MSc Security and Risk Management Module 1 (DL) View Online Asghar, R. (no date) Gen X Is From Mars, Gen Y Is From Venus: A Primer On How To Motivate A Millennial - Forbes. https://www.forbes.com/sites/robasghar/2014/01/14/gen-x-is-from-mars-gen-y-is-from-venu s-a-primer-on-how-to-motivate-a-millennial/#593aeea17c3d. Bamfield, A. (2014) Chapter of The handbook of security - Security and Risk Management, in The handbook of security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, pp. 791 812. https://ebookcentral.proquest.com/lib/leicester/detail.action?docid=4427344. Barker, Richard (2010) The Big Idea: No, Management Is Not a Profession., Harvard Business Review, 88(7). https://hbr.org/2010/07/the-big-idea-no-management-is-not-a-profession. Beck, U. (2006) Living in the world risk society, Economy and Society, 35(3), pp. 329 345. doi: 10.1080/03085140600844902. Benson, M. L. and Simpson, S. S. (2009) Chapter of White-collar crime: an opportunity perspective - Chapter 3: Explaining White-Collar Crime: Traditional Criminological Theories, in White-collar crime: an opportunity perspect New York: Routledge. http://lib.myilibrary.com.ezproxy4.lib.le.ac.uk/open.aspx?id=197781. Boyne, R. (2003) Chapter of Risk - The Limits of Calculation, in Risk. Buckingham: Open University Press, pp. 1 22. Van Brabant, K. (2001) Mainstreaming the Organisational Management of Safety and Security: a Review of Aid Agency Practices and a Guide for Management. London: Overseas Development Institute. http://www.odi.org/sites/odi.org.uk/files/odi-assets/publications-opinion-files/297.pdf. Brown, S. E., Esbensen, F.-A. and Geis, G. (2013) Chapter of Criminology: explaining crime and its context - Deterrence and Rational Choice Theories of Crime, in Criminology: explaining crime and its context. 8th ed. Waltham, MA: Anderson, pp. 153 215. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://www.sciencedirect.com/science/book/97814557 30100. Button, M. (2008a) Doing security: Critical reflections and an agenda for change. Basingstoke: Palgrave Macmillan. 80230583634. 1/7
Button, M. (2008b) Doing security: Critical reflections and an agenda for change. Basingstoke: Palgrave Macmillan. 80230583634. Campbell, S. (2006) Against Beck: In Defence of Risk Analysis, Philosophy of the Social Sciences, 36(2), pp. 149 172. doi: 10.1177/0048393106287209. Carrabine, E. (2014) Chapter of Criminology: a sociological introduction - Early sociologies of crime, in Criminology: a sociological introduction. 3rd edition. London: Routledge, pp. 66 87. http://ezproxy.lib.le.ac.uk/login?url=http://lib.myilibrary.com?id=584252. Center for Problem-Oriented Policing 25 Techniques (no date a). http://www.popcenter.org/25techniques/. Center for Problem-Oriented Policing 25 Techniques (no date b). http://www.popcenter.org/25techniques/. Citizen Security and Human Rights (no date). https://www.cidh.oas.org/countryrep/seguridad.eng/citizensecurity.toc.htm. Clarke, R. V. G., Tilley, N. and Farrell, G. (2012) The reasoning criminologist: essays in honour of Ronald V. Clarke. London: Routledge. http://site.ebrary.com/lib/leicester/doc?id=10542422. Cornish, D. and Clarke, R. (2014) Chapter of The reasoning criminal: rational choice perspectives on offending - Introduction, in Cornish, D. B. and Clarke, R. V. G. (eds) The reasoning criminal: rational choice perspectives on offending. New York: Transaction Publishers, pp. 1 15. Croall, H. (2001) Understanding white collar crime. Rev. and updated ed. Buckingham: Open University Press. http://ezproxy.lib.le.ac.uk/login?url=http://www.myilibrary.com?id=113213. DeKeseredy, W. and Schwartz, M. (2012) Chapter of Routledge handbook of critical criminology - Left realism, in Routledge handbook of critical criminology. London: Routledge, pp. 105 116. http://site.ebrary.com/lib/leicester/doc?id=10535070. Deukmedjian, J. (2014) Chapter of The handbook of security - Securitization, Infopolitics and the Suppression of Liberty, in The handbook of security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. https://ebookcentral.proquest.com/lib/leicester/reader.action?docid=4427344. Ekblom, P. (2010) Crime prevention, security and community safety using the 5Is framework. Basingstoke: Palgrave Macmillan. 