1.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
2.
Tilley N, Farrell G, Clarke RV. Target Suitability and the Crime Drop. In: Criminal Act: The Role and Influence of Routine Activity Theory [Internet]. Hampshire: Palgrave Macmillan; 2015. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1952969
3.
Risk and Business | Security is Your Business [Internet]. Available from: http://securityisyourbusiness.com/video/risk-and-business/
4.
Strategic Directions | Security is Your Business [Internet]. Available from: http://securityisyourbusiness.com/video/strategic-directions/
5.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
6.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
7.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
8.
Nutt DJ, King LA, Phillips LD. Drug harms in the UK: a multicriteria decision analysis. The Lancet [Internet]. 2010;376(9752):1558–65. Available from: https://www-sciencedirect-com.ezproxy4.lib.le.ac.uk/science/article/pii/S0140673610614626?via%3Dihub
9.
Office for Victims of Crime. Through Our Eyes: Children, Violence, and Trauma [Internet]. 2013. Available from: https://www.youtube.com/watch?v=z8vZxDa2KPM
10.
Shapland J, Hall M. What Do We Know About the Effects of Crime on Victims? International Review of Victimology. 2007 May 1;14(2):175–217.
11.
Greenfield VA, Paoli L. A Framework to Assess the Harms of Crimes. British Journal of Criminology. 2013 Sep 1;53(5):864–85.
12.
Mills H, Skodbo S, Blyth P. Understanding Organised Crime: Estimating the Scale and the Social and Economic costs [Internet]. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246390/horr73.pdf
13.
Bates T, Robb A. Crime’s Impact on the Survival Prospects of Young Urban Small Businesses. Economic Development Quarterly. 2008 Aug 1;22(3):228–38.
14.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
15.
Mugellini G. Measuring and analysing crime against the private sector: International experiences and the Mexican practice. [Internet]. Available from: https://books.google.co.uk/books?id=McHODwAAQBAJ&pg=PA65&lpg=PA65&dq=Organized+crime+and+the+commercial+sector+in+England+and+Wales:+policy,+definition+and+the+extent+of+victimization&source=bl&ots=9ABmwakcK3&sig=ACfU3U27eT0OHBk2LGwGb1hjv7faggzw0w&hl=en&sa=X&ved=2ahUKEwi_2K6p-brqAhXNTxUIHR2zBxQQ6AEwAXoECAwQAQ#v=onepage&q=Organized%20crime%20and%20the%20commercial%20sector%20in%20England%20and%20Wales%3A%20policy%2C%20definition%20and%20the%20extent%20of%20victimization&f=false
16.
Hamilton-Smith N, Mackenzie S. The geometry of shadows: a critical review of organised crime risk assessments. Policing and Society. 2010 Sep;20(3):257–79.
17.
Europol. EU Serious and Organised Crime Threat Assessment [Internet]. 2017. Available from: https://www.europol.europa.eu/activities-services/main-reports/european-union-serious-and-organised-crime-threat-assessment-2017
18.
Tilley N, Hopkins M. Organized crime and local businesses. Criminology and Criminal Justice. 2008 Nov 1;8(4):443–59.
19.
WatchMojo.com. The Story of Organized Crime [Internet]. 2009. Available from: https://www.youtube.com/watch?v=JtXuzuxVmGw
20.
Levi M, Maguire M. Reducing and preventing organised crime: An evidence-based critique. Crime, Law and Social Change [Internet]. 2004 Jun;41(5):397–469. Available from: https://link-springer-com.ezproxy4.lib.le.ac.uk/article/10.1023/B:CRIS.0000039600.88691.af
21.
Kleemans ER, de Poot CJ. Criminal Careers in Organized Crime and Social Opportunity Structure. European Journal of Criminology. 2008 Jan 1;5(1):69–98.
22.
Levi M, Innes M, Reuter P, Gandur R. The economic, financial & social impacts of organised crime in the European [Internet]. Available from: http://www.europarl.europa.eu/RegData/etudes/etudes/join/2013/493018/IPOL-JOIN_ET%282013%29493018_EN.pdf
23.
Hot Spot Policing and Displacement, David Weisburd (3 of 7) [Internet]. 5AD. Available from: https://www.youtube.com/watch?v=bahC-0s65BI
24.
