Foreword It is possible that on a list of all the topics of central importance to our well being and yet have been subjected to a low amount of scholarly research security would appear near the top. Indeed, there have been few good attempts to develop the science of security, not because there are not good scientists interested in security, it is more that by and large they have written different types of books. This is why this text is important. It is written by two leading researchers, indeed household names in security research, who are able to speak the language of both 'science' and 'security'. Moreover, this text is written to engage. It starts with a critique of the concept of security. Most books of this kind start that way, but often progress little more than reminding us that the word 'security' has several meanings and in some languages is interpreted as the same as 'safety'. Clifton Smith and David Brooks take us far beyond that, the body of knowledge of security is defined and critiqued and we are invited to understand how the current state of security knowledge relates to the requirements of a discipline (to which it surely aspires). I hope all students – and for that matter practitioners too - will take a special interest in their discussion of the scientific method. This is fundamental to fully understanding how security as a subject needs to evolve and develop. Personally I would not mind if it became a requirement, and at the very least an expectation, that all students of security management should read at least the first chapter, but they be would be wise if they read the whole text. In so doing they will be able to learn how different theories apply to security, including management theories, systems theories, and how these inform the practice of security and relate to planning, metrics, ethics, and cost benefits to highlight just some examples that practitioner need to engage with. The authors offer us ten key principles which they present as guides to practice. Not everyone will view these as complete but they have set a framework for others to critique, I am sure they hope, as we all should, that future researchers will engage with that task. Indeed, in an array of areas, for example, risk management, business continuity management, facilities management, routine activities theory, Defence in Depth and Crime Prevention Through Environmental Design, concepts are examined and shown how they can and do relate to security not from the perspective of a criminologist, as so often is the case, but rather from the viewpoint of a scientist. Their discussion of the role of technology offers a benchmark against which the progress of security can be measured in the years ahead, and they devote a chapter to highlight the ways in which they believe technology is likely to develop and security is likely to change. And throughout the authors keep their audience engaged with important insights and critiques and never lose sight of their goal of providing a better understanding of what security is and how it functions, or should function. The inclusion of a whole chapter on knowledge management is further testament to that. The authors are surely right in presenting security as an emerging discipline, and right too in suggesting that properly directed it has a bright future which. Crucially, this is the important point, in developing better theories it provides a more solid foundation for informing and guiding security work and moving the world of security practice from its current state of 'chaos' to a 'recognised profession'. There book is likely to become a major influence in guiding us in the right direction, I hope it will be heeded, it needs to be. Professor Martin Gill September 2012

Stages of the scientific method
Maslow's hierarchy of human needs.

Figures - uploaded by David Jonathan Brooks

Author content

All figure content in this area was uploaded by David Jonathan Brooks

Content may be subject to copyright.

ResearchGate Logo

Discover the world's research

  • 20+ million members
  • 135+ million publications
  • 700k+ research projects

Join for free

Acknowledgments

We wish to express our gratitude to a

number of people and organizations who

have assisted us by thought and deed over

the duration of the planning, development,

and production of this book.

Mr. Jeffery Corkill, who was always

willing and able to provide us with his

detailed knowledge of intelligence and

input into the future of security.

Mr. Chris Cubbage from MySecurity, who

provided valuable comment and was

always most optimistic about the validity

of this book.

Professor Martin Gill from Perpetuity

Research for his contribution of support in

the Foreword of this book.

Professor Rick Sarre of the University of

South Australia for providing valuable

feedback on portions of the book.

Mr. Bruce Braes for being a sounding

board for security risk management,

business continuity, and his considerable

research into organizational resilience.

Pam Chester, our acquisition editor, who

acknowledged the value of our idea in

writing this book, and her very supportive

staff.

To the (too few) academics striving to

elevate this unique area of security into a

true discipline.

Finally, to the progressive security

practitioners who strive to improve their

industry for those following behind.

ix

Intentionally left as blank

About the Authors

Professor Clifton L. Smith, PhD,

MAppSc (Phys)

Dr. Clifton Smith is currently an honorary

professor at the Electron Science Research

Institute at Edith Cowan University (ECU),

and a visiting professor at the Imaging

Group at Nottingham Trent University

(NTU). He initiated the establishment of the

Australian Institute of Security and Applied

Technology at ECU in 1987, and he developed

research profiles in security imaging, biomet-

ric imaging, ballistics identification, infrared

sensing, and security education. Over the

duration of a decade, Clifton developed the

first bachelor of science (security) program

in Australia, a BSc (security) honors degree,

a masters of science (security science) re-

search degree, and a doctor of philosophy

(security science) research degree. In 2004,

Professor Smith established the Security Sys-

tems Research and Test Laboratory at ECU

for the design and testing of security technol-

ogy. The security systems evaluated and

tested included intelligent CCTV and access

control through biometric systems. In 2005,

Professor Smith developed the masters of

security management coursework degree,

which is now delivered online to all

continents. Dr. Smith retired from ECU in

2006, and continues to supervise PhD stu-

dents at ECU and NTU in security-related

topics.

Dr. David J. Brooks, PhD, MSc

(Security Science), BSc (Security),

ADipEng (Electronics)

Dave has a 33-year security career having

served in the U.K. Royal Air Force, held

positions in the Australian Department of De-

fence, as an academic at Edith Cowan Univer-

sity (ECU), with private security consultancies,

and currently for WorleyParsons as a project

manager of security. During his career, Dave

has worked in all parts of the security industry

gaining insight that such experience provides.

Dave maintains a role as a research leader

within the Security Research Institute at

ECU, specializing in security knowledge, se-

curity risk management, technology evalua-

tion, and security decay. He is the academic

chair and editor of ECU's annual Security

and Intelligence Conference and is on the edi-

torial committee of the Security Journal. Dave

has a PhD in security risk management, a mas-

ters by research on psychometric risk, and a

bachelor of science (security).

xi

Intentionally left as blank

Foreword

It is possible that on a list of all the topics

of central importance to our well-being and

yet have been subjected to a low amount of

scholarly research, security would appear

near the top. Indeed, there have been few

good attempts to develop the science of secu-

rity, not because there are not good scientists

interested in security, but it is more that

by and large they have written different

types of books. This is why this text is impor-

tant. It is written by two leading researchers,

indeed household names in security re-

search, who are able to speak the language

of both science and security.

Moreover, this text is written to engage. It

starts with a critique of the concept of security.

Most books of this kind start that way, but

often progress little more than reminding us

that the word "security" hasseveral meanings

and in some languages is interpreted as the

same as "safety." Clifton Smith and David

Brooks take us far beyond that—the body of

knowledgeof security is defined and critiqued

and we are invited to understand how the

current state of security knowledge relates to

the requirements of a discipline (to which it

surely aspires). I hope all students—and for

that matter, practitioners too—will take a spe-

cial interest in their discussion of the scientific

method. This is fundamental to fully under-

standing how security as a subject needs to

evolve and develop. Personally, I would not

mind if it became a requirement, and at the

very least an expectation, that all students of

security management should read at least

the first chapter, but they would be wise if

they read the whole text.

In so doing, they will be able to learn how

different theories apply to security, includ-

ing management theories and systems theo-

ries, and how these inform the practice of

security and relate to planning, metrics,

ethics, and cost benefits, to highlight just some

examples that practitioners need to engage

with. The authors offer us 10 key principles

that they present as guides to practice. Not

everyone will view these as complete, but

they have set a framework for others to cri-

tique. I am sure the authors hope, as we all

should, that future researchers will engage

with that task.

Indeed, in an array of areas, for example,

risk management, business continuity man-

agement, facilities management, routine ac-

tivities theory, defense-in-depth, and crime

prevention through environmental design,

concepts are examined and shown how they

can and do relate to security not from the per-

spective of a criminologist, as so often is the

case, but rather from the viewpoint of a sci-

entist. Their discussion of the role of technol-

ogy offers a benchmark against which the

progress of security can be measured in the

years ahead, and they devote a chapter to

highlight the ways in which they believe

technology is likely to develop and security

is likely to change. Throughout, the authors

keep their audience engaged with important

insights and critiques and never lose sight of

their goal of providing a better understand-

ing of what security is and how it functions,

or should function. The inclusion of a whole

chapter on knowledge management is fur-

ther testament to that.

xiii

The authors are surely right in presenting

security as an emerging discipline, and right

too in suggesting that properly directed, it

has a bright future. Crucially, this is the

important point: developing better theo-

ries provides a more solid foundation for

informing and guiding security work and

moving the world of security practice from

its current state of "chaos" to a recognized

profession. This book is likely to become a

major influence in guiding us in the right

direction—I hope it will be heeded, it needs

to be.

Martin Gill

xiv FOREWORD

Preface

The writing of this book has been a true ad-

venture, as we believe that we have made a

quantum step in the understanding of the de-

sign, application, operations, and education

of security by having a theoretical foundation

for our security content. We consider that a

theoretical foundation to the understanding

and application of security at the national

and commercial levels will enhance the

future development of the discipline.

Professional development is an essential

component of professional employment, as

it allows individuals to maintain currency

in their chosen career field. A characteristic

of professional development is that it is both

ongoing and directed—that is, to maintain

the confidence of the community in the

knowledge and skills base of a profession,

an individual must continue to strive to be

at the leading edge of knowledge in his or

her chosen discipline.

The security industry has become an inte-

gral part of business enterprise and human

activities, wherever businesses engage in

wealth-creating activities and people congre-

gate into groups for leisure or living. The

functional aspects of security are necessary

to ensure protection and safety of individuals

and assets. The security of persons, assets,

and information remains the responsibility

of government, large organizations, and the

community. At best, the study of security

can only be considered as an emerging disci-

pline, and in some minds still a component of

criminology. However, over the past decade

sufficient new knowledge in the domain of as-

set protection has been published that there is

a case for the claim of security to be consid-

ered as a distinction and discrete body of

knowledge.

The purpose of this book is to seek regu-

larity and internal consistency within the

knowledge domain of security, and to dem-

onstrate the underlying principles applied

in the understanding of security to those of

the scientific method. That is, much of the

knowledge domain of security can be

discussed in terms of theory, either as newly

developed paradigms for asset protection

or as well-established theories within other

disciplines. Thus, by borrowing theories

from other disciplines, it may be possible

to enhance the understanding and therefore

development of the emerging discipline of

security science.

Using theories to apply methods of pro-

tection allows a degree of prediction and

provides a robust test for the discipline.

Nevertheless, for security and, in particular,

the security industry to reach such a state

requires further professionalization at many

levels. To be considered a profession re-

quires defined concepts that form a body of

knowledge that has structure. Knowledge

is being defined within the broader context

of security; however, the relevance and rela-

tionship of such knowledge has to be deter-

mined. If security is an emerging discipline,

what concepts are more related to security

than others and how do they relate to the

knowledge structure? An understanding of

how security knowledge is structured, and

its interrelationship and interdependencies,

are an important element in achieving

xv

regularity and consistency. Ultimately, a

structure of security knowledge may be

formed that supports a discipline of security

science.