80230298996. Field, C. B. and Intergovernmental Panel on Climate Change (2012) Managing the risks of extreme events and disasters to advance climate change adaptation: special report of the 2/7
Intergovernmental Panel on Climate Change. Cambridge: Cambridge University Press. http://ezproxy.lib.le.ac.uk/login?url=http://search.ebscohost.com/login.aspx?direct=true&s cope=site&db=nlebk&db=nlabk&an=451743. Garvin, David A. (2013) How Google Sold Its Engineers on Management., Harvard Business Review, 91(12). http://search.ebscohost.com/login.aspx?direct=true&db=buh&an=92545712&site=ehost-l George, B. and Kimber, S. (2014) Chapter of The handbook of security - The History of Private Security and Its Impact on the Modern Security Sector, in The handbook of security. Second edition. Basingstoke: Palgrave Macmillan. https://ebookcentral.proquest.com/lib/leicester/detail.action?docid=4427344. Gill, M. (2014) Chapter of The Handbook of Security - Introduction, in The handbook of security. Second edition. Basingstoke: Palgrave Macmillan. https://ebookcentral.proquest.com/lib/leicester/detail.action?docid=4427344. Gill, M. L. (2014) The Handbook of Security. Second edition. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. Gratton, L. (no date) Column: The End of the Middle Manager. https://hbr.org/2011/01/column-the-end-of-the-middle-manager/ar/1. Hales, Colin P. (1986) WHAT DO MANAGERS DO? A CRITICAL REVIEW OF THE EVIDENCE., Journal of Management Studies, 23(1). http://search.ebscohost.com/login.aspx?direct=true&db=buh&an=4554269&site=ehost-li ve. Hamel, Gary (2009) Moon Shots for Management., Harvard Business Review, 87(2). http://search.ebscohost.com/login.aspx?direct=true&db=buh&an=36197171&site=ehost-l Hopkin, P. (2012) Chapter of Fundamentals of risk management: understanding, evaluating and implementing effective risk management - Development of risk management, in Fundamentals of risk management: understanding, evaluating and implementing effective risk management. 2nd ed. London: Kogan Page, pp. 36 45. http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveservice& package_service_id=5665572150002746&institutionid=2746&customerid=2745. Hopkin, P. (2012) Fundamentals of risk management: understanding, evaluating and implementing effective risk management. 2nd ed. London: Kogan Page. http://site.ebrary.com/lib/leicester/doc?id=10555723. Hopkins-Burke, R. (2014a) Chapter of An introduction to criminological theory - Contemporary rational actor theories, in An introduction to criminological theory. 4th edition. Cullompton: Willan, pp. 60 77. http://ezproxy.lib.le.ac.uk/login?url=http://lib.myilibrary.com?id=553050. 3/7
Hopkins-Burke, R. (2014b) Chapter of An introduction to criminological theory - Introduction: Crime and Modernity, in An introduction to criminological theory. 4th edition. Cullompton: Willan, pp. 4 30. http://ezproxy.lib.le.ac.uk/login?url=http://lib.myilibrary.com?id=553050. Hurst, D. (no date) The Mongrel Discipline of Management. https://hbr.org/2013/05/the-mongrel-discipline-of-mana/. In Harms Way (no date). https://www.youtube.com/watch?v=fq8p9rhepiq. Institute of Directors (2014) Responding to Global Risks. https://www.mmc.com/content/dam/mmc-web/files/responding-to-global-risks-a-practica l-guide-for-business-leaders.pdf. Jones, S. (2013) Chapter of Criminology - Biological factors and crime, in Criminology. 