1.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
2.
Crane A, Matten D. Business ethics: managing corporate citizenship and sustainability in the age of globalization. 3rd ed. Oxford: Oxford University Press; 2010.
3.
Lowry PB, Posey C, Roberts TL, Bennett RJ. Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse. Journal of Business Ethics. 2014 May;121(3):385–401.
4.
BBC - Search results for bae systems fined [Internet]. Available from: http://www.bbc.co.uk/search?q=bae%20systems%20fined
5.
BAE Systems. Our Ethics Programme [Internet]. 2015. Available from: https://www.baesystems.com/cs/Satellite?c=BAEMedia_C&childpagename=UK%2FBAELayout&cid=1434554840982&pagename=UKWrapper
6.
Thomas Cook boss apologises over Corfu gas deaths - BBC News [Internet]. Available from: http://www.bbc.co.uk/news/uk-england-leeds-32809770
7.
Thomas Cook CEO refuses to say sorry for deaths as ex-boss declines questions | UK news | The Guardian [Internet]. Available from: http://www.theguardian.com/uk-news/2015/may/07/ex-thomas-cook-boss-refuses-to-answer-questions-over-childrens-deaths
8.
Thomas Cook shares crash after Harriet Green is pushed out | Business | The Guardian [Internet]. Available from: http://www.theguardian.com/business/2014/nov/26/thomas-cook-chief-harriet-green-shock-departure
9.
praxiom. ISO 9000 2015 Definitions in Plain English [Internet]. Available from: https://www.iso.org/obp/ui/#iso:std:iso:9000:ed-4:v1:en
10.
The Social Responsibility of Business is to Increase its Profits, by Milton Friedman [Internet]. Available from: http://umich.edu/~thecore/doc/Friedman.pdf
11.
Qualityguru. History of Quality [Internet]. Available from: https://www.qualitygurus.com/history-of-quality/
12.
Red Bead Experiment with Dr. W. Edwards Deming [Internet]. 25AD. Available from: https://www.youtube.com/watch?v=ckBfbvOXDvU
13.
ASIS International. Standards and guidelines, quick reference guide [Internet]. 2010. Available from: https://www.asisonline.org/globalassets/standards-and-guidelines/documents/sgquickreferenceguide.pdf
14.
Dr. Marc Siegel discusses international security standards and ISO 31000 Risk Management [Internet]. 2012. Available from: https://www.youtube.com/watch?v=YbmEOqKGBXI&list=PL4E7A1651D7987B82&index=9
15.
ASIS International. Security management standard: Physical asset protection [Internet]. Available from: http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
16.
British Standards Institution. Security management: strategic and operational guidelines [Internet]. London: BSI; 2015. Available from: https://edoc.site/bs-16000-2015-pdf-free.html
17.
ASIS International. Security management standard: Physical asset protection [Internet]. Available from: http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
18.
ASIS International. Security Management Standard: Physical Asset Protection [Internet]. Available from: http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
19.
ASIS International. Security Management Standard: Physical Asset Protection [Internet]. Available from: http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf
20.
Deloitte. Sharp rise in estimated costs of implementing new global insurance accounting standards | Deloitte UK [Internet]. Available from: https://www2.deloitte.com/uk/en/pages/press-releases/archive-press-release/sharp-rise-in-estimated-costs-of-implementing-new-global-insurance-accounting-standards.html
21.
Chartered Institute of Management Accountants. Simple, practical proposals for better reporting of corporate governance [Internet]. Available from: http://www.cimaglobal.com/Documents/Thought_leadership_docs/Governance/Report-Leadership-Corporate-Governance-Report.pdf
22.
Cadbury A. The Financial Aspects of Corporate Governance [Internet]. Available from: https://www.frc.org.uk/getattachment/9c19ea6f-bcc7-434c-b481-f2e29c1c271a/The-Financial-Aspects-of-Corporate-Governance-(the-Cadbury-Code).pdf
23.
Bevir M. The SAGE handbook of governance [Internet]. Los Angeles: SAGE; 2011. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529
24.