The principal themes of this book are

according to our philosophy of the structure

of knowledge in the discipline of security

science, and, as such, will influence the

arguments and discussions on the future di-

rections in the study of the protection of

assets. These themes of the book include an

understanding of the concept and manage-

ment of security, together with security risk

and the management of security risk. Thus,

by developing a theoretical context for these

principal themes of the knowledge base, it

is possible to build a knowledge structure

that can be applied to security aspects

that can be operationalized to fulfill the func-

tion of protecting an organization's assets.

According to these themes, the understand-

ing of the ideas of asset protection has been

strongly influenced by Bloom's taxonomy,

where a hierarchy of understanding of con-

cepts and principles has been presented to

ensure that advanced-level thinking is ap-

plied to the preservation of well-being and

safety.

This book presents a case for the future di-

rection in the development of security science

through the understanding of the knowledge

associated with asset protection and the pro-

cesses to achieve asset protection. On the con-

cept of security, Chapter 1 discusses the

notion of asset protection according to socio-

logical traits, and the perceptions of the func-

tions of security. A description of the

scientific method is presented to establish

the basis for theories of security. Chapter 2

discusses the principles of security manage-

ment within the concept of resilience applied

to asset protection. The principles of risk, se-

curity risk, and security risk management are

presented and applied in Chapter 3. The so-

cial and cultural theories associated with

the risk management process are considered

to evaluate the theories that underlie decision

making within security risk management.

Chapter 4 compares and contrasts the secu-

rity strategies that may be used to improve

the built environment, considering such tech-

niques as physical measures, crime preven-

tion through environmental design, lighting

and the landscape, and the interrelationship

between facilities and security.

Chapter 5 presents the need for physical se-

curity for the protection of assets, and con-

siders the defense-in-depth principle as an

important approach. The applications of the

routine activity theory through defense-in-

depth and crime prevention through environ-

mental design are appropriate applications in

security. The applications of critical path anal-

ysis and universal element conceptual map-

ping in Chapter 6 are suitable strategies for

assessing physical attacks on facilities. Also

the types and functions of detection systems

are discussed, with understanding of the

possibility of being defeated. Furthermore,

Chapter 7 describes the principles of access

control with an emphasis on biometric identi-

fication. The modes of attack on biometric sys-

tems are considered in order that these might

be prevented. Chapter 8 discusses knowledge

management as strategies and practices in an

organization to consolidate the corporate un-

derstandingofitsinformation.Theimportance

of security intelligence applied to the security

management plan is presented, together with

some discussion on espionage and insider

security threats. The importance of the four

stages of business continuity management

in the context of a crisis is presented in

Chapter 9 . Finally, Chapter 10 discusses the

future of the concept of security in short-, me-

dium-, and long-term predictions for its future

directions and outcomes.

The foundation for the continued develop-

ment of formal knowledge of security and its

applications for the protection of assets in the

xvi PREFACE

national and international contexts will de-

pend on understanding the principles and

concepts of the emerging discipline of security

science. A theory-driven learning program at

the undergraduate and graduate levels of

study will ensure that the formal understand-

ing of security will prevail. The knowledge

base for the emerging discipline of security

will be enhanced by ongoing research, both

in the fundamental context of theory

development and the applied context such as

knowledge management and business conti-

nuity management. Such emergence will pro-

vide the foundation for the formal discipline

of security science, providing organizational

security with an element in becoming a

profession.

Clifton L. Smith & David J. Brooks

September, 2012

xvii PREFACE

Intentionally left as blank

CHAPTER

1

Concept of Security

OBJECTIVES

Discuss what constitutes a traditional

approach to the nature of security.

Critique the scientific method and

engineering design process for the study

of security science.

Examine the diverse and interrelated

disciplines and practice domains of security.

Evaluate theories or concepts that provide

definitions of security.

Appraise the need to provide context when

defining the concept of security.

Defend a framework that supports a

contextual definition of security science.

INTRODUCTION

The traditional academic disciplines have evolved and developed over centuries to reach

their current state of refinement. These traditional disciplines, such as astronomy, physics,

mathematics, medicine, and, more recently, biology and environmental science, exhibit a

set of characteristics by which each can be designated as a discipline. Some of the character-

istics of a discipline would include:

1. Body of knowledge: A well-defined and inclusive body of knowledge.

2. Structure of knowledge: An internal structure of the knowledge, achieved through

internal relationships between concepts so that consistency and logic prevail.

3. Concepts and principles: The building blocks of the knowledge of a discipline are

concepts, and the relationships between concepts are governed by principles.

4. Theories: Theories are predictive in function and provide the ultimate test for a

discipline, as outcomes can be predicted.

The knowledge domain of security has yet to achieve the status of being designated an ac-

ademic discipline, as it lacks validity in the characteristics of the traditional disciplines. How-

ever, the emerging security science discipline will aspire to these characteristics with future

1 Security Science – The Theory and Practice of Security

http://dx.doi.org/10.1016/B978-0-12-394436-8.00001-1

#2013 Elsevier Inc. All rights reserved.

ongoing research applied to the characteristics of a discipline, to provide the context for

knowledge, structure, principles, and predictive theories.

Security lacks definition and, therefore, lacks structured knowledge. In addition, security is

diverse, cross-disciplined, and without a defined or specified knowledge or skill structure

(Hesse and Smith, 2001). Nevertheless, this should not lead to a conclusion that security does

not contain a definable knowledge structure. The diversity and cross-disciplined nature of se-

curity will evolve as the discipline becomes more professional, concepts are developed and de-

fined, and tertiary education programs increase. Professional development is an essential

component of professional employment, as it allows the individual to maintain currency in their

chosen career. Thus, professional diversity has to be bounded by structured knowledge con-

cepts. A characteristic of professional development is that it isboth ongoing and directed—that

is, to maintainthe confidence of the community in the knowledge and skills base of a profession,

you must continue to strive to be at the leading edge of knowledge in your chosen discipline.

The foundation for the continued development of formal knowledge of security and its

applications for the protection of assets in the national and international contexts will depend

on an understanding of the principles and concepts of the emerging discipline of security.

Research and development in the structure of the discipline of security is crucial for the pro-

fessional application of a new generation of conceptual principles of security for the protec-

tion of assets. As Fischer et al. (2008, p. 482) suggested, the future of security is very positive

considering the growth indicated in the discipline.

Security lacks characteristics of a discipline, with a defined and inclusive definition, as the

concept of security is diverse and multidimensional. Nevertheless, security can be defined

given context. Therefore, this chapter introduces the concept of security and provides defini-

tion through context and the presentation of supporting theories, models, and frameworks.

Thus, a definition goes some way in achieving such understanding as to why security is

multidimensional in nature through a staged approach, commencing from security of the

individual to security of national and international systems. Security is a human characteristic

that is objective, perceived, expected, and demanded by people in many different forms. It is

perhaps one concept that over many decades has not changed in its original use; rather, it has

become more broadly used to encompass greater and more diverse meaning.

SCIENTIFIC METHOD IN SUPPORT OF SECURITY SCIENCE

The development of the knowledge base in security science depends on its advancement as

a discipline, and the extent of interaction between academia and professional practitioners of

the security industry. The knowledge base for the emerging discipline of security will be en-

hanced by ongoing research both in the fundamental context of theory development and the

applied context of asset protection. It is necessary for government, academia, and the com-

mercial security industry to contribute to this knowledge base.

The stages in the development of a scientific discipline depend on the application of the

scientific method to the knowledge base under consideration. The scientific method is a pro-

cess for experimentation to seek cause-and-effect relationships between observable factors in

the information of data gathered. For example, does the presence of a person in an e-field

detector distort the field so that intrusion can be registered? From a social perspective, do

21. CONCEPT OF SECURITY

people use utility theory when accessing security risk or do they take a heuristic approach?

Whether in the hard or soft sciences, the scientific method seeks the cause-and-effect relation-

ship by controlling the variables in the experimentation of the phenomenon.

A definite feature of a science is that there are a set of procedures that demonstrate how

outcomes are produced, and these procedures are sufficiently detailed so that others may rep-

licate the process to verify or refute the outcomes. The scientific method is a process of inquiry

that regards itself as fallible, and as a result purposely tests itself and criticizes its outcomes to

correct and improve itself. Although there are several versions of the scientific method, a basic

approach involves a four-stage model to develop knowledge of a natural phenomenon:

1. Gather data by measuring or recording the observations of the phenomenon.

2. Construct an idea of how the phenomenon operates or functions in the form of a

hypothesis.

3. Test or evaluate the idea or hypothesis by designing an experiment to show the

operation or function of the phenomenon.

4. Analyze the results of the experiment to see if the hypothesis is true or false; if it is

true, then the idea may be formalized as a theory.

Scientific Method

The model of the scientific method can be expanded with preplanning for background

research or information seeking before the hypothesis testing stage, and the model can be ex-

tended with an outcomes communication or reporting stage after the analysis to disseminate

findings to practitioners and interested people (Figure 1.1 ). The strength of the scientific

method is that a formalized process is applied to the problem, and an outcome will either

be gained or rejected. A feature of the scientific method is that the hypothesis of the problem

can be tested time after time, and if the hypothesis continues to be accepted then it is accepted

as knowledge. However, if the hypothesis is rejected once, then the model will not be ac-

cepted. The strength of the scientific method is that anyone can conduct the hypothesis testing

for the problem, and thus establish the validity of the model.

The regularization of observations of a phenomenon can eventually be presented as a the-

ory, provided the phenomenon is scrutinized many times from a variety of viewpoints and

with the same outcomes for each experiment. Figure 1.1 shows that if the result of hypothesis

testing is false or partially true, then a modified hypothesis must be tested. When consistency

of testing the hypothesis is obtained, then the idea becomes a theory and provides a coherent

set of propositions that explain a class of phenomena. The theory can be considered as a

framework to explain further observations, from which predictions can be made.

The strength of the scientific method is that it is unprejudiced—that is, it is not necessary to

believe the results or outcomes of a particular researcher, as one can replicate the experiment

and determine whether the results are true or false. The outcomes of the hypothesis testing do

not depend on a particular experimenter, so that faith or belief does not play any part in the

logical proof or material evidence on whether a scientific idea or theory is adopted or

discarded. Thus, a theory is accepted, not based on the proponent, but rather on the quality

of the results obtained through observations or experiments. Results obtained through the

process of the scientific method are repeatable and reproducible.

