‘A structured approach to Enterprise Risk Management and the requirements of ISO 31000’ (no date a). Available at: https://www.theirm.org/media/886062/ISO3100_doc.pdf.
‘A structured approach to Enterprise Risk Management and the requirements of ISO 31000’ (no date b). Available at: https://www.theirm.org/media/886062/ISO3100_doc.pdf.
‘Air Force Bugbot Nano Drone Technology’ (11 AD). Available at: https://www.youtube.com/watch?v=z78mgfKprdg.
Albanese, J.S. (2008) ‘Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels’, Journal of Contemporary Criminal Justice, 24(3), pp. 263–273. Available at: https://doi.org/10.1177/1043986208318225.
Andrew von Hirsch and Nils Jareborg (1991) ‘Gauging Criminal Harm: A Living-Standard Analysis’, Oxford Journal of Legal Studies, 11(1), pp. 1–38. Available at: http://www.jstor.org/stable/764504?seq=1#page_scan_tab_contents.
Aven, T. (2008a) ‘Risk Analysis Methods’, in Risk Analysis. Chichester, UK: John Wiley & Sons, Ltd, pp. 57–84. Available at: https://doi.org/10.1002/9780470694435.ch6.
Aven, T. (2008b) ‘What is a Risk Analysis?’, in Risk Analysis. Chichester, UK: John Wiley & Sons, Ltd, pp. 3–15. Available at: https://doi.org/10.1002/9780470694435.ch1.
Aven, T. (2012) ‘The risk concept—historical and recent development trends’, Reliability Engineering & System Safety, 99, pp. 33–44. Available at: https://doi.org/10.1016/j.ress.2011.11.006.
Aven, T. and Wiley InterScience (Online service) (2008) Risk analysis: assessing uncertainties beyond expected values and probabilities. Hoboken, N.J.: Wiley InterScience. Available at: http://dx.doi.org/10.1002/9780470694435.
Bedford, T. and Cooke, Roger M. (2001) Probabilistic risk analysis: foundations and methods. Cambridge: Cambridge University Press.
‘Biological Attack Fact Sheet | Homeland Security’ (no date a). Available at: https://www.dhs.gov/publication/biological-attack-fact-sheet.
‘Biological Attack Fact Sheet | Homeland Security’ (no date b). Available at: https://www.dhs.gov/publication/biological-attack-fact-sheet.
Borrion, H. et al. (2012a) ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’, in 2012 European Intelligence and Security Informatics Conference. IEEE, pp. 68–75. Available at: https://doi.org/10.1109/EISIC.2012.45.
Borrion, H. et al. (2012b) ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’, in 2012 European Intelligence and Security Informatics Conference. IEEE, pp. 68–75. Available at: https://doi.org/10.1109/EISIC.2012.45.
Borrion, H. (2013) ‘Quality assurance in crime scripting’, Crime Science, 2(1). Available at: https://doi.org/10.1186/2193-7680-2-6.
Campbell, S. (2005) ‘Determining overall risk’, Journal of Risk Research, 8(7–8), pp. 569–581. Available at: https://doi.org/10.1080/13669870500118329.
‘Chemical Attack Fact Sheet | Homeland Security’ (no date). Available at: https://www.dhs.gov/publication/chemical-attack-fact-sheet.
Clarke, R. (no date) ‘Hot Products’. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.551.8913&rep=rep1&type=pdf.
Cohen, M.A. (1988) ‘Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims’, Law & Society Review, 22(3). Available at: https://doi.org/10.2307/3053629.
Cornish, D. (no date) ‘The procedural analysis of offending and its relevance for situational prevention’. Available at: http://www.unipa.it/persone/docenti/c/salvatore.costantino/.content/documenti/Script-schema-cCrnish.pdf.
Dowie, J. (no date) ‘Against Risk’. Available at: https://d1wqtxts1xzle7.cloudfront.net/1029470/AgainstRisk99-libre.pdf?1390588802=&response-content-disposition=inline%3B+filename%3DAgainst_risk.pdf&Expires=1673872326&Signature=IjS5zieyVX9x3X6Va6D8N9yopCyb1c57b0-JAGvXKhX4iBoll8i4tlhv58GcU1DQV-AlxNZW64NeCv90kTleVwOeAC1Tg2Q0THD9srPIgWAKcCKyR-sW9Bhb5PuQeYPODv2Qu1g4I6fwuhyZc9IRw82l5EAGllsUhhYnLncxdLZs8saFBM2-rdBNzP~iAAxBfQ6xjsmVT6qpz7pFdzjrA4VRigCM72aCLJECSyCnQJyDjckX8tMqDrc-gCf~IzJX8Ntl4GDpTxIY37UJD3y~RSxFRFL3pLTqbh0U9TkSI9~v0xGGpF1EM12F1O4f4HdiImeEIC23cRZh~m-4Mw0RiA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA.
Ezell, B.C. et al. (2010a) ‘Probabilistic Risk Analysis and Terrorism Risk’, Risk Analysis, 30(4), pp. 575–589. Available at: https://doi.org/10.1111/j.1539-6924.2010.01401.x.
Ezell, B.C. et al. (2010b) ‘Probabilistic Risk Analysis and Terrorism Risk’, Risk Analysis, 30(4), pp. 575–589. Available at: https://doi.org/10.1111/j.1539-6924.2010.01401.x.
