@article{Albanese_2008, title={Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels}, volume={24}, DOI={10.1177/1043986208318225}, number={3}, journal={Journal of Contemporary Criminal Justice}, author={Albanese, J. S.}, year={2008}, month=may, pages={263–273} }
@article{Andrew von Hirsch and Nils Jareborg_1991, title={Gauging Criminal Harm: A Living-Standard Analysis}, volume={11}, url={http://www.jstor.org/stable/764504?seq=1#page_scan_tab_contents}, number={1}, journal={Oxford Journal of Legal Studies}, publisher={Oxford University PressOxford University Press}, author={Andrew von Hirsch and Nils Jareborg}, year={1991}, pages={1–38} }
@book{Aven, T._Wiley InterScience (Online service)_2008, address={Hoboken, N.J.}, title={Risk analysis: assessing uncertainties beyond expected values and probabilities}, url={http://dx.doi.org/10.1002/9780470694435}, publisher={Wiley InterScience}, author={Aven, T. and Wiley InterScience (Online service)}, year={2008} }
@inbook{Aven_2008a, address={Chichester, UK}, title={What is a Risk Analysis?}, url={http://doi.wiley.com/10.1002/9780470694435.ch1}, DOI={10.1002/9780470694435.ch1}, booktitle={Risk Analysis}, publisher={John Wiley & Sons, Ltd}, author={Aven, Terje}, year={2008}, month=apr, pages={3–15} }
@inbook{Aven_2008b, address={Chichester, UK}, title={Risk Analysis Methods}, url={http://doi.wiley.com/10.1002/9780470694435.ch6}, DOI={10.1002/9780470694435.ch6}, booktitle={Risk Analysis}, publisher={John Wiley & Sons, Ltd}, author={Aven, Terje}, year={2008}, month=apr, pages={57–84} }
@article{Aven_2012, title={The risk concept—historical and recent development trends}, volume={99}, DOI={10.1016/j.ress.2011.11.006}, journal={Reliability Engineering & System Safety}, author={Aven, Terje}, year={2012}, month=mar, pages={33–44} }
@book{Bedford, T._Cooke, Roger M._2001, address={Cambridge}, title={Probabilistic risk analysis: foundations and methods}, publisher={Cambridge University Press}, author={Bedford, T. and Cooke, Roger M.}, year={2001} }
@article{Borrion_2013, title={Quality assurance in crime scripting}, volume={2}, DOI={10.1186/2193-7680-2-6}, number={1}, journal={Crime Science}, author={Borrion, Hervé}, year={2013} }
@inproceedings{Borrion_Mitchener-Nissen_Taylor_Lai_2012a, title={Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics}, url={http://ieeexplore.ieee.org/document/6298815/}, DOI={10.1109/EISIC.2012.45}, booktitle={2012 European Intelligence and Security Informatics Conference}, publisher={IEEE}, author={Borrion, Herve and Mitchener-Nissen, Timothy and Taylor, Jonathon and Lai, Ka-Man}, year={2012}, month=aug, pages={68–75} }
@inproceedings{Borrion_Mitchener-Nissen_Taylor_Lai_2012b, title={Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics}, url={http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6298815}, DOI={10.1109/EISIC.2012.45}, booktitle={2012 European Intelligence and Security Informatics Conference}, publisher={IEEE}, author={Borrion, Herve and Mitchener-Nissen, Timothy and Taylor, Jonathon and Lai, Ka-Man}, year={2012}, month=aug, pages={68–75} }
@article{Campbell_2005, title={Determining overall risk}, volume={8}, DOI={10.1080/13669870500118329}, number={7–8}, journal={Journal of Risk Research}, author={Campbell, Scott}, year={2005}, month=oct, pages={569–581} }
@article{Clarke, title={Hot Products}, url={http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.551.8913&rep=rep1&type=pdf}, author={Clarke, Ronald} }
@article{Cohen_1988, title={Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims}, volume={22}, DOI={10.2307/3053629}, number={3}, journal={Law & Society Review}, author={Cohen, Mark A.}, year={1988} }
@article{Cornish, title={The procedural analysis of offending and its relevance for situational prevention}, url={http://www.unipa.it/persone/docenti/c/salvatore.costantino/.content/documenti/Script-schema-cCrnish.pdf}, author={Cornish, D} }
