[1]
Aas, K.F. 2011. ‘Crimmigrant’ bodies and bona fide travelers: Surveillance, citizenship and global governance. Theoretical Criminology. 15, 3 (2011), 331–346. DOI:https://doi.org/10.1177/1362480610396643.
[2]
Aas, K.F. 2013. Globalization & crime. SAGE.
[3]
Aas, K.F. 2013. Globalization & crime. SAGE.
[4]
Aas, K.F. et al. 2009. Technologies of inSecurity: the surveillance of everyday life. Routledge-Cavendish.
[5]
Aas, K.F. et al. 2009. Technologies of inSecurity: the surveillance of everyday life. Routledge-Cavendish.
[6]
Aas, K.F. and Bosworth, M. eds. 2013. The borders of punishment: migration, citizenship, and social exclusion. Oxford University Press.
[7]
Abrahamsen, R. et al. 2011. Security beyond the state: private security in international politics. Cambridge University Press.
[8]
Abrahamsen, R. and Williams, M.C. 2007. Securing the City: Private Security Companies and Non-State Authority in                Global Governance. International Relations. 21, 2 (Jun. 2007), 237–253. DOI:https://doi.org/10.1177/0047117807077006.
[9]
Ahmed, S. 2015. The ‘emotionalization of the "war on terror”’: Counter-terrorism, fear, risk, insecurity and helplessness. Criminology & Criminal Justice. 15, 5 (2015), 545–560. DOI:https://doi.org/10.1177/1748895815572161.
[10]
Akhgar, B. et al. 2014. Cyber crime and cyber terrorism investigator’s handbook. Syngress.
[11]
Akhgar, B. et al. 2014. Cyber crime and cyber terrorism investigator’s handbook. Syngress.
[12]
Almond, P. and van Erp, J. 2018. Regulation and governance versus criminology: Disciplinary divides, intersections, and opportunities. Regulation & Governance. (Jul. 2018). DOI:https://doi.org/10.1111/rego.12202.
[13]
American Society of Criminology and William S. Hein & Company Criminology.
[14]
Amicelle, A. et al. 2017. Criminology in the face of flows: reflections on contemporary policing and security. Global Crime. 18, 3 (Jul. 2017), 165–175. DOI:https://doi.org/10.1080/17440572.2017.1350427.
[15]
Aradau, C. and van Munster, R. 2009. Exceptionalism and the ‘War on Terror’: Criminology Meets International Relations. British Journal of Criminology. 49, 5 (2009), 686–701. DOI:https://doi.org/10.1093/bjc/azp036.
[16]
Arrigo, B.A. and Bersot, H.Y. 2014. The Routledge handbook of international crime and justice studies. Routledge.
[17]
Arrigo, B.A. and Bersot, H.Y. 2014. The Routledge handbook of international crime and justice studies. Routledge.
[18]
Australian and New Zealand Society of Criminology et al. The Australian & New Zealand journal of criminology.
[19]
Awan, I. and Blakemore, B. eds. 2016. Extremism, counter-terrorism and policing. Routledge.
[20]
Baldwin, D.A. 1997. The Concept of Security. Review of International Studies. 23, 1 (1997), 5–26.
[21]
Ball, K.S. 2001. Surveillance Society: Monitoring Everyday Life. Information Technology & People. 14, 4 (2001), 406–419. DOI:https://doi.org/10.1108/itp.2001.14.4.406.5.
[22]
Balzacq, T. 2011. Securitization theory: how security problems emerge and dissolve. Routledge.
[23]
Beck, U. 1992. Risk society: towards a new modernity. Sage.
[24]
Bennett, C.J. and Haggarty, K.D. 2011. Security games: surveillance and control at mega-events. Routledge.
[25]
Bennett, C.J. and Haggarty, K.D. 2011. Security games: surveillance and control at mega-events. Routledge.
[26]
Bennett, C.J. and Haggarty, K.D. 2011. Security games: surveillance and control at mega-events. Routledge.
[27]
Bennett, C.J. and Haggarty, K.D. 2011. Security games: surveillance and control at mega-events. Routledge.
[28]
Bennett Moses, L. and Chan, J. 2018. Algorithmic prediction in policing: assumptions, evaluation, and accountability. Policing and Society. 28, 7 (Sep. 2018), 806–822. DOI:https://doi.org/10.1080/10439463.2016.1253695.
