The Principal’s Understanding of the Close Protection Officer
- Jan 17
- 16 min read

by Anton Stoeckl
A Critical Analysis of Economic Prioritization, Operational Efficacy, and Professional Definition
Abstract: This essay presents a rigorous, interdisciplinary analysis of the critical disjuncture between the operational imperatives of Close Protection (CP) and the principal’s often deficient understanding of them. It posits that this cognitive gap is the primary determinant of flawed procurement, unsustainable operational practices, and dangerous role ambiguity. Drawing from behavioural economics, cognitive psychology, security studies, and organisational theory, the investigation deconstructs the paradoxical economic choices of principals, evidencing how neuropsychological reward mechanisms and information asymmetry drive misprioritisation. It meticulously analyses the empirical science linking extended shifts and cheap labour to vigilance decrement and increased risk, establishing that such practices are not merely unethical but fundamentally compromise mission efficacy. The essay provides a granular, evidence-based taxonomy of the CPO’s multifaceted skill set—far beyond physical defence—anchoring it in contemporary threat landscapes. It further delineates the CPO from a personal assistant through legal, functional, and cognitive frameworks, highlighting the perils of conflation. Synthesising these analyses, the paper proposes a comprehensive reform agenda focused on industry professionalisation, consultative client education, and contractual innovation to foster a paradigm where the principal’s understanding aligns with the sophisticated reality of modern protective operations.
1. Introduction: The Paradox of Protection and the Imperative of Understanding
The profession of close protection operates within a complex and often contradictory space, situated at the intersection of tangible physical risk and intangible psychological perception. At its functional core lies a dyadic relationship: the principal (the protectee) and the Close Protection Officer (CPO), a specialist whose raison d'être is the intelligent management of threats to the principal’s safety and continuity. Theoretically, this relationship should be symbiotic, founded upon absolute trust, seamless communication, and a deeply shared understanding of objectives, methodologies, and the very nature of the threat environment (Borum et al., 2019). However, empirical observation, industry self-reporting, and analysis of security failures consistently reveal a profound and often dangerous asymmetry in this relationship. A significant cognitive gap exists between the CPO’s professional reality—a discipline grounded in risk assessment, proactive planning, and cognitive readiness—and the principal’s perception of that role, which is frequently reductively framed as a reactive, physical, and commodifiable service.
This essay contends that the principal’s understanding of their CPO’s role, duties, and operational requirements is not a peripheral concern but the foundational variable from which all investment decisions, operational parameters, and ultimately, security outcomes flow. It is the critical path through which professional standards are either validated or undermined. A principal who views their CPO through a flawed cognitive lens—as a deterrent "presence," a luxury accessory, or a hybrid assistant—fundamentally misconfigures the entire security apparatus. This misunderstanding manifests in three distinct, yet interrelated, symptomatic behaviours: the misallocation of economic resources away from protection towards conspicuous consumption; the procurement of protective services based on cost and endurance rather than capability and cognitive sustainability; and the functional conflation of the CPO with a personal assistant, diluting the protective mission.
The consequences of this gap are not merely operational inefficiencies but introduce severe, quantifiable vulnerabilities into the protective continuum. When protection is undervalued, it is under-resourced; when it is misunderstood, it is misapplied. This analysis will, therefore, proceed by interrogating each symptomatic manifestation through an interdisciplinary, evidence-based framework. It will first excavate the psychological and socio-economic drivers behind the principal's economic calculus, employing behavioural economics and threat perception theory. Second, it will rigorously deconstruct the fallacious logic of employing cheap labour on extended shifts, anchoring its critique in the robust cognitive science of vigilance, situational awareness, and human performance degradation. Third, it will move beyond anecdote to provide a detailed, evidence-based exposition of the real CPO skill set, before using this foundation to sharply demarcate the legal, functional, and cognitive boundaries between a CPO and a personal assistant. The essay will conclude by synthesising these threads into a coherent reform agenda, arguing that closing the understanding gap requires a concerted effort in industry professionalisation, consultative client engagement, and the strategic reframing of protection as an intelligence-led enabler rather than a discretionary cost.
2. The Economic Psychology of the Principal: A Dinner Over a Defender – A Deep Dive into Neuroeconomics and Perceived Value
The observable phenomenon of a principal readily expending exorbitant sums on luxury experiences while negotiating aggressively on the daily rate of a CPO is a poignant entry point into their cognitive world. To dismiss this as mere irrationality is insufficient; it demands a forensic examination using the tools of behavioural economics, neuropsychology, and the sociology of consumption. This behaviour represents a perfectly rational outcome within the principal’s subjective value framework, one that systematically discounts probabilistic future safety in favour of certain immediate gratification.
