Aas, K.F. (2011) ‘“Crimmigrant” bodies and bona fide travelers: Surveillance, citizenship and global governance’, Theoretical Criminology, 15(3), pp. 331–346. Available at: https://doi.org/10.1177/1362480610396643.
Aas, K.F. (2013a) Globalization & crime. 2nd ed. London: SAGE.
Aas, K.F. (2013b) Globalization & crime. 2nd ed. London: SAGE.
Aas, K.F. and Bosworth, M. (eds) (2013) The borders of punishment: migration, citizenship, and social exclusion. Oxford: Oxford University Press. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1093/acprof:oso/9780199669394.001.0001.
Aas, K.F., Gundhus, H.O. and Lomell, H.M. (2009a) Technologies of inSecurity: the surveillance of everyday life. London: Routledge-Cavendish. Available at: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=355935.
Aas, K.F., Gundhus, H.O. and Lomell, H.M. (2009b) Technologies of inSecurity: the surveillance of everyday life. London: Routledge-Cavendish. Available at: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=355935.
Abrahamsen, R. and Williams, M.C. (2007) ‘Securing the City: Private Security Companies and Non-State Authority in                Global Governance’, International Relations, 21(2), pp. 237–253. Available at: https://doi.org/10.1177/0047117807077006.
Abrahamsen, R., Williams, M.C., and Ebooks Corporation Limited (2011) Security beyond the state: private security in international politics. Cambridge: Cambridge University Press. Available at: http://www.GLA.eblib.com/patron/FullRecord.aspx?p=647387.
Ahmed, S. (2015) ‘The ‘emotionalization of the "war on terror”’: Counter-terrorism, fear, risk, insecurity and helplessness’, Criminology & Criminal Justice, 15(5), pp. 545–560. Available at: https://doi.org/10.1177/1748895815572161.
Akhgar, B., Staniforth, A. and Bosco, F. (2014a) Cyber crime and cyber terrorism investigator’s handbook. Waltham, MA: Syngress. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://www.sciencedirect.com/science/book/9780128007433.
Akhgar, B., Staniforth, A. and Bosco, F. (2014b) Cyber crime and cyber terrorism investigator’s handbook. Waltham, MA: Syngress. Available at: http://ezproxy.lib.gla.ac.uk/login?url=http://www.sciencedirect.com/science/book/9780128007433.
Almond, P. and van Erp, J. (2018) ‘Regulation and governance versus criminology: Disciplinary divides, intersections, and opportunities’, Regulation & Governance [Preprint]. Available at: https://doi.org/10.1111/rego.12202.
American Society of Criminology and William S. Hein & Company (no date) ‘Criminology’. Available at: https://eleanor.lib.gla.ac.uk/record=b2198168.
Amicelle, A. et al. (2017) ‘Criminology in the face of flows: reflections on contemporary policing and security’, Global Crime, 18(3), pp. 165–175. Available at: https://doi.org/10.1080/17440572.2017.1350427.
Aradau, C. and van Munster, R. (2009) ‘Exceptionalism and the “War on Terror”: Criminology Meets International Relations’, British Journal of Criminology, 49(5), pp. 686–701. Available at: https://doi.org/10.1093/bjc/azp036.
Arrigo, B.A. and Bersot, H.Y. (2014a) The Routledge handbook of international crime and justice studies. Abingdon, Oxon: Routledge.
Arrigo, B.A. and Bersot, H.Y. (2014b) The Routledge handbook of international crime and justice studies. Abingdon, Oxon: Routledge.
Australian and New Zealand Society of Criminology, EBSCO Publishing (Firm), and Thomson Gale (Firm) (no date) ‘The Australian & New Zealand journal of criminology’. Available at: https://eleanor.lib.gla.ac.uk/record=b2196308.
Awan, I. and Blakemore, B. (eds) (2016) Extremism, counter-terrorism and policing. London: Routledge.
Baldwin, D.A. (1997) ‘The Concept of Security’, Review of International Studies, 23(1), pp. 5–26. Available at: http://ezproxy.lib.gla.ac.uk/login?url=http://www.jstor.org/stable/20097464.
Ball, K.S. (2001) ‘Surveillance Society: Monitoring Everyday Life’, Information Technology & People, 14(4), pp. 406–419. Available at: https://doi.org/10.1108/itp.2001.14.4.406.5.
Balzacq, T. (2011) Securitization theory: how security problems emerge and dissolve. Abingdon, Oxon: Routledge. Available at: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=574521.
Beck, U. (1992) Risk society: towards a new modernity. London: Sage. Available at: http://web.b.ebscohost.com.ezproxy.lib.gla.ac.uk/ehost/detail/detail?vid=0&sid=b07b5d4e-7145-4d24-a434-f217f8fa1fcc%40pdc-v-sessmgr01&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=53304&db=nlebk.