[29]
Berg, J. 2010. Seeing like private security: Evolving mentalities of public space protection in South Africa. Criminology & Criminal Justice. 10, 3 (Aug. 2010), 287–301. DOI:https://doi.org/10.1177/1748895810370315.
[30]
Bigo, D. 2016. Rethinking Security at the Crossroad of International Relations and Criminology. British Journal of Criminology. 56, 6 (Nov. 2016), 1068–1086. DOI:https://doi.org/10.1093/bjc/azw062.
[31]
Bosworth, M. 2008. Border Control and the Limits of the Sovereign State. Social & Legal Studies. 17, 2 (2008), 199–215. DOI:https://doi.org/10.1177/0964663908089611.
[32]
Bowling, B. and Sheptycki, J.W.E. 2012. Global policing. SAGE.
[33]
Bowling, B. and Westenra, S. 2018. ‘A really hostile environment’: Adiaphorization, global policing and the crimmigration control system. Theoretical Criminology. (Jun. 2018). DOI:https://doi.org/10.1177/1362480618774034.
[34]
Boyle, P. and Haggerty, K. 2009. Privacy games: the Vancouver Olympics, privacy and surveillance. A report to the Office of the Privacy Commissioner of Canada under the Contributions Program.
[35]
Boyle, P. and Haggerty, K.D. 2009. Spectacular Security: Mega-Events and the Security Complex. International Political Sociology. 3, 3 (Sep. 2009), 257–274. DOI:https://doi.org/10.1111/j.1749-5687.2009.00075.x.
[36]
Brenner, S.W. 2007. Private-Public Sector Cooperation in Combating Cybercrime: In Search of a Model. Journal of International Commercial Law and Technology. 2 (2007).
[37]
Brewer, R. 2017. The malleable character of brokerage and crime control: a study of policing, security and network entrepreneurialism on Melbourne’s waterfront. Policing and Society. 27, 7 (Oct. 2017), 712–731. DOI:https://doi.org/10.1080/10439463.2015.1051047.
[38]
Briggs, D. 2014. Violence, Global Unrest and Advanced Capitalism. Contention. 2, 2 (Jan. 2014). DOI:https://doi.org/10.3167/cont.2014.020206.
[39]
Brisman, A. et al. eds. 2015. Environmental crime and social conflict: contemporary and emerging issues. Ashgate Publishing Limited.
[40]
Brisman, A. et al. eds. 2015. Environmental crime and social conflict: contemporary and emerging issues. Ashgate Publishing Limited.
[41]
Brisman, A. et al. eds. 2015. Environmental crime and social conflict: contemporary and emerging issues. Ashgate Publishing Limited.
[42]
Brisman, A. and South, N. 2015. New "Folk Devils,” Denials and Climate Change: Applying the Work of Stanley Cohen to Green Criminology and Environmental Harm. Critical Criminology. 23, 4 (Nov. 2015), 449–460. DOI:https://doi.org/10.1007/s10612-015-9288-1.
[43]
British Society of Criminology Criminology & criminal justice: CCJ.
[44]
British Society of Criminology (BSC): http://www.britsoccrim.org/.
[45]
Brodeur, J.-P. and Oxford University Press 2010. The policing web. Oxford University Press.
[46]
Brouwer, J. et al. 2017. Border policing, procedural justice and belonging: the legitimacy of (cr)immigration controls in border areas. The British Journal of Criminology. (Aug. 2017). DOI:https://doi.org/10.1093/bjc/azx050.
[47]
Brouwer, J. et al. 2018. (Cr)immigrant framing in border areas: decision-making processes of Dutch border police officers. Policing and Society. 28, 4 (May 2018), 448–463. DOI:https://doi.org/10.1080/10439463.2017.1288731.
[48]
Büscher, B. and Ramutsindela, M. 2015. GREEN VIOLENCE: RHINO POACHING AND THE WAR TO SAVE SOUTHERN AFRICA’S PEACE PARKS. African Affairs. (Dec. 2015). DOI:https://doi.org/10.1093/afraf/adv058.
