2015 Information security breaches survey - PwC UK. (n.d.). https://www.pwc.co.uk/assets/pdf/2015-isbs-technical-report-blue-digital.pdf
A Brief History of the Responsibility to Protect (R2P). (2013). https://www.youtube.com/watch?v=zql34A4elhY
A mammoth guilt trip; Criminalising the American company. (n.d.). The Economist. http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?p=EAIM&u=leicester&id=GALE|A380327111&v=2.1&it=r&sid=summon&userGroup=leicester&authCount=1
A Summary of the GM Recall of Chevrolet Cobalts and Other Cars | New Republic. (n.d.). https://newrepublic.com/article/117224/summary-gm-recall-chevrolet-cobalts-and-other-cars
A Year is a Short Time in Cyber-Space, in Cyber Security 2.0: Reflections on UK/EU Cyber Security co-operation. (n.d.). https://www.academia.edu/9463801/A_Year_is_a_Short_Time_in_Cyber-Space_in_Cyber_Security_2.0_Reflections_on_UK_EU_Cyber-Security_Co-Operation
Airmic. (n.d.-a). Defining and managing reputation risk A framework for risk managers. https://www.yumpu.com/en/document/view/54493098/defining-and-managing-reputation-risk
Allens Arthur Robinson. (n.d.-b). CORPORATE CULTURE’ AS A BASIS FOR THE CRIMINAL LIABILITY OF CORPORATIONS. http://www.reports-and-materials.org/sites/default/files/reports-and-materials/Allens-Arthur-Robinson-Corporate-Culture-paper-for-Ruggie-Feb-2008.pdf
Almond, P. & ebrary, Inc. (2013). Corporate manslaughter and regulatory reform: Vol. Crime prevention and security management. Palgrave Macmillan. http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1109223
ASIS International. (n.d.-c). Security management standard: Physical asset protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
ASIS International. (n.d.-d). Security management standard: Physical asset protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
ASIS International. (n.d.-e). Security Management Standard: Physical Asset Protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
ASIS International. (n.d.-f). Security Management Standard: Physical Asset Protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
ASIS International. (2010). Standards and guidelines, quick reference guide. https://www.asisonline.org/globalassets/standards-and-guidelines/documents/sgquickreferenceguide.pdf
BAE Systems. (2015). Our Ethics Programme. https://www.baesystems.com/cs/Satellite?c=BAEMedia_C&childpagename=UK%2FBAELayout&cid=1434554840982&pagename=UKWrapper
Bates, S. (n.d.). Corporate Security: Managing the Risk Across the Security Continuum. http://content.yudu.com/Library/A3gduo/SECURITY/resources/2.htm?skipFlashCheck=true
BBC - Search results for bae systems fined. (n.d.). http://www.bbc.co.uk/search?q=bae%20systems%20fined
Better Ignition Switch Would Have Cost GM 90 Cents. (2 C.E.). https://www.youtube.com/watch?v=op4UlpNo0D0&feature=youtu.be
Bevir, M. (2011a). The SAGE handbook of governance. SAGE. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529
Bevir, M. (2011b). The SAGE handbook of governance. SAGE. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529
Bevir, M. (2013). Interpreting global security: Vol. Routledge advances in international relations and global politics. Routledge. https://ebookcentral.proquest.com/lib/leicester/detail.action?pq-origsite=primo&docID=1344595
British Standards Institution. (2015). Security management: strategic and operational guidelines: Vol. BS 16000:2015. BSI. https://edoc.site/bs-16000-2015-pdf-free.html
Button, M. (2008). Doing security: Critical reflections and an agenda for change: Vol. Crime prevention and security management. Palgrave Macmillan. http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230583634
Cadbury, A. (n.d.). The Financial Aspects of Corporate Governance. https://www.frc.org.uk/getattachment/9c19ea6f-bcc7-434c-b481-f2e29c1c271a/The-Financial-Aspects-of-Corporate-Governance-(the-Cadbury-Code).pdf
Chartered Institute of Management Accountants. (n.d.-g). Simple, practical proposals for better reporting of corporate governance. http://www.cimaglobal.com/Documents/Thought_leadership_docs/Governance/Report-Leadership-Corporate-Governance-Report.pdf
Cherry, M.; Sneirson, J. (2011). Beyond Profit: Rethinking Corporate Social Responsibility and Greenwashing after the BP Oil Disaster. Tulane Law Review, 85(4), 983–1038. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tulr85&id=991
Clarke, R. A., & Knake, R. K. (2012). Cyber war: the next threat to national security and what to do about it. Ecco. https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=8531520750002746&institutionId=2746&customerId=2745
Crane, A., & Matten, D. (2010). Business ethics: managing corporate citizenship and sustainability in the age of globalization (3rd ed). Oxford University Press.
