@misc{2012a, title={P10 - Probation Programs and the Crime-Reduction Potential of Structured Community Supervision}, url={https://www.youtube.com/watch?v=ISXyjBikH24}, author={Advancing Corrections}, year={2012} }
@article{Affizal Ahmad, title={The Kind of Mental Health Problems and it Association with Aggressiveness: A Study on Security Guards}, volume={2}, url={http://article.sapub.org/10.5923.j.ijpbs.20120206.07.html}, number={6}, journal={International Journal of Psychology and Behavioral Sciences}, author={Affizal Ahmad}, pages={237–244} }
@book{Armitage_2013a, address={London}, title={Crime prevention through housing design: policy and practice}, volume={Crime prevention and security management}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1431389}, publisher={Palgrave Macmillan}, author={Armitage, Rachel}, year={2013} }
@book{Armitage_2013b, address={London}, title={Crime prevention through housing design: policy and practice}, volume={Crime prevention and security management}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1431389}, publisher={Palgrave Macmillan}, author={Armitage, Rachel}, year={2013} }
@article{Armitage_Monchuk_2011, title={Sustaining the crime reduction impact of designing out crime: Re-evaluating the Secured by Design scheme 10 years on}, volume={24}, DOI={10.1057/sj.2010.6}, number={4}, journal={Security Journal}, author={Armitage, Rachel and Monchuk, Leanne}, year={2011}, pages={320–343} }
@article{Armitage_Monchuk_Rogerson_2011, title={It Looks Good, but What is it Like to Live There? Exploring the Impact of Innovative Housing Design on Crime}, volume={17}, DOI={10.1007/s10610-010-9133-8}, number={1}, journal={European Journal on Criminal Policy and Research}, author={Armitage, Rachel and Monchuk, Leanne and Rogerson, Michelle}, year={2011}, pages={29–54} }
@book{Bamfield_2012, address={Basingstoke}, title={Shopping and crime}, volume={Crime prevention and security management}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=882576}, publisher={Palgrave Macmillan}, author={Bamfield, Joshua}, year={2012} }
@misc{Bartlett, title={Is Modern Surveillance Really ‘Orwellian’}, url={http://www.huffingtonpost.co.uk/jamie-bartlett/surveillance-george-orwell_b_3899906.html}, author={Bartlett, J} }
@article{BARTON_2011, title={Screening and Brief Intervention of Detainees for Alcohol Use: A Social Crime Prevention Approach to Combating Alcohol-Related Crime?}, volume={50}, DOI={10.1111/j.1468-2311.2010.00647.x}, number={1}, journal={The Howard Journal of Criminal Justice}, author={BARTON, ADRIAN}, year={2011}, month={Feb}, pages={62–74} }
@article{Bates_Robb_2008, title={Crime’s Impact on the Survival Prospects of Young Urban Small Businesses}, volume={22}, DOI={10.1177/0891242408321255}, number={3}, journal={Economic Development Quarterly}, author={Bates, T. and Robb, A.}, year={2008}, month={Aug}, pages={228–238} }
@misc{Beck_Chapman_Peacock, title={SHRINKAGE: A COLLABORATIVE APPROACH TO REDUCING STOCK LOSS IN THE SUPPLY CHAIN}, url={https://www.ecr.digital/wp_contents/uploads/2016/09/ECR-Bericht_Shrinkage.pdf}, author={Beck, A and Chapman, P and Peacock, C} }
@article{Beck_2011, title={Self-scan checkouts and retail loss: Understanding the risk and minimising the threat}, volume={24}, DOI={10.1057/sj.2011.13}, number={3}, journal={Security Journal}, author={Beck, Adrian}, year={2011}, month={Jul}, pages={199–215} }
@article{Beck_Palmer_2010, title={The Importance of Visual Situational Cues and Difficulty of Removal in Creating Deterrence: The Limitations of Electronic Article Surveillance Source Tagging in the Retail Environment}, volume={6}, DOI={10.1080/19361610.2011.529412}, number={1}, journal={Journal of Applied Security Research}, author={Beck, Adrian and Palmer, Walter}, year={2010}, month={Dec}, pages={110–123} }
@book{Beck_Peacock_2009, address={Basingstoke}, title={New loss prevention: Redefining shrinkage management}, url={http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230250727}, publisher={Palgrave Macmillan}, author={Beck, Adrian and Peacock, Colin}, year={2009} }
