‘A Structured Approach to Enterprise Risk Management and the Requirements of ISO 31000’. Web. <https://www.theirm.org/media/886062/ISO3100_doc.pdf>.
‘---’. Web. <https://www.theirm.org/media/886062/ISO3100_doc.pdf>.
‘Air Force Bugbot Nano Drone Technology’. 11 AD. Web. <https://www.youtube.com/watch?v=z78mgfKprdg>.
Albanese, J. S. ‘Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels’. Journal of Contemporary Criminal Justice 24.3 (2008): 263–273. Web.
Andrew von Hirsch and Nils Jareborg. ‘Gauging Criminal Harm: A Living-Standard Analysis’. Oxford Journal of Legal Studies 11.1 (1991): 1–38. Web. <http://www.jstor.org/stable/764504?seq=1#page_scan_tab_contents>.
Aven, T. and Wiley InterScience (Online service). Risk Analysis: Assessing Uncertainties beyond Expected Values and Probabilities. Hoboken, N.J.: Wiley InterScience, 2008. Web. <http://dx.doi.org/10.1002/9780470694435>.
Aven, Terje. ‘Risk Analysis Methods’. Risk Analysis. Chichester, UK: John Wiley & Sons, Ltd, 2008. 57–84. Web. <http://doi.wiley.com/10.1002/9780470694435.ch6>.
---. ‘The Risk Concept—Historical and Recent Development Trends’. Reliability Engineering & System Safety 99 (2012): 33–44. Web.
---. ‘What Is a Risk Analysis?’ Risk Analysis. Chichester, UK: John Wiley & Sons, Ltd, 2008. 3–15. Web. <http://doi.wiley.com/10.1002/9780470694435.ch1>.
Bedford, T. and Cooke, Roger M. Probabilistic Risk Analysis: Foundations and Methods. Cambridge: Cambridge University Press, 2001. Print.
‘Biological Attack Fact Sheet | Homeland Security’. Web. <https://www.dhs.gov/publication/biological-attack-fact-sheet>.
‘---’. Web. <https://www.dhs.gov/publication/biological-attack-fact-sheet>.
Borrion, Herve et al. ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’. 2012 European Intelligence and Security Informatics Conference. IEEE, 2012. 68–75. Web. <http://ieeexplore.ieee.org/document/6298815/>.
---. ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’. 2012 European Intelligence and Security Informatics Conference. IEEE, 2012. 68–75. Web. <http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6298815>.
Borrion, Hervé. ‘Quality Assurance in Crime Scripting’. Crime Science 2.1 (2013): n. pag. Web.
Campbell, Scott. ‘Determining Overall Risk’. Journal of Risk Research 8.7–8 (2005): 569–581. Web.
‘Chemical Attack Fact Sheet | Homeland Security’. n. pag. Web. <https://www.dhs.gov/publication/chemical-attack-fact-sheet>.
Clarke, Ronald. ‘Hot Products’. n. pag. Web. <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.551.8913&rep=rep1&type=pdf>.
Cohen, Mark A. ‘Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims’. Law & Society Review 22.3 (1988): n. pag. Web.
Cornish, D. ‘The Procedural Analysis of Offending and Its Relevance for Situational Prevention’. n. pag. Web. <http://www.unipa.it/persone/docenti/c/salvatore.costantino/.content/documenti/Script-schema-cCrnish.pdf>.
Dowie, John. ‘Against Risk’. n. pag. Web. <https://d1wqtxts1xzle7.cloudfront.net/1029470/AgainstRisk99-libre.pdf?1390588802=&response-content-disposition=inline%3B+filename%3DAgainst_risk.pdf&Expires=1673872326&Signature=IjS5zieyVX9x3X6Va6D8N9yopCyb1c57b0-JAGvXKhX4iBoll8i4tlhv58GcU1DQV-AlxNZW64NeCv90kTleVwOeAC1Tg2Q0THD9srPIgWAKcCKyR-sW9Bhb5PuQeYPODv2Qu1g4I6fwuhyZc9IRw82l5EAGllsUhhYnLncxdLZs8saFBM2-rdBNzP~iAAxBfQ6xjsmVT6qpz7pFdzjrA4VRigCM72aCLJECSyCnQJyDjckX8tMqDrc-gCf~IzJX8Ntl4GDpTxIY37UJD3y~RSxFRFL3pLTqbh0U9TkSI9~v0xGGpF1EM12F1O4f4HdiImeEIC23cRZh~m-4Mw0RiA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA>.
Ezell, Barry Charles et al. ‘Probabilistic Risk Analysis and Terrorism Risk’. Risk Analysis 30.4 (2010): 575–589. Web.
---. ‘Probabilistic Risk Analysis and Terrorism Risk’. Risk Analysis 30.4 (2010): 575–589. Web.
