‘2015 Information Security Breaches Survey - PwC UK’ <https://www.pwc.co.uk/assets/pdf/2015-isbs-technical-report-blue-digital.pdf>
‘A Brief History of the Responsibility to Protect (R2P)’ <https://www.youtube.com/watch?v=zql34A4elhY>
‘A Mammoth Guilt Trip; Criminalising the American Company’ The Economist <http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?p=EAIM&amp;u=leicester&amp;id=GALE|A380327111&amp;v=2.1&amp;it=r&amp;sid=summon&amp;userGroup=leicester&amp;authCount=1>
‘A Summary of the GM Recall of Chevrolet Cobalts and Other Cars | New Republic’ <https://newrepublic.com/article/117224/summary-gm-recall-chevrolet-cobalts-and-other-cars>
‘A Year Is a Short Time in Cyber-Space, in Cyber Security 2.0: Reflections on UK/EU Cyber Security Co-Operation.’ <https://www.academia.edu/9463801/A_Year_is_a_Short_Time_in_Cyber-Space_in_Cyber_Security_2.0_Reflections_on_UK_EU_Cyber-Security_Co-Operation>
Airmic, ‘Defining and Managing Reputation Risk A Framework for Risk Managers’ <https://www.yumpu.com/en/document/view/54493098/defining-and-managing-reputation-risk>
Allens Arthur Robinson, ‘CORPORATE CULTURE’ AS A BASIS FOR THE CRIMINAL LIABILITY OF CORPORATIONS’ <http://www.reports-and-materials.org/sites/default/files/reports-and-materials/Allens-Arthur-Robinson-Corporate-Culture-paper-for-Ruggie-Feb-2008.pdf>
Almond P and ebrary, Inc, Corporate Manslaughter and Regulatory Reform, vol Crime prevention and security management (Palgrave Macmillan 2013) <http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1109223>
ASIS International, ‘Standards and Guidelines, Quick Reference Guide’ <https://www.asisonline.org/globalassets/standards-and-guidelines/documents/sgquickreferenceguide.pdf>
——, ‘Security Management Standard: Physical Asset Protection’ <http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf>
——, ‘Security Management Standard: Physical Asset Protection’ <http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf>
——, ‘Security Management Standard: Physical Asset Protection’ <http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf>
——, ‘Security Management Standard: Physical Asset Protection’ <http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf>
BAE Systems, ‘Our Ethics Programme’ <https://www.baesystems.com/cs/Satellite?c=BAEMedia_C&amp;childpagename=UK%2FBAELayout&amp;cid=1434554840982&amp;pagename=UKWrapper>
Bates S, ‘Corporate Security: Managing the Risk Across the Security Continuum’ <http://content.yudu.com/Library/A3gduo/SECURITY/resources/2.htm?skipFlashCheck=true>
‘BBC - Search Results for Bae Systems Fined’ <http://www.bbc.co.uk/search?q=bae%20systems%20fined>
‘Better Ignition Switch Would Have Cost GM 90 Cents’ <https://www.youtube.com/watch?v=op4UlpNo0D0&amp;feature=youtu.be>
Bevir M, The SAGE Handbook of Governance (SAGE 2011) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529>
——, The SAGE Handbook of Governance (SAGE 2011) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529>
——, Interpreting Global Security, vol Routledge advances in international relations and global politics (Routledge 2013) <https://ebookcentral.proquest.com/lib/leicester/detail.action?pq-origsite=primo&amp;docID=1344595>
British Standards Institution, Security Management: Strategic and Operational Guidelines, vol BS 16000:2015 (BSI 2015) <https://edoc.site/bs-16000-2015-pdf-free.html>
Button M, Doing Security: Critical Reflections and an Agenda for Change, vol Crime prevention and security management (Palgrave Macmillan 2008) <http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230583634>
Cadbury A, ‘The Financial Aspects of Corporate Governance’ <https://www.frc.org.uk/getattachment/9c19ea6f-bcc7-434c-b481-f2e29c1c271a/The-Financial-Aspects-of-Corporate-Governance-(the-Cadbury-Code).pdf>
Chartered Institute of Management Accountants, ‘Simple, Practical Proposals for Better Reporting of Corporate Governance’ <http://www.cimaglobal.com/Documents/Thought_leadership_docs/Governance/Report-Leadership-Corporate-Governance-Report.pdf>
