@misc{ title={Defining and managing reputation risk A framework for risk managers}, url={https://www.yumpu.com/en/document/view/54493098/defining-and-managing-reputation-risk}, author={Airmic} }
@misc{ title={CORPORATE CULTURE’ AS A BASIS FOR THE CRIMINAL LIABILITY OF CORPORATIONS}, url={http://www.reports-and-materials.org/sites/default/files/reports-and-materials/Allens-Arthur-Robinson-Corporate-Culture-paper-for-Ruggie-Feb-2008.pdf}, author={Allens Arthur Robinson} }
@book{Almond_ebrary, Inc_2013, address={New York}, title={Corporate manslaughter and regulatory reform}, volume={Crime prevention and security management}, url={http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1109223}, publisher={Palgrave Macmillan}, author={Almond, Paul and ebrary, Inc}, year={2013} }
@misc{2010, title={Standards and guidelines, quick reference guide}, url={https://www.asisonline.org/globalassets/standards-and-guidelines/documents/sgquickreferenceguide.pdf}, author={ASIS International}, year={2010} }
@misc{ title={Security management standard: Physical asset protection}, url={http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf}, author={ASIS International} }
@misc{ title={Security management standard: Physical asset protection}, url={http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf}, author={ASIS International} }
@misc{ title={Security Management Standard: Physical Asset Protection}, url={http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf}, author={ASIS International} }
@misc{ title={Security Management Standard: Physical Asset Protection}, url={http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf}, author={ASIS International} }
@misc{2015, title={Our Ethics Programme}, url={https://www.baesystems.com/cs/Satellite?c=BAEMedia_C&childpagename=UK%2FBAELayout&cid=1434554840982&pagename=UKWrapper}, author={BAE Systems}, year={2015} }
@misc{Bates, title={Corporate Security: Managing the Risk Across the Security Continuum}, url={http://content.yudu.com/Library/A3gduo/SECURITY/resources/2.htm?skipFlashCheck=true}, author={Bates, Shayne} }
@book{Bevir_2011a, address={Los Angeles}, title={The SAGE handbook of governance}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529}, publisher={SAGE}, author={Bevir, Mark}, year={2011} }
@book{Bevir_2011b, address={Los Angeles}, title={The SAGE handbook of governance}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529}, publisher={SAGE}, author={Bevir, Mark}, year={2011} }
@book{Bevir_2013, address={Milton Park, Abingdon, Oxon}, title={Interpreting global security}, volume={Routledge advances in international relations and global politics}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?pq-origsite=primo&docID=1344595}, publisher={Routledge}, author={Bevir, Mark}, year={2013} }
@book{British Standards Institution_2015, address={London}, title={Security management: strategic and operational guidelines}, volume={BS 16000:2015}, url={https://edoc.site/bs-16000-2015-pdf-free.html}, publisher={BSI}, author={British Standards Institution}, year={2015} }
@book{Button_2008, address={Basingstoke}, title={Doing security: Critical reflections and an agenda for change}, volume={Crime prevention and security management}, url={http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230583634}, publisher={Palgrave Macmillan}, author={Button, Mark}, year={2008} }
@misc{Cadbury, title={The Financial Aspects of Corporate Governance}, url={https://www.frc.org.uk/getattachment/9c19ea6f-bcc7-434c-b481-f2e29c1c271a/The-Financial-Aspects-of-Corporate-Governance-(the-Cadbury-Code).pdf}, author={Cadbury, A} }
@misc{ title={Simple, practical proposals for better reporting of corporate governance}, url={http://www.cimaglobal.com/Documents/Thought_leadership_docs/Governance/Report-Leadership-Corporate-Governance-Report.pdf}, author={Chartered Institute of Management Accountants} }
