Revealing community security within the Australian security continuum

Original Article

Abstract

The Australian security continuum is broad, with its more traditional subdomains clearly understood. However, significant parts of this continuum are not well known or examined. The study used an exploratory interpretive approach to examine the Australian security domain functions through an analysis of protection-associated job descriptions (N = 170) and criteria language. Thematic analysis uncovered discrete patterns of protective roles, resulting in the emergence of community security. The study revealed that community security has jurisdictional boundaries, with functions to maintain community protection, safety, crime prevention and other community services; however, community security is underrepresented in security literature. Community security addresses broad wellbeing issues such as crime, anti-social behaviour and homelessness. Consequently, greater recognition of community security is necessary, along with its participants and their language.

Keywords

Community security Domain Crime prevention Services Local government Language 

References

  1. American Institute of Architects. 2004. Security planning and design: A guide for architects and building design professionals. Hoboken: John Wiley and Sons.Google Scholar
  2. Amouyel, A. 2006. What is human security. Human Security Journal 1(06): 10–23.Google Scholar
  3. Anjaria, J.S. 2006. Street hawkers and public space in Mumbai. Economic and Political Weekly: 2140–2146.Google Scholar
  4. ASQA. 2016. Training in security programs in Australia. Canberra: Australian Skills Quality Authority, Australian Government.Google Scholar
  5. Bagshaw, D.M. 2000. Reshaping responses to domestic violence. South Australia: University of South Australia.Google Scholar
  6. Baldwin, D.A. 1997. The concept of security. Review of International Studies 23(1): 5–26.CrossRefGoogle Scholar
  7. Bayley, D.H. 1986. Community policing in Australia: An appraisal. NPRU.Google Scholar
  8. Braun, V., and V. Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3(2): 77–101.CrossRefGoogle Scholar
  9. Brooks, D.J. 2006. Mapping the consensual knowledge of security risk management experts. Paper presented at the Australian information warfare and security conference. Perth: Edith Cowan University.Google Scholar
  10. Brooks, D.J. 2010. What is security: Definition through knowledge categorisation. Security Journal 23(3): 225–239.CrossRefGoogle Scholar
  11. Brooks, D.J., J. Corkill, and M. Coole. 2016. The Australian security continuum: National and corporate security gaps from a surveillance language perspective. In National security, surveillance, and emergencies: Canada and Australia compared, eds. K. Walby and R. Lippet. University Press.Google Scholar
  12. Burnette, R. 2013. Biosecurity: Understanding, assessing, and preventing the threat. Hoboken, NJ: John Wiley & Sons.CrossRefGoogle Scholar
  13. Buzan, B. 2004. A reductionist, idealistic notion that adds little analytical value. Security Dialogue 35(3): 369–370.CrossRefGoogle Scholar
  14. Buzan, B., and L. Hansen. 2009. The eveluation of international security studies. Cambridge: Cambridge Univresity Press.CrossRefGoogle Scholar
  15. Buzan, B., O. Wæver, and J. de Wilde. 1998. Security: A new framework for analysis. Boulder: Lynne Rienner Pub.Google Scholar
  16. Cherney, A., and A. Sutton. 2004. Aussie experience: Local governmental community safety officers and capacity building. Safer Communities 3(3): 31–35.CrossRefGoogle Scholar
  17. Coaffee, C., D. Moore, and L. Bosher. 2008. Resilient design for community safety and terror-resistant cities. Municipil Engineer: Proceddings of the Instituion of Civili Engineers, 103–110.Google Scholar
  18. Cohen, L., L. Manion, and K. Morrison. 2002. Research methods in education (5th ed.). London: Routledge Falmer.Google Scholar
  19. Community Engagement Division. 2015. Eyes on the street. Retrieved 2 November, 2015, from http://communitysafety.police.wa.gov.au/eyesonthestreet
  20. Coole, M. 2015. Physical security professional’s body of knowledge: A cultural domain analysis of physical security’s knowledge structure. Doctor of philosophy. Perth: Curtin University of Technology.Google Scholar
  21. Craighead, G. 2003. High rise security and fire life safety (2nd ed.). Woburn: Elsevier.Google Scholar
  22. Fischer, R.J., E. Halibozek, and G. Green. 2008. Introduction to security (8th ed.). Burlington, MA: Elsevier.Google Scholar
  23. Garrard, J. 2014. Health sciences literature review made easy: The matrix method (4th ed.). Sudbury: Jones & Bartlett Learning.Google Scholar
  24. Gibson, V., and D. Johnson. 2016. CPTED, but not as we know it: Investigating the conflict of frameworks and terminology in crime prevention through environmental design. Security Journal 29(2): 256–275.CrossRefGoogle Scholar
  25. Gilling, D. 2001. Community safety and social policy. European Journal on Criminal Policy and Research 9(4): 381–400.CrossRefGoogle Scholar
