Advertisement

Security Journal

, Volume 31, Issue 2, pp 524–547 | Cite as

Educating the physical security professional: developing a science-based curriculum

  • Michael Patrick Coole
  • David Jonathan Brooks
  • Anthony Minnaar
Original Article

Abstract

Within the security stratum is the jurisdictional practice of physical security; however, physical security is not currently a recognised professional undertaking. Professional standing is a social recognition, designated by the public and legal arenas. Yet the physical security practitioner is instrumental in addressing security concerns. Therefore, this study extends a recent article by Coole et al. (Secur J 1–29, 2016) to articulate educational learning objectives within a formal knowledge structure. The study applied a cultural domain analysis, using security expert focus groups to develop a physical security knowledge system. Findings indicated that knowledge subjects should be aligned in order to diagnose the security problem, inference an optimal resolution and identify treatment strategies. The study articulated the overarching physical security learning objectives, using a top-down structure and underpinned by subject learning objectives. The adoption of standardised learning objectives, based on clear content requisites, would represent a significant step forward in the professionalisation of the physical security professional.

Keywords

Security Physical Professional Knowledge Education 

References

  1. Abbott. 1988. The system of professions: An essay on the division of expert labor. Chicago: The University of Chicago Press.Google Scholar
  2. Anderson, L.W., and L.A. Sosniak. 1994. Bloom’s taxonomy: A forty-year retrospective. Chicago: National Society for the Study of Education.Google Scholar
  3. Anderson, P. 2007. Education in security. Sydney: Macquarie University.Google Scholar
  4. Australian Interim Security Professionals Task Force. 2008. Advancing security professionals: A discussion paper to identify the key actions required to advance security professionals and their contribution to Australia. Canberra: Australian Interim Security Professionals Task Force.Google Scholar
  5. Australian Skills Quality Authority. 2016. Training in security programs in Australia: Report. Canberra: Australian Skills Quality Authority, Australian Government. https://www.aqf.edu.au/aqf-levels. Accessed 14 August 2017.
  6. Australian Qualifications Framework. 2013. AQF levels. Canberra: Australian Qualifications Framework Council.Google Scholar
  7. Bernard, H.R., and G.W. Ryan. 2010. Analyzing qualitative data: Systematic approaches. Thousand Oaks, CA: Sage.Google Scholar
  8. Borgatti, S.P. 1999. Elicitation techniques for cultural domain analysis. In The Ethnographer’s Toolkit, ed. J.J. Schensul, and M. Weeks. Walnut Creek: AltaMira Press.Google Scholar
  9. Borodzicz, E.P., and S.D. Gibson. 2006. Corporate security education towards meeting the challenge. Security Journal 19 (3): 180–195.CrossRefGoogle Scholar
  10. Brooks, D.J. 2007. Defining security through the presentation of security knowledge categories. Paper Presented at the 7th Australian Security Research Symposium, Perth.Google Scholar
  11. Brooks, D.J. 2010. What is security: Definition through knowledge categorization. Security Journal 23 (3): 225–239.CrossRefGoogle Scholar
  12. Brooks, D.J. 2011. Security risk management: A psychometric map of expert knowledge structure. Risk Management 13 (1/2): 17–41.CrossRefGoogle Scholar
  13. Bruner, J.S. 1977. The process of education. London: Harvard University Press.Google Scholar
  14. Cohen, L., L. Manion, and K. Morrison. 2000. Research methods in education, 5th ed. London: Routledge.CrossRefGoogle Scholar
  15. Coole, M. 2015. Physical security professional’s body of knowledge: A cultural domain analysis of physical security’s knowledge structure. Ph.D., Curtin University, Perth, Australia.Google Scholar
  16. Coole, M., and D.J. Brooks. 2011. Mapping the organizational relations within physical security’s body of knowledge: A management heuristic of sound theory and best practice. Paper Presented at the 4th Australian Security and Intelligence Conference, Perth, Western Australia.Google Scholar
  17. Coole, M.P., D.J. Brooks, and A. Minnaar. 2016. The physical security professional: Mapping a body of knowledge. Security Journal. doi: 10.1057/s41284-016-0084-8.Google Scholar
  18. Cox, T.F., and M.A.A. Cox. 2000. Multidimensional scaling: Monographs on statistics and applied probability, 2nd ed. Boca Raton: Chapman & Hall/CRC.Google Scholar