@article{Dowie, title={Against Risk}, url={https://d1wqtxts1xzle7.cloudfront.net/1029470/AgainstRisk99-libre.pdf?1390588802=&response-content-disposition=inline%3B+filename%3DAgainst_risk.pdf&Expires=1673872326&Signature=IjS5zieyVX9x3X6Va6D8N9yopCyb1c57b0-JAGvXKhX4iBoll8i4tlhv58GcU1DQV-AlxNZW64NeCv90kTleVwOeAC1Tg2Q0THD9srPIgWAKcCKyR-sW9Bhb5PuQeYPODv2Qu1g4I6fwuhyZc9IRw82l5EAGllsUhhYnLncxdLZs8saFBM2-rdBNzP~iAAxBfQ6xjsmVT6qpz7pFdzjrA4VRigCM72aCLJECSyCnQJyDjckX8tMqDrc-gCf~IzJX8Ntl4GDpTxIY37UJD3y~RSxFRFL3pLTqbh0U9TkSI9~v0xGGpF1EM12F1O4f4HdiImeEIC23cRZh~m-4Mw0RiA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA}, author={Dowie, John} }
@article{Ezell_Bennett_von Winterfeldt_Sokolowski_Collins_2010a, title={Probabilistic Risk Analysis and Terrorism Risk}, volume={30}, DOI={10.1111/j.1539-6924.2010.01401.x}, number={4}, journal={Risk Analysis}, author={Ezell, Barry Charles and Bennett, Steven P. and von Winterfeldt, Detlof and Sokolowski, John and Collins, Andrew J.}, year={2010}, month=apr, pages={575–589} }
@article{Ezell_Bennett_von Winterfeldt_Sokolowski_Collins_2010b, title={Probabilistic Risk Analysis and Terrorism Risk}, volume={30}, DOI={10.1111/j.1539-6924.2010.01401.x}, number={4}, journal={Risk Analysis}, author={Ezell, Barry Charles and Bennett, Steven P. and von Winterfeldt, Detlof and Sokolowski, John and Collins, Andrew J.}, year={2010}, month=apr, pages={575–589} }
@book{Gibson, John E._Scherer, William T._Gibson, William F._2007, address={Hoboken, N.J.}, title={How to do systems analysis}, volume={Wiley series in systems engineering and management}, publisher={Wiley-Interscience}, author={Gibson, John E. and Scherer, William T. and Gibson, William F.}, year={2007} }
@article{Haas_2002, title={The Role of Risk Analysis in Understanding Bioterrorism}, volume={22}, DOI={10.1111/0272-4332.00239}, number={4}, journal={Risk Analysis}, author={Haas, Charles N.}, year={2002}, month=aug, pages={671–677} }
@article{Hamilton-Smith_Mackenzie_2010, title={The geometry of shadows: a critical review of organised crime risk assessments}, volume={20}, DOI={10.1080/10439463.2010.505287}, number={3}, journal={Policing and Society}, author={Hamilton-Smith, Niall and Mackenzie, Simon}, year={2010}, month=sept, pages={257–279} }
@article{J_D_2013, title={The Role of Protection Measures and their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism}, volume={04}, DOI={10.4172/2157-2526.1000123}, number={01}, journal={Journal of Bioterrorism & Biodefense}, author={J, Taylor and D, Margaritis}, year={2013} }
@article{Kaplan_Haimes_Garrick_2001, title={Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk}, volume={21}, DOI={10.1111/0272-4332.215153}, number={5}, journal={Risk Analysis}, author={Kaplan, Stan and Haimes, Yacov Y. and Garrick, B. John}, year={2001}, month=oct, pages={807–807} }
@article{Kaplan_Garrick_1981, title={On The Quantitative Definition of Risk}, volume={1}, DOI={10.1111/j.1539-6924.1981.tb01350.x}, number={1}, journal={Risk Analysis}, author={Kaplan, Stanley and Garrick, B. John}, year={1981}, month=mar, pages={11–27} }
@book{Lefebvre, Mario_2006, address={New York}, title={Applied probability and statistics}, publisher={Springer}, author={Lefebvre, Mario}, year={2006} }
@article{Leitch_2010, title={ISO 31000:2009-The New International Standard on Risk Management}, volume={30}, url={https://web-p-ebscohost-com.libproxy.ucl.ac.uk/ehost/pdfviewer/pdfviewer?vid=0&sid=15a0e9a1-bd24-404f-9757-70feaf124319%40redis}, number={6}, journal={Risk Analysis}, author={Leitch, Matthew}, year={2010}, month=apr, pages={887–892} }
@article{Levi_Burrows_2007, title={Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey}, volume={48}, DOI={10.1093/bjc/azn001}, number={3}, journal={British Journal of Criminology}, author={Levi, M. and Burrows, J.}, year={2007}, month=dec, pages={293–318} }
@book{Lowrance_1976, address={Los Altos, Calif}, title={Of acceptable risk: science and the determination of safety}, publisher={W. Kaufmann}, author={Lowrance, William W.}, year={1976} }
@phdthesis{Nissen, title={Designing for Socially Acceptable Security Technologies}, url={http://discovery.ucl.ac.uk/1426195/}, author={Nissen, T} }