@misc{10AD, title={Ex-Olympus CEO Woodford Says All Directors Should Go}, url={https://www.youtube.com/watch?v=6U5wml5XVww}, author={Bloomberg Express}, year={10AD} }
@misc{Bowie, title={An Emerging Awareness of the Role Organizational Culture and Management Style Can Play in Triggering Workplace Violence}, url={https://docplayer.net/20724466-6-an-emerging-awareness-of-the-role-organizational-culture-and-management-style-can-play-in-triggering-workplace-violence.html}, author={Bowie, V} }
@book{Brayford_Cowe_Deering_2010, address={Cullompton}, title={What else works?: creative work with offenders}, url={http://ezproxy.lib.le.ac.uk/login?url=http://www.myilibrary.com?id=255366}, publisher={Willian Publishing}, author={Brayford, Jo and Cowe, Francis and Deering, John}, year={2010} }
@article{Callender Knefel_Bryant_2004, title={workplace as combat zone: reconceptualizing occupational and organizational violence}, volume={25}, DOI={10.1080/016396200497884}, number={6}, journal={Deviant Behavior}, author={Callender Knefel, Ann M. and Bryant, Clifton D.}, year={2004}, month={Nov}, pages={579–601} }
@misc{Carpenter, title={Match-Fixing – the Biggest Threat to Sport in the 21st Century?}, url={http://www.interpol.int/Media/Files/INTERPOL-Expertise/IGLC/Match-fixing-biggest-threat}, author={Carpenter, K} }
@misc{Chappell_Martino, edition={3rd}, title={Violence at Work}, url={http://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/---publ/documents/publication/wcms_publ_9221108406_en.pdf}, author={Chappell, D and Martino, V} }
@book{Chappell_Di Martino_International Labour Office_2006, address={Geneva}, edition={3rd ed}, title={Violence at work}, url={http://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/---publ/documents/publication/wcms_publ_9221108406_en.pdf}, publisher={International Labour Office}, author={Chappell, Duncan and Di Martino, Vittorio and International Labour Office}, year={2006} }
@misc{Chayka, title={Face-recognition software: Is this the end of anonymity for all of us?}, url={http://www.independent.co.uk/life-style/gadgets-and-tech/features/face-recognition-software-is-this-the-end-of-anonymity-for-all-of-us-9278697.html}, author={Chayka, K} }
@article{CHECHAK_CSIERNIK_2014, title={Canadian Perspectives on Conceptualizing and Responding to Workplace Violence}, volume={29}, DOI={10.1080/15555240.2014.866474}, number={1}, journal={Journal of Workplace Behavioral Health}, author={CHECHAK, DEREK and CSIERNIK, RICK}, year={2014}, month={Jan}, pages={55–72} }
@misc{2014, title={Global Retail Theft Barometer Highlights 2013-2014}, url={https://www.youtube.com/watch?v=kPVOjai-tHY}, author={CheckpointSys}, year={2014} }
@misc{Clarke_Petrossian, title={Shoplifting}, url={http://www.popcenter.org/problems/pdfs/Shoplifting.pdf}, author={Clarke, R and Petrossian, G} }
@article{Clive Norris and Michael McCahill_2006, title={CCTV: BEYOND PENAL MODERNISM?}, volume={46}, url={http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/23639334?pq-origsite=summon}, number={1}, journal={The British Journal of Criminology}, author={Clive Norris and Michael McCahill}, year={2006}, pages={97–118} }
@article{Cozens_Thorn_Hillier_2008, title={Designing out crime in Western Australia: a case study}, volume={26}, DOI={10.1108/02637470810913450}, number={5}, journal={Property Management}, author={Cozens, Paul and Thorn, Michael and Hillier, David}, year={2008}, month={Oct}, pages={295–309} }
@article{Doig_Levi_2013, title={A case of arrested development? Delivering the UK National Fraud Strategy within competing policing policy priorities}, volume={33}, DOI={10.1080/09540962.2013.763435}, number={2}, journal={Public Money & Management}, author={Doig, Alan and Levi, Michael}, year={2013}, month={Mar}, pages={145–152} }
@misc{ title={European Agency for Safety and Health at Work}, url={https://osha.europa.eu/en/node/6745/file_view}, author={E u r o p e a n A g e n c y f o r S a f e t y a n d H e a l t h a t W o r k} }
@book{Ekblom_2010, address={Basingstoke}, title={Crime prevention, security and community safety using the 5Is framework}, volume={Crime prevention and security management}, url={http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230298996}, publisher={Palgrave Macmillan}, author={Ekblom, Paul}, year={2010} }
