A Structured Approach to Enterprise Risk Management and the Requirements of ISO 31000, n.d. <https://www.theirm.org/media/886062/ISO3100_doc.pdf>
——, n.d. <https://www.theirm.org/media/886062/ISO3100_doc.pdf>
Air Force Bugbot Nano Drone Technology, 11 AD <https://www.youtube.com/watch?v=z78mgfKprdg>
Albanese, J. S., ‘Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels’, Journal of Contemporary Criminal Justice, 24.3 (2008), pp. 263–73, doi:10.1177/1043986208318225
Andrew von Hirsch and Nils Jareborg, ‘Gauging Criminal Harm: A Living-Standard Analysis’, Oxford Journal of Legal Studies, 11.1 (1991), pp. 1–38 <http://www.jstor.org/stable/764504?seq=1#page_scan_tab_contents>
Aven, T. and Wiley InterScience (Online service), Risk Analysis: Assessing Uncertainties beyond Expected Values and Probabilities (Wiley InterScience, 2008) <http://dx.doi.org/10.1002/9780470694435>
Aven, Terje, ‘Risk Analysis Methods’, in Risk Analysis (John Wiley & Sons, Ltd, 2008), pp. 57–84, doi:10.1002/9780470694435.ch6
——, ‘The Risk Concept—Historical and Recent Development Trends’, Reliability Engineering & System Safety, 99 (2012), pp. 33–44, doi:10.1016/j.ress.2011.11.006
——, ‘What Is a Risk Analysis?’, in Risk Analysis (John Wiley & Sons, Ltd, 2008), pp. 3–15, doi:10.1002/9780470694435.ch1
Bedford, T. and Cooke, Roger M., Probabilistic Risk Analysis: Foundations and Methods (Cambridge University Press, 2001)
Biological Attack Fact Sheet | Homeland Security, n.d. <https://www.dhs.gov/publication/biological-attack-fact-sheet>
——, n.d. <https://www.dhs.gov/publication/biological-attack-fact-sheet>
Borrion, Herve, and others, ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’, 2012 European Intelligence and Security Informatics Conference, August 2012, pp. 68–75, doi:10.1109/EISIC.2012.45
——, and others, ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’, 2012 European Intelligence and Security Informatics Conference, August 2012, pp. 68–75, doi:10.1109/EISIC.2012.45
Borrion, Hervé, ‘Quality Assurance in Crime Scripting’, Crime Science, 2.1 (2013), doi:10.1186/2193-7680-2-6
Campbell, Scott, ‘Determining Overall Risk’, Journal of Risk Research, 8.7–8 (2005), pp. 569–81, doi:10.1080/13669870500118329
Chemical Attack Fact Sheet | Homeland Security, n.d. <https://www.dhs.gov/publication/chemical-attack-fact-sheet>
Clarke, Ronald, Hot Products, n.d. <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.551.8913&rep=rep1&type=pdf>
Cohen, Mark A., ‘Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims’, Law & Society Review, 22.3 (1988), doi:10.2307/3053629
Cornish, D, The Procedural Analysis of Offending and Its Relevance for Situational Prevention, n.d. <http://www.unipa.it/persone/docenti/c/salvatore.costantino/.content/documenti/Script-schema-cCrnish.pdf>
Dowie, John, Against Risk, n.d. <https://d1wqtxts1xzle7.cloudfront.net/1029470/AgainstRisk99-libre.pdf?1390588802=&response-content-disposition=inline%3B+filename%3DAgainst_risk.pdf&Expires=1673872326&Signature=IjS5zieyVX9x3X6Va6D8N9yopCyb1c57b0-JAGvXKhX4iBoll8i4tlhv58GcU1DQV-AlxNZW64NeCv90kTleVwOeAC1Tg2Q0THD9srPIgWAKcCKyR-sW9Bhb5PuQeYPODv2Qu1g4I6fwuhyZc9IRw82l5EAGllsUhhYnLncxdLZs8saFBM2-rdBNzP~iAAxBfQ6xjsmVT6qpz7pFdzjrA4VRigCM72aCLJECSyCnQJyDjckX8tMqDrc-gCf~IzJX8Ntl4GDpTxIY37UJD3y~RSxFRFL3pLTqbh0U9TkSI9~v0xGGpF1EM12F1O4f4HdiImeEIC23cRZh~m-4Mw0RiA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA>
Ezell, Barry Charles, and others, ‘Probabilistic Risk Analysis and Terrorism Risk’, Risk Analysis, 30.4 (2010), pp. 575–89, doi:10.1111/j.1539-6924.2010.01401.x
——, and others, ‘Probabilistic Risk Analysis and Terrorism Risk’, Risk Analysis, 30.4 (2010), pp. 575–89, doi:10.1111/j.1539-6924.2010.01401.x
Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE), n.d. <http://ascelibrary.org/doi/abs/10.1061/40577(306)2>
Gibson, John E., Scherer, William T., and Gibson, William F., How to Do Systems Analysis (Wiley-Interscience, 2007), Wiley series in systems engineering and management