[49]
Campbell, E. 2016. Policing paedophilia: Assembling bodies, spaces and things. Crime, Media, Culture: An International Journal. 12, 3 (Dec. 2016), 345–365. DOI:https://doi.org/10.1177/1741659015623598.
[50]
Chang, L.Y.C. et al. 2018. Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime. Regulation & Governance. 12, 1 (Mar. 2018), 101–114. DOI:https://doi.org/10.1111/rego.12125.
[51]
Clark, R.M. and Hakim, S. eds. 2017. Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level. Springer International Publishing.
[52]
Clément, D. 2017. The Transformation of Security Planning for the Olympics: The 1976 Montreal Games. Terrorism and Political Violence. 29, 1 (Jan. 2017), 27–51. DOI:https://doi.org/10.1080/09546553.2014.987342.
[53]
Clement, M. and SpringerLink (Online service) 2017. A People’s History of Riots, Protest and the Law: The Sound of the Crowd. Palgrave Macmillan UK.
[54]
Clement, M. and SpringerLink (Online service) 2017. A People’s History of Riots, Protest and the Law: The Sound of the Crowd. Palgrave Macmillan UK.
[55]
Coleman, R. 2004. Reclaiming the streets: surveillance, social control, and the city. Willan.
[56]
Collins, A. 2016. Contemporary security studies. Oxford University Press.
[57]
Crawford, A. and Hutchinson, S. 2016. Mapping the Contours of ‘Everyday Security’: Time, Space and Emotion. British Journal of Criminology. 56, 6 (2016), 1184–1202. DOI:https://doi.org/10.1093/bjc/azv121.
[58]
Crawford, A. and Hutchinson, S. 2016. The Future(s) of Security Studies. British Journal of Criminology. 56, 6 (2016), 1049–1067. DOI:https://doi.org/10.1093/bjc/azw070.
[59]
Crook, M. et al. 2018. Ecocide, genocide, capitalism and colonialism: Consequences for indigenous peoples and glocal ecosystems environments. Theoretical Criminology. 22, 3 (Aug. 2018), 298–317. DOI:https://doi.org/10.1177/1362480618787176.
[60]
David Seddon and Leo Zeilig 2005. Class & Protest in Africa: New Waves. Review of African Political Economy. 32, 103 (2005), 9–27.
[61]
Davies, G. and Dawson, S.E. 2018. Spoonful of sugar or strong medicine: ‘Meet and Greet’ as a strategy for policing large-scale public events. Policing and Society. 28, 6 (Jul. 2018), 697–711. DOI:https://doi.org/10.1080/10439463.2016.1259317.
[62]
Dean, M. 2010. Power at the heart of the present: Exception, risk and sovereignty. European Journal of Cultural Studies. 13, 4 (Nov. 2010), 459–475. DOI:https://doi.org/10.1177/1367549410377147.
[63]
Diphoorn, T. and Berg, J. 2014. Typologies of partnership policing: case studies from urban South Africa. Policing and Society. 24, 4 (Aug. 2014), 425–442. DOI:https://doi.org/10.1080/10439463.2013.864500.
[64]
Dixon, B. 2015. A Violent Legacy: Policing Insurrection in South Africa From Sharpeville to Marikana. British Journal of Criminology. 55, 6 (Nov. 2015), 1131–1148. DOI:https://doi.org/10.1093/bjc/azv056.
[65]
Dupont, B. 2004. Security in the age of networks. Policing and Society. 14, 1 (Mar. 2004), 76–91. DOI:https://doi.org/10.1080/1043946042000181575.
[66]
Ebooks Corporation Limited 2014. Crime: local and global. Routledge.
[67]
Ebooks Corporation Limited 2016. The SAGE handbook of global policing. SAGE Publications, Inc.
[68]
EBSCO Publishing (Firm) Studies in conflict and terrorism.
[69]
Edwards, A. and Gill, P. 2003. Transnational organised crime: perspectives on global security. Routledge.
[70]
Edwards, S.M. et al. 1996. Environmental crime and criminality: theoretical and practical issues. Routledge.
[71]
Ellefsen, R. 2018. Relational dynamics of protest and protest policing: strategic interaction and the coevolution of targeting strategies. Policing and Society. 28, 7 (Sep. 2018), 751–767. DOI:https://doi.org/10.1080/10439463.2016.1262366.
