[1]
Advancing Corrections 2012. P10 - Probation Programs and the Crime-Reduction Potential of Structured Community Supervision.
[2]
Affizal Ahmad The Kind of Mental Health Problems and it Association with Aggressiveness: A Study on Security Guards. International Journal of Psychology and Behavioral Sciences. 2, 6, 237–244.
[3]
Armitage, R. 2013. Crime prevention through housing design: policy and practice. Palgrave Macmillan.
[4]
Armitage, R. 2013. Crime prevention through housing design: policy and practice. Palgrave Macmillan.
[5]
Armitage, R. et al. 2011. It Looks Good, but What is it Like to Live There? Exploring the Impact of Innovative Housing Design on Crime. European Journal on Criminal Policy and Research. 17, 1 (2011), 29–54. DOI:https://doi.org/10.1007/s10610-010-9133-8.
[6]
Armitage, R. and Monchuk, L. 2011. Sustaining the crime reduction impact of designing out crime: Re-evaluating the Secured by Design scheme 10 years on. Security Journal. 24, 4 (2011), 320–343. DOI:https://doi.org/10.1057/sj.2010.6.
[7]
Bamfield, J. 2012. Shopping and crime. Palgrave Macmillan.
[8]
BARTON, A. 2011. Screening and Brief Intervention of Detainees for Alcohol Use: A Social Crime Prevention Approach to Combating Alcohol-Related Crime? The Howard Journal of Criminal Justice. 50, 1 (Feb. 2011), 62–74. DOI:https://doi.org/10.1111/j.1468-2311.2010.00647.x.
[9]
Bates, T. and Robb, A. 2008. Crime’s Impact on the Survival Prospects of Young Urban Small Businesses. Economic Development Quarterly. 22, 3 (Aug. 2008), 228–238. DOI:https://doi.org/10.1177/0891242408321255.
[10]
Beck, A. 2011. Self-scan checkouts and retail loss: Understanding the risk and minimising the threat. Security Journal. 24, 3 (Jul. 2011), 199–215. DOI:https://doi.org/10.1057/sj.2011.13.
[11]
Beck, A. et al. SHRINKAGE: A COLLABORATIVE APPROACH TO REDUCING STOCK LOSS IN THE SUPPLY CHAIN.
[12]
Beck, A. and Palmer, W. 2010. The Importance of Visual Situational Cues and Difficulty of Removal in Creating Deterrence: The Limitations of Electronic Article Surveillance Source Tagging in the Retail Environment. Journal of Applied Security Research. 6, 1 (Dec. 2010), 110–123. DOI:https://doi.org/10.1080/19361610.2011.529412.
[13]
Beck, A. and Peacock, C. 2009. New loss prevention: Redefining shrinkage management. Palgrave Macmillan.
[14]
Bloomberg Express 10AD. Ex-Olympus CEO Woodford Says All Directors Should Go.
[15]
Bowie, V. An Emerging Awareness of the Role Organizational Culture and Management Style Can Play in Triggering Workplace Violence.
[16]
Brayford, J. et al. 2010. What else works?: creative work with offenders. Willian Publishing.
[17]
Callender Knefel, A.M. and Bryant, C.D. 2004. workplace as combat zone: reconceptualizing occupational and organizational violence. Deviant Behavior. 25, 6 (Nov. 2004), 579–601. DOI:https://doi.org/10.1080/016396200497884.
[18]
CCTV Technical Concepts: http://www.popcenter.org/responses/video_surveillance/videos.
[19]
Center for Problem-Oriented Policing: http://www.popcenter.org/.
[20]
Center for Problem-Oriented Policing | 25 Techniques: http://www.popcenter.org/25techniques/.
[21]
Chappell, D. et al. 2006. Violence at work. International Labour Office.
[22]
Chappell, D. and Martino, V. Violence at Work.
[23]
CHECHAK, D. and CSIERNIK, R. 2014. Canadian Perspectives on Conceptualizing and Responding to Workplace Violence. Journal of Workplace Behavioral Health. 29, 1 (Jan. 2014), 55–72. DOI:https://doi.org/10.1080/15555240.2014.866474.
[24]
CheckpointSys 2014. Global Retail Theft Barometer Highlights 2013-2014.
[25]
Clarke, R. and Petrossian, G. Shoplifting.
[26]
Clive Norris and Michael McCahill 2006. CCTV: BEYOND PENAL MODERNISM? The British Journal of Criminology. 46, 1 (2006), 97–118.
[27]
Cozens, P. et al. 2008. Designing out crime in Western Australia: a case study. Property Management. 26, 5 (Oct. 2008), 295–309. DOI:https://doi.org/10.1108/02637470810913450.
[28]
Crime Reduction Toolkit | College of Policing: http://whatworks.college.police.uk/toolkit/Pages/Toolkit.aspx.