Newburn T. Criminology [Internet]. 2nd ed. London: Routledge; 2013. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4799825
25.
ShortcutsTV. Situational Crime Prevention [Internet]. 7AD. Available from: https://www.youtube.com/watch?v=A4JReRRZOLU
26.
Tilley N. Handbook of crime prevention and community safety [Internet]. Cullompton, Devon: Willan Pub; 2005. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5292831
27.
Crime Reduction Toolkit | College of Policing [Internet]. Available from: http://whatworks.college.police.uk/toolkit/Pages/Toolkit.aspx
28.
Ekblom P. Crime prevention, security and community safety using the 5Is framework [Internet]. Vol. Crime prevention and security management. Basingstoke: Palgrave Macmillan; 2010. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230298996
29.
Center for Problem-Oriented Policing [Internet]. Available from: http://www.popcenter.org/
30.
Millsapp J. CPTED (Crime Prevention Through Environmental Design) [Internet]. 2013. Available from: https://www.youtube.com/watch?v=ni8Sz4ttSdg
31.
Armitage R. Crime prevention through housing design: policy and practice [Internet]. Vol. Crime prevention and security management. London: Palgrave Macmillan; 2013. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1431389
32.
Sutton A, Cherney A, White R. Crime prevention: principles, perspectives and practices. Cambridge: Cambridge University Press; 2014.
33.
Cozens P, Thorn M, Hillier D. Designing out crime in Western Australia: a case study. Property Management. 2008 Oct 17;26(5):295–309.
34.
Gill ML. The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014.
35.
Personal Defence Network. Demystifying CPTED [Internet]. Available from: http://www.personaldefensenetwork.com/video/demystifying-cpted-crime-prevention-environmental-design-005340/
36.
Armitage R. Crime prevention through housing design: policy and practice [Internet]. Vol. Crime prevention and security management. London: Palgrave Macmillan; 2013. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1431389
37.
Armitage R, Monchuk L. Sustaining the crime reduction impact of designing out crime: Re-evaluating the Secured by Design scheme 10 years on. Security Journal. 2011;24(4):320–43.
38.
Armitage R, Monchuk L, Rogerson M. It Looks Good, but What is it Like to Live There? Exploring the Impact of Innovative Housing Design on Crime. European Journal on Criminal Policy and Research. 2011;17(1):29–54.
39.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
40.
Video clips for retailers - GETBA [Internet]. Available from: http://www.getba.org.nz/video-clips-for-retailers
41.
Crime Prevention Through Environmental Design [Internet]. 16AD. Available from: https://www.youtube.com/watch?v=TSRCWxGK7tI
42.
Sutton A, Cherney A, White R. Crime prevention: principles, perspectives and practices. Cambridge: Cambridge University Press; 2014.
43.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
44.
Homel R. Developmental crime prevention [Internet]. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.567.7928&rep=rep1&type=pdf
45.
Gregg D. Family intervention projects: a classic case of policy-based evidence [Internet]. Available from: http://www.crimeandjustice.org.uk/publications/family-intervention-projects-classic-case-policy-based-evidence
46.
Welsh B, Farringdon D. The Future of Crime Prevention: Developmental and Situational Strategies [Internet]. Available from: http://www.foresightfordevelopment.org/sobipro/55/1172-the-future-of-crime-prevention-developmental-and-situational-strategies
47.
Hebberecht P, Baillergeau E, editors. Social crime prevention in late modern Europe: a comparative perspective [Internet]. Brussels, Belgium: VUBPress; 2012. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?pq-origsite=primo&docID=3115829
48.
McKinney D. Health: Drug Education [Internet]. 13AD. Available from: https://www.youtube.com/watch?v=FM4LQzFQb94
49.
Old Before My Time  Drugs  Documentary - YouTube [Internet]. Available from: https://www.youtube.com/watch?v=FtJfAM-IkHU
50.
DrugWise [Internet]. Available from: http://www.drugwise.org.uk/
51.
Maguire M, Morgan R, Reiner R. The Oxford handbook of criminology. 5th ed. Oxford: Oxford University Press; 2012.
52.
BARTON A. Screening and Brief Intervention of Detainees for Alcohol Use: A Social Crime Prevention Approach to Combating Alcohol-Related Crime? The Howard Journal of Criminal Justice. 2011 Feb;50(1):62–74.
53.
