1
Gill ML. The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: : Palgrave Macmillan 2014. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
2
Crane A, Matten D. Business ethics: managing corporate citizenship and sustainability in the age of globalization. 3rd ed. Oxford: : Oxford University Press 2010.
3
Lowry PB, Posey C, Roberts TL, et al. Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse. Journal of Business Ethics 2014;121:385–401. doi:10.1007/s10551-013-1705-3
4
BBC - Search results for bae systems fined. http://www.bbc.co.uk/search?q=bae%20systems%20fined
5
BAE Systems. Our Ethics Programme. 2015.https://www.baesystems.com/cs/Satellite?c=BAEMedia_C&childpagename=UK%2FBAELayout&cid=1434554840982&pagename=UKWrapper
6
Thomas Cook boss apologises over Corfu gas deaths - BBC News. http://www.bbc.co.uk/news/uk-england-leeds-32809770
7
Thomas Cook CEO refuses to say sorry for deaths as ex-boss declines questions | UK news | The Guardian. http://www.theguardian.com/uk-news/2015/may/07/ex-thomas-cook-boss-refuses-to-answer-questions-over-childrens-deaths
8
Thomas Cook shares crash after Harriet Green is pushed out | Business | The Guardian. http://www.theguardian.com/business/2014/nov/26/thomas-cook-chief-harriet-green-shock-departure
9
praxiom. ISO 9000 2015 Definitions in Plain English. https://www.iso.org/obp/ui/#iso:std:iso:9000:ed-4:v1:en
10
The Social Responsibility of Business is to Increase its Profits, by Milton Friedman. http://umich.edu/~thecore/doc/Friedman.pdf
11
Qualityguru. History of Quality. https://www.qualitygurus.com/history-of-quality/
12
Red Bead Experiment with Dr. W. Edwards Deming. 25AD.https://www.youtube.com/watch?v=ckBfbvOXDvU
13
ASIS International. Standards and guidelines, quick reference guide. 2010.https://www.asisonline.org/globalassets/standards-and-guidelines/documents/sgquickreferenceguide.pdf
14
Dr. Marc Siegel discusses international security standards and ISO 31000 Risk Management. 2012.https://www.youtube.com/watch?v=YbmEOqKGBXI&list=PL4E7A1651D7987B82&index=9
15
ASIS International. Security management standard: Physical asset protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
16
British Standards Institution. Security management: strategic and operational guidelines. London: : BSI 2015. https://edoc.site/bs-16000-2015-pdf-free.html
17
ASIS International. Security management standard: Physical asset protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
18
ASIS International. Security Management Standard: Physical Asset Protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
19
ASIS International. Security Management Standard: Physical Asset Protection. http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
20
Deloitte. Sharp rise in estimated costs of implementing new global insurance accounting standards | Deloitte UK. https://www2.deloitte.com/uk/en/pages/press-releases/archive-press-release/sharp-rise-in-estimated-costs-of-implementing-new-global-insurance-accounting-standards.html
21
Chartered Institute of Management Accountants. Simple, practical proposals for better reporting of corporate governance. http://www.cimaglobal.com/Documents/Thought_leadership_docs/Governance/Report-Leadership-Corporate-Governance-Report.pdf
22
Cadbury A. The Financial Aspects of Corporate Governance. https://www.frc.org.uk/getattachment/9c19ea6f-bcc7-434c-b481-f2e29c1c271a/The-Financial-Aspects-of-Corporate-Governance-(the-Cadbury-Code).pdf
23
Bevir M. The SAGE handbook of governance. Los Angeles: : SAGE 2011. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529
24
Bevir M. Interpreting global security. Milton Park, Abingdon, Oxon: : Routledge 2013. https://ebookcentral.proquest.com/lib/leicester/detail.action?pq-origsite=primo&docID=1344595
25
Hoogenboom AB. The governance of policing and security: ironies, myths and paradoxes. Basingstoke: : Palgrave Macmillan 2010. http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=346934
26
Bevir M. The SAGE handbook of governance. Los Angeles: : SAGE 2011. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529
27
Hyde company fined over worker’s 40ft death plunge - BBC News. http://www.bbc.co.uk/news/uk-england-manchester-18931390
28
Rhodes RAW. Understanding Governance: Ten Years On. Organization Studies 2007;28:1243–64. doi:10.1177/0170840607076586
29