‘Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE)’ (no date). Available at: http://ascelibrary.org/doi/abs/10.1061/40577(306)2.
Gibson, John E., Scherer, William T., and Gibson, William F. (2007) How to do systems analysis. Hoboken, N.J.: Wiley-Interscience.
Haas, C.N. (2002) ‘The Role of Risk Analysis in Understanding Bioterrorism’, Risk Analysis, 22(4), pp. 671–677. Available at: https://doi.org/10.1111/0272-4332.00239.
Hamilton-Smith, N. and Mackenzie, S. (2010) ‘The geometry of shadows: a critical review of organised crime risk assessments’, Policing and Society, 20(3), pp. 257–279. Available at: https://doi.org/10.1080/10439463.2010.505287.
‘Home Affairs Committee - BTP Submission to Parliment’ (no date). Available at: http://www.publications.parliament.uk/pa/cm200809/cmselect/cmhaff/112/112we07.htm.
‘IED Attack Fact Sheet | Homeland Security’ (no date). Available at: https://www.dhs.gov/publication/ied-attack-fact-sheet.
‘IRM’s risk management standard’ (no date). Available at: https://www.theirm.org/knowledge-and-resources/risk-management-standards/irms-risk-management-standard/.
J, T. and D, M. (2013) ‘The Role of Protection Measures and their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism’, Journal of Bioterrorism & Biodefense, 04(01). Available at: https://doi.org/10.4172/2157-2526.1000123.
Kaplan, S. and Garrick, B.J. (1981) ‘On The Quantitative Definition of Risk’, Risk Analysis, 1(1), pp. 11–27. Available at: https://doi.org/10.1111/j.1539-6924.1981.tb01350.x.
Kaplan, S., Haimes, Y.Y. and Garrick, B.J. (2001) ‘Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk’, Risk Analysis, 21(5), pp. 807–807. Available at: https://doi.org/10.1111/0272-4332.215153.
Lefebvre, Mario (2006) Applied probability and statistics. New York: Springer.
Leitch, M. (2010) ‘ISO 31000:2009-The New International Standard on Risk Management’, Risk Analysis, 30(6), pp. 887–892. Available at: https://web-p-ebscohost-com.libproxy.ucl.ac.uk/ehost/pdfviewer/pdfviewer?vid=0&sid=15a0e9a1-bd24-404f-9757-70feaf124319%40redis.
Levi, M. and Burrows, J. (2007) ‘Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey’, British Journal of Criminology, 48(3), pp. 293–318. Available at: https://doi.org/10.1093/bjc/azn001.
Lowrance, W.W. (1976) Of acceptable risk: science and the determination of safety. Los Altos, Calif: W. Kaufmann.
Nissen, T. (no date) Designing for Socially Acceptable Security Technologies. Available at: http://discovery.ucl.ac.uk/1426195/.
Paoli, Letizia (no date) ‘The Harms of Cocaine Trafficking: Applying a New Framework for Assessment’, Journal of Drug Issues, 43(4), pp. 407–436. Available at: http://search.proquest.com/docview/1520318663?rfr_id=info%3Axri%2Fsid%3Aprimo.
‘Police Drone Looking For Criminals with Heat Cameras & AR Drone’ (8 AD). Available at: https://www.youtube.com/watch?v=YfePcIiKwWs.
‘Police Got Camera Drones To Control Crime – Best Aerial Photography’ (1 AD). Available at: https://www.youtube.com/watch?v=mwHbEk89kug.
Stirling, A. (2010) ‘Keep it complex’, Nature, 468(7327), pp. 1029–1031. Available at: https://doi.org/10.1038/4681029a.
‘The Procedural Analysis of Offending and its Relevance for Situational Prevention’ (no date). Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.375.8084&rep=rep1&type=pdf.
‘Tokyo Police intercept active drone by unfurling net’ (2015). Available at: https://www.youtube.com/watch?v=RKvf_gpVVU4.
Tusikov, Natasha (no date) ‘Measuring organised crime-related harms: exploring five policing methods’, Crime, Law and Social Change, 57(1), pp. 99–115. Available at: http://search.proquest.com/docview/917862490?OpenUrlRefId=info:xri/sid:primo&accountid=14511.
Vose, D. (2008) Risk analysis: a quantitative guide. 3rd ed. Chichester: Wiley.
Willis, H.H. (2007a) ‘Guiding Resource Allocations Based on Terrorism Risk’, Risk Analysis, 27(3), pp. 597–606. Available at: https://doi.org/10.1111/j.1539-6924.2007.00909.x.
Willis, H.H. (2007b) ‘Guiding Resource Allocations Based on Terrorism Risk’, Risk Analysis, 27(3), pp. 597–606. Available at: https://doi.org/10.1111/j.1539-6924.2007.00909.x.
Wolff, J. (no date) ‘Railway safety and the ethics of the tolerability of risk’. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.404.6699&rep=rep1&type=pdf.
Zemp, S. et al. (2011) ‘Generic functions of railway stations—A conceptual basis for the development of common system understanding and assessment criteria’, Transport Policy, 18(2), pp. 446–455. Available at: https://doi.org/10.1016/j.tranpol.2010.09.007.