1.
College of Policing. Disrupting Serious and Organised Criminals: Menu of Tactics [Internet]. London: College of Policing; Available from: https://www.college.police.uk/research/menu-of-tactics
2.
Levi M, Maguire M. Reducing and preventing organised crime: An evidence-based critique. Crime, Law and Social Change. 2004 Jun;41(5):397–469.
3.
Lum C, Kennedy LW, Sherley A. Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. Journal of Experimental Criminology. 2007 Jan 10;2(4):489–516.
4.
Van Der Laan P, Smit M, Busschers I, Aarten P. Cross-border trafficking in human beings: Prevention and intervention strategies for reducing sexual exploitation.
5.
EVIL DONE Terrorism Vulnerability Assessment - YouTube [Internet]. Available from: https://www.youtube.com/watch?time_continue=1&v=Ml7qqRhNr5w
6.
von Lampe K. The application of the framework of Situational Crime Prevention to ‘organized crime’. Criminology and Criminal Justice. 2011 Apr 1;11(2):145–163.
7.
Kleemans ER, Soudijn MRJ, Weenink AW. Organized crime, situational crime prevention and routine activity theory. Trends in Organized Crime. 2012 Sep;15(2–3):87–92.
8.
Newman GR. Situational Approaches to Terrorism. In: Bruinsma G, Weisburd D, editors. Encyclopedia of Criminology and Criminal Justice [Internet]. New York, NY: Springer New York; 2014. p. 4853–4864. Available from: http://link.springer.com/10.1007/978-1-4614-5690-2_95
9.
Perry S, Apel R, Newman GR, Clarke RV. The Situational Prevention of Terrorism: An Evaluation of the Israeli West Bank Barrier. Journal of Quantitative Criminology. 2017 Dec;33(4):727–751.
10.
Richard Wortley and Michael Townsley. Environmental Criminology and Crime Analysis. Routledge; 2016. Available from: https://ebookcentral.proquest.com/lib/ucl/reader.action?docID=4717777&ppg=22
11.
Cockbain E, Laycock G. Crime Science [Internet]. Oxford University Press; 2017. Available from: http://criminology.oxfordre.com/view/10.1093/acrefore/9780190264079.001.0001/acrefore-9780190264079-e-4
12.
Ronald V. Clarke. Situational Crime Prevention. Routledge; 2016. Available from: https://ebookcentral.proquest.com/lib/ucl/reader.action?docID=4717777&ppg=307
13.
Bullock K, Clarke RVG, Tilley N. Situational prevention of organised crimes. Cullompton, Devon: Willan; 2010.
14.
Newman GR, Clarke RV. Policing Terrorism: an Executive Guide [Internet]. Office of Community Oriented Policing Services; 2008. Available from: http://www.popcenter.org/library/reading/PDFs/PolicingTerrorism.pdf
15.
Weisburd D, Feucht T, Hakimi I, Mock L, Perry S. To Protect and To Serve. Policing in an Age of Terrorism [Internet]. London: Springer; 2009. Available from: https://link.springer.com/book/10.1007%2F978-0-387-73685-3
16.
Freilich JD, Gruenewald J, Mandala M. Situational Crime Prevention and Terrorism: An Assessment of 10 Years of Research. Criminal Justice Policy Review. 2018 Oct 12;
17.
Great expectations but little evidence: policing money laundering. Available from: http://ucl-primo.hosted.exlibrisgroup.com/primo_library/libweb/action/display.do?frbrVersion=3&tabs=detailsTab&ct=display&fn=search&doc=TN_emerald_s10.1108%2fIJSSP-06-2016-0076&indx=1&recIds=TN_emerald_s10.1108%2fIJSSP-06-2016-0076&recIdxs=0&elementId=0&renderMode=poppedOut&displayMode=full&frbrVersion=3&query=any%2Ccontains%2CGreat+expectations+but+little+evidence%3A+policing+money+laundering&dscnt=0&search_scope=CSCOP_UCL&scp.scps=scope%3A%28UCL%29%2Cprimo_central_multiple_fe&vid=UCL_VU1&onCampus=false&highlight=false&institution=UCL&bulkSize=10&tab=local&displayField=title&dym=true&vl(2235343UI0)=any&vl(freeText0)=Great%20expectations%20but%20little%20evidence%3A%20policing%20money%20laundering&dstmp=1517224342757
18.