‘Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE)’. n. pag. Web. <http://ascelibrary.org/doi/abs/10.1061/40577(306)2>.
Gibson, John E., Scherer, William T., and Gibson, William F. How to Do Systems Analysis. Wiley series in systems engineering and management. Hoboken, N.J.: Wiley-Interscience, 2007. Print.
Haas, Charles N. ‘The Role of Risk Analysis in Understanding Bioterrorism’. Risk Analysis 22.4 (2002): 671–677. Web.
Hamilton-Smith, Niall, and Simon Mackenzie. ‘The Geometry of Shadows: A Critical Review of Organised Crime Risk Assessments’. Policing and Society 20.3 (2010): 257–279. Web.
‘Home Affairs Committee - BTP Submission to Parliment’. Web. <http://www.publications.parliament.uk/pa/cm200809/cmselect/cmhaff/112/112we07.htm>.
‘IED Attack Fact Sheet | Homeland Security’. n. pag. Web. <https://www.dhs.gov/publication/ied-attack-fact-sheet>.
‘IRM’s Risk Management Standard’. Web. <https://www.theirm.org/knowledge-and-resources/risk-management-standards/irms-risk-management-standard/>.
J, Taylor, and Margaritis D. ‘The Role of Protection Measures and Their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism’. Journal of Bioterrorism & Biodefense 04.01 (2013): n. pag. Web.
Kaplan, Stan, Yacov Y. Haimes, and B. John Garrick. ‘Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk’. Risk Analysis 21.5 (2001): 807–807. Web.
Kaplan, Stanley, and B. John Garrick. ‘On The Quantitative Definition of Risk’. Risk Analysis 1.1 (1981): 11–27. Web.
Lefebvre, Mario. Applied Probability and Statistics. New York: Springer, 2006. Print.
Leitch, Matthew. ‘ISO 31000:2009-The New International Standard on Risk Management’. Risk Analysis 30.6 (2010): 887–892. Web. <https://web-p-ebscohost-com.libproxy.ucl.ac.uk/ehost/pdfviewer/pdfviewer?vid=0&sid=15a0e9a1-bd24-404f-9757-70feaf124319%40redis>.
Levi, M., and J. Burrows. ‘Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey’. British Journal of Criminology 48.3 (2007): 293–318. Web.
Lowrance, William W. Of Acceptable Risk: Science and the Determination of Safety. Los Altos, Calif: W. Kaufmann, 1976. Print.
Nissen, T. ‘Designing for Socially Acceptable Security Technologies’. N.p. Web. <http://discovery.ucl.ac.uk/1426195/>.
Paoli, Letizia. ‘The Harms of Cocaine Trafficking: Applying a New Framework for Assessment’. Journal of Drug Issues 43.4 407–436. Web. <http://search.proquest.com/docview/1520318663?rfr_id=info%3Axri%2Fsid%3Aprimo>.
‘Police Drone Looking For Criminals with Heat Cameras & AR Drone’. 8 AD. Web. <https://www.youtube.com/watch?v=YfePcIiKwWs>.
‘Police Got Camera Drones To Control Crime – Best Aerial Photography’. 1 AD. Web. <https://www.youtube.com/watch?v=mwHbEk89kug>.
Stirling, Andy. ‘Keep It Complex’. Nature 468.7327 (2010): 1029–1031. Web.
‘The Procedural Analysis of Offending and Its Relevance for Situational Prevention’. n. pag. Web. <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.375.8084&rep=rep1&type=pdf>.
‘Tokyo Police Intercept Active Drone by Unfurling Net’. 12 Dec. 2015. Web. <https://www.youtube.com/watch?v=RKvf_gpVVU4>.
Tusikov, Natasha. ‘Measuring Organised Crime-Related Harms: Exploring Five Policing Methods’. Crime, Law and Social Change 57.1 99–115. Web. <http://search.proquest.com/docview/917862490?OpenUrlRefId=info:xri/sid:primo&accountid=14511>.
Vose, David. Risk Analysis: A Quantitative Guide. 3rd ed. Chichester: Wiley, 2008. Print.
Willis, Henry H. ‘Guiding Resource Allocations Based on Terrorism Risk’. Risk Analysis 27.3 (2007): 597–606. Web.
---. ‘Guiding Resource Allocations Based on Terrorism Risk’. Risk Analysis 27.3 (2007): 597–606. Web.
Wolff, Jonathan. ‘Railway Safety and the Ethics of the Tolerability of Risk’. Web. <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.404.6699&rep=rep1&type=pdf>.
Zemp, Stefan et al. ‘Generic Functions of Railway Stations—A Conceptual Basis for the Development of Common System Understanding and Assessment Criteria’. Transport Policy 18.2 (2011): 446–455. Web.