Cranfield School of Management. (20 C.E.). Mid Staffordshire Hospital: Making the Right Changes. https://www.youtube.com/watch?v=7152JFhYfBU
D. C. Seyle. (2013). Business Participation in the Responsibility to Protect. http://oefresearch.org/publications/business-participation-responsibility-protect?page=4
Data Protection Act 2018. (n.d.). http://www.legislation.gov.uk/ukpga/2018/12/contents/enacted
Deloitte. (n.d.-h). Sharp rise in estimated costs of implementing new global insurance accounting standards | Deloitte UK. https://www2.deloitte.com/uk/en/pages/press-releases/archive-press-release/sharp-rise-in-estimated-costs-of-implementing-new-global-insurance-accounting-standards.html
Department of Health. (n.d.-i). Patients First and Foremost. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/170701/Patients_First_and_Foremost.pdf
Dr. Marc Siegel discusses international security standards and ISO 31000 Risk Management. (2012). https://www.youtube.com/watch?v=YbmEOqKGBXI&list=PL4E7A1651D7987B82&index=9
Elisabet Garriga and Domènec Melé. (2004). Corporate Social Responsibility Theories: Mapping the Territory. Journal of Business Ethics, 53(1), 51–71. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/25123282?pq-origsite=summon&seq=1#page_scan_tab_contents
Elliott, D., Swartz, E., & Herbane, B. (2010). Business continuity management: a crisis management approach (2nd ed). Routledge. http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=308099
EN - European Agency for Safety and Health at Work: What we do. (2014). https://www.youtube.com/watch?v=Nu2fR-J7zxA
Endorf, C. (2004). Outsourcing Security: The Need, the Risks, the Providers, and the Process. Information Systems Security, 12(6), 17–23. https://doi.org/10.1201/1086/44022.12.6.20040101/79782.4
Epstein-Reevers, J. (n.d.). A Tale Of Two CEOs, BP vs. Massey: Part I, BP - Forbes. http://www.forbes.com/sites/csr/2010/05/19/a-tale-of-two-ceos-bp-vs-massey-part-i-bp/#1aed251d4ca1
Football Licensing Authority. (n.d.-j). Guide to Safety at Sports Grounds. https://www.raithrovers.net/files/GuidetoSafetyatSportsGrounds.pdf
Ford Motors, CSR and Brand Reputation Management - 3BL Media Special Edition. (7 C.E.). https://www.youtube.com/watch?v=ts9IEVqtYdU&feature=youtu.be
Framework for Improving Critical Infrastructure Cybersecurity. Version 1.0. (n.d.). https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
Francis, R. (n.d.). Report of the Mid Staffordshire NHS Foundation Trust Public Inquiry: executive summary HC 947, Session 2012-2013 - 0947.pdf. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/279124/0947.pdf
General Data Protection Regulation (GDPR) – Final text neatly arranged. (n.d.). https://gdpr-info.eu/
Geneva Academy. (n.d.-k). The International Code of Conduct for Private Security Service Providers. https://icoca.ch/sites/all/themes/icoca/assets/icoc_english3.pdf
Gill, M. L. (2006). The Handbook of Security. Palgrave Macmillan. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
Gill, M. L. (2014a). The Handbook of Security (Second edition). Palgrave Macmillan. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
Gill, M. L. (2014b). The Handbook of Security. Palgrave Macmillan. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
Gill, M. L. (2014c). The Handbook of Security (Second edition). Palgrave Macmillan. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
GM Ignition Update - United States - Home. (n.d.). http://www.gmignitionupdate.com/product/public/us/en/GMIgnitionUpdate/index.html
GM: Steps to a recall nightmare - CNNMoney. (n.d.). http://money.cnn.com/infographic/pf/autos/gm-recall-timeline/
Gobert, J. (2008). The Corporate Manslaughter and Corporate Homicide Act 2007 – Thirteen years in the making but was it worth the wait? Modern Law Review, 71(3), 413–433. https://doi.org/10.1111/j.1468-2230.2008.00699.x
Gray, A. (n.d.). Out-sourcing Security. https://www.emeraldinsight.com/doi/pdfplus/10.1108/EUM0000000002194
Gulf environmental restoration | Gulf commitment | BP U.S. (n.d.). https://www.bp.com/en_us/bp-us/community/commitment-to-the-gulf-of-mexico/gulf-environmental-restoration.html
Hillsborough Independent Panel. (n.d.-l). Hillsborough, The Report of the Hillsborough Independent Panel. https://www.gov.uk/government/publications/the-report-of-the-hillsborough-independent-panel
Hoogenboom, A. B. (2010). The governance of policing and security: ironies, myths and paradoxes: Vol. Crime prevention and security management. Palgrave Macmillan. http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=346934
Hopkin, P. (2012a). Fundamentals of risk management: understanding, evaluating and implementing effective risk management (2nd ed). Kogan Page.
