Where Next for the Professionalization of Security?

  • Alison Wakefield


The scope of professional practice within security risk management has broadened substantially in the new millennium. As corporations are now operating within an increasingly complex, globalized business environment, they often have to take greater risks in doing so, and rely more on their security departments and other organizational risk management functions to mitigate these. The new millennium has also presented a number of new risks and regulatory requirements affecting business, as highlighted in the research by Briggs and Edwards (2006) on the changing role of corporate security departments. Growing regulatory controls on corporations, following the high-profile collapses of Enron in 2001 and World Com and Tyco in 2002, and heightened concern globally about the problems of bribery, corruption and money laundering have raised the status of organizational risk management within corporate governance structures. The events of 9/11 and subsequent terrorist attacks around the world have signalled that corporations are viable terrorist targets and afforded greater priority to business continuity and crisis management within organizations. Most recently, the increasing threat of cyber-attack and the risks to organizations associated with information security breaches has placed security departments under pressure to integrate their activities better with those of corporate IT departments, in order to address converged security threats (Azeem et al., 2013).


Corporate Governance Continue Professional Development Private Security Competency Framework Security Sector 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. ASIS Foundation (2009). Compendium of the ASIS Academic/Practitioner Symposium 1997–2008. Alexandria, VA: ASIS International. Accessed December 20, 2013, from Scholar
  2. ASIS Foundation (2010). Proceedings of the 2009 Academic/Practitioner Symposium. Alexandria, VA: ASIS International. Accessed December 20, 2013, from Scholar
  3. ASIS International (2013a). About ASIS. Alexandria, VA: ASIS International. Accessed December 20, 2013, from http://www.asisonline.orgGoogle Scholar
  4. ASIS International (2013b). Code of Ethics. Alexandria, VA: ASIS International. Accessed December 20, 2013, from Scholar
  5. Australian Government (2010). Protective Security Policy Framework. Canberra: Australian Government. Accessed December 20, 2013, from Scholar
  6. Azeem, A., Wakefield, A. and Button, M. (2013). Addressing the Weakest Link: Implementing Converged Security.. Security Journal, 26(3), 236–248.CrossRefGoogle Scholar
  7. Borodzicz, E. and Gibson, S.D. (2006). Corporate Security Education: Towards Meeting the Challenge.. Security Journal, 19(3), 180–195.CrossRefGoogle Scholar
  8. Briggs, R. (2005). Joining Forces: From National Security to Networked Security. London: Demos. Accessed December 20, 2013, from Scholar
  9. Briggs, R. and Edwards, C. (2006). The Business of Resilience: Corporate Security for the 21st Century. London: Demos. Accessed December 20, 2013, from Scholar
  10. Brooks, D. (2010). What Is Security? Definition Through Knowledge Categorization.. Security Journal, 23(3), 225–239.CrossRefGoogle Scholar
  11. Brooks, D. (2013). Corporate Security: Using Knowledge Construction to Define a Practising Body of Knowledge.. Asian Criminology, 8(2), 1–13.CrossRefGoogle Scholar
  12. Button, M. (2008). Doing Security: Critical Reflections and an Agenda for Change. Basingstoke: Palgrave.CrossRefGoogle Scholar
  13. Cabinet Office (2010). HMG Security Policy Framework. London: Cabinet Office. Accessed December 20, 2013, from Scholar
  14. Chartered Institute of Personnel Development (CIPD) (2011).Competence and Competency Frameworks. London: CIPD.Google Scholar
  15. Chartered Security Professionals Registration Authority (2013). Apply. London: CSPRA. Accessed from Scholar