@article{Cherry, M.; Sneirson, J._2011, title={Beyond Profit: Rethinking Corporate Social Responsibility and Greenwashing after the BP Oil Disaster}, volume={85}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tulr85&id=991}, number={4}, journal={Tulane Law Review}, author={Cherry, M.; Sneirson, J.}, year={2011}, pages={983–1038} }
@book{Clarke_Knake_2012, address={New York}, title={Cyber war: the next threat to national security and what to do about it}, url={https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=8531520750002746&institutionId=2746&customerId=2745}, publisher={Ecco}, author={Clarke, Richard A. and Knake, Robert K.}, year={2012} }
@book{Crane_Matten_2010, address={Oxford}, edition={3rd ed}, title={Business ethics: managing corporate citizenship and sustainability in the age of globalization}, publisher={Oxford University Press}, author={Crane, Andrew and Matten, Dirk}, year={2010} }
@misc{20AD, title={Mid Staffordshire Hospital: Making the Right Changes}, url={https://www.youtube.com/watch?v=7152JFhYfBU}, author={Cranfield School of Management}, year={20AD} }
@article{D. C. Seyle_2013, title={Business Participation in the Responsibility to Protect}, url={http://oefresearch.org/publications/business-participation-responsibility-protect?page=4}, author={D. C. Seyle}, year={2013} }
@misc{ title={Sharp rise in estimated costs of implementing new global insurance accounting standards | Deloitte UK}, url={https://www2.deloitte.com/uk/en/pages/press-releases/archive-press-release/sharp-rise-in-estimated-costs-of-implementing-new-global-insurance-accounting-standards.html}, author={Deloitte} }
@misc{ title={Patients First and Foremost}, url={https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/170701/Patients_First_and_Foremost.pdf}, author={Department of Health} }
@article{Elisabet Garriga and Domènec Melé_2004, title={Corporate Social Responsibility Theories: Mapping the Territory}, volume={53}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/25123282?pq-origsite=summon&seq=1#page_scan_tab_contents}, number={1}, journal={Journal of Business Ethics}, author={Elisabet Garriga and Domènec Melé}, year={2004}, pages={51–71} }
@book{Elliott_Swartz_Herbane_2010, address={New York, NY}, edition={2nd ed}, title={Business continuity management: a crisis management approach}, url={http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=308099}, publisher={Routledge}, author={Elliott, Dominic and Swartz, Ethné and Herbane, Brahim}, year={2010} }
@article{Endorf_2004, title={Outsourcing Security: The Need, the Risks, the Providers, and the Process}, volume={12}, DOI={10.1201/1086/44022.12.6.20040101/79782.4}, number={6}, journal={Information Systems Security}, author={Endorf, Carl}, year={2004}, month={Jan}, pages={17–23} }
@misc{Epstein-Reevers, title={A Tale Of Two CEOs, BP vs. Massey: Part I, BP - Forbes}, url={http://www.forbes.com/sites/csr/2010/05/19/a-tale-of-two-ceos-bp-vs-massey-part-i-bp/#1aed251d4ca1}, author={Epstein-Reevers, J} }
@misc{ title={Guide to Safety at Sports Grounds}, url={https://www.raithrovers.net/files/GuidetoSafetyatSportsGrounds.pdf}, author={Football Licensing Authority} }
@misc{Francis, title={Report of the Mid Staffordshire NHS Foundation Trust Public Inquiry: executive summary HC 947, Session 2012-2013 - 0947.pdf}, url={https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/279124/0947.pdf}, author={Francis, R} }
@misc{ title={The International Code of Conduct for Private Security Service Providers}, url={https://icoca.ch/sites/all/themes/icoca/assets/icoc_english3.pdf}, author={Geneva Academy} }
@book{Gill_2006, address={Basingstoke}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2006} }
@book{Gill_2014a, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014b, address={Basingstoke}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014c, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@article{Gobert_2008, title={The Corporate Manslaughter and Corporate Homicide Act 2007 – Thirteen years in the making but was it worth the wait?}, volume={71}, DOI={10.1111/j.1468-2230.2008.00699.x}, number={3}, journal={Modern Law Review}, author={Gobert, James}, year={2008}, pages={413–433} }