Bennett, C.J. and Haggarty, K.D. (2011a) Security games: surveillance and control at mega-events. Abingdon, Oxon: Routledge.
Bennett, C.J. and Haggarty, K.D. (2011b) Security games: surveillance and control at mega-events. Abingdon, Oxon: Routledge.
Bennett, C.J. and Haggarty, K.D. (2011c) Security games: surveillance and control at mega-events. Abingdon, Oxon: Routledge.
Bennett, C.J. and Haggarty, K.D. (2011d) Security games: surveillance and control at mega-events. Abingdon, Oxon: Routledge.
Bennett Moses, L. and Chan, J. (2018) ‘Algorithmic prediction in policing: assumptions, evaluation, and accountability’, Policing and Society, 28(7), pp. 806–822. Available at: https://doi.org/10.1080/10439463.2016.1253695.
Berg, J. (2010) ‘Seeing like private security: Evolving mentalities of public space protection in South Africa’, Criminology & Criminal Justice, 10(3), pp. 287–301. Available at: https://doi.org/10.1177/1748895810370315.
Bigo, D. (2016) ‘Rethinking Security at the Crossroad of International Relations and Criminology’, British Journal of Criminology, 56(6), pp. 1068–1086. Available at: https://doi.org/10.1093/bjc/azw062.
Bosworth, M. (2008) ‘Border Control and the Limits of the Sovereign State’, Social & Legal Studies, 17(2), pp. 199–215. Available at: https://doi.org/10.1177/0964663908089611.
Bowling, B. and Sheptycki, J.W.E. (2012) Global policing. London: SAGE.
Bowling, B. and Westenra, S. (2018) ‘“A really hostile environment”: Adiaphorization, global policing and the crimmigration control system’, Theoretical Criminology [Preprint]. Available at: https://doi.org/10.1177/1362480618774034.
Boyle, P. and Haggerty, K. (2009) ‘Privacy games: the Vancouver Olympics, privacy and surveillance. A report to the Office of the Privacy Commissioner of Canada under the Contributions Program’. Available at: http://www.sscqueens.org/sites/default/files/Privacy%20Games.pdf.
Boyle, Philip and Haggerty, K.D. (2009) ‘Spectacular Security: Mega-Events and the Security Complex’, International Political Sociology, 3(3), pp. 257–274. Available at: https://doi.org/10.1111/j.1749-5687.2009.00075.x.
Brenner, S.W. (2007) ‘Private-Public Sector Cooperation in Combating Cybercrime: In Search of a Model’, Journal of International Commercial Law and Technology [Preprint], (2). Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://heinonline.org/HOL/P?h=hein.journals/jcolate2&i=58.
Brewer, R. (2017) ‘The malleable character of brokerage and crime control: a study of policing, security and network entrepreneurialism on Melbourne’s waterfront’, Policing and Society, 27(7), pp. 712–731. Available at: https://doi.org/10.1080/10439463.2015.1051047.
Briggs, D. (2014) ‘Violence, Global Unrest and Advanced Capitalism’, Contention, 2(2). Available at: https://doi.org/10.3167/cont.2014.020206.
Brisman, A. and South, N. (2015) ‘New "Folk Devils,” Denials and Climate Change: Applying the Work of Stanley Cohen to Green Criminology and Environmental Harm’, Critical Criminology, 23(4), pp. 449–460. Available at: https://doi.org/10.1007/s10612-015-9288-1.
Brisman, A., South, N. and White, R. (eds) (2015a) Environmental crime and social conflict: contemporary and emerging issues. Farnham, Surrey: Ashgate Publishing Limited.
Brisman, A., South, N. and White, R. (eds) (2015b) Environmental crime and social conflict: contemporary and emerging issues. Farnham, Surrey: Ashgate Publishing Limited.
Brisman, A., South, N. and White, R. (eds) (2015c) Environmental crime and social conflict: contemporary and emerging issues. Farnham, Surrey: Ashgate Publishing Limited.
British Society of Criminology (no date) ‘Criminology & criminal justice: CCJ.’ Available at: https://eleanor.lib.gla.ac.uk/record=b2318605.
British Society of Criminology (BSC) (no date). Available at: http://www.britsoccrim.org/.
Brodeur, J.-P. and Oxford University Press (2010) The policing web. New York: Oxford University Press. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1093/acprof:oso/9780199740598.001.0001.
Brouwer, J., Van Der Woude, M. and Van Der Leun, J. (2017) ‘Border policing, procedural justice and belonging: the legitimacy of (cr)immigration controls in border areas’, The British Journal of Criminology [Preprint]. Available at: https://doi.org/10.1093/bjc/azx050.
Brouwer, J., van der Woude, M. and van der Leun, J. (2018) ‘(Cr)immigrant framing in border areas: decision-making processes of Dutch border police officers’, Policing and Society, 28(4), pp. 448–463. Available at: https://doi.org/10.1080/10439463.2017.1288731.
