Advancing Corrections (2012) ‘P10 - Probation Programs and the Crime-Reduction Potential of Structured Community Supervision’. Available at: https://www.youtube.com/watch?v=ISXyjBikH24.
Affizal Ahmad (no date) ‘The Kind of Mental Health Problems and it Association with Aggressiveness: A Study on Security Guards’, International Journal of Psychology and Behavioral Sciences, 2(6), pp. 237–244. Available at: http://article.sapub.org/10.5923.j.ijpbs.20120206.07.html.
Armitage, R. (2013a) Crime prevention through housing design: policy and practice. London: Palgrave Macmillan. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1431389.
Armitage, R. (2013b) Crime prevention through housing design: policy and practice. London: Palgrave Macmillan. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1431389.
Armitage, R. and Monchuk, L. (2011) ‘Sustaining the crime reduction impact of designing out crime: Re-evaluating the Secured by Design scheme 10 years on’, Security Journal, 24(4), pp. 320–343. Available at: https://doi.org/10.1057/sj.2010.6.
Armitage, R., Monchuk, L. and Rogerson, M. (2011) ‘It Looks Good, but What is it Like to Live There? Exploring the Impact of Innovative Housing Design on Crime’, European Journal on Criminal Policy and Research, 17(1), pp. 29–54. Available at: https://doi.org/10.1007/s10610-010-9133-8.
‘ASIS Issues Workplace Violence Prevention Guide.’ (2006) Professional Safety, 51(9), pp. 17–17. Available at: http://search.ebscohost.com.ezproxy3.lib.le.ac.uk/login.aspx?direct=true&db=buh&AN=22124163&site=ehost-live.
Bamfield, J. (2012) Shopping and crime. Basingstoke: Palgrave Macmillan. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=882576.
Bartlett, J. (no date) Is Modern Surveillance Really ‘Orwellian’. Available at: http://www.huffingtonpost.co.uk/jamie-bartlett/surveillance-george-orwell_b_3899906.html.
BARTON, A. (2011) ‘Screening and Brief Intervention of Detainees for Alcohol Use: A Social Crime Prevention Approach to Combating Alcohol-Related Crime?’, The Howard Journal of Criminal Justice, 50(1), pp. 62–74. Available at: https://doi.org/10.1111/j.1468-2311.2010.00647.x.
Bates, T. and Robb, A. (2008) ‘Crime’s Impact on the Survival Prospects of Young Urban Small Businesses’, Economic Development Quarterly, 22(3), pp. 228–238. Available at: https://doi.org/10.1177/0891242408321255.
Beck, A. (2011) ‘Self-scan checkouts and retail loss: Understanding the risk and minimising the threat’, Security Journal, 24(3), pp. 199–215. Available at: https://doi.org/10.1057/sj.2011.13.
Beck, A., Chapman, P. and Peacock, C. (no date) ‘SHRINKAGE: A COLLABORATIVE APPROACH TO REDUCING STOCK LOSS IN THE SUPPLY CHAIN’. Available at: https://www.ecr.digital/wp_contents/uploads/2016/09/ECR-Bericht_Shrinkage.pdf.
Beck, A. and Palmer, W. (2010) ‘The Importance of Visual Situational Cues and Difficulty of Removal in Creating Deterrence: The Limitations of Electronic Article Surveillance Source Tagging in the Retail Environment’, Journal of Applied Security Research, 6(1), pp. 110–123. Available at: https://doi.org/10.1080/19361610.2011.529412.
Beck, A. and Peacock, C. (2009) New loss prevention: Redefining shrinkage management. Basingstoke: Palgrave Macmillan. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230250727.
Bloomberg Express (10AD) ‘Ex-Olympus CEO Woodford Says All Directors Should Go’. Available at: https://www.youtube.com/watch?v=6U5wml5XVww.
Bowie, V. (no date) ‘An Emerging Awareness of the Role Organizational Culture and Management Style Can Play in Triggering Workplace Violence’. Available at: https://docplayer.net/20724466-6-an-emerging-awareness-of-the-role-organizational-culture-and-management-style-can-play-in-triggering-workplace-violence.html.
Brayford, J., Cowe, F. and Deering, J. (2010) What else works?: creative work with offenders. Cullompton: Willian Publishing. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://www.myilibrary.com?id=255366.