[72]
Elliott, L.M. and Schaedla, W.H. eds. 2018. Handbook of transnational environmental crime. Edward Elgar Publishing.
[73]
Ericson, R.V. and Haggerty, K.D. 2006. The new politics of surveillance and visibility. University of Toronto Press.
[74]
European Society of Criminology and William S. Hein & Company European journal of criminology.
[75]
Field, A. 2016. Ethics and entrapment: Understanding counterterrorism stings. Terrorism and Political Violence. (2016), 1–17. DOI:https://doi.org/10.1080/09546553.2016.1213721.
[76]
Fonio, C. and Pisapia, G. 2015. Security, surveillance and geographical patterns at the 2010 FIFA World Cup in Johannesburg. The Geographical Journal. 181, 3 (Sep. 2015), 242–248. DOI:https://doi.org/10.1111/geoj.12089.
[77]
Fussey, P. 2015. Command, control and contestation: negotiating security at the London 2012 Olympics. The Geographical Journal. 181, 3 (Sep. 2015), 212–223. DOI:https://doi.org/10.1111/geoj.12058.
[78]
Fussey, P. et al. 2011. Securing and sustaining the Olympic city: reconfiguring London for 2012 and beyond. Ashgate.
[79]
Fussey, P. and Ebooks Corporation Limited 2011. Securing and sustaining the Olympic city: reconfiguring London for 2012 and beyond. Ashgate.
[80]
Fussey, P. and Klauser, F. 2015. Securitisation and the mega-event: an editorial introduction. The Geographical Journal. 181, 3 (Sep. 2015), 194–198. DOI:https://doi.org/10.1111/geoj.12101.
[81]
Garner, S. 2015. Crimmigration. Sociology of Race and Ethnicity. 1, 1 (Jan. 2015), 198–203. DOI:https://doi.org/10.1177/2332649214561479.
[82]
Geers, K. 2010. The challenge of cyber attack deterrence. Computer Law & Security Review. 26, 3 (May 2010), 298–303. DOI:https://doi.org/10.1016/j.clsr.2010.03.003.
[83]
Giacomello, G. ed. 2016. Security in cyberspace: targeting nations, infrastructures, individuals. Bloomsbury.
[84]
Gill, M. 2013. Engaging the corporate sector in policing: Realities and opportunities. Policing. 7, 3 (Sep. 2013), 273–279. DOI:https://doi.org/10.1093/police/pat009.
[85]
Giulianotti, R. et al. 2015. Global sport mega-events and the politics of mobility: the case of the London 2012 Olympics. The British Journal of Sociology. 66, 1 (Mar. 2015), 118–140. DOI:https://doi.org/10.1111/1468-4446.12103.
[86]
Goldstein, D.M. 2010. Toward a Critical Anthropology of Security. Current Anthropology. 51, 4 (2010), 487–517. DOI:https://doi.org/10.1086/655393.
[87]
Goold, B.J. et al. 2007. Security and human rights. Hart.
[88]
Goold, B.J. and Neyland, D. 2009. New directions in surveillance and privacy. Willan.
[89]
Haggerty, K.D. and Ericson, R.V. 2000. The surveillant assemblage. British Journal of Sociology. 51, 4 (2000), 605–622. DOI:https://doi.org/10.1080/00071310020015280.
[90]
Hall, M. ed. 2017. Greening criminology in the 21st century: contemporary debates and future directions in the study of environmental harm. Routledge, Taylor & Francis Group.
[91]
Hamilton, C. and Berlusconi, G. 2018. Contagion, counterterrorism and criminology: The Case of France. Criminology & Criminal Justice. 18, 5 (Nov. 2018), 568–584. DOI:https://doi.org/10.1177/1748895817751829.
[92]
Hansen Löfstrand, C. et al. 2016. Doing ‘dirty work’: Stigma and esteem in the private security industry. European Journal of Criminology. 13, 3 (May 2016), 297–314. DOI:https://doi.org/10.1177/1477370815615624.
[93]
Hansen Löfstrand, C. et al. 2018. Private security as moral drama: a tale of two scandals. Policing and Society. 28, 8 (Oct. 2018), 968–984. DOI:https://doi.org/10.1080/10439463.2017.1348354.
[94]
Henry, A. et al. 2007. Transformations of policing. Ashgate.