2.1. The Neurochemistry of Value: Tangible Gratification vs. Intangible Assurance
At a neurobiological level, the decision-making process is heavily influenced by the brain’s reward system. Conspicuous consumption—whether a Michelin-starred dinner, a luxury watch, or a sports car—activates the mesolimbic dopamine pathway, a core circuit associated with pleasure, desire, and reward prediction (Knutson et al., 2007). The acquisition and consumption provide immediate, tangible sensory feedback and social reinforcement, delivering a direct neurochemical payoff. This is compounded by Veblen’s (1899) classic theory, which posits that such consumption serves as a public signal of status and financial prowess, further amplifying its perceived value through social capital.
In stark contrast, remuneration for a CPO purchases risk mitigation—an intangible, probabilistic non-event. Its primary "product" is the absence of harm, a negative outcome that is psychologically difficult to value. Kahneman and Tversky’s (1979) Prospect Theory provides the seminal framework: individuals are loss-averse and consistently overvalue sure, immediate gains while undervaluing future, probabilistic gains. The dinner is a certain gain in pleasure. The CPO’s fee is a premium against a low-probability, high-impact loss. The human brain, shaped by evolution to prioritise immediate, concrete rewards, is cognitively biased to underinvest in insurance against abstract, future threats (Sunstein, 2002). This is not a character flaw but a predictable cognitive heuristic. The principal is not weighing "dinner versus security" in a vacuum; they are subconsciously weighing a certain, vivid neurochemical reward against an abstract, statistical concept of safety.
2.2. Asymmetric Information, Signalling Failure, and the Market for "Lemons"
The principal’s dilemma is exacerbated by a profound information asymmetry, a concept formalised by Akerlof (1970) in his "Market for Lemons" model. The principal is an expert in their own field (finance, entertainment, entrepreneurship) but a layperson in protective security. They lack the technical knowledge to accurately assess the quality of a CPO. How can they distinguish between an operative with advanced tactical medical training (TCCC – Tactical Combat Casualty Care) and one with a basic first aid certificate? Between a driver skilled in anti-surveillance and evasive manoeuvres (RHT – Registered High-risk Transport) and one who merely holds a chauffeur’s license?
In such opaque markets, price and superficial presentation become default heuristics for quality, but they are deeply flawed. A principal may believe a mid-range rate secures 80% of the capability of a top-tier professional, applying a linear value model common to commodity purchases. However, in security, capability is often non-linear and threshold-based. The critical difference may reside in the 20%—the advanced medical intervention that stabilises a GSW before EMS arrival, or the surveillance detection that identifies a hostile pre-attack probe days before an incident (Silberman, 2018). The principal cannot see this differential, leading to a "race to the bottom" where competent professionals are undervalued and undercut by less-qualified, cheaper alternatives who can mimic the appearance of competence (Button, 2020).
2.3. The Accountant’s Lens: Protection as Cost Centre vs. Strategic Enabler
Within corporate structures, this misunderstanding is institutionalised. Executive protection is frequently categorised as an administrative or operational "cost centre" rather than a strategic enabler. Management accounting frameworks, such as Kaplan and Norton’s (1992) Balanced Scorecard, often fail to incorporate security metrics beyond direct cost, rendering its value invisible in strategic performance discussions. During periods of austerity, cost centres are targeted for reduction, unlike revenue-generating or strategic-enabling functions. This contrasts sharply with legal counsel, whose fees are understood as enabling complex mergers, or financial advisors who facilitate capital raises. Until the CP function can be reframed and its value articulated in terms of duty of care fulfilment, liability mitigation, reputation safeguarding, and the enabling of business in high-risk, high-yield environments, it will remain vulnerable to this accountancy-driven economising (Fay, 2020; Shepherd & Button, 2019). The dinner is a business development expense; the CPO is seen as an overhead. This framing is a fundamental failure of strategic risk management.
3. The Real Role and Skill Set of the CPO: An Evidence-Based Taxonomy
To understand the cost of misunderstanding, one must first comprehend the true depth of the professional CPO’s role. It is a profound misconception to view the CPO primarily as a physically imposing deterrent. Modern close protection is a cognitively dominant, intelligence-led profession. The well-trained CPO is a multi-disciplinary practitioner whose skill set can be categorised into several interdependent domains, each supported by empirical evidence and best-practice doctrine.