Advancing Corrections. P10 - Probation Programs and the Crime-Reduction Potential of Structured Community Supervision [Internet]. 2012. Available from: https://www.youtube.com/watch?v=ISXyjBikH24
54.
Thames Valley Probation. Probation - It Works! [Internet]. 2010. Available from: https://www.youtube.com/watch?v=DtWnHGc4nts
55.
Brayford J, Cowe F, Deering J. What else works?: creative work with offenders [Internet]. Cullompton: Willian Publishing; 2010. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://www.myilibrary.com?id=255366
56.
Great Books: 1984 (GEORGE ORWELL) [Internet]. 2007. Available from: https://www.youtube.com/watch?v=8xvsTBVmP8o
57.
Taylor E. Surveillance schools: security, discipline and control in contemporary education [Internet]. Basingstoke: Palgrave Pivot; 2013. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1474957
58.
Newburn T. Criminology [Internet]. 2nd ed. London: Routledge; 2013. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4799825
59.
Stenning C, Shearing P. From the Panopticon to Disney World: the Development of Discipline [Internet]. Available from: http://www.popcenter.org/problems/crimes_against_tourists/PDFs/Shearing_Stenning_1997.pdf
60.
Bartlett J. Is Modern Surveillance Really ‘Orwellian’ [Internet]. Available from: http://www.huffingtonpost.co.uk/jamie-bartlett/surveillance-george-orwell_b_3899906.html
61.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
62.
Clive Norris and Michael McCahill. CCTV: BEYOND PENAL MODERNISM? The British Journal of Criminology [Internet]. 2006;46(1):97–118. Available from: http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/23639334?pq-origsite=summon
63.
Whyte W. The Social Life of Small Urban Spaces [Internet]. Available from: https://vimeo.com/239980034
64.
Center for Problem-Oriented Policing | 25 Techniques [Internet]. Available from: http://www.popcenter.org/25techniques/
65.
Chayka K. Face-recognition software: Is this the end of anonymity for all of us? [Internet]. Available from: http://www.independent.co.uk/life-style/gadgets-and-tech/features/face-recognition-software-is-this-the-end-of-anonymity-for-all-of-us-9278697.html
66.
Marwick A. The Public Domain: Social Surveillance in Everyday Life [Internet]. Available from: https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/pub_dom
67.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
68.
Mitsilegas V. The Value of Privacy in an Era of Security: Embedding Constitutional Limits on Preemptive Surveillance. International Political Sociology [Internet]. 2014;8(1):104–8. Available from: https://academic-oup-com.ezproxy3.lib.le.ac.uk/ips/article/8/1/104/1921111
69.
UK Home Office Scientific Development Branch. CCTV Technical Concepts [Internet]. Available from: http://www.popcenter.org/responses/video_surveillance/videos
70.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
71.
Faundez-Zanuy M, Hussain A, Mekyska J, Sesa-Nogueras E, Monte-Moreno E, Esposito A, et al. Biometric Applications Related to Human Beings: There Is Life beyond Security. Cognitive Computation [Internet]. 2013 Mar;5(1):136–51. Available from: https://link-springer-com.ezproxy3.lib.le.ac.uk/article/10.1007/s12559-012-9169-9
72.
Thumala A, Goold B, Loader I. Tracking devices: On the reception of a novel security good. Criminology and Criminal Justice [Internet]. 2015;15(1):3–22. Available from: https://journals-sagepub-com.ezproxy3.lib.le.ac.uk/doi/10.1177/1748895813507067
73.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
74.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
75.
Waring A. Corporate risk and governance: an end to mismanagement, tunnel vision and quackery [Internet]. Please read chapter 10 - Corporate Fraud. Burlington, Vt: Gower; 2013. Available from: http://site.ebrary.com/lib/leicester/Doc?id=10693684
76.
Levi M. The phantom capitalists: the organization and control of long-firm fraud. Rev. ed. Aldershot: Ashgate; 2008.
77.
Carpenter K. Match-Fixing – the Biggest Threat to Sport in the 21st Century? [Internet]. Available from: http://www.interpol.int/Media/Files/INTERPOL-Expertise/IGLC/Match-fixing-biggest-threat
78.
Gill ML. The Handbook of Security [Internet]. Basingstoke: Palgrave Macmillan; 2014. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://dx.doi.org/10.1007/978-1-349-67284-4
79.