3 SCIENTIFIC METHOD IN SUPPORT OF SECURITY SCIENCE

An important characteristic of a scientific theory or hypothesis is that it must be falsifiable.

That is, if any single experiment relevant to the hypothesis is shown to be negative or untrue,

the hypothesis must be rejected. Thus, theories cannot be proven when the hypotheses are

tested, but only rejected when a negative test results from an experiment. The philosopher

Wittgenstein (1953) in his analyses of experimentation claimed that "there is no independent

criterion of correctness," so that the scientific method must continue to test the validity of its

knowledge.

In a tested scientific hypothesis, a prediction is a rigorous, often quantitative, statement

forecasting new outcomes under specific conditions of the idea being considered. The scien-

tific method is formulated on testing assertions that are logical consequences of scientific

theories, developed through repeatable experiments or observational studies of a pheno-

menon. Thus, a scientific theory of which the assertions are contradicted by observations and

evidence will be rejected. The ability of an idea or hypothesis to predict further outcomes

is a strength of the scientific method in its regularization of information from observation

of experiment. Therefore, the power of the scientific method is to be found in the ability to

predict further outcomes from the original hypothesis of the phenomenon. This important

outcome of prediction from the scientific method is a strong indicator of validity of the pro-

cess, as logical predictions of an idea can then also be hypothesis tested for acceptance or

Pose Question?

Review

background of

issue

Develop

hypothesis

Test

Hypothesis

True False or

partially true

Report findings

Reflect and

adjust

FIGURE 1.1 Stages of the scientific method

showing the hypothesis testing of an idea.

41. CONCEPT OF SECURITY

rejection. The philosopher Karl Popper (1963) sought to show that challenges to the scientific

method are based on a series of misconceptions about the nature of science, and about the

relationship between scientific laws and scientific prediction.

The application of the scientific method to ideas in natural phenomena has scientific

researchers propose hypotheses as explanations of the phenomena. Thus, they are able

to design experimental studies to test these hypotheses and make predictions that can be

derived from the hypotheses. The process must be repeatable, to safeguard against mistakes,

confusion, or prejudice by a particular experimenter. Theories that embrace wider domains of

knowledge from similar fields of study may coalesce several or many independently derived

hypotheses together in a coherent supportive knowledge structure. These knowledge struc-

tures are the foundations for the development of an academic discipline and are particularly

relevant to security science.

The scientific method is an enduring cycle that constantly develops more accurate and

comprehensive methods and models. For example, when Einstein developed the special

and general theories of relativity, he did not refute or discount Newton's principia, which

was the foundation for Newtonian mechanics in physics. Newtonian physics was correct

in its day and was true for the observations in nature. But Newton's equations could not cope

with the enormity of mass in the universe, the tininess of particles in the atom, and the huge

speeds of objects in space, which became observable data in the twentieth century. So

Einstein's theories are extensions and refinements of Newton's theories, and therefore

increase our confidence in Newton's ideas of the natural world.

Engineering Design Process

The application of the scientific method has evolved over centuries, but interestingly, the

engineering design process has more recently been developed to service the needs of the

engineer who creates new products or processes. For engineers, the engineering design

process is a set of phases or actions that establishes a need for a product, system, or environ-

ment. Table 1.1 shows the methodology of the engineering design process, and also the

correspondence with the scientific method.

TABLE 1.1 Scientific Method versus Engineering Design Process

Scientific Method Engineering Design Process

State a question or problem Define a problem or need

Gather background information Gather background information

Formulate hypothesis; identify variables Establish design statement or criteria

Design experiment, establish procedure(s) Prepare preliminary designs

Test hypothesis by doing an experiment Build and test a prototype(s)

Analyze results and draw conclusions Verify, test, and redesign as necessary

Present results Present results

5 SCIENTIFIC METHOD IN SUPPORT OF SECURITY SCIENCE

The engineering design process defines the problem by seeking responses to the following

questions as a reason to engage in the development of a product, system, or environment:

1. What is the problem or need?

2. Who has the problem or need?

3. Why is the problem important to solve?

The engineering design process rarely proceeds in a linear manner through stages, but

rather moves back and forth while converging to a solution. Thus, feedback loops in the logic

of the design process are an important characteristic of the procedure. Table 1.1 demonstrates

that similar logic is presented in each of the methodologies for science and engineering. The

rigor of both of the processes is the strengths of the approaches for testable outcomes. While

the scientific method modifies hypotheses that do not test positive and are hence rejected, the

engineering design process features iterations between stages to achieve design outcomes

that are both logical and sustainable.

Security science will use both scientific and engineering design methods. However, due to

the applied nature of security science, it would be expected that the engineering design

method is equally relevant in developing the discipline. Such applied research allows

directed evaluation of real problems within the social environment rather than theoretical

research, better supporting the security industry.

Security science is an emerging discipline that is developing its own theories for the struc-

ture of knowledge within the context of its knowledge domain. Although some theories in

security science are discipline specific, generally current theories are adapted from other

disciplines and knowledge domains for the security context, such as criminology, psychol-

ogy, and engineering, where relatively strong theoretical contexts have been developed.

However, security science is in its formative phase, and will evolve over the next decade into

an accepted science. Thus, evolution will be based on rigor and logical application through

science and technology theory and principle. The emergence of security science as an

accepted discipline will herald the advancement of security as a profession.

DEFINING THE CONCEPT OF SECURITY

To varying degrees, we all have a concern for our well-being. These concerns extend to our

family, friends, colleagues, the environment, and the world we occupy. The need to address

these concerns is generally labeled security. The concept of security takes numerous forms

within the wide spectrum of society. As Zedner (2009, p. 22) suggests, security is a powerful

term that has a strong emotional appeal arising from its capacity to bear multiple meanings

simultaneously. Furthermore, the rhetorical allure of security has seen it attach to a long line

of neologisms (global security, international security, cooperative security, and human secu-

rity) that deliberately use the term to mobilize political support and economic recourse.

Security is multidimensional in both concept and application; however, we can define se-

curity and understand its nature when we consider it from a contextual perspective. For ex-

ample, security is comprehensible when we consider a lock and key, but less so when we

consider the fight on terrorism. The meaning of security can be unbounded, for example,

in the past decade the increasing world exposure to terror attacks has raised social concern

61. CONCEPT OF SECURITY

over the ability of nation-states to protect its citizens. When we use the term security without

context, it can and does mean many things to many people.

Security may be considered assured freedom from poverty or want; precautions taken to

ensure against theft or espionage; or a person or thing that secures or guarantees (Angus and

Roberston, 1992). Furthermore, Fischer et al. consider that security "implies a stable, rela-

tively predictable environment in which an individual or group may pursue its ends without

disruption or harm and without fear of such disturbance or injury" (2008, p. 31). A tradi-

tional definition of security may be the provision of private services in the protection of

people, information, and assets for individual safety or community wellness. In addition,

private or commercial security may be considered the provision of paid services in

preventing undesirable, unauthorized, or detrimental loss to an organization's assets

(Post and Kingsbury, 1991).

Nevertheless, security has to be expanded to consider national security and the defense of a

nation-state through armed force or the use of such force to control its citizens. Security may

also imply public policing by state-employed public servants. Still others consider security as

crime prevention, secure technology, risk management, or loss prevention (Brooks, 2009 ). The

Protection of Assets Manual (Knote, 2004, pp. 1–2) states that the title was chosen because the

term security is too narrow a definition, whereas the title of protection of assets better describes

the function of security; however, it is argued that the reverse holds greater validity. Asset

protection does better define the function of a part of security, but it is only one part of many.

Security may be considered to be all of these statements; however, such diversity results in

a society that has no clear understanding of security, with a divergence of interests from many

stakeholders (Manunta, 1999 ). As ASIS International stated, "every time we think we've got

the definition of the security field nailed, somebody ... starts taking some of the nails away"

(2003, p. 10). Security has to have a shared definition among the many disciplines that incor-

porate and contribute to security. However, security does present rather different meanings

to different people (Davidson, 2005 ), given time, place, and context.

As shown in Table 1.2 , the nature of security has to be considered. Security may be

extensions—namely, security of international systems, nation-states, and groups and indivi-

duals (Rothschild, 1995 ). In addition, the aspect of security can be an objective concept

(e.g., a lock and key), subjective and driven by our perceptions (e.g., the installation of public

CCTV to make a community feel safer), or symbolic (e.g., aviation security restricting

passengers taking excessive liquids airside). We need to consider security from the individual

to international, as well as the objective, subjective, and symbolic aspects.

TABLE 1.2 Nature of Security

Security Extensions Security Aspects

Security of individuals Objective

Security of groups Subjective

Security of nation-states Symbolic

Security of international systems

7 DEFINING THE CONCEPT OF SECURITY

SECURITY OF INDIVIDUALS

Security of individuals can be discussed within the context of a number of theories. These

theories include Maslow's hierarchy of human needs (1943), the related but distinct concepts

of security and safety, and, finally, the risk effect. Risk has always been closely related to the

concept of security, but it is only in recent times that the management of risk has played such a

significant role in applied security.

Hierarchy of Human Needs

In 1943 Maslow proposed the theory of hierarchy of human needs, ranking an individual's

motivational needs within a priority schema. The theory is often presented as a triangle

(Figure 1.2 ), with five successive stages. Maslow integrated two distinct groupings, being de-

ficiency of needs and growth needs. Deficiencies at each stage must be satisfied by the indi-

vidual before they can proceed to the following level, resulting in the higher needs only being

considered once the lower or more basic needs are satisfied. Once these lower needs are

achieved, creativity, self-fulfillment, and realization of one's potential may be reached. How-

ever, if lower-level needs are no longer being achieved, the person will temporally refocus on

such lower needs and not regress to the lower levels.

Physiological needs are concerned with human survival—breathing, homeostasis, water,

sleep, food, and excretion. Once these physical needs are satisfied, safety needs are consi-

dered. The safety level is often presented as safety and security , with an individual's needs

for personal security and extending to aspects such as order and control, financial security,

job security, health, and well-being.

Once physiological and safety needs are reached, the need of love and belonging fol-

lows. This third stage involves emotional-based relationships and a sense of belonging,

such as friendship, family, affiliation, intimacy, and love. The next level, esteem, considers

an individual's need to achieve, seek, and gain peer approval and recognition, gain self-

value, and respect others. Finally, the highest level is actualization, where one gains

self-fulfillment, understanding, and realizes one's potential. Such actualization leads to

creativity, morality, spontaneity, problem solving, and acceptance of others (Huitt, 2004;

Maslow, 1943).

Actualization

Esteem

Love/belonging

Safety/security

Physiological

FIGURE 1.2 Maslow's hierarchy of human needs.

