1.
Campbell S. Determining overall risk. Journal of Risk Research. 2005;8(7-8):569-581. doi:10.1080/13669870500118329
2.
Kaplan S, Garrick BJ. On The Quantitative Definition of Risk. Risk Analysis. 1981;1(1):11-27. doi:10.1111/j.1539-6924.1981.tb01350.x
3.
Lowrance WW. Of Acceptable Risk: Science and the Determination of Safety. W. Kaufmann; 1976.
4.
Leitch M. ISO 31000:2009-The New International Standard on Risk Management. Risk Analysis. 2010;30(6):887-892. https://web-p-ebscohost-com.libproxy.ucl.ac.uk/ehost/pdfviewer/pdfviewer?vid=0&sid=15a0e9a1-bd24-404f-9757-70feaf124319%40redis
5.
IRM’s risk management standard. https://www.theirm.org/knowledge-and-resources/risk-management-standards/irms-risk-management-standard/
6.
A structured approach to Enterprise Risk Management and the requirements of ISO 31000. https://www.theirm.org/media/886062/ISO3100_doc.pdf
7.
Willis HH. Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis. 2007;27(3):597-606. doi:10.1111/j.1539-6924.2007.00909.x
8.
Aven T. What is a Risk Analysis? In: Risk Analysis. John Wiley & Sons, Ltd; 2008:3-15. doi:10.1002/9780470694435.ch1
9.
Dowie J. Against Risk. https://d1wqtxts1xzle7.cloudfront.net/1029470/AgainstRisk99-libre.pdf?1390588802=&response-content-disposition=inline%3B+filename%3DAgainst_risk.pdf&Expires=1673872326&Signature=IjS5zieyVX9x3X6Va6D8N9yopCyb1c57b0-JAGvXKhX4iBoll8i4tlhv58GcU1DQV-AlxNZW64NeCv90kTleVwOeAC1Tg2Q0THD9srPIgWAKcCKyR-sW9Bhb5PuQeYPODv2Qu1g4I6fwuhyZc9IRw82l5EAGllsUhhYnLncxdLZs8saFBM2-rdBNzP~iAAxBfQ6xjsmVT6qpz7pFdzjrA4VRigCM72aCLJECSyCnQJyDjckX8tMqDrc-gCf~IzJX8Ntl4GDpTxIY37UJD3y~RSxFRFL3pLTqbh0U9TkSI9~v0xGGpF1EM12F1O4f4HdiImeEIC23cRZh~m-4Mw0RiA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
10.
A structured approach to Enterprise Risk Management and the requirements of ISO 31000. https://www.theirm.org/media/886062/ISO3100_doc.pdf
11.
Vose D. Risk Analysis: A Quantitative Guide. 3rd ed. Wiley; 2008.
12.
Biological Attack Fact Sheet | Homeland Security. https://www.dhs.gov/publication/biological-attack-fact-sheet
13.
Haas CN. The Role of Risk Analysis in Understanding Bioterrorism. Risk Analysis. 2002;22(4):671-677. doi:10.1111/0272-4332.00239
14.
J T, D M. The Role of Protection Measures and their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism. Journal of Bioterrorism & Biodefense. 2013;04(01). doi:10.4172/2157-2526.1000123
15.
Borrion H, Mitchener-Nissen T, Taylor J, Lai KM. Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. In: 2012 European Intelligence and Security Informatics Conference. IEEE; 2012:68-75. doi:10.1109/EISIC.2012.45
16.
Aven T. The risk concept—historical and recent development trends. Reliability Engineering & System Safety. 2012;99:33-44. doi:10.1016/j.ress.2011.11.006
17.
Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE). http://ascelibrary.org/doi/abs/10.1061/40577(306)2
18.
Borrion H. Quality assurance in crime scripting. Crime Science. 2013;2(1). doi:10.1186/2193-7680-2-6
19.
Cornish D. The procedural analysis of offending and its relevance for situational prevention. http://www.unipa.it/persone/docenti/c/salvatore.costantino/.content/documenti/Script-schema-cCrnish.pdf
20.
Aven T. Risk Analysis Methods. In: Risk Analysis. John Wiley & Sons, Ltd; 2008:57-84. doi:10.1002/9780470694435.ch6
21.
Willis HH. Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis. 2007;27(3):597-606. doi:10.1111/j.1539-6924.2007.00909.x
22.
Ezell BC, Bennett SP, von Winterfeldt D, Sokolowski J, Collins AJ. Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis. 2010;30(4):575-589. doi:10.1111/j.1539-6924.2010.01401.x
23.