Cherry, M.; Sneirson, J., ‘Beyond Profit: Rethinking Corporate Social Responsibility and Greenwashing after the BP Oil Disaster’ (2011) 85 Tulane Law Review 983 <http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tulr85&id=991>
Clarke RA and Knake RK, Cyber War: The next Threat to National Security and What to Do about It (Ecco 2012) <https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=8531520750002746&institutionId=2746&customerId=2745>
Crane A and Matten D, Business Ethics: Managing Corporate Citizenship and Sustainability in the Age of Globalization (3rd ed, Oxford University Press 2010)
Cranfield School of Management, ‘Mid Staffordshire Hospital: Making the Right Changes’ <https://www.youtube.com/watch?v=7152JFhYfBU>
D. C. Seyle, ‘Business Participation in the Responsibility to Protect’ <http://oefresearch.org/publications/business-participation-responsibility-protect?page=4>
‘Data Protection Act 2018’ <http://www.legislation.gov.uk/ukpga/2018/12/contents/enacted>
Deloitte, ‘Sharp Rise in Estimated Costs of Implementing New Global Insurance Accounting Standards | Deloitte UK’ <https://www2.deloitte.com/uk/en/pages/press-releases/archive-press-release/sharp-rise-in-estimated-costs-of-implementing-new-global-insurance-accounting-standards.html>
Department of Health, ‘Patients First and Foremost’ <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/170701/Patients_First_and_Foremost.pdf>
‘Dr. Marc Siegel Discusses International Security Standards and ISO 31000 Risk Management’ <https://www.youtube.com/watch?v=YbmEOqKGBXI&amp;list=PL4E7A1651D7987B82&amp;index=9>
Elisabet Garriga and Domènec Melé, ‘Corporate Social Responsibility Theories: Mapping the Territory’ (2004) 53 Journal of Business Ethics 51 <http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/25123282?pq-origsite=summon&seq=1#page_scan_tab_contents>
Elliott D, Swartz E and Herbane B, Business Continuity Management: A Crisis Management Approach (2nd ed, Routledge 2010) <http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=308099>
‘EN - European Agency for Safety and Health at Work: What We Do’ <https://www.youtube.com/watch?v=Nu2fR-J7zxA>
Endorf C, ‘Outsourcing Security: The Need, the Risks, the Providers, and the Process’ (2004) 12 Information Systems Security 17
Epstein-Reevers J, ‘A Tale Of Two CEOs, BP vs. Massey: Part I, BP - Forbes’ <http://www.forbes.com/sites/csr/2010/05/19/a-tale-of-two-ceos-bp-vs-massey-part-i-bp/#1aed251d4ca1>
Football Licensing Authority, ‘Guide to Safety at Sports Grounds’ <https://www.raithrovers.net/files/GuidetoSafetyatSportsGrounds.pdf>
‘Ford Motors, CSR and Brand Reputation Management - 3BL Media Special Edition’ <https://www.youtube.com/watch?v=ts9IEVqtYdU&amp;feature=youtu.be>
‘Framework for Improving Critical Infrastructure Cybersecurity. Version 1.0.’ <https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf>
Francis R, ‘Report of the Mid Staffordshire NHS Foundation Trust Public Inquiry: Executive Summary HC 947, Session 2012-2013 - 0947.Pdf’ <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/279124/0947.pdf>
‘General Data Protection Regulation (GDPR) – Final Text Neatly Arranged’ <https://gdpr-info.eu/>
Geneva Academy, ‘The International Code of Conduct for Private Security Service Providers’ <https://icoca.ch/sites/all/themes/icoca/assets/icoc_english3.pdf>
Gill ML, The Handbook of Security (Palgrave Macmillan 2006) <http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344>
——, The Handbook of Security (Second edition, Palgrave Macmillan 2014) <http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344>
——, The Handbook of Security (Palgrave Macmillan 2014) <http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344>
——, The Handbook of Security (Second edition, Palgrave Macmillan 2014) <http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344>
‘GM Ignition Update - United States - Home’ <http://www.gmignitionupdate.com/product/public/us/en/GMIgnitionUpdate/index.html>
‘GM: Steps to a Recall Nightmare - CNNMoney’ <http://money.cnn.com/infographic/pf/autos/gm-recall-timeline/>