81. CONCEPT OF SECURITY

As Maslow's hierarchy of human needs demonstrates, safety and security is a primary

need for the individual. Without feeling safe and secure, our ability to cooperate as a cohort

and achieve creativity is restricted. Thus, such an understanding leads to the conclusion that

security should be an important focus within an organization, allowing employees to be as

efficient as possible. As Huitt (2004) states, Maslow's—and more recent research in this

area—is important for anyone concerned with developing and using the human potential.

Safety versus Security

Safety is freedom from danger or risk of injury, which reflects a past definition of security.

Notwithstanding Maslow's view on the relationship of safety and security, these two con-

cepts are distinct from each other. They do have a degree of relationship, but should be

considered as unique concepts. Safety focuses on hazards that tend to suggest an accident

or an internal threat. As Ale states, "safety is associated with incidents and accidents. Security

deals with malicious acts, such as sabotage and terrorism. There is a grey area, however,

where the distinction between security and safety, between accident and criminal act, is

difficult to draw" (2009, p. 12).

Nevertheless, the distinction between the concepts of safety and security is the added

emphasis on being protected from dangers that originate from outside. A security threat

or risk is someone or something that intends to or could cause harm (see Chapter 3 for a

more extensive discussion of threat and harm), applied from the external (the idea of exter-

nal threat should not be taken literally). Safety focuses on the process within the internal

environment. It could be considered that security threats and risks are far more difficult

to address, as the attacker will try to use his or her human ingenuity to bypass any protec-

tion system put into place.

Risk-driven Security

Security is considered a form of risk, applied within the management approach of risk

management. All activities carry some form of risk and, thus, one makes a decision as to

whether to conduct an activity based on the utility of the activity. In other words, does

the risk of an activity outweigh the benefit? Demands for ever greater reductions in risk

exposure—from a cultural, social, community, corporate, and individual basis—can proceed

beyond the point of overall benefit and become counterproductive. There are three significant

points about how people determine the acceptability of risk:

1. Risk is generally less accepted when imposed by external factors over which people

have little or no control. People demand higher safety standards at work and risks in

the workplace are not well accepted, because people cannot control their exposure.

2. Risks stemming from identifiable activities are not as accepted. Incidents such as the

Exxon Valdez oil spill are less accepted because someone is at fault.

3. Simple numbers and probabilities are inadequate to represent reaction to incidents of

different magnitude. Catastrophic events are given far more attention than more

frequent, but lower consequence, events.

Nevertheless, risk is the possibility of incurring loss or misfortune, which is distinct from

security. There is a degree of interrelationship, but risk management takes an actuary

9 SECURITY OF INDIVIDUALS

approach to security. An actual or perceived risk will eventuate in the need for some form of

security, whether that is at the individual, group, or nation-state levels. Security is an outcome

of risk, and in today's world, the concept of risk could be considered to take precedence over

security (see Chapter 3).

SECURITY OF GROUPS

The security of groups extension can be discussed within the context of the law and public

security. For example, the underlying nature of the law and social contract, where law is the

foundation of our society, and security is the maintainer or enforcer. In addition, the function

of public security (e.g., police) as both policing and private security are becoming more reliant

on each other and converging.

The Law and Social Contract

Driving and developing public security was the most significant aspect that led to our current

social construct, namely the phenomenon of the social contract between the individual and the

nation-state. This contract was perhaps a fundamental aspect that shaped and defined the

broader concept of security as we know it today. We, as individuals, surrender some of our rights

for protection by our nation-state, and in exchange the nation-state expects us to support it.

Society, as a whole, defines social expectations or norms. The law is the foundation and

articulates these social norms. If an individual or group operates beyond those social norms,

they are considered to be breaking the social contract and therefore breaking the law. To

maintain the social contract requires a reaction—in general, defined public security or, more

commonly, policing. Therefore, security is the enforcer or output of the social contract.

Public Security (Policing)

The primary public security function is to maintain accepted behaviors among the commu-

nity, upholding law and regulations, and protecting a nation-state's' general public (Zedner,

2009). Nevertheless, public security is often considered a form of security and is developed

hand-in-hand with other practice areas of security. While one security practice area may have

been more dominate than the other at some point in time, each rose concurrently, supporting

each other and with members moving between areas. While it is considered that private

security developed first, it is important to consider that security reflects society and aims

to meet the needs of its society. Western views suggest that security may have first been

documented in medieval England, with programs to clear the king's roads of brush to serve

as a precaution against highway robbery.

As society changes, so does security, and there are extensive discussions on public security

verses private security. It would be highly unlikely that nation-states would wholly replace

their public security functions for wholly private security services. In the past where this has

been attempted, the results have been for a short-term financial state benefit, public discourse,

and contract termination (Knote, 2004). Nevertheless, both relationships and contractual

10 1. CONCEPT OF SECURITY

Intentionally left as blank

partnerships have and will continue to be successful and expand. Relationships between

public security and private security have been growing for many years. In the past, this has

been through second-career police officers moving from one career to the other. Both public

security and other security practice areas can see the benefits of such a relationship. In addi-

tion, contractual partnerships have been increasing, where private security complement and

allow sworn public officers to be more effective in frontline public security functions.

Distinct differences between public security and private security are their philosophy,

principles, authority, and status (Table 1.3 ), where public security has the obligation of

egalitarian service but private security obligations are client exclusive (Knote, 2004,

pp. 2–22; Sarre and Prenzler, 2011 , p. 83). In other words, public security upholds the social

contract, whereas private security protects one's own assets. Private security's primary func-

tion is to protect their client's people, information, and assets. Such an approach does lead to

varying needs between very similar organizations, resulting with inconsistencies. In addition,

the debate in regard to a profit or nonprofit approach should be considered, but this may

reduce with increasing financial pressure in many public departments. Nevertheless, public

security and private security have quite a different intent.

Public security has many similar functions to the other practicing security domains; how-

ever, it is quite distinct. Public security reacts to an event, with the function to enforce social

law. The reactive nature distinguishes public security from private security, which attempts

to prepare for an event to protect one's own property.

TABLE 1.3 Public Security versus Private Security Functions

Private Security Function Public Security

Client Input Citizen

Selective Service Equal

Profit-driven Delivery resourcing Tax-funded

Undetermined Finance Predetermined

Fragmented Structure Centralized

Citizen Power Legislated

Limited Training Intensive

Loss prevention Role Law enforcement

Protection Orientation Offender

Specific Target General

Private Space Public

Restricted Regulated Heavily

Wide Discretion Limited

Asset protection Output Enforcement

Proactive Stance Reactive

11 SECURITY OF GROUPS

Private Security

A significant development in security has been the growth of private security, which has

grown into a large and international industry that can be broadly defined as an industry de-

voted to crime prevention. Private security is also known as organizational security, corporate

security (Brooks, 2009), commercial security, asset protection, and security management.

Private security officers outnumber public security (police) officers at the estimated global

average of 348 to 318 per 100,000 of population (Prenzler et al., 2009 , p. 4). In the United States,

there are 10,000 security companies employing 1.8 million security guards, equating to almost

three private security officers to every public security officer, and this ratio is expected to

increase (Hemmens et al., 2001 ). Cities in the United States are spending $70 million per week

on security services (Fischer et al., 2008).

The private security industry is an emerging and relatively young discipline and the

traditional distinction between past security entities of public security, private security,

and defense are merging. The expansive nature of private security has resulted in limited

and diffuse understanding, even though extensive resources are being expended. The role

of private security has further expanded, and "there is now an acknowledged role for com-

mercial security in actions against global security threats, national security concerns, local

community safety needs, as well as the requirements of the corporation and the individual"

(Wakefield, 2007 , pp. 13–14).

Combining the findings of several studies (Bradley and Sedgwick, 2009; van Steden and

Sarre, 2007), it has to be noted that the strong growth of private security can be attributed

to the following factors:

The reduction in the public provision of services by nation-states.

The general increase in the fear of crime.

The transfer of noncore public security tasks to the private sector.

Growing value and portability of assets requiring more protection.

Within many parts of the world, the security industry is not classified as one industry;

rather, its members are spread across many associated practice areas that include many oc-

cupations. Private security's prime purpose is to maintain corporate activity, allowing output

and support profit. Thus, such purpose may be applied to not only private organizations but

also public organizations. However, to sustain security requires the cost to be spread between

receiving beneficiaries or stakeholders of the mitigating strategies. In addition, such security

has to consider intangible aspects of social and community issues, a difficult task when deal-

ing with such diverse stakeholders with competing views.

The growth of private security will continue and its importance strengthened within the

broad spectrum of security. Therefore, there is a greater need to better understand and

develop a scientific foundation for the security science practice area.

SECURITY OF NATION-STATE AND INTERNATIONAL SYSTEMS

Security extensions of both nation-states and international systems can be discussed within

the context of the traditional approaches to international security, such as defense or military

12 1. CONCEPT OF SECURITY

power. In addition, international systems may include national security, which is focused on

local and regional nation-state protection. A more recent approach to nation-state security is

homeland security, the convergence of traditional security practice areas such as defense,

public security, and private security. Finally, the politicized approach to some or all of these

security extensions is considered with securitization.

National Security and Defense

Security has strong parallels with defense, as once groups formed and became nations,

these had to be protected and expanded; nevertheless, defense cannot explicitly define secu-

rity. The recent international security environment has witnessed the erosion of traditional

nation-states with increased globalization and access to worldwide information networks

that have further merged defense and security (Stapley et al., 2006 ). The conventional view

of security in defense concerns the survival of the nation-state and the preservation of its sov-

ereignty (Hettne, 2010, p. 33). Revolving around this view are definitions that are "more

concerned with redefining the policy agendas of nation-states" (Baldwin, 1997 , p. 5).

Defense, as with other related practice areas, is often considered security. An example of

such parallelism may be demonstrated through public security and military organizations,

and the increasing convergence in their response to homeland security challenges. Neverthe-

less, opposing such convergence is still the large number of different state agencies that may

respond. Thus, such diverse and multidisciplined views of security cannot support a single

definition of security.

Homeland Security

An applied extension of security of nation-state is homeland security. Homeland security

incorporates and attempts to integrate diverse domains of security such as defense, national

security, private security, and public security. National and public security also integrate first

responders and disaster recovery departments such as fire and emergency, medical facilities

and staff, and other state departments such as intelligence agencies.

An example of such integration can be seen in the United States, where the Department of

Homeland Security (DHS) was formed as a result of national security events and directed

threats. Many other nation-states have not been so direct in their attempt to reconstruct their

approach to national security and the need for greater convergent security. Nevertheless,

many nation-states have shifted their approach to national security to better integrate their

broad security domains, attempting to ensure that they can better tackle their changing

national threats. As Fischer et al. suggest, more nation-states are now experiencing greater

government control in establishing and maintaining the nations' security (2008); however,

much of this security is supported by the private sector.