Waring A. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery [Internet]. Farnham: Taylor and Francis; 2016. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750
80.
Waring A. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery [Internet]. Farnham: Taylor and Francis; 2016. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750
81.
Starner K. Prosecuting tax evasion [Internet]. Available from: http://www.cps.gov.uk/news/articles/prosecuting_tax_evasion/
82.
Fuller C. HMRC wins Eclipse 35 case at Court of Appeal - 18 Feb 2015 - Accountancy Age [Internet]. Available from: http://www.accountancyage.com/aa/news/2395841/hmrc-wins-eclipse-35-case-at-court-of-appeal
83.
Waring A. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery [Internet]. Farnham: Taylor and Francis; 2016. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750
84.
Waring A, Glendon AI. Managing risk. London: Thomson Learning; 1998.
85.
Gill M. Fraud and recessions: Views from fraudsters and fraud managers. International Journal of Law, Crime and Justice. 2011;39(3):204–14.
86.
Schuchter A, Levi M. The Fraud Triangle revisited. Security Journal. 2013 Feb 4;
87.
Waring A. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery [Internet]. Farnham: Taylor and Francis; 2016. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750
88.
rghm. Enron’s Skilling Answers Markey at Hearing; Eyes Roll [Internet]. 2008. Available from: https://www.youtube.com/watch?v=hPqH3DrWEEU
89.
Waring A. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery [Internet]. Farnham: Taylor and Francis; 2016. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750
90.
Wall Street Journal. Inside the Madoff Scandal: Chapter One [Internet]. 2011. Available from: https://www.youtube.com/watch?v=cxFBurk12Gs
91.
Wall Street Journal. Inside the Madoff Scandal: Chapter Two [Internet]. 2011. Available from: https://www.youtube.com/watch?v=4yugDvzvv04
92.
The United States Attorneys Office. United States V. Bernard L. Madoff And Related Cases | USAO-SDNY | Department of Justice [Internet]. Available from: http://www.justice.gov/usao-sdny/programs/victim-witness-services/united-states-v-bernard-l-madoff-and-related-cases
93.
Waring A. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery [Internet]. Farnham: Taylor and Francis; 2016. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750
94.
Bloomberg Express. Ex-Olympus CEO Woodford Says All Directors Should Go [Internet]. 10AD. Available from: https://www.youtube.com/watch?v=6U5wml5XVww
95.
Waring A. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery [Internet]. Farnham: Taylor and Francis; 2016. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750
96.
Waring A, Glendon AI. Managing risk. Read the sections Individual Decision-Making on Risk and Individual Behaviour in the Face of Pure Risk, pages 154-161 of chapter 8 Risk Cognition in Waring and Glendon (1998). Note Figure 8.3 and the narrative’s assertion that regardless of risk type (pure or speculative) an individual’s decision-making will always involve a large degree of speculative trade-offs to benefit self-image and self-esteem. What does this imply for risk decision-making processes and claims to objectivity? London: Thomson Learning; 1998.
97.
Gill M. Learning from Fraudsters. [Internet]. Available from: https://perpetuityresearch.com/855/learning-from-fraudsters/
98.
Waring A. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery [Internet]. Farnham: Taylor and Francis; 2016. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750
99.
Waring A. Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery [Internet]. Farnham: Taylor and Francis; 2016. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750
100.
Simpson SS, Weisburd D. The Criminology of White-Collar Crime [Internet]. 1st ed. New York, NY: Springer New York; 2009. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://dx.doi.org/10.1007/978-0-387-09502-8
101.
Gill M. Fraud and recessions: Views from fraudsters and fraud managers. International Journal of Law, Crime and Justice. 2011 Sep;39(3):204–14.
102.
Levi M. Public and Private Policing of Financial Crimes: the Struggle for Co-ordination [Internet]. Available from: http://www.fvv.um.si/varstvoslovje/articles/vs-2010-4-levi.pdf
103.
Levi M. Regulating fraud: white-collar crime and the criminal process. London: Tavistock Publications; 1987.
104.
Doig A, Levi M. A case of arrested development? Delivering the UK National Fraud Strategy within competing policing policy priorities. Public Money & Management. 2013 Mar;33(2):145–52.
105.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
106.