Callender Knefel, A.M. and Bryant, C.D. (2004) ‘workplace as combat zone: reconceptualizing occupational and organizational violence’, Deviant Behavior, 25(6), pp. 579–601. Available at: https://doi.org/10.1080/016396200497884.
Carpenter, K. (no date) Match-Fixing – the Biggest Threat to Sport in the 21st Century? Available at: http://www.interpol.int/Media/Files/INTERPOL-Expertise/IGLC/Match-fixing-biggest-threat.
Center for Problem-Oriented Policing (no date). Available at: http://www.popcenter.org/.
Center for Problem-Oriented Policing | 25 Techniques (no date). Available at: http://www.popcenter.org/25techniques/.
Chappell, D., Di Martino, V., and International Labour Office (2006) Violence at work. 3rd ed. Geneva: International Labour Office. Available at: http://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/---publ/documents/publication/wcms_publ_9221108406_en.pdf.
Chappell, D. and Martino, V. (no date) ‘Violence at Work’. Available at: http://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/---publ/documents/publication/wcms_publ_9221108406_en.pdf.
Chayka, K. (no date) Face-recognition software: Is this the end of anonymity for all of us? Available at: http://www.independent.co.uk/life-style/gadgets-and-tech/features/face-recognition-software-is-this-the-end-of-anonymity-for-all-of-us-9278697.html.
CHECHAK, D. and CSIERNIK, R. (2014) ‘Canadian Perspectives on Conceptualizing and Responding to Workplace Violence’, Journal of Workplace Behavioral Health, 29(1), pp. 55–72. Available at: https://doi.org/10.1080/15555240.2014.866474.
CheckpointSys (2014) ‘Global Retail Theft Barometer Highlights 2013-2014’. Available at: https://www.youtube.com/watch?v=kPVOjai-tHY.
Clarke, R. and Petrossian, G. (no date) ‘Shoplifting’. Available at: http://www.popcenter.org/problems/pdfs/Shoplifting.pdf.
Clive Norris and Michael McCahill (2006) ‘CCTV: BEYOND PENAL MODERNISM?’, The British Journal of Criminology, 46(1), pp. 97–118. Available at: http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/23639334?pq-origsite=summon.
Cozens, P., Thorn, M. and Hillier, D. (2008) ‘Designing out crime in Western Australia: a case study’, Property Management, 26(5), pp. 295–309. Available at: https://doi.org/10.1108/02637470810913450.
‘Crime Prevention Through Environmental Design’ (16AD). Available at: https://www.youtube.com/watch?v=TSRCWxGK7tI.
Crime Reduction Toolkit | College of Policing (no date). Available at: http://whatworks.college.police.uk/toolkit/Pages/Toolkit.aspx.
Doig, A. and Levi, M. (2013) ‘A case of arrested development? Delivering the UK National Fraud Strategy within competing policing policy priorities’, Public Money & Management, 33(2), pp. 145–152. Available at: https://doi.org/10.1080/09540962.2013.763435.
DrugWise (no date). Available at: http://www.drugwise.org.uk/.
E u r o p e a n A g e n c y f o r S a f e t y a n d H e a l t h a t W o r k (no date) European Agency for Safety and Health at Work. Available at: https://osha.europa.eu/en/node/6745/file_view.
Ekblom, P. (2010) Crime prevention, security and community safety using the 5Is framework. Basingstoke: Palgrave Macmillan. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://www.palgraveconnect.com/doifinder/10.1057/9780230298996.
Europol (2017) ‘EU Serious and Organised Crime Threat Assessment’. Available at: https://www.europol.europa.eu/activities-services/main-reports/european-union-serious-and-organised-crime-threat-assessment-2017.
Fast, L. (no date) ‘Security and Risk Management for Peacebuilding Organisations’. Available at: http://www.berghof-foundation.org/fileadmin/redaktion/Publications/Handbook/Articles/fast_handbook.pdf.
Faundez-Zanuy, M. et al. (2013) ‘Biometric Applications Related to Human Beings: There Is Life beyond Security’, Cognitive Computation, 5(1), pp. 136–151. Available at: https://doi.org/10.1007/s12559-012-9169-9.
Fuller, C. (no date) HMRC wins Eclipse 35 case at Court of Appeal - 18 Feb 2015 - Accountancy Age. Available at: http://www.accountancyage.com/aa/news/2395841/hmrc-wins-eclipse-35-case-at-court-of-appeal.
