1.
Campbell S. Determining overall risk. Journal of Risk Research. 2005 Oct;8(7–8):569–581.
2.
Kaplan S, Garrick BJ. On The Quantitative Definition of Risk. Risk Analysis. 1981 Mar;1(1):11–27.
3.
Lowrance WW. Of acceptable risk: science and the determination of safety. Los Altos, Calif: W. Kaufmann; 1976.
4.
Leitch M. ISO 31000:2009-The New International Standard on Risk Management. Risk Analysis [Internet]. 2010 Apr 8;30(6):887–892. Available from: https://web-p-ebscohost-com.libproxy.ucl.ac.uk/ehost/pdfviewer/pdfviewer?vid=0&sid=15a0e9a1-bd24-404f-9757-70feaf124319%40redis
5.
IRM’s risk management standard [Internet]. Available from: https://www.theirm.org/knowledge-and-resources/risk-management-standards/irms-risk-management-standard/
6.
A structured approach to Enterprise Risk Management and the requirements of ISO 31000 [Internet]. Available from: https://www.theirm.org/media/886062/ISO3100_doc.pdf
7.
Willis HH. Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis. 2007 June;27(3):597–606.
8.
Aven T. What is a Risk Analysis? Risk Analysis [Internet]. Chichester, UK: John Wiley & Sons, Ltd; 2008. p. 3–15. Available from: http://doi.wiley.com/10.1002/9780470694435.ch1
9.
Dowie J. Against Risk. Available from: https://d1wqtxts1xzle7.cloudfront.net/1029470/AgainstRisk99-libre.pdf?1390588802=&response-content-disposition=inline%3B+filename%3DAgainst_risk.pdf&Expires=1673872326&Signature=IjS5zieyVX9x3X6Va6D8N9yopCyb1c57b0-JAGvXKhX4iBoll8i4tlhv58GcU1DQV-AlxNZW64NeCv90kTleVwOeAC1Tg2Q0THD9srPIgWAKcCKyR-sW9Bhb5PuQeYPODv2Qu1g4I6fwuhyZc9IRw82l5EAGllsUhhYnLncxdLZs8saFBM2-rdBNzP~iAAxBfQ6xjsmVT6qpz7pFdzjrA4VRigCM72aCLJECSyCnQJyDjckX8tMqDrc-gCf~IzJX8Ntl4GDpTxIY37UJD3y~RSxFRFL3pLTqbh0U9TkSI9~v0xGGpF1EM12F1O4f4HdiImeEIC23cRZh~m-4Mw0RiA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
10.
A structured approach to Enterprise Risk Management and the requirements of ISO 31000 [Internet]. Available from: https://www.theirm.org/media/886062/ISO3100_doc.pdf
11.
Vose D. Risk analysis: a quantitative guide. 3rd ed. Chichester: Wiley; 2008.
12.
Biological Attack Fact Sheet | Homeland Security [Internet]. Available from: https://www.dhs.gov/publication/biological-attack-fact-sheet
13.
Haas CN. The Role of Risk Analysis in Understanding Bioterrorism. Risk Analysis. 2002 Aug;22(4):671–677.
14.
J T, D M. The Role of Protection Measures and their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism. Journal of Bioterrorism & Biodefense. 2013;04(01).
15.
Borrion H, Mitchener-Nissen T, Taylor J, Lai KM. Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. 2012 European Intelligence and Security Informatics Conference [Internet]. IEEE; 2012. p. 68–75. Available from: http://ieeexplore.ieee.org/document/6298815/
16.
Aven T. The risk concept—historical and recent development trends. Reliability Engineering & System Safety. 2012 Mar;99:33–44.
17.
Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE). Available from: http://ascelibrary.org/doi/abs/10.1061/40577(306)2
18.
Borrion H. Quality assurance in crime scripting. Crime Science. 2013;2(1).
19.
Cornish D. The procedural analysis of offending and its relevance for situational prevention. Available from: http://www.unipa.it/persone/docenti/c/salvatore.costantino/.content/documenti/Script-schema-cCrnish.pdf
20.
Aven T. Risk Analysis Methods. Risk Analysis [Internet]. Chichester, UK: John Wiley & Sons, Ltd; 2008. p. 57–84. Available from: http://doi.wiley.com/10.1002/9780470694435.ch6
21.
Willis HH. Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis. 2007 June;27(3):597–606.
22.
Ezell BC, Bennett SP, von Winterfeldt D, Sokolowski J, Collins AJ. Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis. 2010 Apr;30(4):575–589.
23.
Stirling A. Keep it complex. Nature. 2010 Dec 23;468(7327):1029–1031.
