2745
58.
Framework for Improving Critical Infrastructure Cybersecurity. Version 1.0. https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
59.
Gill ML. The Handbook of Security. Palgrave Macmillan; 2014. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
60.
State sponsored cyber-attacks happen more and more often - Kaspersky. Published online 24AD. https://www.youtube.com/watch?v=lPRowgkd6UE
61.
Souppaya M, Scarfone K. NIST Special Publication 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf
62.
2015 Information security breaches survey - PwC UK. https://www.pwc.co.uk/assets/pdf/2015-isbs-technical-report-blue-digital.pdf
63.
Martin J. Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’. Criminology and Criminal Justice. 2014;14(3):351-367. doi:10.1177/1748895813505234
64.
Whitty M. Anatomy of the Online Dating Romance Scam. http://webcache.googleusercontent.com/search?q=cache:bl10jY6RxwEJ:esrc-files.s3.amazonaws.com/outputs/1rP2bpwo6keXPqVRhVIpZg/GhkDoD8Lik631sEw4Wsscg.pdf+&cd=3&hl=en&ct=clnk&gl=uk
65.
North Korea behind Sony Pictures hack? - CNN Video. https://edition.cnn.com/videos/world/2014/12/03/tsr-dnt-todd-north-korea-sony.cnn
66.
The cyber hell - Eugene Kaspersky on the 3rd annual International Cyber Security Conference. Published online 12AD. https://www.youtube.com/watch?v=2NSl9aWm9pI
67.
A Year is a Short Time in Cyber-Space, in Cyber Security 2.0: Reflections on UK/EU Cyber Security co-operation. https://www.academia.edu/9463801/A_Year_is_a_Short_Time_in_Cyber-Space_in_Cyber_Security_2.0_Reflections_on_UK_EU_Cyber-Security_Co-Operation
68.
Teuber C. EuroDynamics. Published 2012. http://archive.constantcontact.com/fs017/1104610489911/archive/1109045378919.html
69.
Kinslow J. Physical and IT Security. Journal of Security Education. 2006;2(1):75-91. doi:10.1300/J460v02n01_06
70.
Bates S. Corporate Security: Managing the Risk Across the Security Continuum. http://content.yudu.com/Library/A3gduo/SECURITY/resources/2.htm?skipFlashCheck=true
71.
Kytle B, Ruggie J. Corporate Social Responsibility as Risk Management: A Model for Multinationals. https://sites.hks.harvard.edu/m-rcbg/CSRI/publications/workingpaper_10_kytle_ruggie.pdf
72.
Mullins LJ, Christy G. Management and Organisational Behaviour. 11th ed. Pearson Education; 2016. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113
73.
Sandra Waddock. Building a New Institutional Infrastructure for Corporate Responsibility. Academy of Management Perspectives. 2008;22(3):87-108. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/27747465?pq-origsite=summon&seq=1#page_scan_tab_contents
74.
Elisabet Garriga and Domènec Melé. Corporate Social Responsibility Theories: Mapping the Territory. Journal of Business Ethics. 2004;53(1):51-71. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/25123282?pq-origsite=summon&seq=1#page_scan_tab_contents
75.
It’s Hard to Be Good. http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=buh&AN=67002622&site=ehost-live
76.
Levi M. The Phantom Capitalists: The Organization and Control of Long-Firm Fraud. Rev. ed. Ashgate; 2008. https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903550830002746&institutionId=2746&customerId=2745
77.
Geneva Academy. The International Code of Conduct for Private Security Service Providers. https://icoca.ch/sites/all/themes/icoca/assets/icoc_english3.pdf
78.
Gill ML. The Handbook of Security. Second edition. Palgrave Macmillan; 2014. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
79.
Netherlands International Law Review. 2015;62(Issue 1):119-140. doi:10.1007/s40802-015-0017-y
80.
Ford Motors, CSR and Brand Reputation Management - 3BL Media Special Edition. Published online 7AD. https://www.youtube.com/watch?v=ts9IEVqtYdU&feature=youtu.be
81.
Reputation Institute | Reputation Measurement & Stakeholder Management. http://www.reputationinstitute.com/
82.
Hopkin P. Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management. 2nd ed. Kogan Page; 2012.