[95]
Hepple, B.A. et al. eds. 2015. Laws against strikes: the South African experience in an international and comparative perspective. FrancoAngeli.
[96]
Hiller, Harry H.1 hiller@ucalgary.ca 2000. Mega-Events, Urban Boosterism and Growth Strategies: An Analysis of the Objectives and Legitimations of the Cape Town 2004 Olympic Bid. International Journal of Urban & Regional Research. 24, 2 (2000).
[97]
Hope, T. and Sparks, R. 2000. Crime, risk and insecurity: law and order in everyday life and political discourse. Routledge.
[98]
Hough, P. 2013. Understanding global security. Routledge.
[99]
Hudson, B. 2009. Justice in a time of terror. The British Journal of Criminology. 49, 5 (2009), 702–717.
[100]
Huey, L. et al. 2013. ‘Uppity civilians’ and ‘cyber-vigilantes’: The role of the general public in policing cyber-crime. Criminology & Criminal Justice. 13, 1 (Feb. 2013), 81–97. DOI:https://doi.org/10.1177/1748895812448086.
[101]
Huysmans, J. et al. 2006. The politics of protection: sites of insecurity and political agency. Routledge.
[102]
Institute for the Study and Treatment of Delinquency (Great Britain) et al. British journal of criminology.
[103]
Jansson, J. 2018. Building resilience, demolishing accountability? The role of Europol in counter-terrorism. Policing and Society. 28, 4 (May 2018), 432–447. DOI:https://doi.org/10.1080/10439463.2016.1191485.
[104]
Jewkes, Y. and Yar, M. 2011. Handbook of internet crime. Routledge.
[105]
Jewkes, Y. and Yar, M. 2011. Handbook of internet crime. Routledge.
[106]
Johnson, M. 2013. Cyber crime, security and digital intelligence. Gower.
[107]
Johnston, L. and Shearing, C.D. 2003. Governing security: explorations in policing and justice. Routledge.
[108]
Johnston, L. and Shearing, C.D. 2003. Governing security: explorations in policing and justice. Routledge.
[109]
Jones, T. et al. 1998. Private security and public policing. Policy Studies Institute.
[110]
Journès, C. 1998. Policing and security: Terrorists and hooligans. Culture, Sport, Society. 1, 2 (Dec. 1998), 145–160. DOI:https://doi.org/10.1080/14610989808721820.
[111]
LaFree, G. and Freilich, J.D. 2017. The  handbook of the criminology of terrorism. Wiley-Blackwell.
[112]
Leman-Langlois, S. et al. 2009. Human rights implications of new developments in policing. International Council on Human Rights Policy.
[113]
Loader, I. and Walker, N. 2007. Civilizing security. Cambridge University Press.
[114]
Loader, I. and White, A. 2017. How can we better align private security with the public interest? Towards a civilizing model of regulation. Regulation & Governance. 11, 2 (Jun. 2017), 166–184. DOI:https://doi.org/10.1111/rego.12109.
[115]
Loader, I. and White, A. 2018. Valour for Money? Contested Commodification in the Market for Security. The British Journal of Criminology. 58, 6 (Oct. 2018), 1401–1419. DOI:https://doi.org/10.1093/bjc/azy004.
[116]
Lyon, D. 2015. Surveillance after Snowden. Polity Press.
[117]
Lyon, D. 2003. Surveillance as social sorting: privacy, risk, and digital discrimination. Routledge.
[118]
Lyon, D. 2001. Surveillance society: monitoring everyday life. Open University Press.
[119]
Lyon, D. 1994. The electronic eye: the rise of surveillance society. Polity Press.
[120]
Lyon, D. 2015. The Snowden Stakes: Challenges for Understanding Surveillance Today. Surveillance & Society. 13, 2 (2015), 139–152.
[121]
Lyon, D. 2006. Theorizing surveillance: the panopticon and beyond. Willan Publishing.
[122]
Maguire, E. et al. 2018. Attitudes towards the Use of Violence against Police among Occupy Wall Street Protesters. Policing: A Journal of Policy and Practice. (Feb. 2018). DOI:https://doi.org/10.1093/police/pay003.
[123]
Maguire, M. et al. 2012. The Oxford handbook of criminology. Oxford University Press.