Hopkin, P. (2012b). Fundamentals of risk management: understanding, evaluating and implementing effective risk management (2nd ed). Kogan Page.
Hyde company fined over worker’s 40ft death plunge - BBC News. (n.d.). http://www.bbc.co.uk/news/uk-england-manchester-18931390
Improving safety and health at work through a Decent Work Agenda (short version). (2012). https://www.youtube.com/watch?v=_4gX5ue2_dA&list=PL994662ED670AB984&index=22
It’s Hard to Be Good. (n.d.). http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=buh&AN=67002622&site=ehost-live
James Gobert. (2008). The Corporate Manslaughter and Corporate Homicide Act 2007: Thirteen Years in the Making but Was It Worth the Wait? The Modern Law Review, 71(3), 413–433. http://www.jstor.org/stable/25151209?pq-origsite=summon&seq=1#page_scan_tab_contents
James, S. (n.d.). Can legislation stop cyber crime? http://www.computerweekly.com/opinion/Can-legislation-stop-cyber-crime
Jeffcott, S., Pidgeon, N., Weyman, A., & Walls, J. (2006). Risk, Trust, and Safety Culture in U.K. Train Operating Companies. Risk Analysis, 26(5), 1105–1121. https://doi.org/10.1111/j.1539-6924.2006.00819.x
Kaye, L. (n.d.). Five Years After Deepwater Horizon, Can BP Repair Its Reputation? | Sustainable Brands. http://www.sustainablebrands.com/news_and_views/marketing_comms/leon_kaye/five_years_after_deepwater_horizon_can_bp_repair_its_reputa
Keeler, C. (n.d.). The End of the Responsibility to Protect? | Foreign Policy Journal. http://www.foreignpolicyjournal.com/2011/10/12/the-end-of-the-responsibility-to-protect/
Kinslow, J. (2006). Physical and IT Security. Journal of Security Education, 2(1), 75–91. https://doi.org/10.1300/J460v02n01_06
Kytle, B., & Ruggie, J. (n.d.). Corporate Social Responsibility as Risk Management: A Model for Multinationals. https://sites.hks.harvard.edu/m-rcbg/CSRI/publications/workingpaper_10_kytle_ruggie.pdf
Leeson, N., & Whitley, E. (2015). Rogue trader (Updated edition). Sphere.
Levi, M. (2008). The phantom capitalists: the organization and control of long-firm fraud (Rev. ed). Ashgate. https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903550830002746&institutionId=2746&customerId=2745
Loader, I., Goold, B., & Thumala, A. (2014). The moral economy of security. Theoretical Criminology, 18(4), 469–488. https://doi.org/10.1177/1362480614531613
Loader, I., & White, A. (2015). How can we better align private security with the public interest? Towards a civilizing model of regulation. Regulation & Governance, n/a-n/a. https://doi.org/10.1111/rego.12109
Locke, R. M. (2013). The Promise and limits of private power: promoting labor standards in a global economy: Vol. Cambridge studies in comparative politics. Cambridge University Press. http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=566170
Lowry, P. B., Posey, C., Roberts, T. L., & Bennett, R. J. (2014). Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse. Journal of Business Ethics, 121(3), 385–401. https://doi.org/10.1007/s10551-013-1705-3
Lynn T. Drennan. (2004). Ethics, Governance and Risk Management: Lessons from Mirror Group Newspapers and Barings Bank. Journal of Business Ethics, 52(3), 257–266. http://www.jstor.org/stable/25123254?pq-origsite=summon&seq=1#page_scan_tab_contents
Marin, C. (2013). An Old Debate in a New Setting: In-House Versus Outsourced Security Staff in the Context of International Organizations. Journal of Applied Security Research, 8(4), 510–550. https://doi.org/10.1080/19361610.2013.825756
Martin, J. (2014). Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’. Criminology and Criminal Justice, 14(3), 351–367. https://doi.org/10.1177/1748895813505234
Matejek, S., & Gössling, T. (2014). Beyond Legitimacy: A Case Study in BP’s "Green Lashing”. Journal of Business Ethics, 120(4), 571–584. https://doi.org/10.1007/s10551-013-2006-6
Meehan, B., & Benson, B. L. (2015). The occupations of regulators influence occupational regulation: evidence from the US private security industry. Public Choice, 162(1–2), 97–117. https://doi.org/10.1007/s11127-014-0203-1
