globe
  1. General Module Reading 4 items
    There is a wide variety of sources that you can access for this module. Many of these are subject-specific, but here are some general texts that you should find very helpful. I've marked them all as 'essential' although of course you don't have to read every chapter of the Handbook of Security, or every edition of the Security Journal - but you may like to make these your first port of call when researching/reading more about any of the topics in this module.
    1. Security - Lucia Zedner 2009

      Book Essential This book is available electronically

    2. Crime and risk - Pat O'Malley 2010

      Book Essential This book is available electronically

    3. Security journal. - ASIS Foundation. 1989

      Journal Essential The Security Journal has a whole range of really useful articles on just about any topic relevant to this module, so just have a search through or browse the table of contents

    4. The Handbook of Security - SpringerLink (Online service) 2014

      Book Essential This is an edited book that has a number of very relevant chapters

  2. Lecture One: Introduction to Security and Risk 6 items
    1. What Have Criminologists Done for Us Lately? - Ken Pease, Graham Farrell

      Chapter Essential This is Chapter 4 in the Handbook of Security. This is available electronically.

    2. World risk society - Ulrich Beck 1999

      Book Background

    3. Against Beck - Scott Campbell, Greg Currie 06/2006

      Article Background Campbell and Currie argue that Beck's criticism of risk analysis and probability theory are groundless and that they continue to play a key role in the understanding and management of risk

    4. Crime and risk - Pat O'Malley 2010

      Book Background This book is available electronically

    5. Security - Lucia Zedner 2009

      Book Background

  3. Lecture 2: Security and Risk Theories and their Real World Application 10 items
    1. A Review and Current Status of Crime Prevention through Environmental Design (CPTED) - Paul Cozens, Terence Love 11/2015

      Article Essential This is a nice, straightforward article that gives a useful overview of CPTED (crime prevention through environmental design) and discusses its effectiveness.

    2. The effectiveness of burglary security devices - Andromachi Tseloni, Rebecca Thompson, Louise Grove, Nick Tilley 2017-5

      Article Essential This article discusses the effectiveness of security measures relating to burglary and identifies that certain combinations of measures are more effective than others. Quite a useful article to consider what/why some measures may be more effective than others. Don't spend too long reading this (unless you want to), but I'd just like you to skim to get the general idea.

    3. Designing Crime Risk Management Systems - Marianna Perry

      Chapter Essential This is a short, easy to read, article (7 pages) that provides information on how to design a crime risk management system

    4. What Do You Mean, ‘Is It Secure?’ Redesigning Language to be Fit for the Task of Assessing the Security of Domestic and Personal Electronic Goods - Paul Ekblom, Aiden Sidebottom 29/11/2007

      Article Background Background reading - highlights problems with language and definitions

    5. Designing-in Crime by Designing-out the Social? Situational Crime Prevention and the Intensification of Harmful Subjectivities - Thomas Raymen 05/2016

      Article Background This is largely a critique of SCP and CPTED via questioning/challenging the underlying theoretical perspective

    6. Crime risk assessment/crime impact assessment

      Document Background Ekblom, P. (2008) published via the Design Against Crime Research Centre. This is a really short paper

    7. Crime risk management: making it work - Cressida Bridgeman, Great Britain. Police Research Group 1996

      Book Background

  4. Lecture 3: The Private Security Industry 10 items
    1. Volume 26, Issue 3, July 2013

      Article Essential Special Issue on new developments in corporate security and contract private security. Have a look at the Contents and read any article of your choice

    2. Private Security - Jean‐Paul Brodeur

      Chapter Essential

    3. Comparing private security regulation in the European Union - Mark Button, Peter Stiernstedt 04/05/2018

      Article Background

    4. The case for private prisons

      Document Background very brief document arguing the case for private prisons

    5. Countering piracy through private security in the Horn of Africa: prospects and pitfalls - Ladan Affi, Afyare A. Elmi, W. Andy Knight, Said Mohamed 03/05/2016

      Article Background

    6. Private security and the law - Charles P. Nemeth c2012 (electronic resource)

      Book 

  5. Lecture 4: The Night Time Economy 21 items
    1. Securing an urban renaissance: crime, community, and British urban policy - Dr Rowland Atkinson, Rowland Atkinson, Gesa Helms, University of Glasgow. Dept. of Urban Studies 2007 (electronic resource)