SHIELDING THE COMPASS: HOW TO FIGHT TERRORISM WITHOUT DEFEATING THE LAW [Internet]. Available from: https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2013/04/SHIELDING-THE-COMPASS1.pdf
19.
Beekarry, N. International Anti-Money Laundering and Combating the Financing of Terrorism Regulatory Strategy: A Critical Analysis of Compliance Determinants in International Law. Northwestern Journal of International Law & Business [Internet]. 2011; Available from: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/nwjilb31&id=139
20.
King C. Anti-Money Laundering: An Overview. In: King C, Walker C, Gurulé J, editors. The Palgrave Handbook of Criminal and Terrorism Financing Law [Internet]. Cham: Springer International Publishing; 2018. p. 15–31. Available from: http://link.springer.com/10.1007/978-3-319-64498-1_2
21.
Bricknell S. Misuse of the non-profit sector for money laundering and terrorism financing. Trends & issues in crime and criminal justice [Internet]. Canberra: Australian Institute of Criminology; 2011 Sep;(424). Available from: https://aic.gov.au/publications/tandi/tandi424
22.
J. C. Sharman. The Despot’s Guide to Wealth Management [Internet]. Cornell University Press; 2017. Available from: https://www.jstor.org/stable/10.7591/j.ctt1mtz7wd
23.
Jordan J. When Heads Roll: Assessing the Effectiveness of Leadership Decapitation. Security Studies. 2009 Dec 2;18(4):719–755.
24.
LAFREE G, DUGAN L, KORTE R. THE IMPACT OF BRITISH COUNTERTERRORIST STRATEGIES ON POLITICAL VIOLENCE IN NORTHERN IRELAND: COMPARING DETERRENCE AND BACKLASH MODELS. Criminology. 2009 Feb;47(1):17–45.
25.
Smith M, Walsh JI. Do Drone Strikes Degrade Al Qaeda? Evidence From Propaganda Output. Terrorism and Political Violence. 2013 Apr;25(2):311–327.
26.
Johnston PB, Sarbahi AK. The Impact of US Drone Strikes on Terrorism in Pakistan. International Studies Quarterly. 2016 Jun;60(2):203–219.
27.
Benmelech, Efraim1,2Berrebi, Claude3Klor, Esteban F.3,4. Counter-Suicide-Terrorism: Evidence from House Demolitions. Journal of Politics [Internet]. 2015;77(1):27–43. Available from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=bth&AN=100365748&site=ehost-live&scope=site
28.
Braithwaite A, Johnson SD. Space–Time Modeling of Insurgency and Counterinsurgency in Iraq. Journal of Quantitative Criminology. 2012 Mar;28(1):31–48.
29.
Laura Dugan and Erica Chenoweth. Moving Beyond Deterrence: The Effectiveness of Raising the Expected Utility of Abstaining from Terrorism in Israel. American Sociological Review [Internet]. American Sociological Association; 2012;77(4):597–624. Available from: http://www.jstor.org/stable/41723051?seq=1#page_scan_tab_contents
30.
Gill P, Piazza JA, Horgan J. Counterterrorism Killings and Provisional IRA Bombings, 1970–1998. Terrorism and Political Violence. 2016 May 26;28(3):473–496.
31.
Hafez MM, Hatfield JM. Do Targeted Assassinations Work? A Multivariate Analysis of Israel’s Controversial Tactic during Al-Aqsa Uprising. Studies in Conflict & Terrorism. 2006 Jul;29(4):359–382.
32.
Mannes, Aaron. Testing the Snake Head Strategy: Does Killing or Capturing Its Leaders Reduce a Terrorist Group’s Activity? Available from: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2988670
33.
Chris Woods. Sudden Justice: America’s Secret Drone Wars [Internet]. C Hurst & Co Publishers Ltd; 16AD. Available from: https://www.amazon.co.uk/Sudden-Justice-Americas-Secret-Drone/dp/1849044023
34.
University of Oxford Podcasts - Targeted Killing: Exploring its Legality, Morality and Effectiveness [Internet]. Available from: https://podcasts.ox.ac.uk/targeted-killing-exploring-its-legality-morality-and-effectiveness
35.
Godlee F, Hurley R. The war on drugs has failed: doctors should lead calls for drug policy reform. BMJ. 2016 Nov 14;
36.
Werb D, Rowell G, Guyatt G, Kerr T, Montaner J, Wood E. Effect of drug law enforcement on drug market violence: A systematic review. International Journal of Drug Policy. 2011 Mar;22(2):87–94.