@misc{2017, title={EU Serious and Organised Crime Threat Assessment}, url={https://www.europol.europa.eu/activities-services/main-reports/european-union-serious-and-organised-crime-threat-assessment-2017}, author={Europol}, year={2017} }
@misc{Fast, title={Security and Risk Management for Peacebuilding Organisations}, url={http://www.berghof-foundation.org/fileadmin/redaktion/Publications/Handbook/Articles/fast_handbook.pdf}, author={Fast, L} }
@article{Faundez-Zanuy_Hussain_Mekyska_Sesa-Nogueras_Monte-Moreno_Esposito_Chetouani_Garre-Olmo_Abel_Smekal_et al._2013, title={Biometric Applications Related to Human Beings: There Is Life beyond Security}, volume={5}, url={https://link-springer-com.ezproxy3.lib.le.ac.uk/article/10.1007/s12559-012-9169-9}, DOI={10.1007/s12559-012-9169-9}, number={1}, journal={Cognitive Computation}, author={Faundez-Zanuy, Marcos and Hussain, Amir and Mekyska, Jiri and Sesa-Nogueras, Enric and Monte-Moreno, Enric and Esposito, Anna and Chetouani, Mohamed and Garre-Olmo, Josep and Abel, Andrew and Smekal, Zdenek and Lopez-de-Ipiña, Karmele}, year={2013}, month={Mar}, pages={136–151} }
@misc{Fuller, title={HMRC wins Eclipse 35 case at Court of Appeal - 18 Feb 2015 - Accountancy Age}, url={http://www.accountancyage.com/aa/news/2395841/hmrc-wins-eclipse-35-case-at-court-of-appeal}, author={Fuller, C} }
@misc{Gill, title={Learning from Fraudsters.}, url={https://perpetuityresearch.com/855/learning-from-fraudsters/}, author={Gill, M} }
@book{Gill_2006, address={Basingstoke}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2006} }
@book{Gill_2014a, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014b, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014c, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014d, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014e, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014f, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014g, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014h, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014i, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014j, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014k, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014l, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014m, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014n, address={Basingstoke}, title={The Handbook of Security}, url={http://ezproxy.lib.le.ac.uk/login?url=http://dx.doi.org/10.1007/978-1-349-67284-4}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014o, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014p, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014q, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014r, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@book{Gill_2014s, address={Houndmills, Basingstoke, Hampshire}, edition={Second edition}, title={The Handbook of Security}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344}, publisher={Palgrave Macmillan}, author={Gill, M. L.}, year={2014} }
@article{Gill_2011a, title={Fraud and recessions: Views from fraudsters and fraud managers}, volume={39}, DOI={10.1016/j.ijlcj.2011.05.008}, number={3}, journal={International Journal of Law, Crime and Justice}, author={Gill, Martin}, year={2011}, pages={204–214} }
@article{Gill_2011b, title={Fraud and recessions: Views from fraudsters and fraud managers}, volume={39}, DOI={10.1016/j.ijlcj.2011.05.008}, number={3}, journal={International Journal of Law, Crime and Justice}, author={Gill, Martin}, year={2011}, month={Sep}, pages={204–214} }
@misc{ title={Operational security management in violent environments}, url={http://odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf}, author={Good Practice Review} }
@article{Greenfield_Paoli_2013, title={A Framework to Assess the Harms of Crimes}, volume={53}, DOI={10.1093/bjc/azt018}, number={5}, journal={British Journal of Criminology}, author={Greenfield, V. A. and Paoli, L.}, year={2013}, month={Sep}, pages={864–885} }