  26. Griffiths, M., D.J. Brooks, and J. Corkill. 2010. Defining the security professional: Definition through a body of knowledge. Paper presented at the proceedings of the 3rd Australian security and intelligence conference, Perth: Edith Cowan University.Google Scholar
  27. Heywood, A. 2004. Political theory: An introduction (3rd ed.). Basingstoke: Palgrave Macmillan.Google Scholar
  28. Huysmans, J. 1998. Security! What do you mean? From concept to thick signifier. European Journal of International Relations 4(2): 226–255.CrossRefGoogle Scholar
  29. Inglehart, R.F., and P. Norris, 2012. The four horsemen of the apocalypse: Understanding human security. Scandinavian Political Studies 35(1): 71–96.CrossRefGoogle Scholar
  30. Jacobs, J. 1961. The death and life of great American cities. New York: Random House Inc.Google Scholar
  31. Jesson, J.K., L. Matheson, and F. Lacey. 2011. Doing your literature review: Traditional and systematic techniques. Los Angeles: Sage Publications.Google Scholar
  32. Klein, H., and M. Myers. 1999. A set of principals for conducting and evaluating interpretive field studies in information systems. MIS Quarterly 23(1): 67–94.CrossRefGoogle Scholar
  33. Lippert, R.K., K. Walby, and R. Steckle. 2013. Multiplicities of corporate security: Identifying emerging types, trends and issues. Security Journal 26(3): 206–221.CrossRefGoogle Scholar
  34. Local Government Industry Taskforce on Safety. 2014. Rangers and parking control officers. Retrieved 19 October, 2015, from http://www.localgovernmentsafetytaskforce.com/general-information
  35. Manunta, G. 1999. What is security? Security Journal 12(3): 57–66.CrossRefGoogle Scholar
  36. Maslow, A.H., R. Frager, and R. Cox. 1970. In Motivation and personality, eds. J. Fadiman and C. McReynolds, Vol. 2. New York: Harper & Row, pp. 1887–1904.Google Scholar
  37. McDonal, M. 2016. Whose security? Ethics and the referent. In Ethical security studies: A new research agenda, eds. J. Nyman and A. Burke. New York: Taylor and Francis, pp. 39–51.Google Scholar
  38. Mely, C. 2015. Community security: Human security at 21. Contemporary Politics 21(1): 53–69.CrossRefGoogle Scholar
  39. Mill, J.S. 1910. Utilitarianism, liberty, representative government. London: JM Dent and Sons.Google Scholar
  40. O’Block, R.L., J.F. Donnermeyer, and S.E. Doeren. 1991. Security and crime prevention. Boston: Butterworth-Heinemann.Google Scholar
  41. Oxford Dictionaries. 2015. Community. Retrieved 29 October, 2015, from http://www.oxforddictionaries.com/definition/english/community
  42. Prenzler, T. 2005. Mapping the Australian security industry. Security Journal 18(4): 51–64.CrossRefGoogle Scholar
  43. Prenzler, T., R.T. Sarre, and K. Earle. 2008. Developments in the Australian private security industry. Flinders Journal of Law Reform 10: 403–417.Google Scholar
  44. QSR. 2012. NVivo 10 [Computer software]. Retrieved from http://www.qsrinternational.com
  45. Ragin, D.F., E. Ricci, R. Rhodes, J. Holohan, M. Smirnoff, and L.D. Richardson. 2008. Defining the “community” in community consultation for emergency research: Findings from the community VOICES study. Social Science and Medicine 66(6): 1379–1392.CrossRefGoogle Scholar
  46. Shaw, M. 2001. The role of local government in community safety. US Department of Justice, Office of Justice Programs, Bureau of Justice Assistance.Google Scholar
  47. Smith, C.L., and D.J. Brooks. 2013. Security science: The theory and practice of security. Waltham: Elsevier.Google Scholar
  48. Somerson, I.S. 2009. The art and science of security risk assessment. Alexandria: ASIS International.Google Scholar
  49. Talbot, J., and M. Jakeman. 2009. Security risk management body of knowledge. Hoboken, NJ: John Wiley & Sons.CrossRefGoogle Scholar
  50. Tooma, M. 2011. Safety, security, health and environment law. Annandale: Federation Press.Google Scholar
  51. United Nations Development Programme. 1994. Human development report. New York: UNDP.Google Scholar
  52. Waistell, J. 2009. The textual constitution of organisational values. Philosophy of Management 7(2): 41–59.CrossRefGoogle Scholar
  53. Walby, K., R. Lippert, and B. Wilkinson. 2014. ‘The right people to do the right job…’: Legitimation work of municipal corporate security personnel. ANZSOC Journal of Criminology 47(2): 259–275.Google Scholar
  54. Western Australian Government. 2008. Security and Related Activities (Control) Act 1996. Perth: Author.Google Scholar
  55. Whitzman, C. 2008. Community safety indicators: Are we measuring what counts? Urban Policy and Research 26(2): 197–211.CrossRefGoogle Scholar
  56. Wolfers, A. 1952. National security as an ambiguous symbol. Political Sceince Quarterly 67(4): 481–502.CrossRefGoogle Scholar
  57. Zedner, L. 2009. Security: Key ideas in criminology. London: Routledge.Google Scholar

Copyright information

© Macmillan Publishers Ltd 2017

Authors and Affiliations

  • David J. Brooks
    • 1
  • Michael Coole
    • 1
  • Jeffrey Corkill
    • 1
  1. 1.School of ScienceEdith Cowan UniversityJoondalupAustralia

Personalised recommendations