A structured approach to Enterprise Risk Management and the requirements of ISO 31000. n.d.-a.
A structured approach to Enterprise Risk Management and the requirements of ISO 31000. n.d.-b.
Air Force Bugbot Nano Drone Technology. 11 AD.
Albanese, J. S. 2008. ‘Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels’. Journal of Contemporary Criminal Justice 24(3):263–73. doi:10.1177/1043986208318225.
Andrew von Hirsch and Nils Jareborg. 1991. ‘Gauging Criminal Harm: A Living-Standard Analysis’. Oxford Journal of Legal Studies 11(1):1–38. http://www.jstor.org/stable/764504?seq=1#page_scan_tab_contents.
Aven, T. and Wiley InterScience (Online service). 2008. Risk Analysis: Assessing Uncertainties beyond Expected Values and Probabilities. Hoboken, N.J.: Wiley InterScience.
Aven, Terje. 2008a. ‘Risk Analysis Methods’. Pp. 57–84 in Risk Analysis. Chichester, UK: John Wiley & Sons, Ltd.
Aven, Terje. 2008b. ‘What Is a Risk Analysis?’ Pp. 3–15 in Risk Analysis. Chichester, UK: John Wiley & Sons, Ltd.
Aven, Terje. 2012. ‘The Risk Concept—Historical and Recent Development Trends’. Reliability Engineering & System Safety 99:33–44. doi:10.1016/j.ress.2011.11.006.
Bedford, T. and Cooke, Roger M. 2001. Probabilistic Risk Analysis: Foundations and Methods. Cambridge: Cambridge University Press.
Biological Attack Fact Sheet | Homeland Security. n.d.-a.
Biological Attack Fact Sheet | Homeland Security. n.d.-b.
Borrion, Hervé. 2013. ‘Quality Assurance in Crime Scripting’. Crime Science 2(1). doi:10.1186/2193-7680-2-6.
Borrion, Herve, Timothy Mitchener-Nissen, Jonathon Taylor, and Ka-Man Lai. 2012a. ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’. Pp. 68–75 in 2012 European Intelligence and Security Informatics Conference. IEEE.
Borrion, Herve, Timothy Mitchener-Nissen, Jonathon Taylor, and Ka-Man Lai. 2012b. ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’. Pp. 68–75 in 2012 European Intelligence and Security Informatics Conference. IEEE.
Campbell, Scott. 2005. ‘Determining Overall Risk’. Journal of Risk Research 8(7–8):569–81. doi:10.1080/13669870500118329.
Chemical Attack Fact Sheet | Homeland Security. n.d. https://www.dhs.gov/publication/chemical-attack-fact-sheet.
Clarke, Ronald. n.d. ‘Hot Products’. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.551.8913&rep=rep1&type=pdf.
Cohen, Mark A. 1988. ‘Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims’. Law & Society Review 22(3). doi:10.2307/3053629.
Cornish, D. n.d. ‘The Procedural Analysis of Offending and Its Relevance for Situational Prevention’. http://www.unipa.it/persone/docenti/c/salvatore.costantino/.content/documenti/Script-schema-cCrnish.pdf.
Dowie, John. n.d. ‘Against Risk’. https://d1wqtxts1xzle7.cloudfront.net/1029470/AgainstRisk99-libre.pdf?1390588802=&response-content-disposition=inline%3B+filename%3DAgainst_risk.pdf&Expires=1673872326&Signature=IjS5zieyVX9x3X6Va6D8N9yopCyb1c57b0-JAGvXKhX4iBoll8i4tlhv58GcU1DQV-AlxNZW64NeCv90kTleVwOeAC1Tg2Q0THD9srPIgWAKcCKyR-sW9Bhb5PuQeYPODv2Qu1g4I6fwuhyZc9IRw82l5EAGllsUhhYnLncxdLZs8saFBM2-rdBNzP~iAAxBfQ6xjsmVT6qpz7pFdzjrA4VRigCM72aCLJECSyCnQJyDjckX8tMqDrc-gCf~IzJX8Ntl4GDpTxIY37UJD3y~RSxFRFL3pLTqbh0U9TkSI9~v0xGGpF1EM12F1O4f4HdiImeEIC23cRZh~m-4Mw0RiA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA.
Ezell, Barry Charles, Steven P. Bennett, Detlof von Winterfeldt, John Sokolowski, and Andrew J. Collins. 2010a. ‘Probabilistic Risk Analysis and Terrorism Risk’. Risk Analysis 30(4):575–89. doi:10.1111/j.1539-6924.2010.01401.x.