Bevir M. Interpreting global security [Internet]. Milton Park, Abingdon, Oxon: Routledge; 2013. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?pq-origsite=primo&docID=1344595
25.
Hoogenboom AB. The governance of policing and security: ironies, myths and paradoxes [Internet]. Basingstoke: Palgrave Macmillan; 2010. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=346934
26.
Bevir M. The SAGE handbook of governance [Internet]. Los Angeles: SAGE; 2011. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529
27.
Hyde company fined over worker’s 40ft death plunge - BBC News [Internet]. Available from: http://www.bbc.co.uk/news/uk-england-manchester-18931390
28.
Rhodes RAW. Understanding Governance: Ten Years On. Organization Studies [Internet]. 2007 Aug 1;28(8):1243–1264. Available from: https://journals.sagepub.com/doi/10.1177/0170840607076586
29.
Mullins LJ, Christy G. Management and organisational behaviour [Internet]. 11th ed. Harlow: Pearson Education; 2016. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113
30.
Elliott D, Swartz E, Herbane B. Business continuity management: a crisis management approach [Internet]. 2nd ed. New York, NY: Routledge; 2010. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=308099
31.
A Summary of the GM Recall of Chevrolet Cobalts and Other Cars | New Republic [Internet]. Available from: https://newrepublic.com/article/117224/summary-gm-recall-chevrolet-cobalts-and-other-cars
32.
GM: Steps to a recall nightmare - CNNMoney [Internet]. Available from: http://money.cnn.com/infographic/pf/autos/gm-recall-timeline/
33.
GM Ignition Update - United States - Home [Internet]. Available from: http://www.gmignitionupdate.com/product/public/us/en/GMIgnitionUpdate/index.html
34.
Better Ignition Switch Would Have Cost GM 90 Cents [Internet]. 2AD. Available from: https://www.youtube.com/watch?v=op4UlpNo0D0&feature=youtu.be
35.
A mammoth guilt trip; Criminalising the American company. The Economist [Internet]. Available from: http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?p=EAIM&u=leicester&id=GALE|A380327111&v=2.1&it=r&sid=summon&userGroup=leicester&authCount=1
36.
James Gobert. The Corporate Manslaughter and Corporate Homicide Act 2007: Thirteen Years in the Making but Was It Worth the Wait? The Modern Law Review [Internet]. 2008;71(3):413–433. Available from: http://www.jstor.org/stable/25151209?pq-origsite=summon&seq=1#page_scan_tab_contents
37.
Pieth M, Ivory R. Corporate criminal liability: emergence, convergence, and risk [Internet]. Dordrecht: Springer; 2011. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://site.ebrary.com/lib/leicester/detail.action?docID=10465362
38.
Allens Arthur Robinson. CORPORATE CULTURE’ AS A BASIS FOR THE CRIMINAL LIABILITY OF CORPORATIONS [Internet]. Available from: http://www.reports-and-materials.org/sites/default/files/reports-and-materials/Allens-Arthur-Robinson-Corporate-Culture-paper-for-Ruggie-Feb-2008.pdf
39.
Mullins LJ, Christy G. Management and organisational behaviour [Internet]. 11th ed. Harlow: Pearson Education; 2016. Available from: https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=5175113&ppg=8
40.
Hopkin P. Fundamentals of risk management: understanding, evaluating and implementing effective risk management. 2nd ed. London: Kogan Page; 2012.
41.
Improving safety and health at work through a Decent Work Agenda (short version) [Internet]. 2012. Available from: https://www.youtube.com/watch?v=_4gX5ue2_dA&list=PL994662ED670AB984&index=22
42.
EN - European Agency for Safety and Health at Work: What we do [Internet]. 2014. Available from: https://www.youtube.com/watch?v=Nu2fR-J7zxA
43.
Locke RM. The Promise and limits of private power: promoting labor standards in a global economy [Internet]. Cambridge: Cambridge University Press; 2013. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=566170
44.