Mullins LJ, Christy G. Management and organisational behaviour. 11th ed. Harlow: : Pearson Education 2016. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113
30
Elliott D, Swartz E, Herbane B. Business continuity management: a crisis management approach. 2nd ed. New York, NY: : Routledge 2010. http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=308099
31
A Summary of the GM Recall of Chevrolet Cobalts and Other Cars | New Republic. https://newrepublic.com/article/117224/summary-gm-recall-chevrolet-cobalts-and-other-cars
32
GM: Steps to a recall nightmare - CNNMoney. http://money.cnn.com/infographic/pf/autos/gm-recall-timeline/
33
GM Ignition Update - United States - Home. http://www.gmignitionupdate.com/product/public/us/en/GMIgnitionUpdate/index.html
34
Better Ignition Switch Would Have Cost GM 90 Cents. 2AD.https://www.youtube.com/watch?v=op4UlpNo0D0&feature=youtu.be
35
A mammoth guilt trip; Criminalising the American company. The Economisthttp://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?p=EAIM&u=leicester&id=GALE|A380327111&v=2.1&it=r&sid=summon&userGroup=leicester&authCount=1
36
James Gobert. The Corporate Manslaughter and Corporate Homicide Act 2007: Thirteen Years in the Making but Was It Worth the Wait? The Modern Law Review 2008;71:413–33.http://www.jstor.org/stable/25151209?pq-origsite=summon&seq=1#page_scan_tab_contents
37
Pieth M, Ivory R. Corporate criminal liability: emergence, convergence, and risk. Dordrecht: : Springer 2011. http://ezproxy.lib.le.ac.uk/login?url=http://site.ebrary.com/lib/leicester/detail.action?docID=10465362
38
Allens Arthur Robinson. CORPORATE CULTURE’ AS A BASIS FOR THE CRIMINAL LIABILITY OF CORPORATIONS. http://www.reports-and-materials.org/sites/default/files/reports-and-materials/Allens-Arthur-Robinson-Corporate-Culture-paper-for-Ruggie-Feb-2008.pdf
39
Mullins LJ, Christy G. Management and organisational behaviour. 11th ed. Harlow: : Pearson Education 2016. https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=5175113&ppg=8
40
Hopkin P. Fundamentals of risk management: understanding, evaluating and implementing effective risk management. 2nd ed. London: : Kogan Page 2012.
41
Improving safety and health at work through a Decent Work Agenda (short version). 2012.https://www.youtube.com/watch?v=_4gX5ue2_dA&list=PL994662ED670AB984&index=22
42
EN - European Agency for Safety and Health at Work: What we do. 2014.https://www.youtube.com/watch?v=Nu2fR-J7zxA
43
Locke RM. The Promise and limits of private power: promoting labor standards in a global economy. Cambridge: : Cambridge University Press 2013. http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=566170
44
United Nations. Human Security Presentation. 2011.https://docs.unocha.org/sites/dms/HSU/Publications%20and%20Products/Human%20Security%20Tools/Human%20Security%20Presentation.pdf
45
United Nations. Human Security Unit Strategic Plan 2014-2017. https://drive.google.com/file/d/1DZ0kGYD3RG5zWWyiC3abSE2rYnw_XFi3/view
46
United Nations. Human Security - A New Response to Complex Threats. 2013.https://www.youtube.com/watch?v=axb0KkB2Le4
47
Roland Paris. Human Security: Paradigm Shift or Hot Air? International Security 2001;26:87–102.http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/3092123?pq-origsite=summon&seq=1#page_scan_tab_contents
48
A Brief History of the Responsibility to Protect (R2P). 2013.https://www.youtube.com/watch?v=zql34A4elhY
49
Keeler C. The End of the Responsibility to Protect? | Foreign Policy Journal. http://www.foreignpolicyjournal.com/2011/10/12/the-end-of-the-responsibility-to-protect/
50
Paris R. Is it possible to meet the Responsibility to Protect? https://www.washingtonpost.com/blogs/monkey-cage/wp/2014/12/09/is-it-possible-to-meet-the-responsibility-to-protect/
51
Wolf KD, Deitelhoff N, Engert S. Corporate Security Responsibility: Towards a Conceptual Framework for a Comparative Research Agenda. Cooperation and Conflict 2007;42:294–320. doi:10.1177/0010836707079934
52
D. C. Seyle. Business Participation in the Responsibility to Protect. Published Online First: 2013.http://oefresearch.org/publications/business-participation-responsibility-protect?page=4
53
Data Protection Act 2018. http://www.legislation.gov.uk/ukpga/2018/12/contents/enacted
54
General Data Protection Regulation (GDPR) – Final text neatly arranged. https://gdpr-info.eu/
55
