Advertisement

Security Journal

, Volume 30, Issue 3, pp 686–702 | Cite as

Stratum of security practice: Using risk as a measure in the stratification of security works

  • Codee R Ludbey
  • David J Brooks
Original Article

Abstract

Corporate security is a unique practice area within the broad security domain, providing security across government and private organisations. Nevertheless, an understanding of the hierarchy and influence of corporate security practitioners within an organisation is lacking. In contrast, security literature claims that senior security practitioners occupy the executive levels of organisational management. Therefore, the study investigated the link between the measure of risk uncertainty and the level of work in a role, using Jaques’ general theory of managerial hierarchies. The study findings demonstrated that within corporate security, risk does provide a measure of work stratification that indicates a relationship between risk scanning and work level. Furthermore, that this identified the hierarchy of security within the broader corporate stratification of work. Results indicate that the higher the person is within the work strata, the broader and more external their scanning of risk. However, the security manager may hold a senior executive title but lacks alignment in risk outlook and level of work when compared to other executive managers.

Keywords

stratum work complexity scanning risk corporate security 

References

  1. Auster, E. and Choo, C.W. (1993) Environmental scanning by CEOs in two Canadian industries. Journal of the American Society for Information Science 44(4): 194–203.CrossRefGoogle Scholar
  2. Auster, E. and Choo, C.W. (1994a) CEOs, information, and decision-making: Scanning the environment for strategic advantage. Library Trends 43(2): 206–225.Google Scholar
  3. Auster, E. and Choo, C.W. (1994b) How senior managers acquire and use information in environmental scanning. Information Processing & Management 30(5): 607–618.CrossRefGoogle Scholar
  4. Aven, T. (2008) Risk Analysis: Assessing Uncertainties Beyond Expected Values and Probabilities. Chichester, UK: John Wiley & Sons.CrossRefGoogle Scholar
  5. Aven, T. and Renn, O. (2009) On risk defined as an event where the outcome is uncertain. Journal of Risk Research 12(1): 1–11.CrossRefGoogle Scholar
  6. Brooks, D. (2011) Security risk management: A psychometric map of expert knowledge structure. Risk Management: An International Journal 13(1/2): 17–41.CrossRefGoogle Scholar
  7. Brooks, D. (2013) Corporate security: Using knowledge construction to define a practising body of knowledge. Asian Journal of Criminology 8(2): 89–101.CrossRefGoogle Scholar
  8. Brooks, D. and Corkill, J. (2014) Corporate security and the stratum of security management. In: K. Walby and R. Lippert (eds.) Corporate Security in the 21st Century: Theory and Practice in International Perspective. 1st edn. Palgrave Macmillan, pp. 216–234.Google Scholar
  9. Brooks, D. and Coole, M. (2011) Mapping the organizational relations within physical security's body of knowledge: A management heuristic of sound theory and best practice. Paper presented at the 4th Australian Security and Intelligence Conference, Perth, Australia, http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1013&context=asi, accessed 7 January 2016.
  10. Boal, K.B. and Whitehead, C.J. (1992) A Critique and Extension of the Stratified Systems Theory Perspective Strategic Leadership A Multiorganizational-Level Perspective. Westport, CT: Quorum Books.Google Scholar
  11. Campbell, D.J. (1988) Task complexity: A review and analysis. Academy of Management. The Academy of Management Review 13(1): 40–52.Google Scholar
  12. Case, D.O. (2002) Looking for Information A Survey of Research on Information Seeking, Needs, and Behavior. San Diego, CA: Elsevier Science.Google Scholar
  13. Cohen, L., Manion, L. and Morrison, K. (2007) Research Methods in Education. 6th edn. New York: Routledge.Google Scholar
  14. Coole, M. and Brooks, D. (2015) Towards security professionalisation: The cultural journey to employ and develop future security professionals. Australian Security Magazine (April/May): 22–23.Google Scholar
  15. Craddock, K. (2002) Requisite Organization Annotated Bibliography: An Annotated Research Bibliography on Elliott Jaques. 6th edn. Global Organization Design Society, http://globalro.org/index.php/go-library-3/comprehensive-annotated-ro-bibliography, accessed 7 January 2016.
  16. Creswell, J. (2007) Qualitative Inquiry & Research Design Choosing Among Five Approaches. 2nd edn. Thousand Oaks, CA: SAGE Publications.Google Scholar
  17. Creswell, J. (2009) Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. 3rd edn. New Delhi, India: SAGE Publications.Google Scholar
  18. Cubbage, C. and Brooks, D. (2013) Corporate Security in the Asia-Pacific Region. Boca Raton, FL: CRC Press.Google Scholar
  19. Denzin, N.K. (1989) The Research Act: A Theoretical Introduction to Sociological Methods. 3rd edn. Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
  20. Fay, J.J. (2002) Contemporary Security Management. 1st edn. Boston, MA: Butterworth-Heinemann.Google Scholar
  21. Fayol, H. (1949) General and Industrial Management. Chicago, IL: Pitman Publishing Corporation.Google Scholar
  22. Fischer, R.J., Halibozek, E. and Green, G. (2008) Introduction to Security. 8th edn. Oxford: Butterworth-Heinemann.Google Scholar
  23. Fowler, F.J. (2014) Survey Research Methods. 5th edn. Thousand Oaks, CA: SAGE Publications.Google Scholar