3.1. The Cognitive Core: Risk Assessment, Planning, and Situational Awareness (SA)
The foundation of protection is not reaction but proactive risk management. This begins with formalised Risk Assessment (RA), a systematic process of threat identification, vulnerability analysis, and impact assessment, often using established models like CARVER or Probability/Impact matrices (Gill, 2021). The CPO must analyse the principal’s lifestyle, profile, travel patterns, and digital footprint to identify likely threat actors (activists, criminals, terrorists, stalkers). This intelligence-led approach informs all subsequent planning.
Advance Work and Route Selection are critical planning functions. This involves physically surveying locations (venues, hotels, travel routes) to identify choke points, emergency exits, medical facilities, and potential ambush sites. It incorporates counter-surveillance principles to detect hostile reconnaissance. Studies on attacks against protected persons consistently show that successful attacks often exploit failures in advance planning and route predictability (Bunker, 2021).
During execution, the CPO’s primary tool is Situational Awareness (SA), defined by Endsley (1995) as a three-level model: Level 1 (Perception of elements in the environment), Level 2 (Comprehension of their meaning, e.g., identifying anomalous behaviour), and Level 3 (Projection of their future status, e.g., predicting a potential assault). High-fidelity SA is the cognitive engine of prevention. It allows for the early identification of pre-incident indicators (PIIs)—behaviours such as probing, testing, or rehearsing that often precede an attack (Global Advisory Council, 2022).
3.2. Tactical and Technical Skills: Beyond "Hands-On"
While the physical intercept is the last resort, the skills must be pristine. This includes:
Defensive Tactics & Use of Force: Proficiency in de-escalation, control and restraint, and defensive tactics, operating within a strict legal and proportional framework based on national use-of-force legislation (e.g., Common Law, Criminal Law Act 1967).
Tactical Emergency Medicine: Far beyond basic first aid. Training should align with Tactical Combat Casualty Care (TCCC) or Close Protection First Responder (CPFR) standards, focusing on treating ballistic and blast trauma, catastrophic haemorrhage control (tourniquet application), airway management, and patient evacuation under threat (Committee on TCCC, 2021).
Technical Security Driving: include evasive manoeuvres (J-turns, reverse 180s), anti-surveillance driving, and route analysis to avoid predictability and mitigate vehicular attack risks (ramming, boxing-in).
Cyber and Technical Awareness: Understanding digital footprints, operational security (OPSEC) for communications, basic counter-electronic surveillance (C-E SURV), and the risks associated with IoT devices and social media.
3.3. Soft Skills: Communication, Diplomacy, and Adaptive Expertise
The CPO operates in the principal’s personal and professional sphere. They require exceptional interpersonal and communication skills to interface with the principal, their family, staff, and external stakeholders (corporate hosts, law enforcement) seamlessly and discreetly. Cultural awareness and adaptive expertise — the ability to apply principles to novel situations—are crucial for international operations. The CPO must also possess high ethical integrity and professional resilience to manage stress, maintain confidentiality, and avoid complacency (Hitchcock, 2019).
This evidence-based taxonomy reveals the CPO as a security manager, intelligence analyst, emergency medic, tactical driver, and trusted confidant. Reducing this complex profession to a "body" or an "assistant with training" is not an oversimplification; it is a categorical error that lies at the heart of the principal’s misunderstanding.
4. The Fallacy of Cheap Labour and Long Hours: Eroding the Cognitive Foundation – A Scientific Analysis
The principal’s inclination to contract cheaper CPOs for marathon shifts is a direct manifestation of misunderstanding the role’s cognitive demands. This practice is not just poor management; it is a scientifically verifiable method of degrading security performance, turning the protection detail into a liability.
4.1. The Vigilance Decrement: Quantifying Cognitive Erosion
The CPO’s core operational output is vigilance and SA. Decades of human factors research demonstrate that sustained attention is a finite resource that depletes over time. The "vigilance decrement"—a decline in detection rates and an increase in reaction times—is a robust and replicable phenomenon (Warm et al., 2008). In controlled studies, significant performance drops are observed within 30 minutes on monotonous monitoring tasks and become severe after 2 hours (See et al., 1995).
Applied to a 12-16 hour CP shift, the implications are stark. Research on analogous safety-critical professions is illuminating. A meta-analysis by Thomson et al. (2015) on 12-hour shifts in healthcare and security found a 25-30% increase in clinical/security errors. Dawson and McCulloch’s (2005) work on fatigue in transportation shows that 17 hours of sustained wakefulness impairs cognitive performance to a level equivalent to a 0.05% blood alcohol concentration. For a CPO in the latter hours of a long shift, this means:
Reduced environmental scanning: Tunnel vision, missing peripheral cues or persons of interest.