@misc{Gregg, title={Family intervention projects: a classic case of policy-based evidence}, url={http://www.crimeandjustice.org.uk/publications/family-intervention-projects-classic-case-policy-based-evidence}, author={Gregg, D} }
@article{Haelterman_2009, title={Situational Crime Prevention and Supply Chain Security: An "Ex Ante” Consideration of Preventive Measures}, volume={4}, DOI={10.1080/19361610903176294}, number={4}, journal={Journal of Applied Security Research}, author={Haelterman, Harald}, year={2009}, month={Oct}, pages={483–500} }
@article{Hamilton-Smith_Mackenzie_2010, title={The geometry of shadows: a critical review of organised crime risk assessments}, volume={20}, DOI={10.1080/10439463.2010.505287}, number={3}, journal={Policing and Society}, author={Hamilton-Smith, Niall and Mackenzie, Simon}, year={2010}, month={Sep}, pages={257–279} }
@misc{Homel, title={Developmental crime prevention}, url={http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.567.7928&rep=rep1&type=pdf}, author={Homel, R} }
@article{ title={Health care in danger- The Human Cost}, url={https://www.youtube.com/watch?v=Cr3eknFzhWs}, author={ICRC} }
@misc{Kaminski, title={United Association for Labor Education (UALE) - Workplace Bullying Materials}, url={https://uale.org/resources-list/57-workplace-bullying-materials}, author={Kaminski, M} }
@misc{Kang-Brown_Trone_Fratello_Daftary-Kapur, title={A Generation Later: What We’ve Learned about Zero Tolerance in Schools}, url={http://www.vera.org/sites/default/files/resources/downloads/zero-tolerance-in-schools-policy-brief.pdf}, author={Kang-Brown, J and Trone, J and Fratello, J and Daftary-Kapur, T} }
@article{Kenny_2010, title={Risk Assessment and Management Teams: A Comprehensive Approach to Early Intervention in Workplace Violence}, volume={5}, DOI={10.1080/19361611003601033}, number={2}, journal={Journal of Applied Security Research}, author={Kenny, James}, year={2010}, month={Mar}, pages={159–175} }
@book{Kerr_2010, address={Burlington, Mass}, title={Workplace violence: planning for prevention and response}, url={http://site.ebrary.com/lib/leicester/Doc?id=10391642}, publisher={Butterworth-Heinemann}, author={Kerr, Kim M.}, year={2010} }
@article{Kleemans_de Poot_2008, title={Criminal Careers in Organized Crime and Social Opportunity Structure}, volume={5}, DOI={10.1177/1477370807084225}, number={1}, journal={European Journal of Criminology}, author={Kleemans, E. R. and de Poot, C. J.}, year={2008}, month={Jan}, pages={69–98} }
@misc{LEINO_SELIN_SUMMALA_VIRTANEN, title={Work-related Violence against Security Guards— Who is Most at Risk?}, url={https://www.jstage.jst.go.jp/article/indhealth/49/2/49_MS1208/_pdf}, author={LEINO, T and SELIN, R and SUMMALA, H and VIRTANEN, M} }
@article{Leo C.C. Cheung,Hector W.H. Tsang,Christopher U. Tsui_2006, title={A Job-Specific Social Skills Training program for people with severe mental illness: a case study for those who plan to be a security guard}, volume={72}, url={http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?p=EAIM&u=leicester&id=GALE|A157267476&v=2.1&it=r&sid=summon&userGroup=leicester&authCount=1}, number={4}, journal={The Journal of Rehabilitation}, author={Leo C.C. Cheung,Hector W.H. Tsang,Christopher U. Tsui}, year={2006} }
@misc{Levi, title={Public and Private Policing of Financial Crimes: the Struggle for Co-ordination}, url={http://www.fvv.um.si/varstvoslovje/articles/vs-2010-4-levi.pdf}, author={Levi, M} }
@misc{Levi_Innes_Reuter_Gandur, title={The economic, financial & social impacts of organised crime in the European}, url={http://www.europarl.europa.eu/RegData/etudes/etudes/join/2013/493018/IPOL-JOIN_ET%282013%29493018_EN.pdf}, author={Levi, M and Innes, M and Reuter, P and Gandur, R} }
@book{Levi_1987, address={London}, title={Regulating fraud: white-collar crime and the criminal process}, publisher={Tavistock Publications}, author={Levi, Michael}, year={1987} }
@book{Levi_2008, address={Aldershot}, edition={Rev. ed}, title={The phantom capitalists: the organization and control of long-firm fraud}, publisher={Ashgate}, author={Levi, Michael}, year={2008} }