[29]
Demystifying CPTED: http://www.personaldefensenetwork.com/video/demystifying-cpted-crime-prevention-environmental-design-005340/.
[30]
Doig, A. and Levi, M. 2013. A case of arrested development? Delivering the UK National Fraud Strategy within competing policing policy priorities. Public Money & Management. 33, 2 (Mar. 2013), 145–152. DOI:https://doi.org/10.1080/09540962.2013.763435.
[31]
DrugWise: http://www.drugwise.org.uk/.
[32]
Ekblom, P. 2010. Crime prevention, security and community safety using the 5Is framework. Palgrave Macmillan.
[33]
European Agency for Safety and Health at Work: https://osha.europa.eu/en/node/6745/file_view.
[34]
Europol 2017. EU Serious and Organised Crime Threat Assessment.
[35]
Face-recognition software: Is this the end of anonymity for all of us? http://www.independent.co.uk/life-style/gadgets-and-tech/features/face-recognition-software-is-this-the-end-of-anonymity-for-all-of-us-9278697.html.
[36]
Family intervention projects: a classic case of policy-based evidence: http://www.crimeandjustice.org.uk/publications/family-intervention-projects-classic-case-policy-based-evidence.
[37]
Fast, L. Security and Risk Management for Peacebuilding Organisations.
[38]
Faundez-Zanuy, M. et al. 2013. Biometric Applications Related to Human Beings: There Is Life beyond Security. Cognitive Computation. 5, 1 (Mar. 2013), 136–151. DOI:https://doi.org/10.1007/s12559-012-9169-9.
[39]
Gill, M. 2011. Fraud and recessions: Views from fraudsters and fraud managers. International Journal of Law, Crime and Justice. 39, 3 (2011), 204–214. DOI:https://doi.org/10.1016/j.ijlcj.2011.05.008.
[40]
Gill, M. 2011. Fraud and recessions: Views from fraudsters and fraud managers. International Journal of Law, Crime and Justice. 39, 3 (Sep. 2011), 204–214. DOI:https://doi.org/10.1016/j.ijlcj.2011.05.008.
[41]
Gill, M. Learning from Fraudsters.
[42]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[43]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[44]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[45]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[46]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[47]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[48]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[49]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[50]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[51]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[52]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[53]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[54]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[55]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[56]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[57]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[58]
Gill, M.L. 2006. The Handbook of Security. Palgrave Macmillan.
[59]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[60]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[61]
Gill, M.L. 2014. The Handbook of Security. Palgrave Macmillan.
[62]
Good Practice Review Operational security management in violent environments.
[63]
Greenfield, V.A. and Paoli, L. 2013. A Framework to Assess the Harms of Crimes. British Journal of Criminology. 53, 5 (Sep. 2013), 864–885. DOI:https://doi.org/10.1093/bjc/azt018.
[64]
Haelterman, H. 2009. Situational Crime Prevention and Supply Chain Security: An "Ex Ante” Consideration of Preventive Measures. Journal of Applied Security Research. 4, 4 (Oct. 2009), 483–500. DOI:https://doi.org/10.1080/19361610903176294.
[65]
Hamilton-Smith, N. and Mackenzie, S. 2010. The geometry of shadows: a critical review of organised crime risk assessments. Policing and Society. 20, 3 (Sep. 2010), 257–279. DOI:https://doi.org/10.1080/10439463.2010.505287.
[66]
Hebberecht, P. and Baillergeau, E. eds. 2012. Social crime prevention in late modern Europe: a comparative perspective. VUBPress.
[67]
HMRC wins Eclipse 35 case at Court of Appeal - 18 Feb 2015 - Accountancy Age: http://www.accountancyage.com/aa/news/2395841/hmrc-wins-eclipse-35-case-at-court-of-appeal.
[68]
Homel, R. Developmental crime prevention.
[69]
ICRC Health care in danger- The Human Cost.
[70]
Is Modern Surveillance Really ‘Orwellian’: http://www.huffingtonpost.co.uk/jamie-bartlett/surveillance-george-orwell_b_3899906.html.
[71]
Kang-Brown, J. et al. A Generation Later: What We’ve Learned about Zero Tolerance in Schools.
[72]
Kenny, J. 2010. Risk Assessment and Management Teams: A Comprehensive Approach to Early Intervention in Workplace Violence. Journal of Applied Security Research. 5, 2 (Mar. 2010), 159–175. DOI:https://doi.org/10.1080/19361611003601033.
[73]
Kerr, K.M. 2010. Workplace violence: planning for prevention and response. Butterworth-Heinemann.
[74]
Kleemans, E.R. and de Poot, C.J. 2008. Criminal Careers in Organized Crime and Social Opportunity Structure. European Journal of Criminology. 5, 1 (Jan. 2008), 69–98. DOI:https://doi.org/10.1177/1477370807084225.