Büscher, B. and Ramutsindela, M. (2015) ‘GREEN VIOLENCE: RHINO POACHING AND THE WAR TO SAVE SOUTHERN AFRICA’S PEACE PARKS’, African Affairs [Preprint]. Available at: https://doi.org/10.1093/afraf/adv058.
Campbell, E. (2016) ‘Policing paedophilia: Assembling bodies, spaces and things’, Crime, Media, Culture: An International Journal, 12(3), pp. 345–365. Available at: https://doi.org/10.1177/1741659015623598.
Chang, L.Y.C., Zhong, L.Y. and Grabosky, P.N. (2018) ‘Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime’, Regulation & Governance, 12(1), pp. 101–114. Available at: https://doi.org/10.1111/rego.12125.
Clark, R.M. and Hakim, S. (eds) (2017) Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level. Cham: Springer International Publishing. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-3-319-32824-9.
Clément, D. (2017) ‘The Transformation of Security Planning for the Olympics: The 1976 Montreal Games’, Terrorism and Political Violence, 29(1), pp. 27–51. Available at: https://doi.org/10.1080/09546553.2014.987342.
Clement, M. and SpringerLink (Online service) (2017a) A People’s History of Riots, Protest and the Law: The Sound of the Crowd. London: Palgrave Macmillan UK. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1057/978-1-137-52751-6.
Clement, M. and SpringerLink (Online service) (2017b) A People’s History of Riots, Protest and the Law: The Sound of the Crowd. London: Palgrave Macmillan UK. Available at: http://ezproxy.lib.gla.ac.uk/login?url=http://dx.doi.org/10.1057/978-1-137-52751-6.
Coleman, R. (2004) Reclaiming the streets: surveillance, social control, and the city. Cullompton: Willan.
Collins, A. (2016) Contemporary security studies. Fourth edition. Oxford, United Kingdom: Oxford University Press.
Crawford, A. and Hutchinson, S. (2016a) ‘Mapping the Contours of “Everyday Security”: Time, Space and Emotion’, British Journal of Criminology, 56(6), pp. 1184–1202. Available at: https://doi.org/10.1093/bjc/azv121.
Crawford, A. and Hutchinson, S. (2016b) ‘The Future(s) of Security Studies’, British Journal of Criminology, 56(6), pp. 1049–1067. Available at: https://doi.org/10.1093/bjc/azw070.
Crook, M., Short, D. and South, N. (2018) ‘Ecocide, genocide, capitalism and colonialism: Consequences for indigenous peoples and glocal ecosystems environments’, Theoretical Criminology, 22(3), pp. 298–317. Available at: https://doi.org/10.1177/1362480618787176.
David Seddon and Leo Zeilig (2005) ‘Class & Protest in Africa: New Waves’, Review of African Political Economy, 32(103), pp. 9–27. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/4006907.
Davies, G. and Dawson, S.E. (2018) ‘Spoonful of sugar or strong medicine: “Meet and Greet” as a strategy for policing large-scale public events’, Policing and Society, 28(6), pp. 697–711. Available at: https://doi.org/10.1080/10439463.2016.1259317.
Dean, M. (2010) ‘Power at the heart of the present: Exception, risk and sovereignty’, European Journal of Cultural Studies, 13(4), pp. 459–475. Available at: https://doi.org/10.1177/1367549410377147.
Diphoorn, T. and Berg, J. (2014) ‘Typologies of partnership policing: case studies from urban South Africa’, Policing and Society, 24(4), pp. 425–442. Available at: https://doi.org/10.1080/10439463.2013.864500.
Dixon, B. (2015) ‘A Violent Legacy: Policing Insurrection in South Africa From Sharpeville to Marikana’, British Journal of Criminology, 55(6), pp. 1131–1148. Available at: https://doi.org/10.1093/bjc/azv056.
Dupont, B. (2004) ‘Security in the age of networks’, Policing and Society, 14(1), pp. 76–91. Available at: https://doi.org/10.1080/1043946042000181575.
Ebooks Corporation Limited (2014) Crime: local and global. Edited by J. Muncie, D. Talbot, and R. Walters. London: Routledge. Available at: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=1694458.
Ebooks Corporation Limited (2016) The SAGE handbook of global policing. Edited by B. Bradford et al. Thousand Oaks, California: SAGE Publications, Inc. Available at: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=4612336.
EBSCO Publishing (Firm) (no date) ‘Studies in conflict and terrorism’. Available at: https://eleanor.lib.gla.ac.uk/record=b2205534.
Edwards, A. and Gill, P. (2003) Transnational organised crime: perspectives on global security. London: Routledge.
Edwards, S.M., Edwards, T.D. and Fields, C.B. (1996) Environmental crime and criminality: theoretical and practical issues. New York, NY: Routledge.
Ellefsen, R. (2018) ‘Relational dynamics of protest and protest policing: strategic interaction and the coevolution of targeting strategies’, Policing and Society, 28(7), pp. 751–767. Available at: https://doi.org/10.1080/10439463.2016.1262366.
