What is security: Definition through knowledge categorization
- 613 Downloads
There have been a number of studies that have attempted to define the concept of security. However, as past authors have indicated, security is multidimensional in nature and diverse in practice. This diversity leads to difficulty in providing a single all encompassing definition for the many applied domains of security. Security cannot be considered singular in concept definition, as definition is dependant on applied context. This study reversed engineered an applied security definition through the critique of 104 undergraduate security degrees, resulting in the presentation of 13 core security knowledge categories. These 13 knowledge categories were then integrated into an existing Australian security framework, resulting in the presentation of the science of security framework model. This framework allowed a greater understanding of security through knowledge structure and placed concept definition within the applied context domain of organizational security.
Keywordssecurity organizational definition body of knowledge framework
- American Society for Industrial Security. (1999) Proceedings of the 1999 Academic/Practitioner Symposium. Reno: American Society for Industrial Security, University of Nevada.Google Scholar
- American Society for Industrial Security. (2000) Proceedings of the 2000 Academic/Practitioner Symposium. Oklahoma: American Society for Industrial Security, The University of Oklahoma.Google Scholar
- American Society for Industrial Security. (2002) Proceedings of the 2002 Academic/Practitioner Symposium. Ohio: ASIS International, The University of Cincinnati.Google Scholar
- ASIS International. (2003) Proceedings of the 2003 Academic/Practitioner Symposium. Maryland: ASIS International, The University of Maryland.Google Scholar
- ASIS International. (2007) Academic institutions offering degrees and/or courses in security, http://www.asisonline.org/education/universityPrograms/traditionalprograms.pdf, accessed 7 March 2007.
- Association of Universities and Colleges of Canada. (2005) Speaking for Canada's universities at home and abroad, http://oraweb.aucc.ca/pls/, accessed 28 July 2005.
- Bazzina, M. (2006) Security Standards and Support Systems Report: A Collaborative Project Between the Commonwealth Attorney-General's Department and Standards Australia. Sydney, NSW: Standards Australia International.Google Scholar
- Brooks, D.J. (2006) Mapping the consensual knowledge of security risk management experts. In: C. Valli and A. Woodward (eds.) Proceedings of the 7th Australian Information Warfare and Security Conference. Perth, Western Australia: School of Computing and Information Science, Edith Cowan University, pp. 9–17.Google Scholar
- Brooks, D.J. (2007) Defining the Science of Security through Knowledge Categorisation. Paper presented at the Criminology and Victimlogical Society of Southern Africa (CRIMSA) Conference 2007, October, University of Pretoria, Pretoria.Google Scholar
- Clancey, W.J. (1997) The Conceptual Nature of Knowledge, Situations, and Activity. In: P.J. Feltovich, K.M. Ford and R.R. Hoffman (eds.) Expertise in Context: Human and Machine. Menlo Park, CA: The MIT Press, pp. 247–291.Google Scholar
- Collins English Dictionary and Thesaurus. (1992) Sydney, NSW: HarperCollins Publishers.Google Scholar
- Craighead, G. (2003) High-Rise Security and Fire Life Safety. Woburn, MA: Butterworth-Heinemann.Google Scholar
- Davidson, M.A. (2005) A matter of degrees. Security Management 49 (12): 72–99.Google Scholar
- Eysenck, M.W. and Keane, M.T. (2002) Cognitive Psychology: A Student's Handbook. New York: Psychology Press.Google Scholar
- Ferguson, G. (2004) Policing conference returns to Adelaide. Australian Defence Magazine 12(8): 54.Google Scholar
- Fischer, R.J. and Green, G. (2004) Introduction to Security. Boston, MA: Butterworth-Heinemann.Google Scholar
- Garcia, M.L. (2001) The Design and Evaluation of Physical Protection Systems. Boston, MA: Butterworth-Heinemann.Google Scholar
- Good Guides. (2004) Helping you make decisions about where and what to study in Australia, http://www.thegoodguides.com.au/ggcontent/course/id, accessed 28 October 2004.
- Hesse, L. and Smith, C.L. (2001) Core Curriculum in Security Science. In: H. Armstrong (ed.) Proceedings of the 5th Australian Security Research Symposium. Perth, Western Australia: School of Computing and Information Science, Edith Cowan University, pp. 87–104.Google Scholar
- Hiemstra, R. (1996) What's in a word? Changes in self-directed learning language over a decade, http://www-distance.syr.edu/word.html, accessed 20 October 2005.
- Horvath, J. (2004) The fear factor, http://www.telepolis.de/english/inhalt/te/18187/1.html, accessed 3 September 2004.
- Howard, J. (2004) Business government forum on national security, http://www.safeguardingaustralia.org.au/Questions/Howard-address-23June04.doc, accessed 3 July 2004.
- Kellogg, R.T. (2003) Cognitive Psychology. Thousand Oaks, CA: Sage Publications.Google Scholar
- Kidd, S. (2006) The Security Institute yearbook and directory of qualifications 2006, http://www.security-institute.org/pdf/2006%20Yearbook.pdf, accessed 25 June 2007.
- Langston, C. and Lauge-Kristensen, R. (2002) Strategic Management of Built Facilities. Boston, MA: Butterworth-Heinemann.Google Scholar
- Manunta, G. and Manunta, R. (2006) Theorizing about Security. In: M. Gill (ed.) The Handbook of Security. New York: Palgrave Macmillan, pp. 629–657.Google Scholar
- Morley, H.N. and Vogel, R.E. (1993) The higher education dilemma for the private security professional: Delivery methodologies and core curriculum from the practitioner's perspective. Security Journal 4 (3): 122–127.Google Scholar
- Pennebaker, J.W., Francis, M.E. and Booth, R.J. (2001) Linguistic Inquiry and Word Count (LIWC2001). Mahwah, NJ: Erlbaum Publishers.Google Scholar
- Post, R.S. and Kingsbury, A.A. (1991) Security Administration: An Introduction to the Protection Services. Boston, MA: Butterworth-Heinemann.Google Scholar
- Rennie, L.J. and Gribble, J. (1999) A Guide to Preparing Your Application for Candidacy. Perth, Western Australia: Curtin University of Technology.Google Scholar
- Risk Management Institution of Australasia. (2007) Security risk management body of knowledge, http://www.securityprofessionals.org.au/, accessed 24 January 2007.
- Security Professionals' Taskforce. (2008) Advancing security professionals: A discussion paper to identify the key actions required to advance security professionals and their contribution to Australia, http://www.securityprofessionals.org.au/.
- Smith, C.L. (2001) Security science: An emerging applied science. Journal of the Science Teachers Association of Western Australia 37 (2): 8–10.Google Scholar
- Standards Australia. (2004a) AS/NZS4360:2004 Risk Management. Sydney, NSW: Standards Australia International.Google Scholar
- Standards Australia. (2004b) HB221 Business Continuity Planning. Sydney, NSW: Standards Australia International.Google Scholar
- Talbot, J. and Jakeman, M. (2008) Security Risk Management Body of Knowledge. Carlton South: Risk Management Institution of Australasia.Google Scholar
- Tate, P.W. (1997) Report on the Security Industry Training: Case Study of an Emerging Industry. Perth: Western Australian Department of Training, Western Australian Government Publishing.Google Scholar
- Yates, A. (2004) Australia's Homeland Security Market and Industry's Role. Canberra: Australian Homeland Security Research Centre.Google Scholar