1.
Gill, M.L.: The Handbook of Security. Palgrave Macmillan, Houndmills, Basingstoke, Hampshire (2014).
2.
Crane, A., Matten, D.: Business ethics: managing corporate citizenship and sustainability in the age of globalization. Oxford University Press, Oxford (2010).
3.
Lowry, P.B., Posey, C., Roberts, T.L., Bennett, R.J.: Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse. Journal of Business Ethics. 121, 385–401 (2014). https://doi.org/10.1007/s10551-013-1705-3.
4.
BBC - Search results for bae systems fined, http://www.bbc.co.uk/search?q=bae%20systems%20fined.
5.
BAE Systems: Our Ethics Programme, https://www.baesystems.com/cs/Satellite?c=BAEMedia_C&childpagename=UK%2FBAELayout&cid=1434554840982&pagename=UKWrapper, (2015).
6.
Thomas Cook boss apologises over Corfu gas deaths - BBC News, http://www.bbc.co.uk/news/uk-england-leeds-32809770.
7.
Thomas Cook CEO refuses to say sorry for deaths as ex-boss declines questions | UK news | The Guardian, http://www.theguardian.com/uk-news/2015/may/07/ex-thomas-cook-boss-refuses-to-answer-questions-over-childrens-deaths.
8.
Thomas Cook shares crash after Harriet Green is pushed out | Business | The Guardian, http://www.theguardian.com/business/2014/nov/26/thomas-cook-chief-harriet-green-shock-departure.
9.
praxiom: ISO 9000 2015 Definitions in Plain English, https://www.iso.org/obp/ui/#iso:std:iso:9000:ed-4:v1:en.
10.
The Social Responsibility of Business is to Increase its Profits, by Milton Friedman, http://umich.edu/~thecore/doc/Friedman.pdf.
11.
Qualityguru: History of Quality, https://www.qualitygurus.com/history-of-quality/.
12.
Red Bead Experiment with Dr. W. Edwards Deming, https://www.youtube.com/watch?v=ckBfbvOXDvU, (25)AD.
13.
ASIS International: Standards and guidelines, quick reference guide, https://www.asisonline.org/globalassets/standards-and-guidelines/documents/sgquickreferenceguide.pdf, (2010).
14.
Dr. Marc Siegel discusses international security standards and ISO 31000 Risk Management, https://www.youtube.com/watch?v=YbmEOqKGBXI&list=PL4E7A1651D7987B82&index=9, (2012).
15.
ASIS International: Security management standard: Physical asset protection, http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf.
16.
British Standards Institution: Security management: strategic and operational guidelines. BSI, London (2015).
17.
ASIS International: Security management standard: Physical asset protection, http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf.
18.
ASIS International: Security Management Standard: Physical Asset Protection, http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf.
19.
ASIS International: Security Management Standard: Physical Asset Protection, http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf.
20.
Deloitte: Sharp rise in estimated costs of implementing new global insurance accounting standards | Deloitte UK, https://www2.deloitte.com/uk/en/pages/press-releases/archive-press-release/sharp-rise-in-estimated-costs-of-implementing-new-global-insurance-accounting-standards.html.
21.
Chartered Institute of Management Accountants: Simple, practical proposals for better reporting of corporate governance, http://www.cimaglobal.com/Documents/Thought_leadership_docs/Governance/Report-Leadership-Corporate-Governance-Report.pdf.
22.
Cadbury, A.: The Financial Aspects of Corporate Governance, https://www.frc.org.uk/getattachment/9c19ea6f-bcc7-434c-b481-f2e29c1c271a/The-Financial-Aspects-of-Corporate-Governance-(the-Cadbury-Code).pdf.
23.
Bevir, M.: The SAGE handbook of governance. SAGE, Los Angeles (2011).
24.
Bevir, M.: Interpreting global security. Routledge, Milton Park, Abingdon, Oxon (2013).
25.
Hoogenboom, A.B.: The governance of policing and security: ironies, myths and paradoxes. Palgrave Macmillan, Basingstoke (2010).
26.
Bevir, M.: The SAGE handbook of governance. SAGE, Los Angeles (2011).
27.
Hyde company fined over worker’s 40ft death plunge - BBC News, http://www.bbc.co.uk/news/uk-england-manchester-18931390.