[75]
Leo C.C. Cheung,Hector W.H. Tsang,Christopher U. Tsui 2006. A Job-Specific Social Skills Training program for people with severe mental illness: a case study for those who plan to be a security guard. The Journal of Rehabilitation. 72, 4 (2006).
[76]
Levi, M. Public and Private Policing of Financial Crimes: the Struggle for Co-ordination.
[77]
Levi, M. 1987. Regulating fraud: white-collar crime and the criminal process. Tavistock Publications.
[78]
Levi, M. et al. The economic, financial & social impacts of organised crime in the European.
[79]
Levi, M. 2008. The phantom capitalists: the organization and control of long-firm fraud. Ashgate.
[80]
Levi, M. and Maguire, M. 2004. Reducing and preventing organised crime: An evidence-based critique. Crime, Law and Social Change. 41, 5 (Jun. 2004), 397–469. DOI:https://doi.org/10.1023/B:CRIS.0000039600.88691.af.
[81]
Maguire, M. et al. 2012. The Oxford handbook of criminology. Oxford University Press.
[82]
Manners-Bell, J. 2014. Supply chain risk: understanding emerging threats to global supply chains. Kogan Page.
[83]
Manners-Bell, J. 2014. Supply Chain Risk: Understanding Emerging Threats to Global Supply Chains. Kogan Page, Limited.
[84]
Manners-Bell, J. 2014. Supply Chain Risk: Understanding Emerging Threats to Global Supply Chains. Kogan Page, Limited.
[85]
Match-Fixing – the Biggest Threat to Sport in the 21st Century? http://www.interpol.int/Media/Files/INTERPOL-Expertise/IGLC/Match-fixing-biggest-threat.
[86]
McKinney, D. 13AD. Health: Drug Education.
[87]
Mental Welfare Commission Zero Tolerance Measured Response.
[88]
Mills, H. et al. Understanding Organised Crime: Estimating the Scale and the Social and Economic costs.
[89]
Millsapp, J. 2013. CPTED (Crime Prevention Through Environmental Design).
[90]
Mitsilegas, V. 2014. The Value of Privacy in an Era of Security: Embedding Constitutional Limits on Preemptive Surveillance. International Political Sociology. 8, 1 (2014), 104–108. DOI:https://doi.org/10.1111/ips.12043.
[91]
MossAdamsLLP 2013. Assessing Risks in an Omnichannel Retail World.
[92]
Mugellini, G. Measuring and analysing crime against the private sector: International experiences and the Mexican practice.
[93]
Newburn, T. 2013. Criminology. Routledge.
[94]
Newburn, T. 2013. Criminology. Routledge.
[95]
Nutt, D.J. et al. 2010. Drug harms in the UK: a multicriteria decision analysis. The Lancet. 376, 9752 (2010), 1558–1565. DOI:https://doi.org/10.1016/S0140-6736(10)61462-6.
[96]
Office for Victims of Crime 2013. Through Our Eyes: Children, Violence, and Trauma.
[97]
Pinto, J. 2014. Expanding the Content Domain of Workplace Aggression: A Three-level Aggressor-target Taxonomy. International Journal of Management Reviews. 16, 3 (Jul. 2014), 290–313. DOI:https://doi.org/10.1111/ijmr.12021.
[98]
Prosecuting tax evasion: http://www.cps.gov.uk/news/articles/prosecuting_tax_evasion/.
[99]
Redwood-Campbell, L.J. et al. 2014. Health Care Workers in Danger Zones: A Special Report on Safety and Security in a Changing Environment. Prehospital and Disaster Medicine. 29, 05 (Oct. 2014), 503–507. DOI:https://doi.org/10.1017/S1049023X14000934.
[100]
rghm 2008. Enron’s Skilling Answers Markey at Hearing; Eyes Roll.
[101]
Risk and Business | Security is Your Business: http://securityisyourbusiness.com/video/risk-and-business/.
[102]
Schuchter, A. and Levi, M. 2013. The Fraud Triangle revisited. Security Journal. (Feb. 2013). DOI:https://doi.org/10.1057/sj.2013.1.
[103]
Shapland, J. and Hall, M. 2007. What Do We Know About the Effects of Crime on Victims? International Review of Victimology. 14, 2 (May 2007), 175–217. DOI:https://doi.org/10.1177/026975800701400202.
[104]
ShortcutsTV 7AD. Situational Crime Prevention.
[105]
Simpson, S.S. and Weisburd, D. 2009. The Criminology of White-Collar Crime. Springer New York.
[106]
Stenning, C. and Shearing, P. From the Panopticon to Disney World: the Development of Discipline.
[107]
Stoddard, A. et al. The use of private security providers and services in humanitarian operations.
