2015 Information security breaches survey - PwC UK (no date). Available at: https://www.pwc.co.uk/assets/pdf/2015-isbs-technical-report-blue-digital.pdf.
‘A Brief History of the Responsibility to Protect (R2P)’ (2013). Available at: https://www.youtube.com/watch?v=zql34A4elhY.
‘A mammoth guilt trip; Criminalising the American company’ (no date) The Economist [Preprint]. Available at: http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?p=EAIM&u=leicester&id=GALE|A380327111&v=2.1&it=r&sid=summon&userGroup=leicester&authCount=1.
A Summary of the GM Recall of Chevrolet Cobalts and Other Cars | New Republic (no date). Available at: https://newrepublic.com/article/117224/summary-gm-recall-chevrolet-cobalts-and-other-cars.
‘A Year is a Short Time in Cyber-Space, in Cyber Security 2.0: Reflections on UK/EU Cyber Security co-operation.’ (no date). Available at: https://www.academia.edu/9463801/A_Year_is_a_Short_Time_in_Cyber-Space_in_Cyber_Security_2.0_Reflections_on_UK_EU_Cyber-Security_Co-Operation.
Airmic (no date) ‘Defining and managing reputation risk A framework for risk managers’. Available at: https://www.yumpu.com/en/document/view/54493098/defining-and-managing-reputation-risk.
Allens Arthur Robinson (no date) ‘CORPORATE CULTURE’ AS A BASIS FOR THE CRIMINAL LIABILITY OF CORPORATIONS’. Available at: http://www.reports-and-materials.org/sites/default/files/reports-and-materials/Allens-Arthur-Robinson-Corporate-Culture-paper-for-Ruggie-Feb-2008.pdf.
Almond, P. and ebrary, Inc (2013) Corporate manslaughter and regulatory reform. New York: Palgrave Macmillan. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1109223.
ASIS International (2010) ‘Standards and guidelines, quick reference guide’. Available at: https://www.asisonline.org/globalassets/standards-and-guidelines/documents/sgquickreferenceguide.pdf.
ASIS International (no date a) ‘Security management standard: Physical asset protection’. Available at: http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf.
ASIS International (no date b) ‘Security management standard: Physical asset protection’. Available at: http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf.
ASIS International (no date c) ‘Security Management Standard: Physical Asset Protection’. Available at: http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf.
ASIS International (no date d) ‘Security Management Standard: Physical Asset Protection’. Available at: http://www.isc2chapter-italy.it/wp-content/uploads/2012/07/PAP-STD.pdf.
BAE Systems (2015) ‘Our Ethics Programme’. Available at: https://www.baesystems.com/cs/Satellite?c=BAEMedia_C&childpagename=UK%2FBAELayout&cid=1434554840982&pagename=UKWrapper.
Bates, S. (no date) Corporate Security: Managing the Risk Across the Security Continuum. Available at: http://content.yudu.com/Library/A3gduo/SECURITY/resources/2.htm?skipFlashCheck=true.
BBC - Search results for bae systems fined (no date). Available at: http://www.bbc.co.uk/search?q=bae%20systems%20fined.
‘Better Ignition Switch Would Have Cost GM 90 Cents’ (2AD). Available at: https://www.youtube.com/watch?v=op4UlpNo0D0&feature=youtu.be.
Bevir, M. (2011a) The SAGE handbook of governance. Los Angeles: SAGE. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529.
Bevir, M. (2011b) The SAGE handbook of governance. Los Angeles: SAGE. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=689529.
Bevir, M. (2013) Interpreting global security. Milton Park, Abingdon, Oxon: Routledge. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?pq-origsite=primo&docID=1344595.
British Standards Institution (2015) Security management: strategic and operational guidelines. London: BSI. Available at: https://edoc.site/bs-16000-2015-pdf-free.html.
Button, M. (2008) Doing security: Critical reflections and an agenda for change. Basingstoke: Palgrave Macmillan. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230583634.
Cadbury, A. (no date) ‘The Financial Aspects of Corporate Governance’. Available at: https://www.frc.org.uk/getattachment/9c19ea6f-bcc7-434c-b481-f2e29c1c271a/The-Financial-Aspects-of-Corporate-Governance-(the-Cadbury-Code).pdf.