5th ed. Oxford: Oxford University Press, pp. 269 298. Kaplan, Robert S.1,2 (AUTHOR)Mikes, Anette3 (AUTHOR) (2012) MANAGING RISKS: A NEW FRAMEWORK., Harvard Business Review. Jun, 90(6), pp. 48 60. http://search.ebscohost.com/login.aspx?direct=true&db=buh&an=75369695&site=ehost-l Khurana, R. and Nohria, N. (no date) It s Time to Make Management a True Profession, Harvard Business Review, 86(10), pp. 70 77. http://librarysearch.le.ac.uk/primo_library/libweb/action/display.do?frbrversion=7&tabs=vi ewonlinetab&ct=display&fn=search&doc=tn_medline18822673&indx=1&recids=tn_me dline18822673&recidxs=0&elementid=0&rendermode=poppedout&displaymode=full&frb rversion=7&vl(6312249ui0)=any&submit=go&query=any%2ccontains%2c+it%27s+tim e+to+make+management+a+true+profession.&rfnexcgrp=1&dscnt=0&search_scope =default_scope&scp.scps=scope%3a%2844uole_speccol%29%2cscope%3a%2844uol E_DISSERTATIONS%29%2Cscope%3A%2844UOLE_DSPACE%29%2Cscope%3A%2844UOLE _CALM%29%2Cscope%3A%2844UOLE_ALMA%29%2Cscope%3A%2844UOLE_EXAM%29%2 Cscope%3A%2844UOLE_CONTENTDM%29%2Cscope%3A%2844UOLE_OJS%29%2Cprimo_c entral_multiple_fe&vid=44uole_vu1&oncampus=false&highlight=true&institution=44uo LE&bulkSize=10&mulExcFctN=facet_rtype&fctExcV=reviews&tab=default_tab&displayFiel d=title&dym=true&vl(freetext0)=%20it%27s%20time%20to%20make%20management% 20a%20True%20PROFESSION.&dstmp=1492777010498. Kiechel III, Walter (2012) The Management Century., Harvard Business Review, 90(11). http://search.ebscohost.com/login.aspx?direct=true&db=buh&an=82532518&site=ehost-l Killinger, B. (2010) Integrity: doing the right thing for the right reason. 2nd ed. Montreal: McGill-Queen s University Press. http://site.ebrary.com/lib/leicester/doc?id=10577890. Learn Liberty Liberty & Security (no date). http://www.learnliberty.org/videos/liberty-security/. Lloyd s Extraordinary History (7AD). 4/7
https://www.youtube.com/watch?v=ldydehmwbua. Lupton, D. (1999) Chapter of Risk - Introduction, in Risk. London: Routledge, pp. 1 16. http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveservice&pack age_service_id=5665220550002746&institutionid=2746&customerid=2745. Matthews, R. (no date a) Article of Security journal -, Security journal. Basingstoke: Palgrave Macmillan, 1(3), pp. 182 187. Matthews, R. (no date b) Developing More Effective Strategies for Curbing Prostitution. http://www.popcenter.org/problems/street_prostitution/pdfs/matthews.pdf. Mayhew, P. and Howe, M. (2012) Chapter of The reasoning criminologist: essays in honour of Ronald V. Clarke - Situational Crime Prevention The Home Office Origins, in The reasoning criminologist: essays in honour of Ronald V. Clarke. London: Routledge, pp. 15 29. http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveservice&pack age_service_id=5665207150002746&institutionid=2746&customerid=2745. McLaughlin, E. and Newburn, T. (2010) Chapter of The SAGE handbook of criminological theory - Chapter 10: Realist Criminology Revisited, in The SAGE handbook of criminological theory. Los Angeles, Calif: SAGE. http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveservice&pack age_service_id=5665206270002746&institutionid=2746&customerid=2745. Moss, K. (2011) Balancing liberty and security: Human rights, human wrongs. Basingstoke: Palgrave Macmillan. 80230319318. Moss, K. and Gill, M. L. (2008) Security and liberty: Restriction by stealth. Basingstoke: Palgrave Macmillan. 80230583023. Mullins, L. (2013) Chapter of Management and organisational behaviour - Approaches to organisation and management, in Management and organisational behaviour. 10th ed. Harlow: Pearson Education, pp. 77 40. Mullins, L. J. and Christy, G. (2013) Chapter of Management and organisational behaviour - The Nature of Management, in Management and organisational behaviour. 10th ed. Harlow: Pearson Education, pp. 418 512. Newburn, T. (2013) Chapter of Criminology - Chapter 9: The Chicago School, culture and subculture, in Criminology. 2nd ed. London: Routledge, pp. 196 206. Petersen, K. L. (2013) The corporate security professional: A hybrid agent between corporate and national security, Security Journal, 26(3), pp. 222 235. doi: 10.1057/sj.2013.13. Poyner, B. (no date) Lessons from Lisson Green: An Evaluation of Walkway Demolition on 5/7