Gill, M. (2011a) ‘Fraud and recessions: Views from fraudsters and fraud managers’, International Journal of Law, Crime and Justice, 39(3), pp. 204–214. Available at: https://doi.org/10.1016/j.ijlcj.2011.05.008.
Gill, M. (2011b) ‘Fraud and recessions: Views from fraudsters and fraud managers’, International Journal of Law, Crime and Justice, 39(3), pp. 204–214. Available at: https://doi.org/10.1016/j.ijlcj.2011.05.008.
Gill, M. (no date) ‘Learning from Fraudsters.’ Available at: https://perpetuityresearch.com/855/learning-from-fraudsters/.
Gill, M.L. (2006) The Handbook of Security. Basingstoke: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014a) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014b) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014c) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014d) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014e) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014f) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan.
Gill, M.L. (2014g) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014h) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014i) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014j) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014k) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014l) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014m) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014n) The Handbook of Security. Basingstoke: Palgrave Macmillan. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://dx.doi.org/10.1007/978-1-349-67284-4.
Gill, M.L. (2014o) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014p) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014q) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014r) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Gill, M.L. (2014s) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4427344.
Good Practice Review (no date) ‘Operational security management in violent environments’. Available at: http://odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf.
‘Great Books: 1984 (GEORGE ORWELL)’ (2007). Available at: https://www.youtube.com/watch?v=8xvsTBVmP8o.
Greenfield, V.A. and Paoli, L. (2013) ‘A Framework to Assess the Harms of Crimes’, British Journal of Criminology, 53(5), pp. 864–885. Available at: https://doi.org/10.1093/bjc/azt018.
Gregg, D. (no date) Family intervention projects: a classic case of policy-based evidence. Available at: http://www.crimeandjustice.org.uk/publications/family-intervention-projects-classic-case-policy-based-evidence.
Haelterman, H. (2009) ‘Situational Crime Prevention and Supply Chain Security: An "Ex Ante” Consideration of Preventive Measures’, Journal of Applied Security Research, 4(4), pp. 483–500. Available at: https://doi.org/10.1080/19361610903176294.
Hamilton-Smith, N. and Mackenzie, S. (2010) ‘The geometry of shadows: a critical review of organised crime risk assessments’, Policing and Society, 20(3), pp. 257–279. Available at: https://doi.org/10.1080/10439463.2010.505287.
Hebberecht, P. and Baillergeau, E. (eds) (2012) Social crime prevention in late modern Europe: a comparative perspective. Brussels, Belgium: VUBPress. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?pq-origsite=primo&docID=3115829.
Homel, R. (no date) ‘Developmental crime prevention’. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.567.7928&rep=rep1&type=pdf.
‘Hot Spot Policing and Displacement, David Weisburd (3 of 7)’ (5AD). Available at: https://www.youtube.com/watch?v=bahC-0s65BI.
ICRC (no date) ‘Health care in danger- The Human Cost’. Available at: https://www.youtube.com/watch?v=Cr3eknFzhWs.
Kaminski, M. (no date) United Association for Labor Education (UALE) - Workplace Bullying Materials. Available at: https://uale.org/resources-list/57-workplace-bullying-materials.
Kang-Brown, J. et al. (no date) ‘A Generation Later: What We’ve Learned about Zero Tolerance in Schools’. Available at: http://www.vera.org/sites/default/files/resources/downloads/zero-tolerance-in-schools-policy-brief.pdf.
Kenny, J. (2010) ‘Risk Assessment and Management Teams: A Comprehensive Approach to Early Intervention in Workplace Violence’, Journal of Applied Security Research, 5(2), pp. 159–175. Available at: https://doi.org/10.1080/19361611003601033.
Kerr, K.M. (2010) Workplace violence: planning for prevention and response. Burlington, Mass: Butterworth-Heinemann. Available at: http://site.ebrary.com/lib/leicester/Doc?id=10391642.
Kleemans, E.R. and de Poot, C.J. (2008) ‘Criminal Careers in Organized Crime and Social Opportunity Structure’, European Journal of Criminology, 5(1), pp. 69–98. Available at: https://doi.org/10.1177/1477370807084225.
LEINO, T. et al. (no date) Work-related Violence against Security Guards— Who is Most at Risk? Available at: https://www.jstage.jst.go.jp/article/indhealth/49/2/49_MS1208/_pdf.
