Abstract
There have been a number of studies that have attempted to define the concept of security. However, as past authors have indicated, security is multidimensional in nature and diverse in practice. This diversity leads to difficulty in providing a single all encompassing definition for the many applied domains of security. Security cannot be considered singular in concept definition, as definition is dependant on applied context. This study reversed engineered an applied security definition through the critique of 104 undergraduate security degrees, resulting in the presentation of 13 core security knowledge categories. These 13 knowledge categories were then integrated into an existing Australian security framework, resulting in the presentation of the science of security framework model. This framework allowed a greater understanding of security through knowledge structure and placed concept definition within the applied context domain of organizational security.
Similar content being viewed by others
References
American Society for Industrial Security. (1999) Proceedings of the 1999 Academic/Practitioner Symposium. Reno: American Society for Industrial Security, University of Nevada.
American Society for Industrial Security. (2000) Proceedings of the 2000 Academic/Practitioner Symposium. Oklahoma: American Society for Industrial Security, The University of Oklahoma.
American Society for Industrial Security. (2002) Proceedings of the 2002 Academic/Practitioner Symposium. Ohio: ASIS International, The University of Cincinnati.
ASIS International. (2003) Proceedings of the 2003 Academic/Practitioner Symposium. Maryland: ASIS International, The University of Maryland.
ASIS International. (2007) Academic institutions offering degrees and/or courses in security, http://www.asisonline.org/education/universityPrograms/traditionalprograms.pdf, accessed 7 March 2007.
Association of Universities and Colleges of Canada. (2005) Speaking for Canada's universities at home and abroad, http://oraweb.aucc.ca/pls/, accessed 28 July 2005.
Bazzina, M. (2006) Security Standards and Support Systems Report: A Collaborative Project Between the Commonwealth Attorney-General's Department and Standards Australia. Sydney, NSW: Standards Australia International.
Brooks, D.J. (2006) Mapping the consensual knowledge of security risk management experts. In: C. Valli and A. Woodward (eds.) Proceedings of the 7th Australian Information Warfare and Security Conference. Perth, Western Australia: School of Computing and Information Science, Edith Cowan University, pp. 9–17.
Brooks, D.J. (2007) Defining the Science of Security through Knowledge Categorisation. Paper presented at the Criminology and Victimlogical Society of Southern Africa (CRIMSA) Conference 2007, October, University of Pretoria, Pretoria.
Clancey, W.J. (1997) The Conceptual Nature of Knowledge, Situations, and Activity. In: P.J. Feltovich, K.M. Ford and R.R. Hoffman (eds.) Expertise in Context: Human and Machine. Menlo Park, CA: The MIT Press, pp. 247–291.
Collins English Dictionary and Thesaurus. (1992) Sydney, NSW: HarperCollins Publishers.
Craighead, G. (2003) High-Rise Security and Fire Life Safety. Woburn, MA: Butterworth-Heinemann.
Davidson, M.A. (2005) A matter of degrees. Security Management 49 (12): 72–99.
Eysenck, M.W. and Keane, M.T. (2002) Cognitive Psychology: A Student's Handbook. New York: Psychology Press.
Ferguson, G. (2004) Policing conference returns to Adelaide. Australian Defence Magazine 12(8): 54.
Fischer, R.J. and Green, G. (2004) Introduction to Security. Boston, MA: Butterworth-Heinemann.
Garcia, M.L. (2001) The Design and Evaluation of Physical Protection Systems. Boston, MA: Butterworth-Heinemann.
Good Guides. (2004) Helping you make decisions about where and what to study in Australia, http://www.thegoodguides.com.au/ggcontent/course/id, accessed 28 October 2004.
Hesse, L. and Smith, C.L. (2001) Core Curriculum in Security Science. In: H. Armstrong (ed.) Proceedings of the 5th Australian Security Research Symposium. Perth, Western Australia: School of Computing and Information Science, Edith Cowan University, pp. 87–104.