28.
Rhodes, R.A.W.: Understanding Governance: Ten Years On. Organization Studies. 28, 1243–1264 (2007). https://doi.org/10.1177/0170840607076586.
29.
Mullins, L.J., Christy, G.: Management and organisational behaviour. Pearson Education, Harlow (2016).
30.
Elliott, D., Swartz, E., Herbane, B.: Business continuity management: a crisis management approach. Routledge, New York, NY (2010).
31.
A Summary of the GM Recall of Chevrolet Cobalts and Other Cars | New Republic, https://newrepublic.com/article/117224/summary-gm-recall-chevrolet-cobalts-and-other-cars.
32.
GM: Steps to a recall nightmare - CNNMoney, http://money.cnn.com/infographic/pf/autos/gm-recall-timeline/.
33.
GM Ignition Update - United States - Home, http://www.gmignitionupdate.com/product/public/us/en/GMIgnitionUpdate/index.html.
34.
Better Ignition Switch Would Have Cost GM 90 Cents, https://www.youtube.com/watch?v=op4UlpNo0D0&feature=youtu.be, (2)AD.
35.
A mammoth guilt trip; Criminalising the American company. The Economist.
36.
James Gobert: The Corporate Manslaughter and Corporate Homicide Act 2007: Thirteen Years in the Making but Was It Worth the Wait? The Modern Law Review. 71, 413–433 (2008).
37.
Pieth, M., Ivory, R.: Corporate criminal liability: emergence, convergence, and risk. Springer, Dordrecht (2011).
38.
Allens Arthur Robinson: CORPORATE CULTURE’ AS A BASIS FOR THE CRIMINAL LIABILITY OF CORPORATIONS, http://www.reports-and-materials.org/sites/default/files/reports-and-materials/Allens-Arthur-Robinson-Corporate-Culture-paper-for-Ruggie-Feb-2008.pdf.
39.
Mullins, L.J., Christy, G.: Management and organisational behaviour. Pearson Education, Harlow (2016).
40.
Hopkin, P.: Fundamentals of risk management: understanding, evaluating and implementing effective risk management. Kogan Page, London (2012).
41.
Improving safety and health at work through a Decent Work Agenda (short version), https://www.youtube.com/watch?v=_4gX5ue2_dA&list=PL994662ED670AB984&index=22, (2012).
42.
EN - European Agency for Safety and Health at Work: What we do, https://www.youtube.com/watch?v=Nu2fR-J7zxA, (2014).
43.
Locke, R.M.: The Promise and limits of private power: promoting labor standards in a global economy. Cambridge University Press, Cambridge (2013).
44.
United Nations: Human Security Presentation, https://docs.unocha.org/sites/dms/HSU/Publications%20and%20Products/Human%20Security%20Tools/Human%20Security%20Presentation.pdf, (2011).
45.
United Nations: Human Security Unit Strategic Plan 2014-2017, https://drive.google.com/file/d/1DZ0kGYD3RG5zWWyiC3abSE2rYnw_XFi3/view.
46.
United Nations: Human Security - A New Response to Complex Threats, https://www.youtube.com/watch?v=axb0KkB2Le4, (2013).
47.
Roland Paris: Human Security: Paradigm Shift or Hot Air? International Security. 26, 87–102 (2001).
48.
A Brief History of the Responsibility to Protect (R2P), https://www.youtube.com/watch?v=zql34A4elhY, (2013).
49.
Keeler, C.: The End of the Responsibility to Protect? | Foreign Policy Journal, http://www.foreignpolicyjournal.com/2011/10/12/the-end-of-the-responsibility-to-protect/.
50.
Paris, R.: Is it possible to meet the Responsibility to Protect?, https://www.washingtonpost.com/blogs/monkey-cage/wp/2014/12/09/is-it-possible-to-meet-the-responsibility-to-protect/.
51.
Wolf, K.D., Deitelhoff, N., Engert, S.: Corporate Security Responsibility: Towards a Conceptual Framework for a Comparative Research Agenda. Cooperation and Conflict. 42, 294–320 (2007). https://doi.org/10.1177/0010836707079934.
52.
D. C. Seyle: Business Participation in the Responsibility to Protect. (2013).
53.
Data Protection Act 2018.
54.