a British Housing Estate. http://www.popcenter.org/library/crimeprevention/volume_03/05_poyner.pdf. Risk Bites (5AD) Hazard vs Risk - Same Difference? https://www.youtube.com/watch?v=vf-8qksiu7c. Robert K. Yin (1981) The Case Study Crisis: Some Answers, Administrative Science Quarterly, 26(1), pp. 58 65. http://web.a.ebscohost.com.ezproxy4.lib.le.ac.uk/ehost/detail/detail?sid=9d8b6648-ecee-4 657-9183-5fba24eb6fd0%40sessionmgr4002&crlhashurl=login.aspx%253fdirect%253dtru e%2526scope%253dsite%2526db%253dbah%2526an%253d4021475%2526msid%253d6 04013868&hid=4109&vid=0&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=4021475 &db=bah. Schneider, R. (2006) Chapter of The Handbook of Security - Environmental studies and the influence of culture: security consulting experiences in Korea, Japan and Malaysia, in The handbook of security. Basingstoke: Palgrave Macmillan, pp. 41 64. Smith, C. L. and Brooks, D. (2013a) Security science: the theory and practice of security. Oxford: Butterworth-Heinemann. http://ezproxy.lib.le.ac.uk/login?url=http://lib.myilibrary.com?id=424562. Smith, C. L. and Brooks, D. (2013b) Security science: the theory and practice of security. Oxford: Butterworth-Heinemann. http://ezproxy.lib.le.ac.uk/login?url=http://lib.myilibrary.com?id=424562. Talbot, J. (2011) What s right with risk matrices? 31000risk. http://31000risk.wordpress.com/article/what-s-right-with-risk-matrices-3dksezemjiq54-4/. Wakefield, A. (2014) Chapter of Corporate Security in the 21st Century: Theory and Practice in International Perspective - Corporate Security and Enterprise Risk Management, in Walby, K. and Lippert, R. K. (eds) Corporate security in the 21st century: theory and practice in international perspect Basingstoke: Palgrave Macmillan, pp. 235 253. http://ezproxy.lib.le.ac.uk/login?url=http://leicester.eblib.com/patron/fullrecord.aspx?p=1 725804. Wakefield, A. (2014) Chapter of The handbook of security - Professionalization and Security, in The handbook of security. Second edition. Basingstoke: Palgrave Macmillan. https://ebookcentral.proquest.com/lib/leicester/detail.action?docid=4427344. Walklate, S. (2011) Chapter of Criminology: the basics - What is Criminology, in Criminology: the basics. 2nd ed. Abingdon, Oxon: Routledge, pp. 1 28. http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveservice& package_service_id=5665572080002746&institutionid=2746&customerid=2745. Webb, B. (1997) Chapter of Situational crime prevention: successful case studies - Steering Column Locks and Motor Vehicle Theft, in Situational crime prevention: successful case studies. 2nd ed. Monsey, N.Y.: Criminal Justice Press, pp. 46 58. Available at: http://www.popcenter.org/library/crimeprevention/volume_02/04webb.pdf. 6/7
When sustainability means more than green McKinsey & Company (no date). http://www.mckinsey.com/insights/strategy/when_sustainability_means_more_than_green. Williams, K. (2009a) Getting critical. Basingstoke: Palgrave Macmillan. Williams, K. (2009b) Getting critical. Basingstoke: Palgrave Macmillan. Williams, K. (2012) Chapter of Textbook on criminology - Psychological theories of crime, in Textbook on criminology. 7th ed. Oxford: Oxford University Press, pp. 185 231. 7/7