[1]
S. Campbell, ‘Determining overall risk’, Journal of Risk Research, vol. 8, no. 7–8, pp. 569–581, Oct. 2005, doi: 10.1080/13669870500118329
[2]
S. Kaplan and B. J. Garrick, ‘On The Quantitative Definition of Risk’, Risk Analysis, vol. 1, no. 1, pp. 11–27, Mar. 1981, doi: 10.1111/j.1539-6924.1981.tb01350.x
[3]
W. W. Lowrance, Of acceptable risk: science and the determination of safety. Los Altos, Calif: W. Kaufmann, 1976.
[4]
M. Leitch, ‘ISO 31000:2009-The New International Standard on Risk Management’, Risk Analysis, vol. 30, no. 6, pp. 887–892, Apr. 2010, Available: https://web-p-ebscohost-com.libproxy.ucl.ac.uk/ehost/pdfviewer/pdfviewer?vid=0&sid=15a0e9a1-bd24-404f-9757-70feaf124319%40redis
[5]
‘IRM’s risk management standard’. Available: https://www.theirm.org/knowledge-and-resources/risk-management-standards/irms-risk-management-standard/
[6]
‘A structured approach to Enterprise Risk Management and the requirements of ISO 31000’. Available: https://www.theirm.org/media/886062/ISO3100_doc.pdf
[7]
H. H. Willis, ‘Guiding Resource Allocations Based on Terrorism Risk’, Risk Analysis, vol. 27, no. 3, pp. 597–606, June 2007, doi: 10.1111/j.1539-6924.2007.00909.x
[8]
T. Aven, ‘What is a Risk Analysis?’, in Risk Analysis, Chichester, UK: John Wiley & Sons, Ltd, 2008, pp. 3–15. doi: 10.1002/9780470694435.ch1. Available: http://doi.wiley.com/10.1002/9780470694435.ch1
[9]
J. Dowie, ‘Against Risk’, Available: https://d1wqtxts1xzle7.cloudfront.net/1029470/AgainstRisk99-libre.pdf?1390588802=&response-content-disposition=inline%3B+filename%3DAgainst_risk.pdf&Expires=1673872326&Signature=IjS5zieyVX9x3X6Va6D8N9yopCyb1c57b0-JAGvXKhX4iBoll8i4tlhv58GcU1DQV-AlxNZW64NeCv90kTleVwOeAC1Tg2Q0THD9srPIgWAKcCKyR-sW9Bhb5PuQeYPODv2Qu1g4I6fwuhyZc9IRw82l5EAGllsUhhYnLncxdLZs8saFBM2-rdBNzP~iAAxBfQ6xjsmVT6qpz7pFdzjrA4VRigCM72aCLJECSyCnQJyDjckX8tMqDrc-gCf~IzJX8Ntl4GDpTxIY37UJD3y~RSxFRFL3pLTqbh0U9TkSI9~v0xGGpF1EM12F1O4f4HdiImeEIC23cRZh~m-4Mw0RiA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
[10]
‘A structured approach to Enterprise Risk Management and the requirements of ISO 31000’. Available: https://www.theirm.org/media/886062/ISO3100_doc.pdf
[11]
D. Vose, Risk analysis: a quantitative guide, 3rd ed. Chichester: Wiley, 2008.
[12]
‘Biological Attack Fact Sheet | Homeland Security’. Available: https://www.dhs.gov/publication/biological-attack-fact-sheet
[13]
C. N. Haas, ‘The Role of Risk Analysis in Understanding Bioterrorism’, Risk Analysis, vol. 22, no. 4, pp. 671–677, Aug. 2002, doi: 10.1111/0272-4332.00239
[14]
T. J and M. D, ‘The Role of Protection Measures and their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism’, Journal of Bioterrorism & Biodefense, vol. 04, no. 01, 2013, doi: 10.4172/2157-2526.1000123
[15]
H. Borrion, T. Mitchener-Nissen, J. Taylor, and K.-M. Lai, ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’, in 2012 European Intelligence and Security Informatics Conference, IEEE, Aug. 2012, pp. 68–75. doi: 10.1109/EISIC.2012.45. Available: http://ieeexplore.ieee.org/document/6298815/
[16]
T. Aven, ‘The risk concept—historical and recent development trends’, Reliability Engineering & System Safety, vol. 99, pp. 33–44, Mar. 2012, doi: 10.1016/j.ress.2011.11.006
[17]
‘Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE)’, Available: http://ascelibrary.org/doi/abs/10.1061/40577(306)2
[18]
H. Borrion, ‘Quality assurance in crime scripting’, Crime Science, vol. 2, no. 1, 2013, doi: 10.1186/2193-7680-2-6
[19]
D. Cornish, ‘The procedural analysis of offending and its relevance for situational prevention’, Available: http://www.unipa.it/persone/docenti/c/salvatore.costantino/.content/documenti/Script-schema-cCrnish.pdf
[20]
T. Aven, ‘Risk Analysis Methods’, in Risk Analysis, Chichester, UK: John Wiley & Sons, Ltd, 2008, pp. 57–84. doi: 10.1002/9780470694435.ch6. Available: http://doi.wiley.com/10.1002/9780470694435.ch6
[21]
H. H. Willis, ‘Guiding Resource Allocations Based on Terrorism Risk’, Risk Analysis, vol. 27, no. 3, pp. 597–606, June 2007, doi: 10.1111/j.1539-6924.2007.00909.x
[22]
B. C. Ezell, S. P. Bennett, D. von Winterfeldt, J. Sokolowski, and A. J. Collins, ‘Probabilistic Risk Analysis and Terrorism Risk’, Risk Analysis, vol. 30, no. 4, pp. 575–589, Apr. 2010, doi: 10.1111/j.1539-6924.2010.01401.x
[23]
A. Stirling, ‘Keep it complex’, Nature, vol. 468, no. 7327, pp. 1029–1031, Dec. 2010, doi: 10.1038/4681029a
[24]
T. Nissen, ‘Designing for Socially Acceptable Security Technologies’. Available: http://discovery.ucl.ac.uk/1426195/
[25]