Gobert J, ‘The Corporate Manslaughter and Corporate Homicide Act 2007 – Thirteen Years in the Making but Was It Worth the Wait?’ (2008) 71 Modern Law Review 413
Gray A, ‘Out-Sourcing Security’ <https://www.emeraldinsight.com/doi/pdfplus/10.1108/EUM0000000002194>
‘Gulf Environmental Restoration | Gulf Commitment | BP U.S.’ <https://www.bp.com/en_us/bp-us/community/commitment-to-the-gulf-of-mexico/gulf-environmental-restoration.html>
Hillsborough Independent Panel, ‘Hillsborough, The Report of the Hillsborough Independent Panel’ <https://www.gov.uk/government/publications/the-report-of-the-hillsborough-independent-panel>
Hoogenboom AB, The Governance of Policing and Security: Ironies, Myths and Paradoxes, vol Crime prevention and security management (Palgrave Macmillan 2010) <http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=346934>
Hopkin P, Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management (2nd ed, Kogan Page 2012)
——, Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management (2nd ed, Kogan Page 2012)
‘Hyde Company Fined over Worker’s 40ft Death Plunge - BBC News’ <http://www.bbc.co.uk/news/uk-england-manchester-18931390>
‘Improving Safety and Health at Work through a Decent Work Agenda (Short Version)’ <https://www.youtube.com/watch?v=_4gX5ue2_dA&amp;list=PL994662ED670AB984&amp;index=22>
‘It’s Hard to Be Good.’ <http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&amp;db=buh&amp;AN=67002622&amp;site=ehost-live>
James Gobert, ‘The Corporate Manslaughter and Corporate Homicide Act 2007: Thirteen Years in the Making but Was It Worth the Wait?’ (2008) 71 The Modern Law Review 413 <http://www.jstor.org/stable/25151209?pq-origsite=summon&seq=1#page_scan_tab_contents>
James S, ‘Can Legislation Stop Cyber Crime?’ <http://www.computerweekly.com/opinion/Can-legislation-stop-cyber-crime>
Jeffcott S and others, ‘Risk, Trust, and Safety Culture in U.K. Train Operating Companies’ (2006) 26 Risk Analysis 1105
Kaye L, ‘Five Years After Deepwater Horizon, Can BP Repair Its Reputation? | Sustainable Brands’ <http://www.sustainablebrands.com/news_and_views/marketing_comms/leon_kaye/five_years_after_deepwater_horizon_can_bp_repair_its_reputa>
Keeler C, ‘The End of the Responsibility to Protect? | Foreign Policy Journal’ <http://www.foreignpolicyjournal.com/2011/10/12/the-end-of-the-responsibility-to-protect/>
Kinslow J, ‘Physical and IT Security’ (2006) 2 Journal of Security Education 75
Kytle B and Ruggie J, ‘Corporate Social Responsibility as Risk Management: A Model for Multinationals’ <https://sites.hks.harvard.edu/m-rcbg/CSRI/publications/workingpaper_10_kytle_ruggie.pdf>
Leeson N and Whitley E, Rogue Trader (Updated edition, Sphere 2015)
Levi M, The Phantom Capitalists: The Organization and Control of Long-Firm Fraud (Rev ed, Ashgate 2008) <https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&amp;package_service_id=5903550830002746&amp;institutionId=2746&amp;customerId=2745>
Loader I, Goold B and Thumala A, ‘The Moral Economy of Security’ (2014) 18 Theoretical Criminology 469
Loader I and White A, ‘How Can We Better Align Private Security with the Public Interest? Towards a Civilizing Model of Regulation’ [2015] Regulation & Governance n/a
Locke RM, The Promise and Limits of Private Power: Promoting Labor Standards in a Global Economy, vol Cambridge studies in comparative politics (Cambridge University Press 2013) <http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=566170>
Lowry PB and others, ‘Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse’ (2014) 121 Journal of Business Ethics 385
Lynn T. Drennan, ‘Ethics, Governance and Risk Management: Lessons from Mirror Group Newspapers and Barings Bank’ (2004) 52 Journal of Business Ethics 257 <http://www.jstor.org/stable/25123254?pq-origsite=summon&seq=1#page_scan_tab_contents>
Marin C, ‘An Old Debate in a New Setting: In-House Versus Outsourced Security Staff in the Context of International Organizations’ (2013) 8 Journal of Applied Security Research 510
Martin J, ‘Lost on the Silk Road: Online Drug Distribution and the “Cryptomarket”’ (2014) 14 Criminology and Criminal Justice 351 <https://journals.sagepub.com/doi/10.1177/1748895813505234>