Mullins, L. J., & Christy, G. (2016a). Management and organisational behaviour (11th ed). Pearson Education. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113
Mullins, L. J., & Christy, G. (2016b). Management and organisational behaviour (11th ed). Pearson Education. https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=5175113&ppg=8
Mullins, L. J., & Christy, G. (2016c). Management and organisational behaviour (11th ed). Pearson Education. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113
Netherlands International Law Review. (2015). 62(Issue 1), 119–140. https://doi.org/10.1007/s40802-015-0017-y
Nick Leeson Keynote Speaker. (2012). https://www.youtube.com/watch?v=Vfz5HlYkDi8
North Korea behind Sony Pictures hack? - CNN Video. (n.d.). https://edition.cnn.com/videos/world/2014/12/03/tsr-dnt-todd-north-korea-sony.cnn
O’Connor, D., Lippert, R., Spencer, D., & Smylie, L. (2008). Seeing private security like a state. Criminology and Criminal Justice, 8(2), 203–226. https://doi.org/10.1177/1748895808088995
Olympics Security, Seventh Report of Session 2012–13. (n.d.). http://www.publications.parliament.uk/pa/cm201213/cmselect/cmhaff/531/531.pdf
Paris, R. (n.d.). Is it possible to meet the Responsibility to Protect? https://www.washingtonpost.com/blogs/monkey-cage/wp/2014/12/09/is-it-possible-to-meet-the-responsibility-to-protect/
Pieth, M., & Ivory, R. (2011). Corporate criminal liability: emergence, convergence, and risk: Vol. Ius gentium. Springer. http://ezproxy.lib.le.ac.uk/login?url=http://site.ebrary.com/lib/leicester/detail.action?docID=10465362
praxiom. (n.d.-m). ISO 9000 2015 Definitions in Plain English. https://www.iso.org/obp/ui/#iso:std:iso:9000:ed-4:v1:en
Prenzler, T. (2012). Policing and security in practice: Challenges and achievements: Vol. Crime prevention and security management. Palgrave Macmillan. http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9781137007780
Private Security Services in Europe. (n.d.). http://www.coess.org/download.php?down=Li9kb2N1bWVudHMvZmYtMjAxMy1wcml2YXRlLXNlY3VyaXR5LXNlcnZpY2VzLWluLWV1cm9wZS1jb2Vzcy1mYWN0cy1hbmQtZmlndXJlcy5wZGY.
Qualityguru. (n.d.-n). History of Quality. https://www.qualitygurus.com/history-of-quality/
Quirk, H., Seddon, T., & Smith, G. (2010). Regulation and criminal justice: innovations in policy and research. Cambridge University Press. https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903547230002746&institutionId=2746&customerId=2745
Red Bead Experiment with Dr. W. Edwards Deming. (25 C.E.). https://www.youtube.com/watch?v=ckBfbvOXDvU
Reputation Institute | Reputation Measurement & Stakeholder Management. (n.d.). http://www.reputationinstitute.com/
Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf. (n.d.-a). https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf
Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf. (n.d.-b). https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf
Rhodes, R. A. W. (2007). Understanding Governance: Ten Years On. Organization Studies, 28(8), 1243–1264. https://doi.org/10.1177/0170840607076586
Robert Francis: Insights into the Mid Staffordshire inquiry. (14 C.E.a). https://www.youtube.com/watch?v=2dtCz3OFcSM
Robert Francis: Insights into the Mid Staffordshire inquiry. (14 C.E.b). https://www.youtube.com/watch?v=2dtCz3OFcSM
Roland Paris. (2001). Human Security: Paradigm Shift or Hot Air? International Security, 26(2), 87–102. http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/3092123?pq-origsite=summon&seq=1#page_scan_tab_contents
Sandra Waddock. (2008). Building a New Institutional Infrastructure for Corporate Responsibility. Academy of Management Perspectives, 22(3), 87–108. http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/27747465?pq-origsite=summon&seq=1#page_scan_tab_contents
Serious Crime Act 2015. (n.d.). http://www.legislation.gov.uk/ukpga/2015/9/part/2/enacted
Shearing, C., & Wood, J. (2003). Governing security for common goods. International Journal of the Sociology of Law, 31(3), 205–225. https://doi.org/10.1016/j.ijsl.2003.09.005