Chartered Institute of Management Accountants (no date) ‘Simple, practical proposals for better reporting of corporate governance’. Available at: http://www.cimaglobal.com/Documents/Thought_leadership_docs/Governance/Report-Leadership-Corporate-Governance-Report.pdf.
Cherry, M.; Sneirson, J. (2011) ‘Beyond Profit: Rethinking Corporate Social Responsibility and Greenwashing after the BP Oil Disaster’, Tulane Law Review, 85(4), pp. 983–1038. Available at: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tulr85&id=991.
Clarke, R.A. and Knake, R.K. (2012) Cyber war: the next threat to national security and what to do about it. New York: Ecco. Available at: https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=8531520750002746&institutionId=2746&customerId=2745.
Crane, A. and Matten, D. (2010) Business ethics: managing corporate citizenship and sustainability in the age of globalization. 3rd ed. Oxford: Oxford University Press.
Cranfield School of Management (20AD) ‘Mid Staffordshire Hospital: Making the Right Changes’. Available at: https://www.youtube.com/watch?v=7152JFhYfBU.
D. C. Seyle (2013) ‘Business Participation in the Responsibility to Protect’. Available at: http://oefresearch.org/publications/business-participation-responsibility-protect?page=4.
‘Data Protection Act 2018’ (no date). Available at: http://www.legislation.gov.uk/ukpga/2018/12/contents/enacted.
Deloitte (no date) Sharp rise in estimated costs of implementing new global insurance accounting standards | Deloitte UK. Available at: https://www2.deloitte.com/uk/en/pages/press-releases/archive-press-release/sharp-rise-in-estimated-costs-of-implementing-new-global-insurance-accounting-standards.html.
Department of Health (no date) ‘Patients First and Foremost’. Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/170701/Patients_First_and_Foremost.pdf.
‘Dr. Marc Siegel discusses international security standards and ISO 31000 Risk Management’ (2012). Available at: https://www.youtube.com/watch?v=YbmEOqKGBXI&list=PL4E7A1651D7987B82&index=9.
Elisabet Garriga and Domènec Melé (2004) ‘Corporate Social Responsibility Theories: Mapping the Territory’, Journal of Business Ethics, 53(1), pp. 51–71. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/25123282?pq-origsite=summon&seq=1#page_scan_tab_contents.
Elliott, D., Swartz, E. and Herbane, B. (2010) Business continuity management: a crisis management approach. 2nd ed. New York, NY: Routledge. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=308099.
‘EN - European Agency for Safety and Health at Work: What we do’ (2014). Available at: https://www.youtube.com/watch?v=Nu2fR-J7zxA.
Endorf, C. (2004) ‘Outsourcing Security: The Need, the Risks, the Providers, and the Process’, Information Systems Security, 12(6), pp. 17–23. Available at: https://doi.org/10.1201/1086/44022.12.6.20040101/79782.4.
Epstein-Reevers, J. (no date) A Tale Of Two CEOs, BP vs. Massey: Part I, BP - Forbes. Available at: http://www.forbes.com/sites/csr/2010/05/19/a-tale-of-two-ceos-bp-vs-massey-part-i-bp/#1aed251d4ca1.
Football Licensing Authority (no date) ‘Guide to Safety at Sports Grounds’. Available at: https://www.raithrovers.net/files/GuidetoSafetyatSportsGrounds.pdf.
‘Ford Motors, CSR and Brand Reputation Management - 3BL Media Special Edition’ (7AD). Available at: https://www.youtube.com/watch?v=ts9IEVqtYdU&feature=youtu.be.
‘Framework for Improving Critical Infrastructure Cybersecurity. Version 1.0.’ (no date). Available at: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.
Francis, R. (no date) ‘Report of the Mid Staffordshire NHS Foundation Trust Public Inquiry: executive summary HC 947, Session 2012-2013 - 0947.pdf’. Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/279124/0947.pdf.
General Data Protection Regulation (GDPR) – Final text neatly arranged (no date). Available at: https://gdpr-info.eu/.
