Skip to main content
Log in

The physical security professional: Mapping a body of knowledge

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Physical security is a specific jurisdictional domain practice area for contemporary security professionals. However, currently there is limited academic understanding of this group of practitioners in terms of general and technical knowledge requisites and skill competencies. Yet they are instrumental in solving society’s built environment security concerns. Consequently, this study undertook a cultural domain analysis to uncover the knowledge system underpinning physical security. The study found that physical security’s body of knowledge comprises a broad matrix of task-related knowledge categories, ranging from understanding the contextual threat drivers, use of security theories and principles, to engineering knowledge of technical components braced by professional-enabling requisites. Furthermore, this knowledge domain has a hierarchical structure, organised on the professional tasks of diagnosing the security problem, inference to reach the optimal resolution among many options and, finally, treatment of the identified security problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7

Similar content being viewed by others

References

  • Abbott, A. (1988) The System of Professions: An Essay on the Division of Expert Labor. Chicago: The University of Chicago Press.

    Google Scholar 

  • All, A.C., Huycke, L.I., and Fisher, M.J. (2003) Instructional tools for nursing education: concept maps. Nursing Education Perspectives 24(6): 311.

    Google Scholar 

  • Anderson, P. (2007) Education in Security. Sydney: Macquarie University.

    Google Scholar 

  • Anderson, L.W. and Sosniak, L.A. (1994) Bloom’s Taxonomy: A Forty-Year Retrospective. Chicago: National Society for the Study of Education.

    Google Scholar 

  • Atlas, R. (2013) 21st Century Security and Crime Prevention: Designing for Critical Infrastructure Protection and Crime Prevention (2nd ed.). Boca Raton, FL: Taylor & Francis.

    Google Scholar 

  • Attorney-General’s Department. (2009) National Security Resilience Policy Division, http://www.ag.gov.au/www/agd/agd.nsf/Page/OrganisationalStructure_NationalSecurityResiliencePolicyDivision, accessed 16 August 2010.

  • Australian Interim Security Professionals Task Force. (2008). Advancing Security Professionals: A Discussion Paper to Identify the Key Actions Required to Advance Security Professionals and Their Contribution to Australia. Canberra: Author.

    Google Scholar 

  • Axt, D.A. (2002) Is private security a profession? Security Management 46(8): 142.

    Google Scholar 

  • Baker, P.R. and Benny, D.J. (2013) The Complete Guide to physical Security. Boca Raton: CRC Press.

    Google Scholar 

  • Bernard, H.R. and Ryan, G.W. (2010) Analyzing Qualitative Data: Systematic Approaches. Thousand Oaks, CA: Sage.

    Google Scholar 

  • Borgatti, S.P. (1999) Elicitation techniques for cultural domain analysis. In: J.J. Schensul and M. Weeks (eds.) The Ethnographer’s Toolkit. Walnut Creek: AltaMira Press.

    Google Scholar 

  • Borodzicz, E. P., & Gibson, S. D. (2006). Corporate security education towards meeting the challenge. Security Journal, 19(3), 180–195.

    Article  Google Scholar 

  • Broder, J.F. and Tucker, E. (2012) Risk Analysis and the Security Survey (4th ed.). Waltham, MA: Butterworth-Heinemann.

    Google Scholar 

  • Brooks, D.J. (2007) Defining Security Through the Presentation of Security Knowledge Categories. Paper presented at the 7th Australian Security Research Symposium, Perth.

  • Brooks, D.J. (2007) Defining the science of security through knowledge categorisation. Paper presented at the Criminology and Victimlogical Society of Southern Africa (CRIMSA) Conference 2007, University of Pretoria, Pretoria.

  • Brooks, D.J. (2008) The Development and Presentation of Psychometric Concept Maps Within the Knowledge Domain of Security Risk Management. Perth, WA: Doctor of Philosophy, Curtin University of Technology.

    Google Scholar 

  • Brooks, D.J. (2009) Key Concepts in Security Risk Management: A Psychometric Concept Map Approach to Understanding. Saarbrucken: VDM Verlag.

    Google Scholar 

  • Bruner, J.S. (1977) The Process Of Education. London: Harvard University Press.

    Google Scholar 

  • Clarke, R.V. (1992) Situational Crime Prevention: Successful Case Studies. New York: Harrow and Heston.

    Google Scholar 

  • Cohen, L., Manion, L. and Morrison, K. (2000) Research Methods in Education (5th ed.). London: Routledge.

    Book  Google Scholar 

  • Contos, B.T., Crowell, W.P., DeRodeff, C., Dunkel, D., Cole, E. and McKenna, R. (2007) Physical and Logical Security Convergence: Powered by Enterprise Security Management. Burlington, MA: Syngress.

    Google Scholar 

  • Coole, M. (2015) Physical Security Professional’s Body of Knowledge: A cultural Domain Analysis of Physical Security’s Knowledge Structure. (Doctural thesis), Curtin University, Perth.