Impaired decision-making: Slower, less accurate threat assessments and response choices.
Memory lapses: Forgetting key details from earlier in the shift or advance briefings.
Increased risk tolerance: Fatigue leads to a subconscious desire to conclude tasks, potentially cutting security corners.
The principal who mandates such shifts is, in effect, purchasing a service where the provider’s primary tool—their cognition—is knowingly impaired for a significant portion of the paid period.
4.2. The Cost-Quality Correlation in a High-Stakes Labour Market
The market does not offer "the same product for less." Brooks’ (2019) analysis of the UK CP industry demonstrated a strong inverse correlation between daily rate and investment in capability. Operatives in the lowest pay quartile were significantly less likely to possess advanced medical (TCCC) or driving (RHT) qualifications, less likely to engage in mandatory CPD, and more likely to rely solely on the minimum SIA licence training (which is widely criticized as inadequate for high-end work). This creates a adverse selection problem: highly skilled professionals exit the low-end market, leaving it to less capable or desperate individuals. The principal’s cost-saving, therefore, directly purchases inferior human capital, poorer equipment, and a higher likelihood of employing an operative with outdated or insufficient skills to manage a complex threat.
4.3. Fatigue, Morale, and the Amplification of Insider Risk
Chronic fatigue and exploitative conditions have documented psychological sequelae. They are primary drivers of burnout, characterized by emotional exhaustion, depersonalization, and reduced personal accomplishment (Maslach & Leiter, 2016). A burned-out CPO is disengaged, cynical, and less vigilant. From a security perspective, this is catastrophic. Furthermore, Strain Theory (Agnew, 1992) from criminology suggests that individuals subjected to financial strain (low pay) and negative treatment (disrespect, excessive hours) may experience pressure that can neutralize ethical constraints. This does not imply all underpaid CPOs will turn malicious, but it statistically increases the risk profile for negligence, cutting corners, or in extreme cases, becoming susceptible to bribery or collusion. In contrast, a well-compensated, respected professional working sustainable hours has higher morale, stronger loyalty, and a lower propensity for risk-taking behaviours, aligning their personal well-being with the success of the protective mission.
5. Demarcating the Role: CPO vs. Personal Assistant – A Functional and Legal Imperative
The conflation of the CPO with a Personal Assistant (PA) is perhaps the most pernicious operational misunderstanding, as it directly and constantly undermines the protective mission during routine activities.
5.1. Divergent Primary Tasks and the Problem of Attentional Resource Allocation
A CPO’s primary task, as established, is continuous, proactive risk management. A PA’s primary task is logistical facilitation and convenience management. The critical conflict arises from the theory of attentional resources (Wickens, 2002). Cognitive capacity is limited. When a CPO is tasked with managing complex logistics—rearranging a flight, negotiating with a hotel manager, or handling personal correspondence—they must allocate working memory and executive function to that task. This necessarily diverts these finite resources away from environmental monitoring and threat assessment. Dual-tasking leads to performance degradation in both tasks, especially the one requiring sustained vigilance (Eysenck et al., 2007). The moment the CPO’s eyes are fixed on a smartphone screen managing a reservation, they are not conducting observational loops. This creates predictable, recurring windows of vulnerability.
5.2. Legal and Liability Distinctions: A Duty of Care Chasm
The legal frameworks governing the two roles are fundamentally different. A CPO, by virtue of their profession, assumes a specific, heightened duty of care. This duty is judged against the standard of the "reasonably competent CPO" and is enshrined in case law and statutes like the Occupiers' Liability Act 1957 and the Health and Safety at Work etc. Act 1974. They have a legal obligation to identify foreseeable risks and take reasonable steps to mitigate them.
A PA has no such specific protective duty; their duty is one of reasonable care in performing assigned tasks. Role conflation creates profound legal ambiguity. If a security incident occurs while the CPO was booking a restaurant, was he acting as a CPO (and thus liable for a potential breach of his protective duty) or as a PA (where no such duty existed)? This ambiguity can jeopardize insurance coverage, which is often predicated on the insured acting within their professional capacity, and expose both the operative and the principal to significant legal liability (Smith, 2022).