  19. Criscuoli, E.J. 1988. The time has come to acknowledge security as a profession. Annals of the American Academy of Political and Social Science 498 (1): 98–107.CrossRefGoogle Scholar
  20. Edmondson, K.M. 1995. Concept mapping for the development of curricula. Journal of Research in Science Teaching 32 (7): 777–793.CrossRefGoogle Scholar
  21. Eraut, M.R. 1994. Developing professional knowledge and competence. London: Falmer Press.Google Scholar
  22. Flexner, A. 1915. Is social work a profession? Paper Presented at the National Conference of Charities and Corrections, Baltimore, Maryland.Google Scholar
  23. Fox, R.E. 1994. Training professional psychologists for the twenty-first century. American Psychologist 49 (3): 200–206.CrossRefGoogle Scholar
  24. Fraenkel, J.R., N.E. Wallen, and H.H. Hyun. 2012. How to design and evaluate research in education. New York: McGraw-Hill.Google Scholar
  25. Fraser, K.M. 1993. Theory based use of concept mapping in organization development: Creating shared understanding as a basis for the cooperative design of work changes and changes in working relationships. Ann Arbor: UMI.Google Scholar
  26. Garcia, M.L. 2000. Personal opinion: Raising the bar for security professionals. Security Journal 13: 79–81.CrossRefGoogle Scholar
  27. Garcia, M.L. 2008. The design and evaluation of physical protection systems, 2nd ed. Burlington, MA: Butterworth-Heinemann.Google Scholar
  28. Gonzalvo, P., J.J. Canas, and M.T. Bajo. 1994. Structural representations in knowledge acquisition. Journal of Educational Psychology 86 (4): 601.CrossRefGoogle Scholar
  29. Johnson, A.G. 1995. The Blackwell dictionary of sociology: A user’s guide to sociological language. Cambridge: Blackwell.Google Scholar
  30. Kellogg, R.T. 2003. Cognitive psychology, 2nd ed. Thousand Oaks: Sage Publications.Google Scholar
  31. Kelly, G.A. 1955. The psychology of personal constructs. New York: Norton.Google Scholar
  32. Kruskal, J.B., and M. Wish. 1978. Multidimensional scaling. London: Sage Publications.CrossRefGoogle Scholar
  33. Maxwell, J.A. 1992. Understanding and validity in qualitative research. Harvard Education Review 62 (3): 279.CrossRefGoogle Scholar
  34. Nalla, M., and M. Morash. 2002. Assessing the scope of corporate security: Common practices and relationships with other business functions. Security Journal 15: 7–19.CrossRefGoogle Scholar
  35. Rogers, B. 2000. Personal opinion: A framework for higher education in the security field. Security Journal 13: 65–68.CrossRefGoogle Scholar
  36. Rogers, B., D. Palmgren, D. Giever, and M.L. Garcia. 2007. Security education in the 21st century: The role of engineering. American Society for Engineering Education.Google Scholar
  37. Sarre, R., T. Prenzler, and K. Earle. 2011. Private security and public interest: Exploring private security trends and directions for reform in the new era of plural policing. Australian Research Council. Adelaide: University of South Australia.Google Scholar
  38. Schensul, J.J., M.D. LeCompte, B.K. Nastasi, and S.P. Borgatti. 1999. Enhanced ethnographic methods. Walnut Creek, CA: Altamira Press.Google Scholar
  39. Smith, C.L., and D.J. Brooks. 2013. Security science: The theory and practice of security. Amsterdam: Elsevier.Google Scholar
  40. Standards Australia. 2006. HB 167:2006 Security risk management. Sydney: Standards Australia.Google Scholar
  41. Spradley, J.P. 1979. The ethnographic interview. Rinehart and Winston: New York Holt.Google Scholar
  42. McAleese, R. 1999. Concept mapping: A critical review. Innovations in Education and Training International 36 (4): 351.CrossRefGoogle Scholar
  43. McLucas, A.C. 2003. Decision making: Risk management, systems thinking and situation awareness. Canberra: Argos Press.Google Scholar
  44. Novak, J.D. 1993. Human constructivism: A unification of psychological and epistemological phenomena in meaning making. International Journal of Personal Construct Psychology 6: 167–193.CrossRefGoogle Scholar
  45. Western Australia Police. 2017. Police Licensing Services, Security, Licence information. https://www.police.wa.gov.au/About-Us/Our-agency/Police-Licensing-Services/Security/Licence-information#Training_certification. Accessed 10 August 2017
  46. Wilensky, H.L. 1964. The professionalization of everyone? American Journal of Sociology 70 (2): 137–158.CrossRefGoogle Scholar

Copyright information

© Macmillan Publishers Ltd 2017

Authors and Affiliations

  • Michael Patrick Coole
    • 1
  • David Jonathan Brooks
    • 1
  • Anthony Minnaar
    • 2
  1. 1.School of ScienceEdith Cowan UniversityJoondalupAustralia
  2. 2.Department of Criminology & Security ScienceUniversity of South AfricaPretoriaSouth Africa

Personalised recommendations