General Data Protection Regulation (GDPR) – Final text neatly arranged, https://gdpr-info.eu/.
55.
Serious Crime Act 2015.
56.
James, S.: Can legislation stop cyber crime?, http://www.computerweekly.com/opinion/Can-legislation-stop-cyber-crime.
57.
Clarke, R.A., Knake, R.K.: Cyber war: the next threat to national security and what to do about it. Ecco, New York (2012).
58.
Framework for Improving Critical Infrastructure Cybersecurity. Version 1.0., https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.
59.
Gill, M.L.: The Handbook of Security. Palgrave Macmillan, Basingstoke (2014).
60.
State sponsored cyber-attacks happen more and more often - Kaspersky, https://www.youtube.com/watch?v=lPRowgkd6UE, (24)AD.
61.
Souppaya, M., Scarfone, K.: NIST Special Publication 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops., http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf.
62.
2015 Information security breaches survey - PwC UK, https://www.pwc.co.uk/assets/pdf/2015-isbs-technical-report-blue-digital.pdf.
63.
Martin, J.: Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’. Criminology and Criminal Justice. 14, 351–367 (2014). https://doi.org/10.1177/1748895813505234.
64.
Whitty, M.: Anatomy of the Online Dating Romance Scam, http://webcache.googleusercontent.com/search?q=cache:bl10jY6RxwEJ:esrc-files.s3.amazonaws.com/outputs/1rP2bpwo6keXPqVRhVIpZg/GhkDoD8Lik631sEw4Wsscg.pdf+&cd=3&hl=en&ct=clnk&gl=uk.
65.
North Korea behind Sony Pictures hack? - CNN Video, https://edition.cnn.com/videos/world/2014/12/03/tsr-dnt-todd-north-korea-sony.cnn.
66.
The cyber hell - Eugene Kaspersky on the 3rd annual International Cyber Security Conference, https://www.youtube.com/watch?v=2NSl9aWm9pI, (12)AD.
67.
A Year is a Short Time in Cyber-Space, in Cyber Security 2.0: Reflections on UK/EU Cyber Security co-operation., https://www.academia.edu/9463801/A_Year_is_a_Short_Time_in_Cyber-Space_in_Cyber_Security_2.0_Reflections_on_UK_EU_Cyber-Security_Co-Operation.
68.
Teuber, C.: EuroDynamics, http://archive.constantcontact.com/fs017/1104610489911/archive/1109045378919.html.
69.
Kinslow, J.: Physical and IT Security. Journal of Security Education. 2, 75–91 (2006). https://doi.org/10.1300/J460v02n01_06.
70.
Bates, S.: Corporate Security: Managing the Risk Across the Security Continuum, http://content.yudu.com/Library/A3gduo/SECURITY/resources/2.htm?skipFlashCheck=true.
71.
Kytle, B., Ruggie, J.: Corporate Social Responsibility as Risk Management: A Model for Multinationals, https://sites.hks.harvard.edu/m-rcbg/CSRI/publications/workingpaper_10_kytle_ruggie.pdf.
72.
Mullins, L.J., Christy, G.: Management and organisational behaviour. Pearson Education, Harlow (2016).
73.
Sandra Waddock: Building a New Institutional Infrastructure for Corporate Responsibility. Academy of Management Perspectives. 22, 87–108 (2008).
74.
Elisabet Garriga and Domènec Melé: Corporate Social Responsibility Theories: Mapping the Territory. Journal of Business Ethics. 53, 51–71 (2004).
75.
It’s Hard to Be Good.
76.
Levi, M.: The phantom capitalists: the organization and control of long-firm fraud. Ashgate, Aldershot (2008).
77.
Geneva Academy: The International Code of Conduct for Private Security Service Providers, https://icoca.ch/sites/all/themes/icoca/assets/icoc_english3.pdf.
78.
Gill, M.L.: The Handbook of Security. Palgrave Macmillan, Houndmills, Basingstoke, Hampshire (2014).
79.
Netherlands International Law Review. 62, 119–140 (2015). https://doi.org/10.1007/s40802-015-0017-y.
80.
Ford Motors, CSR and Brand Reputation Management - 3BL Media Special Edition, https://www.youtube.com/watch?v=ts9IEVqtYdU&feature=youtu.be, (7)AD.
