Skip to main content
Log in

What is security: Definition through knowledge categorization

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

There have been a number of studies that have attempted to define the concept of security. However, as past authors have indicated, security is multidimensional in nature and diverse in practice. This diversity leads to difficulty in providing a single all encompassing definition for the many applied domains of security. Security cannot be considered singular in concept definition, as definition is dependant on applied context. This study reversed engineered an applied security definition through the critique of 104 undergraduate security degrees, resulting in the presentation of 13 core security knowledge categories. These 13 knowledge categories were then integrated into an existing Australian security framework, resulting in the presentation of the science of security framework model. This framework allowed a greater understanding of security through knowledge structure and placed concept definition within the applied context domain of organizational security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3

Similar content being viewed by others

References

  • American Society for Industrial Security. (1999) Proceedings of the 1999 Academic/Practitioner Symposium. Reno: American Society for Industrial Security, University of Nevada.

  • American Society for Industrial Security. (2000) Proceedings of the 2000 Academic/Practitioner Symposium. Oklahoma: American Society for Industrial Security, The University of Oklahoma.

  • American Society for Industrial Security. (2002) Proceedings of the 2002 Academic/Practitioner Symposium. Ohio: ASIS International, The University of Cincinnati.

  • ASIS International. (2003) Proceedings of the 2003 Academic/Practitioner Symposium. Maryland: ASIS International, The University of Maryland.

  • ASIS International. (2007) Academic institutions offering degrees and/or courses in security, http://www.asisonline.org/education/universityPrograms/traditionalprograms.pdf, accessed 7 March 2007.

  • Association of Universities and Colleges of Canada. (2005) Speaking for Canada's universities at home and abroad, http://oraweb.aucc.ca/pls/, accessed 28 July 2005.

  • Bazzina, M. (2006) Security Standards and Support Systems Report: A Collaborative Project Between the Commonwealth Attorney-General's Department and Standards Australia. Sydney, NSW: Standards Australia International.

    Google Scholar 

  • Brooks, D.J. (2006) Mapping the consensual knowledge of security risk management experts. In: C. Valli and A. Woodward (eds.) Proceedings of the 7th Australian Information Warfare and Security Conference. Perth, Western Australia: School of Computing and Information Science, Edith Cowan University, pp. 9–17.

  • Brooks, D.J. (2007) Defining the Science of Security through Knowledge Categorisation. Paper presented at the Criminology and Victimlogical Society of Southern Africa (CRIMSA) Conference 2007, October, University of Pretoria, Pretoria.

  • Clancey, W.J. (1997) The Conceptual Nature of Knowledge, Situations, and Activity. In: P.J. Feltovich, K.M. Ford and R.R. Hoffman (eds.) Expertise in Context: Human and Machine. Menlo Park, CA: The MIT Press, pp. 247–291.

    Google Scholar 

  • Collins English Dictionary and Thesaurus. (1992) Sydney, NSW: HarperCollins Publishers.

  • Craighead, G. (2003) High-Rise Security and Fire Life Safety. Woburn, MA: Butterworth-Heinemann.

    Google Scholar 

  • Davidson, M.A. (2005) A matter of degrees. Security Management 49 (12): 72–99.

    Google Scholar 

  • Eysenck, M.W. and Keane, M.T. (2002) Cognitive Psychology: A Student's Handbook. New York: Psychology Press.

    Google Scholar 

  • Ferguson, G. (2004) Policing conference returns to Adelaide. Australian Defence Magazine 12(8): 54.

  • Fischer, R.J. and Green, G. (2004) Introduction to Security. Boston, MA: Butterworth-Heinemann.

    Google Scholar 

  • Garcia, M.L. (2001) The Design and Evaluation of Physical Protection Systems. Boston, MA: Butterworth-Heinemann.

    Google Scholar 

  • Good Guides. (2004) Helping you make decisions about where and what to study in Australia, http://www.thegoodguides.com.au/ggcontent/course/id, accessed 28 October 2004.

  • Hesse, L. and Smith, C.L. (2001) Core Curriculum in Security Science. In: H. Armstrong (ed.) Proceedings of the 5th Australian Security Research Symposium. Perth, Western Australia: School of Computing and Information Science, Edith Cowan University, pp. 87–104.