Elliott, L.M. and Schaedla, W.H. (eds) (2018) Handbook of transnational environmental crime. Cheltenham, UK: Edward Elgar Publishing.
Ericson, R.V. and Haggerty, K.D. (2006) The new politics of surveillance and visibility. Toronto, ON: University of Toronto Press.
European Society of Criminology and William S. Hein & Company (no date) ‘European journal of criminology’. Available at: https://eleanor.lib.gla.ac.uk/record=b2465978.
Field, A. (2016) ‘Ethics and entrapment: Understanding counterterrorism stings’, Terrorism and Political Violence, pp. 1–17. Available at: https://doi.org/10.1080/09546553.2016.1213721.
Fonio, C. and Pisapia, G. (2015) ‘Security, surveillance and geographical patterns at the 2010 FIFA World Cup in Johannesburg’, The Geographical Journal, 181(3), pp. 242–248. Available at: https://doi.org/10.1111/geoj.12089.
Fussey, P. et al. (2011) Securing and sustaining the Olympic city: reconfiguring London for 2012 and beyond. Farnham, Surrey: Ashgate. Available at: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=665327.
Fussey, P. (2015) ‘Command, control and contestation: negotiating security at the London 2012 Olympics’, The Geographical Journal, 181(3), pp. 212–223. Available at: https://doi.org/10.1111/geoj.12058.
Fussey, P. and Ebooks Corporation Limited (2011) Securing and sustaining the Olympic city: reconfiguring London for 2012 and beyond. Farnham, Surrey: Ashgate. Available at: http://www.GLA.eblib.com/patron/FullRecord.aspx?p=665327.
Fussey, P. and Klauser, F. (2015) ‘Securitisation and the mega-event: an editorial introduction’, The Geographical Journal, 181(3), pp. 194–198. Available at: https://doi.org/10.1111/geoj.12101.
Garner, S. (2015) ‘Crimmigration’, Sociology of Race and Ethnicity, 1(1), pp. 198–203. Available at: https://doi.org/10.1177/2332649214561479.
Geers, K. (2010) ‘The challenge of cyber attack deterrence’, Computer Law & Security Review, 26(3), pp. 298–303. Available at: https://doi.org/10.1016/j.clsr.2010.03.003.
Giacomello, G. (ed.) (2016) Security in cyberspace: targeting nations, infrastructures, individuals. London: Bloomsbury.
Gill, M. (2013) ‘Engaging the corporate sector in policing: Realities and opportunities’, Policing, 7(3), pp. 273–279. Available at: https://doi.org/10.1093/police/pat009.
Giulianotti, R. et al. (2015) ‘Global sport mega-events and the politics of mobility: the case of the London 2012 Olympics’, The British Journal of Sociology, 66(1), pp. 118–140. Available at: https://doi.org/10.1111/1468-4446.12103.
Goldstein, D.M. (2010) ‘Toward a Critical Anthropology of Security’, Current Anthropology, 51(4), pp. 487–517. Available at: https://doi.org/10.1086/655393.
Goold, B.J., Lazarus, L., and Colloquium on Security and Human Rights (2007) Security and human rights. Oxford: Hart.
Goold, B.J. and Neyland, D. (2009) New directions in surveillance and privacy. Cullompton, Devon: Willan.
Haggerty, K.D. and Ericson, R.V. (2000) ‘The surveillant assemblage’, British Journal of Sociology, 51(4), pp. 605–622. Available at: https://doi.org/10.1080/00071310020015280.
Hall, M. (ed.) (2017) Greening criminology in the 21st century: contemporary debates and future directions in the study of environmental harm. London: Routledge, Taylor & Francis Group.
Hamilton, C. and Berlusconi, G. (2018) ‘Contagion, counterterrorism and criminology: The Case of France’, Criminology & Criminal Justice, 18(5), pp. 568–584. Available at: https://doi.org/10.1177/1748895817751829.
Hansen Löfstrand, C., Loftus, B. and Loader, I. (2016) ‘Doing “dirty work”: Stigma and esteem in the private security industry’, European Journal of Criminology, 13(3), pp. 297–314. Available at: https://doi.org/10.1177/1477370815615624.
Hansen Löfstrand, C., Loftus, B. and Loader, I. (2018) ‘Private security as moral drama: a tale of two scandals’, Policing and Society, 28(8), pp. 968–984. Available at: https://doi.org/10.1080/10439463.2017.1348354.
Henry, A., Smith, D.J., and University of Edinburgh. Centre for Law and Society (2007) Transformations of policing. Aldershot: Ashgate.
Hepple, B.A., Le Roux, R. and Sciarra, S. (eds) (2015) Laws against strikes: the South African experience in an international and comparative perspective. Milano, Italy: FrancoAngeli.