@article{Levi_Maguire_2004, title={Reducing and preventing organised crime: An evidence-based critique}, volume={41}, url={https://link-springer-com.ezproxy4.lib.le.ac.uk/article/10.1023/B:CRIS.0000039600.88691.af}, DOI={10.1023/B:CRIS.0000039600.88691.af}, number={5}, journal={Crime, Law and Social Change}, author={Levi, Michael and Maguire, Mike}, year={2004}, month={Jun}, pages={397–469} }
@book{Maguire_Morgan_Reiner_2012, address={Oxford}, edition={5th ed}, title={The Oxford handbook of criminology}, publisher={Oxford University Press}, author={Maguire, Mike and Morgan, Rodney and Reiner, Robert}, year={2012} }
@book{Manners-Bell_2014a, address={London}, title={Supply chain risk: understanding emerging threats to global supply chains}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1658900}, publisher={Kogan Page}, author={Manners-Bell, John}, year={2014} }
@book{Manners-Bell_2014b, address={London}, edition={1st ed}, title={Supply Chain Risk: Understanding Emerging Threats to Global Supply Chains}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1658900}, publisher={Kogan Page, Limited}, author={Manners-Bell, John}, year={2014} }
@book{Manners-Bell_2014c, address={London}, edition={1st ed}, title={Supply Chain Risk: Understanding Emerging Threats to Global Supply Chains}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1658900}, publisher={Kogan Page, Limited}, author={Manners-Bell, John}, year={2014} }
@misc{Marwick, title={The Public Domain: Social Surveillance in Everyday Life}, url={https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/pub_dom}, author={Marwick, A} }
@misc{McKinney_13AD, title={Health: Drug Education}, url={https://www.youtube.com/watch?v=FM4LQzFQb94}, author={McKinney, D}, year={13AD} }
@misc{ title={Zero Tolerance Measured Response}, url={https://docplayer.net/43776378-Zero-tolerance-measured-response-responding-to-violence-in-mental-health-or-learning-disability-care-settings.html}, author={Mental Welfare Commission} }
@misc{Mills_Skodbo_Blyth, title={Understanding Organised Crime: Estimating the Scale and the Social and Economic costs}, url={https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246390/horr73.pdf}, author={Mills, H and Skodbo, S and Blyth, P} }
@misc{Millsapp_2013, title={CPTED (Crime Prevention Through Environmental Design)}, url={https://www.youtube.com/watch?v=ni8Sz4ttSdg}, author={Millsapp, Joushua}, year={2013} }
@article{Mitsilegas_2014, title={The Value of Privacy in an Era of Security: Embedding Constitutional Limits on Preemptive Surveillance}, volume={8}, url={https://academic-oup-com.ezproxy3.lib.le.ac.uk/ips/article/8/1/104/1921111}, DOI={10.1111/ips.12043}, number={1}, journal={International Political Sociology}, author={Mitsilegas, Valsamis}, year={2014}, pages={104–108} }
@misc{2013a, title={Assessing Risks in an Omnichannel Retail World}, url={https://www.youtube.com/watch?v=ilPJnEBW6Fc&feature=youtu.be}, author={MossAdamsLLP}, year={2013} }
@misc{Mugellini, title={Measuring and analysing crime against the private sector: International experiences and the Mexican practice.}, url={https://books.google.co.uk/books?id=McHODwAAQBAJ&pg=PA65&lpg=PA65&dq=Organized+crime+and+the+commercial+sector+in+England+and+Wales:+policy,+definition+and+the+extent+of+victimization&source=bl&ots=9ABmwakcK3&sig=ACfU3U27eT0OHBk2LGwGb1hjv7faggzw0w&hl=en&sa=X&ved=2ahUKEwi_2K6p-brqAhXNTxUIHR2zBxQQ6AEwAXoECAwQAQ#v=onepage&q=Organized%20crime%20and%20the%20commercial%20sector%20in%20England%20and%20Wales%3A%20policy%2C%20definition%20and%20the%20extent%20of%20victimization&f=false}, author={Mugellini, G} }
@book{Newburn_2013a, address={London}, edition={2nd ed}, title={Criminology}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4799825}, publisher={Routledge}, author={Newburn, Tim}, year={2013} }
@book{Newburn_2013b, address={London}, edition={2nd ed}, title={Criminology}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4799825}, publisher={Routledge}, author={Newburn, Tim}, year={2013} }