@article{Gray, title={Out-sourcing Security}, url={https://www.emeraldinsight.com/doi/pdfplus/10.1108/EUM0000000002194}, author={Gray, A} }
@misc{ title={Hillsborough, The Report of the Hillsborough Independent Panel}, url={https://www.gov.uk/government/publications/the-report-of-the-hillsborough-independent-panel}, author={Hillsborough Independent Panel} }
@book{Hoogenboom_2010, address={Basingstoke}, title={The governance of policing and security: ironies, myths and paradoxes}, volume={Crime prevention and security management}, url={http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=346934}, publisher={Palgrave Macmillan}, author={Hoogenboom, Abraham Bob}, year={2010} }
@book{Hopkin_2012a, address={London}, edition={2nd ed}, title={Fundamentals of risk management: understanding, evaluating and implementing effective risk management}, publisher={Kogan Page}, author={Hopkin, Paul}, year={2012} }
@book{Hopkin_2012b, address={London}, edition={2nd ed}, title={Fundamentals of risk management: understanding, evaluating and implementing effective risk management}, publisher={Kogan Page}, author={Hopkin, Paul}, year={2012} }
@article{James Gobert_2008, title={The Corporate Manslaughter and Corporate Homicide Act 2007: Thirteen Years in the Making but Was It Worth the Wait?}, volume={71}, url={http://www.jstor.org/stable/25151209?pq-origsite=summon&seq=1#page_scan_tab_contents}, number={3}, journal={The Modern Law Review}, author={James Gobert}, year={2008}, pages={413–433} }
@misc{James, title={Can legislation stop cyber crime?}, url={http://www.computerweekly.com/opinion/Can-legislation-stop-cyber-crime}, author={James, S} }
@article{Jeffcott_Pidgeon_Weyman_Walls_2006, title={Risk, Trust, and Safety Culture in U.K. Train Operating Companies}, volume={26}, DOI={10.1111/j.1539-6924.2006.00819.x}, number={5}, journal={Risk Analysis}, author={Jeffcott, Shelly and Pidgeon, Nick and Weyman, Andrew and Walls, John}, year={2006}, month={Oct}, pages={1105–1121} }
@misc{Kaye, title={Five Years After Deepwater Horizon, Can BP Repair Its Reputation? | Sustainable Brands}, url={http://www.sustainablebrands.com/news_and_views/marketing_comms/leon_kaye/five_years_after_deepwater_horizon_can_bp_repair_its_reputa}, author={Kaye, L} }
@misc{Keeler, title={The End of the Responsibility to Protect? | Foreign Policy Journal}, url={http://www.foreignpolicyjournal.com/2011/10/12/the-end-of-the-responsibility-to-protect/}, author={Keeler, C} }
@article{Kinslow_2006, title={Physical and IT Security}, volume={2}, DOI={10.1300/J460v02n01_06}, number={1}, journal={Journal of Security Education}, author={Kinslow, Joseph}, year={2006}, pages={75–91} }
@misc{Kytle_Ruggie, title={Corporate Social Responsibility as Risk Management: A Model for Multinationals}, url={https://sites.hks.harvard.edu/m-rcbg/CSRI/publications/workingpaper_10_kytle_ruggie.pdf}, author={Kytle, B and Ruggie, J} }
@book{Leeson_Whitley_2015, address={London}, edition={Updated edition}, title={Rogue trader}, publisher={Sphere}, author={Leeson, Nick and Whitley, Edward}, year={2015} }
@book{Levi_2008, address={Aldershot}, edition={Rev. ed}, title={The phantom capitalists: the organization and control of long-firm fraud}, url={https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903550830002746&institutionId=2746&customerId=2745}, publisher={Ashgate}, author={Levi, Michael}, year={2008} }
@article{Loader_Goold_Thumala_2014, title={The moral economy of security}, volume={18}, DOI={10.1177/1362480614531613}, number={4}, journal={Theoretical Criminology}, author={Loader, I. and Goold, B. and Thumala, A.}, year={2014}, month={Nov}, pages={469–488} }
@article{Loader_White_2015, title={How can we better align private security with the public interest? Towards a civilizing model of regulation}, DOI={10.1111/rego.12109}, journal={Regulation & Governance}, author={Loader, Ian and White, Adam}, year={2015}, pages={n/a-n/a} }