Geneva Academy (no date) ‘The International Code of Conduct for Private Security Service Providers’. Available at: https://icoca.ch/sites/all/themes/icoca/assets/icoc_english3.pdf.
Gill, M.L. (2006) The Handbook of Security. Basingstoke: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014a) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014b) The Handbook of Security. Basingstoke: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014c) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
GM Ignition Update - United States - Home (no date). Available at: http://www.gmignitionupdate.com/product/public/us/en/GMIgnitionUpdate/index.html.
GM: Steps to a recall nightmare - CNNMoney (no date). Available at: http://money.cnn.com/infographic/pf/autos/gm-recall-timeline/.
Gobert, J. (2008) ‘The Corporate Manslaughter and Corporate Homicide Act 2007 – Thirteen years in the making but was it worth the wait?’, Modern Law Review, 71(3), pp. 413–433. Available at: https://doi.org/10.1111/j.1468-2230.2008.00699.x.
Gray, A. (no date) ‘Out-sourcing Security’. Available at: https://www.emeraldinsight.com/doi/pdfplus/10.1108/EUM0000000002194.
Gulf environmental restoration | Gulf commitment | BP U.S. (no date). Available at: https://www.bp.com/en_us/bp-us/community/commitment-to-the-gulf-of-mexico/gulf-environmental-restoration.html.
Hillsborough Independent Panel (no date) ‘Hillsborough, The Report of the Hillsborough Independent Panel’. Available at: https://www.gov.uk/government/publications/the-report-of-the-hillsborough-independent-panel.
Hoogenboom, A.B. (2010) The governance of policing and security: ironies, myths and paradoxes. Basingstoke: Palgrave Macmillan. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=346934.
Hopkin, P. (2012a) Fundamentals of risk management: understanding, evaluating and implementing effective risk management. 2nd ed. London: Kogan Page.
Hopkin, P. (2012b) Fundamentals of risk management: understanding, evaluating and implementing effective risk management. 2nd ed. London: Kogan Page.
Hyde company fined over worker’s 40ft death plunge - BBC News (no date). Available at: http://www.bbc.co.uk/news/uk-england-manchester-18931390.
‘Improving safety and health at work through a Decent Work Agenda (short version)’ (2012). Available at: https://www.youtube.com/watch?v=_4gX5ue2_dA&list=PL994662ED670AB984&index=22.
‘It’s Hard to Be Good.’ (no date). Available at: http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=buh&AN=67002622&site=ehost-live.
James Gobert (2008) ‘The Corporate Manslaughter and Corporate Homicide Act 2007: Thirteen Years in the Making but Was It Worth the Wait?’, The Modern Law Review, 71(3), pp. 413–433. Available at: http://www.jstor.org/stable/25151209?pq-origsite=summon&seq=1#page_scan_tab_contents.
James, S. (no date) Can legislation stop cyber crime? Available at: http://www.computerweekly.com/opinion/Can-legislation-stop-cyber-crime.
Jeffcott, S. et al. (2006) ‘Risk, Trust, and Safety Culture in U.K. Train Operating Companies’, Risk Analysis, 26(5), pp. 1105–1121. Available at: https://doi.org/10.1111/j.1539-6924.2006.00819.x.
Kaye, L. (no date) Five Years After Deepwater Horizon, Can BP Repair Its Reputation? | Sustainable Brands. Available at: http://www.sustainablebrands.com/news_and_views/marketing_comms/leon_kaye/five_years_after_deepwater_horizon_can_bp_repair_its_reputa.
Keeler, C. (no date) The End of the Responsibility to Protect? | Foreign Policy Journal. Available at: http://www.foreignpolicyjournal.com/2011/10/12/the-end-of-the-responsibility-to-protect/.
Kinslow, J. (2006) ‘Physical and IT Security’, Journal of Security Education, 2(1), pp. 75–91. Available at: https://doi.org/10.1300/J460v02n01_06.
Kytle, B. and Ruggie, J. (no date) ‘Corporate Social Responsibility as Risk Management: A Model for Multinationals’. Available at: https://sites.hks.harvard.edu/m-rcbg/CSRI/publications/workingpaper_10_kytle_ruggie.pdf.
