1
Campbell S. Determining overall risk. Journal of Risk Research. 2005;8:569–81. doi: 10.1080/13669870500118329
2
Kaplan S, Garrick BJ. On The Quantitative Definition of Risk. Risk Analysis. 1981;1:11–27. doi: 10.1111/j.1539-6924.1981.tb01350.x
3
Lowrance WW. Of acceptable risk: science and the determination of safety. Los Altos, Calif: W. Kaufmann 1976.
4
Leitch M. ISO 31000:2009-The New International Standard on Risk Management. Risk Analysis. 2010;30:887–92.
5
IRM’s risk management standard.
6
A structured approach to Enterprise Risk Management and the requirements of ISO 31000.
7
Willis HH. Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis. 2007;27:597–606. doi: 10.1111/j.1539-6924.2007.00909.x
8
Aven T. What is a Risk Analysis? Risk Analysis. Chichester, UK: John Wiley & Sons, Ltd 2008:3–15.
10
A structured approach to Enterprise Risk Management and the requirements of ISO 31000.
11
Vose D. Risk analysis: a quantitative guide. 3rd ed. Chichester: Wiley 2008.
12
Biological Attack Fact Sheet | Homeland Security.
13
Haas CN. The Role of Risk Analysis in Understanding Bioterrorism. Risk Analysis. 2002;22:671–7. doi: 10.1111/0272-4332.00239
14
J T, D M. The Role of Protection Measures and their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism. Journal of Bioterrorism & Biodefense. 2013;04. doi: 10.4172/2157-2526.1000123
15
Borrion H, Mitchener-Nissen T, Taylor J, et al. Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. 2012 European Intelligence and Security Informatics Conference. IEEE 2012:68–75.
16
Aven T. The risk concept—historical and recent development trends. Reliability Engineering & System Safety. 2012;99:33–44. doi: 10.1016/j.ress.2011.11.006
17
Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE).
18
Borrion H. Quality assurance in crime scripting. Crime Science. 2013;2. doi: 10.1186/2193-7680-2-6
19
Cornish D. The procedural analysis of offending and its relevance for situational prevention.
20
Aven T. Risk Analysis Methods. Risk Analysis. Chichester, UK: John Wiley & Sons, Ltd 2008:57–84.
21
Willis HH. Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis. 2007;27:597–606. doi: 10.1111/j.1539-6924.2007.00909.x
22
Ezell BC, Bennett SP, von Winterfeldt D, et al. Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis. 2010;30:575–89. doi: 10.1111/j.1539-6924.2010.01401.x
23
Stirling A. Keep it complex. Nature. 2010;468:1029–31. doi: 10.1038/4681029a
24
Nissen T. Designing for Socially Acceptable Security Technologies.
25
Chemical Attack Fact Sheet | Homeland Security.
26
Biological Attack Fact Sheet | Homeland Security.
27
IED Attack Fact Sheet | Homeland Security.
28
Clarke R. Hot Products.
29
Police Got Camera Drones To Control Crime – Best Aerial Photography. 1 AD.
30
Police Drone Looking For Criminals with Heat Cameras & AR Drone. 8 AD.
31
Air Force Bugbot Nano Drone Technology. 11 AD.
32
Tokyo Police intercept active drone by unfurling net. 2015.
33
Home Affairs Committee - BTP Submission to Parliment.
34
Wolff J. Railway safety and the ethics of the tolerability of risk.
35
Paoli, Letizia. The Harms of Cocaine Trafficking: Applying a New Framework for Assessment. Journal of Drug Issues. ;43:407–36.
36
Andrew von Hirsch and Nils Jareborg. Gauging Criminal Harm: A Living-Standard Analysis. Oxford Journal of Legal Studies. 1991;11:1–38.
37
Albanese JS. Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels. Journal of Contemporary Criminal Justice. 2008;24:263–73. doi: 10.1177/1043986208318225
38
Cohen MA. Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims. Law & Society Review. 1988;22. doi: 10.2307/3053629
39
Hamilton-Smith N, Mackenzie S. The geometry of shadows: a critical review of organised crime risk assessments. Policing and Society. 2010;20:257–79. doi: 10.1080/10439463.2010.505287
40
Levi M, Burrows J. Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey. British Journal of Criminology. 2007;48:293–318. doi: 10.1093/bjc/azn001
41
Tusikov, Natasha. Measuring organised crime-related harms: exploring five policing methods. Crime, Law and Social Change. ;57:99–115.
42
Aven, T., Wiley InterScience (Online service). Risk analysis: assessing uncertainties beyond expected values and probabilities. Hoboken, N.J.: Wiley InterScience 2008.
43
Ezell BC, Bennett SP, von Winterfeldt D, et al. Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis. 2010;30:575–89. doi: 10.1111/j.1539-6924.2010.01401.x
44
Lefebvre, Mario. Applied probability and statistics. New York: Springer 2006.
45
Zemp S, Stauffacher M, Lang DJ, et al. Generic functions of railway stations—A conceptual basis for the development of common system understanding and assessment criteria. Transport Policy. 2011;18:446–55. doi: 10.1016/j.tranpol.2010.09.007
46
Kaplan S, Haimes YY, Garrick BJ. Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk. Risk Analysis. 2001;21:807–807. doi: 10.1111/0272-4332.215153
47
Gibson, John E., Scherer, William T., Gibson, William F. How to do systems analysis. Hoboken, N.J.: Wiley-Interscience 2007.
48
Bedford, T., Cooke, Roger M. Probabilistic risk analysis: foundations and methods. Cambridge: Cambridge University Press 2001.
49
Borrion H, Mitchener-Nissen T, Taylor J, et al. Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. 2012 European Intelligence and Security Informatics Conference. IEEE 2012:68–75.
50
The Procedural Analysis of Offending and its Relevance for Situational Prevention.