@book{Locke_2013, address={Cambridge}, title={The Promise and limits of private power: promoting labor standards in a global economy}, volume={Cambridge studies in comparative politics}, url={http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=566170}, publisher={Cambridge University Press}, author={Locke, Richard M.}, year={2013} }
@article{Lowry_Posey_Roberts_Bennett_2014, title={Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse}, volume={121}, DOI={10.1007/s10551-013-1705-3}, number={3}, journal={Journal of Business Ethics}, author={Lowry, Paul Benjamin and Posey, Clay and Roberts, Tom L. and Bennett, Rebecca J.}, year={2014}, month={May}, pages={385–401} }
@article{Lynn T. Drennan_2004, title={Ethics, Governance and Risk Management: Lessons from Mirror Group Newspapers and Barings Bank}, volume={52}, url={http://www.jstor.org/stable/25123254?pq-origsite=summon&seq=1#page_scan_tab_contents}, number={3}, journal={Journal of Business Ethics}, author={Lynn T. Drennan}, year={2004}, pages={257–266} }
@article{Marin_2013, title={An Old Debate in a New Setting: In-House Versus Outsourced Security Staff in the Context of International Organizations}, volume={8}, DOI={10.1080/19361610.2013.825756}, number={4}, journal={Journal of Applied Security Research}, author={Marin, Constantin}, year={2013}, month={Oct}, pages={510–550} }
@article{Martin_2014, title={Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’}, volume={14}, url={https://journals.sagepub.com/doi/10.1177/1748895813505234}, DOI={10.1177/1748895813505234}, number={3}, journal={Criminology and Criminal Justice}, author={Martin, J.}, year={2014}, month={Jul}, pages={351–367} }
@article{Matejek_Gössling_2014, title={Beyond Legitimacy: A Case Study in BP’s "Green Lashing”}, volume={120}, url={https://link.springer.com/article/10.1007%2Fs10551-013-2006-6}, DOI={10.1007/s10551-013-2006-6}, number={4}, journal={Journal of Business Ethics}, author={Matejek, Sabine and Gössling, Tobias}, year={2014}, month={Apr}, pages={571–584} }
@article{Meehan_Benson_2015, title={The occupations of regulators influence occupational regulation: evidence from the US private security industry}, volume={162}, DOI={10.1007/s11127-014-0203-1}, number={1–2}, journal={Public Choice}, author={Meehan, Brian and Benson, Bruce L.}, year={2015}, month={Jan}, pages={97–117} }
@book{Mullins_Christy_2016a, address={Harlow}, edition={11th ed}, title={Management and organisational behaviour}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113}, publisher={Pearson Education}, author={Mullins, Laurie J. and Christy, Gill}, year={2016} }
@book{Mullins_Christy_2016b, address={Harlow}, edition={11th ed}, title={Management and organisational behaviour}, url={https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=5175113&ppg=8}, publisher={Pearson Education}, author={Mullins, Laurie J. and Christy, Gill}, year={2016} }
@book{Mullins_Christy_2016c, address={Harlow}, edition={11th ed}, title={Management and organisational behaviour}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113}, publisher={Pearson Education}, author={Mullins, Laurie J. and Christy, Gill}, year={2016} }
@article{O’Connor_Lippert_Spencer_Smylie_2008, title={Seeing private security like a state}, volume={8}, DOI={10.1177/1748895808088995}, number={2}, journal={Criminology and Criminal Justice}, author={O’Connor, D. and Lippert, R. and Spencer, D. and Smylie, L.}, year={2008}, month={May}, pages={203–226} }
@misc{Paris, title={Is it possible to meet the Responsibility to Protect?}, url={https://www.washingtonpost.com/blogs/monkey-cage/wp/2014/12/09/is-it-possible-to-meet-the-responsibility-to-protect/}, author={Paris, R} }
@book{Pieth_Ivory_2011, address={Dordrecht}, title={Corporate criminal liability: emergence, convergence, and risk}, volume={Ius gentium}, url={http://ezproxy.lib.le.ac.uk/login?url=http://site.ebrary.com/lib/leicester/detail.action?docID=10465362}, publisher={Springer}, author={Pieth, Mark and Ivory, Radha}, year={2011} }
@misc{ title={ISO 9000 2015 Definitions in Plain English}, url={https://www.iso.org/obp/ui/#iso:std:iso:9000:ed-4:v1:en}, author={praxiom} }