37.
Collins J. Ending the Drug Wars: Report of the LSE Expert Group on the Economics of Drug Policy. [Internet]. Available from: http://www.lse.ac.uk/ideas/Assets/Documents/reports/LSE-IDEAS-Ending-the-Drug-Wars.pdf
38.
Rolles S. An alternative to the war on drugs. BMJ. 2010 Jul 14;341(jul13 1):c3360–c3360.
39.
Count the costs: the alternative world drug report. Second edition [Internet]. Available from: https://transformdrugs.org/publications/the-alternative-world-drug-report-2nd-edition
40.
Hughes CE, Stevens A. What Can We Learn From The Portuguese Decriminalization of Illicit Drugs? British Journal of Criminology. 2010 Nov 1;50(6):999–1022.
41.
Thornton A, Bouhana N. Preventing Radicalization in the UK: Expanding the Knowledge-Base on the Channel Programme. Policing: A Journal of Policy and Practice. 2017 Jun 7;
42.
Channel guidance [Internet]. Home Office; 2012. Available from: https://www.gov.uk/government/publications/channel-guidance
43.
PREVENT Strategy Review 2011 [Internet]. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/97976/prevent-strategy-review.pdf
44.
Bringing it Home Community-based approaches to counter-terrorism [Internet]. Available from: http://www.demos.co.uk/files/Bringing%20it%20Home%20-%20web.pdf
45.
Christakis NA, Fowler JH. Social contagion theory: examining dynamic social networks and human behavior. Statistics in Medicine. 2013 Feb 20;32(4):556–577.
46.
BRAGA AA, KENNEDY DM, WARING EJ, PIEHL AM. Problem-Oriented Policing, Deterrence, and Youth Violence: An Evaluation of Boston’s Operation Ceasefire. Journal of Research in Crime and Delinquency. 2001 Aug;38(3):195–225.
47.
Braga AA, Weisburd DL. The Effects of Focused Deterrence Strategies on Crime. Journal of Research in Crime and Delinquency. 2012 Aug;49(3):323–358.
48.
Kennedy DM. Deterrence and crime prevention: reconsidering the prospect of sanction. London: Routledge; 2009.
49.
Papachristos AV, Wildeman C. Network Exposure and Homicide Victimization in an African American Community. American Journal of Public Health. 2014 Jan;104(1):143–150.
50.
Horn JV, Eisenberg M, Nicholls CM, Mulder J, Webster S, Paskell C, Brown A, Stam J, Kerr J, Jago N. Stop It Now! A Pilot Study Into the Limits and Benefits of a Free Helpline Preventing Child Sexual Abuse. Journal of Child Sexual Abuse. 2015 Nov 17;24(8):853–872.
51.
Cockbain E, Knutsson J, editors. Applied police research: challenges and opportunities. London: Routledge; 2015.
52.
Nick Tilley. Handbook of Crime Prevention and Community Safety [Internet]. Available from: http://ucl-primo.hosted.exlibrisgroup.com/primo_library/libweb/action/display.do;jsessionid=5B9503A3D5327174EC559A1B836AB9CC?tabs=detailsTab&ct=display&fn=search&doc=TN_dawson9781843926146&indx=1&recIds=TN_dawson9781843926146&recIdxs=0&elementId=0&renderMode=poppedOut&displayMode=full&frbrVersion=&query=any%2Ccontains%2Cany%2Ccontains%2CHandbook+of+Crime+Prevention+and+Community+Safety&dscnt=0&search_scope=CSCOP_UCL&scp.scps=scope%3A%28UCL%29%2Cprimo_central_multiple_fe&vid=UCL_VU1&onCampus=false&highlight=false&institution=UCL&bulkSize=10&tab=local&displayField=title&dym=true&vl(2235343UI0)=any&vl(freeText0)=any%2Ccontains%2CHandbook%20of%20Crime%20Prevention%20and%20Community%20Safety&dstmp=1522063223332
53.
Tillyer MS, Kennedy DM. Locating Focused Deterrence Approaches within a Situational Crime Prevention Framework. Crime Prevention and Community Safety. 2008 Apr;10(2):75–84.
54.
Carnochan, J., McCluskey, K. Violence, culture and policing in Scotland. In: Donnelly D, Scott K, editors. Policing Scotland. Abington, Oxon: New York; 2010. p. 399–424.
55.