Beck A, Palmer W. The Importance of Visual Situational Cues and Difficulty of Removal in Creating Deterrence: The Limitations of Electronic Article Surveillance Source Tagging in the Retail Environment. Journal of Applied Security Research. 2010 Dec 30;6(1):110–23.
107.
Beck A. Self-scan checkouts and retail loss: Understanding the risk and minimising the threat. Security Journal. 2011 Jul;24(3):199–215.
108.
CheckpointSys. Global Retail Theft Barometer Highlights 2013-2014 [Internet]. 2014. Available from: https://www.youtube.com/watch?v=kPVOjai-tHY
109.
Beck A, Peacock C. New loss prevention: Redefining shrinkage management [Internet]. Basingstoke: Palgrave Macmillan; 2009. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230250727
110.
Bamfield J. Shopping and crime [Internet]. Vol. Crime prevention and security management. Basingstoke: Palgrave Macmillan; 2012. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=882576
111.
MossAdamsLLP. Assessing Risks in an Omnichannel Retail World [Internet]. 2013. Available from: https://www.youtube.com/watch?v=ilPJnEBW6Fc&feature=youtu.be
112.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
113.
Manners-Bell J. Supply chain risk: understanding emerging threats to global supply chains [Internet]. London: Kogan Page; 2014. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1658900
114.
Manners-Bell J. Supply Chain Risk: Understanding Emerging Threats to Global Supply Chains [Internet]. 1st ed. London: Kogan Page, Limited; 2014. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1658900
115.
Manners-Bell J. Supply Chain Risk: Understanding Emerging Threats to Global Supply Chains [Internet]. 1st ed. London: Kogan Page, Limited; 2014. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1658900
116.
Beck A, Chapman P, Peacock C. SHRINKAGE: A COLLABORATIVE APPROACH TO REDUCING STOCK LOSS IN THE SUPPLY CHAIN [Internet]. Available from: https://www.ecr.digital/wp_contents/uploads/2016/09/ECR-Bericht_Shrinkage.pdf
117.
Haelterman H. Situational Crime Prevention and Supply Chain Security: An "Ex Ante” Consideration of Preventive Measures. Journal of Applied Security Research. 2009 Oct 6;4(4):483–500.
118.
Urciuoli L. Supply chain security—mitigation measures and a logistics multi-layered framework. Journal of Transportation Security. 2010 Mar;3(1):1–28.
119.
Gill ML. The Handbook of Security [Internet]. Basingstoke: Palgrave Macmillan; 2006. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
120.
Clarke R, Petrossian G. Shoplifting [Internet]. Available from: http://www.popcenter.org/problems/pdfs/Shoplifting.pdf
121.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
122.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
123.
Callender Knefel AM, Bryant CD. workplace as combat zone: reconceptualizing occupational and organizational violence. Deviant Behavior. 2004 Nov;25(6):579–601.
124.
CHECHAK D, CSIERNIK R. Canadian Perspectives on Conceptualizing and Responding to Workplace Violence. Journal of Workplace Behavioral Health. 2014 Jan 2;29(1):55–72.
125.
Chappell D, Di Martino V, International Labour Office. Violence at work [Internet]. 3rd ed. Geneva: International Labour Office; 2006. Available from: http://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/---publ/documents/publication/wcms_publ_9221108406_en.pdf
126.
Pinto J. Expanding the Content Domain of Workplace Aggression: A Three-level Aggressor-target Taxonomy. International Journal of Management Reviews. 2014 Jul;16(3):290–313.
127.
Gill ML. The Handbook of Security [Internet]. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan; 2014. Available from: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344
128.
Chappell D, Martino V. Violence at Work [Internet]. 3rd ed. Available from: http://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/---publ/documents/publication/wcms_publ_9221108406_en.pdf
129.
Kerr KM. Workplace violence: planning for prevention and response [Internet]. Burlington, Mass: Butterworth-Heinemann; 2010. Available from: http://site.ebrary.com/lib/leicester/Doc?id=10391642
130.
The Financial Impact of Workplace Violence [Internet]. Available from: http://www.workplaceviolence911.com/docs/FinancialImpactofWV.pdf
131.
Affizal Ahmad. The Kind of Mental Health Problems and it Association with Aggressiveness: A Study on Security Guards. International Journal of Psychology and Behavioral Sciences [Internet]. 2(6):237–44. Available from: http://article.sapub.org/10.5923.j.ijpbs.20120206.07.html
132.