Serious Crime Act 2015. http://www.legislation.gov.uk/ukpga/2015/9/part/2/enacted
56
James S. Can legislation stop cyber crime? http://www.computerweekly.com/opinion/Can-legislation-stop-cyber-crime
57
Clarke RA, Knake RK. Cyber war: the next threat to national security and what to do about it. New York: : Ecco 2012. https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=8531520750002746&institutionId=2746&customerId=2745
58
Framework for Improving Critical Infrastructure Cybersecurity. Version 1.0. https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
59
Gill ML. The Handbook of Security. Basingstoke: : Palgrave Macmillan 2014. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
60
State sponsored cyber-attacks happen more and more often - Kaspersky. 24AD.https://www.youtube.com/watch?v=lPRowgkd6UE
61
Souppaya M, Scarfone K. NIST Special Publication 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf
62
2015 Information security breaches survey - PwC UK. https://www.pwc.co.uk/assets/pdf/2015-isbs-technical-report-blue-digital.pdf
63
Martin J. Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’. Criminology and Criminal Justice 2014;14:351–67. doi:10.1177/1748895813505234
64
Whitty M. Anatomy of the Online Dating Romance Scam. http://webcache.googleusercontent.com/search?q=cache:bl10jY6RxwEJ:esrc-files.s3.amazonaws.com/outputs/1rP2bpwo6keXPqVRhVIpZg/GhkDoD8Lik631sEw4Wsscg.pdf+&cd=3&hl=en&ct=clnk&gl=uk
65
North Korea behind Sony Pictures hack? - CNN Video. https://edition.cnn.com/videos/world/2014/12/03/tsr-dnt-todd-north-korea-sony.cnn
66
The cyber hell - Eugene Kaspersky on the 3rd annual International Cyber Security Conference. 12AD.https://www.youtube.com/watch?v=2NSl9aWm9pI
67
A Year is a Short Time in Cyber-Space, in Cyber Security 2.0: Reflections on UK/EU Cyber Security co-operation. https://www.academia.edu/9463801/A_Year_is_a_Short_Time_in_Cyber-Space_in_Cyber_Security_2.0_Reflections_on_UK_EU_Cyber-Security_Co-Operation
68
Teuber C. EuroDynamics. 2012.http://archive.constantcontact.com/fs017/1104610489911/archive/1109045378919.html
69
Kinslow J. Physical and IT Security. Journal of Security Education 2006;2:75–91. doi:10.1300/J460v02n01_06
70
Bates S. Corporate Security: Managing the Risk Across the Security Continuum. http://content.yudu.com/Library/A3gduo/SECURITY/resources/2.htm?skipFlashCheck=true
71
Kytle B, Ruggie J. Corporate Social Responsibility as Risk Management: A Model for Multinationals. https://sites.hks.harvard.edu/m-rcbg/CSRI/publications/workingpaper_10_kytle_ruggie.pdf
72
Mullins LJ, Christy G. Management and organisational behaviour. 11th ed. Harlow: : Pearson Education 2016. https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113
73
Sandra Waddock. Building a New Institutional Infrastructure for Corporate Responsibility. Academy of Management Perspectives 2008;22:87–108.http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/27747465?pq-origsite=summon&seq=1#page_scan_tab_contents
74
Elisabet Garriga and Domènec Melé. Corporate Social Responsibility Theories: Mapping the Territory. Journal of Business Ethics 2004;53:51–71.http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/25123282?pq-origsite=summon&seq=1#page_scan_tab_contents
75
It’s Hard to Be Good. http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=buh&AN=67002622&site=ehost-live
76
Levi M. The phantom capitalists: the organization and control of long-firm fraud. Rev. ed. Aldershot: : Ashgate 2008. https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903550830002746&institutionId=2746&customerId=2745
77
Geneva Academy. The International Code of Conduct for Private Security Service Providers. https://icoca.ch/sites/all/themes/icoca/assets/icoc_english3.pdf
78
Gill ML. The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: : Palgrave Macmillan 2014. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
79
Netherlands International Law Review. 2015;62:119–40. doi:10.1007/s40802-015-0017-y
80
Ford Motors, CSR and Brand Reputation Management - 3BL Media Special Edition. 7AD.https://www.youtube.com/watch?v=ts9IEVqtYdU&feature=youtu.be
81
Reputation Institute | Reputation Measurement & Stakeholder Management. http://www.reputationinstitute.com/
82
Hopkin P. Fundamentals of risk management: understanding, evaluating and implementing effective risk management. 2nd ed. London: : Kogan Page 2012.