@article{Nutt_King_Phillips_2010, title={Drug harms in the UK: a multicriteria decision analysis}, volume={376}, url={https://www-sciencedirect-com.ezproxy4.lib.le.ac.uk/science/article/pii/S0140673610614626?via%3Dihub}, DOI={10.1016/S0140-6736(10)61462-6}, number={9752}, journal={The Lancet}, author={Nutt, David J and King, Leslie A and Phillips, Lawrence D}, year={2010}, pages={1558–1565} }
@misc{2013b, title={Through Our Eyes: Children, Violence, and Trauma}, url={https://www.youtube.com/watch?v=z8vZxDa2KPM}, author={Office for Victims of Crime}, year={2013} }
@misc{ title={Demystifying CPTED}, url={http://www.personaldefensenetwork.com/video/demystifying-cpted-crime-prevention-environmental-design-005340/}, author={Personal Defence Network} }
@article{Pinto_2014, title={Expanding the Content Domain of Workplace Aggression: A Three-level Aggressor-target Taxonomy}, volume={16}, DOI={10.1111/ijmr.12021}, number={3}, journal={International Journal of Management Reviews}, author={Pinto, Jonathan}, year={2014}, month={Jul}, pages={290–313} }
@article{Redwood-Campbell_Sekhar_Persaud_2014, title={Health Care Workers in Danger Zones: A Special Report on Safety and Security in a Changing Environment}, volume={29}, DOI={10.1017/S1049023X14000934}, number={05}, journal={Prehospital and Disaster Medicine}, author={Redwood-Campbell, Lynda J. and Sekhar, Sharonya N. and Persaud, Christine R.}, year={2014}, month={Oct}, pages={503–507} }
@misc{2008, title={Enron’s Skilling Answers Markey at Hearing; Eyes Roll}, url={https://www.youtube.com/watch?v=hPqH3DrWEEU}, author={rghm}, year={2008} }
@article{Schuchter_Levi_2013, title={The Fraud Triangle revisited}, DOI={10.1057/sj.2013.1}, journal={Security Journal}, author={Schuchter, Alexander and Levi, Michael}, year={2013}, month={Feb} }
@article{Shapland_Hall_2007, title={What Do We Know About the Effects of Crime on Victims?}, volume={14}, DOI={10.1177/026975800701400202}, number={2}, journal={International Review of Victimology}, author={Shapland, J. and Hall, M.}, year={2007}, month={May}, pages={175–217} }
@misc{7AD, title={Situational Crime Prevention}, url={https://www.youtube.com/watch?v=A4JReRRZOLU}, author={ShortcutsTV}, year={7AD} }
@book{Simpson_Weisburd_2009, address={New York, NY}, edition={1}, title={The Criminology of White-Collar Crime}, url={http://ezproxy.lib.le.ac.uk/login?url=http://dx.doi.org/10.1007/978-0-387-09502-8}, publisher={Springer New York}, author={Simpson, Sally S. and Weisburd, David}, year={2009} }
@misc{Starner, title={Prosecuting tax evasion}, url={http://www.cps.gov.uk/news/articles/prosecuting_tax_evasion/}, author={Starner, K} }
@misc{Stenning_Shearing, title={From the Panopticon to Disney World: the Development of Discipline}, url={http://www.popcenter.org/problems/crimes_against_tourists/PDFs/Shearing_Stenning_1997.pdf}, author={Stenning, C and Shearing, P} }
@misc{Stoddard,_Harmer_DiDomenico, title={The use of private security providers and services in humanitarian operations}, url={https://www.eldis.org/document/A41665}, author={Stoddard, A and Harmer, A and DiDomenico, V} }
@book{Sutton_Cherney_White_2014a, address={Cambridge}, title={Crime prevention: principles, perspectives and practices}, publisher={Cambridge University Press}, author={Sutton, Adam and Cherney, Adrian and White, Rob}, year={2014} }
@book{Sutton_Cherney_White_2014b, address={Cambridge}, title={Crime prevention: principles, perspectives and practices}, publisher={Cambridge University Press}, author={Sutton, Adam and Cherney, Adrian and White, Rob}, year={2014} }
@book{Taylor_2013, address={Basingstoke}, title={Surveillance schools: security, discipline and control in contemporary education}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1474957}, publisher={Palgrave Pivot}, author={Taylor, Emmeline}, year={2013} }
@misc{2010, title={Probation - It Works!}, url={https://www.youtube.com/watch?v=DtWnHGc4nts}, author={Thames Valley Probation}, year={2010} }
@misc{ title={United States V. Bernard L. Madoff And Related Cases | USAO-SDNY | Department of Justice}, url={http://www.justice.gov/usao-sdny/programs/victim-witness-services/united-states-v-bernard-l-madoff-and-related-cases}, author={The United States Attorneys Office} }