83.
Airmic. Defining and managing reputation risk A framework for risk managers. https://www.yumpu.com/en/document/view/54493098/defining-and-managing-reputation-risk
84.
Kaye L. Five Years After Deepwater Horizon, Can BP Repair Its Reputation? | Sustainable Brands. http://www.sustainablebrands.com/news_and_views/marketing_comms/leon_kaye/five_years_after_deepwater_horizon_can_bp_repair_its_reputa
85.
Epstein-Reevers J. A Tale Of Two CEOs, BP vs. Massey: Part I, BP - Forbes. http://www.forbes.com/sites/csr/2010/05/19/a-tale-of-two-ceos-bp-vs-massey-part-i-bp/#1aed251d4ca1
86.
Cherry, M.; Sneirson, J. Beyond Profit: Rethinking Corporate Social Responsibility and Greenwashing after the BP Oil Disaster. Tulane Law Review. 2011;85(4):983-1038. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tulr85&id=991
87.
Matejek S, Gössling T. Beyond Legitimacy: A Case Study in BP’s "Green Lashing”. Journal of Business Ethics. 2014;120(4):571-584. doi:10.1007/s10551-013-2006-6
88.
Sustainability | BP Global. http://www.bp.com/en/global/corporate/sustainability.html
89.
Gulf environmental restoration | Gulf commitment | BP U.S. https://www.bp.com/en_us/bp-us/community/commitment-to-the-gulf-of-mexico/gulf-environmental-restoration.html
90.
Button M. Doing Security: Critical Reflections and an Agenda for Change. Vol Crime prevention and security management. Palgrave Macmillan; 2008. http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230583634
91.
Loader I, Goold B, Thumala A. The moral economy of security. Theoretical Criminology. 2014;18(4):469-488. doi:10.1177/1362480614531613
92.
Smith MJ, White A. The paradox of security regulation: public protection versus normative legitimation. Policy & Politics. 2014;42(3):421-437. doi:10.1332/030557312X655495
93.
Walby K, Lippert RK, eds. Corporate Security in the 21st Century: Theory and Practice in International Perspective. Vol Crime prevention and security management. Palgrave Macmillan; 2014. http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1725804
94.
Olympics Security, Seventh Report of Session 2012–13. http://www.publications.parliament.uk/pa/cm201213/cmselect/cmhaff/531/531.pdf
95.
Prenzler T. Policing and Security in Practice: Challenges and Achievements. Vol Crime prevention and security management. Palgrave Macmillan; 2012. http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9781137007780
96.
Gill ML. The Handbook of Security. Palgrave Macmillan; 2006. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
97.
State Regulation concerning Civilian Private Security Services and their Contribution to Crime Prevention and Community Safety. http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/Ebook0.pdf
98.
Shearing C, Wood J. Governing security for common goods. International Journal of the Sociology of Law. 2003;31(3):205-225. doi:10.1016/j.ijsl.2003.09.005
99.
Loader I, White A. How can we better align private security with the public interest? Towards a civilizing model of regulation. Regulation & Governance. Published online 2015:n/a-n/a. doi:10.1111/rego.12109
100.
White A. The impact of the Private Security Industry Act 2001. Security Journal. 2015;28(4):425-442. doi:10.1057/sj.2012.53
101.
Meehan B, Benson BL. The occupations of regulators influence occupational regulation: evidence from the US private security industry. Public Choice. 2015;162(1-2):97-117. doi:10.1007/s11127-014-0203-1
102.
O’Connor D, Lippert R, Spencer D, Smylie L. Seeing private security like a state. Criminology and Criminal Justice. 2008;8(2):203-226. doi:10.1177/1748895808088995
103.
Private Security Services in Europe. http://www.coess.org/download.php?down=Li9kb2N1bWVudHMvZmYtMjAxMy1wcml2YXRlLXNlY3VyaXR5LXNlcnZpY2VzLWluLWV1cm9wZS1jb2Vzcy1mYWN0cy1hbmQtZmlndXJlcy5wZGY.
104.
Quirk H, Seddon T, Smith G. Regulation and Criminal Justice: Innovations in Policy and Research. Cambridge University Press; 2010. https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903547230002746&institutionId=2746&customerId=2745
105.