United Nations. Human Security Presentation [Internet]. 2011. Available from: https://docs.unocha.org/sites/dms/HSU/Publications%20and%20Products/Human%20Security%20Tools/Human%20Security%20Presentation.pdf
45.
United Nations. Human Security Unit Strategic Plan 2014-2017 [Internet]. Available from: https://drive.google.com/file/d/1DZ0kGYD3RG5zWWyiC3abSE2rYnw_XFi3/view
46.
United Nations. Human Security - A New Response to Complex Threats [Internet]. 2013. Available from: https://www.youtube.com/watch?v=axb0KkB2Le4
47.
Roland Paris. Human Security: Paradigm Shift or Hot Air? International Security [Internet]. 2001;26(2):87–102. Available from: http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/3092123?pq-origsite=summon&seq=1#page_scan_tab_contents
48.
A Brief History of the Responsibility to Protect (R2P) [Internet]. 2013. Available from: https://www.youtube.com/watch?v=zql34A4elhY
49.
Keeler C. The End of the Responsibility to Protect? | Foreign Policy Journal [Internet]. Available from: http://www.foreignpolicyjournal.com/2011/10/12/the-end-of-the-responsibility-to-protect/
50.
Paris R. Is it possible to meet the Responsibility to Protect? [Internet]. Available from: https://www.washingtonpost.com/blogs/monkey-cage/wp/2014/12/09/is-it-possible-to-meet-the-responsibility-to-protect/
51.
Wolf KD, Deitelhoff N, Engert S. Corporate Security Responsibility: Towards a Conceptual Framework for a Comparative Research Agenda. Cooperation and Conflict [Internet]. 2007;42(3):294–320. Available from: https://journals-sagepub-com.ezproxy4.lib.le.ac.uk/doi/10.1177/0010836707079934
52.
D. C. Seyle. Business Participation in the Responsibility to Protect. 2013; Available from: http://oefresearch.org/publications/business-participation-responsibility-protect?page=4
53.
Data Protection Act 2018. Statute Law Database; Available from: http://www.legislation.gov.uk/ukpga/2018/12/contents/enacted
54.
General Data Protection Regulation (GDPR) – Final text neatly arranged [Internet]. Available from: https://gdpr-info.eu/
55.
Serious Crime Act 2015. Queen’s Printer of Acts of Parliament; Available from: http://www.legislation.gov.uk/ukpga/2015/9/part/2/enacted
56.
James S. Can legislation stop cyber crime? [Internet]. Available from: http://www.computerweekly.com/opinion/Can-legislation-stop-cyber-crime
57.
Clarke RA, Knake RK. Cyber war: the next threat to national security and what to do about it [Internet]. New York: Ecco; 2012. Available from: https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=8531520750002746&institutionId=2746&customerId=2745
58.
Framework for Improving Critical Infrastructure Cybersecurity. Version 1.0. [Internet]. Available from: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
59.
Gill ML. The Handbook of Security [Internet]. Basingstoke: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
60.
State sponsored cyber-attacks happen more and more often - Kaspersky [Internet]. 24AD. Available from: https://www.youtube.com/watch?v=lPRowgkd6UE
61.
Souppaya M, Scarfone K. NIST Special Publication 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops. [Internet]. Available from: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf
62.
2015 Information security breaches survey - PwC UK [Internet]. Available from: https://www.pwc.co.uk/assets/pdf/2015-isbs-technical-report-blue-digital.pdf
63.
Martin J. Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’. Criminology and Criminal Justice [Internet]. 2014 Jul 1;14(3):351–367. Available from: https://journals.sagepub.com/doi/10.1177/1748895813505234
64.
Whitty M. Anatomy of the Online Dating Romance Scam [Internet]. Available from: http://webcache.googleusercontent.com/search?q=cache:bl10jY6RxwEJ:esrc-files.s3.amazonaws.com/outputs/1rP2bpwo6keXPqVRhVIpZg/GhkDoD8Lik631sEw4Wsscg.pdf+&cd=3&hl=en&ct=clnk&gl=uk
65.