Haas, Charles N., ‘The Role of Risk Analysis in Understanding Bioterrorism’, Risk Analysis, 22.4 (2002), pp. 671–77, doi:10.1111/0272-4332.00239
Hamilton-Smith, Niall, and Simon Mackenzie, ‘The Geometry of Shadows: A Critical Review of Organised Crime Risk Assessments’, Policing and Society, 20.3 (2010), pp. 257–79, doi:10.1080/10439463.2010.505287
Home Affairs Committee - BTP Submission to Parliment, n.d. <http://www.publications.parliament.uk/pa/cm200809/cmselect/cmhaff/112/112we07.htm>
IED Attack Fact Sheet | Homeland Security, n.d. <https://www.dhs.gov/publication/ied-attack-fact-sheet>
IRM’s Risk Management Standard, n.d. <https://www.theirm.org/knowledge-and-resources/risk-management-standards/irms-risk-management-standard/>
J, Taylor, and Margaritis D, ‘The Role of Protection Measures and Their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism’, Journal of Bioterrorism & Biodefense, 04.01 (2013), doi:10.4172/2157-2526.1000123
Kaplan, Stan, Yacov Y. Haimes, and B. John Garrick, ‘Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk’, Risk Analysis, 21.5 (2001), pp. 807–807, doi:10.1111/0272-4332.215153
Kaplan, Stanley, and B. John Garrick, ‘On The Quantitative Definition of Risk’, Risk Analysis, 1.1 (1981), pp. 11–27, doi:10.1111/j.1539-6924.1981.tb01350.x
Lefebvre, Mario, Applied Probability and Statistics (Springer, 2006)
Leitch, Matthew, ‘ISO 31000:2009-The New International Standard on Risk Management’, Risk Analysis, 30.6 (2010), pp. 887–92 <https://web-p-ebscohost-com.libproxy.ucl.ac.uk/ehost/pdfviewer/pdfviewer?vid=0&sid=15a0e9a1-bd24-404f-9757-70feaf124319%40redis>
Levi, M., and J. Burrows, ‘Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey’, British Journal of Criminology, 48.3 (2007), pp. 293–318, doi:10.1093/bjc/azn001
Lowrance, William W., Of Acceptable Risk: Science and the Determination of Safety (W. Kaufmann, 1976)
Nissen, T, ‘Designing for Socially Acceptable Security Technologies’ (unpublished, n.d.) <http://discovery.ucl.ac.uk/1426195/>
Paoli, Letizia, ‘The Harms of Cocaine Trafficking: Applying a New Framework for Assessment’, Journal of Drug Issues, 43.4 (n.d.), pp. 407–36 <http://search.proquest.com/docview/1520318663?rfr_id=info%3Axri%2Fsid%3Aprimo>
Police Drone Looking For Criminals with Heat Cameras & AR Drone, 8 AD <https://www.youtube.com/watch?v=YfePcIiKwWs>
Police Got Camera Drones To Control Crime – Best Aerial Photography, 1 AD <https://www.youtube.com/watch?v=mwHbEk89kug>
Stirling, Andy, ‘Keep It Complex’, Nature, 468.7327 (2010), pp. 1029–31, doi:10.1038/4681029a
The Procedural Analysis of Offending and Its Relevance for Situational Prevention, n.d. <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.375.8084&rep=rep1&type=pdf>
Tokyo Police Intercept Active Drone by Unfurling Net, 2015 <https://www.youtube.com/watch?v=RKvf_gpVVU4>
Tusikov, Natasha, ‘Measuring Organised Crime-Related Harms: Exploring Five Policing Methods’, Crime, Law and Social Change, 57.1 (n.d.), pp. 99–115 <http://search.proquest.com/docview/917862490?OpenUrlRefId=info:xri/sid:primo&accountid=14511>
Vose, David, Risk Analysis: A Quantitative Guide, 3rd ed (Wiley, 2008)
Willis, Henry H., ‘Guiding Resource Allocations Based on Terrorism Risk’, Risk Analysis, 27.3 (2007), pp. 597–606, doi:10.1111/j.1539-6924.2007.00909.x
——, ‘Guiding Resource Allocations Based on Terrorism Risk’, Risk Analysis, 27.3 (2007), pp. 597–606, doi:10.1111/j.1539-6924.2007.00909.x
Wolff, Jonathan, Railway Safety and the Ethics of the Tolerability of Risk, n.d. <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.404.6699&rep=rep1&type=pdf>
Zemp, Stefan, and others, ‘Generic Functions of Railway Stations—A Conceptual Basis for the Development of Common System Understanding and Assessment Criteria’, Transport Policy, 18.2 (2011), pp. 446–55, doi:10.1016/j.tranpol.2010.09.007