[124]
Massé, F. and Lunstrum, E. 2016. Accumulation by securitization: Commercial poaching, neoliberal conservation, and the creation of new wildlife frontiers. Geoforum. 69, (Feb. 2016), 227–237. DOI:https://doi.org/10.1016/j.geoforum.2015.03.005.
[125]
Matheson, C. 2010. Legacy Planning, Regeneration and Events: The Glasgow 2014 Commonwealth Games. Local Economy. 25, 1 (Feb. 2010), 10–23. DOI:https://doi.org/10.1080/02690940903545364.
[126]
McClanahan, B. and Brisman, A. 2015. Climate Change and Peacemaking Criminology: Ecophilosophy, Peace and Security in the "War on Climate Change”. Critical Criminology. 23, 4 (Nov. 2015), 417–431. DOI:https://doi.org/10.1007/s10612-015-9291-6.
[127]
McCulloch, J. and Pickering, S. 2009. Pre-Crime and Counter-Terrorism: Imagining Future Crime in the ‘War on Terror’. British Journal of Criminology. 49, 5 (2009), 628–645. DOI:https://doi.org/10.1093/bjc/azp023.
[128]
McLaughlin, E. and Muncie, J. 2013. The Sage dictionary of criminology. SAGE.
[129]
Milivojevic, S. 2018. ‘Stealing the fire’, 2.0 style? Technology, the pursuit of mobility, social memory and de-securitization of migration. Theoretical Criminology. (Oct. 2018). DOI:https://doi.org/10.1177/1362480618806921.
[130]
Monahan, T. 2010. Surveillance in the time of insecurity. Rutgers University Press.
[131]
Monahan, T. 2010. Surveillance in the time of insecurity. Rutgers University Press.
[132]
Mythen, G. et al. 2009. ‘I’m a Muslim, but I’m not a terrorist’: victimization, risk identities and the performance of safety. The British Journal of Criminology. 49, 6 (2009), 736–754.
[133]
Mythen, G. and Walklate, S. 2016. Counterterrorism and the Reconstruction of (In)Security: Divisions, Dualisms, Duplicities. British Journal of Criminology. 56, 6 (2016), 1107–1124. DOI:https://doi.org/10.1093/bjc/azw030.
[134]
Mythen, G. and Walklate, S. 2006. Criminology and Terrorism: Which Thesis? Risk Society or Governmentality? The British Journal of Criminology. 46, 3 (2006), 379–398.
[135]
National Strategy Information Center et al. Trends in organized crime.
[136]
Newburn, T. 2003. Handbook of policing. Willan.
[137]
Newburn, T. 2008. Handbook of policing. Willan Pub.
[138]
Newman, E. 2016. Human Security: Reconciling Critical Aspirations With Political ‘Realities’. British Journal of Criminology. 56, 6 (2016), 1165–1183. DOI:https://doi.org/10.1093/bjc/azw016.
[139]
Nhan, J. et al. 2015. Digilantism: An Analysis of Crowdsourcing and the Boston Marathon Bombings. British Journal of Criminology. (Dec. 2015). DOI:https://doi.org/10.1093/bjc/azv118.
[140]
Nurse, A. 2013. Privatising the green police: the role of NGOs in wildlife law enforcement. Crime, Law and Social Change. 59, 3 (Apr. 2013), 305–318. DOI:https://doi.org/10.1007/s10611-013-9417-2.
[141]
Palmer, D. et al. 2012. Global environment of policing. CRC Press.
[142]
Pete Fussey 2007. An interrupted transmission? Processes of CCTV implementation and the impact of human agency. Surveillance & Society. 4, 3 (2007), 229–256.
[143]
Peterson, A. 2016. The policing of transnational protest. Routledge.
[144]
della Porta, D. and Zamponi, L. 2013. Protest and policing on October 15th, global day of action: the Italian case. Policing and Society. 23, 1 (Mar. 2013), 65–80. DOI:https://doi.org/10.1080/10439463.2012.727596.
[145]
Pritchard, D. and Pakes, F.J. eds. 2014. Riot, unrest and protest on the global stage. Palgrave Macmillan.
[146]
Pritchard, D. and Pakes, F.J. eds. 2014. Riot, unrest and protest on the global stage. Palgrave Macmillan.