North Korea behind Sony Pictures hack? - CNN Video [Internet]. Available from: https://edition.cnn.com/videos/world/2014/12/03/tsr-dnt-todd-north-korea-sony.cnn
66.
The cyber hell - Eugene Kaspersky on the 3rd annual International Cyber Security Conference [Internet]. 12AD. Available from: https://www.youtube.com/watch?v=2NSl9aWm9pI
67.
A Year is a Short Time in Cyber-Space, in Cyber Security 2.0: Reflections on UK/EU Cyber Security co-operation. [Internet]. Available from: https://www.academia.edu/9463801/A_Year_is_a_Short_Time_in_Cyber-Space_in_Cyber_Security_2.0_Reflections_on_UK_EU_Cyber-Security_Co-Operation
68.
Teuber C. EuroDynamics [Internet]. 2012. Available from: http://archive.constantcontact.com/fs017/1104610489911/archive/1109045378919.html
69.
Kinslow J. Physical and IT Security. Journal of Security Education. 2006;2(1):75–91.
70.
Bates S. Corporate Security: Managing the Risk Across the Security Continuum [Internet]. Available from: http://content.yudu.com/Library/A3gduo/SECURITY/resources/2.htm?skipFlashCheck=true
71.
Kytle B, Ruggie J. Corporate Social Responsibility as Risk Management: A Model for Multinationals [Internet]. Available from: https://sites.hks.harvard.edu/m-rcbg/CSRI/publications/workingpaper_10_kytle_ruggie.pdf
72.
Mullins LJ, Christy G. Management and organisational behaviour [Internet]. 11th ed. Harlow: Pearson Education; 2016. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113
73.
Sandra Waddock. Building a New Institutional Infrastructure for Corporate Responsibility. Academy of Management Perspectives [Internet]. 2008;22(3):87–108. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/27747465?pq-origsite=summon&seq=1#page_scan_tab_contents
74.
Elisabet Garriga and Domènec Melé. Corporate Social Responsibility Theories: Mapping the Territory. Journal of Business Ethics [Internet]. 2004;53(1):51–71. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/25123282?pq-origsite=summon&seq=1#page_scan_tab_contents
75.
It’s Hard to Be Good. Available from: http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=buh&AN=67002622&site=ehost-live
76.
Levi M. The phantom capitalists: the organization and control of long-firm fraud [Internet]. Rev. ed. Aldershot: Ashgate; 2008. Available from: https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903550830002746&institutionId=2746&customerId=2745
77.
Geneva Academy. The International Code of Conduct for Private Security Service Providers [Internet]. Available from: https://icoca.ch/sites/all/themes/icoca/assets/icoc_english3.pdf
78.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
79.
Netherlands International Law Review. Springer International Publishing; 2015 Apr;62(Issue 1):119–140. Available from: http://link.springer.com.ezproxy4.lib.le.ac.uk/article/10.1007%2Fs40802-015-0017-y
80.
Ford Motors, CSR and Brand Reputation Management - 3BL Media Special Edition [Internet]. 7AD. Available from: https://www.youtube.com/watch?v=ts9IEVqtYdU&feature=youtu.be
81.
Reputation Institute | Reputation Measurement & Stakeholder Management [Internet]. Available from: http://www.reputationinstitute.com/
82.
Hopkin P. Fundamentals of risk management: understanding, evaluating and implementing effective risk management. 2nd ed. London: Kogan Page; 2012.
83.
Airmic. Defining and managing reputation risk A framework for risk managers [Internet]. Available from: https://www.yumpu.com/en/document/view/54493098/defining-and-managing-reputation-risk
84.
Kaye L. Five Years After Deepwater Horizon, Can BP Repair Its Reputation? | Sustainable Brands [Internet]. Available from: http://www.sustainablebrands.com/news_and_views/marketing_comms/leon_kaye/five_years_after_deepwater_horizon_can_bp_repair_its_reputa
85.