Matejek S and Gössling T, ‘Beyond Legitimacy: A Case Study in BP’s "Green Lashing”’ (2014) 120 Journal of Business Ethics 571 <https://link.springer.com/article/10.1007%2Fs10551-013-2006-6>
Meehan B and Benson BL, ‘The Occupations of Regulators Influence Occupational Regulation: Evidence from the US Private Security Industry’ (2015) 162 Public Choice 97
Mullins LJ and Christy G, Management and Organisational Behaviour (11th ed, Pearson Education 2016) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113>
——, Management and Organisational Behaviour (11th ed, Pearson Education 2016) <https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=5175113&amp;ppg=8>
——, Management and Organisational Behaviour (11th ed, Pearson Education 2016) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113>
‘Netherlands International Law Review’ (2015) 62 119 <http://link.springer.com.ezproxy4.lib.le.ac.uk/article/10.1007%2Fs40802-015-0017-y>
‘Nick Leeson Keynote Speaker’ <https://www.youtube.com/watch?v=Vfz5HlYkDi8>
‘North Korea behind Sony Pictures Hack? - CNN Video’ <https://edition.cnn.com/videos/world/2014/12/03/tsr-dnt-todd-north-korea-sony.cnn>
O’Connor D and others, ‘Seeing Private Security like a State’ (2008) 8 Criminology and Criminal Justice 203
‘Olympics Security, Seventh Report of Session 2012–13’ <http://www.publications.parliament.uk/pa/cm201213/cmselect/cmhaff/531/531.pdf>
Paris R, ‘Is It Possible to Meet the Responsibility to Protect?’ <https://www.washingtonpost.com/blogs/monkey-cage/wp/2014/12/09/is-it-possible-to-meet-the-responsibility-to-protect/>
Pieth M and Ivory R, Corporate Criminal Liability: Emergence, Convergence, and Risk, vol Ius gentium (Springer 2011) <http://ezproxy.lib.le.ac.uk/login?url=http://site.ebrary.com/lib/leicester/detail.action?docID=10465362>
praxiom, ‘ISO 9000 2015 Definitions in Plain English’ <https://www.iso.org/obp/ui/#iso:std:iso:9000:ed-4:v1:en>
Prenzler T, Policing and Security in Practice: Challenges and Achievements, vol Crime prevention and security management (Palgrave Macmillan 2012) <http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9781137007780>
‘Private Security Services in Europe’ <http://www.coess.org/download.php?down=Li9kb2N1bWVudHMvZmYtMjAxMy1wcml2YXRlLXNlY3VyaXR5LXNlcnZpY2VzLWluLWV1cm9wZS1jb2Vzcy1mYWN0cy1hbmQtZmlndXJlcy5wZGY.>
Qualityguru, ‘History of Quality’ <https://www.qualitygurus.com/history-of-quality/>
Quirk H, Seddon T and Smith G, Regulation and Criminal Justice: Innovations in Policy and Research (Cambridge University Press 2010) <https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&amp;package_service_id=5903547230002746&amp;institutionId=2746&amp;customerId=2745>
‘Red Bead Experiment with Dr. W. Edwards Deming’ <https://www.youtube.com/watch?v=ckBfbvOXDvU>
‘Reputation Institute | Reputation Measurement &amp; Stakeholder Management’ <http://www.reputationinstitute.com/>
‘Return to an Order of the Honourable the House of Commons Dated 18 July 1995 for the Report of the Board of Banking Supervision Inquiry into the Circumstances of the Collapse of Barings HC 673 - 0673.Pdf’ <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf>
‘——’ <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf>
Rhodes RAW, ‘Understanding Governance: Ten Years On’ (2007) 28 Organization Studies 1243 <https://journals.sagepub.com/doi/10.1177/0170840607076586>
‘Robert Francis: Insights into the Mid Staffordshire Inquiry’ <https://www.youtube.com/watch?v=2dtCz3OFcSM>
‘——’ <https://www.youtube.com/watch?v=2dtCz3OFcSM>
Roland Paris, ‘Human Security: Paradigm Shift or Hot Air?’ (2001) 26 International Security 87 <http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/3092123?pq-origsite=summon&seq=1#page_scan_tab_contents>
Sandra Waddock, ‘Building a New Institutional Infrastructure for Corporate Responsibility’ (2008) 22 Academy of Management Perspectives 87 <http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/27747465?pq-origsite=summon&seq=1#page_scan_tab_contents>
‘Serious Crime Act 2015’ <http://www.legislation.gov.uk/ukpga/2015/9/part/2/enacted>