[147]
Reichel, P.L. and Albanese, J.S. 2014. Handbook of transnational crime and justice. SAGE Publications, Inc.
[148]
Richards, A. et al. 2011. Terrorism and the Olympics: major event security and lessons for the future. Routledge.
[149]
Sanders, C.B. et al. 2015. Police Innovations, ‘Secret Squirrels’ and Accountability: Empirically Studying Intelligence-led Policing in Canada. British Journal of Criminology. 55, 4 (2015), 711–729. DOI:https://doi.org/10.1093/bjc/azv008.
[150]
Schreiber, M. and Adang, O. 2010. Fiction, facts and a summer’s fairy tale – mixed messages at the World Cup 2006. Policing and Society. 20, 2 (Jun. 2010), 237–255. DOI:https://doi.org/10.1080/10439461003768029.
[151]
Schuilenburg, M. et al. 2018. The securitization of society: crime, risk and social order. New York University Press.
[152]
Scottish Centre for Crime and Justice Research: http://www.sccjr.ac.uk/.
[153]
Shearing, C. 2015. Criminology and the Anthropocene. Criminology & Criminal Justice. 15, 3 (Jul. 2015), 255–269. DOI:https://doi.org/10.1177/1748895815584712.
[154]
Sheptycki, J.W.E. and Wardak, A. 2005. Transnational and comparative criminology. GlassHouse.
[155]
Shigetomi, S. et al. 2009. Protest and social movements in the developing world. Edward Elgar.
[156]
Smyth, M. 2012. The Ashgate research companion to political violence. Ashgate.
[157]
Spapens, A.C. et al. eds. 2017. Environmental crime and its victims: perspectives within green criminology. Routledge.
[158]
Spapens, A.C. et al. eds. 2017. Environmental crime and its victims: perspectives within green criminology. Routledge.
[159]
SpringerLink (Online service) 2017. Cybercrime, Organized Crime, and Societal Responses: International Approaches. Springer International Publishing.
[160]
Stanley, J. and Steinhardt, B. 2003. Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society.
[161]
Stenning, P. 2009. Governance and Accountability in a Plural Policing Environment--the Story so Far. Policing. 3, 1 (Jan. 2009), 22–33. DOI:https://doi.org/10.1093/police/pan080.
[162]
STODDART, K. 2016. UK cyber security and critical national infrastructure protection. International Affairs. 92, 5 (Sep. 2016), 1079–1105. DOI:https://doi.org/10.1111/1468-2346.12706.
[163]
Stott, C. et al. 2018. Policing football ‘risk’? A participant action research case study of a liaison-based approach to ‘public order’. Policing and Society. 28, 1 (Jan. 2018), 1–16. DOI:https://doi.org/10.1080/10439463.2015.1126267.
[164]
Stumpf, J. 2006. The Crimmigration Crisis: Immigrants, Crime, and Sovereign Power. American University Law Review. 56, 2 (2006), 367, – 419.
[165]
Surveillance Studies Network and EBSCO Publishing (Firm) Surveillance & society.
[166]
The Surveillance Studies Centre, Queen’s University, Canada: http://www.sscqueens.org/.
[167]
Titeca, K. 2019. Illegal Ivory Trade as Transnational Organized Crime? an Empirical Study Into Ivory Traders in Uganda. The British Journal of Criminology. 59, 1 (Jan. 2019), 24–44. DOI:https://doi.org/10.1093/bjc/azy009.
[168]
Treadwell, J. 2012. From the car boot to booting it up? eBay, online counterfeit crime and the transformation of the criminal marketplace. Criminology & Criminal Justice. 12, 2 (Apr. 2012), 175–191. DOI:https://doi.org/10.1177/1748895811428173.
[169]
Valverde, M. 2011. Questions of security: A framework for research. Theoretical Criminology. 15, 1 (Feb. 2011), 3–22. DOI:https://doi.org/10.1177/1362480610382569.
[170]
Verma, A. and Varma, V. 2018. Policing Non-Violent Crowds: Lessons from Kumbh Mela in India. Policing: A Journal of Policy and Practice. (Mar. 2018). DOI:https://doi.org/10.1093/police/pay012.
