‘A Structured Approach to Enterprise Risk Management and the Requirements of ISO 31000’ <https://www.theirm.org/media/886062/ISO3100_doc.pdf>
‘——’ <https://www.theirm.org/media/886062/ISO3100_doc.pdf>
‘Air Force Bugbot Nano Drone Technology’ <https://www.youtube.com/watch?v=z78mgfKprdg>
Albanese JS, ‘Risk Assessment in Organized Crime: Developing a Market and Product-Based Model to Determine Threat Levels’ (2008) 24 Journal of Contemporary Criminal Justice 263
Andrew von Hirsch and Nils Jareborg, ‘Gauging Criminal Harm: A Living-Standard Analysis’ (1991) 11 Oxford Journal of Legal Studies 1 <http://www.jstor.org/stable/764504?seq=1#page_scan_tab_contents>
Aven T, ‘Risk Analysis Methods’, Risk Analysis (John Wiley & Sons, Ltd 2008) <http://doi.wiley.com/10.1002/9780470694435.ch6>
——, ‘What Is a Risk Analysis?’, Risk Analysis (John Wiley & Sons, Ltd 2008) <http://doi.wiley.com/10.1002/9780470694435.ch1>
——, ‘The Risk Concept—Historical and Recent Development Trends’ (2012) 99 Reliability Engineering & System Safety 33
Aven, T. and Wiley InterScience (Online service), Risk Analysis: Assessing Uncertainties beyond Expected Values and Probabilities (Wiley InterScience 2008) <http://dx.doi.org/10.1002/9780470694435>
Bedford, T. and Cooke, Roger M., Probabilistic Risk Analysis: Foundations and Methods (Cambridge University Press 2001)
‘Biological Attack Fact Sheet | Homeland Security’ <https://www.dhs.gov/publication/biological-attack-fact-sheet>
‘——’ <https://www.dhs.gov/publication/biological-attack-fact-sheet>
Borrion H, ‘Quality Assurance in Crime Scripting’ (2013) 2 Crime Science
Borrion H and others, ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’, 2012 European Intelligence and Security Informatics Conference (IEEE 2012) <http://ieeexplore.ieee.org/document/6298815/>
——, ‘Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics’, 2012 European Intelligence and Security Informatics Conference (IEEE 2012) <http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6298815>
Campbell S, ‘Determining Overall Risk’ (2005) 8 Journal of Risk Research 569
‘Chemical Attack Fact Sheet | Homeland Security’ <https://www.dhs.gov/publication/chemical-attack-fact-sheet>
Clarke R, ‘Hot Products’ <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.551.8913&amp;rep=rep1&amp;type=pdf>
Cohen MA, ‘Pain, Suffering, and Jury Awards: A Study of the Cost of Crime to Victims’ (1988) 22 Law & Society Review
Cornish D, ‘The Procedural Analysis of Offending and Its Relevance for Situational Prevention’ <http://www.unipa.it/persone/docenti/c/salvatore.costantino/.content/documenti/Script-schema-cCrnish.pdf>
Dowie J, ‘Against Risk’ <https://d1wqtxts1xzle7.cloudfront.net/1029470/AgainstRisk99-libre.pdf?1390588802=&amp;response-content-disposition=inline%3B+filename%3DAgainst_risk.pdf&amp;Expires=1673872326&amp;Signature=IjS5zieyVX9x3X6Va6D8N9yopCyb1c57b0-JAGvXKhX4iBoll8i4tlhv58GcU1DQV-AlxNZW64NeCv90kTleVwOeAC1Tg2Q0THD9srPIgWAKcCKyR-sW9Bhb5PuQeYPODv2Qu1g4I6fwuhyZc9IRw82l5EAGllsUhhYnLncxdLZs8saFBM2-rdBNzP~iAAxBfQ6xjsmVT6qpz7pFdzjrA4VRigCM72aCLJECSyCnQJyDjckX8tMqDrc-gCf~IzJX8Ntl4GDpTxIY37UJD3y~RSxFRFL3pLTqbh0U9TkSI9~v0xGGpF1EM12F1O4f4HdiImeEIC23cRZh~m-4Mw0RiA__&amp;Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA>
Ezell BC and others, ‘Probabilistic Risk Analysis and Terrorism Risk’ (2010) 30 Risk Analysis 575
——, ‘Probabilistic Risk Analysis and Terrorism Risk’ (2010) 30 Risk Analysis 575