Hiller, Harry H.1 hiller@ucalgary.ca (2000) ‘Mega-Events, Urban Boosterism and Growth Strategies: An Analysis of the Objectives and Legitimations of the Cape Town 2004 Olympic Bid.’, International Journal of Urban & Regional Research, 24(2). Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=sih&AN=3273340&site=ehost-live.
Hope, T. and Sparks, R. (2000) Crime, risk and insecurity: law and order in everyday life and political discourse. London: Routledge.
Hough, P. (2013) Understanding global security. 3rd ed. Abingdon: Routledge.
Hudson, B. (2009) ‘Justice in a time of terror’, The British Journal of Criminology, 49(5), pp. 702–717. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/23639187.
Huey, L., Nhan, J. and Broll, R. (2013) ‘“Uppity civilians” and “cyber-vigilantes”: The role of the general public in policing cyber-crime’, Criminology & Criminal Justice, 13(1), pp. 81–97. Available at: https://doi.org/10.1177/1748895812448086.
Huysmans, J., Dobson, A. and Prokhovnik, R. (2006) The politics of protection: sites of insecurity and political agency. 1st ed. London: Routledge.
Institute for the Study and Treatment of Delinquency (Great Britain) et al. (no date) ‘British journal of criminology’. Available at: https://eleanor.lib.gla.ac.uk/record=b2196820.
Jansson, J. (2018) ‘Building resilience, demolishing accountability? The role of Europol in counter-terrorism’, Policing and Society, 28(4), pp. 432–447. Available at: https://doi.org/10.1080/10439463.2016.1191485.
Jewkes, Y. and Yar, M. (2011a) Handbook of internet crime. Abingdon, Oxon: Routledge. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://www.routledgehandbooks.com/doi/10.4324/9781843929338.
Jewkes, Y. and Yar, M. (2011b) Handbook of internet crime. Abingdon, Oxon: Routledge. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://www.routledgehandbooks.com/doi/10.4324/9781843929338.
Johnson, M. (2013) Cyber crime, security and digital intelligence. Farnham, Surrey, England: Gower.
Johnston, L. and Shearing, C.D. (2003a) Governing security: explorations in policing and justice. Abingdon, Oxon: Routledge.
Johnston, L. and Shearing, C.D. (2003b) Governing security: explorations in policing and justice. Abingdon, Oxon: Routledge.
Jones, T., Newburn, T., and Oxford University Press (1998) Private security and public policing. London: Policy Studies Institute. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1093/acprof:oso/9780198265696.001.0001.
Journès, C. (1998) ‘Policing and security: Terrorists and hooligans’, Culture, Sport, Society, 1(2), pp. 145–160. Available at: https://doi.org/10.1080/14610989808721820.
LaFree, G. and Freilich, J.D. (2017) The  handbook of the criminology of terrorism. Chichester, West Sussex: Wiley-Blackwell.
Leman-Langlois, S. et al. (2009) ‘Human rights implications of new developments in policing’. International Council on Human Rights Policy. Available at: https://www.researchgate.net/publication/242544542_Human_Rights_Implications_of_New_Developments_in_Policing.
Loader, I. and Walker, N. (2007) Civilizing security. Cambridge: Cambridge University Press. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://doi.org/10.1017/CBO9780511611117.
Loader, I. and White, A. (2017) ‘How can we better align private security with the public interest? Towards a civilizing model of regulation’, Regulation & Governance, 11(2), pp. 166–184. Available at: https://doi.org/10.1111/rego.12109.
Loader, I. and White, A. (2018) ‘Valour for Money? Contested Commodification in the Market for Security’, The British Journal of Criminology, 58(6), pp. 1401–1419. Available at: https://doi.org/10.1093/bjc/azy004.
Lyon, D. (1994) The electronic eye: the rise of surveillance society. Cambridge: Polity Press.
Lyon, D. (2001) Surveillance society: monitoring everyday life. Buckingham: Open University Press.
Lyon, D. (2003) Surveillance as social sorting: privacy, risk, and digital discrimination. New York: Routledge.
Lyon, D. (2006) Theorizing surveillance: the panopticon and beyond. Cullompton, Devon: Willan Publishing.
Lyon, D. (2015a) Surveillance after Snowden. Cambridge: Polity Press.
Lyon, D. (2015b) ‘The Snowden Stakes: Challenges for Understanding Surveillance Today.’, Surveillance & Society, 13(2), pp. 139–152. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=sih&AN=108472374&site=ehost-live.
Maguire, E. et al. (2018) ‘Attitudes towards the Use of Violence against Police among Occupy Wall Street Protesters’, Policing: A Journal of Policy and Practice [Preprint]. Available at: https://doi.org/10.1093/police/pay003.
Maguire, M., Morgan, R. and Reiner, R. (2012) The Oxford handbook of criminology. 5th ed. Oxford: Oxford University Press.