83
Airmic. Defining and managing reputation risk A framework for risk managers. https://www.yumpu.com/en/document/view/54493098/defining-and-managing-reputation-risk
84
Kaye L. Five Years After Deepwater Horizon, Can BP Repair Its Reputation? | Sustainable Brands. http://www.sustainablebrands.com/news_and_views/marketing_comms/leon_kaye/five_years_after_deepwater_horizon_can_bp_repair_its_reputa
85
Epstein-Reevers J. A Tale Of Two CEOs, BP vs. Massey: Part I, BP - Forbes. http://www.forbes.com/sites/csr/2010/05/19/a-tale-of-two-ceos-bp-vs-massey-part-i-bp/#1aed251d4ca1
86
Cherry, M.; Sneirson, J. Beyond Profit: Rethinking Corporate Social Responsibility and Greenwashing after the BP Oil Disaster. Tulane Law Review 2011;85:983–1038.http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tulr85&id=991
87
Matejek S, Gössling T. Beyond Legitimacy: A Case Study in BP’s "Green Lashing”. Journal of Business Ethics 2014;120:571–84. doi:10.1007/s10551-013-2006-6
88
Sustainability | BP Global. http://www.bp.com/en/global/corporate/sustainability.html
89
Gulf environmental restoration | Gulf commitment | BP U.S. https://www.bp.com/en_us/bp-us/community/commitment-to-the-gulf-of-mexico/gulf-environmental-restoration.html
90
Button M. Doing security: Critical reflections and an agenda for change. Basingstoke: : Palgrave Macmillan 2008. http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230583634
91
Loader I, Goold B, Thumala A. The moral economy of security. Theoretical Criminology 2014;18:469–88. doi:10.1177/1362480614531613
92
Smith MJ, White A. The paradox of security regulation: public protection versus normative legitimation. Policy & Politics 2014;42:421–37. doi:10.1332/030557312X655495
93
Walby K, Lippert RK, editors. Corporate security in the 21st century: theory and practice in international perspective. Basingstoke: : Palgrave Macmillan 2014. http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1725804
94
Olympics Security, Seventh Report of Session 2012–13. http://www.publications.parliament.uk/pa/cm201213/cmselect/cmhaff/531/531.pdf
95
Prenzler T. Policing and security in practice: Challenges and achievements. Basingstoke: : Palgrave Macmillan 2012. http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9781137007780
96
Gill ML. The Handbook of Security. Basingstoke: : Palgrave Macmillan 2006. http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
97
State Regulation concerning Civilian Private Security Services and their Contribution to Crime Prevention and Community Safety. http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/Ebook0.pdf
98
Shearing C, Wood J. Governing security for common goods. International Journal of the Sociology of Law 2003;31:205–25. doi:10.1016/j.ijsl.2003.09.005
99
Loader I, White A. How can we better align private security with the public interest? Towards a civilizing model of regulation. Regulation & Governance 2015;:n/a-n/a. doi:10.1111/rego.12109
100
White A. The impact of the Private Security Industry Act 2001. Security Journal 2015;28:425–42. doi:10.1057/sj.2012.53
101
Meehan B, Benson BL. The occupations of regulators influence occupational regulation: evidence from the US private security industry. Public Choice 2015;162:97–117. doi:10.1007/s11127-014-0203-1
102
O’Connor D, Lippert R, Spencer D, et al. Seeing private security like a state. Criminology and Criminal Justice 2008;8:203–26. doi:10.1177/1748895808088995
103
Private Security Services in Europe. http://www.coess.org/download.php?down=Li9kb2N1bWVudHMvZmYtMjAxMy1wcml2YXRlLXNlY3VyaXR5LXNlcnZpY2VzLWluLWV1cm9wZS1jb2Vzcy1mYWN0cy1hbmQtZmlndXJlcy5wZGY.
