Security Journal

, Volume 23, Issue 3, pp 225–239 | Cite as

What is security: Definition through knowledge categorization

  • David J Brooks
Original Article


There have been a number of studies that have attempted to define the concept of security. However, as past authors have indicated, security is multidimensional in nature and diverse in practice. This diversity leads to difficulty in providing a single all encompassing definition for the many applied domains of security. Security cannot be considered singular in concept definition, as definition is dependant on applied context. This study reversed engineered an applied security definition through the critique of 104 undergraduate security degrees, resulting in the presentation of 13 core security knowledge categories. These 13 knowledge categories were then integrated into an existing Australian security framework, resulting in the presentation of the science of security framework model. This framework allowed a greater understanding of security through knowledge structure and placed concept definition within the applied context domain of organizational security.


security organizational definition body of knowledge framework 


  1. American Society for Industrial Security. (1999) Proceedings of the 1999 Academic/Practitioner Symposium. Reno: American Society for Industrial Security, University of Nevada.Google Scholar
  2. American Society for Industrial Security. (2000) Proceedings of the 2000 Academic/Practitioner Symposium. Oklahoma: American Society for Industrial Security, The University of Oklahoma.Google Scholar
  3. American Society for Industrial Security. (2002) Proceedings of the 2002 Academic/Practitioner Symposium. Ohio: ASIS International, The University of Cincinnati.Google Scholar
  4. ASIS International. (2003) Proceedings of the 2003 Academic/Practitioner Symposium. Maryland: ASIS International, The University of Maryland.Google Scholar
  5. ASIS International. (2007) Academic institutions offering degrees and/or courses in security,, accessed 7 March 2007.
  6. Association of Universities and Colleges of Canada. (2005) Speaking for Canada's universities at home and abroad,, accessed 28 July 2005.
  7. Bazzina, M. (2006) Security Standards and Support Systems Report: A Collaborative Project Between the Commonwealth Attorney-General's Department and Standards Australia. Sydney, NSW: Standards Australia International.Google Scholar
  8. Brooks, D.J. (2006) Mapping the consensual knowledge of security risk management experts. In: C. Valli and A. Woodward (eds.) Proceedings of the 7th Australian Information Warfare and Security Conference. Perth, Western Australia: School of Computing and Information Science, Edith Cowan University, pp. 9–17.Google Scholar
  9. Brooks, D.J. (2007) Defining the Science of Security through Knowledge Categorisation. Paper presented at the Criminology and Victimlogical Society of Southern Africa (CRIMSA) Conference 2007, October, University of Pretoria, Pretoria.Google Scholar
  10. Clancey, W.J. (1997) The Conceptual Nature of Knowledge, Situations, and Activity. In: P.J. Feltovich, K.M. Ford and R.R. Hoffman (eds.) Expertise in Context: Human and Machine. Menlo Park, CA: The MIT Press, pp. 247–291.Google Scholar
  11. Collins English Dictionary and Thesaurus. (1992) Sydney, NSW: HarperCollins Publishers.Google Scholar
  12. Craighead, G. (2003) High-Rise Security and Fire Life Safety. Woburn, MA: Butterworth-Heinemann.Google Scholar
  13. Davidson, M.A. (2005) A matter of degrees. Security Management 49 (12): 72–99.Google Scholar
  14. Eysenck, M.W. and Keane, M.T. (2002) Cognitive Psychology: A Student's Handbook. New York: Psychology Press.Google Scholar
  15. Ferguson, G. (2004) Policing conference returns to Adelaide. Australian Defence Magazine 12(8): 54.Google Scholar
  16. Fischer, R.J. and Green, G. (2004) Introduction to Security. Boston, MA: Butterworth-Heinemann.Google Scholar
  17. Garcia, M.L. (2001) The Design and Evaluation of Physical Protection Systems. Boston, MA: Butterworth-Heinemann.Google Scholar
  18. Good Guides. (2004) Helping you make decisions about where and what to study in Australia,, accessed 28 October 2004.