Leo C.C. Cheung,Hector W.H. Tsang,Christopher U. Tsui (2006) ‘A Job-Specific Social Skills Training program for people with severe mental illness: a case study for those who plan to be a security guard’, The Journal of Rehabilitation, 72(4). Available at: http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?p=EAIM&u=leicester&id=GALE|A157267476&v=2.1&it=r&sid=summon&userGroup=leicester&authCount=1.
Levi, M. (1987) Regulating fraud: white-collar crime and the criminal process. London: Tavistock Publications.
Levi, M. (2008) The phantom capitalists: the organization and control of long-firm fraud. Rev. ed. Aldershot: Ashgate.
Levi, M. (no date) ‘Public and Private Policing of Financial Crimes: the Struggle for Co-ordination’. Available at: http://www.fvv.um.si/varstvoslovje/articles/vs-2010-4-levi.pdf.
Levi, M. et al. (no date) ‘The economic, financial & social impacts of organised crime in the European’. Available at: http://www.europarl.europa.eu/RegData/etudes/etudes/join/2013/493018/IPOL-JOIN_ET%282013%29493018_EN.pdf.
Levi, M. and Maguire, M. (2004) ‘Reducing and preventing organised crime: An evidence-based critique’, Crime, Law and Social Change, 41(5), pp. 397–469. Available at: https://doi.org/10.1023/B:CRIS.0000039600.88691.af.
Maguire, M., Morgan, R. and Reiner, R. (2012) The Oxford handbook of criminology. 5th ed. Oxford: Oxford University Press.
Manners-Bell, J. (2014a) Supply chain risk: understanding emerging threats to global supply chains. London: Kogan Page. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1658900.
Manners-Bell, J. (2014b) Supply Chain Risk: Understanding Emerging Threats to Global Supply Chains. 1st ed. London: Kogan Page, Limited. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1658900.
Manners-Bell, J. (2014c) Supply Chain Risk: Understanding Emerging Threats to Global Supply Chains. 1st ed. London: Kogan Page, Limited. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1658900.
Marwick, A. (no date) The Public Domain: Social Surveillance in Everyday Life. Available at: https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/pub_dom.
McKinney, D. (13AD) ‘Health: Drug Education’. Available at: https://www.youtube.com/watch?v=FM4LQzFQb94.
Mental Welfare Commission (no date) ‘Zero Tolerance Measured Response’. Available at: https://docplayer.net/43776378-Zero-tolerance-measured-response-responding-to-violence-in-mental-health-or-learning-disability-care-settings.html.
Mills, H., Skodbo, S. and Blyth, P. (no date) ‘Understanding Organised Crime: Estimating the Scale and the Social and Economic costs’. Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246390/horr73.pdf.
Millsapp, J. (2013) ‘CPTED (Crime Prevention Through Environmental Design)’. Available at: https://www.youtube.com/watch?v=ni8Sz4ttSdg.
Mitsilegas, V. (2014) ‘The Value of Privacy in an Era of Security: Embedding Constitutional Limits on Preemptive Surveillance’, International Political Sociology, 8(1), pp. 104–108. Available at: https://doi.org/10.1111/ips.12043.
MossAdamsLLP (2013) ‘Assessing Risks in an Omnichannel Retail World’. Available at: https://www.youtube.com/watch?v=ilPJnEBW6Fc&feature=youtu.be.
Mugellini, G. (no date) ‘Measuring and analysing crime against the private sector: International experiences and the Mexican practice.’ Available at: https://books.google.co.uk/books?id=McHODwAAQBAJ&pg=PA65&lpg=PA65&dq=Organized+crime+and+the+commercial+sector+in+England+and+Wales:+policy,+definition+and+the+extent+of+victimization&source=bl&ots=9ABmwakcK3&sig=ACfU3U27eT0OHBk2LGwGb1hjv7faggzw0w&hl=en&sa=X&ved=2ahUKEwi_2K6p-brqAhXNTxUIHR2zBxQQ6AEwAXoECAwQAQ#v=onepage&q=Organized%20crime%20and%20the%20commercial%20sector%20in%20England%20and%20Wales%3A%20policy%2C%20definition%20and%20the%20extent%20of%20victimization&f=false.
Newburn, T. (2013a) Criminology. 2nd ed. London: Routledge. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4799825.
Newburn, T. (2013b) Criminology. 2nd ed. London: Routledge. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4799825.
Nutt, D.J., King, L.A. and Phillips, L.D. (2010) ‘Drug harms in the UK: a multicriteria decision analysis’, The Lancet, 376(9752), pp. 1558–1565. Available at: https://doi.org/10.1016/S0140-6736(10)61462-6.