@article{Thumala_Goold_Loader_2015, title={Tracking devices: On the reception of a novel security good}, volume={15}, url={https://journals-sagepub-com.ezproxy3.lib.le.ac.uk/doi/10.1177/1748895813507067}, DOI={10.1177/1748895813507067}, number={1}, journal={Criminology and Criminal Justice}, author={Thumala, A. and Goold, B. and Loader, I.}, year={2015}, pages={3–22} }
@article{Tilley_Hopkins_2008, title={Organized crime and local businesses}, volume={8}, DOI={10.1177/1748895808096469}, number={4}, journal={Criminology and Criminal Justice}, author={Tilley, N. and Hopkins, M.}, year={2008}, month={Nov}, pages={443–459} }
@book{Tilley_2005, address={Cullompton, Devon}, title={Handbook of crime prevention and community safety}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5292831}, publisher={Willan Pub}, author={Tilley, Nick}, year={2005} }
@inbook{Tilley_Farrell_Clarke_2015, address={Hampshire}, title={Target Suitability and the Crime Drop}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1952969}, booktitle={Criminal Act: The Role and Influence of Routine Activity Theory}, publisher={Palgrave Macmillan}, author={Tilley, Nick and Farrell, Graham and Clarke, Ronald V.}, year={2015} }
@misc{ title={CCTV Technical Concepts}, url={http://www.popcenter.org/responses/video_surveillance/videos}, author={UK Home Office Scientific Development Branch} }
@article{Urciuoli_2010, title={Supply chain security—mitigation measures and a logistics multi-layered framework}, volume={3}, DOI={10.1007/s12198-009-0034-3}, number={1}, journal={Journal of Transportation Security}, author={Urciuoli, Luca}, year={2010}, month={Mar}, pages={1–28} }
@article{Vanheule_Declercq_Meganck_Desmet_2008, title={Burnout, critical incidents and social support in security guards}, volume={24}, DOI={10.1002/smi.1177}, number={2}, journal={Stress and Health}, author={Vanheule, Stijn and Declercq, Frederic and Meganck, Reitske and Desmet, Mattias}, year={2008}, month={Apr}, pages={137–141} }
@misc{2012b, title={VicHealth (2012) Preventing violence against women in the workplace (An evidence review: summary report), Victorian Heath Promotion Foundation, Melbourne, Australia.}, url={https://www.vichealth.vic.gov.au/~/media/resourcecentre/publicationsandresources/economic%20participation/2012%20workplace/chw_pvaw_full_web_final.ashx}, author={VicHealth}, year={2012} }
@misc{2011a, title={Inside the Madoff Scandal: Chapter One}, url={https://www.youtube.com/watch?v=cxFBurk12Gs}, author={Wall Street Journal}, year={2011}, month={Dec} }
@misc{2011b, title={Inside the Madoff Scandal: Chapter Two}, url={https://www.youtube.com/watch?v=4yugDvzvv04}, author={Wall Street Journal}, year={2011}, month={Dec} }
@book{Waring_2013, address={Burlington, Vt}, title={Corporate risk and governance: an end to mismanagement, tunnel vision and quackery}, url={http://site.ebrary.com/lib/leicester/Doc?id=10693684}, journal={Please read chapter 10 - Corporate Fraud}, publisher={Gower}, author={Waring, Alan}, year={2013} }
@book{Waring_2016a, address={Farnham}, title={Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750}, publisher={Taylor and Francis}, author={Waring, Alan}, year={2016} }
@book{Waring_2016b, address={Farnham}, title={Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750}, publisher={Taylor and Francis}, author={Waring, Alan}, year={2016} }
@book{Waring_2016c, address={Farnham}, title={Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750}, publisher={Taylor and Francis}, author={Waring, Alan}, year={2016} }
@book{Waring_2016d, address={Farnham}, title={Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750}, publisher={Taylor and Francis}, author={Waring, Alan}, year={2016} }
@book{Waring_2016e, address={Farnham}, title={Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750}, publisher={Taylor and Francis}, author={Waring, Alan}, year={2016} }
@book{Waring_2016f, address={Farnham}, title={Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750}, publisher={Taylor and Francis}, author={Waring, Alan}, year={2016} }