Abt, Thomas. What Works in Reducing Community Violence:  A Meta-Review and Field Study for the Northern Triangle. 2016; Available from: https://ncvc.dspacedirect.org/handle/20.500.11990/1043
56.
Offender Focused Domestic Violence Initiative: The First Two Years [Internet]. High Point, North Carolina; Available from: https://www.highpointnc.gov/DocumentCenter/View/1246/Offender-Focused-Domestic-Violence-Initiative---The-First-Two-Years-PDF?bidId=
57.
Molly Smith, Juno Mac. Revolting Prostitutes: The Fight for Sex Workers’ Rights [Internet]. Available from: https://books.google.co.uk/books?hl=en&lr=&id=HypyDwAAQBAJ&oi=fnd&pg=PA1&dq=Revolting+Prostitutes,+Molly+Smith+and+Juno+Mac&ots=dLoE9C_UQj&sig=sghQQU9QO0_qRUhzqJHblfGk6kA#v=onepage&q&f=false
58.
Saunders J. Tackling cybercrime – the UK response. Journal of Cyber Policy. 2017 Jan 2;2(1):4–15.
59.
National Cyber Security Strategy 2016 to 2021 - GOV.UK [Internet]. Available from: https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021
60.
Understanding the costs of cyber crime - GOV.UK [Internet]. Available from: https://www.gov.uk/government/publications/understanding-the-costs-of-cyber-crime
61.
Attacks in London and Manchester between March and June 2017 - GOV.UK [Internet]. Available from: https://www.gov.uk/government/publications/attacks-in-london-and-manchester-between-march-and-june-2017
62.
Operation of police powers under the Terrorism Act 2000 statistics - GOV.UK [Internet]. Available from: https://www.gov.uk/government/collections/operation-of-police-powers-under-the-terrorism-act-2000
63.
Noel Dempsey. Terrorism in Great Britain: the statistics. Available from: http://researchbriefings.parliament.uk/ResearchBriefing/Summary/CBP-7613
64.
National Security Strategy and Strategic Defence and Security Review 2015 - GOV.UK [Internet]. Available from: https://www.gov.uk/government/publications/national-security-strategy-and-strategic-defence-and-security-review-2015
65.
Counter-Terrorism and Security Act 2015. Available from: http://www.legislation.gov.uk/ukpga/2015/6/contents/enacted
66.
Counter-terrorism strategy (CONTEST) - GOV.UK [Internet]. Available from: https://www.gov.uk/government/publications/counter-terrorism-strategy-contest
67.
Independent Reviewer of Terrorism Legislation « [Internet]. Available from: https://terrorismlegislationreviewer.independent.gov.uk/
68.
New power to target hostile state activity - GOV.UK [Internet]. Available from: https://www.gov.uk/government/news/new-power-to-target-hostile-state-activity
69.
Organized Crime and its Role in Contemporary Conflict – an Analysis of UN Security Council Resolutions [Internet]. The Global Initiative Against Transnational Organized Crime; Available from: https://globalinitiative.net/wp-content/uploads/2018/09/TGIATOC-UNSC-Policy-Note-1962-web.pdf
70.
Global Initiative Briefing to the UN Security Council [Internet]. The Global Initiative Against Transnational Organized Crime; Available from: https://globalinitiative.net/global-initiative-briefing-to-the-un-security-council/
71.
Reitano T, Shaw M. Atlantic Currents and their Illicit Undertow: Fragile States andTransnational Security Implications [Internet]. The German Marshall Fund of the United States; Available from: https://globalinitiative.net/wp-content/uploads/2015/10/reitano-and-shaw-atlantic-currents-and-their-illicit-undertow-october-2015.pdf
72.
Hunter M. Curbing Illicit Mercury and Gold Flows in West Africa [Internet]. The Global Initiative Against Transnational Organized Crime; Available from: https://globalinitiative.net/gold_mercury_ecowas/
73.
Haysom S. Where crime compounds conflict: Understanding northern Mozambique’s vulnerabilities [Internet]. The Global Initiative Against Transnational Organized Crime; Available from: https://globalinitiative.net/northern_mozambique_violence/
74.
The nexus of conflict and illicit drug trafficking – Syria and the wider region [Internet]. The Global Initiative Against Transnational Organized Crime; Available from: https://globalinitiative.net/the-nexus-of-conflict-and-drug-trafficking-in-syria/
75.
