1.
Campbell, S. Determining overall risk. Journal of Risk Research 8, 569–581 (2005).
2.
Kaplan, S. & Garrick, B. J. On The Quantitative Definition of Risk. Risk Analysis 1, 11–27 (1981).
3.
Lowrance, W. W. Of Acceptable Risk: Science and the Determination of Safety. (W. Kaufmann, Los Altos, Calif, 1976).
4.
Leitch, M. ISO 31000:2009-The New International Standard on Risk Management. Risk Analysis 30, 887–892 (2010).
5.
IRM’s risk management standard.
6.
A structured approach to Enterprise Risk Management and the requirements of ISO 31000.
7.
Willis, H. H. Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis 27, 597–606 (2007).
8.
Aven, T. What is a Risk Analysis? in Risk Analysis 3–15 (John Wiley & Sons, Ltd, Chichester, UK, 2008). doi:10.1002/9780470694435.ch1.
9.
Dowie, J. Against Risk.
10.
A structured approach to Enterprise Risk Management and the requirements of ISO 31000.
11.
Vose, D. Risk Analysis: A Quantitative Guide. (Wiley, Chichester, 2008).
12.
Biological Attack Fact Sheet | Homeland Security.
13.
Haas, C. N. The Role of Risk Analysis in Understanding Bioterrorism. Risk Analysis 22, 671–677 (2002).
14.
J, T. & D, M. The Role of Protection Measures and their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism. Journal of Bioterrorism & Biodefense 04, (2013).
15.
Borrion, H., Mitchener-Nissen, T., Taylor, J. & Lai, K.-M. Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. in 2012 European Intelligence and Security Informatics Conference 68–75 (IEEE, 2012). doi:10.1109/EISIC.2012.45.
16.
Aven, T. The risk concept—historical and recent development trends. Reliability Engineering & System Safety 99, 33–44 (2012).
17.
Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE).
18.
Borrion, H. Quality assurance in crime scripting. Crime Science 2, (2013).
19.
Cornish, D. The procedural analysis of offending and its relevance for situational prevention.
20.
Aven, T. Risk Analysis Methods. in Risk Analysis 57–84 (John Wiley & Sons, Ltd, Chichester, UK, 2008). doi:10.1002/9780470694435.ch6.
21.
Willis, H. H. Guiding Resource Allocations Based on Terrorism Risk. Risk Analysis 27, 597–606 (2007).
22.
Ezell, B. C., Bennett, S. P., von Winterfeldt, D., Sokolowski, J. & Collins, A. J. Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis 30, 575–589 (2010).
23.
Stirling, A. Keep it complex. Nature 468, 1029–1031 (2010).
24.
Nissen, T. Designing for Socially Acceptable Security Technologies.
25.
Chemical Attack Fact Sheet | Homeland Security.
26.
Biological Attack Fact Sheet | Homeland Security.
27.
IED Attack Fact Sheet | Homeland Security.
28.
Clarke, R. Hot Products.
29.
Police Got Camera Drones To Control Crime – Best Aerial Photography. (1 AD).
30.
Police Drone Looking For Criminals with Heat Cameras & AR Drone. (8 AD).
31.
Air Force Bugbot Nano Drone Technology. (11 AD).
32.
Tokyo Police intercept active drone by unfurling net. (2015).
33.
Home Affairs Committee - BTP Submission to Parliment.
34.
Wolff, J. Railway safety and the ethics of the tolerability of risk.
35.
Paoli, Letizia. The Harms of Cocaine Trafficking: Applying a New Framework for Assessment. Journal of Drug Issues 43, 407–436.
36.
Andrew von Hirsch and Nils Jareborg. Gauging Criminal Harm: A Living-Standard Analysis. Oxford Journal of Legal Studies 11, 1–38 (1991).
37.
Albanese, J. S. Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels. Journal of Contemporary Criminal Justice 24, 263–273 (2008).
38.
Cohen, M. A. Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims. Law & Society Review 22, (1988).
39.
Hamilton-Smith, N. & Mackenzie, S. The geometry of shadows: a critical review of organised crime risk assessments. Policing and Society 20, 257–279 (2010).
40.
Levi, M. & Burrows, J. Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey. British Journal of Criminology 48, 293–318 (2007).
41.
Tusikov, Natasha. Measuring organised crime-related harms: exploring five policing methods. Crime, Law and Social Change 57, 99–115.
42.
Aven, T. & Wiley InterScience (Online service). Risk Analysis: Assessing Uncertainties beyond Expected Values and Probabilities. (Wiley InterScience, Hoboken, N.J., 2008).
43.
Ezell, B. C., Bennett, S. P., von Winterfeldt, D., Sokolowski, J. & Collins, A. J. Probabilistic Risk Analysis and Terrorism Risk. Risk Analysis 30, 575–589 (2010).
44.
Lefebvre, Mario. Applied Probability and Statistics. (Springer, New York, 2006).
45.
Zemp, S., Stauffacher, M., Lang, D. J. & Scholz, R. W. Generic functions of railway stations—A conceptual basis for the development of common system understanding and assessment criteria. Transport Policy 18, 446–455 (2011).
46.
Kaplan, S., Haimes, Y. Y. & Garrick, B. J. Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk. Risk Analysis 21, 807–807 (2001).
47.
Gibson, John E., Scherer, William T., & Gibson, William F. How to Do Systems Analysis. vol. Wiley series in systems engineering and management (Wiley-Interscience, Hoboken, N.J., 2007).
48.
Bedford, T. & Cooke, Roger M. Probabilistic Risk Analysis: Foundations and Methods. (Cambridge University Press, Cambridge, 2001).
49.
Borrion, H., Mitchener-Nissen, T., Taylor, J. & Lai, K.-M. Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. in 2012 European Intelligence and Security Informatics Conference 68–75 (IEEE, 2012). doi:10.1109/EISIC.2012.45.
50.
The Procedural Analysis of Offending and its Relevance for Situational Prevention.