Leeson, N. and Whitley, E. (2015) Rogue trader. Updated edition. London: Sphere.
Levi, M. (2008) The phantom capitalists: the organization and control of long-firm fraud. Rev. ed. Aldershot: Ashgate. Available at: https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903550830002746&institutionId=2746&customerId=2745.
Loader, I., Goold, B. and Thumala, A. (2014) ‘The moral economy of security’, Theoretical Criminology, 18(4), pp. 469–488. Available at: https://doi.org/10.1177/1362480614531613.
Loader, I. and White, A. (2015) ‘How can we better align private security with the public interest? Towards a civilizing model of regulation’, Regulation & Governance, p. n/a-n/a. Available at: https://doi.org/10.1111/rego.12109.
Locke, R.M. (2013) The Promise and limits of private power: promoting labor standards in a global economy. Cambridge: Cambridge University Press. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=566170.
Lowry, P.B. et al. (2014) ‘Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse’, Journal of Business Ethics, 121(3), pp. 385–401. Available at: https://doi.org/10.1007/s10551-013-1705-3.
Lynn T. Drennan (2004) ‘Ethics, Governance and Risk Management: Lessons from Mirror Group Newspapers and Barings Bank’, Journal of Business Ethics, 52(3), pp. 257–266. Available at: http://www.jstor.org/stable/25123254?pq-origsite=summon&seq=1#page_scan_tab_contents.
Marin, C. (2013) ‘An Old Debate in a New Setting: In-House Versus Outsourced Security Staff in the Context of International Organizations’, Journal of Applied Security Research, 8(4), pp. 510–550. Available at: https://doi.org/10.1080/19361610.2013.825756.
Martin, J. (2014) ‘Lost on the Silk Road: Online drug distribution and the “cryptomarket”’, Criminology and Criminal Justice, 14(3), pp. 351–367. Available at: https://doi.org/10.1177/1748895813505234.
Matejek, S. and Gössling, T. (2014) ‘Beyond Legitimacy: A Case Study in BP’s "Green Lashing”’, Journal of Business Ethics, 120(4), pp. 571–584. Available at: https://doi.org/10.1007/s10551-013-2006-6.
Meehan, B. and Benson, B.L. (2015) ‘The occupations of regulators influence occupational regulation: evidence from the US private security industry’, Public Choice, 162(1–2), pp. 97–117. Available at: https://doi.org/10.1007/s11127-014-0203-1.
Mullins, L.J. and Christy, G. (2016a) Management and organisational behaviour. 11th ed. Harlow: Pearson Education. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113.
Mullins, L.J. and Christy, G. (2016b) Management and organisational behaviour. 11th ed. Harlow: Pearson Education. Available at: https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=5175113&ppg=8.
Mullins, L.J. and Christy, G. (2016c) Management and organisational behaviour. 11th ed. Harlow: Pearson Education. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5175113.
‘Netherlands International Law Review’ (2015), 62(Issue 1), pp. 119–140. Available at: https://doi.org/10.1007/s40802-015-0017-y.
‘Nick Leeson Keynote Speaker’ (2012). Available at: https://www.youtube.com/watch?v=Vfz5HlYkDi8.
North Korea behind Sony Pictures hack? - CNN Video (no date). Available at: https://edition.cnn.com/videos/world/2014/12/03/tsr-dnt-todd-north-korea-sony.cnn.
O’Connor, D. et al. (2008) ‘Seeing private security like a state’, Criminology and Criminal Justice, 8(2), pp. 203–226. Available at: https://doi.org/10.1177/1748895808088995.
‘Olympics Security, Seventh Report of Session 2012–13’ (no date). Available at: http://www.publications.parliament.uk/pa/cm201213/cmselect/cmhaff/531/531.pdf.
Paris, R. (no date) Is it possible to meet the Responsibility to Protect? Available at: https://www.washingtonpost.com/blogs/monkey-cage/wp/2014/12/09/is-it-possible-to-meet-the-responsibility-to-protect/.