Ezell, Barry Charles, Steven P. Bennett, Detlof von Winterfeldt, John Sokolowski, and Andrew J. Collins. 2010b. ‘Probabilistic Risk Analysis and Terrorism Risk’. Risk Analysis 30(4):575–89. doi:10.1111/j.1539-6924.2010.01401.x.
Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE). n.d. http://ascelibrary.org/doi/abs/10.1061/40577(306)2.
Gibson, John E., Scherer, William T., and Gibson, William F. 2007. How to Do Systems Analysis. Vol. Wiley series in systems engineering and management. Hoboken, N.J.: Wiley-Interscience.
Haas, Charles N. 2002. ‘The Role of Risk Analysis in Understanding Bioterrorism’. Risk Analysis 22(4):671–77. doi:10.1111/0272-4332.00239.
Hamilton-Smith, Niall, and Simon Mackenzie. 2010. ‘The Geometry of Shadows: A Critical Review of Organised Crime Risk Assessments’. Policing and Society 20(3):257–79. doi:10.1080/10439463.2010.505287.
Home Affairs Committee - BTP Submission to Parliment. n.d.
IED Attack Fact Sheet | Homeland Security. n.d. https://www.dhs.gov/publication/ied-attack-fact-sheet.
IRM’s risk management standard. n.d.
J, Taylor, and Margaritis D. 2013. ‘The Role of Protection Measures and Their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism’. Journal of Bioterrorism & Biodefense 04(01). doi:10.4172/2157-2526.1000123.
Kaplan, Stan, Yacov Y. Haimes, and B. John Garrick. 2001. ‘Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk’. Risk Analysis 21(5):807–807. doi:10.1111/0272-4332.215153.
Kaplan, Stanley, and B. John Garrick. 1981. ‘On The Quantitative Definition of Risk’. Risk Analysis 1(1):11–27. doi:10.1111/j.1539-6924.1981.tb01350.x.
Lefebvre, Mario. 2006. Applied Probability and Statistics. New York: Springer.
Leitch, Matthew. 2010. ‘ISO 31000:2009-The New International Standard on Risk Management’. Risk Analysis 30(6):887–92. https://web-p-ebscohost-com.libproxy.ucl.ac.uk/ehost/pdfviewer/pdfviewer?vid=0&sid=15a0e9a1-bd24-404f-9757-70feaf124319%40redis.
Levi, M., and J. Burrows. 2007. ‘Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey’. British Journal of Criminology 48(3):293–318. doi:10.1093/bjc/azn001.
Lowrance, William W. 1976. Of Acceptable Risk: Science and the Determination of Safety. Los Altos, Calif: W. Kaufmann.
Nissen, T. n.d. ‘Designing for Socially Acceptable Security Technologies’.
Paoli, Letizia. n.d. ‘The Harms of Cocaine Trafficking: Applying a New Framework for Assessment’. Journal of Drug Issues 43(4):407–36. http://search.proquest.com/docview/1520318663?rfr_id=info%3Axri%2Fsid%3Aprimo.
Police Drone Looking For Criminals with Heat Cameras & AR Drone. 8 AD.
Police Got Camera Drones To Control Crime – Best Aerial Photography. 1 AD.
Stirling, Andy. 2010. ‘Keep It Complex’. Nature 468(7327):1029–31. doi:10.1038/4681029a.
The Procedural Analysis of Offending and its Relevance for Situational Prevention. n.d. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.375.8084&rep=rep1&type=pdf.
Tokyo Police intercept active drone by unfurling net. 2015.
Tusikov, Natasha. n.d. ‘Measuring Organised Crime-Related Harms: Exploring Five Policing Methods’. Crime, Law and Social Change 57(1):99–115. http://search.proquest.com/docview/917862490?OpenUrlRefId=info:xri/sid:primo&accountid=14511.
Vose, David. 2008. Risk Analysis: A Quantitative Guide. 3rd ed. Chichester: Wiley.
Willis, Henry H. 2007a. ‘Guiding Resource Allocations Based on Terrorism Risk’. Risk Analysis 27(3):597–606. doi:10.1111/j.1539-6924.2007.00909.x.
Willis, Henry H. 2007b. ‘Guiding Resource Allocations Based on Terrorism Risk’. Risk Analysis 27(3):597–606. doi:10.1111/j.1539-6924.2007.00909.x.
Wolff, Jonathan. n.d. ‘Railway Safety and the Ethics of the Tolerability of Risk’.
Zemp, Stefan, Michael Stauffacher, Daniel J. Lang, and Roland W. Scholz. 2011. ‘Generic Functions of Railway Stations—A Conceptual Basis for the Development of Common System Understanding and Assessment Criteria’. Transport Policy 18(2):446–55. doi:10.1016/j.tranpol.2010.09.007.