Massé, F. and Lunstrum, E. (2016) ‘Accumulation by securitization: Commercial poaching, neoliberal conservation, and the creation of new wildlife frontiers’, Geoforum, 69, pp. 227–237. Available at: https://doi.org/10.1016/j.geoforum.2015.03.005.
Matheson, C. (2010) ‘Legacy Planning, Regeneration and Events: The Glasgow 2014 Commonwealth Games’, Local Economy, 25(1), pp. 10–23. Available at: https://doi.org/10.1080/02690940903545364.
McClanahan, B. and Brisman, A. (2015) ‘Climate Change and Peacemaking Criminology: Ecophilosophy, Peace and Security in the "War on Climate Change”’, Critical Criminology, 23(4), pp. 417–431. Available at: https://doi.org/10.1007/s10612-015-9291-6.
McCulloch, J. and Pickering, S. (2009) ‘Pre-Crime and Counter-Terrorism: Imagining Future Crime in the “War on Terror”’, British Journal of Criminology, 49(5), pp. 628–645. Available at: https://doi.org/10.1093/bjc/azp023.
McLaughlin, E. and Muncie, J. (2013) The Sage dictionary of criminology. 3rd ed. London: SAGE.
Milivojevic, S. (2018) ‘“Stealing the fire”, 2.0 style? Technology, the pursuit of mobility, social memory and de-securitization of migration’, Theoretical Criminology [Preprint]. Available at: https://doi.org/10.1177/1362480618806921.
Monahan, T. (2010a) Surveillance in the time of insecurity. New Brunswick, N.J.: Rutgers University Press. Available at: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=3032155.
Monahan, T. (2010b) Surveillance in the time of insecurity. New Brunswick, NJ: Rutgers University Press.
Mythen, G. and Walklate, S. (2006) ‘Criminology and Terrorism: Which Thesis? Risk Society or Governmentality?’, The British Journal of Criminology, 46(3), pp. 379–398. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/23639354.
Mythen, G. and Walklate, S. (2016) ‘Counterterrorism and the Reconstruction of (In)Security: Divisions, Dualisms, Duplicities’, British Journal of Criminology, 56(6), pp. 1107–1124. Available at: https://doi.org/10.1093/bjc/azw030.
Mythen, G., Walklate, S. and Khan, F. (2009) ‘“I’m a Muslim, but I’m not a terrorist”: victimization, risk identities and the performance of safety’, The British Journal of Criminology, 49(6), pp. 736–754. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/23639597.
National Strategy Information Center, EBSCO Publishing (Firm), and SpringerLink (Online service) (no date) ‘Trends in organized crime’. Available at: https://eleanor.lib.gla.ac.uk/record=b2300851.
Newburn, T. (2003) Handbook of policing. Cullompton: Willan.
Newburn, T. (2008) Handbook of policing. 2nd ed. Cullompton, Devon: Willan Pub.
Newman, E. (2016) ‘Human Security: Reconciling Critical Aspirations With Political “Realities”’, British Journal of Criminology, 56(6), pp. 1165–1183. Available at: https://doi.org/10.1093/bjc/azw016.
Nhan, J., Huey, L. and Broll, R. (2015) ‘Digilantism: An Analysis of Crowdsourcing and the Boston Marathon Bombings’, British Journal of Criminology [Preprint]. Available at: https://doi.org/10.1093/bjc/azv118.
Nurse, A. (2013) ‘Privatising the green police: the role of NGOs in wildlife law enforcement’, Crime, Law and Social Change, 59(3), pp. 305–318. Available at: https://doi.org/10.1007/s10611-013-9417-2.
Palmer, D., Berlin, M.M. and Das, D.K. (2012) Global environment of policing. Boca Raton, FL: CRC Press.
Pete Fussey (2007) ‘An interrupted transmission? Processes of CCTV implementation and the impact of human agency’, Surveillance & Society, 4(3), pp. 229–256. Available at: https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3449.
Peterson, A. (2016) The policing of transnational protest. London: Routledge.
‘Policing’ (no date). Available at: https://eleanor.lib.gla.ac.uk/record=b2697397.
‘Policing & society’ (no date). Available at: https://eleanor.lib.gla.ac.uk/record=b2229231.
della Porta, D. and Zamponi, L. (2013) ‘Protest and policing on October 15th, global day of action: the Italian case’, Policing and Society, 23(1), pp. 65–80. Available at: https://doi.org/10.1080/10439463.2012.727596.
Pritchard, D. and Pakes, F.J. (eds) (2014a) Riot, unrest and protest on the global stage. Basingstoke, Hampshire: Palgrave Macmillan.
Pritchard, D. and Pakes, F.J. (eds) (2014b) Riot, unrest and protest on the global stage. Basingstoke, Hampshire: Palgrave Macmillan.
‘Punishment & society’ (no date). Available at: https://eleanor.lib.gla.ac.uk/record=b2204620.