81.
Reputation Institute | Reputation Measurement & Stakeholder Management, http://www.reputationinstitute.com/.
82.
Hopkin, P.: Fundamentals of risk management: understanding, evaluating and implementing effective risk management. Kogan Page, London (2012).
83.
Airmic: Defining and managing reputation risk A framework for risk managers, https://www.yumpu.com/en/document/view/54493098/defining-and-managing-reputation-risk.
84.
Kaye, L.: Five Years After Deepwater Horizon, Can BP Repair Its Reputation? | Sustainable Brands, http://www.sustainablebrands.com/news_and_views/marketing_comms/leon_kaye/five_years_after_deepwater_horizon_can_bp_repair_its_reputa.
85.
Epstein-Reevers, J.: A Tale Of Two CEOs, BP vs. Massey: Part I, BP - Forbes, http://www.forbes.com/sites/csr/2010/05/19/a-tale-of-two-ceos-bp-vs-massey-part-i-bp/#1aed251d4ca1.
86.
Cherry, M.; Sneirson, J.: Beyond Profit: Rethinking Corporate Social Responsibility and Greenwashing after the BP Oil Disaster. Tulane Law Review. 85, 983–1038 (2011).
87.
Matejek, S., Gössling, T.: Beyond Legitimacy: A Case Study in BP’s "Green Lashing”. Journal of Business Ethics. 120, 571–584 (2014). https://doi.org/10.1007/s10551-013-2006-6.
88.
Sustainability | BP Global, http://www.bp.com/en/global/corporate/sustainability.html.
89.
Gulf environmental restoration | Gulf commitment | BP U.S., https://www.bp.com/en_us/bp-us/community/commitment-to-the-gulf-of-mexico/gulf-environmental-restoration.html.
90.
Button, M.: Doing security: Critical reflections and an agenda for change. Palgrave Macmillan, Basingstoke (2008).
91.
Loader, I., Goold, B., Thumala, A.: The moral economy of security. Theoretical Criminology. 18, 469–488 (2014). https://doi.org/10.1177/1362480614531613.
92.
Smith, M.J., White, A.: The paradox of security regulation: public protection versus normative legitimation. Policy & Politics. 42, 421–437 (2014). https://doi.org/10.1332/030557312X655495.
93.
Walby, K., Lippert, R.K. eds: Corporate security in the 21st century: theory and practice in international perspective. Palgrave Macmillan, Basingstoke (2014).
94.
Olympics Security, Seventh Report of Session 2012–13, http://www.publications.parliament.uk/pa/cm201213/cmselect/cmhaff/531/531.pdf.
95.
Prenzler, T.: Policing and security in practice: Challenges and achievements. Palgrave Macmillan, Basingstoke (2012).
96.
Gill, M.L.: The Handbook of Security. Palgrave Macmillan, Basingstoke (2006).
97.
State Regulation concerning Civilian Private Security Services and their Contribution to Crime Prevention and Community Safety, http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/Ebook0.pdf.
98.
Shearing, C., Wood, J.: Governing security for common goods. International Journal of the Sociology of Law. 31, 205–225 (2003). https://doi.org/10.1016/j.ijsl.2003.09.005.
99.
Loader, I., White, A.: How can we better align private security with the public interest? Towards a civilizing model of regulation. Regulation & Governance. n/a-n/a (2015). https://doi.org/10.1111/rego.12109.
100.
White, A.: The impact of the Private Security Industry Act 2001. Security Journal. 28, 425–442 (2015). https://doi.org/10.1057/sj.2012.53.
101.
Meehan, B., Benson, B.L.: The occupations of regulators influence occupational regulation: evidence from the US private security industry. Public Choice. 162, 97–117 (2015). https://doi.org/10.1007/s11127-014-0203-1.
102.
O’Connor, D., Lippert, R., Spencer, D., Smylie, L.: Seeing private security like a state. Criminology and Criminal Justice. 8, 203–226 (2008). https://doi.org/10.1177/1748895808088995.
103.
Private Security Services in Europe, http://www.coess.org/download.php?down=Li9kb2N1bWVudHMvZmYtMjAxMy1wcml2YXRlLXNlY3VyaXR5LXNlcnZpY2VzLWluLWV1cm9wZS1jb2Vzcy1mYWN0cy1hbmQtZmlndXJlcy5wZGY.