Shearing C and Wood J, ‘Governing Security for Common Goods’ (2003) 31 International Journal of the Sociology of Law 205
‘Single Service or Bundle: Practitioner Perspectives on What Makes the Best ...’ [2015] Journal of Physical Security <https://rbsekurity.com/the-journal-of-physical-security.html>
Smith MJ and White A, ‘The Paradox of Security Regulation: Public Protection versus Normative Legitimation’ (2014) 42 Policy & Politics 421
Souppaya M and Scarfone K, ‘NIST Special Publication 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops.’ <http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf>
‘State Regulation Concerning Civilian Private Security Services and Their Contribution to Crime Prevention and Community Safety’ <http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/Ebook0.pdf>
‘State Sponsored Cyber-Attacks Happen More and More Often - Kaspersky’ <https://www.youtube.com/watch?v=lPRowgkd6UE>
SteCooper, ‘Hillsborough - The Search for Truth’ <https://www.youtube.com/watch?v=tmW1xz6jJGw>
‘Sustainability | BP Global’ <http://www.bp.com/en/global/corporate/sustainability.html>
Taylor S, ‘The Hillsborough Stadium Disaster: 15 April 1989: Inquiry by the Rt Hon Lord Justice Taylor: Final Report: Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty January 1990’ <https://www.scribd.com/document/69424889/Hills-Borough-Stadium-Disaster-Final-Report>
Teuber C, ‘EuroDynamics’ (2012) <http://archive.constantcontact.com/fs017/1104610489911/archive/1109045378919.html>
‘The Cyber Hell - Eugene Kaspersky on the 3rd Annual International Cyber Security Conference’ <https://www.youtube.com/watch?v=2NSl9aWm9pI>
‘The Social Responsibility of Business Is to Increase Its Profits, by Milton Friedman’ <http://umich.edu/~thecore/doc/Friedman.pdf>
‘Thomas Cook Boss Apologises over Corfu Gas Deaths - BBC News’ <http://www.bbc.co.uk/news/uk-england-leeds-32809770>
‘Thomas Cook CEO Refuses to Say Sorry for Deaths as Ex-Boss Declines Questions | UK News | The Guardian’ <http://www.theguardian.com/uk-news/2015/may/07/ex-thomas-cook-boss-refuses-to-answer-questions-over-childrens-deaths>
‘Thomas Cook Shares Crash after Harriet Green Is Pushed out | Business | The Guardian’ <http://www.theguardian.com/business/2014/nov/26/thomas-cook-chief-harriet-green-shock-departure>
Uff J, ‘The Southall Rail Accident Inquiry Report’ <http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf>
——, ‘The Southall Rail Accident Inquiry Report’ <http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf>
United Nations, ‘Human Security Presentation’ <https://docs.unocha.org/sites/dms/HSU/Publications%20and%20Products/Human%20Security%20Tools/Human%20Security%20Presentation.pdf>
——, ‘Human Security - A New Response to Complex Threats’ <https://www.youtube.com/watch?v=axb0KkB2Le4>
——, ‘Human Security Unit Strategic Plan 2014-2017’ <https://drive.google.com/file/d/1DZ0kGYD3RG5zWWyiC3abSE2rYnw_XFi3/view>
Walby K and Lippert RK (eds), Corporate Security in the 21st Century: Theory and Practice in International Perspective, vol Crime prevention and security management (Palgrave Macmillan 2014) <http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1725804>
White A, ‘Post-Crisis Policing and Public–Private Partnerships’ (2014) 54 British Journal of Criminology 1002
——, ‘The Impact of the Private Security Industry Act 2001’ (2015) 28 Security Journal 425
Whitty M, ‘Anatomy of the Online Dating Romance Scam’ <http://webcache.googleusercontent.com/search?q=cache:bl10jY6RxwEJ:esrc-files.s3.amazonaws.com/outputs/1rP2bpwo6keXPqVRhVIpZg/GhkDoD8Lik631sEw4Wsscg.pdf+&amp;cd=3&amp;hl=en&amp;ct=clnk&amp;gl=uk>
Willcocks L, Oshri I and Hindle J, ‘To Bundle or Not to Bundle? Effective Decision-Making for Business and IT Services’ <http://www.globalsourcing.org.uk/Report_Downloads/BundleOrNot.pdf>
Wolf KD, Deitelhoff N and Engert S, ‘Corporate Security Responsibility: Towards a Conceptual Framework for a Comparative Research Agenda’ (2007) 42 Cooperation and Conflict 294 <https://journals-sagepub-com.ezproxy4.lib.le.ac.uk/doi/10.1177/0010836707079934>