@book{Waring_2016g, address={Farnham}, title={Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750}, publisher={Taylor and Francis}, author={Waring, Alan}, year={2016} }
@book{Waring_2016h, address={Farnham}, title={Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750}, publisher={Taylor and Francis}, author={Waring, Alan}, year={2016} }
@book{Waring_2016i, address={Farnham}, title={Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery}, url={http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750}, publisher={Taylor and Francis}, author={Waring, Alan}, year={2016} }
@book{Waring_Glendon_1998a, address={London}, title={Managing risk}, publisher={Thomson Learning}, author={Waring, Alan and Glendon, A. Ian}, year={1998} }
@book{Waring_Glendon_1998b, address={London}, title={Managing risk}, journal={Read the sections Individual Decision-Making on Risk and Individual Behaviour in the Face of Pure Risk, pages 154-161 of chapter 8 Risk Cognition in Waring and Glendon (1998). Note Figure 8.3 and the narrative’s assertion that regardless of risk type (pure or speculative) an individual’s decision-making will always involve a large degree of speculative trade-offs to benefit self-image and self-esteem. What does this imply for risk decision-making processes and claims to objectivity?}, publisher={Thomson Learning}, author={Waring, Alan and Glendon, A. Ian}, year={1998} }
@misc{2009, title={The Story of Organized Crime}, url={https://www.youtube.com/watch?v=JtXuzuxVmGw}, author={WatchMojo.com}, year={2009}, month={Oct} }
@misc{Welsh_Farringdon, title={The Future of Crime Prevention: Developmental and Situational Strategies}, url={http://www.foresightfordevelopment.org/sobipro/55/1172-the-future-of-crime-prevention-developmental-and-situational-strategies}, author={Welsh, B and Farringdon, D} }
@misc{Whyte, title={The Social Life of Small Urban Spaces}, url={https://vimeo.com/239980034}, author={Whyte, W} }
@misc{Hot Spot Policing and Displacement, David Weisburd (3 of 7)_5AD, url={https://www.youtube.com/watch?v=bahC-0s65BI}, year={5AD} }
@misc{Crime Prevention Through Environmental Design_16AD, url={https://www.youtube.com/watch?v=TSRCWxGK7tI}, year={16AD} }
@article{ASIS Issues Workplace Violence Prevention Guide._2006, volume={51}, url={http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=buh&AN=22124163&site=ehost-live}, number={9}, journal={Professional Safety}, year={2006}, pages={17–17} }
@misc{Great Books: 1984 (GEORGE ORWELL)_2007, url={https://www.youtube.com/watch?v=8xvsTBVmP8o}, year={2007} }
@book{Hebberecht_Baillergeau_2012, address={Brussels, Belgium}, title={Social crime prevention in late modern Europe: a comparative perspective}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?pq-origsite=primo&docID=3115829}, publisher={VUBPress}, year={2012} }
@misc{Risk and Business | Security is Your Business, url={http://securityisyourbusiness.com/video/risk-and-business/} }
@misc{Strategic Directions | Security is Your Business, url={http://securityisyourbusiness.com/video/strategic-directions/} }
@misc{Crime Reduction Toolkit | College of Policing, url={http://whatworks.college.police.uk/toolkit/Pages/Toolkit.aspx} }
@misc{Center for Problem-Oriented Policing, url={http://www.popcenter.org/} }
@misc{Video clips for retailers - GETBA, url={http://www.getba.org.nz/video-clips-for-retailers} }
@misc{Old Before My Time  Drugs  Documentary - YouTube, url={https://www.youtube.com/watch?v=FtJfAM-IkHU} }
@misc{DrugWise, url={http://www.drugwise.org.uk/} }
@misc{Center for Problem-Oriented Policing | 25 Techniques, url={http://www.popcenter.org/25techniques/} }
@misc{The Financial Impact of Workplace Violence, url={http://www.workplaceviolence911.com/docs/FinancialImpactofWV.pdf} }
@misc{Workplace Violence Prevention and Response Guideline, url={https://c.ymcdn.com/sites/nabenet.site-ym.com/resource/collection/287C1A6D-C2D6-4E8F-8514-27F9B7FC3CAE/wvpi_std.pdf} }
@misc{Workplace bullying and harassment: building a culture of respect, url={http://www.acas.org.uk/media/pdf/t/p/building_a_culture-accessible-version-Jun-2012.pdf} }