  • Coole, M. and Brooks, D.J. (2011) Mapping the Organizational Relations Within Physical Security’s Body of Knowledge: a Management Heuristic of Sound Theory and Best Practice. Paper presented at the 4th Australian Security and Intelligence Conference, Citigate Hotel, Perth.

  • Coole, M.P., Brooks, D.J. and Treagust, D. (2015) The physical security professional: Formulating a novel body of knowledge. Journal of Applied Security Research 10, 385–410.

    Article  Google Scholar 

  • Criscuoli, E.J. (1988) The time has come to acknowledge security as a profession. Annals of the American Academy of Political and Social Science 498(1), 98–107.

    Article  Google Scholar 

  • Cunningham, W.C. and Taylor, T.H. (1985) The Hallcrest Report: Private Security and Police in America. Portland, OR: Butterworth-Heinemann.

    Google Scholar 

  • Doleman, R.G. (2013). A Study Into the Facility Management Knowledge Categories Within the Life Cycle of a Building (Doctoral thesis). Edith Cowan University, Joondalup. Retrieved from http://ro.ecu.edu.au/theses/574/.

  • Eden, C. (1988) Cognitive mapping. European Journal of Operational Research 36: 1–13.

    Article  Google Scholar 

  • Eraut, M.R. (1994) Developing Professional Knowledge and Competence. London: Falmer Press.

    Google Scholar 

  • Fennelly, L.J. (2012) Handbook of Loss Prevention and Crime Prevention (5th ed.). Waltham, MA: Butterworth-Heinemann.

    Google Scholar 

  • Fennelly, L.J. (2013) Effective Physical Security (4th ed.). Waltham, MA: Butterworth-Heinemann.

    Google Scholar 

  • Finley, F.N., Nam, Y. and Oughton, J. (2011) Earth systems science: An analytic framework. Science Education 95(6): 1066–1085.

    Article  Google Scholar 

  • Fischer, R.J., Halibozek, E. and Green, G. (2008) Introduction to Security (8th ed.). Burlington, MA: Elsevier.

    Google Scholar 

  • Fosnot, C.T. (2005) Constructivism: Theory, Perspectives, and Practice (2nd ed.). New York: Teachers College Press.

    Google Scholar 

  • Fox, R.E. (1994) Training professional psychologists for the twenty-first century. American Psychologist 49(3): 200–206.

    Article  Google Scholar 

  • Fraenkel, J.R., Wallen, N.E. and Hyun, H.H. (2012) How to Design and Evaluate Research in Education. New York: McGraw-Hill.

    Google Scholar 

  • Fraser, K.M. (1993) Theory Based Use of Concept Mapping in Organization Development: Creating Shared Understanding as a Basis for the Cooperative Design of Work Changes and Changes in Working Relationships. Ann Arbor: UMI.

    Google Scholar 

  • Garcia, M.L. (2000) Personal opinion: Raising the bar for security professionals. Security Journal 13: 79–81.

    Article  Google Scholar 

  • Garcia, M.L. (2001) The Design and Evaluation Of Physical Protection Systems. Burlington, MA: Butterworth-Heinemann.

    Google Scholar 

  • Garcia, M L. (2006) Vulnerability Assessment of Physical Protection Systems. Burlingham, MA: Elsevier.

    Google Scholar 

  • Garcia, M.L. (2008) The Design and Evaluation of Physical Protection Systems (2nd ed.). Burlington, MA: Butterworth-Heinemann.

    Google Scholar 

  • Gonzalvo, P., Canas, J.J. and Bajo, M.-T. (1994a) Structural representations in knowledge acquisition. Journal of Educational Psychology 86(4): 601.

    Article  Google Scholar 

  • Gonzalvo, P., Cañas, J.J. and Bajo, M.-T. (1994b) Structural representations in knowledge acquisition. Journal of Educational Psychology 86(4): 601–616.

    Article  Google Scholar 

  • Horrocks, I. (2001) Security training: Education for an emerging profession? Computers & Security 20(3): 219–226.

    Article  Google Scholar 

  • International Foundation for Protection Officers. (2010) The Professional Protection Officer: Practical Security Strategies and Emerging Trends. Burlington, MA: Butterworth-Heinemann.

    Google Scholar 

  • Jaques, E. (1989) Requisite Organization: The CEO’s Guide to Creative Structure and Leadership. Kingston, NY: Cason Hall.

    Google Scholar 

  • Johnson, A.G. (1995) The Blackwell Dictionary of Sociology: A User’s Guide to Sociological Language. Cambridge: Blackwell.

    Google Scholar 

  • Johnson, B. and Christensen, L. (2004) Educational Research: Quantitative, Qualitative, and Mixed Approaches (2nd ed.). Boston: Pearson.

    Google Scholar 

  • Kelly, G.A. (1955). The Psychology of Personal Constructs. New York: Norton.

    Google Scholar 

  • Khairallah, M. (2006) Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. Oxford: Elsevier.

    Google Scholar 

  • Krebs, W.A.. and Wilkes, G.A. (1981) Collin’s Australian Pocket Dictionary of the English Language. Sydney: Collins.