@book{Prenzler_2012, address={Basingstoke}, title={Policing and security in practice: Challenges and achievements}, volume={Crime prevention and security management}, url={http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9781137007780}, publisher={Palgrave Macmillan}, author={Prenzler, Tim}, year={2012} }
@misc{ title={History of Quality}, url={https://www.qualitygurus.com/history-of-quality/}, author={Qualityguru} }
@book{Quirk_Seddon_Smith_2010, address={Cambridge}, title={Regulation and criminal justice: innovations in policy and research}, url={https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903547230002746&institutionId=2746&customerId=2745}, publisher={Cambridge University Press}, author={Quirk, Hannah and Seddon, Toby and Smith, Graham}, year={2010} }
@article{Rhodes_2007, title={Understanding Governance: Ten Years On}, volume={28}, url={https://journals.sagepub.com/doi/10.1177/0170840607076586}, DOI={10.1177/0170840607076586}, number={8}, journal={Organization Studies}, author={Rhodes, R.A.W.}, year={2007}, month={Aug}, pages={1243–1264} }
@article{Roland Paris_2001, title={Human Security: Paradigm Shift or Hot Air?}, volume={26}, url={http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/3092123?pq-origsite=summon&seq=1#page_scan_tab_contents}, number={2}, journal={International Security}, author={Roland Paris}, year={2001}, pages={87–102} }
@article{Sandra Waddock_2008, title={Building a New Institutional Infrastructure for Corporate Responsibility}, volume={22}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/27747465?pq-origsite=summon&seq=1#page_scan_tab_contents}, number={3}, journal={Academy of Management Perspectives}, author={Sandra Waddock}, year={2008}, pages={87–108} }
@article{Shearing_Wood_2003, title={Governing security for common goods}, volume={31}, DOI={10.1016/j.ijsl.2003.09.005}, number={3}, journal={International Journal of the Sociology of Law}, author={Shearing, Clifford and Wood, Jennifer}, year={2003}, month={Sep}, pages={205–225} }
@article{Smith_White_2014, title={The paradox of security regulation: public protection versus normative legitimation}, volume={42}, DOI={10.1332/030557312X655495}, number={3}, journal={Policy & Politics}, author={Smith, Martin J. and White, Adam}, year={2014}, month={Jul}, pages={421–437} }
@misc{Souppaya_Scarfone, title={NIST Special Publication 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops.}, url={http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf}, author={Souppaya, M and Scarfone, K} }
@misc{11AD, title={Hillsborough - The Search for Truth}, url={https://www.youtube.com/watch?v=tmW1xz6jJGw}, author={SteCooper}, year={11AD} }
@misc{Taylor, title={The Hillsborough stadium disaster: 15 April 1989: inquiry by the Rt Hon Lord Justice Taylor: final report: presented to Parliament by the Secretary of State for the Home Department by command of Her Majesty January 1990}, url={https://www.scribd.com/document/69424889/Hills-Borough-Stadium-Disaster-Final-Report}, author={Taylor, S} }
@misc{Teuber_2012, title={EuroDynamics}, url={http://archive.constantcontact.com/fs017/1104610489911/archive/1109045378919.html}, author={Teuber, C}, year={2012} }
@misc{Uff, title={The Southall rail accident inquiry report}, url={http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf}, author={Uff, J} }
@misc{Uff, title={The Southall rail accident inquiry report}, url={http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf}, author={Uff, J} }
@misc{2011, title={Human Security Presentation}, url={https://docs.unocha.org/sites/dms/HSU/Publications%20and%20Products/Human%20Security%20Tools/Human%20Security%20Presentation.pdf}, author={United Nations}, year={2011} }
@misc{2013, title={Human Security - A New Response to Complex Threats}, url={https://www.youtube.com/watch?v=axb0KkB2Le4}, author={United Nations}, year={2013} }
@misc{ title={Human Security Unit Strategic Plan 2014-2017}, url={https://drive.google.com/file/d/1DZ0kGYD3RG5zWWyiC3abSE2rYnw_XFi3/view}, author={United Nations} }