Office for Victims of Crime (2013) ‘Through Our Eyes: Children, Violence, and Trauma’. Available at: https://www.youtube.com/watch?v=z8vZxDa2KPM.
‘Old Before My Time  Drugs  Documentary - YouTube’ (no date). Available at: https://www.youtube.com/watch?v=FtJfAM-IkHU.
Personal Defence Network (no date) Demystifying CPTED. Available at: http://www.personaldefensenetwork.com/video/demystifying-cpted-crime-prevention-environmental-design-005340/.
Pinto, J. (2014) ‘Expanding the Content Domain of Workplace Aggression: A Three-level Aggressor-target Taxonomy’, International Journal of Management Reviews, 16(3), pp. 290–313. Available at: https://doi.org/10.1111/ijmr.12021.
Redwood-Campbell, L.J., Sekhar, S.N. and Persaud, C.R. (2014) ‘Health Care Workers in Danger Zones: A Special Report on Safety and Security in a Changing Environment’, Prehospital and Disaster Medicine, 29(05), pp. 503–507. Available at: https://doi.org/10.1017/S1049023X14000934.
rghm (2008) ‘Enron’s Skilling Answers Markey at Hearing; Eyes Roll’. Available at: https://www.youtube.com/watch?v=hPqH3DrWEEU.
Risk and Business | Security is Your Business (no date). Available at: http://securityisyourbusiness.com/video/risk-and-business/.
Schuchter, A. and Levi, M. (2013) ‘The Fraud Triangle revisited’, Security Journal [Preprint]. Available at: https://doi.org/10.1057/sj.2013.1.
Shapland, J. and Hall, M. (2007) ‘What Do We Know About the Effects of Crime on Victims?’, International Review of Victimology, 14(2), pp. 175–217. Available at: https://doi.org/10.1177/026975800701400202.
ShortcutsTV (7AD) ‘Situational Crime Prevention’. Available at: https://www.youtube.com/watch?v=A4JReRRZOLU.
Simpson, S.S. and Weisburd, D. (2009) The Criminology of White-Collar Crime. 1st edn. New York, NY: Springer New York. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://dx.doi.org/10.1007/978-0-387-09502-8.
Starner, K. (no date) Prosecuting tax evasion. Available at: http://www.cps.gov.uk/news/articles/prosecuting_tax_evasion/.
Stenning, C. and Shearing, P. (no date) ‘From the Panopticon to Disney World: the Development of Discipline’. Available at: http://www.popcenter.org/problems/crimes_against_tourists/PDFs/Shearing_Stenning_1997.pdf.
Stoddard, A., Harmer, A. and DiDomenico, V. (no date) ‘The use of private security providers and services in humanitarian operations’. Available at: https://www.eldis.org/document/A41665.
Strategic Directions | Security is Your Business (no date). Available at: http://securityisyourbusiness.com/video/strategic-directions/.
Sutton, A., Cherney, A. and White, R. (2014a) Crime prevention: principles, perspectives and practices. Cambridge: Cambridge University Press.
Sutton, A., Cherney, A. and White, R. (2014b) Crime prevention: principles, perspectives and practices. Cambridge: Cambridge University Press.
Taylor, E. (2013) Surveillance schools: security, discipline and control in contemporary education. Basingstoke: Palgrave Pivot. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1474957.
Thames Valley Probation (2010) ‘Probation - It Works!’ Available at: https://www.youtube.com/watch?v=DtWnHGc4nts.
‘The Financial Impact of Workplace Violence’ (no date). Available at: http://www.workplaceviolence911.com/docs/FinancialImpactofWV.pdf.
The United States Attorneys Office (no date) United States V. Bernard L. Madoff And Related Cases | USAO-SDNY | Department of Justice. Available at: http://www.justice.gov/usao-sdny/programs/victim-witness-services/united-states-v-bernard-l-madoff-and-related-cases.
Thumala, A., Goold, B. and Loader, I. (2015) ‘Tracking devices: On the reception of a novel security good’, Criminology and Criminal Justice, 15(1), pp. 3–22. Available at: https://doi.org/10.1177/1748895813507067.
Tilley, N. (2005) Handbook of crime prevention and community safety. Cullompton, Devon: Willan Pub. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=5292831.
