A structured approach to Enterprise Risk Management and the requirements of ISO 31000. (n.d.-a). https://www.theirm.org/media/886062/ISO3100_doc.pdf
A structured approach to Enterprise Risk Management and the requirements of ISO 31000. (n.d.-b). https://www.theirm.org/media/886062/ISO3100_doc.pdf
Air Force Bugbot Nano Drone Technology. (11 C.E.). https://www.youtube.com/watch?v=z78mgfKprdg
Albanese, J. S. (2008). Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels. Journal of Contemporary Criminal Justice, 24(3), 263–273. https://doi.org/10.1177/1043986208318225
Andrew von Hirsch and Nils Jareborg. (1991). Gauging Criminal Harm: A Living-Standard Analysis. Oxford Journal of Legal Studies, 11(1), 1–38. http://www.jstor.org/stable/764504?seq=1#page_scan_tab_contents
Aven, T. (2008a). Risk Analysis Methods. In Risk Analysis (pp. 57–84). John Wiley & Sons, Ltd. https://doi.org/10.1002/9780470694435.ch6
Aven, T. (2008b). What is a Risk Analysis? In Risk Analysis (pp. 3–15). John Wiley & Sons, Ltd. https://doi.org/10.1002/9780470694435.ch1
Aven, T. (2012). The risk concept—historical and recent development trends. Reliability Engineering & System Safety, 99, 33–44. https://doi.org/10.1016/j.ress.2011.11.006
Aven, T. & Wiley InterScience (Online service). (2008). Risk analysis: assessing uncertainties beyond expected values and probabilities. Wiley InterScience. http://dx.doi.org/10.1002/9780470694435
Bedford, T. & Cooke, Roger M. (2001). Probabilistic risk analysis: foundations and methods. Cambridge University Press.
Biological Attack Fact Sheet | Homeland Security. (n.d.-a). https://www.dhs.gov/publication/biological-attack-fact-sheet
Biological Attack Fact Sheet | Homeland Security. (n.d.-b). https://www.dhs.gov/publication/biological-attack-fact-sheet
Borrion, H. (2013). Quality assurance in crime scripting. Crime Science, 2(1). https://doi.org/10.1186/2193-7680-2-6
Borrion, H., Mitchener-Nissen, T., Taylor, J., & Lai, K.-M. (2012a). Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. 2012 European Intelligence and Security Informatics Conference, 68–75. https://doi.org/10.1109/EISIC.2012.45
Borrion, H., Mitchener-Nissen, T., Taylor, J., & Lai, K.-M. (2012b). Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. 2012 European Intelligence and Security Informatics Conference, 68–75. https://doi.org/10.1109/EISIC.2012.45
Campbell, S. (2005). Determining overall risk. Journal of Risk Research, 8(7–8), 569–581. https://doi.org/10.1080/13669870500118329
Chemical Attack Fact Sheet | Homeland Security. (n.d.). https://www.dhs.gov/publication/chemical-attack-fact-sheet
Clarke, R. (n.d.). Hot Products. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.551.8913&rep=rep1&type=pdf
Cohen, M. A. (1988). Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims. Law & Society Review, 22(3). https://doi.org/10.2307/3053629
Cornish, D. (n.d.). The procedural analysis of offending and its relevance for situational prevention. http://www.unipa.it/persone/docenti/c/salvatore.costantino/.content/documenti/Script-schema-cCrnish.pdf
Dowie, J. (n.d.). Against Risk. https://d1wqtxts1xzle7.cloudfront.net/1029470/AgainstRisk99-libre.pdf?1390588802=&response-content-disposition=inline%3B+filename%3DAgainst_risk.pdf&Expires=1673872326&Signature=IjS5zieyVX9x3X6Va6D8N9yopCyb1c57b0-JAGvXKhX4iBoll8i4tlhv58GcU1DQV-AlxNZW64NeCv90kTleVwOeAC1Tg2Q0THD9srPIgWAKcCKyR-sW9Bhb5PuQeYPODv2Qu1g4I6fwuhyZc9IRw82l5EAGllsUhhYnLncxdLZs8saFBM2-rdBNzP~iAAxBfQ6xjsmVT6qpz7pFdzjrA4VRigCM72aCLJECSyCnQJyDjckX8tMqDrc-gCf~IzJX8Ntl4GDpTxIY37UJD3y~RSxFRFL3pLTqbh0U9TkSI9~v0xGGpF1EM12F1O4f4HdiImeEIC23cRZh~m-4Mw0RiA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
Ezell, B. C., Bennett, S. P., von Winterfeldt, D., Sokolowski, J., & Collins, A. J. (2010a). Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis, 30(4), 575–589. https://doi.org/10.1111/j.1539-6924.2010.01401.x
Ezell, B. C., Bennett, S. P., von Winterfeldt, D., Sokolowski, J., & Collins, A. J. (2010b). Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis, 30(4), 575–589. https://doi.org/10.1111/j.1539-6924.2010.01401.x
Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE). (n.d.). http://ascelibrary.org/doi/abs/10.1061/40577(306)2
Gibson, John E., Scherer, William T., & Gibson, William F. (2007). How to do systems analysis: Vol. Wiley series in systems engineering and management. Wiley-Interscience.