Vanheule S, Declercq F, Meganck R, Desmet M. Burnout, critical incidents and social support in security guards. Stress and Health. 2008 Apr;24(2):137–41.
133.
Good Practice Review. Operational security management in violent environments [Internet]. Available from: http://odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf
134.
Leo C.C. Cheung,Hector W.H. Tsang,Christopher U. Tsui. A Job-Specific Social Skills Training program for people with severe mental illness: a case study for those who plan to be a security guard. The Journal of Rehabilitation [Internet]. 2006;72(4). Available from: http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?p=EAIM&u=leicester&id=GALE|A157267476&v=2.1&it=r&sid=summon&userGroup=leicester&authCount=1
135.
LEINO T, SELIN R, SUMMALA H, VIRTANEN M. Work-related Violence against Security Guards— Who is Most at Risk? [Internet]. Available from: https://www.jstage.jst.go.jp/article/indhealth/49/2/49_MS1208/_pdf
136.
Kenny J. Risk Assessment and Management Teams: A Comprehensive Approach to Early Intervention in Workplace Violence. Journal of Applied Security Research. 2010 Mar 31;5(2):159–75.
137.
Workplace Violence Prevention and Response Guideline [Internet]. Available from: https://c.ymcdn.com/sites/nabenet.site-ym.com/resource/collection/287C1A6D-C2D6-4E8F-8514-27F9B7FC3CAE/wvpi_std.pdf
138.
ASIS Issues Workplace Violence Prevention Guide. Professional Safety [Internet]. 2006;51(9):17–17. Available from: http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=buh&AN=22124163&site=ehost-live
139.
Mental Welfare Commission. Zero Tolerance Measured Response [Internet]. Available from: https://docplayer.net/43776378-Zero-tolerance-measured-response-responding-to-violence-in-mental-health-or-learning-disability-care-settings.html
140.
Kang-Brown J, Trone J, Fratello J, Daftary-Kapur, T. A Generation Later: What We’ve Learned about Zero Tolerance in Schools [Internet]. Available from: http://www.vera.org/sites/default/files/resources/downloads/zero-tolerance-in-schools-policy-brief.pdf
141.
VicHealth. VicHealth (2012) Preventing violence against women in the workplace (An evidence review: summary report), Victorian Heath Promotion Foundation, Melbourne, Australia. [Internet]. 2012. Available from: https://www.vichealth.vic.gov.au/~/media/resourcecentre/publicationsandresources/economic%20participation/2012%20workplace/chw_pvaw_full_web_final.ashx
142.
Bowie V. An Emerging Awareness of the Role Organizational Culture and Management Style Can Play in Triggering Workplace Violence [Internet]. Available from: https://docplayer.net/20724466-6-an-emerging-awareness-of-the-role-organizational-culture-and-management-style-can-play-in-triggering-workplace-violence.html
143.
ICRC. Health care in danger- The Human Cost. Available from: https://www.youtube.com/watch?v=Cr3eknFzhWs
144.
E u r o p e a n A g e n c y f o r S a f e t y a n d H e a l t h a t W o r k. European Agency for Safety and Health at Work [Internet]. Available from: https://osha.europa.eu/en/node/6745/file_view
145.
Workplace bullying and harassment: building a culture of respect [Internet]. Available from: http://www.acas.org.uk/media/pdf/t/p/building_a_culture-accessible-version-Jun-2012.pdf
146.
Kaminski M. United Association for Labor Education (UALE) - Workplace Bullying Materials [Internet]. Available from: https://uale.org/resources-list/57-workplace-bullying-materials
147.
Redwood-Campbell LJ, Sekhar SN, Persaud CR. Health Care Workers in Danger Zones: A Special Report on Safety and Security in a Changing Environment. Prehospital and Disaster Medicine. 2014 Oct;29(05):503–7.
148.
Stoddard, A, Harmer A, DiDomenico V. The use of private security providers and services in humanitarian operations [Internet]. Available from: https://www.eldis.org/document/A41665
149.
Fast L. Security and Risk Management for Peacebuilding Organisations [Internet]. Available from: http://www.berghof-foundation.org/fileadmin/redaktion/Publications/Handbook/Articles/fast_handbook.pdf