5.3. The Mindset Dichotomy: The Schemata of Protection vs. Service
The CPO operates from a security schema: a cognitive framework focused on anomaly detection, pattern-breaking, and contingency planning. The PA operates from a service schema: focused on accommodation, problem-solving for comfort, and fulfilling requests. Requiring one individual to constantly switch between these conflicting schemas induces role strain, reduces cognitive efficiency, and can lead to schema assimilation, where the protective mindset is gradually diluted by the service mindset. This often manifests as the CPO becoming overly familiar, losing the professional objectivity required to enforce necessary but inconvenient security measures, a phenomenon repeatedly cited in analyses of protective failures (Hitchcock, 2019).
6. Fostering Change: An Evidence-Based Reform Agenda
Bridging the understanding gap requires a deliberate, multi-agent strategy grounded in evidence from security science, organizational psychology, and change management.
6.1. Industry Professionalisation: From Minimum Licence to Recognised Profession
The industry must aggressively move towards the model of other risk-critical professions (e.g., aviation, offshore operations). This requires:
A Mandatory, Tiered Accreditation Scheme: Managed by an independent professional body, with tiers (Operative, Team Leader, Security Manager/Consultant) linked to verified operational hours, mandatory CPD in core competencies (RA, TCCC, SA training), and ethical recertification. This provides the clear quality signal the market lacks (Gill & Howell, 2021).
Integration of Human Factors Science: Training and operational doctrine must explicitly incorporate the science of fatigue, circadian rhythms, and SA. The "12-hour shift" must be contextualized not as a badge of honour but as an exception requiring stringent risk controls and compensatory rest, following HSE (2022) guidance on safety-critical work.
6.2. The Consultative Engagement Model: Educating the Client
The procurement process must be revolutionized. Engagement should begin with a Security Consultant conducting a formal Threat and Risk Assessment (TRA) and presenting an Educative Briefing. This briefing uses data visualizations on vigilance decrement, case studies linking failures to poor practices, and liability case law to transform the principal’s mental model. The consultant’s role is to translate protective needs into the principal’s value language: duty of care, brand protection, and operational enablement (Fischer et al., 2008).
6.3. Contractual Innovation and Value Reframing
Model contracts must become industry standard. These should:
Explicitly separate CPO and PA functions.
Stipulate maximum duty hours and mandatory rest periods in line with human performance data.
Tie remuneration scales to accreditation tier and experience.
Include key performance indicators (KPIs) based on proactive measures (advance surveys completed, training hours maintained) rather than solely reactive outcomes.
Ultimately, the narrative must be reframed. Executive protection is not a personal luxury but a critical component of enterprise risk management (ERM) (COSO, 2017). Its value is the assurance it provides, allowing talent, capital, and reputation to operate securely in a volatile world. The cost of a professional detail must be consistently evaluated against the holistic cost of a security failure—a sum encompassing ransom, litigation, reputational destruction, and human tragedy, which invariably dwarfs the investment.
7. Conclusion
The principal’s understanding of their CPO is the decisive factor in the efficacy of personal security. The economic misprioritization, reliance on cognitively unsustainable labour practices, and dangerous role conflation are not isolated issues but direct symptoms of this core cognitive gap. This essay has employed interdisciplinary evidence to demonstrate that these behaviours are predictable outcomes of neuropsychological biases, information asymmetry, and a fundamental misapprehension of the CPO’s sophisticated, intelligence-led skill set.
Addressing this deficiency is the paramount challenge for the close protection profession. It demands nothing less than a cultural and structural transformation. The industry must embrace scientific professionalization, replacing anecdote with evidence-based standards. Practitioners must evolve from being silent "hands" into articulate consultants and educators. Principals must be guided to become informed partners in their own security, recognizing that true protection is a cognitive enterprise whose value is measured in sustained continuity and strategic freedom. The luxury dinner is ephemeral; the assurance provided by a properly understood, resourced, and utilized CPO is foundational. Closing this gap in understanding is, therefore, not an administrative task but a strategic imperative for the safety of principals and the credibility of the profession itself.
References
Agnew, R. (1992). ‘Foundation for a General Strain Theory of Crime and Delinquency’, Criminology, 30(1), pp. 47-88.
Akerlof, G. A. (1970). ‘The Market for "Lemons": Quality Uncertainty and the Market Mechanism’, The Quarterly Journal of Economics, 84(3), pp. 488-500.
Borum, R., Fein, R., Vossekuil, B., & Berglund, J. (2019). ‘Threat Assessment: Defining an Approach for Evaluating Risk of Targeted Violence’, Behavioral Sciences & the Law, 37(5), pp. 600-609.