Matfess H. Power, elitism and history: Analyzing trends in targeted killings in Nigeria, 2000-2017 [Internet]. The Global Initiative Against Transnational Organized Crime; Available from: https://globalinitiative.net/analyzing-trends-in-targeted-killings-in-nigeria/
76.
Shaw M, Nellemann C, Stock J. World Atlas of Illicit Flows: Organized crime underpins major conflicts and terrorism [Internet]. The Global Initiative Against Transnational Organized Crime; Available from: https://globalinitiative.net/world-atlas-of-illicit-flows/
77.
Ellis S, Shaw M. Does organized crime exist in Africa? African Affairs. 2015 Oct;114(457):505–528.
78.
Mogelson L. Bad Guys vs. Worse Guys in Afghanistan. The New York Times; Available from: https://www.nytimes.com/2011/10/23/magazine/bad-guys-vs-worse-guys-in-afghanistan.html
79.
Jones, Derek. Understanding the Form, Function, and Logic of Clandestine Cellular Networks: The First Step in Effective Counternetwork Operations [Internet]. 2009. Available from: https://apps.dtic.mil/docs/citations/ADA505161
80.
Heuer RJ. Psychology of Intelligence Analysis [Internet]. Central Intelligence Agency; Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/index.html
81.
A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis [Internet]. US Government; Available from: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf
82.
Levi M, Maguire M. Reducing and preventing organised crime: An evidence-based critique. Crime, Law and Social Change. 2004 Jun;41(5):397–469.
83.
Lum C, Kennedy LW, Sherley A. Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. Journal of Experimental Criminology. 2007 Jan 10;2(4):489–516.
84.
GTReC Public Seminar - Tore Bjørgo on Strategies for Preventing Terrorism [Internet]. 30AD. Available from: https://www.youtube.com/watch?v=fRfIcUPZILw
85.
R. V. G. Clarke, Graeme R. Newman. Outsmarting the Terrorists [Internet]. Available from: https://books.google.co.uk/books?hl=en&lr=&id=nkP9aU1dMFQC&oi=fnd&pg=PP5&dq=terrorism+situational+crime+prevention&ots=3XgC5eMZ4h&sig=rxvLNRpgBHUgnHSHu-DMggamIrs&redir_esc=y#v=onepage&q=terrorism%20situational%20crime%20prevention&f=false
86.
Freilich J. The Intersections of Criminology and Terrorism Studies with Joshua Freilich [Internet]. Available from: http://www.tandfonline.com/sda/4890/audioclip-ftpv3.mp3
87.
Kleemans ER, Soudijn MRJ, Weenink AW. Organized crime, situational crime prevention and routine activity theory. Trends in Organized Crime. 2012 Sep;15(2–3):87–92.
88.
Chiu YN, Leclerc B, Townsley M. Crime Script Analysis of Drug Manufacturing In Clandestine Laboratories: Implications for Prevention. British Journal of Criminology. 2011 Mar 1;51(2):355–374.
89.
von Lampe K. The application of the framework of Situational Crime Prevention to ‘organized crime’. Criminology and Criminal Justice. 2011 Apr 1;11(2):145–163.
90.
Extending our reach: a comprehensive approach to tackling serious organised crime [Internet]. Home Office; 2009. Available from: https://www.gov.uk/government/publications/extending-our-reach-a-comprehensive-approach-to-tackling-serious-organised-crime
91.
Braithwaite A, Johnson SD. Space–Time Modeling of Insurgency and Counterinsurgency in Iraq. Journal of Quantitative Criminology. 2012 Mar;28(1):31–48.
92.
Cockbain E, Laycock G. Crime Science [Internet]. Oxford University Press; 2017. Available from: http://criminology.oxfordre.com/view/10.1093/acrefore/9780190264079.001.0001/acrefore-9780190264079-e-4
93.
EVIL DONE Terrorism Vulnerability Assessment [Internet]. 29AD. Available from: https://www.youtube.com/watch?v=Ml7qqRhNr5w
94.
Professor Kate Bowers on Situational Crime Prevention, 27 February 2013, Sydney [Internet]. 14AD. Available from: https://www.youtube.com/watch?v=t2Jw-YTiulg
95.
Crime Prevention Through Environmental Design [Internet]. 16AD. Available from: https://www.youtube.com/watch?v=TSRCWxGK7tI
96.
Criminal Assets Bureau [Internet]. 29AD. Available from: https://www.youtube.com/watch?v=R6a3s6BuWr0
97.