[171]
Viano, E.C. ed. 2017. Cybercrime, Organized Crime, and Societal Responses: International Approaches. Springer International Publishing.
[172]
Virta, S. and Branders, M. 2016. Legitimate Security? Understanding the Contingencies of Security and Deliberation. British Journal of Criminology. 56, 6 (2016), 1146–1164. DOI:https://doi.org/10.1093/bjc/azw024.
[173]
Walklate, S. and Mythen, G. 2008. How scared are we? The British Journal of Criminology. 48, 2 (2008), 209–225.
[174]
Walsh, J. 2017. Moral panics by design: The case of terrorism. Current Sociology. 65, 5 (2017), 643–662. DOI:https://doi.org/10.1177/0011392116633257.
[175]
Walsh, J. 2018. Report and deport: Public vigilance and migration policing in Australia. Theoretical Criminology. (Feb. 2018). DOI:https://doi.org/10.1177/1362480618756363.
[176]
Weber, L. et al. eds. 2017. The Routledge international handbook of criminology and human rights. Routledge, Taylor & Francis Group.
[177]
Weber, L. and Bowling, B. 2008. Valiant beggars and global vagabonds. Theoretical Criminology. 12, 3 (Aug. 2008), 355–375. DOI:https://doi.org/10.1177/1362480608093311.
[178]
White, A. 2014. Post-crisis Policing and Public–Private Partnerships. British Journal of Criminology. 54, 6 (Nov. 2014), 1002–1022. DOI:https://doi.org/10.1093/bjc/azu063.
[179]
White, A. 2018. What is the Privatization of Policing? Policing: A Journal of Policy and Practice. (Nov. 2018). DOI:https://doi.org/10.1093/police/pay085.
[180]
White, R.D. 2009. Environmental crime: a reader. Willan.
[181]
White, R.D. 2014. Environmental crime: a reader. Routledge.
[182]
Wichita State University. Department of Administration of Justice International journal of comparative and applied criminal justice.
[183]
William S. Hein & Company Social & legal studies.
[184]
Williams, P.D. and McDonald, M. eds. 2018. Security studies: an introduction. Routledge.
[185]
Wonders, N.A. and Jones, L.C. 2018. Doing and undoing borders: The multiplication of citizenship, citizenship performances, and migration as social movement. Theoretical Criminology. (Oct. 2018). DOI:https://doi.org/10.1177/1362480618802297.
[186]
Wood, J. and Dupont, B. 2006. Democracy, Society and the Governance of Security. Cambridge University Press.
[187]
Wood, J. and Shearing, C.D. 2011. Imagining security. Routledge.
[188]
Wood, J. and Shearing, C.D. 2011. Imagining security. Routledge.
[189]
Wright, D. and Kreissl, R. 2015. Surveillance in Europe. Routledge.
[190]
Yarwood, R. and Paasche, T. 2015. The Relational Geographies of Policing and Security. Geography Compass. 9, 6 (Jun. 2015), 362–370. DOI:https://doi.org/10.1111/gec3.12216.
[191]
Zedner, L. 2006. Liquid security. Criminology & Criminal Justice. 6, 3 (Aug. 2006), 267–288. DOI:https://doi.org/10.1177/1748895806065530.
[192]
Zedner, L. 2005. Securing Liberty in the Face of Terror: Reflections from Criminal Justice. Journal of Law and Society. 32, 4 (2005), 507–533.
[193]
Zedner, L. 2009. Security. Routledge.
[194]
Zedner, L. 2009. Security. Routledge.
[195]
Zedner, L. 2010. Security, the State, and the Citizen: The Changing Architecture of Crime Control. New Criminal Law Review. 13, 2 (2010), 379–403.
[196]
Zedner, L. 2003. The concept of security: an agenda for comparative analysis. Legal Studies. 23, 01 (2003), 153–176.
[197]
Zureik, E. and Salter, M.B. 2005. Global surveillance and policing: borders, security, identity. Willan.
[198]
Policing.
[199]
Policing & society.
[200]
Punishment & society.
[201]
Terrorism and political violence.
[202]
2015. The Routledge handbook on crime and international migration. Routledge.
[203]
Theoretical criminology.
[204]
2012. Uncertain Governance and Resilient Subjects in the Risk Society. Oñati Socio-Legal Series. 3, 2 (2012).