Haas, C. N. (2002). The Role of Risk Analysis in Understanding Bioterrorism. Risk Analysis, 22(4), 671–677. https://doi.org/10.1111/0272-4332.00239
Hamilton-Smith, N., & Mackenzie, S. (2010). The geometry of shadows: a critical review of organised crime risk assessments. Policing and Society, 20(3), 257–279. https://doi.org/10.1080/10439463.2010.505287
Home Affairs Committee - BTP Submission to Parliment. (n.d.). http://www.publications.parliament.uk/pa/cm200809/cmselect/cmhaff/112/112we07.htm
IED Attack Fact Sheet | Homeland Security. (n.d.). https://www.dhs.gov/publication/ied-attack-fact-sheet
IRM’s risk management standard. (n.d.). https://www.theirm.org/knowledge-and-resources/risk-management-standards/irms-risk-management-standard/
J, T., & D, M. (2013). The Role of Protection Measures and their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism. Journal of Bioterrorism & Biodefense, 04(01). https://doi.org/10.4172/2157-2526.1000123
Kaplan, S., & Garrick, B. J. (1981). On The Quantitative Definition of Risk. Risk Analysis, 1(1), 11–27. https://doi.org/10.1111/j.1539-6924.1981.tb01350.x
Kaplan, S., Haimes, Y. Y., & Garrick, B. J. (2001). Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk. Risk Analysis, 21(5), 807–807. https://doi.org/10.1111/0272-4332.215153
Lefebvre, Mario. (2006). Applied probability and statistics. Springer.
Leitch, M. (2010). ISO 31000:2009-The New International Standard on Risk Management. Risk Analysis, 30(6), 887–892. https://web-p-ebscohost-com.libproxy.ucl.ac.uk/ehost/pdfviewer/pdfviewer?vid=0&sid=15a0e9a1-bd24-404f-9757-70feaf124319%40redis
Levi, M., & Burrows, J. (2007). Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey. British Journal of Criminology, 48(3), 293–318. https://doi.org/10.1093/bjc/azn001
Lowrance, W. W. (1976). Of acceptable risk: science and the determination of safety. W. Kaufmann.
Nissen, T. (n.d.). Designing for Socially Acceptable Security Technologies. http://discovery.ucl.ac.uk/1426195/
Paoli, Letizia. (n.d.). The Harms of Cocaine Trafficking: Applying a New Framework for Assessment. Journal of Drug Issues, 43(4), 407–436. http://search.proquest.com/docview/1520318663?rfr_id=info%3Axri%2Fsid%3Aprimo
Police Drone Looking For Criminals with Heat Cameras & AR Drone. (8 C.E.). https://www.youtube.com/watch?v=YfePcIiKwWs
Police Got Camera Drones To Control Crime – Best Aerial Photography. (1 C.E.). https://www.youtube.com/watch?v=mwHbEk89kug
Stirling, A. (2010). Keep it complex. Nature, 468(7327), 1029–1031. https://doi.org/10.1038/4681029a
The Procedural Analysis of Offending and its Relevance for Situational Prevention. (n.d.). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.375.8084&rep=rep1&type=pdf
Tokyo Police intercept active drone by unfurling net. (2015). https://www.youtube.com/watch?v=RKvf_gpVVU4
Tusikov, Natasha. (n.d.). Measuring organised crime-related harms: exploring five policing methods. Crime, Law and Social Change, 57(1), 99–115. http://search.proquest.com/docview/917862490?OpenUrlRefId=info:xri/sid:primo&accountid=14511
Vose, D. (2008). Risk analysis: a quantitative guide (3rd ed). Wiley.
Willis, H. H. (2007a). Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis, 27(3), 597–606. https://doi.org/10.1111/j.1539-6924.2007.00909.x
Willis, H. H. (2007b). Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis, 27(3), 597–606. https://doi.org/10.1111/j.1539-6924.2007.00909.x
Wolff, J. (n.d.). Railway safety and the ethics of the tolerability of risk. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.404.6699&rep=rep1&type=pdf
Zemp, S., Stauffacher, M., Lang, D. J., & Scholz, R. W. (2011). Generic functions of railway stations—A conceptual basis for the development of common system understanding and assessment criteria. Transport Policy, 18(2), 446–455. https://doi.org/10.1016/j.tranpol.2010.09.007