Skip to main content
Log in

Educating the physical security professional: developing a science-based curriculum

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Within the security stratum is the jurisdictional practice of physical security; however, physical security is not currently a recognised professional undertaking. Professional standing is a social recognition, designated by the public and legal arenas. Yet the physical security practitioner is instrumental in addressing security concerns. Therefore, this study extends a recent article by Coole et al. (Secur J 1–29, 2016) to articulate educational learning objectives within a formal knowledge structure. The study applied a cultural domain analysis, using security expert focus groups to develop a physical security knowledge system. Findings indicated that knowledge subjects should be aligned in order to diagnose the security problem, inference an optimal resolution and identify treatment strategies. The study articulated the overarching physical security learning objectives, using a top-down structure and underpinned by subject learning objectives. The adoption of standardised learning objectives, based on clear content requisites, would represent a significant step forward in the professionalisation of the physical security professional.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

(Coole et al. 2016, p. 15)

Fig. 2

(Coole et al. 2016, p. 17)

Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Abbott. 1988. The system of professions: An essay on the division of expert labor. Chicago: The University of Chicago Press.

    Google Scholar 

  • Anderson, L.W., and L.A. Sosniak. 1994. Bloom’s taxonomy: A forty-year retrospective. Chicago: National Society for the Study of Education.

    Google Scholar 

  • Anderson, P. 2007. Education in security. Sydney: Macquarie University.

    Google Scholar 

  • Australian Interim Security Professionals Task Force. 2008. Advancing security professionals: A discussion paper to identify the key actions required to advance security professionals and their contribution to Australia. Canberra: Australian Interim Security Professionals Task Force.

    Google Scholar 

  • Australian Skills Quality Authority. 2016. Training in security programs in Australia: Report. Canberra: Australian Skills Quality Authority, Australian Government. https://www.aqf.edu.au/aqf-levels. Accessed 14 August 2017.

  • Australian Qualifications Framework. 2013. AQF levels. Canberra: Australian Qualifications Framework Council.

    Google Scholar 

  • Bernard, H.R., and G.W. Ryan. 2010. Analyzing qualitative data: Systematic approaches. Thousand Oaks, CA: Sage.

    Google Scholar 

  • Borgatti, S.P. 1999. Elicitation techniques for cultural domain analysis. In The Ethnographer’s Toolkit, ed. J.J. Schensul, and M. Weeks. Walnut Creek: AltaMira Press.

    Google Scholar 

  • Borodzicz, E.P., and S.D. Gibson. 2006. Corporate security education towards meeting the challenge. Security Journal 19 (3): 180–195.

    Article  Google Scholar 

  • Brooks, D.J. 2007. Defining security through the presentation of security knowledge categories. Paper Presented at the 7th Australian Security Research Symposium, Perth.

  • Brooks, D.J. 2010. What is security: Definition through knowledge categorization. Security Journal 23 (3): 225–239.

    Article  Google Scholar 

  • Brooks, D.J. 2011. Security risk management: A psychometric map of expert knowledge structure. Risk Management 13 (1/2): 17–41.

    Article  Google Scholar 

  • Bruner, J.S. 1977. The process of education. London: Harvard University Press.

    Google Scholar 

  • Cohen, L., L. Manion, and K. Morrison. 2000. Research methods in education, 5th ed. London: Routledge.

    Book  Google Scholar 

  • Coole, M. 2015. Physical security professional’s body of knowledge: A cultural domain analysis of physical security’s knowledge structure. Ph.D., Curtin University, Perth, Australia.

  • Coole, M., and D.J. Brooks. 2011. Mapping the organizational relations within physical security’s body of knowledge: A management heuristic of sound theory and best practice. Paper Presented at the 4th Australian Security and Intelligence Conference, Perth, Western Australia.

  • Coole, M.P., D.J. Brooks, and A. Minnaar. 2016. The physical security professional: Mapping a body of knowledge. Security Journal. doi:10.1057/s41284-016-0084-8.

    Google Scholar 

  • Cox, T.F., and M.A.A. Cox. 2000. Multidimensional scaling: Monographs on statistics and applied probability, 2nd ed. Boca Raton: Chapman & Hall/CRC.

    Google Scholar 

  • Criscuoli, E.J. 1988. The time has come to acknowledge security as a profession. Annals of the American Academy of Political and Social Science 498 (1): 98–107.

    Article  Google Scholar 

  • Edmondson, K.M. 1995. Concept mapping for the development of curricula. Journal of Research in Science Teaching 32 (7): 777–793.