    Google Scholar 

  • Kumar, R. (1996) Research Methodology: A Step-by Step Guide for Beginners. Melbourne: Longman.

    Google Scholar 

  • Lab, S.P. (2014) Crime Prevention: Approaches, Practices and Evaluations (8th ed.). Waltham, MA: Elsevier.

    Google Scholar 

  • Liamputtong, P. and Ezzy, D. (2006) Qualitative Research Methods (2nd ed.). New York: Oxford.

    Google Scholar 

  • Lodahl, J.B. and Gordon, G. (1972) The structure of scientific fields and the functioning of university graduate departments. American Sociological Review 37(1): 57–72.

    Article  Google Scholar 

  • Manunta, G. (1999) What is security? Security Journal 12: 57–66.

    Article  Google Scholar 

  • Martin, C.S. and Guerin, D.A. (2005) The Interior Design Profession’s Body of Knowledge. Minneapolis: University of Minnesota.

    Google Scholar 

  • Marutello, F. (1981) The semantic definition of a profession. Southern Review of Public Administration 5(3): 246–257.

    Google Scholar 

  • McAleese, R. (1999) Concept mapping: a critical review. Innovations in Education and Training International 36(4): 351.

    Article  Google Scholar 

  • McLucas, A.C. (2003) Decision Making: Risk Management, Systems Thinking and Situation Awareness. Canberra: Argos Press.

    Google Scholar 

  • Morris, P.W.G., Crawford, L., Hodgson, D., Shepherd, M.M. and Thomas, J. (2006) Exploring the role of formal bodies of knowledge in defining a profession—the case of project management. International Journal of Project Management 24(8): 710–721.

    Article  Google Scholar 

  • Nalla, M. and Morash, M. (2002) Assessing the scope of corporate security: Common practices and relationships with other business functions. Security Journal 15: 7–19.

    Article  Google Scholar 

  • Norman, T. (2007) Integrated Security Systems Design: Concepts, Specifications, and Implementation. Boston, MA: Elsevier.

    Google Scholar 

  • Novak, J.D. (1993) Human constructivism: A unification of psychological and epistemological phenomena in meaning making. International Journal of Personal Construct Psychology 6: 167–193.

    Article  Google Scholar 

  • Pearson, R.L. (2007) Electronic Security Systems: A Manager’s Guide to Evaluating and Selecting System Solutions. Boston: Butterworth-Heinemann.

    Google Scholar 

  • Prenzler, T., Earle, K. and Sarre, R. (2009a) Private security in Australia: Trends and key characteristics. Trends & Issues in Crime and Criminal Justice 374: 1–6.

    Google Scholar 

  • Prenzler, T., Martin, K. and Sarre, R. (2009b) Tertitary education in security and policing in Australia. Asian Journal of Criminology 5(1): 1–10.

    Article  Google Scholar 

  • Rakshit, S. and Ananthasuresh, G.K. (2007) An amino acid map of inter-residue contact energies using metric multi-dimensional scaling. Journal of Theoretical Biology 250: 291–297.

    Article  Google Scholar 

  • Rogers, B. (2000). Personal opinion: A framework for higher education in the security field. Security Journal, 13, 65–68.

    Article  Google Scholar 

  • Rogers, B., Palmgren, D., Giever, D. and Garcia, M.L. (2007) Security Education in the 21st Century: The Role of Engineering. ASEE Annual Conference and Exposition, Conference Proceedings.

  • Rundblad, G. (2006) Recruiting a representative sample, www.appliedlinguistics.org.uk, accessed 20 May 2010.

  • Silverman, D. (2002) Doing Qualitative Research: A Practical Handbook. London: Sage Publications.

    Google Scholar 

  • Smith, C.L. (2002) A method for understanding students’ perceptions of concepts in the defence in depth strategy. Paper presented at the 3rd Australian Information Warfare and Security Conference 2002, Perth.

  • Smith, C.L. and Brooks, D.J. (2013) Security Science: The Theory and Practice of Security. Amsterdam: Elsevier.

    Google Scholar 

  • Spradley, J.P. (1979) The Ethnographic Interview. New York: Holt, Rinehart, and Winston.

    Google Scholar 

  • Tzu, S. (2011) The Art of War. London: HarperCollins Publishers.

    Google Scholar 

  • Walker, P. (1998) Electronic Security Systems: Reducing False Alarms (3rd ed.). Oxford: Newnes.

    Google Scholar 

  • Walsh, T. J. and Healy, R.J. (2012) Protection of Assets: Physical Security. Alexandria, VA: ASIS International.

    Google Scholar 

  • Wilensky, H.L. (1964) The professionalization of everyone? American Journal of Sociology 70(2): 137–158.

    Article  Google Scholar 

  • Zipser, B. (1999). Professionals and the standard of care. Torts Law Journal 7(2): 167.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Jonathan Brooks.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Coole, M.P., Brooks, D.J. & Minnaar, A. The physical security professional: Mapping a body of knowledge. Secur J 30, 1169–1197 (2017). https://doi.org/10.1057/s41284-016-0084-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41284-016-0084-8

Keywords

Navigation