24.
Nissen T. Designing for Socially Acceptable Security Technologies [Internet]. Available from: http://discovery.ucl.ac.uk/1426195/
25.
Chemical Attack Fact Sheet | Homeland Security. Available from: https://www.dhs.gov/publication/chemical-attack-fact-sheet
26.
Biological Attack Fact Sheet | Homeland Security [Internet]. Available from: https://www.dhs.gov/publication/biological-attack-fact-sheet
27.
IED Attack Fact Sheet | Homeland Security. Available from: https://www.dhs.gov/publication/ied-attack-fact-sheet
28.
Clarke R. Hot Products. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.551.8913&rep=rep1&type=pdf
29.
Police Got Camera Drones To Control Crime – Best Aerial Photography [Internet]. 1 AD. Available from: https://www.youtube.com/watch?v=mwHbEk89kug
30.
Police Drone Looking For Criminals with Heat Cameras & AR Drone [Internet]. 8 AD. Available from: https://www.youtube.com/watch?v=YfePcIiKwWs
31.
Air Force Bugbot Nano Drone Technology [Internet]. 11 AD. Available from: https://www.youtube.com/watch?v=z78mgfKprdg
32.
Tokyo Police intercept active drone by unfurling net [Internet]. 2015. Available from: https://www.youtube.com/watch?v=RKvf_gpVVU4
33.
Home Affairs Committee - BTP Submission to Parliment [Internet]. Available from: http://www.publications.parliament.uk/pa/cm200809/cmselect/cmhaff/112/112we07.htm
34.
Wolff J. Railway safety and the ethics of the tolerability of risk [Internet]. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.404.6699&rep=rep1&type=pdf
35.
Paoli, Letizia. The Harms of Cocaine Trafficking: Applying a New Framework for Assessment. Journal of Drug Issues [Internet]. Sage Publications, Inc; 43(4):407–436. Available from: http://search.proquest.com/docview/1520318663?rfr_id=info%3Axri%2Fsid%3Aprimo
36.
Andrew von Hirsch and Nils Jareborg. Gauging Criminal Harm: A Living-Standard Analysis. Oxford Journal of Legal Studies [Internet]. Oxford University PressOxford University Press; 1991;11(1):1–38. Available from: http://www.jstor.org/stable/764504?seq=1#page_scan_tab_contents
37.
Albanese JS. Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels. Journal of Contemporary Criminal Justice. 2008 May 6;24(3):263–273.
38.
Cohen MA. Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims. Law & Society Review. 1988;22(3).
39.
Hamilton-Smith N, Mackenzie S. The geometry of shadows: a critical review of organised crime risk assessments. Policing and Society. 2010 Sept;20(3):257–279.
40.
Levi M, Burrows J. Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey. British Journal of Criminology. 2007 Dec 24;48(3):293–318.
41.
Tusikov, Natasha. Measuring organised crime-related harms: exploring five policing methods. Crime, Law and Social Change [Internet]. 57(1):99–115. Available from: http://search.proquest.com/docview/917862490?OpenUrlRefId=info:xri/sid:primo&accountid=14511
42.
Aven, T., Wiley InterScience (Online service). Risk analysis: assessing uncertainties beyond expected values and probabilities [Internet]. Hoboken, N.J.: Wiley InterScience; 2008. Available from: http://dx.doi.org/10.1002/9780470694435
43.
Ezell BC, Bennett SP, von Winterfeldt D, Sokolowski J, Collins AJ. Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis. 2010 Apr;30(4):575–589.
44.
Lefebvre, Mario. Applied probability and statistics. New York: Springer; 2006.
45.
Zemp S, Stauffacher M, Lang DJ, Scholz RW. Generic functions of railway stations—A conceptual basis for the development of common system understanding and assessment criteria. Transport Policy. 2011 Mar;18(2):446–455.
46.
Kaplan S, Haimes YY, Garrick BJ. Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk. Risk Analysis. 2001 Oct;21(5):807–807.
47.
Gibson, John E., Scherer, William T., Gibson, William F. How to do systems analysis. Hoboken, N.J.: Wiley-Interscience; 2007.
48.
Bedford, T., Cooke, Roger M. Probabilistic risk analysis: foundations and methods. Cambridge: Cambridge University Press; 2001.
49.
Borrion H, Mitchener-Nissen T, Taylor J, Lai KM. Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. 2012 European Intelligence and Security Informatics Conference [Internet]. IEEE; 2012. p. 68–75. Available from: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6298815
50.
The Procedural Analysis of Offending and its Relevance for Situational Prevention. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.375.8084&rep=rep1&type=pdf