[108]
Strategic Directions | Security is Your Business: http://securityisyourbusiness.com/video/strategic-directions/.
[109]
Sutton, A. et al. 2014. Crime prevention: principles, perspectives and practices. Cambridge University Press.
[110]
Sutton, A. et al. 2014. Crime prevention: principles, perspectives and practices. Cambridge University Press.
[111]
Taylor, E. 2013. Surveillance schools: security, discipline and control in contemporary education. Palgrave Pivot.
[112]
Thames Valley Probation 2010. Probation - It Works!
[113]
The Public Domain: Social Surveillance in Everyday Life: https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/pub_dom.
[114]
The Social Life of Small Urban Spaces: https://vimeo.com/239980034.
[115]
Thumala, A. et al. 2015. Tracking devices: On the reception of a novel security good. Criminology and Criminal Justice. 15, 1 (2015), 3–22. DOI:https://doi.org/10.1177/1748895813507067.
[116]
Tilley, N. 2005. Handbook of crime prevention and community safety. Willan Pub.
[117]
Tilley, N. et al. 2015. Target Suitability and the Crime Drop. Criminal Act: The Role and Influence of Routine Activity Theory. Palgrave Macmillan.
[118]
Tilley, N. and Hopkins, M. 2008. Organized crime and local businesses. Criminology and Criminal Justice. 8, 4 (Nov. 2008), 443–459. DOI:https://doi.org/10.1177/1748895808096469.
[119]
United Association for Labor Education (UALE) - Workplace Bullying Materials: https://uale.org/resources-list/57-workplace-bullying-materials.
[120]
United States V. Bernard L. Madoff And Related Cases | USAO-SDNY | Department of Justice: http://www.justice.gov/usao-sdny/programs/victim-witness-services/united-states-v-bernard-l-madoff-and-related-cases.
[121]
Urciuoli, L. 2010. Supply chain security—mitigation measures and a logistics multi-layered framework. Journal of Transportation Security. 3, 1 (Mar. 2010), 1–28. DOI:https://doi.org/10.1007/s12198-009-0034-3.
[122]
Vanheule, S. et al. 2008. Burnout, critical incidents and social support in security guards. Stress and Health. 24, 2 (Apr. 2008), 137–141. DOI:https://doi.org/10.1002/smi.1177.
[123]
VicHealth (2012) Preventing violence against women in the workplace (An evidence review: summary report), Victorian Heath Promotion Foundation, Melbourne, Australia.: 2012. https://www.vichealth.vic.gov.au/~/media/resourcecentre/publicationsandresources/economic%20participation/2012%20workplace/chw_pvaw_full_web_final.ashx.
[124]
Video clips for retailers - GETBA: http://www.getba.org.nz/video-clips-for-retailers.
[125]
Wall Street Journal 2011. Inside the Madoff Scandal: Chapter One.
[126]
Wall Street Journal 2011. Inside the Madoff Scandal: Chapter Two.
[127]
Waring, A. 2013. Corporate risk and governance: an end to mismanagement, tunnel vision and quackery. Gower.
[128]
Waring, A. 2016. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Taylor and Francis.
[129]
Waring, A. 2016. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Taylor and Francis.
[130]
Waring, A. 2016. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Taylor and Francis.
[131]
Waring, A. 2016. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Taylor and Francis.
[132]
Waring, A. 2016. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Taylor and Francis.
[133]
Waring, A. 2016. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Taylor and Francis.
[134]
Waring, A. 2016. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Taylor and Francis.
[135]
Waring, A. 2016. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Taylor and Francis.
[136]
Waring, A. 2016. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Taylor and Francis.
[137]
Waring, A. and Glendon, A.I. 1998. Managing risk. Thomson Learning.
[138]
Waring, A. and Glendon, A.I. 1998. Managing risk. Thomson Learning.
[139]
WatchMojo.com 2009. The Story of Organized Crime.
[140]
Welsh, B. and Farringdon, D. The Future of Crime Prevention: Developmental and Situational Strategies.
[141]
Work-related Violence against Security Guards— Who is Most at Risk? https://www.jstage.jst.go.jp/article/indhealth/49/2/49_MS1208/_pdf.
[142]
2006. ASIS Issues Workplace Violence Prevention Guide. Professional Safety. 51, 9 (2006), 17–17.
[143]
16AD. Crime Prevention Through Environmental Design.
[144]
2007. Great Books: 1984 (GEORGE ORWELL).
[145]
5AD. Hot Spot Policing and Displacement, David Weisburd (3 of 7).
[146]
Old Before My Time  Drugs  Documentary - YouTube.
[147]
The Financial Impact of Workplace Violence.
[148]
Workplace bullying and harassment: building a culture of respect.
[149]
Workplace Violence Prevention and Response Guideline.