Tilley, N., Farrell, G. and Clarke, R.V. (2015) ‘Target Suitability and the Crime Drop’, in Criminal Act: The Role and Influence of Routine Activity Theory. Hampshire: Palgrave Macmillan. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1952969.
Tilley, N. and Hopkins, M. (2008) ‘Organized crime and local businesses’, Criminology and Criminal Justice, 8(4), pp. 443–459. Available at: https://doi.org/10.1177/1748895808096469.
UK Home Office Scientific Development Branch (no date) CCTV Technical Concepts. Available at: http://www.popcenter.org/responses/video_surveillance/videos.
Urciuoli, L. (2010) ‘Supply chain security—mitigation measures and a logistics multi-layered framework’, Journal of Transportation Security, 3(1), pp. 1–28. Available at: https://doi.org/10.1007/s12198-009-0034-3.
Vanheule, S. et al. (2008) ‘Burnout, critical incidents and social support in security guards’, Stress and Health, 24(2), pp. 137–141. Available at: https://doi.org/10.1002/smi.1177.
VicHealth (2012) VicHealth (2012) Preventing violence against women in the workplace (An evidence review: summary report), Victorian Heath Promotion Foundation, Melbourne, Australia. Available at: https://www.vichealth.vic.gov.au/~/media/resourcecentre/publicationsandresources/economic%20participation/2012%20workplace/chw_pvaw_full_web_final.ashx.
Video clips for retailers - GETBA (no date). Available at: http://www.getba.org.nz/video-clips-for-retailers.
Wall Street Journal (2011a) ‘Inside the Madoff Scandal: Chapter One’. Available at: https://www.youtube.com/watch?v=cxFBurk12Gs.
Wall Street Journal (2011b) ‘Inside the Madoff Scandal: Chapter Two’. Available at: https://www.youtube.com/watch?v=4yugDvzvv04.
Waring, A. (2013) Corporate risk and governance: an end to mismanagement, tunnel vision and quackery, Please read chapter 10 - Corporate Fraud. Burlington, Vt: Gower. Available at: http://site.ebrary.com/lib/leicester/Doc?id=10693684.
Waring, A. (2016a) Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Farnham: Taylor and Francis. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750.
Waring, A. (2016b) Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Farnham: Taylor and Francis. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750.
Waring, A. (2016c) Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Farnham: Taylor and Francis. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750.
Waring, A. (2016d) Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Farnham: Taylor and Francis. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750.
Waring, A. (2016e) Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Farnham: Taylor and Francis. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750.
Waring, A. (2016f) Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Farnham: Taylor and Francis. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750.
Waring, A. (2016g) Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Farnham: Taylor and Francis. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750.
Waring, A. (2016h) Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Farnham: Taylor and Francis. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750.
Waring, A. (2016i) Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Farnham: Taylor and Francis. Available at: http://ebookcentral.proquest.com/lib/leicester/detail.action?docID=1182750.
Waring, A. and Glendon, A.I. (1998a) Managing risk. London: Thomson Learning.
Waring, A. and Glendon, A.I. (1998b) Managing risk, Read the sections Individual Decision-Making on Risk and Individual Behaviour in the Face of Pure Risk, pages 154-161 of chapter 8 Risk Cognition in Waring and Glendon (1998). Note Figure 8.3 and the narrative’s assertion that regardless of risk type (pure or speculative) an individual’s decision-making will always involve a large degree of speculative trade-offs to benefit self-image and self-esteem. What does this imply for risk decision-making processes and claims to objectivity? London: Thomson Learning.
WatchMojo.com (2009) ‘The Story of Organized Crime’. Available at: https://www.youtube.com/watch?v=JtXuzuxVmGw.
Welsh, B. and Farringdon, D. (no date) ‘The Future of Crime Prevention: Developmental and Situational Strategies’. Available at: http://www.foresightfordevelopment.org/sobipro/55/1172-the-future-of-crime-prevention-developmental-and-situational-strategies.
Whyte, W. (no date) The Social Life of Small Urban Spaces. Available at: https://vimeo.com/239980034.
‘Workplace bullying and harassment: building a culture of respect’ (no date). Available at: http://www.acas.org.uk/media/pdf/t/p/building_a_culture-accessible-version-Jun-2012.pdf.
‘Workplace Violence Prevention and Response Guideline’ (no date). Available at: https://c.ymcdn.com/sites/nabenet.site-ym.com/resource/collection/287C1A6D-C2D6-4E8F-8514-27F9B7FC3CAE/wvpi_std.pdf.