In the United States, homeland security is officially defined by the National Strategy for

Homeland Security as "a concerted national effort to prevent terrorist attacks within the

United States, reduce America's vulnerability to terrorism, and minimize the damage and re-

cover from attacks that do occur." The DHS includes the Federal Emergency Management

Agency, which has responsibility for preparedness, response, and recovery to natural

13 SECURITY OF NATION-STATE AND INTERNATIONAL SYSTEMS

disasters. The scope of homeland security includes emergency preparedness and response for

an all-hazards approach to such events as terrorism to natural disasters. In addition, domestic

and international intelligence activities, critical infrastructure protection, and border security

that includes land, maritime, and nation borders.

World nation-states react to local, state, and regional threats and situations, resulting in

political agendas where policy is developed and driven by many vectors. Such policy drives

the domains of security to varying degrees, based on their own and competing factors. Thus,

the affect is seen not only in national security, but in all aspects of a community from transit

security, public and private utilities, public buildings, and private facilities.

Securitization

The concept of securitization was put forward as a means to better understand security,

based on the notion of different sectors of security drawn from speech act theory (Buzan

et al., 1998). Securitization highlights the intellectual and political aspects in using the term

security for an ever wider range of issues. The idea argues that it is essential that an analytical

grounding or principle has to determine what is and what is not a security issue. If this ap-

proach is not taken, there is a danger that the concept of security will be applied to any issue

and hence becomes effectively meaningless. Furthermore, the concept of security is directed to

survival; therefore, an issue is represented as an existential threat to the survival of an object.

Securitization is achieved when an issue comes to be treated as a security issue and it is

reasonable to use exceptional political measures to deal with it, thus the issue has been

"securitized." We can think about the process of securitization in terms of a spectrum that

extends from nonpoliticized (meaning that an issue is not a political issue), through politicized

(meaning it is part of a public debate), to securitized (meaning that the issue is thought of as an

existential threat and therefore justifies responses that go beyond normal political practices)

(Peoples and Vaughan-Williams, 2010 , p. 77). Securitization can be extended to all sectors of

security such as the military, environment, economic, and societal, and of course its focus

being the political arena, although it has not been extended to the individual.

CONCEPT OF SECURITY MATRIX

Security has been considered within the context of its extension, namely of the individual,

group, nation-state, and international. Various theories have been used in an attempt to de-

fine the concept of security; nevertheless, security is not easy to define. As Manunta and

Manunta state, "security is both a need and philosophical idea" (2006, p. 631).

One approach to better understand the concept of security and provide understanding is

through the articulation of context or practice areas. Such an approach can be more clearly

demonstrated when considering some of the applied domains of security, using and increas-

ing the "extensions" of security. Table 1.4 is not comprehensive, but it demonstrates the more

popular view of security within a matrix format.

However, Table 1.4 does demonstrate, to some degree, the importance of understanding

the context of security. Where, as with risk, a definition of security is dependent on a clear

14 1. CONCEPT OF SECURITY

articulation of context to gain understanding. With this in mind, there needs to be a definition

that provides a more appropriate context for security, which in this case commences with

defining security science.

SECURITY SCIENCE: CONTEXT DEFINES CONCEPT DEFINITION

When considering a definition of security science, one approach is to view security within a

practise area or with context. Such an approach allows a review of what functions security

practitioners perform and leads to an understanding of its body of knowledge. There has been

past studies (ASIS International, 2010; Brooks, 2009; Hesse and Smith, 2001 ) that have taken

such an approach to develop a security science body of knowledge; nevertheless, before these

studies can be considered a final definition will be presented.

Theoretical Definition of Security

Manunta (1999) put forward a definition of security that encompasses the natures of security

(Table 1.2 ), as it can be applied across the many extensions of security from the individual to

national defense. In addition, the definition allows, to some degree, the aspects of security to

be addressed, namely the objective, subjective, and symbolic nature of security. The definition

uses a formula that combines a number of mutually inclusive components:

Security ¼ð A; P; T ðÞ Si

where A is asset, P is protection, Tis threat, and Si is situation.

TABLE 1.4 Applied Security Matrix

by/for Defense

Public

Security

Homeland

Security

Corporate

Security

Private

Security Individual

International X

Regional XX X

Nation-state XXXX XX XXXX

Community XX XXXX XXX X X

Organization X XX X XXXX XXX X

Group XX X XX XX X

Peer X X X XX

Family XXX

Individual XXXX

Note: X indicates the strength of the relationship between the security provider (by) and the receiver of security (for ), with XXXX having the

strongest and X having the weakest relationships.

15 SECURITY SCIENCE: CONTEXT DEFINES CONCEPT DEFINITION

For security to be considered there must be an asset (A ), and there is an individual, group,

or nation-state who wish to provide some level of protection (P ), with an actual or perceived

threat (T) against the asset. In addition, the sum of these components has to be considered

within a certain environment or situation (Si ), giving the definition context. Thus, the formula

provides the elements of security; nevertheless, the formula is deficient in several aspects.

First, let us consider that for security to be addressed, the asset has to have value (whether

actual or intrinsic). Second, and an issue with many security definitions, the formula does

not assist in a consensual understanding of security. The ability to define security still

requires context, thus placing security within a situation.

Studies in a Body of Knowledge

Traditional academic disciplines exhibit characteristics that designate them as a discipline.

One of the more significant characteristics is a body of knowledge , which needs to be well

defined and inclusive. Supporting and integral to a body of knowledge is the structure of

knowledge, which provides internal structure of the knowledge through conceptual relation-

ships that exhibit consistency and logic.

The knowledge domain of security has yet to achieve the status of being designated an ac-

ademic discipline, as it lacks validity in the characteristics of a definable and defendable body

of knowledge. This is an area that researchers, educators, industry, and government have

been progressing; nevertheless, slowly due to the inability to define the many domains of se-

curity. Such issues include an understanding of what this practice area encompasses and also

semantics—for example, is it security management or protection of assets?

Notwithstanding these issues, research groups (ASIS International, 2010; Brooks, 2009;

Hesse and Smith, 2001; Kooi and Hinduja, 2008 ) have begun to progress a defendable body of

knowledge. One such group is ASIS International, at their annual practitioner/academic sym-

posia. An outcome of their annual symposium has been the development of a security model

containing what the group believed were the core elements of security, which has within the

United States provided a baseline for tertiary-level course development (ASIS International,

2003). For example, the 2009 symposium attempted to gain an understanding of the security

body of knowledge, understand what disciplines security may extract its knowledge categories

from, what knowledge categories are core, how these knowledge categories can be used, and

to consider if consistency and consensus can be gained. In addition, a list of 18 knowledge

categories ( ASIS International, 2009, p. 44) was put forward as a security model ( Table 1.5 ).

TABLE 1.5 ASIS International Symposium Security Model

Physical security Personnel security Information security systems

Investigations Loss prevention Risk management

Legal aspects Emergency/continuity planning Fire protection

Crisis management Disaster management Counterterrorism

Competitive intelligence Executive protection Violence in the workplace

Crime prevention Crime prevention through environmental

design

Security architecture and engineering

16 1. CONCEPT OF SECURITY

Kooi and Hinduja (2008, p. 299) summarize their experience of teaching security to

criminal justice undergraduates where they considered the wider understanding of the

art and science of security, resulting in the recommendation of 19 topic areas (Table 1.6).

Nevertheless, it could be argued that many of these proposed topics—for example, retail,

casino, Olympic, nuclear, and museum security—are practice areas rather than security

knowledge.

Security education, from the perspective of criminal justice and social science, can be ben-

eficial in further validating security categories and the body of knowledge; however, such

studies may also increase confusion as to what may constitute security and reduce the ability

of achieving consensus in the near to medium term.

In a study to define security, Brooks (2009) put forward a list of 13 security knowledge cat-

egories (Table 1.7). The list was extracted and developed from a critique of 104 international

undergraduate tertiary security courses from Australia, South Africa, United Kingdom, and

the United States.

Thus, listings from these many groups begin to support a common body of knowledge.

Such security knowledge categories provide a number of benefits, such as providing a degree

of contextual understanding and the commencement of a security science body of knowledge,

supporting a contextual definition. Furthermore, these categories allow a consolidated frame-

work of security science to be presented. Nevertheless, security science will be prone to a

TABLE 1.6 Security Course: Components in the Context of a Criminal Justice Undergraduate Degree

The origins and development

of security

Security education, training,

certification, and regulation

The role of security

Proprietary vs. contract security Risk analysis and security survey Perimeter and exterior security

Interior security and access

control

Transportation/cargo security Computer and information

security

Security and the law Internal and external fraud Personnel policies and human

relations

Workplace violence Retail security Casino security

Olympic security Nuclear security Museum security

Continuity of operations

TABLE 1.7 Security Knowledge Categories

Criminology Business continuity management Security management

Facility management Industrial security Security technology

Investigations Physical security Law

Risk management Safety Fire science

Source: Adjusted from Brooks, 2009.

17 SECURITY SCIENCE: CONTEXT DEFINES CONCEPT DEFINITION

suffering from a fluid body of knowledge due to such issues as knowledge structure, termi-

nology, differing context, and practice domains and academic disciplines that feel that they

have some ownership of security knowledge.

Consolidated Framework of Security Science

The integration of the 13 knowledge categories from Table 1.7 leads to a framework of se-

curity science (Figure 1.3 ). Such a framework considers the breadth of security science,

whereas traditional security knowledge has generally focused on electronic, manpower,

and physical security categories and not the range of security-related functions. As the secu-

rity science framework indicates along its upper axis, core security knowledge categories

comprise of risk management, business continuity management (BCM), security technology

(encompassing traditional electronic security, but also IT and computing), physical security,

personnel security, and industrial security, all applied at operational, tactical, and strategic

levels. Industrial security encompasses security requirements in unique environments such

as nuclear, aviation security, maritime security, and critical infrastructure. Many of these in-

dustries have legislative security requirements.

The model may overlap other disciplines, which is appropriate as other disciplines can and

do support security science with allied theories. Supporting security knowledge categories

include investigations, law, criminology, facility management, fire and life safety, occupa-

tional safety and health, and intelligence. Such an approach supports what more mature

disciplines do—that is, selectively draw from related disciplines to append their unique

offerings (Young, 2007 , p. 84). In addition, the tabulated knowledge categories and integrated

framework provide some degree of concept definition, assisting in understanding orga-

niational security and commencing knowledge structure.