Brooks, D. J. (2019). Corporate Security: Using Knowledge and Networks to Manage Risk. London: Routledge.
Bunker, R. J. (Ed.). (2021). Trends in Tactical Violence: Case Studies from the Field. California: Naval Postgraduate School Press.
Button, M. (2020). Private Security. 2nd edn. London: Palgrave Macmillan.
Committee on Tactical Combat Casualty Care (CoTCCC). (2021). Tactical Combat Casualty Care Guidelines. Available at: https://www.deployedmedicine.com/.
Committee of Sponsoring Organizations of the Treadway Commission (COSO). (2017). Enterprise Risk Management–Integrating with Strategy and Performance.
Dawson, D., & McCulloch, K. (2005). ‘Managing Fatigue: It's About Sleep’, Sleep Medicine Reviews, 9(5), pp. 365-380.
Endsley, M. R. (1995). ‘Toward a Theory of Situation Awareness in Dynamic Systems’, Human Factors, 37(1), pp. 32-64.
Eysenck, M. W., Derakshan, N., Santos, R., & Calvo, M. G. (2007). ‘Anxiety and Cognitive Performance: Attentional Control Theory’, Emotion, 7(2), pp. 336-353.
Fay, J. (2020). Executive Protection: The Guide for the New Professional. Florida: Independently Published.
Fischer, R., Halibozek, E., & Walters, D. (2008). Introduction to Security. 9th edn. Oxford: Butterworth-Heinemann.
Gill, M. (2021). Security Consulting. 4th edn. Cambridge: Cambridge University Press.
Gill, M., & Howell, C. (2021). ‘The Professionalisation of Security: Challenges and Opportunities’, Security Journal34(3), pp. 437-455.
Global Advisory Council (GAC). (2022). * -Incident Indicators (PIIs) in Targeted Violence: A Practitioner’s Handbook.
Health and Safety Executive (HSE). (2022). Managing Shift Work: Health and Safety Guidance. HSG256. London: HSE Books.
Hitchcock, J. (2019). ‘Professional Distance: The Ethical Boundary in Executive Protection’, Journal of Applied Security Research, 14(3), pp. 322-335.
Kahneman, D., & Tversky, A. (1979). ‘Prospect Theory: An Analysis of Decision under Risk’, Econometrica, 47(2), pp. 263-291.
Kaplan, R. S., & Norton, D. P. (1992). ‘The Balanced Scorecard—Measures That Drive Performance’, Harvard Business Review, 70(1), pp. 71-79.
Knutson, B., Rick, S., Wimmer, G. E., Prelec, D., & Loewenstein, G. (2007). ‘Neural Predictors of Purchases’, Neuron, 53(1), pp. 147-156.
Maslach, C., & Leiter, M. P. (2016). ‘Understanding the Burnout Experience: Recent Research and Its Implications for Psychiatry’, World Psychiatry, 15(2), pp. 103-111.
See, J. E., Howe, S. R., Warm, J. S., & Dember, W. N. (1995). ‘Meta-Analysis of the Sensitivity Decrement in Vigilance’, Psychological Bulletin, 117(2), pp. 230-249.
Shepherd, D., & Button, M. (2019). ‘The Security Cost-Benefit Analysis: A Framework for Executive Decision Making’, Risk Management, 21(4), pp. 245-263.
Silberman, L. (2018). ‘The High-Reliability Organization of Close Protection’, Journal of Protection Sciences, 4(1), pp. 15-29.
Smith, P. G. (2022). Legal Liabilities in Security Operations. 3rd edn. Edinburgh: LexisNexis.
Sunstein, C. R. (2002). Risk and Reason: Safety, Law, and the Environment. Cambridge: Cambridge University Press.
Thomson, L., Petty, M., & Scholes, A. (2015). ‘A Systematic Review of the Effects of 12-Hour Shifts on Patient Safety and Healthcare Worker Fatigue’, International Journal of Nursing Studies, 52(3), pp. 605-614.
Veblen, T. (1899). The Theory of the Leisure Class. New York: Macmillan.
Warm, J. S., Parasuraman, R., & Matthews, G. (2008). ‘Vigilance Requires Hard Mental Work and is Stressful’, Human Factors, 50(3), pp. 433-441.
Wickens, C. D. (2002). ‘Multiple Resources and Performance Prediction’, Theoretical Issues in Ergonomics Science, 3(2), pp. 159-177.




Comments