@article{White_2014, title={Post-crisis Policing and Public–Private Partnerships}, volume={54}, DOI={10.1093/bjc/azu063}, number={6}, journal={British Journal of Criminology}, author={White, Adam}, year={2014}, month={Nov}, pages={1002–1022} }
@article{White_2015, title={The impact of the Private Security Industry Act 2001}, volume={28}, DOI={10.1057/sj.2012.53}, number={4}, journal={Security Journal}, author={White, Adam}, year={2015}, month={Oct}, pages={425–442} }
@misc{Whitty, title={Anatomy of the Online Dating Romance Scam}, url={http://webcache.googleusercontent.com/search?q=cache:bl10jY6RxwEJ:esrc-files.s3.amazonaws.com/outputs/1rP2bpwo6keXPqVRhVIpZg/GhkDoD8Lik631sEw4Wsscg.pdf+&cd=3&hl=en&ct=clnk&gl=uk}, author={Whitty, M} }
@misc{Willcocks_Oshri_Hindle, title={To bundle or not to bundle? Effective decision-making for business and IT services}, url={http://www.globalsourcing.org.uk/Report_Downloads/BundleOrNot.pdf}, author={Willcocks, L and Oshri, I and Hindle, J} }
@article{Wolf_Deitelhoff_Engert_2007, title={Corporate Security Responsibility: Towards a Conceptual Framework for a Comparative Research Agenda}, volume={42}, url={https://journals-sagepub-com.ezproxy4.lib.le.ac.uk/doi/10.1177/0010836707079934}, DOI={10.1177/0010836707079934}, number={3}, journal={Cooperation and Conflict}, author={Wolf, K. D. and Deitelhoff, N. and Engert, S.}, year={2007}, pages={294–320} }
@misc{Better Ignition Switch Would Have Cost GM 90 Cents_2AD, url={https://www.youtube.com/watch?v=op4UlpNo0D0&feature=youtu.be}, year={2AD} }
@misc{Ford Motors, CSR and Brand Reputation Management - 3BL Media Special Edition_7AD, url={https://www.youtube.com/watch?v=ts9IEVqtYdU&feature=youtu.be}, year={7AD} }
@misc{The cyber hell - Eugene Kaspersky on the 3rd annual International Cyber Security Conference_12AD, url={https://www.youtube.com/watch?v=2NSl9aWm9pI}, year={12AD} }
@misc{Robert Francis: Insights into the Mid Staffordshire inquiry_14ADa, url={https://www.youtube.com/watch?v=2dtCz3OFcSM}, year={14AD} }
@misc{Robert Francis: Insights into the Mid Staffordshire inquiry_14ADb, url={https://www.youtube.com/watch?v=2dtCz3OFcSM}, year={14AD} }
@misc{State sponsored cyber-attacks happen more and more often - Kaspersky_24AD, url={https://www.youtube.com/watch?v=lPRowgkd6UE}, year={24AD} }
@misc{Red Bead Experiment with Dr. W. Edwards Deming_25AD, url={https://www.youtube.com/watch?v=ckBfbvOXDvU}, year={25AD} }
@misc{Dr. Marc Siegel discusses international security standards and ISO 31000 Risk Management_2012, url={https://www.youtube.com/watch?v=YbmEOqKGBXI&list=PL4E7A1651D7987B82&index=9}, year={2012} }
@misc{Improving safety and health at work through a Decent Work Agenda (short version)_2012, url={https://www.youtube.com/watch?v=_4gX5ue2_dA&list=PL994662ED670AB984&index=22}, year={2012} }
@misc{Nick Leeson Keynote Speaker_2012, url={https://www.youtube.com/watch?v=Vfz5HlYkDi8}, year={2012}, month={Dec} }
@misc{A Brief History of the Responsibility to Protect (R2P)_2013, url={https://www.youtube.com/watch?v=zql34A4elhY}, year={2013} }
@misc{EN - European Agency for Safety and Health at Work: What we do_2014, url={https://www.youtube.com/watch?v=Nu2fR-J7zxA}, year={2014} }
@book{Walby_Lippert_2014, address={Basingstoke}, title={Corporate security in the 21st century: theory and practice in international perspective}, volume={Crime prevention and security management}, url={http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1725804}, publisher={Palgrave Macmillan}, year={2014} }
@article{Single Service or Bundle: Practitioner Perspectives on What Makes the Best ..._2015, url={https://rbsekurity.com/the-journal-of-physical-security.html}, journal={Journal of Physical Security}, year={2015} }
@article{Netherlands International Law Review_2015, volume={62}, url={http://link.springer.com.ezproxy4.lib.le.ac.uk/article/10.1007%2Fs40802-015-0017-y}, DOI={10.1007/s40802-015-0017-y}, number={Issue 1}, publisher={Springer International Publishing}, year={2015}, month={Apr}, pages={119–140} }