@article{Paoli, Letizia, title={The Harms of Cocaine Trafficking: Applying a New Framework for Assessment}, volume={43}, url={http://search.proquest.com/docview/1520318663?rfr_id=info%3Axri%2Fsid%3Aprimo}, number={4}, journal={Journal of Drug Issues}, publisher={Sage Publications, Inc}, author={Paoli, Letizia}, pages={407–436} }
@article{Stirling_2010, title={Keep it complex}, volume={468}, DOI={10.1038/4681029a}, number={7327}, journal={Nature}, author={Stirling, Andy}, year={2010}, month=dec, pages={1029–1031} }
@article{Tusikov, Natasha, title={Measuring organised crime-related harms: exploring five policing methods}, volume={57}, url={http://search.proquest.com/docview/917862490?OpenUrlRefId=info:xri/sid:primo&accountid=14511}, number={1}, journal={Crime, Law and Social Change}, author={Tusikov, Natasha}, pages={99–115} }
@book{Vose_2008, address={Chichester}, edition={3rd ed}, title={Risk analysis: a quantitative guide}, publisher={Wiley}, author={Vose, David}, year={2008} }
@article{Willis_2007a, title={Guiding Resource Allocations Based on Terrorism Risk}, volume={27}, DOI={10.1111/j.1539-6924.2007.00909.x}, number={3}, journal={Risk Analysis}, author={Willis, Henry H.}, year={2007}, month=june, pages={597–606} }
@article{Willis_2007b, title={Guiding Resource Allocations Based on Terrorism Risk}, volume={27}, DOI={10.1111/j.1539-6924.2007.00909.x}, number={3}, journal={Risk Analysis}, author={Willis, Henry H.}, year={2007}, month=june, pages={597–606} }
@misc{Wolff, title={Railway safety and the ethics of the tolerability of risk}, url={http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.404.6699&rep=rep1&type=pdf}, author={Wolff, Jonathan} }
@article{Zemp_Stauffacher_Lang_Scholz_2011, title={Generic functions of railway stations—A conceptual basis for the development of common system understanding and assessment criteria}, volume={18}, DOI={10.1016/j.tranpol.2010.09.007}, number={2}, journal={Transport Policy}, author={Zemp, Stefan and Stauffacher, Michael and Lang, Daniel J. and Scholz, Roland W.}, year={2011}, month=mar, pages={446–455} }
@misc{Police Got Camera Drones To Control Crime – Best Aerial Photography_1 AD, url={https://www.youtube.com/watch?v=mwHbEk89kug}, year={1 AD} }
@misc{Police Drone Looking For Criminals with Heat Cameras & AR Drone_8 AD, url={https://www.youtube.com/watch?v=YfePcIiKwWs}, year={8 AD} }
@misc{Air Force Bugbot Nano Drone Technology_11 AD, url={https://www.youtube.com/watch?v=z78mgfKprdg}, year={11 AD} }
@misc{Tokyo Police intercept active drone by unfurling net_2015, url={https://www.youtube.com/watch?v=RKvf_gpVVU4}, year={2015}, month=dec }
@misc{IRM’s risk management standard, url={https://www.theirm.org/knowledge-and-resources/risk-management-standards/irms-risk-management-standard/} }
@misc{A structured approach to Enterprise Risk Management and the requirements of ISO 31000, url={https://www.theirm.org/media/886062/ISO3100_doc.pdf} }
@misc{A structured approach to Enterprise Risk Management and the requirements of ISO 31000, url={https://www.theirm.org/media/886062/ISO3100_doc.pdf} }
@misc{Biological Attack Fact Sheet | Homeland Security, url={https://www.dhs.gov/publication/biological-attack-fact-sheet} }
@article{Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE), url={http://ascelibrary.org/doi/abs/10.1061/40577(306)2} }
@article{Chemical Attack Fact Sheet | Homeland Security, url={https://www.dhs.gov/publication/chemical-attack-fact-sheet} }
@misc{Biological Attack Fact Sheet | Homeland Security, url={https://www.dhs.gov/publication/biological-attack-fact-sheet} }
@article{IED Attack Fact Sheet | Homeland Security, url={https://www.dhs.gov/publication/ied-attack-fact-sheet} }
@misc{Home Affairs Committee - BTP Submission to Parliment, url={http://www.publications.parliament.uk/pa/cm200809/cmselect/cmhaff/112/112we07.htm} }
@article{The Procedural Analysis of Offending and its Relevance for Situational Prevention, url={http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.375.8084&rep=rep1&type=pdf} }