[1]
Albanese, J.S. 2008. Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels. Journal of Contemporary Criminal Justice. 24, 3 (May 2008), 263–273. https://doi.org/10.1177/1043986208318225.
[2]
Andrew von Hirsch and Nils Jareborg 1991. Gauging Criminal Harm: A Living-Standard Analysis. Oxford Journal of Legal Studies. 11, 1 (1991), 1–38.
[3]
Aven, T. 2008. Risk Analysis Methods. Risk Analysis. John Wiley & Sons, Ltd. 57–84.
[4]
Aven, T. 2012. The risk concept—historical and recent development trends. Reliability Engineering & System Safety. 99, (Mar. 2012), 33–44. https://doi.org/10.1016/j.ress.2011.11.006.
[5]
Aven, T. 2008. What is a Risk Analysis? Risk Analysis. John Wiley & Sons, Ltd. 3–15.
[6]
Aven, T. and Wiley InterScience (Online service) 2008. Risk analysis: assessing uncertainties beyond expected values and probabilities. Wiley InterScience.
[7]
Bedford, T. and Cooke, Roger M. 2001. Probabilistic risk analysis: foundations and methods. Cambridge University Press.
[8]
Borrion, H. et al. 2012. Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. 2012 European Intelligence and Security Informatics Conference (Aug. 2012), 68–75.
[9]
Borrion, H. et al. 2012. Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. 2012 European Intelligence and Security Informatics Conference (Aug. 2012), 68–75.
[10]
Borrion, H. 2013. Quality assurance in crime scripting. Crime Science. 2, 1 (2013). https://doi.org/10.1186/2193-7680-2-6.
[11]
Campbell, S. 2005. Determining overall risk. Journal of Risk Research. 8, 7–8 (Oct. 2005), 569–581. https://doi.org/10.1080/13669870500118329.
[12]
Clarke, R. Hot Products.
[13]
Cohen, M.A. 1988. Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims. Law & Society Review. 22, 3 (1988). https://doi.org/10.2307/3053629.
[14]
Cornish, D. The procedural analysis of offending and its relevance for situational prevention.
[15]
Dowie, J. Against Risk.
[16]
Ezell, B.C. et al. 2010. Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis. 30, 4 (Apr. 2010), 575–589. https://doi.org/10.1111/j.1539-6924.2010.01401.x.
[17]
Ezell, B.C. et al. 2010. Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis. 30, 4 (Apr. 2010), 575–589. https://doi.org/10.1111/j.1539-6924.2010.01401.x.
[18]
Gibson, John E. et al. 2007. How to do systems analysis. Wiley-Interscience.
[19]
Haas, C.N. 2002. The Role of Risk Analysis in Understanding Bioterrorism. Risk Analysis. 22, 4 (Aug. 2002), 671–677. https://doi.org/10.1111/0272-4332.00239.
[20]
Hamilton-Smith, N. and Mackenzie, S. 2010. The geometry of shadows: a critical review of organised crime risk assessments. Policing and Society. 20, 3 (Sept. 2010), 257–279. https://doi.org/10.1080/10439463.2010.505287.
[21]
J, T. and D, M. 2013. The Role of Protection Measures and their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism. Journal of Bioterrorism & Biodefense. 04, 01 (2013). https://doi.org/10.4172/2157-2526.1000123.
[22]
Kaplan, S. et al. 2001. Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk. Risk Analysis. 21, 5 (Oct. 2001), 807–807. https://doi.org/10.1111/0272-4332.215153.
[23]
Kaplan, S. and Garrick, B.J. 1981. On The Quantitative Definition of Risk. Risk Analysis. 1, 1 (Mar. 1981), 11–27. https://doi.org/10.1111/j.1539-6924.1981.tb01350.x.
[24]
Lefebvre, Mario 2006. Applied probability and statistics. Springer.
[25]
Leitch, M. 2010. ISO 31000:2009-The New International Standard on Risk Management. Risk Analysis. 30, 6 (Apr. 2010), 887–892.
[26]
Levi, M. and Burrows, J. 2007. Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey. British Journal of Criminology. 48, 3 (Dec. 2007), 293–318. https://doi.org/10.1093/bjc/azn001.
[27]
Lowrance, W.W. 1976. Of acceptable risk: science and the determination of safety. W. Kaufmann.
[28]
Nissen, T. Designing for Socially Acceptable Security Technologies.
[29]
Paoli, Letizia The Harms of Cocaine Trafficking: Applying a New Framework for Assessment. Journal of Drug Issues. 43, 4, 407–436.
[30]
Stirling, A. 2010. Keep it complex. Nature. 468, 7327 (Dec. 2010), 1029–1031. https://doi.org/10.1038/4681029a.
[31]
Tusikov, Natasha Measuring organised crime-related harms: exploring five policing methods. Crime, Law and Social Change. 57, 1, 99–115.
[32]
Vose, D. 2008. Risk analysis: a quantitative guide. Wiley.
[33]
Willis, H.H. 2007. Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis. 27, 3 (June 2007), 597–606. https://doi.org/10.1111/j.1539-6924.2007.00909.x.
[34]
Willis, H.H. 2007. Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis. 27, 3 (June 2007), 597–606. https://doi.org/10.1111/j.1539-6924.2007.00909.x.
[35]
Wolff, J. Railway safety and the ethics of the tolerability of risk.
[36]
Zemp, S. et al. 2011. Generic functions of railway stations—A conceptual basis for the development of common system understanding and assessment criteria. Transport Policy. 18, 2 (Mar. 2011), 446–455. https://doi.org/10.1016/j.tranpol.2010.09.007.
[37]
A structured approach to Enterprise Risk Management and the requirements of ISO 31000.
[38]
A structured approach to Enterprise Risk Management and the requirements of ISO 31000.
[39]
11 AD. Air Force Bugbot Nano Drone Technology.
[40]
Biological Attack Fact Sheet | Homeland Security.
[41]
Biological Attack Fact Sheet | Homeland Security.
[42]
Chemical Attack Fact Sheet | Homeland Security.
[43]
Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE).
[44]
Home Affairs Committee - BTP Submission to Parliment.
[45]
IED Attack Fact Sheet | Homeland Security.
[46]
IRM’s risk management standard.
[47]
8 AD. Police Drone Looking For Criminals with Heat Cameras & AR Drone.
[48]
1 AD. Police Got Camera Drones To Control Crime – Best Aerial Photography.
[49]
The Procedural Analysis of Offending and its Relevance for Situational Prevention.
[50]
2015. Tokyo Police intercept active drone by unfurling net.