Thus, organizational security operates at many levels within an organization, such as op-

erational, tactical, strategic, and governance. At the operational level, the day-to-day practice

of security ensures that the function of security is achieved and maintained at the appropriate

level to counter the threat, and meets the organization's expectations and legislative compli-

ance. Nevertheless, effective security should also operate at a tactical level, seeking methods

Operational

Management

Strategic

Governance

Physical

Technology

Investigations

BCM

Criminology Fire & Life

Safety Safety

Industrial

Personnel

Facility

Management

Law Intelligence

Level 1

Level 2

Security Risk

Management

FIGURE 1.3 Integrated knowledge framework of security science. (Used with permission from Brooks, 2012, p. 10.)

18 1. CONCEPT OF SECURITY

to improve performance and provide tangible benefits to the organization. Perhaps the most

important level in developing a true security profession is the ability of practitioners to be

effective at the strategic security level. Such an approach aligns security with the group's core

goals and future directions, allowing proactive management and supporting the group. As

Langston and Lauge-Kristensen state, "it is this [strategic] level that separates the routine

from the dynamic, and justifies the emergence of ... a professional discipline in its own right"

(2002, p. xv).

There have been a number of assumptions made within this integrated framework and

other security models presented. These assumptions considered that some knowledge

categories are more relevant to security than others; therefore, this framework incorporates

a hierarchy of knowledge categories. Level 1 may be considered core security knowledge cat-

egories, whereas level 2 is noncore knowledge categories. The noncore knowledge categories

may be allied disciplines, practice domains, or industries informing or supporting the general

function of security. In addition, the fluid nature of a defined security science body of knowl-

edge can be overcome. The acceptance of such a framework and its knowledge has to go

through iterations, until international consensus can be demonstrated. Nevertheless, with

the increasing tertiary offerings, and a greater research commitment, such consensus will

be achieved.

SECURITY SCIENCE

Security science is an idea that brings together many concepts and principles—with some,

in the future, becoming theories—into a developing and structured body of knowledge. Such

convergence is the beginning of an academic discipline in the traditional sense. Nevertheless,

security science is still in its formative years with a developing set of characteristics that will,

in the future, make it a profession and an academic discipline.

It is important that security science develops a structured and defined body of knowledge,

with a clear context or practice definition. A more simplistic view of security science—beyond

the integrated knowledge framework—can be presented as a Venn diagram, which integrates

the concepts of security management, the built environment and security principles,

informed and directed by security risk management (Figure 1.4). Security management

encompasses the human function of security, including tasks like management, business,

Principles

Security

Risk

Management

Security

Management

Built

Environment

FIGURE 1.4 Primary concepts of security science.

19 SECURITY SCIENCE

finance, administration, awareness, and policy and procedures. The built environment

includes the physical and technological environment we live, work, and play in. Principles

are related security strategies, including allied academic theories appropriate in supporting

the function of security. Such principles may include the functions of deter, detect, delay,

respond, and recover to criminology offender studies. Finally, security risk management

directs, informs, and, to some degree, quantifies the security mitigation strategies. Thus, such

a model may provide some overview of the function of security science.

Nevertheless, we must always be aware that we are attempting to counter at the extreme,

motivated attackers with the intent to use knowledge and resources to circumvent our mit-

igation strategies. In addition, being secured is a paradox as it is "measured by the absence of

activities which would have negative effects on the corporation if they occurred" (Challinger,

2006, p. 587). When security controls are working, it appears as though nothing is happening,

and to some degree there lies the paradox.

CONCLUSION

Security is diverse and multidimensional, leaving the ability to define and understand the

concept of security open to debate. Nevertheless, security can be contextually defined, once

the practice domain and its functions have been articulated. Many parts of the practice do-

mains of security lack definition and are defuse, yet are distinct fields of practice and, to some

degree, academic disciplines.

As a broad concept, security can be defined in many ways. One such method is the nature

of security, where security can be considered as international systems, security of nation-

states, security of groups, or the security of individuals (Rothschild, 1995 ). In addition, secu-

rity has to be considered from an objective, subjective, and symbolic perspective. Such duality

allows theories and ideas to more effectively consider all parts of security. For example, the

security of the individual may use Maslow's hierarchy of human needs (1943), or the related

but distinct concepts of security and safety, or, finally, the effect of risk. Risk has always been

closely related to the concept of security, but it is only in recent times that the management of

risk has played such a significant role in applied security.

Security of groups has to consider the underlying nature of law and the social contract,

where law may be considered a foundation of society and security is an output, being a

maintainer or enforcer. The security maintainer has, for over 100 years, been considered

the function of public security (policing), although private security is becoming more relevant

and both domains are converging. The security of nation-states and international arenas in-

clude military defense, which is one of the more traditional views of security. More recently,

homeland security has been applied at the nation-state level, converging traditional security

practice areas such as defense, public security, and private security.

The security industry requires, among other characteristics, a dedicated academic disci-

pline to support its professional development. A dedicated academic discipline can validate

and structure the growing body of knowledge through the scientific method, seeking cause

and effect. Whether such research uses the scientific method or an engineering design

approach, either will suit the diverse strategies applied in security and develop the discipline

of security science.

20 1. CONCEPT OF SECURITY

SECURITY

SCIENCE

The Theory and Practice

of Security

CLIFTON LS MITH

Electron Science Research Institute

Edith Cowan University

DAVID JB ROOKS

School of Computer and Security Science

Security Research Institute

Edith Cowan University

Security science is an emerging academic discipline that brings together concepts into a

structured body of knowledge. At its most simplistic, knowledge areas include security man-

agement, security theories and principles, the built environment, and security risk manage-

ment. These concepts can be expanded into an integrated framework that also includes

business continuity, security technology, physical and personnel security, and industrial

security (see Figure 1.3). Thus, context provides many parts of security with clear understand-

ing of its operating boundaries, from which further consensus in a body of knowledge can be

achieved.

Further Reading

Button, M., 2008. Doing Security: Critical Reflections and an Agenda for Change. Palgrave Macmillian, Houndmills,

Basingstoke, UK.

References

Ale, B., 2009. Risk: An Introduction—The Concepts of Risk. Sanger and Chance, Routledge, Abingdon.

Angus and Roberston, 1992. Dictionary and Thesaurus. HarperCollins Publishers, Sydney.

ASIS International, 2003. Proceedings of the 2003 Academic/Practitioner Symposium. University of Maryland,

College Park, ASIS International.

ASIS International, 2009, July 29–31. 2009 Academic/Practitioner Symposium. Paper presented at the 2009

Academic/Practitioner Symposium, University of Maryland, College Park.

ASIS International, 2010. 2010 Academic/Practitioner Symposium. Paper presented at the 2010 Academic/

Practitioner Symposium Hilton Old Town, Alexandra, VA.

Baldwin, D.A., 1997. The concept of security. Review of International Studies 23 (1), 5–26.

Bradley, T., Sedgwick, C., 2009. Policing beyond the police: A "first cut" study of private security in New Zealand.

Policing and Society 19 (4), 468–492.

Brooks, D.J., 2009. What is security: Definition through knowledge categorisation. Security Journal 23 (3), 229–239.

Brooks, D.J., 2012. Corporate security: Using knowledge construction to define a practising body of knowledge. Asian

Journal of Criminology, http://dx.doi.org/10.1007/s11417-012-9135-1.

Buzan, B., Waever, O., de Wilde, J., 1998. Security: A New Framework for Analysis. Lynne Rienner, London.

Challinger, D., 2006. Corporate security: A cost or contributor to the bottom line? In: Gill, M. (Ed.), The Handbook of

Security. Palgrave Macmillian Ltd, Basingstoke, UK, pp. 586–609.

Davidson, M.A., 2005. A matter of degrees. Security Management 49 (12), 72–99.

Fischer, R.J., Halibozek, E., Green, G., 2008. Introduction to Security, eighth ed. Butterworth-Heinemann, Boston.

Hemmens, C., Maahs, J., Scarborough, K.E., Collins, P.A., 2001. Watching the watchmen: State regulation of private

security, 1983–1998. Security Journal 14 (4), 17–28.

Hesse, L., Smith, C.L., 2001. Core Curriculum in Security Science. Paper presented at the Proceedings of the 5th

Australian Security Research Symposium, Perth, Western Australia.

Hettne, B., 2010. Development and Security: Origins and Future. Security Dialogue 41 (1), 31–52.

Huitt, W., 2004. Maslow's Hierarchy of Human Needs. Retrieved March 1, 2009, from http://chiron.valdosta.edu/

whuitt/col/regsys/maslow.html.

Knote, M.E., 2004. Part 1: Introduction to assets protection. In: Williams, T.L. (Ed.), Protection of Assets Manual. POA

Publishing, Los Angeles.

Kooi, B., Hinduja, S., 2008. Teaching security courses experientially. Journal of Criminal Justice Education 19 (2),

290–307.

Langston, C., Lauge-Kristensen, R., 2002. Strategic Management of Built Facilities. Butterworth-Heinemann, Boston.

Manunta, G., 1999. What is security? Security Journal 12 (3), 57–66.

Manunta, G., Manunta, R., 2006. Theorizing about security. In: Gill, M. (Ed.), The Handbook of Security. Palgrave

Macmillan, New York, pp. 629–657.

21 CONCLUSION

Maslow, A.H., 1943. A theory on human motivation. Psychol Rev 50 (4), 370–396.

Peoples, C., Vaughan-Williams, N., 2010. Critical Security Studies: An Introduction. Routledge, Oxon.

Popper, K., 1963. Conjectures and Refutations: The Growth of Scientific Knowledge. Routledge, London.

Post, R.S., Kingsbury, A.A., 1991. Security Administration: An Introduction to the Protection Services, fourth ed.

Butterworth-Heinemann, Boston.

Prenzler, T., Earle, K., Sarre, T., 2009. Private security in Australia: Trends and key characteristics. Trends and Issues

in Crime and Criminology 374, 1–6.

Rothschild, E., 1995. What is security. Daedalus 124 (3), 53–98.

Sarre, R., Prenzler, T., 2011. Private Security and Public Interest: Exploring Private Security Trends and Directions for

Reform in the New Era of Plural Policing. Australian Research Council, Caberra.

Stapley, C., Grillot, S., Sloan, S., 2006. The study of national security versus the study of corporate security: What can

they learn from each other? In: Gill, M. (Ed.), The Handbook of Security. Palgrave Macmillian Ltd, Basingstoke,

UK, pp. 45–65.

van Steden, R., Sarre, R., 2007. The growth of private security: Trends in the European Union. Security Journal 20 (4),

222–235.

Wakefield, A., 2007. The study and practice of security: Today and tomorrow. Security Journal 20, 13–14.

Wittgenstein, L., 1953/2001. Philosophical Investigations. Blackwell Publishing, Oxford.

Young, L.J., 2007. Criminal intelligence and research: An untapped nexus. The Journal of the Australian Institute of

Professional Intelligence Officers 15 (1), 75–88.

Zedner, L., 2009. Security: Keys Ideas in Criminology. Routledge, London.