Epstein-Reevers J. A Tale Of Two CEOs, BP vs. Massey: Part I, BP - Forbes [Internet]. Available from: http://www.forbes.com/sites/csr/2010/05/19/a-tale-of-two-ceos-bp-vs-massey-part-i-bp/#1aed251d4ca1
86.
Cherry, M.; Sneirson, J. Beyond Profit: Rethinking Corporate Social Responsibility and Greenwashing after the BP Oil Disaster. Tulane Law Review [Internet]. 2011;85(4):983–1038. Available from: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tulr85&id=991
87.
Matejek S, Gössling T. Beyond Legitimacy: A Case Study in BP’s "Green Lashing”. Journal of Business Ethics [Internet]. 2014 Apr;120(4):571–584. Available from: https://link.springer.com/article/10.1007%2Fs10551-013-2006-6
88.
Sustainability | BP Global [Internet]. Available from: http://www.bp.com/en/global/corporate/sustainability.html
89.
Gulf environmental restoration | Gulf commitment | BP U.S. [Internet]. Available from: https://www.bp.com/en_us/bp-us/community/commitment-to-the-gulf-of-mexico/gulf-environmental-restoration.html
90.
Button M. Doing security: Critical reflections and an agenda for change [Internet]. Basingstoke: Palgrave Macmillan; 2008. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230583634
91.
Loader I, Goold B, Thumala A. The moral economy of security. Theoretical Criminology. 2014 Nov 1;18(4):469–488.
92.
Smith MJ, White A. The paradox of security regulation: public protection versus normative legitimation. Policy & Politics. 2014 Jul 1;42(3):421–437.
93.
Walby K, Lippert RK, editors. Corporate security in the 21st century: theory and practice in international perspective [Internet]. Basingstoke: Palgrave Macmillan; 2014. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1725804
94.
Olympics Security, Seventh Report of Session 2012–13 [Internet]. Available from: http://www.publications.parliament.uk/pa/cm201213/cmselect/cmhaff/531/531.pdf
95.
Prenzler T. Policing and security in practice: Challenges and achievements [Internet]. Basingstoke: Palgrave Macmillan; 2012. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9781137007780
96.
Gill ML. The Handbook of Security [Internet]. Basingstoke: Palgrave Macmillan; 2006. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
97.
State Regulation concerning Civilian Private Security Services and their Contribution to Crime Prevention and Community Safety [Internet]. Available from: http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/Ebook0.pdf
98.
Shearing C, Wood J. Governing security for common goods. International Journal of the Sociology of Law. 2003 Sep;31(3):205–225.
99.
Loader I, White A. How can we better align private security with the public interest? Towards a civilizing model of regulation. Regulation & Governance. 2015;n/a-n/a.
100.
White A. The impact of the Private Security Industry Act 2001. Security Journal. 2015 Oct;28(4):425–442.
101.
Meehan B, Benson BL. The occupations of regulators influence occupational regulation: evidence from the US private security industry. Public Choice. 2015 Jan;162(1–2):97–117.
102.
O’Connor D, Lippert R, Spencer D, Smylie L. Seeing private security like a state. Criminology and Criminal Justice. 2008 May 1;8(2):203–226.
103.
Private Security Services in Europe [Internet]. Available from: http://www.coess.org/download.php?down=Li9kb2N1bWVudHMvZmYtMjAxMy1wcml2YXRlLXNlY3VyaXR5LXNlcnZpY2VzLWluLWV1cm9wZS1jb2Vzcy1mYWN0cy1hbmQtZmlndXJlcy5wZGY.
104.
Quirk H, Seddon T, Smith G. Regulation and criminal justice: innovations in policy and research [Internet]. Cambridge: Cambridge University Press; 2010. Available from: https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903547230002746&institutionId=2746&customerId=2745
105.
White A. Post-crisis Policing and Public–Private Partnerships. British Journal of Criminology. 2014 Nov;54(6):1002–1022.
106.
Leeson N, Whitley E. Rogue trader. Updated edition. London: Sphere; 2015.