Hiemstra, R. (1996) What's in a word? Changes in self-directed learning language over a decade, http://www-distance.syr.edu/word.html, accessed 20 October 2005.
Horvath, J. (2004) The fear factor, http://www.telepolis.de/english/inhalt/te/18187/1.html, accessed 3 September 2004.
Howard, J. (2004) Business government forum on national security, http://www.safeguardingaustralia.org.au/Questions/Howard-address-23June04.doc, accessed 3 July 2004.
Kellogg, R.T. (2003) Cognitive Psychology. Thousand Oaks, CA: Sage Publications.
Kidd, S. (2006) The Security Institute yearbook and directory of qualifications 2006, http://www.security-institute.org/pdf/2006%20Yearbook.pdf, accessed 25 June 2007.
Langston, C. and Lauge-Kristensen, R. (2002) Strategic Management of Built Facilities. Boston, MA: Butterworth-Heinemann.
Lockhart, R.S. and Craik, F.I.M. (1990) Levels of processing: A retrospective commentary on a framework for memory research. Canadian Journal of Psychology 44: 87–112.
Manunta, G. (1999) What is security? Security Journal 12 (3): 57–66.
Manunta, G. (2002) Risk and security: Are they compatible concepts? Security Journal 15 (2): 43–55.
Manunta, G. and Manunta, R. (2006) Theorizing about Security. In: M. Gill (ed.) The Handbook of Security. New York: Palgrave Macmillan, pp. 629–657.
McCrie, R.D. (2004) The history of expertise in security management practice and litigation. Security Journal 17 (3): 11–19.
Morley, H.N. and Vogel, R.E. (1993) The higher education dilemma for the private security professional: Delivery methodologies and core curriculum from the practitioner's perspective. Security Journal 4 (3): 122–127.
Novak, J.D. and Gowin, D.B. (1984) Learning How to Learn. Cambridge: Cambridge University Press.
Pennebaker, J.W., Francis, M.E. and Booth, R.J. (2001) Linguistic Inquiry and Word Count (LIWC2001). Mahwah, NJ: Erlbaum Publishers.
Post, R.S. and Kingsbury, A.A. (1991) Security Administration: An Introduction to the Protection Services. Boston, MA: Butterworth-Heinemann.
Rennie, L.J. and Gribble, J. (1999) A Guide to Preparing Your Application for Candidacy. Perth, Western Australia: Curtin University of Technology.
Risk Management Institution of Australasia. (2007) Security risk management body of knowledge, http://www.securityprofessionals.org.au/, accessed 24 January 2007.
Sarre, R. (2005) Researching private policing: Challenges and agendas for researchers. Security Journal 18 (3): 57–70.
Security Professionals' Taskforce. (2008) Advancing security professionals: A discussion paper to identify the key actions required to advance security professionals and their contribution to Australia, http://www.securityprofessionals.org.au/.
Smith, C.L. (2001) Security science: An emerging applied science. Journal of the Science Teachers Association of Western Australia 37 (2): 8–10.
Standards Australia. (2004a) AS/NZS4360:2004 Risk Management. Sydney, NSW: Standards Australia International.
Standards Australia. (2004b) HB221 Business Continuity Planning. Sydney, NSW: Standards Australia International.
Talbot, J. and Jakeman, M. (2008) Security Risk Management Body of Knowledge. Carlton South: Risk Management Institution of Australasia.
Tate, P.W. (1997) Report on the Security Industry Training: Case Study of an Emerging Industry. Perth: Western Australian Department of Training, Western Australian Government Publishing.
Yates, A. (2004) Australia's Homeland Security Market and Industry's Role. Canberra: Australian Homeland Security Research Centre.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Brooks, D. What is security: Definition through knowledge categorization. Secur J 23, 225–239 (2010). https://doi.org/10.1057/sj.2008.18
Published:
Issue Date:
DOI: https://doi.org/10.1057/sj.2008.18