  24. Garcia, M.L. (2008) The Design and Evaluation of Physical Protection Systems. 2nd edn. Sydney, New South Wales: Butterworth-Heinemann.CrossRefGoogle Scholar
  25. Gill, M. (ed.) (2014) The Handbook of Security. 2nd edn. New York: Palgrave Macmillan.CrossRefGoogle Scholar
  26. Griffiths, M., Brooks, D. and Corkill, J. (2010) Defining the security professional: Definition through a body of knowledge. Paper presented at the 3rd Australian Security and Intelligence Conference, Perth, Australia, http://igneous.scis.ecu.edu.au/proceedings/2010/secintel/griffiths.pdf.
  27. Haerem, T. and Rau, D. (2007) The influence of degree of expertise and objective task complexity on perceived task complexity and performance. The Journal of Applied Psychology 92(5): 1320–1331.CrossRefGoogle Scholar
  28. Ivanov, S. (2006) Investigating the optimum manager-subordinate relationship of a discontinuity theory of managerial organisations: An exploratory study of a general theory of managerial hierarchy. Doctor of Philosophy, The George Washington University, Washington DC, https://sergeyivanovorg.sharepoint.com/Documents/Sergey_Ivanov_PhD_PUBLIC_2014_12_01.pdf.
  29. Ivanov, S. (2011) Why organizations fail: A conversation about American competitiveness. International Journal of Organizational Innovation 4(1): 94–110.Google Scholar
  30. Jaques, E. (1951) The Changing Culture of a Factory a Study of Authority and Participation in an Industrial Setting. London: Tavistock Publications.Google Scholar
  31. Jaques, E. (1964) Time-Span Handbook How to Use Time-Span of Discretion to Measure the Level of Work in Employment Roles and to Arrange an Equitable Payment Structure. 1st edn. London: Heinemann Educational Books.Google Scholar
  32. Jaques, E. (1972) Measurement of Responsibility A Study of Work, Payment, and Individual Capacity. New York: John Wiley & Sons.Google Scholar
  33. Jaques, E. (1976) A General Theory of Bureaucracy. London: Heinemann Educational Books.Google Scholar
  34. Jaques, E. (1986) The development of intellectual capability: A discussion of stratified systems theory. The Journal of Applied Behavioral Science 22(4): 361–383.CrossRefGoogle Scholar
  35. Jaques, E. (1996) Requisite Organization A Total System for Effective Managerial Organization and Managerial Leadership for the 21st Century. 2nd edn. Arlington, VA: Carson Hall and Co Publishers.Google Scholar
  36. Jaques, E. (2002) The psychological foundations of managerial systems a general systems approach to consulting psychology. Paper presented at the Midwinter Conference of the Society of Consulting Psychology, San Antonio, TX.Google Scholar
  37. Kalser, R.B., Bartholomew, C.S., Overfield, D.V. and Yarborough, P. (2011) Differences in managerial jobs at the bottom, middle, and top: A review of empirical research. The Psychologist-Manager Journal 14(2): 76–91.CrossRefGoogle Scholar
  38. Laner, S., Crossman, E.R.F.W. and Baker, H.T. (1969) Measurement of Responsibility: A Critical Evaluation of Level of Work Measurement by Time-Span of Discretion. Berkeley, CA: California University.Google Scholar
  39. Litterer, J.A. (1963) Organizations: Structured Behaviour. New York: John Wiley and Sons.Google Scholar
  40. Martin, J. and Fellenz, M. (2010) Organizational Behaviour & Management. 4th edn. Hampshire, UK: Cengage Learning EMEA.Google Scholar
  41. Mintzberg, H. (1973) The Nature of Managerial Work. 1st edn. New York: Harper & Row, Publishers.Google Scholar
  42. Mintzberg, H. (1980) Structure in 5’s: A synthesis of the research on organization design. Management Science 26(3): 322–341.CrossRefGoogle Scholar
  43. Naylor, J.C. and Dickinson, T.L. (1969) Task structure, work structure, and team performance. Journal of Applied Psychology 53(3): 167–177.CrossRefGoogle Scholar
  44. Power, M. (2007) Organized Uncertainty: Designing a World of Risk Management. Oxford: Oxford University Press.Google Scholar
  45. Robbins, S.P. and Judge, T.A. (2012) Essentials of Organizational Behaviour. 11th edn. Essex, UK: Pearson Education Limited.Google Scholar
  46. Robson, A. and Robinson, L. (2013) Building on models of information behaviour: Linking information seeking and communication. Journal of Documentation 69(2): 169–193.CrossRefGoogle Scholar
  47. Sarre, R. and Prenzler, T. (2005) Mapping the Australian security industry. Security Journal 18(4): 51–64.CrossRefGoogle Scholar
  48. Sennewald, C.A. (2011) Effective Security Management. 5th edn. Portland, OR: Butterworth-Heinemann.Google Scholar
  49. Sjoberg, L. (2000) Factors in risk perception. Risk Analysis 20(1): 1–12.CrossRefGoogle Scholar
  50. Smith, C.L. and Brooks, D.J. (2013) Security Science: The Theory and Practice of Security. Waltham, MA: Elsevier.Google Scholar
  51. Talbot, J. and Jakeman, M. (2009) Security Risk Management Body of Knowledge. Hoboken, New Jersey: Wiley.CrossRefGoogle Scholar
  52. Tushman, M.L. and Nadler, D.A. (1978) Information processing as an integrating concept in organizational design. The Academy of Management Review 3(3): 613–624.Google Scholar
  53. Willis, H.H. (2007) Guiding resource allocations based on terrorism risk. Risk Analysis 27(3): 597–606.CrossRefGoogle Scholar
  54. Wood, R.E. (1986) Task complexity: Definition of the construct. Organizational Behavior and Human Decision Processes 37(1): 60–82.CrossRefGoogle Scholar

Copyright information

© Macmillan Publishers Ltd 2016

Authors and Affiliations

  • Codee R Ludbey
    • 1
  • David J Brooks
    • 1
  1. 1.School of Computer and Security Science, Edith Cowan UniversityJoondalupAustralia

Personalised recommendations