Pieth, M. and Ivory, R. (2011) Corporate criminal liability: emergence, convergence, and risk. Dordrecht: Springer. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://site.ebrary.com/lib/leicester/detail.action?docID=10465362.
praxiom (no date) ISO 9000 2015 Definitions in Plain English. Available at: https://www.iso.org/obp/ui/#iso:std:iso:9000:ed-4:v1:en.
Prenzler, T. (2012) Policing and security in practice: Challenges and achievements. Basingstoke: Palgrave Macmillan. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9781137007780.
‘Private Security Services in Europe’ (no date). Available at: http://www.coess.org/download.php?down=Li9kb2N1bWVudHMvZmYtMjAxMy1wcml2YXRlLXNlY3VyaXR5LXNlcnZpY2VzLWluLWV1cm9wZS1jb2Vzcy1mYWN0cy1hbmQtZmlndXJlcy5wZGY.
Qualityguru (no date) History of Quality. Available at: https://www.qualitygurus.com/history-of-quality/.
Quirk, H., Seddon, T. and Smith, G. (2010) Regulation and criminal justice: innovations in policy and research. Cambridge: Cambridge University Press. Available at: https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5903547230002746&institutionId=2746&customerId=2745.
‘Red Bead Experiment with Dr. W. Edwards Deming’ (25AD). Available at: https://www.youtube.com/watch?v=ckBfbvOXDvU.
Reputation Institute | Reputation Measurement & Stakeholder Management (no date). Available at: http://www.reputationinstitute.com/.
‘Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf’ (no date a). Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf.
‘Return to an order of the Honourable the House of Commons dated 18 July 1995 for the Report of the Board of Banking Supervision inquiry into the circumstances of the collapse of Barings HC 673 - 0673.pdf’ (no date b). Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/235622/0673.pdf.
Rhodes, R.A.W. (2007) ‘Understanding Governance: Ten Years On’, Organization Studies, 28(8), pp. 1243–1264. Available at: https://doi.org/10.1177/0170840607076586.
‘Robert Francis: Insights into the Mid Staffordshire inquiry’ (14ADa). Available at: https://www.youtube.com/watch?v=2dtCz3OFcSM.
‘Robert Francis: Insights into the Mid Staffordshire inquiry’ (14ADb). Available at: https://www.youtube.com/watch?v=2dtCz3OFcSM.
Roland Paris (2001) ‘Human Security: Paradigm Shift or Hot Air?’, International Security, 26(2), pp. 87–102. Available at: http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/3092123?pq-origsite=summon&seq=1#page_scan_tab_contents.
Sandra Waddock (2008) ‘Building a New Institutional Infrastructure for Corporate Responsibility’, Academy of Management Perspectives, 22(3), pp. 87–108. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/27747465?pq-origsite=summon&seq=1#page_scan_tab_contents.
‘Serious Crime Act 2015’ (no date). Available at: http://www.legislation.gov.uk/ukpga/2015/9/part/2/enacted.
Shearing, C. and Wood, J. (2003) ‘Governing security for common goods’, International Journal of the Sociology of Law, 31(3), pp. 205–225. Available at: https://doi.org/10.1016/j.ijsl.2003.09.005.
‘Single Service or Bundle: Practitioner Perspectives on What Makes the Best ...’ (2015) Journal of Physical Security [Preprint]. Available at: https://rbsekurity.com/the-journal-of-physical-security.html.
Smith, M.J. and White, A. (2014) ‘The paradox of security regulation: public protection versus normative legitimation’, Policy & Politics, 42(3), pp. 421–437. Available at: https://doi.org/10.1332/030557312X655495.
Souppaya, M. and Scarfone, K. (no date) ‘NIST Special Publication 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops.’ Available at: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf.
‘State Regulation concerning Civilian Private Security Services and their Contribution to Crime Prevention and Community Safety’ (no date). Available at: http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/Ebook0.pdf.
‘State sponsored cyber-attacks happen more and more often - Kaspersky’ (24AD). Available at: https://www.youtube.com/watch?v=lPRowgkd6UE.