    Google Scholar 

  • Hiemstra, R. (1996) What's in a word? Changes in self-directed learning language over a decade, http://www-distance.syr.edu/word.html, accessed 20 October 2005.

  • Horvath, J. (2004) The fear factor, http://www.telepolis.de/english/inhalt/te/18187/1.html, accessed 3 September 2004.

  • Howard, J. (2004) Business government forum on national security, http://www.safeguardingaustralia.org.au/Questions/Howard-address-23June04.doc, accessed 3 July 2004.

  • Kellogg, R.T. (2003) Cognitive Psychology. Thousand Oaks, CA: Sage Publications.

    Google Scholar 

  • Kidd, S. (2006) The Security Institute yearbook and directory of qualifications 2006, http://www.security-institute.org/pdf/2006%20Yearbook.pdf, accessed 25 June 2007.

  • Langston, C. and Lauge-Kristensen, R. (2002) Strategic Management of Built Facilities. Boston, MA: Butterworth-Heinemann.

    Google Scholar 

  • Lockhart, R.S. and Craik, F.I.M. (1990) Levels of processing: A retrospective commentary on a framework for memory research. Canadian Journal of Psychology 44: 87–112.

    Article  Google Scholar 

  • Manunta, G. (1999) What is security? Security Journal 12 (3): 57–66.

    Article  Google Scholar 

  • Manunta, G. (2002) Risk and security: Are they compatible concepts? Security Journal 15 (2): 43–55.

    Article  Google Scholar 

  • Manunta, G. and Manunta, R. (2006) Theorizing about Security. In: M. Gill (ed.) The Handbook of Security. New York: Palgrave Macmillan, pp. 629–657.

    Google Scholar 

  • McCrie, R.D. (2004) The history of expertise in security management practice and litigation. Security Journal 17 (3): 11–19.

    Article  Google Scholar 

  • Morley, H.N. and Vogel, R.E. (1993) The higher education dilemma for the private security professional: Delivery methodologies and core curriculum from the practitioner's perspective. Security Journal 4 (3): 122–127.

    Google Scholar 

  • Novak, J.D. and Gowin, D.B. (1984) Learning How to Learn. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Pennebaker, J.W., Francis, M.E. and Booth, R.J. (2001) Linguistic Inquiry and Word Count (LIWC2001). Mahwah, NJ: Erlbaum Publishers.

    Google Scholar 

  • Post, R.S. and Kingsbury, A.A. (1991) Security Administration: An Introduction to the Protection Services. Boston, MA: Butterworth-Heinemann.

    Google Scholar 

  • Rennie, L.J. and Gribble, J. (1999) A Guide to Preparing Your Application for Candidacy. Perth, Western Australia: Curtin University of Technology.

    Google Scholar 

  • Risk Management Institution of Australasia. (2007) Security risk management body of knowledge, http://www.securityprofessionals.org.au/, accessed 24 January 2007.

  • Sarre, R. (2005) Researching private policing: Challenges and agendas for researchers. Security Journal 18 (3): 57–70.

    Article  Google Scholar 

  • Security Professionals' Taskforce. (2008) Advancing security professionals: A discussion paper to identify the key actions required to advance security professionals and their contribution to Australia, http://www.securityprofessionals.org.au/.

  • Smith, C.L. (2001) Security science: An emerging applied science. Journal of the Science Teachers Association of Western Australia 37 (2): 8–10.

    Google Scholar 

  • Standards Australia. (2004a) AS/NZS4360:2004 Risk Management. Sydney, NSW: Standards Australia International.

  • Standards Australia. (2004b) HB221 Business Continuity Planning. Sydney, NSW: Standards Australia International.

  • Talbot, J. and Jakeman, M. (2008) Security Risk Management Body of Knowledge. Carlton South: Risk Management Institution of Australasia.

    Google Scholar 

  • Tate, P.W. (1997) Report on the Security Industry Training: Case Study of an Emerging Industry. Perth: Western Australian Department of Training, Western Australian Government Publishing.

    Google Scholar 

  • Yates, A. (2004) Australia's Homeland Security Market and Industry's Role. Canberra: Australian Homeland Security Research Centre.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Brooks, D. What is security: Definition through knowledge categorization. Secur J 23, 225–239 (2010). https://doi.org/10.1057/sj.2008.18

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2008.18

Keywords

Navigation