22 1. CONCEPT OF SECURITY

Acquiring Editor: Pamela Chester

Editorial Project Manager: Amber Hodge

Project Manager: Priya Kumaraguruparan

Designer: Alan Studholme

Butterworth-Heinemann is an imprint of Elsevier

225 Wyman Street, Waltham, MA 02451, USA

The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK

#2013 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or

mechanical, including photocopying, recording, or any information storage and retrieval system,

without permission in writing from the publisher. Details on how to seek permission, further

information about the Publisher's permissions policies and our arrangements with organizations such

as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website:

www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the

Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience

broaden our understanding, changes in research methods or professional practices, may become

necessary. Practitioners and researchers must always rely on their own experience and knowledge in

evaluating and using any information or methods described herein. In using such information or

methods they should be mindful of their own safety and the safety of others, including parties for whom

they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume

any liability for any injury and/or damage to persons or property as a matter of products liability,

negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas

contained in the material herein.

Library of Congress Cataloging-in-Publication Data

Application submitted

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library.

ISBN 978-0-12-394436-8

For information on all Butterworth–Heinemann publications

visit our website at store.elsevier.com

Printed in the United States of America

131410987654321

To my dearest wife Maree and daughters Fiona and Amanda who always supported me

in my endeavors.

To Professor John De Laeter who showed me how to be a scientist.

—Clifton L. Smith

To my darling wife Glenda, for the hours that this work has taken me from you. You are

still my world.

To Professor Clifton Smith, coauthor and mentor, who inspired me to reach this place.

To my Australian and United Kingdom families, my foundation.

—David J. Brooks

Intentionally left as blank

Contents

Acknowledgments ix

About the Authors xi

Foreword xiii

Preface xv

1. Concept of Security

Introduction 1

Scientific Method in Support of Security Science 2

Defining the Concept of Security 6

Security of Individuals 8

Security of Groups 10

Security of Nation-State and International

Systems 12

Concept of Security Matrix 14

Security Science: Context Defines Concept

Definition 15

Security Science 19

Conclusion 20

2. Security Management

Introduction 23

Security Management Issues 24

A Systems Approach 25

Security Management 27

Strategic Security Management Frameworks 30

Organizational Resilience 35

Security Management Functions 38

Security Management Policies and Procedures 43

Security Principles 46

Security Ethics 46

Security Decay 47

Conclusion 48

3. Security Risk Management

Introduction 51

The Concept of Risk 52

Defining Risk 53

The Concepts of Probability to

Likelihood 54

Importance of Consequence 55

Source of Risk 56

Risk Management 56

An International Approach to Risk

Management 57

Security Risk Management 62

Threat 64

Criticality 66

Vulnerability 67

Threat, Criticality, and Vulnerability 69

Risk Models and Modeling 70

Gaming Risk 70

Decision-making in Risk 71

Perception and Culture 73

Trust 75

Gaining Consensus 77

Conclusion 78

4. Built Environment

Introduction 81

Built Environment 82

Security and the Built Environment 83

Facility Management 85

Who is the Facility Manager? 86

Facility Management and Security 90

Building Management Systems 90

Protecting the Facility 102

Conclusion 102

5. Physical Security

Introduction 105

Routine Activity Theory 106

Defense-in-Depth 107

Crime Prevention Through Environmental

Design 111

Physical Barriers 117

Relationships Between DiD Functions 120

Conclusion 126

vii

6. Detection Systems

Introduction 129

Theory 130

Function of Security Technology 139

Barrier and Open Ground Detection 142

Testing Systems 145

Conclusion 151

7. Integrated Identification Technology

Introduction 153

Background 154

Access Control Systems 157

Cards 160

Biometrics 163

Intelligent CCTV 171

Conclusion 174

8. Knowledge Management

Introduction 177

Knowledge 178

Intelligence 187

Intelligence in Security Management 191

Vetting 194

Predictive Profiling 196

Conclusion 197

9. Business Continuity Management

Introduction 199

Crisis 200

Four Phases of a Crisis 201

Business Continuity Management 203

Essential Elements of Business Continuity

Management 205

BCM Framework 207

Business Impact Forecasting 211

Learning from a Crisis 213

Common Elements of BCM 214

Security and BCM 221

Conclusion 222

10. The Future of Security

Introduction 225

Background 226

Security in the Future 229

Future of Intelligence 239

Professionalism 243

Management 246

Conclusion 248

Index 251

viii CONTENTS

... Corporate security is an organisational undertaking with the function to provide services which ensure stability and protection of business operations from malicious disruption and harm (Talbot & Jakeman, 2009). Furthermore, the application of corporate security is underpinned by the implementation of policy and functionally achieved through a combination of procedural, technical and physical risk strategies and control measures (Smith & Brooks, 2012). Consequently, corporate security transforms organisational resources through the application of management practices into a protective business function. ...

... The practice of corporate security has often been considered from a managerial context. As a result of this, effective security managers view their outputs as contributors to overall business objectives (Smith & Brooks, 2012); seeking to align their function to the whole organisation (Sennewald, 2011). Such a position can be historically traced to early theorists of scientific management, where Fayol (1949) purported security to be, among others, a core business activity of every organisation. ...

... Consequently, the definition of security is often contested, with many agreeing that the concept of security is contextual, and as such, difficult to define (Cubbage & Brooks, 2013;Fay, 2002;Fischer, Halibozek, & Green, 2008;Hillman, 2011;Prenzler, 2005). Regardless, the concept of security can be considered from the individual, group, and national context, each with their own implied assumptions, meanings, and applications (Smith & Brooks, 2012, p. 7). ...

  • Codee Ludbey Codee Ludbey

Corporate security is a practicing domain and developing academic discipline that provides for the protection of people, information and assets, as well as the self-protection of organisations. Fayol (1949) articulated such an activity within organisations to be a core business function of significant importance; embedding security operations within all aspects of organisational work. This embedded nature of security within organisations has led to difficulty in the literature delineating roles and responsibilities of security practitioners; consequently leading to a nebulous understanding of security as a whole. Therefore, an investigation of the corporate security stratum of work has been undertaken to address this issue in part, undertaking an innovative, objective approach. The study embraced the broader socio-organisational literature to ground and orient the research, providing an outward-in perspective in its exploration of the corporate security function. The research perspective was rooted in the sociological theory of structural functionalism, where Parsons (1951) and Durkheim (1984) identified an occupational stratum of work seated within a differentiated and stratified society. Such a society induces individuals to fulfil specialist roles, which can be ranked hierarchically along a stratum of work. Significantly, organisations are the practical implementation of this occupational stratum of work, with specialist roles aligned hierarchically and controlled through positions of authority. Jaques (1951, 2002) articulated seven strata of work within organisations, each delineated by their capacity to understand complexity and capability to manage tasks into the future. This study undertook an ethnographic approach, consisting of two parts. Firstly, the literature critique informed the design and implementation of the research instrument; which consisted of two tools. Secondly, the administration of the research instrument to the participant sample, which was refined through a pilot study (N=16) and then applied to the main study (N=42). The study identified a suitable sample consisting of security practitioners functionally positioned across the stratum of work, with this sample being purposively selected. Significantly, the study revealed a disconnect between the corporate security and socioorganisational literature, with many points of divergence. Such disconnect is rooted in a misperception of the importance and positioning of the corporate security function by the corporate security literature. Therefore, the study has revealed that corporate security operates at a tactical and operational level within an organisation, functionally positioned between Stratum One and Stratum Four. This finding indicates that the concept of corporate security as a strategic function with executive reach is invalid, and the existence of a strategic security practitioner is not the norm. Furthermore, the study has established the corporate security function as an operating activity situated within the technostructure of organisations; leveraging its ability to diagnose, infer, and treat discipline specific concerns. Subsequently, these findings have uncovered several significant implications for policy, education, academia, and the broader community. These implications include career progression pathways and an understanding of the glass ceiling for security practitioners; professionalisation of the industry, including insights into corporate perceptions of the function; corporate security practitioner role definition and articulation, where defined jurisdictional boundaries can be begin to be drawn; and the fallout of a misaligned corporate security literature consensus.

... proactive policing. Another way of managing physical spaces would be mechanical -incorporating security hardware such as CCTV (Smith and Brooks, 2012). ...

... Students feel unsafe because they have no control over who can access the university's public space. What made people feel safe on campus was DMU's physical security, which encompasses a mixture of human and mechanical security.Smith and Brooks (2012) note that this type of CPTED can often impact how people feel about specific places. ...

  • Jodi Rose Jodi Rose

The purpose of this study was to investigate if crime prevention through environmental design (CPTED) in Leicester affects DMU student's perception of safety. This study aimed to contribute to eliminating the gap of knowledge in the field. The currently available literature has limited information surrounding CPTED and the perception of safety for university students. The research was also chosen to aid De Montfort University and Leicester in addressing any safety concerns mentioned in the study. This study systematically analysed data collected from an online survey that was conducted. An online mixed-method survey approach was taken and distributed via DMU Facebook group platforms. The survey was then thematically analysed. The data highlighted that students have a multitude of safety concerns that often overlap each other, including, but not limited to: lack of lighting, limited surveillance, large amounts of homelessness, antisocial behaviour and the lack of proactive policing/security. The findings of this study demonstrate that there is a link between CPTED and the perception of safety for DMU students. Recommendations for improvements will be made for Leicester and De Montfort University to action at their discretion.

... This is also called Alarm receiving center. The function of an alarm in a monitoring and detection system is "to indicate that an anomalous signal has been detected" (Smith et al., 2013) and that a response is required to investigate this. The response might be to shut the alarm down if a false alarm is discovered, or for the incident to be referred for further investigation by stake holders, first responders or the police. ...

  • Sunday Salimon Sunday Salimon

Description Installation of capacitors in power networks are generally used for the improvement of the network power factor, improvement of the voltage profile and the voltage stability index, maximizing flow through cables and transformer, and minimization of total power loses due to the compensation of the reactive component of power flow. These benefits depend to a very large extent on the size and location of the capacitor in the radial distribution network as wrong placement can lead to the opposite effects. Furthermore, the appropriate placement of capacitors will reduce the total capacitor costs and the running expenses of Distribution Companies (DISCOs). In this paper, the problem of optimal placement and sizing of capacitor in the buses of Nigerian distribution network is addressed. The proposed methodology uses the Cuckoo Search Algorithm (CSA) to determine the size and the location satisfying the operating constraints. To demonstrate the capability of the proposed method, it was tested Imalefalafia 32 bus radial distribution network of the Ibadan Electricity Distribution Company (IBEDC). The simulation results obtained with compensation was compared with that of the base case (without compensation) and found to be encouraging.

