Skip to main content
Log in

Security risk management: A psychometric map of expert knowledge structure

  • Original Article
  • Published:
Risk Management Aims and scope Submit manuscript

Abstract

The security industry operates within a diverse and multi-disciplined knowledge base, with risk management as a fundamental knowledge domain within security to mitigate its risks. Nevertheless, there has been limited research in understanding and mapping security expert knowledge structures within security risk management to consider if parts of security risk management are unique from more general risk management. This interpretive study applied a technique of multidimensional scaling (MDS) to develop and present a psychometric map within the knowledge domain of security risk management, validated with expert interviews. The psychometric MDS security risk management concept map presented the expert knowledge structure of security risk management, demonstrating the inclusive and spatial locality of significant security risk concepts, conceptual complexity, uniqueness of the domain and the importance of the concept threat. Understanding security experts’ consensual knowledge of security risk may allow improved understanding of threat-based risk, the issue with applying probabilistic risk analysis against antagonist events, and improved teaching and learning within this knowledge domain.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7

Similar content being viewed by others

References

  • American Society for Industrial Security. (2000) Proceedings of the 2000 Academic/Practitioner Symposium, The University of Oklahoma, OK: American Society for Industrial Security.

  • Angus and Roberston (1992) Dictionary and Thesaurus. Sydney, Australia: Harper Collins Publishers.

    Google Scholar 

  • ASIS International. (2003a) Proceedings of the 2003 Academic/Practitioner Symposium, The University of Maryland, MD: ASIS International.

  • ASIS International. (2003b) Proceedings of the 2003 Academic/Practitioner Symposium, The University of Maryland, MD: ASIS International.

  • ASIS International. (2007) Academic institutions offering degrees and/or courses in security, http://www.asisonline.org/education/universityPrograms/traditionalprograms.pdf, accessed 7 March 2007.

  • ASIS International. (2009) Security body of knowledge (BoK): Substantive considerations. Unpublished ASIS International Academic/Practitioner Symposium 2009, ASIS International.

  • Association of Universities and Colleges of Canada. (2005) Speaking for Canada's universities at home and abroad, http://oraweb.aucc.ca/pls/dcu/, accessed 28 July 2005.

  • Aven, T. (2008) Risk Analysis: Assessing Uncertainties Beyond Expected Values and Probabilities. West Sussex, UK: John Wiley & Sons.

    Book  Google Scholar 

  • Bar, V. and Travis, A.S. (1991) Children's views concerning phase changes. Journal of Research in Science Teaching 28 (4): 363–382.

    Article  Google Scholar 

  • Beard, B. and Brooks, D.J. (2006) Security Risk Assessment: Group Approach to a Consensual Outcome, Proceeding of the 7th Australian Information Warfare and Security Conference. Perth, Australia: Edith Cowan University, pp. 5–8.

  • Bennett, B. and Rolheiser, C. (2001) Beyond Monet: The Artful Science of Instructional Integration. Toronto, Canada: Bookation.

    Google Scholar 

  • Bier, V.M. (1999) Challenges to the acceptance of probabilistic risk analysis [Electronic version]. Risk Analysis 19 (4): 703–710.

    Google Scholar 

  • Bier, V.M. (2007) Choosing what to protect [Electronic version]. Risk Analysis 27 (3): 607–620.

    Article  Google Scholar 

  • Borges, T.A. and Gilbert, J.K. (1999) Mental models of electricity. International Journal of Science Education 21 (1): 95–117.

    Article  Google Scholar 

  • Brooks, D.J. (2009a) Key Concepts in Security Risk Management: A Psychometric Concept Map Approach to Understanding. Saarbrucken, Germany: VDM Verlag.

    Google Scholar 

  • Brooks, D.J. (2009b) What is security: Definition through knowledge categorisation. Security Journal, DOI 101057/sj.2008.18, 1–15.

  • Cheng, C.C. (2004) Statistical approaches on discriminating spatial variation of species diversity. Botanical Bulletin of Academia Sinica 45: 339–346.