Stirling A. Keep it complex. Nature. 2010;468(7327):1029-1031. doi:10.1038/4681029a
24.
Nissen T. Designing for Socially Acceptable Security Technologies. http://discovery.ucl.ac.uk/1426195/
25.
Chemical Attack Fact Sheet | Homeland Security. https://www.dhs.gov/publication/chemical-attack-fact-sheet
26.
Biological Attack Fact Sheet | Homeland Security. https://www.dhs.gov/publication/biological-attack-fact-sheet
27.
IED Attack Fact Sheet | Homeland Security. https://www.dhs.gov/publication/ied-attack-fact-sheet
28.
Clarke R. Hot Products. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.551.8913&rep=rep1&type=pdf
29.
Police Got Camera Drones To Control Crime – Best Aerial Photography. Published online 1 AD. https://www.youtube.com/watch?v=mwHbEk89kug
30.
Police Drone Looking For Criminals with Heat Cameras & AR Drone. Published online 8 AD. https://www.youtube.com/watch?v=YfePcIiKwWs
31.
Air Force Bugbot Nano Drone Technology. Published online 11 AD. https://www.youtube.com/watch?v=z78mgfKprdg
32.
Tokyo Police intercept active drone by unfurling net. Published online 12 December 2015. https://www.youtube.com/watch?v=RKvf_gpVVU4
33.
Home Affairs Committee - BTP Submission to Parliment. http://www.publications.parliament.uk/pa/cm200809/cmselect/cmhaff/112/112we07.htm
34.
Wolff J. Railway safety and the ethics of the tolerability of risk. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.404.6699&rep=rep1&type=pdf
35.
Paoli, Letizia. The Harms of Cocaine Trafficking: Applying a New Framework for Assessment. Journal of Drug Issues. 43(4):407-436. http://search.proquest.com/docview/1520318663?rfr_id=info%3Axri%2Fsid%3Aprimo
36.
Andrew von Hirsch and Nils Jareborg. Gauging Criminal Harm: A Living-Standard Analysis. Oxford Journal of Legal Studies. 1991;11(1):1-38. http://www.jstor.org/stable/764504?seq=1#page_scan_tab_contents
37.
Albanese JS. Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels. Journal of Contemporary Criminal Justice. 2008;24(3):263-273. doi:10.1177/1043986208318225
38.
Cohen MA. Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims. Law & Society Review. 1988;22(3). doi:10.2307/3053629
39.
Hamilton-Smith N, Mackenzie S. The geometry of shadows: a critical review of organised crime risk assessments. Policing and Society. 2010;20(3):257-279. doi:10.1080/10439463.2010.505287
40.
Levi M, Burrows J. Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey. British Journal of Criminology. 2007;48(3):293-318. doi:10.1093/bjc/azn001
41.
Tusikov, Natasha. Measuring organised crime-related harms: exploring five policing methods. Crime, Law and Social Change. 57(1):99-115. http://search.proquest.com/docview/917862490?OpenUrlRefId=info:xri/sid:primo&accountid=14511
42.
Aven, T., Wiley InterScience (Online service). Risk Analysis: Assessing Uncertainties beyond Expected Values and Probabilities. Wiley InterScience; 2008. http://dx.doi.org/10.1002/9780470694435
43.
Ezell BC, Bennett SP, von Winterfeldt D, Sokolowski J, Collins AJ. Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis. 2010;30(4):575-589. doi:10.1111/j.1539-6924.2010.01401.x
44.
Lefebvre, Mario. Applied Probability and Statistics. Springer; 2006.
45.
Zemp S, Stauffacher M, Lang DJ, Scholz RW. Generic functions of railway stations—A conceptual basis for the development of common system understanding and assessment criteria. Transport Policy. 2011;18(2):446-455. doi:10.1016/j.tranpol.2010.09.007
46.
Kaplan S, Haimes YY, Garrick BJ. Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk. Risk Analysis. 2001;21(5):807-807. doi:10.1111/0272-4332.215153
47.
Gibson, John E., Scherer, William T., Gibson, William F. How to Do Systems Analysis. Vol Wiley series in systems engineering and management. Wiley-Interscience; 2007.
48.
Bedford, T., Cooke, Roger M. Probabilistic Risk Analysis: Foundations and Methods. Cambridge University Press; 2001.
49.
Borrion H, Mitchener-Nissen T, Taylor J, Lai KM. Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. In: 2012 European Intelligence and Security Informatics Conference. IEEE; 2012:68-75. doi:10.1109/EISIC.2012.45
50.
The Procedural Analysis of Offending and its Relevance for Situational Prevention. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.375.8084&rep=rep1&type=pdf