Reichel, P.L. and Albanese, J.S. (2014) Handbook of transnational crime and justice. Second edition. Los Angeles, California: SAGE Publications, Inc.
Richards, A., Fussey, P. and Silke, A. (2011) Terrorism and the Olympics: major event security and lessons for the future. London: Routledge.
Sanders, C.B., Weston, C. and Schott, N. (2015) ‘Police Innovations, “Secret Squirrels” and Accountability: Empirically Studying Intelligence-led Policing in Canada’, British Journal of Criminology, 55(4), pp. 711–729. Available at: https://doi.org/10.1093/bjc/azv008.
Schreiber, M. and Adang, O. (2010) ‘Fiction, facts and a summer’s fairy tale – mixed messages at the World Cup 2006’, Policing and Society, 20(2), pp. 237–255. Available at: https://doi.org/10.1080/10439461003768029.
Schuilenburg, M., Hall, G. and Garland, D. (2018) The securitization of society: crime, risk and social order. New York: New York University Press.
Scottish Centre for Crime and Justice Research (no date). Available at: http://www.sccjr.ac.uk/.
Shearing, C. (2015) ‘Criminology and the Anthropocene’, Criminology & Criminal Justice, 15(3), pp. 255–269. Available at: https://doi.org/10.1177/1748895815584712.
Sheptycki, J.W.E. and Wardak, A. (2005) Transnational and comparative criminology. London: GlassHouse. Available at: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=220151.
Shigetomi, S., Makino, K., and Nihon Bo+ѕeki Shinko+ѕ Kiko+ѕ (2009) Protest and social movements in the developing world. Cheltenham (UK): Edward Elgar.
Smyth, M. (2012) The Ashgate research companion to political violence. Burlington, VT: Ashgate.
Spapens, A.C., White, R.D. and Kluin, M. (eds) (2017a) Environmental crime and its victims: perspectives within green criminology. London: Routledge.
Spapens, A.C., White, R.D. and Kluin, M. (eds) (2017b) Environmental crime and its victims: perspectives within green criminology. London: Routledge.
SpringerLink (Online service) (2017) Cybercrime, Organized Crime, and Societal Responses: International Approaches. Edited by E.C. Viano. Cham: Springer International Publishing. Available at: http://ezproxy.lib.gla.ac.uk/login?url=http://dx.doi.org/10.1007/978-3-319-44501-4.
Stanley, J. and Steinhardt, B. (2003) ‘Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society’. Available at: https://www.aclu.org/files/FilesPDFs/aclu_report_bigger_monster_weaker_chains.pdf.
Stenning, P. (2009) ‘Governance and Accountability in a Plural Policing Environment--the Story so Far’, Policing, 3(1), pp. 22–33. Available at: https://doi.org/10.1093/police/pan080.
STODDART, K. (2016) ‘UK cyber security and critical national infrastructure protection’, International Affairs, 92(5), pp. 1079–1105. Available at: https://doi.org/10.1111/1468-2346.12706.
Stott, C., West, O. and Radburn, M. (2018) ‘Policing football “risk”? A participant action research case study of a liaison-based approach to “public order”’, Policing and Society, 28(1), pp. 1–16. Available at: https://doi.org/10.1080/10439463.2015.1126267.
Stumpf, J. (2006) ‘The Crimmigration Crisis: Immigrants, Crime, and Sovereign Power’, American University Law Review, 56(2), pp. 367, – 419. Available at: http://ezproxy.lib.gla.ac.uk/login?url=http://heinonline.org/HOL/Page?public=false&handle=hein.journals/aulr56&id=379.
Surveillance Studies Network and EBSCO Publishing (Firm) (no date) ‘Surveillance & society’. Available at: https://eleanor.lib.gla.ac.uk/record=b2589307.
‘Terrorism and political violence’ (no date). Available at: https://eleanor.lib.gla.ac.uk/record=b2229383.
The Routledge handbook on crime and international migration. 1st ed (2015). New York: Routledge.
The Surveillance Studies Centre, Queen’s University, Canada (no date). Available at: http://www.sscqueens.org/.
‘Theoretical criminology’ (no date). Available at: https://eleanor.lib.gla.ac.uk/record=b2205724.
Titeca, K. (2019) ‘Illegal Ivory Trade as Transnational Organized Crime? an Empirical Study Into Ivory Traders in Uganda’, The British Journal of Criminology, 59(1), pp. 24–44. Available at: https://doi.org/10.1093/bjc/azy009.
Treadwell, J. (2012) ‘From the car boot to booting it up? eBay, online counterfeit crime and the transformation of the criminal marketplace’, Criminology & Criminal Justice, 12(2), pp. 175–191. Available at: https://doi.org/10.1177/1748895811428173.
‘Uncertain Governance and Resilient Subjects in the Risk Society’ (2012) Oñati Socio-Legal Series, 3(2). Available at: http://opo.iisj.net/index.php/osls/article/view/183.