    Article  Google Scholar 

  • Eraut, M.R. 1994. Developing professional knowledge and competence. London: Falmer Press.

    Google Scholar 

  • Flexner, A. 1915. Is social work a profession? Paper Presented at the National Conference of Charities and Corrections, Baltimore, Maryland.

  • Fox, R.E. 1994. Training professional psychologists for the twenty-first century. American Psychologist 49 (3): 200–206.

    Article  Google Scholar 

  • Fraenkel, J.R., N.E. Wallen, and H.H. Hyun. 2012. How to design and evaluate research in education. New York: McGraw-Hill.

    Google Scholar 

  • Fraser, K.M. 1993. Theory based use of concept mapping in organization development: Creating shared understanding as a basis for the cooperative design of work changes and changes in working relationships. Ann Arbor: UMI.

    Google Scholar 

  • Garcia, M.L. 2000. Personal opinion: Raising the bar for security professionals. Security Journal 13: 79–81.

    Article  Google Scholar 

  • Garcia, M.L. 2008. The design and evaluation of physical protection systems, 2nd ed. Burlington, MA: Butterworth-Heinemann.

    Google Scholar 

  • Gonzalvo, P., J.J. Canas, and M.T. Bajo. 1994. Structural representations in knowledge acquisition. Journal of Educational Psychology 86 (4): 601.

    Article  Google Scholar 

  • Johnson, A.G. 1995. The Blackwell dictionary of sociology: A user’s guide to sociological language. Cambridge: Blackwell.

    Google Scholar 

  • Kellogg, R.T. 2003. Cognitive psychology, 2nd ed. Thousand Oaks: Sage Publications.

    Google Scholar 

  • Kelly, G.A. 1955. The psychology of personal constructs. New York: Norton.

    Google Scholar 

  • Kruskal, J.B., and M. Wish. 1978. Multidimensional scaling. London: Sage Publications.

    Book  Google Scholar 

  • Maxwell, J.A. 1992. Understanding and validity in qualitative research. Harvard Education Review 62 (3): 279.

    Article  Google Scholar 

  • Nalla, M., and M. Morash. 2002. Assessing the scope of corporate security: Common practices and relationships with other business functions. Security Journal 15: 7–19.

    Article  Google Scholar 

  • Rogers, B. 2000. Personal opinion: A framework for higher education in the security field. Security Journal 13: 65–68.

    Article  Google Scholar 

  • Rogers, B., D. Palmgren, D. Giever, and M.L. Garcia. 2007. Security education in the 21st century: The role of engineering. American Society for Engineering Education.

  • Sarre, R., T. Prenzler, and K. Earle. 2011. Private security and public interest: Exploring private security trends and directions for reform in the new era of plural policing. Australian Research Council. Adelaide: University of South Australia.

    Google Scholar 

  • Schensul, J.J., M.D. LeCompte, B.K. Nastasi, and S.P. Borgatti. 1999. Enhanced ethnographic methods. Walnut Creek, CA: Altamira Press.

    Google Scholar 

  • Smith, C.L., and D.J. Brooks. 2013. Security science: The theory and practice of security. Amsterdam: Elsevier.

    Google Scholar 

  • Standards Australia. 2006. HB 167:2006 Security risk management. Sydney: Standards Australia.

    Google Scholar 

  • Spradley, J.P. 1979. The ethnographic interview. Rinehart and Winston: New York Holt.

    Google Scholar 

  • McAleese, R. 1999. Concept mapping: A critical review. Innovations in Education and Training International 36 (4): 351.

    Article  Google Scholar 

  • McLucas, A.C. 2003. Decision making: Risk management, systems thinking and situation awareness. Canberra: Argos Press.

    Google Scholar 

  • Novak, J.D. 1993. Human constructivism: A unification of psychological and epistemological phenomena in meaning making. International Journal of Personal Construct Psychology 6: 167–193.

    Article  Google Scholar 

  • Western Australia Police. 2017. Police Licensing Services, Security, Licence information. https://www.police.wa.gov.au/About-Us/Our-agency/Police-Licensing-Services/Security/Licence-information#Training_certification. Accessed 10 August 2017

  • Wilensky, H.L. 1964. The professionalization of everyone? American Journal of Sociology 70 (2): 137–158.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Jonathan Brooks.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Coole, M.P., Brooks, D.J. & Minnaar, A. Educating the physical security professional: developing a science-based curriculum. Secur J 31, 524–547 (2018). https://doi.org/10.1057/s41284-017-0114-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41284-017-0114-1

Keywords

Navigation