... In the field of archaeology, there has, to my knowledge, been no attempt at defining a theoretical concept of security for the study of past behaviours and motivations. However, security in modern society has become a formalised field of scientific research in recent years, which has involved a growing theoretical development (Gill 2006;Smith and Brooks 2013). ...

  • Heidi Lund Berg Heidi Lund Berg

This thesis examines the technological and social parameters for, and the social impact of, the introduction and implementation of locking into Norway in the Iron Age, based on analyses of locks and keys. The functional properties of locking devices and their practical applications as security mechanisms constitute the focal point of the study, and the basis for discussing how locking contributed to the ordering and organisation of life and society in the course of the first millennium AD. The main aims are to establish an empirical foundation for the study of locking devices and to understand locks and keys as a technological and social phenomenon which was affected by and had effects on the societies that created and used them. The archaeological material is approached from a conceptual framework centred on perspectives of entanglement and social boundaries, in which locking is considered a social practice. As material agents locks and keys are seen as involved in the physical protection of things and spaces, regulation of access, and manifestation of ownership rights, as well as the creation and negotiation of values and norms as part of social order. The analytical material is comprised by more than eight hundred locks and keys dated from the Roman Period to the Viking Age, deriving from burials, depositions, and settlements, as well as single finds. The finds are used in the construction of renewed classifications for Scandinavian locks and keys, which is based on their functional designs and their correlation to lockable containers, doors, and fetters. Through temporal, spatial, and contextual analyses of types the thesis outlines a complex picture of production, innovation, distribution, and application of locking devices. The results illustrate that locks and keys were introduced and developed in stages in Norway, and that their use expanded and diversified practically as well as socially. The analytical patterns are further discussed in terms of security, ownership, and order, arguing that locking from its introduction became gradually embedded into society during the Iron Age. This is suggested to result from the success of locks and keys in achieving order, and their close relationship with processes of hierarchisation, social differentiation, and social complexity. The thesis provides new insights into the practical functions and applications of diverse locking mechanisms, technological development, craft specialisation, exchange and contact networks, and the social impact of locking in terms of physical and social order. It also contributes to current debates concerning social organisation and transformations within Norway and wider Scandinavia and Northern Europe in the first millennium AD.

... As a result, security-related decisions, mostly, are likely to be marginally evidenced or empirically based on the specific circumstance in which treatments are applied. By default, most organisation's senior management would seemingly act more on responsibilisation (Peterson, 2014) pressures and expectations rather than proactively embracing 'strategic security management framework' (Smith and Brooks, 2012). Despite the higher business management demands inclusive of governance, asset protection, leadership, and productivity outputs. ...

  • Tony Ridley Tony Ridley

As is often the case with most emergent professions transitioning to a technical discipline, the security profession and broader security industry typically struggle with the distinction and understanding of security management versus that of security leadership. In other words, it generally is unclear as to what explicitly they consider as security leadership as opposed to that of security management. These highly subjective, individual, or localised beliefs rarely remain valid or consistent across geography, culture, or time. For that reason, this research and analysis aim to contribute to the nascent corporate security management and corporate security leadership understanding through an applied literature review and contextual experience within the security profession. We consider them across the international security industry, across countries, jurisdiction and regulatory territories with decades of practical application. In sum, this analysis explores popular perceptions of security management and security leadership by analysing management sciences, contexts, and definitions, which is used to analyse security management and security leadership literature. The result is perhaps predictable, but there appears to be very little valid, empirical security leadership literature because of the lack of consistent units of analysis for comparison, verifiable data, and adequate separation from various biases. Paradoxically, there remains a far greater necessity for specific security management than generalist management practices applied to security as a commodity or concept than the necessity for more significant security leadership. Put another way, security within a corporate (public and private) context is rarely managed by qualified, experienced, and verifiable security risk managers according to a universal body of knowledge or academic standard of education. While this may present as a bold if not contentious assertion, this analysis explores the underlying factors for this verifiable hypothesis. Moreover, it raises significant questions about the empirical and practical application of existing corporate security literature if not constructed by suitably objective and qualified security professionals using consistent, positivist methods and foundations. In particular, if repurposing much of the general management literature to support arguments for security management. Overall, this analysis contributes to much broader issues faced by the security profession and industry.

... With regard to "integrated identification technologies," such as proximity cards, the radio frequency signal (RF) is used to send and receive identification codes. This is science and technology, without life, humanity, or nature [19]. ...

  • Shih-Hsing Wu
  • Kuo-Kuang Fan
  • Chuan-Jen Sun Chuan-Jen Sun

Taiwan has an abundance of the environmentally-friendly resource bamboo, as well as long-standing Chinese bamboo customs and culture. As a result, modest bamboo furniture accompanies the simple life of Taiwan's residents. However, as people prosper, consumers are beginning to choose bamboo furniture for its decorative design and style more than for its practicality. Therefore, the symbolic application of decorative art is worthy of research and discussion. The purpose of this research is to use codes to explore the decorative design of bamboo tube furniture and enlighten Taiwan's new direction of bamboo furniture design in the future. Through literature content analysis, field expert interviews, and practical experience participation methods, in addition to using function codes, emotion codes, transmission codes, and identification codes to interpret the Han Dynasty's Liushu and Chinese bamboo cultural content, we verify the relevance of the code and bamboo furniture decoration and provide interactive new thinking and creative products.

  • Lewis Barnes

The past few years have seen the emergence of new developments in the field of occupational fraud. These have manifested themselves in the forms of both insider trading and the misrepresentation of figures in financial statement reporting. In either case, the result is a loss to stakeholders. The proposed study sets out to establish whether the systemic management of occupational fraud can add value to the firm's wider risk management practices. It will seek to establish how the nature of these value-adding factors can be identified and analysed. The methodology adopted by this research is the collection of primary data from risk man-agers and senior-level security officers of more than fifty organisations. The study-framework employs a quantitative research design via the application of quantitative data-analysis techniques. These include descriptive and demographic statistics, frequency analysis, correlation, and regression. The principal finding of the study are that: • the use of technology, artificial intelligence and blockchain, alongside government regulation, reinforces fraud risk management. • the removal of third parties adds value to the risk-management practices of the organisation concerned. • the use of whistleblowing is shown to be an effective risk-prevention measure. • the existence of 'excessive trust' relationships can increase the risk of occupational fraud. The overall conclusion is that the possibility of occupational fraud can be managed and significantly reduced. This can be achieved with the assistance of artificial intelligence, block-chain and whistleblowing.

  • Radoslav Ivančík Radoslav Ivančík

Security is one of the most strongly felt human needs, and therefore the issue of security has accompanied mankind throughout its civilized history. It could also be said that the history of mankind is the history of man's struggle to ensure his security. For this reason, the main goal of the author of this study, following the research and works of renowned authors in the field of security, is with the use relevant methods of scientific research to contribute to the development of security theory and discuss the postulates of security theory.

  • Tony Ridley Tony Ridley

Uncertainty and change will likely dominate the post-pandemic world of travel. While security and terrorism have been constant concerns for tourists, broader issues of personal safety, risk and crime will understandably infuse travel decision making in the wake of COVID-19. This chapter explores the multitude of definitions and expressions that make direct comparisons of security between places exceptionally difficult. In this chapter, context, hyper-specific location, travel security and crime prevention techniques are introduced. The chapter also explores the relationships and overlaps of international security, safety, terrorism, crime and risk. Complete with a series of systematic literature reviews specific to each sub-topic, large data sets, expert analysis and evidence-based decision making, this chapter offers practical tips for travellers at all levels of experience. The curated, practical advice will empower tourists to contribute to their own personal security by better understanding the complexities summed up with simple, practical guidance no matter where they venture. Overall, the consolidated security and terrorism work within this chapter presents an updated base for tourists and the travel industry to relaunch travel in the wake of one of the world's most significant travel disruptions. Tourists should be better informed and equipped for new travel challenges and adventures. Author Tony Ridley MSc is an international security and risk management professional. His global, practical experience range from security management in remote sites, enterprise security management for large multinational entities, commercial security services for millions of travellers and enterprise risk management at a major federal government agency. Tony's also a Veteran.

This paper provides an update of the trend towards greater private provision of policing and security services in the European Union (EU). Although data must be treated with caution, recent figures indicate growth from around 600,000 security employees in 1999 to well over a million today. To predict future trends, researchers must undertake international comparisons of the reach of private security and make a start towards drawing a comprehensive picture of the means by which security industries are best monitored and regulated in national jurisdictions. The authors argue that, in addition, issues of equality, professionalism and accountability surrounding privatized policing must become a focus of research attention by practitioners and theorists alike.

  • Ben Ale Ben Ale

Investments, global warming and crossing the road - risk is a factor embedded in our everyday lives but do we really understand what it means, how it is quantified and how decisions are made? In six chapters Ben Ale explains the concepts, methods and procedures for risk analysis and in doing so provides an introductory understanding of risk perception, assessment and management. Aided by over seventy illustrations, the author casts light on the often overlooked basics of this fascinating field, making this an essential text for students at undergraduate and postgraduate level as well as policy and decision-making professionals. Developed from the Safety Science or Risk Science course taught at Delft University, this highly respected author has a lifetime of knowledge and experience in the study of risk.

  • David Jonathan Brooks David Jonathan Brooks

Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, business continuity, personnel and physical security, and security technology. Nevertheless, corporate security also has interrelationships with criminology, facility management, safety, and law. Such a framework provides clear boundaries for the practising domain of corporate security, better reflects the security experts' view of their practising domain, allows directed tertiary pedagogy, and presents what could be considered the scholarly area of Security Science.

  • Björn Hettne Björn Hettne

The problems of development and security have historically formed distinct discourses. More recently, they have been inextricably linked both in discourse and in much policy, thus creating the so-called development—security nexus that pervades much of today's international development assistance. The empirical basis for attention to this nexus has been quite obvious given the many humanitarian emergencies occurring in the 1990s. It is less clear what, in terms of linkages, went before and what will come after. This article discusses the putative nexus in different historical geopolitical contexts, probing into its origins and speculating about the shape it may take in the future. It consists of three parts. The first deals with conceptual issues and the overall theoretical framework. The second describes four historical discourses, consecutively prevalent from about 1750 to 1980. The third concerns the current discourse on globalization and its possible future shape: global development.

There are currently over 10,000 security companies in the United States, employing 1.8 million guards. Security guards already outnumber police by almost three to one, and this discrepancy is expected to continue to grow. Security guards perform many of the same functions as police officers, and may even carry weapons, but to what extent do states regulate the private security industry?This paper compares the change in state regulation of private security, in particular the requirements for hiring and training security officers. The provisions of the states as of 1982 and 1998 are compared and evaluated. We are interested in determining what threshold requirements the states have seen fit to establish for entry into the security industry, and whether these threshold requirements provide adequate protection for the public.