      Book 

    2. Situational crime prevention: successful case studies - Ronald V. G. Clarke 1997

      Book Background Chapter 21 Preventing Drunkenness and Violence around Nightclubs in a Tourist Resort, pp 263-282

    3. Crime at work: increasing the risk for offenders, Vol.2 - M. L. Gill 1998

      Book  Chapter 12 - Drugs and Doors: Improving Door Security and Tackling Drug Dealing in Clubs and Pubs, by Sheridan Morris

    4. Crime at work: studies in security and crime prevention, Vol.1 - M. L. Gill 1994

      Book  Fiddling in hotel bars: types, patterns, motivations and prevention by Karen Gill, pp 125- 138

    5. ID scanners in the night time economy - Darren Palmer, Ian Warren, Peter Miller 06/2010

      Article 

  6. Lecture 5: Retail Crime and Security 9 items
    1. Shopping and crime - Joshua Bamfield 2012

      Book Essential

    2. Organized retail crime - Blake H. Liventin 2011

      Book Essential

    3. Crime and security: managing the risk to safe shopping - Adrian Beck, Andrew Willis 1995

      Book Background

    4. The prevention of shop theft: an approach through crime analysis - Paul Ekblom, Great Britain. Home Office. Crime Prevention Unit 1986

      Book Background

    5. Retail crime and loss prevention - John Guthrie, John Guthrie, Sarah Todd c2006 (electronic resource)

      Book Background

  7. Cyber crime and cyber security 14 items
    Choose what you'd like to read in accordance with your area of interest
    1. The Handbook of Security - Martin Gill 2016

      Book Essential Read Chapter 15 - Cybercrime and Establishing a Secure Cyberworld by Chang and Grabosky

    2. Crime and the Internet - David Wall 2003-9-2

      Book Essential

    3. Introduction to cyber-warfare: a multidisciplinary approach - Paulo Shakarian, Jana Shakarian, Andrew Ruef 2013 (electronic resource)

      Book 

    4. Cyber security culture: counteracting cyber threats through organizational learning and training - Peter R. J. Trim, David Upton c2013 (electronic resource)

      Book 

    5. Cyber crime and cyber terrorism investigator's handbook - Babak Akhgar, Benjamin Rearick, Priya Kumaraguruparan, Mark Rogers 2014

      Book 

    6. The EU as a Coherent (Cyber)Security Actor? - Helena Carrapico, André Barrinha 11/2017

      Article 

  8. Lectures 7 and 8: Transnational Crime parts 1 and 2 19 items
    1. The Handbook of Security - SpringerLink (Online service) 2014

      Book Essential Chapter 16 on Counterfeiting

    2. Prevention of organised crime: a situational approach - Henk Van de Bunt, Cathelijne van der Schoot, Wetenschappelijk Onderzoek- en Documentatiecentrum 2003

      Book 

    3. Transnational organised crime: perspectives on global security - Adam Edwards, Adam Edwards, Peter Gill 2003 (electronic resource)

      Book 

    4. Encyclopedia of transnational crime and justice - Margaret E. Beare 2012

      Book 

    5. Policing cyber hate, cyber threats and cyber terrorism - Imran Awan, Brian Blakemore 2012

      Book 

    6. Cyber warfare: techniques, tactics and tools for security practitioners - Jason Andress, Steve Winterfeld, Russ Rogers c2011 (electronic resource)

      Book Essential

    7. The basics of cyber warfare: understanding the fundamentals of cyber warfare in theory and practice - Steve Winterfeld, Jason Andress c2013 (electronic resource)

      Book 

    8. Introduction to cyber-warfare: a multidisciplinary approach - Paulo Shakarian, Jana Shakarian, Andrew Ruef 2013 (electronic resource)

      Book 

    9. Cyber conflict: competing national perspectives - Daniel Ventre, Daniel Ventre 2012 (electronic resource)

      Book 

    10. Effects of Prohibition and Decriminalization on Drug Market Conflict - Scott Jacques, Richard Rosenfeld, Richard Wright, Frank van Gemert 08/2016

      Article 

    11. Human trafficking in Europe: character, causes and consequences - Gillian Wylie, Penny McRedmond 2010 (electronic resource)

      Book 

  9. Privacy, Surveillance and Human Rights 6 items
    1. Surveillance, crime, and social control - Clive Norris, Dean Wilson 2006

      Book 

All rights reserved ©