‘Chemical Attack Fact Sheet | Homeland Security’, Available: https://www.dhs.gov/publication/chemical-attack-fact-sheet
[26]
‘Biological Attack Fact Sheet | Homeland Security’. Available: https://www.dhs.gov/publication/biological-attack-fact-sheet
[27]
‘IED Attack Fact Sheet | Homeland Security’, Available: https://www.dhs.gov/publication/ied-attack-fact-sheet
[28]
R. Clarke, ‘Hot Products’, Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.551.8913&rep=rep1&type=pdf
[29]
‘Police Got Camera Drones To Control Crime – Best Aerial Photography’. 1 AD. Available: https://www.youtube.com/watch?v=mwHbEk89kug
[30]
‘Police Drone Looking For Criminals with Heat Cameras & AR Drone’. 8 AD. Available: https://www.youtube.com/watch?v=YfePcIiKwWs
[31]
‘Air Force Bugbot Nano Drone Technology’. 11 AD. Available: https://www.youtube.com/watch?v=z78mgfKprdg
[32]
‘Tokyo Police intercept active drone by unfurling net’. Dec. 12, 2015. Available: https://www.youtube.com/watch?v=RKvf_gpVVU4
[33]
‘Home Affairs Committee - BTP Submission to Parliment’. Available: http://www.publications.parliament.uk/pa/cm200809/cmselect/cmhaff/112/112we07.htm
[34]
J. Wolff, ‘Railway safety and the ethics of the tolerability of risk’. Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.404.6699&rep=rep1&type=pdf
[35]
Paoli, Letizia, ‘The Harms of Cocaine Trafficking: Applying a New Framework for Assessment’, Journal of Drug Issues, vol. 43, no. 4, pp. 407–436, Available: http://search.proquest.com/docview/1520318663?rfr_id=info%3Axri%2Fsid%3Aprimo
[36]
Andrew von Hirsch and Nils Jareborg, ‘Gauging Criminal Harm: A Living-Standard Analysis’, Oxford Journal of Legal Studies, vol. 11, no. 1, pp. 1–38, 1991, Available: http://www.jstor.org/stable/764504?seq=1#page_scan_tab_contents
[37]
J. S. Albanese, ‘Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels’, Journal of Contemporary Criminal Justice, vol. 24, no. 3, pp. 263–273, May 2008, doi: 10.1177/1043986208318225
[38]
M. A. Cohen, ‘Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims’, Law & Society Review, vol. 22, no. 3, 1988, doi: 10.2307/3053629
[39]
N. Hamilton-Smith and S. Mackenzie, ‘The geometry of shadows: a critical review of organised crime risk assessments’, Policing and Society, vol. 20, no. 3, pp. 257–279, Sept. 2010, doi: 10.1080/10439463.2010.505287
[40]
M. Levi and J. Burrows, ‘Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey’, British Journal of Criminology, vol. 48, no. 3, pp. 293–318, Dec. 2007, doi: 10.1093/bjc/azn001
[41]
Tusikov, Natasha, ‘Measuring organised crime-related harms: exploring five policing methods’, Crime, Law and Social Change, vol. 57, no. 1, pp. 99–115, Available: http://search.proquest.com/docview/917862490?OpenUrlRefId=info:xri/sid:primo&accountid=14511
[42]
Aven, T. and Wiley InterScience (Online service), Risk analysis: assessing uncertainties beyond expected values and probabilities. Hoboken, N.J.: Wiley InterScience, 2008. Available: http://dx.doi.org/10.1002/9780470694435
[43]
B. C. Ezell, S. P. Bennett, D. von Winterfeldt, J. Sokolowski, and A. J. Collins, ‘Probabilistic Risk Analysis and Terrorism Risk’, Risk Analysis, vol. 30, no. 4, pp. 575–589, Apr. 2010, doi: 10.1111/j.1539-6924.2010.01401.x
[44]
Lefebvre, Mario, Applied probability and statistics. New York: Springer, 2006.
[45]
S. Zemp, M. Stauffacher, D. J. Lang, and R. W. Scholz, ‘Generic functions of railway stations—A conceptual basis for the development of common system understanding and assessment criteria’, Transport Policy, vol. 18, no. 2, pp. 446–455, Mar. 2011, doi: 10.1016/j.tranpol.2010.09.007
[46]
S. Kaplan, Y. Y. Haimes, and B. J. Garrick, ‘Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk’, Risk Analysis, vol. 21, no. 5, pp. 807–807, Oct. 2001, doi: 10.1111/0272-4332.215153
[47]
Gibson, John E., Scherer, William T., and Gibson, William F., How to do systems analysis, vol. Wiley series in systems engineering and management. Hoboken, N.J.: Wiley-Interscience, 2007.
[48]
Bedford, T. and Cooke, Roger M., Probabilistic risk analysis: foundations and methods. Cambridge: Cambridge University Press, 2001.
[49]
H. Borrion, T. Mitchener-Nissen, J. Taylor, and K.-M. Lai, ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’, in 2012 European Intelligence and Security Informatics Conference, IEEE, Aug. 2012, pp. 68–75. doi: 10.1109/EISIC.2012.45. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6298815
[50]
‘The Procedural Analysis of Offending and its Relevance for Situational Prevention’, Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.375.8084&rep=rep1&type=pdf