Valverde, M. (2011) ‘Questions of security: A framework for research’, Theoretical Criminology, 15(1), pp. 3–22. Available at: https://doi.org/10.1177/1362480610382569.
Verma, A. and Varma, V. (2018) ‘Policing Non-Violent Crowds: Lessons from Kumbh Mela in India’, Policing: A Journal of Policy and Practice [Preprint]. Available at: https://doi.org/10.1093/police/pay012.
Viano, E.C. (ed.) (2017) Cybercrime, Organized Crime, and Societal Responses: International Approaches. Cham: Springer International Publishing. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-3-319-44501-4.
Virta, S. and Branders, M. (2016) ‘Legitimate Security? Understanding the Contingencies of Security and Deliberation’, British Journal of Criminology, 56(6), pp. 1146–1164. Available at: https://doi.org/10.1093/bjc/azw024.
Walklate, S. and Mythen, G. (2008) ‘How scared are we?’, The British Journal of Criminology, 48(2), pp. 209–225. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/23639235.
Walsh, J. (2017) ‘Moral panics by design: The case of terrorism’, Current Sociology, 65(5), pp. 643–662. Available at: https://doi.org/10.1177/0011392116633257.
Walsh, J. (2018) ‘Report and deport: Public vigilance and migration policing in Australia’, Theoretical Criminology [Preprint]. Available at: https://doi.org/10.1177/1362480618756363.
Weber, L. and Bowling, B. (2008) ‘Valiant beggars and global vagabonds’, Theoretical Criminology, 12(3), pp. 355–375. Available at: https://doi.org/10.1177/1362480608093311.
Weber, L., Fishwick, E. and Marmo, M. (eds) (2017) The Routledge international handbook of criminology and human rights. London: Routledge, Taylor & Francis Group.
White, A. (2014) ‘Post-crisis Policing and Public–Private Partnerships’, British Journal of Criminology, 54(6), pp. 1002–1022. Available at: https://doi.org/10.1093/bjc/azu063.
White, A. (2018) ‘What is the Privatization of Policing?’, Policing: A Journal of Policy and Practice [Preprint]. Available at: https://doi.org/10.1093/police/pay085.
White, R.D. (2009) Environmental crime: a reader. Cullompton: Willan.
White, R.D. (2014) Environmental crime: a reader. Abingdon, Oxon: Routledge.
Wichita State University. Department of Administration of Justice (no date) ‘International journal of comparative and applied criminal justice’. Available at: https://eleanor.lib.gla.ac.uk/record=b2916914.
William S. Hein & Company (no date) ‘Social & legal studies’. Available at: https://eleanor.lib.gla.ac.uk/record=b2205295.
Williams, P.D. and McDonald, M. (eds) (2018) Security studies: an introduction. Third edition. London: Routledge. Available at: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=5295090.
Wonders, N.A. and Jones, L.C. (2018) ‘Doing and undoing borders: The multiplication of citizenship, citizenship performances, and migration as social movement’, Theoretical Criminology [Preprint]. Available at: https://doi.org/10.1177/1362480618802297.
Wood, J. and Dupont, B. (2006) Democracy, Society and the Governance of Security. Cambridge: Cambridge University Press. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1017/CBO9780511489358.
Wood, J. and Shearing, C.D. (2011a) Imagining security. Abingdon, Oxon: Routledge.
Wood, J. and Shearing, C.D. (2011b) Imagining security. Abingdon, Oxon: Routledge.
Wright, D. and Kreissl, R. (2015) Surveillance in Europe. London: Routledge.
Yarwood, R. and Paasche, T. (2015) ‘The Relational Geographies of Policing and Security’, Geography Compass, 9(6), pp. 362–370. Available at: https://doi.org/10.1111/gec3.12216.
Zedner, L. (2003) ‘The concept of security: an agenda for comparative analysis’, Legal Studies, 23(01), pp. 153–176. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://onlinelibrary.wiley.com/doi/10.1111/j.1748-121X.2003.tb00209.x/abstract.
Zedner, L. (2005) ‘Securing Liberty in the Face of Terror: Reflections from Criminal Justice’, Journal of Law and Society, 32(4), pp. 507–533. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/3557249.
Zedner, L. (2006) ‘Liquid security’, Criminology & Criminal Justice, 6(3), pp. 267–288. Available at: https://doi.org/10.1177/1748895806065530.
Zedner, L. (2009a) Security. Abingdon, Oxon: Routledge.
Zedner, L. (2009b) Security. Abingdon, Oxon: Routledge.
Zedner, L. (2010) ‘Security, the State, and the Citizen: The Changing Architecture of Crime Control’, New Criminal Law Review, 13(2), pp. 379–403. Available at: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/10.1525/nclr.2010.13.2.379.
Zureik, E. and Salter, M.B. (2005) Global surveillance and policing: borders, security, identity. Cullompton: Willan.