    Google Scholar 

  • Clancey, W.J. (1997) The conceptual nature of knowledge, situations, and activity. In: P.J. Feltovich, K.M. Ford and R.R. Hoffman (eds.) Expertise in Context: Human and Machine. Menlo Park, CA: The MIT Press, pp. 247–291.

    Google Scholar 

  • Cohen, L., Manion, L. and Morrison, K. (2002) Research Methods in Education, 5th edn. London: RoutledgeFalmer.

    Google Scholar 

  • Cox, L.A. (2008) Some limitations of ‘risk=threat x vulnerability x consequence’ for risk analysis of terrorist attacks [Electronic version]. Risk Analysis 28 (6): 1749–1761.

    Article  Google Scholar 

  • Cox, T.F. and Cox, M.A.A. (2000) Multidimensional Scaling: Monographs on Statistics and Applied Probability, Vol. 88, 2nd edn. Boca Raton, FL: Chapman & Hall/CRC.

    Google Scholar 

  • Davidson, M.A. (2005) A matter of degrees. Security Management 49 (12): 72–99.

    Google Scholar 

  • Eysenck, M.W. and Keane, M.T. (2002) Cognitive Psychology: A Student's Handbook, 4th edn. New York: Psychology Press.

    Google Scholar 

  • Fischer, R.J. and Green, G. (2004) Introduction to Security, 7th edn. Boston, MA: Butterworth Heinemann.

    Google Scholar 

  • Garlick, A. (2007) Estimating Risk: A Management Approach. Aldershot, UK: Gower Publishing Company.

    Google Scholar 

  • Good Guides. (2004) Helping you make decisions about where and what to study in Australia, http://www.thegoodguides.com.au/ggcontent/course/id, accessed 28 October 2004.

  • Hesse, L. and Smith, C.L. (2001) Core Curriculum in Security Science, Proceedings of the 5th Australian Security Research Symposium, Perth, Western Australia. Perth, Australia: Edith Cowan University, pp. 87–104.

  • Horvath, J. (2004) The fear factor, http://www.telepolis.de/english/inhalt/te/18187/1.html, accessed 3 September 2004.

  • Howard, J. (2004) Business government forum on national security, http://www.safeguardingaustralia.org.au/Questions/Howard-address-23June04.doc, accessed 3 July 2004.

  • Hoz, R., Bowman, D. and Chacham, T. (1997) Psychometric and edumetric validity of dimensions of geomorphological knowledge which are trapped by concept mapping. Journal of Research in Science Teaching 34 (9): 925–947.

    Article  Google Scholar 

  • Jay, C. (2005) Big debacles help shape a new science. The Australian Financial Review, 17 March: 2.

  • Johnson-Laird, P.N. (1983) Mental Models: Towards a Cognitive Science of Language, Inference and Consciousness. Cambridge, UK: Cambridge University Press.

    Google Scholar 

  • Johnson, R.A. and Wichern, D.W. (2002) Applied Multivariate Statistical Analysis, 5th edn. Upper Saddle River, NJ: Prentice-Hall.

    Google Scholar 

  • Jones, D.E.L. and Smith, C.L. (2005) The development of a model for the testing and evaluation of security equipment within Australian Standard/New Zealand Standard AS/NZS4360:2004 – Risk management. Recent Advances in Counter-Terrorism Technology and Infrastructure Protection.

  • Kealy, W.A. (2001) Knowledge maps and their use in computer-based collaborative learning environments. Journal of Computing Research 25 (3): 325–349.

    Google Scholar 

  • Kellogg, R.T. (2003) Cognitive Psychology, 2nd edn. Thousand Oaks, CA: Sage Publications.

    Google Scholar 

  • Kidd, S. (2006) The Security Institute yearbook and directory of qualifications 2006, http://www.security-institute.org/yearbook.html, accessed 25 June 2007.