SteCooper (11AD) ‘Hillsborough - The Search for Truth’. Available at: https://www.youtube.com/watch?v=tmW1xz6jJGw.
Sustainability | BP Global (no date). Available at: http://www.bp.com/en/global/corporate/sustainability.html.
Taylor, S. (no date) ‘The Hillsborough stadium disaster: 15 April 1989: inquiry by the Rt Hon Lord Justice Taylor: final report: presented to Parliament by the Secretary of State for the Home Department by command of Her Majesty January 1990’. Available at: https://www.scribd.com/document/69424889/Hills-Borough-Stadium-Disaster-Final-Report.
Teuber, C. (2012) EuroDynamics. Available at: http://archive.constantcontact.com/fs017/1104610489911/archive/1109045378919.html.
‘The cyber hell - Eugene Kaspersky on the 3rd annual International Cyber Security Conference’ (12AD). Available at: https://www.youtube.com/watch?v=2NSl9aWm9pI.
The Social Responsibility of Business is to Increase its Profits, by Milton Friedman (no date). Available at: http://umich.edu/~thecore/doc/Friedman.pdf.
Thomas Cook boss apologises over Corfu gas deaths - BBC News (no date). Available at: http://www.bbc.co.uk/news/uk-england-leeds-32809770.
Thomas Cook CEO refuses to say sorry for deaths as ex-boss declines questions | UK news | The Guardian (no date). Available at: http://www.theguardian.com/uk-news/2015/may/07/ex-thomas-cook-boss-refuses-to-answer-questions-over-childrens-deaths.
Thomas Cook shares crash after Harriet Green is pushed out | Business | The Guardian (no date). Available at: http://www.theguardian.com/business/2014/nov/26/thomas-cook-chief-harriet-green-shock-departure.
Uff, J. (no date a) ‘The Southall rail accident inquiry report’. Available at: http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf.
Uff, J. (no date b) ‘The Southall rail accident inquiry report’. Available at: http://www.railwaysarchive.co.uk/documents/HSE_Southall1997.pdf.
United Nations (2011) ‘Human Security Presentation’. Available at: https://docs.unocha.org/sites/dms/HSU/Publications%20and%20Products/Human%20Security%20Tools/Human%20Security%20Presentation.pdf.
United Nations (2013) ‘Human Security - A New Response to Complex Threats’. Available at: https://www.youtube.com/watch?v=axb0KkB2Le4.
United Nations (no date) ‘Human Security Unit Strategic Plan 2014-2017’. Available at: https://drive.google.com/file/d/1DZ0kGYD3RG5zWWyiC3abSE2rYnw_XFi3/view.
Walby, K. and Lippert, R.K. (eds) (2014) Corporate security in the 21st century: theory and practice in international perspective. Basingstoke: Palgrave Macmillan. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/FullRecord.aspx?p=1725804.
White, A. (2014) ‘Post-crisis Policing and Public–Private Partnerships’, British Journal of Criminology, 54(6), pp. 1002–1022. Available at: https://doi.org/10.1093/bjc/azu063.
White, A. (2015) ‘The impact of the Private Security Industry Act 2001’, Security Journal, 28(4), pp. 425–442. Available at: https://doi.org/10.1057/sj.2012.53.
Whitty, M. (no date) Anatomy of the Online Dating Romance Scam. Available at: http://webcache.googleusercontent.com/search?q=cache:bl10jY6RxwEJ:esrc-files.s3.amazonaws.com/outputs/1rP2bpwo6keXPqVRhVIpZg/GhkDoD8Lik631sEw4Wsscg.pdf+&cd=3&hl=en&ct=clnk&gl=uk.
Willcocks, L., Oshri, I. and Hindle, J. (no date) ‘To bundle or not to bundle? Effective decision-making for business and IT services’. Available at: http://www.globalsourcing.org.uk/Report_Downloads/BundleOrNot.pdf.
Wolf, K.D., Deitelhoff, N. and Engert, S. (2007) ‘Corporate Security Responsibility: Towards a Conceptual Framework for a Comparative Research Agenda’, Cooperation and Conflict, 42(3), pp. 294–320. Available at: https://doi.org/10.1177/0010836707079934.