White A. Post-crisis Policing and Public–Private Partnerships. British Journal of Criminology. 2014;54(6):1002-1022. doi:10.1093/bjc/azu063
106.
Leeson N, Whitley E. Rogue Trader. Updated edition. Sphere; 2015.
107.
Nick Leeson Keynote Speaker. Published online 14 December 2012. https://www.youtube.com/watch?v=Vfz5HlYkDi8
108.
Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf
109.
Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf
110.
Lynn T. Drennan. Ethics, Governance and Risk Management: Lessons from Mirror Group Newspapers and Barings Bank. Journal of Business Ethics. 2004;52(3):257-266. http://www.jstor.org/stable/25123254?pq-origsite=summon&seq=1#page_scan_tab_contents
111.
Robert Francis: Insights into the Mid Staffordshire inquiry. Published online 14AD. https://www.youtube.com/watch?v=2dtCz3OFcSM
112.
SteCooper. Hillsborough - The Search for Truth. Published online 11AD. https://www.youtube.com/watch?v=tmW1xz6jJGw
113.
Football Licensing Authority. Guide to Safety at Sports Grounds. https://www.raithrovers.net/files/GuidetoSafetyatSportsGrounds.pdf
114.
Taylor S. The Hillsborough stadium disaster: 15 April 1989: inquiry by the Rt Hon Lord Justice Taylor: final report: presented to Parliament by the Secretary of State for the Home Department by command of Her Majesty January 1990. https://www.scribd.com/document/69424889/Hills-Borough-Stadium-Disaster-Final-Report
115.
Hillsborough Independent Panel. Hillsborough, The Report of the Hillsborough Independent Panel. https://www.gov.uk/government/publications/the-report-of-the-hillsborough-independent-panel
116.
Uff J. The Southall rail accident inquiry report. http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf
117.
Jeffcott S, Pidgeon N, Weyman A, Walls J. Risk, Trust, and Safety Culture in U.K. Train Operating Companies. Risk Analysis. 2006;26(5):1105-1121. doi:10.1111/j.1539-6924.2006.00819.x
118.
Uff J. The Southall rail accident inquiry report. http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf
119.
Almond P, ebrary, Inc. Corporate Manslaughter and Regulatory Reform. Vol Crime prevention and security management. Palgrave Macmillan; 2013. http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1109223
120.
Gobert J. The Corporate Manslaughter and Corporate Homicide Act 2007 – Thirteen years in the making but was it worth the wait? Modern Law Review. 2008;71(3):413-433. doi:10.1111/j.1468-2230.2008.00699.x
121.
Francis R. Report of the Mid Staffordshire NHS Foundation Trust Public Inquiry: executive summary HC 947, Session 2012-2013 - 0947.pdf. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/279124/0947.pdf
122.
Robert Francis: Insights into the Mid Staffordshire inquiry. Published online 14AD. https://www.youtube.com/watch?v=2dtCz3OFcSM
123.
Department of Health. Patients First and Foremost. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/170701/Patients_First_and_Foremost.pdf
124.
Cranfield School of Management. Mid Staffordshire Hospital: Making the Right Changes. Published online 20AD. https://www.youtube.com/watch?v=7152JFhYfBU
125.
Endorf C. Outsourcing Security: The Need, the Risks, the Providers, and the Process. Information Systems Security. 2004;12(6):17-23. doi:10.1201/1086/44022.12.6.20040101/79782.4
126.
Marin C. An Old Debate in a New Setting: In-House Versus Outsourced Security Staff in the Context of International Organizations. Journal of Applied Security Research. 2013;8(4):510-550. doi:10.1080/19361610.2013.825756
127.
Gray A. Out-sourcing Security. https://www.emeraldinsight.com/doi/pdfplus/10.1108/EUM0000000002194
128.
Willcocks L, Oshri I, Hindle J. To bundle or not to bundle? Effective decision-making for business and IT services. http://www.globalsourcing.org.uk/Report_Downloads/BundleOrNot.pdf
129.
Single Service or Bundle: Practitioner Perspectives on What Makes the Best ... Journal of Physical Security. Published online 2015. https://rbsekurity.com/the-journal-of-physical-security.html