Single Service or Bundle: Practitioner Perspectives on What Makes the Best ... (2015). Journal of Physical Security. https://rbsekurity.com/the-journal-of-physical-security.html
Smith, M. J., & White, A. (2014). The paradox of security regulation: public protection versus normative legitimation. Policy & Politics, 42(3), 421–437. https://doi.org/10.1332/030557312X655495
Souppaya, M., & Scarfone, K. (n.d.). NIST Special Publication 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf
State Regulation concerning Civilian Private Security Services and their Contribution to Crime Prevention and Community Safety. (n.d.). http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/Ebook0.pdf
State sponsored cyber-attacks happen more and more often - Kaspersky. (24 C.E.). https://www.youtube.com/watch?v=lPRowgkd6UE
SteCooper. (11 C.E.). Hillsborough - The Search for Truth. https://www.youtube.com/watch?v=tmW1xz6jJGw
Sustainability | BP Global. (n.d.). http://www.bp.com/en/global/corporate/sustainability.html
Taylor, S. (n.d.). The Hillsborough stadium disaster: 15 April 1989: inquiry by the Rt Hon Lord Justice Taylor: final report: presented to Parliament by the Secretary of State for the Home Department by command of Her Majesty January 1990. https://www.scribd.com/document/69424889/Hills-Borough-Stadium-Disaster-Final-Report
Teuber, C. (2012). EuroDynamics. http://archive.constantcontact.com/fs017/1104610489911/archive/1109045378919.html
The cyber hell - Eugene Kaspersky on the 3rd annual International Cyber Security Conference. (12 C.E.). https://www.youtube.com/watch?v=2NSl9aWm9pI
The Social Responsibility of Business is to Increase its Profits, by Milton Friedman. (n.d.). http://umich.edu/~thecore/doc/Friedman.pdf
Thomas Cook boss apologises over Corfu gas deaths - BBC News. (n.d.). http://www.bbc.co.uk/news/uk-england-leeds-32809770
Thomas Cook CEO refuses to say sorry for deaths as ex-boss declines questions | UK news | The Guardian. (n.d.). http://www.theguardian.com/uk-news/2015/may/07/ex-thomas-cook-boss-refuses-to-answer-questions-over-childrens-deaths
Thomas Cook shares crash after Harriet Green is pushed out | Business | The Guardian. (n.d.). http://www.theguardian.com/business/2014/nov/26/thomas-cook-chief-harriet-green-shock-departure
Uff, J. (n.d.-a). The Southall rail accident inquiry report. http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf
Uff, J. (n.d.-b). The Southall rail accident inquiry report. http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf
United Nations. (n.d.-o). Human Security Unit Strategic Plan 2014-2017. https://drive.google.com/file/d/1DZ0kGYD3RG5zWWyiC3abSE2rYnw_XFi3/view
United Nations. (2011). Human Security Presentation. https://docs.unocha.org/sites/dms/HSU/Publications%20and%20Products/Human%20Security%20Tools/Human%20Security%20Presentation.pdf
United Nations. (2013). Human Security - A New Response to Complex Threats. https://www.youtube.com/watch?v=axb0KkB2Le4
Walby, K., & Lippert, R. K. (Eds.). (2014). Corporate security in the 21st century: theory and practice in international perspective: Vol. Crime prevention and security management. Palgrave Macmillan. http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1725804
White, A. (2014). Post-crisis Policing and Public–Private Partnerships. British Journal of Criminology, 54(6), 1002–1022. https://doi.org/10.1093/bjc/azu063
White, A. (2015). The impact of the Private Security Industry Act 2001. Security Journal, 28(4), 425–442. https://doi.org/10.1057/sj.2012.53
Whitty, M. (n.d.). Anatomy of the Online Dating Romance Scam. http://webcache.googleusercontent.com/search?q=cache:bl10jY6RxwEJ:esrc-files.s3.amazonaws.com/outputs/1rP2bpwo6keXPqVRhVIpZg/GhkDoD8Lik631sEw4Wsscg.pdf+&cd=3&hl=en&ct=clnk&gl=uk
Willcocks, L., Oshri, I., & Hindle, J. (n.d.). To bundle or not to bundle? Effective decision-making for business and IT services. http://www.globalsourcing.org.uk/Report_Downloads/BundleOrNot.pdf
Wolf, K. D., Deitelhoff, N., & Engert, S. (2007). Corporate Security Responsibility: Towards a Conceptual Framework for a Comparative Research Agenda. Cooperation and Conflict, 42(3), 294–320. https://doi.org/10.1177/0010836707079934