Borgers M, Moors J. Targeting the Proceeds of Crime: Bottlenecks in International Cooperation. European Journal of Crime, Criminal Law and Criminal Justice. 2007 Mar 1;15(1):1–22.
98.
Levi M, Gilmore W. Terrorist Finance, Money Laundering and the Rise and Rise of Mutual Evaluation: A New Paradigm for Crime Control? In: Pieth M, editor. Financing Terrorism [Internet]. Dordrecht: Kluwer Academic Publishers; 2003. p. 87–114. Available from: http://link.springer.com/10.1007/0-306-48044-1_6
99.
Levi M. Taking the Profit Out of Crime: The UK Experience. European Journal of Crime, Criminal Law and Criminal Justice. 1997 Jan 1;5(3):228–239.
100.
Levi, Michael ; Michael Levi. COMBATING THE FINANCING OF TERRORISM: A History and Assessment of the Control of ‘Threat Finance’. Available from: http://ucl-primo.hosted.exlibrisgroup.com/primo_library/libweb/action/display.do?frbrVersion=11&tabs=detailsTab&ct=display&fn=search&doc=TN_jstor_archive_1243610773&indx=1&recIds=TN_jstor_archive_1243610773&recIdxs=0&elementId=0&renderMode=poppedOut&displayMode=full&frbrVersion=11&frbg=&&dscnt=0&scp.scps=scope%3A%28UCL%29%2Cprimo_central_multiple_fe&tb=t&mode=Basic&vid=UCL_VU1&srt=rank&tab=local&dum=true&vl(freeText0)=COMBATING%20THE%20FINANCING%20OF%20TERRORISM%20A%20History%20and%20Assessment%20of%20the%20Control%20of%20%E2%80%98Threat%20Finance%E2%80%99&dstmp=1472744563464
101.
Sproat PA. An evaluation of the UK’s anti-money laundering and asset recovery regime. Crime, Law and Social Change. 2007 Oct 12;47(3):169–184.
102.
Jordan J. When Heads Roll: Assessing the Effectiveness of Leadership Decapitation. Security Studies. 2009 Dec 2;18(4):719–755.
103.
Jordan J. When Heads Roll: Assessing the Effectiveness of Leadership Decapitation. Security Studies. 2009 Dec 2;18(4):719–755.
104.
Walker C. Clamping Down on Terrorism in the United Kingdom. Journal of International Criminal Justice. 2006 Nov 1;4(5):1137–1151.
105.
Braddock K, Horgan J. Towards a Guide for Constructing and Disseminating Counternarratives to Reduce Support for Terrorism. Studies in Conflict & Terrorism. 2016 May 3;39(5):381–404.
106.
Ending Gang and Youth Violence - Mick McNally [Internet]. Available from: http://www.policyreview.tv/video/832/6018
107.
Baines M. Winning Hearts and Minds: Managing Community Tensions. Available from: http://policing.oxfordjournals.org/content/1/3/316.full.pdf
108.
Bloom, Mia ; Horgan, John ; Mia Bloom ; John Horgan. Missing Their Mark: The IRA’s Proxy Bomb Campaign. Available from: http://ucl-primo.hosted.exlibrisgroup.com/primo_library/libweb/action/display.do?frbrVersion=9&tabs=detailsTab&ct=display&fn=search&doc=TN_jstor_archive_1040972076&indx=1&recIds=TN_jstor_archive_1040972076&recIdxs=0&elementId=0&renderMode=poppedOut&displayMode=full&frbrVersion=9&frbg=&&dscnt=0&scp.scps=scope%3A%28UCL%29%2Cprimo_central_multiple_fe&tb=t&mode=Basic&vid=UCL_VU1&srt=rank&tab=local&dum=true&vl(freeText0)=Missing%20Their%20Mark%3A%20The%20IRA%27s%20Proxy%20Bomb%20Campaign&dstmp=1472746537719
109.
Bullock K, Tilley N. Understanding and Tackling Gang Violence. Crime Prevention & Community Safety. 2008 Feb;10(1):36–47.
110.
Thornton S, Mason L. Community Cohesion in High Wycombe: a Case Study of Operation Overt. Policing. 2007 Jan 1;1(1):57–60.
111.
Vertigans S. Routes into ‘Islamic’ Terrorism: Dead Ends and Spaghetti Junctions. Policing. 2007 Nov 7;1(4):447–459.