@misc{BBC - Search results for bae systems fined, url={http://www.bbc.co.uk/search?q=bae%20systems%20fined} }
@misc{Thomas Cook boss apologises over Corfu gas deaths - BBC News, url={http://www.bbc.co.uk/news/uk-england-leeds-32809770} }
@misc{Thomas Cook CEO refuses to say sorry for deaths as ex-boss declines questions | UK news | The Guardian, url={http://www.theguardian.com/uk-news/2015/may/07/ex-thomas-cook-boss-refuses-to-answer-questions-over-childrens-deaths} }
@misc{Thomas Cook shares crash after Harriet Green is pushed out | Business | The Guardian, url={http://www.theguardian.com/business/2014/nov/26/thomas-cook-chief-harriet-green-shock-departure} }
@misc{The Social Responsibility of Business is to Increase its Profits, by Milton Friedman, url={http://umich.edu/~thecore/doc/Friedman.pdf} }
@misc{Hyde company fined over worker’s 40ft death plunge - BBC News, url={http://www.bbc.co.uk/news/uk-england-manchester-18931390} }
@misc{A Summary of the GM Recall of Chevrolet Cobalts and Other Cars | New Republic, url={https://newrepublic.com/article/117224/summary-gm-recall-chevrolet-cobalts-and-other-cars} }
@misc{GM: Steps to a recall nightmare - CNNMoney, url={http://money.cnn.com/infographic/pf/autos/gm-recall-timeline/} }
@misc{GM Ignition Update - United States - Home, url={http://www.gmignitionupdate.com/product/public/us/en/GMIgnitionUpdate/index.html} }
@article{A mammoth guilt trip; Criminalising the American company, url={http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?p=EAIM&u=leicester&id=GALE|A380327111&v=2.1&it=r&sid=summon&userGroup=leicester&authCount=1}, journal={The Economist} }
@article{Data Protection Act 2018, url={http://www.legislation.gov.uk/ukpga/2018/12/contents/enacted}, publisher={Statute Law Database} }
@misc{General Data Protection Regulation (GDPR) – Final text neatly arranged, url={https://gdpr-info.eu/} }
@article{Serious Crime Act 2015, url={http://www.legislation.gov.uk/ukpga/2015/9/part/2/enacted}, publisher={Queen’s Printer of Acts of Parliament} }
@misc{Framework for Improving Critical Infrastructure Cybersecurity. Version 1.0., url={https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf} }
@misc{2015 Information security breaches survey - PwC UK, url={https://www.pwc.co.uk/assets/pdf/2015-isbs-technical-report-blue-digital.pdf} }
@misc{North Korea behind Sony Pictures hack? - CNN Video, url={https://edition.cnn.com/videos/world/2014/12/03/tsr-dnt-todd-north-korea-sony.cnn} }
@misc{A Year is a Short Time in Cyber-Space, in Cyber Security 2.0: Reflections on UK/EU Cyber Security co-operation., url={https://www.academia.edu/9463801/A_Year_is_a_Short_Time_in_Cyber-Space_in_Cyber_Security_2.0_Reflections_on_UK_EU_Cyber-Security_Co-Operation} }
@article{It’s Hard to Be Good., url={http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=buh&AN=67002622&site=ehost-live} }
@misc{Reputation Institute | Reputation Measurement & Stakeholder Management, url={http://www.reputationinstitute.com/} }
@misc{Sustainability | BP Global, url={http://www.bp.com/en/global/corporate/sustainability.html} }
@misc{Gulf environmental restoration | Gulf commitment | BP U.S., url={https://www.bp.com/en_us/bp-us/community/commitment-to-the-gulf-of-mexico/gulf-environmental-restoration.html} }
@misc{Olympics Security, Seventh Report of Session 2012–13, url={http://www.publications.parliament.uk/pa/cm201213/cmselect/cmhaff/531/531.pdf} }
@misc{State Regulation concerning Civilian Private Security Services and their Contribution to Crime Prevention and Community Safety, url={http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/Ebook0.pdf} }
@misc{Private Security Services in Europe, url={http://www.coess.org/download.php?down=Li9kb2N1bWVudHMvZmYtMjAxMy1wcml2YXRlLXNlY3VyaXR5LXNlcnZpY2VzLWluLWV1cm9wZS1jb2Vzcy1mYWN0cy1hbmQtZmlndXJlcy5wZGY.} }
@misc{Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf, url={https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf} }
@misc{Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf, url={https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf} }