104
Quirk H, Seddon T, Smith G. Regulation and criminal justice: innovations in policy and research. Cambridge: : Cambridge University Press 2010. https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903547230002746&institutionId=2746&customerId=2745
105
White A. Post-crisis Policing and Public–Private Partnerships. British Journal of Criminology 2014;54:1002–22. doi:10.1093/bjc/azu063
106
Leeson N, Whitley E. Rogue trader. Updated edition. London: : Sphere 2015.
107
Nick Leeson Keynote Speaker. 2012.https://www.youtube.com/watch?v=Vfz5HlYkDi8
108
Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf
109
Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf
110
Lynn T. Drennan. Ethics, Governance and Risk Management: Lessons from Mirror Group Newspapers and Barings Bank. Journal of Business Ethics 2004;52:257–66.http://www.jstor.org/stable/25123254?pq-origsite=summon&seq=1#page_scan_tab_contents
111
Robert Francis: Insights into the Mid Staffordshire inquiry. 14AD.https://www.youtube.com/watch?v=2dtCz3OFcSM
112
SteCooper. Hillsborough - The Search for Truth. 11AD.https://www.youtube.com/watch?v=tmW1xz6jJGw
113
Football Licensing Authority. Guide to Safety at Sports Grounds. https://www.raithrovers.net/files/GuidetoSafetyatSportsGrounds.pdf
114
Taylor S. The Hillsborough stadium disaster: 15 April 1989: inquiry by the Rt Hon Lord Justice Taylor: final report: presented to Parliament by the Secretary of State for the Home Department by command of Her Majesty January 1990. https://www.scribd.com/document/69424889/Hills-Borough-Stadium-Disaster-Final-Report
115
Hillsborough Independent Panel. Hillsborough, The Report of the Hillsborough Independent Panel. https://www.gov.uk/government/publications/the-report-of-the-hillsborough-independent-panel
116
Uff J. The Southall rail accident inquiry report. http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf
117
Jeffcott S, Pidgeon N, Weyman A, et al. Risk, Trust, and Safety Culture in U.K. Train Operating Companies. Risk Analysis 2006;26:1105–21. doi:10.1111/j.1539-6924.2006.00819.x
118
Uff J. The Southall rail accident inquiry report. http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf
119
Almond P, ebrary, Inc. Corporate manslaughter and regulatory reform. New York: : Palgrave Macmillan 2013. http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1109223
120
Gobert J. The Corporate Manslaughter and Corporate Homicide Act 2007 – Thirteen years in the making but was it worth the wait? Modern Law Review 2008;71:413–33. doi:10.1111/j.1468-2230.2008.00699.x
121
Francis R. Report of the Mid Staffordshire NHS Foundation Trust Public Inquiry: executive summary HC 947, Session 2012-2013 - 0947.pdf. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/279124/0947.pdf
122
Robert Francis: Insights into the Mid Staffordshire inquiry. 14AD.https://www.youtube.com/watch?v=2dtCz3OFcSM
123
Department of Health. Patients First and Foremost. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/170701/Patients_First_and_Foremost.pdf
124
Cranfield School of Management. Mid Staffordshire Hospital: Making the Right Changes. 20AD.https://www.youtube.com/watch?v=7152JFhYfBU
125
Endorf C. Outsourcing Security: The Need, the Risks, the Providers, and the Process. Information Systems Security 2004;12:17–23. doi:10.1201/1086/44022.12.6.20040101/79782.4
126
Marin C. An Old Debate in a New Setting: In-House Versus Outsourced Security Staff in the Context of International Organizations. Journal of Applied Security Research 2013;8:510–50. doi:10.1080/19361610.2013.825756
127
Gray A. Out-sourcing Security. https://www.emeraldinsight.com/doi/pdfplus/10.1108/EUM0000000002194
128
Willcocks L, Oshri I, Hindle J. To bundle or not to bundle? Effective decision-making for business and IT services. http://www.globalsourcing.org.uk/Report_Downloads/BundleOrNot.pdf
129
Single Service or Bundle: Practitioner Perspectives on What Makes the Best ... Journal of Physical Security Published Online First: 2015.https://rbsekurity.com/the-journal-of-physical-security.html