Richard. (2014, November 14). Advantages and Disadvantages of Using Security Cameras. Retrieved April 24, 2018, from http://www.a1securitycameras.com/blog/advantages-disadvantages-using-security-cameras/
Nye, J. S. (2011). Nuclear lessons for cyber security? Strategic Studies Quarterly
McCreight, T., & Coppoolse, M. (n.d.). But, we\\'re already doing this... Retrieved April 24, 2018, from http://allsecurityevents.com/but-were-already-doing-this/
Security Risk Governance Group. (2017, December 06). ESRM and ERM...Clarifying the Differences. Retrieved April 24, 2018, from http://esrm.info/esrm-erm-clarifying-differences/
Elbeheri, A. (2015, December 16). ENTERPRISE SECURITY RISK MANAGEMENT: A HOLISTIC APPROACH TO SECURITY. Retrieved April 24, 2018, from http://www.linkedin.com/pulse/enterprise-security-risk-management-holistic-approach-alaa
Masters, D., & Hoen, P. (2012). State Legitimacy and Terrorism. Democracy and Security, 8(4), 337-357.
Chaliand, G., & Blin, A. (Eds.). (2007). The history of terrorism: from antiquity to al Qaeda. Univ of California Press.
Sheehy, C. (2017, March 7). Innovation in CCTV and its impact on Loss Prevention. Retrieved April 24, 2018, from http://datecheckpro.com/2017/03/07/innovation-in-cctv-and-its-impact-on-loss-prevention/