104.
Quirk, H., Seddon, T., Smith, G.: Regulation and criminal justice: innovations in policy and research. Cambridge University Press, Cambridge (2010).
105.
White, A.: Post-crisis Policing and Public–Private Partnerships. British Journal of Criminology. 54, 1002–1022 (2014). https://doi.org/10.1093/bjc/azu063.
106.
Leeson, N., Whitley, E.: Rogue trader. Sphere, London (2015).
107.
Nick Leeson Keynote Speaker, https://www.youtube.com/watch?v=Vfz5HlYkDi8, (2012).
108.
Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf.
109.
Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf.
110.
Lynn T. Drennan: Ethics, Governance and Risk Management: Lessons from Mirror Group Newspapers and Barings Bank. Journal of Business Ethics. 52, 257–266 (2004).
111.
Robert Francis: Insights into the Mid Staffordshire inquiry, https://www.youtube.com/watch?v=2dtCz3OFcSM, (14)AD.
112.
SteCooper: Hillsborough - The Search for Truth, https://www.youtube.com/watch?v=tmW1xz6jJGw, (11)AD.
113.
Football Licensing Authority: Guide to Safety at Sports Grounds, https://www.raithrovers.net/files/GuidetoSafetyatSportsGrounds.pdf.
114.
Taylor, S.: The Hillsborough stadium disaster: 15 April 1989: inquiry by the Rt Hon Lord Justice Taylor: final report: presented to Parliament by the Secretary of State for the Home Department by command of Her Majesty January 1990, https://www.scribd.com/document/69424889/Hills-Borough-Stadium-Disaster-Final-Report.
115.
Hillsborough Independent Panel: Hillsborough, The Report of the Hillsborough Independent Panel, https://www.gov.uk/government/publications/the-report-of-the-hillsborough-independent-panel.
116.
Uff, J.: The Southall rail accident inquiry report, http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf.
117.
Jeffcott, S., Pidgeon, N., Weyman, A., Walls, J.: Risk, Trust, and Safety Culture in U.K. Train Operating Companies. Risk Analysis. 26, 1105–1121 (2006). https://doi.org/10.1111/j.1539-6924.2006.00819.x.
118.
Uff, J.: The Southall rail accident inquiry report, http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf.
119.
Almond, P., ebrary, Inc: Corporate manslaughter and regulatory reform. Palgrave Macmillan, New York (2013).
120.
Gobert, J.: The Corporate Manslaughter and Corporate Homicide Act 2007 – Thirteen years in the making but was it worth the wait? Modern Law Review. 71, 413–433 (2008). https://doi.org/10.1111/j.1468-2230.2008.00699.x.
121.
Francis, R.: Report of the Mid Staffordshire NHS Foundation Trust Public Inquiry: executive summary HC 947, Session 2012-2013 - 0947.pdf, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/279124/0947.pdf.
122.
Robert Francis: Insights into the Mid Staffordshire inquiry, https://www.youtube.com/watch?v=2dtCz3OFcSM, (14)AD.
123.
Department of Health: Patients First and Foremost, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/170701/Patients_First_and_Foremost.pdf.
124.
Cranfield School of Management: Mid Staffordshire Hospital: Making the Right Changes, https://www.youtube.com/watch?v=7152JFhYfBU, (20)AD.
125.
Endorf, C.: Outsourcing Security: The Need, the Risks, the Providers, and the Process. Information Systems Security. 12, 17–23 (2004). https://doi.org/10.1201/1086/44022.12.6.20040101/79782.4.
126.
Marin, C.: An Old Debate in a New Setting: In-House Versus Outsourced Security Staff in the Context of International Organizations. Journal of Applied Security Research. 8, 510–550 (2013). https://doi.org/10.1080/19361610.2013.825756.
127.
Gray, A.: Out-sourcing Security.
128.
Willcocks, L., Oshri, I., Hindle, J.: To bundle or not to bundle? Effective decision-making for business and IT services, http://www.globalsourcing.org.uk/Report_Downloads/BundleOrNot.pdf.
129.
Single Service or Bundle: Practitioner Perspectives on What Makes the Best ... Journal of Physical Security. (2015).