  • Kruskal, J.B. and Wish, M. (1978) Multidimensional Scaling, Vol. 07, London: Sage Publications.

    Book  Google Scholar 

  • Lockhart, R.S. and Craik, F.I.M. (1990) Levels of processing: A retrospective commentary on a framework for memory research. Canadian Journal of Psychology 44: 87–112.

    Article  Google Scholar 

  • Manunta, G. (1996) The case against: Private security is not a profession. International Journal of Risk, Security and Crime Prevention 1 (3): 233–240.

    Google Scholar 

  • Manunta, G. (1999) What is security? Security Journal 12 (3): 57–66.

    Article  Google Scholar 

  • Manunta, G. (2002) Risk and security: Are they compatible concepts? Security Journal 15 (2): 43–55.

    Article  Google Scholar 

  • Markham, K.M., Mintzes, J.J. and Jones, M.G. (1994) The concept map as a research and evaluation tool: Further evidence of validity. Journal of Research in Science Teaching 31 (1): 91–101.

    Article  Google Scholar 

  • Martinez-Torres, M.R., Garcia, F.J.B., Marin, S.L.T. and Vazquez, S.G. (2005) A digital signal processing teaching methodology using concept-mapping techniques. IEEE Transactions on Education 48 (3): 422–429.

    Article  Google Scholar 

  • McGill, W.L., Ayyub, B.M. and Kaminsky, M. (2007) Risk analysis for critical asset protection [Electronic resource]. Risk Analysis 27 (5): 1265–1281.

    Article  Google Scholar 

  • Morgan, G. and Henrion, M. (1990) Uncertainty: A Guide to Dealing With Uncertainty in Quantitative Risk and Policy Analysis. New York: Cambridge University Press.

    Book  Google Scholar 

  • Norman, D.A. (1983) Some observations on mental models. In: D. Gentner and A.L. Stevens (eds.) Mental Models. Hillsdale, NJ: Lawrence Erlbaum Associates, pp. 7–14.

    Google Scholar 

  • Novak, J.D. (1990) Concept mapping: A useful tool for science education. Journal of Research in Science Education 27: 937–949.

    Google Scholar 

  • Novak, J.D. (1998) Learning, Creating and Using Knowledge: Concept Maps as Facilitative Tools in Schools and Corporations. Mahwah, NJ: Lawrence Erlbaum Associates.

    Google Scholar 

  • Novak, J.D. and Gowin, D.B. (1984) Learning How to Learn. Cambridge, USA: Cambridge University Press.

    Book  Google Scholar 

  • Pennebaker, J.W., Francis, M.E. and Booth, R.J. (2001) Linguistic Inquiry and Word Count (LIWC2001). Mahwah, NJ: Erlbaum Publishers.

    Google Scholar 

  • Power, M. (2007) Organized Uncertainty: Designing a World of Risk Management. Oxford, UK: Oxford University Press.

    Google Scholar 

  • Reisberg, D. (2001) Cognition: Exploring the Science of the Mind, 2nd edn. New York: W. W. Norton & Company.

    Google Scholar 

  • Rennie, L.J. and Gribble, J. (1999) A Guide to Preparing Your Application for Candidacy. Perth, Western Australia: Curtin University of Technology.

    Google Scholar 

  • Risk Management Institute of Australasia. (2007b) Security risk management body of knowledge, http://www.securityprofessionals.org.au/2007SRMBOK.htm, accessed 24 January 2007.

  • Ruiz-Primo, M.A., Schultz, S.E., Li, M. and Shavelson, R.J. (2001) Comparison of the reliability and validity of scores from two concept-mapping techniques. Journal of Research in Science Teaching 38 (2): 260–278.

    Article  Google Scholar 

  • Simonsen, C.E. (1996) The case for: Security management is a profession. International Journal of Risk, Security and Crime Prevention 1 (3): 229–232.

    Google Scholar 

  • Smith, C.L. (1984) Learning astronomy and the organisation of astronomy concepts in semantic memory. Unpublished doctoral thesis, Murdoch University, Perth, Western Australia.