‘Fitting Hierarchical Holographic Modeling (HHM) into the Theory of Scenario Structuring (ASCE)’ <http://ascelibrary.org/doi/abs/10.1061/40577(306)2>
Gibson, John E., Scherer, William T., and Gibson, William F., How to Do Systems Analysis, vol Wiley series in systems engineering and management (Wiley-Interscience 2007)
Haas CN, ‘The Role of Risk Analysis in Understanding Bioterrorism’ (2002) 22 Risk Analysis 671
Hamilton-Smith N and Mackenzie S, ‘The Geometry of Shadows: A Critical Review of Organised Crime Risk Assessments’ (2010) 20 Policing and Society 257
‘Home Affairs Committee - BTP Submission to Parliment’ <http://www.publications.parliament.uk/pa/cm200809/cmselect/cmhaff/112/112we07.htm>
‘IED Attack Fact Sheet | Homeland Security’ <https://www.dhs.gov/publication/ied-attack-fact-sheet>
‘IRM’s Risk Management Standard’ <https://www.theirm.org/knowledge-and-resources/risk-management-standards/irms-risk-management-standard/>
J T and D M, ‘The Role of Protection Measures and Their Interaction in Determining Building Vulnerability and Resilience to Bioterrorism’ (2013) 04 Journal of Bioterrorism & Biodefense
Kaplan S and Garrick BJ, ‘On The Quantitative Definition of Risk’ (1981) 1 Risk Analysis 11
Kaplan S, Haimes YY and Garrick BJ, ‘Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk’ (2001) 21 Risk Analysis 807
Lefebvre, Mario, Applied Probability and Statistics (Springer 2006)
Leitch M, ‘ISO 31000:2009-The New International Standard on Risk Management’ (2010) 30 Risk Analysis 887 <https://web-p-ebscohost-com.libproxy.ucl.ac.uk/ehost/pdfviewer/pdfviewer?vid=0&amp;sid=15a0e9a1-bd24-404f-9757-70feaf124319%40redis>
Levi M and Burrows J, ‘Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey’ (2007) 48 British Journal of Criminology 293
Lowrance WW, Of Acceptable Risk: Science and the Determination of Safety (W Kaufmann 1976)
Nissen T, ‘Designing for Socially Acceptable Security Technologies’ <http://discovery.ucl.ac.uk/1426195/>
Paoli, Letizia, ‘The Harms of Cocaine Trafficking: Applying a New Framework for Assessment’ 43 Journal of Drug Issues 407 <http://search.proquest.com/docview/1520318663?rfr_id=info%3Axri%2Fsid%3Aprimo>
‘Police Drone Looking For Criminals with Heat Cameras & AR Drone’ <https://www.youtube.com/watch?v=YfePcIiKwWs>
‘Police Got Camera Drones To Control Crime – Best Aerial Photography’ <https://www.youtube.com/watch?v=mwHbEk89kug>
Stirling A, ‘Keep It Complex’ (2010) 468 Nature 1029
‘The Procedural Analysis of Offending and Its Relevance for Situational Prevention’ <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.375.8084&rep=rep1&type=pdf>
‘Tokyo Police Intercept Active Drone by Unfurling Net’ <https://www.youtube.com/watch?v=RKvf_gpVVU4>
Tusikov, Natasha, ‘Measuring Organised Crime-Related Harms: Exploring Five Policing Methods’ 57 Crime, Law and Social Change 99 <http://search.proquest.com/docview/917862490?OpenUrlRefId=info:xri/sid:primo&amp;accountid=14511>
Vose D, Risk Analysis: A Quantitative Guide (3rd ed, Wiley 2008)
Willis HH, ‘Guiding Resource Allocations Based on Terrorism Risk’ (2007) 27 Risk Analysis 597
——, ‘Guiding Resource Allocations Based on Terrorism Risk’ (2007) 27 Risk Analysis 597
Wolff J, ‘Railway Safety and the Ethics of the Tolerability of Risk’ <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.404.6699&amp;rep=rep1&amp;type=pdf>
Zemp S and others, ‘Generic Functions of Railway Stations—A Conceptual Basis for the Development of Common System Understanding and Assessment Criteria’ (2011) 18 Transport Policy 446