References
- Becker, T. M. (1974). The place of private police in society: An area of research for the social sciences. Social Problems, 21, 438. doi:10.2307/799910
- Becoming a Certified Security Consultant. 2017. Retrieved from: https://iapsc.org/about-us/certification.
- Bergel, J. (2015, Nov 10). In many states, security guards get scant training, oversight. HuffPost.
- Chang, L. Y. C., & Grabsky, P. (2014). Cybercrime and establishing a secure cyberworld. In M. Gill (Ed.), Handbook of security., London & New York: Palgrave Macmillan.
- CISSP® − Certified information systems security professional.2017 Retrieved from: https:www.isc2.org/template-three-column-certificate-pages.aspex
- Clarke, R., & Newman, G. (2005). Designing out crime from products and systems. Monsey, NY: Criminal Justice Press.
- Clarke, R. V. (Ed.). (1997). Situational crime prevention: Successful case studies (pp. 2nd). Guilderland, NY: Harrow and Heston.
- Cunningham, W., & Taylor, T. (1985). The Hallcrest report: Private security and police in America. Boston, MA: Butterworth-Heinemann.
- Cunningham, W. C., Strauchs, J. J., & Van Meter, C. W. 1990. The Hallcrest report II: Private security trends 1970-2000. Stoneham, MA: Butterworth-Heinemann.
- Donovan, E., & Walsh, W. (1986). An evaluation of Starrett City security services. University Park, PA: Pennsylvania State University.
- Freedonia Group. (2015, June 20). Private security service revenues. Cleveland, OH: Freedonia Group, Inc.
- Hemmens, C., Maahs, J., Scarborough, K. E., & Collins, P. A. (2001). Watching the watchman: State regulations of private security 1982-1998. Security Journal, 14(4), 17–28. doi:10.1057/palgrave.sj.8340095
- Horan, J. D. (1967). The Pinkertons: The detective dynasty that made history (pp. 50). New York: Bonanza Books.
- Joh, E. E. (2005). Conceptualizing the private police. Utah Law Review, 573, 578–579.
- Kakalik, J. S., & Wildhorn, S. 1972. Private police in the United States: Findings and recommendations, Government Printing Office, Washington, DC, vol. 5, 30. (The Rand Report)
- Keller, K. S. (2004). Securing security expert testimony: Overcoming the Daubert challenge to reach the witness stand. Security Journal, 17(3), 21–29. doi:10.1057/palgrave.sj.8340174
- Krahmann, E. 2002. Private firms and the new security governance. Retrieved from http://www.isanet.org/noarchive/krahmann.html
- Lee, L. (2009). Homeland security and private sector business: Corporations’ role in critical infrastructure protection. Boca Raton, FL: CRC Press.
- McCrie, R. (2005). ASIS International. In L. E. Sullivan (Ed.), Encyclopedia of law enforcement, vol. 2 (pp. 547–549). Thousand Oaks, CA: Sage Publications.
- McCrie, R. (2006). A history of security. In M. Gill (Ed.), Handbook of security. London & New York: Palgrave Macmillan.
- McCrie, R. D. (2004). The history of expertise in security management practice and litigation. Security Journal, 17(3), 11–19. doi:10.1057/palgrave.sj.8340173
- Morn, F. (1982). The eye that never sleeps. Bloomington, IN: Indiana University Press, p. 98.
- Nalla, M. K., & Crichlow, V. J. (2014). Have the standards for private security guards become more stringent in the Post 9/11 Era? An assessment of security guard regulations in the US from 1982 to 2010. Security Journal, 27, 1–15.
- National Advisory Committee on Criminal Justice Standards and Goals. 1976. Private security: Report of the task force on private security. Government Printing Office, Washington, DC.
- Nemeth, C. P. (2012). Private security and the law (4th ed.). Waltham, MA: Butterworth-Heinemann.
- Phillips, B. (2016). The complete book of locks and locksmithing (7th ed.). New York: McGraw-Hill.
- Poulin, K. C., & Nemeth, C. P. (2005). Private security and public safety: A community-based approach. Upper Saddle River, NJ: Pearson Prentice Hall.
- Prenzler, T., & Sarre, R. (2014). Regulation. In M. Gill (Ed.), The handbook of security (2nd ed.). London & New York: Palgrave Macmillan.
- Private Security Officer Selection and Training. (2010). ASIS GDL PSO-2010. Alexandria, VA: ASIS International.
- Private Security Service Demand in the United States. (2015). Cleveland, OH: Freedonia Group.
- Richemond-Barak, D. (2014). Can self-regulation work? Lessons from the private security and military industry. Michigan Journal of International Law, 35, 773.
- Roberts, C. (2012). The U.S. Federal Protective Service: A troubled agency–The need for improved contract guard training and oversight. Journal of Applied Security Research, 7(4), 478–488. doi:10.1080/19361610.2012.710539
- Sennewald, C. A., & Tsukayama, J. K. (2015). The process of investigation: Concepts and strategies for investigators in the private sector (4th ed., pp. 13). Waltham, MA: Butterworth-Heinemann.
- Sklansky, D. A. (1999). The private police. UCLA Law Review, 46, 1165–1287.
- Sklansky, D. A. (2006). Private police and democracy. American Criminal Law Review, 43, 89–105.
- Valiant Solutions . (2017, June 7). Personal communications. Woodbury, NY: Valiant Solutions, Inc.
- Spearin, C. (2014). Special operations forces & private security companies. Parameters, 44(2), 61.
- Strom, K., Berzofsky, M., Shook-Sa, B., Barrick, K., Daye, C., Hortstmann, N., & Kinsey, S. (2010). The private security industry: A review of the definitions, available data sources, and paths moving forward. Washington, DC: US Department of Justice.
- USA PATRIOT ACT 2001. http://www.gpo.gov/fdsys/pkg/PLAW-107publ56/pdf/plaw-107publ56.pdf
- Williams, A. (2014). Guards with guns [online]. [2016, July 27]. Available: htpps://apps.cironline.org/hired-guns