  • Smith, C.L. (2001a) Security science as an applied science? Australian Science Teachers’ Journal 47 (2): 32–36.

    Google Scholar 

  • Smith, C.L. (2001b) Security science: An emerging applied science. Journal of the Science Teachers Association of Western Australia 37 (2): 8–10.

    Google Scholar 

  • Smith, C.L. (2003) Understanding Concepts in the Defence in Depth Strategy, Security Technology, 2003. Proceedings, IEEE 37th Annual 2003 International Carnaham Conference. Taipei, Taiwan, Republic of China, pp. 8–16.

  • Standards Australia. (2004a) AS/NZS4360:2004 Risk Management. Sydney, Australia: Standards Australia International.

  • Standards Australia. (2004b) AS/NZS 4360: 2004 Risk Management. Sydney, Australia: Standards Australia.

  • Standards Australia. (2004c) HB221 Business Continuity Planning. Sydney, Australia: Standards Australia International.

  • Standards Australia. (2004d) HB436:2994 Risk Management Guidelines: Companion to AS/NZS4360:2004. Sydney, Australia: Standards Australia International.

  • Standards Australia. (2006) HB 167:2006 Security Risk Management. Sydney, Australia: Standards Australia.

  • Standards Australia. (2009) AS/NZS ISO31000:2009 Risk Management – Principles and Guidelines. Sydney, Australia: Standards Australia.

  • Standards Australia. (2011) Imagine a world without standards. Brochure. Homebush.

  • Stein, E.W. (1997) A look at expertise from a social perspective. In: P.J. Feltovich, K.M. Ford and R.R. Hoffman (eds.) Expertise in Context: Human and Machine. Menlo Park, CA: The MIT Press, pp. 181–194.

    Google Scholar 

  • Streveler, R., Miller, R.L. and Boyd, T.M. (2001) Using an on-line tool to investigate chemical engineering seniors’ concept of the design process. Paper presented at the Annual Meeting of the American Educational Research Association, Seattle, WA.

  • Talbot, J. and Jakeman, M. (2008) SRMBOK: Security Risk Management Body of Knowledge. Carlton South: Risk Management Institution of Australasia.

    Google Scholar 

  • Tate, P.W. (1997) Report on the Security Industry Training: Case Study of an Emerging Industry. Perth, Australia: Western Australian Department of Training. Western Australian Government Publishing.

    Google Scholar 

  • Trochim, W.M.K. (1989) An introduction to concept mapping for planning and evaluation. Evaluation and Program Planning 12 (1): 1–16.

    Article  Google Scholar 

  • Trochim, W.M.K. (1993) The reliability of concept mapping, http://www.socialreserachmethods.net/reserach/Reliable/reliable.htm, accessed 24 July 2005.

  • Trochim, W.M.K. (2005) Concept mapping. http://www.socialresearchmethods.net/kb/conmap.htm, accessed 28 July 2005.

  • Trochim, W.M.K. and Cook, J.A. (1994) Using concept mapping to develop a conceptual framework of staff's views of a supported employment program for persons with severe mental illness. Journal of Consulting and Clinical Psychology 62 (4): 766–775.

    Article  Google Scholar 

  • Turner, P. (2002) Multidimensional scaling analysis of techniques used by physiotherapists in Southeast Australia: A cross-national replication. Australian Journal of Physiotherapy 48: 123–130.

    Article  Google Scholar 

  • Wallace, A., Schirato, T. and Bright, P. (1999) Beginning University: Thinking, Researching and Writing for Success. Sydney, Australia: Allen & Unwin.

    Google Scholar 

  • Zedner, L. (2009) Security: Keys Ideas in Criminology. London: Routledge.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

J Brooks, D. Security risk management: A psychometric map of expert knowledge structure. Risk Manag 13, 17–41 (2011). https://doi.org/10.1057/rm.2010.7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/rm.2010.7

Keywords

Navigation