107.
Nick Leeson Keynote Speaker [Internet]. 2012. Available from: https://www.youtube.com/watch?v=Vfz5HlYkDi8
108.
Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf [Internet]. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf
109.
Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf [Internet]. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf
110.
Lynn T. Drennan. Ethics, Governance and Risk Management: Lessons from Mirror Group Newspapers and Barings Bank. Journal of Business Ethics [Internet]. 2004;52(3):257–266. Available from: http://www.jstor.org/stable/25123254?pq-origsite=summon&seq=1#page_scan_tab_contents
111.
Robert Francis: Insights into the Mid Staffordshire inquiry [Internet]. 14AD. Available from: https://www.youtube.com/watch?v=2dtCz3OFcSM
112.
SteCooper. Hillsborough - The Search for Truth [Internet]. 11AD. Available from: https://www.youtube.com/watch?v=tmW1xz6jJGw
113.
Football Licensing Authority. Guide to Safety at Sports Grounds [Internet]. Available from: https://www.raithrovers.net/files/GuidetoSafetyatSportsGrounds.pdf
114.
Taylor S. The Hillsborough stadium disaster: 15 April 1989: inquiry by the Rt Hon Lord Justice Taylor: final report: presented to Parliament by the Secretary of State for the Home Department by command of Her Majesty January 1990 [Internet]. Available from: https://www.scribd.com/document/69424889/Hills-Borough-Stadium-Disaster-Final-Report
115.
Hillsborough Independent Panel. Hillsborough, The Report of the Hillsborough Independent Panel [Internet]. Available from: https://www.gov.uk/government/publications/the-report-of-the-hillsborough-independent-panel
116.
Uff J. The Southall rail accident inquiry report [Internet]. Available from: http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf
117.
Jeffcott S, Pidgeon N, Weyman A, Walls J. Risk, Trust, and Safety Culture in U.K. Train Operating Companies. Risk Analysis. 2006 Oct;26(5):1105–1121.
118.
Uff J. The Southall rail accident inquiry report [Internet]. Available from: http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf
119.
Almond P, ebrary, Inc. Corporate manslaughter and regulatory reform [Internet]. New York: Palgrave Macmillan; 2013. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1109223
120.
Gobert J. The Corporate Manslaughter and Corporate Homicide Act 2007 – Thirteen years in the making but was it worth the wait? Modern Law Review. 2008;71(3):413–433.
121.
Francis R. Report of the Mid Staffordshire NHS Foundation Trust Public Inquiry: executive summary HC 947, Session 2012-2013 - 0947.pdf [Internet]. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/279124/0947.pdf
122.
Robert Francis: Insights into the Mid Staffordshire inquiry [Internet]. 14AD. Available from: https://www.youtube.com/watch?v=2dtCz3OFcSM
123.
Department of Health. Patients First and Foremost [Internet]. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/170701/Patients_First_and_Foremost.pdf
124.
Cranfield School of Management. Mid Staffordshire Hospital: Making the Right Changes [Internet]. 20AD. Available from: https://www.youtube.com/watch?v=7152JFhYfBU
125.
Endorf C. Outsourcing Security: The Need, the Risks, the Providers, and the Process. Information Systems Security. 2004 Jan;12(6):17–23.
126.
Marin C. An Old Debate in a New Setting: In-House Versus Outsourced Security Staff in the Context of International Organizations. Journal of Applied Security Research. 2013 Oct;8(4):510–550.
127.
Gray A. Out-sourcing Security. Available from: https://www.emeraldinsight.com/doi/pdfplus/10.1108/EUM0000000002194
128.
Willcocks L, Oshri I, Hindle J. To bundle or not to bundle? Effective decision-making for business and IT services [Internet]. Available from: http://www.globalsourcing.org.uk/Report_Downloads/BundleOrNot.pdf
129.
Single Service or Bundle: Practitioner Perspectives on What Makes the Best ... Journal of Physical Security [Internet]. 2015; Available from: https://rbsekurity.com/the-journal-of-physical-security.html