  16. Chartered Security Professionals Registration Authority (2013). Register of Chartered Security Professionals Code of Conduct. London: CSPRA. Accessed December 20, 2013, from Scholar
  17. Evetts, J., Mieg, H.A. and Felt, U. (2006). Professionalization, Scientific Expertise, and Elitism: A Sociological Perspective, in Ericsson, K.A., Charness, N., Feltovich, P.J. and Hoffman, R.R. (eds.) The Cambridge Handbook of Expertise and Expert Performance, 105–127. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  18. Griffiths, M., Brooks, D.J., Corkill, J. (2010). Defining the Security Professional: Definition Through a Body of Knowledge. Proceedings of the 3rd Australian Security and Intelligence Conference, 44–52, Perth.Google Scholar
  19. Guardian (2011). Briton Danny Fitzsimons Jailed in Iraq for Contractors’ Murders. February 28. Accessed December 20, 2013, from Scholar
  20. Guardian (2012a). Blackwater Guards Lose Bid to Appeal Charges in Iraqi Civilian Shooting Case. June 5. Accessed December 20, 2013, from Scholar
  21. Guardian (2012b). G4S Boss Discovered Olympic Security Guard Shortfall Only a Few Days Ago. July 14. Accessed December 20, 2013, from Scholar
  22. Guardian (2012c). Surrey Police Shelve Privatisation Plan after G4S Olympic Failure. July 12. Accessed December 20, 2012, from Scholar
  23. Howe, D. (1986). Social Workers and Their Practice in Welfare Bureaucracies. Aldershot: Gower.Google Scholar
  24. Larson, M.S. (1977). The Rise of Professionalism: A Sociological Analysis. Berkeley, CA: University of California Press.Google Scholar
  25. Livingstone, K. and Hart, J. (2003). The Wrong Arm of the Law? Public Images of Private Security.. Policing and Society: An International Journal of Research and Policy, 13(2), 159–170.CrossRefGoogle Scholar
  26. McGee, A. (2006). Corporate Security’s Professional Project: An Examination of the Modern Condition of Corporate Security Management, and the Potential for Further Professionalisation of the Occupation. MSc Thesis, Shrivenham: Cranfield University.Google Scholar
  27. Nalla, M. K. (2001). Designing an Introductory Survey Course in Private Security.. Journal of Criminal Justice Education, 12(1), 35–52.CrossRefGoogle Scholar
  28. Reuters (2012). West Midlands Police Latest to Axe Outsourcing Plans. November 22. Accessed December 20, 2013, from Scholar
  29. Rothwell, A. and Arnold, J. (2005). How HR Professionals Rate ‘Continuing Professional Development’.. Human Resource Management Journal, 15(3), 18–32.CrossRefGoogle Scholar
  30. Scott, D., Brown, A., Lunt, I. and Thorne, L. (2004). Professional Doctorates: Integrating Professional and Academic Knowledge. Maidenhead: Open University Press.Google Scholar
  31. Sennewald, C.A. (2011). Effective Security Management. 5th ed. Burlington, MA: Butterworth-Heinemann.Google Scholar
  32. Shepherd, M. and Atkinson, R. (2011). Project Management Bodies of Knowledge; Conjectures and Refutations.. The Electronic Journal of Business Research Methods, 9(2), 152–158.Google Scholar
  33. Simonsen, C. (1996). The Case for: Security Management Is a Profession.. International Journal of Risk, Security and Crime Prevention, 1(3), 229–232.Google Scholar
  34. Talbot, J. and Jakeman, M. (2009). Security Risk Management Body of Knowledge. Hoboken, NJ: Wiley.CrossRefGoogle Scholar
  35. Wakefield, A. and Button, M. (2013). New Perspectives on Police Education and Training: Lessons from the Private Security Sector, in Stanislas, P. (ed.) International Perspectives on Police Education and Training. London: Routledge.Google Scholar
  36. Wakefield, A. and Prenzler, T. (2009). Privatization, in Wakefield, A. and Fleming, J. (eds.) The Sage Dictionary of Policing. London: Sage.CrossRefGoogle Scholar

Copyright information

© Alison Wakefield 2014

Authors and Affiliations

  • Alison Wakefield

There are no affiliations available

Personalised recommendations