  19. Hesse, L. and Smith, C.L. (2001) Core Curriculum in Security Science. In: H. Armstrong (ed.) Proceedings of the 5th Australian Security Research Symposium. Perth, Western Australia: School of Computing and Information Science, Edith Cowan University, pp. 87–104.Google Scholar
  20. Hiemstra, R. (1996) What's in a word? Changes in self-directed learning language over a decade,, accessed 20 October 2005.
  21. Horvath, J. (2004) The fear factor,, accessed 3 September 2004.
  22. Howard, J. (2004) Business government forum on national security,, accessed 3 July 2004.
  23. Kellogg, R.T. (2003) Cognitive Psychology. Thousand Oaks, CA: Sage Publications.Google Scholar
  24. Kidd, S. (2006) The Security Institute yearbook and directory of qualifications 2006,, accessed 25 June 2007.
  25. Langston, C. and Lauge-Kristensen, R. (2002) Strategic Management of Built Facilities. Boston, MA: Butterworth-Heinemann.Google Scholar
  26. Lockhart, R.S. and Craik, F.I.M. (1990) Levels of processing: A retrospective commentary on a framework for memory research. Canadian Journal of Psychology 44: 87–112.CrossRefGoogle Scholar
  27. Manunta, G. (1999) What is security? Security Journal 12 (3): 57–66.CrossRefGoogle Scholar
  28. Manunta, G. (2002) Risk and security: Are they compatible concepts? Security Journal 15 (2): 43–55.CrossRefGoogle Scholar
  29. Manunta, G. and Manunta, R. (2006) Theorizing about Security. In: M. Gill (ed.) The Handbook of Security. New York: Palgrave Macmillan, pp. 629–657.Google Scholar
  30. McCrie, R.D. (2004) The history of expertise in security management practice and litigation. Security Journal 17 (3): 11–19.CrossRefGoogle Scholar
  31. Morley, H.N. and Vogel, R.E. (1993) The higher education dilemma for the private security professional: Delivery methodologies and core curriculum from the practitioner's perspective. Security Journal 4 (3): 122–127.Google Scholar
  32. Novak, J.D. and Gowin, D.B. (1984) Learning How to Learn. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  33. Pennebaker, J.W., Francis, M.E. and Booth, R.J. (2001) Linguistic Inquiry and Word Count (LIWC2001). Mahwah, NJ: Erlbaum Publishers.Google Scholar
  34. Post, R.S. and Kingsbury, A.A. (1991) Security Administration: An Introduction to the Protection Services. Boston, MA: Butterworth-Heinemann.Google Scholar
  35. Rennie, L.J. and Gribble, J. (1999) A Guide to Preparing Your Application for Candidacy. Perth, Western Australia: Curtin University of Technology.Google Scholar
  36. Risk Management Institution of Australasia. (2007) Security risk management body of knowledge,, accessed 24 January 2007.
  37. Sarre, R. (2005) Researching private policing: Challenges and agendas for researchers. Security Journal 18 (3): 57–70.CrossRefGoogle Scholar
  38. Security Professionals' Taskforce. (2008) Advancing security professionals: A discussion paper to identify the key actions required to advance security professionals and their contribution to Australia,
  39. Smith, C.L. (2001) Security science: An emerging applied science. Journal of the Science Teachers Association of Western Australia 37 (2): 8–10.Google Scholar
  40. Standards Australia. (2004a) AS/NZS4360:2004 Risk Management. Sydney, NSW: Standards Australia International.Google Scholar
  41. Standards Australia. (2004b) HB221 Business Continuity Planning. Sydney, NSW: Standards Australia International.Google Scholar
  42. Talbot, J. and Jakeman, M. (2008) Security Risk Management Body of Knowledge. Carlton South: Risk Management Institution of Australasia.Google Scholar
  43. Tate, P.W. (1997) Report on the Security Industry Training: Case Study of an Emerging Industry. Perth: Western Australian Department of Training, Western Australian Government Publishing.Google Scholar
  44. Yates, A. (2004) Australia's Homeland Security Market and Industry's Role. Canberra: Australian Homeland Security Research Centre.Google Scholar

Copyright information

© Palgrave Macmillan, a division of Macmillan Publishers Ltd 2009

Authors and Affiliations

  • David J Brooks
    • 1
  1. 1.Security Research Centre (SECAU) at Edith Cowan University, Edith Cowan UniversityJoondalupAustralia

Personalised recommendations